path: root/security/security.c
diff options
authorLinus Torvalds <>2020-06-14 11:39:31 -0700
committerLinus Torvalds <>2020-06-14 11:39:31 -0700
commit4a87b197c1da6b16608d5110709e0b3308e25dcd (patch)
tree65ffaafafca247113124b1d62e4e9bdd8b2a3f4d /security/security.c
parent9d645db853a4cd1b7077931491d0055602d3d420 (diff)
parent39030e1351aa1aa7443bb2da24426573077c83da (diff)
Merge tag 'LSM-add-setgid-hook-5.8-author-fix' of git://
Pull SafeSetID update from Micah Morton: "Add additional LSM hooks for SafeSetID SafeSetID is capable of making allow/deny decisions for set*uid calls on a system, and we want to add similar functionality for set*gid calls. The work to do that is not yet complete, so probably won't make it in for v5.8, but we are looking to get this simple patch in for v5.8 since we have it ready. We are planning on the rest of the work for extending the SafeSetID LSM being merged during the v5.9 merge window" * tag 'LSM-add-setgid-hook-5.8-author-fix' of git:// security: Add LSM hooks to set*gid syscalls
Diffstat (limited to 'security/security.c')
1 files changed, 6 insertions, 0 deletions
diff --git a/security/security.c b/security/security.c
index 2a652e59c413..0ce3e73edd42 100644
--- a/security/security.c
+++ b/security/security.c
@@ -1696,6 +1696,12 @@ int security_task_fix_setuid(struct cred *new, const struct cred *old,
return call_int_hook(task_fix_setuid, 0, new, old, flags);
+int security_task_fix_setgid(struct cred *new, const struct cred *old,
+ int flags)
+ return call_int_hook(task_fix_setgid, 0, new, old, flags);
int security_task_setpgid(struct task_struct *p, pid_t pgid)
return call_int_hook(task_setpgid, 0, p, pgid);