xref: /linux/security/lsm_init.c (revision 27be5600fe852c52d5b70f4ac9406879b39c864e)
167a4b6a8SPaul Moore // SPDX-License-Identifier: GPL-2.0-or-later
267a4b6a8SPaul Moore /*
367a4b6a8SPaul Moore  * LSM initialization functions
467a4b6a8SPaul Moore  */
567a4b6a8SPaul Moore 
667a4b6a8SPaul Moore #define pr_fmt(fmt) "LSM: " fmt
767a4b6a8SPaul Moore 
867a4b6a8SPaul Moore #include <linux/init.h>
967a4b6a8SPaul Moore #include <linux/lsm_hooks.h>
1067a4b6a8SPaul Moore 
1167a4b6a8SPaul Moore #include "lsm.h"
1267a4b6a8SPaul Moore 
132d671726SPaul Moore /* LSM enabled constants. */
142d671726SPaul Moore static __initdata int lsm_enabled_true = 1;
152d671726SPaul Moore static __initdata int lsm_enabled_false = 0;
162d671726SPaul Moore 
1767a4b6a8SPaul Moore /* Pointers to LSM sections defined in include/asm-generic/vmlinux.lds.h */
1867a4b6a8SPaul Moore extern struct lsm_info __start_lsm_info[], __end_lsm_info[];
1967a4b6a8SPaul Moore extern struct lsm_info __start_early_lsm_info[], __end_early_lsm_info[];
2067a4b6a8SPaul Moore 
21592b104fSPaul Moore /* Build and boot-time LSM ordering. */
22592b104fSPaul Moore static __initconst const char *const lsm_order_builtin = CONFIG_LSM;
23592b104fSPaul Moore static __initdata const char *lsm_order_cmdline;
24592b104fSPaul Moore static __initdata const char *lsm_order_legacy;
2567a4b6a8SPaul Moore 
2667a4b6a8SPaul Moore /* Ordered list of LSMs to initialize. */
27592b104fSPaul Moore static __initdata struct lsm_info *lsm_order[MAX_LSM_COUNT + 1];
28592b104fSPaul Moore static __initdata struct lsm_info *lsm_exclusive;
2967a4b6a8SPaul Moore 
3067a4b6a8SPaul Moore static __initdata bool debug;
3167a4b6a8SPaul Moore #define init_debug(...)							\
3267a4b6a8SPaul Moore 	do {								\
3367a4b6a8SPaul Moore 		if (debug)						\
3467a4b6a8SPaul Moore 			pr_info(__VA_ARGS__);				\
3567a4b6a8SPaul Moore 	} while (0)
3667a4b6a8SPaul Moore 
3737f788f6SPaul Moore #define lsm_order_for_each(iter)					\
38592b104fSPaul Moore 	for ((iter) = lsm_order; *(iter); (iter)++)
3937f788f6SPaul Moore #define lsm_for_each_raw(iter)						\
4037f788f6SPaul Moore 	for ((iter) = __start_lsm_info;					\
4137f788f6SPaul Moore 	     (iter) < __end_lsm_info; (iter)++)
4237f788f6SPaul Moore #define lsm_early_for_each_raw(iter)					\
4337f788f6SPaul Moore 	for ((iter) = __start_early_lsm_info;				\
4437f788f6SPaul Moore 	     (iter) < __end_early_lsm_info; (iter)++)
4537f788f6SPaul Moore 
46592b104fSPaul Moore /**
47592b104fSPaul Moore  * lsm_choose_security - Legacy "major" LSM selection
48592b104fSPaul Moore  * @str: kernel command line parameter
49592b104fSPaul Moore  */
50592b104fSPaul Moore static int __init lsm_choose_security(char *str)
5167a4b6a8SPaul Moore {
52592b104fSPaul Moore 	lsm_order_legacy = str;
5367a4b6a8SPaul Moore 	return 1;
5467a4b6a8SPaul Moore }
55592b104fSPaul Moore __setup("security=", lsm_choose_security);
5667a4b6a8SPaul Moore 
57592b104fSPaul Moore /**
58592b104fSPaul Moore  * lsm_choose_lsm - Modern LSM selection
59592b104fSPaul Moore  * @str: kernel command line parameter
60592b104fSPaul Moore  */
61592b104fSPaul Moore static int __init lsm_choose_lsm(char *str)
6267a4b6a8SPaul Moore {
63592b104fSPaul Moore 	lsm_order_cmdline = str;
6467a4b6a8SPaul Moore 	return 1;
6567a4b6a8SPaul Moore }
66592b104fSPaul Moore __setup("lsm=", lsm_choose_lsm);
6767a4b6a8SPaul Moore 
68592b104fSPaul Moore /**
69592b104fSPaul Moore  * lsm_debug_enable - Enable LSM framework debugging
70592b104fSPaul Moore  * @str: kernel command line parameter
71592b104fSPaul Moore  *
72592b104fSPaul Moore  * Currently we only provide debug info during LSM initialization, but we may
73592b104fSPaul Moore  * want to expand this in the future.
