Linux 6.14-rc1
[linux.git] / security / landlock / setup.c
blob28519a45b11ffb9c0674bf7c212999847c74d0fa
1 // SPDX-License-Identifier: GPL-2.0-only
2 /*
3 * Landlock LSM - Security framework setup
5 * Copyright © 2016-2020 Mickaël Salaün <mic@digikod.net>
6 * Copyright © 2018-2020 ANSSI
7 */
9 #include <linux/init.h>
10 #include <linux/lsm_hooks.h>
11 #include <uapi/linux/lsm.h>
13 #include "common.h"
14 #include "cred.h"
15 #include "fs.h"
16 #include "net.h"
17 #include "setup.h"
18 #include "task.h"
20 bool landlock_initialized __ro_after_init = false;
22 struct lsm_blob_sizes landlock_blob_sizes __ro_after_init = {
23 .lbs_cred = sizeof(struct landlock_cred_security),
24 .lbs_file = sizeof(struct landlock_file_security),
25 .lbs_inode = sizeof(struct landlock_inode_security),
26 .lbs_superblock = sizeof(struct landlock_superblock_security),
29 const struct lsm_id landlock_lsmid = {
30 .name = LANDLOCK_NAME,
31 .id = LSM_ID_LANDLOCK,
34 static int __init landlock_init(void)
36 landlock_add_cred_hooks();
37 landlock_add_task_hooks();
38 landlock_add_fs_hooks();
39 landlock_add_net_hooks();
40 landlock_initialized = true;
41 pr_info("Up and running.\n");
42 return 0;
45 DEFINE_LSM(LANDLOCK_NAME) = {
46 .name = LANDLOCK_NAME,
47 .init = landlock_init,
48 .blobs = &landlock_blob_sizes,