netlink.c 2.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Netlink event notifications for SELinux.
  4. *
  5. * Author: James Morris <[email protected]>
  6. *
  7. * Copyright (C) 2004 Red Hat, Inc., James Morris <[email protected]>
  8. */
  9. #include <linux/init.h>
  10. #include <linux/types.h>
  11. #include <linux/slab.h>
  12. #include <linux/stddef.h>
  13. #include <linux/kernel.h>
  14. #include <linux/export.h>
  15. #include <linux/skbuff.h>
  16. #include <linux/selinux_netlink.h>
  17. #include <net/net_namespace.h>
  18. #include <net/netlink.h>
  19. #include "security.h"
  20. static struct sock *selnl __ro_after_init;
  21. static int selnl_msglen(int msgtype)
  22. {
  23. int ret = 0;
  24. switch (msgtype) {
  25. case SELNL_MSG_SETENFORCE:
  26. ret = sizeof(struct selnl_msg_setenforce);
  27. break;
  28. case SELNL_MSG_POLICYLOAD:
  29. ret = sizeof(struct selnl_msg_policyload);
  30. break;
  31. default:
  32. BUG();
  33. }
  34. return ret;
  35. }
  36. static void selnl_add_payload(struct nlmsghdr *nlh, int len, int msgtype, void *data)
  37. {
  38. switch (msgtype) {
  39. case SELNL_MSG_SETENFORCE: {
  40. struct selnl_msg_setenforce *msg = nlmsg_data(nlh);
  41. memset(msg, 0, len);
  42. msg->val = *((int *)data);
  43. break;
  44. }
  45. case SELNL_MSG_POLICYLOAD: {
  46. struct selnl_msg_policyload *msg = nlmsg_data(nlh);
  47. memset(msg, 0, len);
  48. msg->seqno = *((u32 *)data);
  49. break;
  50. }
  51. default:
  52. BUG();
  53. }
  54. }
  55. static void selnl_notify(int msgtype, void *data)
  56. {
  57. int len;
  58. sk_buff_data_t tmp;
  59. struct sk_buff *skb;
  60. struct nlmsghdr *nlh;
  61. len = selnl_msglen(msgtype);
  62. skb = nlmsg_new(len, GFP_USER);
  63. if (!skb)
  64. goto oom;
  65. tmp = skb->tail;
  66. nlh = nlmsg_put(skb, 0, 0, msgtype, len, 0);
  67. if (!nlh)
  68. goto out_kfree_skb;
  69. selnl_add_payload(nlh, len, msgtype, data);
  70. nlh->nlmsg_len = skb->tail - tmp;
  71. NETLINK_CB(skb).dst_group = SELNLGRP_AVC;
  72. netlink_broadcast(selnl, skb, 0, SELNLGRP_AVC, GFP_USER);
  73. out:
  74. return;
  75. out_kfree_skb:
  76. kfree_skb(skb);
  77. oom:
  78. pr_err("SELinux: OOM in %s\n", __func__);
  79. goto out;
  80. }
  81. void selnl_notify_setenforce(int val)
  82. {
  83. selnl_notify(SELNL_MSG_SETENFORCE, &val);
  84. }
  85. void selnl_notify_policyload(u32 seqno)
  86. {
  87. selnl_notify(SELNL_MSG_POLICYLOAD, &seqno);
  88. }
  89. static int __init selnl_init(void)
  90. {
  91. struct netlink_kernel_cfg cfg = {
  92. .groups = SELNLGRP_MAX,
  93. .flags = NL_CFG_F_NONROOT_RECV,
  94. };
  95. selnl = netlink_kernel_create(&init_net, NETLINK_SELINUX, &cfg);
  96. if (selnl == NULL)
  97. panic("SELinux: Cannot create netlink socket.");
  98. return 0;
  99. }
  100. __initcall(selnl_init);