12345678910111213141516171819202122232425262728293031323334353637383940414243444546 |
- // SPDX-License-Identifier: GPL-2.0-only
- /*
- * Landlock LSM - Credential hooks
- *
- * Copyright © 2017-2020 Mickaël Salaün <[email protected]>
- * Copyright © 2018-2020 ANSSI
- */
- #include <linux/cred.h>
- #include <linux/lsm_hooks.h>
- #include "common.h"
- #include "cred.h"
- #include "ruleset.h"
- #include "setup.h"
- static int hook_cred_prepare(struct cred *const new,
- const struct cred *const old, const gfp_t gfp)
- {
- struct landlock_ruleset *const old_dom = landlock_cred(old)->domain;
- if (old_dom) {
- landlock_get_ruleset(old_dom);
- landlock_cred(new)->domain = old_dom;
- }
- return 0;
- }
- static void hook_cred_free(struct cred *const cred)
- {
- struct landlock_ruleset *const dom = landlock_cred(cred)->domain;
- if (dom)
- landlock_put_ruleset_deferred(dom);
- }
- static struct security_hook_list landlock_hooks[] __lsm_ro_after_init = {
- LSM_HOOK_INIT(cred_prepare, hook_cred_prepare),
- LSM_HOOK_INIT(cred_free, hook_cred_free),
- };
- __init void landlock_add_cred_hooks(void)
- {
- security_add_hooks(landlock_hooks, ARRAY_SIZE(landlock_hooks),
- LANDLOCK_NAME);
- }
|