tomoyo.c 14.9 KB
Newer Older
1
// SPDX-License-Identifier: GPL-2.0
K
Kentaro Takeda 已提交
2 3 4
/*
 * security/tomoyo/tomoyo.c
 *
T
Tetsuo Handa 已提交
5
 * Copyright (C) 2005-2011  NTT DATA CORPORATION
K
Kentaro Takeda 已提交
6 7
 */

C
Casey Schaufler 已提交
8
#include <linux/lsm_hooks.h>
K
Kentaro Takeda 已提交
9 10
#include "common.h"

T
Tetsuo Handa 已提交
11 12 13 14 15 16 17 18
/**
 * tomoyo_cred_alloc_blank - Target for security_cred_alloc_blank().
 *
 * @new: Pointer to "struct cred".
 * @gfp: Memory allocation flags.
 *
 * Returns 0.
 */
19 20 21 22 23 24
static int tomoyo_cred_alloc_blank(struct cred *new, gfp_t gfp)
{
	new->security = NULL;
	return 0;
}

T
Tetsuo Handa 已提交
25 26 27 28 29 30 31 32 33
/**
 * tomoyo_cred_prepare - Target for security_prepare_creds().
 *
 * @new: Pointer to "struct cred".
 * @old: Pointer to "struct cred".
 * @gfp: Memory allocation flags.
 *
 * Returns 0.
 */
K
Kentaro Takeda 已提交
34 35 36
static int tomoyo_cred_prepare(struct cred *new, const struct cred *old,
			       gfp_t gfp)
{
37 38 39 40
	struct tomoyo_domain_info *domain = old->security;
	new->security = domain;
	if (domain)
		atomic_inc(&domain->users);
K
Kentaro Takeda 已提交
41 42 43
	return 0;
}

T
Tetsuo Handa 已提交
44 45 46 47 48 49
/**
 * tomoyo_cred_transfer - Target for security_transfer_creds().
 *
 * @new: Pointer to "struct cred".
 * @old: Pointer to "struct cred".
 */
50 51
static void tomoyo_cred_transfer(struct cred *new, const struct cred *old)
{
52 53 54
	tomoyo_cred_prepare(new, old, 0);
}

T
Tetsuo Handa 已提交
55 56 57 58 59
/**
 * tomoyo_cred_free - Target for security_cred_free().
 *
 * @cred: Pointer to "struct cred".
 */
60 61 62 63 64
static void tomoyo_cred_free(struct cred *cred)
{
	struct tomoyo_domain_info *domain = cred->security;
	if (domain)
		atomic_dec(&domain->users);
65 66
}

T
Tetsuo Handa 已提交
67 68 69 70 71 72 73
/**
 * tomoyo_bprm_set_creds - Target for security_bprm_set_creds().
 *
 * @bprm: Pointer to "struct linux_binprm".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
74 75 76 77 78 79
static int tomoyo_bprm_set_creds(struct linux_binprm *bprm)
{
	/*
	 * Do only if this function is called for the first time of an execve
	 * operation.
	 */
80
	if (bprm->called_set_creds)
K
Kentaro Takeda 已提交
81
		return 0;
82
#ifndef CONFIG_SECURITY_TOMOYO_OMIT_USERSPACE_LOADER
K
Kentaro Takeda 已提交
83 84 85 86 87 88
	/*
	 * Load policy if /sbin/tomoyo-init exists and /sbin/init is requested
	 * for the first time.
	 */
	if (!tomoyo_policy_loaded)
		tomoyo_load_policy(bprm->filename);
89
#endif
90 91 92 93 94 95 96 97
	/*
	 * Release reference to "struct tomoyo_domain_info" stored inside
	 * "bprm->cred->security". New reference to "struct tomoyo_domain_info"
	 * stored inside "bprm->cred->security" will be acquired later inside
	 * tomoyo_find_next_domain().
	 */
	atomic_dec(&((struct tomoyo_domain_info *)
		     bprm->cred->security)->users);
K
Kentaro Takeda 已提交
98 99 100 101 102 103 104 105
	/*
	 * Tell tomoyo_bprm_check_security() is called for the first time of an
	 * execve operation.
	 */
	bprm->cred->security = NULL;
	return 0;
}

