diff options
author | Andrii Nakryiko <andrii@kernel.org> | 2024-01-23 18:21:02 -0800 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2024-01-24 16:21:01 -0800 |
commit | 9ea7c4bf17e39d463eb4782f948f401d9764b1b3 (patch) | |
tree | 9cf0cc9d7b7ceb2ec8b7b2fe37baa0b5ce0bd30c /kernel/trace/bpf_trace.c | |
parent | a177fc2bf6fd83704854feaf7aae926b1df4f0b9 (diff) | |
download | linux-9ea7c4bf17e39d463eb4782f948f401d9764b1b3.tar.gz linux-9ea7c4bf17e39d463eb4782f948f401d9764b1b3.tar.bz2 linux-9ea7c4bf17e39d463eb4782f948f401d9764b1b3.zip |
bpf: Add BPF token support to BPF_BTF_LOAD command
Accept BPF token FD in BPF_BTF_LOAD command to allow BTF data loading
through delegated BPF token. BPF_F_TOKEN_FD flag has to be specified
when passing BPF token FD. Given BPF_BTF_LOAD command didn't have flags
field before, we also add btf_flags field.
BTF loading is a pretty straightforward operation, so as long as BPF
token is created with allow_cmds granting BPF_BTF_LOAD command, kernel
proceeds to parsing BTF data and creating BTF object.
Signed-off-by: Andrii Nakryiko <andrii@kernel.org>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Link: https://lore.kernel.org/bpf/20240124022127.2379740-6-andrii@kernel.org
Diffstat (limited to 'kernel/trace/bpf_trace.c')
0 files changed, 0 insertions, 0 deletions