Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Wed, 25 Jun 2025 11:24:11 -0700 you wrote: > Currently, pointers returned by `bpf_rdonly_cast()` have a type of > "pointer to btf id", and only casts to structure types are allowed. > Access to memory pointed to by these pointers is done through > `BPF_PROBE_{MEM,MEMSX}` instructions and does not produce errors on > invalid memory access. > > This patch set extends `bpf_rdonly_cast()` to allow casts to an > equivalent of 'void *', effectively replacing > `bpf_probe_read_kernel()` calls in situations where access to > individual bytes or integers is necessary. > > [...] Here is the summary with links: - [bpf-next,v3,1/3] bpf: add bpf_features enum https://git.kernel.org/bpf/bpf-next/c/b23e97ffc252 - [bpf-next,v3,2/3] bpf: allow void* cast using bpf_rdonly_cast() https://git.kernel.org/bpf/bpf-next/c/f2362a57aeff - [bpf-next,v3,3/3] selftests/bpf: check operations on untrusted ro pointers to mem https://git.kernel.org/bpf/bpf-next/c/12ed81f82391 You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html