Lines Matching +full:0 +full:e
56 * @e: buffer position info
59 * Returns: %0 or error
62 const char *name, const char *info, struct aa_ext *e, in audit_iface() argument
67 if (e) in audit_iface()
68 aad(&sa)->iface.pos = e->pos - e->start; in audit_iface()
105 if (aa_g_hash_policy && memcmp(l->hash, r->hash, aa_hash_size()) != 0) in aa_rawdata_eq()
107 return memcmp(l->data, r->data, r->compressed_size ?: r->size) == 0; in aa_rawdata_eq()
161 VISIBLE_IF_KUNIT bool aa_inbounds(struct aa_ext *e, size_t size) in aa_inbounds() argument
163 return (size <= e->end - e->pos); in aa_inbounds()
169 * @e: serialized data read head (NOT NULL)
174 VISIBLE_IF_KUNIT size_t aa_unpack_u16_chunk(struct aa_ext *e, char **chunk) in aa_unpack_u16_chunk() argument
176 size_t size = 0; in aa_unpack_u16_chunk()
177 void *pos = e->pos; in aa_unpack_u16_chunk()
179 if (!aa_inbounds(e, sizeof(u16))) in aa_unpack_u16_chunk()
181 size = le16_to_cpu(get_unaligned((__le16 *) e->pos)); in aa_unpack_u16_chunk()
182 e->pos += sizeof(__le16); in aa_unpack_u16_chunk()
183 if (!aa_inbounds(e, size)) in aa_unpack_u16_chunk()
185 *chunk = e->pos; in aa_unpack_u16_chunk()
186 e->pos += size; in aa_unpack_u16_chunk()
190 e->pos = pos; in aa_unpack_u16_chunk()
191 return 0; in aa_unpack_u16_chunk()
196 VISIBLE_IF_KUNIT bool aa_unpack_X(struct aa_ext *e, enum aa_code code) in aa_unpack_X() argument
198 if (!aa_inbounds(e, 1)) in aa_unpack_X()
200 if (*(u8 *) e->pos != code) in aa_unpack_X()
202 e->pos++; in aa_unpack_X()
209 * @e: serialized data extent information (NOT NULL)
223 VISIBLE_IF_KUNIT bool aa_unpack_nameX(struct aa_ext *e, enum aa_code code, const char *name) in aa_unpack_nameX() argument
228 void *pos = e->pos; in aa_unpack_nameX()
233 if (aa_unpack_X(e, AA_NAME)) { in aa_unpack_nameX()
235 size_t size = aa_unpack_u16_chunk(e, &tag); in aa_unpack_nameX()
237 if (name && (!size || tag[size-1] != '\0' || strcmp(name, tag))) in aa_unpack_nameX()
245 if (aa_unpack_X(e, code)) in aa_unpack_nameX()
249 e->pos = pos; in aa_unpack_nameX()
254 static bool unpack_u8(struct aa_ext *e, u8 *data, const char *name) in unpack_u8() argument
256 void *pos = e->pos; in unpack_u8()
258 if (aa_unpack_nameX(e, AA_U8, name)) { in unpack_u8()
259 if (!aa_inbounds(e, sizeof(u8))) in unpack_u8()
262 *data = *((u8 *)e->pos); in unpack_u8()
263 e->pos += sizeof(u8); in unpack_u8()
268 e->pos = pos; in unpack_u8()
272 VISIBLE_IF_KUNIT bool aa_unpack_u32(struct aa_ext *e, u32 *data, const char *name) in aa_unpack_u32() argument
274 void *pos = e->pos; in aa_unpack_u32()
276 if (aa_unpack_nameX(e, AA_U32, name)) { in aa_unpack_u32()
277 if (!aa_inbounds(e, sizeof(u32))) in aa_unpack_u32()
280 *data = le32_to_cpu(get_unaligned((__le32 *) e->pos)); in aa_unpack_u32()
281 e->pos += sizeof(u32); in aa_unpack_u32()
286 e->pos = pos; in aa_unpack_u32()
291 VISIBLE_IF_KUNIT bool aa_unpack_u64(struct aa_ext *e, u64 *data, const char *name) in aa_unpack_u64() argument
293 void *pos = e->pos; in aa_unpack_u64()
295 if (aa_unpack_nameX(e, AA_U64, name)) { in aa_unpack_u64()
296 if (!aa_inbounds(e, sizeof(u64))) in aa_unpack_u64()
299 *data = le64_to_cpu(get_unaligned((__le64 *) e->pos)); in aa_unpack_u64()
300 e->pos += sizeof(u64); in aa_unpack_u64()
305 e->pos = pos; in aa_unpack_u64()
310 static bool aa_unpack_cap_low(struct aa_ext *e, kernel_cap_t *data, const char *name) in aa_unpack_cap_low() argument
