Patch Series

Subject bpf: Fix call offset truncation and OOB read in bpf_patch_call_args()
Author tangyazhou@zju.edu.cn
Date 2026-04-29 10:56:06 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com emil@etsalapatis.com haoluo@google.com john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org martin.lau@linux.dev puranjay@kernel.org sdf@fomichev.me shenghaoyuan0928@163.com song@kernel.org tangyazhou518@outlook.com tangyazhou@zju.edu.cn xukuohai@huaweicloud.com yonghong.song@linux.dev ziye@zju.edu.cn

Patches (3)

Name Content [All]
[PATCH bpf-next v8 1/3] bpf: Fix out-of-bounds read in bpf_patch_call_args() [Body]
[PATCH bpf-next v8 2/3] bpf: Fix s16 truncation for large bpf-to-bpf call offsets [Body]
[PATCH bpf-next v8 3/3] selftests/bpf: Add test for large offset bpf-to-bpf call [Body]
Session 2026-04-29
ID (for dev) 6e7308cb-cc16-41d4-8017-776c4c3f61cb
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 9f5b3ffc3f1dac7204e32eeeff84bc5cc55c393e [Config] passed [Log]
[KASAN] Boot test: Base 9f5b3ffc3f1dac7204e32eeeff84bc5cc55c393e [Config] passed [Log]
[KASAN] Build Patched 9f5b3ffc3f1dac7204e32eeeff84bc5cc55c393e [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 9f5b3ffc3f1dac7204e32eeeff84bc5cc55c393e [Config] [patched] passed [Log]
[KASAN] Fuzz 9f5b3ffc3f1dac7204e32eeeff84bc5cc55c393e [Config] 9f5b3ffc3f1dac7204e32eeeff84bc5cc55c393e [Config] [patched] passed [Log] [Artifacts]