bpf: Restrict kernel image access functions when the kernel is locked down
authorLee, Chun-Yi <jlee@suse.com>
Wed, 5 Apr 2017 16:40:31 +0000 (17:40 +0100)
committerSalvatore Bonaccorso <carnil@debian.org>
Sun, 15 Oct 2017 06:57:36 +0000 (07:57 +0100)
commitcedee2d0ead8a3f8d8da709c642e9c9b4344d224
tree4159ca57b0785c28e9e1e67a7353bee55bd7264e
parenta5bc37dc65d6c895dbc8299f56ec6daa6df33259
bpf: Restrict kernel image access functions when the kernel is locked down

There are some bpf functions can be used to read kernel memory:
bpf_probe_read, bpf_probe_write_user and bpf_trace_printk.  These allow
private keys in kernel memory (e.g. the hibernation image signing key) to
be read by an eBPF program.  Prohibit those functions when the kernel is
locked down.

Signed-off-by: Lee, Chun-Yi <jlee@suse.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Gbp-Pq: Topic features/all/lockdown
Gbp-Pq: Name 0057-bpf-Restrict-kernel-image-access-functions-when-the-.patch
kernel/trace/bpf_trace.c