314 if (!aa_unpack_u32(e, &val, name)) in aa_unpack_cap_low()
320 static bool aa_unpack_cap_high(struct aa_ext *e, kernel_cap_t *data, const char *name) in aa_unpack_cap_high() argument
324 if (!aa_unpack_u32(e, &val, name)) in aa_unpack_cap_high()
330 VISIBLE_IF_KUNIT bool aa_unpack_array(struct aa_ext *e, const char *name, u16 *size) in aa_unpack_array() argument
332 void *pos = e->pos; in aa_unpack_array()
334 if (aa_unpack_nameX(e, AA_ARRAY, name)) { in aa_unpack_array()
335 if (!aa_inbounds(e, sizeof(u16))) in aa_unpack_array()
337 *size = le16_to_cpu(get_unaligned((__le16 *) e->pos)); in aa_unpack_array()
338 e->pos += sizeof(u16); in aa_unpack_array()
343 e->pos = pos; in aa_unpack_array()
348 VISIBLE_IF_KUNIT size_t aa_unpack_blob(struct aa_ext *e, char **blob, const char *name) in aa_unpack_blob() argument
350 void *pos = e->pos; in aa_unpack_blob()
352 if (aa_unpack_nameX(e, AA_BLOB, name)) { in aa_unpack_blob()
354 if (!aa_inbounds(e, sizeof(u32))) in aa_unpack_blob()
356 size = le32_to_cpu(get_unaligned((__le32 *) e->pos)); in aa_unpack_blob()
357 e->pos += sizeof(u32); in aa_unpack_blob()
358 if (aa_inbounds(e, (size_t) size)) { in aa_unpack_blob()
359 *blob = e->pos; in aa_unpack_blob()
360 e->pos += size; in aa_unpack_blob()
366 e->pos = pos; in aa_unpack_blob()
367 return 0; in aa_unpack_blob()
371 VISIBLE_IF_KUNIT int aa_unpack_str(struct aa_ext *e, const char **string, const char *name) in aa_unpack_str() argument
374 size_t size = 0; in aa_unpack_str()
375 void *pos = e->pos; in aa_unpack_str()
377 if (aa_unpack_nameX(e, AA_STRING, name)) { in aa_unpack_str()
378 size = aa_unpack_u16_chunk(e, &src_str); in aa_unpack_str()
381 if (src_str[size - 1] != 0) in aa_unpack_str()
390 e->pos = pos; in aa_unpack_str()
391 return 0; in aa_unpack_str()
395 VISIBLE_IF_KUNIT int aa_unpack_strdup(struct aa_ext *e, char **string, const char *name) in aa_unpack_strdup() argument
398 void *pos = e->pos; in aa_unpack_strdup()
399 int res = aa_unpack_str(e, &tmp, name); in aa_unpack_strdup()
403 return 0; in aa_unpack_strdup()
407 e->pos = pos; in aa_unpack_strdup()
408 return 0; in aa_unpack_strdup()
418 * @e: serialized data extent information (NOT NULL)
423 static struct aa_dfa *unpack_dfa(struct aa_ext *e, int flags) in unpack_dfa() argument
429 size = aa_unpack_blob(e, &blob, "aadfa"); in unpack_dfa()
436 size_t sz = blob - (char *) e->start - in unpack_dfa()
437 ((e->pos - e->start) & 7); in unpack_dfa()
453 * @e: serialized data extent information (NOT NULL)
458 static bool unpack_trans_table(struct aa_ext *e, struct aa_str_table *strs) in unpack_trans_table() argument
460 void *saved_pos = e->pos; in unpack_trans_table()
464 if (aa_unpack_nameX(e, AA_STRUCT, "xtable")) { in unpack_trans_table()
468 if (!aa_unpack_array(e, NULL, &size)) in unpack_trans_table()
480 for (i = 0; i < size; i++) { in unpack_trans_table()
482 int c, j, pos, size2 = aa_unpack_strdup(e, &str, NULL); in unpack_trans_table()
493 /* count internal # of internal \0 */ in unpack_trans_table()
494 for (c = j = 0; j < size2 - 1; j++) { in unpack_trans_table()
504 /* beginning with : requires an embedded \0, in unpack_trans_table()
505 * verify that exactly 1 internal \0 exists in unpack_trans_table()
506 * trailing \0 already verified by aa_unpack_strdup in unpack_trans_table()
