|
103 | 103 | * @sb_free_security:
|
104 | 104 | * Deallocate and clear the sb->s_security field.
|
105 | 105 | * @sb contains the super_block structure to be modified.
|
| 106 | + * @sb_free_mnt_opts: |
| 107 | + * Free memory associated with @mnt_ops. |
| 108 | + * @sb_eat_lsm_opts: |
| 109 | + * Eat (scan @orig options) and save them in @mnt_opts. |
106 | 110 | * @sb_statfs:
|
107 | 111 | * Check permission before obtaining filesystem statistics for the @mnt
|
108 | 112 | * mountpoint.
|
|
136 | 140 | * @sb superblock being remounted
|
137 | 141 | * @data contains the filesystem-specific data.
|
138 | 142 | * Return 0 if permission is granted.
|
| 143 | + * @sb_kern_mount: |
| 144 | + * Mount this @sb if allowed by permissions. |
| 145 | + * @sb_show_options: |
| 146 | + * Show (print on @m) mount options for this @sb. |
139 | 147 | * @sb_umount:
|
140 | 148 | * Check permission before the @mnt file system is unmounted.
|
141 | 149 | * @mnt contains the mounted file system.
|
|
155 | 163 | * Copy all security options from a given superblock to another
|
156 | 164 | * @oldsb old superblock which contain information to clone
|
157 | 165 | * @newsb new superblock which needs filled in
|
| 166 | + * @sb_add_mnt_opt: |
| 167 | + * Add one mount @option to @mnt_opts. |
158 | 168 | * @sb_parse_opts_str:
|
159 | 169 | * Parse a string of security data filling in the opts structure
|
160 | 170 | * @options string containing all mount options known by the LSM
|
|
451 | 461 | * security module does not know about attribute or a negative error code
|
452 | 462 | * to abort the copy up. Note that the caller is responsible for reading
|
453 | 463 | * and writing the xattrs as this hook is merely a filter.
|
| 464 | + * @d_instantiate: |
| 465 | + * Fill in @inode security information for a @dentry if allowed. |
| 466 | + * @getprocattr: |
| 467 | + * Read attribute @name for process @p and store it into @value if allowed. |
| 468 | + * @setprocattr: |
| 469 | + * Write (set) attribute @name to @value, size @size if allowed. |
454 | 470 | *
|
455 | 471 | * Security hooks for kernfs node operations
|
456 | 472 | *
|
|
1113 | 1129 | * In case of failure, @secid will be set to zero.
|
1114 | 1130 | *
|
1115 | 1131 | * Security hooks for individual messages held in System V IPC message queues
|
| 1132 | + * |
1116 | 1133 | * @msg_msg_alloc_security:
|
1117 | 1134 | * Allocate and attach a security structure to the msg->security field.
|
1118 | 1135 | * The security field is initialized to NULL when the structure is first
|
|
1302 | 1319 | * @cap contains the capability <include/linux/capability.h>.
|
1303 | 1320 | * @opts contains options for the capable check <include/linux/security.h>
|
1304 | 1321 | * Return 0 if the capability is granted for @tsk.
|
| 1322 | + * @quotactl: |
| 1323 | + * Check whether the quotactl syscall is allowed for this @sb. |
| 1324 | + * @quota_on: |
| 1325 | + * Check whether QUOTAON is allowed for this @dentry. |
1305 | 1326 | * @syslog:
|
1306 | 1327 | * Check permission before accessing the kernel message ring or changing
|
1307 | 1328 | * logging to the console.
|
|
1449 | 1470 | * @bpf_prog_free_security:
|
1450 | 1471 | * Clean up the security information stored inside bpf prog.
|
1451 | 1472 | *
|
1452 |
| - * @locked_down |
| 1473 | + * @locked_down: |
1453 | 1474 | * Determine whether a kernel feature that potentially enables arbitrary
|
1454 | 1475 | * code execution in kernel space should be permitted.
|
1455 | 1476 | *
|
1456 | 1477 | * @what: kernel feature being accessed
|
| 1478 | + * |
| 1479 | + * Security hooks for perf events |
| 1480 | + * |
| 1481 | + * @perf_event_open: |
| 1482 | + * Check whether the @type of perf_event_open syscall is allowed. |
| 1483 | + * @perf_event_alloc: |
| 1484 | + * Allocate and save perf_event security info. |
| 1485 | + * @perf_event_free: |
| 1486 | + * Release (free) perf_event security info. |
| 1487 | + * @perf_event_read: |
| 1488 | + * Read perf_event security info if allowed. |
| 1489 | + * @perf_event_write: |
| 1490 | + * Write perf_event security info if allowed. |
1457 | 1491 | */
|
1458 | 1492 | union security_list_options {
|
1459 | 1493 | int (*binder_set_context_mgr)(struct task_struct *mgr);
|
|
0 commit comments