blob: 1de87172885d22bca351f321f28fbf8e2fea435b [file] [log] [blame]
Huw Daviescb72d382016-06-27 15:02:46 -04001/*
2 * NetLabel CALIPSO/IPv6 Support
3 *
4 * This file defines the CALIPSO/IPv6 functions for the NetLabel system. The
5 * NetLabel system manages static and dynamic label mappings for network
6 * protocols such as CIPSO and CALIPSO.
7 *
8 * Authors: Paul Moore <paul@paul-moore.com>
9 * Huw Davies <huw@codeweavers.com>
10 *
11 */
12
13/* (c) Copyright Hewlett-Packard Development Company, L.P., 2006
14 * (c) Copyright Huw Davies <huw@codeweavers.com>, 2015
15 *
16 * This program is free software; you can redistribute it and/or modify
17 * it under the terms of the GNU General Public License as published by
18 * the Free Software Foundation; either version 2 of the License, or
19 * (at your option) any later version.
20 *
21 * This program is distributed in the hope that it will be useful,
22 * but WITHOUT ANY WARRANTY; without even the implied warranty of
23 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
24 * the GNU General Public License for more details.
25 *
26 * You should have received a copy of the GNU General Public License
27 * along with this program; if not, see <http://www.gnu.org/licenses/>.
28 *
29 */
30
31#include <linux/types.h>
32#include <linux/socket.h>
33#include <linux/string.h>
34#include <linux/skbuff.h>
35#include <linux/audit.h>
36#include <linux/slab.h>
37#include <net/sock.h>
38#include <net/netlink.h>
39#include <net/genetlink.h>
40#include <net/netlabel.h>
41#include <net/calipso.h>
42#include <linux/atomic.h>
43
44#include "netlabel_user.h"
45#include "netlabel_calipso.h"
46#include "netlabel_mgmt.h"
47#include "netlabel_domainhash.h"
48
Huw Daviese1ce69d2016-06-27 15:02:48 -040049/* Argument struct for calipso_doi_walk() */
50struct netlbl_calipso_doiwalk_arg {
51 struct netlink_callback *nl_cb;
52 struct sk_buff *skb;
53 u32 seq;
54};
55
Huw Daviesd7cce012016-06-27 15:02:49 -040056/* Argument struct for netlbl_domhsh_walk() */
57struct netlbl_domhsh_walk_arg {
58 struct netlbl_audit *audit_info;
59 u32 doi;
60};
61
Huw Daviescb72d382016-06-27 15:02:46 -040062/* NetLabel Generic NETLINK CALIPSO family */
Johannes Berg489111e2016-10-24 14:40:03 +020063static struct genl_family netlbl_calipso_gnl_family;
Huw Daviescb72d382016-06-27 15:02:46 -040064
65/* NetLabel Netlink attribute policy */
66static const struct nla_policy calipso_genl_policy[NLBL_CALIPSO_A_MAX + 1] = {
67 [NLBL_CALIPSO_A_DOI] = { .type = NLA_U32 },
68 [NLBL_CALIPSO_A_MTYPE] = { .type = NLA_U32 },
69};
70
71/* NetLabel Command Handlers
72 */
73/**
74 * netlbl_calipso_add_pass - Adds a CALIPSO pass DOI definition
75 * @info: the Generic NETLINK info block
76 * @audit_info: NetLabel audit information
77 *
78 * Description:
79 * Create a new CALIPSO_MAP_PASS DOI definition based on the given ADD message
80 * and add it to the CALIPSO engine. Return zero on success and non-zero on
81 * error.
