aboutsummaryrefslogtreecommitdiffstats
path: root/net/unix/af_unix.c
diff options
context:
space:
mode:
authorLorenz Bauer <[email protected]>2021-09-22 11:11:52 +0000
committerDaniel Borkmann <[email protected]>2021-09-28 07:28:37 +0000
commit8a98ae12fbefdb583a7696de719a1d57e5e940a2 (patch)
treeb03a979d216d3ae792ae7a325b2ab558e0395ae2 /net/unix/af_unix.c
parentbpf, mips: Validate conditional branch offsets (diff)
downloadkernel-8a98ae12fbefdb583a7696de719a1d57e5e940a2.tar.gz
kernel-8a98ae12fbefdb583a7696de719a1d57e5e940a2.zip
bpf: Exempt CAP_BPF from checks against bpf_jit_limit
When introducing CAP_BPF, bpf_jit_charge_modmem() was not changed to treat programs with CAP_BPF as privileged for the purpose of JIT memory allocation. This means that a program without CAP_BPF can block a program with CAP_BPF from loading a program. Fix this by checking bpf_capable() in bpf_jit_charge_modmem(). Fixes: 2c78ee898d8f ("bpf: Implement CAP_BPF") Signed-off-by: Lorenz Bauer <[email protected]> Signed-off-by: Daniel Borkmann <[email protected]> Link: https://lore.kernel.org/bpf/[email protected]
Diffstat (limited to 'net/unix/af_unix.c')
0 files changed, 0 insertions, 0 deletions