Patch Series

Subject bpf: Fix invalid mem access when update_effective_progs fails in __cgroup_bpf_detach
Author pulehui@huaweicloud.com
Date 2025-11-10 09:25:36 +0000 UTC
Version 3
Cc alan.maguire@oracle.com andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com haoluo@google.com john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org martin.lau@linux.dev pulehui@huawei.com pulehui@huaweicloud.com sdf@fomichev.me song@kernel.org yonghong.song@linux.dev

Patches (1)

Name Content [All]
[PATCH bpf v3] bpf: Fix invalid mem access when update_effective_progs fails in __cgroup_bpf_detach [Body]

Session 2025-11-10

ID (for dev) 0b1480e0-d037-4341-83dd-6a76f8b70a33
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base ba36dd5ee6fd4643ebbf6ee6eefcecf0b07e35c7 [Config] passed [Log]
[KASAN] Boot test: Base ba36dd5ee6fd4643ebbf6ee6eefcecf0b07e35c7 [Config] passed
[KASAN] Build Patched ba36dd5ee6fd4643ebbf6ee6eefcecf0b07e35c7 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched ba36dd5ee6fd4643ebbf6ee6eefcecf0b07e35c7 [Config] [patched] passed
[KASAN] Fuzzing ba36dd5ee6fd4643ebbf6ee6eefcecf0b07e35c7 [Config] ba36dd5ee6fd4643ebbf6ee6eefcecf0b07e35c7 [Config] [patched] passed [Log] [Artifacts]