lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sun, 06 Mar 2022 14:23:37 -0500 From: Mimi Zohar <zohar@...ux.ibm.com> To: Roberto Sassu <roberto.sassu@...wei.com>, shuah@...nel.org, ast@...nel.org, daniel@...earbox.net, andrii@...nel.org, yhs@...com, kpsingh@...nel.org, revest@...omium.org, gregkh@...uxfoundation.org Cc: linux-integrity@...r.kernel.org, linux-security-module@...r.kernel.org, linux-kselftest@...r.kernel.org, bpf@...r.kernel.org, netdev@...r.kernel.org, linux-kernel@...r.kernel.org Subject: Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA On Wed, 2022-03-02 at 12:13 +0100, Roberto Sassu wrote: > Extend the interoperability with IMA, to give wider flexibility for the > implementation of integrity-focused LSMs based on eBPF. > > Patch 1 fixes some style issues. > > Patches 2-6 give the ability to eBPF-based LSMs to take advantage of the > measurement capability of IMA without needing to setup a policy in IMA > (those LSMs might implement the policy capability themselves). > > Patches 7-9 allow eBPF-based LSMs to evaluate files read by the kernel. The tests seem to only work when neither a builtin IMA policy or a custom policy is previously loaded. thanks, Mimi
Powered by blists - more mailing lists