1 /*
2  * AppArmor security module
3  *
4  * This file contains AppArmor basic global and lib definitions
5  *
6  * Copyright (C) 1998-2008 Novell/SUSE
7  * Copyright 2009-2010 Canonical Ltd.
8  *
9  * This program is free software; you can redistribute it and/or
10  * modify it under the terms of the GNU General Public License as
11  * published by the Free Software Foundation, version 2 of the
12  * License.
13  */
14 
15 #ifndef __APPARMOR_H
16 #define __APPARMOR_H
17 
18 #include <linux/slab.h>
19 #include <linux/fs.h>
20 
21 #include "match.h"
22 
23 /*
24  * Class of mediation types in the AppArmor policy db
25  */
26 #define AA_CLASS_ENTRY		0
27 #define AA_CLASS_UNKNOWN	1
28 #define AA_CLASS_FILE		2
29 #define AA_CLASS_CAP		3
30 #define AA_CLASS_NET		4
31 #define AA_CLASS_RLIMITS	5
32 #define AA_CLASS_DOMAIN		6
33 
34 #define AA_CLASS_LAST		AA_CLASS_DOMAIN
35 
36 /* Control parameters settable through module/boot flags */
37 extern enum audit_mode aa_g_audit;
38 extern bool aa_g_audit_header;
39 extern bool aa_g_debug;
40 extern bool aa_g_hash_policy;
41 extern bool aa_g_lock_policy;
42 extern bool aa_g_logsyscall;
43 extern bool aa_g_paranoid_load;
44 extern unsigned int aa_g_path_max;
45 
46 /*
47  * DEBUG remains global (no per profile flag) since it is mostly used in sysctl
48  * which is not related to profile accesses.
49  */
50 
51 #define AA_DEBUG(fmt, args...)						\
52 	do {								\
53 		if (aa_g_debug && printk_ratelimit())			\
54 			printk(KERN_DEBUG "AppArmor: " fmt, ##args);	\
55 	} while (0)
56 
57 #define AA_ERROR(fmt, args...)						\
58 	do {								\
59 		if (printk_ratelimit())					\
60 			printk(KERN_ERR "AppArmor: " fmt, ##args);	\
61 	} while (0)
62 
63 /* Flag indicating whether initialization completed */
64 extern int apparmor_initialized __initdata;
65 
66 /* fn's in lib */
67 char *aa_split_fqname(char *args, char **ns_name);
68 void aa_info_message(const char *str);
69 void *__aa_kvmalloc(size_t size, gfp_t flags);
70 
71 static inline void *kvmalloc(size_t size)
72 {
73 	return __aa_kvmalloc(size, 0);
74 }
75 
76 static inline void *kvzalloc(size_t size)
77 {
78 	return __aa_kvmalloc(size, __GFP_ZERO);
79 }
80 
81 /* returns 0 if kref not incremented */
82 static inline int kref_get_not0(struct kref *kref)
83 {
84 	return atomic_inc_not_zero(&kref->refcount);
85 }
86 
87 /**
88  * aa_strneq - compare null terminated @str to a non null terminated substring
89  * @str: a null terminated string
90  * @sub: a substring, not necessarily null terminated
91  * @len: length of @sub to compare
92  *
93  * The @str string must be full consumed for this to be considered a match
94  */
95 static inline bool aa_strneq(const char *str, const char *sub, int len)
96 {
97 	return !strncmp(str, sub, len) && !str[len];
98 }
99 
100 /**
101  * aa_dfa_null_transition - step to next state after null character
102  * @dfa: the dfa to match against
103  * @start: the state of the dfa to start matching in
104  *
105  * aa_dfa_null_transition transitions to the next state after a null
106  * character which is not used in standard matching and is only
107  * used to separate pairs.
108  */
109 static inline unsigned int aa_dfa_null_transition(struct aa_dfa *dfa,
110 						  unsigned int start)
111 {
112 	/* the null transition only needs the string's null terminator byte */
113 	return aa_dfa_next(dfa, start, 0);
114 }
115 
116 static inline bool mediated_filesystem(struct dentry *dentry)
117 {
118 	return !(dentry->d_sb->s_flags & MS_NOUSER);
119 }
120 
121 #endif /* __APPARMOR_H */
122