Patch Series

Subject bpf: Fix call offset truncation and OOB read in bpf_patch_call_args()
Author tangyazhou@zju.edu.cn
Date 2026-04-21 14:45:02 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com emil@etsalapatis.com haoluo@google.com john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org martin.lau@linux.dev puranjay@kernel.org sdf@fomichev.me shenghaoyuan0928@163.com song@kernel.org tangyazhou518@outlook.com tangyazhou@zju.edu.cn xukuohai@huaweicloud.com yonghong.song@linux.dev ziye@zju.edu.cn

Patches (3)

Name Content [All]
[PATCH bpf-next v7 1/3] bpf: Fix out-of-bounds read in bpf_patch_call_args() [Body]
[PATCH bpf-next v7 2/3] bpf: Fix s16 truncation for large bpf-to-bpf call offsets [Body]
[PATCH bpf-next v7 3/3] selftests/bpf: Add test for large offset bpf-to-bpf call [Body]
Session 2026-04-21
ID (for dev) de2c6c79-c34b-4392-955b-58426cf16516
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base c8f0ee969f76277e562e44a20a6ff8bb47acab15 [Config] passed [Log]
[KASAN] Boot test: Base c8f0ee969f76277e562e44a20a6ff8bb47acab15 [Config] passed [Log]
[KASAN] Build Patched c8f0ee969f76277e562e44a20a6ff8bb47acab15 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched c8f0ee969f76277e562e44a20a6ff8bb47acab15 [Config] [patched] passed [Log]
[KASAN] Fuzz c8f0ee969f76277e562e44a20a6ff8bb47acab15 [Config] c8f0ee969f76277e562e44a20a6ff8bb47acab15 [Config] [patched] passed [Log] [Artifacts]