Patch Series

Subject bpf: Fix invalid mem access when update_effective_progs fails in __cgroup_bpf_detach
Author pulehui@huaweicloud.com
Date 2025-11-15 10:23:43 +0000 UTC
Version 5
Cc alan.maguire@oracle.com andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com haoluo@google.com john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org martin.lau@linux.dev pulehui@huawei.com pulehui@huaweicloud.com sdf@fomichev.me song@kernel.org yonghong.song@linux.dev

Patches (1)

Name Content [All]
[PATCH bpf v5] bpf: Fix invalid mem access when update_effective_progs fails in __cgroup_bpf_detach [Body]

Session 2025-11-15

ID (for dev) 956de0c1-6ef8-4051-a936-2e7981661395
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 91a78ce994e710f2e983071ccf6d0e60fc9c1ac5 [Config] passed [Log]
[KASAN] Boot test: Base 91a78ce994e710f2e983071ccf6d0e60fc9c1ac5 [Config] passed
[KASAN] Build Patched 91a78ce994e710f2e983071ccf6d0e60fc9c1ac5 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 91a78ce994e710f2e983071ccf6d0e60fc9c1ac5 [Config] [patched] passed
[KASAN] Fuzzing 91a78ce994e710f2e983071ccf6d0e60fc9c1ac5 [Config] 91a78ce994e710f2e983071ccf6d0e60fc9c1ac5 [Config] [patched] passed [Log] [Artifacts]