Linux Audio

Check our new training course

Loading...
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0-or-later
  2/*
  3 * NetLabel CALIPSO/IPv6 Support
  4 *
  5 * This file defines the CALIPSO/IPv6 functions for the NetLabel system.  The
  6 * NetLabel system manages static and dynamic label mappings for network
  7 * protocols such as CIPSO and CALIPSO.
  8 *
  9 * Authors: Paul Moore <paul@paul-moore.com>
 10 *          Huw Davies <huw@codeweavers.com>
 
 11 */
 12
 13/* (c) Copyright Hewlett-Packard Development Company, L.P., 2006
 14 * (c) Copyright Huw Davies <huw@codeweavers.com>, 2015
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 15 */
 16
 17#include <linux/types.h>
 18#include <linux/socket.h>
 19#include <linux/string.h>
 20#include <linux/skbuff.h>
 21#include <linux/audit.h>
 22#include <linux/slab.h>
 23#include <net/sock.h>
 24#include <net/netlink.h>
 25#include <net/genetlink.h>
 26#include <net/netlabel.h>
 27#include <net/calipso.h>
 28#include <linux/atomic.h>
 29
 30#include "netlabel_user.h"
 31#include "netlabel_calipso.h"
 32#include "netlabel_mgmt.h"
 33#include "netlabel_domainhash.h"
 34
 35/* Argument struct for calipso_doi_walk() */
 36struct netlbl_calipso_doiwalk_arg {
 37	struct netlink_callback *nl_cb;
 38	struct sk_buff *skb;
 39	u32 seq;
 40};
 41
 42/* Argument struct for netlbl_domhsh_walk() */
 43struct netlbl_domhsh_walk_arg {
 44	struct netlbl_audit *audit_info;
 45	u32 doi;
 46};
 47
 48/* NetLabel Generic NETLINK CALIPSO family */
 49static struct genl_family netlbl_calipso_gnl_family;
 50
 51/* NetLabel Netlink attribute policy */
 52static const struct nla_policy calipso_genl_policy[NLBL_CALIPSO_A_MAX + 1] = {
 53	[NLBL_CALIPSO_A_DOI] = { .type = NLA_U32 },
 54	[NLBL_CALIPSO_A_MTYPE] = { .type = NLA_U32 },
 55};
 56
 57static const struct netlbl_calipso_ops *calipso_ops;
 58
 59/**
 60 * netlbl_calipso_ops_register - Register the CALIPSO operations
 61 * @ops: ops to register
 62 *
 63 * Description:
 64 * Register the CALIPSO packet engine operations.
 65 *
 66 */
 67const struct netlbl_calipso_ops *
 68netlbl_calipso_ops_register(const struct netlbl_calipso_ops *ops)
 69{
 70	return xchg(&calipso_ops, ops);
 71}
 72EXPORT_SYMBOL(netlbl_calipso_ops_register);
 73
 74static const struct netlbl_calipso_ops *netlbl_calipso_ops_get(void)
 75{
 76	return READ_ONCE(calipso_ops);
 77}
 78
 79/* NetLabel Command Handlers
 80 */
 81/**
 82 * netlbl_calipso_add_pass - Adds a CALIPSO pass DOI definition
 83 * @info: the Generic NETLINK info block
 84 * @audit_info: NetLabel audit information
 85 *
 86 * Description:
 87 * Create a new CALIPSO_MAP_PASS DOI definition based on the given ADD message
 88 * and add it to the CALIPSO engine.  Return zero on success and non-zero on
 89 * error.
 90 *
 91 */
 92static int netlbl_calipso_add_pass(struct genl_info *info,
 93				   struct netlbl_audit *audit_info)
 94{
 95	int ret_val;
 96	struct calipso_doi *doi_def = NULL;
 97
 98	doi_def = kmalloc(sizeof(*doi_def), GFP_KERNEL);
 99	if (!doi_def)
100		return -ENOMEM;
101	doi_def->type = CALIPSO_MAP_PASS;
102	doi_def->doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
103	ret_val = calipso_doi_add(doi_def, audit_info);
104	if (ret_val != 0)
105		calipso_doi_free(doi_def);
106
107	return ret_val;
108}
109
110/**
111 * netlbl_calipso_add - Handle an ADD message
112 * @skb: the NETLINK buffer
113 * @info: the Generic NETLINK info block
114 *
115 * Description:
116 * Create a new DOI definition based on the given ADD message and add it to the
117 * CALIPSO engine.  Returns zero on success, negative values on failure.
118 *
119 */
120static int netlbl_calipso_add(struct sk_buff *skb, struct genl_info *info)
 
