Hello: This series was applied to bpf/bpf-next.git (master) by Alexei Starovoitov <ast@xxxxxxxxxx>: On Fri, 4 Jul 2025 16:03:46 -0700 you wrote: > This patch set introduces two usability enhancements leveraging > untrusted pointers to mem: > - When reading a pointer field from a PTR_TO_BTF_ID, the resulting > value is now assumed to be PTR_TO_MEM|MEM_RDONLY|PTR_UNTRUSTED > instead of SCALAR_VALUE, provided the pointer points to a primitive > type. > - __arg_untrusted attribute for global function parameters, > allowed for pointer arguments of both structural and primitive > types: > - For structural types, the attribute produces > PTR_TO_BTF_ID|PTR_UNTRUSTED. > - For primitive types, it yields > PTR_TO_MEM|MEM_RDONLY|PTR_UNTRUSTED. > > [...] Here is the summary with links: - [bpf-next,v2,1/8] bpf: make makr_btf_ld_reg return error for unexpected reg types https://git.kernel.org/bpf/bpf-next/c/b9d44bc9fd30 - [bpf-next,v2,2/8] bpf: rdonly_untrusted_mem for btf id walk pointer leafs https://git.kernel.org/bpf/bpf-next/c/2d5c91e1cc14 - [bpf-next,v2,3/8] selftests/bpf: ptr_to_btf_id struct walk ending with primitive pointer https://git.kernel.org/bpf/bpf-next/c/f1f5d6f25d09 - [bpf-next,v2,4/8] bpf: attribute __arg_untrusted for global function parameters https://git.kernel.org/bpf/bpf-next/c/182f7df70419 - [bpf-next,v2,5/8] libbpf: __arg_untrusted in bpf_helpers.h https://git.kernel.org/bpf/bpf-next/c/aaa0e57e6930 - [bpf-next,v2,6/8] selftests/bpf: test cases for __arg_untrusted https://git.kernel.org/bpf/bpf-next/c/54ac2c9418af - [bpf-next,v2,7/8] bpf: support for void/primitive __arg_untrusted global func params https://git.kernel.org/bpf/bpf-next/c/c4aa454c64ae - [bpf-next,v2,8/8] selftests/bpf: tests for __arg_untrusted void * global func params https://git.kernel.org/bpf/bpf-next/c/68cca81fd57f You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html