Subject | Avoid warning on bpf_sock_addr padding access |
---|---|
Author | paul.chaignon@gmail.com |
Date | 2025-09-17 08:08:00 +0000 UTC |
Version | 2 |
Cc | andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com martin.lau@linux.dev paul.chaignon@gmail.com |
ID (for dev) | 79d64d63-d857-4f65-a3fa-3463becf3452 |
---|---|
Status | finished |
Triaged | OK [Log] |
Execution Log | [Link] |
Test | Base | Patched | Verdict |
---|---|---|---|
Build Base | a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] | passed [Log] | |
Build Patched | a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] [patched] | passed [Log] | |
Boot test: Base | a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] | passed | |
Boot test: Patched | a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] [patched] | passed | |
Fuzzing | a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] | a578b54a8ad282dd739e4d1f4e8352fc8ac1c4a0 [Config] [patched] | passed [Log] [Artifacts] |