On Tue, Oct 20, 2020 at 04:59:59PM -0400, Konrad Rzeszutek Wilk wrote:
> bpf_read() and bpf_read_str() could potentially be abused to (eg) allow
> private keys in kernel memory to be leaked. Disable them if the kernel
> has been locked down in confidentiality mode.
> 
> Suggested-by: Alexei Starovoitov <alexei.starovoi...@gmail.com>
> Signed-off-by: Matthew Garrett <mj...@google.com>
> Reviewed-by: Kees Cook <keesc...@chromium.org>
> cc: netdev@vger.kernel.org
> cc: Chun-Yi Lee <j...@suse.com>
> cc: Alexei Starovoitov <alexei.starovoi...@gmail.com>
> Cc: Daniel Borkmann <dan...@iogearbox.net>
> Signed-off-by: James Morris <jmor...@namei.org>
> 
> [Backport notes:
>  The upstream version is using enums, and all that fancy code.
>  We are just retroffiting UEK5 a bit and just checking to
>  see if integrity mode has been enabled and if so then
>  allow it. If the default lockdown mode (confidentiality) is on
>  then we don't allow it.]

<sigh>

And that is what I get for _not_ doing --suppress-cc=all

My apologies for spamming you all!

<goes to hide in the corner of shame>

Reply via email to