Patch Series

Subject bpf: refactor max_depth computation in bpf_get_stack()
Author contact@arnaud-lcm.com
Date 2025-08-12 19:30:34 +0000 UTC
Version 3
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org contact@arnaud-lcm.com daniel@iogearbox.net eddyz87@gmail.com haoluo@google.com john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org linux-kernel@vger.kernel.org martin.lau@linux.dev sdf@fomichev.me song@kernel.org syzbot@syzkaller.appspotmail.com syzkaller-bugs@googlegroups.com yonghong.song@linux.dev

Patches (2)

Name Content
[PATCH bpf-next v3 1/2] bpf: refactor max_depth computation in bpf_get_stack() [Body]
[PATCH bpf-next v3 2/2] bpf: fix stackmap overflow check in __bpf_get_stackid() [Body]

Session 2025-08-12

ID (for dev) 2c989d98-1bec-4fb7-aa22-b156e94f0e59
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
Build Base 07866544e410e4c895a729971e4164861b41fad5 [Config] passed [Log]
Build Patched 07866544e410e4c895a729971e4164861b41fad5 [Config] [patched] passed [Log]
Boot test: Base 07866544e410e4c895a729971e4164861b41fad5 [Config] passed
Boot test: Patched 07866544e410e4c895a729971e4164861b41fad5 [Config] [patched] passed
Fuzzing 07866544e410e4c895a729971e4164861b41fad5 [Config] 07866544e410e4c895a729971e4164861b41fad5 [Config] [patched] passed [Log] [Artifacts]