Hello: This patch was applied to bpf/bpf-next.git (master) by Daniel Borkmann <daniel@xxxxxxxxxxxxx>: On Wed, 15 Mar 2023 17:54:00 +0100 you wrote: > For every BPF_ADD/SUB involving a pointer, adjust_ptr_min_max_vals() > ensures that the resulting pointer has a constant offset if > bypass_spec_v1 is false. This is ensured by calling > sanitize_check_bounds() which in turn calls > check_stack_access_for_ptr_arithmetic(). There, -EACCESS is returned if > the register's offset is not constant, thereby rejecting the program. > > [...] Here is the summary with links: - bpf: remove misleading spec_v1 check on var-offset stack read https://git.kernel.org/bpf/bpf-next/c/082cdc69a465 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html