Searched refs:onexec (Results 1 - 7 of 7) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/apparmor/include/
H A Dprocattr.h23 int aa_setprocattr_changeprofile(char *fqname, bool onexec, int test);
H A Ddomain.h33 int aa_change_profile(const char *ns_name, const char *name, bool onexec,
H A Dcontext.h70 struct aa_profile *onexec; member in struct:aa_task_cxt
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/security/apparmor/
H A Dcontext.c52 aa_put_profile(cxt->onexec);
68 aa_get_profile(new->onexec);
96 aa_put_profile(cxt->onexec);
98 cxt->onexec = NULL;
114 * aa_set_current_onexec - set the tasks change_profile to happen onexec
128 aa_put_profile(cxt->onexec);
129 cxt->onexec = profile;
167 aa_put_profile(cxt->onexec);
168 cxt->onexec = NULL;
211 aa_put_profile(cxt->onexec);
[all...]
H A Dprocattr.c153 * @onexec: true if change_profile should be delayed until exec
158 int aa_setprocattr_changeprofile(char *fqname, bool onexec, int test) argument
163 return aa_change_profile(ns_name, name, onexec, test);
H A Ddomain.c386 /* Test for onexec first as onexec directives override other
391 if (cxt->onexec)
393 new_profile = aa_get_profile(cxt->onexec);
403 if (cxt->onexec) {
405 info = "change_profile onexec";
409 /* test if this exec can be paired with change_profile onexec.
410 * onexec permission is linked to exec with a standard pairing
414 cp = change_profile_perms(profile, cxt->onexec->ns, name,
419 new_profile = aa_get_profile(aa_newest_version(cxt->onexec));
725 aa_change_profile(const char *ns_name, const char *hname, bool onexec, bool permtest) argument
[all...]
H A Dlsm.c530 else if (strcmp(name, "exec") == 0 && cxt->onexec)
531 error = aa_getprocattr(aa_newest_version(cxt->onexec),

Completed in 102 milliseconds