Skip to content

Commit 4575c6a

Browse files
committed
board configs: disable unprivelaged BPF
Fixes wrong CPU vulnerability output: /sys/devices/system/cpu/vulnerabilities/spectre_v2:Mitigation:Vulnerable: Unprivileged eBPF enabled It's enabled but CONFIG_BPF_UNPRIV_DEFAULT_OFF being unset causes the warning. This warning happens on ARM32 and ARM64 devices. Edited with: find -name "*.config" -exec sed -i 's/# CONFIG_BPF_UNPRIV_DEFAULT_OFF is not set/CONFIG_BPF_UNPRIV_DEFAULT_OFF=y/g' '{}' \; Signed-off-by: Rosen Penev <[email protected]>
1 parent 7f9d663 commit 4575c6a

File tree

1 file changed

+1
-0
lines changed

1 file changed

+1
-0
lines changed

lib/functions/compilation/armbian-kernel.sh

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -120,6 +120,7 @@ function armbian_kernel_config__600_enable_ebpf_and_btf_info() {
120120
opts_n+=("DEBUG_INFO_NONE") # Make sure the "none" option is disabled
121121
opts_y+=(
122122
"BPF_JIT" "BPF_JIT_DEFAULT_ON" "FTRACE_SYSCALLS" "PROBE_EVENTS_BTF_ARGS" "BPF_KPROBE_OVERRIDE" # eBPF == on
123+
"BPF_UNPRIV_DEFAULT_OFF"
123124
"DEBUG_INFO" "DEBUG_INFO_DWARF5" "DEBUG_INFO_BTF" "DEBUG_INFO_BTF_MODULES" # BTF & CO-RE == off
124125
)
125126
fi

0 commit comments

Comments
 (0)