BPF
[Prev Page][Next Page]
- Re: [PATCH v3 09/13] powerpc: extend execmem_params for kprobes allocations
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v3 08/13] riscv: extend execmem_params for generated code allocations
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v3 06/13] mm/execmem: introduce execmem_data_alloc()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 0/5] Reduce overhead of LSMs with static calls
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v3 02/13] mm: introduce execmem_text_alloc() and execmem_free()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v3 02/13] mm: introduce execmem_text_alloc() and execmem_free()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v3 02/13] mm: introduce execmem_text_alloc() and execmem_free()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- Re: [PATCH v4 3/5] security: Replace indirect LSM hook calls with static calls
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH bpf 1/3] bpf: tcp_read_skb needs to pop skb regardless of seq
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCHv3 bpf-next 2/9] bpf: Add missed value to kprobe_multi link info
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- [PATCH v1 17/18] perf header: Fix various error path memory leaks
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 18/18] perf bpf_counter: Fix a few memory leaks
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 16/18] perf trace-event-info: Avoid passing NULL value to closedir
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 14/18] perf parse-events: Fix unlikely memory leak when cloning terms
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 15/18] tools api: Avoid potential double free
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 13/18] perf svghelper: Avoid memory leak
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 12/18] perf hists browser: Avoid potential NULL dereference
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 11/18] perf hists browser: Reorder variables to reduce padding
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 10/18] perf dlfilter: Be defensive against potential NULL dereference
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 09/18] perf mem-events: Avoid uninitialized read
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 08/18] perf jitdump: Avoid memory leak
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 07/18] perf env: Remove unnecessary NULL tests
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 06/18] perf buildid-cache: Fix use of uninitialized value
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 05/18] perf bench uprobe: Fix potential use of memory after free
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 04/18] perf hisi-ptt: Fix potential memory leak
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 03/18] run-clang-tools: Add pass through checks and and header-filter arguments
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 02/18] gen_compile_commands: Sort output compile commands by file name
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 01/18] gen_compile_commands: Allow the line prefix to still be cmd_
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 00/18] clang-tools support in tools
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [PATCH bpf-next v5 3/9] bpf: Add bpf_sock_addr_set_unix_addr() to allow writing unix sockaddr from bpf
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH] perf record: Fix BTF type checks in the off-cpu profiling
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH v4 2/12] bpf: introduce BPF token object
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [syzbot] [net?] memory leak in tcp_md5_do_add
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH bpf-next v5 9/9] selftests/bpf: Add tests for cgroup unix socket address hooks
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v4 0/3] libbpf: Support symbol versioning for uprobe
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next v4 2/3] libbpf: Support symbol versioning for uprobe
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v5 4/9] bpf: Implement cgroup sockaddr hooks for unix sockets
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf 3/4] bpf: Ensure unit_size is matched with slab cache object size
- From: Guenter Roeck <linux@xxxxxxxxxxxx>
- Re: [PATCH v4 0/5] Reduce overhead of LSMs with static calls
- From: Mateusz Guzik <mjguzik@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [RFC PATCH bpf-next 0/8] bpf, cgroup: Add bpf support for cgroup controller
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [syzbot] [net?] memory leak in tcp_md5_do_add
- From: Kuniyuki Iwashima <kuniyu@xxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Count the LSMs enabled at compile time
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v4 0/5] Reduce overhead of LSMs with static calls
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v4 2/5] security: Count the LSMs enabled at compile time
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH v4 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v4 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v4 3/5] security: Replace indirect LSM hook calls with static calls
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v4 2/5] security: Count the LSMs enabled at compile time
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v4 1/5] kernel: Add helper macros for loop unrolling
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v4 0/5] Reduce overhead of LSMs with static calls
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [RFC PATCH bpf-next 7/8] selftests/bpf: Add new cgroup helper get_classid_cgroup_id()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [RFC PATCH bpf-next 8/8] selftests/bpf: Add selftests for cgroup controller
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [RFC PATCH bpf-next 6/8] selftests/bpf: Add parallel support for classid
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [RFC PATCH bpf-next 5/8] selftests/bpf: Fix issues in setup_classid_environment()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [RFC PATCH bpf-next 4/8] bpf: Add new kfuncs support for cgroup controller
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [RFC PATCH bpf-next 2/8] cgroup: Enable task_under_cgroup_hierarchy() on cgroup1
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [RFC PATCH bpf-next 3/8] cgroup: Add cgroup_get_from_id_within_subsys()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [RFC PATCH bpf-next 1/8] bpf: Fix missed rcu read lock in bpf_task_under_cgroup()
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [RFC PATCH bpf-next 0/8] bpf, cgroup: Add bpf support for cgroup controller
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf 3/3] bpf: sockmap, add tests for MSG_F_PEEK
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- Re: [PATCH v14 30/42] virtio_pci: introduce helper to get/set queue reset
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH bpf 2/3] bpf: sockmap, do not inc copied_seq when PEEK flag set
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- Re: [PATCH v3 08/13] riscv: extend execmem_params for generated code allocations
- From: Alexandre Ghiti <alex@xxxxxxxx>
- Re: [PATCH v3 09/13] powerpc: extend execmem_params for kprobes allocations
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH v3 06/13] mm/execmem: introduce execmem_data_alloc()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- Re: [PATCH net-next v3 1/5] arch: x86: Add IPC mailbox accessor function and add SoC register access
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v4 2/12] bpf: introduce BPF token object
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH net-next v10 6/6] net: veth: use newly added page pool API for veth with xdp
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [PATCH net-next v10 5/6] page_pool: update document about fragment API
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [PATCH net-next v10 0/6] introduce page_pool_alloc() related API
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH v3 06/13] mm/execmem: introduce execmem_data_alloc()
- From: Song Liu <song@xxxxxxxxxx>
- LPC 2023 Networking and BPF Track CFP (Final Reminder)
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH net-next 1/1] net/sched: Disambiguate verdict from return code
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- RE: [PATCH bpf-next 6/8] selftests/xsk: iterate over all the sockets in the send pkts function
- From: "Vyavahare, Tushar" <tushar.vyavahare@xxxxxxxxx>
- Re: [PATCH v3 06/13] mm/execmem: introduce execmem_data_alloc()
- From: Christophe Leroy <christophe.leroy@xxxxxxxxxx>
- The kernel fails to load the ko file because the btf information in the ko file is inconsistent.
