Scheduled Maintenance: We are aware of an issue with Google, AOL, and Yahoo services as email providers which are blocking new registrations. We are trying to fix the issue and we have several internal and external support tickets in process to resolve the issue. Please see: viewtopic.php?t=158230

 

 

 

how much risk is ther in this "BPF"

Here you can discuss every aspect of Debian. Note: not for support requests!
Post Reply
Message
Author
User avatar
mike acker
Posts: 131
Joined: 2017-06-28 21:23

how much risk is ther in this "BPF"

#1 Post by mike acker »

Regarding "BPF" ( in kernel trace tools ) REFERENCE:

excerpt
WHAT ABOUT THE CODE?
But, enough of the personal and social issues of Linux, what about the code?

We spoke about the rise in use of the BPF in Linux. As Jon Corbet, kernel developer and editor of LWN, explained in a keynote at Open Source Europe, BPF is an in-kernel VM. It's different from the others, because it allows user-space processes to load processes into kernel space.

Traditionally, Linux is made of the kernel and user space and never the twain shall meet -- except by well-defined application programming interfaces (APIs).
This is the first time I've read any notes regarding "BPF"; hopefully this is available only in the developer edition for use in the lab.

thoughts/comments?
Viva la Resistencia

Segfault
Posts: 993
Joined: 2005-09-24 12:24
Has thanked: 5 times
Been thanked: 17 times

Re: how much risk is ther in this "BPF"

#2 Post by Segfault »

Read up on Berkeley Packet Filter. It is not what you think it is.

For starters: https://en.wikipedia.org/wiki/Berkeley_Packet_Filter

User avatar
mike acker
Posts: 131
Joined: 2017-06-28 21:23

Re: how much risk is ther in this "BPF"

#3 Post by mike acker »

Segfault wrote:Read up on Berkeley Packet Filter. It is not what you think it is.

For starters: https://en.wikipedia.org/wiki/Berkeley_Packet_Filter
wickipedia isn't the most reputable source particularly on this type of topic -- which has serious political implications.

I'll continue to watch for info on this although 1 thing is abundantly clear: letting a user process start code in the kernel is a no-no and has been since multi-pprocessing was developed.
Viva la Resistencia

User avatar
llivv
Posts: 5340
Joined: 2007-02-14 18:10
Location: cold storage

Re: how much risk is ther in this "BPF"

#4 Post by llivv »

their are lots of ways user space intereacts with kernel space. Just read a few package descriptions and you can see for yourself.
politics be damned. Obviously not all good. for everyone all the time or even anyone any time. (strike that)
That's not at all saying there are lots of ways for Users to interact with the kernel, but their are some.
simple example: issuing a kernel boot option to the kernel boot commandline.

Until we get an idea where you intend this thread to go I'll just stick with wiki for my example as well.
https://en.wikipedia.org/wiki/Sandbox_% ... ecurity%29

And if you're interested in understanding more about this hot? issue, a search for the data you desire is not extremely difficult.
In memory of Ian Ashley Murdock (1973 - 2015) founder of the Debian project.

Post Reply