Patch Series

Subject bpf: refactor max_depth computation in bpf_get_stack()
Author contact@arnaud-lcm.com
Date 2025-08-13 20:46:05 +0000 UTC
Version 4
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org contact@arnaud-lcm.com daniel@iogearbox.net eddyz87@gmail.com haoluo@google.com john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org linux-kernel@vger.kernel.org martin.lau@linux.dev sdf@fomichev.me song@kernel.org syzbot@syzkaller.appspotmail.com syzkaller-bugs@googlegroups.com yonghong.song@linux.dev

Patches (2)

Name Content
[PATCH bpf-next v4 1/2] bpf: refactor max_depth computation in bpf_get_stack() [Body]
[PATCH bpf-next v4 2/2] bpf: fix stackmap overflow check in __bpf_get_stackid() [Body]

Session 2025-08-13

ID (for dev) fba994be-745a-407e-a576-a770ef144b3b
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
Build Base 07866544e410e4c895a729971e4164861b41fad5 [Config] passed [Log]
Build Patched 07866544e410e4c895a729971e4164861b41fad5 [Config] [patched] passed [Log]
Boot test: Patched 07866544e410e4c895a729971e4164861b41fad5 [Config] [patched] passed
Boot test: Base 07866544e410e4c895a729971e4164861b41fad5 [Config] passed
Fuzzing 07866544e410e4c895a729971e4164861b41fad5 [Config] 07866544e410e4c895a729971e4164861b41fad5 [Config] [patched] passed [Log] [Artifacts]