Package: kernel
Version: 5.10.13-1

Enabling CONFIG_BPF_LSM in the KConfig of Debian Kernels, allowing
users to use BPF LSM programs. I can see that all the configs this
depends on have already been enabled (the main one being
CONFIG_DEBUG_INFO_BTF).

The BPF LSM was merged into the Linux kernel 5.7

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=641cd7b06c911c5935c34f24850ea18690649917

https://outflux.net/blog/archives/2020/09/21/security-things-in-linux-v5-7

It allows users to implement MAC and Audit Policies using BPF
programs. As a follow-up from the interest generated by the LSM on
BPF/Linux conferences and on request from users, we’d like to request
the enabling of CONFIG_BPF_LSM.

The LSM won't be added to the list of active LSMs by default (in
CONFIG_LSM or lsm= on the boot parameters) yet, as it adds an indirect
function call overhead by registering an empty LSM hook for all hooks.
However enabling it in the kernel config will support users who wish
to use BPF LSM programs without needing to replace their kernel image.

The LSM can be made "active" by default when our work on getting rid
of this overhead is merged in the kernel:

https://lore.kernel.org/bpf/20200820164753.3256899-1-jackm...@chromium.org

This has already been enabled by Ubuntu (Hirsute Hippo):

https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1905975

and Fedora (version 33 onwards).

Regression Potential:

None. The LSM is not active by default, so it does not have any
performance or functional regression.

Reply via email to