Patch Series

Subject bpf: arm64: Fix panic due to missing BTI at indirect jump targets
Author xukuohai@huaweicloud.com
Date 2025-12-27 08:04:47.753475963 +0000 UTC
Version 3
Cc a.s.protopopov@gmail.com andrii@kernel.org ast@kernel.org bpf@vger.kernel.org catalin.marinas@arm.com daniel@iogearbox.net eddyz87@gmail.com linux-kernel@vger.kernel.org martin.lau@linux.dev puranjay@kernel.org will@kernel.org xukuohai@huaweicloud.com yonghong.song@linux.dev

Patches (1)

Name Content [All]
[PATCH bpf-next v3] bpf: arm64: Fix panic due to missing BTI at indirect jump targets [Body]

Session 2025-12-27

ID (for dev) 98f59254-d44f-4ff7-85dd-fc396e2eba08
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] passed [Log]
[KASAN] Boot test: Base f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] passed [Log]
[KASAN] Build Patched f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] [patched] passed [Log]
[KASAN] Fuzzing f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] [patched] passed [Log] [Artifacts]