167a4b6a8SPaul Moore // SPDX-License-Identifier: GPL-2.0-or-later 267a4b6a8SPaul Moore /* 367a4b6a8SPaul Moore * LSM initialization functions 467a4b6a8SPaul Moore */ 567a4b6a8SPaul Moore 667a4b6a8SPaul Moore #define pr_fmt(fmt) "LSM: " fmt 767a4b6a8SPaul Moore 867a4b6a8SPaul Moore #include <linux/init.h> 967a4b6a8SPaul Moore #include <linux/lsm_hooks.h> 1067a4b6a8SPaul Moore 1167a4b6a8SPaul Moore #include "lsm.h" 1267a4b6a8SPaul Moore 132d671726SPaul Moore /* LSM enabled constants. */ 142d671726SPaul Moore static __initdata int lsm_enabled_true = 1; 152d671726SPaul Moore static __initdata int lsm_enabled_false = 0; 162d671726SPaul Moore 1767a4b6a8SPaul Moore /* Pointers to LSM sections defined in include/asm-generic/vmlinux.lds.h */ 1867a4b6a8SPaul Moore extern struct lsm_info __start_lsm_info[], __end_lsm_info[]; 1967a4b6a8SPaul Moore extern struct lsm_info __start_early_lsm_info[], __end_early_lsm_info[]; 2067a4b6a8SPaul Moore 21592b104fSPaul Moore /* Build and boot-time LSM ordering. */ 22592b104fSPaul Moore static __initconst const char *const lsm_order_builtin = CONFIG_LSM; 23592b104fSPaul Moore static __initdata const char *lsm_order_cmdline; 24592b104fSPaul Moore static __initdata const char *lsm_order_legacy; 2567a4b6a8SPaul Moore 2667a4b6a8SPaul Moore /* Ordered list of LSMs to initialize. */ 27592b104fSPaul Moore static __initdata struct lsm_info *lsm_order[MAX_LSM_COUNT + 1]; 28592b104fSPaul Moore static __initdata struct lsm_info *lsm_exclusive; 2967a4b6a8SPaul Moore 3067a4b6a8SPaul Moore static __initdata bool debug; 3167a4b6a8SPaul Moore #define init_debug(...) \ 3267a4b6a8SPaul Moore do { \ 3367a4b6a8SPaul Moore if (debug) \ 3467a4b6a8SPaul Moore pr_info(__VA_ARGS__); \ 3567a4b6a8SPaul Moore } while (0) 3667a4b6a8SPaul Moore 3737f788f6SPaul Moore #define lsm_order_for_each(iter) \ 38592b104fSPaul Moore for ((iter) = lsm_order; *(iter); (iter)++) 3937f788f6SPaul Moore #define lsm_for_each_raw(iter) \ 4037f788f6SPaul Moore for ((iter) = __start_lsm_info; \ 4137f788f6SPaul Moore (iter) < __end_lsm_info; (iter)++) 4237f788f6SPaul Moore #define lsm_early_for_each_raw(iter) \ 4337f788f6SPaul Moore for ((iter) = __start_early_lsm_info; \ 4437f788f6SPaul Moore (iter) < __end_early_lsm_info; (iter)++) 4537f788f6SPaul Moore 46592b104fSPaul Moore /** 47592b104fSPaul Moore * lsm_choose_security - Legacy "major" LSM selection 48592b104fSPaul Moore * @str: kernel command line parameter 49592b104fSPaul Moore */ 50592b104fSPaul Moore static int __init lsm_choose_security(char *str) 5167a4b6a8SPaul Moore { 52592b104fSPaul Moore lsm_order_legacy = str; 5367a4b6a8SPaul Moore return 1; 5467a4b6a8SPaul Moore } 55592b104fSPaul Moore __setup("security=", lsm_choose_security); 5667a4b6a8SPaul Moore 57592b104fSPaul Moore /** 58592b104fSPaul Moore * lsm_choose_lsm - Modern LSM selection 59592b104fSPaul Moore * @str: kernel command line parameter 60592b104fSPaul Moore */ 61592b104fSPaul Moore static int __init lsm_choose_lsm(char *str) 6267a4b6a8SPaul Moore { 63592b104fSPaul Moore lsm_order_cmdline = str; 6467a4b6a8SPaul Moore return 1; 6567a4b6a8SPaul Moore } 66592b104fSPaul Moore __setup("lsm=", lsm_choose_lsm); 6767a4b6a8SPaul Moore 68592b104fSPaul Moore /** 69592b104fSPaul Moore * lsm_debug_enable - Enable LSM framework debugging 70592b104fSPaul Moore * @str: kernel command line parameter 71592b104fSPaul Moore * 72592b104fSPaul Moore * Currently we only provide debug info during LSM initialization, but we may 73592b104fSPaul Moore * want to expand this in the future. 