diff options
author | David S. Miller <davem@davemloft.net> | 2019-05-07 09:29:16 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2019-05-07 09:29:16 -0700 |
commit | 14cfbdac6680bc87f6b9f6196d4d4ec044a01481 (patch) | |
tree | af0d50b37477808d297a0a3f0273fb44b7b1ca7a /net | |
parent | 54516da1ea859dd4f56ebba2e483d2df9d7c8a32 (diff) | |
parent | d24ed99b3b270c6de8f47c25d709b5f6ef7d3807 (diff) | |
download | linux-stable-14cfbdac6680bc87f6b9f6196d4d4ec044a01481.tar.gz linux-stable-14cfbdac6680bc87f6b9f6196d4d4ec044a01481.tar.bz2 linux-stable-14cfbdac6680bc87f6b9f6196d4d4ec044a01481.zip |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next
Daniel Borkmann says:
====================
pull-request: bpf-next 2019-05-06
The following pull-request contains BPF updates for your *net-next* tree.
The main changes are:
1) Two AF_XDP libbpf fixes for socket teardown; first one an invalid
munmap and the other one an invalid skmap cleanup, both from Björn.
2) More graceful CONFIG_DEBUG_INFO_BTF handling when pahole is not
present in the system to generate vmlinux btf info, from Andrii.
3) Fix libbpf and thus fix perf build error with uClibc on arc
architecture, from Vineet.
4) Fix missing libbpf_util.h header install in libbpf, from William.
5) Exclude bash-completion/bpftool from .gitignore pattern, from Masahiro.
6) Fix up rlimit in test_libbpf_open kselftest test case, from Yonghong.
7) Minor misc cleanups.
====================
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net')
-rw-r--r-- | net/core/bpf_sk_storage.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/core/bpf_sk_storage.c b/net/core/bpf_sk_storage.c index a8e9ac71b22d..cc9597a87770 100644 --- a/net/core/bpf_sk_storage.c +++ b/net/core/bpf_sk_storage.c @@ -708,7 +708,7 @@ static int bpf_fd_sk_storage_update_elem(struct bpf_map *map, void *key, if (sock) { sdata = sk_storage_update(sock->sk, map, value, map_flags); sockfd_put(sock); - return IS_ERR(sdata) ? PTR_ERR(sdata) : 0; + return PTR_ERR_OR_ZERO(sdata); } return err; |