diff options
author | David S. Miller <davem@davemloft.net> | 2019-01-19 16:38:12 -0800 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2019-01-19 16:38:12 -0800 |
commit | 6436408e814b81046f4595245c1f9bc4409e945c (patch) | |
tree | 435d9a06258e299a57739bdd2dbe2494b8aed619 /net/ipv4 | |
parent | df133f3f96257ee29696c0ed8bd198ec801dc810 (diff) | |
parent | e7c87bd6cc4ec7b0ac1ed0a88a58f8206c577488 (diff) |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf
Daniel Borkmann says:
====================
pull-request: bpf 2019-01-20
The following pull-request contains BPF updates for your *net* tree.
The main changes are:
1) Fix a out-of-bounds access in __bpf_redirect_no_mac, from Willem.
2) Fix bpf_setsockopt to reset sock dst on SO_MARK changes, from Peter.
3) Fix map in map masking to prevent out-of-bounds access under
speculative execution, from Daniel.
4) Fix bpf_setsockopt's SO_MAX_PACING_RATE to support TCP internal
pacing, from Yuchung.
5) Fix json writer license in bpftool, from Thomas.
6) Fix AF_XDP to check if an actually queue exists during umem
setup, from Krzysztof.
7) Several fixes to BPF stackmap's build id handling. Another fix
for bpftool build to account for libbfd variations wrt linking
requirements, from Stanislav.
8) Fix BPF samples build with clang by working around missing asm
goto, from Yonghong.
9) Fix libbpf to retry program load on signal interrupt, from Lorenz.
10) Various minor compile warning fixes in BPF code, from Mathieu.
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ipv4')
0 files changed, 0 insertions, 0 deletions