messages from 2021-07-07 22:58:43 to 2021-07-12 04:57:22 UTC [more...]
[PATCH -tip v8 00/13] kprobes: Fix stacktrace with kretprobes on x86
2021-07-12 4:57 UTC (30+ messages)
` [PATCH -tip v8 02/13] kprobes: treewide: Replace arch_deref_entry_point() with dereference_symbol_descriptor()
` [PATCH -tip v8 05/13] x86/kprobes: Add UNWIND_HINT_FUNC on kretprobe_trampoline code
` [PATCH 1/2] objtool: Add frame-pointer-specific function ignore
` [PATCH 2/2] objtool: Ignore unwind hints for ignored functions
` [PATCH -tip v8 10/13] x86/kprobes: Push a fake return address at kretprobe_trampoline
` [PATCH -tip v8 11/13] x86/unwind: Recover kretprobe trampoline entry
[PATCH rfc v2 0/5] add elevated refcnt support for page pool
2021-07-12 3:30 UTC (13+ messages)
` [PATCH rfc v2 1/5] page_pool: keep pp info as long as page pool owns the page
` [PATCH rfc v2 2/5] page_pool: add interface for getting and setting pagecnt_bias
` [PATCH rfc v2 3/5] page_pool: add page recycling support based on elevated refcnt
` [PATCH rfc v2 4/5] page_pool: support page frag API for page pool
` [PATCH rfc v2 5/5] net: hns3: support skb's frag page recycling based on "
[bpf-next 0/3] potential memleak and use after free in bpf verifier
2021-07-12 2:17 UTC (8+ messages)
` [bpf-next 3/3] bpf: Fix a use after free in bpf_check()
[RFC PATCH bpf-next v1 00/14] MIPS: eBPF: refactor code, add MIPS32 JIT
2021-07-12 0:35 UTC (14+ messages)
` [RFC PATCH bpf-next v1 01/14] MIPS: eBPF: support BPF_TAIL_CALL in JIT static analysis
` [RFC PATCH bpf-next v1 02/14] MIPS: eBPF: mask 32-bit index for tail calls
` [RFC PATCH bpf-next v1 03/14] MIPS: eBPF: fix BPF_ALU|ARSH handling in JIT static analysis
` [RFC PATCH bpf-next v1 04/14] MIPS: eBPF: support BPF_JMP32 "
` [RFC PATCH bpf-next v1 05/14] MIPS: eBPF: fix system hang with verifier dead-code patching
` [RFC PATCH bpf-next v1 06/14] MIPS: eBPF: fix JIT static analysis hang with bounded loops
` [RFC PATCH bpf-next v1 07/14] MIPS: eBPF: fix MOD64 insn on R6 ISA
` [RFC PATCH bpf-next v1 08/14] MIPS: eBPF: support long jump for BPF_JMP|EXIT
` [RFC PATCH bpf-next v1 09/14] MIPS: eBPF: drop src_reg restriction in BPF_LD|BPF_DW|BPF_IMM
` [RFC PATCH bpf-next v1 10/14] MIPS: eBPF: improve and clarify enum 'which_ebpf_reg'
` [RFC PATCH bpf-next v1 11/14] MIPS: eBPF: add core support for 32/64-bit systems
` [RFC PATCH bpf-next v1 13/14] MIPS: uasm: Enable muhu opcode for MIPS R6
` [RFC PATCH bpf-next v1 14/14] MIPS: eBPF: add MIPS32 JIT
[PATCHv3 bpf-next 0/7] bpf, x86: Add bpf_get_func_ip helper
2021-07-11 14:48 UTC (18+ messages)
` [PATCHv3 bpf-next 3/7] bpf: Add bpf_get_func_ip helper for tracing programs
` [PATCHv3 bpf-next 4/7] bpf: Add bpf_get_func_ip helper for kprobe programs
` [PATCHv3 bpf-next 5/7] selftests/bpf: Add test for bpf_get_func_ip helper
` [PATCHv3 bpf-next 6/7] libbpf: allow specification of "kprobe/function+offset"
` [PATCHv3 bpf-next 7/7] selftests/bpf: Add test for bpf_get_func_ip in kprobe+offset probe
[PATCH -tip v9 00/14] kprobes: Fix stacktrace with kretprobes on x86
2021-07-11 13:37 UTC (15+ messages)
` [PATCH -tip v9 01/14] ia64: kprobes: Fix to pass correct trampoline address to the handler
` [PATCH -tip v9 02/14] kprobes: treewide: Replace arch_deref_entry_point() with dereference_symbol_descriptor()
` [PATCH -tip v9 03/14] kprobes: treewide: Remove trampoline_address from kretprobe_trampoline_handler()
