This set fixes a issue reported for tracing and struct ops programs using btf_ctx_access for ctx checks, where loading a pointer argument from the ctx doesn't enforce a BPF_DW access size check. The original report is at link [0]. Also add a regression test along with the fix. [0]: https://lore.kernel.org/bpf/51338.1732985814@localhost Kumar Kartikeya Dwivedi (2): bpf: Check size for BTF-based ctx access of pointer members selftests/bpf: Add test for narrow ctx load for pointer args kernel/bpf/btf.c | 6 +++ .../bpf/progs/verifier_btf_ctx_access.c | 40 ++++++++++++++++++- .../selftests/bpf/progs/verifier_d_path.c | 4 +- 3 files changed, 46 insertions(+), 4 deletions(-) base-commit: 7d0d673627e20cfa3b21a829a896ce03b58a4f1c -- 2.43.5