74592b104fSPaul Moore */ 75592b104fSPaul Moore static int __init lsm_debug_enable(char *str) 7667a4b6a8SPaul Moore { 7767a4b6a8SPaul Moore debug = true; 7867a4b6a8SPaul Moore return 1; 7967a4b6a8SPaul Moore } 80592b104fSPaul Moore __setup("lsm.debug", lsm_debug_enable); 8167a4b6a8SPaul Moore 822d671726SPaul Moore /** 832d671726SPaul Moore * lsm_enabled_set - Mark a LSM as enabled 842d671726SPaul Moore * @lsm: LSM definition 852d671726SPaul Moore * @enabled: enabled flag 862d671726SPaul Moore */ 872d671726SPaul Moore static void __init lsm_enabled_set(struct lsm_info *lsm, bool enabled) 8867a4b6a8SPaul Moore { 8967a4b6a8SPaul Moore /* 9067a4b6a8SPaul Moore * When an LSM hasn't configured an enable variable, we can use 9167a4b6a8SPaul Moore * a hard-coded location for storing the default enabled state. 9267a4b6a8SPaul Moore */ 932d671726SPaul Moore if (!lsm->enabled || 942d671726SPaul Moore lsm->enabled == &lsm_enabled_true || 952d671726SPaul Moore lsm->enabled == &lsm_enabled_false) { 962d671726SPaul Moore lsm->enabled = enabled ? &lsm_enabled_true : &lsm_enabled_false; 9767a4b6a8SPaul Moore } else { 9867a4b6a8SPaul Moore *lsm->enabled = enabled; 9967a4b6a8SPaul Moore } 10067a4b6a8SPaul Moore } 10167a4b6a8SPaul Moore 1022d671726SPaul Moore /** 1032d671726SPaul Moore * lsm_is_enabled - Determine if a LSM is enabled 1042d671726SPaul Moore * @lsm: LSM definition 1052d671726SPaul Moore */ 1062d671726SPaul Moore static inline bool lsm_is_enabled(struct lsm_info *lsm) 10767a4b6a8SPaul Moore { 1082d671726SPaul Moore return (lsm->enabled ? *lsm->enabled : false); 10967a4b6a8SPaul Moore } 11067a4b6a8SPaul Moore 111*a748372aSPaul Moore /** 112*a748372aSPaul Moore * lsm_order_exists - Determine if a LSM exists in the ordered list 113*a748372aSPaul Moore * @lsm: LSM definition 114*a748372aSPaul Moore */ 115*a748372aSPaul Moore static bool __init lsm_order_exists(struct lsm_info *lsm) 11667a4b6a8SPaul Moore { 11767a4b6a8SPaul Moore struct lsm_info **check; 11867a4b6a8SPaul Moore 11937f788f6SPaul Moore lsm_order_for_each(check) { 12067a4b6a8SPaul Moore if (*check == lsm) 12167a4b6a8SPaul Moore return true; 12237f788f6SPaul Moore } 12367a4b6a8SPaul Moore 12467a4b6a8SPaul Moore return false; 12567a4b6a8SPaul Moore } 12667a4b6a8SPaul Moore 12767a4b6a8SPaul Moore /* Append an LSM to the list of ordered LSMs to initialize. */ 12867a4b6a8SPaul Moore static int last_lsm __initdata; 12967a4b6a8SPaul Moore static void __init append_ordered_lsm(struct lsm_info *lsm, const char *from) 13067a4b6a8SPaul Moore { 13167a4b6a8SPaul Moore /* Ignore duplicate selections. */ 132*a748372aSPaul Moore if (lsm_order_exists(lsm)) 13367a4b6a8SPaul Moore return; 13467a4b6a8SPaul Moore 13567a4b6a8SPaul Moore if (WARN(last_lsm == MAX_LSM_COUNT, "%s: out of LSM static calls!?