Patch Series

Subject emit ENDBR/BTI instructions for indirect jump targets
Author xukuohai@huaweicloud.com
Date 2026-03-24 12:08:50.152809913 +0000 UTC
Version
Cc a.s.protopopov@gmail.com alexis.lothore@bootlin.com andrii@kernel.org ast@kernel.org bjorn@kernel.org bpf@vger.kernel.org chleroy@kernel.org daniel@iogearbox.net davem@davemloft.net eddyz87@gmail.com gor@linux.ibm.com hbathini@linux.ibm.com hca@linux.ibm.com hengqi.chen@gmail.com iii@linux.ibm.com johan.almbladh@anyfinetworks.com linux-arm-kernel@lists.infradead.org linux-kernel@vger.kernel.org linux@armlinux.org.uk list@vahedi.org luke.r.nels@gmail.com martin.lau@linux.dev naveen@kernel.org paulburton@kernel.org pulehui@huawei.com puranjay@kernel.org udknight@gmail.com xi.wang@gmail.com xukuohai@huaweicloud.com yangtiezhu@loongson.cn yonghong.song@linux.dev

Patches (5)

Name Content [All]
[PATCH bpf-next v10 1/5] bpf: Move constants blinding out of arch-specific JITs [Body]
[PATCH bpf-next v10 2/5] bpf: Pass bpf_verifier_env to JIT [Body]
[PATCH bpf-next v10 3/5] bpf: Add helper to detect indirect jump targets [Body]
[PATCH bpf-next v10 4/5] bpf, x86: Emit ENDBR for indirect jump targets [Body]
[PATCH bpf-next v10 5/5] bpf, arm64: Emit BTI for indirect jump target [Body]

Session 2026-03-24

ID (for dev) 8bbb2c96-fb3d-4536-b814-699a5652750a
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base bb6da652c585c397fc2c98df9e7534197e1b1cb1 [Config] passed [Log]
[KASAN] Boot test: Base bb6da652c585c397fc2c98df9e7534197e1b1cb1 [Config] passed [Log]
[KASAN] Build Patched bb6da652c585c397fc2c98df9e7534197e1b1cb1 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched bb6da652c585c397fc2c98df9e7534197e1b1cb1 [Config] [patched] passed [Log]
[KASAN] Fuzz bb6da652c585c397fc2c98df9e7534197e1b1cb1 [Config] bb6da652c585c397fc2c98df9e7534197e1b1cb1 [Config] [patched] passed [Log] [Artifacts]