508 * convert \0 back to : for label_parse in unpack_trans_table()
515 /* fail - all other cases with embedded \0 */ in unpack_trans_table()
518 if (!aa_unpack_nameX(e, AA_ARRAYEND, NULL)) in unpack_trans_table()
520 if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) in unpack_trans_table()
530 e->pos = saved_pos; in unpack_trans_table()
534 static bool unpack_xattrs(struct aa_ext *e, struct aa_profile *profile) in unpack_xattrs() argument
536 void *pos = e->pos; in unpack_xattrs()
538 if (aa_unpack_nameX(e, AA_STRUCT, "xattrs")) { in unpack_xattrs()
542 if (!aa_unpack_array(e, NULL, &size)) in unpack_xattrs()
548 for (i = 0; i < size; i++) { in unpack_xattrs()
549 if (!aa_unpack_strdup(e, &profile->attach.xattrs[i], NULL)) in unpack_xattrs()
552 if (!aa_unpack_nameX(e, AA_ARRAYEND, NULL)) in unpack_xattrs()
554 if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) in unpack_xattrs()
561 e->pos = pos; in unpack_xattrs()
565 static bool unpack_secmark(struct aa_ext *e, struct aa_ruleset *rules) in unpack_secmark() argument
567 void *pos = e->pos; in unpack_secmark()
571 if (aa_unpack_nameX(e, AA_STRUCT, "secmark")) { in unpack_secmark()
572 if (!aa_unpack_array(e, NULL, &size)) in unpack_secmark()
582 for (i = 0; i < size; i++) { in unpack_secmark()
583 if (!unpack_u8(e, &rules->secmark[i].audit, NULL)) in unpack_secmark()
585 if (!unpack_u8(e, &rules->secmark[i].deny, NULL)) in unpack_secmark()
587 if (!aa_unpack_strdup(e, &rules->secmark[i].label, NULL)) in unpack_secmark()
590 if (!aa_unpack_nameX(e, AA_ARRAYEND, NULL)) in unpack_secmark()
592 if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) in unpack_secmark()
600 for (i = 0; i < size; i++) in unpack_secmark()
603 rules->secmark_count = 0; in unpack_secmark()
607 e->pos = pos; in unpack_secmark()
611 static bool unpack_rlimits(struct aa_ext *e, struct aa_ruleset *rules) in unpack_rlimits() argument
613 void *pos = e->pos; in unpack_rlimits()
616 if (aa_unpack_nameX(e, AA_STRUCT, "rlimits")) { in unpack_rlimits()
619 u32 tmp = 0; in unpack_rlimits()
620 if (!aa_unpack_u32(e, &tmp, NULL)) in unpack_rlimits()
624 if (!aa_unpack_array(e, NULL, &size) || in unpack_rlimits()
627 for (i = 0; i < size; i++) { in unpack_rlimits()
628 u64 tmp2 = 0; in unpack_rlimits()
630 if (!aa_unpack_u64(e, &tmp2, NULL)) in unpack_rlimits()
634 if (!aa_unpack_nameX(e, AA_ARRAYEND, NULL)) in unpack_rlimits()
636 if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) in unpack_rlimits()
642 e->pos = pos; in unpack_rlimits()
646 static bool unpack_perm(struct aa_ext *e, u32 version, struct aa_perms *perm) in unpack_perm() argument
651 return aa_unpack_u32(e, &perm->allow, NULL) && in unpack_perm()
652 aa_unpack_u32(e, &perm->allow, NULL) && in unpack_perm()
653 aa_unpack_u32(e, &perm->deny, NULL) && in unpack_perm()
654 aa_unpack_u32(e, &perm->subtree, NULL) && in unpack_perm()
655 aa_unpack_u32(e, &perm->cond, NULL) && in unpack_perm()
656 aa_unpack_u32(e, &perm->kill, NULL) && in unpack_perm()
657 aa_unpack_u32(e, &perm->complain, NULL) && in unpack_perm()
658 aa_unpack_u32(e, &perm->prompt, NULL) && in unpack_perm()
659 aa_unpack_u32(e, &perm->audit, NULL) && in unpack_perm()
660 aa_unpack_u32(e, &perm->quiet, NULL) && in unpack_perm()
661 aa_unpack_u32(e, &perm->hide, NULL) && in unpack_perm()
662 aa_unpack_u32(e, &perm->xindex, NULL) && in unpack_perm()
663 aa_unpack_u32(e, &perm->tag, NULL) && in unpack_perm()
