Patch Series

Subject Avoid warning on bpf_sock_addr padding access
Author paul.chaignon@gmail.com
Date 2025-09-17 08:08:00 +0000 UTC
Version 2
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com martin.lau@linux.dev paul.chaignon@gmail.com

Patches (3)

Name Content
[PATCH bpf-next v2 1/3] bpf: Explicitly check accesses to bpf_sock_addr [Body]
[PATCH bpf-next v2 2/3] selftests/bpf: Move macros to bpf_misc.h [Body]
[PATCH bpf-next v2 3/3] selftest/bpf: Test accesses to ctx padding [Body]

Session 2025-09-17

ID (for dev) 79d64d63-d857-4f65-a3fa-3463becf3452
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
Build Base a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] passed [Log]
Build Patched a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] [patched] passed [Log]
Boot test: Base a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] passed
Boot test: Patched a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] [patched] passed
Fuzzing a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] [patched] passed [Log] [Artifacts]