[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <CAEf4BzbKn5Ee8TVMpph_E8JhKkv6KpgHZBEV0X4RwtMKum10Mg@mail.gmail.com>
Date: Tue, 24 Oct 2023 12:38:31 -0700
From: Andrii Nakryiko <andrii.nakryiko@...il.com>
To: Paul Moore <paul@...l-moore.com>
Cc: Andrii Nakryiko <andrii@...nel.org>, bpf@...r.kernel.org, netdev@...r.kernel.org,
linux-fsdevel@...r.kernel.org, linux-security-module@...r.kernel.org,
keescook@...omium.org, brauner@...nel.org, lennart@...ttering.net,
kernel-team@...a.com, sargun@...gun.me
Subject: Re: [PATCH v8 bpf-next 00/18] BPF token and BPF FS-based delegation
On Tue, Oct 24, 2023 at 11:23 AM Paul Moore <paul@...l-moore.com> wrote:
>
> On Tue, Oct 24, 2023 at 1:52 PM Andrii Nakryiko
> <andrii.nakryiko@...il.com> wrote:
> > On Mon, Oct 16, 2023 at 11:04 AM Andrii Nakryiko <andrii@...nel.org> wrote:
>
> ...
>
> > > v7->v8:
> > > - add bpf_token_allow_cmd and bpf_token_capable hooks (Paul);
> > > - inline bpf_token_alloc() into bpf_token_create() to prevent accidental
> > > divergence with security_bpf_token_create() hook (Paul);
> >
> > Hi Paul,
> >
> > I believe I addressed all the concerns you had in this revision. Can
> > you please take a look and confirm that all things look good to you
> > from LSM perspective? Thanks!
>
> Yes, thanks for that, this patchset is near the top of my list, there
> just happen to be a lot of things vying for my time at the moment. My
> apologies on the delay.
No problem, thanks!
>
> --
> paul-moore.com
Powered by blists - more mailing lists