06a1c40a09
Let's follow a consistent and documented coding style. Everything may not be to our liking but it is better than tacit knowledge. Moreover, this will help maintain style consistency between different developers. This contains only whitespace changes. Automatically formatted with: clang-format-14 -i security/landlock/*.[ch] include/uapi/linux/landlock.h Link: https://lore.kernel.org/r/20220506160513.523257-3-mic@digikod.net Cc: stable@vger.kernel.org Signed-off-by: Mickaël Salaün <mic@digikod.net>
47 lines
1.0 KiB
C
47 lines
1.0 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* Landlock LSM - Credential hooks
|
|
*
|
|
* Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net>
|
|
* Copyright © 2018-2020 ANSSI
|
|
*/
|
|
|
|
#include <linux/cred.h>
|
|
#include <linux/lsm_hooks.h>
|
|
|
|
#include "common.h"
|
|
#include "cred.h"
|
|
#include "ruleset.h"
|
|
#include "setup.h"
|
|
|
|
static int hook_cred_prepare(struct cred *const new,
|
|
const struct cred *const old, const gfp_t gfp)
|
|
{
|
|
struct landlock_ruleset *const old_dom = landlock_cred(old)->domain;
|
|
|
|
if (old_dom) {
|
|
landlock_get_ruleset(old_dom);
|
|
landlock_cred(new)->domain = old_dom;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
static void hook_cred_free(struct cred *const cred)
|
|
{
|
|
struct landlock_ruleset *const dom = landlock_cred(cred)->domain;
|
|
|
|
if (dom)
|
|
landlock_put_ruleset_deferred(dom);
|
|
}
|
|
|
|
static struct security_hook_list landlock_hooks[] __lsm_ro_after_init = {
|
|
LSM_HOOK_INIT(cred_prepare, hook_cred_prepare),
|
|
LSM_HOOK_INIT(cred_free, hook_cred_free),
|
|
};
|
|
|
|
__init void landlock_add_cred_hooks(void)
|
|
{
|
|
security_add_hooks(landlock_hooks, ARRAY_SIZE(landlock_hooks),
|
|
LANDLOCK_NAME);
|
|
}
|