` [PATCH -tip v9 04/14] kprobes: treewide: Make it harder to refer kretprobe_trampoline directly
` [PATCH -tip v9 05/14] kprobes: Add kretprobe_find_ret_addr() for searching return address
` [PATCH -tip v9 06/14] x86/kprobes: Add UNWIND_HINT_FUNC on kretprobe_trampoline()
` [PATCH -tip v9 07/14] ARC: Add instruction_pointer_set() API
` [PATCH -tip v9 08/14] ia64: "
` [PATCH -tip v9 09/14] arm: kprobes: Make space for instruction pointer on stack
` [PATCH -tip v9 10/14] kprobes: Enable stacktrace from pt_regs in kretprobe handler
` [PATCH -tip v9 11/14] x86/kprobes: Push a fake return address at kretprobe_trampoline
` [PATCH -tip v9 12/14] x86/unwind: Recover kretprobe trampoline entry
` [PATCH -tip v9 13/14] tracing: Show kretprobe unknown indicator only for kretprobe_trampoline
` [PATCH -tip v9 14/14] x86/kprobes: Fixup return address in generic trampoline handler
[PATCH -tip v2 0/6] kprobes: treewide: Clean up kprobe code
2021-07-11 7:35 UTC (7+ messages)
` [PATCH -tip v2 1/6] kprobes: treewide: Cleanup the error messages for kprobes
` [PATCH -tip v2 2/6] kprobes: Fix coding style issues
` [PATCH -tip v2 3/6] kprobes: Use IS_ENABLED() instead of kprobes_built_in()
` [PATCH -tip v2 4/6] kprobes: Add assertions for required lock
` [PATCH -tip v2 5/6] kprobes: treewide: Use 'kprobe_opcode_t *' for the code address in get_optimized_kprobe()
` [PATCH -tip v2 6/6] kprobes: Use bool type for functions which returns boolean value
[PATCH bpf-next v3 0/2] libbpf: Introduce 'btf_custom_path' to 'bpf_obj_open_opts'
2021-07-11 1:27 UTC (5+ messages)
` [PATCH bpf-next v3 1/2] "
` [PATCH bpf-next v3 2/2] libbpf: Fix the possible memory leak caused by obj->kconfig
[PATCH -tip 0/6] kprobes: treewide: Clean up kprobe code
2021-07-11 1:26 UTC (9+ messages)
` [PATCH -tip 1/6] kprobes: treewide: Cleanup the error messages for kprobes
` [PATCH -tip 2/6] kprobes: Fix coding style issues
` [PATCH -tip 3/6] kprobes: Use IS_ENABLED() instead of kprobes_built_in()
` [PATCH -tip 4/6] kprobes: Add assertions for required lock
` [PATCH -tip 5/6] kprobes: treewide: Use 'kprobe_opcode_t *' for the code address in get_optimized_kprobe()
` [PATCH -tip 6/6] kprobes: Use bool type for functions which returns boolean value
RFC: default to spec_store_bypass_disable=prctl spectre_v2_user=prctl
2021-07-10 18:05 UTC (2+ messages)
[PATCH net-next RFC 0/2] add elevated refcnt support for page pool
2021-07-10 9:16 UTC (27+ messages)
` [PATCH net-next RFC 1/2] page_pool: add page recycling support based on elevated refcnt
` [Linuxarm] "
[PATCH bpf-next] bpf: add ambient BPF runtime context stored in current
2021-07-10 4:34 UTC (3+ messages)
[PATCH net v4] xdp, net: fix use-after-free in bpf_xdp_link_release
2021-07-10 3:16 UTC
[PATCH net v3] xdp, net: fix use-after-free in bpf_xdp_link_release
2021-07-10 3:11 UTC
[PATCH net v2] xdp, net: fix use-after-free in bpf_xdp_link_release
2021-07-10 1:23 UTC (6+ messages)
pull-request: bpf 2021-07-09
2021-07-09 22:16 UTC
[PATCHv2] selftests: Use kselftest skip code for skipped tests
2021-07-09 17:53 UTC (4+ messages)
[syzbot] net test error: possible deadlock in fs_reclaim_acquire
2021-07-09 17:42 UTC
[PATCH bpf-next 0/2] Add xdp_update_skb_shared_info utility routine
2021-07-09 11:10 UTC (3+ messages)
` [PATCH bpf-next 1/2] net: skbuff: add xdp_frags_tsize field to skb_shared_info
` [PATCH bpf-next 2/2] net: xdp: add xdp_update_skb_shared_info utility routine
XDP-hints: Howto support multiple BTF types per packet basis?
