diff options
author | David Howells <dhowells@redhat.com> | 2019-08-20 02:17:59 +0200 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2019-08-20 06:54:16 +0200 |
commit | 9d1f8be5cf42b497a3bddf1d523f2bb142e9318c (patch) | |
tree | fc926ba08f6b2b69c2b9341de2a16d2870b25bda /kernel/events/core.c | |
parent | lockdown: Lock down tracing and perf kprobes when in confidentiality mode (diff) | |
download | linux-9d1f8be5cf42b497a3bddf1d523f2bb142e9318c.tar.xz linux-9d1f8be5cf42b497a3bddf1d523f2bb142e9318c.zip |
bpf: Restrict bpf when kernel lockdown is in confidentiality mode
bpf_read() and bpf_read_str() could potentially be abused to (eg) allow
private keys in kernel memory to be leaked. Disable them if the kernel
has been locked down in confidentiality mode.
Suggested-by: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Signed-off-by: Matthew Garrett <mjg59@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
cc: netdev@vger.kernel.org
cc: Chun-Yi Lee <jlee@suse.com>
cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'kernel/events/core.c')
0 files changed, 0 insertions, 0 deletions