mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/next/linux-next.git
synced 2024-12-28 16:52:18 +00:00
58ecb3a789
free_task() already calls bpf_task_storage_free(). It is not necessary to call it again on security_task_free(). Remove the hook. Signed-off-by: Song Liu <song@kernel.org> Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org> Acked-by: Matt Bobrowski <mattbobrowski@google.com> Link: https://patch.msgid.link/20241212075956.2614894-1-song@kernel.org
40 lines
892 B
C
40 lines
892 B
C
// SPDX-License-Identifier: GPL-2.0
|
|
|
|
/*
|
|
* Copyright (C) 2020 Google LLC.
|
|
*/
|
|
#include <linux/lsm_hooks.h>
|
|
#include <linux/bpf_lsm.h>
|
|
#include <uapi/linux/lsm.h>
|
|
|
|
static struct security_hook_list bpf_lsm_hooks[] __ro_after_init = {
|
|
#define LSM_HOOK(RET, DEFAULT, NAME, ...) \
|
|
LSM_HOOK_INIT(NAME, bpf_lsm_##NAME),
|
|
#include <linux/lsm_hook_defs.h>
|
|
#undef LSM_HOOK
|
|
LSM_HOOK_INIT(inode_free_security, bpf_inode_storage_free),
|
|
};
|
|
|
|
static const struct lsm_id bpf_lsmid = {
|
|
.name = "bpf",
|
|
.id = LSM_ID_BPF,
|
|
};
|
|
|
|
static int __init bpf_lsm_init(void)
|
|
{
|
|
security_add_hooks(bpf_lsm_hooks, ARRAY_SIZE(bpf_lsm_hooks),
|
|
&bpf_lsmid);
|
|
pr_info("LSM support for eBPF active\n");
|
|
return 0;
|
|
}
|
|
|
|
struct lsm_blob_sizes bpf_lsm_blob_sizes __ro_after_init = {
|
|
.lbs_inode = sizeof(struct bpf_storage_blob),
|
|
};
|
|
|
|
DEFINE_LSM(bpf) = {
|
|
.name = "bpf",
|
|
.init = bpf_lsm_init,
|
|
.blobs = &bpf_lsm_blob_sizes
|
|
};
|