Patch Series

Subject bpf: Fix s16 truncation for large bpf-to-bpf call offsets
Author tangyazhou@zju.edu.cn
Date 2026-03-23 08:17:46 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com emil@etsalapatis.com haoluo@google.com john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org martin.lau@linux.dev puranjay@kernel.org sdf@fomichev.me shenghaoyuan0928@163.com song@kernel.org tangyazhou518@outlook.com tangyazhou@zju.edu.cn yonghong.song@linux.dev ziye@zju.edu.cn

Patches (3)

Name Content [All]
[PATCH bpf v2 1/3] bpf: Reject bpf-to-bpf call with large offset in interpreter [Body]
[PATCH bpf v2 2/3] selftests/bpf: Add test for large offset bpf-to-bpf call [Body]
[PATCH bpf v2 3/3] bpf: Fix incorrect subprog ID in dumped bpf_pseudo_call instructions [Body]

Session 2026-03-23

ID (for dev) 5d4e2e83-b878-4ecc-abab-cb436ca8acde
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 4a04d13576fd69149b91672b5f1dc62eca272fa5 [Config] passed [Log]
[KASAN] Boot test: Base 4a04d13576fd69149b91672b5f1dc62eca272fa5 [Config] passed [Log]
[KASAN] Build Patched 4a04d13576fd69149b91672b5f1dc62eca272fa5 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 4a04d13576fd69149b91672b5f1dc62eca272fa5 [Config] [patched] passed [Log]
[KASAN] Fuzz 4a04d13576fd69149b91672b5f1dc62eca272fa5 [Config] 4a04d13576fd69149b91672b5f1dc62eca272fa5 [Config] [patched] passed [Log] [Artifacts]