74592b104fSPaul Moore  */
75592b104fSPaul Moore static int __init lsm_debug_enable(char *str)
7667a4b6a8SPaul Moore {
7767a4b6a8SPaul Moore 	debug = true;
7867a4b6a8SPaul Moore 	return 1;
7967a4b6a8SPaul Moore }
80592b104fSPaul Moore __setup("lsm.debug", lsm_debug_enable);
8167a4b6a8SPaul Moore 
822d671726SPaul Moore /**
832d671726SPaul Moore  * lsm_enabled_set - Mark a LSM as enabled
842d671726SPaul Moore  * @lsm: LSM definition
852d671726SPaul Moore  * @enabled: enabled flag
862d671726SPaul Moore  */
872d671726SPaul Moore static void __init lsm_enabled_set(struct lsm_info *lsm, bool enabled)
8867a4b6a8SPaul Moore {
8967a4b6a8SPaul Moore 	/*
9067a4b6a8SPaul Moore 	 * When an LSM hasn't configured an enable variable, we can use
9167a4b6a8SPaul Moore 	 * a hard-coded location for storing the default enabled state.
9267a4b6a8SPaul Moore 	 */
932d671726SPaul Moore 	if (!lsm->enabled ||
942d671726SPaul Moore 	    lsm->enabled == &lsm_enabled_true ||
952d671726SPaul Moore 	    lsm->enabled == &lsm_enabled_false) {
962d671726SPaul Moore 		lsm->enabled = enabled ? &lsm_enabled_true : &lsm_enabled_false;
9767a4b6a8SPaul Moore 	} else {
9867a4b6a8SPaul Moore 		*lsm->enabled = enabled;
9967a4b6a8SPaul Moore 	}
10067a4b6a8SPaul Moore }
10167a4b6a8SPaul Moore 
1022d671726SPaul Moore /**
1032d671726SPaul Moore  * lsm_is_enabled - Determine if a LSM is enabled
1042d671726SPaul Moore  * @lsm: LSM definition
1052d671726SPaul Moore  */
1062d671726SPaul Moore static inline bool lsm_is_enabled(struct lsm_info *lsm)
10767a4b6a8SPaul Moore {
1082d671726SPaul Moore 	return (lsm->enabled ? *lsm->enabled : false);
10967a4b6a8SPaul Moore }
11067a4b6a8SPaul Moore 
111a748372aSPaul Moore /**
112a748372aSPaul Moore  * lsm_order_exists - Determine if a LSM exists in the ordered list
113a748372aSPaul Moore  * @lsm: LSM definition
114a748372aSPaul Moore  */
115a748372aSPaul Moore static bool __init lsm_order_exists(struct lsm_info *lsm)
11667a4b6a8SPaul Moore {
11767a4b6a8SPaul Moore 	struct lsm_info **check;
11867a4b6a8SPaul Moore 
11937f788f6SPaul Moore 	lsm_order_for_each(check) {
12067a4b6a8SPaul Moore 		if (*check == lsm)
12167a4b6a8SPaul Moore 			return true;
12237f788f6SPaul Moore 	}
12367a4b6a8SPaul Moore 
12467a4b6a8SPaul Moore 	return false;
12567a4b6a8SPaul Moore }
12667a4b6a8SPaul Moore 
12724a9c589SPaul Moore /**
12824a9c589SPaul Moore  * lsm_order_append - Append a LSM to the ordered list
12924a9c589SPaul Moore  * @lsm: LSM definition
13024a9c589SPaul Moore  * @src: source of the addition
13124a9c589SPaul Moore  *
13224a9c589SPaul Moore  * Append @lsm to the enabled LSM array after ensuring that it hasn't been
13324a9c589SPaul Moore  * explicitly disabled, is a duplicate entry, or would run afoul of the
13424a9c589SPaul Moore  * LSM_FLAG_EXCLUSIVE logic.
