Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp1154183ybl; Wed, 8 Jan 2020 12:00:17 -0800 (PST) X-Google-Smtp-Source: APXvYqyXU0r0y58XzzpxYqaXotPV1kk381WbnDCZMX6JWEuUxsNybQcsYMuIoVjHWtfNSKWbYtkR X-Received: by 2002:a05:6808:aa8:: with SMTP id r8mr232082oij.7.1578513617466; Wed, 08 Jan 2020 12:00:17 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1578513617; cv=none; d=google.com; s=arc-20160816; b=IPAOMmyG4CdsnezubI9MvC59VasCRDrjJ53aJ1++b0iZ1lY0b6vGzPvvFrUhjdWazq fwc1AJWjRkE6r42eEL7mUUz/aRuXmeafq+4foREZVen0WzsLH20ZaMpJGcR4yZCMFWr8 otlGoTpzMZCwSlwsqn6kS/d4J204LOXw8gGzRA7d00rYiMuVrO74WX1ZIuvTvPfr8IlX CtERmC1M28QKR/xKsFve6ysvbaxqesU2e7MMsdOjyQ5eXxoda1kjJMNMqeiovk7/2Ngz FQ+2cXvhdmVgNHvi/T+Pg8B//tA7BowmRTMYKtvJRvtBkTpl8wxdJEyNubZtEcG0cI61 UfDQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:mime-version:user-agent:references :message-id:in-reply-to:subject:cc:to:from:date; bh=zcJH5ZtJ6/LvksHySnmrMQI3CpU4roydy1Qu+/yInKA=; b=JiJnY506Xh8UYXys1JBqlwOCP1ouLX8kXGFQ2jVB2gNj5k+fMFyD7xXPoFX8vbniMk ji6cZIgM3HT2QnXs1PnWsi2osbtE+J4QJgJi2GcXA7AfzLHf++sw6iPpAM3V5+hQz0B4 jRNhpkyhqU4mYOayOhbq2EW6E+cNutl7n6ZZWDJjxzVmZ6waF5mxnRNLIVxHpMIPx7Vy GucRqMBeYZTcpGafbASYbTuEGx/5TsfM7lMBzDizFefp+OOMyHYUNdaYaGfKKrDOBZ3G 5Efbect2rCkkGwTfLdoOBRr7Dj9kqfR5sEhwHrqtckY58NAsZWhGtLmp/aoIyZvgqPnY 5wQQ== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id v3si2493059oth.256.2020.01.08.12.00.05; Wed, 08 Jan 2020 12:00:17 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730186AbgAHSWd (ORCPT + 99 others); Wed, 8 Jan 2020 13:22:33 -0500 Received: from namei.org ([65.99.196.166]:56096 "EHLO namei.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727169AbgAHSWd (ORCPT ); Wed, 8 Jan 2020 13:22:33 -0500 Received: from localhost (localhost [127.0.0.1]) by namei.org (8.14.4/8.14.4) with ESMTP id 008ILnMB026782; Wed, 8 Jan 2020 18:21:49 GMT Date: Thu, 9 Jan 2020 05:21:49 +1100 (AEDT) From: James Morris To: KP Singh cc: linux-kernel@vger.kernel.org, bpf@vger.kernel.org, linux-security-module@vger.kernel.org, Alexei Starovoitov , Daniel Borkmann , Kees Cook , Thomas Garnier , Michael Halcrow , Paul Turner , Brendan Gregg , Jann Horn , Matthew Garrett , Christian Brauner , =?ISO-8859-15?Q?Micka=EBl_Sala=FCn?= , Florent Revest , Brendan Jackman , Martin KaFai Lau , Song Liu , Yonghong Song , "Serge E. Hallyn" , Mauro Carvalho Chehab , "David S. Miller" , Greg Kroah-Hartman , Nicolas Ferre , Stanislav Fomichev , Quentin Monnet , Andrey Ignatov , Joe Stringer Subject: Re: [PATCH bpf-next v1 10/13] bpf: lsm: Handle attachment of the same program In-Reply-To: <20191220154208.15895-11-kpsingh@chromium.org> Message-ID: References: <20191220154208.15895-1-kpsingh@chromium.org> <20191220154208.15895-11-kpsingh@chromium.org> User-Agent: Alpine 2.21 (LRH 202 2017-01-01) MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 20 Dec 2019, KP Singh wrote: > From: KP Singh > > Allow userspace to attach a newer version of a program without having > duplicates of the same program. > > If BPF_F_ALLOW_OVERRIDE is passed, the attachment logic compares the > name of the new program to the names of existing attached programs. The > names are only compared till a "__" (or '\0', if there is no "__"). If > a successful match is found, the existing program is replaced with the > newer attachment. > > ./loader Attaches "env_dumper__v1" followed by "env_dumper__v2" > to the bprm_check_security hook.. > > ./loader > ./loader > > Before: > > cat /sys/kernel/security/bpf/process_execution > env_dumper__v1 > env_dumper__v2 > > After: > > cat /sys/kernel/security/bpf/process_execution > env_dumper__v2 > > Signed-off-by: KP Singh Reviewed-by: James Morris -- James Morris