]> bbs.cooldavid.org Git - net-next-2.6.git/blame - security/selinux/netlink.c
Merge branch 'bug-fixes' of git://git.kernel.org/pub/scm/linux/kernel/git/josef/btrfs...
[net-next-2.6.git] / security / selinux / netlink.c
CommitLineData
1da177e4
LT
1/*
2 * Netlink event notifications for SELinux.
3 *
4 * Author: James Morris <jmorris@redhat.com>
5 *
6 * Copyright (C) 2004 Red Hat, Inc., James Morris <jmorris@redhat.com>
7 *
8 * This program is free software; you can redistribute it and/or modify
9 * it under the terms of the GNU General Public License version 2,
10 * as published by the Free Software Foundation.
11 */
12#include <linux/init.h>
13#include <linux/types.h>
5a0e3ad6 14#include <linux/slab.h>
1da177e4
LT
15#include <linux/stddef.h>
16#include <linux/kernel.h>
1da177e4
LT
17#include <linux/skbuff.h>
18#include <linux/netlink.h>
19#include <linux/selinux_netlink.h>
b4b51029 20#include <net/net_namespace.h>
1da177e4
LT
21
22static struct sock *selnl;
23
24static int selnl_msglen(int msgtype)
25{
26 int ret = 0;
c544c028 27
1da177e4
LT
28 switch (msgtype) {
29 case SELNL_MSG_SETENFORCE:
30 ret = sizeof(struct selnl_msg_setenforce);
31 break;
c544c028 32
1da177e4
LT
33 case SELNL_MSG_POLICYLOAD:
34 ret = sizeof(struct selnl_msg_policyload);
35 break;
c544c028 36
1da177e4
LT
37 default:
38 BUG();
39 }
40 return ret;
41}
42
43static void selnl_add_payload(struct nlmsghdr *nlh, int len, int msgtype, void *data)
44{
45 switch (msgtype) {
46 case SELNL_MSG_SETENFORCE: {
47 struct selnl_msg_setenforce *msg = NLMSG_DATA(nlh);
c544c028 48
1da177e4
LT
49 memset(msg, 0, len);
50 msg->val = *((int *)data);
51 break;
52 }
c544c028 53
1da177e4
LT
54 case SELNL_MSG_POLICYLOAD: {
55 struct selnl_msg_policyload *msg = NLMSG_DATA(nlh);
c544c028 56
1da177e4
LT
57 memset(msg, 0, len);
58 msg->seqno = *((u32 *)data);
59 break;
60 }
61
62 default:
63 BUG();
64 }
65}
66
67static void selnl_notify(int msgtype, void *data)
68{
69 int len;
27a884dc 70 sk_buff_data_t tmp;
1da177e4
LT
71 struct sk_buff *skb;
72 struct nlmsghdr *nlh;
c544c028 73
1da177e4 74 len = selnl_msglen(msgtype);
c544c028 75
1da177e4
LT
76 skb = alloc_skb(NLMSG_SPACE(len), GFP_USER);
77 if (!skb)
78 goto oom;
79
80 tmp = skb->tail;
81 nlh = NLMSG_PUT(skb, 0, 0, msgtype, len);
82 selnl_add_payload(nlh, len, msgtype, data);
83 nlh->nlmsg_len = skb->tail - tmp;
ac6d439d
PM
84 NETLINK_CB(skb).dst_group = SELNLGRP_AVC;
85 netlink_broadcast(selnl, skb, 0, SELNLGRP_AVC, GFP_USER);
1da177e4
LT
86out:
87 return;
c544c028 88
1da177e4
LT
89nlmsg_failure:
90 kfree_skb(skb);
91oom:
dd6f953a 92 printk(KERN_ERR "SELinux: OOM in %s\n", __func__);
1da177e4
LT
93 goto out;
94}
95
96void selnl_notify_setenforce(int val)
97{
98 selnl_notify(SELNL_MSG_SETENFORCE, &val);
99}
100
101void selnl_notify_policyload(u32 seqno)
102{
103 selnl_notify(SELNL_MSG_POLICYLOAD, &seqno);
104}
105
106static int __init selnl_init(void)
107{
b4b51029
EB
108 selnl = netlink_kernel_create(&init_net, NETLINK_SELINUX,
109 SELNLGRP_MAX, NULL, NULL, THIS_MODULE);
1da177e4
LT
110 if (selnl == NULL)
111 panic("SELinux: Cannot create netlink socket.");
c544c028 112 netlink_set_nonroot(NETLINK_SELINUX, NL_NONROOT_RECV);
1da177e4
LT
113 return 0;
114}
115
116__initcall(selnl_init);