Hello: This patch was applied to bpf/bpf-next.git (master) by Andrii Nakryiko <andrii@xxxxxxxxxx>: On Thu, 14 Mar 2024 15:04:38 +0000 you wrote: > From: Quentin Monnet <qmo@xxxxxxxxxx> > > In bpf_objec_load_prog(), there's no guarantee that obj->btf is non-NULL > when passing it to btf__fd(), and this function does not perform any > check before dereferencing its argument (as bpf_object__btf_fd() used to > do). As a consequence, we get segmentation fault errors in bpftool (for > example) when trying to load programs that come without BTF information. > > [...] Here is the summary with links: - [bpf-next,v2] libbpf: Prevent null-pointer dereference when prog to load has no BTF https://git.kernel.org/bpf/bpf-next/c/9bf48fa19a4b You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html