Files
linux/kernel
Eric Paris 9188499cdb security: introducing security_request_module
Calling request_module() will trigger a userspace upcall which will load a
new module into the kernel.  This can be a dangerous event if the process
able to trigger request_module() is able to control either the modprobe
binary or the module binary.  This patch adds a new security hook to
request_module() which can be used by an LSM to control a processes ability
to call request_module().

Signed-off-by: Eric Paris <eparis@redhat.com>
Acked-by: Serge Hallyn <serue@us.ibm.com>
Signed-off-by: James Morris <jmorris@namei.org>
2009-08-14 11:18:37 +10:00
..
2009-07-12 12:22:34 -07:00
2009-06-24 00:02:38 -04:00
2009-06-24 00:02:38 -04:00
2009-07-29 19:10:35 -07:00
2008-10-16 11:21:30 -07:00
2009-07-08 09:31:56 -07:00
2009-06-16 19:47:48 -07:00
2009-07-10 17:32:55 +02:00
2008-07-28 14:37:38 +02:00
2009-05-15 07:56:24 -05:00
2009-07-27 12:15:46 -07:00
2009-01-14 18:09:02 +01:00
2009-06-18 13:03:56 -07:00
2009-07-24 15:30:45 -04:00
2009-06-18 13:03:55 -07:00
2008-09-02 19:21:40 -07:00
2009-07-14 00:30:40 +10:00
2009-03-30 22:05:16 +10:30
2009-08-01 11:18:56 -07:00
2009-08-07 10:39:55 -07:00
2009-06-16 19:47:48 -07:00
2009-06-15 21:30:23 -07:00
2009-06-18 13:03:55 -07:00
2009-04-14 17:17:16 +02:00