diff options
| author | Blaise Boscaccy <[email protected]> | 2025-03-10 22:17:12 +0000 |
|---|---|---|
| committer | Alexei Starovoitov <[email protected]> | 2025-03-15 18:48:58 +0000 |
| commit | 7987f1627e6173ecd9f7d532ca9ee8f62112f381 (patch) | |
| tree | d96b61d619adcf7c68dba2a82cd4e875603127b8 /drivers/gpu/drm/amd/amdgpu/amdgpu_irq.c | |
| parent | security: Propagate caller information in bpf hooks (diff) | |
| download | kernel-7987f1627e6173ecd9f7d532ca9ee8f62112f381.tar.gz kernel-7987f1627e6173ecd9f7d532ca9ee8f62112f381.zip | |
selftests/bpf: Add a kernel flag test for LSM bpf hook
This test exercises the kernel flag added to security_bpf by
effectively blocking light-skeletons from loading while allowing
normal skeletons to function as-is. Since this should work with any
arbitrary BPF program, an existing program from LSKELS_EXTRA was
used as a test payload.
Signed-off-by: Blaise Boscaccy <[email protected]>
Acked-by: Song Liu <[email protected]>
Link: https://lore.kernel.org/r/[email protected]
Signed-off-by: Alexei Starovoitov <[email protected]>
Diffstat (limited to 'drivers/gpu/drm/amd/amdgpu/amdgpu_irq.c')
0 files changed, 0 insertions, 0 deletions
