aboutsummaryrefslogtreecommitdiffstats
path: root/kernel/trace/bpf_trace.c
diff options
context:
space:
mode:
authorDavid Howells <dhowells@redhat.com>2019-08-19 17:17:58 -0700
committerJames Morris <jmorris@namei.org>2019-08-19 21:54:16 -0700
commita94549dd87f5ea4ca50fee493df08a2dc6256b53 (patch)
tree37a2c9cbe4da7ed515a8009e49672a3853b48c67 /kernel/trace/bpf_trace.c
parentlockdown: Lock down /proc/kcore (diff)
downloadlinux-dev-a94549dd87f5ea4ca50fee493df08a2dc6256b53.tar.xz
linux-dev-a94549dd87f5ea4ca50fee493df08a2dc6256b53.zip
lockdown: Lock down tracing and perf kprobes when in confidentiality mode
Disallow the creation of perf and ftrace kprobes when the kernel is locked down in confidentiality mode by preventing their registration. This prevents kprobes from being used to access kernel memory to steal crypto data, but continues to allow the use of kprobes from signed modules. Reported-by: Alexei Starovoitov <alexei.starovoitov@gmail.com> Signed-off-by: David Howells <dhowells@redhat.com> Signed-off-by: Matthew Garrett <mjg59@google.com> Acked-by: Masami Hiramatsu <mhiramat@kernel.org> Reviewed-by: Kees Cook <keescook@chromium.org> Cc: Naveen N. Rao <naveen.n.rao@linux.ibm.com> Cc: Anil S Keshavamurthy <anil.s.keshavamurthy@intel.com> Cc: davem@davemloft.net Cc: Masami Hiramatsu <mhiramat@kernel.org> Signed-off-by: James Morris <jmorris@namei.org>
Diffstat (limited to 'kernel/trace/bpf_trace.c')
0 files changed, 0 insertions, 0 deletions