mirror of
https://github.com/edk2-porting/linux-next.git
synced 2024-12-19 18:53:52 +08:00
520b7aa00d
* The hooks are initialized using the definitions in include/linux/lsm_hook_defs.h. * The LSM can be enabled / disabled with CONFIG_BPF_LSM. Signed-off-by: KP Singh <kpsingh@google.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net> Reviewed-by: Brendan Jackman <jackmanb@google.com> Reviewed-by: Florent Revest <revest@google.com> Acked-by: Kees Cook <keescook@chromium.org> Acked-by: James Morris <jamorris@linux.microsoft.com> Link: https://lore.kernel.org/bpf/20200329004356.27286-6-kpsingh@chromium.org
27 lines
574 B
C
27 lines
574 B
C
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
/*
|
|
* Copyright (C) 2020 Google LLC.
|
|
*/
|
|
#include <linux/lsm_hooks.h>
|
|
#include <linux/bpf_lsm.h>
|
|
|
|
static struct security_hook_list bpf_lsm_hooks[] __lsm_ro_after_init = {
|
|
#define LSM_HOOK(RET, DEFAULT, NAME, ...) \
|
|
LSM_HOOK_INIT(NAME, bpf_lsm_##NAME),
|
|
#include <linux/lsm_hook_defs.h>
|
|
#undef LSM_HOOK
|
|
};
|
|
|
|
static int __init bpf_lsm_init(void)
|
|
{
|
|
security_add_hooks(bpf_lsm_hooks, ARRAY_SIZE(bpf_lsm_hooks), "bpf");
|
|
pr_info("LSM support for eBPF active\n");
|
|
return 0;
|
|
}
|
|
|
|
DEFINE_LSM(bpf) = {
|
|
.name = "bpf",
|
|
.init = bpf_lsm_init,
|
|
};
|