Patch Series

Subject bpf: arm64: Indirect jumps
Author puranjay@kernel.org
Date 2025-11-17 00:46:36 +0000 UTC
Version 1
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org catalin.marinas@arm.com daniel@iogearbox.net eddyz87@gmail.com kernel-team@meta.com martin.lau@kernel.org puranjay12@gmail.com puranjay@kernel.org will@kernel.org xukuohai@huaweicloud.com

Patches (4)

Name Content [All]
[PATCH bpf-next 1/4] bpf: arm64: Add support for instructions array [Body]
[PATCH bpf-next 2/4] bpf: arm64: Add support for indirect jumps [Body]
[PATCH bpf-next 3/4] libbpf: Ignore relocations for .jumptables sections [Body]
[PATCH bpf-next 4/4] selftests: bpf: Enable gotox tests from arm64 [Body]

Session 2025-11-17

ID (for dev) 55d0599d-7c1b-4bc5-96a4-c50787c014e6
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 026bcf9c286c42aacc34359a18aebcc1787f12d2 [Config] passed [Log]
[KASAN] Boot test: Base 026bcf9c286c42aacc34359a18aebcc1787f12d2 [Config] passed
[KASAN] Build Patched 026bcf9c286c42aacc34359a18aebcc1787f12d2 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 026bcf9c286c42aacc34359a18aebcc1787f12d2 [Config] [patched] passed
[KASAN] Fuzzing 026bcf9c286c42aacc34359a18aebcc1787f12d2 [Config] 026bcf9c286c42aacc34359a18aebcc1787f12d2 [Config] [patched] skipped [Log] [Artifacts]