13524a9c589SPaul Moore  */
13624a9c589SPaul Moore static void __init lsm_order_append(struct lsm_info *lsm, const char *src)
13767a4b6a8SPaul Moore {
13867a4b6a8SPaul Moore 	/* Ignore duplicate selections. */
139a748372aSPaul Moore 	if (lsm_order_exists(lsm))
14067a4b6a8SPaul Moore 		return;
14167a4b6a8SPaul Moore 
14224a9c589SPaul Moore 	/* Skip explicitly disabled LSMs. */
14324a9c589SPaul Moore 	if (lsm->enabled && !lsm_is_enabled(lsm))
14424a9c589SPaul Moore 		goto out;
14567a4b6a8SPaul Moore 
14624a9c589SPaul Moore 	if (WARN(lsm_active_cnt == MAX_LSM_COUNT,
14724a9c589SPaul Moore 		 "%s: out of LSM static calls!?\n", src)) {
14824a9c589SPaul Moore 		lsm_enabled_set(lsm, false);
14924a9c589SPaul Moore 		goto out;
15024a9c589SPaul Moore 	}
15167a4b6a8SPaul Moore 
15224a9c589SPaul Moore 	if (lsm->flags & LSM_FLAG_EXCLUSIVE) {
15324a9c589SPaul Moore 		if (lsm_exclusive) {
15424a9c589SPaul Moore 			init_debug("exclusive disabled: %s\n", lsm->id->name);
15524a9c589SPaul Moore 			lsm_enabled_set(lsm, false);
15624a9c589SPaul Moore 			goto out;
15724a9c589SPaul Moore 		} else {
15824a9c589SPaul Moore 			init_debug("exclusive chosen:   %s\n", lsm->id->name);
15924a9c589SPaul Moore 			lsm_exclusive = lsm;
16024a9c589SPaul Moore 		}
16124a9c589SPaul Moore 	}
16224a9c589SPaul Moore 
16324a9c589SPaul Moore 	lsm_enabled_set(lsm, true);
16424a9c589SPaul Moore 	lsm_order[lsm_active_cnt] = lsm;
16524a9c589SPaul Moore 	lsm_idlist[lsm_active_cnt++] = lsm->id;
16624a9c589SPaul Moore 
16724a9c589SPaul Moore out:
16824a9c589SPaul Moore 	init_debug("%s ordered: %s (%s)\n", src, lsm->id->name,
1692d671726SPaul Moore 		   lsm_is_enabled(lsm) ? "enabled" : "disabled");
17067a4b6a8SPaul Moore }
17167a4b6a8SPaul Moore 
172*27be5600SPaul Moore 
173291271e6SPaul Moore /**
174291271e6SPaul Moore  * lsm_blob_size_update - Update the LSM blob size and offset information
175291271e6SPaul Moore  * @sz_req: the requested additional blob size
176291271e6SPaul Moore  * @sz_cur: the existing blob size
177291271e6SPaul Moore  */
178291271e6SPaul Moore static void __init lsm_blob_size_update(unsigned int *sz_req,
179291271e6SPaul Moore 					unsigned int *sz_cur)
18067a4b6a8SPaul Moore {
181291271e6SPaul Moore 	unsigned int offset;
18267a4b6a8SPaul Moore 
183291271e6SPaul Moore 	if (*sz_req == 0)
18467a4b6a8SPaul Moore 		return;
18567a4b6a8SPaul Moore 
186291271e6SPaul Moore 	offset = ALIGN(*sz_cur, sizeof(void *));
187291271e6SPaul Moore 	*sz_cur = offset + *sz_req;
188291271e6SPaul Moore 	*sz_req = offset;
18967a4b6a8SPaul Moore }
19067a4b6a8SPaul Moore 
191e0257856SPaul Moore /**
192e0257856SPaul Moore  * lsm_prepare - Prepare the LSM framework for a new LSM
193e0257856SPaul Moore  * @lsm: LSM definition
19467a4b6a8SPaul Moore  */
195e0257856SPaul Moore static void __init lsm_prepare(struct lsm_info *lsm)
19667a4b6a8SPaul Moore {
19724a9c589SPaul Moore 	struct lsm_blob_sizes *blobs = lsm->blobs;
19867a4b6a8SPaul Moore 
19924a9c589SPaul Moore 	if (!blobs)
200e0257856SPaul Moore 		return;
20167a4b6a8SPaul Moore 
202e0257856SPaul Moore 	/* Register the LSM blob sizes. */
203291271e6SPaul Moore 	blobs = lsm->blobs;
204291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_cred, &blob_sizes.lbs_cred);
205291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_file, &blob_sizes.lbs_file);