T
Tetsuo Handa 已提交
106 107 108 109 110 111 112
/**
 * tomoyo_bprm_check_security - Target for security_bprm_check().
 *
 * @bprm: Pointer to "struct linux_binprm".
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
113 114 115 116 117 118 119 120
static int tomoyo_bprm_check_security(struct linux_binprm *bprm)
{
	struct tomoyo_domain_info *domain = bprm->cred->security;

	/*
	 * Execute permission is checked against pathname passed to do_execve()
	 * using current domain.
	 */
121 122 123 124 125 126
	if (!domain) {
		const int idx = tomoyo_read_lock();
		const int err = tomoyo_find_next_domain(bprm);
		tomoyo_read_unlock(idx);
		return err;
	}
K
Kentaro Takeda 已提交
127 128 129
	/*
	 * Read permission is checked against interpreters using next domain.
	 */
T
Tetsuo Handa 已提交
130 131
	return tomoyo_check_open_permission(domain, &bprm->file->f_path,
					    O_RDONLY);
K
Kentaro Takeda 已提交
132 133
}

T
Tetsuo Handa 已提交
134 135 136 137 138 139 140 141
/**
 * tomoyo_inode_getattr - Target for security_inode_getattr().
 *
 * @mnt:    Pointer to "struct vfsmount".
 * @dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
142
static int tomoyo_inode_getattr(const struct path *path)
T
Tetsuo Handa 已提交
143
{
144
	return tomoyo_path_perm(TOMOYO_TYPE_GETATTR, path, NULL);
T
Tetsuo Handa 已提交
145 146
}

T
Tetsuo Handa 已提交
147 148 149 150 151 152 153
/**
 * tomoyo_path_truncate - Target for security_path_truncate().
 *
 * @path: Pointer to "struct path".
 *
 * Returns 0 on success, negative value otherwise.
 */
A
Al Viro 已提交
154
static int tomoyo_path_truncate(const struct path *path)
K
Kentaro Takeda 已提交
155
{
T
Tetsuo Handa 已提交
156
	return tomoyo_path_perm(TOMOYO_TYPE_TRUNCATE, path, NULL);
K
Kentaro Takeda 已提交
157 158
}

T
Tetsuo Handa 已提交
159 160 161 162 163 164 165 166
/**
 * tomoyo_path_unlink - Target for security_path_unlink().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
A
Al Viro 已提交
167
static int tomoyo_path_unlink(const struct path *parent, struct dentry *dentry)
K
Kentaro Takeda 已提交
168
{
K
Kees Cook 已提交
169
	struct path path = { .mnt = parent->mnt, .dentry = dentry };
T
Tetsuo Handa 已提交
170
	return tomoyo_path_perm(TOMOYO_TYPE_UNLINK, &path, NULL);
K
Kentaro Takeda 已提交
171 172
}

T
Tetsuo Handa 已提交
173 174 175 176 177 178 179 180 181
/**
 * tomoyo_path_mkdir - Target for security_path_mkdir().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 * @mode:   DAC permission mode.
 *
 * Returns 0 on success, negative value otherwise.
 */
182
static int tomoyo_path_mkdir(const struct path *parent, struct dentry *dentry,
A
Al Viro 已提交
183
			     umode_t mode)
K
Kentaro Takeda 已提交
184
{
K
Kees Cook 已提交
185
	struct path path = { .mnt = parent->mnt, .dentry = dentry };
186 187
	return tomoyo_path_number_perm(TOMOYO_TYPE_MKDIR, &path,
				       mode & S_IALLUGO);
K
Kentaro Takeda 已提交
188 189
}

T
Tetsuo Handa 已提交
190 191 192 193 194 195 196 197
/**
 * tomoyo_path_rmdir - Target for security_path_rmdir().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
A
Al Viro 已提交
198
static int tomoyo_path_rmdir(const struct path *parent, struct dentry *dentry)
K
Kentaro Takeda 已提交
199
{
K
Kees Cook 已提交
200
	struct path path = { .mnt = parent->mnt, .dentry = dentry };
T
Tetsuo Handa 已提交
201
	return tomoyo_path_perm(TOMOYO_TYPE_RMDIR, &path, NULL);
K
Kentaro Takeda 已提交
202 203
}