- From: Xin Liu <liuxin350@xxxxxxxxxx>
- Re: [syzbot] [net?] memory leak in tcp_md5_do_add
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH bpf-next v5 2/9] bpf: Propagate modified uaddrlen from cgroup sockaddr programs
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v14 30/42] virtio_pci: introduce helper to get/set queue reset
- From: Xuan Zhuo <xuanzhuo@xxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v5 2/3] arm64: patching: Add aarch64_insn_set()
- From: Xu Kuohai <xukuohai@xxxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [syzbot] [net?] memory leak in tcp_md5_do_add
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [PATCH v3 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v3 06/13] mm/execmem: introduce execmem_data_alloc()
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH bpf-next v1] bpf, docs: Add loongarch64 as arch supporting BPF JIT
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH v3 02/13] mm: introduce execmem_text_alloc() and execmem_free()
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v3 09/13] powerpc: extend execmem_params for kprobes allocations
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v4 2/12] bpf: introduce BPF token object
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v3 02/13] mm: introduce execmem_text_alloc() and execmem_free()
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v3 02/13] mm: introduce execmem_text_alloc() and execmem_free()
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH bpf v2 0/3] samples/bpf: syscall_tp_user: Refactor and fix array index out-of-bounds bug
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf v2 1/3] samples/bpf: Add -fsanitize=bounds to userspace programs
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v2 00/10] Implement cpuv4 support for s390x
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf 1/3] bpf: tcp_read_skb needs to pop skb regardless of seq
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- Re: [PATCH bpf 1/3] bpf: tcp_read_skb needs to pop skb regardless of seq
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH v3 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v3 3/5] security: Replace indirect LSM hook calls with static calls
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v3 1/5] kernel: Add helper macros for loop unrolling
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: Song Liu <song@xxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 940fcc189c51032dd0282cbee4497542c982ac59
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH net-next v3 2/5] net: pcs: xpcs: combine C37 SGMII AN and 2500BASEX for Intel mGbE controller
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next v2 0/5] TSN auto negotiation between 1G and 2.5G
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next v3 4/5] net: stmmac: enable Intel mGbE 1G/2.5G auto-negotiation support
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- [PATCH net v3] ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH net-next v3 0/5] TSN auto negotiation between 1G and 2.5G
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v5 7/9] documentation/bpf: Document cgroup unix socket address hooks
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- Re: [PATCH net-next v2 0/5] TSN auto negotiation between 1G and 2.5G
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next v9 5/6] page_pool: update document about frag API
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH] bpf, sockmap: fix deadlocks in the sockhash and sockmap
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- Re: [PATCH bpf-next 6/8] selftests/xsk: iterate over all the sockets in the send pkts function
- From: Magnus Karlsson <magnus.karlsson@xxxxxxxxx>
- Re: [PATCH net-next v2 0/5] TSN auto negotiation between 1G and 2.5G
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v2 01/10] bpf: Disable zero-extension for BPF_MEMSX
- From: Puranjay Mohan <puranjay12@xxxxxxxxx>
- [PATCH bpf-next v5 9/9] selftests/bpf: Add tests for cgroup unix socket address hooks
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- [PATCH bpf-next v5 4/9] bpf: Implement cgroup sockaddr hooks for unix sockets
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- Re: [PATCH bpf-next v5 2/3] arm64: patching: Add aarch64_insn_set()
- From: Puranjay Mohan <puranjay12@xxxxxxxxx>
- [PATCH bpf-next v5 5/9] libbpf: Add support for cgroup unix socket address hooks
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 0/8] Add a test for SHARED_UMEM feature
- From: Magnus Karlsson <magnus.karlsson@xxxxxxxxx>
- Re: [PATCH net-next v3 0/5] TSN auto negotiation between 1G and 2.5G
- From: Andrew Lunn <andrew@xxxxxxx>
- Re: [PATCH bpf-next] bpf, arm64: Support up to 12 function arguments
- From: Florent Revest <revest@xxxxxxxxxxxx>
- Re: [PATCH net-next v2 0/5] TSN auto negotiation between 1G and 2.5G
- From: Choong Yong Liang <yong.liang.choong@xxxxxxxxxxxxxxx>
- Re: [PATCH net v2 3/3] octeontx2-pf: Do xdp_do_flush() after redirects.
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH net-next v2 0/5] TSN auto negotiation between 1G and 2.5G
- From: Andrew Lunn <andrew@xxxxxxx>
- [PATCH bpf-next v5 1/9] selftests/bpf: Add missing section name tests for getpeername/getsockname
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH net-next v2 0/5] TSN auto negotiation between 1G and 2.5G
- From: Andrew Lunn <andrew@xxxxxxx>
- [PATCH bpf-next v5 0/9] Add cgroup sockaddr hooks for unix sockets
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- [PATCH bpf-next v5 8/9] selftests/bpf: Make sure mount directory exists
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- Re: [PATCH net-next v3 3/5] net: phy: update in-band AN mode when changing interface by PHY driver
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v5 3/9] bpf: Add bpf_sock_addr_set_unix_addr() to allow writing unix sockaddr from bpf
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- Re: [PATCH bpf-next 4/8] selftests/xsk: iterate over all the sockets in the receive pkts function
- From: Magnus Karlsson <magnus.karlsson@xxxxxxxxx>
- Re: [PATCHv3 bpf-next 2/9] bpf: Add missed value to kprobe_multi link info
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v1 0/5] Enable BPF skeletons by default
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 1/1] bpf, arm64: support exceptions
- From: Xu Kuohai <xukuohai@xxxxxxxxxx>
- Re: [PATCH -next] perf kwork top: Simplify bool conversion
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re:Re: [PATCH bpf-next 00/14] add libbpf getters for individual ringbuffers
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v5 2/9] bpf: Propagate modified uaddrlen from cgroup sockaddr programs
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v2 1/1] bpf, arm64: support exceptions
- From: Puranjay Mohan <puranjay12@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next 6/8] bpf: Add arch_bpf_trampoline_size()
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH bpf-next 3/8] selftests/xsk: implement a function that generates MAC addresses
- From: Magnus Karlsson <magnus.karlsson@xxxxxxxxx>
- Re: [PATCH v14 30/42] virtio_pci: introduce helper to get/set queue reset
- From: "Michael S. Tsirkin" <mst@xxxxxxxxxx>
- Re: [PATCH bpf-next 6/8] bpf: Add arch_bpf_trampoline_size()
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- [PATCH net-next v3 3/5] net: phy: update in-band AN mode when changing interface by PHY driver
- From: Choong Yong Liang <yong.liang.choong@xxxxxxxxxxxxxxx>
- [PATCH net-next v3 2/5] net: pcs: xpcs: combine C37 SGMII AN and 2500BASEX for Intel mGbE controller
- From: Choong Yong Liang <yong.liang.choong@xxxxxxxxxxxxxxx>
- [PATCH net-next v3 0/5] TSN auto negotiation between 1G and 2.5G
- From: Choong Yong Liang <yong.liang.choong@xxxxxxxxxxxxxxx>
- [PATCH net-next v3 5/5] stmmac: intel: Add 1G/2.5G auto-negotiation support for ADL-N
- From: Choong Yong Liang <yong.liang.choong@xxxxxxxxxxxxxxx>
- [PATCH net-next v3 4/5] net: stmmac: enable Intel mGbE 1G/2.5G auto-negotiation support
- From: Choong Yong Liang <yong.liang.choong@xxxxxxxxxxxxxxx>
- [PATCH net-next v3 1/5] arch: x86: Add IPC mailbox accessor function and add SoC register access
- From: Choong Yong Liang <yong.liang.choong@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v5 6/9] bpftool: Add support for cgroup unix socket address hooks
- From: Daan De Meyer <daan.j.demeyer@xxxxxxxxx>
- Re: [PATCH bpf-next v2 1/1] bpf, arm64: support exceptions
- From: Puranjay Mohan <puranjay12@xxxxxxxxx>
- Re: [PATCH bpf-next v5 1/3] arm64: patching: Add aarch64_insn_copy()
- From: Puranjay Mohan <puranjay12@xxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: Tetsuo Handa <penguin-kernel@xxxxxxxxxxxxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH net v3] ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH bpf-next 6/8] bpf: Add arch_bpf_trampoline_size()
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH net v3] ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH net-next v9 5/6] page_pool: update document about frag API
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [syzbot] [net?] memory leak in tcp_md5_do_add
- From: Dmitry Safonov <dima@xxxxxxxxxx>
- Re: [syzbot] [net?] memory leak in tcp_md5_do_add
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- [syzbot] [net?] memory leak in tcp_md5_do_add
- From: syzbot <syzbot+68662811b3d5f6695bcb@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v3 3/5] security: Replace indirect LSM hook calls with static calls
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v3 3/5] security: Replace indirect LSM hook calls with static calls
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v3 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH net v2 0/3] Add missing xdp_do_flush() invocations.
