Commit 1f6d52f1 authored by Kumar Kartikeya Dwivedi's avatar Kumar Kartikeya Dwivedi Committed by Alexei Starovoitov

bpf: Remove local kptr references in documentation

We don't want to commit to a specific name for these. Simply call them
allocated objects coming from bpf_obj_new, which is completely clear in
itself.
Signed-off-by: default avatarKumar Kartikeya Dwivedi <memxor@gmail.com>
Link: https://lore.kernel.org/r/20221114191547.1694267-2-memxor@gmail.comSigned-off-by: default avatarAlexei Starovoitov <ast@kernel.org>
parent de763fbb
...@@ -332,13 +332,14 @@ avoid defining types with 'bpf\_' prefix to not be broken in future releases. ...@@ -332,13 +332,14 @@ avoid defining types with 'bpf\_' prefix to not be broken in future releases.
In other words, no backwards compatibility is guaranteed if one using a type In other words, no backwards compatibility is guaranteed if one using a type
in BTF with 'bpf\_' prefix. in BTF with 'bpf\_' prefix.
Q: What is the compatibility story for special BPF types in local kptrs? Q: What is the compatibility story for special BPF types in allocated objects?
------------------------------------------------------------------------ ------------------------------------------------------------------------------
Q: Same as above, but for local kptrs (i.e. pointers to objects allocated using Q: Same as above, but for allocated objects (i.e. objects allocated using
bpf_obj_new for user defined structures). Will the kernel preserve backwards bpf_obj_new for user defined types). Will the kernel preserve backwards
compatibility for these features? compatibility for these features?
A: NO. A: NO.
Unlike map value types, there are no stability guarantees for this case. The Unlike map value types, there are no stability guarantees for this case. The
whole local kptr API itself is unstable (since it is exposed through kfuncs). whole API to work with allocated objects and any support for special fields
inside them is unstable (since it is exposed through kfuncs).
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment