167a4b6a8SPaul Moore // SPDX-License-Identifier: GPL-2.0-or-later 267a4b6a8SPaul Moore /* 367a4b6a8SPaul Moore * LSM initialization functions 467a4b6a8SPaul Moore */ 567a4b6a8SPaul Moore 667a4b6a8SPaul Moore #define pr_fmt(fmt) "LSM: " fmt 767a4b6a8SPaul Moore 867a4b6a8SPaul Moore #include <linux/init.h> 967a4b6a8SPaul Moore #include <linux/lsm_hooks.h> 1067a4b6a8SPaul Moore 1167a4b6a8SPaul Moore #include "lsm.h" 1267a4b6a8SPaul Moore 13*2d671726SPaul Moore /* LSM enabled constants. */ 14*2d671726SPaul Moore static __initdata int lsm_enabled_true = 1; 15*2d671726SPaul Moore static __initdata int lsm_enabled_false = 0; 16*2d671726SPaul Moore 1767a4b6a8SPaul Moore /* Pointers to LSM sections defined in include/asm-generic/vmlinux.lds.h */ 1867a4b6a8SPaul Moore extern struct lsm_info __start_lsm_info[], __end_lsm_info[]; 1967a4b6a8SPaul Moore extern struct lsm_info __start_early_lsm_info[], __end_early_lsm_info[]; 2067a4b6a8SPaul Moore 21592b104fSPaul Moore /* Build and boot-time LSM ordering. */ 22592b104fSPaul Moore static __initconst const char *const lsm_order_builtin = CONFIG_LSM; 23592b104fSPaul Moore static __initdata const char *lsm_order_cmdline; 24592b104fSPaul Moore static __initdata const char *lsm_order_legacy; 2567a4b6a8SPaul Moore 2667a4b6a8SPaul Moore /* Ordered list of LSMs to initialize. */ 27592b104fSPaul Moore static __initdata struct lsm_info *lsm_order[MAX_LSM_COUNT + 1]; 28592b104fSPaul Moore static __initdata struct lsm_info *lsm_exclusive; 2967a4b6a8SPaul Moore 3067a4b6a8SPaul Moore static __initdata bool debug; 3167a4b6a8SPaul Moore #define init_debug(...) \ 3267a4b6a8SPaul Moore do { \ 3367a4b6a8SPaul Moore if (debug) \ 3467a4b6a8SPaul Moore pr_info(__VA_ARGS__); \ 3567a4b6a8SPaul Moore } while (0) 3667a4b6a8SPaul Moore 3737f788f6SPaul Moore #define lsm_order_for_each(iter) \ 38592b104fSPaul Moore for ((iter) = lsm_order; *(iter); (iter)++) 3937f788f6SPaul Moore #define lsm_for_each_raw(iter) \ 4037f788f6SPaul Moore for ((iter) = __start_lsm_info; \ 4137f788f6SPaul Moore (iter) < __end_lsm_info; (iter)++) 4237f788f6SPaul Moore #define lsm_early_for_each_raw(iter) \ 4337f788f6SPaul Moore for ((iter) = __start_early_lsm_info; \ 4437f788f6SPaul Moore (iter) < __end_early_lsm_info; (iter)++) 4537f788f6SPaul Moore 46592b104fSPaul Moore /** 47592b104fSPaul Moore * lsm_choose_security - Legacy "major" LSM selection 48592b104fSPaul Moore * @str: kernel command line parameter 49592b104fSPaul Moore */ 50592b104fSPaul Moore static int __init lsm_choose_security(char *str) 5167a4b6a8SPaul Moore { 52592b104fSPaul Moore lsm_order_legacy = str; 5367a4b6a8SPaul Moore return 1; 5467a4b6a8SPaul Moore } 55592b104fSPaul Moore __setup("security=", lsm_choose_security); 5667a4b6a8SPaul Moore 57592b104fSPaul Moore /** 58592b104fSPaul Moore * lsm_choose_lsm - Modern LSM selection 59592b104fSPaul Moore * @str: kernel command line parameter 60592b104fSPaul Moore */ 61592b104fSPaul Moore static int __init lsm_choose_lsm(char *str) 6267a4b6a8SPaul Moore { 63592b104fSPaul Moore lsm_order_cmdline = str; 6467a4b6a8SPaul Moore return 1; 6567a4b6a8SPaul Moore } 66592b104fSPaul Moore __setup("lsm=", lsm_choose_lsm); 6767a4b6a8SPaul Moore 68592b104fSPaul Moore /** 69592b104fSPaul Moore * lsm_debug_enable - Enable LSM framework debugging 70592b104fSPaul Moore * @str: kernel command line parameter 71592b104fSPaul Moore * 72592b104fSPaul Moore * Currently we only provide debug info during LSM initialization, but we may 73592b104fSPaul Moore * want to expand this in the future. 