\n", from)) 13667a4b6a8SPaul Moore return; 13767a4b6a8SPaul Moore 13867a4b6a8SPaul Moore /* Enable this LSM, if it is not already set. */ 13967a4b6a8SPaul Moore if (!lsm->enabled) 14067a4b6a8SPaul Moore lsm->enabled = &lsm_enabled_true; 141592b104fSPaul Moore lsm_order[last_lsm] = lsm; 1429f9dc69eSPaul Moore lsm_idlist[last_lsm++] = lsm->id; 14367a4b6a8SPaul Moore 1449f9dc69eSPaul Moore init_debug("%s ordered: %s (%s)\n", from, lsm->id->name, 1452d671726SPaul Moore lsm_is_enabled(lsm) ? "enabled" : "disabled"); 14667a4b6a8SPaul Moore } 14767a4b6a8SPaul Moore 14867a4b6a8SPaul Moore static void __init lsm_set_blob_size(int *need, int *lbs) 14967a4b6a8SPaul Moore { 15067a4b6a8SPaul Moore int offset; 15167a4b6a8SPaul Moore 15267a4b6a8SPaul Moore if (*need <= 0) 15367a4b6a8SPaul Moore return; 15467a4b6a8SPaul Moore 15567a4b6a8SPaul Moore offset = ALIGN(*lbs, sizeof(void *)); 15667a4b6a8SPaul Moore *lbs = offset + *need; 15767a4b6a8SPaul Moore *need = offset; 15867a4b6a8SPaul Moore } 15967a4b6a8SPaul Moore 160e0257856SPaul Moore /** 161e0257856SPaul Moore * lsm_prepare - Prepare the LSM framework for a new LSM 162e0257856SPaul Moore * @lsm: LSM definition 16367a4b6a8SPaul Moore */ 164e0257856SPaul Moore static void __init lsm_prepare(struct lsm_info *lsm) 16567a4b6a8SPaul Moore { 166e0257856SPaul Moore struct lsm_blob_sizes *blobs; 16767a4b6a8SPaul Moore 1682d671726SPaul Moore if (!lsm_is_enabled(lsm)) { 1692d671726SPaul Moore lsm_enabled_set(lsm, false); 170e0257856SPaul Moore return; 171592b104fSPaul Moore } else if ((lsm->flags & LSM_FLAG_EXCLUSIVE) && lsm_exclusive) { 1729f9dc69eSPaul Moore init_debug("exclusive disabled: %s\n", lsm->id->name); 1732d671726SPaul Moore lsm_enabled_set(lsm, false); 174e0257856SPaul Moore return; 175e0257856SPaul Moore } 17667a4b6a8SPaul Moore 177e0257856SPaul Moore /* Mark the LSM as enabled. */ 1782d671726SPaul Moore lsm_enabled_set(lsm, true); 179592b104fSPaul Moore if ((lsm->flags & LSM_FLAG_EXCLUSIVE) && !lsm_exclusive) { 1809f9dc69eSPaul Moore init_debug("exclusive chosen: %s\n", lsm->id->name); 181592b104fSPaul Moore lsm_exclusive = lsm; 18267a4b6a8SPaul Moore } 18367a4b6a8SPaul Moore 184e0257856SPaul Moore /* Register the LSM blob sizes. */ 185e0257856SPaul Moore blobs = lsm->blobs; 186e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_cred, &blob_sizes.lbs_cred); 187e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_file, &blob_sizes.lbs_file); 188e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_ib, &blob_sizes.lbs_ib); 189e0257856SPaul Moore /* inode blob gets an rcu_head in addition to LSM blobs. */ 190e0257856SPaul Moore if (blobs->lbs_inode && blob_sizes.lbs_inode == 0) 191e0257856SPaul Moore blob_sizes.lbs_inode = sizeof(struct rcu_head); 192e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_inode, &blob_sizes.lbs_inode); 193e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_ipc, &blob_sizes.lbs_ipc); 194e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_key, &blob_sizes.lbs_key); 195e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_msg_msg, &blob_sizes.lbs_msg_msg); 196e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_perf_event, &blob_sizes.lbs_perf_event); 197e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_sock, &blob_sizes.lbs_sock); 