Patch Series

Subject emit ENDBR/BTI instructions for indirect
Author xukuohai@huaweicloud.com
Date 2026-04-13 12:44:58 +0000 UTC
Version
Cc a.s.protopopov@gmail.com alexis.lothore@bootlin.com andrii@kernel.org ast@kernel.org bjorn@kernel.org bpf@vger.kernel.org chleroy@kernel.org daniel@iogearbox.net davem@davemloft.net eddyz87@gmail.com gor@linux.ibm.com hbathini@linux.ibm.com hca@linux.ibm.com hengqi.chen@gmail.com iii@linux.ibm.com johan.almbladh@anyfinetworks.com linux-arm-kernel@lists.infradead.org linux-kernel@vger.kernel.org linux@armlinux.org.uk list@vahedi.org luke.r.nels@gmail.com martin.lau@linux.dev memxor@gmail.com naveen@kernel.org paulburton@kernel.org pulehui@huawei.com puranjay@kernel.org udknight@gmail.com xi.wang@gmail.com xukuohai@huaweicloud.com yangtiezhu@loongson.cn yonghong.song@linux.dev

Patches (5)

Name Content [All]
[PATCH bpf-next v14 1/5] bpf: Move constants blinding out of arch-specific JITs [Body]
[PATCH bpf-next v14 2/5] bpf: Pass bpf_verifier_env to JIT [Body]
[PATCH bpf-next v14 3/5] bpf: Add helper to detect indirect jump targets [Body]
[PATCH bpf-next v14 4/5] bpf, x86: Emit ENDBR for indirect jump targets [Body]
[PATCH bpf-next v14 5/5] bpf, arm64: Emit BTI for indirect jump target [Body]
Session 2026-04-13
ID (for dev) 80588cb1-d9bf-4140-a2e8-8085b99073d4
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 71b500afd2f7336f5b6c6026f2af546fc079be26 [Config] passed [Log]
[KASAN] Boot test: Base 71b500afd2f7336f5b6c6026f2af546fc079be26 [Config] passed [Log]
[KASAN] Build Patched 71b500afd2f7336f5b6c6026f2af546fc079be26 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 71b500afd2f7336f5b6c6026f2af546fc079be26 [Config] [patched] passed [Log]
[KASAN] Fuzz 71b500afd2f7336f5b6c6026f2af546fc079be26 [Config] 71b500afd2f7336f5b6c6026f2af546fc079be26 [Config] [patched] passed [Log] [Artifacts]