206291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_ib, &blob_sizes.lbs_ib);
207e0257856SPaul Moore 	/* inode blob gets an rcu_head in addition to LSM blobs. */
208e0257856SPaul Moore 	if (blobs->lbs_inode && blob_sizes.lbs_inode == 0)
209e0257856SPaul Moore 		blob_sizes.lbs_inode = sizeof(struct rcu_head);
210291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_inode, &blob_sizes.lbs_inode);
211291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_ipc, &blob_sizes.lbs_ipc);
212291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_key, &blob_sizes.lbs_key);
213291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_msg_msg, &blob_sizes.lbs_msg_msg);
214291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_perf_event,
215291271e6SPaul Moore 			     &blob_sizes.lbs_perf_event);
216291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_sock, &blob_sizes.lbs_sock);
217291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_superblock,
218291271e6SPaul Moore 			     &blob_sizes.lbs_superblock);
219291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_task, &blob_sizes.lbs_task);
220291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_tun_dev, &blob_sizes.lbs_tun_dev);
221291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_xattr_count,
222e0257856SPaul Moore 			     &blob_sizes.lbs_xattr_count);
223291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_bdev, &blob_sizes.lbs_bdev);
224291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_bpf_map, &blob_sizes.lbs_bpf_map);
225291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_bpf_prog, &blob_sizes.lbs_bpf_prog);
226291271e6SPaul Moore 	lsm_blob_size_update(&blobs->lbs_bpf_token, &blob_sizes.lbs_bpf_token);
22767a4b6a8SPaul Moore }
22867a4b6a8SPaul Moore 
229*27be5600SPaul Moore /**
230*27be5600SPaul Moore  * lsm_init_single - Initialize a given LSM
231*27be5600SPaul Moore  * @lsm: LSM definition
232*27be5600SPaul Moore  */
233*27be5600SPaul Moore static void __init lsm_init_single(struct lsm_info *lsm)
23467a4b6a8SPaul Moore {
23567a4b6a8SPaul Moore 	int ret;
23667a4b6a8SPaul Moore 
237*27be5600SPaul Moore 	if (!lsm_is_enabled(lsm))
238*27be5600SPaul Moore 		return;
239*27be5600SPaul Moore 
2409f9dc69eSPaul Moore 	init_debug("initializing %s\n", lsm->id->name);
24167a4b6a8SPaul Moore 	ret = lsm->init();
2429f9dc69eSPaul Moore 	WARN(ret, "%s failed to initialize: %d\n", lsm->id->name, ret);
24367a4b6a8SPaul Moore }
24467a4b6a8SPaul Moore 
245752db065SPaul Moore /**
246752db065SPaul Moore  * lsm_order_parse - Parse the comma delimited LSM list
247752db065SPaul Moore  * @list: LSM list
248752db065SPaul Moore  * @src: source of the list
249752db065SPaul Moore  */
250752db065SPaul Moore static void __init lsm_order_parse(const char *list, const char *src)
25167a4b6a8SPaul Moore {
25267a4b6a8SPaul Moore 	struct lsm_info *lsm;
25367a4b6a8SPaul Moore 	char *sep, *name, *next;
25467a4b6a8SPaul Moore 
255752db065SPaul Moore 	/* Handle any Legacy LSM exclusions if one was specified. */
256752db065SPaul Moore 	if (lsm_order_legacy) {
257752db065SPaul Moore 		/*
258752db065SPaul Moore 		 * To match the original "security=" behavior, this explicitly
259752db065SPaul Moore 		 * does NOT fallback to another Legacy Major if the selected
260752db065SPaul Moore 		 * one was separately disabled: disable all non-matching
261752db065SPaul Moore 		 * Legacy Major LSMs.
