Patch Series

Subject bpf/verifier: Expand the usage scenarios of bpf_kptr_xchg
Author pilgrimtao@gmail.com
Date 2026-02-01 03:16:05 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org chengkaitao@kylinos.cn daniel@iogearbox.net eddyz87@gmail.com haoluo@google.com john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org linux-kernel@vger.kernel.org linux-kselftest@vger.kernel.org martin.lau@linux.dev pilgrimtao@gmail.com sdf@fomichev.me shuah@kernel.org song@kernel.org yangfeng@kylinos.cn yonghong.song@linux.dev

Patches (3)

Name Content [All]
[PATCH v2 1/3] bpf/verifier: allow calling bpf_kptr_xchg while holding a lock [Body]
[PATCH v2 2/3] bpf/verifier: allow using bpf_kptr_xchg even if the NON_OWN_REF flag is set [Body]
[PATCH v2 3/3] selftests/bpf: Add supplementary tests for bpf_kptr_xchg [Body]

Session 2026-02-01

ID (for dev) 6e48ece1-22bb-4c97-a364-aa7be023f1d7
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base cda0cbfdeefe7690370595f72be277de0ad7b096 [Config] passed [Log]
[KASAN] Boot test: Base cda0cbfdeefe7690370595f72be277de0ad7b096 [Config] passed [Log]
[KASAN] Build Patched cda0cbfdeefe7690370595f72be277de0ad7b096 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched cda0cbfdeefe7690370595f72be277de0ad7b096 [Config] [patched] passed [Log]
[KASAN] Fuzzing cda0cbfdeefe7690370595f72be277de0ad7b096 [Config] cda0cbfdeefe7690370595f72be277de0ad7b096 [Config] [patched] passed [Log] [Artifacts]