linux/security
Stephen Smalley 65c90bca0d selinux: Fix send_sigiotask hook
The CRED patch incorrectly converted the SELinux send_sigiotask hook to
use the current task SID rather than the target task SID in its
permission check, yielding the wrong permission check.  This fixes the
hook function.  Detected by the ltp selinux testsuite and confirmed to
correct the test failure.

Signed-off-by:  Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: James Morris <jmorris@namei.org>
2009-05-05 08:31:03 +10:00
..
integrity/ima
keys keys: Handle there being no fallback destination keyring for request_key() 2009-04-09 10:41:19 -07:00
selinux selinux: Fix send_sigiotask hook 2009-05-05 08:31:03 +10:00
smack Smack: check for SMACK xattr validity in smack_inode_setxattr 2009-04-18 12:58:25 +10:00
tomoyo tomoyo: version bump to 2.2.0. 2009-04-14 09:15:02 +10:00
capability.c lsm: Remove the socket_post_accept() hook 2009-03-28 15:01:37 +11:00
commoncap.c cap_prctl: don't set error to 0 at 'no_change' 2009-04-09 09:12:03 +10:00
device_cgroup.c devcgroup: avoid using cgroup_lock 2009-04-02 19:04:55 -07:00
inode.c
Kconfig
Makefile
root_plug.c
security.c CacheFiles: Export things for CacheFiles 2009-04-03 16:42:40 +01:00