From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 11D8FC433F5 for ; Mon, 23 May 2022 21:20:15 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 735AB6B0073; Mon, 23 May 2022 17:20:15 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 6E1706B0075; Mon, 23 May 2022 17:20:15 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 5CE326B0078; Mon, 23 May 2022 17:20:15 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0011.hostedemail.com [216.40.44.11]) by kanga.kvack.org (Postfix) with ESMTP id 46B986B0073 for ; Mon, 23 May 2022 17:20:15 -0400 (EDT) Received: from smtpin03.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay06.hostedemail.com (Postfix) with ESMTP id 02636351B1 for ; Mon, 23 May 2022 21:20:14 +0000 (UTC) X-FDA: 79498275990.03.16DFCA3 Received: from ams.source.kernel.org (ams.source.kernel.org [145.40.68.75]) by imf05.hostedemail.com (Postfix) with ESMTP id D356210002E for ; Mon, 23 May 2022 21:19:46 +0000 (UTC) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ams.source.kernel.org (Postfix) with ESMTPS id D288CB8162F; Mon, 23 May 2022 21:20:12 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPS id 9675EC385AA; Mon, 23 May 2022 21:20:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1653340811; bh=KpVOl6sTTTMSdwMKeBQ+rNG6QFT8GvV9wqoXCWKC1kk=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=eC8P8PEp53dbFijkViM2qWXeK78rMsvnAO0hU2RBBD2Ra1HQRn36xyEc2UF1KC6Bp 5h6rNjFqoG49w9qIHXM9erZTPLycpSmJtST4D0xooyPV7/v2rQe2JKdALtOQYEBO4s GB9UjIu9kI2tWI9l6uHyf9ZvjFlkPbM3ZMfPl6ACaYy2X7bqYQTQ+z7f+jJiOppRKa yk2u1Dgt6Flexs2nN8qxAi0JHaSq5BP/IqNsnwliChGmVrvos8bQEt605WjvDp9PSv H6bWojryU3Um7u3imUYdv5UflyeLNCkX9i+sw4OVz3dy+93pMwenrEFNACGqq8keyU b/MNyDMlrSUoA== Received: from aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by aws-us-west-2-korg-oddjob-1.ci.codeaurora.org (Postfix) with ESMTP id 71AA5F03935; Mon, 23 May 2022 21:20:11 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH v4 bpf-next 0/8] bpf_prog_pack followup From: patchwork-bot+netdevbpf@kernel.org Message-Id: <165334081146.9921.11212774683009494244.git-patchwork-notify@kernel.org> Date: Mon, 23 May 2022 21:20:11 +0000 References: <20220520235758.1858153-1-song@kernel.org> In-Reply-To: <20220520235758.1858153-1-song@kernel.org> To: Song Liu Cc: linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-mm@kvack.org, ast@kernel.org, daniel@iogearbox.net, peterz@infradead.org, mcgrof@kernel.org, torvalds@linux-foundation.org, rick.p.edgecombe@intel.com, kernel-team@fb.com X-Rspam-User: X-Rspamd-Queue-Id: D356210002E X-Stat-Signature: u4iiumjtkdeww9fjm6ghxitn7ipftuia Authentication-Results: imf05.hostedemail.com; dkim=pass header.d=kernel.org header.s=k20201202 header.b=eC8P8PEp; dmarc=pass (policy=none) header.from=kernel.org; spf=pass (imf05.hostedemail.com: domain of patchwork-bot+netdevbpf@kernel.org designates 145.40.68.75 as permitted sender) smtp.mailfrom=patchwork-bot+netdevbpf@kernel.org X-Rspamd-Server: rspam04 X-HE-Tag: 1653340786-299308 X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hello: This series was applied to bpf/bpf-next.git (master) by Daniel Borkmann : On Fri, 20 May 2022 16:57:50 -0700 you wrote: > Changes v3 => v4: > 1. Shorten CC list on 4/8, so it is not dropped by the mail list. > > Changes v2 => v3: > 1. Fix issues reported by kernel test robot . > > Changes v1 => v2: > 1. Add WARN to set_vm_flush_reset_perms() on huge pages. (Rick Edgecombe) > 2. Simplify select_bpf_prog_pack_size. (Rick Edgecombe) > > [...] Here is the summary with links: - [v4,bpf-next,1/8] bpf: fill new bpf_prog_pack with illegal instructions https://git.kernel.org/bpf/bpf-next/c/d88bb5eed04c - [v4,bpf-next,2/8] x86/alternative: introduce text_poke_set https://git.kernel.org/bpf/bpf-next/c/aadd1b678ebe - [v4,bpf-next,3/8] bpf: introduce bpf_arch_text_invalidate for bpf_prog_pack https://git.kernel.org/bpf/bpf-next/c/fe736565efb7 - [v4,bpf-next,4/8] module: introduce module_alloc_huge (no matching commit) - [v4,bpf-next,5/8] bpf: use module_alloc_huge for bpf_prog_pack (no matching commit) - [v4,bpf-next,6/8] vmalloc: WARN for set_vm_flush_reset_perms() on huge pages (no matching commit) - [v4,bpf-next,7/8] vmalloc: introduce huge_vmalloc_supported (no matching commit) - [v4,bpf-next,8/8] bpf: simplify select_bpf_prog_pack_size (no matching commit) You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html