Lines Matching full:rules
565 static bool unpack_secmark(struct aa_ext *e, struct aa_ruleset *rules) in unpack_secmark() argument
575 rules->secmark = kcalloc(size, sizeof(struct aa_secmark), in unpack_secmark()
577 if (!rules->secmark) in unpack_secmark()
580 rules->secmark_count = size; in unpack_secmark()
583 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark()
585 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark()
587 if (!aa_unpack_strdup(e, &rules->secmark[i].label, NULL)) in unpack_secmark()
599 if (rules->secmark) { in unpack_secmark()
601 kfree(rules->secmark[i].label); in unpack_secmark()
602 kfree(rules->secmark); in unpack_secmark()
603 rules->secmark_count = 0; in unpack_secmark()
604 rules->secmark = NULL; in unpack_secmark()
611 static bool unpack_rlimits(struct aa_ext *e, struct aa_ruleset *rules) in unpack_rlimits() argument
622 rules->rlimits.mask = tmp; in unpack_rlimits()
632 rules->rlimits.limits[a].rlim_max = tmp2; in unpack_rlimits()
822 struct aa_ruleset *rules; in unpack_profile() local
865 rules = list_first_entry(&profile->rules, typeof(*rules), list); in unpack_profile()
948 if (!aa_unpack_cap_low(e, &rules->caps.allow, NULL)) in unpack_profile()
950 if (!aa_unpack_cap_low(e, &rules->caps.audit, NULL)) in unpack_profile()
952 if (!aa_unpack_cap_low(e, &rules->caps.quiet, NULL)) in unpack_profile()
960 if (!aa_unpack_cap_high(e, &rules->caps.allow, NULL)) in unpack_profile()
962 if (!aa_unpack_cap_high(e, &rules->caps.audit, NULL)) in unpack_profile()
964 if (!aa_unpack_cap_high(e, &rules->caps.quiet, NULL)) in unpack_profile()
975 if (!aa_unpack_cap_low(e, &rules->caps.extended, NULL)) in unpack_profile()
977 if (!aa_unpack_cap_high(e, &rules->caps.extended, NULL)) in unpack_profile()
988 if (!unpack_rlimits(e, rules)) { in unpack_profile()
993 if (!unpack_secmark(e, rules)) { in unpack_profile()
994 info = "failed to unpack profile secmark rules"; in unpack_profile()
1001 error = unpack_pdb(e, &rules->policy, true, false, in unpack_profile()
1006 if (aa_dfa_next(rules->policy->dfa, rules->policy->start[0], in unpack_profile()
1008 rules->policy->start[AA_CLASS_FILE] = in unpack_profile()
1009 aa_dfa_next(rules->policy->dfa, in unpack_profile()
1010 rules->policy->start[0], in unpack_profile()
1014 if (!rules->policy->perms) { in unpack_profile()
1015 error = aa_compat_map_policy(rules->policy, in unpack_profile()
1023 rules->policy = aa_get_pdb(nullpdb); in unpack_profile()
1025 /* get file rules */ in unpack_profile()
1026 error = unpack_pdb(e, &rules->file, false, true, &info); in unpack_profile()
1029 } else if (rules->file->dfa) { in unpack_profile()
1030 if (!rules->file->perms) { in unpack_profile()
1031 error = aa_compat_map_file(rules->file); in unpack_profile()
1037 } else if (rules->policy->dfa && in unpack_profile()
1038 rules->policy->start[AA_CLASS_FILE]) { in unpack_profile()
1039 aa_put_pdb(rules->file); in unpack_profile()
1040 rules->file = aa_get_pdb(rules->policy); in unpack_profile()
1042 aa_put_pdb(rules->file); in unpack_profile()
1043 rules->file = aa_get_pdb(nullpdb); in unpack_profile()
1246 struct aa_ruleset *rules = list_first_entry(&profile->rules, in verify_profile() local
1247 typeof(*rules), list); in verify_profile()
1248 if (!rules) in verify_profile()
1251 if (rules->file->dfa && !verify_dfa_accept_index(rules->file->dfa, in verify_profile()
1252 rules->file->size)) { in verify_profile()
1258 if (rules->policy->dfa && in verify_profile()
1259 !verify_dfa_accept_index(rules->policy->dfa, rules->policy->size)) { in verify_profile()
1266 if (!verify_perms(rules->file)) { in verify_profile()
1271 if (!verify_perms(rules->policy)) { in verify_profile()