mirror of
https://github.com/torvalds/linux.git
synced 2024-11-21 19:46:16 +00:00
ec4e9d630a
If IPv6 support is disabled at boot (ipv6.disable=1),
the calipso_init() -> netlbl_calipso_ops_register() function isn't called,
and the netlbl_calipso_ops_get() function always returns NULL.
In this case, the netlbl_calipso_add_pass() function allocates memory
for the doi_def variable but doesn't free it with the calipso_doi_free().
BUG: memory leak
unreferenced object 0xffff888011d68180 (size 64):
comm "syz-executor.1", pid 10746, jiffies 4295410986 (age 17.928s)
hex dump (first 32 bytes):
00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00 ................
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................
backtrace:
[<...>] kmalloc include/linux/slab.h:552 [inline]
[<...>] netlbl_calipso_add_pass net/netlabel/netlabel_calipso.c:76 [inline]
[<...>] netlbl_calipso_add+0x22e/0x4f0 net/netlabel/netlabel_calipso.c:111
[<...>] genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739
[<...>] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]
[<...>] genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800
[<...>] netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2515
[<...>] genl_rcv+0x29/0x40 net/netlink/genetlink.c:811
[<...>] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
[<...>] netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1339
[<...>] netlink_sendmsg+0x90a/0xdf0 net/netlink/af_netlink.c:1934
[<...>] sock_sendmsg_nosec net/socket.c:651 [inline]
[<...>] sock_sendmsg+0x157/0x190 net/socket.c:671
[<...>] ____sys_sendmsg+0x712/0x870 net/socket.c:2342
[<...>] ___sys_sendmsg+0xf8/0x170 net/socket.c:2396
[<...>] __sys_sendmsg+0xea/0x1b0 net/socket.c:2429
[<...>] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46
[<...>] entry_SYSCALL_64_after_hwframe+0x61/0xc6
Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with Syzkaller
Fixes: cb72d38211
("netlabel: Initial support for the CALIPSO netlink protocol.")
Signed-off-by: Gavrilov Ilia <Ilia.Gavrilov@infotecs.ru>
[PM: merged via the LSM tree at Jakub Kicinski request]
Signed-off-by: Paul Moore <paul@paul-moore.com>
736 lines
19 KiB
C
736 lines
19 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
/*
|
|
* NetLabel CALIPSO/IPv6 Support
|
|
*
|
|
* This file defines the CALIPSO/IPv6 functions for the NetLabel system. The
|
|
* NetLabel system manages static and dynamic label mappings for network
|
|
* protocols such as CIPSO and CALIPSO.
|
|
*
|
|
* Authors: Paul Moore <paul@paul-moore.com>
|
|
* Huw Davies <huw@codeweavers.com>
|
|
*/
|
|
|
|
/* (c) Copyright Hewlett-Packard Development Company, L.P., 2006
|
|
* (c) Copyright Huw Davies <huw@codeweavers.com>, 2015
|
|
*/
|
|
|
|
#include <linux/types.h>
|
|
#include <linux/socket.h>
|
|
#include <linux/string.h>
|
|
#include <linux/skbuff.h>
|
|
#include <linux/audit.h>
|
|
#include <linux/slab.h>
|
|
#include <net/sock.h>
|
|
#include <net/netlink.h>
|
|
#include <net/genetlink.h>
|
|
#include <net/netlabel.h>
|
|
#include <net/calipso.h>
|
|
#include <linux/atomic.h>
|
|
|
|
#include "netlabel_user.h"
|
|
#include "netlabel_calipso.h"
|
|
#include "netlabel_mgmt.h"
|
|
#include "netlabel_domainhash.h"
|
|
|
|
/* Argument struct for calipso_doi_walk() */
|
|
struct netlbl_calipso_doiwalk_arg {
|
|
struct netlink_callback *nl_cb;
|
|
struct sk_buff *skb;
|
|
u32 seq;
|
|
};
|
|
|
|
/* Argument struct for netlbl_domhsh_walk() */
|
|
struct netlbl_domhsh_walk_arg {
|
|
struct netlbl_audit *audit_info;
|
|
u32 doi;
|
|
};
|
|
|
|
/* NetLabel Generic NETLINK CALIPSO family */
|
|
static struct genl_family netlbl_calipso_gnl_family;
|
|
|
|
/* NetLabel Netlink attribute policy */
|
|
static const struct nla_policy calipso_genl_policy[NLBL_CALIPSO_A_MAX + 1] = {
|
|
[NLBL_CALIPSO_A_DOI] = { .type = NLA_U32 },
|
|
[NLBL_CALIPSO_A_MTYPE] = { .type = NLA_U32 },
|
|
};
|
|
|
|
static const struct netlbl_calipso_ops *calipso_ops;
|
|
|
|
/**
|
|
* netlbl_calipso_ops_register - Register the CALIPSO operations
|
|
* @ops: ops to register
|
|
*
|
|
* Description:
|
|
* Register the CALIPSO packet engine operations.
