|
32 | 32 | /** |
33 | 33 | * union security_list_options - Linux Security Module hook function list |
34 | 34 | * |
35 | | - * Security hooks affecting all System V IPC operations. |
36 | | - * |
37 | | - * @ipc_permission: |
38 | | - * Check permissions for access to IPC |
39 | | - * @ipcp contains the kernel IPC permission structure. |
40 | | - * @flag contains the desired (requested) permission set. |
41 | | - * Return 0 if permission is granted. |
42 | | - * @ipc_getsecid: |
43 | | - * Get the secid associated with the ipc object. |
44 | | - * @ipcp contains the kernel IPC permission structure. |
45 | | - * @secid contains a pointer to the location where result will be saved. |
46 | | - * In case of failure, @secid will be set to zero. |
47 | | - * |
48 | | - * Security hooks for individual messages held in System V IPC message queues |
49 | | - * |
50 | | - * @msg_msg_alloc_security: |
51 | | - * Allocate and attach a security structure to the msg->security field. |
52 | | - * The security field is initialized to NULL when the structure is first |
53 | | - * created. |
54 | | - * @msg contains the message structure to be modified. |
55 | | - * Return 0 if operation was successful and permission is granted. |
56 | | - * @msg_msg_free_security: |
57 | | - * Deallocate the security structure for this message. |
58 | | - * @msg contains the message structure to be modified. |
59 | | - * |
60 | | - * Security hooks for System V IPC Message Queues |
61 | | - * |
62 | | - * @msg_queue_alloc_security: |
63 | | - * Allocate and attach a security structure to the |
64 | | - * @perm->security field. The security field is initialized to |
65 | | - * NULL when the structure is first created. |
66 | | - * @perm contains the IPC permissions of the message queue. |
67 | | - * Return 0 if operation was successful and permission is granted. |
68 | | - * @msg_queue_free_security: |
69 | | - * Deallocate security field @perm->security for the message queue. |
70 | | - * @perm contains the IPC permissions of the message queue. |
71 | | - * @msg_queue_associate: |
72 | | - * Check permission when a message queue is requested through the |
73 | | - * msgget system call. This hook is only called when returning the |
74 | | - * message queue identifier for an existing message queue, not when a |
75 | | - * new message queue is created. |
76 | | - * @perm contains the IPC permissions of the message queue. |
77 | | - * @msqflg contains the operation control flags. |
78 | | - * Return 0 if permission is granted. |
79 | | - * @msg_queue_msgctl: |
80 | | - * Check permission when a message control operation specified by @cmd |
81 | | - * is to be performed on the message queue with permissions @perm. |
82 | | - * The @perm may be NULL, e.g. for IPC_INFO or MSG_INFO. |
83 | | - * @perm contains the IPC permissions of the msg queue. May be NULL. |
84 | | - * @cmd contains the operation to be performed. |
85 | | - * Return 0 if permission is granted. |
86 | | - * @msg_queue_msgsnd: |
87 | | - * Check permission before a message, @msg, is enqueued on the message |
88 | | - * queue with permissions @perm. |
89 | | - * @perm contains the IPC permissions of the message queue. |
90 | | - * @msg contains the message to be enqueued. |
91 | | - * @msqflg contains operational flags. |
92 | | - * Return 0 if permission is granted. |
93 | | - * @msg_queue_msgrcv: |
94 | | - * Check permission before a message, @msg, is removed from the message |
95 | | - * queue. The @target task structure contains a pointer to the |
96 | | - * process that will be receiving the message (not equal to the current |
97 | | - * process when inline receives are being performed). |
98 | | - * @perm contains the IPC permissions of the message queue. |
99 | | - * @msg contains the message destination. |
100 | | - * @target contains the task structure for recipient process. |
101 | | - * @type contains the type of message requested. |
102 | | - * @mode contains the operational flags. |
103 | | - * Return 0 if permission is granted. |
104 | | - * |
105 | | - * Security hooks for System V Shared Memory Segments |
106 | | - * |
107 | | - * @shm_alloc_security: |
108 | | - * Allocate and attach a security structure to the @perm->security |
