* [PATCH] sysctl: Disable bpf() calls from unprivileged users without toggle option
@ 2024-06-16 14:02 Peter Müller
0 siblings, 0 replies; only message in thread
From: Peter Müller @ 2024-06-16 14:02 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 1209 bytes --]
According to the Linux kernel documentation, enabling BPF_UNPRIV_DEFAULT_OFF
(which was done in 69dde418f11dc0085cbe061b90f6c002d6d6cce2) will cause
the sysctl kernel.unprivileged_bpf_disabled to default to 2. This
prohibits calls to bpf() from unprivileged users by default, but allows
for such calls to be allowed again during runtime, by setting
kernel.unprivileged_bpf_disabled to 0.
There is no legitimate reason why this should be possible on IPFire,
which is why this patch sets kernel.unprivileged_bpf_disabled to 1
during startup, causing the same effect as 2, but without any option to
revert this setting during runtime. This fixes a Lynis warning.
Signed-off-by: Peter Müller <peter.mueller(a)ipfire.org>
---
config/etc/sysctl.conf | 3 +++
1 file changed, 3 insertions(+)
diff --git a/config/etc/sysctl.conf b/config/etc/sysctl.conf
index 31a220e38..51a804043 100644
--- a/config/etc/sysctl.conf
+++ b/config/etc/sysctl.conf
@@ -111,3 +111,6 @@ kernel.perf_event_paranoid = 3
# Only processes with CAP_SYS_PTRACE may use ptrace
kernel.yama.ptrace_scope = 2
+
+# Disable unprivileged calls to bpf() without option to enable during runtime
+kernel.unprivileged_bpf_disabled = 1
--
2.35.3
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2024-06-16 14:02 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-06-16 14:02 [PATCH] sysctl: Disable bpf() calls from unprivileged users without toggle option Peter Müller
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox