diff options
author | Mircea Cirjaliu <mcirjaliu@bitdefender.com> | 2021-01-19 21:53:18 +0100 |
---|---|---|
committer | Daniel Borkmann <daniel@iogearbox.net> | 2021-01-19 22:04:08 +0100 |
commit | 301a33d51880619d0c5a581b5a48d3a5248fa84b (patch) | |
tree | 52653445fbe86d9614777afe8a4ff95f35acadd1 /README | |
parent | f7b9820dbe1620a3d681991fc82774ae49c2b6d2 (diff) |
bpf: Fix helper bpf_map_peek_elem_proto pointing to wrong callback
I assume this was obtained by copy/paste. Point it to bpf_map_peek_elem()
instead of bpf_map_pop_elem(). In practice it may have been less likely
hit when under JIT given shielded via 84430d4232c3 ("bpf, verifier: avoid
retpoline for map push/pop/peek operation").
Fixes: f1a2e44a3aec ("bpf: add queue and stack maps")
Signed-off-by: Mircea Cirjaliu <mcirjaliu@bitdefender.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Cc: Mauricio Vasquez <mauriciovasquezbernal@gmail.com>
Link: https://lore.kernel.org/bpf/AM7PR02MB6082663DFDCCE8DA7A6DD6B1BBA30@AM7PR02MB6082.eurprd02.prod.outlook.com
Diffstat (limited to 'README')
0 files changed, 0 insertions, 0 deletions