Patch Series

Subject bpf: Fix call offset truncation and OOB read in bpf_patch_call_args()
Author tangyazhou@zju.edu.cn
Date 2026-05-06 09:47:12 +0000 UTC
Version
Cc andrii@kernel.org ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net eddyz87@gmail.com emil@etsalapatis.com haoluo@google.com john.fastabend@gmail.com jolsa@kernel.org kpsingh@kernel.org martin.lau@linux.dev puranjay@kernel.org qmo@kernel.org sdf@fomichev.me shenghaoyuan0928@163.com song@kernel.org tangyazhou518@outlook.com tangyazhou@zju.edu.cn xukuohai@huawei.com xukuohai@huaweicloud.com yonghong.song@linux.dev ziye@zju.edu.cn

Patches (3)

Name Content [All]
[PATCH bpf-next v10 1/3] bpf: Fix out-of-bounds read in bpf_patch_call_args() [Body]
[PATCH bpf-next v10 2/3] bpf: Fix s16 truncation for large bpf-to-bpf call offsets [Body]
[PATCH bpf-next v10 3/3] selftests/bpf: Add test for large offset bpf-to-bpf call [Body]
Session 2026-05-06
ID (for dev) 1d486c5a-1585-4e26-b578-dbe0671d958b
Status finished
Triaged OK [Log]
Execution Log [Link]
Test Base Patched Verdict
[KASAN] Build Base 2ca6723a5f7b68c739dba47b2639e3eaa7884b09 [Config] passed [Log]
[KASAN] Boot test: Base 2ca6723a5f7b68c739dba47b2639e3eaa7884b09 [Config] passed [Log]
[KASAN] Build Patched 2ca6723a5f7b68c739dba47b2639e3eaa7884b09 [Config] [patched] passed [Log]
[KASAN] Boot test: Patched 2ca6723a5f7b68c739dba47b2639e3eaa7884b09 [Config] [patched] passed [Log]
[KASAN] Fuzz 2ca6723a5f7b68c739dba47b2639e3eaa7884b09 [Config] 2ca6723a5f7b68c739dba47b2639e3eaa7884b09 [Config] [patched] passed [Log] [Artifacts]