{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":362632248,"defaultBranch":"main","name":"linux","ownerLogin":"kkdwivedi","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2021-04-28T23:22:26.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/47572208?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1714383948.0","currentOid":""},"activityList":{"items":[{"before":"a6b7ebbd298c4e877db3713c1a169731109fa780","after":"b26da4a2a82e4c8f28e45df625cb01061f6fadb1","ref":"refs/heads/perfmode","pushedAt":"2024-05-15T23:05:45.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"bpf, x86: Skip bounds checking for PROBE_MEM with SMAP\n\nThe previous patch changed the do_user_addr_fault page fault handler to\ninvoke BPF's fixup routines (by searching exception tables and calling\nex_handler_bpf). This would only occur when SMAP is enabled, such that\nany user address access from BPF programs running in kernel mode would\nreach this path and invoke the fixup routines.\n\nRelying on this behavior, disable any bounds checking instrumentation in\nthe BPF JIT for x86 when X86_FEATURE_SMAP is available. All BPF\nprograms execute with SMAP enabled, therefore when this feature is\navailable, we can assume that SMAP will be enabled during program\nexecution at runtime.\n\nThis optimizes PROBE_MEM loads down to a normal unchecked load\ninstruction. Any page faults for user or kernel addresses will be\nhandled using the fixup routines, and the generation exception table\nentries for such load instructions.\n\nAll in all, this ensures that PROBE_MEM loads will now incur no runtime\noverhead, and become practically free.\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"bpf, x86: Skip bounds checking for PROBE_MEM with SMAP"}},{"before":"1ad6c0dcd78399c4cbfd701c01a18bb0f59f45cf","after":"35af3df689719afd6948143e98fc69cdd7b25f97","ref":"refs/heads/lock","pushedAt":"2024-04-29T16:14:47.000Z","pushType":"push","commitsCount":3,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"locktorture: Dont BUG_ON for null node, skip operation\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"locktorture: Dont BUG_ON for null node, skip operation"}},{"before":null,"after":"1ad6c0dcd78399c4cbfd701c01a18bb0f59f45cf","ref":"refs/heads/lock","pushedAt":"2024-04-29T09:45:48.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"Revert \"bpf: Remove spin in bpf_lock_release.\"\n\nThis reverts commit 2642e87378863730fc8dc9835aafba3fcd48b16e.","shortMessageHtmlLink":"Revert \"bpf: Remove spin in bpf_lock_release.\""}},{"before":"456d08b19c16f78a6c8329a434b590d1276ae187","after":"a6b7ebbd298c4e877db3713c1a169731109fa780","ref":"refs/heads/perfmode","pushedAt":"2024-04-25T12:16:59.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"bpf, x86: Skip bounds checking for PROBE_MEM with SMAP\n\nThe previous patch changed the do_user_addr_fault page fault handler to\ninvoke BPF's fixup routines (by searching exception tables and calling\nex_handler_bpf). This would only occur when SMAP is enabled, such that\nany user address access from BPF programs running in kernel mode would\nreach this path and invoke the fixup routines.\n\nRelying on this behavior, disable any bounds checking instrumentation in\nthe BPF JIT for x86 when X86_FEATURE_SMAP is available. All BPF\nprograms execute with SMAP enabled, therefore when this feature is\navailable, we can assume that SMAP will be enabled during program\nexecution at runtime.\n\nThis optimizes PROBE_MEM loads down to a normal unchecked load\ninstruction. Any page faults for user or kernel addresses will be\nhandled using the fixup routines, and the generation exception table\nentries for such load instructions.\n\nAll in all, this ensures that PROBE_MEM loads will now incur no runtime\noverhead, and become practically free.\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"bpf, x86: Skip bounds checking for PROBE_MEM with SMAP"}},{"before":"35c1721e76b4a5e189a0320a1b67b02641dec6a4","after":"456d08b19c16f78a6c8329a434b590d1276ae187","ref":"refs/heads/perfmode","pushedAt":"2024-04-25T11:51:10.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"bpf, x86: Skip bounds checking for PROBE_MEM with SMAP\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"bpf, x86: Skip bounds checking for PROBE_MEM with SMAP"}},{"before":"9b231036c0cd2d300351632e6d501839fb55c1db","after":null,"ref":"refs/heads/lock","pushedAt":"2024-04-24T09:49:43.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"}},{"before":null,"after":"35c1721e76b4a5e189a0320a1b67b02641dec6a4","ref":"refs/heads/perfmode","pushedAt":"2024-04-24T09:49:20.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"bpf, x86: Skip bounds checking for PROBE_MEM with SMAP\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"bpf, x86: Skip bounds checking for PROBE_MEM with SMAP"}},{"before":"c4a5d6fda76d9d5d026f0e6c18737387f4ab6d63","after":"9b231036c0cd2d300351632e6d501839fb55c1db","ref":"refs/heads/lock","pushedAt":"2024-04-23T01:18:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add PoC\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add PoC"}},{"before":"36f46309e791c663121c5c33a0baa40d715bbc31","after":"c4a5d6fda76d9d5d026f0e6c18737387f4ab6d63","ref":"refs/heads/lock","pushedAt":"2024-04-23T00:48:05.