87bc514620
The purpose of this LSM is to allow processes to drop to a less privileged user id without having to grant them full CAP_SETUID (or use file caps). The LSM allows configuring a whitelist policy of permitted from:to uid transitions. The policy is enforced upon calls to setuid(2) and related syscalls. Policies are configured through securityfs by writing to - safesetid/add_whitelist_policy ; and - safesetid/flush_whitelist_policies A process attempting a transition not permitted by current policy is killed (to avoid accidentally running with higher privileges than intended). A uid that has a configured policy is prevented from obtaining auxiliary setuid privileges (e.g., setting up user namespaces). See also: https://www.kernel.org/doc/html/latest/admin-guide/LSM/SafeSetID.html |
||
---|---|---|
.. | ||
cpu-cgroup-v2-patches | ||
bridge-stp-helper.patch | ||
common-config.nix | ||
export_kernel_fpu_functions.patch | ||
generate-config.pl | ||
generic.nix | ||
genksyms-fix-segfault.patch | ||
hardened-config.nix | ||
linux-4.4.nix | ||
linux-4.9.nix | ||
linux-4.14.nix | ||
linux-4.19.nix | ||
linux-5.0.nix | ||
linux-5.1.nix | ||
linux-hardkernel-4.14.nix | ||
linux-libre.nix | ||
linux-mptcp-93.nix | ||
linux-mptcp.nix | ||
linux-rpi.nix | ||
linux-testing-bcachefs.nix | ||
linux-testing.nix | ||
manual-config.nix | ||
modinst-arg-list-too-long.patch | ||
p9-fixes.patch | ||
patches.nix | ||
perf.nix | ||
randstruct-provide-seed.patch | ||
tag-hardened.patch | ||
update.sh |