Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp1395493pxb; Fri, 6 Nov 2020 08:34:38 -0800 (PST) X-Google-Smtp-Source: ABdhPJyn1c9St47RR1g4A76tTEb81BkcerE8TZOcDm45siH84lxNOp2DjIf5Q5qFpk0s2VecfBdM X-Received: by 2002:a17:906:4bc4:: with SMTP id x4mr2844254ejv.66.1604680478209; Fri, 06 Nov 2020 08:34:38 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604680478; cv=none; d=google.com; s=arc-20160816; b=tS6i8xr4mUe8woSPM4pyfZEwAW5yjRHyItB+y349H4XqAZ2mj8VJTQI3To7mwG+NOM 8Fs6Bx/g+jyohfdZG98PNtdVsGdJLMCAK/tAb5i9KzinQwUU7LkWuIpY76plq5AMPGSF D4gb7G6+38VEPyM5+0Vf8JuC6bxU2gWbqBn3YraBomwkKY972hqdtE65g6HWsQi9V20n UTrpELKUL9LZqE8EZTalaS5iIiBzvH+mj1ZYGUhmfA/55AMr7cPQ5h/1VnF0ikVT+sei zPg0hEzsuyoDTKhWFWCbFAcz60AqbVI/nH1NsNw2J+BGWMYnWB0UQ9ohG1PAskc2JhJ/ xIqw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:in-reply-to:references:date:message-id :from:subject:content-transfer-encoding:mime-version:dkim-signature; bh=L3/08c3+ZawoiZwH+kCLdyPqFAGWEXLYWjbOJhplt60=; b=0knSyhXSqviXajDvCclZQ7ZyC7X4ZRYusVmEftd3GOP9ocHueaYr52DXd83POihFOb foZv+LJ53gMLaQIy112Yaj13pXG2atPkH8cD0pzeu7H2w/WF7mPh9FHV9pIDPKSATR5X 73kJR2DVy3d3rtGKf/0Ho4G72b43Ld/ToQ5p0VCIQ0BZszFh4c1NwcLRbGGeU/uwMuhL ISErOJTnMnOwkdVnmWAYsANv9vJEyBrxeDQ3ifkLxLkjNYJyWqMfy/Ekuhl3IMm/YExJ AN8BnykBn1ZclpMDoa6TcVtFG/SESXtqY6ZX/rr0eXcH68BISicnLDDe29wZ5s/X7avB JrPA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dXX4qPXC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id l8si1207724ejb.335.2020.11.06.08.34.13; Fri, 06 Nov 2020 08:34:38 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b=dXX4qPXC; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727170AbgKFQaH (ORCPT + 99 others); Fri, 6 Nov 2020 11:30:07 -0500 Received: from mail.kernel.org ([198.145.29.99]:39326 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726482AbgKFQaG (ORCPT ); Fri, 6 Nov 2020 11:30:06 -0500 Content-Type: text/plain; charset="utf-8" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604680206; bh=7+TLDC0TsrPzHnm18zh2FFLZMNWt6KUkleHczhCixcI=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=dXX4qPXCSZ2z3S19tsVQDoeV8uVoY2UQpcS9So7QF7mhy/8elRheRSPcGFIEKVT3T RpWnxXv1Bt4RmQ2a+MVl5NJR50eAns7QOwfFYPf79lcIaRv4JyqgkjWFxDpCMVvhW8 pzIZvUDO1feib8ELeak3Z+8yrxAtNOMBdEp5be08= MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH bpf-next v6 1/9] bpf: Allow LSM programs to use bpf spin locks From: patchwork-bot+netdevbpf@kernel.org Message-Id: <160468020631.12149.17904247795919763724.git-patchwork-notify@kernel.org> Date: Fri, 06 Nov 2020 16:30:06 +0000 References: <20201106103747.2780972-2-kpsingh@chromium.org> In-Reply-To: <20201106103747.2780972-2-kpsingh@chromium.org> To: KP Singh Cc: linux-kernel@vger.kernel.org, bpf@vger.kernel.org, songliubraving@fb.com, kafai@fb.com, ast@kernel.org, daniel@iogearbox.net, pjt@google.com, jannh@google.com, haoluo@google.com Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This series was applied to bpf/bpf-next.git (refs/heads/master): On Fri, 6 Nov 2020 10:37:39 +0000 you wrote: > From: KP Singh > > Usage of spin locks was not allowed for tracing programs due to > insufficient preemption checks. The verifier does not currently prevent > LSM programs from using spin locks, but the helpers are not exposed > via bpf_lsm_func_proto. > > [...] Here is the summary with links: - [bpf-next,v6,1/9] bpf: Allow LSM programs to use bpf spin locks https://git.kernel.org/bpf/bpf-next/c/9e7a4d9831e8 - [bpf-next,v6,2/9] bpf: Implement task local storage https://git.kernel.org/bpf/bpf-next/c/4cf1bc1f1045 - [bpf-next,v6,3/9] libbpf: Add support for task local storage https://git.kernel.org/bpf/bpf-next/c/8885274d2259 - [bpf-next,v6,4/9] bpftool: Add support for task local storage https://git.kernel.org/bpf/bpf-next/c/864ab0616dcc - [bpf-next,v6,5/9] bpf: Implement get_current_task_btf and RET_PTR_TO_BTF_ID https://git.kernel.org/bpf/bpf-next/c/3ca1032ab7ab - [bpf-next,v6,6/9] bpf: Fix tests for local_storage https://git.kernel.org/bpf/bpf-next/c/f0e5ba0bc481 - [bpf-next,v6,7/9] bpf: Update selftests for local_storage to use vmlinux.h https://git.kernel.org/bpf/bpf-next/c/a367efa71b3f - [bpf-next,v6,8/9] bpf: Add tests for task_local_storage https://git.kernel.org/bpf/bpf-next/c/9cde3beeadb3 - [bpf-next,v6,9/9] bpf: Exercise syscall operations for inode and sk storage https://git.kernel.org/bpf/bpf-next/c/4170bc6baa54 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html