blob: 788667d582ae5788648834ccebfe5d04d26a9666 [file] [log] [blame]
KP Singh520b7aa2020-03-29 01:43:53 +01001// SPDX-License-Identifier: GPL-2.0
2
3/*
4 * Copyright (C) 2020 Google LLC.
5 */
6#include <linux/lsm_hooks.h>
7#include <linux/bpf_lsm.h>
8
9static struct security_hook_list bpf_lsm_hooks[] __lsm_ro_after_init = {
10 #define LSM_HOOK(RET, DEFAULT, NAME, ...) \
11 LSM_HOOK_INIT(NAME, bpf_lsm_##NAME),
12 #include <linux/lsm_hook_defs.h>
13 #undef LSM_HOOK
KP Singh8ea63682020-08-25 20:29:17 +020014 LSM_HOOK_INIT(inode_free_security, bpf_inode_storage_free),
KP Singh520b7aa2020-03-29 01:43:53 +010015};
16
17static int __init bpf_lsm_init(void)
18{
19 security_add_hooks(bpf_lsm_hooks, ARRAY_SIZE(bpf_lsm_hooks), "bpf");
20 pr_info("LSM support for eBPF active\n");
21 return 0;
22}
23
KP Singh8ea63682020-08-25 20:29:17 +020024struct lsm_blob_sizes bpf_lsm_blob_sizes __lsm_ro_after_init = {
25 .lbs_inode = sizeof(struct bpf_storage_blob),
26};
27
KP Singh520b7aa2020-03-29 01:43:53 +010028DEFINE_LSM(bpf) = {
29 .name = "bpf",
30 .init = bpf_lsm_init,
KP Singh8ea63682020-08-25 20:29:17 +020031 .blobs = &bpf_lsm_blob_sizes
KP Singh520b7aa2020-03-29 01:43:53 +010032};