121{
122	int ret_val = -EINVAL;
123	struct netlbl_audit audit_info;
124	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
125
126	if (!info->attrs[NLBL_CALIPSO_A_DOI] ||
127	    !info->attrs[NLBL_CALIPSO_A_MTYPE])
128		return -EINVAL;
129
130	if (!ops)
131		return -EOPNOTSUPP;
132
133	netlbl_netlink_auditinfo(&audit_info);
134	switch (nla_get_u32(info->attrs[NLBL_CALIPSO_A_MTYPE])) {
135	case CALIPSO_MAP_PASS:
136		ret_val = netlbl_calipso_add_pass(info, &audit_info);
137		break;
138	}
139	if (ret_val == 0)
140		atomic_inc(&netlabel_mgmt_protocount);
141
142	return ret_val;
143}
144
145/**
146 * netlbl_calipso_list - Handle a LIST message
147 * @skb: the NETLINK buffer
148 * @info: the Generic NETLINK info block
149 *
150 * Description:
151 * Process a user generated LIST message and respond accordingly.
152 * Returns zero on success and negative values on error.
153 *
154 */
155static int netlbl_calipso_list(struct sk_buff *skb, struct genl_info *info)
156{
157	int ret_val;
158	struct sk_buff *ans_skb = NULL;
159	void *data;
160	u32 doi;
161	struct calipso_doi *doi_def;
162
163	if (!info->attrs[NLBL_CALIPSO_A_DOI]) {
164		ret_val = -EINVAL;
165		goto list_failure;
166	}
167
168	doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
169
170	doi_def = calipso_doi_getdef(doi);
171	if (!doi_def) {
172		ret_val = -EINVAL;
173		goto list_failure;
174	}
175
176	ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
177	if (!ans_skb) {
178		ret_val = -ENOMEM;
179		goto list_failure_put;
180	}
181	data = genlmsg_put_reply(ans_skb, info, &netlbl_calipso_gnl_family,
182				 0, NLBL_CALIPSO_C_LIST);
183	if (!data) {
184		ret_val = -ENOMEM;
185		goto list_failure_put;
186	}
187
188	ret_val = nla_put_u32(ans_skb, NLBL_CALIPSO_A_MTYPE, doi_def->type);
189	if (ret_val != 0)
190		goto list_failure_put;
191
192	calipso_doi_putdef(doi_def);
193
194	genlmsg_end(ans_skb, data);
195	return genlmsg_reply(ans_skb, info);
196
197list_failure_put:
198	calipso_doi_putdef(doi_def);
199list_failure:
200	kfree_skb(ans_skb);
201	return ret_val;
202}
203
204/**
205 * netlbl_calipso_listall_cb - calipso_doi_walk() callback for LISTALL
206 * @doi_def: the CALIPSO DOI definition
207 * @arg: the netlbl_calipso_doiwalk_arg structure
208 *
209 * Description:
210 * This function is designed to be used as a callback to the
211 * calipso_doi_walk() function for use in generating a response for a LISTALL
212 * message.  Returns the size of the message on success, negative values on
213 * failure.
214 *
215 */
216static int netlbl_calipso_listall_cb(struct calipso_doi *doi_def, void *arg)
217{
218	int ret_val = -ENOMEM;
219	struct netlbl_calipso_doiwalk_arg *cb_arg = arg;
220	void *data;
221
222	data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).portid,
223			   cb_arg->seq, &netlbl_calipso_gnl_family,
224			   NLM_F_MULTI, NLBL_CALIPSO_C_LISTALL);
225	if (!data)
226		goto listall_cb_failure;
227
228	ret_val = nla_put_u32(cb_arg->skb, NLBL_CALIPSO_A_DOI, doi_def->doi);
229	if (ret_val != 0)
230		goto listall_cb_failure;
231	ret_val = nla_put_u32(cb_arg->skb,
232			      NLBL_CALIPSO_A_MTYPE,
233			      doi_def->type);
234	if (ret_val != 0)
235		goto listall_cb_failure;
236
237	genlmsg_end(cb_arg->skb, data);
238	return 0;
239
240listall_cb_failure:
241	genlmsg_cancel(cb_arg->skb, data);
242	return ret_val;
243}
244
245/**
246 * netlbl_calipso_listall - Handle a LISTALL message
247 * @skb: the NETLINK buffer
248 * @cb: the NETLINK callback
249 *
250 * Description:
251 * Process a user generated LISTALL message and respond accordingly.  Returns
252 * zero on success and negative values on error.
253 *
254 */
255static int netlbl_calipso_listall(struct sk_buff *skb,
256				  struct netlink_callback *cb)
257{
258	struct netlbl_calipso_doiwalk_arg cb_arg;
259	u32 doi_skip = cb->args[0];
260
261	cb_arg.nl_cb = cb;
262	cb_arg.skb = skb;
263	cb_arg.seq = cb->nlh->nlmsg_seq;
264
265	calipso_doi_walk(&doi_skip, netlbl_calipso_listall_cb, &cb_arg);
266
267	cb->args[0] = doi_skip;
268	return skb->len;
269}
270
271/**
272 * netlbl_calipso_remove_cb - netlbl_calipso_remove() callback for REMOVE
273 * @entry: LSM domain mapping entry
274 * @arg: the netlbl_domhsh_walk_arg structure
275 *
276 * Description:
277 * This function is intended for use by netlbl_calipso_remove() as the callback
278 * for the netlbl_domhsh_walk() function; it removes LSM domain map entries
279 * which are associated with the CALIPSO DOI specified in @arg.  Returns zero on
280 * success, negative values on failure.
281 *
282 */
283static int netlbl_calipso_remove_cb(struct netlbl_dom_map *entry, void *arg)
284{
285	struct netlbl_domhsh_walk_arg *cb_arg = arg;
286
287	if (entry->def.type == NETLBL_NLTYPE_CALIPSO &&
288	    entry->def.calipso->doi == cb_arg->doi)
289		return netlbl_domhsh_remove_entry(entry, cb_arg->audit_info);
290
291	return 0;
292}
293
294/**
295 * netlbl_calipso_remove - Handle a REMOVE message
296 * @skb: the NETLINK buffer
297 * @info: the Generic NETLINK info block
298 *
299 * Description:
300 * Process a user generated REMOVE message and respond accordingly.  Returns
301 * zero on success, negative values on failure.
302 *
303 */
304static int netlbl_calipso_remove(struct sk_buff *skb, struct genl_info *info)
305{
306	int ret_val = -EINVAL;
307	struct netlbl_domhsh_walk_arg cb_arg;
308	struct netlbl_audit audit_info;
309	u32 skip_bkt = 0;
310	u32 skip_chain = 0;
311
312	if (!info->attrs[NLBL_CALIPSO_A_DOI])
313		return -EINVAL;
314
315	netlbl_netlink_auditinfo(&audit_info);
316	cb_arg.doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
317	cb_arg.audit_info = &audit_info;
318	ret_val = netlbl_domhsh_walk(&skip_bkt, &skip_chain,
319				     netlbl_calipso_remove_cb, &cb_arg);
320	if (ret_val == 0 || ret_val == -ENOENT) {
321		ret_val = calipso_doi_remove(cb_arg.doi, &audit_info);
322		if (ret_val == 0)
323			atomic_dec(&netlabel_mgmt_protocount);
324	}
325
326	return ret_val;
327}
328
329/* NetLabel Generic NETLINK Command Definitions
330 */
331
332static const struct genl_small_ops netlbl_calipso_ops[] = {
333	{
334	.cmd = NLBL_CALIPSO_C_ADD,
335	.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
336	.flags = GENL_ADMIN_PERM,
 
