This is an automated email from the git hooks/post-receive script.
unknown user pushed a change to branch master in repository linux.
from a0e3919a2df2 Merge tag 'usb-6.13-rc3' of git://git.kernel.org/pub/scm/l [...] new 75e072a390da bpf, sockmap: Fix update element with same new ed1fc5d76b81 bpf, sockmap: Fix race between element replace and close() new 11d5245f608f selftests/bpf: Extend test for sockmap update with same new ef1b808e3b7c bpf: Fix UAF via mismatching bpf_prog/attachment RCU flavors new 978c4486cca5 bpf,perf: Fix invalid prog_array access in perf_event_deta [...] new 27e88bc4df1d bpf: add find_containing_subprog() utility function new b238e187b4a2 bpf: refactor bpf_helper_changes_pkt_data to use helper number new 51081a3f25c7 bpf: track changes_pkt_data property for global functions new 3f23ee5590d9 selftests/bpf: test for changing packet data from global f [...] new 81f6d0530ba0 bpf: check changes_pkt_data property for extension programs new 89ff40890d8f selftests/bpf: freplace tests for tracking of changes_packet_data new 1a4607ffba35 bpf: consider that tail calls invalidate packet pointers new d9706b56e13b selftests/bpf: validate that tail call invalidates packet [...] new cf8b876363da Merge branch 'bpf-track-changes_pkt_data-property-for-glob [...] new c4441ca86afe bpf: fix potential error return new 7d0d673627e2 bpf: Fix theoretical prog_array UAF in __uprobe_perf_func() new ac6542ad9275 bpf: fix null dereference when computing changes_pkt_data [...] new 04789af756a4 selftests/bpf: extend changes_pkt_data with cases w/o subprograms new 659b9ba7cb2d bpf: Check size for BTF-based ctx access of pointer members new 8025731c28be selftests/bpf: Add test for narrow ctx load for pointer args new e4c80f69758e Merge branch 'add-missing-size-check-for-btf-based-ctx-access' new c00d738e1673 bpf: Revert "bpf: Mark raw_tp arguments with PTR_MAYBE_NULL" new 838a10bd2ebf bpf: Augment raw_tp arguments with PTR_MAYBE_NULL new 0da1955b5bd2 selftests/bpf: Add tests for raw_tp NULL args new a8e1a3ddf724 Merge branch 'explicit-raw_tp-null-arguments' new c83508da5620 bpf: Avoid deadlock caused by nested kprobe and fentry bpf [...] new 35f301dd4551 Merge tag 'bpf-fixes' of git://git.kernel.org/pub/scm/linu [...] new f103396ae318 scsi: ufs: core: Update compl_time_stamp_local_clock after [...] new 2d8308bf5b67 Merge tag 'scsi-fixes' of git://git.kernel.org/pub/scm/lin [...]
The 29 revisions listed above as "new" are entirely new to this repository and will be described in separate emails. The revisions listed as "adds" were already present in the repository and have only been added to this reference.
Summary of changes: drivers/ufs/core/ufshcd.c | 1 + include/linux/bpf.h | 20 +-- include/linux/bpf_verifier.h | 1 + include/linux/filter.h | 2 +- kernel/bpf/Makefile | 6 + kernel/bpf/btf.c | 149 ++++++++++++++++++- kernel/bpf/core.c | 8 +- kernel/bpf/verifier.c | 160 ++++++++++----------- kernel/trace/bpf_trace.c | 11 ++ kernel/trace/trace_uprobe.c | 6 +- net/core/filter.c | 65 ++++----- net/core/sock_map.c | 6 +- .../selftests/bpf/prog_tests/changes_pkt_data.c | 107 ++++++++++++++ .../testing/selftests/bpf/prog_tests/raw_tp_null.c | 3 + .../selftests/bpf/prog_tests/sockmap_basic.c | 8 +- .../testing/selftests/bpf/progs/changes_pkt_data.c | 39 +++++ .../bpf/progs/changes_pkt_data_freplace.c | 18 +++ tools/testing/selftests/bpf/progs/raw_tp_null.c | 19 ++- .../testing/selftests/bpf/progs/raw_tp_null_fail.c | 24 ++++ tools/testing/selftests/bpf/progs/tc_bpf2bpf.c | 2 + .../selftests/bpf/progs/test_tp_btf_nullable.c | 6 +- .../selftests/bpf/progs/verifier_btf_ctx_access.c | 40 +++++- .../testing/selftests/bpf/progs/verifier_d_path.c | 4 +- tools/testing/selftests/bpf/progs/verifier_sock.c | 56 ++++++++ 24 files changed, 597 insertions(+), 164 deletions(-) create mode 100644 tools/testing/selftests/bpf/prog_tests/changes_pkt_data.c create mode 100644 tools/testing/selftests/bpf/progs/changes_pkt_data.c create mode 100644 tools/testing/selftests/bpf/progs/changes_pkt_data_freplace.c create mode 100644 tools/testing/selftests/bpf/progs/raw_tp_null_fail.c