BPF
[Prev Page][Next Page]
- RE: [PATCH bpf-next 3/8] libbpf: further decouple feature checking logic from bpf_object
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- Re: [PATCH bpf-next v5 9/9] bpf: xfrm: Add selftest for bpf_xdp_get_xfrm_state()
- From: Eyal Birger <eyal.birger@xxxxxxxxx>
- Re: [PATCH bpf-next v5 1/9] bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc
- From: Eyal Birger <eyal.birger@xxxxxxxxx>
- RE: [PATCH bpf-next 2/8] libbpf: split feature detectors definitions from cached results
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- RE: [PATCH bpf-next 1/8] bpf: fail BPF_TOKEN_CREATE if no delegation option was set on BPF FS
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- RE: [PATCH bpf-next ] selftests/bpf: Fixes tests for filesystem kfuncs
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- RE: [PATCH v3 bpf-next] selftests/bpf: validate eliminated global subprog is not freplaceable
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- Re: [net-next v1 08/16] memory-provider: dmabuf devmem memory provider
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- [PATCH bpf-next v5 9/9] bpf: xfrm: Add selftest for bpf_xdp_get_xfrm_state()
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 8/9] bpf: selftests: Move xfrm tunnel test to test_progs
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 7/9] bpf: selftests: test_tunnel: Use vmlinux.h declarations
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 6/9] bpf: selftests: test_tunnel: Setup fresh topology for each subtest
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 5/9] bpf: selftests: Add verifier tests for CO-RE bitfield writes
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 4/9] bpf: selftests: test_loader: Support __btf_path() annotation
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 3/9] libbpf: Add BPF_CORE_WRITE_BITFIELD() macro
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 2/9] bpf: xfrm: Add bpf_xdp_xfrm_state_release() kfunc
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 1/9] bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next v5 0/9] Add bpf_xdp_get_xfrm_state() kfunc
- From: Daniel Xu <dxu@xxxxxxxxx>
- Re: [PATCH bpf-next v2] bpf: Update the comments in maybe_wait_bpf_programs()
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- Re: [PATCH v1 00/14] Clean up libperf cpumap's empty function
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [PATCH bpf V2 1/1] bpf: fix verification of indirect var-off stack access
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next] bpf: make the verifier trace the "not qeual" for regs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v7 2/4] selftests/bpf: Add test for recursive attachment of tracing progs
- From: Dmitry Dolgov <9erthalion6@xxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v7 1/4] bpf: Relax tracing prog recursive attach rules
- From: Dmitry Dolgov <9erthalion6@xxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 0/8] BPF token support in libbpf's BPF object
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 3/8] libbpf: further decouple feature checking logic from bpf_object
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [net-next v1 09/16] page_pool: device memory support
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH bpf-next ] selftests/bpf: Fixes tests for filesystem kfuncs
- From: Manu Bretelle <chantr4@xxxxxxxxx>
- Re: [RFC PATCH bpf-next v2 4/4] selftests/bpf: Add testcases for tailcall hierarchy fixing
- From: Maciej Fijalkowski <maciej.fijalkowski@xxxxxxxxx>
- Re: [RFC PATCH bpf-next v2 3/4] bpf, x64: Load tail_call_cnt pointer
- From: Maciej Fijalkowski <maciej.fijalkowski@xxxxxxxxx>
- Re: [RFC PATCH bpf-next v2 2/4] bpf, x64: Fix tailcall hierarchy
- From: Maciej Fijalkowski <maciej.fijalkowski@xxxxxxxxx>
- [PATCH v3 bpf-next] selftests/bpf: validate eliminated global subprog is not freplaceable
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- Re: [PATCH v1 bpf-next 1/2] bpf: Support BPF_F_MMAPABLE task_local storage
- From: David Marchevsky <david.marchevsky@xxxxxxxxx>
- Re: [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Anton Protopopov <aspsk@xxxxxxxxxxxxx>
- Re: [PATCH v3 net-next 2/2] xdp: add multi-buff support for xdp running in generic mode
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH bpf-next 1/4] bpf: Use __GFP_NOWARN for kvcalloc when attaching multiple uprobes
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH net-next v9 15/15] p4tc: add P4 classifier
- From: Jamal Hadi Salim <jhs@xxxxxxxxxxxx>
- [Bug Report] bpf: incorrectly pruning runtime execution path
- From: Hao Sun <sunhao.th@xxxxxxxxx>
- Re: [PATCH bpf-next v3] bpf: Support uid and gid when mounting bpffs
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next v3] bpf: Support uid and gid when mounting bpffs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v3 1/4] perf/bpf: Call bpf handler directly, not through overflow machinery
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 0/2] Allow data_meta size > 32
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH net-next v9 14/15] p4tc: add set of P4TC table kfuncs
- From: Jamal Hadi Salim <jhs@xxxxxxxxxxxx>
- Re: [PATCH bpf-next] bpf: make the verifier trace the "not qeual" for regs
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH net-next v9 14/15] p4tc: add set of P4TC table kfuncs
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- Re: [PATCH bpf-next v2] bpf: Update the comments in maybe_wait_bpf_programs()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf v2 1/2] bpf: syzkaller found null ptr deref in unix_bpf proto add
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: WARNING: kmalloc bug in bpf_uprobe_multi_link_attach
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH bpf-next v3] bpf: Support uid and gid when mounting bpffs
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH v3 1/4] perf/bpf: Call bpf handler directly, not through overflow machinery
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: WARNING: kmalloc bug in bpf_uprobe_multi_link_attach
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH bpf-next 3/4] selftests/bpf: Add test for abnormal cnt during multi-kprobe attachment
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH bpf-next 4/4] selftests/bpf: Add test for abnormal cnt during multi-uprobe attachment
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH bpf-next 2/4] bpf: Use __GFP_NOWARN for kvmalloc_array() when attaching multiple kprobes
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH bpf-next 1/4] bpf: Use __GFP_NOWARN for kvcalloc when attaching multiple uprobes
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- bpftool fails on 32-bit hosts when -Wa,--compress-debug-sections is used
- From: Sergei Trofimovich <slyich@xxxxxxxxx>
- Re: Question about bpf perfbuf/ringbuf: pinned in backend with overwriting
- From: Philo Lu <lulie@xxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v7 4/4] selftests/bpf: Test re-attachment fix for bpf_tracing_prog_attach
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH bpf-next v7 2/4] selftests/bpf: Add test for recursive attachment of tracing progs
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH bpf-next v7 1/4] bpf: Relax tracing prog recursive attach rules
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [net-next v1 09/16] page_pool: device memory support
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: WARNING: kmalloc bug in bpf_uprobe_multi_link_attach
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 2/4] bpf: Use __GFP_NOWARN for kvmalloc_array() when attaching multiple kprobes
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 4/4] selftests/bpf: Add test for abnormal cnt during multi-uprobe attachment
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 3/4] selftests/bpf: Add test for abnormal cnt during multi-kprobe attachment
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 1/4] bpf: Use __GFP_NOWARN for kvcalloc when attaching multiple uprobes
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 0/4] bpf: Fix warnings in kvmalloc_node()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: WARNING: kmalloc bug in bpf_uprobe_multi_link_attach
- From: Masami Hiramatsu (Google) <mhiramat@xxxxxxxxxx>
- Re: [PATCH v12 bpf-next 03/17] bpf: introduce BPF token object
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH bpf-next] bpf: make the verifier trace the "not qeual" for regs
- From: Menglong Dong <menglong8.dong@xxxxxxxxx>
- [PATCH bpf-next v2] bpf: Update the comments in maybe_wait_bpf_programs()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- WARNING: kmalloc bug in bpf_uprobe_multi_link_attach
- From: xingwei lee <xrivendell7@xxxxxxxxx>
- [PATCH v5 bpf-next 6/6] selftest: bpf: Test bpf_sk_assign_tcp_reqsk().