337	.doit = netlbl_calipso_add,
338	.dumpit = NULL,
339	},
340	{
341	.cmd = NLBL_CALIPSO_C_REMOVE,
342	.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
343	.flags = GENL_ADMIN_PERM,
 
344	.doit = netlbl_calipso_remove,
345	.dumpit = NULL,
346	},
347	{
348	.cmd = NLBL_CALIPSO_C_LIST,
349	.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
350	.flags = 0,
 
351	.doit = netlbl_calipso_list,
352	.dumpit = NULL,
353	},
354	{
355	.cmd = NLBL_CALIPSO_C_LISTALL,
356	.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
357	.flags = 0,
 
358	.doit = NULL,
359	.dumpit = netlbl_calipso_listall,
360	},
361};
362
363static struct genl_family netlbl_calipso_gnl_family __ro_after_init = {
364	.hdrsize = 0,
365	.name = NETLBL_NLTYPE_CALIPSO_NAME,
366	.version = NETLBL_PROTO_VERSION,
367	.maxattr = NLBL_CALIPSO_A_MAX,
368	.policy = calipso_genl_policy,
369	.module = THIS_MODULE,
370	.small_ops = netlbl_calipso_ops,
371	.n_small_ops = ARRAY_SIZE(netlbl_calipso_ops),
372	.resv_start_op = NLBL_CALIPSO_C_LISTALL + 1,
373};
374
375/* NetLabel Generic NETLINK Protocol Functions
376 */
377
378/**
379 * netlbl_calipso_genl_init - Register the CALIPSO NetLabel component
380 *
381 * Description:
382 * Register the CALIPSO packet NetLabel component with the Generic NETLINK
383 * mechanism.  Returns zero on success, negative values on failure.
384 *
385 */
386int __init netlbl_calipso_genl_init(void)
387{
388	return genl_register_family(&netlbl_calipso_gnl_family);
389}
390
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
391/**
392 * calipso_doi_add - Add a new DOI to the CALIPSO protocol engine
393 * @doi_def: the DOI structure
394 * @audit_info: NetLabel audit information
395 *
396 * Description:
397 * The caller defines a new DOI for use by the CALIPSO engine and calls this
398 * function to add it to the list of acceptable domains.  The caller must
399 * ensure that the mapping table specified in @doi_def->map meets all of the
400 * requirements of the mapping type (see calipso.h for details).  Returns
401 * zero on success and non-zero on failure.
402 *
403 */
404int calipso_doi_add(struct calipso_doi *doi_def,
405		    struct netlbl_audit *audit_info)
406{
407	int ret_val = -ENOMSG;
408	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
409
410	if (ops)
411		ret_val = ops->doi_add(doi_def, audit_info);
412	return ret_val;
413}
414
415/**
416 * calipso_doi_free - Frees a DOI definition
417 * @doi_def: the DOI definition
418 *
419 * Description:
420 * This function frees all of the memory associated with a DOI definition.
421 *
422 */
423void calipso_doi_free(struct calipso_doi *doi_def)
424{
425	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
426
427	if (ops)
428		ops->doi_free(doi_def);
429}
430
431/**
432 * calipso_doi_remove - Remove an existing DOI from the CALIPSO protocol engine
433 * @doi: the DOI value
434 * @audit_info: NetLabel audit information
435 *
436 * Description:
437 * Removes a DOI definition from the CALIPSO engine.  The NetLabel routines will
438 * be called to release their own LSM domain mappings as well as our own
439 * domain list.  Returns zero on success and negative values on failure.
440 *
441 */
442int calipso_doi_remove(u32 doi, struct netlbl_audit *audit_info)
443{
444	int ret_val = -ENOMSG;
445	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
446
447	if (ops)
448		ret_val = ops->doi_remove(doi, audit_info);
449	return ret_val;
450}
451
452/**
453 * calipso_doi_getdef - Returns a reference to a valid DOI definition
454 * @doi: the DOI value
455 *
456 * Description:
457 * Searches for a valid DOI definition and if one is found it is returned to
458 * the caller.  Otherwise NULL is returned.  The caller must ensure that
459 * calipso_doi_putdef() is called when the caller is done.
460 *
461 */
462struct calipso_doi *calipso_doi_getdef(u32 doi)
463{
464	struct calipso_doi *ret_val = NULL;
465	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
466
467	if (ops)
468		ret_val = ops->doi_getdef(doi);
469	return ret_val;
470}
471
472/**
473 * calipso_doi_putdef - Releases a reference for the given DOI definition
474 * @doi_def: the DOI definition
475 *
476 * Description:
477 * Releases a DOI definition reference obtained from calipso_doi_getdef().
478 *
479 */
480void calipso_doi_putdef(struct calipso_doi *doi_def)
481{
482	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
483
484	if (ops)
485		ops->doi_putdef(doi_def);
486}
487
488/**
489 * calipso_doi_walk - Iterate through the DOI definitions
490 * @skip_cnt: skip past this number of DOI definitions, updated
491 * @callback: callback for each DOI definition
492 * @cb_arg: argument for the callback function
493 *
494 * Description:
495 * Iterate over the DOI definition list, skipping the first @skip_cnt entries.
496 * For each entry call @callback, if @callback returns a negative value stop
497 * 'walking' through the list and return.  Updates the value in @skip_cnt upon
498 * return.  Returns zero on success, negative values on failure.
499 *
500 */
501int calipso_doi_walk(u32 *skip_cnt,
502		     int (*callback)(struct calipso_doi *doi_def, void *arg),
503		     void *cb_arg)
504{
505	int ret_val = -ENOMSG;
506	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
507
508	if (ops)
509		ret_val = ops->doi_walk(skip_cnt, callback, cb_arg);
510	return ret_val;
511}
512
513/**
514 * calipso_sock_getattr - Get the security attributes from a sock
515 * @sk: the sock
516 * @secattr: the security attributes
517 *
518 * Description:
519 * Query @sk to see if there is a CALIPSO option attached to the sock and if
520 * there is return the CALIPSO security attributes in @secattr.  This function
521 * requires that @sk be locked, or privately held, but it does not do any
522 * locking itself.  Returns zero on success and negative values on failure.
523 *
524 */
525int calipso_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
526{
527	int ret_val = -ENOMSG;