74592b104fSPaul Moore */ 75592b104fSPaul Moore static int __init lsm_debug_enable(char *str) 7667a4b6a8SPaul Moore { 7767a4b6a8SPaul Moore debug = true; 7867a4b6a8SPaul Moore return 1; 7967a4b6a8SPaul Moore } 80592b104fSPaul Moore __setup("lsm.debug", lsm_debug_enable); 8167a4b6a8SPaul Moore 82*2d671726SPaul Moore /** 83*2d671726SPaul Moore * lsm_enabled_set - Mark a LSM as enabled 84*2d671726SPaul Moore * @lsm: LSM definition 85*2d671726SPaul Moore * @enabled: enabled flag 86*2d671726SPaul Moore */ 87*2d671726SPaul Moore static void __init lsm_enabled_set(struct lsm_info *lsm, bool enabled) 8867a4b6a8SPaul Moore { 8967a4b6a8SPaul Moore /* 9067a4b6a8SPaul Moore * When an LSM hasn't configured an enable variable, we can use 9167a4b6a8SPaul Moore * a hard-coded location for storing the default enabled state. 9267a4b6a8SPaul Moore */ 93*2d671726SPaul Moore if (!lsm->enabled || 94*2d671726SPaul Moore lsm->enabled == &lsm_enabled_true || 95*2d671726SPaul Moore lsm->enabled == &lsm_enabled_false) { 96*2d671726SPaul Moore lsm->enabled = enabled ? &lsm_enabled_true : &lsm_enabled_false; 9767a4b6a8SPaul Moore } else { 9867a4b6a8SPaul Moore *lsm->enabled = enabled; 9967a4b6a8SPaul Moore } 10067a4b6a8SPaul Moore } 10167a4b6a8SPaul Moore 102*2d671726SPaul Moore /** 103*2d671726SPaul Moore * lsm_is_enabled - Determine if a LSM is enabled 104*2d671726SPaul Moore * @lsm: LSM definition 105*2d671726SPaul Moore */ 106*2d671726SPaul Moore static inline bool lsm_is_enabled(struct lsm_info *lsm) 10767a4b6a8SPaul Moore { 108*2d671726SPaul Moore return (lsm->enabled ? *lsm->enabled : false); 10967a4b6a8SPaul Moore } 11067a4b6a8SPaul Moore 11167a4b6a8SPaul Moore /* Is an LSM already listed in the ordered LSMs list? */ 11267a4b6a8SPaul Moore static bool __init exists_ordered_lsm(struct lsm_info *lsm) 11367a4b6a8SPaul Moore { 11467a4b6a8SPaul Moore struct lsm_info **check; 11567a4b6a8SPaul Moore 11637f788f6SPaul Moore lsm_order_for_each(check) { 11767a4b6a8SPaul Moore if (*check == lsm) 11867a4b6a8SPaul Moore return true; 11937f788f6SPaul Moore } 12067a4b6a8SPaul Moore 12167a4b6a8SPaul Moore return false; 12267a4b6a8SPaul Moore } 12367a4b6a8SPaul Moore 12467a4b6a8SPaul Moore /* Append an LSM to the list of ordered LSMs to initialize. */ 12567a4b6a8SPaul Moore static int last_lsm __initdata; 12667a4b6a8SPaul Moore static void __init append_ordered_lsm(struct lsm_info *lsm, const char *from) 12767a4b6a8SPaul Moore { 12867a4b6a8SPaul Moore /* Ignore duplicate selections. */ 12967a4b6a8SPaul Moore if (exists_ordered_lsm(lsm)) 13067a4b6a8SPaul Moore return; 13167a4b6a8SPaul Moore 13267a4b6a8SPaul Moore if (WARN(last_lsm == MAX_LSM_COUNT, "%s: out of LSM static calls!?