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- [PATCH v5 bpf-next 5/6] bpf: tcp: Support arbitrary SYN Cookie.
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- [PATCH v5 bpf-next 4/6] bpf: tcp: Handle BPF SYN Cookie in cookie_v[46]_check().
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- [PATCH v5 bpf-next 3/6] bpf: tcp: Handle BPF SYN Cookie in skb_steal_sock().
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- [PATCH v5 bpf-next 2/6] tcp: Move skb_steal_sock() to request_sock.h
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- [PATCH bpf-next v2 0/2] bpf: Use GFP_KERNEL in bpf_event_entry_gen()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v2 2/2] bpf: Use GFP_KERNEL in bpf_event_entry_gen()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v2 1/2] bpf: Reduce the scope of rcu_read_lock when updating fd map
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH v5 bpf-next 1/6] tcp: Move tcp_ns_to_ts() to tcp.h
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- [PATCH v5 bpf-next 0/6] bpf: tcp: Support arbitrary SYN Cookie at TC.
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH bpf-next] bpf: make the verifier trace the "not qeual" for regs
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- [PATCH v3 4/4] selftest/bpf: Test a perf bpf program that suppresses side effects.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v3 3/4] perf/bpf: Allow a bpf program to suppress all sample side effects
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v3 2/4] perf/bpf: Remove unneeded uses_default_overflow_handler.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v3 1/4] perf/bpf: Call bpf handler directly, not through overflow machinery
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v3 0/4] Combine perf and bpf for fast eval of hw breakpoint conditions
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: [net-next v1 09/16] page_pool: device memory support
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 7/7] bpf: Wait for sleepable BPF program in maybe_wait_bpf_programs()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next 7/7] bpf: Wait for sleepable BPF program in maybe_wait_bpf_programs()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [net-next v1 08/16] memory-provider: dmabuf devmem memory provider
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [net-next v1 09/16] page_pool: device memory support
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [net-next v1 06/16] netdev: support binding dma-buf to netdevice
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH bpf-next 7/7] bpf: Wait for sleepable BPF program in maybe_wait_bpf_programs()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: [net-next v1 09/16] page_pool: device memory support
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH bpf V2 1/1] bpf: fix verification of indirect var-off stack access
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- Re: [PATCH bpf-next 7/7] bpf: Wait for sleepable BPF program in maybe_wait_bpf_programs()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next 6/7] bpf: Only call maybe_wait_bpf_programs() when at least one map operation succeeds
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: [PATCH RESEND bpf-next 1/2] bpf: Reduce the scope of rcu_read_lock when updating fd map
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf V2 1/1] bpf: fix verification of indirect var-off stack access
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- [PATCH bpf-next] bpf: Simplify checking size of helper accesses
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf-next] bpf: Comment on check_mem_size_reg
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- Re: [PATCH bpf V2 1/1] bpf: fix verification of indirect var-off stack access
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- Re: [Bpf] BPF ISA conformance groups
- From: Watson Ladd <watsonbladd@xxxxxxxxx>
- Re: [syzbot] [bpf?] WARNING in __mark_chain_precision (3)
- From: syzbot <syzbot+4d6330e14407721955eb@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [bpf?] WARNING in __mark_chain_precision (3)
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 3/8] libbpf: further decouple feature checking logic from bpf_object
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 0/8] BPF token support in libbpf's BPF object
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- [PATCH bpf-next] bpf: make the verifier trace the "not qeual" for regs
- From: Menglong Dong <menglong8.dong@xxxxxxxxx>
- [syzbot] [bpf?] WARNING in __mark_chain_precision (3)
- From: syzbot <syzbot+4d6330e14407721955eb@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH
- From: Akihiko Odaki <akihiko.odaki@xxxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf-next 0/2] Add new bpf_cpumask_weight() kfunc
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH RESEND bpf-next 1/2] bpf: Reduce the scope of rcu_read_lock when updating fd map
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH RESEND bpf-next v1] test_bpf: Rename second ALU64_SMOD_X to ALU64_SMOD_K
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [net-next v1 01/16] net: page_pool: factor out releasing DMA from releasing the page
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [net-next v1 00/16] Device Memory TCP
- From: Shakeel Butt <shakeelb@xxxxxxxxxx>
- Re: [bug report] until recently, code for bpf_loop callbacks using stack for ctx was mangled by verifier
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- bpf selftest iters/iter_arr_with_actual_elem_count failure with latest llvm cpu=v4
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf-next 1/2] bpf: handle fake register spill to stack with BPF_ST_MEM instruction
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [Bpf] BPF ISA conformance groups
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [net-next v1 08/16] memory-provider: dmabuf devmem memory provider
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH v4 3/5] mm, security: Add lsm hook for memory policy adjustment
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH bpf-next 0/7] bpf: Fixes for maybe_wait_bpf_programs()
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [bug report] until recently, code for bpf_loop callbacks using stack for ctx was mangled by verifier
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 6/7] bpf: Only call maybe_wait_bpf_programs() when at least one map operation succeeds
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 7/7] bpf: Wait for sleepable BPF program in maybe_wait_bpf_programs()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [net-next v1 06/16] netdev: support binding dma-buf to netdevice
- From: David Ahern <dsahern@xxxxxxxxxx>
- Re: [PATCH v3 net-next 2/2] xdp: add multi-buff support for xdp running in generic mode
- From: Lorenzo Bianconi <lorenzo@xxxxxxxxxx>
- Re: [PATCH bpf-next 2/2] selftests/bpf: validate fake register spill/fill precision backtracking logic
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 1/2] bpf: handle fake register spill to stack with BPF_ST_MEM instruction
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- [RFC PATCH v3] LSM: Officially support appending LSM hooks after boot.
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf V2 1/1] bpf: fix verification of indirect var-off stack access
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 1/2] bpf: handle fake register spill to stack with BPF_ST_MEM instruction
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf V2 1/1] bpf: fix verification of indirect var-off stack access
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- Re: [PATCH bpf-next 1/2] bpf: handle fake register spill to stack with BPF_ST_MEM instruction
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 1/2] bpf: handle fake register spill to stack with BPF_ST_MEM instruction
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 1/2] bpf: handle fake register spill to stack with BPF_ST_MEM instruction
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 1/2] bpf: handle fake register spill to stack with BPF_ST_MEM instruction
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH v4 bpf-next 3/3] selftest: bpf: Test bpf_sk_assign_tcp_reqsk().
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v2] libbpf: add pr_warn() for EINVAL cases in linker_sanity_check_elf
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next 3/3] selftests/bpf: Add selftests for cgroup1 local storage
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next 0/3] bpf: Expand bpf_cgrp_storage to support cgroup1 non-attach case
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH bpf-next 2/2] selftests/bpf: validate fake register spill/fill precision backtracking logic
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH bpf-next 1/2] bpf: handle fake register spill to stack with BPF_ST_MEM instruction
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- Re: [PATCH bpf-next] selftests/bpf: fix timer/test_bad_ret subtest on test_progs-cpuv4 flavor
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next v12 00/14] Registrating struct_ops types from modules
- From: Kui-Feng Lee <sinquersw@xxxxxxxxx>
- [PATCH bpf-next v13 14/14] bpf: pass btf object id in bpf_map_info.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 13/14] selftests/bpf: test case for register_bpf_struct_ops().
