bpf.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
 messages from 2021-07-07 22:58:43 to 2021-07-12 04:57:22 UTC [more...]

[PATCH -tip v8 00/13] kprobes: Fix stacktrace with kretprobes on x86
 2021-07-12  4:57 UTC  (30+ messages)
` [PATCH -tip v8 02/13] kprobes: treewide: Replace arch_deref_entry_point() with dereference_symbol_descriptor()
` [PATCH -tip v8 05/13] x86/kprobes: Add UNWIND_HINT_FUNC on kretprobe_trampoline code
          ` [PATCH 1/2] objtool: Add frame-pointer-specific function ignore
          ` [PATCH 2/2] objtool: Ignore unwind hints for ignored functions
` [PATCH -tip v8 10/13] x86/kprobes: Push a fake return address at kretprobe_trampoline
` [PATCH -tip v8 11/13] x86/unwind: Recover kretprobe trampoline entry

[PATCH rfc v2 0/5] add elevated refcnt support for page pool
 2021-07-12  3:30 UTC  (13+ messages)
` [PATCH rfc v2 1/5] page_pool: keep pp info as long as page pool owns the page
` [PATCH rfc v2 2/5] page_pool: add interface for getting and setting pagecnt_bias
` [PATCH rfc v2 3/5] page_pool: add page recycling support based on elevated refcnt
` [PATCH rfc v2 4/5] page_pool: support page frag API for page pool
` [PATCH rfc v2 5/5] net: hns3: support skb's frag page recycling based on "

[bpf-next 0/3] potential memleak and use after free in bpf verifier
 2021-07-12  2:17 UTC  (8+ messages)
` [bpf-next 3/3] bpf: Fix a use after free in bpf_check()

[RFC PATCH bpf-next v1 00/14] MIPS: eBPF: refactor code, add MIPS32 JIT
 2021-07-12  0:35 UTC  (14+ messages)
` [RFC PATCH bpf-next v1 01/14] MIPS: eBPF: support BPF_TAIL_CALL in JIT static analysis
` [RFC PATCH bpf-next v1 02/14] MIPS: eBPF: mask 32-bit index for tail calls
` [RFC PATCH bpf-next v1 03/14] MIPS: eBPF: fix BPF_ALU|ARSH handling in JIT static analysis
` [RFC PATCH bpf-next v1 04/14] MIPS: eBPF: support BPF_JMP32 "
` [RFC PATCH bpf-next v1 05/14] MIPS: eBPF: fix system hang with verifier dead-code patching
` [RFC PATCH bpf-next v1 06/14] MIPS: eBPF: fix JIT static analysis hang with bounded loops
` [RFC PATCH bpf-next v1 07/14] MIPS: eBPF: fix MOD64 insn on R6 ISA
` [RFC PATCH bpf-next v1 08/14] MIPS: eBPF: support long jump for BPF_JMP|EXIT
` [RFC PATCH bpf-next v1 09/14] MIPS: eBPF: drop src_reg restriction in BPF_LD|BPF_DW|BPF_IMM
` [RFC PATCH bpf-next v1 10/14] MIPS: eBPF: improve and clarify enum 'which_ebpf_reg'
` [RFC PATCH bpf-next v1 11/14] MIPS: eBPF: add core support for 32/64-bit systems
` [RFC PATCH bpf-next v1 13/14] MIPS: uasm: Enable muhu opcode for MIPS R6
` [RFC PATCH bpf-next v1 14/14] MIPS: eBPF: add MIPS32 JIT

[PATCHv3 bpf-next 0/7] bpf, x86: Add bpf_get_func_ip helper
 2021-07-11 14:48 UTC  (18+ messages)
` [PATCHv3 bpf-next 3/7] bpf: Add bpf_get_func_ip helper for tracing programs
` [PATCHv3 bpf-next 4/7] bpf: Add bpf_get_func_ip helper for kprobe programs
` [PATCHv3 bpf-next 5/7] selftests/bpf: Add test for bpf_get_func_ip helper
` [PATCHv3 bpf-next 6/7] libbpf: allow specification of "kprobe/function+offset"
` [PATCHv3 bpf-next 7/7] selftests/bpf: Add test for bpf_get_func_ip in kprobe+offset probe

