Bug#886619: tshark: dumpcap unconditionally enables the eBPF JIT in the kernel

2018-01-08 Thread Jon DeVree
On Mon, Jan 08, 2018 at 13:02:50 +0100, Balint Reczey wrote: > Control: forwarded -1 https://code.wireshark.org/review/#/c/25192/2 > Control: tags -1 upstream confirmed pending > I filed a bug directly against upstream too, I linked your code review to it:

Bug#886619: tshark: dumpcap unconditionally enables the eBPF JIT in the kernel

2018-01-08 Thread Balint Reczey
Control: forwarded -1 https://code.wireshark.org/review/#/c/25192/2 Control: tags -1 upstream confirmed pending Hi Jon, On Mon, Jan 8, 2018 at 7:34 AM, Jon wrote: > Package: tshark > Version: 2.4.3-1 > Severity: important > Tags: patch > > Dear Maintainer, > > dumpcap

Bug#886619: tshark: dumpcap unconditionally enables the eBPF JIT in the kernel

2018-01-07 Thread Jon
Package: tshark Version: 2.4.3-1 Severity: important Tags: patch Dear Maintainer, dumpcap unconditionally attempts to set net.core.bpf_jit_enable to 1 when each time it runs. This is done without any consideration of the admin's desired system configuration or the current value of