2019-06-04 11:11:33 +03:00
// SPDX-License-Identifier: GPL-2.0-only
2005-04-17 02:20:36 +04:00
/*
* Netlink message type permission tables , for user generated messages .
*
* Author : James Morris < jmorris @ redhat . com >
*
* Copyright ( C ) 2004 Red Hat , Inc . , James Morris < jmorris @ redhat . com >
*/
# include <linux/types.h>
# include <linux/kernel.h>
# include <linux/netlink.h>
# include <linux/rtnetlink.h>
# include <linux/if.h>
2005-08-16 07:34:48 +04:00
# include <linux/inet_diag.h>
2005-04-17 02:20:36 +04:00
# include <linux/xfrm.h>
# include <linux/audit.h>
2014-01-28 23:45:41 +04:00
# include <linux/sock_diag.h>
2005-04-17 02:20:36 +04:00
# include "flask.h"
# include "av_permissions.h"
2011-08-30 06:09:15 +04:00
# include "security.h"
2005-04-17 02:20:36 +04:00
2008-04-19 01:38:26 +04:00
struct nlmsg_perm {
2005-04-17 02:20:36 +04:00
u16 nlmsg_type ;
u32 perm ;
} ;
2017-03-06 19:58:08 +03:00
static const struct nlmsg_perm nlmsg_route_perms [ ] =
2005-04-17 02:20:36 +04:00
{
{ RTM_NEWLINK , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELLINK , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETLINK , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_SETLINK , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_NEWADDR , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELADDR , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETADDR , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_NEWROUTE , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELROUTE , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETROUTE , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_NEWNEIGH , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELNEIGH , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETNEIGH , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_NEWRULE , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELRULE , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETRULE , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_NEWQDISC , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELQDISC , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETQDISC , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_NEWTCLASS , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELTCLASS , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETTCLASS , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_NEWTFILTER , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELTFILTER , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETTFILTER , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_NEWACTION , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELACTION , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETACTION , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_NEWPREFIX , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETMULTICAST , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_GETANYCAST , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
2005-06-19 09:50:55 +04:00
{ RTM_GETNEIGHTBL , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_SETNEIGHTBL , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
2008-11-05 15:35:06 +03:00
{ RTM_NEWADDRLABEL , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELADDRLABEL , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETADDRLABEL , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
2010-12-16 19:46:51 +03:00
{ RTM_GETDCB , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_SETDCB , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
2012-12-07 22:59:48 +04:00
{ RTM_NEWNETCONF , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
2017-03-29 00:28:01 +03:00
{ RTM_DELNETCONF , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
2012-12-07 22:59:48 +04:00
{ RTM_GETNETCONF , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
2012-12-15 02:09:50 +04:00
{ RTM_NEWMDB , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELMDB , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
2012-12-07 04:04:48 +04:00
{ RTM_GETMDB , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
2015-04-08 19:36:38 +03:00
{ RTM_NEWNSID , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
2015-04-08 19:36:39 +03:00
{ RTM_DELNSID , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
2015-04-08 19:36:38 +03:00
{ RTM_GETNSID , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
2016-04-20 18:43:43 +03:00
{ RTM_NEWSTATS , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
{ RTM_GETSTATS , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
2017-06-20 23:54:15 +03:00
{ RTM_NEWCACHEREPORT , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
2018-11-28 20:57:33 +03:00
{ RTM_NEWCHAIN , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELCHAIN , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETCHAIN , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
net: nexthop uapi
New UAPI for nexthops as standalone objects:
- defines netlink ancillary header, struct nhmsg
- RTM commands for nexthop objects, RTM_*NEXTHOP,
- RTNLGRP for nexthop notifications, RTNLGRP_NEXTHOP,
- Attributes for creating nexthops, NHA_*
- Attribute for route specs to specify a nexthop by id, RTA_NH_ID.
