Hello:

This series was applied to bpf/bpf-next.git (master)
by Alexei Starovoitov <[email protected]>:

On Tue, 16 Sep 2025 23:52:55 +0200 you wrote:
> hi,
> we recently had several requests for tetragon to be able to change
> user application function return value or divert its execution through
> instruction pointer change.
> 
> This patchset adds support for uprobe program to change app's registers
> including instruction pointer.
> 
> [...]

Here is the summary with links:
  - [PATCHv4,bpf-next,1/6] bpf: Allow uprobe program to change context registers
    https://git.kernel.org/bpf/bpf-next/c/7384893d970e
  - [PATCHv4,bpf-next,2/6] uprobe: Do not emulate/sstep original instruction 
when ip is changed
    https://git.kernel.org/bpf/bpf-next/c/4363264111e1
  - [PATCHv4,bpf-next,3/6] selftests/bpf: Add uprobe context registers changes 
test
    https://git.kernel.org/bpf/bpf-next/c/7f8a05c5d388
  - [PATCHv4,bpf-next,4/6] selftests/bpf: Add uprobe context ip register change 
test
    https://git.kernel.org/bpf/bpf-next/c/6a4ea0d1cb44
  - [PATCHv4,bpf-next,5/6] selftests/bpf: Add kprobe write ctx attach test
    https://git.kernel.org/bpf/bpf-next/c/1b881ee294b2
  - [PATCHv4,bpf-next,6/6] selftests/bpf: Add kprobe multi write ctx attach test
    https://git.kernel.org/bpf/bpf-next/c/3d237467a444

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



Reply via email to