aboutsummaryrefslogtreecommitdiff
path: root/tools/testing/selftests/bpf/prog_tests/prog_array_init.c
diff options
context:
space:
mode:
authorCasey Schaufler <[email protected]>2024-10-09 10:32:09 -0700
committerPaul Moore <[email protected]>2024-10-11 14:34:11 -0400
commited870e35db660724ff0d815d9a3ef9a6247ffbab (patch)
tree609bd55272de1ab997fe21a36616d7c6bf6d6727 /tools/testing/selftests/bpf/prog_tests/prog_array_init.c
parent9852d85ec9d492ebef56dc5f229416c925758edc (diff)
lsm: add the lsm_prop data structure
When more than one security module is exporting data to audit and networking sub-systems a single 32 bit integer is no longer sufficient to represent the data. Add a structure to be used instead. The lsm_prop structure definition is intended to keep the LSM specific information private to the individual security modules. The module specific information is included in a new set of header files under include/lsm. Each security module is allowed to define the information included for its use in the lsm_prop. SELinux includes a u32 secid. Smack includes a pointer into its global label list. The conditional compilation based on feature inclusion is contained in the include/lsm files. Cc: [email protected] Cc: [email protected] Cc: [email protected] Cc: [email protected] Suggested-by: Paul Moore <[email protected]> Signed-off-by: Casey Schaufler <[email protected]> Acked-by: John Johansen <[email protected]> [PM: added include/linux/lsm/ to MAINTAINERS, subj tweak] Signed-off-by: Paul Moore <[email protected]>
Diffstat (limited to 'tools/testing/selftests/bpf/prog_tests/prog_array_init.c')
0 files changed, 0 insertions, 0 deletions