mirror of
https://git.kernel.org/pub/scm/linux/kernel/git/chenhuacai/linux-loongson
synced 2025-08-26 21:52:20 +00:00

Extend struct landlock_cred_security with a domain_exec bitmask to identify which Landlock domain were created by the current task's bprm. The whole bitmask is reset on each execve(2) call. Cc: Günther Noack <gnoack@google.com> Cc: Paul Moore <paul@paul-moore.com> Link: https://lore.kernel.org/r/20250320190717.2287696-9-mic@digikod.net Signed-off-by: Mickaël Salaün <mic@digikod.net>
72 lines
1.6 KiB
C
72 lines
1.6 KiB
C
// SPDX-License-Identifier: GPL-2.0-only
|
|
/*
|
|
* Landlock - Credential hooks
|
|
*
|
|
* Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net>
|
|
* Copyright © 2018-2020 ANSSI
|
|
* Copyright © 2024-2025 Microsoft Corporation
|
|
*/
|
|
|
|
#include <linux/binfmts.h>
|
|
#include <linux/cred.h>
|
|
#include <linux/lsm_hooks.h>
|
|
|
|
#include "common.h"
|
|
#include "cred.h"
|
|
#include "ruleset.h"
|
|
#include "setup.h"
|
|
|
|
static void hook_cred_transfer(struct cred *const new,
|
|
const struct cred *const old)
|
|
{
|
|
const struct landlock_cred_security *const old_llcred =
|
|
landlock_cred(old);
|
|
|
|
if (old_llcred->domain) {
|
|
landlock_get_ruleset(old_llcred->domain);
|
|
*landlock_cred(new) = *old_llcred;
|
|
}
|
|
}
|
|
|
|
static int hook_cred_prepare(struct cred *const new,
|
|
const struct cred *const old, const gfp_t gfp)
|
|
{
|
|
hook_cred_transfer(new, old);
|
|
return 0;
|
|
}
|
|
|
|
static void hook_cred_free(struct cred *const cred)
|
|
{
|
|
struct landlock_ruleset *const dom = landlock_cred(cred)->domain;
|
|
|
|
if (dom)
|
|
landlock_put_ruleset_deferred(dom);
|
|
}
|
|
|
|
#ifdef CONFIG_AUDIT
|
|
|
|
static int hook_bprm_creds_for_exec(struct linux_binprm *const bprm)
|
|
{
|
|
/* Resets for each execution. */
|
|
landlock_cred(bprm->cred)->domain_exec = 0;
|
|
return 0;
|
|
}
|
|
|
|
#endif /* CONFIG_AUDIT */
|
|
|
|
static struct security_hook_list landlock_hooks[] __ro_after_init = {
|
|
LSM_HOOK_INIT(cred_prepare, hook_cred_prepare),
|
|
LSM_HOOK_INIT(cred_transfer, hook_cred_transfer),
|
|
LSM_HOOK_INIT(cred_free, hook_cred_free),
|
|
|
|
#ifdef CONFIG_AUDIT
|
|
LSM_HOOK_INIT(bprm_creds_for_exec, hook_bprm_creds_for_exec),
|
|
#endif /* CONFIG_AUDIT */
|
|
};
|
|
|
|
__init void landlock_add_cred_hooks(void)
|
|
{
|
|
security_add_hooks(landlock_hooks, ARRAY_SIZE(landlock_hooks),
|
|
&landlock_lsmid);
|
|
}
|