T
Tetsuo Handa 已提交
204 205 206 207 208 209 210 211 212
/**
 * tomoyo_path_symlink - Target for security_path_symlink().
 *
 * @parent:   Pointer to "struct path".
 * @dentry:   Pointer to "struct dentry".
 * @old_name: Symlink's content.
 *
 * Returns 0 on success, negative value otherwise.
 */
213
static int tomoyo_path_symlink(const struct path *parent, struct dentry *dentry,
K
Kentaro Takeda 已提交
214 215
			       const char *old_name)
{
K
Kees Cook 已提交
216
	struct path path = { .mnt = parent->mnt, .dentry = dentry };
T
Tetsuo Handa 已提交
217
	return tomoyo_path_perm(TOMOYO_TYPE_SYMLINK, &path, old_name);
K
Kentaro Takeda 已提交
218 219
}

T
Tetsuo Handa 已提交
220 221 222 223 224 225 226 227 228 229
/**
 * tomoyo_path_mknod - Target for security_path_mknod().
 *
 * @parent: Pointer to "struct path".
 * @dentry: Pointer to "struct dentry".
 * @mode:   DAC permission mode.
 * @dev:    Device attributes.
 *
 * Returns 0 on success, negative value otherwise.
 */
230
static int tomoyo_path_mknod(const struct path *parent, struct dentry *dentry,
A
Al Viro 已提交
231
			     umode_t mode, unsigned int dev)
K
Kentaro Takeda 已提交
232
{
K
Kees Cook 已提交
233
	struct path path = { .mnt = parent->mnt, .dentry = dentry };
T
Tetsuo Handa 已提交
234
	int type = TOMOYO_TYPE_CREATE;
235
	const unsigned int perm = mode & S_IALLUGO;
K
Kentaro Takeda 已提交
236 237 238

	switch (mode & S_IFMT) {
	case S_IFCHR:
T
Tetsuo Handa 已提交
239
		type = TOMOYO_TYPE_MKCHAR;
K
Kentaro Takeda 已提交
240 241
		break;
	case S_IFBLK:
T
Tetsuo Handa 已提交
242
		type = TOMOYO_TYPE_MKBLOCK;
K
Kentaro Takeda 已提交
243
		break;
244 245 246
	default:
		goto no_dev;
	}
T
Tetsuo Handa 已提交
247
	return tomoyo_mkdev_perm(type, &path, perm, dev);
248 249
 no_dev:
	switch (mode & S_IFMT) {
K
Kentaro Takeda 已提交
250
	case S_IFIFO:
T
Tetsuo Handa 已提交
251
		type = TOMOYO_TYPE_MKFIFO;
K
Kentaro Takeda 已提交
252 253
		break;
	case S_IFSOCK:
T
Tetsuo Handa 已提交
254
		type = TOMOYO_TYPE_MKSOCK;
K
Kentaro Takeda 已提交
255 256
		break;
	}
257
	return tomoyo_path_number_perm(type, &path, perm);
K
Kentaro Takeda 已提交
258 259
}

T
Tetsuo Handa 已提交
260 261 262 263 264 265 266 267 268
/**
 * tomoyo_path_link - Target for security_path_link().
 *
 * @old_dentry: Pointer to "struct dentry".
 * @new_dir:    Pointer to "struct path".
 * @new_dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
A
Al Viro 已提交
269
static int tomoyo_path_link(struct dentry *old_dentry, const struct path *new_dir,
K
Kentaro Takeda 已提交
270 271
			    struct dentry *new_dentry)
{
K
Kees Cook 已提交
272 273
	struct path path1 = { .mnt = new_dir->mnt, .dentry = old_dentry };
	struct path path2 = { .mnt = new_dir->mnt, .dentry = new_dentry };
274
	return tomoyo_path2_perm(TOMOYO_TYPE_LINK, &path1, &path2);
K
Kentaro Takeda 已提交
275 276
}

