Patch Series

Subject bpf: Support stack arguments for BPF functions and kfuncs
Author yonghong.song@linux.dev
Date 2026-04-02 01:27:32 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net jose.marchesi@oracle.com kernel-team@fb.com martin.lau@kernel.org yonghong.song@linux.dev

Patches (10)

Name Content [All]
[PATCH bpf-next 01/10] bpf: Introduce bpf register BPF_REG_STACK_ARG_BASE [Body]
[PATCH bpf-next 02/10] bpf: Reuse MAX_BPF_FUNC_ARGS for maximum number of arguments [Body]
[PATCH bpf-next 03/10] bpf: Support stack arguments for bpf functions [Body]
[PATCH bpf-next 04/10] bpf: Support stack arguments for kfunc calls [Body]
[PATCH bpf-next 05/10] bpf: Reject stack arguments in non-JITed programs [Body]
[PATCH bpf-next 06/10] bpf: Enable stack argument support for x86_64 [Body]
[PATCH bpf-next 07/10] bpf,x86: Implement JIT support for stack arguments [Body]
[PATCH bpf-next 08/10] selftests/bpf: Add tests for BPF function stack arguments [Body]
[PATCH bpf-next 09/10] selftests/bpf: Add negative test for oversized kfunc stack argument [Body]
[PATCH bpf-next 10/10] selftests/bpf: Add verifier tests for stack argument validation [Body]
Session 2026-04-02
ID (for dev) e0ca8238-c1e6-4eb7-a029-2389f36582a2
Status in progress
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] passed [Log]
[KASAN] Boot test: Base 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] passed [Log]
[KASAN] Build Patched 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] passed [Log]
[KASAN] Fuzz 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] running [Log] [Artifacts]