82 *
83 */
84static int netlbl_calipso_add_pass(struct genl_info *info,
85 struct netlbl_audit *audit_info)
86{
87 int ret_val;
88 struct calipso_doi *doi_def = NULL;
89
90 doi_def = kmalloc(sizeof(*doi_def), GFP_KERNEL);
91 if (!doi_def)
92 return -ENOMEM;
93 doi_def->type = CALIPSO_MAP_PASS;
94 doi_def->doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
95 ret_val = calipso_doi_add(doi_def, audit_info);
96 if (ret_val != 0)
97 calipso_doi_free(doi_def);
98
99 return ret_val;
100}
101
102/**
103 * netlbl_calipso_add - Handle an ADD message
104 * @skb: the NETLINK buffer
105 * @info: the Generic NETLINK info block
106 *
107 * Description:
108 * Create a new DOI definition based on the given ADD message and add it to the
109 * CALIPSO engine. Returns zero on success, negative values on failure.
110 *
111 */
112static int netlbl_calipso_add(struct sk_buff *skb, struct genl_info *info)
113
114{
115 int ret_val = -EINVAL;
116 struct netlbl_audit audit_info;
117
118 if (!info->attrs[NLBL_CALIPSO_A_DOI] ||
119 !info->attrs[NLBL_CALIPSO_A_MTYPE])
120 return -EINVAL;
121
122 netlbl_netlink_auditinfo(skb, &audit_info);
123 switch (nla_get_u32(info->attrs[NLBL_CALIPSO_A_MTYPE])) {
124 case CALIPSO_MAP_PASS:
125 ret_val = netlbl_calipso_add_pass(info, &audit_info);
126 break;
127 }
128 if (ret_val == 0)
129 atomic_inc(&netlabel_mgmt_protocount);
130
131 return ret_val;
132}
133
Huw Daviesa5e34492016-06-27 15:02:47 -0400134/**
135 * netlbl_calipso_list - Handle a LIST message
136 * @skb: the NETLINK buffer
137 * @info: the Generic NETLINK info block
138 *
139 * Description:
140 * Process a user generated LIST message and respond accordingly.
141 * Returns zero on success and negative values on error.
142 *
143 */
144static int netlbl_calipso_list(struct sk_buff *skb, struct genl_info *info)
145{
146 int ret_val;
147 struct sk_buff *ans_skb = NULL;
148 void *data;
149 u32 doi;
150 struct calipso_doi *doi_def;
151
152 if (!info->attrs[NLBL_CALIPSO_A_DOI]) {
153 ret_val = -EINVAL;
154 goto list_failure;
155 }
156
157 doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
158
159 doi_def = calipso_doi_getdef(doi);
160 if (!doi_def) {
161 ret_val = -EINVAL;
162 goto list_failure;
163 }
164
165 ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
166 if (!ans_skb) {
167 ret_val = -ENOMEM;
168 goto list_failure_put;
169 }
170 data = genlmsg_put_reply(ans_skb, info, &netlbl_calipso_gnl_family,
171 0, NLBL_CALIPSO_C_LIST);
172 if (!data) {
173 ret_val = -ENOMEM;
174 goto list_failure_put;
175 }
176
177 ret_val = nla_put_u32(ans_skb, NLBL_CALIPSO_A_MTYPE, doi_def->type);
178 if (ret_val != 0)
179 goto list_failure_put;
180
181 calipso_doi_putdef(doi_def);
182
183 genlmsg_end(ans_skb, data);
184 return genlmsg_reply(ans_skb, info);
185
186list_failure_put:
187 calipso_doi_putdef(doi_def);
188list_failure:
189 kfree_skb(ans_skb);
190 return ret_val;
191}
192
Huw Daviese1ce69d2016-06-27 15:02:48 -0400193/**
194 * netlbl_calipso_listall_cb - calipso_doi_walk() callback for LISTALL
195 * @doi_def: the CALIPSO DOI definition
196 * @arg: the netlbl_calipso_doiwalk_arg structure
197 *
198 * Description:
199 * This function is designed to be used as a callback to the
200 * calipso_doi_walk() function for use in generating a response for a LISTALL
201 * message. Returns the size of the message on success, negative values on
202 * failure.
