In the Linux kernel, the following vulnerability has been resolved:
bpf: Remove tstrun from lwtseg6localprogops.
The syzbot reported that the lwtseg6 related BPF ops can be invoked via bpftestrun() without without entering inputactionendbpf() first.
Martin KaFai Lau said that self test for BPFPROGTYPELWTSEG6LOCAL probably didn't work since it was introduced in commit 04d4b274e2a ("ipv6: sr: Add seg6local action End.BPF"). The reason is that the per-CPU variable seg6bpfsrh_states::srh is never assigned in the self test case but each BPF function expects it.
Remove testrun for BPFPROGTYPELWT_SEG6LOCAL.