commit | 60b58afc96c9df71871df2dbad42037757ceef26 | [log] [tgz] |
---|---|---|
author | Alexei Starovoitov <ast@fb.com> | Thu Dec 14 17:55:14 2017 -0800 |
committer | Daniel Borkmann <daniel@iogearbox.net> | Sun Dec 17 20:34:36 2017 +0100 |
tree | 5651c4845120fc28c9712f53f31962adfd4abe73 | |
parent | 1ea47e01ad6ea0fe99697c54c2413d81dd21fe32 [diff] |
bpf: fix net.core.bpf_jit_enable race global bpf_jit_enable variable is tested multiple times in JITs, blinding and verifier core. The malicious root can try to toggle it while loading the programs. This race condition was accounted for and there should be no issues, but it's safer to avoid this race condition. Signed-off-by: Alexei Starovoitov <ast@kernel.org> Acked-by: Daniel Borkmann <daniel@iogearbox.net> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>