From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-wr1-f49.google.com (mail-wr1-f49.google.com [209.85.221.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id A86793E95A1 for ; Thu, 15 Jan 2026 18:00:22 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=209.85.221.49 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768500025; cv=none; b=dftgWxGzDhtn+7aD/Qw2qiNkm52H3i0Et5oQWPz83RT3XQ8Vz3uWOZwO8sdgrAg0iSs4Pof7gPwvqrkvRzqiaj6/XctChMntAyucSZ+5Tl9ry8DVNFIIGPQVGyy8l5jeB5uTBp1rBNn2TFCPqCZA8Bg1n2T+7R/pC4AekZC6c0M= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1768500025; c=relaxed/simple; bh=vLddMxM0W6026RbjbLsRAyK48T0JMu6b1ru+OYq9x+Y=; h=From:Date:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=nc/OFq2GFxBt/kRDjKyv1uqHySGgL1tvRB5CPYG8DJQ3OK2KymEG7WWGnuis7BGzwg1g/VL3WwLfYD0JUBCutaUTw6+ElFvy7ZsXofrwdNuae+n2oQwMVyRD39yRN/25J/CTjTSWdegKOra0b6fWA2M4sr4+a/ywQ4nrUwRDfww= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com; spf=pass smtp.mailfrom=gmail.com; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b=Q98W8KbV; arc=none smtp.client-ip=209.85.221.49 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=gmail.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=gmail.com Authentication-Results: smtp.subspace.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="Q98W8KbV" Received: by mail-wr1-f49.google.com with SMTP id ffacd0b85a97d-42fb03c3cf2so891176f8f.1 for ; Thu, 15 Jan 2026 10:00:22 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1768500021; x=1769104821; darn=vger.kernel.org; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:date:from:from:to :cc:subject:date:message-id:reply-to; bh=8THmu0qXU1sZub569pYlCPkbhQYfiv8r3J7zMWrHXdE=; b=Q98W8KbVD0HNwCgzTK/NzQjs7GwQ8LlzVXscW6qR5zM3u/JEKK49xq2wVfvSrBM5hz wrjQ3Keo1Dkesj1NSgyflDA93bKlJr1/XlBUiPIYOlMBXdnIRDiHqWICuAE0eTOuflM7 wakFJkdpJGUu9AtDdJfWUEKSYcSNyOPJd8zPPySwPWfsYRXtEMmm+JxX6By/DYizyERV QGlnQyAI7p8p8yn/NPrfLhnH+5GtykFM+nEGpqjt30Hxo9Xbwh/0IP0u0Q37CiCgg0Gn sbn95rjNZcm2YbXypPimgYoZa6PLazYTKFIbtnBKPf4RM4QbcCNJWAQWAhkdb73r28Ua HGeA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1768500021; x=1769104821; h=in-reply-to:content-transfer-encoding:content-disposition :mime-version:references:message-id:subject:cc:to:date:from:x-gm-gg :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=8THmu0qXU1sZub569pYlCPkbhQYfiv8r3J7zMWrHXdE=; b=I7Rpkek68g2KBRsELT9wifddvRfRfX3RMcqL5mhjgfQ/PMnd3OfU4Y8+ZaRFlQYTow Cuxcl5G2bbzECxUUrTQMAdhIGFANSdUWPcxBhaJzYuhefluwSqU+IKhQ+OEoKq45AS6d ExJXKjNRrL9mlSBmcgGSXJ9rlhhqZpRTj1TQUnFOG1w8wfoQD6ETMy6WpRpkYhS0pDn3 0GmPwrY9mB9dw8mQKNJE4tCJf13dNNM/vE7bv38/1zv75TI25islsX6niklrsxF4VZxa S2L3/4MYbaDuZGZ2+8g7imbWBwwaujt5PPPSDDPCu5Q1qhSUz3/kE5x2L7LkKkexhCIx 0deg== X-Forwarded-Encrypted: i=1; AJvYcCX2Alk63HaY8L98Bzy9NBDJmEaT8vpI7UHWnjhIhZc6SxCcaLHR6IJUrTNVxGHzUwPxAzryouo1K150slE=@vger.kernel.org