Subj : [$] Securing BPF programs before and after verification To : All From : LWN.net Date : Tue Jun 11 2024 19:45:05 [$] Securing BPF programs before and after verification Date: Tue, 11 Jun 2024 18:39:22 +0000 Description: BPF is in a unique position in terms of security. It runs in a privileged context, within the kernel, and can have access to many sensitive details of the kernel's operation. At the same time, unlike kernel modules, BPF programs aren't signed. Additionally, the mechanisms behind BPF present challenges to implementing signing or other security features. Three nearly back-to-back sessions at the 2024 Linux Storage, Filesystem, Memory Management, and BPF Summit addressed some of the potential security problems. ====================================================================== Link to news story: https://lwn.net/Articles/977394/ --- Mystic BBS v1.12 A47 (Linux/64) * Origin: tqwNet UK HUB @ hub.uk.erb.pw (1337:1/100) .