262752db065SPaul Moore 		 */
263752db065SPaul Moore 		lsm_for_each_raw(lsm) {
264752db065SPaul Moore 			if ((lsm->flags & LSM_FLAG_LEGACY_MAJOR) &&
265752db065SPaul Moore 			     strcmp(lsm->id->name, lsm_order_legacy)) {
266752db065SPaul Moore 				lsm_enabled_set(lsm, false);
267752db065SPaul Moore 				init_debug("security=%s disabled: %s (only one legacy major LSM)\n",
268752db065SPaul Moore 					   lsm_order_legacy, lsm->id->name);
269752db065SPaul Moore 			}
270752db065SPaul Moore 		}
271752db065SPaul Moore 	}
272752db065SPaul Moore 
273752db065SPaul Moore 	/* LSM_ORDER_FIRST */
27437f788f6SPaul Moore 	lsm_for_each_raw(lsm) {
27567a4b6a8SPaul Moore 		if (lsm->order == LSM_ORDER_FIRST)
27624a9c589SPaul Moore 			lsm_order_append(lsm, "first");
27767a4b6a8SPaul Moore 	}
27867a4b6a8SPaul Moore 
279752db065SPaul Moore 	/* Normal or "mutable" LSMs */
280752db065SPaul Moore 	sep = kstrdup(list, GFP_KERNEL);
28167a4b6a8SPaul Moore 	next = sep;
28267a4b6a8SPaul Moore 	/* Walk the list, looking for matching LSMs. */
28367a4b6a8SPaul Moore 	while ((name = strsep(&next, ",")) != NULL) {
28437f788f6SPaul Moore 		lsm_for_each_raw(lsm) {
285752db065SPaul Moore 			if (!strcmp(lsm->id->name, name) &&
286752db065SPaul Moore 			    lsm->order == LSM_ORDER_MUTABLE)
287752db065SPaul Moore 				lsm_order_append(lsm, src);
28867a4b6a8SPaul Moore 		}
28967a4b6a8SPaul Moore 	}
290752db065SPaul Moore 	kfree(sep);
29167a4b6a8SPaul Moore 
292752db065SPaul Moore 	/* Legacy LSM if specified. */
293592b104fSPaul Moore 	if (lsm_order_legacy) {
29437f788f6SPaul Moore 		lsm_for_each_raw(lsm) {
295752db065SPaul Moore 			if (!strcmp(lsm->id->name, lsm_order_legacy))
296752db065SPaul Moore 				lsm_order_append(lsm, src);
29767a4b6a8SPaul Moore 		}
29867a4b6a8SPaul Moore 	}
29967a4b6a8SPaul Moore 
300752db065SPaul Moore 	/* LSM_ORDER_LAST */
30137f788f6SPaul Moore 	lsm_for_each_raw(lsm) {
30267a4b6a8SPaul Moore 		if (lsm->order == LSM_ORDER_LAST)
30324a9c589SPaul Moore 			lsm_order_append(lsm, "last");
30467a4b6a8SPaul Moore 	}
30567a4b6a8SPaul Moore 
306752db065SPaul Moore 	/* Disable all LSMs not previously enabled. */
30737f788f6SPaul Moore 	lsm_for_each_raw(lsm) {
308a748372aSPaul Moore 		if (lsm_order_exists(lsm))
30967a4b6a8SPaul Moore 			continue;
3102d671726SPaul Moore 		lsm_enabled_set(lsm, false);
31167a4b6a8SPaul Moore 		init_debug("%s skipped: %s (not in requested order)\n",
312752db065SPaul Moore 			   src, lsm->id->name);
31367a4b6a8SPaul Moore 	}
31467a4b6a8SPaul Moore }
31567a4b6a8SPaul Moore 
316faabedcdSPaul Moore /**
317faabedcdSPaul Moore  * lsm_init_ordered - Initialize the ordered LSMs
