1 // SPDX-License-Identifier: GPL-2.0
3 * Copyright (C) 2020-2024 Microsoft Corporation. All rights reserved.
5 #include <uapi/linux/lsm.h>
11 extern const char *const ipe_boot_policy
;
14 static struct lsm_blob_sizes ipe_blobs __ro_after_init
= {
15 .lbs_superblock
= sizeof(struct ipe_superblock
),
16 #ifdef CONFIG_IPE_PROP_DM_VERITY
17 .lbs_bdev
= sizeof(struct ipe_bdev
),
18 #endif /* CONFIG_IPE_PROP_DM_VERITY */
19 #ifdef CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG
20 .lbs_inode
= sizeof(struct ipe_inode
),
21 #endif /* CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG */
24 static const struct lsm_id ipe_lsmid
= {
29 struct ipe_superblock
*ipe_sb(const struct super_block
*sb
)
31 return sb
->s_security
+ ipe_blobs
.lbs_superblock
;
34 #ifdef CONFIG_IPE_PROP_DM_VERITY
35 struct ipe_bdev
*ipe_bdev(struct block_device
*b
)
37 return b
->bd_security
+ ipe_blobs
.lbs_bdev
;
39 #endif /* CONFIG_IPE_PROP_DM_VERITY */
41 #ifdef CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG
42 struct ipe_inode
*ipe_inode(const struct inode
*inode
)
44 return inode
->i_security
+ ipe_blobs
.lbs_inode
;
46 #endif /* CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG */
48 static struct security_hook_list ipe_hooks
[] __ro_after_init
= {
49 LSM_HOOK_INIT(bprm_check_security
, ipe_bprm_check_security
),
50 LSM_HOOK_INIT(mmap_file
, ipe_mmap_file
),
51 LSM_HOOK_INIT(file_mprotect
, ipe_file_mprotect
),
52 LSM_HOOK_INIT(kernel_read_file
, ipe_kernel_read_file
),
53 LSM_HOOK_INIT(kernel_load_data
, ipe_kernel_load_data
),
54 LSM_HOOK_INIT(initramfs_populated
, ipe_unpack_initramfs
),
55 #ifdef CONFIG_IPE_PROP_DM_VERITY
56 LSM_HOOK_INIT(bdev_free_security
, ipe_bdev_free_security
),
57 LSM_HOOK_INIT(bdev_setintegrity
, ipe_bdev_setintegrity
),
58 #endif /* CONFIG_IPE_PROP_DM_VERITY */
59 #ifdef CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG
60 LSM_HOOK_INIT(inode_setintegrity
, ipe_inode_setintegrity
),
61 #endif /* CONFIG_IPE_PROP_FS_VERITY_BUILTIN_SIG */
65 * ipe_init() - Entry point of IPE.
67 * This is called at LSM init, which happens occurs early during kernel
68 * start up. During this phase, IPE registers its hooks and loads the
69 * builtin boot policy.
73 * * %-ENOMEM - Out of memory (OOM)
75 static int __init
ipe_init(void)
77 struct ipe_policy
*p
= NULL
;
79 security_add_hooks(ipe_hooks
, ARRAY_SIZE(ipe_hooks
), &ipe_lsmid
);
82 if (ipe_boot_policy
) {
83 p
= ipe_new_policy(ipe_boot_policy
, strlen(ipe_boot_policy
),
88 rcu_assign_pointer(ipe_active_policy
, p
);