203 *
204 */
205static int netlbl_calipso_listall_cb(struct calipso_doi *doi_def, void *arg)
206{
207 int ret_val = -ENOMEM;
208 struct netlbl_calipso_doiwalk_arg *cb_arg = arg;
209 void *data;
210
211 data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).portid,
212 cb_arg->seq, &netlbl_calipso_gnl_family,
213 NLM_F_MULTI, NLBL_CALIPSO_C_LISTALL);
214 if (!data)
215 goto listall_cb_failure;
216
217 ret_val = nla_put_u32(cb_arg->skb, NLBL_CALIPSO_A_DOI, doi_def->doi);
218 if (ret_val != 0)
219 goto listall_cb_failure;
220 ret_val = nla_put_u32(cb_arg->skb,
221 NLBL_CALIPSO_A_MTYPE,
222 doi_def->type);
223 if (ret_val != 0)
224 goto listall_cb_failure;
225
226 genlmsg_end(cb_arg->skb, data);
227 return 0;
228
229listall_cb_failure:
230 genlmsg_cancel(cb_arg->skb, data);
231 return ret_val;
232}
233
234/**
235 * netlbl_calipso_listall - Handle a LISTALL message
236 * @skb: the NETLINK buffer
237 * @cb: the NETLINK callback
238 *
239 * Description:
240 * Process a user generated LISTALL message and respond accordingly. Returns
241 * zero on success and negative values on error.
242 *
243 */
244static int netlbl_calipso_listall(struct sk_buff *skb,
245 struct netlink_callback *cb)
246{
247 struct netlbl_calipso_doiwalk_arg cb_arg;
248 u32 doi_skip = cb->args[0];
249
250 cb_arg.nl_cb = cb;
251 cb_arg.skb = skb;
252 cb_arg.seq = cb->nlh->nlmsg_seq;
253
254 calipso_doi_walk(&doi_skip, netlbl_calipso_listall_cb, &cb_arg);
255
256 cb->args[0] = doi_skip;
257 return skb->len;
258}
259
Huw Daviesd7cce012016-06-27 15:02:49 -0400260/**
261 * netlbl_calipso_remove_cb - netlbl_calipso_remove() callback for REMOVE
262 * @entry: LSM domain mapping entry
263 * @arg: the netlbl_domhsh_walk_arg structure
264 *
265 * Description:
266 * This function is intended for use by netlbl_calipso_remove() as the callback
267 * for the netlbl_domhsh_walk() function; it removes LSM domain map entries
268 * which are associated with the CALIPSO DOI specified in @arg. Returns zero on
269 * success, negative values on failure.
270 *
271 */
272static int netlbl_calipso_remove_cb(struct netlbl_dom_map *entry, void *arg)
273{
274 struct netlbl_domhsh_walk_arg *cb_arg = arg;
275
276 if (entry->def.type == NETLBL_NLTYPE_CALIPSO &&
277 entry->def.calipso->doi == cb_arg->doi)
278 return netlbl_domhsh_remove_entry(entry, cb_arg->audit_info);
279
280 return 0;
281}
282
283/**
284 * netlbl_calipso_remove - Handle a REMOVE message
285 * @skb: the NETLINK buffer
286 * @info: the Generic NETLINK info block
287 *
288 * Description:
289 * Process a user generated REMOVE message and respond accordingly. Returns
290 * zero on success, negative values on failure.
