Displaying 1 result from an estimated 1 matches for "bpf_lsm_".
Did you mean:
bpf_lsm
2023 Mar 06
1
ocfs2 xattr
...the source it seems that eBPF creates all hooks and returns the
default value of 0 for inode_init_security:
include/linux/lsm_hook_defs.h:LSM_HOOK(int, 0, inode_init_security, struct inode *inode,
kernel/bpf/bpf_lsm.c:#define LSM_HOOK(RET, DEFAULT, NAME, ...) \
kernel/bpf/bpf_lsm.c:noinline RET bpf_lsm_##NAME(__VA_ARGS__) \
kernel/bpf/bpf_lsm.c:{ \
kernel/bpf/bpf_lsm.c: return DEFAULT; \
kernel/bpf/bpf_lsm.c:}
I suppose the fix would be to change the default value to -EOPNOTSUPP?
--
Valentin