xref: /linux/Documentation/bpf/kfuncs.rst (revision c5dbf04160005e07e8ca7232a7faa77ab1547ae0)
1.. SPDX-License-Identifier: GPL-2.0
2
3.. _kfuncs-header-label:
4
5=============================
6BPF Kernel Functions (kfuncs)
7=============================
8
91. Introduction
10===============
11
12BPF Kernel Functions or more commonly known as kfuncs are functions in the Linux
13kernel which are exposed for use by BPF programs. Unlike normal BPF helpers,
14kfuncs do not have a stable interface and can change from one kernel release to
15another. Hence, BPF programs need to be updated in response to changes in the
16kernel. See :ref:`BPF_kfunc_lifecycle_expectations` for more information.
17
182. Defining a kfunc
19===================
20
21There are two ways to expose a kernel function to BPF programs, either make an
22existing function in the kernel visible, or add a new wrapper for BPF. In both
23cases, care must be taken that BPF program can only call such function in a
24valid context. To enforce this, visibility of a kfunc can be per program type.
25
26If you are not creating a BPF wrapper for existing kernel function, skip ahead
27to :ref:`BPF_kfunc_nodef`.
28
292.1 Creating a wrapper kfunc
30----------------------------
31
32When defining a wrapper kfunc, the wrapper function should have extern linkage.
33This prevents the compiler from optimizing away dead code, as this wrapper kfunc
34is not invoked anywhere in the kernel itself. It is not necessary to provide a
35prototype in a header for the wrapper kfunc.
36
37An example is given below::
38
39        /* Disables missing prototype warnings */
40        __bpf_kfunc_start_defs();
41
42        __bpf_kfunc struct task_struct *bpf_find_get_task_by_vpid(pid_t nr)
43        {
44                return find_get_task_by_vpid(nr);
45        }
46
47        __bpf_kfunc_end_defs();
48
49A wrapper kfunc is often needed when we need to annotate parameters of the
50kfunc. Otherwise one may directly make the kfunc visible to the BPF program by
51registering it with the BPF subsystem. See :ref:`BPF_kfunc_nodef`.
52
532.2 Annotating kfunc parameters
54-------------------------------
55
56Similar to BPF helpers, there is sometime need for additional context required
57by the verifier to make the usage of kernel functions safer and more useful.
58Hence, we can annotate a parameter by suffixing the name of the argument of the
59kfunc with a __tag, where tag may be one of the supported annotations.
60
612.2.1 __sz Annotation
62---------------------
63
64This annotation is used to indicate a memory and size pair in the argument list.
65An example is given below::
66
67        __bpf_kfunc void bpf_memzero(void *mem, int mem__sz)
68        {
69        ...
70        }
71
72Here, the verifier will treat first argument as a PTR_TO_MEM, and second
73argument as its size. By default, without __sz annotation, the size of the type
74of the pointer is used. Without __sz annotation, a kfunc cannot accept a void
75pointer.
76
772.2.2 __k Annotation
78--------------------
79
80This annotation is only understood for scalar arguments, where it indicates that
81the verifier must check the scalar argument to be a known constant, which does
82not indicate a size parameter, and the value of the constant is relevant to the
83safety of the program.
84
85An example is given below::
86
87        __bpf_kfunc void *bpf_obj_new(u32 local_type_id__k, ...)
88        {
89        ...
90        }
91
92Here, bpf_obj_new uses local_type_id argument to find out the size of that type
93ID in program's BTF and return a sized pointer to it. Each type ID will have a
94distinct size, hence it is crucial to treat each such call as distinct when
95values don't match during verifier state pruning checks.
96
97Hence, whenever a constant scalar argument is accepted by a kfunc which is not a
98size parameter, and the value of the constant matters for program safety, __k
99suffix should be used.
100
1012.2.3 __uninit Annotation
102-------------------------
103
104This annotation is used to indicate that the argument will be treated as
105uninitialized.
106
107An example is given below::
108
109        __bpf_kfunc int bpf_dynptr_from_skb(..., struct bpf_dynptr_kern *ptr__uninit)
110        {
111        ...
112        }
113
114Here, the dynptr will be treated as an uninitialized dynptr. Without this
115annotation, the verifier will reject the program if the dynptr passed in is
116not initialized.
