REGISTER_SECURITY(9) Security Framework REGISTER_SECURITY(9)NAME
register_security - registers a security framework with the kernel
SYNOPSIS
int register_security(struct security_operations * ops);
ARGUMENTS
ops
a pointer to the struct security_options that is to be registered
DESCRIPTION
This function allows a security module to register itself with the kernel security subsystem. Some rudimentary checking is done on the ops
value passed to this function. You'll need to check first if your LSM is allowed to register its ops by calling
security_module_enable(ops).
If there is already a security module registered with the kernel, an error will be returned. Otherwise 0 is returned on success.
COPYRIGHT Kernel Hackers Manual 3.10 June 2014 REGISTER_SECURITY(9)
Check Out this Related Man Page
UTRACE_ATTACH_TASK(9) utrace core API UTRACE_ATTACH_TASK(9)NAME
utrace_attach_task - attach new engine, or look up an attached engine
SYNOPSIS
struct utrace_engine * utrace_attach_task(struct task_struct * target, int flags, const struct utrace_engine_ops * ops, void * data);
ARGUMENTS
target
thread to attach to
flags
flag bits combined with OR, see below
ops
callback table for new engine
data
engine private data pointer
DESCRIPTION
The caller must ensure that the target thread does not get freed, i.e. hold a ref or be its parent. It is always safe to call this on
current, or on the child pointer in a report_clone callback. For most other cases, it's easier to use utrace_attach_pid instead.
UTRACE_ATTACH_CREATE
Create a new engine. If UTRACE_ATTACH_CREATE is not specified, you only look up an existing engine already attached to the thread.
UTRACE_ATTACH_EXCLUSIVE
Attempting to attach a second (matching) engine fails with -EEXIST.
UTRACE_ATTACH_MATCH_OPS
Only consider engines matching ops.
UTRACE_ATTACH_MATCH_DATA
Only consider engines matching data.
Calls with neither UTRACE_ATTACH_MATCH_OPS nor UTRACE_ATTACH_MATCH_DATA match the first among any engines attached to target. That means
that UTRACE_ATTACH_EXCLUSIVE in such a call fails with -EEXIST if there are any engines on target at all.
Kernel Hackers Manual 2.6. July 2010 UTRACE_ATTACH_TASK(9)
I am trying to get a flash card reader to work with my machine. My question is, are all of my USB ports screwed up? Do I need to buy a seperate USB controller? I does not appear that the onboard USB ports work.
In trying to get it to work, I typed cat /proc/scsi/scsi and got this:
# cat... (2 Replies)
Hi there,
I'm currently writing a program/module which makes use of the Linux Security Modules (LSM), which provide hooks for some security .
The bad thing about it is: The function to set the hook to the LSM is not exported. That means, I can't just write a loadable kernel module, but have to... (3 Replies)
Hello,
I am running into this issues, few VMWare VM's that are running with RHEL 5.6 and Centos 5.7, are having read write errors on the root file system. This is noticed on all vm's. After looking to log files this what I noticed.
#touch test.txt
touch: cannot touch `test.txt': Read-only... (12 Replies)
Hi All,
Could anyone please help to resolve the below problem.
I installed RHEL5.5 in my desktop.But when i try to activate the ethernet connection then it gives me the error.
I spent 2 days for the above and go through with several suggestion found by googling. But no luck.
... (0 Replies)