Patch Series

Subject bpf: Explicitly check accesses to bpf_sock_addr
Author paul.chaignon@gmail.com
Date 2025-09-16 15:17:40 +0000 UTC
Version 1
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com martin.lau@linux.dev paul.chaignon@gmail.com

Patches (3)

Name Content
[PATCH bpf 1/3] bpf: Explicitly check accesses to bpf_sock_addr [Body]
[PATCH bpf 2/3] selftests/bpf: Move macros to bpf_misc.h [Body]
[PATCH bpf 3/3] selftest/bpf: Test accesses to ctx padding [Body]

Session 2025-09-16

ID (for dev) 546e1377-3714-41a9-be1b-b22d56a84315
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
Build Base df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] passed [Log]
Build Patched df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] [patched] passed [Log]
Boot test: Base df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] passed
Boot test: Patched df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] [patched] passed
Fuzzing df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] [patched] passed [Log] [Artifacts]