| Subject | bpf: Explicitly check accesses to bpf_sock_addr |
|---|---|
| Author | paul.chaignon@gmail.com |
| Date | 2025-09-16 15:17:40 +0000 UTC |
| Version | 1 |
| Cc | andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com martin.lau@linux.dev paul.chaignon@gmail.com |
| ID (for dev) | 546e1377-3714-41a9-be1b-b22d56a84315 |
|---|---|
| Status | finished |
| Triaged | OK [Log] |
| Execution Log | [Link] |
| Test | Base | Patched | Verdict |
|---|---|---|---|
| Build Base | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] | passed [Log] | |
| Build Patched | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] [patched] | passed [Log] | |
| Boot test: Base | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] | passed | |
| Boot test: Patched | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] [patched] | passed | |
| Fuzzing | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] [patched] | passed [Log] [Artifacts] |