From mboxrd@z Thu Jan 1 00:00:00 1970 From: Daniel Borkmann Subject: [PATCH bpf 0/2] Two x86 BPF JIT fixes Date: Wed, 2 May 2018 20:12:21 +0200 Message-ID: <20180502181223.30613-1-daniel@iogearbox.net> Cc: netdev@vger.kernel.org, Daniel Borkmann To: ast@kernel.org Return-path: Received: from www62.your-server.de ([213.133.104.62]:51377 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1750944AbeEBSM3 (ORCPT ); Wed, 2 May 2018 14:12:29 -0400 Sender: netdev-owner@vger.kernel.org List-ID: Fix two memory leaks in x86 JIT. For details, please see individual patches in this series. Thanks! Daniel Borkmann (2): bpf, x64: fix memleak when not converging after image bpf, x64: fix memleak when not converging on calls arch/x86/net/bpf_jit_comp.c | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) -- 2.9.5