The nexthop attributes and semantics follow the route and RTA ones for
device, gateway and lwt encap. Unique to nexthop objects are a blackhole
and a group which contains references to other nexthop objects. With the
exception of blackhole and group, nexthop objects MUST contain a device.
Gateway and encap are optional. Nexthop groups can only reference other
pre-existing nexthops by id. If the NHA_ID attribute is present that id
is used for the nexthop. If not specified, one is auto assigned.
Dump requests can include attributes:
- NHA_GROUPS to return only nexthop groups,
- NHA_MASTER to limit dumps to nexthops with devices enslaved to the
given master (e.g., VRF)
- NHA_OIF to limit dumps to nexthops using given device
nlmsg_route_perms in selinux code is updated for the new RTM comands.
Signed-off-by: David Ahern <dsahern@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2019-05-25 00:43:03 +03:00
{ RTM_NEWNEXTHOP , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELNEXTHOP , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETNEXTHOP , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
2019-09-30 12:48:16 +03:00
{ RTM_NEWLINKPROP , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELLINKPROP , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
2020-01-14 20:56:09 +03:00
{ RTM_NEWVLAN , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELVLAN , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETVLAN , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
2021-03-11 21:03:15 +03:00
{ RTM_NEWNEXTHOPBUCKET , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_DELNEXTHOPBUCKET , NETLINK_ROUTE_SOCKET__NLMSG_WRITE } ,
{ RTM_GETNEXTHOPBUCKET , NETLINK_ROUTE_SOCKET__NLMSG_READ } ,
2005-04-17 02:20:36 +04:00
} ;
2017-03-06 19:58:08 +03:00
static const struct nlmsg_perm nlmsg_tcpdiag_perms [ ] =
2005-04-17 02:20:36 +04:00
{
{ TCPDIAG_GETSOCK , NETLINK_TCPDIAG_SOCKET__NLMSG_READ } ,
2005-08-16 07:34:48 +04:00
{ DCCPDIAG_GETSOCK , NETLINK_TCPDIAG_SOCKET__NLMSG_READ } ,
2014-01-28 23:45:41 +04:00
{ SOCK_DIAG_BY_FAMILY , NETLINK_TCPDIAG_SOCKET__NLMSG_READ } ,
2016-02-03 19:17:12 +03:00
{ SOCK_DESTROY , NETLINK_TCPDIAG_SOCKET__NLMSG_WRITE } ,
2005-04-17 02:20:36 +04:00
} ;
2017-03-06 19:58:08 +03:00
static const struct nlmsg_perm nlmsg_xfrm_perms [ ] =
2005-04-17 02:20:36 +04:00
{
{ XFRM_MSG_NEWSA , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
{ XFRM_MSG_DELSA , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
{ XFRM_MSG_GETSA , NETLINK_XFRM_SOCKET__NLMSG_READ } ,
{ XFRM_MSG_NEWPOLICY , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
{ XFRM_MSG_DELPOLICY , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
{ XFRM_MSG_GETPOLICY , NETLINK_XFRM_SOCKET__NLMSG_READ } ,
{ XFRM_MSG_ALLOCSPI , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
2006-03-21 06:17:39 +03:00
{ XFRM_MSG_ACQUIRE , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
{ XFRM_MSG_EXPIRE , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
2005-04-17 02:20:36 +04:00
{ XFRM_MSG_UPDPOLICY , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
{ XFRM_MSG_UPDSA , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
2006-03-21 06:17:39 +03:00
{ XFRM_MSG_POLEXPIRE , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
{ XFRM_MSG_FLUSHSA , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
