[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <27646.1510309304@warthog.procyon.org.uk>
Date: Fri, 10 Nov 2017 10:21:44 +0000
From: David Howells <dhowells@...hat.com>
To: Jiri Kosina <jikos@...nel.org>
Cc: dhowells@...hat.com,
Alexei Starovoitov <alexei.starovoitov@...il.com>,
linux-security-module@...r.kernel.org, gnomes@...rguk.ukuu.org.uk,
linux-efi@...r.kernel.org, linux-kernel@...r.kernel.org,
jforbes@...hat.com, Steven Rostedt <rostedt@...dmis.org>
Subject: Re: [PATCH 26/30] Lock down ftrace
Jiri Kosina <jikos@...nel.org> wrote:
> > The idea is to prevent cryptographic data for filesystems and other things
> > from being read out of the kernel memory as well as to prevent unauthorised
> > modification of kernel memory.
>
> Then it would make sense to actually lock down dumping of registers /
> function arguments (kprobes can currently do that, ftrace eventually could
> as well I guess), but disabling the whole ftrace altogether seems like a
> totally unnecessary overkill.
That would be fine by me. I have a patch that locks down kprobes in this
series. Steven says that ftrace might acquire the ability to dump registers
in the future.
David
Powered by blists - more mailing lists