lib.c (bf690f59d0429c62de4db1234f16557eedcb39bf) lib.c (33fc95d8293cfca352ac875668857293e22d7d51)
1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * AppArmor security module
4 *
5 * This file contains basic common functions used in AppArmor
6 *
7 * Copyright (C) 1998-2008 Novell/SUSE
8 * Copyright 2009-2010 Canonical Ltd.

--- 343 unchanged lines hidden (view full) ---

352 accum->prompt |= addend->prompt & ~accum->allow & ~accum->deny;
353 accum->subtree &= addend->subtree & ~accum->deny;
354}
355
356void aa_profile_match_label(struct aa_profile *profile, struct aa_label *label,
357 int type, u32 request, struct aa_perms *perms)
358{
359 /* TODO: doesn't yet handle extended types */
1// SPDX-License-Identifier: GPL-2.0-only
2/*
3 * AppArmor security module
4 *
5 * This file contains basic common functions used in AppArmor
6 *
7 * Copyright (C) 1998-2008 Novell/SUSE
8 * Copyright 2009-2010 Canonical Ltd.

--- 343 unchanged lines hidden (view full) ---

352 accum->prompt |= addend->prompt & ~accum->allow & ~accum->deny;
353 accum->subtree &= addend->subtree & ~accum->deny;
354}
355
356void aa_profile_match_label(struct aa_profile *profile, struct aa_label *label,
357 int type, u32 request, struct aa_perms *perms)
358{
359 /* TODO: doesn't yet handle extended types */
360 unsigned int state;
360 aa_state_t state;
361
362 state = aa_dfa_next(profile->policy.dfa,
363 profile->policy.start[AA_CLASS_LABEL],
364 type);
365 aa_label_match(profile, label, state, false, request, perms);
366}
367
368

--- 132 unchanged lines hidden ---
361
362 state = aa_dfa_next(profile->policy.dfa,
363 profile->policy.start[AA_CLASS_LABEL],
364 type);
365 aa_label_match(profile, label, state, false, request, perms);
366}
367
368

--- 132 unchanged lines hidden ---