public inbox for bpf@vger.kernel.org
 help / color / mirror / Atom feed
 messages from 2026-04-10 07:49:26 to 2026-04-10 09:57:03 UTC [more...]

[PATCH bpf-next v3 00/13] bpf: static stack liveness data flow analysis
 2026-04-10  9:57 UTC  (16+ messages)
` [PATCH bpf-next v3 01/13] bpf: share several utility functions as internal API
` [PATCH bpf-next v3 02/13] bpf: save subprogram name in bpf_subprog_info
` [PATCH bpf-next v3 03/13] bpf: Add spis_*() helpers for 4-byte stack slot bitmasks
` [PATCH bpf-next v3 04/13] bpf: make liveness.c track stack with 4-byte granularity
` [PATCH bpf-next v3 05/13] bpf: 4-byte precise clean_verifier_state
` [PATCH bpf-next v3 06/13] bpf: prepare bpf_liveness api for use by static analysis pass
` [PATCH bpf-next v3 07/13] bpf: introduce forward arg-tracking dataflow analysis
` [PATCH bpf-next v3 08/13] bpf: simplify liveness to use (callsite, depth) keyed func_instances
` [PATCH bpf-next v3 09/13] bpf: change logging scheme for live stack analysis
` [PATCH bpf-next v3 10/13] selftests/bpf: update existing tests due to liveness changes
` [PATCH bpf-next v3 11/13] selftests/bpf: adjust verifier_log buffers
` [PATCH bpf-next v3 12/13] selftests/bpf: add new tests for static stack liveness analysis
` [PATCH bpf-next v3 13/13] bpf: poison dead stack slots

[PATCH v2 bpf-next 0/2] bpf: Fix Null-Pointer Dereference in kernel_clone() via BPF fmod_ret on security_task_alloc
 2026-04-10  9:20 UTC  (5+ messages)
` [PATCH v2 bpf-next 1/2] "

[PATCH v2 bpf-next 1/2] bpf: Fix Null-Pointer Dereference in kernel_clone() via BPF fmod_ret on security_task_alloc
 2026-04-10  8:24 UTC  (2+ messages)

[PATCH v2 bpf-next 1/2] bpf: Fix Null-Pointer Dereference in kernel_clone() via BPF fmod_ret on security_task_alloc
 2026-04-10  8:07 UTC  (4+ messages)


This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox