lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Tue, 22 Mar 2022 18:39:13 +0100 From: KP Singh <kpsingh@...nel.org> To: Quentin Monnet <quentin@...valent.com> Cc: Milan Landaverde <milan@...verde.com>, Alexei Starovoitov <ast@...nel.org>, Daniel Borkmann <daniel@...earbox.net>, Andrii Nakryiko <andrii@...nel.org>, Martin KaFai Lau <kafai@...com>, Song Liu <songliubraving@...com>, Yonghong Song <yhs@...com>, John Fastabend <john.fastabend@...il.com>, Paul Chaignon <paul@...valent.com>, Niklas Söderlund <niklas.soderlund@...igine.com>, netdev@...r.kernel.org, bpf@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH bpf-next] bpf/bpftool: add unprivileged_bpf_disabled check against value of 2 On Tue, Mar 22, 2022 at 4:54 PM Quentin Monnet <quentin@...valent.com> wrote: > > 2022-03-22 10:49 UTC-0400 ~ Milan Landaverde <milan@...verde.com> > > In [1], we added a kconfig knob that can set > > /proc/sys/kernel/unprivileged_bpf_disabled to 2 > > > > We now check against this value in bpftool feature probe > > > > [1] https://lore.kernel.org/bpf/74ec548079189e4e4dffaeb42b8987bb3c852eee.1620765074.git.daniel@iogearbox.net > > > > Signed-off-by: Milan Landaverde <milan@...verde.com> > > Acked-by: Quentin Monnet <quentin@...valent.com> Acked-by: KP Singh <kpsingh@...nel.org> Thanks, this is very useful!
Powered by blists - more mailing lists