Patch Series

Subject bpf: replace path-sensitive with path-insensitive live stack analysis
Author eddyz87@gmail.com
Date 2025-09-11 01:04:26 +0000 UTC
Version 1
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com kernel-team@fb.com martin.lau@linux.dev yonghong.song@linux.dev

Patches (10)

Name Content
[PATCH bpf-next v1 01/10] bpf: bpf_verifier_state->cleaned flag instead of REG_LIVE_DONE [Body]
[PATCH bpf-next v1 02/10] bpf: use compute_live_registers() info in clean_func_state [Body]
[PATCH bpf-next v1 03/10] bpf: remove redundant REG_LIVE_READ check in stacksafe() [Body]
[PATCH bpf-next v1 04/10] bpf: declare a few utility functions as internal api [Body]
[PATCH bpf-next v1 05/10] bpf: compute instructions postorder per subprogram [Body]
[PATCH bpf-next v1 06/10] bpf: callchain sensitive stack liveness tracking using CFG [Body]
[PATCH bpf-next v1 07/10] bpf: enable callchain sensitive stack liveness tracking [Body]
[PATCH bpf-next v1 08/10] bpf: signal error if old liveness is more conservative than new [Body]
[PATCH bpf-next v1 09/10] bpf: disable and remove registers chain based liveness [Body]
[PATCH bpf-next v1 10/10] bpf: table based bpf_insn_successors() [Body]

Session 2025-09-11

ID (for dev) 69a740b4-3d0b-4c0b-ae02-d0ec7b525e75
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
Build Base e12873ee856ffa6f104869b8ea10c0f741606f13 [Config] passed [Log]
Build Patched e12873ee856ffa6f104869b8ea10c0f741606f13 [Config] [patched] passed [Log]
Boot test: Patched e12873ee856ffa6f104869b8ea10c0f741606f13 [Config] [patched] passed
Boot test: Base e12873ee856ffa6f104869b8ea10c0f741606f13 [Config] passed
Fuzzing e12873ee856ffa6f104869b8ea10c0f741606f13 [Config] e12873ee856ffa6f104869b8ea10c0f741606f13 [Config] [patched] passed [Log] [Artifacts]
KASAN: slab-out-of-bounds Write in compute_postorder [Log] [Syz Repro] [C Repro]