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 11/14] libbpf: Find correct module BTFs for struct_ops maps and progs.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 12/14] bpf: export btf_ctx_access to modules.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 10/14] bpf, net: switch to dynamic registration
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 09/14] bpf: validate value_type
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 08/14] bpf: hold module for bpf_struct_ops_map.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 07/14] bpf: pass attached BTF to the bpf_struct_ops subsystem
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 06/14] bpf: lookup struct_ops types from a given module BTF.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 05/14] bpf: make struct_ops_map support btfs other than btf_vmlinux.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 04/14] bpf: add struct_ops_tab to btf.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 03/14] bpf, net: introduce bpf_struct_ops_desc.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 02/14] bpf: get type information with BPF_ID_LIST
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 01/14] bpf: refactory struct_ops type initialization to a function.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v13 00/14] Registrating struct_ops types from modules
- From: thinker.li@xxxxxxxxx
- Re: [PATCH bpf-next v4 02/10] bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc
- From: Daniel Xu <dxu@xxxxxxxxx>
- Re: [devel-ipsec] [PATCH bpf-next v4 01/10] xfrm: bpf: Move xfrm_interface_bpf.c to xfrm_bpf.c
- From: Daniel Xu <dxu@xxxxxxxxx>
- [PATCH bpf-next] selftests/bpf: fix timer/test_bad_ret subtest on test_progs-cpuv4 flavor
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [net-next v1 08/16] memory-provider: dmabuf devmem memory provider
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [net-next v1 08/16] memory-provider: dmabuf devmem memory provider
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH bpf v5 0/3] bpf: fix accesses to uninit stack slots
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [net-next v1 08/16] memory-provider: dmabuf devmem memory provider
- From: Pavel Begunkov <asml.silence@xxxxxxxxx>
- Re: [PATCH bpf-next 6/7] bpf: Only call maybe_wait_bpf_programs() when at least one map operation succeeds
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next 1/8] bpf: fail BPF_TOKEN_CREATE if no delegation option was set on BPF FS
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v12 bpf-next 03/17] bpf: introduce BPF token object
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: Question about bpf perfbuf/ringbuf: pinned in backend with overwriting
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 7/7] bpf: Wait for sleepable BPF program in maybe_wait_bpf_programs()
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf V2 1/1] bpf: fix verification of indirect var-off stack access
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v2] libbpf: add pr_warn() for EINVAL cases in linker_sanity_check_elf
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- [PATCH v2] libbpf: add pr_warn() for EINVAL cases in linker_sanity_check_elf
- From: Sergei Trofimovich <slyich@xxxxxxxxx>
- Re: [PATCH bpf-next 1/8] bpf: fail BPF_TOKEN_CREATE if no delegation option was set on BPF FS
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v5 3/3] bpf: minor cleanup around stack bounds
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next v5 1/3] bpf: add some comments to stack representation
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [syzbot] [mm?] BUG: unable to handle kernel paging request in copy_from_kernel_nofault
- From: Thomas Gleixner <tglx@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [net-next v1 06/16] netdev: support binding dma-buf to netdevice
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH net-next v9 14/15] p4tc: add set of P4TC table kfuncs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [net-next v1 00/16] Device Memory TCP
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [net-next v1 07/16] netdev: netdevice devmem allocator
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [net-next v1 13/16] tcp: RX path for devmem TCP
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [net-next v1 06/16] netdev: support binding dma-buf to netdevice
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [PATCH bpf-next v7 4/4] selftests/bpf: Test re-attachment fix for bpf_tracing_prog_attach
- From: Dmitrii Dolgov <9erthalion6@xxxxxxxxx>
- [PATCH bpf-next v7 3/4] bpf: Fix re-attachment branch in bpf_tracing_prog_attach
- From: Dmitrii Dolgov <9erthalion6@xxxxxxxxx>
- [PATCH bpf-next v7 2/4] selftests/bpf: Add test for recursive attachment of tracing progs
- From: Dmitrii Dolgov <9erthalion6@xxxxxxxxx>
- [PATCH bpf-next v7 1/4] bpf: Relax tracing prog recursive attach rules
- From: Dmitrii Dolgov <9erthalion6@xxxxxxxxx>
- [PATCH bpf-next v7 0/4] Relax tracing prog recursive attach rules
- From: Dmitrii Dolgov <9erthalion6@xxxxxxxxx>
- Re: [PATCH bpf-next v4] bpf: Fix a race condition between btf_put() and map_free()
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v5] bpf: Fix a race condition between btf_put() and map_free()
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH RESEND bpf-next 2/2] bpf: Use GFP_KERNEL in bpf_event_entry_gen()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH RESEND bpf-next 1/2] bpf: Reduce the scope of rcu_read_lock when updating fd map
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [net-next v1 00/16] Device Memory TCP
- From: David Ahern <dsahern@xxxxxxxxxx>
- Re: [net-next v1 07/16] netdev: netdevice devmem allocator
- From: David Ahern <dsahern@xxxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [net-next v1 13/16] tcp: RX path for devmem TCP
- From: David Ahern <dsahern@xxxxxxxxxx>
- Re: [PATCH bpf 2/3] net: fix usage of multi-buffer BPF helper for ZC AF_XDP
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH bpf 2/3] net: fix usage of multi-buffer BPF helper for ZC AF_XDP
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH] bpf: add __printf() to for printf fmt strings
- From: Ben Dooks <ben.dooks@xxxxxxxxxxxxxxx>
- Re: [net-next v1 06/16] netdev: support binding dma-buf to netdevice
- From: David Ahern <dsahern@xxxxxxxxxx>
- Re: [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Load vmlinux btf for any struct_ops map
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v8 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH v4 3/5] mm, security: Add lsm hook for memory policy adjustment
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH bpf 2/3] net: fix usage of multi-buffer BPF helper for ZC AF_XDP
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH v2 3/3] selftest/bpf: Test a perf bpf program that suppresses side effects.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v4] bpf: Fix a race condition between btf_put() and map_free()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf-next v4] bpf: Fix a race condition between btf_put() and map_free()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Anton Protopopov <aspsk@xxxxxxxxxxxxx>
- Re: [net-next v1 09/16] page_pool: device memory support
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [net-next v1 06/16] netdev: support binding dma-buf to netdevice
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [net-next v1 13/16] tcp: RX path for devmem TCP
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [net-next v1 06/16] netdev: support binding dma-buf to netdevice
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Alan Maguire <alan.maguire@xxxxxxxxxx>
- [PATCH bpf-next] bpf: add small subset of SECURITY_PATH hooks to BPF sleepable_lsm_hooks list
- From: Matt Bobrowski <mattbobrowski@xxxxxxxxxx>
- Re: [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 1/1] bpf: Mark virtual BPF context structures as preserve_static_offset
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [syzbot] [mm?] BUG: unable to handle kernel paging request in copy_from_kernel_nofault
- From: Jann Horn <jannh@xxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v12 bpf-next 03/17] bpf: introduce BPF token object
- From: Christian Brauner <brauner@xxxxxxxxxx>
- [syzbot] Monthly bpf report (Dec 2023)
- From: syzbot <syzbot+listfafd4fe0e0bf9b4d93f3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Alan Maguire <alan.maguire@xxxxxxxxxx>
- RE: [PATCH bpf 3/3] ice: work on pre-XDP prog frag count
- From: "Sokolowski, Jan" <jan.sokolowski@xxxxxxxxx>
- [PATCH bpf 3/3] ice: work on pre-XDP prog frag count
- From: Maciej Fijalkowski <maciej.fijalkowski@xxxxxxxxx>
- [PATCH bpf 2/3] net: fix usage of multi-buffer BPF helper for ZC AF_XDP
- From: Maciej Fijalkowski <maciej.fijalkowski@xxxxxxxxx>
- [PATCH bpf 1/3] xsk: recycle buffer in case Rx queue was full
- From: Maciej Fijalkowski <maciej.fijalkowski@xxxxxxxxx>
- [PATCH bpf 0/3] net: bpf_xdp_adjust_tail() fixes