528	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
529
530	if (ops)
531		ret_val = ops->sock_getattr(sk, secattr);
532	return ret_val;
533}
534
535/**
536 * calipso_sock_setattr - Add a CALIPSO option to a socket
537 * @sk: the socket
538 * @doi_def: the CALIPSO DOI to use
539 * @secattr: the specific security attributes of the socket
540 *
541 * Description:
542 * Set the CALIPSO option on the given socket using the DOI definition and
543 * security attributes passed to the function.  This function requires
544 * exclusive access to @sk, which means it either needs to be in the
545 * process of being created or locked.  Returns zero on success and negative
546 * values on failure.
547 *
548 */
549int calipso_sock_setattr(struct sock *sk,
550			 const struct calipso_doi *doi_def,
551			 const struct netlbl_lsm_secattr *secattr)
552{
553	int ret_val = -ENOMSG;
554	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
555
556	if (ops)
557		ret_val = ops->sock_setattr(sk, doi_def, secattr);
558	return ret_val;
559}
560
561/**
562 * calipso_sock_delattr - Delete the CALIPSO option from a socket
563 * @sk: the socket
564 *
565 * Description:
566 * Removes the CALIPSO option from a socket, if present.
567 *
568 */
569void calipso_sock_delattr(struct sock *sk)
570{
571	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
572
573	if (ops)
574		ops->sock_delattr(sk);
575}
576
577/**
578 * calipso_req_setattr - Add a CALIPSO option to a connection request socket
579 * @req: the connection request socket
580 * @doi_def: the CALIPSO DOI to use
581 * @secattr: the specific security attributes of the socket
582 *
583 * Description:
584 * Set the CALIPSO option on the given socket using the DOI definition and
585 * security attributes passed to the function.  Returns zero on success and
586 * negative values on failure.
587 *
588 */
589int calipso_req_setattr(struct request_sock *req,
590			const struct calipso_doi *doi_def,
591			const struct netlbl_lsm_secattr *secattr)
592{
593	int ret_val = -ENOMSG;
594	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
595
596	if (ops)
597		ret_val = ops->req_setattr(req, doi_def, secattr);
598	return ret_val;
599}
600
601/**
602 * calipso_req_delattr - Delete the CALIPSO option from a request socket
603 * @req: the request socket
604 *
605 * Description:
606 * Removes the CALIPSO option from a request socket, if present.
607 *
608 */
609void calipso_req_delattr(struct request_sock *req)
610{
611	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
612
613	if (ops)
614		ops->req_delattr(req);
615}
616
617/**
618 * calipso_optptr - Find the CALIPSO option in the packet
619 * @skb: the packet
620 *
621 * Description:
622 * Parse the packet's IP header looking for a CALIPSO option.  Returns a pointer
623 * to the start of the CALIPSO option on success, NULL if one if not found.
624 *
625 */
626unsigned char *calipso_optptr(const struct sk_buff *skb)
627{
628	unsigned char *ret_val = NULL;
629	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
630
631	if (ops)
632		ret_val = ops->skbuff_optptr(skb);
633	return ret_val;
634}
635
636/**
637 * calipso_getattr - Get the security attributes from a memory block.
638 * @calipso: the CALIPSO option
639 * @secattr: the security attributes
640 *
641 * Description:
642 * Inspect @calipso and return the security attributes in @secattr.
643 * Returns zero on success and negative values on failure.
644 *
645 */
646int calipso_getattr(const unsigned char *calipso,
647		    struct netlbl_lsm_secattr *secattr)
648{
649	int ret_val = -ENOMSG;
650	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
651
652	if (ops)
653		ret_val = ops->opt_getattr(calipso, secattr);
654	return ret_val;
655}
656
657/**
658 * calipso_skbuff_setattr - Set the CALIPSO option on a packet
659 * @skb: the packet
660 * @doi_def: the CALIPSO DOI to use
661 * @secattr: the security attributes
662 *
663 * Description:
664 * Set the CALIPSO option on the given packet based on the security attributes.
665 * Returns a pointer to the IP header on success and NULL on failure.
666 *
667 */
668int calipso_skbuff_setattr(struct sk_buff *skb,
669			   const struct calipso_doi *doi_def,
670			   const struct netlbl_lsm_secattr *secattr)
671{
672	int ret_val = -ENOMSG;
673	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
674
675	if (ops)
676		ret_val = ops->skbuff_setattr(skb, doi_def, secattr);
677	return ret_val;
678}
679
680/**
681 * calipso_skbuff_delattr - Delete any CALIPSO options from a packet
682 * @skb: the packet
683 *
684 * Description:
685 * Removes any and all CALIPSO options from the given packet.  Returns zero on
686 * success, negative values on failure.
687 *
688 */
689int calipso_skbuff_delattr(struct sk_buff *skb)
690{
691	int ret_val = -ENOMSG;
692	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
693
694	if (ops)
695		ret_val = ops->skbuff_delattr(skb);
696	return ret_val;
697}
698
699/**
700 * calipso_cache_invalidate - Invalidates the current CALIPSO cache
701 *
702 * Description:
703 * Invalidates and frees any entries in the CALIPSO cache.  Returns zero on
704 * success and negative values on failure.
705 *
706 */
707void calipso_cache_invalidate(void)
708{
709	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
710
711	if (ops)
712		ops->cache_invalidate();
713}
714
715/**
716 * calipso_cache_add - Add an entry to the CALIPSO cache
717 * @calipso_ptr: the CALIPSO option
718 * @secattr: the packet's security attributes
719 *
720 * Description:
721 * Add a new entry into the CALIPSO label mapping cache.
722 * Returns zero on success, negative values on failure.
723 *
724 */
725int calipso_cache_add(const unsigned char *calipso_ptr,
726		      const struct netlbl_lsm_secattr *secattr)
727
728{
729	int ret_val = -ENOMSG;
730	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
731
732	if (ops)
733		ret_val = ops->cache_add(calipso_ptr, secattr);
734	return ret_val;
735}
v4.10.11
 
