path: root/include/linux/security.h
diff options
authorLuis Chamberlain <mcgrof@kernel.org>2022-07-15 12:16:22 -0700
committerPaul Moore <paul@paul-moore.com>2022-08-26 11:19:43 -0400
commit2a5840124009f133bd09fd855963551fb2cefe22 (patch)
treea5d4322412e3fb7e7b372039fca8fbf6841a8893 /include/linux/security.h
parentLinux 6.0-rc1 (diff)
lsm,io_uring: add LSM hooks for the new uring_cmd file op
io-uring cmd support was added through ee692a21e9bf ("fs,io_uring: add infrastructure for uring-cmd"), this extended the struct file_operations to allow a new command which each subsystem can use to enable command passthrough. Add an LSM specific for the command passthrough which enables LSMs to inspect the command details. This was discussed long ago without no clear pointer for something conclusive, so this enables LSMs to at least reject this new file operation. [0] https://lkml.kernel.org/r/8adf55db-7bab-f59d-d612-ed906b948d19@schaufler-ca.com Cc: stable@vger.kernel.org Fixes: ee692a21e9bf ("fs,io_uring: add infrastructure for uring-cmd") Signed-off-by: Luis Chamberlain <mcgrof@kernel.org> Acked-by: Jens Axboe <axboe@kernel.dk> Signed-off-by: Paul Moore <paul@paul-moore.com>
Diffstat (limited to '')
1 files changed, 5 insertions, 0 deletions
diff --git a/include/linux/security.h b/include/linux/security.h
index 1bc362cb413f..7bd0c490703d 100644
--- a/include/linux/security.h
+++ b/include/linux/security.h
@@ -2060,6 +2060,7 @@ static inline int security_perf_event_write(struct perf_event *event)
extern int security_uring_override_creds(const struct cred *new);
extern int security_uring_sqpoll(void);
+extern int security_uring_cmd(struct io_uring_cmd *ioucmd);
static inline int security_uring_override_creds(const struct cred *new)
@@ -2069,6 +2070,10 @@ static inline int security_uring_sqpoll(void)
return 0;
+static inline int security_uring_cmd(struct io_uring_cmd *ioucmd)
+ return 0;
#endif /* CONFIG_SECURITY */
#endif /* CONFIG_IO_URING */