diff options
author | Kees Cook <keescook@chromium.org> | 2017-07-19 00:25:24 +0200 |
---|---|---|
committer | Kees Cook <keescook@chromium.org> | 2017-08-01 21:03:06 +0200 |
commit | 993b3ab0642e57da5de6bef11dd50db7e2fc3b7e (patch) | |
tree | 0406425b33f4d3c513d9cf773ddcfe25500a5d5e /security/apparmor/include/file.h | |
parent | binfmt: Introduce secureexec flag (diff) | |
download | linux-993b3ab0642e57da5de6bef11dd50db7e2fc3b7e.tar.xz linux-993b3ab0642e57da5de6bef11dd50db7e2fc3b7e.zip |
apparmor: Refactor to remove bprm_secureexec hook
The AppArmor bprm_secureexec hook can be merged with the bprm_set_creds
hook since it's dealing with the same information, and all of the details
are finalized during the first call to the bprm_set_creds hook via
prepare_binprm() (subsequent calls due to binfmt_script, etc, are ignored
via bprm->called_set_creds).
Here, all the comments describe how secureexec is actually calculated
during bprm_set_creds, so this actually does it, drops the bprm flag that
was being used internally by AppArmor, and drops the bprm_secureexec hook.
Signed-off-by: Kees Cook <keescook@chromium.org>
Acked-by: John Johansen <john.johansen@canonical.com>
Reviewed-by: James Morris <james.l.morris@oracle.com>
Acked-by: Serge Hallyn <serge@hallyn.com>
Diffstat (limited to 'security/apparmor/include/file.h')
-rw-r--r-- | security/apparmor/include/file.h | 3 |
1 files changed, 0 insertions, 3 deletions
diff --git a/security/apparmor/include/file.h b/security/apparmor/include/file.h index 001e40073ff9..4c2c8ac8842f 100644 --- a/security/apparmor/include/file.h +++ b/security/apparmor/include/file.h @@ -101,9 +101,6 @@ static inline struct aa_label *aa_get_file_label(struct aa_file_ctx *ctx) #define AA_X_INHERIT 0x4000 #define AA_X_UNCONFINED 0x8000 -/* AA_SECURE_X_NEEDED - is passed in the bprm->unsafe field */ -#define AA_SECURE_X_NEEDED 0x8000 - /* need to make conditional which ones are being set */ struct path_cond { kuid_t uid; |