291 *
292 */
293static int netlbl_calipso_remove(struct sk_buff *skb, struct genl_info *info)
294{
295 int ret_val = -EINVAL;
296 struct netlbl_domhsh_walk_arg cb_arg;
297 struct netlbl_audit audit_info;
298 u32 skip_bkt = 0;
299 u32 skip_chain = 0;
300
301 if (!info->attrs[NLBL_CALIPSO_A_DOI])
302 return -EINVAL;
303
304 netlbl_netlink_auditinfo(skb, &audit_info);
305 cb_arg.doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
306 cb_arg.audit_info = &audit_info;
307 ret_val = netlbl_domhsh_walk(&skip_bkt, &skip_chain,
308 netlbl_calipso_remove_cb, &cb_arg);
309 if (ret_val == 0 || ret_val == -ENOENT) {
310 ret_val = calipso_doi_remove(cb_arg.doi, &audit_info);
311 if (ret_val == 0)
312 atomic_dec(&netlabel_mgmt_protocount);
313 }
314
315 return ret_val;
316}
317
Huw Daviescb72d382016-06-27 15:02:46 -0400318/* NetLabel Generic NETLINK Command Definitions
319 */
320
321static const struct genl_ops netlbl_calipso_ops[] = {
322 {
323 .cmd = NLBL_CALIPSO_C_ADD,
Johannes Bergef6243a2019-04-26 14:07:31 +0200324 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
Huw Daviescb72d382016-06-27 15:02:46 -0400325 .flags = GENL_ADMIN_PERM,
Huw Daviescb72d382016-06-27 15:02:46 -0400326 .doit = netlbl_calipso_add,
327 .dumpit = NULL,
328 },
Huw Daviesa5e34492016-06-27 15:02:47 -0400329 {
Huw Daviesd7cce012016-06-27 15:02:49 -0400330 .cmd = NLBL_CALIPSO_C_REMOVE,
Johannes Bergef6243a2019-04-26 14:07:31 +0200331 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
Huw Daviesd7cce012016-06-27 15:02:49 -0400332 .flags = GENL_ADMIN_PERM,
Huw Daviesd7cce012016-06-27 15:02:49 -0400333 .doit = netlbl_calipso_remove,
334 .dumpit = NULL,
335 },
336 {
Huw Daviesa5e34492016-06-27 15:02:47 -0400337 .cmd = NLBL_CALIPSO_C_LIST,
Johannes Bergef6243a2019-04-26 14:07:31 +0200338 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
Huw Daviesa5e34492016-06-27 15:02:47 -0400339 .flags = 0,
Huw Daviesa5e34492016-06-27 15:02:47 -0400340 .doit = netlbl_calipso_list,
341 .dumpit = NULL,
342 },
Huw Daviese1ce69d2016-06-27 15:02:48 -0400343 {
344 .cmd = NLBL_CALIPSO_C_LISTALL,
Johannes Bergef6243a2019-04-26 14:07:31 +0200345 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
Huw Daviese1ce69d2016-06-27 15:02:48 -0400346 .flags = 0,
Huw Daviese1ce69d2016-06-27 15:02:48 -0400347 .doit = NULL,
348 .dumpit = netlbl_calipso_listall,
349 },
Huw Daviescb72d382016-06-27 15:02:46 -0400350};
351
Johannes Berg56989f62016-10-24 14:40:05 +0200352static struct genl_family netlbl_calipso_gnl_family __ro_after_init = {
Johannes Berg489111e2016-10-24 14:40:03 +0200353 .hdrsize = 0,
354 .name = NETLBL_NLTYPE_CALIPSO_NAME,
355 .version = NETLBL_PROTO_VERSION,
356 .maxattr = NLBL_CALIPSO_A_MAX,
Johannes Berg3b0f31f2019-03-21 22:51:02 +0100357 .policy = calipso_genl_policy,
Johannes Berg489111e2016-10-24 14:40:03 +0200358 .module = THIS_MODULE,
359 .ops = netlbl_calipso_ops,
360 .n_ops = ARRAY_SIZE(netlbl_calipso_ops),
361};
362
Huw Daviescb72d382016-06-27 15:02:46 -0400363/* NetLabel Generic NETLINK Protocol Functions
364 */
365
366/**
367 * netlbl_calipso_genl_init - Register the CALIPSO NetLabel component
368 *
369 * Description:
370 * Register the CALIPSO packet NetLabel component with the Generic NETLINK
371 * mechanism. Returns zero on success, negative values on failure.
