Hello:
This series was applied to bpf/bpf-next.git (master)
by Alexei Starovoitov <[email protected]>:
On Tue, 16 Sep 2025 23:52:55 +0200 you wrote:
> hi,
> we recently had several requests for tetragon to be able to change
> user application function return value or divert its execution through
> instruction pointer change.
>
> This patchset adds support for uprobe program to change app's registers
> including instruction pointer.
>
> [...]
Here is the summary with links:
- [PATCHv4,bpf-next,1/6] bpf: Allow uprobe program to change context registers
https://git.kernel.org/bpf/bpf-next/c/7384893d970e
- [PATCHv4,bpf-next,2/6] uprobe: Do not emulate/sstep original instruction
when ip is changed
https://git.kernel.org/bpf/bpf-next/c/4363264111e1
- [PATCHv4,bpf-next,3/6] selftests/bpf: Add uprobe context registers changes
test
https://git.kernel.org/bpf/bpf-next/c/7f8a05c5d388
- [PATCHv4,bpf-next,4/6] selftests/bpf: Add uprobe context ip register change
test
https://git.kernel.org/bpf/bpf-next/c/6a4ea0d1cb44
- [PATCHv4,bpf-next,5/6] selftests/bpf: Add kprobe write ctx attach test
https://git.kernel.org/bpf/bpf-next/c/1b881ee294b2
- [PATCHv4,bpf-next,6/6] selftests/bpf: Add kprobe multi write ctx attach test
https://git.kernel.org/bpf/bpf-next/c/3d237467a444
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html