]> git.proxmox.com Git - mirror_ubuntu-zesty-kernel.git/commit
UBUNTU: SAUCE: UEFI: bpf: disable bpf when module security is enabled
authorTim Gardner <tim.gardner@canonical.com>
Thu, 17 Nov 2016 19:18:05 +0000 (12:18 -0700)
committerTim Gardner <tim.gardner@canonical.com>
Mon, 20 Feb 2017 03:57:58 +0000 (20:57 -0700)
commit4724e62b30026296f90477d73439bf47f2f602ba
tree262156b598d4d9a8793898c10cf6925caf6d302b
parent31d2c15ba3eba8a76e12a04685e6845574924661
UBUNTU: SAUCE: UEFI: bpf: disable bpf when module security is enabled

BPF carnage - Hi, It looks like CONFIG_BPF_EVENTS needs to be disabled
in secure boot environments since you can read kernel memory (and
hence, the hibernation image signing key) by attaching an eBPF program
to a tracepoint through a perf_event_open() fd which uses bpf_probe_read()
and either bpf_trace_printk() or bpf_probe_write_user(). (Or, rather,
kernel memory _reads_ need to be added to the threat model if a private
key is held in kernel memory.) -Kees -- Kees Cook Nexus Security

Signed-off-by: Tim Gardner <tim.gardner@canonical.com>
Signed-off-by: Seth Forshee <seth.forshee@canonical.com>
Conflicts:
kernel/bpf/syscall.c
kernel/bpf/syscall.c