Received: by 2002:a05:6358:d09b:b0:dc:cd0c:909e with SMTP id jc27csp47950rwb; Wed, 7 Dec 2022 14:15:04 -0800 (PST) X-Google-Smtp-Source: AA0mqf5/Nf31nrfQRdYlxg4HMNn/JMt8TtW24LRMNWh7COS+X0pBkiBsxuIwm1cNnrgYOFX+kx6v X-Received: by 2002:a63:d84c:0:b0:478:6bad:dc4 with SMTP id k12-20020a63d84c000000b004786bad0dc4mr29813122pgj.405.1670451303901; Wed, 07 Dec 2022 14:15:03 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1670451303; cv=none; d=google.com; s=arc-20160816; b=wMVUJ/zfpko5hco1fhyJo6e70+VNh1IMy4cfK13z+EJaM8eVwmjcpH+fF0q+GVEp0h LOFYwG9A7fq/uoYLZSULGTnc96PVrWel7hMNJ4fh71yYx60eVv+/wZ3g8X5PDY0jdFvG uIP1vQc2W2fMsqDQLsacnYp/JXAjwgcujJCgYK/9FCOVOfHzUzBI27K0FPVtfzGftzPN UhNWzZE3FtWmGr0nkiWe8+aIJzI3bxo0fdSU37lu6fqAyK9YijT0/SQY+PG+fECJMQts M3+YFb6oehiMuGFss0slOs5ESIEDlLXfL4SOIvX2KP9Zzb81MvL9lDpexiRCPyFXxnWy k5aQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=GlY7YKUGk/JMgLNRQtXaOgjE8d+PC1cuzdEgWl3757o=; b=rSupB2OBG9rek1QzGbOOZsfOYvxyqd3Ko8JICUvdefczieFoNWa24wOsKIgM1mwkVy 3zKiKHWFngQgKkt6hLEU1bEszBWjzN6mCHRKNfYf3kzOk+/BTJmV4BPig/lgaN1iZrR+ 3LyggU5OPg+zvFXpKmOnmruSNnsrrTcU8EFMpxSSBMxs9AGaTTveXWYWloLZR+Sc4H3i nZoUNMQ6hcfsQeTi4juJRmOwajpwF2vEa1DcAZIIufmk6ptmIr7BFo6oOkiT9VxECyxx PGzf7KnWsawZAMmOhShZHdHHU6ThUehqKkoWoL7fN15iDYbYdKLy7xNhDAEEn9EjtTQz dfiQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=BAyzgnrH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id w15-20020a1709027b8f00b00189c4a9c5ecsi13115082pll.297.2022.12.07.14.14.54; Wed, 07 Dec 2022 14:15:03 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20210112 header.b=BAyzgnrH; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229623AbiLGV6k (ORCPT + 74 others); Wed, 7 Dec 2022 16:58:40 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:42190 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229816AbiLGV6g (ORCPT ); Wed, 7 Dec 2022 16:58:36 -0500 Received: from mail-ej1-x62e.google.com (mail-ej1-x62e.google.com [IPv6:2a00:1450:4864:20::62e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 25CBB7B577; Wed, 7 Dec 2022 13:58:35 -0800 (PST) Received: by mail-ej1-x62e.google.com with SMTP id fc4so17126881ejc.12; Wed, 07 Dec 2022 13:58:35 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:from:to:cc:subject:date:message-id:reply-to; bh=GlY7YKUGk/JMgLNRQtXaOgjE8d+PC1cuzdEgWl3757o=; b=BAyzgnrHLyxAF50YHNrs5KIo425dz9za57F2c/lVxwhJVBKsq4H9WgK/QAusXdE4gf qaISO8uNVXsDB1HbxSZghn8+QvZROOKatVWuzRd7uvJTJhlAbtq4aYmTOsetF18Ze3J3 9fslDRY8G6PliNo1sXAvR57/+yW4Zx3BHvIUKbQc7nzTyQ8nfY/T1OK/QCn5m5AlsGhH hcj5wE1js3uMvNPACLPFMxGDX2chQ10t8pIPYouYBMLrOaKNZStqS0Q+NbyILzYyapcB 14AFzI2/rEA8XAhma/ch9/HhPOPmZQwUOqC43c961sq6P2ci73nwo8j5aBycOgVapQ8B Mv8w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:subject:message-id:date:from:in-reply-to:references :mime-version:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=GlY7YKUGk/JMgLNRQtXaOgjE8d+PC1cuzdEgWl3757o=; b=BJUJxOIY6XxPe3CZsB8ygUO+Vle5jetaxtazoXIabgxvNDYs6iNTMGOf0yjz8Fm8R+ 