T
Tetsuo Handa 已提交
277 278 279 280 281 282 283 284 285 286
/**
 * tomoyo_path_rename - Target for security_path_rename().
 *
 * @old_parent: Pointer to "struct path".
 * @old_dentry: Pointer to "struct dentry".
 * @new_parent: Pointer to "struct path".
 * @new_dentry: Pointer to "struct dentry".
 *
 * Returns 0 on success, negative value otherwise.
 */
A
Al Viro 已提交
287
static int tomoyo_path_rename(const struct path *old_parent,
K
Kentaro Takeda 已提交
288
			      struct dentry *old_dentry,
A
Al Viro 已提交
289
			      const struct path *new_parent,
K
Kentaro Takeda 已提交
290 291
			      struct dentry *new_dentry)
{
K
Kees Cook 已提交
292 293
	struct path path1 = { .mnt = old_parent->mnt, .dentry = old_dentry };
	struct path path2 = { .mnt = new_parent->mnt, .dentry = new_dentry };
294
	return tomoyo_path2_perm(TOMOYO_TYPE_RENAME, &path1, &path2);
K
Kentaro Takeda 已提交
295 296
}

T
Tetsuo Handa 已提交
297 298 299 300 301 302 303 304 305
/**
 * tomoyo_file_fcntl - Target for security_file_fcntl().
 *
 * @file: Pointer to "struct file".
 * @cmd:  Command for fcntl().
 * @arg:  Argument for @cmd.
 *
 * Returns 0 on success, negative value otherwise.
 */
K
Kentaro Takeda 已提交
306 307 308
static int tomoyo_file_fcntl(struct file *file, unsigned int cmd,
			     unsigned long arg)
{
T
Tetsuo Handa 已提交
309 310 311 312
	if (!(cmd == F_SETFL && ((arg ^ file->f_flags) & O_APPEND)))
		return 0;
	return tomoyo_check_open_permission(tomoyo_domain(), &file->f_path,
					    O_WRONLY | (arg & O_APPEND));
K
Kentaro Takeda 已提交
313 314
}

T
Tetsuo Handa 已提交
315
/**
316
 * tomoyo_file_open - Target for security_file_open().
T
Tetsuo Handa 已提交
317 318 319 320 321 322
 *
 * @f:    Pointer to "struct file".
 * @cred: Pointer to "struct cred".
 *
 * Returns 0 on success, negative value otherwise.
 */
A
Al Viro 已提交
323
static int tomoyo_file_open(struct file *f)
K
Kentaro Takeda 已提交
324 325 326 327 328 329 330 331
{
	int flags = f->f_flags;
	/* Don't check read permission here if called from do_execve(). */
	if (current->in_execve)
		return 0;
	return tomoyo_check_open_permission(tomoyo_domain(), &f->f_path, flags);
}

T
Tetsuo Handa 已提交
332 333 334 335 336 337 338 339 340
/**
 * tomoyo_file_ioctl - Target for security_file_ioctl().
 *
 * @file: Pointer to "struct file".
 * @cmd:  Command for ioctl().
 * @arg:  Argument for @cmd.
 *
 * Returns 0 on success, negative value otherwise.
 */
341 342 343
static int tomoyo_file_ioctl(struct file *file, unsigned int cmd,
			     unsigned long arg)
{
344
	return tomoyo_path_number_perm(TOMOYO_TYPE_IOCTL, &file->f_path, cmd);
345 346
}

T
Tetsuo Handa 已提交
347 348 349
/**
 * tomoyo_path_chmod - Target for security_path_chmod().
 *
350 351
 * @path: Pointer to "struct path".
 * @mode: DAC permission mode.
T
Tetsuo Handa 已提交
352 353 354
 *
 * Returns 0 on success, negative value otherwise.
 */
355
static int tomoyo_path_chmod(const struct path *path, umode_t mode)
356
{
357
	return tomoyo_path_number_perm(TOMOYO_TYPE_CHMOD, path,
358
				       mode & S_IALLUGO);
359 360
}

T
Tetsuo Handa 已提交
361 362 363 364 365 366 367 368 369
/**
 * tomoyo_path_chown - Target for security_path_chown().
 *
 * @path: Pointer to "struct path".
 * @uid:  Owner ID.
 * @gid:  Group ID.
 *
 * Returns 0 on success, negative value otherwise.
 */
370
static int tomoyo_path_chown(const struct path *path, kuid_t uid, kgid_t gid)
371 372
{
	int error = 0;
373 374 375 376 377 378
	if (uid_valid(uid))
		error = tomoyo_path_number_perm(TOMOYO_TYPE_CHOWN, path,
						from_kuid(&init_user_ns, uid));
	if (!error && gid_valid(gid))
		error = tomoyo_path_number_perm(TOMOYO_TYPE_CHGRP, path,
						from_kgid(&init_user_ns, gid));
379 380 381
	return error;
}