372 *
373 */
374int __init netlbl_calipso_genl_init(void)
375{
Johannes Berg489111e2016-10-24 14:40:03 +0200376 return genl_register_family(&netlbl_calipso_gnl_family);
Huw Daviescb72d382016-06-27 15:02:46 -0400377}
378
379static const struct netlbl_calipso_ops *calipso_ops;
380
381/**
382 * netlbl_calipso_ops_register - Register the CALIPSO operations
383 *
384 * Description:
385 * Register the CALIPSO packet engine operations.
386 *
387 */
388const struct netlbl_calipso_ops *
389netlbl_calipso_ops_register(const struct netlbl_calipso_ops *ops)
390{
391 return xchg(&calipso_ops, ops);
392}
393EXPORT_SYMBOL(netlbl_calipso_ops_register);
394
395static const struct netlbl_calipso_ops *netlbl_calipso_ops_get(void)
396{
Mark Rutland6aa7de02017-10-23 14:07:29 -0700397 return READ_ONCE(calipso_ops);
Huw Daviescb72d382016-06-27 15:02:46 -0400398}
399
400/**
401 * calipso_doi_add - Add a new DOI to the CALIPSO protocol engine
402 * @doi_def: the DOI structure
403 * @audit_info: NetLabel audit information
404 *
405 * Description:
406 * The caller defines a new DOI for use by the CALIPSO engine and calls this
407 * function to add it to the list of acceptable domains. The caller must
408 * ensure that the mapping table specified in @doi_def->map meets all of the
409 * requirements of the mapping type (see calipso.h for details). Returns
410 * zero on success and non-zero on failure.
411 *
412 */
413int calipso_doi_add(struct calipso_doi *doi_def,
414 struct netlbl_audit *audit_info)
415{
416 int ret_val = -ENOMSG;
417 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
418
419 if (ops)
420 ret_val = ops->doi_add(doi_def, audit_info);
421 return ret_val;
422}
423
424/**
425 * calipso_doi_free - Frees a DOI definition
426 * @doi_def: the DOI definition
427 *
428 * Description:
429 * This function frees all of the memory associated with a DOI definition.
430 *
431 */
432void calipso_doi_free(struct calipso_doi *doi_def)
433{
434 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
435
436 if (ops)
437 ops->doi_free(doi_def);
438}
Huw Daviesa5e34492016-06-27 15:02:47 -0400439
440/**
Huw Daviesd7cce012016-06-27 15:02:49 -0400441 * calipso_doi_remove - Remove an existing DOI from the CALIPSO protocol engine
442 * @doi: the DOI value
443 * @audit_secid: the LSM secid to use in the audit message
444 *
445 * Description:
446 * Removes a DOI definition from the CALIPSO engine. The NetLabel routines will
447 * be called to release their own LSM domain mappings as well as our own
448 * domain list. Returns zero on success and negative values on failure.
449 *
450 */
451int calipso_doi_remove(u32 doi, struct netlbl_audit *audit_info)
452{
453 int ret_val = -ENOMSG;
454 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
455
456 if (ops)
457 ret_val = ops->doi_remove(doi, audit_info);
458 return ret_val;
459}
460
461/**
Huw Daviesa5e34492016-06-27 15:02:47 -0400462 * calipso_doi_getdef - Returns a reference to a valid DOI definition
463 * @doi: the DOI value
464 *
465 * Description:
466 * Searches for a valid DOI definition and if one is found it is returned to
467 * the caller. Otherwise NULL is returned. The caller must ensure that
468 * calipso_doi_putdef() is called when the caller is done.
469 *
470 */
471struct calipso_doi *calipso_doi_getdef(u32 doi)
472{
473 struct calipso_doi *ret_val = NULL;
474 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
475
476 if (ops)
477 ret_val = ops->doi_getdef(doi);
478 return ret_val;
479}
480
481/**
482 * calipso_doi_putdef - Releases a reference for the given DOI definition
483 * @doi_def: the DOI definition
484 *
485 * Description:
486 * Releases a DOI definition reference obtained from calipso_doi_getdef().
