[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-Id: <20171018.141155.1830215730026401984.davem@davemloft.net>
Date: Wed, 18 Oct 2017 14:11:55 +0100 (WEST)
From: David Miller <davem@...emloft.net>
To: chenbofeng.kernel@...il.com
Cc: netdev@...r.kernel.org, Selinux@...ho.nsa.gov,
linux-security-module@...r.kernel.org, jeffv@...gle.com,
alexei.starovoitov@...il.com, lorenzo@...gle.com,
daniel@...earbox.net, sds@...ho.nsa.gov, james.l.morris@...cle.com,
paul@...l-moore.com, fengc@...gle.com
Subject: Re: [PATCH net-next v6 0/5] bpf: security: New file mode and LSM
hooks for eBPF object permission control
From: David Miller <davem@...emloft.net>
Date: Wed, 18 Oct 2017 13:47:29 +0100 (WEST)
> Series applied.
I had to revert as this breaks the build:
net/netfilter/xt_bpf.c: In function ‘__bpf_mt_check_path’:
net/netfilter/xt_bpf.c:59:7: error: too few arguments to function ‘bpf_obj_get_user’
fd = bpf_obj_get_user(path);
^~~~~~~~~~~~~~~~
Powered by blists - more mailing lists