1ea87ae85SKP Singh // SPDX-License-Identifier: GPL-2.0
2ea87ae85SKP Singh 
3ea87ae85SKP Singh /*
4ea87ae85SKP Singh  * Copyright 2020 Google LLC.
5ea87ae85SKP Singh  */
6ea87ae85SKP Singh 
7*da4282c1SJiang Wang #include <linux/bpf.h>
8ea87ae85SKP Singh #include <errno.h>
9ea87ae85SKP Singh #include <bpf/bpf_helpers.h>
10ea87ae85SKP Singh #include <bpf/bpf_tracing.h>
11ea87ae85SKP Singh 
12ea87ae85SKP Singh char _license[] SEC("license") = "GPL";
13ea87ae85SKP Singh 
14ea87ae85SKP Singh struct {
15ea87ae85SKP Singh 	__uint(type, BPF_MAP_TYPE_TASK_STORAGE);
16ea87ae85SKP Singh 	__uint(map_flags, BPF_F_NO_PREALLOC);
17ea87ae85SKP Singh 	__type(key, int);
18ea87ae85SKP Singh 	__type(value, int);
19ea87ae85SKP Singh } secure_exec_task_map SEC(".maps");
20ea87ae85SKP Singh 
21ea87ae85SKP Singh SEC("lsm/bprm_creds_for_exec")
BPF_PROG(secure_exec,struct linux_binprm * bprm)22ea87ae85SKP Singh int BPF_PROG(secure_exec, struct linux_binprm *bprm)
23ea87ae85SKP Singh {
24ea87ae85SKP Singh 	int *secureexec;
25ea87ae85SKP Singh 
26ea87ae85SKP Singh 	secureexec = bpf_task_storage_get(&secure_exec_task_map,
27ea87ae85SKP Singh 				   bpf_get_current_task_btf(), 0,
28ea87ae85SKP Singh 				   BPF_LOCAL_STORAGE_GET_F_CREATE);
29ea87ae85SKP Singh 
30ea87ae85SKP Singh 	if (secureexec && *secureexec)
31ea87ae85SKP Singh 		bpf_bprm_opts_set(bprm, BPF_F_BPRM_SECUREEXEC);
32ea87ae85SKP Singh 
33ea87ae85SKP Singh 	return 0;
34ea87ae85SKP Singh }
35