Re: [PATCH bpf-next 1/2] bpf, test_run: Fix user-memory-access vulnerability for LIVE_FRAMES

From: Toke Høiland-Jørgensen
Date: Mon Jan 05 2026 - 05:49:37 EST


KaFai Wan <kafai.wan@xxxxxxxxx> writes:

> This fix reverts to the original version and ensures data_hard_start
> correctly points to the xdp_frame structure, eliminating the security
> risk.

This is wrong. We should just be checking the meta_len on input to
account for the size of xdp_frame. I'll send a patch.

-Toke