Function report |
Source Code:security\apparmor\domain.c |
Create Date:2022-07-28 19:51:37 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:profile_transition
Proto:static struct aa_label *profile_transition(struct aa_profile *profile, const struct linux_binprm *bprm, char *buffer, struct path_cond *cond, bool *secure_exec)
Type:struct aa_label
Parameter:
Type | Parameter | Name |
---|---|---|
struct aa_profile * | profile | |
const struct linux_binprm * | bprm | |
char * | buffer | |
struct path_cond * | cond | |
bool * | secure_exec |
628 | bool nonewprivs = false |
629 | error = 0 |
637 | If error Then |
638 | If profile_unconfined(profile) || flags & fallback to ix on name lookup fail Then |
645 | Go to audit |
648 | If profile_unconfined(profile) Then |
651 | If new Then |
655 | AA_DEBUG("unconfined exec no attachment") |
667 | Go to audit |
668 | Else if Not new Then |
673 | Else |
689 | Else if COMPLAIN_MODE(profile) Then |
691 | struct aa_profile * new_profile = NULL |
695 | If Not new_profile Then |
698 | Else |
711 | If Not ( Reserved: * u32 subtree; / * set only when allow is set * / & AA_X_UNSAFE) Then |
713 | dbg_printk("apparmor: scrubbing environment variables for %s profile=", name) |
715 | aa_label_printk(new, GFP_KERNEL) |
716 | dbg_printk("\n") |
718 | * secure_exec = true |
721 | audit : |
724 | If Not new || nonewprivs Then |
725 | aa_put_label(new) |
729 | Return new |
Name | Describe |
---|---|
handle_onexec | sure none ns domain transitions are correctly applied with onexec |
apparmor_bprm_set_creds | apparmor_bprm_set_creds - set the new creds on the bprm struct*@bprm: binprm for the exec (NOT NULL)* Returns: %0 or error on failure* TODO: once the other paths are done see if we can't refactor into a fn |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |