Message ID | 20190813192126.122370-7-matthewgarrett@google.com (mailing list archive) |
---|---|
State | New, archived |
Headers | show |
Series | lockdown fixups | expand |
diff --git a/include/linux/lsm_hooks.h b/include/linux/lsm_hooks.h index 5ec2912c8661..2f4ba9062fb8 100644 --- a/include/linux/lsm_hooks.h +++ b/include/linux/lsm_hooks.h @@ -1446,6 +1446,11 @@ * @bpf_prog_free_security: * Clean up the security information stored inside bpf prog. * + * @locked_down + * Determine whether a kernel feature that potentially enables arbitrary + * code execution in kernel space should be permitted. + * + * @what: kernel feature being accessed */ union security_list_options { int (*binder_set_context_mgr)(struct task_struct *mgr);
The kbuild test robot pointed out that this wasn't documented. Reported-by: kbuild test robot <lkp@intel.com> Fixes: c360be6c ("security: Add a "locked down" LSM hook") Signed-off-by: Matthew Garrett <mjg59@google.com> --- include/linux/lsm_hooks.h | 5 +++++ 1 file changed, 5 insertions(+)