Patch Series

Subject bpf: Disallow BPF_F_LOCK with mixed special fields
Author leon.hwang@linux.dev
Date 2026-01-23 05:56:57 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com haoluo@google.com john.fastabend@gmail.com jolsa@kernel.org kernel-patches-bot@fb.com kpsingh@kernel.org leon.hwang@linux.dev linux-kernel@vger.kernel.org linux-kselftest@vger.kernel.org martin.lau@linux.dev sdf@fomichev.me shuah@kernel.org song@kernel.org yonghong.song@linux.dev

Patches (2)

Name Content [All]
[PATCH bpf-next v2 1/2] bpf: Disallow BPF_F_LOCK with mixed special fields and centralize flag checks [Body]
[PATCH bpf-next v2 2/2] selftests/bpf: Add tests to verify BPF_F_LOCK restrictions [Body]

Session 2026-01-23

ID (for dev) 95b56fb2-acff-4c39-a189-6fae3eb50ad5
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base a32ae2658471dd87a2f7a438388ed7d9a5767212 [Config] passed [Log]
[KASAN] Boot test: Base a32ae2658471dd87a2f7a438388ed7d9a5767212 [Config] passed [Log]
[KASAN] Build Patched a32ae2658471dd87a2f7a438388ed7d9a5767212 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched a32ae2658471dd87a2f7a438388ed7d9a5767212 [Config] [patched] passed [Log]
[KASAN] Fuzzing a32ae2658471dd87a2f7a438388ed7d9a5767212 [Config] a32ae2658471dd87a2f7a438388ed7d9a5767212 [Config] [patched] passed [Log] [Artifacts]