Description: bpf: Verifer, adjust_scalar_min_max_vals to always call update_reg_bounds() References: https://bugzilla.suse.com/show_bug.cgi?id=1194227 https://bugzilla.redhat.com/show_bug.cgi?id=2036024 Notes: bwh> I think this can be ignored. Privileged users can generally read bwh> kernel memory through kprobes/tracepoints. Unprivileged use of bwh> eBPF is now disabled by default in all Debian suites. Bugs: upstream: released (5.7-rc1) [294f2fc6da27620a506e6c050241655459ccd6bd] 5.10-upstream-stable: N/A "Fixed before branching point" 4.19-upstream-stable: released (4.19.256) [6c6b84ef5ea8dc0ca3559ccf69810960e348c555] 4.9-upstream-stable: sid: released (5.7.6-1) 5.10-bullseye-security: N/A "Fixed before branching point" 4.19-buster-security: released (4.19.260-1) 4.9-stretch-security: ignored "Too risky to backport, and mitigated by default"