In the Linux kernel, the following vulnerability has been resolved: bpf: Add bpfprogrundatapointers() syzbot found that clsbpfclassify() is able to change tcskbcb(skb)->dropreason triggering a warning in skskbreasondrop(). WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 _skskbreasondrop net/core/skbuff.c:1189 [inline] WARNING: CPU: 0 PID: 5965 at net/core/skbuff.c:1192 skskbreasondrop+0x76/0x170 net/core/skbuff.c:1214 struct tcskbcb has been added in commit ec624fe740b4 ("net/sched: Extend qdisc control block with tc control block"), which added a wrong interaction with db58ba459202 ("bpf: wire in data and dataend for clsactbpf"). dropreason was added later. Add bpfprogrundatapointers() helper to save/restore the netsched storage colliding with BPF datameta/dataend.