[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <nycvar.YFH.7.76.2212101007030.9000@cbobk.fhfr.pm>
Date: Sat, 10 Dec 2022 10:07:31 +0100 (CET)
From: Jiri Kosina <jikos@...nel.org>
To: Benjamin Tissoires <benjamin.tissoires@...hat.com>
cc: Florent Revest <revest@...omium.org>,
Jon Hunter <jonathanh@...dia.com>,
Alexei Starovoitov <alexei.starovoitov@...il.com>,
Daniel Borkmann <daniel@...earbox.net>,
Andrii Nakryiko <andrii@...nel.org>, bpf@...r.kernel.org,
netdev@...r.kernel.org, linux-input@...r.kernel.org,
linux-kernel@...r.kernel.org
Subject: Re: [PATCH HID for-next v3 0/5] HID: bpf: remove the need for
ALLOW_ERROR_INJECTION and Kconfig fixes
On Tue, 6 Dec 2022, Benjamin Tissoires wrote:
> Compared to v2, I followed the review from Alexei which cleaned up the
> code a little bit.
>
> I also got a kbuild test bot complaining[3] so add a fix for that too.
>
> For reference, here is the previous cover letter:
>
> So this patch series aims at solving both [0] and [1].
>
> The first one is bpf related and concerns the ALLOW_ERROR_INJECTION API.
> It is considered as a hack to begin with, so introduce a proper kernel
> API to declare when a BPF hook can have its return value changed.
>
> The second one is related to the fact that
> DYNAMIC_FTRACE_WITH_DIRECT_CALLS is currently not enabled on arm64, and
> that means that the current HID-BPF implementation doesn't work there
> for now.
>
> The first patch actually touches the bpf core code, but it would be
> easier if we could merge it through the hid tree in the for-6.2/hid-bpf
> branch once we get the proper acks.
For the series:
Reviewed-by: Jiri Kosina <jkosina@...e.cz>
Thanks,
--
Jiri Kosina
SUSE Labs
Powered by blists - more mailing lists