T
Tetsuo Handa 已提交
382 383 384 385 386 387 388
/**
 * tomoyo_path_chroot - Target for security_path_chroot().
 *
 * @path: Pointer to "struct path".
 *
 * Returns 0 on success, negative value otherwise.
 */
A
Al Viro 已提交
389
static int tomoyo_path_chroot(const struct path *path)
390
{
T
Tetsuo Handa 已提交
391
	return tomoyo_path_perm(TOMOYO_TYPE_CHROOT, path, NULL);
392 393
}

T
Tetsuo Handa 已提交
394 395 396 397 398 399 400 401 402 403 404
/**
 * tomoyo_sb_mount - Target for security_sb_mount().
 *
 * @dev_name: Name of device file. Maybe NULL.
 * @path:     Pointer to "struct path".
 * @type:     Name of filesystem type. Maybe NULL.
 * @flags:    Mount options.
 * @data:     Optional data. Maybe NULL.
 *
 * Returns 0 on success, negative value otherwise.
 */
A
Al Viro 已提交
405
static int tomoyo_sb_mount(const char *dev_name, const struct path *path,
A
Al Viro 已提交
406
			   const char *type, unsigned long flags, void *data)
407
{
T
Tetsuo Handa 已提交
408
	return tomoyo_mount_permission(dev_name, path, type, flags, data);
409 410
}

T
Tetsuo Handa 已提交
411 412 413 414 415 416 417 418
/**
 * tomoyo_sb_umount - Target for security_sb_umount().
 *
 * @mnt:   Pointer to "struct vfsmount".
 * @flags: Unmount options.
 *
 * Returns 0 on success, negative value otherwise.
 */
419 420
static int tomoyo_sb_umount(struct vfsmount *mnt, int flags)
{
K
Kees Cook 已提交
421
	struct path path = { .mnt = mnt, .dentry = mnt->mnt_root };
T
Tetsuo Handa 已提交
422
	return tomoyo_path_perm(TOMOYO_TYPE_UMOUNT, &path, NULL);
423 424
}

T
Tetsuo Handa 已提交
425 426 427 428 429 430 431 432
/**
 * tomoyo_sb_pivotroot - Target for security_sb_pivotroot().
 *
 * @old_path: Pointer to "struct path".
 * @new_path: Pointer to "struct path".
 *
 * Returns 0 on success, negative value otherwise.
 */
A
Al Viro 已提交
433
static int tomoyo_sb_pivotroot(const struct path *old_path, const struct path *new_path)
434
{
435
	return tomoyo_path2_perm(TOMOYO_TYPE_PIVOT_ROOT, new_path, old_path);
436 437
}

438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490 491 492 493 494 495
/**
 * tomoyo_socket_listen - Check permission for listen().
 *
 * @sock:    Pointer to "struct socket".
 * @backlog: Backlog parameter.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_listen(struct socket *sock, int backlog)
{
	return tomoyo_socket_listen_permission(sock);
}

/**
 * tomoyo_socket_connect - Check permission for connect().
 *
 * @sock:     Pointer to "struct socket".
 * @addr:     Pointer to "struct sockaddr".
 * @addr_len: Size of @addr.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_connect(struct socket *sock, struct sockaddr *addr,
				 int addr_len)
{
	return tomoyo_socket_connect_permission(sock, addr, addr_len);
}

/**
 * tomoyo_socket_bind - Check permission for bind().
 *
 * @sock:     Pointer to "struct socket".
 * @addr:     Pointer to "struct sockaddr".
 * @addr_len: Size of @addr.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_bind(struct socket *sock, struct sockaddr *addr,
			      int addr_len)
{
	return tomoyo_socket_bind_permission(sock, addr, addr_len);
}