\n", from)) 13367a4b6a8SPaul Moore return; 13467a4b6a8SPaul Moore 13567a4b6a8SPaul Moore /* Enable this LSM, if it is not already set. */ 13667a4b6a8SPaul Moore if (!lsm->enabled) 13767a4b6a8SPaul Moore lsm->enabled = &lsm_enabled_true; 138592b104fSPaul Moore lsm_order[last_lsm] = lsm; 1399f9dc69eSPaul Moore lsm_idlist[last_lsm++] = lsm->id; 14067a4b6a8SPaul Moore 1419f9dc69eSPaul Moore init_debug("%s ordered: %s (%s)\n", from, lsm->id->name, 142*2d671726SPaul Moore lsm_is_enabled(lsm) ? "enabled" : "disabled"); 14367a4b6a8SPaul Moore } 14467a4b6a8SPaul Moore 14567a4b6a8SPaul Moore static void __init lsm_set_blob_size(int *need, int *lbs) 14667a4b6a8SPaul Moore { 14767a4b6a8SPaul Moore int offset; 14867a4b6a8SPaul Moore 14967a4b6a8SPaul Moore if (*need <= 0) 15067a4b6a8SPaul Moore return; 15167a4b6a8SPaul Moore 15267a4b6a8SPaul Moore offset = ALIGN(*lbs, sizeof(void *)); 15367a4b6a8SPaul Moore *lbs = offset + *need; 15467a4b6a8SPaul Moore *need = offset; 15567a4b6a8SPaul Moore } 15667a4b6a8SPaul Moore 157e0257856SPaul Moore /** 158e0257856SPaul Moore * lsm_prepare - Prepare the LSM framework for a new LSM 159e0257856SPaul Moore * @lsm: LSM definition 16067a4b6a8SPaul Moore */ 161e0257856SPaul Moore static void __init lsm_prepare(struct lsm_info *lsm) 16267a4b6a8SPaul Moore { 163e0257856SPaul Moore struct lsm_blob_sizes *blobs; 16467a4b6a8SPaul Moore 165*2d671726SPaul Moore if (!lsm_is_enabled(lsm)) { 166*2d671726SPaul Moore lsm_enabled_set(lsm, false); 167e0257856SPaul Moore return; 168592b104fSPaul Moore } else if ((lsm->flags & LSM_FLAG_EXCLUSIVE) && lsm_exclusive) { 1699f9dc69eSPaul Moore init_debug("exclusive disabled: %s\n", lsm->id->name); 170*2d671726SPaul Moore lsm_enabled_set(lsm, false); 171e0257856SPaul Moore return; 172e0257856SPaul Moore } 17367a4b6a8SPaul Moore 174e0257856SPaul Moore /* Mark the LSM as enabled. */ 175*2d671726SPaul Moore lsm_enabled_set(lsm, true); 176592b104fSPaul Moore if ((lsm->flags & LSM_FLAG_EXCLUSIVE) && !lsm_exclusive) { 1779f9dc69eSPaul Moore init_debug("exclusive chosen: %s\n", lsm->id->name); 178592b104fSPaul Moore lsm_exclusive = lsm; 17967a4b6a8SPaul Moore } 18067a4b6a8SPaul Moore 181e0257856SPaul Moore /* Register the LSM blob sizes. */ 182e0257856SPaul Moore blobs = lsm->blobs; 183e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_cred, &blob_sizes.lbs_cred); 184e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_file, &blob_sizes.lbs_file); 185e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_ib, &blob_sizes.lbs_ib); 186e0257856SPaul Moore /* inode blob gets an rcu_head in addition to LSM blobs. */ 187e0257856SPaul Moore if (blobs->lbs_inode && blob_sizes.lbs_inode == 0) 188e0257856SPaul Moore blob_sizes.lbs_inode = sizeof(struct rcu_head); 189e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_inode, &blob_sizes.lbs_inode); 190e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_ipc, &blob_sizes.lbs_ipc); 191e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_key, &blob_sizes.lbs_key); 192e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_msg_msg, &blob_sizes.lbs_msg_msg); 193e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_perf_event, &blob_sizes.lbs_perf_event); 194e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_sock, &blob_sizes.lbs_sock); 