Subject | bpf: Explicitly check accesses to bpf_sock_addr |
---|---|
Author | paul.chaignon@gmail.com |
Date | 2025-09-16 15:17:40 +0000 UTC |
Version | 1 |
Cc | andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com martin.lau@linux.dev paul.chaignon@gmail.com |
ID (for dev) | 546e1377-3714-41a9-be1b-b22d56a84315 |
---|---|
Status | finished |
Triaged | OK [Log] |
Execution Log | [Link] |
Test | Base | Patched | Verdict |
---|---|---|---|
Build Base | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] | passed [Log] | |
Build Patched | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] [patched] | passed [Log] | |
Boot test: Base | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] | passed | |
Boot test: Patched | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] [patched] | passed | |
Fuzzing | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] | df0cb5cb50bd54d3cd4d0d83417ceec6a66404aa [Config] [patched] | passed [Log] [Artifacts] |