[Bug 1863234] Re: Disabling bpf() syscall on kernel lockdown break apps when secure boot is on

2020-02-20 Thread Brendan Gregg
This change also prevents BPF security programs from running (like those we use at Netflix) making Ubuntu less secure. In case I'm not being clear enough: this is the worst change I've ever seen in operating systems. Some people want lockdown? Let them opt in. -- You received this bug

[Bug 1863234] Re: Disabling bpf() syscall on kernel lockdown break apps when secure boot is on

2020-02-20 Thread Brendan Gregg
The relaxed BPF restrictions still break BPF tracing and other things, making Ubuntu no longer meet the debugability requirements for an enterprise OS. Lockdown should not be enabled by default. It needs to be opt-in, not opt-out. Tyler -- please fix Ubuntu. -- You received this bug