117
1182.2.4 __opt Annotation
119-------------------------
120
121This annotation is used to indicate that the buffer associated with an __sz or __szk
122argument may be null. If the function is passed a nullptr in place of the buffer,
123the verifier will not check that length is appropriate for the buffer. The kfunc is
124responsible for checking if this buffer is null before using it.
125
126An example is given below::
127
128        __bpf_kfunc void *bpf_dynptr_slice(..., void *buffer__opt, u32 buffer__szk)
129        {
130        ...
131        }
132
133Here, the buffer may be null. If buffer is not null, it at least of size buffer_szk.
134Either way, the returned buffer is either NULL, or of size buffer_szk. Without this
135annotation, the verifier will reject the program if a null pointer is passed in with
136a nonzero size.
137
138
139.. _BPF_kfunc_nodef:
140
1412.3 Using an existing kernel function
142-------------------------------------
143
144When an existing function in the kernel is fit for consumption by BPF programs,
145it can be directly registered with the BPF subsystem. However, care must still
146be taken to review the context in which it will be invoked by the BPF program
147and whether it is safe to do so.
148
1492.4 Annotating kfuncs
150---------------------
151
152In addition to kfuncs' arguments, verifier may need more information about the
153type of kfunc(s) being registered with the BPF subsystem. To do so, we define
154flags on a set of kfuncs as follows::
155
156        BTF_SET8_START(bpf_task_set)
157        BTF_ID_FLAGS(func, bpf_get_task_pid, KF_ACQUIRE | KF_RET_NULL)
158        BTF_ID_FLAGS(func, bpf_put_pid, KF_RELEASE)
159        BTF_SET8_END(bpf_task_set)
160
161This set encodes the BTF ID of each kfunc listed above, and encodes the flags
162along with it. Ofcourse, it is also allowed to specify no flags.
163
164kfunc definitions should also always be annotated with the ``__bpf_kfunc``
165macro. This prevents issues such as the compiler inlining the kfunc if it's a
166static kernel function, or the function being elided in an LTO build as it's
167not used in the rest of the kernel. Developers should not manually add
168annotations to their kfunc to prevent these issues. If an annotation is
169required to prevent such an issue with your kfunc, it is a bug and should be
170added to the definition of the macro so that other kfuncs are similarly
171protected. An example is given below::
172
173        __bpf_kfunc struct task_struct *bpf_get_task_pid(s32 pid)
174        {
175        ...
176        }
177
1782.4.1 KF_ACQUIRE flag
179---------------------
180
181The KF_ACQUIRE flag is used to indicate that the kfunc returns a pointer to a
182refcounted object. The verifier will then ensure that the pointer to the object
183is eventually released using a release kfunc, or transferred to a map using a
184referenced kptr (by invoking bpf_kptr_xchg). If not, the verifier fails the
185loading of the BPF program until no lingering references remain in all possible
186explored states of the program.
187
1882.4.2 KF_RET_NULL flag
189----------------------
190
191The KF_RET_NULL flag is used to indicate that the pointer returned by the kfunc
192may be NULL. Hence, it forces the user to do a NULL check on the pointer
193returned from the kfunc before making use of it (dereferencing or passing to
194another helper). This flag is often used in pairing with KF_ACQUIRE flag, but
195both are orthogonal to each other.
196
1972.4.3 KF_RELEASE flag
198---------------------
199
200The KF_RELEASE flag is used to indicate that the kfunc releases the pointer
201passed in to it. There can be only one referenced pointer that can be passed
202in. All copies of the pointer being released are invalidated as a result of
203invoking kfunc with this flag. KF_RELEASE kfuncs automatically receive the
204protection afforded by the KF_TRUSTED_ARGS flag described below.
205
2062.4.4 KF_TRUSTED_ARGS flag
207--------------------------
208
209The KF_TRUSTED_ARGS flag is used for kfuncs taking pointer arguments. It
210indicates that the all pointer arguments are valid, and that all pointers to
211BTF objects have been passed in their unmodified form (that is, at a zero
212offset, and without having been obtained from walking another pointer, with one
213exception described below).
214
215There are two types of pointers to kernel objects which are considered "valid":
216
2171. Pointers which are passed as tracepoint or struct_ops callback arguments.
2182. Pointers which were returned from a KF_ACQUIRE kfunc.
219
220Pointers to non-BTF objects (e.g. scalar pointers) may also be passed to
221KF_TRUSTED_ARGS kfuncs, and may have a non-zero offset.
