android_kernel_google_msm/security/apparmor
John Johansen 7f86aad709 Fix execve behavior apparmor for PR_{GET,SET}_NO_NEW_PRIVS
Add support for AppArmor to explicitly fail requested domain transitions
if NO_NEW_PRIVS is set and the task is not unconfined.

Transitions from unconfined are still allowed because this always results
in a reduction of privileges.

Acked-by: Eric Paris <eparis@redhat.com>
Signed-off-by: Will Drewry <wad@chromium.org>
Signed-off-by: John Johansen <john.johansen@canonical.com>
Signed-off-by: Andy Lutomirski <luto@amacapital.net>

v18: new acked-by, new description
2014-10-31 19:46:09 -07:00
..
include LSM: shrink sizeof LSM specific portion of common_audit_data 2012-04-03 09:48:40 -07:00
.gitignore
apparmorfs.c
audit.c lsm_audit: don't specify the audit pre/post callbacks in 'struct common_audit_data' 2012-04-03 09:49:59 -07:00
capability.c LSM: shrink sizeof LSM specific portion of common_audit_data 2012-04-03 09:48:40 -07:00
context.c
domain.c Fix execve behavior apparmor for PR_{GET,SET}_NO_NEW_PRIVS 2014-10-31 19:46:09 -07:00
file.c LSM: shrink sizeof LSM specific portion of common_audit_data 2012-04-03 09:48:40 -07:00
ipc.c LSM: shrink sizeof LSM specific portion of common_audit_data 2012-04-03 09:48:40 -07:00
Kconfig
lib.c LSM: shrink sizeof LSM specific portion of common_audit_data 2012-04-03 09:48:40 -07:00
lsm.c LSM: shrink sizeof LSM specific portion of common_audit_data 2012-04-03 09:48:40 -07:00
Makefile
match.c
path.c
policy.c LSM: shrink sizeof LSM specific portion of common_audit_data 2012-04-03 09:48:40 -07:00
policy_unpack.c LSM: shrink sizeof LSM specific portion of common_audit_data 2012-04-03 09:48:40 -07:00
procattr.c
resource.c LSM: shrink sizeof LSM specific portion of common_audit_data 2012-04-03 09:48:40 -07:00
sid.c