mirror of
https://github.com/torvalds/linux.git
synced 2025-12-07 20:06:24 +00:00
Reduce the duplication between the lsm_id struct and the DEFINE_LSM() definition by linking the lsm_id struct directly into the individual LSM's DEFINE_LSM() instance. Linking the lsm_id into the LSM definition also allows us to simplify the security_add_hooks() function by removing the code which populates the lsm_idlist[] array and moving it into the normal LSM startup code where the LSM list is parsed and the individual LSMs are enabled, making for a cleaner implementation with less overhead at boot. Reviewed-by: Kees Cook <kees@kernel.org> Reviewed-by: John Johansen <john.johansen@canonical.com> Reviewed-by: Casey Schaufler <casey@schaufler-ca.com> Reviewed-by: Mimi Zohar <zohar@linux.ibm.com> Signed-off-by: Paul Moore <paul@paul-moore.com>
40 lines
895 B
C
40 lines
895 B
C
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
/*
|
|
* Copyright (C) 2020 Google LLC.
|
|
*/
|
|
#include <linux/lsm_hooks.h>
|
|
#include <linux/bpf_lsm.h>
|
|
#include <uapi/linux/lsm.h>
|
|
|
|
static struct security_hook_list bpf_lsm_hooks[] __ro_after_init = {
|
|
#define LSM_HOOK(RET, DEFAULT, NAME, ...) \
|
|
LSM_HOOK_INIT(NAME, bpf_lsm_##NAME),
|
|
#include <linux/lsm_hook_defs.h>
|
|
#undef LSM_HOOK
|
|
LSM_HOOK_INIT(inode_free_security, bpf_inode_storage_free),
|
|
};
|
|
|
|
static const struct lsm_id bpf_lsmid = {
|
|
.name = "bpf",
|
|
.id = LSM_ID_BPF,
|
|
};
|
|
|
|
static int __init bpf_lsm_init(void)
|
|
{
|
|
security_add_hooks(bpf_lsm_hooks, ARRAY_SIZE(bpf_lsm_hooks),
|
|
&bpf_lsmid);
|
|
pr_info("LSM support for eBPF active\n");
|
|
return 0;
|
|
}
|
|
|
|
struct lsm_blob_sizes bpf_lsm_blob_sizes __ro_after_init = {
|
|
.lbs_inode = sizeof(struct bpf_storage_blob),
|
|
};
|
|
|
|
DEFINE_LSM(bpf) = {
|
|
.id = &bpf_lsmid,
|
|
.init = bpf_lsm_init,
|
|
.blobs = &bpf_lsm_blob_sizes
|
|
};
|