195e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_superblock, &blob_sizes.lbs_superblock); 196e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_task, &blob_sizes.lbs_task); 197e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_tun_dev, &blob_sizes.lbs_tun_dev); 198e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_xattr_count, 199e0257856SPaul Moore &blob_sizes.lbs_xattr_count); 200e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_bdev, &blob_sizes.lbs_bdev); 201e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_bpf_map, &blob_sizes.lbs_bpf_map); 202e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_bpf_prog, &blob_sizes.lbs_bpf_prog); 203e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_bpf_token, &blob_sizes.lbs_bpf_token); 20467a4b6a8SPaul Moore } 20567a4b6a8SPaul Moore 20667a4b6a8SPaul Moore /* Initialize a given LSM, if it is enabled. */ 20767a4b6a8SPaul Moore static void __init initialize_lsm(struct lsm_info *lsm) 20867a4b6a8SPaul Moore { 209*2d671726SPaul Moore if (lsm_is_enabled(lsm)) { 21067a4b6a8SPaul Moore int ret; 21167a4b6a8SPaul Moore 2129f9dc69eSPaul Moore init_debug("initializing %s\n", lsm->id->name); 21367a4b6a8SPaul Moore ret = lsm->init(); 2149f9dc69eSPaul Moore WARN(ret, "%s failed to initialize: %d\n", lsm->id->name, ret); 21567a4b6a8SPaul Moore } 21667a4b6a8SPaul Moore } 21767a4b6a8SPaul Moore 21867a4b6a8SPaul Moore /* Populate ordered LSMs list from comma-separated LSM name list. */ 21967a4b6a8SPaul Moore static void __init ordered_lsm_parse(const char *order, const char *origin) 22067a4b6a8SPaul Moore { 22167a4b6a8SPaul Moore struct lsm_info *lsm; 22267a4b6a8SPaul Moore char *sep, *name, *next; 22367a4b6a8SPaul Moore 22467a4b6a8SPaul Moore /* LSM_ORDER_FIRST is always first. */ 22537f788f6SPaul Moore lsm_for_each_raw(lsm) { 22667a4b6a8SPaul Moore if (lsm->order == LSM_ORDER_FIRST) 22767a4b6a8SPaul Moore append_ordered_lsm(lsm, " first"); 22867a4b6a8SPaul Moore } 22967a4b6a8SPaul Moore 23067a4b6a8SPaul Moore /* Process "security=", if given. */ 231592b104fSPaul Moore if (lsm_order_legacy) { 23267a4b6a8SPaul Moore struct lsm_info *major; 23367a4b6a8SPaul Moore 23467a4b6a8SPaul Moore /* 23567a4b6a8SPaul Moore * To match the original "security=" behavior, this 23667a4b6a8SPaul Moore * explicitly does NOT fallback to another Legacy Major 23767a4b6a8SPaul Moore * if the selected one was separately disabled: disable 23867a4b6a8SPaul Moore * all non-matching Legacy Major LSMs. 23967a4b6a8SPaul Moore */ 24037f788f6SPaul Moore lsm_for_each_raw(major) { 24167a4b6a8SPaul Moore if ((major->flags & LSM_FLAG_LEGACY_MAJOR) && 242592b104fSPaul Moore strcmp(major->id->name, lsm_order_legacy) != 0) { 243*2d671726SPaul Moore lsm_enabled_set(major, false); 24467a4b6a8SPaul Moore init_debug("security=%s disabled: %s (only one legacy major LSM)\n", 245592b104fSPaul Moore lsm_order_legacy, major->id->name); 24667a4b6a8SPaul Moore } 24767a4b6a8SPaul Moore } 24867a4b6a8SPaul Moore } 24967a4b6a8SPaul Moore 25067a4b6a8SPaul Moore sep = kstrdup(order, GFP_KERNEL); 25167a4b6a8SPaul Moore next = sep; 25267a4b6a8SPaul Moore /* Walk the list, looking for matching LSMs. */ 25367a4b6a8SPaul Moore while ((name = strsep(&next, ",")) != NULL) { 