Hello: This patch was applied to bpf/bpf.git (master) by Daniel Borkmann <daniel@xxxxxxxxxxxxx>: On Mon, 19 Feb 2024 00:09:33 +0900 you wrote: > syzbot reported the following NULL pointer dereference issue [1]: > > BUG: kernel NULL pointer dereference, address: 0000000000000000 > ... > RIP: 0010:0x0 > ... > Call Trace: > <TASK> > sk_psock_verdict_data_ready+0x232/0x340 net/core/skmsg.c:1230 > unix_stream_sendmsg+0x9b4/0x1230 net/unix/af_unix.c:2293 > sock_sendmsg_nosec net/socket.c:730 [inline] > __sock_sendmsg+0x221/0x270 net/socket.c:745 > ____sys_sendmsg+0x525/0x7d0 net/socket.c:2584 > ___sys_sendmsg net/socket.c:2638 [inline] > __sys_sendmsg+0x2b0/0x3a0 net/socket.c:2667 > do_syscall_64+0xf9/0x240 > entry_SYSCALL_64_after_hwframe+0x6f/0x77 > > [...] Here is the summary with links: - [bpf] bpf, sockmap: Fix NULL pointer dereference in sk_psock_verdict_data_ready() https://git.kernel.org/bpf/bpf/c/4cd12c6065df You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html