Hello:
This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov ast@kernel.org:
On Tue, 20 Sep 2022 09:59:38 +0200 you wrote:
From: Roberto Sassu roberto.sassu@huawei.com
One of the desirable features in security is the ability to restrict import of data to a given system based on data authenticity. If data import can be restricted, it would be possible to enforce a system-wide policy based on the signing keys the system owner trusts.
[...]
Here is the summary with links: - [v18,01/13] bpf: Allow kfuncs to be used in LSM programs https://git.kernel.org/bpf/bpf-next/c/d15bf1501c75 - [v18,02/13] btf: Export bpf_dynptr definition https://git.kernel.org/bpf/bpf-next/c/00f146413ccb - [v18,03/13] bpf: Move dynptr type check to is_dynptr_type_expected() https://git.kernel.org/bpf/bpf-next/c/e9e315b4a5de - [v18,04/13] btf: Allow dynamic pointer parameters in kfuncs https://git.kernel.org/bpf/bpf-next/c/b8d31762a0ae - [v18,05/13] bpf: Export bpf_dynptr_get_size() https://git.kernel.org/bpf/bpf-next/c/51df48657185 - [v18,06/13] KEYS: Move KEY_LOOKUP_ to include/linux/key.h and define KEY_LOOKUP_ALL https://git.kernel.org/bpf/bpf-next/c/90fd8f26edd4 - [v18,07/13] bpf: Add bpf_lookup_*_key() and bpf_key_put() kfuncs https://git.kernel.org/bpf/bpf-next/c/f3cf4134c5c6 - [v18,08/13] bpf: Add bpf_verify_pkcs7_signature() kfunc https://git.kernel.org/bpf/bpf-next/c/865b0566d8f1 - [v18,09/13] selftests/bpf: Compile kernel with everything as built-in https://git.kernel.org/bpf/bpf-next/c/94fd7420faa0 - [v18,10/13] selftests/bpf: Add verifier tests for bpf_lookup_*_key() and bpf_key_put() https://git.kernel.org/bpf/bpf-next/c/7c036ed9e006 - [v18,11/13] selftests/bpf: Add additional tests for bpf_lookup_*_key() https://git.kernel.org/bpf/bpf-next/c/ecce368d6e6d - [v18,12/13] selftests/bpf: Add test for bpf_verify_pkcs7_signature() kfunc https://git.kernel.org/bpf/bpf-next/c/fc97590668ae - [v18,13/13] selftests/bpf: Add tests for dynamic pointers parameters in kfuncs https://git.kernel.org/bpf/bpf-next/c/b94fa9f9dcf9
You are awesome, thank you!