On Thu, May 14, 2020 at 12:47 PM Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx> wrote: > > On Thu, May 14, 2020 at 12:43 PM James Morris > <jamorris@xxxxxxxxxxxxxxxxxxx> wrote: > > > > On Wed, 13 May 2020, Alexei Starovoitov wrote: > > > > > James, > > > > > > since you took the previous similar patch are you going to pick this > > > one up as well? > > > Or we can route it via bpf tree to Linus asap. > > > > Routing via your tree is fine. > > Perfect. > Applied to bpf tree. Thanks everyone. Looks like it was a wrong fix. It breaks audit like this: sudo auditctl -e 0 [ 88.400296] audit: error in audit_log_task_context [ 88.400976] audit: error in audit_log_task_context [ 88.401597] audit: type=1305 audit(1589584951.198:89): op=set audit_enabled=0 old=1 auid=0 ses=1 res=0 [ 88.402691] audit: type=1300 audit(1589584951.198:89): arch=c000003e syscall=44 success=yes exit=52 a0=3 a1=7ffe42a37400 a2=34 a3=0 items=0 ppid=2250 pid=2251 auid=0 uid=0 gid=0 euid=0 suid=0 fsuid=0 egid=0 sgid=0 fsgid=0 tty=ttyS0 se) [ 88.405587] audit: type=1327 audit(1589584951.198:89): proctitle=617564697463746C002D650030 Error sending enable request (Operation not supported) when CONFIG_LSM= has "bpf" in it. KP, Anders, please take a look.