487 *
488 */
489void calipso_doi_putdef(struct calipso_doi *doi_def)
490{
491 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
492
493 if (ops)
494 ops->doi_putdef(doi_def);
495}
Huw Daviese1ce69d2016-06-27 15:02:48 -0400496
497/**
498 * calipso_doi_walk - Iterate through the DOI definitions
499 * @skip_cnt: skip past this number of DOI definitions, updated
500 * @callback: callback for each DOI definition
501 * @cb_arg: argument for the callback function
502 *
503 * Description:
504 * Iterate over the DOI definition list, skipping the first @skip_cnt entries.
505 * For each entry call @callback, if @callback returns a negative value stop
506 * 'walking' through the list and return. Updates the value in @skip_cnt upon
507 * return. Returns zero on success, negative values on failure.
508 *
509 */
510int calipso_doi_walk(u32 *skip_cnt,
511 int (*callback)(struct calipso_doi *doi_def, void *arg),
512 void *cb_arg)
513{
514 int ret_val = -ENOMSG;
515 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
516
517 if (ops)
518 ret_val = ops->doi_walk(skip_cnt, callback, cb_arg);
519 return ret_val;
520}
Huw Daviesceba1832016-06-27 15:02:51 -0400521
522/**
523 * calipso_sock_getattr - Get the security attributes from a sock
524 * @sk: the sock
525 * @secattr: the security attributes
526 *
527 * Description:
528 * Query @sk to see if there is a CALIPSO option attached to the sock and if
529 * there is return the CALIPSO security attributes in @secattr. This function
530 * requires that @sk be locked, or privately held, but it does not do any
531 * locking itself. Returns zero on success and negative values on failure.
532 *
533 */
534int calipso_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
535{
536 int ret_val = -ENOMSG;
537 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
538
539 if (ops)
540 ret_val = ops->sock_getattr(sk, secattr);
541 return ret_val;
542}
543
544/**
545 * calipso_sock_setattr - Add a CALIPSO option to a socket
546 * @sk: the socket
547 * @doi_def: the CALIPSO DOI to use
548 * @secattr: the specific security attributes of the socket
549 *
550 * Description:
551 * Set the CALIPSO option on the given socket using the DOI definition and
552 * security attributes passed to the function. This function requires
553 * exclusive access to @sk, which means it either needs to be in the
554 * process of being created or locked. Returns zero on success and negative
555 * values on failure.
556 *
557 */
558int calipso_sock_setattr(struct sock *sk,
559 const struct calipso_doi *doi_def,
560 const struct netlbl_lsm_secattr *secattr)
561{
562 int ret_val = -ENOMSG;
563 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
564
565 if (ops)
566 ret_val = ops->sock_setattr(sk, doi_def, secattr);
567 return ret_val;
568}
569
570/**
571 * calipso_sock_delattr - Delete the CALIPSO option from a socket
572 * @sk: the socket
573 *
574 * Description:
575 * Removes the CALIPSO option from a socket, if present.
576 *
577 */
578void calipso_sock_delattr(struct sock *sk)
579{
580 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
581
582 if (ops)
583 ops->sock_delattr(sk);
584}
Huw Daviese1adea92016-06-27 15:05:29 -0400585
586/**
587 * calipso_req_setattr - Add a CALIPSO option to a connection request socket
588 * @req: the connection request socket
589 * @doi_def: the CALIPSO DOI to use
590 * @secattr: the specific security attributes of the socket
591 *
592 * Description:
593 * Set the CALIPSO option on the given socket using the DOI definition and
594 * security attributes passed to the function. Returns zero on success and
595 * negative values on failure.
596 *
597 */
598int calipso_req_setattr(struct request_sock *req,
599 const struct calipso_doi *doi_def,
600 const struct netlbl_lsm_secattr *secattr)
601{
602 int ret_val = -ENOMSG;
603 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
604
605 if (ops)
606 ret_val = ops->req_setattr(req, doi_def, secattr);
607 return ret_val;
608}
609
610/**
611 * calipso_req_delattr - Delete the CALIPSO option from a request socket
612 * @reg: the request socket
613 *
614 * Description:
615 * Removes the CALIPSO option from a request socket, if present.
