| Subject | bpf: reject direct access to nullable PTR_TO_BUF pointers |
|---|---|
| Author | tpluszz77@gmail.com |
| Date | 2026-04-02 09:29:22 +0000 UTC |
| Version | |
| Cc | andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com john.fastabend@gmail.com martin.lau@linux.dev song@kernel.org tpluszz77@gmail.com |
| Name | Content [All] |
|---|---|
| [PATCH bpf v3 1/2] bpf: reject direct access to nullable PTR_TO_BUF pointers | [Body] |
| [PATCH bpf v3 2/2] selftests/bpf: add test for nullable PTR_TO_BUF access | [Body] |
| ID (for dev) | 20b4dc32-4664-484f-836b-f34bfcc627a0 |
|---|---|
| Status | finished |
| Triaged | OK [Log] |
| Execution Log | [Link] |
| Test | Base | Patched | Verdict |
|---|---|---|---|
| [KASAN] Build Base | ad8391d37f334ee73ba91926f8b4e4cf6d31ea04 [Config] | passed [Log] | |
| [KASAN] Boot test: Base | ad8391d37f334ee73ba91926f8b4e4cf6d31ea04 [Config] | passed [Log] | |
| [KASAN] Build Patched | ad8391d37f334ee73ba91926f8b4e4cf6d31ea04 [Config] [patched] | passed [Log] | |
| [KASAN] Boot test: Patched | ad8391d37f334ee73ba91926f8b4e4cf6d31ea04 [Config] [patched] | passed [Log] | |
| [KASAN] Fuzz | ad8391d37f334ee73ba91926f8b4e4cf6d31ea04 [Config] | ad8391d37f334ee73ba91926f8b4e4cf6d31ea04 [Config] [patched] | passed [Log] [Artifacts] |