  1/*
  2 * NetLabel CALIPSO/IPv6 Support
  3 *
  4 * This file defines the CALIPSO/IPv6 functions for the NetLabel system.  The
  5 * NetLabel system manages static and dynamic label mappings for network
  6 * protocols such as CIPSO and CALIPSO.
  7 *
  8 * Authors: Paul Moore <paul@paul-moore.com>
  9 *          Huw Davies <huw@codeweavers.com>
 10 *
 11 */
 12
 13/* (c) Copyright Hewlett-Packard Development Company, L.P., 2006
 14 * (c) Copyright Huw Davies <huw@codeweavers.com>, 2015
 15 *
 16 * This program is free software;  you can redistribute it and/or modify
 17 * it under the terms of the GNU General Public License as published by
 18 * the Free Software Foundation; either version 2 of the License, or
 19 * (at your option) any later version.
 20 *
 21 * This program is distributed in the hope that it will be useful,
 22 * but WITHOUT ANY WARRANTY;  without even the implied warranty of
 23 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
 24 * the GNU General Public License for more details.
 25 *
 26 * You should have received a copy of the GNU General Public License
 27 * along with this program;  if not, see <http://www.gnu.org/licenses/>.
 28 *
 29 */
 30
 31#include <linux/types.h>
 32#include <linux/socket.h>
 33#include <linux/string.h>
 34#include <linux/skbuff.h>
 35#include <linux/audit.h>
 36#include <linux/slab.h>
 37#include <net/sock.h>
 38#include <net/netlink.h>
 39#include <net/genetlink.h>
 40#include <net/netlabel.h>
 41#include <net/calipso.h>
 42#include <linux/atomic.h>
 43
 44#include "netlabel_user.h"
 45#include "netlabel_calipso.h"
 46#include "netlabel_mgmt.h"
 47#include "netlabel_domainhash.h"
 48
 49/* Argument struct for calipso_doi_walk() */
 50struct netlbl_calipso_doiwalk_arg {
 51	struct netlink_callback *nl_cb;
 52	struct sk_buff *skb;
 53	u32 seq;
 54};
 55
 56/* Argument struct for netlbl_domhsh_walk() */
 57struct netlbl_domhsh_walk_arg {
 58	struct netlbl_audit *audit_info;
 59	u32 doi;
 60};
 61
 62/* NetLabel Generic NETLINK CALIPSO family */
 63static struct genl_family netlbl_calipso_gnl_family;
 64
 65/* NetLabel Netlink attribute policy */
 66static const struct nla_policy calipso_genl_policy[NLBL_CALIPSO_A_MAX + 1] = {
 67	[NLBL_CALIPSO_A_DOI] = { .type = NLA_U32 },
 68	[NLBL_CALIPSO_A_MTYPE] = { .type = NLA_U32 },
 69};
 70
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 71/* NetLabel Command Handlers
 72 */
 73/**
 74 * netlbl_calipso_add_pass - Adds a CALIPSO pass DOI definition
 75 * @info: the Generic NETLINK info block
 76 * @audit_info: NetLabel audit information
 77 *
 78 * Description:
 79 * Create a new CALIPSO_MAP_PASS DOI definition based on the given ADD message
 80 * and add it to the CALIPSO engine.  Return zero on success and non-zero on
 81 * error.
 82 *
 83 */
 84static int netlbl_calipso_add_pass(struct genl_info *info,
 85				   struct netlbl_audit *audit_info)
 86{
 87	int ret_val;
 88	struct calipso_doi *doi_def = NULL;
 89
 90	doi_def = kmalloc(sizeof(*doi_def), GFP_KERNEL);
 91	if (!doi_def)
 92		return -ENOMEM;
 93	doi_def->type = CALIPSO_MAP_PASS;
 94	doi_def->doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
 95	ret_val = calipso_doi_add(doi_def, audit_info);
 96	if (ret_val != 0)
 97		calipso_doi_free(doi_def);
 98
 99	return ret_val;
100}
101
102/**
103 * netlbl_calipso_add - Handle an ADD message
104 * @skb: the NETLINK buffer
105 * @info: the Generic NETLINK info block
106 *
107 * Description:
108 * Create a new DOI definition based on the given ADD message and add it to the
109 * CALIPSO engine.  Returns zero on success, negative values on failure.
110 *
111 */
112static int netlbl_calipso_add(struct sk_buff *skb, struct genl_info *info)
113
114{
115	int ret_val = -EINVAL;
116	struct netlbl_audit audit_info;
 
117
118	if (!info->attrs[NLBL_CALIPSO_A_DOI] ||
119	    !info->attrs[NLBL_CALIPSO_A_MTYPE])
120		return -EINVAL;
121
122	netlbl_netlink_auditinfo(skb, &audit_info);
 
 
 
