| // SPDX-License-Identifier: GPL-2.0-only | 
 | /* | 
 |  * Landlock LSM - Credential hooks | 
 |  * | 
 |  * Copyright © 2017-2020 Mickaël Salaün <mic@digikod.net> | 
 |  * Copyright © 2018-2020 ANSSI | 
 |  */ | 
 |  | 
 | #include <linux/cred.h> | 
 | #include <linux/lsm_hooks.h> | 
 |  | 
 | #include "common.h" | 
 | #include "cred.h" | 
 | #include "ruleset.h" | 
 | #include "setup.h" | 
 |  | 
 | static int hook_cred_prepare(struct cred *const new, | 
 | 			     const struct cred *const old, const gfp_t gfp) | 
 | { | 
 | 	struct landlock_ruleset *const old_dom = landlock_cred(old)->domain; | 
 |  | 
 | 	if (old_dom) { | 
 | 		landlock_get_ruleset(old_dom); | 
 | 		landlock_cred(new)->domain = old_dom; | 
 | 	} | 
 | 	return 0; | 
 | } | 
 |  | 
 | static void hook_cred_free(struct cred *const cred) | 
 | { | 
 | 	struct landlock_ruleset *const dom = landlock_cred(cred)->domain; | 
 |  | 
 | 	if (dom) | 
 | 		landlock_put_ruleset_deferred(dom); | 
 | } | 
 |  | 
 | static struct security_hook_list landlock_hooks[] __lsm_ro_after_init = { | 
 | 	LSM_HOOK_INIT(cred_prepare, hook_cred_prepare), | 
 | 	LSM_HOOK_INIT(cred_free, hook_cred_free), | 
 | }; | 
 |  | 
 | __init void landlock_add_cred_hooks(void) | 
 | { | 
 | 	security_add_hooks(landlock_hooks, ARRAY_SIZE(landlock_hooks), | 
 | 			   LANDLOCK_NAME); | 
 | } |