222
223The definition of "valid" pointers is subject to change at any time, and has
224absolutely no ABI stability guarantees.
225
226As mentioned above, a nested pointer obtained from walking a trusted pointer is
227no longer trusted, with one exception. If a struct type has a field that is
228guaranteed to be valid (trusted or rcu, as in KF_RCU description below) as long
229as its parent pointer is valid, the following macros can be used to express
230that to the verifier:
231
232* ``BTF_TYPE_SAFE_TRUSTED``
233* ``BTF_TYPE_SAFE_RCU``
234* ``BTF_TYPE_SAFE_RCU_OR_NULL``
235
236For example,
237
238.. code-block:: c
239
240	BTF_TYPE_SAFE_TRUSTED(struct socket) {
241		struct sock *sk;
242	};
243
244or
245
246.. code-block:: c
247
248	BTF_TYPE_SAFE_RCU(struct task_struct) {
249		const cpumask_t *cpus_ptr;
250		struct css_set __rcu *cgroups;
251		struct task_struct __rcu *real_parent;
252		struct task_struct *group_leader;
253	};
254
255In other words, you must:
256
2571. Wrap the valid pointer type in a ``BTF_TYPE_SAFE_*`` macro.
258
2592. Specify the type and name of the valid nested field. This field must match
260   the field in the original type definition exactly.
261
262A new type declared by a ``BTF_TYPE_SAFE_*`` macro also needs to be emitted so
263that it appears in BTF. For example, ``BTF_TYPE_SAFE_TRUSTED(struct socket)``
264is emitted in the ``type_is_trusted()`` function as follows:
265
266.. code-block:: c
267
268	BTF_TYPE_EMIT(BTF_TYPE_SAFE_TRUSTED(struct socket));
269
270
2712.4.5 KF_SLEEPABLE flag
272-----------------------
273
274The KF_SLEEPABLE flag is used for kfuncs that may sleep. Such kfuncs can only
275be called by sleepable BPF programs (BPF_F_SLEEPABLE).
276
2772.4.6 KF_DESTRUCTIVE flag
278--------------------------
279
280The KF_DESTRUCTIVE flag is used to indicate functions calling which is
281destructive to the system. For example such a call can result in system
282rebooting or panicking. Due to this additional restrictions apply to these
283calls. At the moment they only require CAP_SYS_BOOT capability, but more can be
284added later.
285
2862.4.7 KF_RCU flag
287-----------------
288
289The KF_RCU flag is a weaker version of KF_TRUSTED_ARGS. The kfuncs marked with
290KF_RCU expect either PTR_TRUSTED or MEM_RCU arguments. The verifier guarantees
291that the objects are valid and there is no use-after-free. The pointers are not
292NULL, but the object's refcount could have reached zero. The kfuncs need to
293consider doing refcnt != 0 check, especially when returning a KF_ACQUIRE
294pointer. Note as well that a KF_ACQUIRE kfunc that is KF_RCU should very likely
295also be KF_RET_NULL.
296
297.. _KF_deprecated_flag:
298
2992.4.8 KF_DEPRECATED flag
300------------------------
301
302The KF_DEPRECATED flag is used for kfuncs which are scheduled to be
303changed or removed in a subsequent kernel release. A kfunc that is
304marked with KF_DEPRECATED should also have any relevant information
305captured in its kernel doc. Such information typically includes the
306kfunc's expected remaining lifespan, a recommendation for new
307functionality that can replace it if any is available, and possibly a
308rationale for why it is being removed.
309
310Note that while on some occasions, a KF_DEPRECATED kfunc may continue to be
311supported and have its KF_DEPRECATED flag removed, it is likely to be far more
312difficult to remove a KF_DEPRECATED flag after it's been added than it is to
313prevent it from being added in the first place. As described in
314:ref:`BPF_kfunc_lifecycle_expectations`, users that rely on specific kfuncs are
315encouraged to make their use-cases known as early as possible, and participate
316in upstream discussions regarding whether to keep, change, deprecate, or remove
317those kfuncs if and when such discussions occur.
