[PATCH bpf-next v2] bpf, arm64: Sign return address for jited code

patchwork-bot+netdevbpf at kernel.org patchwork-bot+netdevbpf at kernel.org
Tue Apr 5 15:10:13 PDT 2022


Hello:

This patch was applied to bpf/bpf-next.git (master)
by Daniel Borkmann <daniel at iogearbox.net>:

On Sat, 2 Apr 2022 03:39:42 -0400 you wrote:
> Sign return address for jited code when the kernel is built with pointer
> authentication enabled.
> 
> 1. Sign LR with paciasp instruction before LR is pushed to stack. Since
>    paciasp acts like landing pads for function entry, no need to insert
>    bti instruction before paciasp.
> 
> [...]

Here is the summary with links:
  - [bpf-next,v2] bpf, arm64: Sign return address for jited code
    https://git.kernel.org/bpf/bpf-next/c/042152c27c3b

You are awesome, thank you!
-- 
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html





More information about the linux-arm-kernel mailing list