Patch Series

Subject emit ENDBR/BTI instructions for indirect jump targets
Author xukuohai@huaweicloud.com
Date 2026-01-14 09:22:53.226316158 +0000 UTC
Version
Cc a.s.protopopov@gmail.com andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com linux-arm-kernel@lists.infradead.org linux-kernel@vger.kernel.org martin.lau@linux.dev puranjay@kernel.org xukuohai@huaweicloud.com yonghong.song@linux.dev

Patches (4)

Name Content [All]
[PATCH bpf-next v4 1/4] bpf: Fix an off-by-one error in check_indirect_jump [Body]
[PATCH bpf-next v4 2/4] bpf: Add helper to detect indirect jump targets [Body]
[PATCH bpf-next v4 3/4] bpf, x86: Emit ENDBR for indirect jump targets [Body]
[PATCH bpf-next v4 4/4] bpf, arm64: Emit BTI for indirect jump target [Body]

Session 2026-01-14

ID (for dev) 69692707-bb67-4220-95c6-52facb80a5fa
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 46c76760febfb14618d88f6a01fca2d93d003082 [Config] passed [Log]
[KASAN] Boot test: Base 46c76760febfb14618d88f6a01fca2d93d003082 [Config] passed [Log]
[KASAN] Build Patched 46c76760febfb14618d88f6a01fca2d93d003082 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 46c76760febfb14618d88f6a01fca2d93d003082 [Config] [patched] passed [Log]
[KASAN] Fuzzing 46c76760febfb14618d88f6a01fca2d93d003082 [Config] 46c76760febfb14618d88f6a01fca2d93d003082 [Config] [patched] passed [Log] [Artifacts]