diff options
author | Thomas Cedeno <thomascedeno@google.com> | 2020-06-09 10:22:13 -0700 |
---|---|---|
committer | Micah Morton <mortonm@chromium.org> | 2020-06-14 10:52:02 -0700 |
commit | 39030e1351aa1aa7443bb2da24426573077c83da (patch) | |
tree | f593d47dfb088f59bf3db1ce3be5ddc475af6218 /include/linux/security.h | |
parent | 3d77e6a8804abcc0504c904bd6e5cdf3a5cf8162 (diff) |
security: Add LSM hooks to set*gid syscalls
The SafeSetID LSM uses the security_task_fix_setuid hook to filter
set*uid() syscalls according to its configured security policy. In
preparation for adding analagous support in the LSM for set*gid()
syscalls, we add the requisite hook here. Tested by putting print
statements in the security_task_fix_setgid hook and seeing them get hit
during kernel boot.
Signed-off-by: Thomas Cedeno <thomascedeno@google.com>
Signed-off-by: Micah Morton <mortonm@chromium.org>
Diffstat (limited to 'include/linux/security.h')
-rw-r--r-- | include/linux/security.h | 9 |
1 files changed, 9 insertions, 0 deletions
diff --git a/include/linux/security.h b/include/linux/security.h index a8d9310472df..88749bf0d1d7 100644 --- a/include/linux/security.h +++ b/include/linux/security.h @@ -389,6 +389,8 @@ int security_kernel_post_read_file(struct file *file, char *buf, loff_t size, enum kernel_read_file_id id); int security_task_fix_setuid(struct cred *new, const struct cred *old, int flags); +int security_task_fix_setgid(struct cred *new, const struct cred *old, + int flags); int security_task_setpgid(struct task_struct *p, pid_t pgid); int security_task_getpgid(struct task_struct *p); int security_task_getsid(struct task_struct *p); @@ -1027,6 +1029,13 @@ static inline int security_task_fix_setuid(struct cred *new, return cap_task_fix_setuid(new, old, flags); } +static inline int security_task_fix_setgid(struct cred *new, + const struct cred *old, + int flags) +{ + return 0; +} + static inline int security_task_setpgid(struct task_struct *p, pid_t pgid) { return 0; |