2021-07-09 10:57 UTC (12+ messages)
[PATCH net] i40e: introduce pseudo number of cpus for compatibility
2021-07-09 7:13 UTC (2+ messages)
[PATCH v5 bpf-next 00/11] bpf: Introduce BPF timers
2021-07-09 7:00 UTC (18+ messages)
` [PATCH v5 bpf-next 01/11] bpf: Prepare bpf_prog_put() to be called from irq context
` [PATCH v5 bpf-next 02/11] bpf: Factor out bpf_spin_lock into helpers
` [PATCH v5 bpf-next 03/11] bpf: Introduce bpf timers
` [PATCH v5 bpf-next 04/11] bpf: Add map side support for "
` [PATCH v5 bpf-next 05/11] bpf: Prevent pointer mismatch in bpf_timer_init
` [PATCH v5 bpf-next 06/11] bpf: Remember BTF of inner maps
` [PATCH v5 bpf-next 07/11] bpf: Relax verifier recursion check
` [PATCH v5 bpf-next 08/11] bpf: Implement verifier support for validation of async callbacks
` [PATCH v5 bpf-next 09/11] bpf: Teach stack depth check about "
` [PATCH v5 bpf-next 10/11] selftests/bpf: Add bpf_timer test
` [PATCH v5 bpf-next 11/11] selftests/bpf: Add a test with bpf_timer in inner map
[PATCH v2 0/6] Add TDX Guest Support (Attestation support)
2021-07-09 2:43 UTC (19+ messages)
` [PATCH v2 1/6] x86/tdx: Add TDREPORT TDX Module call support
` [PATCH v2 5/6] platform/x86: intel_tdx_attest: Add TDX Guest attestation interface driver
eBPF support for TCP payload append feature
2021-07-08 22:06 UTC
[PATCH bpf-next v2] libbpf: Introduce 'btf_custom_path' to 'bpf_obj_open_opts'
2021-07-08 21:48 UTC (2+ messages)
[PATCH net] xdp, net: fix use-after-free in bpf_xdp_link_release
2021-07-08 21:38 UTC (2+ messages)
[PATCH bpf v2 0/2] bpf, fix for subprogs with tailcalls
2021-07-08 20:42 UTC (4+ messages)
` [PATCH bpf v2 2/2] bpf: selftest to verify mixing bpf2bpf calls and tailcalls with insn patch
[PATCH bpf v3 0/2] potential sockmap memleak and proc stats fix
2021-07-08 20:39 UTC (6+ messages)
` [PATCH bpf v3 1/2] bpf, sockmap: fix potential memory leak on unlikely error case
` [PATCH bpf v3 2/2] bpf, sockmap: sk_prot needs inuse_idx set for proc stats
[PATCH bpf] libbpf: fix race when pinning maps in parallel
2021-07-08 20:33 UTC (4+ messages)
[PATCH bpf] libbpf: fix reuse of pinned map on older kernel
2021-07-08 20:20 UTC (5+ messages)
[PATCH] tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing
2021-07-08 20:11 UTC (10+ messages)
[PATCH bpf] bpf: fix for BUG: kernel NULL pointer dereference, address: 0000000000000000
2021-07-08 19:14 UTC (4+ messages)
[PATCH] checkpatch: Follow scripts/spdxcheck.py's switch to python3
2021-07-08 17:25 UTC (2+ messages)
[PATCH bpf-next] libbpf: Introduce 'custom_btf_path' to 'bpf_obj_open_opts'
2021-07-08 13:11 UTC (3+ messages)
[PATCH bpf-next] bpf: runqslower: fixed make install issue
2021-07-08 3:16 UTC (2+ messages)
[PATCH net-next v6 0/5] Generic XDP improvements
2021-07-08 3:10 UTC (2+ messages)
[PATCH bpf-next v8 0/4] bpf: support input xdp_md context in BPF_PROG_TEST_RUN
2021-07-08 2:59 UTC (6+ messages)
` [PATCH bpf-next v8 3/4] bpf: support specifying ingress via "
` [PATCH bpf-next v8 4/4] selftests/bpf: Add test for "
[PATCH bpf-next V1] samples/bpf: xdp_redirect_cpu_user: cpumap qsize set larger default
2021-07-07 23:16 UTC (2+ messages)
page: next (older) | prev (newer) | latest
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).