Hello: This patch was applied to bpf/bpf-next.git (master) by Andrii Nakryiko <andrii@xxxxxxxxxx>: On Tue, 26 Sep 2023 23:50:29 -0500 you wrote: > From: Ruowen Qin <ruowenq2@xxxxxxxxxxxx> > > Thanks to Alexei, patch 2/3 and 3/3 from v2 have been upstreamed. v3 > primarily addresses scenarios where the compiler lacks ubsan support. > > There are currently 6 BPF programs in syscall_tp_kern but the array to > hold the corresponding bpf_links in syscall_tp_user only has space for 4 > programs, given the array size is hardcoded. This causes the sample > program to fail due to an out-of-bound access that corrupts other stack > variables: > > [...] Here is the summary with links: - [bpf-next,v3,1/1] samples/bpf: Add -fsanitize=bounds to userspace programs https://git.kernel.org/bpf/bpf-next/c/9e09b75079e2 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html