xref: /OK3568_Linux_fs/kernel/security/bpf/hooks.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun 
3*4882a593Smuzhiyun /*
4*4882a593Smuzhiyun  * Copyright (C) 2020 Google LLC.
5*4882a593Smuzhiyun  */
6*4882a593Smuzhiyun #include <linux/lsm_hooks.h>
7*4882a593Smuzhiyun #include <linux/bpf_lsm.h>
8*4882a593Smuzhiyun 
9*4882a593Smuzhiyun static struct security_hook_list bpf_lsm_hooks[] __lsm_ro_after_init = {
10*4882a593Smuzhiyun 	#define LSM_HOOK(RET, DEFAULT, NAME, ...) \
11*4882a593Smuzhiyun 	LSM_HOOK_INIT(NAME, bpf_lsm_##NAME),
12*4882a593Smuzhiyun 	#include <linux/lsm_hook_defs.h>
13*4882a593Smuzhiyun 	#undef LSM_HOOK
14*4882a593Smuzhiyun 	LSM_HOOK_INIT(inode_free_security, bpf_inode_storage_free),
15*4882a593Smuzhiyun };
16*4882a593Smuzhiyun 
bpf_lsm_init(void)17*4882a593Smuzhiyun static int __init bpf_lsm_init(void)
18*4882a593Smuzhiyun {
19*4882a593Smuzhiyun 	security_add_hooks(bpf_lsm_hooks, ARRAY_SIZE(bpf_lsm_hooks), "bpf");
20*4882a593Smuzhiyun 	pr_info("LSM support for eBPF active\n");
21*4882a593Smuzhiyun 	return 0;
22*4882a593Smuzhiyun }
23*4882a593Smuzhiyun 
24*4882a593Smuzhiyun struct lsm_blob_sizes bpf_lsm_blob_sizes __lsm_ro_after_init = {
25*4882a593Smuzhiyun 	.lbs_inode = sizeof(struct bpf_storage_blob),
26*4882a593Smuzhiyun };
27*4882a593Smuzhiyun 
28*4882a593Smuzhiyun DEFINE_LSM(bpf) = {
29*4882a593Smuzhiyun 	.name = "bpf",
30*4882a593Smuzhiyun 	.init = bpf_lsm_init,
31*4882a593Smuzhiyun 	.blobs = &bpf_lsm_blob_sizes
32*4882a593Smuzhiyun };
33