Patch Series

Subject bpf: enable x86 fentry on tail-called programs
Author hayatake396@gmail.com
Date 2026-03-27 14:16:01 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net hayatake396@gmail.com linux-kernel@vger.kernel.org linux-kselftest@vger.kernel.org x86@kernel.org

Patches (2)

Name Content [All]
[PATCH bpf-next 1/2] bpf, x86: patch tail-call fentry slot on non-IBT JITs [Body]
[PATCH bpf-next 2/2] selftests/bpf: cover fentry on tailcalled programs [Body]
Session 2026-03-27
ID (for dev) fd87b95f-0a9f-4d49-ab37-f20a0cb553ee
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 01504da43e67f823fbd22f4ec9e4469236a34b5c [Config] passed [Log]
[KASAN] Boot test: Base 01504da43e67f823fbd22f4ec9e4469236a34b5c [Config] passed [Log]
[KASAN] Build Patched 01504da43e67f823fbd22f4ec9e4469236a34b5c [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 01504da43e67f823fbd22f4ec9e4469236a34b5c [Config] [patched] passed [Log]
[KASAN] Fuzz 01504da43e67f823fbd22f4ec9e4469236a34b5c [Config] 01504da43e67f823fbd22f4ec9e4469236a34b5c [Config] [patched] passed [Log] [Artifacts]