Patch Series

Subject bpf: Fix memory access flags in helper prototypes
Author ftyghome@gmail.com
Date 2026-01-07 12:21:38 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net davem@davemloft.net dxu@dxuuu.xyz eddyz87@gmail.com edumazet@google.com electronlsr@gmail.com ftyghome@gmail.com gplhust955@gmail.com haoluo@google.com haoran.ni.cs@gmail.com horms@kernel.org john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org kuba@kernel.org linux-kernel@vger.kernel.org linux-trace-kernel@vger.kernel.org martin.lau@linux.dev mathieu.desnoyers@efficios.com mattbobrowski@google.com mhiramat@kernel.org netdev@vger.kernel.org pabeni@redhat.com rostedt@goodmis.org sdf@fomichev.me song@kernel.org yonghong.song@linux.dev

Patches (2)

Name Content [All]
[PATCH bpf 1/2] bpf: Fix memory access flags in helper prototypes [Body]
[PATCH bpf 2/2] bpf: Require ARG_PTR_TO_MEM with memory flag [Body]

Session 2026-01-07

ID (for dev) d5d53859-79fb-473e-8cb7-434fc513fde6
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base ab86d0bf01f6d0e37fd67761bb62918321b64efc [Config] passed [Log]
[KASAN] Boot test: Base ab86d0bf01f6d0e37fd67761bb62918321b64efc [Config] passed [Log]
[KASAN] Build Patched ab86d0bf01f6d0e37fd67761bb62918321b64efc [Config] [patched] passed [Log]
[KASAN] Boot test: Patched ab86d0bf01f6d0e37fd67761bb62918321b64efc [Config] [patched] passed [Log]
[KASAN] Fuzzing ab86d0bf01f6d0e37fd67761bb62918321b64efc [Config] ab86d0bf01f6d0e37fd67761bb62918321b64efc [Config] [patched] passed [Log] [Artifacts]
WARNING in check_helper_call [Log] [Syz Repro] [C Repro]