Function report

Linux Kernel

v5.5.9

Brick Technologies Co., Ltd

Source Code:security\apparmor\lib.c Create Date:2022-07-28 19:50:57
Last Modify:2020-03-12 14:18:49 Copyright©Brick
home page Tree
Annotation kernel can get tool activityDownload SCCTChinese

Name:aa_apply_modes_to_perms - apply namespace and profile flags to perms*@profile: that perms where computed from*@perms: perms to apply mode modifiers to* TODO: split into profile and ns based flags for when accumulating perms

Proto:void aa_apply_modes_to_perms(struct aa_profile *profile, struct aa_perms *perms)

Type:void

Parameter:

TypeParameterName
struct aa_profile *profile
struct aa_perms *perms
293  Case AUDIT_MODE(profile) == AUDIT_ALL
294  set only when allow is set = ALL_PERMS_MASK
296  Case AUDIT_MODE(profile) == do not quiet audit messages
297  set only when ~allow | deny = 0
298  Break
299  Case AUDIT_MODE(profile) == quiet all messages
300  set only when allow is set = 0
302  Case AUDIT_MODE(profile) == quiet all denied access messages
303  set only when ~allow | deny = ALL_PERMS_MASK
304  Break
307  If KILL_MODE(profile) Then set only when ~allow | deny = ALL_PERMS_MASK
309  Else if COMPLAIN_MODE(profile) Then accumulates only used when ~allow & ~deny = ALL_PERMS_MASK
Caller
NameDescribe
profile_ptrace_permTODO: conditionals
profile_signal_perm
aa_profile_label_permrrently unused
label_compound_matchlabel_compound_match - find perms for full compound label*@profile: profile to find perms for*@label: label to check access permissions for*@stack: whether this is a stacking request*@start: state to start match in*@subns: whether to do permission checks
label_components_matchlabel_components_match - find perms for all subcomponents of a label*@profile: profile to find perms for*@label: label to check access permissions for*@stack: whether this is a stacking request*@start: state to start match in*@subns: whether to do
label_compound_matchlabel_compound_match - find perms for full compound label*@profile: profile to find perms for*@label: label to check access permissions for*@start: state to start match in*@subns: whether to do permission checks on components in a subns*@request:
label_components_matchlabel_components_match - find perms for all subcomponents of a label*@profile: profile to find perms for*@label: label to check access permissions for*@start: state to start match in*@subns: whether to do permission checks on components in a
aa_profile_af_permGeneric af perm
profile_query_cb