318faabedcdSPaul Moore  */
319faabedcdSPaul Moore static void __init lsm_init_ordered(void)
32067a4b6a8SPaul Moore {
321cb1513dbSPaul Moore 	unsigned int first = 0;
32267a4b6a8SPaul Moore 	struct lsm_info **lsm;
323cb1513dbSPaul Moore 	struct lsm_info *early;
32467a4b6a8SPaul Moore 
325592b104fSPaul Moore 	if (lsm_order_cmdline) {
326592b104fSPaul Moore 		if (lsm_order_legacy) {
32767a4b6a8SPaul Moore 			pr_warn("security=%s is ignored because it is superseded by lsm=%s\n",
328592b104fSPaul Moore 				lsm_order_legacy, lsm_order_cmdline);
329592b104fSPaul Moore 			lsm_order_legacy = NULL;
33067a4b6a8SPaul Moore 		}
331752db065SPaul Moore 		lsm_order_parse(lsm_order_cmdline, "cmdline");
33267a4b6a8SPaul Moore 	} else
333752db065SPaul Moore 		lsm_order_parse(lsm_order_builtin, "builtin");
33467a4b6a8SPaul Moore 
33537f788f6SPaul Moore 	lsm_order_for_each(lsm) {
336e0257856SPaul Moore 		lsm_prepare(*lsm);
33737f788f6SPaul Moore 	}
33867a4b6a8SPaul Moore 
339cb1513dbSPaul Moore 	pr_info("initializing lsm=");
340cb1513dbSPaul Moore 	lsm_early_for_each_raw(early) {
3412d671726SPaul Moore 		if (lsm_is_enabled(early))
3429f9dc69eSPaul Moore 			pr_cont("%s%s",
3439f9dc69eSPaul Moore 				first++ == 0 ? "" : ",", early->id->name);
344cb1513dbSPaul Moore 	}
345cb1513dbSPaul Moore 	lsm_order_for_each(lsm) {
3462d671726SPaul Moore 		if (lsm_is_enabled(*lsm))
3479f9dc69eSPaul Moore 			pr_cont("%s%s",
3489f9dc69eSPaul Moore 				first++ == 0 ? "" : ",", (*lsm)->id->name);
349cb1513dbSPaul Moore 	}
350cb1513dbSPaul Moore 	pr_cont("\n");
35167a4b6a8SPaul Moore 
35267a4b6a8SPaul Moore 	init_debug("cred blob size       = %d\n", blob_sizes.lbs_cred);
35367a4b6a8SPaul Moore 	init_debug("file blob size       = %d\n", blob_sizes.lbs_file);
35467a4b6a8SPaul Moore 	init_debug("ib blob size         = %d\n", blob_sizes.lbs_ib);
35567a4b6a8SPaul Moore 	init_debug("inode blob size      = %d\n", blob_sizes.lbs_inode);
35667a4b6a8SPaul Moore 	init_debug("ipc blob size        = %d\n", blob_sizes.lbs_ipc);
35767a4b6a8SPaul Moore #ifdef CONFIG_KEYS
35867a4b6a8SPaul Moore 	init_debug("key blob size        = %d\n", blob_sizes.lbs_key);
35967a4b6a8SPaul Moore #endif /* CONFIG_KEYS */
36067a4b6a8SPaul Moore 	init_debug("msg_msg blob size    = %d\n", blob_sizes.lbs_msg_msg);
36167a4b6a8SPaul Moore 	init_debug("sock blob size       = %d\n", blob_sizes.lbs_sock);
36267a4b6a8SPaul Moore 	init_debug("superblock blob size = %d\n", blob_sizes.lbs_superblock);
36367a4b6a8SPaul Moore 	init_debug("perf event blob size = %d\n", blob_sizes.lbs_perf_event);
36467a4b6a8SPaul Moore 	init_debug("task blob size       = %d\n", blob_sizes.lbs_task);
