acrn-kernel/Documentation/admin-guide/sysctl
Yauheni Kaliuta bfeb7e399b bpf: Use bpf_capable() instead of CAP_SYS_ADMIN for blinding decision
The full CAP_SYS_ADMIN requirement for blinding looks too strict nowadays.
These days given unprivileged BPF is disabled by default, the main users
for constant blinding coming from unprivileged in particular via cBPF -> eBPF
migration (e.g. old-style socket filters).

Signed-off-by: Yauheni Kaliuta <ykaliuta@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Link: https://lore.kernel.org/bpf/20220831090655.156434-1-ykaliuta@redhat.com
Link: https://lore.kernel.org/bpf/20220905090149.61221-1-ykaliuta@redhat.com
2022-09-16 22:11:57 +02:00
..
abi.rst
fs.rst
index.rst
kernel.rst powerpc updates for 6.0 2022-08-06 16:38:17 -07:00
net.rst bpf: Use bpf_capable() instead of CAP_SYS_ADMIN for blinding decision 2022-09-16 22:11:57 +02:00
sunrpc.rst
user.rst
vm.rst mm: hugetlb_vmemmap: introduce the name HVO 2022-08-08 18:06:42 -07:00