hooks.c (9e8238020c5beba64e7ffafbb7ea0fb02fe68270) | hooks.c (8ea636848aca35b9f97c5b5dee30225cf2dd0fe6) |
---|---|
1// SPDX-License-Identifier: GPL-2.0 2 3/* 4 * Copyright (C) 2020 Google LLC. 5 */ 6#include <linux/lsm_hooks.h> 7#include <linux/bpf_lsm.h> 8 9static struct security_hook_list bpf_lsm_hooks[] __lsm_ro_after_init = { 10 #define LSM_HOOK(RET, DEFAULT, NAME, ...) \ 11 LSM_HOOK_INIT(NAME, bpf_lsm_##NAME), 12 #include <linux/lsm_hook_defs.h> 13 #undef LSM_HOOK | 1// SPDX-License-Identifier: GPL-2.0 2 3/* 4 * Copyright (C) 2020 Google LLC. 5 */ 6#include <linux/lsm_hooks.h> 7#include <linux/bpf_lsm.h> 8 9static struct security_hook_list bpf_lsm_hooks[] __lsm_ro_after_init = { 10 #define LSM_HOOK(RET, DEFAULT, NAME, ...) \ 11 LSM_HOOK_INIT(NAME, bpf_lsm_##NAME), 12 #include <linux/lsm_hook_defs.h> 13 #undef LSM_HOOK |
14 LSM_HOOK_INIT(inode_free_security, bpf_inode_storage_free), |
|
14}; 15 16static int __init bpf_lsm_init(void) 17{ 18 security_add_hooks(bpf_lsm_hooks, ARRAY_SIZE(bpf_lsm_hooks), "bpf"); 19 pr_info("LSM support for eBPF active\n"); 20 return 0; 21} 22 | 15}; 16 17static int __init bpf_lsm_init(void) 18{ 19 security_add_hooks(bpf_lsm_hooks, ARRAY_SIZE(bpf_lsm_hooks), "bpf"); 20 pr_info("LSM support for eBPF active\n"); 21 return 0; 22} 23 |
24struct lsm_blob_sizes bpf_lsm_blob_sizes __lsm_ro_after_init = { 25 .lbs_inode = sizeof(struct bpf_storage_blob), 26}; 27 |
|
23DEFINE_LSM(bpf) = { 24 .name = "bpf", 25 .init = bpf_lsm_init, | 28DEFINE_LSM(bpf) = { 29 .name = "bpf", 30 .init = bpf_lsm_init, |
31 .blobs = &bpf_lsm_blob_sizes |
|
26}; | 32}; |