[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <b429e5e5-12cb-e05f-f9d9-1f4d1d066428@iogearbox.net>
Date: Thu, 17 May 2018 22:51:03 +0200
From: Daniel Borkmann <daniel@...earbox.net>
To: "Gustavo A. R. Silva" <gustavo@...eddedor.com>,
Alexei Starovoitov <ast@...nel.org>,
John Fastabend <john.fastabend@...il.com>
Cc: netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH 0/2] bpf: sockmap, fix uninitialized variable and
double-free
On 05/17/2018 04:04 PM, Gustavo A. R. Silva wrote:
> This patchset aims to fix an uninitialized variable issue and
> a double-free issue in __sock_map_ctx_update_elem.
>
> Both issues were reported by Coverity.
>
> Thanks.
>
> Gustavo A. R. Silva (2):
> bpf: sockmap, fix uninitialized variable
> bpf: sockmap, fix double-free
>
> kernel/bpf/sockmap.c | 3 +--
> 1 file changed, 1 insertion(+), 2 deletions(-)
Applied to bpf-next, thanks Gustavo!
P.s.: Please indicate that next time in the email subject via '[PATCH bpf-next]'.
Powered by blists - more mailing lists