Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp1577228pxb; Fri, 6 Nov 2020 13:25:49 -0800 (PST) X-Google-Smtp-Source: ABdhPJxQOCtIpiv6Y+mmguOV1M1SL1udczT188F4a1CSONJvbP+Aofp0vOPJkZUIRTkqW4hDR4Xm X-Received: by 2002:a17:906:4dd3:: with SMTP id f19mr3841625ejw.364.1604697949564; Fri, 06 Nov 2020 13:25:49 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604697949; cv=none; d=google.com; s=arc-20160816; b=T3fmfwh8ZGiaeOGyG5/DpQwXQku2OvlgyFDlgXhnLpO9/lSDag2ItP5zF0ztul1lmi MTtKRm6hdnPuBInyJ+KsZdRfnI6jscnNs3loLYwVGmN6XlMcd35J1h14ouVEY0EcgE19 1jnzytnB6azq1+yA6CPRi4r0MYEajFcwaxnL/x3qFzSRJfAF3XJLT/TVyz57Wj/dZOu4 bzcwZVtyXptNYORt9TMIXk9T9iOrfl3QTK2VIQZa34N5HREoYhNA3dspHH/nBEPgCdZ/ qzhtCLFzsMexUKN+po/qejsrpJqxbvOFKM3E3JyeBAp+hCk7rSMm86yFT9pl1w2SOiZI eFdg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:in-reply-to:references:date:message-id :from:subject:content-transfer-encoding:mime-version:dkim-signature; bh=TcyRGptVFQegfIi9KF73bjVruMcLjVnC+6Gcy64kfCw=; b=qBaRRsfnTkzNIIItwnKOhPkBv+N2kw9eqkVCNJJpzJ/1k+g2hUs4Qi+MWTbRcs1mi2 zwD9smlPKtJBP8L0uZzALBteQ4GCekTkeQ5ns6gnYs6dPpIrhPJu8881dCR2COlJ3aob ouEVTgByB53/YGgeQ4E7zQzGoKt59chZRkZ3uD8qVUiXFFqrYOJp8myn1MX0te/n9SD4 D1Cc6ABsvhkZuHEaNsQ0rQleXYLMvfGqAPNCcjmTfIkQpS6zgSVZOSxw3wCzlBH5RKTr tYD/8awOLVTo68/EnEGI6+h67H0M9qESPYt9yJ6kiMu+RxxF6K0gAZPVyS+hhXgbOWSZ s2CQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="srr1r/gx"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id n6si1677807ejx.303.2020.11.06.13.25.25; Fri, 06 Nov 2020 13:25:49 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=default header.b="srr1r/gx"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727996AbgKFVVj (ORCPT + 99 others); Fri, 6 Nov 2020 16:21:39 -0500 Received: from mail.kernel.org ([198.145.29.99]:49874 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725868AbgKFVVj (ORCPT ); Fri, 6 Nov 2020 16:21:39 -0500 Content-Type: text/plain; charset="utf-8" DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604697698; bh=eYgXIrgiM7g1O99LNX0IImdvQnHUw3o5UfTypxA/6QM=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=srr1r/gxE4+BjbyC0ad8VZ94DMlyqxxHX1J/yvrFH2WW7bHIDK/9uIKu203Ga4ZgX goeNgaf1zyywMlFxR9XUWRZCCZQEgLOI152SFToh/p8qxNa0KsP05DfLmx2ihX006F v/uWxYepLdfBGA4YfZYH7I89IR5Xq51CD1kj5EJw= MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH bpf-next v2] bpf: Update verification logic for LSM programs From: patchwork-bot+netdevbpf@kernel.org Message-Id: <160469769850.21746.734806332257716938.git-patchwork-notify@kernel.org> Date: Fri, 06 Nov 2020 21:21:38 +0000 References: <20201105230651.2621917-1-kpsingh@chromium.org> In-Reply-To: <20201105230651.2621917-1-kpsingh@chromium.org> To: KP Singh Cc: linux-kernel@vger.kernel.org, bpf@vger.kernel.org, ast@kernel.org, daniel@iogearbox.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This patch was applied to bpf/bpf.git (refs/heads/master): On Thu, 5 Nov 2020 23:06:51 +0000 you wrote: > From: KP Singh > > The current logic checks if the name of the BTF type passed in > attach_btf_id starts with "bpf_lsm_", this is not sufficient as it also > allows attachment to non-LSM hooks like the very function that performs > this check, i.e. bpf_lsm_verify_prog. > > [...] Here is the summary with links: - [bpf-next,v2] bpf: Update verification logic for LSM programs https://git.kernel.org/bpf/bpf/c/6f64e4778300 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html