[ Sasha's backport helper bot ]
Hi,
✅ All tests passed successfully. No issues detected. No action required from the submitter.
The upstream commit SHA1 provided is correct: 51081a3f25c742da5a659d7fc6fd77ebfdd555be
WARNING: Author mismatch between patch and upstream commit: Backport author: Shung-Hsi Yushung-hsi.yu@suse.com Commit author: Eduard Zingermaneddyz87@gmail.com
Status in newer kernel trees: 6.14.y | Present (exact SHA1)
Note: The patch differs from the upstream commit: --- 1: 51081a3f25c74 ! 1: 6678a7d80c020 bpf: track changes_pkt_data property for global functions @@ Metadata ## Commit message ## bpf: track changes_pkt_data property for global functions
+ commit 51081a3f25c742da5a659d7fc6fd77ebfdd555be upstream. + When processing calls to certain helpers, verifier invalidates all packet pointers in a current state. For example, consider the following program: @@ Commit message Signed-off-by: Eduard Zingerman eddyz87@gmail.com Link: https://lore.kernel.org/r/20241210041100.1898468-4-eddyz87@gmail.com Signed-off-by: Alexei Starovoitov ast@kernel.org + Signed-off-by: Shung-Hsi Yu shung-hsi.yu@suse.com
## include/linux/bpf_verifier.h ## @@ include/linux/bpf_verifier.h: struct bpf_subprog_info { @@ include/linux/bpf_verifier.h: struct bpf_subprog_info { bool keep_fastcall_stack: 1; + bool changes_pkt_data: 1;
- enum priv_stack_mode priv_stack_mode; u8 arg_cnt; + struct bpf_subprog_arg_info args[MAX_BPF_FUNC_REG_ARGS];
## kernel/bpf/verifier.c ## @@ kernel/bpf/verifier.c: static int check_func_call(struct bpf_verifier_env *env, struct bpf_insn *insn, ---
Results of testing on various branches:
| Branch | Patch Apply | Build Test | |---------------------------|-------------|------------| | stable/linux-6.14.y | Success | Success |