36567a4b6a8SPaul Moore 	init_debug("tun device blob size = %d\n", blob_sizes.lbs_tun_dev);
36667a4b6a8SPaul Moore 	init_debug("xattr slots          = %d\n", blob_sizes.lbs_xattr_count);
36767a4b6a8SPaul Moore 	init_debug("bdev blob size       = %d\n", blob_sizes.lbs_bdev);
36867a4b6a8SPaul Moore 	init_debug("bpf map blob size    = %d\n", blob_sizes.lbs_bpf_map);
36967a4b6a8SPaul Moore 	init_debug("bpf prog blob size   = %d\n", blob_sizes.lbs_bpf_prog);
37067a4b6a8SPaul Moore 	init_debug("bpf token blob size  = %d\n", blob_sizes.lbs_bpf_token);
37167a4b6a8SPaul Moore 
37267a4b6a8SPaul Moore 	if (blob_sizes.lbs_file)
37367a4b6a8SPaul Moore 		lsm_file_cache = kmem_cache_create("lsm_file_cache",
37467a4b6a8SPaul Moore 						   blob_sizes.lbs_file, 0,
37567a4b6a8SPaul Moore 						   SLAB_PANIC, NULL);
37667a4b6a8SPaul Moore 	if (blob_sizes.lbs_inode)
37767a4b6a8SPaul Moore 		lsm_inode_cache = kmem_cache_create("lsm_inode_cache",
37867a4b6a8SPaul Moore 						    blob_sizes.lbs_inode, 0,
37967a4b6a8SPaul Moore 						    SLAB_PANIC, NULL);
38067a4b6a8SPaul Moore 
38192ed3500SPaul Moore 	if (lsm_cred_alloc((struct cred __rcu *)current->cred, GFP_KERNEL))
38292ed3500SPaul Moore 		panic("%s: early cred alloc failed.\n", __func__);
38392ed3500SPaul Moore 	if (lsm_task_alloc(current))
38492ed3500SPaul Moore 		panic("%s: early task alloc failed.\n", __func__);
38592ed3500SPaul Moore 
38637f788f6SPaul Moore 	lsm_order_for_each(lsm) {
387*27be5600SPaul Moore 		lsm_init_single(*lsm);
38867a4b6a8SPaul Moore 	}
38937f788f6SPaul Moore }
39067a4b6a8SPaul Moore 
39167a4b6a8SPaul Moore static void __init lsm_static_call_init(struct security_hook_list *hl)
39267a4b6a8SPaul Moore {
39367a4b6a8SPaul Moore 	struct lsm_static_call *scall = hl->scalls;
39467a4b6a8SPaul Moore 	int i;
39567a4b6a8SPaul Moore 
39667a4b6a8SPaul Moore 	for (i = 0; i < MAX_LSM_COUNT; i++) {
39767a4b6a8SPaul Moore 		/* Update the first static call that is not used yet */
39867a4b6a8SPaul Moore 		if (!scall->hl) {
39967a4b6a8SPaul Moore 			__static_call_update(scall->key, scall->trampoline,
40067a4b6a8SPaul Moore 					     hl->hook.lsm_func_addr);
40167a4b6a8SPaul Moore 			scall->hl = hl;
40267a4b6a8SPaul Moore 			static_branch_enable(scall->active);
40367a4b6a8SPaul Moore 			return;
40467a4b6a8SPaul Moore 		}
40567a4b6a8SPaul Moore 		scall++;
40667a4b6a8SPaul Moore 	}
40767a4b6a8SPaul Moore 	panic("%s - Ran out of static slots.\n", __func__);
40867a4b6a8SPaul Moore }
40967a4b6a8SPaul Moore 
41067a4b6a8SPaul Moore /**
41167a4b6a8SPaul Moore  * security_add_hooks - Add a modules hooks to the hook lists.
