Re: [PATCH 18/27] bpf: Restrict kernel image access functions when the kernel is locked down
From: David Howells
Date: Mon Oct 23 2017 - 10:51:27 EST
Alexei Starovoitov <alexei.starovoitov@xxxxxxxxx> wrote:
> If you want to lock down read access you'd need to disable
> not only bpf, but all of kprobe and likey ftrace, since
> untrusted root can infer kernel data by observing function
> execution even if it cannot load modules and bpf progs.
Okay.
David