-
Notifications
You must be signed in to change notification settings - Fork 5
BPF signature hash chains #6059
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
BPF signature hash chains #6059
Conversation
|
Upstream branch: 0cc114d |
1f0b79a to
7abc661
Compare
|
Upstream branch: 0cc114d |
c91222f to
680f2c6
Compare
7abc661 to
31fc1e2
Compare
|
Upstream branch: 4b21134 |
680f2c6 to
2a36c3b
Compare
31fc1e2 to
25b0220
Compare
|
Upstream branch: 0e8e60e |
2a36c3b to
e1d62c8
Compare
25b0220 to
191fc27
Compare
|
Upstream branch: 15cf392 |
e1d62c8 to
34c75b6
Compare
191fc27 to
3561924
Compare
|
Upstream branch: 4ef77dd |
This patch introduces hash chain support for signature verification of arbitrary bpf map objects which was described here: https://lore.kernel.org/linux-security-module/[email protected]/ The UAPI is extended to allow for in-kernel checking of maps passed in via the fd_array. A hash chain is constructed from the maps, in order specified by the signature_maps field. The hash chain is terminated with the hash of the program itself. Signed-off-by: Blaise Boscaccy <[email protected]>
Convert an existing signed lskel test to use the newly introduced map signature hash-chain support added to libbpf. Signed-off-by: Blaise Boscaccy <[email protected]>
34c75b6 to
5e50652
Compare
|
At least one diff in series https://patchwork.kernel.org/project/netdevbpf/list/?series=1006678 expired. Closing PR. |
Pull request for series with
subject: BPF signature hash chains
version: 1
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=1006678