Patch Series

Subject bpf: tailcall: Eliminate max_entries and bpf_func access at runtime
Author leon.hwang@linux.dev
Date 2026-01-02 15:00:29 +0000 UTC
Version
Cc akpm@linux-foundation.org andrii@kernel.org ast@kernel.org bp@alien8.de bpf@vger.kernel.org catalin.marinas@arm.com daniel@iogearbox.net dave.hansen@linux.intel.com davem@davemloft.net dsahern@kernel.org eddyz87@gmail.com haoluo@google.com hpa@zytor.com john.fastabend@gmail.com jolsa@kernel.org kernel-patches-bot@fb.com kpsingh@kernel.org leon.hwang@linux.dev linux-arm-kernel@lists.infradead.org linux-kernel@vger.kernel.org martin.lau@linux.dev mingo@redhat.com netdev@vger.kernel.org puranjay@kernel.org sdf@fomichev.me song@kernel.org tglx@linutronix.de will@kernel.org x86@kernel.org xukuohai@huaweicloud.com yonghong.song@linux.dev

Patches (4)

Name Content [All]
[PATCH bpf-next 1/4] bpf: tailcall: Introduce bpf_arch_tail_call_prologue_offset [Body]
[PATCH bpf-next 2/4] bpf, x64: tailcall: Eliminate max_entries and bpf_func access at runtime [Body]
[PATCH bpf-next 3/4] bpf, arm64: tailcall: Eliminate max_entries and bpf_func access at runtime [Body]
[PATCH bpf-next 4/4] bpf, lib/test_bpf: Fix broken tailcall tests [Body]

Session 2026-01-02

ID (for dev) 9795ca58-cc02-444b-aa69-d610a1a636e5
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 317a5df78f24bd77fb770a26eb85bf39620592e0 [Config] passed [Log]
[KASAN] Boot test: Base 317a5df78f24bd77fb770a26eb85bf39620592e0 [Config] passed [Log]
[KASAN] Build Patched 317a5df78f24bd77fb770a26eb85bf39620592e0 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 317a5df78f24bd77fb770a26eb85bf39620592e0 [Config] [patched] passed [Log]
[KASAN] Fuzzing 317a5df78f24bd77fb770a26eb85bf39620592e0 [Config] 317a5df78f24bd77fb770a26eb85bf39620592e0 [Config] [patched] passed [Log] [Artifacts]