Patch Series

Subject Allow variable offsets for syscall PTR_TO_CTX
Author memxor@gmail.com
Date 2026-04-01 12:28:10 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net dschatzberg@meta.com eddyz87@gmail.com emil@etsalapatis.com kernel-team@meta.com kkd@meta.com martin.lau@kernel.org memxor@gmail.com puranjay@kernel.org tj@kernel.org yatsenko@meta.com

Patches (7)

Name Content [All]
[PATCH bpf-next v4 1/7] bpf: Support variable offsets for syscall PTR_TO_CTX [Body]
[PATCH bpf-next v4 2/7] bpf: Enable unaligned accesses for syscall ctx [Body]
[PATCH bpf-next v4 3/7] selftests/bpf: Convert ctx tests from ASM to C [Body]
[PATCH bpf-next v4 4/7] selftests/bpf: Add syscall ctx variable offset tests [Body]
[PATCH bpf-next v4 5/7] selftests/bpf: Test modified syscall ctx for ARG_PTR_TO_CTX [Body]
[PATCH bpf-next v4 6/7] selftests/bpf: Add tests for unaligned syscall ctx accesses [Body]
[PATCH bpf-next v4 7/7] selftests/bpf: Add tests for syscall ctx accesses beyond U16_MAX [Body]
Session 2026-04-01
ID (for dev) 990cb6e3-4ffd-4d4b-8e5c-2b4e23a688b6
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] passed [Log]
[KASAN] Boot test: Base 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] passed [Log]
[KASAN] Build Patched 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] passed [Log]
[KASAN] Fuzz 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] passed [Log] [Artifacts]