Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
UBUNTU: [Config] mark CONFIG_BPF_UNPRIV_DEFAULT_OFF enforced
Setting unprivileged_bpf_disabled to 2 by default will prevent attacks using BPF by unprivileged users by default. If necessary, the sysadmin will be able to turn this on again by setting unprivileged_bpf_disabled to 0. On the other hand, the sysadmin can disable unprivileged BPF without allowing it to be reenabled by setting unprivileged_bpf_disabled to 1. Additionaly, there is a CAP_BPF that allows processes to use BPF without having the complete capability set or CAP_SYS_ADMIN. Mark the option as enforced so derivative kernels will pick it up. Signed-off-by: Thadeu Lima de Souza Cascardo <cascardo@canonical.com> Acked-by: Colin Ian King <colin.king@canonical.com> Acked-by: Tim Gardner <tim.gardner@canonical.com> Signed-off-by: Paolo Pisati <paolo.pisati@canonical.com> (copied to debian.oem too) Signed-off-by: Timo Aaltonen <timo.aaltonen@canonical.com>
- Loading branch information