security: Add LSM hooks to set*gid syscalls
authorThomas Cedeno <thomascedeno@google.com>
Tue, 9 Jun 2020 17:22:13 +0000 (10:22 -0700)
committerMicah Morton <mortonm@chromium.org>
Sun, 14 Jun 2020 17:52:02 +0000 (10:52 -0700)
commit39030e1351aa1aa7443bb2da24426573077c83da
treef593d47dfb088f59bf3db1ce3be5ddc475af6218
parent3d77e6a8804abcc0504c904bd6e5cdf3a5cf8162
security: Add LSM hooks to set*gid syscalls

The SafeSetID LSM uses the security_task_fix_setuid hook to filter
set*uid() syscalls according to its configured security policy. In
preparation for adding analagous support in the LSM for set*gid()
syscalls, we add the requisite hook here. Tested by putting print
statements in the security_task_fix_setgid hook and seeing them get hit
during kernel boot.

Signed-off-by: Thomas Cedeno <thomascedeno@google.com>
Signed-off-by: Micah Morton <mortonm@chromium.org>
include/linux/lsm_hook_defs.h
include/linux/lsm_hooks.h
include/linux/security.h
kernel/sys.c
security/security.c