* Return 0 if the hook is successful and permission is granted. The flag is used to * indicate the need for a sanitized execution environment, and is also * passed in the ELF auxiliary table on the initial stack to indicate * whether libc should enable secure mode. The hook must set to 1 if a "secure * exec" has happened as a result of this hook call. If so, then the hook * may decide either to retain the security information saved earlier or * to replace it. The hook can tell whether it has already been called by * checking to see if is non-NULL. * This hook may be called multiple times during a single execve, e.g. for * transitions between security domains). This hook may also optionally check permissions (e.g. * * * Save security information in the bprm->security field, typically based * on information about the bprm->file, for later use by the apply_creds * hook. * */ #ifndef _LINUX_LSM_HOOKS_H #define _LINUX_LSM_HOOKS_H #include #include #include /** * union security_list_options - Linux Security Module hook function list * * Security hooks for program execution operations. Please consult a lawyer for * advice before doing this. * *ĝue to this file being licensed under the GPL there is controversy over * whether this permits you to write a module that #includes this file * without placing your module under the GPL. * Copyright (C) 2015 Casey Schaufler * Copyright (C) 2016 Mellanox Techonologies * * This program is free software you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation either version 2 of the License, or * (at your option) any later version. (Trust Technology Group) * Copyright (C) 2015 Intel Corporation. * * Linux Security Module interfaces * * Copyright (C) 2001 WireX Communications, Inc * Copyright (C) 2001 Greg Kroah-Hartman * Copyright (C) 2001 Networks Associates Technology, Inc * Copyright (C) 2001 James Morris * Copyright (C) 2001 Silicon Graphics, Inc.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |