Message ID | 20201125202404.1419509-1-kpsingh@chromium.org (mailing list archive) |
---|---|
State | Accepted |
Delegated to: | BPF |
Headers | show |
Series | [bpf-next] bpf: Add MAINTAINERS entry for BPF LSM | expand |
Context | Check | Description |
---|---|---|
netdev/cover_letter | success | Link |
netdev/fixes_present | success | Link |
netdev/patch_count | success | Link |
netdev/tree_selection | success | Clearly marked for bpf-next |
netdev/subject_prefix | success | Link |
netdev/source_inline | success | Was 0 now: 0 |
netdev/verify_signedoff | success | Link |
netdev/module_param | success | Was 0 now: 0 |
netdev/build_32bit | success | Errors and warnings before: 0 this patch: 0 |
netdev/kdoc | success | Errors and warnings before: 0 this patch: 0 |
netdev/verify_fixes | success | Link |
netdev/checkpatch | success | total: 0 errors, 0 warnings, 0 checks, 17 lines checked |
netdev/build_allmodconfig_warn | success | Errors and warnings before: 0 this patch: 0 |
netdev/header_inline | success | Link |
netdev/stable | success | Stable not CCed |
On Wed, Nov 25, 2020 at 12:24 PM KP Singh <kpsingh@chromium.org> wrote: > > From: KP Singh <kpsingh@google.com> > > Similar to XDP and some JITs, also added Brendan and Florent who have > been reviewing all my patches internally as reviewers. The patches are > still expected to go via the BPF tree / list / merge workflows. > > Signed-off-by: KP Singh <kpsingh@google.com> > --- > MAINTAINERS | 11 +++++++++++ > 1 file changed, 11 insertions(+) > > diff --git a/MAINTAINERS b/MAINTAINERS > index af9f6a3ab100..09c902bee5d2 100644 > --- a/MAINTAINERS > +++ b/MAINTAINERS > @@ -3366,6 +3366,17 @@ S: Supported > F: arch/x86/net/ > X: arch/x86/net/bpf_jit_comp32.c > > +BPF LSM (Security Audit and Enforcement using eBPF) > +M: KP Singh <kpsingh@chromium.org> > +R: Florent Revest <revest@chromium.org> > +R: Brendan Jackman <jackmanb@chromium.org> > +L: bpf@vger.kernel.org > +S: Maintained > +F: Documentation/bpf/bpf_lsm.rst > +F: include/linux/bpf_lsm.h > +F: kernel/bpf/bpf_lsm.c > +F: security/bpf/ I'm not sure what's the value of the additional entry. bpf has many different components. This is just one of them. Your maintainer of bpf_lsm responsibilities stay the same regardless of the entry in the file.
On Wed, Nov 25, 2020 at 9:53 PM Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > On Wed, Nov 25, 2020 at 12:24 PM KP Singh <kpsingh@chromium.org> wrote: > > > > From: KP Singh <kpsingh@google.com> > > > > Similar to XDP and some JITs, also added Brendan and Florent who have > > been reviewing all my patches internally as reviewers. The patches are > > still expected to go via the BPF tree / list / merge workflows. > > > > Signed-off-by: KP Singh <kpsingh@google.com> > > --- > > MAINTAINERS | 11 +++++++++++ > > 1 file changed, 11 insertions(+) > > > > diff --git a/MAINTAINERS b/MAINTAINERS > > index af9f6a3ab100..09c902bee5d2 100644 > > --- a/MAINTAINERS > > +++ b/MAINTAINERS > > @@ -3366,6 +3366,17 @@ S: Supported > > F: arch/x86/net/ > > X: arch/x86/net/bpf_jit_comp32.c > > > > +BPF LSM (Security Audit and Enforcement using eBPF) > > +M: KP Singh <kpsingh@chromium.org> > > +R: Florent Revest <revest@chromium.org> > > +R: Brendan Jackman <jackmanb@chromium.org> > > +L: bpf@vger.kernel.org > > +S: Maintained > > +F: Documentation/bpf/bpf_lsm.rst > > +F: include/linux/bpf_lsm.h > > +F: kernel/bpf/bpf_lsm.c > > +F: security/bpf/ > > I'm not sure what's the value of the additional entry. I think it's better to add Brendan and Florent as reviewers for the LSM bits but not the overall BPF stuff (for now). We can also keep any tools/bpf stuff we add for LSM (at least initially) listed here. > bpf has many different components. This is just one of them. > Your maintainer of bpf_lsm responsibilities stay the same > regardless of the entry in the file. I do understand this does not entail any change in responsibilities
diff --git a/MAINTAINERS b/MAINTAINERS index af9f6a3ab100..09c902bee5d2 100644 --- a/MAINTAINERS +++ b/MAINTAINERS @@ -3366,6 +3366,17 @@ S: Supported F: arch/x86/net/ X: arch/x86/net/bpf_jit_comp32.c +BPF LSM (Security Audit and Enforcement using eBPF) +M: KP Singh <kpsingh@chromium.org> +R: Florent Revest <revest@chromium.org> +R: Brendan Jackman <jackmanb@chromium.org> +L: bpf@vger.kernel.org +S: Maintained +F: Documentation/bpf/bpf_lsm.rst +F: include/linux/bpf_lsm.h +F: kernel/bpf/bpf_lsm.c +F: security/bpf/ + BROADCOM B44 10/100 ETHERNET DRIVER M: Michael Chan <michael.chan@broadcom.com> L: netdev@vger.kernel.org