123	switch (nla_get_u32(info->attrs[NLBL_CALIPSO_A_MTYPE])) {
124	case CALIPSO_MAP_PASS:
125		ret_val = netlbl_calipso_add_pass(info, &audit_info);
126		break;
127	}
128	if (ret_val == 0)
129		atomic_inc(&netlabel_mgmt_protocount);
130
131	return ret_val;
132}
133
134/**
135 * netlbl_calipso_list - Handle a LIST message
136 * @skb: the NETLINK buffer
137 * @info: the Generic NETLINK info block
138 *
139 * Description:
140 * Process a user generated LIST message and respond accordingly.
141 * Returns zero on success and negative values on error.
142 *
143 */
144static int netlbl_calipso_list(struct sk_buff *skb, struct genl_info *info)
145{
146	int ret_val;
147	struct sk_buff *ans_skb = NULL;
148	void *data;
149	u32 doi;
150	struct calipso_doi *doi_def;
151
152	if (!info->attrs[NLBL_CALIPSO_A_DOI]) {
153		ret_val = -EINVAL;
154		goto list_failure;
155	}
156
157	doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
158
159	doi_def = calipso_doi_getdef(doi);
160	if (!doi_def) {
161		ret_val = -EINVAL;
162		goto list_failure;
163	}
164
165	ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
166	if (!ans_skb) {
167		ret_val = -ENOMEM;
168		goto list_failure_put;
169	}
170	data = genlmsg_put_reply(ans_skb, info, &netlbl_calipso_gnl_family,
171				 0, NLBL_CALIPSO_C_LIST);
172	if (!data) {
173		ret_val = -ENOMEM;
174		goto list_failure_put;
175	}
176
177	ret_val = nla_put_u32(ans_skb, NLBL_CALIPSO_A_MTYPE, doi_def->type);
178	if (ret_val != 0)
179		goto list_failure_put;
180
181	calipso_doi_putdef(doi_def);
182
183	genlmsg_end(ans_skb, data);
184	return genlmsg_reply(ans_skb, info);
185
186list_failure_put:
187	calipso_doi_putdef(doi_def);
188list_failure:
189	kfree_skb(ans_skb);
190	return ret_val;
191}
192
193/**
194 * netlbl_calipso_listall_cb - calipso_doi_walk() callback for LISTALL
195 * @doi_def: the CALIPSO DOI definition
196 * @arg: the netlbl_calipso_doiwalk_arg structure
197 *
198 * Description:
199 * This function is designed to be used as a callback to the
200 * calipso_doi_walk() function for use in generating a response for a LISTALL
201 * message.  Returns the size of the message on success, negative values on
202 * failure.
203 *
204 */
205static int netlbl_calipso_listall_cb(struct calipso_doi *doi_def, void *arg)
206{
207	int ret_val = -ENOMEM;
208	struct netlbl_calipso_doiwalk_arg *cb_arg = arg;
209	void *data;
210
211	data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).portid,
212			   cb_arg->seq, &netlbl_calipso_gnl_family,
213			   NLM_F_MULTI, NLBL_CALIPSO_C_LISTALL);
214	if (!data)
215		goto listall_cb_failure;
216
217	ret_val = nla_put_u32(cb_arg->skb, NLBL_CALIPSO_A_DOI, doi_def->doi);
218	if (ret_val != 0)
219		goto listall_cb_failure;
220	ret_val = nla_put_u32(cb_arg->skb,
221			      NLBL_CALIPSO_A_MTYPE,
222			      doi_def->type);
223	if (ret_val != 0)
224		goto listall_cb_failure;
225
226	genlmsg_end(cb_arg->skb, data);
227	return 0;
228
229listall_cb_failure:
230	genlmsg_cancel(cb_arg->skb, data);
231	return ret_val;
232}
233
234/**
235 * netlbl_calipso_listall - Handle a LISTALL message
236 * @skb: the NETLINK buffer
237 * @cb: the NETLINK callback
238 *
239 * Description:
240 * Process a user generated LISTALL message and respond accordingly.  Returns
241 * zero on success and negative values on error.
242 *
243 */
244static int netlbl_calipso_listall(struct sk_buff *skb,
245				  struct netlink_callback *cb)
246{
247	struct netlbl_calipso_doiwalk_arg cb_arg;
248	u32 doi_skip = cb->args[0];
249
250	cb_arg.nl_cb = cb;
251	cb_arg.skb = skb;
252	cb_arg.seq = cb->nlh->nlmsg_seq;
253
254	calipso_doi_walk(&doi_skip, netlbl_calipso_listall_cb, &cb_arg);
255
256	cb->args[0] = doi_skip;
257	return skb->len;
258}
259
260/**
261 * netlbl_calipso_remove_cb - netlbl_calipso_remove() callback for REMOVE
262 * @entry: LSM domain mapping entry
263 * @arg: the netlbl_domhsh_walk_arg structure
264 *
265 * Description:
266 * This function is intended for use by netlbl_calipso_remove() as the callback
267 * for the netlbl_domhsh_walk() function; it removes LSM domain map entries
268 * which are associated with the CALIPSO DOI specified in @arg.  Returns zero on
269 * success, negative values on failure.
270 *
271 */
272static int netlbl_calipso_remove_cb(struct netlbl_dom_map *entry, void *arg)
273{
274	struct netlbl_domhsh_walk_arg *cb_arg = arg;
275
276	if (entry->def.type == NETLBL_NLTYPE_CALIPSO &&
277	    entry->def.calipso->doi == cb_arg->doi)
278		return netlbl_domhsh_remove_entry(entry, cb_arg->audit_info);
279
280	return 0;
281}
282
283/**
284 * netlbl_calipso_remove - Handle a REMOVE message
285 * @skb: the NETLINK buffer
286 * @info: the Generic NETLINK info block
287 *
288 * Description:
289 * Process a user generated REMOVE message and respond accordingly.  Returns
290 * zero on success, negative values on failure.
291 *
292 */
293static int netlbl_calipso_remove(struct sk_buff *skb, struct genl_info *info)
294{
295	int ret_val = -EINVAL;
296	struct netlbl_domhsh_walk_arg cb_arg;
297	struct netlbl_audit audit_info;
298	u32 skip_bkt = 0;
299	u32 skip_chain = 0;
300
301	if (!info->attrs[NLBL_CALIPSO_A_DOI])
302		return -EINVAL;
303
304	netlbl_netlink_auditinfo(skb, &audit_info);
305	cb_arg.doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
306	cb_arg.audit_info = &audit_info;
307	ret_val = netlbl_domhsh_walk(&skip_bkt, &skip_chain,
308				     netlbl_calipso_remove_cb, &cb_arg);
309	if (ret_val == 0 || ret_val == -ENOENT) {
310		ret_val = calipso_doi_remove(cb_arg.doi, &audit_info);
311		if (ret_val == 0)
312			atomic_dec(&netlabel_mgmt_protocount);
313	}
314
315	return ret_val;
316}
317
318/* NetLabel Generic NETLINK Command Definitions
319 */
320
321static const struct genl_ops netlbl_calipso_ops[] = {
322	{
323	.cmd = NLBL_CALIPSO_C_ADD,
 
324	.flags = GENL_ADMIN_PERM,
325	.policy = calipso_genl_policy,
326	.doit = netlbl_calipso_add,
327	.dumpit = NULL,
328	},
329	{
330	.cmd = NLBL_CALIPSO_C_REMOVE,
 
331	.flags = GENL_ADMIN_PERM,
332	.policy = calipso_genl_policy,
333	.doit = netlbl_calipso_remove,
334	.dumpit = NULL,
335	},
336	{
337	.cmd = NLBL_CALIPSO_C_LIST,
 
