| Subject | bpf: reject direct access to nullable PTR_TO_BUF pointers |
|---|---|
| Author | tpluszz77@gmail.com |
| Date | 2026-04-03 03:38:27 +0000 UTC |
| Version | |
| Cc | andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com john.fastabend@gmail.com martin.lau@linux.dev memxor@gmail.com song@kernel.org tpluszz77@gmail.com |
| Name | Content [All] |
|---|---|
| [PATCH bpf v4 1/2] bpf: reject direct access to nullable PTR_TO_BUF pointers | [Body] |
| [PATCH bpf v4 2/2] selftests/bpf: add test for nullable PTR_TO_BUF access | [Body] |
| ID (for dev) | 1a303516-4062-4266-9591-98d8108619a5 |
|---|---|
| Status | finished |
| Triaged | OK [Log] |
| Execution Log | [Link] |
| Test | Base | Patched | Verdict |
|---|---|---|---|
| [KASAN] Build Base | 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] | passed [Log] | |
| [KASAN] Boot test: Base | 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] | passed [Log] | |
| [KASAN] Build Patched | 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] | passed [Log] | |
| [KASAN] Boot test: Patched | 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] | passed [Log] | |
| [KASAN] Fuzz | 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] | 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] | passed [Log] [Artifacts] |