616 *
617 */
618void calipso_req_delattr(struct request_sock *req)
619{
620 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
621
622 if (ops)
623 ops->req_delattr(req);
624}
Huw Davies2917f572016-06-27 15:06:15 -0400625
626/**
627 * calipso_optptr - Find the CALIPSO option in the packet
628 * @skb: the packet
629 *
630 * Description:
631 * Parse the packet's IP header looking for a CALIPSO option. Returns a pointer
632 * to the start of the CALIPSO option on success, NULL if one if not found.
633 *
634 */
635unsigned char *calipso_optptr(const struct sk_buff *skb)
636{
637 unsigned char *ret_val = NULL;
638 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
639
640 if (ops)
641 ret_val = ops->skbuff_optptr(skb);
642 return ret_val;
643}
644
645/**
646 * calipso_getattr - Get the security attributes from a memory block.
647 * @calipso: the CALIPSO option
648 * @secattr: the security attributes
649 *
650 * Description:
651 * Inspect @calipso and return the security attributes in @secattr.
652 * Returns zero on success and negative values on failure.
653 *
654 */
655int calipso_getattr(const unsigned char *calipso,
656 struct netlbl_lsm_secattr *secattr)
657{
658 int ret_val = -ENOMSG;
659 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
660
661 if (ops)
662 ret_val = ops->opt_getattr(calipso, secattr);
663 return ret_val;
664}
665
666/**
667 * calipso_skbuff_setattr - Set the CALIPSO option on a packet
668 * @skb: the packet
669 * @doi_def: the CALIPSO DOI to use
670 * @secattr: the security attributes
671 *
672 * Description:
673 * Set the CALIPSO option on the given packet based on the security attributes.
674 * Returns a pointer to the IP header on success and NULL on failure.
675 *
676 */
677int calipso_skbuff_setattr(struct sk_buff *skb,
678 const struct calipso_doi *doi_def,
679 const struct netlbl_lsm_secattr *secattr)
680{
681 int ret_val = -ENOMSG;
682 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
683
684 if (ops)
685 ret_val = ops->skbuff_setattr(skb, doi_def, secattr);
686 return ret_val;
687}
688
689/**
690 * calipso_skbuff_delattr - Delete any CALIPSO options from a packet
691 * @skb: the packet
692 *
693 * Description:
694 * Removes any and all CALIPSO options from the given packet. Returns zero on
695 * success, negative values on failure.
696 *
697 */
698int calipso_skbuff_delattr(struct sk_buff *skb)
699{
700 int ret_val = -ENOMSG;
701 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
702
703 if (ops)
704 ret_val = ops->skbuff_delattr(skb);
705 return ret_val;
706}
Huw Davies4fee5242016-06-27 15:06:17 -0400707
708/**
709 * calipso_cache_invalidate - Invalidates the current CALIPSO cache
710 *
711 * Description:
712 * Invalidates and frees any entries in the CALIPSO cache. Returns zero on
713 * success and negative values on failure.
714 *
715 */
716void calipso_cache_invalidate(void)
717{
718 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
719
720 if (ops)
721 ops->cache_invalidate();
722}
723
724/**
725 * calipso_cache_add - Add an entry to the CALIPSO cache
726 * @calipso_ptr: the CALIPSO option
727 * @secattr: the packet's security attributes
728 *
729 * Description:
730 * Add a new entry into the CALIPSO label mapping cache.
731 * Returns zero on success, negative values on failure.
732 *
733 */
734int calipso_cache_add(const unsigned char *calipso_ptr,
735 const struct netlbl_lsm_secattr *secattr)
736
737{
738 int ret_val = -ENOMSG;
739 const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
740
741 if (ops)
742 ret_val = ops->cache_add(calipso_ptr, secattr);
743 return ret_val;
744}