Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp11588pxb; Wed, 22 Sep 2021 14:41:50 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzi+oR3PPW3dNAChwewXEDJUweSlBg5Yx8g9hUo8jYOP6amHHX3gzqvn2UGxFQiwMtN2ARL X-Received: by 2002:a17:906:844d:: with SMTP id e13mr1510381ejy.223.1632346910022; Wed, 22 Sep 2021 14:41:50 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632346910; cv=none; d=google.com; s=arc-20160816; b=OWy1Uhru5Ajo8C9tZdQv/zgHLSa1VoExy5uM5ICHfkPie1DAr6gBEroJZYWahcU1j4 ozMYp5N3Yx7MfRDbN9OzH8Ajw6xZqnR/3ZkaSiLPjnvDadyf/7bz4ldHJeUX8XFLaiRl ESIqigpUis/Zsfh9ezENkAFFMOa2mAlDxwWMfcUsfDF5962Z3htlEdlyoon7DkK6PKsG SYYhloSCI8csKw/c+CyFRQTkVTi0JacunffzlXq/ybRCEnv3RmCHhI8hxAKNucFAr3BC 3xNor1zvaJOYDPvB4k5jJe7XY/hb3wdxP9ktlIjLHPr9F/4/mnIECABsnhDMw1d6vkNO m8rA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:in-reply-to:references:date:message-id :from:subject:content-transfer-encoding:mime-version:dkim-signature; bh=Hgm8AhV1jzbpSW8iWMKIxk7x4Qi39p5uoDFINMcVPP4=; b=bW4HNO4FyxlOqJRPo1CwnZBGltVTzTOE45XajacOfmQS5YDHiyuFEWvDamhrjCTZ0I OtqJeg/pA0P0xCIXlwgIOHo8moaxxBsFj1fjvvTCdUGk+dSX5Klq0KBQPmNcyVTKd4Id 4LvfjmlMiSnImrDYY8nGnXcjJGFYzdNqbgOzKjq8Rj79uMLbK+p9+eqU3krWAsb7iTxD JGC+5Niu4sP7N70m2rEW1btleOkHYC3E8M0aJP1mWWTk2W8qXwI1oGgnO5tzUhhb97lY DMFoKMwo95uf7QiiVCC/Pw8WSLKdoZLJhqhz3DKJZbss76yj+Chn70bd4qfO7JVt0qhi LIYw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=LCE4XjtY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id jl18si3897611ejc.212.2021.09.22.14.41.26; Wed, 22 Sep 2021 14:41:50 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=LCE4XjtY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S238180AbhIVVlh (ORCPT + 99 others); Wed, 22 Sep 2021 17:41:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:47848 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S238014AbhIVVlh (ORCPT ); Wed, 22 Sep 2021 17:41:37 -0400 Received: by mail.kernel.org (Postfix) with ESMTPS id C673E611C6; Wed, 22 Sep 2021 21:40:06 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1632346806; bh=kKspU6df3JFZlrUoGZBO3dnhk7nV8hFXBEK+CihxI/0=; h=Subject:From:Date:References:In-Reply-To:To:Cc:From; b=LCE4XjtYA/sYn9J6akNRl/fK+6PifpXKTX0TiAvNIVQnSF2cKKEUGgyKbL6ScDEBu 1JweOXMssljPNMeOyRw78vOLeGZrK/OIsKtA2ZEPq1yCcEsqqDD8AoX0nXEDuCWN63 d6DmFWOaQUuihInderH4/D2lSq7fc3Pvwnl7AWNtr6kS1NoWcSpLv/3O/2ekhgwWyW lYm4UsNux6v/tC4kCM+cgVhmmkXjCX3daUHMDqb+bljPiN6Juw6z8c6pBwggBZh2g9 DzBoy5x+oJ4ituDZzpw4MdUzpAaXULy0IszxL22k+eHDmmwhZiLD52S5XHbvR36yt+ TUZsCVccODeog== Received: from pdx-korg-docbuild-2.ci.codeaurora.org (localhost.localdomain [127.0.0.1]) by pdx-korg-docbuild-2.ci.codeaurora.org (Postfix) with ESMTP id B857D60A6B; Wed, 22 Sep 2021 21:40:06 +0000 (UTC) Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: Re: [PATCH bpf] bpf: exempt CAP_BPF from checks against bpf_jit_limit From: patchwork-bot+netdevbpf@kernel.org Message-Id: <163234680674.13903.12726490005358522005.git-patchwork-notify@kernel.org> Date: Wed, 22 Sep 2021 21:40:06 +0000 References: <20210922111153.19843-1-lmb@cloudflare.com> In-Reply-To: <20210922111153.19843-1-lmb@cloudflare.com> To: Lorenz Bauer Cc: ast@kernel.org, daniel@iogearbox.net, kernel-team@cloudflare.com, netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hello: This patch was applied to bpf/bpf.git (refs/heads/master): On Wed, 22 Sep 2021 12:11:52 +0100 you wrote: > When introducing CAP_BPF, bpf_jit_charge_modmem was not changed to > treat programs with CAP_BPF as privileged for the purpose of JIT > memory allocation. This means that a program without CAP_BPF can > block a program with CAP_BPF from loading a program. > > Fix this by checking bpf_capable in bpf_jit_charge_modmem. > > [...] Here is the summary with links: - [bpf] bpf: exempt CAP_BPF from checks against bpf_jit_limit https://git.kernel.org/bpf/bpf/c/7c3a00911b3d You are awesome, thank you! -- Deet-doot-dot, I am a bot. https://korg.docs.kernel.org/patchwork/pwbot.html