41267a4b6a8SPaul Moore  * @hooks: the hooks to add
41367a4b6a8SPaul Moore  * @count: the number of hooks to add
41467a4b6a8SPaul Moore  * @lsmid: the identification information for the security module
41567a4b6a8SPaul Moore  *
41667a4b6a8SPaul Moore  * Each LSM has to register its hooks with the infrastructure.
41767a4b6a8SPaul Moore  */
41867a4b6a8SPaul Moore void __init security_add_hooks(struct security_hook_list *hooks, int count,
41967a4b6a8SPaul Moore 			       const struct lsm_id *lsmid)
42067a4b6a8SPaul Moore {
42167a4b6a8SPaul Moore 	int i;
42267a4b6a8SPaul Moore 
42367a4b6a8SPaul Moore 	for (i = 0; i < count; i++) {
42467a4b6a8SPaul Moore 		hooks[i].lsmid = lsmid;
42567a4b6a8SPaul Moore 		lsm_static_call_init(&hooks[i]);
42667a4b6a8SPaul Moore 	}
42767a4b6a8SPaul Moore }
42867a4b6a8SPaul Moore 
42967a4b6a8SPaul Moore int __init early_security_init(void)
43067a4b6a8SPaul Moore {
43167a4b6a8SPaul Moore 	struct lsm_info *lsm;
43267a4b6a8SPaul Moore 
43337f788f6SPaul Moore 	lsm_early_for_each_raw(lsm) {
43424a9c589SPaul Moore 		lsm_enabled_set(lsm, true);
43524a9c589SPaul Moore 		lsm_order_append(lsm, "early");
436e0257856SPaul Moore 		lsm_prepare(lsm);
437*27be5600SPaul Moore 		lsm_init_single(lsm);
43867a4b6a8SPaul Moore 	}
43967a4b6a8SPaul Moore 
44067a4b6a8SPaul Moore 	return 0;
44167a4b6a8SPaul Moore }
44267a4b6a8SPaul Moore 
44367a4b6a8SPaul Moore /**
44467a4b6a8SPaul Moore  * security_init - initializes the security framework
44567a4b6a8SPaul Moore  *
44667a4b6a8SPaul Moore  * This should be called early in the kernel initialization sequence.
44767a4b6a8SPaul Moore  */
44867a4b6a8SPaul Moore int __init security_init(void)
44967a4b6a8SPaul Moore {
45067a4b6a8SPaul Moore 	struct lsm_info *lsm;
45167a4b6a8SPaul Moore 
452592b104fSPaul Moore 	init_debug("legacy security=%s\n", lsm_order_legacy ? : " *unspecified*");
453592b104fSPaul Moore 	init_debug("  CONFIG_LSM=%s\n", lsm_order_builtin);
454592b104fSPaul Moore 	init_debug("boot arg lsm=%s\n", lsm_order_cmdline ? : " *unspecified*");
45567a4b6a8SPaul Moore 
45667a4b6a8SPaul Moore 	/*
45767a4b6a8SPaul Moore 	 * Append the names of the early LSM modules now that kmalloc() is
45867a4b6a8SPaul Moore 	 * available
45967a4b6a8SPaul Moore 	 */
46037f788f6SPaul Moore 	lsm_early_for_each_raw(lsm) {
4619f9dc69eSPaul Moore 		init_debug("  early started: %s (%s)\n", lsm->id->name,
4622d671726SPaul Moore 			   lsm_is_enabled(lsm) ? "enabled" : "disabled");
46367a4b6a8SPaul Moore 	}
46467a4b6a8SPaul Moore 
46567a4b6a8SPaul Moore 	/* Load LSMs in specified order. */
466faabedcdSPaul Moore 	lsm_init_ordered();
46767a4b6a8SPaul Moore 
46867a4b6a8SPaul Moore 	return 0;
46967a4b6a8SPaul Moore }
470