- From: Maciej Fijalkowski <maciej.fijalkowski@xxxxxxxxx>
- Re: [PATCH bpf-next v2 1/3] skmsg: Support to get the data length in ingress_msg
- From: "Pengcheng Yang" <yangpc@xxxxxxxxxx>
- RE: [PATCH net-next v5 3/3] net: Convert some ethtool_sprintf() to ethtool_puts()
- From: <Divya.Koppera@xxxxxxxxxxxxx>
- Re: [PATCH net-next v5 0/3] ethtool: Add ethtool_puts()
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- RE: [PATCH net-next v5 1/3] ethtool: Implement ethtool_puts()
- From: <Madhuri.Sripada@xxxxxxxxxxxxx>
- [PATCH RESEND bpf-next 2/2] bpf: Use GFP_KERNEL in bpf_event_entry_gen()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH RESEND bpf-next 1/2] bpf: Reduce the scope of rcu_read_lock when updating fd map
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH RESEND bpf-next 0/2] bpf: Use GFP_KERNEL in bpf_event_entry_gen()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH v4 33/33] Documentation: probes: Update fprobe on function-graph tracer
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 32/33] selftests: ftrace: Remove obsolate maxactive syntax check
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 31/33] bpf: Enable kprobe_multi feature if CONFIG_FPROBE is enabled
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- [PATCH v4 30/33] tracing/fprobe: Enable fprobe events with CONFIG_DYNAMIC_FTRACE_WITH_ARGS
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 29/33] tracing/fprobe: Remove nr_maxactive from fprobe
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 28/33] fprobe: Rewrite fprobe on function-graph tracer
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 27/33] tracing: Add ftrace_fill_perf_regs() for perf event
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 26/33] tracing: Add ftrace_partial_regs() for converting ftrace_regs to pt_regs
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 25/33] fprobe: Use ftrace_regs in fprobe exit handler
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 24/33] fprobe: Use ftrace_regs in fprobe entry handler
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 23/33] arm64: ftrace: Enable HAVE_FUNCTION_GRAPH_FREGS
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 22/33] tracing: Rename ftrace_regs_return_value to ftrace_regs_get_return_value
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 21/33] x86/ftrace: Enable HAVE_FUNCTION_GRAPH_FREGS
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 20/33] function_graph: Add a new exit handler with parent_ip and ftrace_regs
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 19/33] function_graph: Add a new entry handler with parent_ip and ftrace_regs
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 18/33] function_graph: Add selftest for passing local variables
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 17/33] function_graph: Implement fgraph_reserve_data() and fgraph_retrieve_data()
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 16/33] function_graph: Move graph notrace bit to shadow stack global var
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 15/33] function_graph: Move graph depth stored data to shadow stack global var
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 14/33] function_graph: Move set_graph_function tests to shadow stack global var
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 13/33] function_graph: Add "task variables" per task for fgraph_ops
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 12/33] function_graph: Use a simple LRU for fgraph_array index number
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 11/33] function_graph: Have the instances use their own ftrace_ops for filtering
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 10/33] ftrace: Allow ftrace startup flags exist without dynamic ftrace
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 09/33] ftrace: Allow function_graph tracer to be enabled in instances
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 08/33] ftrace/function_graph: Pass fgraph_ops to function graph callbacks
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 07/33] function_graph: Remove logic around ftrace_graph_entry and return
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 06/33] function_graph: Allow multiple users to attach to function graph
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 05/33] function_graph: Add an array structure that will allow multiple callbacks
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 04/33] fgraph: Use BUILD_BUG_ON() to make sure we have structures divisible by long
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 03/33] function_graph: Convert ret_stack to a series of longs
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 02/33] x86: tracing: Add ftrace_regs definition in the header
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 01/33] tracing: Add a comment about ftrace_regs definition
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH v4 00/33] tracing: fprobe: function_graph: Multi-function graph and fprobe on fgraph
- From: "Masami Hiramatsu (Google)" <mhiramat@xxxxxxxxxx>
- [PATCH bpf-next 1/7] bpf: Remove unnecessary wait from bpf_map_copy_value()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 7/7] bpf: Wait for sleepable BPF program in maybe_wait_bpf_programs()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 6/7] bpf: Only call maybe_wait_bpf_programs() when at least one map operation succeeds
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 3/7] bpf: Add missed maybe_wait_bpf_programs() for htab of maps
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 5/7] bpf: Set uattr->batch.count as zero before batched update or deletion
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 0/7] bpf: Fixes for maybe_wait_bpf_programs()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 4/7] bpf: Only call maybe_wait_bpf_programs() when map operation succeeds
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 2/7] bpf: Call maybe_wait_bpf_programs() only once for generic_map_update_batch()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next v9 14/15] p4tc: add set of P4TC table kfuncs
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- Re: [PATCH net-next v9 15/15] p4tc: add P4 classifier
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Load vmlinux btf for any struct_ops map
- From: Alan Maguire <alan.maguire@xxxxxxxxxx>
- Re: [net-next v1 09/16] page_pool: device memory support
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [PATCH v4 5/5] selftests/bpf: Add selftests for set_mempolicy with a lsm prog
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 4/5] security: selinux: Implement set_mempolicy hook
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 3/5] mm, security: Add lsm hook for memory policy adjustment
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 2/5] mm: mempolicy: Revise comment regarding mempolicy mode flags
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 1/5] mm, doc: Add doc for MPOL_F_NUMA_BALANCING
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH v4 0/5] mm, security, bpf: Fine-grained control over memory policy adjustments with lsm bpf
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [devel-ipsec] [PATCH bpf-next v4 01/10] xfrm: bpf: Move xfrm_interface_bpf.c to xfrm_bpf.c
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH bpf-next v4] bpf: Fix a race condition between btf_put() and map_free()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4] bpf: Fix a race condition between btf_put() and map_free()
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v2 3/3] selftest/bpf: Test a perf bpf program that suppresses side effects.
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH net-next v9 14/15] p4tc: add set of P4TC table kfuncs
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH net-next v5 3/3] net: Convert some ethtool_sprintf() to ethtool_puts()
- From: Louis Peens <louis.peens@xxxxxxxxxxxx>
- [PATCH bpf-next] bpf: Load vmlinux btf for any struct_ops map
- From: David Vernet <void@xxxxxxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH bpf-next 2/2] selftests/bpf: Add test for bpf_cpumask_weight() kfunc
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf-next 1/2] bpf: Add bpf_cpumask_weight() kfunc
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf v2 1/2] bpf: syzkaller found null ptr deref in unix_bpf proto add
- From: Cong Wang <xiyou.wangcong@xxxxxxxxx>
- Re: [PATCH bpf-next v5] bpf: Fix a race condition between btf_put() and map_free()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- [PATCH bpf-next v5] bpf: Fix a race condition between btf_put() and map_free()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf-next v4] bpf: Fix a race condition between btf_put() and map_free()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf-next v4] bpf: Fix a race condition between btf_put() and map_free()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH v2 3/3] selftest/bpf: Test a perf bpf program that suppresses side effects.