2pWU5I43DH5HjoMjjn/5lfQ/3x+YB8B7rO/Wby27+uECX5iKcYrZLLVnRK6IExBdh6fr eeEiR/eL+9hfdOJPqG1TD+/5zrYEqb/JL1lkYId0BNKmqzrkOrwr57O+vZteMzJlxsm2 XUGDDgVkzt3MqJZDY+esO82dhkk/YTsB+KvPO8NKJS9r0ARaZfBZaC2egzza+1P0SDU2 v/4I+ELlB0Jfbl4Fw/OPYha24ZO3x2+IvPX7Ic20Zm8xnjMqm1lv7pvf+PFaJruEfVR3 a7OA== X-Gm-Message-State: ANoB5pk4nPgIcol6h9PMOgLPCjGbdDTHXQtg3TY/7+oqM0x19CPHOpMR 2HEr8IwSbo7Ble82QCVNnCUjo/W9q0+VC5QuJ+ztS5if X-Received: by 2002:a17:907:76cb:b0:7c0:870b:3dda with SMTP id kf11-20020a17090776cb00b007c0870b3ddamr33725550ejc.676.1670450313417; Wed, 07 Dec 2022 13:58:33 -0800 (PST) MIME-Version: 1.0 References: <20221206145936.922196-1-benjamin.tissoires@redhat.com> <20221206145936.922196-2-benjamin.tissoires@redhat.com> In-Reply-To: From: Alexei Starovoitov Date: Wed, 7 Dec 2022 13:58:22 -0800 Message-ID: Subject: Re: [PATCH HID for-next v3 1/5] bpf: do not rely on ALLOW_ERROR_INJECTION for fmod_ret To: Benjamin Tissoires Cc: Jiri Kosina , Florent Revest , Jon Hunter , Daniel Borkmann , Andrii Nakryiko , bpf , Network Development , "open list:HID CORE LAYER" , LKML Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Dec 7, 2022 at 6:57 AM Benjamin Tissoires wrote: > > On Tue, Dec 6, 2022 at 9:48 PM Alexei Starovoitov > wrote: > > > > On Tue, Dec 6, 2022 at 6:59 AM Benjamin Tissoires > > wrote: > > > > > > The current way of expressing that a non-bpf kernel component is willing > > > to accept that bpf programs can be attached to it and that they can change > > > the return value is to abuse ALLOW_ERROR_INJECTION. > > > This is debated in the link below, and the result is that it is not a > > > reasonable thing to do. > > > > > > Reuse the kfunc declaration structure to also tag the kernel functions > > > we want to be fmodret. This way we can control from any subsystem which > > > functions are being modified by bpf without touching the verifier. > > > > > > > > > Link: https://lore.kernel.org/all/20221121104403.1545f9b5@gandalf.local.home/ > > > Suggested-by: Alexei Starovoitov > > > Signed-off-by: Benjamin Tissoires > > > > BPF CI couldn't do its job because of a merge conflict. > > CI only tries to apply the whole series. > > But I tested the patch 1 manually. > > Everything is green on x86-64 and the patch looks good. > > > > Acked-by: Alexei Starovoitov > > > > Please send the set during the merge window. > > If not we can take just this patch, > > since the series from Viktor Malik would need this patch too. > > > > Thanks a lot for the quick review/tests Alexei. > > I have now taken this patch and the next into the hid tree. > > I actually took this patch through a branch attached to our hid.git > master branch so compared to Linus, it only has this one patch. I also > tagged (and signed) that very same branch with "for-alexei-2022120701" > in case you also want to bring this one in through the bpf tree too. I didn't find such a branch in your tree, but found that tag and pulled into bpf-next. Thanks!