123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124 |
- #include <linux/init.h>
- #include <linux/types.h>
- #include <linux/list.h>
- #include <linux/socket.h>
- #include <linux/audit.h>
- #include <linux/tty.h>
- #include <linux/security.h>
- #include <linux/gfp.h>
- #include <net/sock.h>
- #include <net/netlink.h>
- #include <net/genetlink.h>
- #include <net/netlabel.h>
- #include <asm/bug.h>
- #include "netlabel_mgmt.h"
- #include "netlabel_unlabeled.h"
- #include "netlabel_cipso_v4.h"
- #include "netlabel_calipso.h"
- #include "netlabel_user.h"
- int __init netlbl_netlink_init(void)
- {
- int ret_val;
- ret_val = netlbl_mgmt_genl_init();
- if (ret_val != 0)
- return ret_val;
- ret_val = netlbl_cipsov4_genl_init();
- if (ret_val != 0)
- return ret_val;
- ret_val = netlbl_calipso_genl_init();
- if (ret_val != 0)
- return ret_val;
- return netlbl_unlabel_genl_init();
- }
- struct audit_buffer *netlbl_audit_start_common(int type,
- struct netlbl_audit *audit_info)
- {
- struct audit_buffer *audit_buf;
- char *secctx;
- u32 secctx_len;
- if (audit_enabled == 0)
- return NULL;
- audit_buf = audit_log_start(current->audit_context, GFP_ATOMIC, type);
- if (audit_buf == NULL)
- return NULL;
- audit_log_format(audit_buf, "netlabel: auid=%u ses=%u",
- from_kuid(&init_user_ns, audit_info->loginuid),
- audit_info->sessionid);
- if (audit_info->secid != 0 &&
- security_secid_to_secctx(audit_info->secid,
- &secctx,
- &secctx_len) == 0) {
- audit_log_format(audit_buf, " subj=%s", secctx);
- security_release_secctx(secctx, secctx_len);
- }
- return audit_buf;
- }
|