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add PoC\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add PoC"}},{"before":"b01c9017225d3cdaa2d8237a8145da76dae88115","after":"36f46309e791c663121c5c33a0baa40d715bbc31","ref":"refs/heads/lock","pushedAt":"2024-04-23T00:19:51.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add PoC\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add PoC"}},{"before":null,"after":"b01c9017225d3cdaa2d8237a8145da76dae88115","ref":"refs/heads/lock","pushedAt":"2024-04-23T00:18:49.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add PoC\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add PoC"}},{"before":"05f43eaaaee7df5103a208de52fcbf5d61d9f1ab","after":"9ee3e061d90025b128d69da704d00c0089750e9a","ref":"refs/heads/exceptions","pushedAt":"2024-04-11T23:37:29.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add tests for exceptions runtime cleanup\n\nAdd tests for the runtime cleanup support for exceptions, ensuring that\nresources are correctly identified and released when an exception is\nthrown. Also, we add negative tests to exercise corner cases the\nverifier should reject.\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add tests for exceptions runtime cleanup"}},{"before":"b28207e910830322d270df672c9486daa09de342","after":"05f43eaaaee7df5103a208de52fcbf5d61d9f1ab","ref":"refs/heads/exceptions","pushedAt":"2024-04-11T23:34:30.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add tests for exceptions runtime cleanup\n\nAdd tests for the runtime cleanup support for exceptions, ensuring that\nresources are correctly identified and released when an exception is\nthrown. Also, we add negative tests to exercise corner cases the\nverifier should reject.\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add tests for exceptions runtime cleanup"}},{"before":"5bae0b03a75b8d7a85a925cab47b455b3510824f","after":"b28207e910830322d270df672c9486daa09de342","ref":"refs/heads/exceptions","pushedAt":"2024-03-18T17:05:30.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"Fixup arch_bpf_cleanup_frame_resource error\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"Fixup arch_bpf_cleanup_frame_resource error"}},{"before":"16b46b9c3ef54a3bc0f8198c61204420b4d2c30d","after":null,"ref":"refs/heads/arena","pushedAt":"2024-03-14T17:58:28.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"}},{"before":null,"after":"16b46b9c3ef54a3bc0f8198c61204420b4d2c30d","ref":"refs/heads/arena","pushedAt":"2024-03-14T17:36:05.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"bpf: Temporarily disable atomic operations in BPF arena\n\nCurrently, the x86 JIT handling PROBE_MEM32 tagged accesses is not\nequipped to handle atomic accesses into PTR_TO_ARENA, as no PROBE_MEM32\ntagging is performed and no handling is enabled for them.\n\nThis will lead to unsafety as the offset into arena will dereferenced\ndirectly without turning it into a base + offset access into the arena\nregion.\n\nSince the changes to the x86 JIT will be fairly involved, for now,\ntemporarily disallow use of PTR_TO_ARENA as the destination operand for\natomics until support is added to the JIT backend.\n\nFixes: 2fe99eb0ccf2 (\"bpf: Add x86-64 JIT support for PROBE_MEM32 pseudo instructions.\")\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"bpf: Temporarily disable atomic operations in BPF arena"}},{"before":"903edf16318e27f1edbcf05f4d02b5a7c9a8582d","after":"5bae0b03a75b8d7a85a925cab47b455b3510824f","ref":"refs/heads/exceptions","pushedAt":"2024-03-06T10:12:05.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"Fixup arch_bpf_cleanup_frame_resource error\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"Fixup arch_bpf_cleanup_frame_resource error"}},{"before":"670df5e0ac97a5f9d8f98598f2083c6cfdca86ba","after":"903edf16318e27f1edbcf05f4d02b5a7c9a8582d","ref":"refs/heads/exceptions","pushedAt":"2024-03-02T13:03:07.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"[TEST] spin_lock abort test","shortMessageHtmlLink":"[TEST] spin_lock abort test"}},{"before":"bc1b60f963d450b2fa3d93997f0267151af96315","after":null,"ref":"refs/heads/runtime","pushedAt":"2024-03-02T12:59:05.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"}},{"before":null,"after":"bc1b60f963d450b2fa3d93997f0267151af96315","ref":"refs/heads/runtime","pushedAt":"2024-03-02T12:58:32.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"Revert \"bpf: Revert aligned allocation change\"\n\nLet's try aligned allocation approach again, and trace why we get\n-ENOMEM.\n\nThis reverts commit b2b4de98c6df95022a8eaa0856d4aa90cdd6a434.","shortMessageHtmlLink":"Revert \"bpf: Revert aligned allocation change\""}},{"before":"b96fe3797599e718153a1443acfad05da22b764d","after":"cb97e6c101c332520f6adb672b9b1d0acf5f30d0","ref":"refs/heads/iter-fix","pushedAt":"2024-02-22T08:57:02.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"iter fix + test\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"iter fix + test"}},{"before":null,"after":"b96fe3797599e718153a1443acfad05da22b764d","ref":"refs/heads/iter-fix","pushedAt":"2024-02-22T08:53:35.