198e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_superblock, &blob_sizes.lbs_superblock); 199e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_task, &blob_sizes.lbs_task); 200e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_tun_dev, &blob_sizes.lbs_tun_dev); 201e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_xattr_count, 202e0257856SPaul Moore &blob_sizes.lbs_xattr_count); 203e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_bdev, &blob_sizes.lbs_bdev); 204e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_bpf_map, &blob_sizes.lbs_bpf_map); 205e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_bpf_prog, &blob_sizes.lbs_bpf_prog); 206e0257856SPaul Moore lsm_set_blob_size(&blobs->lbs_bpf_token, &blob_sizes.lbs_bpf_token); 20767a4b6a8SPaul Moore } 20867a4b6a8SPaul Moore 20967a4b6a8SPaul Moore /* Initialize a given LSM, if it is enabled. */ 21067a4b6a8SPaul Moore static void __init initialize_lsm(struct lsm_info *lsm) 21167a4b6a8SPaul Moore { 2122d671726SPaul Moore if (lsm_is_enabled(lsm)) { 21367a4b6a8SPaul Moore int ret; 21467a4b6a8SPaul Moore 2159f9dc69eSPaul Moore init_debug("initializing %s\n", lsm->id->name); 21667a4b6a8SPaul Moore ret = lsm->init(); 2179f9dc69eSPaul Moore WARN(ret, "%s failed to initialize: %d\n", lsm->id->name, ret); 21867a4b6a8SPaul Moore } 21967a4b6a8SPaul Moore } 22067a4b6a8SPaul Moore 22167a4b6a8SPaul Moore /* Populate ordered LSMs list from comma-separated LSM name list. */ 22267a4b6a8SPaul Moore static void __init ordered_lsm_parse(const char *order, const char *origin) 22367a4b6a8SPaul Moore { 22467a4b6a8SPaul Moore struct lsm_info *lsm; 22567a4b6a8SPaul Moore char *sep, *name, *next; 22667a4b6a8SPaul Moore 22767a4b6a8SPaul Moore /* LSM_ORDER_FIRST is always first. */ 22837f788f6SPaul Moore lsm_for_each_raw(lsm) { 22967a4b6a8SPaul Moore if (lsm->order == LSM_ORDER_FIRST) 23067a4b6a8SPaul Moore append_ordered_lsm(lsm, " first"); 23167a4b6a8SPaul Moore } 23267a4b6a8SPaul Moore 23367a4b6a8SPaul Moore /* Process "security=", if given. */ 234592b104fSPaul Moore if (lsm_order_legacy) { 23567a4b6a8SPaul Moore struct lsm_info *major; 23667a4b6a8SPaul Moore 23767a4b6a8SPaul Moore /* 23867a4b6a8SPaul Moore * To match the original "security=" behavior, this 23967a4b6a8SPaul Moore * explicitly does NOT fallback to another Legacy Major 24067a4b6a8SPaul Moore * if the selected one was separately disabled: disable 24167a4b6a8SPaul Moore * all non-matching Legacy Major LSMs. 24267a4b6a8SPaul Moore */ 24337f788f6SPaul Moore lsm_for_each_raw(major) { 24467a4b6a8SPaul Moore if ((major->flags & LSM_FLAG_LEGACY_MAJOR) && 245592b104fSPaul Moore strcmp(major->id->name, lsm_order_legacy) != 0) { 2462d671726SPaul Moore lsm_enabled_set(major, false); 24767a4b6a8SPaul Moore init_debug("security=%s disabled: %s (only one legacy major LSM)\n", 248592b104fSPaul Moore lsm_order_legacy, major->id->name); 24967a4b6a8SPaul Moore } 25067a4b6a8SPaul Moore } 25167a4b6a8SPaul Moore } 25267a4b6a8SPaul Moore 25367a4b6a8SPaul Moore sep = kstrdup(order, GFP_KERNEL); 25467a4b6a8SPaul Moore next = sep; 25567a4b6a8SPaul Moore /* Walk the list, looking for matching LSMs. */ 25667a4b6a8SPaul Moore