Subject | x86/bpf: use bpf_capable() instead of capable(CAP_SYS_ADMIN) |
---|---|
Author | omosnace@redhat.com |
Date | 2025-08-06 14:31:05 +0000 UTC |
Version | 1 |
Cc | ast@kernel.org bpf@vger.kernel.org daniel@iogearbox.net linux-security-module@vger.kernel.org omosnace@redhat.com selinux@vger.kernel.org |
Name | Content |
---|---|
[PATCH] x86/bpf: use bpf_capable() instead of capable(CAP_SYS_ADMIN) | [Body] |
ID (for dev) | ca006099-5531-4891-b809-db001a03cd38 |
---|---|
Status | finished |
Triaged | OK [Log] |
Execution Log | [Link] |
Test | Base | Patched | Verdict |
---|---|---|---|
Build Base | f3af62b6cee8af9f07012051874af2d2a451f0e5 [Config] | passed [Log] | |
Build Patched | f3af62b6cee8af9f07012051874af2d2a451f0e5 [Config] [patched] | passed [Log] | |
Boot test: Base | f3af62b6cee8af9f07012051874af2d2a451f0e5 [Config] | passed | |
Boot test: Patched | f3af62b6cee8af9f07012051874af2d2a451f0e5 [Config] [patched] | passed | |
Fuzzing | f3af62b6cee8af9f07012051874af2d2a451f0e5 [Config] | f3af62b6cee8af9f07012051874af2d2a451f0e5 [Config] [patched] | passed [Log] [Artifacts] |