Skip to content

Comments

bpf: add a few hooks for sandboxing#11113

Open
kernel-patches-daemon-bpf[bot] wants to merge 4 commits intobpf-next_basefrom
series/1055733=>bpf-next
Open

bpf: add a few hooks for sandboxing#11113
kernel-patches-daemon-bpf[bot] wants to merge 4 commits intobpf-next_basefrom
series/1055733=>bpf-next

Conversation

@kernel-patches-daemon-bpf
Copy link

Pull request for series with
subject: bpf: add a few hooks for sandboxing
version: 1
url: https://patchwork.kernel.org/project/netdevbpf/list/?series=1055733

@kernel-patches-daemon-bpf
Copy link
Author

Upstream branch: 9cd168a
series: https://patchwork.kernel.org/project/netdevbpf/list/?series=1055733
version: 1

@kernel-patches-daemon-bpf
Copy link
Author

Upstream branch: 3ecf0b4
series: https://patchwork.kernel.org/project/netdevbpf/list/?series=1055733
version: 1

@kernel-patches-daemon-bpf
Copy link
Author

Upstream branch: 3ecf0b4
series: https://patchwork.kernel.org/project/netdevbpf/list/?series=1055733
version: 1

@kernel-patches-daemon-bpf
Copy link
Author

Upstream branch: 0d6bc03
series: https://patchwork.kernel.org/project/netdevbpf/list/?series=1055733
version: 1

Add the three namespace lifecycle hooks and make them available to bpf
lsm program types. This allows bpf to supervise namespace creation. I'm
in the process of adding various "universal truth" bpf programs to
systemd that will make use of this. This e.g., allows to lock in a
program into a given set of namespaces.

Signed-off-by: Christian Brauner <brauner@kernel.org>
Add a hook to manage attaching tasks to cgroup. I'm in the process of
adding various "universal truth" bpf programs to systemd that will make
use of this.

This has been a long-standing request (cf. [1] and [2]). It will allow us to
enforce cgroup migrations and ensure that services can never escape their
cgroups. This is just one of many use-cases.

Link: systemd/systemd#6356 [1]
Link: systemd/systemd#22874 [2]
Signed-off-by: Christian Brauner <brauner@kernel.org>
Add a BPF LSM selftest that implements a "lock on entry" namespace
sandbox policy.

Signed-off-by: Christian Brauner <brauner@kernel.org>
@kernel-patches-daemon-bpf
Copy link
Author

Upstream branch: 055d8dd
series: https://patchwork.kernel.org/project/netdevbpf/list/?series=1055733
version: 1

Signed-off-by: Christian Brauner <brauner@kernel.org>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant