From: David S. Miller Date: Wed, 21 Mar 2018 16:09:04 +0000 (-0400) Subject: Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf X-Git-Tag: v4.19~1406^2~15 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=3d27484eba9572ded0117acab7d2728e8916d58f;p=platform%2Fkernel%2Flinux-rpi.git Merge git://git./pub/scm/linux/kernel/git/bpf/bpf Daniel Borkmann says: ==================== pull-request: bpf 2018-03-21 The following pull-request contains BPF updates for your *net* tree. The main changes are: 1) Follow-up fix to the fault injection framework to prevent jump optimization on the kprobe by installing a dummy post-handler, from Masami. 2) Drop bpf_perf_prog_read_value helper from tracepoint type programs which was mistakenly added there and would otherwise crash due to wrong input context, from Yonghong. 3) Fix a crash in BPF fs when compiled with clang. Code appears to be fine just that clang tries to overly aggressive optimize in non C conform ways, therefore fix the kernel's Makefile to generally prevent such issues, from Daniel. 4) Skip unnecessary capability checks in bpf syscall, which is otherwise triggering unnecessary security hooks on capability checking and causing false alarms on unprivileged processes trying to access CAP_SYS_ADMIN restricted infra, from Chenbo. 5) Fix the test_bpf.ko module when CONFIG_BPF_JIT_ALWAYS_ON is set with regards to a test case that is really just supposed to fail on x8_64 JIT but not others, from Thadeu. ==================== Signed-off-by: David S. Miller --- 3d27484eba9572ded0117acab7d2728e8916d58f