In the Linux kernel, the following vulnerability has been resolved:
x86/bpf: Fix IP after emitting call depth accounting
Adjust the IP passed to emit_patch
so it calculates the correct offset
for the CALL instruction if x86_call_depth_emit_accounting
emits code.
Otherwise we will skip some instructions and most likely crash.