From mboxrd@z Thu Jan 1 00:00:00 1970 From: Daniel Borkmann Subject: [PATCH bpf 0/2] Two BPF sockmap fixes Date: Fri, 24 Aug 2018 22:08:49 +0200 Message-ID: <20180824200851.12308-1-daniel@iogearbox.net> Cc: john.fastabend@gmail.com, netdev@vger.kernel.org, Daniel Borkmann To: alexei.starovoitov@gmail.com Return-path: Received: from www62.your-server.de ([213.133.104.62]:48326 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1726675AbeHXXpc (ORCPT ); Fri, 24 Aug 2018 19:45:32 -0400 Sender: netdev-owner@vger.kernel.org List-ID: This series contains two fixes found while working with the BPF sockmap code. One refcount leakage and one case for a small window of use after free. See patches for more info. Thanks! Daniel Borkmann (2): bpf, sockmap: fix potential use after free in bpf_tcp_close bpf, sockmap: fix psock refcount leak in bpf_tcp_recvmsg kernel/bpf/sockmap.c | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) -- 2.9.5