| Subject | bpf: Bump maximum runtime call stack depth to 16 |
|---|---|
| Author | emil@etsalapatis.com |
| Date | 2026-02-10 21:36:06 +0000 UTC |
| Version | |
| Cc | andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com emil@etsalapatis.com martin.lau@kernel.org memxor@gmail.com song@kernel.org yonghong.song@linux.dev |
| Name | Content [All] |
|---|---|
| [PATCH bpf-next v2] bpf: Bump maximum runtime call stack depth to 16 | [Body] |
| ID (for dev) | 96e84925-71f9-4271-adb0-520b4018d098 |
|---|---|
| Status | finished |
| Triaged | OK [Log] |
| Execution Log | [Link] |
| Test | Base | Patched | Verdict |
|---|---|---|---|
| [KASAN] Build Base | db975debcb8c4cd367a78811bc1ba84c83f854bd [Config] | passed [Log] | |
| [KASAN] Boot test: Base | db975debcb8c4cd367a78811bc1ba84c83f854bd [Config] | passed [Log] | |
| [KASAN] Build Patched | db975debcb8c4cd367a78811bc1ba84c83f854bd [Config] [patched] | passed [Log] | |
| [KASAN] Boot test: Patched | db975debcb8c4cd367a78811bc1ba84c83f854bd [Config] [patched] | passed [Log] | |
| [KASAN] Fuzzing | db975debcb8c4cd367a78811bc1ba84c83f854bd [Config] | db975debcb8c4cd367a78811bc1ba84c83f854bd [Config] [patched] | passed [Log] [Artifacts] |