aboutsummaryrefslogtreecommitdiffstats
path: root/tools/perf/scripts/python/event_analyzing_sample.py
diff options
context:
space:
mode:
authorLorenz Bauer <lmb@cloudflare.com>2021-09-22 12:11:52 +0100
committerDaniel Borkmann <daniel@iogearbox.net>2021-09-28 09:28:37 +0200
commit8a98ae12fbefdb583a7696de719a1d57e5e940a2 (patch)
treeb03a979d216d3ae792ae7a325b2ab558e0395ae2 /tools/perf/scripts/python/event_analyzing_sample.py
parentbpf, mips: Validate conditional branch offsets (diff)
downloadlinux-8a98ae12fbefdb583a7696de719a1d57e5e940a2.tar.gz
linux-8a98ae12fbefdb583a7696de719a1d57e5e940a2.zip
bpf: Exempt CAP_BPF from checks against bpf_jit_limit
When introducing CAP_BPF, bpf_jit_charge_modmem() was not changed to treat programs with CAP_BPF as privileged for the purpose of JIT memory allocation. This means that a program without CAP_BPF can block a program with CAP_BPF from loading a program. Fix this by checking bpf_capable() in bpf_jit_charge_modmem(). Fixes: 2c78ee898d8f ("bpf: Implement CAP_BPF") Signed-off-by: Lorenz Bauer <lmb@cloudflare.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Link: https://lore.kernel.org/bpf/20210922111153.19843-1-lmb@cloudflare.com
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions
f34811783089d217d&follow=1'>vfs: keep list of mounts for each superblockMiklos Szeredi4-0/+11 2012-01-06vfs: switch ->show_options() to struct dentry *Al Viro39-91/+90 2012-01-06vfs: switch ->show_path() to struct dentry *Al Viro3-4/+4 2012-01-06vfs: switch ->show_devname() to struct dentry *Al Viro3-12/+13 2012-01-06vfs: switch ->show_stats to struct dentry *Al Viro5-16/+17 2012-01-06switch security_path_chmod() to struct path *Al Viro6-25/+15 2012-01-06vfs: prefer ->dentry->d_sb to ->mnt->mnt_sbAl Viro14-25/+27 2012-01-06arm: fix up some samsung merge sysdev conversion problemsKukjin Kim5-5/+5 2012-01-06dma-buf: mark EXPERIMENTAL for 1st release.Sumit Semwal1-0/+1