[PATCH 23/27] bpf: Restrict kernel image access functions when the kernel is locked down

Matthew Garrett mjg59 at google.com
Tue Mar 26 20:19:10 UTC 2019


On Tue, Mar 26, 2019 at 11:57 AM James Morris <jmorris at namei.org> wrote:
> - Assign an ID to each lockdown point
> - Implement a policy mechanism where each ID is mapped to 0 or 1
> - Allow this policy to be specified statically or dynamically

One of the problems with this approach is what the default behaviour
should be when a new feature is added. If an admin fails to notice
that there's now a new policy element, they run the risk of kernel
integrity being compromised via the new feature even if the rest of
the kernel is locked down.



More information about the Linux-security-module-archive mailing list