Merge tag 'for-linus' of git://git.kernel.org/pub/scm/virt/kvm/kvm
[linux-stable.git] / security / bpf / hooks.c
blob3663aec7bcbd21e411b28a630f216af6631cc3d1
1 // SPDX-License-Identifier: GPL-2.0
3 /*
4 * Copyright (C) 2020 Google LLC.
5 */
6 #include <linux/lsm_hooks.h>
7 #include <linux/bpf_lsm.h>
8 #include <uapi/linux/lsm.h>
10 static struct security_hook_list bpf_lsm_hooks[] __ro_after_init = {
11 #define LSM_HOOK(RET, DEFAULT, NAME, ...) \
12 LSM_HOOK_INIT(NAME, bpf_lsm_##NAME),
13 #include <linux/lsm_hook_defs.h>
14 #undef LSM_HOOK
15 LSM_HOOK_INIT(inode_free_security, bpf_inode_storage_free),
16 LSM_HOOK_INIT(task_free, bpf_task_storage_free),
19 static const struct lsm_id bpf_lsmid = {
20 .name = "bpf",
21 .id = LSM_ID_BPF,
24 static int __init bpf_lsm_init(void)
26 security_add_hooks(bpf_lsm_hooks, ARRAY_SIZE(bpf_lsm_hooks),
27 &bpf_lsmid);
28 pr_info("LSM support for eBPF active\n");
29 return 0;
32 struct lsm_blob_sizes bpf_lsm_blob_sizes __ro_after_init = {
33 .lbs_inode = sizeof(struct bpf_storage_blob),
36 DEFINE_LSM(bpf) = {
37 .name = "bpf",
38 .init = bpf_lsm_init,
39 .blobs = &bpf_lsm_blob_sizes