lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 10 Aug 2020 17:01:27 +0200 From: Toke Høiland-Jørgensen <toke@...hat.com> To: Andrii Nakryiko <andriin@...com>, bpf@...r.kernel.org, netdev@...r.kernel.org, ast@...com, daniel@...earbox.net Cc: andrii.nakryiko@...il.com, kernel-team@...com, Andrii Nakryiko <andriin@...com> Subject: Re: [PATCH bpf-next 0/5] BPF link force-detach support Andrii Nakryiko <andriin@...com> writes: > This patch set adds new BPF link operation, LINK_DETACH, allowing processes > with BPF link FD to force-detach it from respective BPF hook, similarly how > BPF link is auto-detached when such BPF hook (e.g., cgroup, net_device, netns, > etc) is removed. This facility allows admin to forcefully undo BPF link > attachment, while process that created BPF link in the first place is left > intact. > > Once force-detached, BPF link stays valid in the kernel as long as there is at > least one FD open against it. It goes into defunct state, just like > auto-detached BPF link. > > bpftool also got `link detach` command to allow triggering this in > non-programmatic fashion. I know this was already merged, but just wanted to add a belated 'thanks for adding this'! > Cc: Toke Høiland-Jørgensen <toke@...hat.com> BTW, I've noticed that you tend to drop Ccs on later versions of your patch series (had to go and lookup v2 of this to check that it was in fact merged). Is that intentional? :) -Toke
Powered by blists - more mailing lists