Skip to content

Conversation

@kernel-patches-daemon-bpf-rc
Copy link

Pull request for series with
subject: bpf: Add more dentry kfuncs for BPF LSM programs
version: 1
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=1005898

@kernel-patches-daemon-bpf-rc
Copy link
Author

Upstream branch: d4680a1
series: https://patchwork.kernel.org/project/netdevbpf/list/?series=1005898
version: 1

@kernel-patches-daemon-bpf-rc
Copy link
Author

Upstream branch: d4680a1
series: https://patchwork.kernel.org/project/netdevbpf/list/?series=1005898
version: 1

@kernel-patches-daemon-bpf-rc
Copy link
Author

Upstream branch: d4680a1
series: https://patchwork.kernel.org/project/netdevbpf/list/?series=1005898
version: 1

@kernel-patches-daemon-bpf-rc
Copy link
Author

Upstream branch: d4680a1
series: https://patchwork.kernel.org/project/netdevbpf/list/?series=1005898
version: 1

Add six new BPF kfuncs that enable BPF LSM programs to safely interact
with dentry objects:

- bpf_dget(): Acquire reference on dentry
- bpf_dput(): Release reference on dentry
- bpf_dget_parent(): Get referenced parent dentry
- bpf_d_find_alias(): Find referenced alias dentry for inode
- bpf_file_dentry(): Get dentry from file
- bpf_file_vfsmount(): Get vfsmount from file

All kfuncs are currently restricted to BPF_PROG_TYPE_LSM programs.

Signed-off-by: David Windsor <[email protected]>
Add BPF selftests that exercise the new dentry kfuncs via an LSM program
attached to the file_open hook.

Signed-off-by: David Windsor <[email protected]>
@kernel-patches-daemon-bpf-rc
Copy link
Author

Upstream branch: dd948aa
series: https://patchwork.kernel.org/project/netdevbpf/list/?series=1005898
version: 1

@kernel-patches-daemon-bpf-rc
Copy link
Author

At least one diff in series https://patchwork.kernel.org/project/netdevbpf/list/?series=1005898 expired. Closing PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants