Patch Series

Subject bpf: Fix Null-Pointer Dereference in kernel_clone() via BPF fmod_ret on security_task_alloc
Author yangfeng59949@163.com
Date 2026-04-10 06:10:36 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com jiayuan.chen@linux.dev john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org linux-kernel@vger.kernel.org linux-kselftest@vger.kernel.org martin.lau@linux.dev mattbobrowski@google.com memxor@gmail.com song@kernel.org yangfeng59949@163.com yonghong.song@linux.dev

Patches (2)

Name Content [All]
[PATCH v2 bpf-next 1/2] bpf: Fix Null-Pointer Dereference in kernel_clone() via BPF fmod_ret on security_task_alloc [Body]
[PATCH v2 bpf-next 2/2] selftests/bpf: Add selftests for verifying return values of fmod_ret. [Body]
Session 2026-04-10
ID (for dev) f19cb466-9770-40ac-a9b3-593c9f1dfbe1
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] passed [Log]
[KASAN] Boot test: Base 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] passed [Log]
[KASAN] Build Patched 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] passed [Log]
[KASAN] Fuzz 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] 0eeb0094ba0321f0927806857b5f01c1577bc245 [Config] [patched] passed [Log] [Artifacts]