Lines Matching full:profile
53 * @new: profile if it has been allocated (MAYBE NULL)
54 * @ns_name: name of the ns the profile is to be loaded to (MAY BE NULL)
55 * @name: name of the profile being manipulated (MAYBE NULL)
66 struct aa_profile *profile = labels_profile(aa_current_raw_label()); in audit_iface() local
78 return aa_audit(AUDIT_APPARMOR_STATUS, profile, &ad, audit_cb); in audit_iface()
453 * unpack_trans_table - unpack a profile transition table
534 static bool unpack_xattrs(struct aa_ext *e, struct aa_profile *profile) in unpack_xattrs() argument
544 profile->attach.xattr_count = size; in unpack_xattrs()
545 profile->attach.xattrs = kcalloc(size, sizeof(char *), GFP_KERNEL); in unpack_xattrs()
546 if (!profile->attach.xattrs) in unpack_xattrs()
549 if (!aa_unpack_strdup(e, &profile->attach.xattrs[i], NULL)) in unpack_xattrs()
779 *info = "failed to unpack profile transition table"; in unpack_pdb()
814 * unpack_profile - unpack a serialized profile
818 * NOTE: unpack profile sets audit struct if there is a failure
823 struct aa_profile *profile = NULL; in unpack_profile() local
825 const char *info = "failed to unpack profile"; in unpack_profile()
837 if (!aa_unpack_nameX(e, AA_STRUCT, "profile")) in unpack_profile()
847 info = "empty profile name"; in unpack_profile()
859 profile = aa_alloc_profile(name, NULL, GFP_KERNEL); in unpack_profile()
860 if (!profile) { in unpack_profile()
865 rules = list_first_entry(&profile->rules, typeof(*rules), list); in unpack_profile()
867 /* profile renaming is optional */ in unpack_profile()
868 (void) aa_unpack_str(e, &profile->rename, "rename"); in unpack_profile()
871 (void) aa_unpack_str(e, &profile->attach.xmatch_str, "attach"); in unpack_profile()
874 error = unpack_pdb(e, &profile->attach.xmatch, false, false, &info); in unpack_profile()
881 if (profile->attach.xmatch->dfa) { in unpack_profile()
886 profile->attach.xmatch_len = tmp; in unpack_profile()
887 profile->attach.xmatch->start[AA_CLASS_XMATCH] = DFA_START; in unpack_profile()
888 if (!profile->attach.xmatch->perms) { in unpack_profile()
889 error = aa_compat_map_xmatch(profile->attach.xmatch); in unpack_profile()
899 profile->disconnected = disconnected; in unpack_profile()
901 /* per profile debug flags (complain, audit) */ in unpack_profile()
903 info = "profile missing flags"; in unpack_profile()
906 info = "failed to unpack profile flags"; in unpack_profile()
910 profile->label.flags |= FLAG_HAT; in unpack_profile()
912 profile->label.flags |= FLAG_DEBUG1; in unpack_profile()
914 profile->label.flags |= FLAG_DEBUG2; in unpack_profile()
918 profile->mode = APPARMOR_COMPLAIN; in unpack_profile()
920 profile->mode = APPARMOR_ENFORCE; in unpack_profile()
922 profile->mode = APPARMOR_KILL; in unpack_profile()
924 profile->mode = APPARMOR_UNCONFINED; in unpack_profile()
925 profile->label.flags |= FLAG_UNCONFINED; in unpack_profile()
927 profile->mode = APPARMOR_USER; in unpack_profile()
934 profile->audit = AUDIT_ALL; in unpack_profile()
940 if (aa_unpack_u32(e, &profile->path_flags, "path_flags")) in unpack_profile()
941 profile->path_flags |= profile->label.flags & in unpack_profile()
945 profile->path_flags = PATH_MEDIATE_DELETED; in unpack_profile()
947 info = "failed to unpack profile capabilities"; in unpack_profile()
957 info = "failed to unpack upper profile capabilities"; in unpack_profile()
972 info = "failed to unpack extended profile capabilities"; in unpack_profile()
983 if (!unpack_xattrs(e, profile)) { in unpack_profile()
984 info = "failed to unpack profile xattrs"; in unpack_profile()
989 info = "failed to unpack profile rlimits"; in unpack_profile()
994 info = "failed to unpack profile secmark rules"; in unpack_profile()
1048 profile->data = kzalloc(sizeof(*profile->data), GFP_KERNEL); in unpack_profile()
1049 if (!profile->data) { in unpack_profile()
1060 if (rhashtable_init(profile->data, ¶ms)) { in unpack_profile()
1083 if (rhashtable_insert_fast(profile->data, &data->head, in unpack_profile()
1084 profile->data->p)) { in unpack_profile()
1100 info = "failed to unpack end of profile"; in unpack_profile()
1104 return profile; in unpack_profile()
1114 if (profile) in unpack_profile()
1118 audit_iface(profile, NULL, name, info, e, error); in unpack_profile()
1119 aa_free_profile(profile); in unpack_profile()
1141 audit_iface(NULL, NULL, NULL, "invalid profile format", in verify_header()
1237 * verify_profile - Do post unpack analysis to verify profile consistency
1238 * @profile: profile to verify (NOT NULL)
1244 static int verify_profile(struct aa_profile *profile) in verify_profile() argument
1246 struct aa_ruleset *rules = list_first_entry(&profile->rules, in verify_profile()
1253 audit_iface(profile, NULL, NULL, in verify_profile()
1260 audit_iface(profile, NULL, NULL, in verify_profile()
1267 audit_iface(profile, NULL, NULL, in verify_profile()
1272 audit_iface(profile, NULL, NULL, in verify_profile()
1276 if (!verify_perms(profile->attach.xmatch)) { in verify_profile()
1277 audit_iface(profile, NULL, NULL, in verify_profile()
1402 * aa_unpack - unpack packed binary profile(s) data loaded from user space
1405 * @ns: Returns namespace profile is in if specified else NULL (NOT NULL)
1407 * Unpack user data and return refcounted allocated profile(s) stored in
1411 * Returns: profile(s) on @lh else error pointer if fails to unpack
1417 struct aa_profile *profile = NULL; in aa_unpack() local
1434 profile = unpack_profile(&e, &ns_name); in aa_unpack()
1435 if (IS_ERR(profile)) { in aa_unpack()
1436 error = PTR_ERR(profile); in aa_unpack()
1440 error = verify_profile(profile); in aa_unpack()
1445 error = aa_calc_profile_hash(profile, e.version, start, in aa_unpack()
1456 ent->new = profile; in aa_unpack()
1480 aa_put_profile(profile); in aa_unpack()