From: patchwork-bot+netdevbpf@kernel.org
To: Daniel Borkmann <daniel@iogearbox.net>
Cc: bpf@vger.kernel.org, ast@kernel.org, eddyz87@gmail.com, info@starlabs.sg
Subject: Re: [PATCH bpf-next v2 1/4] bpf: Propagate error from visit_tailcall_insn
Date: Thu, 09 Apr 2026 01:50:09 +0000 [thread overview]
Message-ID: <177569940955.949482.17510748914664571817.git-patchwork-notify@kernel.org> (raw)
In-Reply-To: <20260408191242.526279-1-daniel@iogearbox.net>
Hello:
This series was applied to bpf/bpf-next.git (master)
by Alexei Starovoitov <ast@kernel.org>:
On Wed, 8 Apr 2026 21:12:39 +0200 you wrote:
> Commit e40f5a6bf88a ("bpf: correct stack liveness for tail calls") added
> visit_tailcall_insn() but did not check its return value.
>
> Fixes: e40f5a6bf88a ("bpf: correct stack liveness for tail calls")
> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
> ---
> kernel/bpf/verifier.c | 7 +++++--
> 1 file changed, 5 insertions(+), 2 deletions(-)
Here is the summary with links:
- [bpf-next,v2,1/4] bpf: Propagate error from visit_tailcall_insn
https://git.kernel.org/bpf/bpf-next/c/6bd96e40f31d
- [bpf-next,v2,2/4] bpf: Fix ld_{abs,ind} failure path analysis in subprogs
https://git.kernel.org/bpf/bpf-next/c/ee861486e377
- [bpf-next,v2,3/4] bpf: Remove static qualifier from local subprog pointer
https://git.kernel.org/bpf/bpf-next/c/9dba0ae973e7
- [bpf-next,v2,4/4] selftests/bpf: Add tests for ld_{abs,ind} failure path in subprogs
https://git.kernel.org/bpf/bpf-next/c/e0fcb42bc6f4
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
prev parent reply other threads:[~2026-04-09 1:50 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-08 19:12 [PATCH bpf-next v2 1/4] bpf: Propagate error from visit_tailcall_insn Daniel Borkmann
2026-04-08 19:12 ` [PATCH bpf-next v2 2/4] bpf: Fix ld_{abs,ind} failure path analysis in subprogs Daniel Borkmann
2026-04-08 19:12 ` [PATCH bpf-next v2 3/4] bpf: Remove static qualifier from local subprog pointer Daniel Borkmann
2026-04-08 19:12 ` [PATCH bpf-next v2 4/4] selftests/bpf: Add tests for ld_{abs,ind} failure path in subprogs Daniel Borkmann
2026-04-09 1:50 ` patchwork-bot+netdevbpf [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=177569940955.949482.17510748914664571817.git-patchwork-notify@kernel.org \
--to=patchwork-bot+netdevbpf@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=eddyz87@gmail.com \
--cc=info@starlabs.sg \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox