Lines Matching full:profile
53 * @new: profile if it has been allocated (MAYBE NULL)
54 * @ns_name: name of the ns the profile is to be loaded to (MAY BE NULL)
55 * @name: name of the profile being manipulated (MAYBE NULL)
66 struct aa_profile *profile = labels_profile(aa_current_raw_label()); in audit_iface() local
78 return aa_audit(AUDIT_APPARMOR_STATUS, profile, &ad, audit_cb); in audit_iface()
453 * unpack_trans_table - unpack a profile transition table
534 static bool unpack_xattrs(struct aa_ext *e, struct aa_profile *profile) in unpack_xattrs() argument
544 profile->attach.xattr_count = size; in unpack_xattrs()
545 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs()
546 if (!profile->attach.xattrs) in unpack_xattrs()
549 if (!aa_unpack_strdup(e, &profile->attach.xattrs[i], NULL)) in unpack_xattrs()
766 *info = "failed to unpack profile transition table"; in unpack_pdb()
796 * unpack_profile - unpack a serialized profile
800 * NOTE: unpack profile sets audit struct if there is a failure
805 struct aa_profile *profile = NULL; in unpack_profile() local
807 const char *info = "failed to unpack profile"; in unpack_profile()
819 if (!aa_unpack_nameX(e, AA_STRUCT, "profile")) in unpack_profile()
829 info = "empty profile name"; in unpack_profile()
841 profile = aa_alloc_profile(name, NULL, GFP_KERNEL); in unpack_profile()
842 if (!profile) { in unpack_profile()
847 rules = list_first_entry(&profile->rules, typeof(*rules), list); in unpack_profile()
849 /* profile renaming is optional */ in unpack_profile()
850 (void) aa_unpack_str(e, &profile->rename, "rename"); in unpack_profile()
853 (void) aa_unpack_str(e, &profile->attach.xmatch_str, "attach"); in unpack_profile()
856 error = unpack_pdb(e, &profile->attach.xmatch, false, false, &info); in unpack_profile()
863 if (profile->attach.xmatch.dfa) { in unpack_profile()
868 profile->attach.xmatch_len = tmp; in unpack_profile()
869 profile->attach.xmatch.start[AA_CLASS_XMATCH] = DFA_START; in unpack_profile()
870 if (!profile->attach.xmatch.perms) { in unpack_profile()
871 error = aa_compat_map_xmatch(&profile->attach.xmatch); in unpack_profile()
881 profile->disconnected = disconnected; in unpack_profile()
883 /* per profile debug flags (complain, audit) */ in unpack_profile()
885 info = "profile missing flags"; in unpack_profile()
888 info = "failed to unpack profile flags"; in unpack_profile()
892 profile->label.flags |= FLAG_HAT; in unpack_profile()
894 profile->label.flags |= FLAG_DEBUG1; in unpack_profile()
896 profile->label.flags |= FLAG_DEBUG2; in unpack_profile()
900 profile->mode = APPARMOR_COMPLAIN; in unpack_profile()
902 profile->mode = APPARMOR_ENFORCE; in unpack_profile()
904 profile->mode = APPARMOR_KILL; in unpack_profile()
906 profile->mode = APPARMOR_UNCONFINED; in unpack_profile()
907 profile->label.flags |= FLAG_UNCONFINED; in unpack_profile()
909 profile->mode = APPARMOR_USER; in unpack_profile()
916 profile->audit = AUDIT_ALL; in unpack_profile()
922 if (aa_unpack_u32(e, &profile->path_flags, "path_flags")) in unpack_profile()
923 profile->path_flags |= profile->label.flags & in unpack_profile()
927 profile->path_flags = PATH_MEDIATE_DELETED; in unpack_profile()
929 info = "failed to unpack profile capabilities"; in unpack_profile()
939 info = "failed to unpack upper profile capabilities"; in unpack_profile()
954 info = "failed to unpack extended profile capabilities"; in unpack_profile()
965 if (!unpack_xattrs(e, profile)) { in unpack_profile()
966 info = "failed to unpack profile xattrs"; in unpack_profile()
971 info = "failed to unpack profile rlimits"; in unpack_profile()
976 info = "failed to unpack profile secmark rules"; in unpack_profile()
1047 profile->data = kzalloc(sizeof(*profile->data), GFP_KERNEL); in unpack_profile()
1048 if (!profile->data) { in unpack_profile()
1059 if (rhashtable_init(profile->data, ¶ms)) { in unpack_profile()
1082 if (rhashtable_insert_fast(profile->data, &data->head, in unpack_profile()
1083 profile->data->p)) { in unpack_profile()
1099 info = "failed to unpack end of profile"; in unpack_profile()
1103 return profile; in unpack_profile()
1113 if (profile) in unpack_profile()
1117 audit_iface(profile, NULL, name, info, e, error); in unpack_profile()
1118 aa_free_profile(profile); in unpack_profile()
1140 audit_iface(NULL, NULL, NULL, "invalid profile format", in verify_header()
1236 * verify_profile - Do post unpack analysis to verify profile consistency
1237 * @profile: profile to verify (NOT NULL)
1243 static int verify_profile(struct aa_profile *profile) in verify_profile() argument
1245 struct aa_ruleset *rules = list_first_entry(&profile->rules, in verify_profile()
1254 audit_iface(profile, NULL, NULL, in verify_profile()
1260 audit_iface(profile, NULL, NULL, in verify_profile()
1265 audit_iface(profile, NULL, NULL, in verify_profile()
1269 if (!verify_perms(&profile->attach.xmatch)) { in verify_profile()
1270 audit_iface(profile, NULL, NULL, in verify_profile()
1395 * aa_unpack - unpack packed binary profile(s) data loaded from user space
1398 * @ns: Returns namespace profile is in if specified else NULL (NOT NULL)
1400 * Unpack user data and return refcounted allocated profile(s) stored in
1404 * Returns: profile(s) on @lh else error pointer if fails to unpack
1410 struct aa_profile *profile = NULL; in aa_unpack() local
1427 profile = unpack_profile(&e, &ns_name); in aa_unpack()
1428 if (IS_ERR(profile)) { in aa_unpack()
1429 error = PTR_ERR(profile); in aa_unpack()
1433 error = verify_profile(profile); in aa_unpack()
1438 error = aa_calc_profile_hash(profile, e.version, start, in aa_unpack()
1449 ent->new = profile; in aa_unpack()
1473 aa_put_profile(profile); in aa_unpack()