Hello: This patch was applied to bpf/bpf-next.git (master) by Andrii Nakryiko <andrii@xxxxxxxxxx>: On Fri, 25 Nov 2022 14:06:17 -0800 you wrote: > From: Alexei Starovoitov <ast@xxxxxxxxxx> > > The networking programs typically don't require CAP_PERFMON, but through kfuncs > like bpf_cast_to_kern_ctx() they can access memory through PTR_TO_BTF_ID. In > such case enforce CAP_PERFMON. > Also make sure that only GPL programs can access kernel data structures. > All kfuncs require GPL already. > > [...] Here is the summary with links: - [v2,bpf-next] bpf: Tighten ptr_to_btf_id checks. https://git.kernel.org/bpf/bpf-next/c/c67cae551f0d You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html