25467a4b6a8SPaul Moore bool found = false; 25567a4b6a8SPaul Moore 25637f788f6SPaul Moore lsm_for_each_raw(lsm) { 2579f9dc69eSPaul Moore if (strcmp(lsm->id->name, name) == 0) { 25867a4b6a8SPaul Moore if (lsm->order == LSM_ORDER_MUTABLE) 25967a4b6a8SPaul Moore append_ordered_lsm(lsm, origin); 26067a4b6a8SPaul Moore found = true; 26167a4b6a8SPaul Moore } 26267a4b6a8SPaul Moore } 26367a4b6a8SPaul Moore 26467a4b6a8SPaul Moore if (!found) 26567a4b6a8SPaul Moore init_debug("%s ignored: %s (not built into kernel)\n", 26667a4b6a8SPaul Moore origin, name); 26767a4b6a8SPaul Moore } 26867a4b6a8SPaul Moore 26967a4b6a8SPaul Moore /* Process "security=", if given. */ 270592b104fSPaul Moore if (lsm_order_legacy) { 27137f788f6SPaul Moore lsm_for_each_raw(lsm) { 27267a4b6a8SPaul Moore if (exists_ordered_lsm(lsm)) 27367a4b6a8SPaul Moore continue; 274592b104fSPaul Moore if (strcmp(lsm->id->name, lsm_order_legacy) == 0) 27567a4b6a8SPaul Moore append_ordered_lsm(lsm, "security="); 27667a4b6a8SPaul Moore } 27767a4b6a8SPaul Moore } 27867a4b6a8SPaul Moore 27967a4b6a8SPaul Moore /* LSM_ORDER_LAST is always last. */ 28037f788f6SPaul Moore lsm_for_each_raw(lsm) { 28167a4b6a8SPaul Moore if (lsm->order == LSM_ORDER_LAST) 28267a4b6a8SPaul Moore append_ordered_lsm(lsm, " last"); 28367a4b6a8SPaul Moore } 28467a4b6a8SPaul Moore 28567a4b6a8SPaul Moore /* Disable all LSMs not in the ordered list. */ 28637f788f6SPaul Moore lsm_for_each_raw(lsm) { 28767a4b6a8SPaul Moore if (exists_ordered_lsm(lsm)) 28867a4b6a8SPaul Moore continue; 289*2d671726SPaul Moore lsm_enabled_set(lsm, false); 29067a4b6a8SPaul Moore init_debug("%s skipped: %s (not in requested order)\n", 2919f9dc69eSPaul Moore origin, lsm->id->name); 29267a4b6a8SPaul Moore } 29367a4b6a8SPaul Moore 29467a4b6a8SPaul Moore kfree(sep); 29567a4b6a8SPaul Moore } 29667a4b6a8SPaul Moore 297faabedcdSPaul Moore /** 298faabedcdSPaul Moore * lsm_init_ordered - Initialize the ordered LSMs 299faabedcdSPaul Moore */ 300faabedcdSPaul Moore static void __init lsm_init_ordered(void) 30167a4b6a8SPaul Moore { 302cb1513dbSPaul Moore unsigned int first = 0; 30367a4b6a8SPaul Moore struct lsm_info **lsm; 304cb1513dbSPaul Moore struct lsm_info *early; 30567a4b6a8SPaul Moore 306592b104fSPaul Moore if (lsm_order_cmdline) { 307592b104fSPaul Moore if (lsm_order_legacy) { 30867a4b6a8SPaul Moore pr_warn("security=%s is ignored because it is superseded by lsm=%s\n", 309592b104fSPaul Moore lsm_order_legacy, lsm_order_cmdline); 310592b104fSPaul Moore lsm_order_legacy = NULL; 31167a4b6a8SPaul Moore } 312592b104fSPaul Moore ordered_lsm_parse(lsm_order_cmdline, "cmdline"); 31367a4b6a8SPaul Moore } else 314592b104fSPaul Moore ordered_lsm_parse(lsm_order_builtin, "builtin"); 31567a4b6a8SPaul Moore 31637f788f6SPaul Moore lsm_order_for_each(lsm) { 317e0257856SPaul Moore lsm_prepare(*lsm); 31837f788f6SPaul Moore } 31967a4b6a8SPaul Moore 320cb1513dbSPaul Moore pr_info("initializing lsm="); 321cb1513dbSPaul Moore lsm_early_for_each_raw(early) { 322*2d671726SPaul Moore if (lsm_is_enabled(early)) 3239f9dc69eSPaul Moore pr_cont("%s%s", 3249f9dc69eSPaul Moore first++ == 0 ? "" : ",", early->id->name); 325cb1513dbSPaul Moore } 326cb1513dbSPaul