[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAHC9VhRxR3ygxskpfbukHeM5wmX0=SifvLny2eiezWvwAyB9tw@mail.gmail.com>
Date: Tue, 24 Oct 2023 14:23:21 -0400
From: Paul Moore <paul@...l-moore.com>
To: Andrii Nakryiko <andrii.nakryiko@...il.com>
Cc: Andrii Nakryiko <andrii@...nel.org>, bpf@...r.kernel.org, netdev@...r.kernel.org,
linux-fsdevel@...r.kernel.org, linux-security-module@...r.kernel.org,
keescook@...omium.org, brauner@...nel.org, lennart@...ttering.net,
kernel-team@...a.com, sargun@...gun.me
Subject: Re: [PATCH v8 bpf-next 00/18] BPF token and BPF FS-based delegation
On Tue, Oct 24, 2023 at 1:52 PM Andrii Nakryiko
<andrii.nakryiko@...il.com> wrote:
> On Mon, Oct 16, 2023 at 11:04 AM Andrii Nakryiko <andrii@...nel.org> wrote:
...
> > v7->v8:
> > - add bpf_token_allow_cmd and bpf_token_capable hooks (Paul);
> > - inline bpf_token_alloc() into bpf_token_create() to prevent accidental
> > divergence with security_bpf_token_create() hook (Paul);
>
> Hi Paul,
>
> I believe I addressed all the concerns you had in this revision. Can
> you please take a look and confirm that all things look good to you
> from LSM perspective? Thanks!
Yes, thanks for that, this patchset is near the top of my list, there
just happen to be a lot of things vying for my time at the moment. My
apologies on the delay.
--
paul-moore.com
Powered by blists - more mailing lists