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"iter fix + test\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"iter fix + test"}},{"before":"f7afaaaf41f1c17d0aa2544c6d5fedca62093f4a","after":"670df5e0ac97a5f9d8f98598f2083c6cfdca86ba","ref":"refs/heads/exceptions","pushedAt":"2024-02-09T17:42:33.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"[TEST] spin_lock abort test","shortMessageHtmlLink":"[TEST] spin_lock abort test"}},{"before":"c2327f3762b0ce1c67c58245049c74b1a99ee8a1","after":"1c1f6081bdac888e373ced3ba0afa76a6e4d9b87","ref":"refs/heads/scx-misc","pushedAt":"2024-02-09T17:41:37.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add tests for RCU lock transfer between subprogs\n\nAdd selftests covering the following cases:\n- A static or global subprog called from within a RCU read section works\n- A static subprog taking an RCU read lock which is released in caller works\n- A static subprog releasing the caller's RCU read lock works\n\nGlobal subprogs that leave the lock in an imbalanced state will not\nwork, as they are verified separately, so ensure those cases fail as\nwell.\n\nAcked-by: Yonghong Song \nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add tests for RCU lock transfer between subprogs"}},{"before":"09e57594311192145e2784501459afc36fe4b0ea","after":"c2327f3762b0ce1c67c58245049c74b1a99ee8a1","ref":"refs/heads/scx-misc","pushedAt":"2024-02-04T22:24:32.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add test for static subprog call in lock cs\n\nAdd selftests for static subprog calls within bpf_spin_lock critical\nsection, and ensure we still reject global subprog calls. Also test the\ncase where a subprog call will unlock the caller's held lock, or the\ncaller will unlock a lock taken by a subprog call, ensuring correct\ntransfer of lock state across frames on exit.\n\nAcked-by: Yonghong Song \nAcked-by: David Vernet \nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add test for static subprog call in lock cs"}},{"before":"a2bea773d47f0995a7718dc9f4fe0d6f5bb490ce","after":"f7afaaaf41f1c17d0aa2544c6d5fedca62093f4a","ref":"refs/heads/exceptions","pushedAt":"2024-02-04T12:59:20.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"spin_lock abort test","shortMessageHtmlLink":"spin_lock abort test"}},{"before":null,"after":"09e57594311192145e2784501459afc36fe4b0ea","ref":"refs/heads/scx-misc","pushedAt":"2024-02-04T12:02:22.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add test for static subprog call in lock cs\n\nAdd selftests for static subprog calls within bpf_spin_lock critical\nsection, and ensure we still reject global subprog calls. Also test the\ncase where a subprog call will unlock the caller's held lock, or the\ncaller will unlock a lock taken by a subprog call, ensuring correct\ntransfer of lock state across frames on exit.\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add test for static subprog call in lock cs"}},{"before":"51176f1f5b5c4d618e9339d7417f3b0365cd0d84","after":"a2bea773d47f0995a7718dc9f4fe0d6f5bb490ce","ref":"refs/heads/exceptions","pushedAt":"2024-02-01T04:18:28.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add tests for exceptions runtime cleanup\n\nAdd tests for the runtime cleanup support for exceptions, ensuring that\nresources are correctly identified and released when an exception is\nthrown. Also, we add negative tests to exercise corner cases the\nverifier should reject.\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add tests for exceptions runtime cleanup"}},{"before":"392e77debf0a8c4c1f6514d060e58ed71656a3a7","after":"51176f1f5b5c4d618e9339d7417f3b0365cd0d84","ref":"refs/heads/exceptions","pushedAt":"2024-02-01T03:50:04.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add tests for exceptions runtime cleanup\n\nAdd tests for the runtime cleanup support for exceptions, ensuring that\nresources are correctly identified and released when an exception is\nthrown. Also, we add negative tests to exercise corner cases the\nverifier should reject.\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add tests for exceptions runtime cleanup"}},{"before":"fb4ee32f702fea4aed29174fe2a5d40a9870a3ad","after":"392e77debf0a8c4c1f6514d060e58ed71656a3a7","ref":"refs/heads/exceptions","pushedAt":"2024-01-31T23:07:17.000Z","pushType":"force_push","commitsCount":0,"pusher":{"login":"kkdwivedi","name":"Kumar Kartikeya Dwivedi","path":"/kkdwivedi","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/47572208?s=80&v=4"},"commit":{"message":"selftests/bpf: Add tests for exceptions runtime cleanup\n\nAdd tests for the runtime cleanup support for exceptions, ensuring that\nresources are correctly identified and released when an exception is\nthrown. Also, we add negative tests to exercise corner cases the\nverifier should reject.\n\nSigned-off-by: Kumar Kartikeya Dwivedi ","shortMessageHtmlLink":"selftests/bpf: Add tests for exceptions runtime cleanup"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAESwwMzAA","startCursor":null,"endCursor":null}},"title":"Activity ยท kkdwivedi/linux"}