106 lines
		
	
	
	
		
			2.7 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			106 lines
		
	
	
	
		
			2.7 KiB
			
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * AppArmor security module
 | |
|  *
 | |
|  * This file contains basic common functions used in AppArmor
 | |
|  *
 | |
|  * Copyright (C) 1998-2008 Novell/SUSE
 | |
|  * Copyright 2009-2010 Canonical Ltd.
 | |
|  *
 | |
|  * This program is free software; you can redistribute it and/or
 | |
|  * modify it under the terms of the GNU General Public License as
 | |
|  * published by the Free Software Foundation, version 2 of the
 | |
|  * License.
 | |
|  */
 | |
| 
 | |
| #include <linux/mm.h>
 | |
| #include <linux/slab.h>
 | |
| #include <linux/string.h>
 | |
| #include <linux/vmalloc.h>
 | |
| 
 | |
| #include "include/audit.h"
 | |
| #include "include/apparmor.h"
 | |
| 
 | |
| 
 | |
| /**
 | |
|  * aa_split_fqname - split a fqname into a profile and namespace name
 | |
|  * @fqname: a full qualified name in namespace profile format (NOT NULL)
 | |
|  * @ns_name: pointer to portion of the string containing the ns name (NOT NULL)
 | |
|  *
 | |
|  * Returns: profile name or NULL if one is not specified
 | |
|  *
 | |
|  * Split a namespace name from a profile name (see policy.c for naming
 | |
|  * description).  If a portion of the name is missing it returns NULL for
 | |
|  * that portion.
 | |
|  *
 | |
|  * NOTE: may modify the @fqname string.  The pointers returned point
 | |
|  *       into the @fqname string.
 | |
|  */
 | |
| char *aa_split_fqname(char *fqname, char **ns_name)
 | |
| {
 | |
| 	char *name = strim(fqname);
 | |
| 
 | |
| 	*ns_name = NULL;
 | |
| 	if (name[0] == ':') {
 | |
| 		char *split = strchr(&name[1], ':');
 | |
| 		*ns_name = skip_spaces(&name[1]);
 | |
| 		if (split) {
 | |
| 			/* overwrite ':' with \0 */
 | |
| 			*split++ = 0;
 | |
| 			if (strncmp(split, "//", 2) == 0)
 | |
| 				split += 2;
 | |
| 			name = skip_spaces(split);
 | |
| 		} else
 | |
| 			/* a ns name without a following profile is allowed */
 | |
| 			name = NULL;
 | |
| 	}
 | |
| 	if (name && *name == 0)
 | |
| 		name = NULL;
 | |
| 
 | |
| 	return name;
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * aa_info_message - log a none profile related status message
 | |
|  * @str: message to log
 | |
|  */
 | |
| void aa_info_message(const char *str)
 | |
| {
 | |
| 	if (audit_enabled) {
 | |
| 		struct common_audit_data sa;
 | |
| 		struct apparmor_audit_data aad = {0,};
 | |
| 		sa.type = LSM_AUDIT_DATA_NONE;
 | |
| 		sa.aad = &aad;
 | |
| 		aad.info = str;
 | |
| 		aa_audit_msg(AUDIT_APPARMOR_STATUS, &sa, NULL);
 | |
| 	}
 | |
| 	printk(KERN_INFO "AppArmor: %s\n", str);
 | |
| }
 | |
| 
 | |
| /**
 | |
|  * __aa_kvmalloc - do allocation preferring kmalloc but falling back to vmalloc
 | |
|  * @size: how many bytes of memory are required
 | |
|  * @flags: the type of memory to allocate (see kmalloc).
 | |
|  *
 | |
|  * Return: allocated buffer or NULL if failed
 | |
|  *
 | |
|  * It is possible that policy being loaded from the user is larger than
 | |
|  * what can be allocated by kmalloc, in those cases fall back to vmalloc.
 | |
|  */
 | |
| void *__aa_kvmalloc(size_t size, gfp_t flags)
 | |
| {
 | |
| 	void *buffer = NULL;
 | |
| 
 | |
| 	if (size == 0)
 | |
| 		return NULL;
 | |
| 
 | |
| 	/* do not attempt kmalloc if we need more than 16 pages at once */
 | |
| 	if (size <= (16*PAGE_SIZE))
 | |
| 		buffer = kmalloc(size, flags | GFP_NOIO | __GFP_NOWARN);
 | |
| 	if (!buffer) {
 | |
| 		if (flags & __GFP_ZERO)
 | |
| 			buffer = vzalloc(size);
 | |
| 		else
 | |
| 			buffer = vmalloc(size);
 | |
| 	}
 | |
| 	return buffer;
 | |
| }
 | 
