Received: by 2002:a05:6a10:413:0:0:0:0 with SMTP id 19csp2712044pxp; Mon, 7 Mar 2022 23:33:39 -0800 (PST) X-Google-Smtp-Source: ABdhPJwA17sD4azfjtP4C4BSlAQAwQ9cnY4575ehtjCAnAjB+Xgqz7poK9oA5tCe8rH5jmfeytiN X-Received: by 2002:aa7:943a:0:b0:4f6:adc9:d741 with SMTP id y26-20020aa7943a000000b004f6adc9d741mr16864778pfo.30.1646724819155; Mon, 07 Mar 2022 23:33:39 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1646724819; cv=none; d=google.com; s=arc-20160816; b=FXG9m0ivfUEGJN1A1Eif/v1cD+F5c4lJ+MrhZefv/THGMprXvQHLQPRlgyE5tLtcrg TpLyiEmVYrsA8YQlNvL+yctv4lEehXUW7RS7iHge8I/4NHh8VI+ijVEx2n3euwTAKcZq 2IPl6XbHYH4df9x3OegaZV9HiTMPJXws9LqlCItS96wocU4JXnPNbP2O2oOeXE6EvogK 3fjiDUgh5P0QKh3tlBWUxECoiw7wbK5kuL638R9BtxMyhk7G3fIKa9GEYHz2AQWW0xqx G28dbCIcpvgS4LlK9yztsUOGGKbj9NPX/vjD7JQx4+Ce3LW3axvC5HjHffzoLhGOoLxG 0DMg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=zN3XBQ4n/6sGpG7Vx9ovJb9+BQXKOsOUfUacPbieyjc=; b=I1yhWGTRlAyqfgT1cSSdeVFc4PRiqSmLH/LviuKuuRmQNEYO2uQ1d4k05ZrGkaXyun xRxBhgvbY0qBqctfwFakYTfc/ncfVaxQS9I/BxNGFkwyluHclsf0lz4W/sj7gH6yQjlR j9smM2gLVHoxX7lZeLjET1ZXZoOyxokG8QWyr0sakctQwQPNP1OMzsj1Y3nBqOO29TS1 DpJ1AePfTIXvcqflsUQsTe5B1BwVS5glrdeQuxNvB3W4g8pIqGbD20gMOUyTzU8/J4Da e0R7cSJ+HIEnc6vOWcYNtF8pWARuD+RJ6cmUbkqAZZxSdWWwKN+pEf+9S23ne6+OXUU3 l5kQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fdfnW2Fl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id k6-20020a654346000000b0037716e34d1fsi15203621pgq.133.2022.03.07.23.33.23; Mon, 07 Mar 2022 23:33:39 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@kernel.org header.s=k20201202 header.b=fdfnW2Fl; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S236361AbiCGNTH (ORCPT + 99 others); Mon, 7 Mar 2022 08:19:07 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37882 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S242797AbiCGNTG (ORCPT ); Mon, 7 Mar 2022 08:19:06 -0500 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 77BE027B13 for ; Mon, 7 Mar 2022 05:18:09 -0800 (PST) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id 0C80661202 for ; Mon, 7 Mar 2022 13:18:09 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id 6DA8EC36AEC for ; Mon, 7 Mar 2022 13:18:08 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=k20201202; t=1646659088; bh=0x9avxE1QuPb1xRSPHVfHgo20smbkC0ezQPHmsX583Y=; h=References:In-Reply-To:From:Date:Subject:To:Cc:From; b=fdfnW2FlS2s/NtI9OIEPoL3friIZhn4gB+q9ykNTwU5vvuw+nEflebKpQ3V3Pf4Lq z1BWhCICYLQtHghvBBeeuVJezZ3Hf6PZ3w+svus4UbBeUsvAyA0WgXS5q6PEXrcohQ U23e8nTBn7HGvs9ksItlQIjmC62kxSbWB5GB4c5VWjL7CJVUNiioReQrUB0b+B0izG 3192CzMmcsmDuN9waHQVmNKjgENwZ5u7B40kB4aazoknGByseLS7kWkeZnji6uljzW qp6gKFVNXu3ojloMsNRa7sUIp/hh1PyEtMUFyfS2vflRdTLJz7zczBt/r6E6axLPhR 2anp04mEGAqyA== Received: by mail-ej1-f53.google.com with SMTP id kt27so31982180ejb.0 for ; Mon, 07 Mar 2022 05:18:08 -0800 (PST) X-Gm-Message-State: AOAM5332dFgoGB3DE2xz3JMlpRbd1i3urPLP7IHoPZMs/wg5jBUdVHDz BbGy+XGGkY0cydHaAWnoAQSXEDbq+/sxwuYKGa64Mg== X-Received: by 2002:a17:906:a1c8:b0:6da:a635:e402 with SMTP id bx8-20020a170906a1c800b006daa635e402mr9441257ejb.598.1646659086280; Mon, 07 Mar 2022 05:18:06 -0800 (PST) MIME-Version: 1.0 References: <20220302111404.193900-1-roberto.sassu@huawei.com> <20220302222056.73dzw5lnapvfurxg@ast-mbp.dhcp.thefacebook.com> <04d878d4b2441bb8a579a4191d8edc936c5a794a.camel@linux.ibm.com> <40db9f74fd3c9c7b660e3a203c5a6eda08736d5b.camel@linux.ibm.com> In-Reply-To: <40db9f74fd3c9c7b660e3a203c5a6eda08736d5b.camel@linux.ibm.com> From: KP Singh Date: Mon, 7 Mar 2022 14:17:55 +0100 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH v3 0/9] bpf-lsm: Extend interoperability with IMA To: Mimi Zohar Cc: Alexei Starovoitov , Roberto Sassu , Shuah Khan , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Yonghong Song , Florent Revest , Greg Kroah-Hartman , linux-integrity , LSM List , "open list:KERNEL SELFTEST FRAMEWORK" , bpf , Network Development , LKML , Florent Revest , Kees Cook Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-7.6 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_HI, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Mar 7, 2022 at 3:57 AM Mimi Zohar wrote: > > On Thu, 2022-03-03 at 14:39 -0800, Alexei Starovoitov wrote: > > > . There is no such thing as "eBPF modules". There are BPF programs. > > They cannot be signed the same way as kernel modules. > > We've been working on providing a way to sign them for more > > than a year now. That work is still ongoing. > > > > . IMA cannot be used for integrity check of BPF programs for the same > > reasons why kernel module like signing cannot be used. > > I assume the issue isn't where the signature is stored (e.g. appended, > xattr), but of calculating the hash. Where is the discussion taking This has the relevant background: https://lwn.net/Articles/853489/ We had some more discussions in one of our BSC meeting: https://github.com/ebpf-io/bsc/blob/master/minutes.md and we expect the discussions to continue over conferences this year (e.g. LSF/MM/BPF, Linux Plumbers). As I mentioned on another thread we don't have to wait for conferences and we can discuss this in the BPF office hours. Please feel free to add an agenda at: https://docs.google.com/spreadsheets/d/1LfrDXZ9-fdhvPEp_LHkxAMYyxxpwBXjywWa0AejEveU/edit#gid=0 (best is to give some notice so that interested folks can join). > place? Are there any summaries of what has been discussed? > > FYI, IMA isn't limited to measuring files. Support was added for > buffer measurements (e.g kexec boot command line, certificates) and > measuring kernel critical data (e.g. SELinux in memory policy & state, > device mapper). Nice. I need to look at how this is implemented. - KP > > thanks, > > Mimi >