while ((name = strsep(&next, ",")) != NULL) { 25767a4b6a8SPaul Moore bool found = false; 25867a4b6a8SPaul Moore 25937f788f6SPaul Moore lsm_for_each_raw(lsm) { 2609f9dc69eSPaul Moore if (strcmp(lsm->id->name, name) == 0) { 26167a4b6a8SPaul Moore if (lsm->order == LSM_ORDER_MUTABLE) 26267a4b6a8SPaul Moore append_ordered_lsm(lsm, origin); 26367a4b6a8SPaul Moore found = true; 26467a4b6a8SPaul Moore } 26567a4b6a8SPaul Moore } 26667a4b6a8SPaul Moore 26767a4b6a8SPaul Moore if (!found) 26867a4b6a8SPaul Moore init_debug("%s ignored: %s (not built into kernel)\n", 26967a4b6a8SPaul Moore origin, name); 27067a4b6a8SPaul Moore } 27167a4b6a8SPaul Moore 27267a4b6a8SPaul Moore /* Process "security=", if given. */ 273592b104fSPaul Moore if (lsm_order_legacy) { 27437f788f6SPaul Moore lsm_for_each_raw(lsm) { 275*a748372aSPaul Moore if (lsm_order_exists(lsm)) 27667a4b6a8SPaul Moore continue; 277592b104fSPaul Moore if (strcmp(lsm->id->name, lsm_order_legacy) == 0) 27867a4b6a8SPaul Moore append_ordered_lsm(lsm, "security="); 27967a4b6a8SPaul Moore } 28067a4b6a8SPaul Moore } 28167a4b6a8SPaul Moore 28267a4b6a8SPaul Moore /* LSM_ORDER_LAST is always last. */ 28337f788f6SPaul Moore lsm_for_each_raw(lsm) { 28467a4b6a8SPaul Moore if (lsm->order == LSM_ORDER_LAST) 28567a4b6a8SPaul Moore append_ordered_lsm(lsm, " last"); 28667a4b6a8SPaul Moore } 28767a4b6a8SPaul Moore 28867a4b6a8SPaul Moore /* Disable all LSMs not in the ordered list. */ 28937f788f6SPaul Moore lsm_for_each_raw(lsm) { 290*a748372aSPaul Moore if (lsm_order_exists(lsm)) 29167a4b6a8SPaul Moore continue; 2922d671726SPaul Moore lsm_enabled_set(lsm, false); 29367a4b6a8SPaul Moore init_debug("%s skipped: %s (not in requested order)\n", 2949f9dc69eSPaul Moore origin, lsm->id->name); 29567a4b6a8SPaul Moore } 29667a4b6a8SPaul Moore 29767a4b6a8SPaul Moore kfree(sep); 29867a4b6a8SPaul Moore } 29967a4b6a8SPaul Moore 300faabedcdSPaul Moore /** 301faabedcdSPaul Moore * lsm_init_ordered - Initialize the ordered LSMs 302faabedcdSPaul Moore */ 303faabedcdSPaul Moore static void __init lsm_init_ordered(void) 30467a4b6a8SPaul Moore { 305cb1513dbSPaul Moore unsigned int first = 0; 30667a4b6a8SPaul Moore struct lsm_info **lsm; 307cb1513dbSPaul Moore struct lsm_info *early; 30867a4b6a8SPaul Moore 309592b104fSPaul Moore if (lsm_order_cmdline) { 310592b104fSPaul Moore if (lsm_order_legacy) { 31167a4b6a8SPaul Moore pr_warn("security=%s is ignored because it is superseded by lsm=%s\n", 312592b104fSPaul Moore lsm_order_legacy, lsm_order_cmdline); 313592b104fSPaul Moore lsm_order_legacy = NULL; 31467a4b6a8SPaul Moore } 315592b104fSPaul Moore ordered_lsm_parse(lsm_order_cmdline, "cmdline"); 31667a4b6a8SPaul Moore } else 317592b104fSPaul Moore ordered_lsm_parse(lsm_order_builtin, "builtin"); 31867a4b6a8SPaul Moore 31937f788f6SPaul Moore lsm_order_for_each(lsm) { 320e0257856SPaul Moore lsm_prepare(*lsm); 32137f788f6SPaul Moore } 32267a4b6a8SPaul Moore 323cb1513dbSPaul Moore pr_info("initializing lsm="); 324cb1513dbSPaul Moore lsm_early_for_each_raw(early) { 3252d671726SPaul Moore if (lsm_is_enabled(early)) 3269f9dc69eSPaul Moore pr_cont("%s%s", 3279f9dc69eSPaul Moore first++ == 0 ? "" : ",", early->id->name); 328cb1513dbSPaul