On Mon, Nov 09, 2020 at 02:22:28PM +, Kevin Sheldrake wrote:
> I triggered the corruption by sending samples larger than 64KB-24 bytes
> to a perf ring buffer from eBPF using bpf_perf_event_output(). The u16
> that holds the size in the struct perf_event_header is overflowed and
> the distanc
NAL] Re: [PATCH bpf-next v2] Update perf ring buffer to
> prevent corruption
>
> On Thu, Nov 05, 2020 at 08:19:47PM -0800, Alexei Starovoitov wrote:
> > On Thu, Nov 5, 2020 at 7:18 AM Kevin Sheldrake
> > wrote:
> > >
> > > Resent due to some f