Hello: This series was applied to bpf/bpf.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Fri, 2 Feb 2024 18:39:32 +0800 you wrote: > From: Hou Tao <houtao1@xxxxxxxxxx> > > Hi, > > As reported by syzboot [1] and [2], when trying to read vsyscall page > by using bpf_probe_read_kernel() or bpf_probe_read(), oops may happen. > > [...] Here is the summary with links: - [bpf,v3,1/3] x86/mm: Move is_vsyscall_vaddr() into asm/vsyscall.h https://git.kernel.org/bpf/bpf/c/ee0e39a63b78 - [bpf,v3,2/3] x86/mm: Disallow vsyscall page read for copy_from_kernel_nofault() https://git.kernel.org/bpf/bpf/c/32019c659ecf - [bpf,v3,3/3] selftest/bpf: Test the read of vsyscall page under x86-64 https://git.kernel.org/bpf/bpf/c/be66d79189ec You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html