[PATCH v16 01/12] bpf: Allow kfuncs to be used in LSM programs
Kumar Kartikeya Dwivedi
memxor at gmail.com
Tue Sep 6 02:28:19 UTC 2022
On Mon, 5 Sept 2022 at 16:34, Roberto Sassu
<roberto.sassu at huaweicloud.com> wrote:
>
> From: KP Singh <kpsingh at kernel.org>
>
> In preparation for the addition of new kfuncs, allow kfuncs defined in the
> tracing subsystem to be used in LSM programs by mapping the LSM program
> type to the TRACING hook.
>
> Signed-off-by: KP Singh <kpsingh at kernel.org>
> Signed-off-by: Roberto Sassu <roberto.sassu at huawei.com>
> ---
Acked-by: Kumar Kartikeya Dwivedi <memxor at gmail.com>
> kernel/bpf/btf.c | 1 +
> 1 file changed, 1 insertion(+)
>
> diff --git a/kernel/bpf/btf.c b/kernel/bpf/btf.c
> index 903719b89238..e49b3b6d48ad 100644
> --- a/kernel/bpf/btf.c
> +++ b/kernel/bpf/btf.c
> @@ -7243,6 +7243,7 @@ static int bpf_prog_type_to_kfunc_hook(enum bpf_prog_type prog_type)
> case BPF_PROG_TYPE_STRUCT_OPS:
> return BTF_KFUNC_HOOK_STRUCT_OPS;
> case BPF_PROG_TYPE_TRACING:
> + case BPF_PROG_TYPE_LSM:
> return BTF_KFUNC_HOOK_TRACING;
> case BPF_PROG_TYPE_SYSCALL:
> return BTF_KFUNC_HOOK_SYSCALL;
> --
> 2.25.1
>
More information about the Linux-security-module-archive
mailing list