On Mon, Feb 24, 2020 at 11:50 AM Stephen Kitt <steve@xxxxxxx> wrote: > > On Sun, 23 Feb 2020 14:44:31 -0800, Alexei Starovoitov > <alexei.starovoitov@xxxxxxxxx> wrote: > > On Fri, Feb 21, 2020 at 10:18 AM Stephen Kitt <steve@xxxxxxx> wrote: > > > @@ -1152,6 +1166,16 @@ NMI switch that most IA32 servers have fires > > > unknown NMI up, for example. If a system hangs up, try pressing the NMI > > > switch. > > > > > > > > > +unprivileged_bpf_disabled > > > +========================= > > > + > > > +Writing 1 to this entry will disabled unprivileged calls to ``bpf()``; > > > > 'will disable' ? > > Indeed, thanks. > > > It doesn't apply to bpf-next with: > > error: sha1 information is lacking or useless > > (Documentation/admin-guide/sysctl/kernel.rst). > > error: could not build fake ancestor > > Patch failed at 0001 docs: sysctl/kernel: Document BPF entries > > Sorry, I forgot to include the base commit information; this is against > 8f21f54b8a95 in docs-next. > > I’ll wait for that to make it to Linus’ tree and re-submit the patch (with > the fix above). Please use bpf-next tree as a base for your patch.