Moore lsm_order_for_each(lsm) { 327*2d671726SPaul Moore if (lsm_is_enabled(*lsm)) 3289f9dc69eSPaul Moore pr_cont("%s%s", 3299f9dc69eSPaul Moore first++ == 0 ? "" : ",", (*lsm)->id->name); 330cb1513dbSPaul Moore } 331cb1513dbSPaul Moore pr_cont("\n"); 33267a4b6a8SPaul Moore 33367a4b6a8SPaul Moore init_debug("cred blob size = %d\n", blob_sizes.lbs_cred); 33467a4b6a8SPaul Moore init_debug("file blob size = %d\n", blob_sizes.lbs_file); 33567a4b6a8SPaul Moore init_debug("ib blob size = %d\n", blob_sizes.lbs_ib); 33667a4b6a8SPaul Moore init_debug("inode blob size = %d\n", blob_sizes.lbs_inode); 33767a4b6a8SPaul Moore init_debug("ipc blob size = %d\n", blob_sizes.lbs_ipc); 33867a4b6a8SPaul Moore #ifdef CONFIG_KEYS 33967a4b6a8SPaul Moore init_debug("key blob size = %d\n", blob_sizes.lbs_key); 34067a4b6a8SPaul Moore #endif /* CONFIG_KEYS */ 34167a4b6a8SPaul Moore init_debug("msg_msg blob size = %d\n", blob_sizes.lbs_msg_msg); 34267a4b6a8SPaul Moore init_debug("sock blob size = %d\n", blob_sizes.lbs_sock); 34367a4b6a8SPaul Moore init_debug("superblock blob size = %d\n", blob_sizes.lbs_superblock); 34467a4b6a8SPaul Moore init_debug("perf event blob size = %d\n", blob_sizes.lbs_perf_event); 34567a4b6a8SPaul Moore init_debug("task blob size = %d\n", blob_sizes.lbs_task); 34667a4b6a8SPaul Moore init_debug("tun device blob size = %d\n", blob_sizes.lbs_tun_dev); 34767a4b6a8SPaul Moore init_debug("xattr slots = %d\n", blob_sizes.lbs_xattr_count); 34867a4b6a8SPaul Moore init_debug("bdev blob size = %d\n", blob_sizes.lbs_bdev); 34967a4b6a8SPaul Moore init_debug("bpf map blob size = %d\n", blob_sizes.lbs_bpf_map); 35067a4b6a8SPaul Moore init_debug("bpf prog blob size = %d\n", blob_sizes.lbs_bpf_prog); 35167a4b6a8SPaul Moore init_debug("bpf token blob size = %d\n", blob_sizes.lbs_bpf_token); 35267a4b6a8SPaul Moore 35367a4b6a8SPaul Moore if (blob_sizes.lbs_file) 35467a4b6a8SPaul Moore lsm_file_cache = kmem_cache_create("lsm_file_cache", 35567a4b6a8SPaul Moore blob_sizes.lbs_file, 0, 35667a4b6a8SPaul Moore SLAB_PANIC, NULL); 35767a4b6a8SPaul Moore if (blob_sizes.lbs_inode) 35867a4b6a8SPaul Moore lsm_inode_cache = kmem_cache_create("lsm_inode_cache", 35967a4b6a8SPaul Moore blob_sizes.lbs_inode, 0, 36067a4b6a8SPaul Moore SLAB_PANIC, NULL); 36167a4b6a8SPaul Moore 36292ed3500SPaul Moore if (lsm_cred_alloc((struct cred __rcu *)current->cred, GFP_KERNEL)) 36392ed3500SPaul Moore panic("%s: early cred alloc failed.\n", __func__); 36492ed3500SPaul Moore if (lsm_task_alloc(current)) 36592ed3500SPaul Moore panic("%s: early task alloc failed.\n", __func__); 36692ed3500SPaul Moore 36737f788f6SPaul Moore lsm_order_for_each(lsm) { 36867a4b6a8SPaul Moore initialize_lsm(*lsm); 36967a4b6a8SPaul Moore } 37037f788f6SPaul Moore } 37167a4b6a8SPaul Moore 37267a4b6a8SPaul Moore static void __init lsm_static_call_init(struct security_hook_list *hl) 37367a4b6a8SPaul Moore { 37467a4b6a8SPaul Moore struct lsm_static_call *scall = hl->scalls; 37567a4b6a8SPaul Moore int i; 37667a4b6a8SPaul Moore 37767a4b6a8SPaul Moore for (i = 0; i < MAX_LSM_COUNT; i++) { 37867a4b6a8SPaul Moore /* Update the first static call that is not used yet */ 37967a4b6a8SPaul Moore if (!scall->hl) { 38067a4b6a8SPaul Moore __static_call_update(scall->key, scall->trampoline, 38167a4b6a8SPaul Moore hl->hook.lsm_func_addr); 38267a4b6a8SPaul Moore scall->hl = hl; 38367a4b6a8SPaul Moore static_branch_enable(scall->active); 38467a4b6a8SPaul Moore return; 38567a4b6a8SPaul Moore } 38667a4b6a8SPaul Moore scall++; 38767a4b6a8SPaul Moore } 38867a4b6a8SPaul Moore panic("%s - Ran out of static slots.