{ XFRM_MSG_FLUSHPOLICY , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
{ XFRM_MSG_NEWAE , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
{ XFRM_MSG_GETAE , NETLINK_XFRM_SOCKET__NLMSG_READ } ,
2015-04-10 17:24:26 +03:00
{ XFRM_MSG_REPORT , NETLINK_XFRM_SOCKET__NLMSG_READ } ,
2015-04-10 17:24:27 +03:00
{ XFRM_MSG_MIGRATE , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
2015-04-08 19:36:42 +03:00
{ XFRM_MSG_NEWSADINFO , NETLINK_XFRM_SOCKET__NLMSG_READ } ,
{ XFRM_MSG_GETSADINFO , NETLINK_XFRM_SOCKET__NLMSG_READ } ,
2015-04-08 19:36:40 +03:00
{ XFRM_MSG_NEWSPDINFO , NETLINK_XFRM_SOCKET__NLMSG_WRITE } ,
2015-04-08 19:36:41 +03:00
{ XFRM_MSG_GETSPDINFO , NETLINK_XFRM_SOCKET__NLMSG_READ } ,
2015-04-10 17:24:28 +03:00
{ XFRM_MSG_MAPPING , NETLINK_XFRM_SOCKET__NLMSG_READ } ,
2005-04-17 02:20:36 +04:00
} ;
2017-03-06 19:58:08 +03:00
static const struct nlmsg_perm nlmsg_audit_perms [ ] =
2005-04-17 02:20:36 +04:00
{
[PATCH] SELinux: add finer grained permissions to Netlink audit processing
This patch provides finer grained permissions for the audit family of
Netlink sockets under SELinux.
1. We need a way to differentiate between privileged and unprivileged
reads of kernel data maintained by the audit subsystem. The AUDIT_GET
operation is unprivileged: it returns the current status of the audit
subsystem (e.g. whether it's enabled etc.). The AUDIT_LIST operation
however returns a list of the current audit ruleset, which is considered
privileged by the audit folk. To deal with this, a new SELinux
permission has been implemented and applied to the operation:
nlmsg_readpriv, which can be allocated to appropriately privileged
domains. Unprivileged domains would only be allocated nlmsg_read.
2. There is a requirement for certain domains to generate audit events
from userspace. These events need to be collected by the kernel,
collated and transmitted sequentially back to the audit daemon. An
example is user level login, an auditable event under CAPP, where
login-related domains generate AUDIT_USER messages via PAM which are
relayed back to auditd via the kernel. To prevent handing out
nlmsg_write permissions to such domains, a new permission has been
added, nlmsg_relay, which is intended for this type of purpose: data is
passed via the kernel back to userspace but no privileged information is
written to the kernel.
Also, AUDIT_LOGIN messages are now valid only for kernel->user messaging,
so this value has been removed from the SELinux nlmsgtab (which is only
used to check user->kernel messages).
Signed-off-by: James Morris <jmorris@redhat.com>
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-05-01 19:58:40 +04:00
{ AUDIT_GET , NETLINK_AUDIT_SOCKET__NLMSG_READ } ,
{ AUDIT_SET , NETLINK_AUDIT_SOCKET__NLMSG_WRITE } ,
{ AUDIT_LIST , NETLINK_AUDIT_SOCKET__NLMSG_READPRIV } ,
{ AUDIT_ADD , NETLINK_AUDIT_SOCKET__NLMSG_WRITE } ,
{ AUDIT_DEL , NETLINK_AUDIT_SOCKET__NLMSG_WRITE } ,
2006-02-07 20:05:27 +03:00
{ AUDIT_LIST_RULES , NETLINK_AUDIT_SOCKET__NLMSG_READPRIV } ,
{ AUDIT_ADD_RULE , NETLINK_AUDIT_SOCKET__NLMSG_WRITE } ,
{ AUDIT_DEL_RULE , NETLINK_AUDIT_SOCKET__NLMSG_WRITE } ,
[PATCH] SELinux: add finer grained permissions to Netlink audit processing
This patch provides finer grained permissions for the audit family of
Netlink sockets under SELinux.
