Patch Series

Subject BPF indirect jumps
Author a.s.protopopov@gmail.com
Date 2025-10-19 20:21:29 +0000 UTC
Version 6
Cc a.s.protopopov@gmail.com andrii@kernel.org aspsk@isovalent.com ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com qmo@kernel.org yonghong.song@linux.dev

Patches (17)

Name Content [All]
[PATCH v6 bpf-next 01/17] bpf: fix the return value of push_stack [Body]
[PATCH v6 bpf-next 02/17] bpf: save the start of functions in bpf_prog_aux [Body]
[PATCH v6 bpf-next 03/17] bpf: generalize and export map_get_next_key for arrays [Body]
[PATCH v6 bpf-next 04/17] bpf, x86: add new map type: instructions array [Body]
[PATCH v6 bpf-next 05/17] selftests/bpf: add selftests for new insn_array map [Body]
[PATCH v6 bpf-next 06/17] bpf: support instructions arrays with constants blinding [Body]
[PATCH v6 bpf-next 07/17] selftests/bpf: test instructions arrays with blinding [Body]
[PATCH v6 bpf-next 08/17] bpf, x86: allow indirect jumps to r8...r15 [Body]
[PATCH v6 bpf-next 09/17] bpf: make bpf_insn_successors to return a pointer [Body]
[PATCH v6 bpf-next 10/17] bpf, x86: add support for indirect jumps [Body]
[PATCH v6 bpf-next 11/17] bpf: disasm: add support for BPF_JMP|BPF_JA|BPF_X [Body]
[PATCH v6 bpf-next 12/17] bpf, docs: do not state that indirect jumps are not supported [Body]
[PATCH v6 bpf-next 13/17] libbpf: fix formatting of bpf_object__append_subprog_code [Body]
[PATCH v6 bpf-next 14/17] libbpf: support llvm-generated indirect jumps [Body]
[PATCH v6 bpf-next 15/17] bpftool: Recognize insn_array map type [Body]
[PATCH v6 bpf-next 16/17] selftests/bpf: add new verifier_gotox test [Body]
[PATCH v6 bpf-next 17/17] selftests/bpf: add C-level selftests for indirect jumps [Body]

Session 2025-10-19

ID (for dev) b363c25d-766b-4026-8302-44a1c2da421d
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 7361c864852f07b39f5e571447060bd4d758a998 [Config] passed [Log]
[KASAN] Boot test: Base 7361c864852f07b39f5e571447060bd4d758a998 [Config] passed
[KASAN] Build Patched 7361c864852f07b39f5e571447060bd4d758a998 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 7361c864852f07b39f5e571447060bd4d758a998 [Config] [patched] passed
[KASAN] Fuzzing 7361c864852f07b39f5e571447060bd4d758a998 [Config] 7361c864852f07b39f5e571447060bd4d758a998 [Config] [patched] passed [Log] [Artifacts]