You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.

34 lines
1.2 KiB

Allows a process to manipulate aspects of the kernel
enhanced Berkeley Packet Filter (BPF) system. This is
an execution subsystem of the kernel, that manages BPF
programs. CAP_BPF permits a process to:
- create all types of BPF maps
- advanced verifier features:
- indirect variable access
- bounded loops
- BPF to BPF function calls
- scalar precision tracking
- larger complexity limits
- dead code elimination
- potentially other features
Other capabilities can be used together with CAP_BFP to
further manipulate the BPF system:
- CAP_PERFMON relaxes the verifier checks as follows:
- BPF programs can use pointer-to-integer
conversions
- speculation attack hardening measures can be
bypassed
- bpf_probe_read to read arbitrary kernel memory is
permitted
- bpf_trace_printk to print the content of kernel
memory
- CAP_SYS_ADMIN permits the following:
- use of bpf_probe_write_user
- iteration over the system-wide loaded programs,
maps, links BTFs and convert their IDs to file
descriptors.
- CAP_PERFMON is required to load tracing programs.
- CAP_NET_ADMIN is required to load networking
programs.