X-Gm-Message-State: AOJu0YzqrlsUrwPn4CiCnxmTHIaBql/ojCAyAEWF6Dxv1ySCQ2Ws+V4i ZZ218QoHSv4e91o/asTd5OurveUA/5RrLN9CgKCOCM5Wd2DkgUbBOn/H X-Gm-Gg: AY/fxX7A0g2+ePRoRtTGINZ3XCahj6Vr8QZCZ7Ay+cA7kfZ60oQHGS2lQDspjxDe/ie MTeS7+rE95cLy2cK9SA1vVtb6sJBQF5vf2DSqE7k8t5oQpLLRp8IFXd4nZoVtv8HFgm3Rnxytnq JQLnH7OJCZeWb2DojDKHVcoqTvFCNHxxPv1aKdMXKu3Pg9dUas4XjlmA1gsRU6327C9IrjQNUSW Af1apqbXlb2nXlmZa0DKhsX1KUw6ywg4yf0y1aarte0RrPeJUiOngjHCL+rzNxKCu7gnqSdqnuo 70LqSau7B50jeN4Q5ShO7noRI4ygvUUadCfGiSxG1e3JmXZQHCv0EwiWO92eVItzRMn8bbXezEG kv+TIVPCHXbmDdgBnEjEr+6JvqX9Qumn6+lHg+VCsQasY4pNBhZbdHtDcNXiBtHrqKX2yyh11Jv s= X-Received: by 2002:a05:6000:26d1:b0:431:2cb:d335 with SMTP id ffacd0b85a97d-4356a053852mr135704f8f.34.1768500020783; Thu, 15 Jan 2026 10:00:20 -0800 (PST) Received: from krava ([176.74.159.170]) by smtp.gmail.com with ESMTPSA id ffacd0b85a97d-4356997e664sm280337f8f.30.2026.01.15.10.00.18 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 15 Jan 2026 10:00:20 -0800 (PST) From: Jiri Olsa X-Google-Original-From: Jiri Olsa Date: Thu, 15 Jan 2026 19:00:17 +0100 To: Alexei Starovoitov Cc: Jiri Olsa , Leon Hwang , bpf , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Eduard Zingerman , Song Liu , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Puranjay Mohan , Xu Kuohai , Catalin Marinas , Will Deacon , "David S . Miller" , David Ahern , Thomas Gleixner , Ingo Molnar , Borislav Petkov , Dave Hansen , X86 ML , "H . Peter Anvin" , Andrew Morton , linux-arm-kernel , LKML , Network Development , kernel-patches-bot@fb.com Subject: Re: [PATCH bpf-next 0/4] bpf: tailcall: Eliminate max_entries and bpf_func access at runtime Message-ID: References: <20260102150032.53106-1-leon.hwang@linux.dev> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: On Wed, Jan 14, 2026 at 01:56:11PM -0800, Alexei Starovoitov wrote: > On Wed, Jan 14, 2026 at 1:00 PM Jiri Olsa wrote: > > > > > > > > > fyi I briefly discussed that with Andrii indicating that it might not > > > > be worth the effort at this stage. > > > > > > depending on complexity of course. > > > > for my tests I just had to allow BPF_MAP_TYPE_PROG_ARRAY map > > for sleepable programs > > > > jirka > > > > > > --- > > diff --git a/kernel/bpf/verifier.c b/kernel/bpf/verifier.c > > index faa1ecc1fe9d..1f6fc74c7ea1 100644 > > --- a/kernel/bpf/verifier.c > > +++ b/kernel/bpf/verifier.c > > @@ -20969,6 +20969,7 @@ static int check_map_prog_compatibility(struct bpf_verifier_env *env, > > case BPF_MAP_TYPE_STACK: > > case BPF_MAP_TYPE_ARENA: > > case BPF_MAP_TYPE_INSN_ARRAY: > > + case BPF_MAP_TYPE_PROG_ARRAY: > > break; > > default: > > verbose(env, > > Think it through, add selftests, ship it. > On the surface the easy part is to make > __bpf_prog_map_compatible() reject sleepable/non-sleepable combo. > Maybe there are other things. ok, thanks jirka