summaryrefslogtreecommitdiffstats
path: root/0001-bpf-Add-tech-preview-taint-for-syscall.patch
diff options
context:
space:
mode:
Diffstat (limited to '0001-bpf-Add-tech-preview-taint-for-syscall.patch')
-rw-r--r--0001-bpf-Add-tech-preview-taint-for-syscall.patch53
1 files changed, 0 insertions, 53 deletions
diff --git a/0001-bpf-Add-tech-preview-taint-for-syscall.patch b/0001-bpf-Add-tech-preview-taint-for-syscall.patch
deleted file mode 100644
index 0c6cecfe2..000000000
--- a/0001-bpf-Add-tech-preview-taint-for-syscall.patch
+++ /dev/null
@@ -1,53 +0,0 @@
-From 0000000000000000000000000000000000000000 Mon Sep 17 00:00:00 2001
-From: Eugene Syromiatnikov <esyr@redhat.com>
-Date: Thu, 14 Jun 2018 16:36:08 -0400
-Subject: [PATCH] bpf: Add tech preview taint for syscall
-
-Message-id: <394af3a9985d1ad9ea6741cb95ff145312d106b9.1528991396.git.esyr@redhat.com>
-Patchwork-id: 8251
-O-Subject: [kernel team] [RHEL8 PATCH v4 3/5] [bpf] bpf: Add tech preview taint for syscall
-Bugzilla: 1559877
-RH-Acked-by: Jiri Benc <jbenc@redhat.com>
-RH-Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
-
-Adding tech preview taint for using the eBPF syscall.
-
-Based on a RHEL 7 commit "bpf: Add tech preview taint for syscall" by
-Jiri Olsa.
-
-Bugzilla: https://bugzilla.redhat.com/show_bug.cgi?id=1559877
-Brew: https://brewweb.engineering.redhat.com/brew/taskinfo?taskID=16716594
-
-Upstream Status: RHEL only
-Signed-off-by: Jiri Olsa <jolsa@redhat.com>
-Signed-off-by: Eugene Syromiatnikov <esyr@redhat.com>
-Signed-off-by: Herton R. Krzesinski <herton@redhat.com>
----
- kernel/bpf/syscall.c | 6 ++++++
- 1 file changed, 6 insertions(+)
-
-diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c
-index f7e570292afe..56c39dc8995e 100644
---- a/kernel/bpf/syscall.c
-+++ b/kernel/bpf/syscall.c
-@@ -4155,11 +4155,17 @@ static int bpf_iter_create(union bpf_attr *attr)
- SYSCALL_DEFINE3(bpf, int, cmd, union bpf_attr __user *, uattr, unsigned int, size)
- {
- union bpf_attr attr;
-+ static int marked;
- int err;
-
- if (sysctl_unprivileged_bpf_disabled && !bpf_capable())
- return -EPERM;
-
-+ if (!marked) {
-+ mark_tech_preview("eBPF syscall", NULL);
-+ marked = true;
-+ }
-+
- err = bpf_check_uarg_tail_zero(uattr, sizeof(attr), size);
- if (err)
- return err;
---
-2.28.0
-