apparmor: add fn to lookup profiles by fqname

Signed-off-by: John Johansen <john.johansen@canonical.com>
This commit is contained in:
John Johansen 2017-01-16 00:42:24 -08:00
parent 3b0aaf5866
commit 31617ddfdd
4 changed files with 38 additions and 7 deletions

View File

@ -180,6 +180,8 @@ struct aa_profile *aa_find_child(struct aa_profile *parent, const char *name);
struct aa_profile *aa_lookupn_profile(struct aa_ns *ns, const char *hname, struct aa_profile *aa_lookupn_profile(struct aa_ns *ns, const char *hname,
size_t n); size_t n);
struct aa_profile *aa_lookup_profile(struct aa_ns *ns, const char *name); struct aa_profile *aa_lookup_profile(struct aa_ns *ns, const char *name);
struct aa_profile *aa_fqlookupn_profile(struct aa_profile *base,
const char *fqname, size_t n);
struct aa_profile *aa_match_profile(struct aa_ns *ns, const char *name); struct aa_profile *aa_match_profile(struct aa_ns *ns, const char *name);
ssize_t aa_replace_profiles(void *udata, size_t size, bool noreplace); ssize_t aa_replace_profiles(void *udata, size_t size, bool noreplace);

View File

@ -46,11 +46,11 @@ struct aa_ns_acct {
* @uniq_id: a unique id count for the profiles in the namespace * @uniq_id: a unique id count for the profiles in the namespace
* @dents: dentries for the namespaces file entries in apparmorfs * @dents: dentries for the namespaces file entries in apparmorfs
* *
* An aa_ns defines the set profiles that are searched to determine * An aa_ns defines the set profiles that are searched to determine which
* which profile to attach to a task. Profiles can not be shared between * profile to attach to a task. Profiles can not be shared between aa_ns
* aa_nss and profile names within a namespace are guaranteed to be * and profile names within a namespace are guaranteed to be unique. When
* unique. When profiles in separate namespaces have the same name they * profiles in separate namespaces have the same name they are NOT considered
* are NOT considered to be equivalent. * to be equivalent.
* *
* Namespaces are hierarchical and only namespaces and profiles below the * Namespaces are hierarchical and only namespaces and profiles below the
* current namespace are visible. * current namespace are visible.

View File

@ -498,6 +498,35 @@ struct aa_profile *aa_lookup_profile(struct aa_ns *ns, const char *hname)
{ {
return aa_lookupn_profile(ns, hname, strlen(hname)); return aa_lookupn_profile(ns, hname, strlen(hname));
} }
struct aa_profile *aa_fqlookupn_profile(struct aa_profile *base,
const char *fqname, size_t n)
{
struct aa_profile *profile;
struct aa_ns *ns;
const char *name, *ns_name;
size_t ns_len;
name = aa_splitn_fqname(fqname, n, &ns_name, &ns_len);
if (ns_name) {
ns = aa_findn_ns(base->ns, ns_name, ns_len);
if (!ns)
return NULL;
} else
ns = aa_get_ns(base->ns);
if (name)
profile = aa_lookupn_profile(ns, name, n - (name - fqname));
else if (ns)
/* default profile for ns, currently unconfined */
profile = aa_get_newest_profile(ns->unconfined);
else
profile = NULL;
aa_put_ns(ns);
return profile;
}
/** /**
* replacement_allowed - test to see if replacement is allowed * replacement_allowed - test to see if replacement is allowed
* @profile: profile to test if it can be replaced (MAYBE NULL) * @profile: profile to test if it can be replaced (MAYBE NULL)

View File

@ -226,7 +226,7 @@ static void __ns_list_release(struct list_head *head);
/** /**
* destroy_ns - remove everything contained by @ns * destroy_ns - remove everything contained by @ns
* @ns: ns to have it contents removed (NOT NULL) * @ns: namespace to have it contents removed (NOT NULL)
*/ */
static void destroy_ns(struct aa_ns *ns) static void destroy_ns(struct aa_ns *ns)
{ {
@ -276,7 +276,7 @@ static void __ns_list_release(struct list_head *head)
} }
/** /**
* aa_alloc_root_ns - allocate the root profile namespcae * aa_alloc_root_ns - allocate the root profile namespace
* *
* Returns: %0 on success else error * Returns: %0 on success else error
* *