338	.flags = 0,
339	.policy = calipso_genl_policy,
340	.doit = netlbl_calipso_list,
341	.dumpit = NULL,
342	},
343	{
344	.cmd = NLBL_CALIPSO_C_LISTALL,
 
345	.flags = 0,
346	.policy = calipso_genl_policy,
347	.doit = NULL,
348	.dumpit = netlbl_calipso_listall,
349	},
350};
351
352static struct genl_family netlbl_calipso_gnl_family __ro_after_init = {
353	.hdrsize = 0,
354	.name = NETLBL_NLTYPE_CALIPSO_NAME,
355	.version = NETLBL_PROTO_VERSION,
356	.maxattr = NLBL_CALIPSO_A_MAX,
 
357	.module = THIS_MODULE,
358	.ops = netlbl_calipso_ops,
359	.n_ops = ARRAY_SIZE(netlbl_calipso_ops),
 
360};
361
362/* NetLabel Generic NETLINK Protocol Functions
363 */
364
365/**
366 * netlbl_calipso_genl_init - Register the CALIPSO NetLabel component
367 *
368 * Description:
369 * Register the CALIPSO packet NetLabel component with the Generic NETLINK
370 * mechanism.  Returns zero on success, negative values on failure.
371 *
372 */
373int __init netlbl_calipso_genl_init(void)
374{
375	return genl_register_family(&netlbl_calipso_gnl_family);
376}
377
378static const struct netlbl_calipso_ops *calipso_ops;
379
380/**
381 * netlbl_calipso_ops_register - Register the CALIPSO operations
382 *
383 * Description:
384 * Register the CALIPSO packet engine operations.
385 *
386 */
387const struct netlbl_calipso_ops *
388netlbl_calipso_ops_register(const struct netlbl_calipso_ops *ops)
389{
390	return xchg(&calipso_ops, ops);
391}
392EXPORT_SYMBOL(netlbl_calipso_ops_register);
393
394static const struct netlbl_calipso_ops *netlbl_calipso_ops_get(void)
395{
396	return ACCESS_ONCE(calipso_ops);
397}
398
399/**
400 * calipso_doi_add - Add a new DOI to the CALIPSO protocol engine
401 * @doi_def: the DOI structure
402 * @audit_info: NetLabel audit information
403 *
404 * Description:
405 * The caller defines a new DOI for use by the CALIPSO engine and calls this
406 * function to add it to the list of acceptable domains.  The caller must
407 * ensure that the mapping table specified in @doi_def->map meets all of the
408 * requirements of the mapping type (see calipso.h for details).  Returns
409 * zero on success and non-zero on failure.
410 *
411 */
412int calipso_doi_add(struct calipso_doi *doi_def,
413		    struct netlbl_audit *audit_info)
414{
415	int ret_val = -ENOMSG;
416	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
417
418	if (ops)
419		ret_val = ops->doi_add(doi_def, audit_info);
420	return ret_val;
421}
422
423/**
424 * calipso_doi_free - Frees a DOI definition
425 * @doi_def: the DOI definition
426 *
427 * Description:
428 * This function frees all of the memory associated with a DOI definition.
429 *
430 */
431void calipso_doi_free(struct calipso_doi *doi_def)
432{
433	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
434
435	if (ops)
436		ops->doi_free(doi_def);
437}
438
439/**
440 * calipso_doi_remove - Remove an existing DOI from the CALIPSO protocol engine
441 * @doi: the DOI value
442 * @audit_secid: the LSM secid to use in the audit message
443 *
444 * Description:
445 * Removes a DOI definition from the CALIPSO engine.  The NetLabel routines will
446 * be called to release their own LSM domain mappings as well as our own
447 * domain list.  Returns zero on success and negative values on failure.
448 *
449 */
450int calipso_doi_remove(u32 doi, struct netlbl_audit *audit_info)
451{
452	int ret_val = -ENOMSG;
453	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
454
455	if (ops)
456		ret_val = ops->doi_remove(doi, audit_info);
457	return ret_val;
458}
459
460/**
461 * calipso_doi_getdef - Returns a reference to a valid DOI definition
462 * @doi: the DOI value
463 *
464 * Description:
465 * Searches for a valid DOI definition and if one is found it is returned to
466 * the caller.  Otherwise NULL is returned.  The caller must ensure that
467 * calipso_doi_putdef() is called when the caller is done.
468 *
469 */
470struct calipso_doi *calipso_doi_getdef(u32 doi)
471{
472	struct calipso_doi *ret_val = NULL;
473	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
474
475	if (ops)
476		ret_val = ops->doi_getdef(doi);
477	return ret_val;
478}
479
480/**
481 * calipso_doi_putdef - Releases a reference for the given DOI definition
482 * @doi_def: the DOI definition
483 *
484 * Description:
485 * Releases a DOI definition reference obtained from calipso_doi_getdef().
486 *
487 */
488void calipso_doi_putdef(struct calipso_doi *doi_def)
489{
490	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
491
492	if (ops)
493		ops->doi_putdef(doi_def);
494}
495
496/**
497 * calipso_doi_walk - Iterate through the DOI definitions
498 * @skip_cnt: skip past this number of DOI definitions, updated
499 * @callback: callback for each DOI definition
500 * @cb_arg: argument for the callback function
501 *
502 * Description:
503 * Iterate over the DOI definition list, skipping the first @skip_cnt entries.
504 * For each entry call @callback, if @callback returns a negative value stop
505 * 'walking' through the list and return.  Updates the value in @skip_cnt upon
506 * return.  Returns zero on success, negative values on failure.
507 *
508 */
509int calipso_doi_walk(u32 *skip_cnt,
510		     int (*callback)(struct calipso_doi *doi_def, void *arg),
511		     void *cb_arg)
512{
513	int ret_val = -ENOMSG;
514	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
515
516	if (ops)
517		ret_val = ops->doi_walk(skip_cnt, callback, cb_arg);
518	return ret_val;
519}
520
521/**
522 * calipso_sock_getattr - Get the security attributes from a sock
523 * @sk: the sock
524 * @secattr: the security attributes
525 *
526 * Description:
527 * Query @sk to see if there is a CALIPSO option attached to the sock and if
528 * there is return the CALIPSO security attributes in @secattr.  This function
529 * requires that @sk be locked, or privately held, but it does not do any
530 * locking itself.  Returns zero on success and negative values on failure.
531 *
532 */
533int calipso_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
