[PATCH bpf-next v2] bpf, arm64: Sign return address for jited code
patchwork-bot+netdevbpf at kernel.org
patchwork-bot+netdevbpf at kernel.org
Tue Apr 5 15:10:13 PDT 2022
Hello:
This patch was applied to bpf/bpf-next.git (master)
by Daniel Borkmann <daniel at iogearbox.net>:
On Sat, 2 Apr 2022 03:39:42 -0400 you wrote:
> Sign return address for jited code when the kernel is built with pointer
> authentication enabled.
>
> 1. Sign LR with paciasp instruction before LR is pushed to stack. Since
> paciasp acts like landing pads for function entry, no need to insert
> bti instruction before paciasp.
>
> [...]
Here is the summary with links:
- [bpf-next,v2] bpf, arm64: Sign return address for jited code
https://git.kernel.org/bpf/bpf-next/c/042152c27c3b
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
More information about the linux-arm-kernel
mailing list