[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id:
<175870741477.2114834.11872828252359824573.git-patchwork-notify@kernel.org>
Date: Wed, 24 Sep 2025 09:50:14 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Jiri Olsa <jolsa@...nel.org>
Cc: oleg@...hat.com, mhiramat@...nel.org, peterz@...radead.org,
andrii@...nel.org, bpf@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-trace-kernel@...r.kernel.org, x86@...nel.org, songliubraving@...com,
yhs@...com, john.fastabend@...il.com, haoluo@...gle.com, rostedt@...dmis.org,
mingo@...nel.org
Subject: Re: [PATCHv4 bpf-next 0/6] uprobe,bpf: Allow to change app registers
from
uprobe registers
Hello:
This series was applied to bpf/bpf-next.git (master)
by Alexei Starovoitov <ast@...nel.org>:
On Tue, 16 Sep 2025 23:52:55 +0200 you wrote:
> hi,
> we recently had several requests for tetragon to be able to change
> user application function return value or divert its execution through
> instruction pointer change.
>
> This patchset adds support for uprobe program to change app's registers
> including instruction pointer.
>
> [...]
Here is the summary with links:
- [PATCHv4,bpf-next,1/6] bpf: Allow uprobe program to change context registers
https://git.kernel.org/bpf/bpf-next/c/7384893d970e
- [PATCHv4,bpf-next,2/6] uprobe: Do not emulate/sstep original instruction when ip is changed
https://git.kernel.org/bpf/bpf-next/c/4363264111e1
- [PATCHv4,bpf-next,3/6] selftests/bpf: Add uprobe context registers changes test
https://git.kernel.org/bpf/bpf-next/c/7f8a05c5d388
- [PATCHv4,bpf-next,4/6] selftests/bpf: Add uprobe context ip register change test
https://git.kernel.org/bpf/bpf-next/c/6a4ea0d1cb44
- [PATCHv4,bpf-next,5/6] selftests/bpf: Add kprobe write ctx attach test
https://git.kernel.org/bpf/bpf-next/c/1b881ee294b2
- [PATCHv4,bpf-next,6/6] selftests/bpf: Add kprobe multi write ctx attach test
https://git.kernel.org/bpf/bpf-next/c/3d237467a444
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists