Patch Series

Subject bpf: Fix s16 truncation for large bpf-to-bpf call offsets
Author tangyazhou@zju.edu.cn
Date 2026-03-26 09:01:31 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com emil@etsalapatis.com haoluo@google.com john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org martin.lau@linux.dev puranjay@kernel.org sdf@fomichev.me shenghaoyuan0928@163.com song@kernel.org tangyazhou518@outlook.com tangyazhou@zju.edu.cn yonghong.song@linux.dev ziye@zju.edu.cn

Patches (3)

Name Content [All]
[PATCH bpf v5 1/3] bpf: Reject bpf-to-bpf call with large offset in interpreter [Body]
[PATCH bpf v5 2/3] selftests/bpf: Add test for large offset bpf-to-bpf call [Body]
[PATCH bpf v5 3/3] bpf: Fix incorrect subprog ID in dumped bpf_pseudo_call instructions [Body]

Session 2026-03-26

ID (for dev) 5d151086-5186-4f45-853d-1b4083726b6b
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base c369299895a591d96745d6492d4888259b004a9e [Config] passed [Log]
[KASAN] Boot test: Base c369299895a591d96745d6492d4888259b004a9e [Config] passed [Log]
[KASAN] Build Patched c369299895a591d96745d6492d4888259b004a9e [Config] [patched] passed [Log]
[KASAN] Boot test: Patched c369299895a591d96745d6492d4888259b004a9e [Config] [patched] passed [Log]
[KASAN] Fuzz c369299895a591d96745d6492d4888259b004a9e [Config] c369299895a591d96745d6492d4888259b004a9e [Config] [patched] passed [Log] [Artifacts]