Patch Series

Subject tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork.
Author kuniyu@google.com
Date 2025-09-09 23:26:12 +0000 UTC
Version 1
Cc ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net jakub@cloudflare.com john.fastabend@gmail.com kuni1840@gmail.com kuniyu@google.com netdev@vger.kernel.org syzbot@syzkaller.appspotmail.com

Patches (1)

Name Content
[PATCH v1 bpf] tcp_bpf: Call sk_msg_free() when tcp_bpf_send_verdict() fails to allocate psock->cork. [Body]

Session 2025-09-09

ID (for dev) 1981b4c0-236f-4008-bd3b-712253c5a99a
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
Build Base 5aa00f0e9589b20b7306961cc0e4185497704683 [Config] passed [Log]
Build Patched 5aa00f0e9589b20b7306961cc0e4185497704683 [Config] [patched] passed [Log]
Boot test: Patched 5aa00f0e9589b20b7306961cc0e4185497704683 [Config] [patched] passed
Boot test: Base 5aa00f0e9589b20b7306961cc0e4185497704683 [Config] passed
Fuzzing 5aa00f0e9589b20b7306961cc0e4185497704683 [Config] 5aa00f0e9589b20b7306961cc0e4185497704683 [Config] [patched] passed [Log] [Artifacts]