109 | | - * field. The security field is initialized to NULL when the structure is |
110 | | - * first created. |
111 | | - * @perm contains the IPC permissions of the shared memory structure. |
112 | | - * Return 0 if operation was successful and permission is granted. |
113 | | - * @shm_free_security: |
114 | | - * Deallocate the security structure @perm->security for the memory segment. |
115 | | - * @perm contains the IPC permissions of the shared memory structure. |
116 | | - * @shm_associate: |
117 | | - * Check permission when a shared memory region is requested through the |
118 | | - * shmget system call. This hook is only called when returning the shared |
119 | | - * memory region identifier for an existing region, not when a new shared |
120 | | - * memory region is created. |
121 | | - * @perm contains the IPC permissions of the shared memory structure. |
122 | | - * @shmflg contains the operation control flags. |
123 | | - * Return 0 if permission is granted. |
124 | | - * @shm_shmctl: |
125 | | - * Check permission when a shared memory control operation specified by |
126 | | - * @cmd is to be performed on the shared memory region with permissions @perm. |
127 | | - * The @perm may be NULL, e.g. for IPC_INFO or SHM_INFO. |
128 | | - * @perm contains the IPC permissions of the shared memory structure. |
129 | | - * @cmd contains the operation to be performed. |
130 | | - * Return 0 if permission is granted. |
131 | | - * @shm_shmat: |
132 | | - * Check permissions prior to allowing the shmat system call to attach the |
133 | | - * shared memory segment with permissions @perm to the data segment of the |
134 | | - * calling process. The attaching address is specified by @shmaddr. |
135 | | - * @perm contains the IPC permissions of the shared memory structure. |
136 | | - * @shmaddr contains the address to attach memory region to. |
137 | | - * @shmflg contains the operational flags. |
138 | | - * Return 0 if permission is granted. |
139 | | - * |
140 | | - * Security hooks for System V Semaphores |
141 | | - * |
142 | | - * @sem_alloc_security: |
143 | | - * Allocate and attach a security structure to the @perm->security |
144 | | - * field. The security field is initialized to NULL when the structure is |
145 | | - * first created. |
146 | | - * @perm contains the IPC permissions of the semaphore. |
147 | | - * Return 0 if operation was successful and permission is granted. |
148 | | - * @sem_free_security: |
149 | | - * Deallocate security structure @perm->security for the semaphore. |
150 | | - * @perm contains the IPC permissions of the semaphore. |
151 | | - * @sem_associate: |
152 | | - * Check permission when a semaphore is requested through the semget |
153 | | - * system call. This hook is only called when returning the semaphore |
154 | | - * identifier for an existing semaphore, not when a new one must be |
155 | | - * created. |
156 | | - * @perm contains the IPC permissions of the semaphore. |
157 | | - * @semflg contains the operation control flags. |
158 | | - * Return 0 if permission is granted. |
159 | | - * @sem_semctl: |
160 | | - * Check permission when a semaphore operation specified by @cmd is to be |
161 | | - * performed on the semaphore. The @perm may be NULL, e.g. for |
162 | | - * IPC_INFO or SEM_INFO. |
163 | | - * @perm contains the IPC permissions of the semaphore. May be NULL. |
164 | | - * @cmd contains the operation to be performed. |
165 | | - * Return 0 if permission is granted. |
166 | | - * @sem_semop: |
167 | | - * Check permissions before performing operations on members of the |
168 | | - * semaphore set. If the @alter flag is nonzero, the semaphore set |
169 | | - * may be modified. |
170 | | - * @perm contains the IPC permissions of the semaphore. |
171 | | - * @sops contains the operations to perform. |
172 | | - * @nsops contains the number of operations to perform. |
173 | | - * @alter contains the flag indicating whether changes are to be made. |
174 | | - * Return 0 if permission is granted. |
175 | | - * |
176 | 35 | * @binder_set_context_mgr: |
177 | 36 | * Check whether @mgr is allowed to be the binder context manager. |
178 | 37 | * @mgr contains the struct cred for the current binder process. |
|
0 commit comments