Moore } 329cb1513dbSPaul Moore lsm_order_for_each(lsm) { 3302d671726SPaul Moore if (lsm_is_enabled(*lsm)) 3319f9dc69eSPaul Moore pr_cont("%s%s", 3329f9dc69eSPaul Moore first++ == 0 ? "" : ",", (*lsm)->id->name); 333cb1513dbSPaul Moore } 334cb1513dbSPaul Moore pr_cont("\n"); 33567a4b6a8SPaul Moore 33667a4b6a8SPaul Moore init_debug("cred blob size = %d\n", blob_sizes.lbs_cred); 33767a4b6a8SPaul Moore init_debug("file blob size = %d\n", blob_sizes.lbs_file); 33867a4b6a8SPaul Moore init_debug("ib blob size = %d\n", blob_sizes.lbs_ib); 33967a4b6a8SPaul Moore init_debug("inode blob size = %d\n", blob_sizes.lbs_inode); 34067a4b6a8SPaul Moore init_debug("ipc blob size = %d\n", blob_sizes.lbs_ipc); 34167a4b6a8SPaul Moore #ifdef CONFIG_KEYS 34267a4b6a8SPaul Moore init_debug("key blob size = %d\n", blob_sizes.lbs_key); 34367a4b6a8SPaul Moore #endif /* CONFIG_KEYS */ 34467a4b6a8SPaul Moore init_debug("msg_msg blob size = %d\n", blob_sizes.lbs_msg_msg); 34567a4b6a8SPaul Moore init_debug("sock blob size = %d\n", blob_sizes.lbs_sock); 34667a4b6a8SPaul Moore init_debug("superblock blob size = %d\n", blob_sizes.lbs_superblock); 34767a4b6a8SPaul Moore init_debug("perf event blob size = %d\n", blob_sizes.lbs_perf_event); 34867a4b6a8SPaul Moore init_debug("task blob size = %d\n", blob_sizes.lbs_task); 34967a4b6a8SPaul Moore init_debug("tun device blob size = %d\n", blob_sizes.lbs_tun_dev); 35067a4b6a8SPaul Moore init_debug("xattr slots = %d\n", blob_sizes.lbs_xattr_count); 35167a4b6a8SPaul Moore init_debug("bdev blob size = %d\n", blob_sizes.lbs_bdev); 35267a4b6a8SPaul Moore init_debug("bpf map blob size = %d\n", blob_sizes.lbs_bpf_map); 35367a4b6a8SPaul Moore init_debug("bpf prog blob size = %d\n", blob_sizes.lbs_bpf_prog); 35467a4b6a8SPaul Moore init_debug("bpf token blob size = %d\n", blob_sizes.lbs_bpf_token); 35567a4b6a8SPaul Moore 35667a4b6a8SPaul Moore if (blob_sizes.lbs_file) 35767a4b6a8SPaul Moore lsm_file_cache = kmem_cache_create("lsm_file_cache", 35867a4b6a8SPaul Moore blob_sizes.lbs_file, 0, 35967a4b6a8SPaul Moore SLAB_PANIC, NULL); 36067a4b6a8SPaul Moore if (blob_sizes.lbs_inode) 36167a4b6a8SPaul Moore lsm_inode_cache = kmem_cache_create("lsm_inode_cache", 36267a4b6a8SPaul Moore blob_sizes.lbs_inode, 0, 36367a4b6a8SPaul Moore SLAB_PANIC, NULL); 36467a4b6a8SPaul Moore 36592ed3500SPaul Moore if (lsm_cred_alloc((struct cred __rcu *)current->cred, GFP_KERNEL)) 36692ed3500SPaul Moore panic("%s: early cred alloc failed.\n", __func__); 36792ed3500SPaul Moore if (lsm_task_alloc(current)) 36892ed3500SPaul Moore panic("%s: early task alloc failed.\n", __func__); 36992ed3500SPaul Moore 37037f788f6SPaul Moore lsm_order_for_each(lsm) { 37167a4b6a8SPaul Moore initialize_lsm(*lsm); 37267a4b6a8SPaul Moore } 37337f788f6SPaul Moore } 37467a4b6a8SPaul Moore 37567a4b6a8SPaul Moore static void __init lsm_static_call_init(struct security_hook_list *hl) 37667a4b6a8SPaul Moore { 37767a4b6a8SPaul Moore struct lsm_static_call *scall = hl->scalls; 37867a4b6a8SPaul Moore int i; 37967a4b6a8SPaul Moore 38067a4b6a8SPaul Moore for (i = 0; i < MAX_LSM_COUNT; i++) { 38167a4b6a8SPaul Moore /* Update the first static call that is not used yet */ 38267a4b6a8SPaul Moore if (!scall->hl) { 38367a4b6a8SPaul Moore __static_call_update(scall->key, scall->trampoline, 38467a4b6a8SPaul Moore hl->hook.lsm_func_addr); 38567a4b6a8SPaul Moore scall->hl = hl; 38667a4b6a8SPaul Moore static_branch_enable(scall->active); 38767a4b6a8SPaul Moore return; 38867a4b6a8SPaul Moore } 38967a4b6a8SPaul Moore scall++; 39067a4b6a8SPaul Moore } 39167a4b6a8SPaul Moore panic("%s - Ran out of static slots.