From: Balbir Singh <sblbir@amzn.com>
-The error strings need to be updated, since they fail early.
+The changes to fix the CVE 2019-7308 make the bpf verifier stricter
+with respect to operations that were allowed earlier in unprivileged
+mode. Fixup the test cases so that the error messages now correctly
+reflect pointer arithmetic going out of range for tests.
Signed-off-by: Balbir Singh <sblbir@amzn.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
Signed-off-by: Sasha Levin <sashal@kernel.org>
---
- include/linux/swap.h | 4 ++--
+ include/linux/swap.h | 4 ++--
1 file changed, 2 insertions(+), 2 deletions(-)
-diff --git a/include/linux/swap.h b/include/linux/swap.h
-index d8ca2eaa3a8b..0a0b7529dae4 100644
--- a/include/linux/swap.h
+++ b/include/linux/swap.h
@@ -135,9 +135,9 @@ struct swap_extent {
enum {
SWP_USED = (1 << 0), /* is slot in swap_info[] used? */
---
-2.19.1
-