libbpf: Reject static entry-point BPF programs
mainline inclusion from mainline-5.14-rc1 commit 513f485c category: feature bugzilla: https://gitee.com/openeuler/kernel/issues/I5EUVD CVE: NA Reference: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f485ca5163c6cba869602d076a8e2f04d1ca1 ------------------------------------------------- Detect use of static entry-point BPF programs (those with SEC() markings) and emit error message. This is similar to c1cccec9 ("libbpf: Reject static maps") but for BPF programs. Signed-off-by: NAndrii Nakryiko <andrii@kernel.org> Signed-off-by: NAlexei Starovoitov <ast@kernel.org> Acked-by: NSong Liu <songliubraving@fb.com> Link: https://lore.kernel.org/bpf/20210514195534.1440970-1-andrii@kernel.org (cherry picked from commit 513f485c) Signed-off-by: NWang Yufen <wangyufen@huawei.com>
Showing
想要评论请 注册 或 登录