318
3192.5 Registering the kfuncs
320--------------------------
321
322Once the kfunc is prepared for use, the final step to making it visible is
323registering it with the BPF subsystem. Registration is done per BPF program
324type. An example is shown below::
325
326        BTF_SET8_START(bpf_task_set)
327        BTF_ID_FLAGS(func, bpf_get_task_pid, KF_ACQUIRE | KF_RET_NULL)
328        BTF_ID_FLAGS(func, bpf_put_pid, KF_RELEASE)
329        BTF_SET8_END(bpf_task_set)
330
331        static const struct btf_kfunc_id_set bpf_task_kfunc_set = {
332                .owner = THIS_MODULE,
333                .set   = &bpf_task_set,
334        };
335
336        static int init_subsystem(void)
337        {
338                return register_btf_kfunc_id_set(BPF_PROG_TYPE_TRACING, &bpf_task_kfunc_set);
339        }
340        late_initcall(init_subsystem);
341
3422.6  Specifying no-cast aliases with ___init
343--------------------------------------------
344
345The verifier will always enforce that the BTF type of a pointer passed to a
346kfunc by a BPF program, matches the type of pointer specified in the kfunc
347definition. The verifier, does, however, allow types that are equivalent
348according to the C standard to be passed to the same kfunc arg, even if their
349BTF_IDs differ.
350
351For example, for the following type definition:
352
353.. code-block:: c
354
355	struct bpf_cpumask {
356		cpumask_t cpumask;
357		refcount_t usage;
358	};
359
360The verifier would allow a ``struct bpf_cpumask *`` to be passed to a kfunc
361taking a ``cpumask_t *`` (which is a typedef of ``struct cpumask *``). For
362instance, both ``struct cpumask *`` and ``struct bpf_cpmuask *`` can be passed
363to bpf_cpumask_test_cpu().
364
365In some cases, this type-aliasing behavior is not desired. ``struct
366nf_conn___init`` is one such example:
367
368.. code-block:: c
369
370	struct nf_conn___init {
371		struct nf_conn ct;
372	};
373
374The C standard would consider these types to be equivalent, but it would not
375always be safe to pass either type to a trusted kfunc. ``struct
376nf_conn___init`` represents an allocated ``struct nf_conn`` object that has
377*not yet been initialized*, so it would therefore be unsafe to pass a ``struct
378nf_conn___init *`` to a kfunc that's expecting a fully initialized ``struct
379nf_conn *`` (e.g. ``bpf_ct_change_timeout()``).
380
381In order to accommodate such requirements, the verifier will enforce strict
382PTR_TO_BTF_ID type matching if two types have the exact same name, with one
383being suffixed with ``___init``.
384
385.. _BPF_kfunc_lifecycle_expectations:
386
3873. kfunc lifecycle expectations
388===============================
389
390kfuncs provide a kernel <-> kernel API, and thus are not bound by any of the
391strict stability restrictions associated with kernel <-> user UAPIs. This means
392they can be thought of as similar to EXPORT_SYMBOL_GPL, and can therefore be
393modified or removed by a maintainer of the subsystem they're defined in when
394it's deemed necessary.
395
396Like any other change to the kernel, maintainers will not change or remove a
397kfunc without having a reasonable justification.  Whether or not they'll choose
398to change a kfunc will ultimately depend on a variety of factors, such as how
399widely used the kfunc is, how long the kfunc has been in the kernel, whether an
400alternative kfunc exists, what the norm is in terms of stability for the
401subsystem in question, and of course what the technical cost is of continuing
402to support the kfunc.
403
404There are several implications of this:
405
406a) kfuncs that are widely used or have been in the kernel for a long time will
407   be more difficult to justify being changed or removed by a maintainer. In
408   other words, kfuncs that are known to have a lot of users and provide
409   significant value provide stronger incentives for maintainers to invest the
410   time and complexity in supporting them. It is therefore important for
411   developers that are using kfuncs in their BPF programs to communicate and
412   explain how and why those kfuncs are being used, and to participate in
413   discussions regarding those kfuncs when they occur upstream.
414
415b) Unlike regular kernel symbols marked with EXPORT_SYMBOL_GPL, BPF programs
416   that call kfuncs are generally not part of the kernel tree. This means that
417   refactoring cannot typically change callers in-place when a kfunc changes,
418   as is done for e.g. an upstreamed driver being updated in place when a
419   kernel symbol is changed.
420
421   Unlike with regular kernel symbols, this is expected behavior for BPF
422   symbols, and out-of-tree BPF programs that use kfuncs should be considered
423   relevant to discussions and decisions around modifying and removing those
424   kfuncs. The BPF community will take an active role in participating in
425   upstream discussions when necessary to ensure that the perspectives of such
426   users are taken into account.
