Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Fri, 8 Mar 2024 06:38:07 +0100 you wrote: > set_memory_ro() can fail, leaving memory unprotected. > > Check its return and take it into account as an error. > > Link: https://github.com/KSPP/linux/issues/7 > Signed-off-by: Christophe Leroy <christophe.leroy@xxxxxxxxxx> > Cc: linux-hardening@xxxxxxxxxxxxxxx <linux-hardening@xxxxxxxxxxxxxxx> > Reviewed-by: Kees Cook <keescook@xxxxxxxxxxxx> > > [...] Here is the summary with links: - [bpf-next,v3,1/2] bpf: Take return from set_memory_ro() into account with bpf_prog_lock_ro() https://git.kernel.org/bpf/bpf-next/c/7d2cc63eca0c - [bpf-next,v3,2/2] bpf: Take return from set_memory_rox() into account with bpf_jit_binary_lock_ro() https://git.kernel.org/bpf/bpf-next/c/e60adf513275 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html