• [$] BPF signing LSM hook change rejected

    From LWN.net@1337:1/100 to All on Mon Oct 27 19:00:06 2025
    [$] BPF signing LSM hook change rejected

    Date:
    Mon, 27 Oct 2025 18:46:17 +0000

    Description:
    BPF lets users load programs into a running kernel.
    Even though BPF programs are checked by the verifier to
    ensure that they stay inside certain limits, some users would still like to ensure
    that only approved BPF programs are loaded. KP Singh's patches adding that capability to the kernel were accepted
    in version 6.18, but not everyone is
    satisfied with his implementation. Blaise Boscaccy, who has been working to get
    a version of BPF code signing with better auditability
    into the kernel for some time, posted a patch set on top of Singh's changes that alters the loading process to
    not invoke security module hooks
    until the entire loading process is complete.
    The discussion on the patch
    set is the continuation of a long-running disagreement over
    the interface for signed BPF programs.

    ======================================================================
    Link to news story:
    https://lwn.net/Articles/1042625/


    --- Mystic BBS v1.12 A49 (Linux/64)
    * Origin: tqwNet UK HUB @ hub.uk.erb.pw (1337:1/100)