Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Fri, 4 Feb 2022 15:58:48 -0800 you wrote: > When kattr->test.data_size_in > INT_MAX, signed min_t will assign > negative value to data_len. This negative value then gets passed > over to copy_from_user where it is converted to (big) unsigned. > > Use unsigned min_t to avoid this overflow. > > usercopy: Kernel memory overwrite attempt detected to wrapped address > (offset 0, size 18446612140539162846)! > > [...] Here is the summary with links: - [bpf-next,1/2] bpf: test_run: fix overflow in xdp frags parsing https://git.kernel.org/bpf/bpf-next/c/9d63b59d1e9d - [bpf-next,2/2] bpf: test_run: fix overflow in bpf_test_finish frags parsing https://git.kernel.org/bpf/bpf-next/c/5d1e9f437df5 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html