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next 6/8] bpf: Add arch_bpf_trampoline_size()
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH net v2] ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: [PATCH] bpf, sockmap: fix deadlocks in the sockhash and sockmap
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next 13/14] libbpf: add ring__consume
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 09/14] libbpf: add ring__size
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 07/14] libbpf: add ring__avail_data_size
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 05/14] libbpf: add ring__producer_pos, ring__consumer_pos
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 04/14] selftests/bpf: add tests for ring_buffer__ring
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 03/14] libbpf: add ring_buffer__ring
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 01/14] libbpf: refactor cleanup in ring_buffer__add
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next 00/14] add libbpf getters for individual ringbuffers
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH net-next v9 5/6] page_pool: update document about frag API
- From: Dima Tisnek <dimaqq@xxxxxxxxx>
- Re: [PATCH bpf-next 6/8] bpf: Add arch_bpf_trampoline_size()
- From: Pu Lehui <pulehui@xxxxxxxxxx>
- [PATCH bpf 3/3] bpf: sockmap, add tests for MSG_F_PEEK
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- [PATCH bpf 2/3] bpf: sockmap, do not inc copied_seq when PEEK flag set
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- [PATCH bpf 1/3] bpf: tcp_read_skb needs to pop skb regardless of seq
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- [PATCH bpf 0/3] bpf, sockmap complete fixes for avail bytes
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- Re: [PATCH bpf-next] bpf, arm64: Support up to 12 function arguments
- From: Florent Revest <revest@xxxxxxxxxxxx>
- [PATCHv3 bpf-next 9/9] selftests/bpf: Add test for recursion counts of perf event link tracepoint
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCHv3 bpf-next 8/9] selftests/bpf: Add test for recursion counts of perf event link kprobe
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCHv3 bpf-next 7/9] selftests/bpf: Add test for missed counts of perf event link kprobe
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCHv3 bpf-next 6/9] bpftool: Display missed count for kprobe perf link
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCHv3 bpf-next 5/9] bpftool: Display missed count for kprobe_multi link
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCHv3 bpf-next 4/9] bpf: Count missed stats in trace_call_bpf
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCHv3 bpf-next 3/9] bpf: Add missed value to kprobe perf link info
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCHv3 bpf-next 2/9] bpf: Add missed value to kprobe_multi link info
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCHv3 bpf-next 1/9] bpf: Count stats for kprobe_multi programs
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCHv3 bpf-next 0/9] bpf: Add missed stats for kprobes
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- Re: [PATCH bpf] bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets
- From: Kui-Feng Lee <sinquersw@xxxxxxxxx>
- Re: [PATCH bpf] bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH bpf] bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets
- From: Kui-Feng Lee <sinquersw@xxxxxxxxx>
- Re: [PATCH v3 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 3/5] security: Replace indirect LSM hook calls with static calls
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH] bpf, sockmap: fix deadlocks in the sockhash and sockmap
- From: John Fastabend <john.fastabend@xxxxxxxxx>
- Re: [PATCH v3 1/5] kernel: Add helper macros for loop unrolling
- From: Casey Schaufler <casey@xxxxxxxxxxxxxxxx>
- Re: [PATCH v9 bpf-next 5/9] bpf: udp: Implement batching for sockets iterator
- From: Aditi Ghag <aditi.ghag@xxxxxxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf-next v3 15/17] libbpf: Add support for custom exception callbacks
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 926f75c8a5ab70567eb4c2d82fbc96963313e564
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH bpf-next 4/8] bpf: Add helpers for trampoline image management
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- [RFC bpf-next v3 11/11] selftests/bpf: test case for register_bpf_struct_ops().
- From: thinker.li@xxxxxxxxx
- [RFC bpf-next v3 10/11] bpf: export btf_ctx_access to modules.
- From: thinker.li@xxxxxxxxx
- [RFC bpf-next v3 09/11] libbpf: Find correct module BTFs for struct_ops maps and progs.
- From: thinker.li@xxxxxxxxx
- [RFC bpf-next v3 08/11] bpf: pass attached BTF to find correct type info of struct_ops progs.
- From: thinker.li@xxxxxxxxx
- [RFC bpf-next v3 07/11] bpf, net: switch to storing struct_ops in btf
- From: thinker.li@xxxxxxxxx
- [RFC bpf-next v3 06/11] bpf: validate value_type
- From: thinker.li@xxxxxxxxx
- [RFC bpf-next v3 05/11] bpf: hold module for bpf_struct_ops_map.
- From: thinker.li@xxxxxxxxx
- [RFC bpf-next v3 04/11] bpf: attach a module BTF to a bpf_struct_ops
- From: thinker.li@xxxxxxxxx
- [RFC bpf-next v3 03/11] bpf: add register and unregister functions for struct_ops.
- From: thinker.li@xxxxxxxxx
- [RFC bpf-next v3 02/11] bpf: add struct_ops_tab to btf.
- From: thinker.li@xxxxxxxxx
- Re: [PATCH v3 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- [RFC bpf-next v3 01/11] bpf: refactory struct_ops type initialization to a function.
- From: thinker.li@xxxxxxxxx
- [RFC bpf-next v3 00/11] Registrating struct_ops types from modules
- From: thinker.li@xxxxxxxxx
- Re: [PATCH bpf-next 6/8] bpf: Add arch_bpf_trampoline_size()
- From: Song Liu <songliubraving@xxxxxxxx>
- Re: [PATCH v3 3/5] security: Replace indirect LSM hook calls with static calls
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 1/5] kernel: Add helper macros for loop unrolling
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH v3 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Kees Cook <keescook@xxxxxxxxxxxx>
- Re: [PATCH net v2] ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: How to manually construct a struct bpf_program instance?
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- [PATCH 5.15 072/110] perf test shell stat_bpf_counters: Fix test on Intel
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 5.15 071/110] perf test: Remove bash construct from stat_bpf_counters.sh test
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v2 3/6] bpf: Introduce process open coded iterator kfuncs
- From: Chuyi Zhou <zhouchuyi@xxxxxxxxxxxxx>
- [PATCH net-next v9 6/6] net: veth: use newly added page pool API for veth with xdp
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [PATCH net-next v9 5/6] page_pool: update document about frag API
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- [PATCH net-next v9 0/6] introduce page_pool_alloc() related API
- From: Yunsheng Lin <linyunsheng@xxxxxxxxxx>
- Re: [PATCH bpf] bpf: unconditionally reset backtrack_state masks on global func exit
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- [PATCH bpf] bpf, sockmap: Reject sk_msg egress redirects to non-TCP sockets
- From: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>
- [PATCH net v2] ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH net] ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH net v2 0/3] Add missing xdp_do_flush() invocations.
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next 6/8] bpf: Add arch_bpf_trampoline_size()
- From: Xu Kuohai <xukuohai@xxxxxxxxxx>
- Re: [PATCH net v2 0/3] Add missing xdp_do_flush() invocations.
- From: Jesper Dangaard Brouer <hawk@xxxxxxxxxx>
- [PATCH bpf-next 8/8] x86, bpf: Use bpf_prog_pack for bpf trampoline
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH bpf-next 6/8] bpf: Add arch_bpf_trampoline_size()
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH bpf-next 7/8] bpf: Use arch_bpf_trampoline_size for trampoline
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH bpf-next 5/8] bpf, x86: Adjust arch_prepare_bpf_trampoline return value
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH bpf-next 4/8] bpf: Add helpers for trampoline image management
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH bpf-next 2/8] bpf: Let bpf_prog_pack_free handle any pointer
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH bpf-next 1/8] s390/bpf: Let arch_prepare_bpf_trampoline return program size
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH bpf-next 3/8] bpf: Adjust argument names of arch_prepare_bpf_trampoline()
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH bpf-next 0/8] Allocate bpf trampoline on bpf_prog_pack
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH v1 0/5] Enable BPF skeletons by default
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: Re: Is is possible to get the function calling stack in an fentry bpf program?
- From: 刘畅 <chang-liu22@xxxxxxxxxxxxxxxxxxxxx>
- How to manually construct a struct bpf_program instance?
- From: Shuyi Cheng <chengshuyi@xxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v3 15/17] libbpf: Add support for custom exception callbacks
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- Re: [PATCH bpf] bpf: unconditionally reset backtrack_state masks on global func exit
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH v9 bpf-next 5/9] bpf: udp: Implement batching for sockets iterator
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v3 15/17] libbpf: Add support for custom exception callbacks
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: [PATCH bpf v2] bpf: Fix tr dereferencing
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf 3/4] bpf: Ensure unit_size is matched with slab cache object size
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 3/6] bpf: Introduce process open coded iterator kfuncs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH net-next 1/1] net/sched: Disambiguate verdict from return code
- From: Jamal Hadi Salim <jhs@xxxxxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH net-next 1/1] net/sched: Disambiguate verdict from return code
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH v5 bpf-next 11/13] libbpf: add BPF token support to bpf_btf_load() API
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 13/13] selftests/bpf: add BPF token-enabled tests
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 08/13] bpf: consistenly use BPF token throughout BPF verifier logic
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 09/13] libbpf: add bpf_token_create() API
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 12/13] libbpf: add BPF token support to bpf_prog_load() API
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 05/13] bpf: add BPF token support to BPF_BTF_LOAD command
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 03/13] bpf: introduce BPF token object
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 06/13] bpf: add BPF token support to BPF_PROG_LOAD command
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 02/13] bpf: add BPF token delegation mount options to BPF FS
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 07/13] bpf: take into account BPF token when fetching helper protos
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 10/13] libbpf: add BPF token support to bpf_map_create() API
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 04/13] bpf: add BPF token support to BPF_MAP_CREATE command
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 01/13] bpf: align CAP_NET_ADMIN checks with bpf_capable() approach
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- [PATCH v5 bpf-next 00/13] BPF token and BPF FS-based delegation
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- Re: [PATCH bpf] bpf: unconditionally reset backtrack_state masks on global func exit
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH net] ipv4, ipv6: Fix handling of transhdrlen in __ip{,6}_append_data()
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 29e400e3ea486bf942b214769fc9778098114113
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH bpf] bpf: unconditionally reset backtrack_state masks on global func exit
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH dwarves 0/3] dwarves: detect BTF kinds supported by kernel
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCHSET v4] sched: Implement BPF extensible scheduler class
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH dwarves 0/3] dwarves: detect BTF kinds supported by kernel
- From: Alan Maguire <alan.maguire@xxxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: Is is possible to get the function calling stack in an fentry bpf program?
