/kernel/linux/linux-5.10/security/apparmor/include/ |
H A D | task.h | 21 * @onexec: profile to transition to on next exec (MAY BE NULL) 27 struct aa_label *onexec; member 47 aa_put_label(ctx->onexec); in aa_free_task_ctx() 62 aa_get_label(new->onexec); in aa_dup_task_ctx() 74 aa_put_label(ctx->onexec); in aa_clear_task_ctx_trans() 76 ctx->onexec = NULL; in aa_clear_task_ctx_trans()
|
/kernel/linux/linux-6.6/security/apparmor/include/ |
H A D | task.h | 21 * @onexec: profile to transition to on next exec (MAY BE NULL) 27 struct aa_label *onexec; member 47 aa_put_label(ctx->onexec); in aa_free_task_ctx() 62 aa_get_label(new->onexec); in aa_dup_task_ctx() 74 aa_put_label(ctx->onexec); in aa_clear_task_ctx_trans() 76 ctx->onexec = NULL; in aa_clear_task_ctx_trans()
|
/kernel/linux/linux-5.10/security/apparmor/ |
H A D | task.c | 88 * aa_set_current_onexec - set the tasks change_profile to happen onexec 98 aa_put_label(ctx->onexec); in aa_set_current_onexec() 99 ctx->onexec = label; in aa_set_current_onexec() 139 aa_put_label(ctx->onexec); in aa_set_current_hat() 140 ctx->onexec = NULL; in aa_set_current_hat()
|
H A D | domain.c | 720 static int profile_onexec(struct aa_profile *profile, struct aa_label *onexec, in profile_onexec() argument 727 const char *xname = NULL, *info = "change_profile onexec"; in profile_onexec() 731 AA_BUG(!onexec); in profile_onexec() 763 /* test if this exec can be paired with change_profile onexec. in profile_onexec() 764 * onexec permission is linked to exec with a standard pairing in profile_onexec() 768 error = change_profile_perms(profile, onexec, stack, AA_MAY_ONEXEC, in profile_onexec() 779 aa_label_printk(onexec, GFP_KERNEL); in profile_onexec() 787 NULL, onexec, cond->uid, info, error); in profile_onexec() 790 /* ensure none ns domain transitions are correctly applied with onexec */ 793 struct aa_label *onexec, boo in handle_onexec() 792 handle_onexec(struct aa_label *label, struct aa_label *onexec, bool stack, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *unsafe) handle_onexec() argument [all...] |
H A D | lsm.c | 601 else if (strcmp(name, "exec") == 0 && ctx->onexec) in apparmor_getprocattr() 602 label = aa_get_newest_label(ctx->onexec); in apparmor_getprocattr()
|
/kernel/linux/linux-6.6/security/apparmor/ |
H A D | task.c | 93 * aa_set_current_onexec - set the tasks change_profile to happen onexec 103 aa_put_label(ctx->onexec); in aa_set_current_onexec() 104 ctx->onexec = label; in aa_set_current_onexec() 144 aa_put_label(ctx->onexec); in aa_set_current_hat() 145 ctx->onexec = NULL; in aa_set_current_hat()
|
H A D | domain.c | 732 struct aa_profile *profile, struct aa_label *onexec, in profile_onexec() 741 const char *xname = NULL, *info = "change_profile onexec"; in profile_onexec() 745 AA_BUG(!onexec); in profile_onexec() 777 /* test if this exec can be paired with change_profile onexec. in profile_onexec() 778 * onexec permission is linked to exec with a standard pairing in profile_onexec() 782 error = change_profile_perms(profile, onexec, stack, AA_MAY_ONEXEC, in profile_onexec() 793 aa_label_printk(onexec, GFP_KERNEL); in profile_onexec() 802 NULL, onexec, cond->uid, info, error); in profile_onexec() 805 /* ensure none ns domain transitions are correctly applied with onexec */ 809 struct aa_label *onexec, boo in handle_onexec() 731 profile_onexec(const struct cred *subj_cred, struct aa_profile *profile, struct aa_label *onexec, bool stack, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *secure_exec) profile_onexec() argument 807 handle_onexec(const struct cred *subj_cred, struct aa_label *label, struct aa_label *onexec, bool stack, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *unsafe) handle_onexec() argument [all...] |
H A D | lsm.c | 676 else if (strcmp(name, "exec") == 0 && ctx->onexec) in apparmor_getprocattr() 677 label = aa_get_newest_label(ctx->onexec); in apparmor_getprocattr()
|