Function report |
Source Code:security\apparmor\include\label.h |
Create Date:2022-07-28 19:48:50 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:aa_put_label
Proto:static inline void aa_put_label(struct aa_label *l)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
struct aa_label * | l |
Name | Describe |
---|---|
query_data | query_data - queries a policy and writes its data to buf*@buf: the resulting data is stored here (NOT NULL)*@buf_len: size of buf*@query: query string used to retrieve data*@query_len: size of query including second NUL byte |
query_label | query_label - queries a label and writes permissions to buf*@buf: the resulting permissions string is stored here (NOT NULL)*@buf_len: size of buf*@query: binary query string to match against the dfa*@query_len: size of query*@view_only: only compute for |
seq_profile_name_show | |
seq_profile_mode_show | |
seq_profile_attach_show | |
seq_profile_hash_show | |
rawdata_get_link_base | |
aa_audit_rule_free | |
aa_replace_current_label | aa_replace_current_label - replace the current tasks label*@label: new label (NOT NULL)* Returns: 0 or error on failure |
aa_set_current_onexec | aa_set_current_onexec - set the tasks change_profile to happen onexec*@label: system label to set at exec (MAYBE NULL to clear value)*@stack: whether stacking should be done* Returns: 0 or error on failure |
aa_set_current_hat | aa_set_current_hat - set the current tasks hat*@label: label to set as the current hat (NOT NULL)*@token: token value that must be specified to change from the hat* Do switch of tasks hat |
aa_restore_previous_label | aa_restore_previous_label - exit from hat context restoring previous label*@token: the token that must be matched to exit hat context* Attempt to return out of a hat to the previous label |
may_change_ptraced_domain | may_change_ptraced_domain - check if can change profile on ptraced task*@to_label: profile to change to (NOT NULL)*@info: message if there is an error* Check if current is ptraced and if so if the tracing task is allowed* to trace the new domain* Returns: |
x_to_label | x_to_label - get target label for a given xindex*@profile: current profile (NOT NULL)*@bprm: binprm structure of transitioning task*@name: name to lookup (NOT NULL)*@xindex: index into x transition table*@lookupname: returns: name used in lookup if one |
profile_transition | |
apparmor_bprm_set_creds | apparmor_bprm_set_creds - set the new creds on the bprm struct*@bprm: binprm for the exec (NOT NULL)* Returns: %0 or error on failure* TODO: once the other paths are done see if we can't refactor into a fn |
aa_change_hat | aa_change_hat - change hat to/from subprofile*@hats: vector of hat names to try changing into (MAYBE NULL if @count == 0)*@count: number of hat names in @hats*@token: magic value to validate the hat change*@flags: flags affecting behavior of the change |
aa_change_profile | aa_change_profile - perform a one-way profile transition*@fqname: name of profile may include namespace (NOT NULL)*@onexec: whether this transition is to take place immediately or at exec*@flags: flags affecting change behavior |
__add_profile | __add_profile - add a profiles to list and label tree*@list: list to add it to (NOT NULL)*@profile: the profile to add (NOT NULL)* refcount @profile, should be put by __list_remove_profile* Requires: namespace lock be held, or list not be shared |
apparmor_cred_free | put the associated labels |
apparmor_ptrace_access_check | |
apparmor_ptrace_traceme | |
apparmor_capget | Derived from security/commoncap.c:cap_capget |
apparmor_capable | |
apparmor_file_open | |
apparmor_file_free_security | |
apparmor_sb_pivotroot | |
apparmor_getprocattr | |
apparmor_task_getsecid | |
apparmor_task_kill | |
apparmor_sk_free_security | apparmor_sk_free_security - free the sk_security field |
apparmor_socket_post_create | apparmor_socket_post_create - setup the per-socket security struct* Note:* - kernel sockets currently labeled unconfined but we may want to* move to a special kernel label* - socket may not have sk here if created with sock_create_lite or* sock_alloc |
aa_task_setrlimit | aa_task_setrlimit - test permission to set an rlimit*@label - label confining the task (NOT NULL)*@task - task the resource is being set on*@resource - the resource being set*@new_rlim - the new resource limit (NOT NULL) |
update_file_ctx | |
aa_file_perm | aa_file_perm - do permission revalidation check & audit for @file*@op: operation being checked*@label: label being enforced (NOT NULL)*@file: file to revalidate access permissions on (NOT NULL)*@request: requested permissions*@in_atomic: whether |
aa_inherit_files | ased on selinux's flush_unauthorized_files |
free_proxy | |
__aa_proxy_redirect | quires profile list write lock held |
label_free_or_put_new | |
aa_label_replace | aa_label_replace - replace a label @old with a new version @new*@old: label to replace*@new: label replacing @old* Returns: true if @old was in tree and replaced* else @old was not in tree, and @new was not inserted |
aa_label_find_merge | aa_label_find_merge - find label that is equiv to merge of @a and @b*@a: label to merge with @b (NOT NULL)*@b: label to merge with @a (NOT NULL)* Requires: labels be fully constructed with a valid ns* Returns: ref counted label that is equiv to merge of |
aa_label_merge | aa_label_merge - attempt to insert new merged label of @a and @b*@ls: set of labels to insert label into (NOT NULL)*@a: label to merge with @b (NOT NULL)*@b: label to merge with @a (NOT NULL)*@gfp: memory allocation type* Requires: caller to hold valid |
__labelset_update | __labelset_update - update labels in @ns*@ns: namespace to update labels in (NOT NULL)* Requires: @ns lock be held* Walk the labelset ensuring that all labels are up to date and valid* Any label that has a stale component is marked stale and replaced and |
aa_pivotroot |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |