[apparmor] [PATCH] apparmor: remove redundant perms.allow MAY_EXEC bitflag set
Ryan Lee
ryan.lee at canonical.com
Mon Jun 23 21:58:00 UTC 2025
This section of profile_transition that occurs after x_to_label only
happens if perms.allow already has the MAY_EXEC bit set, so we don't need
to set it again.
Fixes: 16916b17b4f8 ("apparmor: force auditing of conflicting attachment execs from confined")
Signed-off-by: Ryan Lee <ryan.lee at canonical.com>
---
This is a follow-up to the patch sent here:
https://lists.ubuntu.com/archives/apparmor/2025-May/013613.html
The original patch I sent contained a missing braces typo that was fixed
in the version of the patch that was actually applied, but the applied
version still has the redundant bitflag set operation.
security/apparmor/domain.c | 4 +---
1 file changed, 1 insertion(+), 3 deletions(-)
diff --git a/security/apparmor/domain.c b/security/apparmor/domain.c
index f9370a63a83c..d689597f253b 100644
--- a/security/apparmor/domain.c
+++ b/security/apparmor/domain.c
@@ -734,10 +734,8 @@ static struct aa_label *profile_transition(const struct cred *subj_cred,
* we don't need to care about clobbering it
*/
if (info == CONFLICTING_ATTACH_STR_IX
- || info == CONFLICTING_ATTACH_STR_UX) {
+ || info == CONFLICTING_ATTACH_STR_UX)
perms.audit |= MAY_EXEC;
- perms.allow |= MAY_EXEC;
- }
/* hack ix fallback - improve how this is detected */
goto audit;
} else if (!new) {
base-commit: 1fdb22c54a5f64fb9c8a78b0dc36afea87245c15
--
2.43.0
More information about the AppArmor
mailing list