Commit | Line | Data |
---|---|---|
1ccea77e | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
d15c345f PM |
2 | /* |
3 | * NetLabel NETLINK Interface | |
4 | * | |
5 | * This file defines the NETLINK interface for the NetLabel system. The | |
6 | * NetLabel system manages static and dynamic label mappings for network | |
7 | * protocols such as CIPSO and RIPSO. | |
8 | * | |
82c21bfa | 9 | * Author: Paul Moore <paul@paul-moore.com> |
d15c345f PM |
10 | */ |
11 | ||
12 | /* | |
13 | * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 | |
d15c345f PM |
14 | */ |
15 | ||
16 | #include <linux/init.h> | |
17 | #include <linux/types.h> | |
18 | #include <linux/list.h> | |
19 | #include <linux/socket.h> | |
32f50cde PM |
20 | #include <linux/audit.h> |
21 | #include <linux/tty.h> | |
22 | #include <linux/security.h> | |
5a0e3ad6 | 23 | #include <linux/gfp.h> |
d15c345f PM |
24 | #include <net/sock.h> |
25 | #include <net/netlink.h> | |
26 | #include <net/genetlink.h> | |
27 | #include <net/netlabel.h> | |
28 | #include <asm/bug.h> | |
29 | ||
30 | #include "netlabel_mgmt.h" | |
31 | #include "netlabel_unlabeled.h" | |
32 | #include "netlabel_cipso_v4.h" | |
cb72d382 | 33 | #include "netlabel_calipso.h" |
d15c345f PM |
34 | #include "netlabel_user.h" |
35 | ||
36 | /* | |
37 | * NetLabel NETLINK Setup Functions | |
38 | */ | |
39 | ||
40 | /** | |
41 | * netlbl_netlink_init - Initialize the NETLINK communication channel | |
42 | * | |
43 | * Description: | |
44 | * Call out to the NetLabel components so they can register their families and | |
45 | * commands with the Generic NETLINK mechanism. Returns zero on success and | |
46 | * non-zero on failure. | |
47 | * | |
48 | */ | |
05705e4e | 49 | int __init netlbl_netlink_init(void) |
d15c345f PM |
50 | { |
51 | int ret_val; | |
52 | ||
53 | ret_val = netlbl_mgmt_genl_init(); | |
54 | if (ret_val != 0) | |
55 | return ret_val; | |
56 | ||
57 | ret_val = netlbl_cipsov4_genl_init(); | |
58 | if (ret_val != 0) | |
59 | return ret_val; | |
60 | ||
cb72d382 HD |
61 | ret_val = netlbl_calipso_genl_init(); |
62 | if (ret_val != 0) | |
63 | return ret_val; | |
64 | ||
16b99a4f | 65 | return netlbl_unlabel_genl_init(); |
d15c345f | 66 | } |
32f50cde PM |
67 | |
68 | /* | |
69 | * NetLabel Audit Functions | |
70 | */ | |
71 | ||
72 | /** | |
73 | * netlbl_audit_start_common - Start an audit message | |
74 | * @type: audit message type | |
95d4e6be | 75 | * @audit_info: NetLabel audit information |
32f50cde PM |
76 | * |
77 | * Description: | |
78 | * Start an audit message using the type specified in @type and fill the audit | |
79 | * message with some fields common to all NetLabel audit messages. Returns | |
80 | * a pointer to the audit buffer on success, NULL on failure. | |
81 | * | |
82 | */ | |
95d4e6be PM |
83 | struct audit_buffer *netlbl_audit_start_common(int type, |
84 | struct netlbl_audit *audit_info) | |
32f50cde | 85 | { |
32f50cde | 86 | struct audit_buffer *audit_buf; |
32f50cde PM |
87 | char *secctx; |
88 | u32 secctx_len; | |
89 | ||
f7859590 | 90 | if (audit_enabled == AUDIT_OFF) |
de64688f PM |
91 | return NULL; |
92 | ||
cdfb6b34 | 93 | audit_buf = audit_log_start(audit_context(), GFP_ATOMIC, type); |
32f50cde PM |
94 | if (audit_buf == NULL) |
95 | return NULL; | |
96 | ||
2532386f | 97 | audit_log_format(audit_buf, "netlabel: auid=%u ses=%u", |
e1760bd5 | 98 | from_kuid(&init_user_ns, audit_info->loginuid), |
2532386f | 99 | audit_info->sessionid); |
32f50cde | 100 | |
95d4e6be PM |
101 | if (audit_info->secid != 0 && |
102 | security_secid_to_secctx(audit_info->secid, | |
103 | &secctx, | |
e6e0871c | 104 | &secctx_len) == 0) { |
32f50cde | 105 | audit_log_format(audit_buf, " subj=%s", secctx); |
e6e0871c PM |
106 | security_release_secctx(secctx, secctx_len); |
107 | } | |
32f50cde PM |
108 | |
109 | return audit_buf; | |
110 | } |