- From: Kui-Feng Lee <sinquersw@xxxxxxxxx>
- Is is possible to get the function calling stack in an fentry bpf program?
- From: 刘畅 <chang-liu22@xxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH v1 0/5] Enable BPF skeletons by default
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- Re: [PATCH bpf-next 4/4] riscv, bpf: Mixing bpf2bpf and tailcalls
- From: Pu Lehui <pulehui@xxxxxxxxxx>
- Re: [PATCH bpf-next 4/4] riscv, bpf: Mixing bpf2bpf and tailcalls
- From: Conor Dooley <conor@xxxxxxxxxx>
- pull-request: bpf-next 2023-09-19
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 4/4] riscv, bpf: Mixing bpf2bpf and tailcalls
- From: Pu Lehui <pulehui@xxxxxxxxxx>
- Re: [PATCH bpf-next 4/4] riscv, bpf: Mixing bpf2bpf and tailcalls
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH bpf-next v2] bpf, x64: Check imm32 first at BPF_CALL in do_jit()
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- [PATCH bpf-next v2 10/10] selftests/bpf: Trim DENYLIST.s390x
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- [PATCH bpf-next v2 09/10] selftests/bpf: Enable the cpuv4 tests for s390x
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- [PATCH bpf-next v2 08/10] s390/bpf: Implement signed division
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- [PATCH bpf-next v2 04/10] s390/bpf: Implement BPF_MOV | BPF_X with sign-extension
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- [PATCH bpf-next v2 07/10] s390/bpf: Implement unconditional jump with 32-bit offset
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- [PATCH bpf-next v2 05/10] s390/bpf: Implement BPF_MEMSX
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- [PATCH bpf-next v2 06/10] s390/bpf: Implement unconditional byte swap
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- [PATCH bpf-next v2 03/10] selftests/bpf: Add big-endian support to the ldsx test
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- [PATCH bpf-next v2 02/10] selftests/bpf: Unmount the cgroup2 work directory
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- [PATCH bpf-next v2 01/10] bpf: Disable zero-extension for BPF_MEMSX
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- [PATCH bpf-next v2 00/10] Implement cpuv4 support for s390x
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- Re: [PATCH bpf 0/2] s390/bpf: Fix arch_prepare_bpf_trampoline
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next 4/4] riscv, bpf: Mixing bpf2bpf and tailcalls
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: BPF memory model
- From: "Paul E. McKenney" <paulmck@xxxxxxxxxx>
- Re: pull-request: bpf-next 2023-09-16
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf 1/2] s390/bpf: Let arch_prepare_bpf_trampoline return program size
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- Re: [PATCH bpf] bpf: unconditionally reset backtrack_state masks on global func exit
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf 2/2] selftests/bpf: Check bpf_cubic_acked() is called via struct_ops
- From: Ilya Leoshkevich <iii@xxxxxxxxxxxxx>
- Re: [syzbot] [net?] WARNING in __ip6_append_data
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH 2/3] Revert "bpf: Fix issue in verifying allow_ptr_leaks"
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [syzbot] [net?] WARNING in __ip6_append_data
- From: Tom Parkin <tparkin@xxxxxxxxxxx>
- [PATCH bpf-next v1] bpf, docs: Add loongarch64 as arch supporting BPF JIT
- From: Tiezhu Yang <yangtiezhu@xxxxxxxxxxx>
- Re: [PATCH bpf-next v2 4/6] riscv, bpf: Add necessary Zbb instructions
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v2 4/6] riscv, bpf: Add necessary Zbb instructions
- From: Conor Dooley <conor@xxxxxxxxxx>
- Re: [PATCH 2/3] Revert "bpf: Fix issue in verifying allow_ptr_leaks"
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH net v2 3/3] octeontx2-pf: Do xdp_do_flush() after redirects.
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH bpf 2/2] selftests/bpf: Check bpf_cubic_acked() is called via struct_ops
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH bpf 0/2] s390/bpf: Fix arch_prepare_bpf_trampoline
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH bpf 1/2] s390/bpf: Let arch_prepare_bpf_trampoline return program size
- From: Song Liu <song@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next 1/5] cgroup: Enable task_under_cgroup_hierarchy() on cgroup1
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- [PATCH bpf-next v2 2/6] riscv, bpf: Unify 32-bit zero-extension to emit_zextw
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v2 6/6] riscv, bpf: Optimize bswap insns with Zbb support
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v2 0/6] Zbb support and code simplification for RV64 JIT
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v2 4/6] riscv, bpf: Add necessary Zbb instructions
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v2 1/6] riscv, bpf: Unify 32-bit sign-extension to emit_sextw
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v2 3/6] riscv, bpf: Simplify sext and zext logics in branch instructions
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v2 5/6] riscv, bpf: Optimize sign-extention mov insns with Zbb support
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 4/4] riscv, bpf: Mixing bpf2bpf and tailcalls
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 2/4] riscv, bpf: Using kvcalloc to allocate cache buffer
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 1/4] riscv, bpf: Remove redundant ctx->offset initialization
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 0/4] Mixing bpf2bpf and tailcalls for RV64
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 3/4] riscv, bpf: Add RV_TAILCALL_OFFSET macro to format tailcall offset
- From: Pu Lehui <pulehui@xxxxxxxxxxxxxxx>
- Re: [PATCH 2/3] Revert "bpf: Fix issue in verifying allow_ptr_leaks"
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v1 4/5] perf test: Ensure EXTRA_TESTS is covered in build test
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [PATCH v1 0/5] Enable BPF skeletons by default
- From: Yang Jihong <yangjihong1@xxxxxxxxxx>
- Re: [PATCH v1 0/5] Enable BPF skeletons by default
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH v1 4/5] perf test: Ensure EXTRA_TESTS is covered in build test
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- [PATCH v3 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v3 4/5] bpf: Only enable BPF LSM hooks when an LSM program is attached
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v3 3/5] security: Replace indirect LSM hook calls with static calls
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v3 2/5] security: Count the LSMs enabled at compile time
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v3 1/5] kernel: Add helper macros for loop unrolling
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH v3 0/5] Reduce overhead of LSMs with static calls
- From: KP Singh <kpsingh@xxxxxxxxxx>
- [PATCH bpf] bpf: unconditionally reset backtrack_state masks on global func exit
- From: Andrii Nakryiko <andrii@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 0/3] Fixes for Exceptions
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next v2 1/6] cgroup: Prepare for using css_task_iter_*() in BPF
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [RFC bpf-next v2 2/9] bpf: add register and unregister functions for struct_ops.
- From: Kui-Feng Lee <sinquersw@xxxxxxxxx>
- Re: [PATCH] bpf, sockmap: fix deadlocks in the sockhash and sockmap
- From: Kui-Feng Lee <sinquersw@xxxxxxxxx>
- Re: [RFC bpf-next v2 2/9] bpf: add register and unregister functions for struct_ops.
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf-next v2 2/3] bpf: Fix bpf_throw warning on 32-bit arch
- From: Kui-Feng Lee <sinquersw@xxxxxxxxx>
- Re: [PATCH net v2 3/3] octeontx2-pf: Do xdp_do_flush() after redirects.
