Patch Series

Subject bpf: Prepare to support stack arguments
Author yonghong.song@linux.dev
Date 2026-04-23 03:34:30 +0000 UTC
Version
Cc ameryhung@gmail.com andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net jose.marchesi@oracle.com kernel-team@fb.com martin.lau@kernel.org memxor@gmail.com puranjay@kernel.org yonghong.song@linux.dev

Patches (9)

Name Content [All]
[PATCH bpf-next v3 1/9] bpf: Remove unused parameter from check_map_kptr_access() [Body]
[PATCH bpf-next v3 2/9] bpf: Fix tail_call_reachable leak [Body]
[PATCH bpf-next v3 3/9] bpf: Remove WARN_ON_ONCE in check_kfunc_mem_size_reg() [Body]
[PATCH bpf-next v3 4/9] bpf: Refactor to avoid redundant calculation of bpf_reg_state [Body]
[PATCH bpf-next v3 5/9] bpf: Refactor to handle memory and size together [Body]
[PATCH bpf-next v3 6/9] bpf: Rename existing argno to arg [Body]
[PATCH bpf-next v3 7/9] bpf: Prepare verifier logs for upcoming kfunc stack arguments [Body]
[PATCH bpf-next v3 8/9] bpf: Introduce bpf register BPF_REG_PARAMS [Body]
[PATCH bpf-next v3 9/9] bpf: Reuse MAX_BPF_FUNC_ARGS for maximum number of arguments [Body]
Session 2026-04-23
ID (for dev) 9b1d641c-56fc-4023-93f5-a007c4cc3e49
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 7f843c0584f438c1cc8cbe798ca8ab4207e67509 [Config] passed [Log]
[KASAN] Boot test: Base 7f843c0584f438c1cc8cbe798ca8ab4207e67509 [Config] passed [Log]
[KASAN] Build Patched 7f843c0584f438c1cc8cbe798ca8ab4207e67509 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 7f843c0584f438c1cc8cbe798ca8ab4207e67509 [Config] [patched] passed [Log]
[KASAN] Fuzz 7f843c0584f438c1cc8cbe798ca8ab4207e67509 [Config] 7f843c0584f438c1cc8cbe798ca8ab4207e67509 [Config] [patched] passed [Log] [Artifacts]