Patch Series

Subject emit ENDBR/BTI instructions for indirect jump targets
Author xukuohai@huaweicloud.com
Date 2026-04-03 09:09:11 +0000 UTC
Version
Cc a.s.protopopov@gmail.com alexis.lothore@bootlin.com andrii@kernel.org ast@kernel.org bjorn@kernel.org bpf@vger.kernel.org chleroy@kernel.org daniel@iogearbox.net davem@davemloft.net eddyz87@gmail.com gor@linux.ibm.com hbathini@linux.ibm.com hca@linux.ibm.com hengqi.chen@gmail.com iii@linux.ibm.com johan.almbladh@anyfinetworks.com linux-arm-kernel@lists.infradead.org linux-kernel@vger.kernel.org linux@armlinux.org.uk list@vahedi.org luke.r.nels@gmail.com martin.lau@linux.dev naveen@kernel.org paulburton@kernel.org pulehui@huawei.com puranjay@kernel.org udknight@gmail.com xi.wang@gmail.com xukuohai@huaweicloud.com yangtiezhu@loongson.cn yonghong.song@linux.dev

Patches (5)

Name Content [All]
[PATCH bpf-next v11 1/5] bpf: Move constants blinding out of arch-specific JITs [Body]
[PATCH bpf-next v11 2/5] bpf: Pass bpf_verifier_env to JIT [Body]
[PATCH bpf-next v11 3/5] bpf: Add helper to detect indirect jump targets [Body]
[PATCH bpf-next v11 4/5] bpf, x86: Emit ENDBR for indirect jump targets [Body]
[PATCH bpf-next v11 5/5] bpf, arm64: Emit BTI for indirect jump target [Body]
Session 2026-04-03
ID (for dev) beeb2756-4006-443b-ad93-1a2d1d79ae1d
Status waiting
Test Base Patched Verdict