\n", __func__); 39267a4b6a8SPaul Moore } 39367a4b6a8SPaul Moore 39467a4b6a8SPaul Moore /** 39567a4b6a8SPaul Moore * security_add_hooks - Add a modules hooks to the hook lists. 39667a4b6a8SPaul Moore * @hooks: the hooks to add 39767a4b6a8SPaul Moore * @count: the number of hooks to add 39867a4b6a8SPaul Moore * @lsmid: the identification information for the security module 39967a4b6a8SPaul Moore * 40067a4b6a8SPaul Moore * Each LSM has to register its hooks with the infrastructure. 40167a4b6a8SPaul Moore */ 40267a4b6a8SPaul Moore void __init security_add_hooks(struct security_hook_list *hooks, int count, 40367a4b6a8SPaul Moore const struct lsm_id *lsmid) 40467a4b6a8SPaul Moore { 40567a4b6a8SPaul Moore int i; 40667a4b6a8SPaul Moore 40767a4b6a8SPaul Moore for (i = 0; i < count; i++) { 40867a4b6a8SPaul Moore hooks[i].lsmid = lsmid; 40967a4b6a8SPaul Moore lsm_static_call_init(&hooks[i]); 41067a4b6a8SPaul Moore } 41167a4b6a8SPaul Moore } 41267a4b6a8SPaul Moore 41367a4b6a8SPaul Moore int __init early_security_init(void) 41467a4b6a8SPaul Moore { 41567a4b6a8SPaul Moore struct lsm_info *lsm; 41667a4b6a8SPaul Moore 41737f788f6SPaul Moore lsm_early_for_each_raw(lsm) { 41867a4b6a8SPaul Moore if (!lsm->enabled) 41967a4b6a8SPaul Moore lsm->enabled = &lsm_enabled_true; 420e0257856SPaul Moore lsm_prepare(lsm); 42167a4b6a8SPaul Moore initialize_lsm(lsm); 42267a4b6a8SPaul Moore } 42367a4b6a8SPaul Moore 42467a4b6a8SPaul Moore return 0; 42567a4b6a8SPaul Moore } 42667a4b6a8SPaul Moore 42767a4b6a8SPaul Moore /** 42867a4b6a8SPaul Moore * security_init - initializes the security framework 42967a4b6a8SPaul Moore * 43067a4b6a8SPaul Moore * This should be called early in the kernel initialization sequence. 43167a4b6a8SPaul Moore */ 43267a4b6a8SPaul Moore int __init security_init(void) 43367a4b6a8SPaul Moore { 43467a4b6a8SPaul Moore struct lsm_info *lsm; 43567a4b6a8SPaul Moore 436592b104fSPaul Moore init_debug("legacy security=%s\n", lsm_order_legacy ? : " *unspecified*"); 437592b104fSPaul Moore init_debug(" CONFIG_LSM=%s\n", lsm_order_builtin); 438592b104fSPaul Moore init_debug("boot arg lsm=%s\n", lsm_order_cmdline ? : " *unspecified*"); 43967a4b6a8SPaul Moore 44067a4b6a8SPaul Moore /* 44167a4b6a8SPaul Moore * Append the names of the early LSM modules now that kmalloc() is 44267a4b6a8SPaul Moore * available 44367a4b6a8SPaul Moore */ 44437f788f6SPaul Moore lsm_early_for_each_raw(lsm) { 4459f9dc69eSPaul Moore init_debug(" early started: %s (%s)\n", lsm->id->name, 4462d671726SPaul Moore lsm_is_enabled(lsm) ? "enabled" : "disabled"); 44767a4b6a8SPaul Moore } 44867a4b6a8SPaul Moore 44967a4b6a8SPaul Moore /* Load LSMs in specified order. */ 450faabedcdSPaul Moore lsm_init_ordered(); 45167a4b6a8SPaul Moore 45267a4b6a8SPaul Moore return 0; 45367a4b6a8SPaul Moore } 454