On Tue, Jul 29, 2025 at 4:30 AM Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx> wrote: > > On Mon, Jul 21, 2025 at 2:20 PM KP Singh <kpsingh@xxxxxxxxxx> wrote: > > + > > +SEC("fexit/bpf_prog_verify_signature") > > +int BPF_PROG(bpf_sign, struct bpf_prog *prog, union bpf_attr *attr, bool is_kernel, int ret) > > I don't understand why it needs to peek into the kernel to > verify that it goes well. The exposed uapi should be good enough. > If the signature was specified and it is loaded fine we're good. > Double checking the kernel decisions goes too far. > Especially since this function can be inlined by the compiler. Fair, I will drop this patch - KP