Blame view
net/netlabel/netlabel_user.c
3.16 KB
d15c345fe [NetLabel]: core ... |
1 2 3 4 5 6 7 |
/* * NetLabel NETLINK Interface * * This file defines the NETLINK interface for the NetLabel system. The * NetLabel system manages static and dynamic label mappings for network * protocols such as CIPSO and RIPSO. * |
82c21bfab doc: Update the e... |
8 |
* Author: Paul Moore <paul@paul-moore.com> |
d15c345fe [NetLabel]: core ... |
9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 |
* */ /* * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See * the GNU General Public License for more details. * * You should have received a copy of the GNU General Public License |
d484ff154 netlabel: Fix FSF... |
26 |
* along with this program; if not, see <http://www.gnu.org/licenses/>. |
d15c345fe [NetLabel]: core ... |
27 28 29 30 31 32 33 |
* */ #include <linux/init.h> #include <linux/types.h> #include <linux/list.h> #include <linux/socket.h> |
32f50cdee [NetLabel]: add a... |
34 35 36 |
#include <linux/audit.h> #include <linux/tty.h> #include <linux/security.h> |
5a0e3ad6a include cleanup: ... |
37 |
#include <linux/gfp.h> |
d15c345fe [NetLabel]: core ... |
38 39 40 41 42 43 44 45 46 |
#include <net/sock.h> #include <net/netlink.h> #include <net/genetlink.h> #include <net/netlabel.h> #include <asm/bug.h> #include "netlabel_mgmt.h" #include "netlabel_unlabeled.h" #include "netlabel_cipso_v4.h" |
cb72d3821 netlabel: Initial... |
47 |
#include "netlabel_calipso.h" |
d15c345fe [NetLabel]: core ... |
48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 |
#include "netlabel_user.h" /* * NetLabel NETLINK Setup Functions */ /** * netlbl_netlink_init - Initialize the NETLINK communication channel * * Description: * Call out to the NetLabel components so they can register their families and * commands with the Generic NETLINK mechanism. Returns zero on success and * non-zero on failure. * */ |
05705e4e1 [NETLABEL]: Move ... |
63 |
int __init netlbl_netlink_init(void) |
d15c345fe [NetLabel]: core ... |
64 65 66 67 68 69 70 71 72 73 |
{ int ret_val; ret_val = netlbl_mgmt_genl_init(); if (ret_val != 0) return ret_val; ret_val = netlbl_cipsov4_genl_init(); if (ret_val != 0) return ret_val; |
cb72d3821 netlabel: Initial... |
74 75 76 |
ret_val = netlbl_calipso_genl_init(); if (ret_val != 0) return ret_val; |
16b99a4f6 netlabel: directl... |
77 |
return netlbl_unlabel_genl_init(); |
d15c345fe [NetLabel]: core ... |
78 |
} |
32f50cdee [NetLabel]: add a... |
79 80 81 82 83 84 85 86 |
/* * NetLabel Audit Functions */ /** * netlbl_audit_start_common - Start an audit message * @type: audit message type |
95d4e6be2 [NetLabel]: audit... |
87 |
* @audit_info: NetLabel audit information |
32f50cdee [NetLabel]: add a... |
88 89 90 91 92 93 94 |
* * Description: * Start an audit message using the type specified in @type and fill the audit * message with some fields common to all NetLabel audit messages. Returns * a pointer to the audit buffer on success, NULL on failure. * */ |
95d4e6be2 [NetLabel]: audit... |
95 96 |
struct audit_buffer *netlbl_audit_start_common(int type, struct netlbl_audit *audit_info) |
32f50cdee [NetLabel]: add a... |
97 |
{ |
32f50cdee [NetLabel]: add a... |
98 |
struct audit_buffer *audit_buf; |
32f50cdee [NetLabel]: add a... |
99 100 |
char *secctx; u32 secctx_len; |
de64688ff NetLabel: honor t... |
101 102 |
if (audit_enabled == 0) return NULL; |
94de7feb2 [NETLABEL]: Compi... |
103 |
audit_buf = audit_log_start(current->audit_context, GFP_ATOMIC, type); |
32f50cdee [NetLabel]: add a... |
104 105 |
if (audit_buf == NULL) return NULL; |
2532386f4 Audit: collect se... |
106 |
audit_log_format(audit_buf, "netlabel: auid=%u ses=%u", |
e1760bd5f userns: Convert t... |
107 |
from_kuid(&init_user_ns, audit_info->loginuid), |
2532386f4 Audit: collect se... |
108 |
audit_info->sessionid); |
32f50cdee [NetLabel]: add a... |
109 |
|
95d4e6be2 [NetLabel]: audit... |
110 111 112 |
if (audit_info->secid != 0 && security_secid_to_secctx(audit_info->secid, &secctx, |
e6e0871cc Net/Security: fix... |
113 |
&secctx_len) == 0) { |
32f50cdee [NetLabel]: add a... |
114 |
audit_log_format(audit_buf, " subj=%s", secctx); |
e6e0871cc Net/Security: fix... |
115 116 |
security_release_secctx(secctx, secctx_len); } |
32f50cdee [NetLabel]: add a... |
117 118 119 |
return audit_buf; } |