- From: Kui-Feng Lee <sinquersw@xxxxxxxxx>
- Re: [PATCH v2 2/3] selftests/hid: do not manually call headers_install
- From: Shuah Khan <skhan@xxxxxxxxxxxxxxxxxxx>
- Re: [PATCH net v2 2/3] bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI
- From: Michael Chan <michael.chan@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v2 2/3] bpf: Fix bpf_throw warning on 32-bit arch
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 7fc7222d9680366edeecc219c21ca96310bdbc10
- From: kernel test robot <lkp@xxxxxxxxx>
- [PATCH bpf-next v1 1/3] selftests/bpf: Print log buffer for exceptions test only on failure
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- Re: [PATCH bpf-next v2 1/1] bpf, arm64: support exceptions
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- [PATCH bpf-next v1 2/3] bpf: Fix bpf_throw warning on 32-bit arch
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- Re: [PATCH v2 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- Re: pull-request: bpf-next 2023-09-16
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- Re: [PATCH bpf-next v1 3/3] bpf: Disable exceptions when CONFIG_UNWINDER_FRAME_POINTER=y
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- Re: [PATCH bpf-next v3 10/17] bpf: Prevent KASAN false positive with bpf_throw
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- [PATCH bpf-next v2 1/3] selftests/bpf: Print log buffer for exceptions test only on failure
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- [PATCH bpf-next v2 3/3] bpf: Disable exceptions when CONFIG_UNWINDER_FRAME_POINTER=y
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- Re: [xdp-hints] [RFC bpf-next 10/23] ice: Implement VLAN tag hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [PATCH bpf-next v2 3/3] bpf: Disable exceptions when CONFIG_UNWINDER_FRAME_POINTER=y
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH bpf-next v1 3/3] bpf: Disable exceptions when CONFIG_UNWINDER_FRAME_POINTER=y
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v2 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- [PATCH bpf-next v2 2/3] bpf: Fix bpf_throw warning on 32-bit arch
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- [PATCH bpf-next v2 0/3] Fixes for Exceptions
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- Re: [syzbot] [net?] WARNING in __ip6_append_data
- From: Willem de Bruijn <willemdebruijn.kernel@xxxxxxxxx>
- Re: pull-request: bpf-next 2023-09-16
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [syzbot] [net?] WARNING in __ip6_append_data
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [PATCH bpf-next v3 10/17] bpf: Prevent KASAN false positive with bpf_throw
- From: Matthieu Baerts <matthieu.baerts@xxxxxxxxxxxx>
- Re: pull-request: bpf-next 2023-09-16
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH bpf-next v1 0/3] Fixes for Exceptions
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- [PATCH net v2 1/3] net: ena: Flush XDP packets on error.
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: pull-request: bpf-next 2023-09-16
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH net v2 0/3] Add missing xdp_do_flush() invocations.
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH net v2 3/3] octeontx2-pf: Do xdp_do_flush() after redirects.
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- [PATCH net v2 2/3] bnxt_en: Flush XDP for bnxt_poll_nitroa0()'s NAPI
- From: Sebastian Andrzej Siewior <bigeasy@xxxxxxxxxxxxx>
- Re: pull-request: bpf-next 2023-09-16
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH bpf-next v1 3/3] bpf: Disable exceptions when CONFIG_UNWINDER_FRAME_POINTER=y
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- Re: pull-request: bpf-next 2023-09-16
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [RFC PATCH bpf-next 1/5] cgroup: Enable task_under_cgroup_hierarchy() on cgroup1
- From: Michal Koutný <mkoutny@xxxxxxxx>
- Re: pull-request: bpf-next 2023-09-16
- From: Eric Dumazet <edumazet@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next 0/5] bpf, cgroup: Enable cgroup_array map on cgroup1
- From: Michal Koutný <mkoutny@xxxxxxxx>
- Re: pull-request: bpf-next 2023-09-16
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- Re: [syzbot] [net?] WARNING in __ip6_append_data
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: BPF memory model
- From: Barret Rhoden <brho@xxxxxxxxxx>
- Re: [PATCH v2 5/5] security: Add CONFIG_SECURITY_HOOK_LIKELY
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [syzbot] [bpf?] WARNING in bpf_mprog_pos_after
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [PATCH 2/3] Revert "bpf: Fix issue in verifying allow_ptr_leaks"
- From: Luis Gerhorst <gerhorst@xxxxxxxxx>
- Re: [PATCH 2/3] Revert "bpf: Fix issue in verifying allow_ptr_leaks"
- From: Luis Gerhorst <gerhorst@xxxxxxxxx>
- Re: [syzbot] [net?] WARNING in __ip6_append_data
- From: syzbot <syzbot+62cbf263225ae13ff153@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [syzbot] [net?] WARNING in __ip6_append_data
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [syzbot] [net?] WARNING in __ip6_append_data
- From: David Howells <dhowells@xxxxxxxxxx>
- [PATCH] bpf, sockmap: fix deadlocks in the sockhash and sockmap
- From: Ma Ke <make_ruc2021@xxxxxxx>
- [PATCH bpf-next 8/8] selftests/xsk: add a test for shared umem feature
- From: Tushar Vyavahare <tushar.vyavahare@xxxxxxxxx>
- [PATCH bpf-next 7/8] selftests/xsk: modify xsk_update_xskmap() to accept the index as an argument.
- From: Tushar Vyavahare <tushar.vyavahare@xxxxxxxxx>
- [PATCH bpf-next 6/8] selftests/xsk: iterate over all the sockets in the send pkts function
- From: Tushar Vyavahare <tushar.vyavahare@xxxxxxxxx>
- [PATCH bpf-next 5/8] selftests/xsk: remove unnecessary parameter from pkt_set() function call
- From: Tushar Vyavahare <tushar.vyavahare@xxxxxxxxx>
- [PATCH bpf-next 4/8] selftests/xsk: iterate over all the sockets in the receive pkts function
- From: Tushar Vyavahare <tushar.vyavahare@xxxxxxxxx>
- [PATCH bpf-next 3/8] selftests/xsk: implement a function that generates MAC addresses
- From: Tushar Vyavahare <tushar.vyavahare@xxxxxxxxx>
- [PATCH bpf-next 2/8] selftests/xsk: rename xsk_xdp_metadata.h to xsk_xdp_common.h
- From: Tushar Vyavahare <tushar.vyavahare@xxxxxxxxx>
- [PATCH bpf-next 1/8] selftests/xsk: move pkt_stream to the xsk_socket_info
- From: Tushar Vyavahare <tushar.vyavahare@xxxxxxxxx>
- [PATCH bpf-next 0/8] Add a test for SHARED_UMEM feature
- From: Tushar Vyavahare <tushar.vyavahare@xxxxxxxxx>
- [PATCH v3 13/13] bpf: remove CONFIG_BPF_JIT dependency on CONFIG_MODULES of
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 11/13] x86/ftrace: enable dynamic ftrace without CONFIG_MODULES
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 10/13] arch: make execmem setup available regardless of CONFIG_MODULES
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 09/13] powerpc: extend execmem_params for kprobes allocations
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 08/13] riscv: extend execmem_params for generated code allocations
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 06/13] mm/execmem: introduce execmem_data_alloc()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 12/13] kprobes: remove dependency on CONFIG_MODULES
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 05/13] modules, execmem: drop module_alloc
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 04/13] mm/execmem, arch: convert remaining overrides of module_alloc to execmem
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 07/13] arm64, execmem: extend execmem_params for generated code allocations
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 03/13] mm/execmem, arch: convert simple overrides of module_alloc to execmem
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 02/13] mm: introduce execmem_text_alloc() and execmem_free()
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 01/13] nios2: define virtual address space for modules
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH v3 00/13] mm: jit/text allocator
- From: Mike Rapoport <rppt@xxxxxxxxxx>
- [PATCH bpf-next v4 3/3] selftests/bpf: Add tests for symbol versioning for uprobe
- From: Hengqi Chen <hengqi.chen@xxxxxxxxx>
- [PATCH bpf-next v4 2/3] libbpf: Support symbol versioning for uprobe
- From: Hengqi Chen <hengqi.chen@xxxxxxxxx>
- [PATCH bpf-next v4 1/3] libbpf: Resolve symbol conflicts at the same offset for uprobe
- From: Hengqi Chen <hengqi.chen@xxxxxxxxx>
- [PATCH bpf-next v4 0/3] libbpf: Support symbol versioning for uprobe
- From: Hengqi Chen <hengqi.chen@xxxxxxxxx>
- [syzbot] [bpf?] WARNING in bpf_mprog_pos_after
- From: syzbot <syzbot+2558ca3567a77b7af4e3@xxxxxxxxxxxxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next v3 12/17] bpf: Disallow fentry/fexit/freplace for exception callbacks
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next 3/6] riscv, bpf: Simplify sext and zext logics in branch instructions
- From: Pu Lehui <pulehui@xxxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- [PATCH bpf v2 2/3] samples/bpf: syscall_tp_user: Rename num_progs into nr_tests
- From: Jinghao Jia <jinghao7@xxxxxxxxxxxx>
- [PATCH bpf v2 1/3] samples/bpf: Add -fsanitize=bounds to userspace programs
- From: Jinghao Jia <jinghao7@xxxxxxxxxxxx>
- [PATCH bpf v2 3/3] samples/bpf: syscall_tp_user: Fix array out-of-bound access
- From: Jinghao Jia <jinghao7@xxxxxxxxxxxx>
- [PATCH bpf v2 0/3] samples/bpf: syscall_tp_user: Refactor and fix array index out-of-bounds bug
- From: Jinghao Jia <jinghao7@xxxxxxxxxxxx>
- Re: [BUG] verifier escape with iteration helpers (bpf_loop, ...)
