linux/security/apparmor
Kees Cook 1d4457f999 sched: move no_new_privs into new atomic flags
Since seccomp transitions between threads requires updates to the
no_new_privs flag to be atomic, the flag must be part of an atomic flag
set. This moves the nnp flag into a separate task field, and introduces
accessors.

Signed-off-by: Kees Cook <keescook@chromium.org>
Reviewed-by: Oleg Nesterov <oleg@redhat.com>
Reviewed-by: Andy Lutomirski <luto@amacapital.net>
2014-07-18 12:13:38 -07:00
..
include nick kvfree() from apparmor 2014-05-06 14:02:53 -04:00
.gitignore
apparmorfs.c apparmor: fix bad lock balance when introspecting policy 2013-10-16 11:54:01 +11:00
audit.c apparmor: remove parent task info from audit logging 2013-10-29 21:34:04 -07:00
capability.c apparmor: fix capability to not use the current task, during reporting 2013-10-29 21:33:37 -07:00
context.c
crypto.c apparmor: Use shash crypto API interface for profile hashes 2013-09-30 09:53:59 +10:00
domain.c sched: move no_new_privs into new atomic flags 2014-07-18 12:13:38 -07:00
file.c
ipc.c apparmor: fix capability to not use the current task, during reporting 2013-10-29 21:33:37 -07:00
Kconfig
lib.c nick kvfree() from apparmor 2014-05-06 14:02:53 -04:00
lsm.c security: replace strict_strto*() with kstrto*() 2014-02-06 19:11:04 +11:00
Makefile
match.c
path.c
policy.c apparmor: fix memleak of the profile hash 2013-10-16 11:53:59 +11:00
policy_unpack.c
procattr.c
resource.c
sid.c