On Tue, Apr 07, 2026 at 10:26:26AM +0800, Jiayuan Chen wrote: > When a BPF sock_ops program accesses ctx fields with dst_reg == src_reg, > the SOCK_OPS_GET_SK() and SOCK_OPS_GET_FIELD() macros fail to zero the > destination register in the !fullsock / !locked_tcp_sock path, leading to > OOB read (GET_SK) and kernel pointer leak (GET_FIELD).
Acked-by: Martin KaFai Lau <[email protected]> Jakub, can you help to push it to the net tree? Thanks!

