Patch Series

Subject BPF indirect jumps
Author a.s.protopopov@gmail.com
Date 2025-11-05 09:00:36.950329752 +0000 UTC
Version 11
Cc a.s.protopopov@gmail.com andrii@kernel.org aspsk@isovalent.com ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com qmo@kernel.org yonghong.song@linux.dev

Patches (12)

Name Content [All]
[PATCH v11 bpf-next 01/12] bpf, x86: add new map type: instructions array [Body]
[PATCH v11 bpf-next 02/12] bpftool: Recognize insn_array map type [Body]
[PATCH v11 bpf-next 03/12] libbpf: Recognize insn_array map type [Body]
[PATCH v11 bpf-next 04/12] selftests/bpf: add selftests for new insn_array map [Body]
[PATCH v11 bpf-next 05/12] bpf: support instructions arrays with constants blinding [Body]
[PATCH v11 bpf-next 06/12] selftests/bpf: test instructions arrays with blinding [Body]
[PATCH v11 bpf-next 07/12] bpf, x86: allow indirect jumps to r8...r15 [Body]
[PATCH v11 bpf-next 08/12] bpf, x86: add support for indirect jumps [Body]
[PATCH v11 bpf-next 09/12] bpf: disasm: add support for BPF_JMP|BPF_JA|BPF_X [Body]
[PATCH v11 bpf-next 10/12] libbpf: support llvm-generated indirect jumps [Body]
[PATCH v11 bpf-next 11/12] selftests/bpf: add new verifier_gotox test [Body]
[PATCH v11 bpf-next 12/12] selftests/bpf: add C-level selftests for indirect jumps [Body]

Session 2025-11-05

ID (for dev) 965bcad6-e146-444f-9c95-62be18c7641d
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 11369e6e337a3c57ba60b7788046fb41e234b083 [Config] passed [Log]
[KASAN] Boot test: Base 11369e6e337a3c57ba60b7788046fb41e234b083 [Config] passed
[KASAN] Build Patched 11369e6e337a3c57ba60b7788046fb41e234b083 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 11369e6e337a3c57ba60b7788046fb41e234b083 [Config] [patched] passed
[KASAN] Fuzzing 11369e6e337a3c57ba60b7788046fb41e234b083 [Config] 11369e6e337a3c57ba60b7788046fb41e234b083 [Config] [patched] passed [Log] [Artifacts]