From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Howells Subject: Re: An actual suggestion (Re: [GIT PULL] Kernel lockdown for secure boot) Date: Wed, 04 Apr 2018 23:19:27 +0100 Message-ID: <15406.1522880367@warthog.procyon.org.uk> References: <1119.1522858644@warthog.procyon.org.uk> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Return-path: In-Reply-To: Content-ID: <15405.1522880367.1@warthog.procyon.org.uk> Sender: linux-kernel-owner@vger.kernel.org To: Jann Horn Cc: dhowells@redhat.com, Alexei Starovoitov , Andy Lutomirski , Greg Kroah-Hartman , "Theodore Y. Ts'o" , Matthew Garrett , Linus Torvalds , Ard Biesheuvel , James Morris , Alan Cox , Linux Kernel Mailing List , Justin Forbes , linux-man , joeyli , LSM List , Linux API , Kees Cook , linux-efi List-Id: linux-man@vger.kernel.org Jann Horn wrote: > > Uh, no. bpf, for example, can be used to modify kernel memory. > > I'm pretty sure bpf isn't supposed to be able to modify arbitrary > kernel memory. AFAIU if you can use BPF to write to arbitrary kernel > memory, that's a bug; with CAP_SYS_ADMIN, you can read from userspace, > write to userspace, and read from kernelspace, but you shouldn't be > able to write to kernelspace. Ah - you may be right. I seem to have misremembered what Joey Lee wrote in his patch description. David