[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <9be81980b1849dc60b46ad0672b667b6b5365f2d.camel@linux.ibm.com>
Date: Sun, 06 Mar 2022 14:23:37 -0500
From: Mimi Zohar <zohar@...ux.ibm.com>
To: Roberto Sassu <roberto.sassu@...wei.com>, shuah@...nel.org,
ast@...nel.org, daniel@...earbox.net, andrii@...nel.org,
yhs@...com, kpsingh@...nel.org, revest@...omium.org,
gregkh@...uxfoundation.org
Cc: linux-integrity@...r.kernel.org,
linux-security-module@...r.kernel.org,
linux-kselftest@...r.kernel.org, bpf@...r.kernel.org,
netdev@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA
On Wed, 2022-03-02 at 12:13 +0100, Roberto Sassu wrote:
> Extend the interoperability with IMA, to give wider flexibility for the
> implementation of integrity-focused LSMs based on eBPF.
>
> Patch 1 fixes some style issues.
>
> Patches 2-6 give the ability to eBPF-based LSMs to take advantage of the
> measurement capability of IMA without needing to setup a policy in IMA
> (those LSMs might implement the policy capability themselves).
>
> Patches 7-9 allow eBPF-based LSMs to evaluate files read by the kernel.
The tests seem to only work when neither a builtin IMA policy or a
custom policy is previously loaded.
thanks,
Mimi
Powered by blists - more mailing lists