1. We need a way to differentiate between privileged and unprivileged
reads of kernel data maintained by the audit subsystem. The AUDIT_GET
operation is unprivileged: it returns the current status of the audit
subsystem (e.g. whether it's enabled etc.). The AUDIT_LIST operation
however returns a list of the current audit ruleset, which is considered
privileged by the audit folk. To deal with this, a new SELinux
permission has been implemented and applied to the operation:
nlmsg_readpriv, which can be allocated to appropriately privileged
domains. Unprivileged domains would only be allocated nlmsg_read.
2. There is a requirement for certain domains to generate audit events
from userspace. These events need to be collected by the kernel,
collated and transmitted sequentially back to the audit daemon. An
example is user level login, an auditable event under CAPP, where
login-related domains generate AUDIT_USER messages via PAM which are
relayed back to auditd via the kernel. To prevent handing out
nlmsg_write permissions to such domains, a new permission has been
added, nlmsg_relay, which is intended for this type of purpose: data is
passed via the kernel back to userspace but no privileged information is
written to the kernel.
Also, AUDIT_LOGIN messages are now valid only for kernel->user messaging,
so this value has been removed from the SELinux nlmsgtab (which is only
used to check user->kernel messages).
Signed-off-by: James Morris <jmorris@redhat.com>
Signed-off-by: Stephen Smalley <sds@tycho.nsa.gov>
Signed-off-by: Andrew Morton <akpm@osdl.org>
Signed-off-by: Linus Torvalds <torvalds@osdl.org>
2005-05-01 19:58:40 +04:00
{ AUDIT_USER , NETLINK_AUDIT_SOCKET__NLMSG_RELAY } ,
2005-05-06 15:38:39 +04:00
{ AUDIT_SIGNAL_INFO , NETLINK_AUDIT_SOCKET__NLMSG_READ } ,
2009-06-03 01:01:16 +04:00
{ AUDIT_TRIM , NETLINK_AUDIT_SOCKET__NLMSG_WRITE } ,
{ AUDIT_MAKE_EQUIV , NETLINK_AUDIT_SOCKET__NLMSG_WRITE } ,
Audit: add TTY input auditing
Add TTY input auditing, used to audit system administrator's actions. This is
required by various security standards such as DCID 6/3 and PCI to provide
non-repudiation of administrator's actions and to allow a review of past
actions if the administrator seems to overstep their duties or if the system
becomes misconfigured for unknown reasons. These requirements do not make it
necessary to audit TTY output as well.
Compared to an user-space keylogger, this approach records TTY input using the
audit subsystem, correlated with other audit events, and it is completely
transparent to the user-space application (e.g. the console ioctls still
work).
TTY input auditing works on a higher level than auditing all system calls
within the session, which would produce an overwhelming amount of mostly
useless audit events.
Add an "audit_tty" attribute, inherited across fork (). Data read from TTYs
by process with the attribute is sent to the audit subsystem by the kernel.
The audit netlink interface is extended to allow modifying the audit_tty
attribute, and to allow sending explanatory audit events from user-space (for
example, a shell might send an event containing the final command, after the
interactive command-line editing and history expansion is performed, which
might be difficult to decipher from the TTY input alone).
Because the "audit_tty" attribute is inherited across fork (), it would be set
e.g. for sshd restarted within an audited session. To prevent this, the
audit_tty attribute is cleared when a process with no open TTY file
descriptors (e.g. after daemon startup) opens a TTY.
See https://www.redhat.com/archives/linux-audit/2007-June/msg00000.html for a
more detailed rationale document for an older version of this patch.
