~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

TOMOYO Linux Cross Reference
Linux/security/landlock/cred.c

Version: ~ [ linux-6.12-rc7 ] ~ [ linux-6.11.7 ] ~ [ linux-6.10.14 ] ~ [ linux-6.9.12 ] ~ [ linux-6.8.12 ] ~ [ linux-6.7.12 ] ~ [ linux-6.6.60 ] ~ [ linux-6.5.13 ] ~ [ linux-6.4.16 ] ~ [ linux-6.3.13 ] ~ [ linux-6.2.16 ] ~ [ linux-6.1.116 ] ~ [ linux-6.0.19 ] ~ [ linux-5.19.17 ] ~ [ linux-5.18.19 ] ~ [ linux-5.17.15 ] ~ [ linux-5.16.20 ] ~ [ linux-5.15.171 ] ~ [ linux-5.14.21 ] ~ [ linux-5.13.19 ] ~ [ linux-5.12.19 ] ~ [ linux-5.11.22 ] ~ [ linux-5.10.229 ] ~ [ linux-5.9.16 ] ~ [ linux-5.8.18 ] ~ [ linux-5.7.19 ] ~ [ linux-5.6.19 ] ~ [ linux-5.5.19 ] ~ [ linux-5.4.285 ] ~ [ linux-5.3.18 ] ~ [ linux-5.2.21 ] ~ [ linux-5.1.21 ] ~ [ linux-5.0.21 ] ~ [ linux-4.20.17 ] ~ [ linux-4.19.323 ] ~ [ linux-4.18.20 ] ~ [ linux-4.17.19 ] ~ [ linux-4.16.18 ] ~ [ linux-4.15.18 ] ~ [ linux-4.14.336 ] ~ [ linux-4.13.16 ] ~ [ linux-4.12.14 ] ~ [ linux-4.11.12 ] ~ [ linux-4.10.17 ] ~ [ linux-4.9.337 ] ~ [ linux-4.4.302 ] ~ [ linux-3.10.108 ] ~ [ linux-2.6.32.71 ] ~ [ linux-2.6.0 ] ~ [ linux-2.4.37.11 ] ~ [ unix-v6-master ] ~ [ ccs-tools-1.8.12 ] ~ [ policy-sample ] ~
Architecture: ~ [ i386 ] ~ [ alpha ] ~ [ m68k ] ~ [ mips ] ~ [ ppc ] ~ [ sparc ] ~ [ sparc64 ] ~

Diff markup

Differences between /security/landlock/cred.c (Version linux-6.12-rc7) and /security/landlock/cred.c (Version linux-6.3.13)


  1 // SPDX-License-Identifier: GPL-2.0-only            1 // SPDX-License-Identifier: GPL-2.0-only
  2 /*                                                  2 /*
  3  * Landlock LSM - Credential hooks                  3  * Landlock LSM - Credential hooks
  4  *                                                  4  *
  5  * Copyright © 2017-2020 Mickaël Salaün <mi      5  * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net>
  6  * Copyright © 2018-2020 ANSSI                     6  * Copyright © 2018-2020 ANSSI
  7  */                                                 7  */
  8                                                     8 
  9 #include <linux/cred.h>                             9 #include <linux/cred.h>
 10 #include <linux/lsm_hooks.h>                       10 #include <linux/lsm_hooks.h>
 11                                                    11 
 12 #include "common.h"                                12 #include "common.h"
 13 #include "cred.h"                                  13 #include "cred.h"
 14 #include "ruleset.h"                               14 #include "ruleset.h"
 15 #include "setup.h"                                 15 #include "setup.h"
 16                                                    16 
 17 static void hook_cred_transfer(struct cred *co !!  17 static int hook_cred_prepare(struct cred *const new,
 18                                const struct cr !!  18                              const struct cred *const old, const gfp_t gfp)
 19 {                                                  19 {
 20         struct landlock_ruleset *const old_dom     20         struct landlock_ruleset *const old_dom = landlock_cred(old)->domain;
 21                                                    21 
 22         if (old_dom) {                             22         if (old_dom) {
 23                 landlock_get_ruleset(old_dom);     23                 landlock_get_ruleset(old_dom);
 24                 landlock_cred(new)->domain = o     24                 landlock_cred(new)->domain = old_dom;
 25         }                                          25         }
 26 }                                              << 
 27                                                << 
 28 static int hook_cred_prepare(struct cred *cons << 
 29                              const struct cred << 
 30 {                                              << 
 31         hook_cred_transfer(new, old);          << 
 32         return 0;                                  26         return 0;
 33 }                                                  27 }
 34                                                    28 
 35 static void hook_cred_free(struct cred *const      29 static void hook_cred_free(struct cred *const cred)
 36 {                                                  30 {
 37         struct landlock_ruleset *const dom = l     31         struct landlock_ruleset *const dom = landlock_cred(cred)->domain;
 38                                                    32 
 39         if (dom)                                   33         if (dom)
 40                 landlock_put_ruleset_deferred(     34                 landlock_put_ruleset_deferred(dom);
 41 }                                                  35 }
 42                                                    36 
 43 static struct security_hook_list landlock_hook !!  37 static struct security_hook_list landlock_hooks[] __lsm_ro_after_init = {
 44         LSM_HOOK_INIT(cred_prepare, hook_cred_     38         LSM_HOOK_INIT(cred_prepare, hook_cred_prepare),
 45         LSM_HOOK_INIT(cred_transfer, hook_cred << 
 46         LSM_HOOK_INIT(cred_free, hook_cred_fre     39         LSM_HOOK_INIT(cred_free, hook_cred_free),
 47 };                                                 40 };
 48                                                    41 
 49 __init void landlock_add_cred_hooks(void)          42 __init void landlock_add_cred_hooks(void)
 50 {                                                  43 {
 51         security_add_hooks(landlock_hooks, ARR     44         security_add_hooks(landlock_hooks, ARRAY_SIZE(landlock_hooks),
 52                            &landlock_lsmid);   !!  45                            LANDLOCK_NAME);
 53 }                                                  46 }
 54                                                    47 

~ [ source navigation ] ~ [ diff markup ] ~ [ identifier search ] ~

kernel.org | git.kernel.org | LWN.net | Project Home | SVN repository | Mail admin

Linux® is a registered trademark of Linus Torvalds in the United States and other countries.
TOMOYO® is a registered trademark of NTT DATA CORPORATION.

sflogo.php