[PATCH -tip v9 00/14] kprobes: Fix stacktrace with kretprobes on x86
 2021-07-11 13:37 UTC  (15+ messages)
` [PATCH -tip v9 01/14] ia64: kprobes: Fix to pass correct trampoline address to the handler
` [PATCH -tip v9 02/14] kprobes: treewide: Replace arch_deref_entry_point() with dereference_symbol_descriptor()
` [PATCH -tip v9 03/14] kprobes: treewide: Remove trampoline_address from kretprobe_trampoline_handler()
` [PATCH -tip v9 04/14] kprobes: treewide: Make it harder to refer kretprobe_trampoline directly
` [PATCH -tip v9 05/14] kprobes: Add kretprobe_find_ret_addr() for searching return address
` [PATCH -tip v9 06/14] x86/kprobes: Add UNWIND_HINT_FUNC on kretprobe_trampoline()
` [PATCH -tip v9 07/14] ARC: Add instruction_pointer_set() API
` [PATCH -tip v9 08/14] ia64: "
` [PATCH -tip v9 09/14] arm: kprobes: Make space for instruction pointer on stack
` [PATCH -tip v9 10/14] kprobes: Enable stacktrace from pt_regs in kretprobe handler
` [PATCH -tip v9 11/14] x86/kprobes: Push a fake return address at kretprobe_trampoline
` [PATCH -tip v9 12/14] x86/unwind: Recover kretprobe trampoline entry
` [PATCH -tip v9 13/14] tracing: Show kretprobe unknown indicator only for kretprobe_trampoline
` [PATCH -tip v9 14/14] x86/kprobes: Fixup return address in generic trampoline handler

[PATCH -tip v2 0/6] kprobes: treewide: Clean up kprobe code
 2021-07-11  7:35 UTC  (7+ messages)
` [PATCH -tip v2 1/6] kprobes: treewide: Cleanup the error messages for kprobes
` [PATCH -tip v2 2/6] kprobes: Fix coding style issues
` [PATCH -tip v2 3/6] kprobes: Use IS_ENABLED() instead of kprobes_built_in()
` [PATCH -tip v2 4/6] kprobes: Add assertions for required lock
` [PATCH -tip v2 5/6] kprobes: treewide: Use 'kprobe_opcode_t *' for the code address in get_optimized_kprobe()
` [PATCH -tip v2 6/6] kprobes: Use bool type for functions which returns boolean value

[PATCH bpf-next v3 0/2] libbpf: Introduce 'btf_custom_path' to 'bpf_obj_open_opts'
 2021-07-11  1:27 UTC  (5+ messages)
` [PATCH bpf-next v3 1/2] "
` [PATCH bpf-next v3 2/2] libbpf: Fix the possible memory leak caused by obj->kconfig

[PATCH -tip 0/6] kprobes: treewide: Clean up kprobe code
 2021-07-11  1:26 UTC  (9+ messages)
` [PATCH -tip 1/6] kprobes: treewide: Cleanup the error messages for kprobes
` [PATCH -tip 2/6] kprobes: Fix coding style issues
` [PATCH -tip 3/6] kprobes: Use IS_ENABLED() instead of kprobes_built_in()
` [PATCH -tip 4/6] kprobes: Add assertions for required lock
` [PATCH -tip 5/6] kprobes: treewide: Use 'kprobe_opcode_t *' for the code address in get_optimized_kprobe()
` [PATCH -tip 6/6] kprobes: Use bool type for functions which returns boolean value

RFC: default to spec_store_bypass_disable=prctl spectre_v2_user=prctl
 2021-07-10 18:05 UTC  (2+ messages)

[PATCH net-next RFC 0/2] add elevated refcnt support for page pool
 2021-07-10  9:16 UTC  (27+ messages)
` [PATCH net-next RFC 1/2] page_pool: add page recycling support based on elevated refcnt
                ` [Linuxarm] "

[PATCH bpf-next] bpf: add ambient BPF runtime context stored in current
 2021-07-10  4:34 UTC  (3+ messages)

[PATCH net v4] xdp, net: fix use-after-free in bpf_xdp_link_release
 2021-07-10  3:16 UTC 

[PATCH net v3] xdp, net: fix use-after-free in bpf_xdp_link_release
 2021-07-10  3:11 UTC 

[PATCH net v2] xdp, net: fix use-after-free in bpf_xdp_link_release
 2021-07-10  1:23 UTC  (6+ messages)

pull-request: bpf 2021-07-09
 2021-07-09 22:16 UTC 

[PATCHv2] selftests: Use kselftest skip code for skipped tests
 2021-07-09 17:53 UTC  (4+ messages)

[syzbot] net test error: possible deadlock in fs_reclaim_acquire
 2021-07-09 17:42 UTC 

[PATCH bpf-next 0/2] Add xdp_update_skb_shared_info utility routine
 2021-07-09 11:10 UTC  (3+ messages)
` [PATCH bpf-next 1/2] net: skbuff: add xdp_frags_tsize field to skb_shared_info
` [PATCH bpf-next 2/2] net: xdp: add xdp_update_skb_shared_info utility routine

