Patch Series

Subject bpf: Fix Null-Pointer Dereference in kernel_clone() via BPF fmod_ret on security_task_alloc
Author yangfeng59949@163.com
Date 2026-04-11 16:35:55 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com jiayuan.chen@linux.dev john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org leon.hwang@linux.dev linux-kernel@vger.kernel.org linux-kselftest@vger.kernel.org martin.lau@linux.dev mattbobrowski@google.com memxor@gmail.com menglong.dong@linux.dev song@kernel.org yangfeng59949@163.com yangfeng@kylinos.cn yonghong.song@linux.dev

Patches (2)

Name Content [All]
[PATCH v3 bpf-next 1/2] bpf: Fix Null-Pointer Dereference in kernel_clone() via BPF fmod_ret on security_task_alloc [Body]
[PATCH v3 bpf-next 2/2] selftests/bpf: Add selftests for verifying return values of fmod_ret. [Body]
Session 2026-04-11
ID (for dev) 910eb7ca-95eb-4d9f-87a2-7021341ee811
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] passed [Log]
[KASAN] Boot test: Base 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] passed [Log]
[KASAN] Build Patched 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] passed [Log]
[KASAN] Fuzz 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] passed [Log] [Artifacts]