Home
last modified time | relevance | path

Searched refs:onexec (Results 1 - 8 of 8) sorted by relevance

/kernel/linux/linux-5.10/security/apparmor/include/
H A Dtask.h21 * @onexec: profile to transition to on next exec (MAY BE NULL)
27 struct aa_label *onexec; member
47 aa_put_label(ctx->onexec); in aa_free_task_ctx()
62 aa_get_label(new->onexec); in aa_dup_task_ctx()
74 aa_put_label(ctx->onexec); in aa_clear_task_ctx_trans()
76 ctx->onexec = NULL; in aa_clear_task_ctx_trans()
/kernel/linux/linux-6.6/security/apparmor/include/
H A Dtask.h21 * @onexec: profile to transition to on next exec (MAY BE NULL)
27 struct aa_label *onexec; member
47 aa_put_label(ctx->onexec); in aa_free_task_ctx()
62 aa_get_label(new->onexec); in aa_dup_task_ctx()
74 aa_put_label(ctx->onexec); in aa_clear_task_ctx_trans()
76 ctx->onexec = NULL; in aa_clear_task_ctx_trans()
/kernel/linux/linux-5.10/security/apparmor/
H A Dtask.c88 * aa_set_current_onexec - set the tasks change_profile to happen onexec
98 aa_put_label(ctx->onexec); in aa_set_current_onexec()
99 ctx->onexec = label; in aa_set_current_onexec()
139 aa_put_label(ctx->onexec); in aa_set_current_hat()
140 ctx->onexec = NULL; in aa_set_current_hat()
H A Ddomain.c720 static int profile_onexec(struct aa_profile *profile, struct aa_label *onexec, in profile_onexec() argument
727 const char *xname = NULL, *info = "change_profile onexec"; in profile_onexec()
731 AA_BUG(!onexec); in profile_onexec()
763 /* test if this exec can be paired with change_profile onexec. in profile_onexec()
764 * onexec permission is linked to exec with a standard pairing in profile_onexec()
768 error = change_profile_perms(profile, onexec, stack, AA_MAY_ONEXEC, in profile_onexec()
779 aa_label_printk(onexec, GFP_KERNEL); in profile_onexec()
787 NULL, onexec, cond->uid, info, error); in profile_onexec()
790 /* ensure none ns domain transitions are correctly applied with onexec */
793 struct aa_label *onexec, boo in handle_onexec()
792 handle_onexec(struct aa_label *label, struct aa_label *onexec, bool stack, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *unsafe) handle_onexec() argument
[all...]
H A Dlsm.c601 else if (strcmp(name, "exec") == 0 && ctx->onexec) in apparmor_getprocattr()
602 label = aa_get_newest_label(ctx->onexec); in apparmor_getprocattr()
/kernel/linux/linux-6.6/security/apparmor/
H A Dtask.c93 * aa_set_current_onexec - set the tasks change_profile to happen onexec
103 aa_put_label(ctx->onexec); in aa_set_current_onexec()
104 ctx->onexec = label; in aa_set_current_onexec()
144 aa_put_label(ctx->onexec); in aa_set_current_hat()
145 ctx->onexec = NULL; in aa_set_current_hat()
H A Ddomain.c732 struct aa_profile *profile, struct aa_label *onexec, in profile_onexec()
741 const char *xname = NULL, *info = "change_profile onexec"; in profile_onexec()
745 AA_BUG(!onexec); in profile_onexec()
777 /* test if this exec can be paired with change_profile onexec. in profile_onexec()
778 * onexec permission is linked to exec with a standard pairing in profile_onexec()
782 error = change_profile_perms(profile, onexec, stack, AA_MAY_ONEXEC, in profile_onexec()
793 aa_label_printk(onexec, GFP_KERNEL); in profile_onexec()
802 NULL, onexec, cond->uid, info, error); in profile_onexec()
805 /* ensure none ns domain transitions are correctly applied with onexec */
809 struct aa_label *onexec, boo in handle_onexec()
731 profile_onexec(const struct cred *subj_cred, struct aa_profile *profile, struct aa_label *onexec, bool stack, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *secure_exec) profile_onexec() argument
807 handle_onexec(const struct cred *subj_cred, struct aa_label *label, struct aa_label *onexec, bool stack, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *unsafe) handle_onexec() argument
[all...]
H A Dlsm.c676 else if (strcmp(name, "exec") == 0 && ctx->onexec) in apparmor_getprocattr()
677 label = aa_get_newest_label(ctx->onexec); in apparmor_getprocattr()

Completed in 9 milliseconds