/**
 * tomoyo_socket_sendmsg - Check permission for sendmsg().
 *
 * @sock: Pointer to "struct socket".
 * @msg:  Pointer to "struct msghdr".
 * @size: Size of message.
 *
 * Returns 0 on success, negative value otherwise.
 */
static int tomoyo_socket_sendmsg(struct socket *sock, struct msghdr *msg,
				 int size)
{
	return tomoyo_socket_sendmsg_permission(sock, msg, size);
}

496 497 498 499
/*
 * tomoyo_security_ops is a "struct security_operations" which is used for
 * registering TOMOYO.
 */
500
static struct security_hook_list tomoyo_hooks[] __lsm_ro_after_init = {
501 502 503 504 505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528
	LSM_HOOK_INIT(cred_alloc_blank, tomoyo_cred_alloc_blank),
	LSM_HOOK_INIT(cred_prepare, tomoyo_cred_prepare),
	LSM_HOOK_INIT(cred_transfer, tomoyo_cred_transfer),
	LSM_HOOK_INIT(cred_free, tomoyo_cred_free),
	LSM_HOOK_INIT(bprm_set_creds, tomoyo_bprm_set_creds),
	LSM_HOOK_INIT(bprm_check_security, tomoyo_bprm_check_security),
	LSM_HOOK_INIT(file_fcntl, tomoyo_file_fcntl),
	LSM_HOOK_INIT(file_open, tomoyo_file_open),
	LSM_HOOK_INIT(path_truncate, tomoyo_path_truncate),
	LSM_HOOK_INIT(path_unlink, tomoyo_path_unlink),
	LSM_HOOK_INIT(path_mkdir, tomoyo_path_mkdir),
	LSM_HOOK_INIT(path_rmdir, tomoyo_path_rmdir),
	LSM_HOOK_INIT(path_symlink, tomoyo_path_symlink),
	LSM_HOOK_INIT(path_mknod, tomoyo_path_mknod),
	LSM_HOOK_INIT(path_link, tomoyo_path_link),
	LSM_HOOK_INIT(path_rename, tomoyo_path_rename),
	LSM_HOOK_INIT(inode_getattr, tomoyo_inode_getattr),
	LSM_HOOK_INIT(file_ioctl, tomoyo_file_ioctl),
	LSM_HOOK_INIT(path_chmod, tomoyo_path_chmod),
	LSM_HOOK_INIT(path_chown, tomoyo_path_chown),
	LSM_HOOK_INIT(path_chroot, tomoyo_path_chroot),
	LSM_HOOK_INIT(sb_mount, tomoyo_sb_mount),
	LSM_HOOK_INIT(sb_umount, tomoyo_sb_umount),
	LSM_HOOK_INIT(sb_pivotroot, tomoyo_sb_pivotroot),
	LSM_HOOK_INIT(socket_bind, tomoyo_socket_bind),
	LSM_HOOK_INIT(socket_connect, tomoyo_socket_connect),
	LSM_HOOK_INIT(socket_listen, tomoyo_socket_listen),
	LSM_HOOK_INIT(socket_sendmsg, tomoyo_socket_sendmsg),
K
Kentaro Takeda 已提交
529 530
};

531
/* Lock for GC. */
532
DEFINE_SRCU(tomoyo_ss);
533

T
Tetsuo Handa 已提交
534 535 536 537 538
/**
 * tomoyo_init - Register TOMOYO Linux as a LSM module.
 *
 * Returns 0.
 */
K
Kentaro Takeda 已提交
539 540 541 542 543
static int __init tomoyo_init(void)
{
	struct cred *cred = (struct cred *) current_cred();

	/* register ourselves with the security framework */
544
	security_add_hooks(tomoyo_hooks, ARRAY_SIZE(tomoyo_hooks), "tomoyo");
K
Kentaro Takeda 已提交
545 546
	printk(KERN_INFO "TOMOYO Linux initialized\n");
	cred->security = &tomoyo_kernel_domain;
547
	tomoyo_mm_init();
K
Kentaro Takeda 已提交
548 549 550
	return 0;
}

551
DEFINE_LSM(tomoyo) = {
552
	.name = "tomoyo",
553
	.flags = LSM_FLAG_LEGACY_MAJOR | LSM_FLAG_EXCLUSIVE,
554 555
	.init = tomoyo_init,
};