\n", __func__); 38967a4b6a8SPaul Moore } 39067a4b6a8SPaul Moore 39167a4b6a8SPaul Moore /** 39267a4b6a8SPaul Moore * security_add_hooks - Add a modules hooks to the hook lists. 39367a4b6a8SPaul Moore * @hooks: the hooks to add 39467a4b6a8SPaul Moore * @count: the number of hooks to add 39567a4b6a8SPaul Moore * @lsmid: the identification information for the security module 39667a4b6a8SPaul Moore * 39767a4b6a8SPaul Moore * Each LSM has to register its hooks with the infrastructure. 39867a4b6a8SPaul Moore */ 39967a4b6a8SPaul Moore void __init security_add_hooks(struct security_hook_list *hooks, int count, 40067a4b6a8SPaul Moore const struct lsm_id *lsmid) 40167a4b6a8SPaul Moore { 40267a4b6a8SPaul Moore int i; 40367a4b6a8SPaul Moore 40467a4b6a8SPaul Moore for (i = 0; i < count; i++) { 40567a4b6a8SPaul Moore hooks[i].lsmid = lsmid; 40667a4b6a8SPaul Moore lsm_static_call_init(&hooks[i]); 40767a4b6a8SPaul Moore } 40867a4b6a8SPaul Moore } 40967a4b6a8SPaul Moore 41067a4b6a8SPaul Moore int __init early_security_init(void) 41167a4b6a8SPaul Moore { 41267a4b6a8SPaul Moore struct lsm_info *lsm; 41367a4b6a8SPaul Moore 41437f788f6SPaul Moore lsm_early_for_each_raw(lsm) { 41567a4b6a8SPaul Moore if (!lsm->enabled) 41667a4b6a8SPaul Moore lsm->enabled = &lsm_enabled_true; 417e0257856SPaul Moore lsm_prepare(lsm); 41867a4b6a8SPaul Moore initialize_lsm(lsm); 41967a4b6a8SPaul Moore } 42067a4b6a8SPaul Moore 42167a4b6a8SPaul Moore return 0; 42267a4b6a8SPaul Moore } 42367a4b6a8SPaul Moore 42467a4b6a8SPaul Moore /** 42567a4b6a8SPaul Moore * security_init - initializes the security framework 42667a4b6a8SPaul Moore * 42767a4b6a8SPaul Moore * This should be called early in the kernel initialization sequence. 42867a4b6a8SPaul Moore */ 42967a4b6a8SPaul Moore int __init security_init(void) 43067a4b6a8SPaul Moore { 43167a4b6a8SPaul Moore struct lsm_info *lsm; 43267a4b6a8SPaul Moore 433592b104fSPaul Moore init_debug("legacy security=%s\n", lsm_order_legacy ? : " *unspecified*"); 434592b104fSPaul Moore init_debug(" CONFIG_LSM=%s\n", lsm_order_builtin); 435592b104fSPaul Moore init_debug("boot arg lsm=%s\n", lsm_order_cmdline ? : " *unspecified*"); 43667a4b6a8SPaul Moore 43767a4b6a8SPaul Moore /* 43867a4b6a8SPaul Moore * Append the names of the early LSM modules now that kmalloc() is 43967a4b6a8SPaul Moore * available 44067a4b6a8SPaul Moore */ 44137f788f6SPaul Moore lsm_early_for_each_raw(lsm) { 4429f9dc69eSPaul Moore init_debug(" early started: %s (%s)\n", lsm->id->name, 443*2d671726SPaul Moore lsm_is_enabled(lsm) ? "enabled" : "disabled"); 44467a4b6a8SPaul Moore } 44567a4b6a8SPaul Moore 44667a4b6a8SPaul Moore /* Load LSMs in specified order. */ 447faabedcdSPaul Moore lsm_init_ordered(); 44867a4b6a8SPaul Moore 44967a4b6a8SPaul Moore return 0; 45067a4b6a8SPaul Moore } 451