[PATCH v6 2/5] landlock: Support file truncation
Günther Noack
gnoack3000 at gmail.com
Mon Sep 12 19:04:33 UTC 2022
On Mon, Sep 12, 2022 at 08:37:09PM +0200, Mickaël Salaün wrote:
>
>
> On 12/09/2022 17:28, Günther Noack wrote:
> > On Fri, Sep 09, 2022 at 03:51:16PM +0200, Mickaël Salaün wrote:
> > >
> > > On 08/09/2022 21:58, Günther Noack wrote:
> > > > diff --git a/security/landlock/fs.h b/security/landlock/fs.h
> > > > index 8db7acf9109b..275ba5375839 100644
> > > > --- a/security/landlock/fs.h
> > > > +++ b/security/landlock/fs.h
> > > > +/**
> > > > + * struct landlock_file_security - File security blob
> > > > + *
> > > > + * This information is populated when opening a file in hook_file_open, and
> > > > + * tracks the relevant Landlock access rights that were available at the time
> > > > + * of opening the file. Other LSM hooks use these rights in order to authorize
> > > > + * operations on already opened files.
> > > > + */
> > > > +struct landlock_file_security {
> > > > + access_mask_t rights;
> > >
> > > I think it would make it more consistent to name it "access" to be in line
> > > with struct landlock_layer and other types.
> >
> > Done.
>
> Hmm, actually, "allowed_access" is more explicit. We could use other
> access-related fields for other purposes (e.g. cache).
Makes sense, renamed to allowed_access.
—Günther
--
More information about the Linux-security-module-archive
mailing list