summaryrefslogtreecommitdiff
path: root/include/linux/lsm_audit.h
diff options
context:
space:
mode:
authorDavid Howells <dhowells@redhat.com>2020-01-14 20:07:13 +0300
committerDavid Howells <dhowells@redhat.com>2020-05-19 17:47:38 +0300
commita8478a602913dc89a7cd2060e613edecd07e1dbd (patch)
treedab2ce77466d2de20ae20034eda3f17c8f51f422 /include/linux/lsm_audit.h
parent3e412ccc22e25666772094fb5ca01af056c54471 (diff)
downloadlinux-a8478a602913dc89a7cd2060e613edecd07e1dbd.tar.xz
smack: Implement the watch_key and post_notification hooks
Implement the watch_key security hook in Smack to make sure that a key grants the caller Read permission in order to set a watch on a key. Also implement the post_notification security hook to make sure that the notification source is granted Write permission by the watch queue. For the moment, the watch_devices security hook is left unimplemented as it's not obvious what the object should be since the queue is global and didn't previously exist. Signed-off-by: David Howells <dhowells@redhat.com> Acked-by: Casey Schaufler <casey@schaufler-ca.com>
Diffstat (limited to 'include/linux/lsm_audit.h')
-rw-r--r--include/linux/lsm_audit.h1
1 files changed, 1 insertions, 0 deletions
diff --git a/include/linux/lsm_audit.h b/include/linux/lsm_audit.h
index 99d629fd9944..28f23b341c1c 100644
--- a/include/linux/lsm_audit.h
+++ b/include/linux/lsm_audit.h
@@ -75,6 +75,7 @@ struct common_audit_data {
#define LSM_AUDIT_DATA_IBPKEY 13
#define LSM_AUDIT_DATA_IBENDPORT 14
#define LSM_AUDIT_DATA_LOCKDOWN 15
+#define LSM_AUDIT_DATA_NOTIFICATION 16
union {
struct path path;
struct dentry *dentry;