Patch Series

Subject emit ENDBR/BTI instructions for indirect jump targets
Author xukuohai@huaweicloud.com
Date 2026-03-02 10:14:33.42237987 +0000 UTC
Version
Cc a.s.protopopov@gmail.com andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com linux-arm-kernel@lists.infradead.org linux-kernel@vger.kernel.org martin.lau@linux.dev puranjay@kernel.org xukuohai@huaweicloud.com yonghong.song@linux.dev

Patches (5)

Name Content [All]
[PATCH bpf-next v5 1/5] bpf: Move JIT for single-subprog programs to verifier [Body]
[PATCH bpf-next v5 2/5] bpf: Pass bpf_verifier_env to jit [Body]
[PATCH bpf-next v5 3/5] bpf: Add helper to detect indirect jump targets [Body]
[PATCH bpf-next v5 4/5] bpf, x86: Emit ENDBR for indirect jump targets [Body]
[PATCH bpf-next v5 5/5] bpf, arm64: Emit BTI for indirect jump target [Body]
Session 2026-03-02
ID (for dev) 71a7845c-ca42-4333-a682-a802cea10d09
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 309d8808eef93d29b65ae69241a4475b2c8bd6fe [Config] passed [Log]
[KASAN] Boot test: Base 309d8808eef93d29b65ae69241a4475b2c8bd6fe [Config] passed [Log]
[KASAN] Build Patched 309d8808eef93d29b65ae69241a4475b2c8bd6fe [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 309d8808eef93d29b65ae69241a4475b2c8bd6fe [Config] [patched] passed [Log]
[KASAN] Fuzz 309d8808eef93d29b65ae69241a4475b2c8bd6fe [Config] 309d8808eef93d29b65ae69241a4475b2c8bd6fe [Config] [patched] passed [Log] [Artifacts]