forked from Qortal/Brooklyn
2a709f28fa
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
45 lines
1023 B
C
45 lines
1023 B
C
#ifndef _LINUX_FS_STRUCT_H
|
|
#define _LINUX_FS_STRUCT_H
|
|
|
|
#include <linux/path.h>
|
|
#include <linux/spinlock.h>
|
|
#include <linux/seqlock.h>
|
|
|
|
struct fs_struct {
|
|
atomic_t users;
|
|
spinlock_t lock;
|
|
seqcount_t seq;
|
|
int umask;
|
|
int in_exec;
|
|
struct path root, pwd;
|
|
} __randomize_layout;
|
|
|
|
extern struct kmem_cache *fs_cachep;
|
|
|
|
extern void exit_fs(struct task_struct *);
|
|
extern void set_fs_root(struct fs_struct *, const struct path *);
|
|
extern void set_fs_pwd(struct fs_struct *, const struct path *);
|
|
extern struct fs_struct *copy_fs_struct(struct fs_struct *);
|
|
extern void free_fs_struct(struct fs_struct *);
|
|
extern int unshare_fs_struct(void);
|
|
|
|
static inline void get_fs_root(struct fs_struct *fs, struct path *root)
|
|
{
|
|
spin_lock(&fs->lock);
|
|
*root = fs->root;
|
|
path_get(root);
|
|
spin_unlock(&fs->lock);
|
|
}
|
|
|
|
static inline void get_fs_pwd(struct fs_struct *fs, struct path *pwd)
|
|
{
|
|
spin_lock(&fs->lock);
|
|
*pwd = fs->pwd;
|
|
path_get(pwd);
|
|
spin_unlock(&fs->lock);
|
|
}
|
|
|
|
extern bool current_chrooted(void);
|
|
|
|
#endif /* _LINUX_FS_STRUCT_H */
|