427
428c) A kfunc will never have any hard stability guarantees. BPF APIs cannot and
429   will not ever hard-block a change in the kernel purely for stability
430   reasons. That being said, kfuncs are features that are meant to solve
431   problems and provide value to users. The decision of whether to change or
432   remove a kfunc is a multivariate technical decision that is made on a
433   case-by-case basis, and which is informed by data points such as those
434   mentioned above. It is expected that a kfunc being removed or changed with
435   no warning will not be a common occurrence or take place without sound
436   justification, but it is a possibility that must be accepted if one is to
437   use kfuncs.
438
4393.1 kfunc deprecation
440---------------------
441
442As described above, while sometimes a maintainer may find that a kfunc must be
443changed or removed immediately to accommodate some changes in their subsystem,
444usually kfuncs will be able to accommodate a longer and more measured
445deprecation process. For example, if a new kfunc comes along which provides
446superior functionality to an existing kfunc, the existing kfunc may be
447deprecated for some period of time to allow users to migrate their BPF programs
448to use the new one. Or, if a kfunc has no known users, a decision may be made
449to remove the kfunc (without providing an alternative API) after some
450deprecation period so as to provide users with a window to notify the kfunc
451maintainer if it turns out that the kfunc is actually being used.
452
453It's expected that the common case will be that kfuncs will go through a
454deprecation period rather than being changed or removed without warning. As
455described in :ref:`KF_deprecated_flag`, the kfunc framework provides the
456KF_DEPRECATED flag to kfunc developers to signal to users that a kfunc has been
457deprecated. Once a kfunc has been marked with KF_DEPRECATED, the following
458procedure is followed for removal:
459
4601. Any relevant information for deprecated kfuncs is documented in the kfunc's
461   kernel docs. This documentation will typically include the kfunc's expected
462   remaining lifespan, a recommendation for new functionality that can replace
463   the usage of the deprecated function (or an explanation as to why no such
464   replacement exists), etc.
465
4662. The deprecated kfunc is kept in the kernel for some period of time after it
467   was first marked as deprecated. This time period will be chosen on a
468   case-by-case basis, and will typically depend on how widespread the use of
469   the kfunc is, how long it has been in the kernel, and how hard it is to move
470   to alternatives. This deprecation time period is "best effort", and as
471   described :ref:`above<BPF_kfunc_lifecycle_expectations>`, circumstances may
472   sometimes dictate that the kfunc be removed before the full intended
473   deprecation period has elapsed.
474
4753. After the deprecation period the kfunc will be removed. At this point, BPF
476   programs calling the kfunc will be rejected by the verifier.
477
4784. Core kfuncs
479==============
480
481The BPF subsystem provides a number of "core" kfuncs that are potentially
482applicable to a wide variety of different possible use cases and programs.
483Those kfuncs are documented here.
484
4854.1 struct task_struct * kfuncs
486-------------------------------
487
488There are a number of kfuncs that allow ``struct task_struct *`` objects to be
489used as kptrs:
490
491.. kernel-doc:: kernel/bpf/helpers.c
492   :identifiers: bpf_task_acquire bpf_task_release
493
494These kfuncs are useful when you want to acquire or release a reference to a
495``struct task_struct *`` that was passed as e.g. a tracepoint arg, or a
496struct_ops callback arg. For example:
497
498.. code-block:: c
499
500	/**
501	 * A trivial example tracepoint program that shows how to
502	 * acquire and release a struct task_struct * pointer.
503	 */
504	SEC("tp_btf/task_newtask")
505	int BPF_PROG(task_acquire_release_example, struct task_struct *task, u64 clone_flags)
506	{
507		struct task_struct *acquired;
508
509		acquired = bpf_task_acquire(task);
510		if (acquired)
511			/*
512			 * In a typical program you'd do something like store
513			 * the task in a map, and the map will automatically
514			 * release it later. Here, we release it manually.
515			 */
516			bpf_task_release(acquired);
517		return 0;
518	}
519
520
521References acquired on ``struct task_struct *`` objects are RCU protected.
522Therefore, when in an RCU read region, you can obtain a pointer to a task
523embedded in a map value without having to acquire a reference:
524
525.. code-block:: c
526
527	#define private(name) SEC(".data." #name) __hidden __attribute__((aligned(8)))
528	private(TASK) static struct task_struct *global;
529
530	/**
531	 * A trivial example showing how to access a task stored
532	 * in a map using RCU.
