Patch Series

Subject arm32, bpf: Reject BPF-to-BPF calls and callbacks in the JIT
Author puranjay@kernel.org
Date 2026-04-17 14:33:52 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com jre@pengutronix.de kernel@pengutronix.de linux-arm-kernel@lists.infradead.org linux@armlinux.org.uk martin.lau@linux.dev memxor@gmail.com puranjay@kernel.org song@kernel.org

Patches (1)

Name Content [All]
[PATCH bpf-next v2] arm32, bpf: Reject BPF-to-BPF calls and callbacks in the JIT [Body]
Session 2026-04-17
ID (for dev) 346a93be-58f8-4f10-8c3f-d463fab85832
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 1f5ffc672165ff851063a5fd044b727ab2517ae3 [Config] passed [Log]
[KASAN] Boot test: Base 1f5ffc672165ff851063a5fd044b727ab2517ae3 [Config] passed [Log]
[KASAN] Build Patched 1f5ffc672165ff851063a5fd044b727ab2517ae3 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 1f5ffc672165ff851063a5fd044b727ab2517ae3 [Config] [patched] passed [Log]
[KASAN] Fuzz 1f5ffc672165ff851063a5fd044b727ab2517ae3 [Config] 1f5ffc672165ff851063a5fd044b727ab2517ae3 [Config] [patched] skipped [Log] [Artifacts]