664 aa_unpack_u32(e, &perm->label, NULL); in unpack_perm()
667 static ssize_t unpack_perms_table(struct aa_ext *e, struct aa_perms **perms) in unpack_perms_table() argument
669 void *pos = e->pos; in unpack_perms_table()
670 u16 size = 0; in unpack_perms_table()
677 if (aa_unpack_nameX(e, AA_STRUCT, "perms")) { in unpack_perms_table()
681 if (!aa_unpack_u32(e, &version, "version")) in unpack_perms_table()
683 if (!aa_unpack_array(e, NULL, &size)) in unpack_perms_table()
688 for (i = 0; i < size; i++) { in unpack_perms_table()
689 if (!unpack_perm(e, version, &(*perms)[i])) in unpack_perms_table()
692 if (!aa_unpack_nameX(e, AA_ARRAYEND, NULL)) in unpack_perms_table()
694 if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) in unpack_perms_table()
704 e->pos = pos; in unpack_perms_table()
708 static int unpack_pdb(struct aa_ext *e, struct aa_policydb *policy, in unpack_pdb() argument
712 void *pos = e->pos; in unpack_pdb()
716 size = unpack_perms_table(e, &policy->perms); in unpack_pdb()
717 if (size < 0) { in unpack_pdb()
734 policy->dfa = unpack_dfa(e, flags); in unpack_pdb()
754 if (!aa_unpack_u32(e, &policy->start[0], "start")) in unpack_pdb()
756 policy->start[0] = DFA_START; in unpack_pdb()
757 if (!aa_unpack_u32(e, &policy->start[AA_CLASS_FILE], "dfa_start")) { in unpack_pdb()
762 policy->start[i] = aa_dfa_next(policy->dfa, policy->start[0], in unpack_pdb()
765 if (!unpack_trans_table(e, &policy->trans) && required_trans) { in unpack_pdb()
773 return 0; in unpack_pdb()
776 e->pos = pos; in unpack_pdb()
797 * @e: serialized data extent information (NOT NULL)
802 static struct aa_profile *unpack_profile(struct aa_ext *e, char **ns_name) in unpack_profile() argument
809 struct rhashtable_params params = { 0 }; in unpack_profile()
819 if (!aa_unpack_nameX(e, AA_STRUCT, "profile")) in unpack_profile()
821 if (!aa_unpack_str(e, &name, NULL)) in unpack_profile()
823 if (*name == '\0') in unpack_profile()
846 (void) aa_unpack_str(e, &profile->rename, "rename"); in unpack_profile()
849 (void) aa_unpack_str(e, &profile->attach.xmatch_str, "attach"); in unpack_profile()
852 error = unpack_pdb(e, &profile->attach.xmatch, false, false, &info); in unpack_profile()
860 if (!aa_unpack_u32(e, &tmp, NULL)) { in unpack_profile()
876 (void) aa_unpack_str(e, &profile->disconnected, "disconnected"); in unpack_profile()
879 if (!aa_unpack_nameX(e, AA_STRUCT, "flags")) { in unpack_profile()
884 if (!aa_unpack_u32(e, &tmp, NULL)) in unpack_profile()
892 if (!aa_unpack_u32(e, &tmp, NULL)) in unpack_profile()
894 if (tmp == PACKED_MODE_COMPLAIN || (e->version & FORCE_COMPLAIN_FLAG)) { in unpack_profile()
908 if (!aa_unpack_u32(e, &tmp, NULL)) in unpack_profile()
913 if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) in unpack_profile()
917 if (aa_unpack_u32(e, &profile->path_flags, "path_flags")) in unpack_profile()
925 if (!aa_unpack_cap_low(e, &rules->caps.allow, NULL)) in unpack_profile()
927 if (!aa_unpack_cap_low(e, &rules->caps.audit, NULL)) in unpack_profile()
929 if (!aa_unpack_cap_low(e, &rules->caps.quiet, NULL)) in unpack_profile()
931 if (!aa_unpack_cap_low(e, &tmpcap, NULL)) in unpack_profile()
935 if (aa_unpack_nameX(e, AA_STRUCT, "caps64")) { in unpack_profile()
937 if (!aa_unpack_cap_high(e, &rules->caps.allow, NULL)) in unpack_profile()
939 if (!aa_unpack_cap_high(e, &rules->caps.audit, NULL)) in unpack_profile()