[akpm@linux-foundation.org: build fix]
Signed-off-by: Miloslav Trmac <mitr@redhat.com>
Cc: Al Viro <viro@zeniv.linux.org.uk>
Cc: Alan Cox <alan@lxorguk.ukuu.org.uk>
Cc: Paul Fulghum <paulkf@microgate.com>
Cc: Casey Schaufler <casey@schaufler-ca.com>
Cc: Steve Grubb <sgrubb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2007-07-16 10:40:56 +04:00
{ AUDIT_TTY_GET , NETLINK_AUDIT_SOCKET__NLMSG_READ } ,
2009-03-05 21:43:35 +03:00
{ AUDIT_TTY_SET , NETLINK_AUDIT_SOCKET__NLMSG_TTY_AUDIT } ,
2013-05-24 20:09:50 +04:00
{ AUDIT_GET_FEATURE , NETLINK_AUDIT_SOCKET__NLMSG_READ } ,
{ AUDIT_SET_FEATURE , NETLINK_AUDIT_SOCKET__NLMSG_WRITE } ,
2005-04-17 02:20:36 +04:00
} ;
2017-03-06 19:58:08 +03:00
static int nlmsg_perm ( u16 nlmsg_type , u32 * perm , const struct nlmsg_perm * tab , size_t tabsize )
2005-04-17 02:20:36 +04:00
{
int i , err = - EINVAL ;
for ( i = 0 ; i < tabsize / sizeof ( struct nlmsg_perm ) ; i + + )
if ( nlmsg_type = = tab [ i ] . nlmsg_type ) {
* perm = tab [ i ] . perm ;
err = 0 ;
break ;
}
return err ;
}
int selinux_nlmsg_lookup ( u16 sclass , u16 nlmsg_type , u32 * perm )
{
int err = 0 ;
switch ( sclass ) {
case SECCLASS_NETLINK_ROUTE_SOCKET :
2018-11-28 20:57:33 +03:00
/* RTM_MAX always points to RTM_SETxxxx, ie RTM_NEWxxx + 3.
* If the BUILD_BUG_ON ( ) below fails you must update the
* structures at the top of this file with the new mappings
* before updating the BUILD_BUG_ON ( ) macro !
*/
2021-03-11 21:03:15 +03:00
BUILD_BUG_ON ( RTM_MAX ! = ( RTM_NEWNEXTHOPBUCKET + 3 ) ) ;
2005-04-17 02:20:36 +04:00
err = nlmsg_perm ( nlmsg_type , perm , nlmsg_route_perms ,
sizeof ( nlmsg_route_perms ) ) ;
break ;
case SECCLASS_NETLINK_TCPDIAG_SOCKET :
err = nlmsg_perm ( nlmsg_type , perm , nlmsg_tcpdiag_perms ,
sizeof ( nlmsg_tcpdiag_perms ) ) ;
break ;
case SECCLASS_NETLINK_XFRM_SOCKET :
2018-11-28 20:57:33 +03:00
/* If the BUILD_BUG_ON() below fails you must update the
* structures at the top of this file with the new mappings
* before updating the BUILD_BUG_ON ( ) macro !
*/
2015-04-13 16:20:37 +03:00
BUILD_BUG_ON ( XFRM_MSG_MAX ! = XFRM_MSG_MAPPING ) ;
2005-04-17 02:20:36 +04:00
err = nlmsg_perm ( nlmsg_type , perm , nlmsg_xfrm_perms ,
sizeof ( nlmsg_xfrm_perms ) ) ;
break ;
case SECCLASS_NETLINK_AUDIT_SOCKET :
2005-11-03 18:48:08 +03:00
if ( ( nlmsg_type > = AUDIT_FIRST_USER_MSG & &
nlmsg_type < = AUDIT_LAST_USER_MSG ) | |
( nlmsg_type > = AUDIT_FIRST_USER_MSG2 & &
2008-04-19 01:38:26 +04:00
nlmsg_type < = AUDIT_LAST_USER_MSG2 ) ) {
2005-05-18 13:21:07 +04:00
* perm = NETLINK_AUDIT_SOCKET__NLMSG_RELAY ;
} else {
err = nlmsg_perm ( nlmsg_type , perm , nlmsg_audit_perms ,
sizeof ( nlmsg_audit_perms ) ) ;
}
2005-04-17 02:20:36 +04:00
break ;
/* No messaging from userspace, or class unknown/unhandled */
default :
err = - ENOENT ;
break ;
}
return err ;
}