bpf: Restrict kernel image access functions when the kernel is locked down
authorLee, Chun-Yi <jlee@suse.com>
Wed, 5 Apr 2017 16:40:31 +0000 (17:40 +0100)
committerPeter Michael Green <plugwash@raspbian.org>
Wed, 7 Feb 2018 23:32:32 +0000 (23:32 +0000)
commit4c398f155f482c5d455a0db9870f3213c7c4055d
tree3cb4eb4cb01ced3ee564a28f6eebc61d85c58076
parentf219e16187c65f2bbca9e845aa10491d0a36fb99
bpf: Restrict kernel image access functions when the kernel is locked down

There are some bpf functions can be used to read kernel memory:
bpf_probe_read, bpf_probe_write_user and bpf_trace_printk.  These allow
private keys in kernel memory (e.g. the hibernation image signing key) to
be read by an eBPF program.  Prohibit those functions when the kernel is
locked down.

Signed-off-by: Lee, Chun-Yi <jlee@suse.com>
Signed-off-by: David Howells <dhowells@redhat.com>
Gbp-Pq: Topic features/all/lockdown
Gbp-Pq: Name 0057-bpf-Restrict-kernel-image-access-functions-when-the-.patch
kernel/trace/bpf_trace.c