533	 */
534	SEC("tp_btf/task_newtask")
535	int BPF_PROG(task_rcu_read_example, struct task_struct *task, u64 clone_flags)
536	{
537		struct task_struct *local_copy;
538
539		bpf_rcu_read_lock();
540		local_copy = global;
541		if (local_copy)
542			/*
543			 * We could also pass local_copy to kfuncs or helper functions here,
544			 * as we're guaranteed that local_copy will be valid until we exit
545			 * the RCU read region below.
546			 */
547			bpf_printk("Global task %s is valid", local_copy->comm);
548		else
549			bpf_printk("No global task found");
550		bpf_rcu_read_unlock();
551
552		/* At this point we can no longer reference local_copy. */
553
554		return 0;
555	}
556
557----
558
559A BPF program can also look up a task from a pid. This can be useful if the
560caller doesn't have a trusted pointer to a ``struct task_struct *`` object that
561it can acquire a reference on with bpf_task_acquire().
562
563.. kernel-doc:: kernel/bpf/helpers.c
564   :identifiers: bpf_task_from_pid
565
566Here is an example of it being used:
567
568.. code-block:: c
569
570	SEC("tp_btf/task_newtask")
571	int BPF_PROG(task_get_pid_example, struct task_struct *task, u64 clone_flags)
572	{
573		struct task_struct *lookup;
574
575		lookup = bpf_task_from_pid(task->pid);
576		if (!lookup)
577			/* A task should always be found, as %task is a tracepoint arg. */
578			return -ENOENT;
579
580		if (lookup->pid != task->pid) {
581			/* bpf_task_from_pid() looks up the task via its
582			 * globally-unique pid from the init_pid_ns. Thus,
583			 * the pid of the lookup task should always be the
584			 * same as the input task.
585			 */
586			bpf_task_release(lookup);
587			return -EINVAL;
588		}
589
590		/* bpf_task_from_pid() returns an acquired reference,
591		 * so it must be dropped before returning from the
592		 * tracepoint handler.
593		 */
594		bpf_task_release(lookup);
595		return 0;
596	}
597
5984.2 struct cgroup * kfuncs
599--------------------------
600
601``struct cgroup *`` objects also have acquire and release functions:
602
603.. kernel-doc:: kernel/bpf/helpers.c
604   :identifiers: bpf_cgroup_acquire bpf_cgroup_release
605
606These kfuncs are used in exactly the same manner as bpf_task_acquire() and
607bpf_task_release() respectively, so we won't provide examples for them.
608
609----
610
611Other kfuncs available for interacting with ``struct cgroup *`` objects are
612bpf_cgroup_ancestor() and bpf_cgroup_from_id(), allowing callers to access
613the ancestor of a cgroup and find a cgroup by its ID, respectively. Both
614return a cgroup kptr.
615
616.. kernel-doc:: kernel/bpf/helpers.c
617   :identifiers: bpf_cgroup_ancestor
618
619.. kernel-doc:: kernel/bpf/helpers.c
620   :identifiers: bpf_cgroup_from_id
621
622Eventually, BPF should be updated to allow this to happen with a normal memory
623load in the program itself. This is currently not possible without more work in
624the verifier. bpf_cgroup_ancestor() can be used as follows:
625
626.. code-block:: c
627
628	/**
629	 * Simple tracepoint example that illustrates how a cgroup's
630	 * ancestor can be accessed using bpf_cgroup_ancestor().
631	 */
632	SEC("tp_btf/cgroup_mkdir")
633	int BPF_PROG(cgrp_ancestor_example, struct cgroup *cgrp, const char *path)
634	{
635		struct cgroup *parent;
636
637		/* The parent cgroup resides at the level before the current cgroup's level. */
638		parent = bpf_cgroup_ancestor(cgrp, cgrp->level - 1);
639		if (!parent)
640			return -ENOENT;
641
642		bpf_printk("Parent id is %d", parent->self.id);
643
644		/* Return the parent cgroup that was acquired above. */
645		bpf_cgroup_release(parent);
646		return 0;
647	}
648
6494.3 struct cpumask * kfuncs
650---------------------------
651
652BPF provides a set of kfuncs that can be used to query, allocate, mutate, and
653destroy struct cpumask * objects. Please refer to :ref:`cpumasks-header-label`
654for more details.
655