- From: Eduard Zingerman <eddyz87@xxxxxxxxx>
- [PATCH 6.1 179/219] perf test shell stat_bpf_counters: Fix test on Intel
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.1 081/219] perf test stat_bpf_counters_cgrp: Enhance perf stat cgroup BPF counter test
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.5 234/285] perf test shell stat_bpf_counters: Fix test on Intel
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.5 098/285] perf test stat_bpf_counters_cgrp: Enhance perf stat cgroup BPF counter test
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.5 072/285] perf parse-events: Move instances of YYABORT to YYNOMEM
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.5 071/285] perf parse-events: Separate YYABORT and YYNOMEM cases
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.5 074/285] perf parse-events: Additional error reporting
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH 6.5 073/285] perf parse-events: Separate ENOMEM memory handling
- From: Greg Kroah-Hartman <gregkh@xxxxxxxxxxxxxxxxxxx>
- [PATCH bpf v2] bpf: Fix tr dereferencing
- From: Leon Hwang <hffilwlqm@xxxxxxxxx>
- Re: [PATCH v4] tracepoint: add new `tcp:tcp_ca_event` trace event
- From: Steven Rostedt <rostedt@xxxxxxxxxxx>
- [PATCH bpf-next] bpf, arm64: Support up to 12 function arguments
- From: Xu Kuohai <xukuohai@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf] bpf: Fix tr dereferencing
- From: Leon Hwang <hffilwlqm@xxxxxxxxx>
- Re: duplicate BTF_IDs leading to symbol redefinition errors?
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH v4] tracepoint: add new `tcp:tcp_ca_event` trace event
- From: Manjusaka <me@xxxxxxxxxxxx>
- Re: [BUG] perf test: Regression because of d6e6286a12e7
- From: Arnaldo Carvalho de Melo <acme@xxxxxxxxxx>
- Re: [RFC PATCH v2] bpf: Using binary search to improve the performance of btf_find_by_name_kind
- From: pengdonglin <pengdonglin@xxxxxxxxxxxxxx>
- Re: [RFC PATCH bpf-next 0/5] bpf, cgroup: Enable cgroup_array map on cgroup1
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [RFC PATCH bpf-next 0/5] bpf, cgroup: Enable cgroup_array map on cgroup1
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [RFC PATCH bpf-next 0/5] bpf, cgroup: Enable cgroup_array map on cgroup1
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH v1] perf trace: Avoid compile error wrt redefining bool
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH v1] perf bpf-prologue: Remove unused file
- From: Namhyung Kim <namhyung@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 1/1] bpf, arm64: support exceptions
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- [PATCH bpf-next v2 1/1] bpf, arm64: support exceptions
- From: Puranjay Mohan <puranjay12@xxxxxxxxx>
- [PATCH bpf-next v2 0/1] bpf, arm64: Support Exceptions
- From: Puranjay Mohan <puranjay12@xxxxxxxxx>
- Re: [PATCH net-next 4/6] net: stmmac: rk: use stmmac_set_tx_clk_gmii()
- From: Serge Semin <fancer.lancer@xxxxxxxxx>
- Re: [PATCH bpf-next v3 12/17] bpf: Disallow fentry/fexit/freplace for exception callbacks
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- Re: [PATCH bpf-next v3 12/17] bpf: Disallow fentry/fexit/freplace for exception callbacks
- From: Kumar Kartikeya Dwivedi <memxor@xxxxxxxxx>
- pull-request: bpf-next 2023-09-16
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v3 00/17] Exceptions - 1/2
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next v3 12/17] bpf: Disallow fentry/fexit/freplace for exception callbacks
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v3 10/17] bpf: Prevent KASAN false positive with bpf_throw
- From: Andrey Konovalov <andreyknvl@xxxxxxxxx>
- Re: [PATCH bpf-next v3 09/17] mm: kasan: Declare kasan_unpoison_task_stack_below in kasan.h
- From: Andrey Konovalov <andreyknvl@xxxxxxxxx>
- Re: [PATCH bpf-next 3/6] riscv, bpf: Simplify sext and zext logics in branch instructions
- From: Simon Horman <horms@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 3/6] bpf: Introduce process open coded iterator kfuncs
- From: Chuyi Zhou <zhouchuyi@xxxxxxxxxxxxx>
- Re: [PATCH net] igc: Fix infinite initialization loop with early XDP redirect
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next 0/4] Reduce overhead of LSMs with static calls
- From: Paolo Abeni <pabeni@xxxxxxxxxx>
- Re: [PATCH bpf-next v2] bpf, x64: Check imm32 first at BPF_CALL in do_jit()
- From: Leon Hwang <hffilwlqm@xxxxxxxxx>
- Re: [Syzkaller & bisect] There is general protection fault in bpf_prog_offload_verifier_prep in v6.6-rc1 kernel
- From: Pengfei Xu <pengfei.xu@xxxxxxxxx>
- Re: [PATCH bpf 3/4] bpf: Ensure unit_size is matched with slab cache object size
- From: Hou Tao <houtao@xxxxxxxxxxxxxxx>
- Re: [RFC bpf-next v2 1/9] bpf: refactory struct_ops type initialization to a function.
- From: Kui-Feng Lee <sinquersw@xxxxxxxxx>
- Re: [RFC bpf-next v2 2/9] bpf: add register and unregister functions for struct_ops.
- From: Kui-Feng Lee <sinquersw@xxxxxxxxx>
- Re: [PATCH bpf-next 0/4] Reduce overhead of LSMs with static calls
- From: KP Singh <kpsingh@xxxxxxxxxx>
- Re: [PATCH v2 2/5] security: Count the LSMs enabled at compile time
- From: KP Singh <kpsingh@xxxxxxxxxx>
- pull-request: bpf 2023-09-15
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v3 9/9] MAINTAINERS: Add myself for ARM32 BPF JIT maintainer.
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf-next v3 0/9] arm32, bpf: add support for cpuv4 insns
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [RFC bpf-next v2 2/9] bpf: add register and unregister functions for struct_ops.
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [RFC bpf-next v2 1/9] bpf: refactory struct_ops type initialization to a function.
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH v4 2/12] bpf: introduce BPF token object
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: duplicate BTF_IDs leading to symbol redefinition errors?