941 if (!aa_unpack_cap_high(e, &rules->caps.quiet, NULL)) in unpack_profile()
943 if (!aa_unpack_cap_high(e, &tmpcap, NULL)) in unpack_profile()
945 if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) in unpack_profile()
950 if (aa_unpack_nameX(e, AA_STRUCT, "capsx")) { in unpack_profile()
952 if (!aa_unpack_cap_low(e, &rules->caps.extended, NULL)) in unpack_profile()
954 if (!aa_unpack_cap_high(e, &rules->caps.extended, NULL)) in unpack_profile()
956 if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) in unpack_profile()
960 if (!unpack_xattrs(e, profile)) { in unpack_profile()
965 if (!unpack_rlimits(e, rules)) { in unpack_profile()
970 if (!unpack_secmark(e, rules)) { in unpack_profile()
975 if (aa_unpack_nameX(e, AA_STRUCT, "policydb")) { in unpack_profile()
978 error = unpack_pdb(e, &rules->policy, true, false, in unpack_profile()
983 if (aa_dfa_next(rules->policy.dfa, rules->policy.start[0], in unpack_profile()
987 rules->policy.start[0], in unpack_profile()
989 if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) in unpack_profile()
993 e->version); in unpack_profile()
1008 error = unpack_pdb(e, &rules->file, false, true, &info); in unpack_profile()
1040 if (aa_unpack_nameX(e, AA_STRUCT, "data")) { in unpack_profile()
1059 while (aa_unpack_strdup(e, &key, NULL)) { in unpack_profile()
1068 data->size = aa_unpack_blob(e, &data->data, NULL); in unpack_profile()
1086 if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) { in unpack_profile()
1092 if (!aa_unpack_nameX(e, AA_STRUCTEND, NULL)) { in unpack_profile()
1100 if (error == 0) in unpack_profile()
1111 audit_iface(profile, NULL, name, info, e, error); in unpack_profile()
1119 * @e: serialized data read head (NOT NULL)
1123 * Returns: error or 0 if header is good
1125 static int verify_header(struct aa_ext *e, int required, const char **ns) in verify_header() argument
1132 if (!aa_unpack_u32(e, &e->version, "version")) { in verify_header()
1135 e, error); in verify_header()
1144 if (VERSION_LT(e->version, v5) || VERSION_GT(e->version, v9)) { in verify_header()
1146 e, error); in verify_header()
1151 if (aa_unpack_str(e, &name, "namespace")) { in verify_header()
1152 if (*name == '\0') { in verify_header()
1154 e, error); in verify_header()
1158 audit_iface(NULL, NULL, NULL, "invalid ns change", e, in verify_header()
1167 return 0; in verify_header()
1178 for (i = 0; i < dfa->tables[YYTD_ID_ACCEPT]->td_lolen; i++) { in verify_dfa_accept_index()
1212 for (i = 0; i < pdb->size; i++) { in verify_perms()
1233 * Returns: 0 if passes verification else error
1242 return 0; in verify_profile()
1269 return 0; in verify_profile()
1301 int ret = 0; in compress_zstd()
1360 return 0; in compress_zstd()
1366 AA_BUG(data->compressed_size > 0); in compress_loaddata()
1372 if (aa_g_rawdata_compression_level != 0) { in compress_loaddata()
1385 return 0; in compress_loaddata()
1407 struct aa_ext e = { in aa_unpack() local
1414 while (e.pos < e.end) { in aa_unpack()
1416 error = verify_header(&e, e.pos == e.start, ns); in aa_unpack()
1420 start = e.pos; in aa_unpack()
1421 profile = unpack_profile(&e, &ns_name); in aa_unpack()
1432 error = aa_calc_profile_hash(profile, e.version, start, in aa_unpack()
1433 e.pos - start); in aa_unpack()
1448 udata->abi = e.version & K_ABI_MASK; in aa_unpack()
1463 return 0; in aa_unpack()