In the Linux kernel, the following vulnerability has been resolved: x86/bpf: Fix IP after emitting call depth accounting Adjust the IP passed to emit_patch
so it calculates the correct offset for the CALL instruction if x86_call_depth_emit_accounting
emits code. Otherwise we will skip some instructions and most likely crash.