diff options
author | 2022-03-10 18:58:04 -0800 | |
---|---|---|
committer | 2022-03-10 19:10:13 -0800 | |
commit | a77c2cfd4ee4bfb5267653dad3de8ec45a58b0b7 (patch) | |
tree | 4b6611d6f456f2f2ef7c44e1ce579cffece0ef11 /tools/perf/scripts/python | |
parent | bpftool: Ensure bytes_memlock json output is correct (diff) | |
parent | selftests/bpf: Check that bpf_kernel_read_file() denies reading IMA policy (diff) | |
download | linux-dev-a77c2cfd4ee4bfb5267653dad3de8ec45a58b0b7.tar.xz linux-dev-a77c2cfd4ee4bfb5267653dad3de8ec45a58b0b7.zip |
Merge branch 'bpf-lsm: Extend interoperability with IMA'
Roberto Sassu says:
====================
Extend the interoperability with IMA, to give wider flexibility for the
implementation of integrity-focused LSMs based on eBPF.
Patch 1 fixes some style issues.
Patches 2-6 give the ability to eBPF-based LSMs to take advantage of the
measurement capability of IMA without needing to setup a policy in IMA
(those LSMs might implement the policy capability themselves).
Patches 7-9 allow eBPF-based LSMs to evaluate files read by the kernel.
Changelog
v2:
- Add better description to patch 1 (suggested by Shuah)
- Recalculate digest if it is not fresh (when IMA_COLLECTED flag not set)
- Move declaration of bpf_ima_file_hash() at the end (suggested by
Yonghong)
- Add tests to check if the digest has been recalculated
- Add deny test for bpf_kernel_read_file()
- Add description to tests
v1:
- Modify ima_file_hash() only and allow the usage of the function with the
modified behavior by eBPF-based LSMs through the new function
bpf_ima_file_hash() (suggested by Mimi)
- Make bpf_lsm_kernel_read_file() sleepable so that bpf_ima_inode_hash()
and bpf_ima_file_hash() can be called inside the implementation of
eBPF-based LSMs for this hook
====================
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools/perf/scripts/python')
0 files changed, 0 insertions, 0 deletions