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v2 3/6] bpf: Introduce process open coded iterator kfuncs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v2 4/6] bpf: Introduce css_descendant open-coded iterator kfuncs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [External] Re: [PATCH bpf-next v2 5/6] bpf: teach the verifier to enforce css_iter and process_iter in RCU CS
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v3 2/3] libbpf: Support symbol versioning for uprobe
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v2] bpf: Allow to use kfunc XDP hints and frags together
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [PATCH bpf v3 0/2] link to v1: https://lore.kernel.org/bpf/20230915103228.1196234-1-jolsa@xxxxxxxxxx/
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next v2] bpf: Allow to use kfunc XDP hints and frags together
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [RFC PATCH bpf-next 0/5] bpf, cgroup: Enable cgroup_array map on cgroup1
- From: Hao Luo <haoluo@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 0/3] bpf: expose information about netdev xdp-metadata kfunc support
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf v3 1/2] bpf: Fix BTF_ID symbol generation collision
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [PATCH bpf-next] xsk: add multi-buffer support for sockets sharing umem
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf] bpf: Fix uprobe_multi get_pid_task error path
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf] bpf: Skip unit_size checking for global per-cpu allocator
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf] bpf: Fix tr dereferencing
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- [PATCH bpf v3 0/2] link to v1: https://lore.kernel.org/bpf/20230915103228.1196234-1-jolsa@xxxxxxxxxx/
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v2] bpf: Fix BTF_ID symbol generation collision
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH bpf v3 2/2] bpf: Fix BTF_ID symbol generation collision in tools/
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH bpf v3 1/2] bpf: Fix BTF_ID symbol generation collision
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v2] bpf: Fix BTF_ID symbol generation collision
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next 0/5] bpf, cgroup: Enable cgroup_array map on cgroup1
- From: Tejun Heo <tj@xxxxxxxxxx>
- Re: [PATCH v2] bpf: Fix BTF_ID symbol generation collision
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH bpf] bpf: Fix BTF_ID symbol generation
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v2] bpf: Fix BTF_ID symbol generation collision
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v2] bpf: Fix BTF_ID symbol generation collision
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH v2] bpf: Fix BTF_ID symbol generation collision
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [PATCH v2] bpf: Fix BTF_ID symbol generation collision
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: [RFC PATCH bpf-next 0/5] bpf, cgroup: Enable cgroup_array map on cgroup1
- From: Michal Koutný <mkoutny@xxxxxxxx>
- Re: duplicate BTF_IDs leading to symbol redefinition errors?
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- [PATCH v2] bpf: Fix BTF_ID symbol generation collision
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH bpf-next v2] bpf, x64: Check imm32 first at BPF_CALL in do_jit()
- From: Zvi Effron <zeffron@xxxxxxxxxxxxx>
- Re: [PATCH bpf] bpf: Fix BTF_ID symbol generation
- From: Nick Desaulniers <ndesaulniers@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 2/9] xsk: add TX timestamp and TX checksum offload support
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- Re: [syzbot] [net?] WARNING in __ip6_append_data
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH bpf-next v2] bpf: Allow to use kfunc XDP hints and frags together
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- Re: [Syzkaller & bisect] There is general protection fault in bpf_prog_offload_verifier_prep in v6.6-rc1 kernel
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [syzbot] [net?] WARNING in __ip6_append_data
- From: David Howells <dhowells@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 3/6] bpf: Introduce process open coded iterator kfuncs
- From: Chuyi Zhou <zhouchuyi@xxxxxxxxxxxxx>
- [linux-next:master] BUILD REGRESSION dfa449a58323de195773cf928d99db4130702bf7
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH bpf] bpf: Fix uprobe_multi get_pid_task error path
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 4/6] bpf: Introduce css_descendant open-coded iterator kfuncs
- From: Chuyi Zhou <zhouchuyi@xxxxxxxxxxxxx>
- [PATCH bpf] bpf: Fix BTF_ID symbol generation
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- [PATCH bpf] bpf: Fix uprobe_multi get_pid_task error path
- From: Jiri Olsa <jolsa@xxxxxxxxxx>
- Re: [PATCH bpf-next v2 2/9] xsk: add TX timestamp and TX checksum offload support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [bug report] bpf: Add pid filter support for uprobe_multi link
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- RE: [PATCH net-next 4/6] net: stmmac: rk: use stmmac_set_tx_clk_gmii()
- From: Jose Abreu <Jose.Abreu@xxxxxxxxxxxx>
- [PATCH bpf-next v2] bpf: Allow to use kfunc XDP hints and frags together
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: duplicate BTF_IDs leading to symbol redefinition errors?
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH bpf-next v3 2/3] libbpf: Support symbol versioning for uprobe
- From: Hengqi Chen <hengqi.chen@xxxxxxxxx>
- [bug report] bpf: Add pid filter support for uprobe_multi link
- From: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
- [PATCH -next] perf kwork top: Simplify bool conversion
- From: Yang Li <yang.lee@xxxxxxxxxxxxxxxxx>
- Re: [External] Re: [PATCH bpf-next v2 5/6] bpf: teach the verifier to enforce css_iter and process_iter in RCU CS
- From: Chuyi Zhou <zhouchuyi@xxxxxxxxxxxxx>
- Re: [PATCH bpf-next v2 3/6] bpf: Introduce process open coded iterator kfuncs
- From: Chuyi Zhou <zhouchuyi@xxxxxxxxxxxxx>
- [Syzkaller & bisect] There is general protection fault in bpf_prog_offload_verifier_prep in v6.6-rc1 kernel
- From: Pengfei Xu <pengfei.xu@xxxxxxxxx>
- Re: [RFC PATCH v2 2/5] mm: Add policy_name to identify OOM policies
- From: Chuyi Zhou <zhouchuyi@xxxxxxxxxxxxx>
- Re: [PATCH bpf] bpf: Fix tr dereferencing
- From: Hengqi Chen <hengqi.chen@xxxxxxxxx>
- Re: [PATCH bpf-next v2 4/9] net/mlx5e: Implement AF_XDP TX timestamp and checksum offload
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [External] Re: [RFC PATCH v2 2/5] mm: Add policy_name to identify OOM policies
- From: Bixuan Cui <cuibixuan@xxxxxxxx>
- Re: [PATCH 2/3] Revert "bpf: Fix issue in verifying allow_ptr_leaks"
- From: Yafang Shao <laoar.shao@xxxxxxxxx>
- Re: [PATCH bpf] bpf: Fix tr dereferencing
- From: Leon Hwang <hffilwlqm@xxxxxxxxx>
- Re: [PATCH bpf] bpf: Fix tr dereferencing
- From: Hengqi Chen <hengqi.chen@xxxxxxxxx>
- Re: pahole 1.25 SIGSEGV when building kernel (-j when cores > 81)
- From: Vitaly Chikunov <vt@xxxxxxxxxxxx>
- Re: [PATCH bpf-next v2 2/9] xsk: add TX timestamp and TX checksum offload support
- From: Vinicius Costa Gomes <vinicius.gomes@xxxxxxxxx>
- Re: [PATCH bpf-next v2 2/9] xsk: add TX timestamp and TX checksum offload support
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [PATCH bpf-next v4 0/7] add BPF_F_PERMANENT flag for sockmap skmsg redirect
- From: "liujian (CE)" <liujian56@xxxxxxxxxx>
- Re: [PATCH v4 2/12] bpf: introduce BPF token object
- From: Paul Moore <paul@xxxxxxxxxxxxxx>
- Re: [PATCH v2 bpf-next] bpf: Charge modmem for struct_ops trampoline
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next v2 5/6] bpf: teach the verifier to enforce css_iter and process_iter in RCU CS
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v2 5/6] bpf: teach the verifier to enforce css_iter and process_iter in RCU CS
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v2 4/6] bpf: Introduce css_descendant open-coded iterator kfuncs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v2 3/6] bpf: Introduce process open coded iterator kfuncs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next v2 2/6] bpf: Introduce css_task open-coded iterator kfuncs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- [PATCH bpf-next 14/14] selftests/bpf: add tests for ring__consume
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 13/14] libbpf: add ring__consume
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 12/14] selftests/bpf: add tests for ring__map_fd
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 11/14] libbpf: add ring__map_fd
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 10/14] selftests/bpf: add tests for ring__size
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 06/14] selftests/bpf: add tests for ring__*_pos
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 05/14] libbpf: add ring__producer_pos, ring__consumer_pos
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 03/14] libbpf: add ring_buffer__ring
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 09/14] libbpf: add ring__size
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 02/14] libbpf: switch rings to array of pointers
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 04/14] selftests/bpf: add tests for ring_buffer__ring
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 01/14] libbpf: refactor cleanup in ring_buffer__add
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 08/14] selftests/bpf: add tests for ring__avail_data_size
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 07/14] libbpf: add ring__avail_data_size
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH bpf-next 00/14] add libbpf getters for individual ringbuffers
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- [PATCH v2 bpf-next] bpf: Charge modmem for struct_ops trampoline
- From: Song Liu <song@xxxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Charge modmem for struct_ops trampoline
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- Re: [RFC PATCH v2] bpf: Using binary search to improve the performance of btf_find_by_name_kind
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [BUG] perf test: Regression because of d6e6286a12e7
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [PATCH bpf] bpf: Fix tr dereferencing
- From: Jiri Olsa <olsajiri@xxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Charge modmem for struct_ops trampoline
- From: Song Liu <song@xxxxxxxxxx>
- [PATCH v1 5/5] perf test: Detect off-cpu support from build options
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 4/5] perf test: Ensure EXTRA_TESTS is covered in build test
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 3/5] perf test: Update build test for changed BPF skeleton defaults
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 2/5] perf build: Default BUILD_BPF_SKEL, warn/disable for missing deps
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 1/5] perf version: Add status of bpf skeletons
- From: Ian Rogers <irogers@xxxxxxxxxx>
- [PATCH v1 0/5] Enable BPF skeletons by default
- From: Ian Rogers <irogers@xxxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Charge modmem for struct_ops trampoline
- From: Martin KaFai Lau <martin.lau@xxxxxxxxx>
- [PATCH bpf-next v2 8/9] selftests/bpf: Add TX side to xdp_hw_metadata
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- [PATCH bpf-next v2 9/9] xsk: document tx_metadata_len layout
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- [PATCH bpf-next v2 7/9] selftests/bpf: Add TX side to xdp_metadata
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- [PATCH bpf-next v2 6/9] selftests/bpf: Add csum helpers
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- [PATCH bpf-next v2 5/9] selftests/xsk: Support tx_metadata_len
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- [PATCH bpf-next v2 4/9] net/mlx5e: Implement AF_XDP TX timestamp and checksum offload
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- [PATCH bpf-next v2 3/9] tools: ynl: print xsk-features from the sample
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- [PATCH bpf-next v2 2/9] xsk: add TX timestamp and TX checksum offload support
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- [PATCH bpf-next v2 1/9] xsk: Support tx_metadata_len
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- [PATCH bpf-next v2 0/9] xsk: TX metadata
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- Re: [PATCH 2/3] Revert "bpf: Fix issue in verifying allow_ptr_leaks"
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: Re: Best way to check for fentry attach support
- From: Martin Kelly <martin.kelly@xxxxxxxxxxxxxxx>
- Re: [PATCH bpf-next] selftests/bpf: skip module_fentry_shadow test when bpf_testmod is not available
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next] selftests/bpf: skip module_fentry_shadow test when bpf_testmod is not available
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: duplicate BTF_IDs leading to symbol redefinition errors?
