diff options
author | David Howells <dhowells@redhat.com> | 2019-08-19 17:17:59 -0700 |
---|---|---|
committer | James Morris <jmorris@namei.org> | 2019-08-19 21:54:16 -0700 |
commit | 9d1f8be5cf42b497a3bddf1d523f2bb142e9318c (patch) | |
tree | fc926ba08f6b2b69c2b9341de2a16d2870b25bda /arch | |
parent | a94549dd87f5ea4ca50fee493df08a2dc6256b53 (diff) | |
download | linux-9d1f8be5cf42b497a3bddf1d523f2bb142e9318c.tar.bz2 |
bpf: Restrict bpf when kernel lockdown is in confidentiality mode
bpf_read() and bpf_read_str() could potentially be abused to (eg) allow
private keys in kernel memory to be leaked. Disable them if the kernel
has been locked down in confidentiality mode.
Suggested-by: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Signed-off-by: Matthew Garrett <mjg59@google.com>
Reviewed-by: Kees Cook <keescook@chromium.org>
cc: netdev@vger.kernel.org
cc: Chun-Yi Lee <jlee@suse.com>
cc: Alexei Starovoitov <alexei.starovoitov@gmail.com>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'arch')
0 files changed, 0 insertions, 0 deletions