1 // SPDX-License-Identifier: GPL-2.0-only
3 * Landlock LSM - Security framework setup
5 * Copyright © 2016-2020 Mickaël Salaün <mic@digikod.net>
6 * Copyright © 2018-2020 ANSSI
9 #include <linux/init.h>
10 #include <linux/lsm_hooks.h>
11 #include <uapi/linux/lsm.h>
20 bool landlock_initialized __ro_after_init
= false;
22 struct lsm_blob_sizes landlock_blob_sizes __ro_after_init
= {
23 .lbs_cred
= sizeof(struct landlock_cred_security
),
24 .lbs_file
= sizeof(struct landlock_file_security
),
25 .lbs_inode
= sizeof(struct landlock_inode_security
),
26 .lbs_superblock
= sizeof(struct landlock_superblock_security
),
29 const struct lsm_id landlock_lsmid
= {
30 .name
= LANDLOCK_NAME
,
31 .id
= LSM_ID_LANDLOCK
,
34 static int __init
landlock_init(void)
36 landlock_add_cred_hooks();
37 landlock_add_task_hooks();
38 landlock_add_fs_hooks();
39 landlock_add_net_hooks();
40 landlock_initialized
= true;
41 pr_info("Up and running.\n");
45 DEFINE_LSM(LANDLOCK_NAME
) = {
46 .name
= LANDLOCK_NAME
,
47 .init
= landlock_init
,
48 .blobs
= &landlock_blob_sizes
,