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 1/1] bpf: Mark virtual BPF context structures as preserve_static_offset
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- [PATCH bpf-next v5 2/3] bpf: fix accesses to uninit stack slots
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf-next v5 1/3] bpf: add some comments to stack representation
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf v5 0/3] bpf: fix accesses to uninit stack slots
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf-next v5 3/3] bpf: minor cleanup around stack bounds
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- Re: [PATCH bpf V2 1/1] bpf: fix verification of indirect var-off stack access
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- Re: [PATCH bpf v4 0/3] bpf: fix accesses to uninit stack slots
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- Re: [PATCH bpf v4 0/3] bpf: fix accesses to uninit stack slots
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf v4 0/3] bpf: fix accesses to uninit stack slots
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf v4 2/3] bpf: fix accesses to uninit stack slots
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf v4 3/3] bpf: minor cleanup around stack bounds
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf v4 1/3] bpf: add some comments to stack representation
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf v4 0/3] bpf: fix accesses to uninit stack slots
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- Re: [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- [PATCH] perf lock contention: Account contending locks too
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [net-next v1 00/16] Device Memory TCP
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: [PATCH bpf-next v4] bpf: Fix a race condition between btf_put() and map_free()
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [GIT PULL] Networking for v6.7-rc5
- From: pr-tracker-bot@xxxxxxxxxx
- Re: [PATCH v2 3/3] selftest/bpf: Test a perf bpf program that suppresses side effects.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [net-next v1 16/16] selftests: add ncdevmem, netcat for devmem TCP
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 15/16] net: add devmem TCP documentation
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 14/16] net: add SO_DEVMEM_DONTNEED setsockopt to release RX frags
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 13/16] tcp: RX path for devmem TCP
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 12/16] net: add support for skbs with unreadable frags
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 11/16] net: support non paged skb frags
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 09/16] page_pool: device memory support
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 10/16] page_pool: don't release iov on elevanted refcount
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 08/16] memory-provider: dmabuf devmem memory provider
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 07/16] netdev: netdevice devmem allocator
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 06/16] netdev: support binding dma-buf to netdevice
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 05/16] net: netdev netlink api to bind dma-buf to a net device
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 04/16] gve: implement queue api
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 03/16] queue_api: define queue api
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 02/16] net: page_pool: create hooks for custom page providers
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 01/16] net: page_pool: factor out releasing DMA from releasing the page
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- [net-next v1 00/16] Device Memory TCP
- From: Mina Almasry <almasrymina@xxxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- Re: [PATCH] scx: set p->scx.ops_state using atomic_long_set_release
- From: Tejun Heo <tj@xxxxxxxxxx>
- [PATCH bpf-next 1/1] bpf: Mark virtual BPF context structures as preserve_static_offset
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- [PATCH bpf-next 0/1] use preserve_static_offset in bpf uapi headers
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: Song Liu <song@xxxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- Re: [PATCH] tools/lib/bpf: add pr_warn() to more -EINVAL cases
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH v2 3/3] selftest/bpf: Test a perf bpf program that suppresses side effects.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v2] selftests/bpf: Test the release of map btf
- From: Yonghong Song <yhs@xxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH RFC bpf-next 2/3] bpf: extend parsing logic for BPF FS delegate_cmds mount option
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH RFC bpf-next 1/3] bpf: add mapper macro for bpf_cmd enum
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH RFC bpf-next 0/3] BPF FS mount options parsing follow ups
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH RFC bpf-next 3/3] selftests/bpf: utilize string values for delegate_xxx mount options
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [bug report] until recently, code for bpf_loop callbacks using stack for ctx was mangled by verifier
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- Re: linux-next: Signed-off-by missing for commit in the bpf-next tree
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [Bpf] BPF ISA conformance groups
- From: David Vernet <void@xxxxxxxxxxxxx>
- linux-next: Signed-off-by missing for commit in the bpf-next tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 02/10] bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc
- From: Eyal Birger <eyal.birger@xxxxxxxxx>
- [PATCH bpf-next 2/2] selftests/bpf: Add test for bpf_cpumask_weight() kfunc
- From: David Vernet <void@xxxxxxxxxxxxx>
- [PATCH bpf-next 1/2] bpf: Add bpf_cpumask_weight() kfunc
- From: David Vernet <void@xxxxxxxxxxxxx>
- [PATCH bpf-next 0/2] Add new bpf_cpumask_weight() kfunc
- From: David Vernet <void@xxxxxxxxxxxxx>
- Re: [devel-ipsec] [PATCH bpf-next v4 01/10] xfrm: bpf: Move xfrm_interface_bpf.c to xfrm_bpf.c
- From: Eyal Birger <eyal.birger@xxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- [GIT PULL] Networking for v6.7-rc5
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v2 3/3] selftest/bpf: Test a perf bpf program that suppresses side effects.
- From: Marco Elver <elver@xxxxxxxxxx>
- Re: [PATCH v2 3/3] selftest/bpf: Test a perf bpf program that suppresses side effects.
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v2 2/3] perf/bpf: Allow a bpf program to suppress all sample side effects.
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v5 0/3] bpf: fix verification of indirect var-off stack access
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH bpf-next 6/8] libbpf: wire up BPF token support at BPF object level
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH bpf-next 4/8] libbpf: move feature detection code into its own file
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH bpf-next 8/8] selftests/bpf: add tests for BPF object load with implicit token
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH bpf-next 7/8] selftests/bpf: add BPF object loading tests with explicit token passing
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH bpf-next 5/8] libbpf: wire up token_fd into feature probing logic
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH bpf-next 3/8] libbpf: further decouple feature checking logic from bpf_object
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH bpf-next 2/8] libbpf: split feature detectors definitions from cached results
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH bpf-next 0/8] BPF token support in libbpf's BPF object
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH bpf-next 1/8] bpf: fail BPF_TOKEN_CREATE if no delegation option was set on BPF FS
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH] tools/lib/bpf: add pr_warn() to more -EINVAL cases
- From: Sergei Trofimovich <slyich@xxxxxxxxx>
- Re: [PATCH bpf-next v6 1/4] bpf: Relax tracing prog recursive attach rules
- From: Dmitry Dolgov <9erthalion6@xxxxxxxxx>
- Re: [PATCH net 0/2] fixes for ktls
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: pull-request: bpf 2023-12-06
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: BPF LSM prevent program unload
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- RE: [PATCH net 1/2] net: tls, update curr on splice as well
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- [PATCH v2 3/3] selftest/bpf: Test a perf bpf program that suppresses side effects.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v2 2/3] perf/bpf: Allow a bpf program to suppress all sample side effects.