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf 3/4] bpf: Ensure unit_size is matched with slab cache object size
- From: Nathan Chancellor <nathan@xxxxxxxxxx>
- Re: Best way to check for fentry attach support
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH dwarves 0/3] dwarves: detect BTF kinds supported by kernel
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH v4 2/12] bpf: introduce BPF token object
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH 2/3] Revert "bpf: Fix issue in verifying allow_ptr_leaks"
- From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
- Re: [RFC PATCH bpf-next 2/4] bpf: Introduce process open coded iterator kfuncs
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [RFC PATCH v2] bpf: Using binary search to improve the performance of btf_find_by_name_kind
- From: Alan Maguire <alan.maguire@xxxxxxxxxx>
- Re: [PATCH bpf-next v3 2/3] libbpf: Support symbol versioning for uprobe
- From: Andrii Nakryiko <andrii.nakryiko@xxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Allow to use kfunc XDP hints and frags together
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [xdp-hints] [RFC bpf-next 10/23] ice: Implement VLAN tag hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Allow to use kfunc XDP hints and frags together
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- Re: [RFC bpf-next 07/23] ice: Support RX hash XDP hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [PATCH net-next 4/6] net: stmmac: rk: use stmmac_set_tx_clk_gmii()
- From: Serge Semin <fancer.lancer@xxxxxxxxx>
- Re: [PATCH bpf-next v4 00/10] seltests/xsk: various improvements to xskxceiver
- From: patchwork-bot+netdevbpf@xxxxxxxxxx
- Re: [PATCH bpf-next] bpf: Allow to use kfunc XDP hints and frags together
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [RFC bpf-next 07/23] ice: Support RX hash XDP hint
- From: Alexander Lobakin <aleksander.lobakin@xxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Allow to use kfunc XDP hints and frags together
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [xdp-hints] [RFC bpf-next 10/23] ice: Implement VLAN tag hint
- From: Alexander Lobakin <aleksander.lobakin@xxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Allow to use kfunc XDP hints and frags together
- From: Maciej Fijalkowski <maciej.fijalkowski@xxxxxxxxx>
- Re: [RFC bpf-next 11/23] ice: use VLAN proto from ring packet context in skb path
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [RFC bpf-next 12/23] xdp: Add checksum hint
- From: Alexander Lobakin <aleksander.lobakin@xxxxxxxxx>
- Re: [xdp-hints] [RFC bpf-next 10/23] ice: Implement VLAN tag hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [RFC bpf-next 11/23] ice: use VLAN proto from ring packet context in skb path
- From: Alexander Lobakin <aleksander.lobakin@xxxxxxxxx>
- Re: [RFC bpf-next 09/23] xdp: Add VLAN tag hint
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [PATCH bpf-next] bpf: Allow to use kfunc XDP hints and frags together
- From: Stanislav Fomichev <sdf@xxxxxxxxxx>
- Re: [xdp-hints] [RFC bpf-next 10/23] ice: Implement VLAN tag hint
- From: Alexander Lobakin <aleksander.lobakin@xxxxxxxxx>
- [linux-next:master] BUILD REGRESSION 98897dc735cf6635f0966f76eb0108354168fb15
- From: kernel test robot <lkp@xxxxxxxxx>
- Re: [xdp-hints] [RFC bpf-next 01/23] ice: make RX hash reading code more reusable
- From: Larysa Zaremba <larysa.zaremba@xxxxxxxxx>
- Re: [PATCH 2/3] Revert "bpf: Fix issue in verifying allow_ptr_leaks"
- From: Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx>
- Re: [RFC bpf-next 09/23] xdp: Add VLAN tag hint
- From: Alexander Lobakin <aleksander.lobakin@xxxxxxxxx>
- Re: [xdp-hints] [RFC bpf-next 01/23] ice: make RX hash reading code more reusable
- From: Alexander Lobakin <aleksander.lobakin@xxxxxxxxx>
- Re: [PATCH net-next 1/6] net: stmmac: add stmmac_set_tx_clk_gmii()
- From: Serge Semin <fancer.lancer@xxxxxxxxx>
- RE: [PATCH net-next 4/6] net: stmmac: rk: use stmmac_set_tx_clk_gmii()
- From: Jose Abreu <Jose.Abreu@xxxxxxxxxxxx>
- Re: [PATCH net-next 4/6] net: stmmac: rk: use stmmac_set_tx_clk_gmii()
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next 4/6] net: stmmac: rk: use stmmac_set_tx_clk_gmii()
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next 4/6] net: stmmac: rk: use stmmac_set_tx_clk_gmii()
- From: Serge Semin <fancer.lancer@xxxxxxxxx>
- Re: [PATCH net-next 1/6] net: stmmac: add stmmac_set_tx_clk_gmii()
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next 5/6] net: stmmac: starfive: use stmmac_set_tx_clk_gmii()
- From: Serge Semin <fancer.lancer@xxxxxxxxx>
- Re: [PATCH net-next 4/6] net: stmmac: rk: use stmmac_set_tx_clk_gmii()
- From: "Russell King (Oracle)" <linux@xxxxxxxxxxxxxxx>
- Re: [PATCH net-next 3/6] net: stmmac: intel-plat: use stmmac_set_tx_clk_gmii()
- From: Serge Semin <fancer.lancer@xxxxxxxxx>
- Re: [PATCH net-next 2/6] net: stmmac: imx: use stmmac_set_tx_clk_gmii()
- From: Serge Semin <fancer.lancer@xxxxxxxxx>
- Re: [PATCH net-next 1/6] net: stmmac: add stmmac_set_tx_clk_gmii()
- From: Serge Semin <fancer.lancer@xxxxxxxxx>
- [PATCH bpf] bpf: Fix tr dereferencing
- From: Leon Hwang <hffilwlqm@xxxxxxxxx>
[Index of Archives]
[Linux Samsung SoC]
[Linux Rockchip SoC]
[Linux for Synopsys ARC Processors]
[Linux Actions SoC]
[Linux Kernel]
[Linux USB Devel]
[Video for Linux]
[Linux SCSI]
[Scanners]
[Yosemite Forum]