xref: /linux/security/apparmor/include/apparmor.h (revision ca55b2fef3a9373fcfc30f82fd26bc7fccbda732)
1 /*
2  * AppArmor security module
3  *
4  * This file contains AppArmor basic global and lib definitions
5  *
6  * Copyright (C) 1998-2008 Novell/SUSE
7  * Copyright 2009-2010 Canonical Ltd.
8  *
9  * This program is free software; you can redistribute it and/or
10  * modify it under the terms of the GNU General Public License as
11  * published by the Free Software Foundation, version 2 of the
12  * License.
13  */
14 
15 #ifndef __APPARMOR_H
16 #define __APPARMOR_H
17 
18 #include <linux/slab.h>
19 #include <linux/fs.h>
20 
21 #include "match.h"
22 
23 /*
24  * Class of mediation types in the AppArmor policy db
25  */
26 #define AA_CLASS_ENTRY		0
27 #define AA_CLASS_UNKNOWN	1
28 #define AA_CLASS_FILE		2
29 #define AA_CLASS_CAP		3
30 #define AA_CLASS_NET		4
31 #define AA_CLASS_RLIMITS	5
32 #define AA_CLASS_DOMAIN		6
33 
34 #define AA_CLASS_LAST		AA_CLASS_DOMAIN
35 
36 /* Control parameters settable through module/boot flags */
37 extern enum audit_mode aa_g_audit;
38 extern bool aa_g_audit_header;
39 extern bool aa_g_debug;
40 extern bool aa_g_lock_policy;
41 extern bool aa_g_logsyscall;
42 extern bool aa_g_paranoid_load;
43 extern unsigned int aa_g_path_max;
44 
45 /*
46  * DEBUG remains global (no per profile flag) since it is mostly used in sysctl
47  * which is not related to profile accesses.
48  */
49 
50 #define AA_DEBUG(fmt, args...)						\
51 	do {								\
52 		if (aa_g_debug && printk_ratelimit())			\
53 			printk(KERN_DEBUG "AppArmor: " fmt, ##args);	\
54 	} while (0)
55 
56 #define AA_ERROR(fmt, args...)						\
57 	do {								\
58 		if (printk_ratelimit())					\
59 			printk(KERN_ERR "AppArmor: " fmt, ##args);	\
60 	} while (0)
61 
62 /* Flag indicating whether initialization completed */
63 extern int apparmor_initialized __initdata;
64 
65 /* fn's in lib */
66 char *aa_split_fqname(char *args, char **ns_name);
67 void aa_info_message(const char *str);
68 void *__aa_kvmalloc(size_t size, gfp_t flags);
69 
70 static inline void *kvmalloc(size_t size)
71 {
72 	return __aa_kvmalloc(size, 0);
73 }
74 
75 static inline void *kvzalloc(size_t size)
76 {
77 	return __aa_kvmalloc(size, __GFP_ZERO);
78 }
79 
80 /* returns 0 if kref not incremented */
81 static inline int kref_get_not0(struct kref *kref)
82 {
83 	return atomic_inc_not_zero(&kref->refcount);
84 }
85 
86 /**
87  * aa_strneq - compare null terminated @str to a non null terminated substring
88  * @str: a null terminated string
89  * @sub: a substring, not necessarily null terminated
90  * @len: length of @sub to compare
91  *
92  * The @str string must be full consumed for this to be considered a match
93  */
94 static inline bool aa_strneq(const char *str, const char *sub, int len)
95 {
96 	return !strncmp(str, sub, len) && !str[len];
97 }
98 
99 /**
100  * aa_dfa_null_transition - step to next state after null character
101  * @dfa: the dfa to match against
102  * @start: the state of the dfa to start matching in
103  *
104  * aa_dfa_null_transition transitions to the next state after a null
105  * character which is not used in standard matching and is only
106  * used to separate pairs.
107  */
108 static inline unsigned int aa_dfa_null_transition(struct aa_dfa *dfa,
109 						  unsigned int start)
110 {
111 	/* the null transition only needs the string's null terminator byte */
112 	return aa_dfa_next(dfa, start, 0);
113 }
114 
115 static inline bool mediated_filesystem(struct dentry *dentry)
116 {
117 	return !(dentry->d_sb->s_flags & MS_NOUSER);
118 }
119 
120 #endif /* __APPARMOR_H */
121