[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-Id:
<176895840810.676405.3513205876401603776.git-patchwork-notify@kernel.org>
Date: Wed, 21 Jan 2026 01:20:08 +0000
From: patchwork-bot+netdevbpf@...nel.org
To: Zesen Liu <ftyghome@...il.com>
Cc: ast@...nel.org, daniel@...earbox.net, andrii@...nel.org,
martin.lau@...ux.dev, eddyz87@...il.com, song@...nel.org,
yonghong.song@...ux.dev, john.fastabend@...il.com, kpsingh@...nel.org,
sdf@...ichev.me, haoluo@...gle.com, jolsa@...nel.org,
mattbobrowski@...gle.com, rostedt@...dmis.org, mhiramat@...nel.org,
mathieu.desnoyers@...icios.com, davem@...emloft.net, edumazet@...gle.com,
kuba@...nel.org, pabeni@...hat.com, horms@...nel.org, dxu@...uu.xyz,
bpf@...r.kernel.org, linux-kernel@...r.kernel.org,
linux-trace-kernel@...r.kernel.org, netdev@...r.kernel.org,
electronlsr@...il.com, gplhust955@...il.com, haoran.ni.cs@...il.com
Subject: Re: [PATCH bpf-next v3 0/2] bpf: Fix memory access flags in helper
prototypes
Hello:
This series was applied to bpf/bpf-next.git (master)
by Alexei Starovoitov <ast@...nel.org>:
On Tue, 20 Jan 2026 16:28:45 +0800 you wrote:
> Hi,
>
> This series adds missing memory access flags (MEM_RDONLY or MEM_WRITE) to
> several bpf helper function prototypes that use ARG_PTR_TO_MEM but lack the
> correct flag. It also adds a new check in verifier to ensure the flag is
> specified.
>
> [...]
Here is the summary with links:
- [bpf-next,v3,1/2] bpf: Fix memory access flags in helper prototypes
https://git.kernel.org/bpf/bpf-next/c/802eef5afb18
- [bpf-next,v3,2/2] bpf: Require ARG_PTR_TO_MEM with memory flag
https://git.kernel.org/bpf/bpf-next/c/ed4724212f6f
You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html
Powered by blists - more mailing lists