| Subject | bpf: arm64: Fix panic due to missing BTI at indirect jump targets |
|---|---|
| Author | xukuohai@huaweicloud.com |
| Date | 2025-12-27 08:04:47.753475963 +0000 UTC |
| Version | 3 |
| Cc | a.s.protopopov@gmail.com andrii@kernel.org ast@kernel.org bpf@vger.kernel.org catalin.marinas@arm.com daniel@iogearbox.net eddyz87@gmail.com linux-kernel@vger.kernel.org martin.lau@linux.dev puranjay@kernel.org will@kernel.org xukuohai@huaweicloud.com yonghong.song@linux.dev |
| Name | Content [All] |
|---|---|
| [PATCH bpf-next v3] bpf: arm64: Fix panic due to missing BTI at indirect jump targets | [Body] |
| ID (for dev) | 98f59254-d44f-4ff7-85dd-fc396e2eba08 |
|---|---|
| Status | finished |
| Triaged | OK [Log] |
| Execution Log | [Link] |
| Test | Base | Patched | Verdict |
|---|---|---|---|
| [KASAN] Build Base | f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] | passed [Log] | |
| [KASAN] Boot test: Base | f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] | passed [Log] | |
| [KASAN] Build Patched | f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] [patched] | passed [Log] | |
| [KASAN] Boot test: Patched | f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] [patched] | passed [Log] | |
| [KASAN] Fuzzing | f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] | f14cdb1367b947d373215e36cfe9c69768dbafc9 [Config] [patched] | passed [Log] [Artifacts] |