| // SPDX-License-Identifier: GPL-2.0-only | 
 | /* | 
 |  * Landlock LSM - Security framework setup | 
 |  * | 
 |  * Copyright © 2016-2020 Mickaël Salaün <mic@digikod.net> | 
 |  * Copyright © 2018-2020 ANSSI | 
 |  */ | 
 |  | 
 | #include <linux/init.h> | 
 | #include <linux/lsm_hooks.h> | 
 | #include <uapi/linux/lsm.h> | 
 |  | 
 | #include "common.h" | 
 | #include "cred.h" | 
 | #include "fs.h" | 
 | #include "net.h" | 
 | #include "setup.h" | 
 | #include "task.h" | 
 |  | 
 | bool landlock_initialized __ro_after_init = false; | 
 |  | 
 | struct lsm_blob_sizes landlock_blob_sizes __ro_after_init = { | 
 | 	.lbs_cred = sizeof(struct landlock_cred_security), | 
 | 	.lbs_file = sizeof(struct landlock_file_security), | 
 | 	.lbs_inode = sizeof(struct landlock_inode_security), | 
 | 	.lbs_superblock = sizeof(struct landlock_superblock_security), | 
 | }; | 
 |  | 
 | const struct lsm_id landlock_lsmid = { | 
 | 	.name = LANDLOCK_NAME, | 
 | 	.id = LSM_ID_LANDLOCK, | 
 | }; | 
 |  | 
 | static int __init landlock_init(void) | 
 | { | 
 | 	landlock_add_cred_hooks(); | 
 | 	landlock_add_task_hooks(); | 
 | 	landlock_add_fs_hooks(); | 
 | 	landlock_add_net_hooks(); | 
 | 	landlock_initialized = true; | 
 | 	pr_info("Up and running.\n"); | 
 | 	return 0; | 
 | } | 
 |  | 
 | DEFINE_LSM(LANDLOCK_NAME) = { | 
 | 	.name = LANDLOCK_NAME, | 
 | 	.init = landlock_init, | 
 | 	.blobs = &landlock_blob_sizes, | 
 | }; |