[PATCH] Add security_task_post_setgid

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi,


the following patch adds a post_setgid() security hook, and necessary dummy 
funcs.

Signed-off-by: Jan Engelhardt <[email protected]>

diff -dpru linux-2.6.13-rc1-git3-20050706140055/include/linux/security.h AS17/include/linux/security.h
--- linux-2.6.13-rc1-git3-20050706140055/include/linux/security.h	2005-07-11 22:16:30.000000000 +0200
+++ AS17/include/linux/security.h	2005-07-14 23:28:45.000000000 +0200
@@ -558,6 +558,17 @@ struct swap_info_struct;
  *	@id2 contains a gid.
  *	@flags contains one of the LSM_SETID_* values.
  *	Return 0 if permission is granted.
+ * @task_post_setgid:
+ *	Update the module's state after setting one or more of the user
+ *	identity attributes of the current process. The @flags parameter
+ *	indicates which of the set*gid system calls invoked this hook. If
+ *	@flags is LSM_SETID_FS, then @old_rgid is the old fs gid and the other
+ *	parameters are not used.
+ *	@old_rgid contains the old real gid (or fs gid if LSM_SETID_FS).
+ *	@old_egid contains the old effective gid (or -1 if LSM_SETID_FS).
+ *	@old_sgid contains the old saved gid (or -1 if LSM_SETID_FS).
+ *	@flags contains one of the LSM_SETID_* values.
+ *	Return 0 on success.
  * @task_setpgid:
  *	Check permission before setting the process group identifier of the
  *	process @p to @pgid.
@@ -1151,6 +1162,7 @@ struct security_operations {
 	int (*task_post_setuid) (uid_t old_ruid /* or fsuid */ ,
 				 uid_t old_euid, uid_t old_suid, int flags);
 	int (*task_setgid) (gid_t id0, gid_t id1, gid_t id2, int flags);
+	int (*task_post_setgid) (gid_t, gid_t, gid_t, int);
 	int (*task_setpgid) (struct task_struct * p, pid_t pgid);
 	int (*task_getpgid) (struct task_struct * p);
 	int (*task_getsid) (struct task_struct * p);
@@ -1949,6 +1961,12 @@ static inline int security_task_setgid (
 			 0);
 }
 
+static inline int security_task_post_setgid(gid_t id0, gid_t id1, gid_t id2,
+					int flags)
+{
+	return COND_SECURITY(task_post_setgid(id0, id1, id2, flags), 0);
+}
+
 static inline int security_task_setpgid (struct task_struct *p, pid_t pgid)
 {
 	return COND_SECURITY(task_setpgid (p, pgid),
diff -dpru linux-2.6.13-rc1-git3-20050706140055/kernel/sys.c AS17/kernel/sys.c
--- linux-2.6.13-rc1-git3-20050706140055/kernel/sys.c	2005-07-07 20:53:44.000000000 +0200
+++ AS17/kernel/sys.c	2005-07-14 23:23:12.000000000 +0200
@@ -558,7 +558,7 @@ asmlinkage long sys_setregid(gid_t rgid,
 	current->egid = new_egid;
 	current->gid = new_rgid;
 	key_fsgid_changed(current);
-	return 0;
+	return security_task_post_setgid(old_rgid, old_egid, -1, LSM_SETID_RE);
 }
 
 /*
@@ -597,7 +597,7 @@ asmlinkage long sys_setgid(gid_t gid)
 		return -EPERM;
 
 	key_fsgid_changed(current);
-	return 0;
+	return security_task_post_setgid(gid, -1, -1, LSM_SETID_ID);
 }
   
 static int set_user(uid_t new_ruid, int dumpclear)
@@ -801,6 +801,9 @@ asmlinkage long sys_getresuid(uid_t __us
  */
 asmlinkage long sys_setresgid(gid_t rgid, gid_t egid, gid_t sgid)
 {
+	gid_t old_rgid = current->gid;
+	gid_t old_egid = current->egid;
+	gid_t old_sgid = current->sgid;
 	int retval;
 
 	retval = security_task_setgid(rgid, egid, sgid, LSM_SETID_RES);
@@ -833,7 +836,7 @@ asmlinkage long sys_setresgid(gid_t rgid
 		current->sgid = sgid;
 
 	key_fsgid_changed(current);
-	return 0;
+	return security_task_post_setgid(old_rgid, old_egid, old_sgid, LSM_SETID_RES);
 }
 
 asmlinkage long sys_getresgid(gid_t __user *rgid, gid_t __user *egid, gid_t __user *sgid)
diff -dpru linux-2.6.13-rc1-git3-20050706140055/security/dummy.c AS17/security/dummy.c
--- linux-2.6.13-rc1-git3-20050706140055/security/dummy.c	2005-07-07 20:53:51.000000000 +0200
+++ AS17/security/dummy.c	2005-07-14 23:26:27.000000000 +0200
@@ -518,6 +518,11 @@ static int dummy_task_setgid (gid_t id0,
 	return 0;
 }
 
+static int dummy_task_post_setgid(gid_t id0, gid_t id1, gid_t id2, int flags)
+{
+	return 0;
+}
+
 static int dummy_task_setpgid (struct task_struct *p, pid_t pgid)
 {
 	return 0;
@@ -931,6 +936,7 @@ void security_fixup_ops (struct security
 	set_to_dummy_if_null(ops, task_setuid);
 	set_to_dummy_if_null(ops, task_post_setuid);
 	set_to_dummy_if_null(ops, task_setgid);
+	set_to_dummy_if_null(ops, task_post_setgid);
 	set_to_dummy_if_null(ops, task_setpgid);
 	set_to_dummy_if_null(ops, task_getpgid);
 	set_to_dummy_if_null(ops, task_getsid);
#eof


Jan Engelhardt
-- 
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [email protected]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

[Index of Archives]     [Kernel Newbies]     [Netfilter]     [Bugtraq]     [Photo]     [Gimp]     [Yosemite News]     [MIPS Linux]     [ARM Linux]     [Linux Security]     [Linux RAID]     [Video 4 Linux]     [Linux for the blind]
  Powered by Linux