- From: Kyle Huey <me@xxxxxxxxxxxx>
- [PATCH v2 0/3] Combine perf and bpf for fast eval of hw breakpoint conditions
- From: Kyle Huey <me@xxxxxxxxxxxx>
- Re: [PATCH net-next v5 3/3] net: Convert some ethtool_sprintf() to ethtool_puts()
- From: Andrew Lunn <andrew@xxxxxxx>
- Re: [PATCH net-next v5 1/3] ethtool: Implement ethtool_puts()
- From: Andrew Lunn <andrew@xxxxxxx>
- Re: BPF LSM prevent program unload
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: Question about bpf perfbuf/ringbuf: pinned in backend with overwriting
- From: Alan Maguire <alan.maguire@xxxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH bpf-next v2] selftests/bpf: Test the release of map btf
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH bpf-next v4] bpf: Fix a race condition between btf_put() and map_free()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Question about bpf perfbuf/ringbuf: pinned in backend with overwriting
- From: Philo Lu <lulie@xxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v7 1/3] bpf: make common crypto API for TC/XDP programs
- From: Vadim Fedorenko <vadim.fedorenko@xxxxxxxxx>
- Re: [PATCH bpf-next v4 03/10] bpf: xfrm: Add bpf_xdp_xfrm_state_release() kfunc
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH bpf-next v4 02/10] bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH bpf-next v4 01/10] xfrm: bpf: Move xfrm_interface_bpf.c to xfrm_bpf.c
- From: Steffen Klassert <steffen.klassert@xxxxxxxxxxx>
- Re: [PATCH bpf-next v6 06/13] xsk: Document tx_metadata_len layout
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH bpf-next v6 1/4] bpf: Relax tracing prog recursive attach rules
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: Re: [PATCH bpf-next] netkit: Add some ethtool ops to provide information to user
- From: Feng Zhou <zhoufeng.zf@xxxxxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [Intel-wired-lan] [PATCH net-next v5 2/3] checkpatch: add ethtool_sprintf rules
- From: Przemek Kitszel <przemyslaw.kitszel@xxxxxxxxx>
- RE: [PATCH net-next v5 3/3] net: Convert some ethtool_sprintf() to ethtool_puts()
- From: Wei Fang <wei.fang@xxxxxxx>
- Re: [Intel-wired-lan] [PATCH net-next v5 1/3] ethtool: Implement ethtool_puts()
- From: Przemek Kitszel <przemyslaw.kitszel@xxxxxxxxx>
- Re: [PATCH RESEND bpf-next v1] test_bpf: Rename second ALU64_SMOD_X to ALU64_SMOD_K
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH v4 bpf-next 3/3] selftest: bpf: Test bpf_sk_assign_tcp_reqsk().
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH net-next 4/6] vhost/net: remove vhost_net_page_frag_refill()
- From: Jason Wang <jasowang@xxxxxxxxxx>
- Re: [PATCH bpf-next v2] bpf: Support uid and gid when mounting bpffs
- From: Jie Jiang <jiejiang@xxxxxxxxxxxx>
- [PATCH bpf-next v5 3/3] bpf: guard stack limits against 32bit overflow
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf-next v5 2/3] bpf: add verifier regression test for previous patch
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf-next v5 1/3] bpf: fix verification of indirect var-off stack access
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf-next v5 0/3] bpf: fix verification of indirect var-off stack access
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH v1] test_bpf: Rename second ALU64_SMOD_X to ALU64_SMOD_K
- From: Tiezhu Yang <yangtiezhu@xxxxxxxxxxx>
- [PATCH RESEND bpf-next v1] test_bpf: Rename second ALU64_SMOD_X to ALU64_SMOD_K
- From: Tiezhu Yang <yangtiezhu@xxxxxxxxxxx>
- [PATCH bpf-next v3] bpf: Support uid and gid when mounting bpffs
- From: Jie Jiang <jiejiang@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v4 1/2] bpf: fix verification of indirect var-off stack access
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- Re: [PATCH net-next] tcp: add tracepoints for data send/recv/acked
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH bpf-next] selftests/bpf: Test the release of map btf
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- [PATCH] scx: set p->scx.ops_state using atomic_long_set_release
- From: Changwoo Min <multics69@xxxxxxxxx>
- [PATCH v1] perf env: Avoid recursively taking env->bpf_progs.lock
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH bpf-next v12 14/14] bpf: pass btf object id in bpf_map_info.
- From: thinker.li@xxxxxxxxx
- Re: [PATCH v7 bpf-next 0/7] Allocate bpf trampoline on bpf_prog_pack
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH bpf-next v12 13/14] selftests/bpf: test case for register_bpf_struct_ops().
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 10/14] bpf, net: switch to dynamic registration
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 07/14] bpf: pass attached BTF to the bpf_struct_ops subsystem
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 12/14] bpf: export btf_ctx_access to modules.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 11/14] libbpf: Find correct module BTFs for struct_ops maps and progs.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 08/14] bpf: hold module for bpf_struct_ops_map.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 09/14] bpf: validate value_type
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 03/14] bpf, net: introduce bpf_struct_ops_desc.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 06/14] bpf: lookup struct_ops types from a given module BTF.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 05/14] bpf: make struct_ops_map support btfs other than btf_vmlinux.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 04/14] bpf: add struct_ops_tab to btf.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 02/14] bpf: get type information with BPF_ID_LIST
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 01/14] bpf: refactory struct_ops type initialization to a function.
- From: thinker.li@xxxxxxxxx
- [PATCH bpf-next v12 00/14] Registrating struct_ops types from modules
- From: thinker.li@xxxxxxxxx
- linux-next: manual merge of the security tree with the bpf-next tree
- From: Stephen Rothwell <sfr@xxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] net/sched: Load modules via alias
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- Re: [PATCH 0/3] net/sched: Load modules via alias
- From: Toke Høiland-Jørgensen <toke@xxxxxxxxxx>
- [PATCH net 1/2] net: tls, update curr on splice as well
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- [PATCH net 2/2] bpf: sockmap, updating the sg structure should also update curr
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- [PATCH net 0/2] fixes for ktls
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- Re: [PATCH bpf-next] selftests/bpf: Test the release of map btf
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- [PATCH net-next v5 3/3] net: Convert some ethtool_sprintf() to ethtool_puts()
- From: justinstitt@xxxxxxxxxx
- [PATCH net-next v5 2/3] checkpatch: add ethtool_sprintf rules
- From: justinstitt@xxxxxxxxxx
- [PATCH net-next v5 1/3] ethtool: Implement ethtool_puts()
- From: justinstitt@xxxxxxxxxx
- [PATCH net-next v5 0/3] ethtool: Add ethtool_puts()
- From: justinstitt@xxxxxxxxxx
- Re: [PATCH bpf-next] bpf: rename MAX_BPF_LINK_TYPE into __MAX_BPF_LINK_TYPE for consistency
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH 0/3] net/sched: Load modules via alias
- From: Michal Koutný <mkoutny@xxxxxxxx>
- [PATCH v7 bpf-next 7/7] x86, bpf: Use bpf_prog_pack for bpf trampoline
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH v7 bpf-next 6/7] bpf: Use arch_bpf_trampoline_size
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH v7 bpf-next 5/7] bpf: Add arch_bpf_trampoline_size()
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH v7 bpf-next 4/7] bpf, x86: Adjust arch_prepare_bpf_trampoline return value
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH v7 bpf-next 3/7] bpf: Add helpers for trampoline image management
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH v7 bpf-next 2/7] bpf: Adjust argument names of arch_prepare_bpf_trampoline()
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH v7 bpf-next 1/7] bpf: Let bpf_prog_pack_free handle any pointer
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH v7 bpf-next 0/7] Allocate bpf trampoline on bpf_prog_pack
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH 0/3] net/sched: Load modules via alias
- From: Stephen Hemminger <stephen@xxxxxxxxxxxxxxxxxx>
- pull-request: bpf 2023-12-06
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCHv4 bpf 0/2] bpf: Fix map poke update
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next] bpf: rename MAX_BPF_LINK_TYPE into __MAX_BPF_LINK_TYPE for consistency
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH v6 bpf-next 5/7] bpf: Add arch_bpf_trampoline_size()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v6 bpf-next 5/7] bpf: Add arch_bpf_trampoline_size()
