Message ID | 20221206145936.922196-1-benjamin.tissoires@redhat.com (mailing list archive) |
---|---|
Headers | show |
Series | HID: bpf: remove the need for ALLOW_ERROR_INJECTION and Kconfig fixes | expand |
Hello: This series was applied to bpf/bpf-next.git (master) by Benjamin Tissoires <benjamin.tissoires@redhat.com>: On Tue, 6 Dec 2022 15:59:31 +0100 you wrote: > Hi, > > This is a new version of the ALLOW_ERROR_INJECTION hack removal. > > Compared to v2, I followed the review from Alexei which cleaned up the > code a little bit. > > [...] Here is the summary with links: - [HID,for-next,v3,1/5] bpf: do not rely on ALLOW_ERROR_INJECTION for fmod_ret https://git.kernel.org/bpf/bpf-next/c/5b481acab4ce - [HID,for-next,v3,2/5] HID: bpf: do not rely on ALLOW_ERROR_INJECTION (no matching commit) - [HID,for-next,v3,3/5] HID: bpf: enforce HID_BPF dependencies (no matching commit) - [HID,for-next,v3,4/5] selftests: hid: ensures we have the proper requirements in config (no matching commit) - [HID,for-next,v3,5/5] kselftests: hid: fix missing headers_install step (no matching commit) You are awesome, thank you!
On Tue, 6 Dec 2022, Benjamin Tissoires wrote: > Compared to v2, I followed the review from Alexei which cleaned up the > code a little bit. > > I also got a kbuild test bot complaining[3] so add a fix for that too. > > For reference, here is the previous cover letter: > > So this patch series aims at solving both [0] and [1]. > > The first one is bpf related and concerns the ALLOW_ERROR_INJECTION API. > It is considered as a hack to begin with, so introduce a proper kernel > API to declare when a BPF hook can have its return value changed. > > The second one is related to the fact that > DYNAMIC_FTRACE_WITH_DIRECT_CALLS is currently not enabled on arm64, and > that means that the current HID-BPF implementation doesn't work there > for now. > > The first patch actually touches the bpf core code, but it would be > easier if we could merge it through the hid tree in the for-6.2/hid-bpf > branch once we get the proper acks. For the series: Reviewed-by: Jiri Kosina <jkosina@suse.cz> Thanks,
On Sat, Dec 10, 2022 at 10:07 AM Jiri Kosina <jikos@kernel.org> wrote: > > On Tue, 6 Dec 2022, Benjamin Tissoires wrote: > > > Compared to v2, I followed the review from Alexei which cleaned up the > > code a little bit. > > > > I also got a kbuild test bot complaining[3] so add a fix for that too. > > > > For reference, here is the previous cover letter: > > > > So this patch series aims at solving both [0] and [1]. > > > > The first one is bpf related and concerns the ALLOW_ERROR_INJECTION API. > > It is considered as a hack to begin with, so introduce a proper kernel > > API to declare when a BPF hook can have its return value changed. > > > > The second one is related to the fact that > > DYNAMIC_FTRACE_WITH_DIRECT_CALLS is currently not enabled on arm64, and > > that means that the current HID-BPF implementation doesn't work there > > for now. > > > > The first patch actually touches the bpf core code, but it would be > > easier if we could merge it through the hid tree in the for-6.2/hid-bpf > > branch once we get the proper acks. > > For the series: > > Reviewed-by: Jiri Kosina <jkosina@suse.cz> Thanks. I have applied the rest of the series to for-6.2/hid-bpf. Cheers, Benjamin > > Thanks, > > -- > Jiri Kosina > SUSE Labs >