Hello: This series was applied to bpf/bpf-next.git (master) by Martin KaFai Lau <martin.lau@xxxxxxxxxx>: On Tue, 30 May 2023 13:50:29 -0700 you wrote: > syzbot reported a warning in [1] with the following stacktrace: > WARNING: CPU: 0 PID: 5005 at kernel/bpf/btf.c:1988 btf_type_id_size+0x2d9/0x9d0 kernel/bpf/btf.c:1988 > ... > RIP: 0010:btf_type_id_size+0x2d9/0x9d0 kernel/bpf/btf.c:1988 > ... > Call Trace: > <TASK> > map_check_btf kernel/bpf/syscall.c:1024 [inline] > map_create+0x1157/0x1860 kernel/bpf/syscall.c:1198 > __sys_bpf+0x127f/0x5420 kernel/bpf/syscall.c:5040 > __do_sys_bpf kernel/bpf/syscall.c:5162 [inline] > __se_sys_bpf kernel/bpf/syscall.c:5160 [inline] > __x64_sys_bpf+0x79/0xc0 kernel/bpf/syscall.c:5160 > do_syscall_x64 arch/x86/entry/common.c:50 [inline] > do_syscall_64+0x39/0xb0 arch/x86/entry/common.c:80 > entry_SYSCALL_64_after_hwframe+0x63/0xcd > > [...] Here is the summary with links: - [bpf-next,v2,1/2] bpf: Silence a warning in btf_type_id_size() https://git.kernel.org/bpf/bpf-next/c/e6c2f594ed96 - [bpf-next,v2,2/2] selftests/bpf: Add a test where map key_type_id with decl_tag type https://git.kernel.org/bpf/bpf-next/c/e38096d95f4d You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html