blob: e5971fa74fd748a7650e5eb5c37bd4bf738a0c45 [file] [log] [blame]
KP Singh520b7aa2020-03-29 01:43:53 +01001// SPDX-License-Identifier: GPL-2.0
2
3/*
4 * Copyright (C) 2020 Google LLC.
5 */
6#include <linux/lsm_hooks.h>
7#include <linux/bpf_lsm.h>
8
9static struct security_hook_list bpf_lsm_hooks[] __lsm_ro_after_init = {
10 #define LSM_HOOK(RET, DEFAULT, NAME, ...) \
11 LSM_HOOK_INIT(NAME, bpf_lsm_##NAME),
12 #include <linux/lsm_hook_defs.h>
13 #undef LSM_HOOK
KP Singh8ea63682020-08-25 20:29:17 +020014 LSM_HOOK_INIT(inode_free_security, bpf_inode_storage_free),
KP Singh4cf1bc12020-11-06 10:37:40 +000015 LSM_HOOK_INIT(task_free, bpf_task_storage_free),
KP Singh520b7aa2020-03-29 01:43:53 +010016};
17
18static int __init bpf_lsm_init(void)
19{
20 security_add_hooks(bpf_lsm_hooks, ARRAY_SIZE(bpf_lsm_hooks), "bpf");
21 pr_info("LSM support for eBPF active\n");
22 return 0;
23}
24
KP Singh8ea63682020-08-25 20:29:17 +020025struct lsm_blob_sizes bpf_lsm_blob_sizes __lsm_ro_after_init = {
26 .lbs_inode = sizeof(struct bpf_storage_blob),
KP Singh4cf1bc12020-11-06 10:37:40 +000027 .lbs_task = sizeof(struct bpf_storage_blob),
KP Singh8ea63682020-08-25 20:29:17 +020028};
29
KP Singh520b7aa2020-03-29 01:43:53 +010030DEFINE_LSM(bpf) = {
31 .name = "bpf",
32 .init = bpf_lsm_init,
KP Singh8ea63682020-08-25 20:29:17 +020033 .blobs = &bpf_lsm_blob_sizes
KP Singh520b7aa2020-03-29 01:43:53 +010034};