1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * Landlock LSM - Security framework setup
4 *
5 * Copyright �� 2016-2020 Micka��l Sala��n <mic@digikod.net>
6 * Copyright �� 2018-2020 ANSSI
7 */
8
9#include <linux/init.h>
10#include <linux/lsm_hooks.h>
11#include <uapi/linux/lsm.h>
12
13#include "common.h"
14#include "cred.h"
15#include "fs.h"
16#include "net.h"
17#include "setup.h"
18#include "task.h"
19
20bool landlock_initialized __ro_after_init = false;
21
22struct lsm_blob_sizes landlock_blob_sizes __ro_after_init = {
23	.lbs_cred = sizeof(struct landlock_cred_security),
24	.lbs_file = sizeof(struct landlock_file_security),
25	.lbs_inode = sizeof(struct landlock_inode_security),
26	.lbs_superblock = sizeof(struct landlock_superblock_security),
27};
28
29const struct lsm_id landlock_lsmid = {
30	.name = LANDLOCK_NAME,
31	.id = LSM_ID_LANDLOCK,
32};
33
34static int __init landlock_init(void)
35{
36	landlock_add_cred_hooks();
37	landlock_add_task_hooks();
38	landlock_add_fs_hooks();
39	landlock_add_net_hooks();
40	landlock_initialized = true;
41	pr_info("Up and running.\n");
42	return 0;
43}
44
45DEFINE_LSM(LANDLOCK_NAME) = {
46	.name = LANDLOCK_NAME,
47	.init = landlock_init,
48	.blobs = &landlock_blob_sizes,
49};
50