From 9f53a0182b5f6a7cf8228bf19b04661d39c7a2fe Mon Sep 17 00:00:00 2001 From: Patrick Schleizer Date: Fri, 19 Jul 2024 07:20:59 -0400 Subject: [PATCH] undo io_uring related changes as these should be done in a separate pull request (if apprpriate) https://github.com/Kicksecure/security-misc/pull/244#issuecomment-2238889062 --- README.md | 2 +- usr/lib/sysctl.d/990-security-misc.conf | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 29654c4..5e029c8 100644 --- a/README.md +++ b/README.md @@ -43,7 +43,7 @@ space, user space, core dumps, and swap space. - Randomize the addresses (ASLR) for mmap base, stack, VDSO pages, and heap. -- Provide the option to disable asynchronous I/O as `io_uring` has been the source +- Disable asynchronous I/O as `io_uring` has been the source of numerous kernel exploits (when using Linux kernel version >= 6.6). - Restrict usage of `ptrace()` to only processes with `CAP_SYS_PTRACE` as it diff --git a/usr/lib/sysctl.d/990-security-misc.conf b/usr/lib/sysctl.d/990-security-misc.conf index e302047..7b07033 100644 --- a/usr/lib/sysctl.d/990-security-misc.conf +++ b/usr/lib/sysctl.d/990-security-misc.conf @@ -128,7 +128,7 @@ kernel.randomize_va_space=2 ## ## Applicable when using Linux kernel >= 6.6 (retained here for future-proofing and completeness). ## -#kernel.io_uring_disabled=2 +kernel.io_uring_disabled=2 ## 2. User Space: ##