1ea87ae85SKP Singh // SPDX-License-Identifier: GPL-2.0
2ea87ae85SKP Singh
3ea87ae85SKP Singh /*
4ea87ae85SKP Singh * Copyright 2020 Google LLC.
5ea87ae85SKP Singh */
6ea87ae85SKP Singh
7*da4282c1SJiang Wang #include <linux/bpf.h>
8ea87ae85SKP Singh #include <errno.h>
9ea87ae85SKP Singh #include <bpf/bpf_helpers.h>
10ea87ae85SKP Singh #include <bpf/bpf_tracing.h>
11ea87ae85SKP Singh
12ea87ae85SKP Singh char _license[] SEC("license") = "GPL";
13ea87ae85SKP Singh
14ea87ae85SKP Singh struct {
15ea87ae85SKP Singh __uint(type, BPF_MAP_TYPE_TASK_STORAGE);
16ea87ae85SKP Singh __uint(map_flags, BPF_F_NO_PREALLOC);
17ea87ae85SKP Singh __type(key, int);
18ea87ae85SKP Singh __type(value, int);
19ea87ae85SKP Singh } secure_exec_task_map SEC(".maps");
20ea87ae85SKP Singh
21ea87ae85SKP Singh SEC("lsm/bprm_creds_for_exec")
BPF_PROG(secure_exec,struct linux_binprm * bprm)22ea87ae85SKP Singh int BPF_PROG(secure_exec, struct linux_binprm *bprm)
23ea87ae85SKP Singh {
24ea87ae85SKP Singh int *secureexec;
25ea87ae85SKP Singh
26ea87ae85SKP Singh secureexec = bpf_task_storage_get(&secure_exec_task_map,
27ea87ae85SKP Singh bpf_get_current_task_btf(), 0,
28ea87ae85SKP Singh BPF_LOCAL_STORAGE_GET_F_CREATE);
29ea87ae85SKP Singh
30ea87ae85SKP Singh if (secureexec && *secureexec)
31ea87ae85SKP Singh bpf_bprm_opts_set(bprm, BPF_F_BPRM_SECUREEXEC);
32ea87ae85SKP Singh
33ea87ae85SKP Singh return 0;
34ea87ae85SKP Singh }
35