1// SPDX-License-Identifier: GPL-2.0
2
3/*
4 * Copyright (C) 2020 Google LLC.
5 */
6#include <linux/lsm_hooks.h>
7#include <linux/bpf_lsm.h>
8#include <uapi/linux/lsm.h>
9
10static struct security_hook_list bpf_lsm_hooks[] __ro_after_init = {
11 #define LSM_HOOK(RET, DEFAULT, NAME, ...) \
12 LSM_HOOK_INIT(NAME, bpf_lsm_##NAME),
13 #include <linux/lsm_hook_defs.h>
14 #undef LSM_HOOK
15 LSM_HOOK_INIT(inode_free_security, bpf_inode_storage_free),
16};
17
18static const struct lsm_id bpf_lsmid = {
19 .name = "bpf",
20 .id = LSM_ID_BPF,
21};
22
23static int __init bpf_lsm_init(void)
24{
25 security_add_hooks(hooks: bpf_lsm_hooks, ARRAY_SIZE(bpf_lsm_hooks),
26 lsmid: &bpf_lsmid);
27 pr_info("LSM support for eBPF active\n");
28 return 0;
29}
30
31struct lsm_blob_sizes bpf_lsm_blob_sizes __ro_after_init = {
32 .lbs_inode = sizeof(struct bpf_storage_blob),
33};
34
35DEFINE_LSM(bpf) = {
36 .name = "bpf",
37 .init = bpf_lsm_init,
38 .blobs = &bpf_lsm_blob_sizes
39};
40

Provided by KDAB

Privacy Policy
Improve your Profiling and Debugging skills
Find out more

source code of linux/security/bpf/hooks.c