Date |
List |
Subject |
2024-03-22 15:13:13
|
linux-kernel
|
Re: [PATCH bpf v4] bpf: verifier: prevent userspace memory access |
2024-03-22 14:38:57
|
linux-kernel
|
[PATCH bpf] bpf: verifier: fix NULL pointer dereference in do_misc_fixups() |
2024-03-22 13:45:09
|
linux-kernel
|
[PATCH bpf] selftests/bpf: verifier_arena: fix mmap address for arm64 |
2024-03-21 16:05:27
|
linux-kernel
|
[RESEND PATCH bpf] bpf: verifier: fix addr_space_cast from as(1) to as(0) |
2024-03-21 15:57:02
|
linux-kernel
|
[PATCH bpf-next v2 1/2] bpf: Add arm64 JIT support for PROBE_MEM32 pseudo instructions. |
2024-03-21 15:56:38
|
linux-kernel
|
[PATCH bpf-next v2 0/2] bpf,arm64: Add support for BPF Arena |
2024-03-21 15:43:45
|
linux-kernel
|
Re: [PATCH bpf] bpf: verifier: fix addr_space_cast from as(1) to as(0) |
2024-03-21 15:39:04
|
linux-kernel
|
[PATCH bpf-next v2 2/2] bpf: Add arm64 JIT support for bpf_addr_space_cast instruction. |
2024-03-21 12:47:06
|
linux-kernel
|
[PATCH bpf v4] bpf: verifier: prevent userspace memory access |
2024-03-21 12:31:11
|
linux-kernel
|
Re: [PATCH bpf v3] bpf: verifier: prevent userspace memory access |
2024-03-21 12:09:12
|
linux-kernel
|
[PATCH bpf v3] bpf: verifier: prevent userspace memory access |
2024-03-21 11:49:12
|
linux-kernel
|
Re: [PATCH bpf v2] bpf: verifier: prevent userspace memory access |
2024-03-21 10:13:23
|
linux-kernel
|
Re: [PATCH bpf] bpf: verifier: prevent userspace memory access |
2024-03-21 10:11:28
|
linux-kernel
|
[PATCH bpf v2] bpf: verifier: prevent userspace memory access |
2024-03-20 15:46:56
|
linux-kernel
|
Re: [PATCH bpf-next] arm64: bpf: zero upper bits after rev32 |
2024-03-20 10:55:20
|
linux-kernel
|
[PATCH bpf] bpf: verifier: prevent userspace memory access |
2024-03-15 10:33:05
|
linux-kernel
|
Re: [PATCH bpf-next 1/2] bpf: Add arm64 JIT support for PROBE_MEM32 pseudo instructions. |
2024-03-14 17:49:47
|
linux-kernel
|
[PATCH bpf] bpf: Temporarily disable atomic operations in BPF arena |
2024-03-14 17:14:11
|
linux-kernel
|
Re: [PATCH bpf-next 1/2] bpf: Add arm64 JIT support for PROBE_MEM32 pseudo instructions. |
2024-03-14 15:00:46
|
linux-kernel
|
[PATCH bpf-next 2/2] bpf: Add arm64 JIT support for bpf_addr_space_cast instruction. |
2024-03-14 15:00:37
|
linux-kernel
|
[PATCH bpf-next 1/2] bpf: Add arm64 JIT support for PROBE_MEM32 pseudo instructions. |
2024-03-14 15:00:25
|
linux-kernel
|
[PATCH bpf-next 0/2] bpf,arm64: Add support for BPF Arena |
2024-03-14 14:16:48
|
linux-kernel
|
Re: [RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS |
2024-03-12 23:59:50
|
linux-kernel
|
[PATCH bpf] bpf, arm64: fix bug in BPF_LDX_MEMSX |
2024-03-11 12:27:40
|
linux-kernel
|
[PATCH bpf-next v2] bpf: hardcode BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() |
