Function report |
Source Code:security\apparmor\lib.c |
Create Date:2022-07-28 19:50:57 |
Last Modify:2020-03-12 14:18:49 | Copyright©Brick |
home page | Tree |
Annotation kernel can get tool activity | Download SCCT | Chinese |
Name:aa_apply_modes_to_perms - apply namespace and profile flags to perms*@profile: that perms where computed from*@perms: perms to apply mode modifiers to* TODO: split into profile and ns based flags for when accumulating perms
Proto:void aa_apply_modes_to_perms(struct aa_profile *profile, struct aa_perms *perms)
Type:void
Parameter:
Type | Parameter | Name |
---|---|---|
struct aa_profile * | profile | |
struct aa_perms * | perms |
293 | Case AUDIT_MODE(profile) == AUDIT_ALL |
296 | Case AUDIT_MODE(profile) == do not quiet audit messages |
297 | set only when ~allow | deny = 0 |
298 | Break |
299 | Case AUDIT_MODE(profile) == quiet all messages |
300 | set only when allow is set = 0 |
302 | Case AUDIT_MODE(profile) == quiet all denied access messages |
304 | Break |
307 | If KILL_MODE(profile) Then set only when ~allow | deny = ALL_PERMS_MASK |
309 | Else if COMPLAIN_MODE(profile) Then accumulates only used when ~allow & ~deny = ALL_PERMS_MASK |
Name | Describe |
---|---|
profile_ptrace_perm | TODO: conditionals |
profile_signal_perm | |
aa_profile_label_perm | rrently unused |
label_compound_match | label_compound_match - find perms for full compound label*@profile: profile to find perms for*@label: label to check access permissions for*@stack: whether this is a stacking request*@start: state to start match in*@subns: whether to do permission checks |
label_components_match | label_components_match - find perms for all subcomponents of a label*@profile: profile to find perms for*@label: label to check access permissions for*@stack: whether this is a stacking request*@start: state to start match in*@subns: whether to do |
label_compound_match | label_compound_match - find perms for full compound label*@profile: profile to find perms for*@label: label to check access permissions for*@start: state to start match in*@subns: whether to do permission checks on components in a subns*@request: |
label_components_match | label_components_match - find perms for all subcomponents of a label*@profile: profile to find perms for*@label: label to check access permissions for*@start: state to start match in*@subns: whether to do permission checks on components in a |
aa_profile_af_perm | Generic af perm |
profile_query_cb |
Source code conversion tool public plug-in interface | X |
---|---|
Support c/c++/esqlc/java Oracle/Informix/Mysql Plug-in can realize: logical Report Code generation and batch code conversion |