summaryrefslogtreecommitdiff
path: root/include/uapi/linux/ipc.h
diff options
context:
space:
mode:
authorDavid S. Miller <davem@davemloft.net>2018-05-17 23:33:52 -0400
committerDavid S. Miller <davem@davemloft.net>2018-05-17 23:33:52 -0400
commit6caf9fb3bda17df59de4ed6ed4950c43ca1361e3 (patch)
treef8a69e825b9e240972566dbd8e5af0ec49d9dae9 /include/uapi/linux/ipc.h
parent113f99c3358564a0647d444c2ae34e8b1abfd5b9 (diff)
parent050fad7c4534c13c8eb1d9c2ba66012e014773cb (diff)
Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf
Daniel Borkmann says: ==================== pull-request: bpf 2018-05-18 The following pull-request contains BPF updates for your *net* tree. The main changes are: 1) Fix two bugs in sockmap, a use after free in sockmap's error path from sock_map_ctx_update_elem() where we mistakenly drop a reference we didn't take prior to that, and in the same function fix a race in bpf_prog_inc_not_zero() where we didn't use the progs from prior READ_ONCE(), from John. 2) Reject program expansions once we figure out that their jump target which crosses patchlet boundaries could otherwise get truncated in insn->off space, from Daniel. 3) Check the return value of fopen() in BPF selftest's test_verifier where we determine whether unpriv BPF is disabled, and iff we do fail there then just assume it is disabled. This fixes a segfault when used with older kernels, from Jesper. ==================== Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'include/uapi/linux/ipc.h')
0 files changed, 0 insertions, 0 deletions