On Tue, Dec 20, 2016 at 10:49:25AM -0800, Andy Lutomirski wrote: > >> FWIW, everywhere I say ioctl(), the bpf() syscall would be okay, too. > >> It doesn't make a semantic difference, except that I dislike > >> BPF_PROG_DETACH because that particular command isn't BPF-specific at > >> all. > > > > Well, I think it is; it pops the bpf program from a target and drops the > > reference on it. It's not much code, but it's certainly bpf-specific. > > I mean the interface isn't bpf-specific. If there was something that > wasn't bpf attached to the target, you'd still want an API to detach > it. This discussion won't go anywhere while you keep thinking that this api has to be generalized. As I explained several times earlier BPF_CGROUP_INET_SOCK_CREATE hook is bpf specific. There is nothing in the kernel that can take advantage of it today, so by definition the hook is bpf specific. Period. Saying that something in the future may come along that would want to use that is like saying I want to design the generic steering wheel for any car that will ever need it. Hence if you want to change 'target_fd' in BPF_PROG_ATTACH/DETACH cmds from being fd of open("cgroupdir") to fd of open("cgroupdir/cgroup.bpf") file inside it then I'm ok with that. All other proposals with non-extensible ioctls() and crazy text based per-hook permissions is nack. -- To unsubscribe from this list: send the line "unsubscribe linux-api" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html