534{
535	int ret_val = -ENOMSG;
536	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
537
538	if (ops)
539		ret_val = ops->sock_getattr(sk, secattr);
540	return ret_val;
541}
542
543/**
544 * calipso_sock_setattr - Add a CALIPSO option to a socket
545 * @sk: the socket
546 * @doi_def: the CALIPSO DOI to use
547 * @secattr: the specific security attributes of the socket
548 *
549 * Description:
550 * Set the CALIPSO option on the given socket using the DOI definition and
551 * security attributes passed to the function.  This function requires
552 * exclusive access to @sk, which means it either needs to be in the
553 * process of being created or locked.  Returns zero on success and negative
554 * values on failure.
555 *
556 */
557int calipso_sock_setattr(struct sock *sk,
558			 const struct calipso_doi *doi_def,
559			 const struct netlbl_lsm_secattr *secattr)
560{
561	int ret_val = -ENOMSG;
562	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
563
564	if (ops)
565		ret_val = ops->sock_setattr(sk, doi_def, secattr);
566	return ret_val;
567}
568
569/**
570 * calipso_sock_delattr - Delete the CALIPSO option from a socket
571 * @sk: the socket
572 *
573 * Description:
574 * Removes the CALIPSO option from a socket, if present.
575 *
576 */
577void calipso_sock_delattr(struct sock *sk)
578{
579	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
580
581	if (ops)
582		ops->sock_delattr(sk);
583}
584
585/**
586 * calipso_req_setattr - Add a CALIPSO option to a connection request socket
587 * @req: the connection request socket
588 * @doi_def: the CALIPSO DOI to use
589 * @secattr: the specific security attributes of the socket
590 *
591 * Description:
592 * Set the CALIPSO option on the given socket using the DOI definition and
593 * security attributes passed to the function.  Returns zero on success and
594 * negative values on failure.
595 *
596 */
597int calipso_req_setattr(struct request_sock *req,
598			const struct calipso_doi *doi_def,
599			const struct netlbl_lsm_secattr *secattr)
600{
601	int ret_val = -ENOMSG;
602	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
603
604	if (ops)
605		ret_val = ops->req_setattr(req, doi_def, secattr);
606	return ret_val;
607}
608
609/**
610 * calipso_req_delattr - Delete the CALIPSO option from a request socket
611 * @reg: the request socket
612 *
613 * Description:
614 * Removes the CALIPSO option from a request socket, if present.
615 *
616 */
617void calipso_req_delattr(struct request_sock *req)
618{
619	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
620
621	if (ops)
622		ops->req_delattr(req);
623}
624
625/**
626 * calipso_optptr - Find the CALIPSO option in the packet
627 * @skb: the packet
628 *
629 * Description:
630 * Parse the packet's IP header looking for a CALIPSO option.  Returns a pointer
631 * to the start of the CALIPSO option on success, NULL if one if not found.
632 *
633 */
634unsigned char *calipso_optptr(const struct sk_buff *skb)
635{
636	unsigned char *ret_val = NULL;
637	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
638
639	if (ops)
640		ret_val = ops->skbuff_optptr(skb);
641	return ret_val;
642}
643
644/**
645 * calipso_getattr - Get the security attributes from a memory block.
646 * @calipso: the CALIPSO option
647 * @secattr: the security attributes
648 *
649 * Description:
650 * Inspect @calipso and return the security attributes in @secattr.
651 * Returns zero on success and negative values on failure.
652 *
653 */
654int calipso_getattr(const unsigned char *calipso,
655		    struct netlbl_lsm_secattr *secattr)
656{
657	int ret_val = -ENOMSG;
658	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
659
660	if (ops)
661		ret_val = ops->opt_getattr(calipso, secattr);
662	return ret_val;
663}
664
665/**
666 * calipso_skbuff_setattr - Set the CALIPSO option on a packet
667 * @skb: the packet
668 * @doi_def: the CALIPSO DOI to use
669 * @secattr: the security attributes
670 *
671 * Description:
672 * Set the CALIPSO option on the given packet based on the security attributes.
673 * Returns a pointer to the IP header on success and NULL on failure.
674 *
675 */
676int calipso_skbuff_setattr(struct sk_buff *skb,
677			   const struct calipso_doi *doi_def,
678			   const struct netlbl_lsm_secattr *secattr)
679{
680	int ret_val = -ENOMSG;
681	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
682
683	if (ops)
684		ret_val = ops->skbuff_setattr(skb, doi_def, secattr);
685	return ret_val;
686}
687
688/**
689 * calipso_skbuff_delattr - Delete any CALIPSO options from a packet
690 * @skb: the packet
691 *
692 * Description:
693 * Removes any and all CALIPSO options from the given packet.  Returns zero on
694 * success, negative values on failure.
695 *
696 */
697int calipso_skbuff_delattr(struct sk_buff *skb)
698{
699	int ret_val = -ENOMSG;
700	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
701
702	if (ops)
703		ret_val = ops->skbuff_delattr(skb);
704	return ret_val;
705}
706
707/**
708 * calipso_cache_invalidate - Invalidates the current CALIPSO cache
709 *
710 * Description:
711 * Invalidates and frees any entries in the CALIPSO cache.  Returns zero on
712 * success and negative values on failure.
713 *
714 */
715void calipso_cache_invalidate(void)
716{
717	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
718
719	if (ops)
720		ops->cache_invalidate();
721}
722
723/**
724 * calipso_cache_add - Add an entry to the CALIPSO cache
725 * @calipso_ptr: the CALIPSO option
726 * @secattr: the packet's security attributes
727 *
728 * Description:
729 * Add a new entry into the CALIPSO label mapping cache.
730 * Returns zero on success, negative values on failure.
731 *
732 */
733int calipso_cache_add(const unsigned char *calipso_ptr,
734		      const struct netlbl_lsm_secattr *secattr)
735
736{
737	int ret_val = -ENOMSG;
738	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
739
740	if (ops)
741		ret_val = ops->cache_add(calipso_ptr, secattr);
742	return ret_val;
743}