]>
Commit | Line | Data |
---|---|---|
d15c345f PM |
1 | /* |
2 | * NetLabel NETLINK Interface | |
3 | * | |
4 | * This file defines the NETLINK interface for the NetLabel system. The | |
5 | * NetLabel system manages static and dynamic label mappings for network | |
6 | * protocols such as CIPSO and RIPSO. | |
7 | * | |
82c21bfa | 8 | * Author: Paul Moore <[email protected]> |
d15c345f PM |
9 | * |
10 | */ | |
11 | ||
12 | /* | |
13 | * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 | |
14 | * | |
15 | * This program is free software; you can redistribute it and/or modify | |
16 | * it under the terms of the GNU General Public License as published by | |
17 | * the Free Software Foundation; either version 2 of the License, or | |
18 | * (at your option) any later version. | |
19 | * | |
20 | * This program is distributed in the hope that it will be useful, | |
21 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
22 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See | |
23 | * the GNU General Public License for more details. | |
24 | * | |
25 | * You should have received a copy of the GNU General Public License | |
d484ff15 | 26 | * along with this program; if not, see <http://www.gnu.org/licenses/>. |
d15c345f PM |
27 | * |
28 | */ | |
29 | ||
30 | #include <linux/init.h> | |
31 | #include <linux/types.h> | |
32 | #include <linux/list.h> | |
33 | #include <linux/socket.h> | |
32f50cde PM |
34 | #include <linux/audit.h> |
35 | #include <linux/tty.h> | |
36 | #include <linux/security.h> | |
5a0e3ad6 | 37 | #include <linux/gfp.h> |
d15c345f PM |
38 | #include <net/sock.h> |
39 | #include <net/netlink.h> | |
40 | #include <net/genetlink.h> | |
41 | #include <net/netlabel.h> | |
42 | #include <asm/bug.h> | |
43 | ||
44 | #include "netlabel_mgmt.h" | |
45 | #include "netlabel_unlabeled.h" | |
46 | #include "netlabel_cipso_v4.h" | |
cb72d382 | 47 | #include "netlabel_calipso.h" |
d15c345f PM |
48 | #include "netlabel_user.h" |
49 | ||
50 | /* | |
51 | * NetLabel NETLINK Setup Functions | |
52 | */ | |
53 | ||
54 | /** | |
55 | * netlbl_netlink_init - Initialize the NETLINK communication channel | |
56 | * | |
57 | * Description: | |
58 | * Call out to the NetLabel components so they can register their families and | |
59 | * commands with the Generic NETLINK mechanism. Returns zero on success and | |
60 | * non-zero on failure. | |
61 | * | |
62 | */ | |
05705e4e | 63 | int __init netlbl_netlink_init(void) |
d15c345f PM |
64 | { |
65 | int ret_val; | |
66 | ||
67 | ret_val = netlbl_mgmt_genl_init(); | |
68 | if (ret_val != 0) | |
69 | return ret_val; | |
70 | ||
71 | ret_val = netlbl_cipsov4_genl_init(); | |
72 | if (ret_val != 0) | |
73 | return ret_val; | |
74 | ||
cb72d382 HD |
75 | ret_val = netlbl_calipso_genl_init(); |
76 | if (ret_val != 0) | |
77 | return ret_val; | |
78 | ||
16b99a4f | 79 | return netlbl_unlabel_genl_init(); |
d15c345f | 80 | } |
32f50cde PM |
81 | |
82 | /* | |
83 | * NetLabel Audit Functions | |
84 | */ | |
85 | ||
86 | /** | |
87 | * netlbl_audit_start_common - Start an audit message | |
88 | * @type: audit message type | |
95d4e6be | 89 | * @audit_info: NetLabel audit information |
32f50cde PM |
90 | * |
91 | * Description: | |
92 | * Start an audit message using the type specified in @type and fill the audit | |
93 | * message with some fields common to all NetLabel audit messages. Returns | |
94 | * a pointer to the audit buffer on success, NULL on failure. | |
95 | * | |
96 | */ | |
95d4e6be PM |
97 | struct audit_buffer *netlbl_audit_start_common(int type, |
98 | struct netlbl_audit *audit_info) | |
32f50cde | 99 | { |
32f50cde | 100 | struct audit_buffer *audit_buf; |
32f50cde PM |
101 | char *secctx; |
102 | u32 secctx_len; | |
103 | ||
de64688f PM |
104 | if (audit_enabled == 0) |
105 | return NULL; | |
106 | ||
94de7feb | 107 | audit_buf = audit_log_start(current->audit_context, GFP_ATOMIC, type); |
32f50cde PM |
108 | if (audit_buf == NULL) |
109 | return NULL; | |
110 | ||
2532386f | 111 | audit_log_format(audit_buf, "netlabel: auid=%u ses=%u", |
e1760bd5 | 112 | from_kuid(&init_user_ns, audit_info->loginuid), |
2532386f | 113 | audit_info->sessionid); |
32f50cde | 114 | |
95d4e6be PM |
115 | if (audit_info->secid != 0 && |
116 | security_secid_to_secctx(audit_info->secid, | |
117 | &secctx, | |
e6e0871c | 118 | &secctx_len) == 0) { |
32f50cde | 119 | audit_log_format(audit_buf, " subj=%s", secctx); |
e6e0871c PM |
120 | security_release_secctx(secctx, secctx_len); |
121 | } | |
32f50cde PM |
122 | |
123 | return audit_buf; | |
124 | } |