diff options
author | 2023-06-21 13:59:46 -0700 | |
---|---|---|
committer | 2023-06-21 13:59:46 -0700 | |
commit | 59bb14bda2f86550d10e65c9091ba442a0ac4b45 (patch) | |
tree | a64d972e5d282edcf9b2d6fbf33376596ed4e1d4 /scripts/generate_rust_analyzer.py | |
parent | Revert "net: phy: dp83867: perform soft reset and retain established link" (diff) | |
parent | bpf: Force kprobe multi expected_attach_type for kprobe_multi link (diff) | |
download | wireguard-linux-59bb14bda2f86550d10e65c9091ba442a0ac4b45.tar.xz wireguard-linux-59bb14bda2f86550d10e65c9091ba442a0ac4b45.zip |
Merge tag 'for-netdev' of https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf
Daniel Borkmann says:
====================
pull-request: bpf 2023-06-21
We've added 7 non-merge commits during the last 14 day(s) which contain
a total of 7 files changed, 181 insertions(+), 15 deletions(-).
The main changes are:
1) Fix a verifier id tracking issue with scalars upon spill,
from Maxim Mikityanskiy.
2) Fix NULL dereference if an exception is generated while a BPF
subprogram is running, from Krister Johansen.
3) Fix a BTF verification failure when compiling kernel with LLVM_IAS=0,
from Florent Revest.
4) Fix expected_attach_type enforcement for kprobe_multi link,
from Jiri Olsa.
5) Fix a bpf_jit_dump issue for x86_64 to pick the correct JITed image,
from Yonghong Song.
* tag 'for-netdev' of https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf:
bpf: Force kprobe multi expected_attach_type for kprobe_multi link
bpf/btf: Accept function names that contain dots
selftests/bpf: add a test for subprogram extables
bpf: ensure main program has an extable
bpf: Fix a bpf_jit_dump issue for x86_64 with sysctl bpf_jit_enable.
selftests/bpf: Add test cases to assert proper ID tracking on spill
bpf: Fix verifier id tracking of scalars on spill
====================
Link: https://lore.kernel.org/r/20230621101116.16122-1-daniel@iogearbox.net
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
Diffstat (limited to 'scripts/generate_rust_analyzer.py')
0 files changed, 0 insertions, 0 deletions