mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 10:40:15 +02:00 
			
		
		
		
	free_task() already calls bpf_task_storage_free(). It is not necessary to call it again on security_task_free(). Remove the hook. Signed-off-by: Song Liu <song@kernel.org> Signed-off-by: Martin KaFai Lau <martin.lau@kernel.org> Acked-by: Matt Bobrowski <mattbobrowski@google.com> Link: https://patch.msgid.link/20241212075956.2614894-1-song@kernel.org
		
			
				
	
	
		
			39 lines
		
	
	
	
		
			892 B
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			39 lines
		
	
	
	
		
			892 B
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0
 | 
						|
 | 
						|
/*
 | 
						|
 * Copyright (C) 2020 Google LLC.
 | 
						|
 */
 | 
						|
#include <linux/lsm_hooks.h>
 | 
						|
#include <linux/bpf_lsm.h>
 | 
						|
#include <uapi/linux/lsm.h>
 | 
						|
 | 
						|
static struct security_hook_list bpf_lsm_hooks[] __ro_after_init = {
 | 
						|
	#define LSM_HOOK(RET, DEFAULT, NAME, ...) \
 | 
						|
	LSM_HOOK_INIT(NAME, bpf_lsm_##NAME),
 | 
						|
	#include <linux/lsm_hook_defs.h>
 | 
						|
	#undef LSM_HOOK
 | 
						|
	LSM_HOOK_INIT(inode_free_security, bpf_inode_storage_free),
 | 
						|
};
 | 
						|
 | 
						|
static const struct lsm_id bpf_lsmid = {
 | 
						|
	.name = "bpf",
 | 
						|
	.id = LSM_ID_BPF,
 | 
						|
};
 | 
						|
 | 
						|
static int __init bpf_lsm_init(void)
 | 
						|
{
 | 
						|
	security_add_hooks(bpf_lsm_hooks, ARRAY_SIZE(bpf_lsm_hooks),
 | 
						|
			   &bpf_lsmid);
 | 
						|
	pr_info("LSM support for eBPF active\n");
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
struct lsm_blob_sizes bpf_lsm_blob_sizes __ro_after_init = {
 | 
						|
	.lbs_inode = sizeof(struct bpf_storage_blob),
 | 
						|
};
 | 
						|
 | 
						|
DEFINE_LSM(bpf) = {
 | 
						|
	.name = "bpf",
 | 
						|
	.init = bpf_lsm_init,
 | 
						|
	.blobs = &bpf_lsm_blob_sizes
 | 
						|
};
 |