On Tue, Sep 11, 2001 at 09:38:05AM -0700, richard offer wrote: > > How does this work ? It back-tracks from Stephens separation of function > from access control, but it implements an identical code path to pre-LSM. I don't know, how does this work? Have you tried it out against the different ptrace sploits out there? It looks better, but I still don't like the authorative hooks :) greg k-h _______________________________________________ linux-security-module mailing list linux-security-moduleat_private http://mail.wirex.com/mailman/listinfo/linux-security-module
This archive was generated by hypermail 2b30 : Tue Sep 11 2001 - 13:16:36 PDT