Puranjay Mohan ([email protected])

Number of posts: 313 (0.17 per day)
First post: 2019-06-18 04:14:05
Last post: 2024-06-14 12:15:10

Date List Subject
2024-03-22 15:13:13 linux-kernel Re: [PATCH bpf v4] bpf: verifier: prevent userspace memory access
2024-03-22 14:38:57 linux-kernel [PATCH bpf] bpf: verifier: fix NULL pointer dereference in do_misc_fixups()
2024-03-22 13:45:09 linux-kernel [PATCH bpf] selftests/bpf: verifier_arena: fix mmap address for arm64
2024-03-21 16:05:27 linux-kernel [RESEND PATCH bpf] bpf: verifier: fix addr_space_cast from as(1) to as(0)
2024-03-21 15:57:02 linux-kernel [PATCH bpf-next v2 1/2] bpf: Add arm64 JIT support for PROBE_MEM32 pseudo instructions.
2024-03-21 15:56:38 linux-kernel [PATCH bpf-next v2 0/2] bpf,arm64: Add support for BPF Arena
2024-03-21 15:43:45 linux-kernel Re: [PATCH bpf] bpf: verifier: fix addr_space_cast from as(1) to as(0)
2024-03-21 15:39:04 linux-kernel [PATCH bpf-next v2 2/2] bpf: Add arm64 JIT support for bpf_addr_space_cast instruction.
2024-03-21 12:47:06 linux-kernel [PATCH bpf v4] bpf: verifier: prevent userspace memory access
2024-03-21 12:31:11 linux-kernel Re: [PATCH bpf v3] bpf: verifier: prevent userspace memory access
2024-03-21 12:09:12 linux-kernel [PATCH bpf v3] bpf: verifier: prevent userspace memory access
2024-03-21 11:49:12 linux-kernel Re: [PATCH bpf v2] bpf: verifier: prevent userspace memory access
2024-03-21 10:13:23 linux-kernel Re: [PATCH bpf] bpf: verifier: prevent userspace memory access
2024-03-21 10:11:28 linux-kernel [PATCH bpf v2] bpf: verifier: prevent userspace memory access
2024-03-20 15:46:56 linux-kernel Re: [PATCH bpf-next] arm64: bpf: zero upper bits after rev32
2024-03-20 10:55:20 linux-kernel [PATCH bpf] bpf: verifier: prevent userspace memory access
2024-03-15 10:33:05 linux-kernel Re: [PATCH bpf-next 1/2] bpf: Add arm64 JIT support for PROBE_MEM32 pseudo instructions.
2024-03-14 17:49:47 linux-kernel [PATCH bpf] bpf: Temporarily disable atomic operations in BPF arena
2024-03-14 17:14:11 linux-kernel Re: [PATCH bpf-next 1/2] bpf: Add arm64 JIT support for PROBE_MEM32 pseudo instructions.
2024-03-14 15:00:46 linux-kernel [PATCH bpf-next 2/2] bpf: Add arm64 JIT support for bpf_addr_space_cast instruction.
2024-03-14 15:00:37 linux-kernel [PATCH bpf-next 1/2] bpf: Add arm64 JIT support for PROBE_MEM32 pseudo instructions.
2024-03-14 15:00:25 linux-kernel [PATCH bpf-next 0/2] bpf,arm64: Add support for BPF Arena
2024-03-14 14:16:48 linux-kernel Re: [RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS
2024-03-12 23:59:50 linux-kernel [PATCH bpf] bpf, arm64: fix bug in BPF_LDX_MEMSX
2024-03-11 12:27:40 linux-kernel [PATCH bpf-next v2] bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes()
2024-03-08 14:23:49 linux-kernel Re: [RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS
2024-03-08 14:13:24 linux-kernel Re: [RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS
2024-03-08 12:07:41 linux-kernel [PATCH bpf-next] bpf: cap BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes()
2024-03-07 20:02:06 linux-kernel Re: [RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS
2024-03-07 00:19:20 linux-kernel Re: [RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS
2024-03-06 17:00:43 linux-kernel [RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS
2024-03-04 20:29:57 linux-kernel [PATCH bpf-next] arm64, bpf: Use bpf_prog_pack for arm64 bpf trampoline
2024-03-03 17:02:58 linux-kernel [PATCH bpf-next 1/1] riscv64/cfi,bpf: Support kCFI + BPF on riscv64
2024-03-03 17:02:42 linux-kernel [PATCH bpf-next 0/1] Support kCFI + BPF on riscv64
2024-03-02 14:52:38 linux-kernel [PATCH] arm64: head: remove unnecessary instructions from __relocate_kernel
2024-02-29 23:16:59 linux-kernel [PATCH] arm64: prohibit probing on arch_kunwind_consume_entry()
2024-02-29 19:44:10 linux-kernel Re: arm64: Supporting DYNAMIC_FTRACE_WITH_CALL_OPS with CLANG_CFI
2024-02-28 23:27:35 linux-kernel arm64: Supporting DYNAMIC_FTRACE_WITH_CALL_OPS with CLANG_CFI
2024-02-28 14:39:51 linux-kernel [PATCH bpf-next v9 2/2] bpf, arm64: use bpf_prog_pack for memory management
2024-02-28 14:21:10 linux-kernel Re: [PATCH bpf-next v8 0/2] bpf, arm64: use BPF prog pack allocator in BPF JIT
2024-02-28 14:19:14 linux-kernel [PATCH bpf-next v9 1/2] arm64: patching: implement text_poke API
2024-02-28 14:18:57 linux-kernel [PATCH bpf-next v9 0/2] bpf, arm64: use BPF prog pack allocator in BPF JIT
2024-02-27 15:17:12 linux-kernel [PATCH bpf-next 1/1] arm64/cfi,bpf: Support kCFI + BPF on arm64
2024-02-27 15:13:32 linux-kernel [PATCH bpf-next 0/1] Support kCFI + BPF on arm64
2024-02-21 14:52:13 linux-kernel [PATCH bpf-next v8 2/2] bpf, arm64: use bpf_prog_pack for memory management
2024-02-21 14:51:55 linux-kernel [PATCH bpf-next v8 1/2] arm64: patching: implement text_poke API
2024-02-21 14:51:39 linux-kernel [PATCH bpf-next v8 0/2] bpf, arm64: use BPF prog pack allocator in BPF JIT
2024-02-19 15:15:37 linux-kernel Re: [PATCH bpf-next v7 1/2] arm64: patching: implement text_poke API
2024-02-19 15:08:56 linux-kernel Re: [PATCH bpf-next 2/2] bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro()
2024-02-01 12:53:35 linux-kernel [PATCH bpf-next v3 2/2] bpf, arm64: support exceptions
2024-02-01 12:53:15 linux-kernel [PATCH bpf-next v3 1/2] arm64: stacktrace: Implement arch_bpf_stack_walk() for the BPF JIT