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH 0/3] net/sched: Load modules via alias
- From: Michal Koutný <mkoutny@xxxxxxxx>
- [PATCH bpf-next v4] bpf: Fix a race condition between btf_put() and map_free()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- [PATCH bpf-next v4 2/2] net, xdp: allow metadata > 32
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v4 1/2] selftests/bpf: increase invalid metadata size
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v4 0/2] Allow data_meta size > 32
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [PATCH 0/3] net/sched: Load modules via alias
- From: Pedro Tammela <pctammela@xxxxxxxxxxxx>
- Re: [PATCH v6 bpf-next 5/7] bpf: Add arch_bpf_trampoline_size()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH 3/3] net/sched: act: Load TC action modules via alias
- From: Michal Koutný <mkoutny@xxxxxxxx>
- [PATCH 2/3] net/sched: sch: Load qdisc modules via alias
- From: Michal Koutný <mkoutny@xxxxxxxx>
- [PATCH 1/3] net/sched: cls: Load net classifier modules via alias
- From: Michal Koutný <mkoutny@xxxxxxxx>
- [PATCH 0/3] net/sched: Load modules via alias
- From: Michal Koutný <mkoutny@xxxxxxxx>
- [PATCH bpf-next] bpf: rename MAX_BPF_LINK_TYPE into __MAX_BPF_LINK_TYPE for consistency
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- Re: [xdp-hints] Re: [PATCH bpf-next v3 2/3] net: stmmac: add Launch Time support to XDP ZC
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- Re: [PATCH bpf-next v4 2/2] bpf: guard stack limits against 32bit overflow
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v4 1/2] bpf: fix verification of indirect var-off stack access
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 10/13] bpf: support 'arg:xxx' btf_decl_tag-based hints for global subprog args
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v12 bpf-next 03/17] bpf: introduce BPF token object
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v2] bpf: Support uid and gid when mounting bpffs
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v12 bpf-next 00/17] BPF token and BPF FS-based delegation
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v12 bpf-next 03/17] bpf: introduce BPF token object
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 11/13] bpf: add dynptr global subprog arg tag support
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 10/13] bpf: support 'arg:xxx' btf_decl_tag-based hints for global subprog args
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 06/13] bpf: remove unnecessary and (mostly) ignored BTF check for main program
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 09/13] bpf: reuse subprog argument parsing logic for subprog call checks
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 05/13] bpf: abstract away global subprog arg preparation logic from reg state setup
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 03/13] bpf: tidy up exception callback management a bit
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 06/13] bpf: remove unnecessary and (mostly) ignored BTF check for main program
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v2] bpf: Support uid and gid when mounting bpffs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Support uid and gid when mounting bpffs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf v3 0/2] bpf: fix verification of indirect var-off stack access
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next v4 1/2] bpf: fix verification of indirect var-off stack access
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- [PATCH bpf-next v4 2/2] bpf: guard stack limits against 32bit overflow
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf-next v4 1/2] bpf: fix verification of indirect var-off stack access
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- [PATCH bpf-next v4 0/2] bpf: fix verification of indirect var-off stack access
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- Re: [PATCH bpf v3 0/2] bpf: fix verification of indirect var-off stack access
- From: Andrei Matei <andreimatei1@xxxxxxxxx>
- Re: [PATCH bpf-next] selftests/bpf: Test the release of map btf
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH bpf-next v3] bpf: Fix a race condition between btf_put() and map_free()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH v3 net-next 2/2] xdp: add multi-buff support for xdp running in generic mode
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH v2 2/2] x86/cfi,bpf: Fix BPF JIT call
- From: Peter Zijlstra <peterz@xxxxxxxxxxxxx>
- Re: [PATCH net-next v9 13/15] p4tc: add runtime table entry create, update, get, delete, flush and dump
- From: Jamal Hadi Salim <jhs@xxxxxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- Re: [PATCH net-next v9 15/15] p4tc: add P4 classifier
- From: Jamal Hadi Salim <jhs@xxxxxxxxxxxx>
- [PATCH bpf-next 7/7] selftests/bpf: Add tests for BPF Static Keys
- From: Anton Protopopov <aspsk@xxxxxxxxxxxxx>
- [PATCH bpf-next 4/7] bpf: implement BPF Static Keys support
- From: Anton Protopopov <aspsk@xxxxxxxxxxxxx>
- [PATCH bpf-next 6/7] libbpf: BPF Static Keys support
- From: Anton Protopopov <aspsk@xxxxxxxxxxxxx>
- [PATCH bpf-next 5/7] bpf: x86: implement static keys support
- From: Anton Protopopov <aspsk@xxxxxxxxxxxxx>
- [PATCH bpf-next 2/7] bpf: rename and export a struct definition
- From: Anton Protopopov <aspsk@xxxxxxxxxxxxx>
- [PATCH bpf-next 3/7] bpf: adjust functions offsets when patching progs
- From: Anton Protopopov <aspsk@xxxxxxxxxxxxx>
- [PATCH bpf-next 1/7] bpf: extract bpf_prog_bind_map logic into an inline helper
- From: Anton Protopopov <aspsk@xxxxxxxxxxxxx>
- [PATCH bpf-next 0/7] BPF Static Keys
- From: Anton Protopopov <aspsk@xxxxxxxxxxxxx>
- Re: [PATCH v3 net-next 2/2] xdp: add multi-buff support for xdp running in generic mode
- From: Lorenzo Bianconi <lorenzo@xxxxxxxxxx>
- Re: [PATCH v3 net-next 2/2] xdp: add multi-buff support for xdp running in generic mode
- From: Jesper Dangaard Brouer <hawk@xxxxxxxxxx>
- [PATCH bpf-next 2/3] selftests/bpf: Add a new cgroup helper open_classid()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH bpf-next 3/3] selftests/bpf: Add selftests for cgroup1 local storage
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH bpf-next 1/3] bpf: Enable bpf_cgrp_storage for cgroup1 non-attach case
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH bpf-next 0/3] bpf: Expand bpf_cgrp_storage to support cgroup1 non-attach case
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH bpf-next] selftests/bpf: Test the release of map btf
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Support uid and gid when mounting bpffs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH bpf-next] netkit: Add some ethtool ops to provide information to user
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next v2] bpf: Support uid and gid when mounting bpffs
- From: Christian Brauner <brauner@xxxxxxxxxx>
- Re: [PATCH] net: atlantic: Fix NULL dereference of skb pointer in
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [EXT] [PATCH] net: atlantic: Fix NULL dereference of skb pointer in
- From: Даниил Максимов <daniil31415it@xxxxxxxxx>
- Re: [xdp-hints] Re: [PATCH bpf-next v3 2/3] net: stmmac: add Launch Time support to XDP ZC
- From: Magnus Karlsson <magnus.karlsson@xxxxxxxxx>
- Re: [PATCH 07/10] printk: Remove the now superfluous sentinel elements from ctl_table array
- From: Petr Mladek <pmladek@xxxxxxxx>
- Re: [PATCH bpf v2 1/2] bpf: syzkaller found null ptr deref in unix_bpf proto add
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- Re: [RFC PATCH bpf-next 3/3] selftests/bpf: Add selftests for cgroup1 local storage
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH bpf-next v8 14/18] mlx5: implement VLAN tag XDP hint
- From: Jesper Dangaard Brouer <hawk@xxxxxxxxxx>
- [PATCHv4 bpf 2/2] selftests/bpf: Add test for early update in prog_array_map_poke_run
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCHv4 bpf 1/2] bpf: Fix prog_array_map_poke_run map poke update
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCHv4 bpf 0/2] bpf: Fix map poke update
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- Re: [PATCH bpf-next v8 09/18] xdp: Add VLAN tag hint
- From: Jesper Dangaard Brouer <hawk@xxxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Support uid and gid when mounting bpffs
- From: Jie Jiang <jiejiang@xxxxxxxxxxxx>
- [PATCH bpf-next v2] bpf: Support uid and gid when mounting bpffs
- From: Jie Jiang <jiejiang@xxxxxxxxxxxx>
- Re: Re: [PATCH bpf-next] netkit: Add some ethtool ops to provide information to user
- From: Feng Zhou <zhoufeng.zf@xxxxxxxxxxxxx>
- Re: [RFC PATCH bpf-next v2 2/4] bpf, x64: Fix tailcall hierarchy
- From: Leon Hwang <hffilwlqm@xxxxxxxxx>
- Re: [PATCH v4 bpf-next 3/3] selftest: bpf: Test bpf_sk_assign_tcp_reqsk().
