Hello: This series was applied to bpf/bpf.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Thu, 12 Dec 2024 01:20:48 -0800 you wrote: > This set fixes a issue reported for tracing and struct ops programs > using btf_ctx_access for ctx checks, where loading a pointer argument > from the ctx doesn't enforce a BPF_DW access size check. The original > report is at link [0]. Also add a regression test along with the fix. > > [0]: https://lore.kernel.org/bpf/51338.1732985814@localhost > > [...] Here is the summary with links: - [bpf,v1,1/2] bpf: Check size for BTF-based ctx access of pointer members https://git.kernel.org/bpf/bpf/c/659b9ba7cb2d - [bpf,v1,2/2] selftests/bpf: Add test for narrow ctx load for pointer args https://git.kernel.org/bpf/bpf/c/8025731c28be You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html