2024-03-08 14:23:49
|
linux-kernel
|
Re: [RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS |
2024-03-08 14:13:24
|
linux-kernel
|
Re: [RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS |
2024-03-08 12:07:41
|
linux-kernel
|
[PATCH bpf-next] bpf: cap BPF_PROG_PACK_SIZE to 2MB * num_possible_nodes() |
2024-03-07 20:02:06
|
linux-kernel
|
Re: [RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS |
2024-03-07 00:19:20
|
linux-kernel
|
Re: [RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS |
2024-03-06 17:00:43
|
linux-kernel
|
[RFC PATCH] riscv: Implement HAVE_DYNAMIC_FTRACE_WITH_CALL_OPS |
2024-03-04 20:29:57
|
linux-kernel
|
[PATCH bpf-next] arm64, bpf: Use bpf_prog_pack for arm64 bpf trampoline |
2024-03-03 17:02:58
|
linux-kernel
|
[PATCH bpf-next 1/1] riscv64/cfi,bpf: Support kCFI + BPF on riscv64 |
2024-03-03 17:02:42
|
linux-kernel
|
[PATCH bpf-next 0/1] Support kCFI + BPF on riscv64 |
2024-03-02 14:52:38
|
linux-kernel
|
[PATCH] arm64: head: remove unnecessary instructions from __relocate_kernel |
2024-02-29 23:16:59
|
linux-kernel
|
[PATCH] arm64: prohibit probing on arch_kunwind_consume_entry() |
2024-02-29 19:44:10
|
linux-kernel
|
Re: arm64: Supporting DYNAMIC_FTRACE_WITH_CALL_OPS with CLANG_CFI |
2024-02-28 23:27:35
|
linux-kernel
|
arm64: Supporting DYNAMIC_FTRACE_WITH_CALL_OPS with CLANG_CFI |
2024-02-28 14:39:51
|
linux-kernel
|
[PATCH bpf-next v9 2/2] bpf, arm64: use bpf_prog_pack for memory management |
2024-02-28 14:21:10
|
linux-kernel
|
Re: [PATCH bpf-next v8 0/2] bpf, arm64: use BPF prog pack allocator in BPF JIT |
2024-02-28 14:19:14
|
linux-kernel
|
[PATCH bpf-next v9 1/2] arm64: patching: implement text_poke API |
2024-02-28 14:18:57
|
linux-kernel
|
[PATCH bpf-next v9 0/2] bpf, arm64: use BPF prog pack allocator in BPF JIT |
2024-02-27 15:17:12
|
linux-kernel
|
[PATCH bpf-next 1/1] arm64/cfi,bpf: Support kCFI + BPF on arm64 |
2024-02-27 15:13:32
|
linux-kernel
|
[PATCH bpf-next 0/1] Support kCFI + BPF on arm64 |
2024-02-21 14:52:13
|
linux-kernel
|
[PATCH bpf-next v8 2/2] bpf, arm64: use bpf_prog_pack for memory management |
2024-02-21 14:51:55
|
linux-kernel
|
[PATCH bpf-next v8 1/2] arm64: patching: implement text_poke API |
2024-02-21 14:51:39
|
linux-kernel
|
[PATCH bpf-next v8 0/2] bpf, arm64: use BPF prog pack allocator in BPF JIT |
2024-02-19 15:15:37
|
linux-kernel
|
Re: [PATCH bpf-next v7 1/2] arm64: patching: implement text_poke API |
2024-02-19 15:08:56
|
linux-kernel
|
Re: [PATCH bpf-next 2/2] bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro() |
2024-02-01 12:53:35
|
linux-kernel
|
[PATCH bpf-next v3 2/2] bpf, arm64: support exceptions |
2024-02-01 12:53:15
|
linux-kernel
|
[PATCH bpf-next v3 1/2] arm64: stacktrace: Implement arch_bpf_stack_walk() for the BPF JIT |