diff options
author | Alexei Starovoitov <ast@kernel.org> | 2022-03-11 05:58:04 +0300 |
---|---|---|
committer | Alexei Starovoitov <ast@kernel.org> | 2022-03-11 06:10:13 +0300 |
commit | a77c2cfd4ee4bfb5267653dad3de8ec45a58b0b7 (patch) | |
tree | 4b6611d6f456f2f2ef7c44e1ce579cffece0ef11 /tools/perf/scripts/python/event_analyzing_sample.py | |
parent | 357b3cc3c0467b2f7cd6c4a87f7a18bfd779ce5b (diff) | |
parent | 7bae42b68d7f070a346fde4c7c1ce182f2284933 (diff) | |
download | linux-a77c2cfd4ee4bfb5267653dad3de8ec45a58b0b7.tar.xz |
Merge branch 'bpf-lsm: Extend interoperability with IMA'
Roberto Sassu says:
====================
Extend the interoperability with IMA, to give wider flexibility for the
implementation of integrity-focused LSMs based on eBPF.
Patch 1 fixes some style issues.
Patches 2-6 give the ability to eBPF-based LSMs to take advantage of the
measurement capability of IMA without needing to setup a policy in IMA
(those LSMs might implement the policy capability themselves).
Patches 7-9 allow eBPF-based LSMs to evaluate files read by the kernel.
Changelog
v2:
- Add better description to patch 1 (suggested by Shuah)
- Recalculate digest if it is not fresh (when IMA_COLLECTED flag not set)
- Move declaration of bpf_ima_file_hash() at the end (suggested by
Yonghong)
- Add tests to check if the digest has been recalculated
- Add deny test for bpf_kernel_read_file()
- Add description to tests
v1:
- Modify ima_file_hash() only and allow the usage of the function with the
modified behavior by eBPF-based LSMs through the new function
bpf_ima_file_hash() (suggested by Mimi)
- Make bpf_lsm_kernel_read_file() sleepable so that bpf_ima_inode_hash()
and bpf_ima_file_hash() can be called inside the implementation of
eBPF-based LSMs for this hook
====================
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Diffstat (limited to 'tools/perf/scripts/python/event_analyzing_sample.py')
0 files changed, 0 insertions, 0 deletions