XDP-hints: Howto support multiple BTF types per packet basis?
 2021-07-09 10:57 UTC  (12+ messages)

[PATCH net] i40e: introduce pseudo number of cpus for compatibility
 2021-07-09  7:13 UTC  (2+ messages)

[PATCH v5 bpf-next 00/11] bpf: Introduce BPF timers
 2021-07-09  7:00 UTC  (18+ messages)
` [PATCH v5 bpf-next 01/11] bpf: Prepare bpf_prog_put() to be called from irq context
` [PATCH v5 bpf-next 02/11] bpf: Factor out bpf_spin_lock into helpers
` [PATCH v5 bpf-next 03/11] bpf: Introduce bpf timers
` [PATCH v5 bpf-next 04/11] bpf: Add map side support for "
` [PATCH v5 bpf-next 05/11] bpf: Prevent pointer mismatch in bpf_timer_init
` [PATCH v5 bpf-next 06/11] bpf: Remember BTF of inner maps
` [PATCH v5 bpf-next 07/11] bpf: Relax verifier recursion check
` [PATCH v5 bpf-next 08/11] bpf: Implement verifier support for validation of async callbacks
` [PATCH v5 bpf-next 09/11] bpf: Teach stack depth check about "
` [PATCH v5 bpf-next 10/11] selftests/bpf: Add bpf_timer test
` [PATCH v5 bpf-next 11/11] selftests/bpf: Add a test with bpf_timer in inner map

[PATCH v2 0/6] Add TDX Guest Support (Attestation support)
 2021-07-09  2:43 UTC  (19+ messages)
` [PATCH v2 1/6] x86/tdx: Add TDREPORT TDX Module call support
` [PATCH v2 5/6] platform/x86: intel_tdx_attest: Add TDX Guest attestation interface driver

eBPF support for TCP payload append feature
 2021-07-08 22:06 UTC 

[PATCH bpf-next v2] libbpf: Introduce 'btf_custom_path' to 'bpf_obj_open_opts'
 2021-07-08 21:48 UTC  (2+ messages)

[PATCH net] xdp, net: fix use-after-free in bpf_xdp_link_release
 2021-07-08 21:38 UTC  (2+ messages)

[PATCH bpf v2 0/2] bpf, fix for subprogs with tailcalls
 2021-07-08 20:42 UTC  (4+ messages)
` [PATCH bpf v2 2/2] bpf: selftest to verify mixing bpf2bpf calls and tailcalls with insn patch

[PATCH bpf v3 0/2] potential sockmap memleak and proc stats fix
 2021-07-08 20:39 UTC  (6+ messages)
` [PATCH bpf v3 1/2] bpf, sockmap: fix potential memory leak on unlikely error case
` [PATCH bpf v3 2/2] bpf, sockmap: sk_prot needs inuse_idx set for proc stats

[PATCH bpf] libbpf: fix race when pinning maps in parallel
 2021-07-08 20:33 UTC  (4+ messages)

[PATCH bpf] libbpf: fix reuse of pinned map on older kernel
 2021-07-08 20:20 UTC  (5+ messages)

[PATCH] tracepoint: Add tracepoint_probe_register_may_exist() for BPF tracing
 2021-07-08 20:11 UTC  (10+ messages)

[PATCH bpf] bpf: fix for BUG: kernel NULL pointer dereference, address: 0000000000000000
 2021-07-08 19:14 UTC  (4+ messages)

[PATCH] checkpatch: Follow scripts/spdxcheck.py's switch to python3
 2021-07-08 17:25 UTC  (2+ messages)

[PATCH bpf-next] libbpf: Introduce 'custom_btf_path' to 'bpf_obj_open_opts'
 2021-07-08 13:11 UTC  (3+ messages)

[PATCH bpf-next] bpf: runqslower: fixed make install issue
 2021-07-08  3:16 UTC  (2+ messages)

[PATCH net-next v6 0/5] Generic XDP improvements
 2021-07-08  3:10 UTC  (2+ messages)

[PATCH bpf-next v8 0/4] bpf: support input xdp_md context in BPF_PROG_TEST_RUN
 2021-07-08  2:59 UTC  (6+ messages)
` [PATCH bpf-next v8 3/4] bpf: support specifying ingress via "
` [PATCH bpf-next v8 4/4] selftests/bpf: Add test for "

[PATCH bpf-next V1] samples/bpf: xdp_redirect_cpu_user: cpumap qsize set larger default
 2021-07-07 23:16 UTC  (2+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).