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v4 bpf-next 1/3] bpf: tcp: Handle BPF SYN Cookie in cookie_v[46]_check().
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH bpf-next v7 1/3] bpf: make common crypto API for TC/XDP programs
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [PATCH net-next v9 13/15] p4tc: add runtime table entry create, update, get, delete, flush and dump
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next 3/3] selftests/bpf: Add selftests for cgroup1 local storage
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [RFC PATCH bpf-next 2/3] selftests/bpf: Add a new cgroup helper open_classid()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [RFC PATCH bpf-next 1/3] bpf: Enable bpf_cgrp_storage for cgroup1 non-attach case
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH v4 bpf-next 1/3] bpf: tcp: Handle BPF SYN Cookie in cookie_v[46]_check().
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [RFC PATCH bpf-next 0/3] bpf: Expand bpf_cgrp_storage to support cgroup1 non-attach case
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [RFC PATCH bpf-next 0/3] bpf: Expand bpf_cgrp_storage to support cgroup1 non-attach case
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: BPF LSM prevent program unload
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [ANN] Winter break shutdown plan
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/3] bpf: tcp: Support arbitrary SYN Cookie.
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH v4 bpf-next 1/3] bpf: tcp: Handle BPF SYN Cookie in cookie_v[46]_check().
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH v4 bpf-next 2/3] bpf: tcp: Support arbitrary SYN Cookie.
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v3] bpf: Fix a race condition between btf_put() and map_free()
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf v3 1/2] bpf: fix verification of indirect var-off stack access
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH v4 bpf-next 1/3] bpf: tcp: Handle BPF SYN Cookie in cookie_v[46]_check().
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf v3 0/2] bpf: fix verification of indirect var-off stack access
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v3 net-next 2/2] xdp: add multi-buff support for xdp running in generic mode
- From: Jakub Kicinski <kuba@xxxxxxxxxx>
- Re: [PATCH bpf v3 0/2] bpf: fix verification of indirect var-off stack access
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 13/13] selftests/bpf: add global subprog annotation tests
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 08/13] bpf: move subprog call logic back to verifier.c
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 07/13] bpf: prepare btf_prepare_func_args() for handling static subprogs
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 04/13] bpf: use bitfields for simple per-subprog bool flags
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 03/13] bpf: tidy up exception callback management a bit
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 02/13] bpf: emit more dynptr information in verifier log
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 01/13] bpf: log PTR_TO_MEM memory size in verifier log
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 11/13] bpf: add dynptr global subprog arg tag support
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 10/13] bpf: support 'arg:xxx' btf_decl_tag-based hints for global subprog args
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 09/13] bpf: reuse subprog argument parsing logic for subprog call checks
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 06/13] bpf: remove unnecessary and (mostly) ignored BTF check for main program
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 05/13] bpf: abstract away global subprog arg preparation logic from reg state setup
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH v4 bpf-next 10/10] bpf: use common instruction history across all states
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v3 net-next 2/2] xdp: add multi-buff support for xdp running in generic mode
- From: Lorenzo Bianconi <lorenzo@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next v2 2/4] bpf, x64: Fix tailcall hierarchy
- From: Maciej Fijalkowski <maciej.fijalkowski@xxxxxxxxx>
- Re: [PATCH bpf-next v8 17/18] selftests/bpf: Add AF_INET packet generation to xdp_metadata
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- Re: [PATCH bpf] bpf: Fix a race condition between btf_put() and map_free()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- [PATCH bpf-next v3] bpf: Fix a race condition between btf_put() and map_free()
- From: Yonghong Song <yonghong.song@xxxxxxxxx>
- Re: [PATCH net-next v9 15/15] p4tc: add P4 classifier
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH v4 bpf-next 10/10] bpf: use common instruction history across all states
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v4 bpf-next 00/10] Complete BPF verifier precision tracking support for register spills
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCHv3 bpf 2/2] selftests/bpf: Add test for early update in prog_array_map_poke_run
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH bpf-next v7 1/3] bpf: make common crypto API for TC/XDP programs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH bpf] bpf: Fix a race condition between btf_put() and map_free()
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH bpf-next v8 17/18] selftests/bpf: Add AF_INET packet generation to xdp_metadata
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 18/18] selftests/bpf: Check VLAN tag and proto in xdp_metadata
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 16/18] selftests/bpf: Add flags and VLAN hint to xdp_hw_metadata
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 15/18] selftests/bpf: Allow VLAN packets in xdp_hw_metadata
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 14/18] mlx5: implement VLAN tag XDP hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 13/18] net: make vlan_get_tag() return -ENODATA instead of -EINVAL
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 12/18] veth: Implement VLAN tag XDP hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 11/18] ice: use VLAN proto from ring packet context in skb path
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 10/18] ice: Implement VLAN tag hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 09/18] xdp: Add VLAN tag hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 08/18] ice: Support XDP hints in AF_XDP ZC mode
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 07/18] xsk: add functions to fill control buffer
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 06/18] ice: Support RX hash XDP hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 05/18] ice: Support HW timestamp hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 04/18] ice: Introduce ice_xdp_buff
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 03/18] ice: Make ptype internal to descriptor info processing
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 02/18] ice: make RX HW timestamp reading code more reusable
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 01/18] ice: make RX hash reading code more reusable
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- [PATCH bpf-next v8 00/18] XDP metadata via kfuncs for ice + VLAN hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [PATCH net-next] tcp: add tracepoints for data send/recv/acked
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- BPF LSM prevent program unload
- From: Frederick Lawler <fred@xxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v7 1/3] bpf: make common crypto API for TC/XDP programs
- From: kernel test robot <lkp@xxxxxxxxx>
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux Actions SoC]
[Linux Kernel]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Scanners]
[Yosemite Forum]