Next: execve
Up: Enhancements to the Linux
Previous: The Access Control Database
The reference functions
This section presents some examples of the extensions introduced to
control the system calls defined in section 2.2 as threat
level 1.
2000-08-22