函数逻辑报告

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\apparmor\lib.c Create Date:2022-07-27 21:27:48
Last Modify:2020-03-12 14:18:49 Copyright©Brick
首页 函数Tree
注解内核,赢得工具下载SCCTEnglish

函数名称:aa_apply_modes_to_perms - apply namespace and profile flags to perms*@profile: that perms where computed from*@perms: perms to apply mode modifiers to* TODO: split into profile and ns based flags for when accumulating perms

函数原型:void aa_apply_modes_to_perms(struct aa_profile *profile, struct aa_perms *perms)

返回类型:void

参数:

类型参数名称
struct aa_profile *profile
struct aa_perms *perms
293  :AUDIT_MODE(profile)恒等于AUDIT_ALL
294  set only when allow is set 等于ALL_PERMS_MASK
296  :AUDIT_MODE(profile)恒等于 do not quiet audit messages
297  set only when ~allow | deny 等于0
298  退出
299  :AUDIT_MODE(profile)恒等于 quiet all messages
300  set only when allow is set 等于0
302  :AUDIT_MODE(profile)恒等于 quiet all denied access messages
303  set only when ~allow | deny 等于ALL_PERMS_MASK
304  退出
307  如果KILL_MODE(profile)则 set only when ~allow | deny 等于ALL_PERMS_MASK
309  否则如果COMPLAIN_MODE(profile)则 accumulates only used when ~allow & ~deny 等于ALL_PERMS_MASK
调用者
名称描述
profile_ptrace_permTODO: conditionals
profile_signal_perm
aa_profile_label_permrrently unused
label_compound_matchlabel_compound_match - find perms for full compound label*@profile: profile to find perms for*@label: label to check access permissions for*@stack: whether this is a stacking request*@start: state to start match in*@subns: whether to do permission checks
label_components_matchlabel_components_match - find perms for all subcomponents of a label*@profile: profile to find perms for*@label: label to check access permissions for*@stack: whether this is a stacking request*@start: state to start match in*@subns: whether to do
label_compound_matchlabel_compound_match - find perms for full compound label*@profile: profile to find perms for*@label: label to check access permissions for*@start: state to start match in*@subns: whether to do permission checks on components in a subns*@request:
label_components_matchlabel_components_match - find perms for all subcomponents of a label*@profile: profile to find perms for*@label: label to check access permissions for*@start: state to start match in*@subns: whether to do permission checks on components in a
aa_profile_af_permGeneric af perm
profile_query_cb