Hello: This patch was applied to bpf/bpf.git (master) by Daniel Borkmann <daniel@xxxxxxxxxxxxx>: On Tue, 24 May 2022 10:12:27 +0800 you wrote: > From: Menglong Dong <imagedong@xxxxxxxxxxx> > > I think there is something wrong with BPF_PROBE_MEM in ___bpf_prog_run() > in big-endian machine. Let's make a test and see what will happen if we > want to load a 'u16' with BPF_PROBE_MEM. > > Let's make the src value '0x0001', the value of dest register will become > 0x0001000000000000, as the value will be loaded to the first 2 byte of > DST with following code: > > [...] Here is the summary with links: - [bpf,v2] bpf: fix probe read error in ___bpf_prog_run() https://git.kernel.org/bpf/bpf/c/caff1fa4118c You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html