|
|
*
|
|
*/
|
|
const struct netlbl_calipso_ops *
|
|
netlbl_calipso_ops_register(const struct netlbl_calipso_ops *ops)
|
|
{
|
|
return xchg(&calipso_ops, ops);
|
|
}
|
|
EXPORT_SYMBOL(netlbl_calipso_ops_register);
|
|
|
|
static const struct netlbl_calipso_ops *netlbl_calipso_ops_get(void)
|
|
{
|
|
return READ_ONCE(calipso_ops);
|
|
}
|
|
|
|
/* NetLabel Command Handlers
|
|
*/
|
|
/**
|
|
* netlbl_calipso_add_pass - Adds a CALIPSO pass DOI definition
|
|
* @info: the Generic NETLINK info block
|
|
* @audit_info: NetLabel audit information
|
|
*
|
|
* Description:
|
|
* Create a new CALIPSO_MAP_PASS DOI definition based on the given ADD message
|
|
* and add it to the CALIPSO engine. Return zero on success and non-zero on
|
|
* error.
|
|
*
|
|
*/
|
|
static int netlbl_calipso_add_pass(struct genl_info *info,
|
|
struct netlbl_audit *audit_info)
|
|
{
|
|
int ret_val;
|
|
struct calipso_doi *doi_def = NULL;
|
|
|
|
doi_def = kmalloc(sizeof(*doi_def), GFP_KERNEL);
|
|
if (!doi_def)
|
|
return -ENOMEM;
|
|
doi_def->type = CALIPSO_MAP_PASS;
|
|
doi_def->doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
|
|
ret_val = calipso_doi_add(doi_def, audit_info);
|
|
if (ret_val != 0)
|
|
calipso_doi_free(doi_def);
|
|
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* netlbl_calipso_add - Handle an ADD message
|
|
* @skb: the NETLINK buffer
|
|
* @info: the Generic NETLINK info block
|
|
*
|
|
* Description:
|
|
* Create a new DOI definition based on the given ADD message and add it to the
|
|
* CALIPSO engine. Returns zero on success, negative values on failure.
|
|
*
|
|
*/
|
|
static int netlbl_calipso_add(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
int ret_val = -EINVAL;
|
|
struct netlbl_audit audit_info;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (!info->attrs[NLBL_CALIPSO_A_DOI] ||
|
|
!info->attrs[NLBL_CALIPSO_A_MTYPE])
|
|
return -EINVAL;
|
|
|
|
if (!ops)
|
|
return -EOPNOTSUPP;
|
|
|
|
netlbl_netlink_auditinfo(&audit_info);
|
|
switch (nla_get_u32(info->attrs[NLBL_CALIPSO_A_MTYPE])) {
|
|
case CALIPSO_MAP_PASS:
|
|
ret_val = netlbl_calipso_add_pass(info, &audit_info);
|
|
break;
|
|
}
|
|
if (ret_val == 0)
|
|
atomic_inc(&netlabel_mgmt_protocount);
|
|
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* netlbl_calipso_list - Handle a LIST message
|
|
* @skb: the NETLINK buffer
|
|
* @info: the Generic NETLINK info block
|
|
*
|
|
* Description:
|
|
* Process a user generated LIST message and respond accordingly.
|
|
* Returns zero on success and negative values on error.
|
|
*
|
|
*/
|
|
static int netlbl_calipso_list(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
int ret_val;
|
|
struct sk_buff *ans_skb = NULL;
|
|
void *data;
|
|
u32 doi;
|
|
struct calipso_doi *doi_def;
|
|
|
|
if (!info->attrs[NLBL_CALIPSO_A_DOI]) {
|
|
ret_val = -EINVAL;
|
|
goto list_failure;
|
|
}
|
|
|
|
doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
|
|
|
|
doi_def = calipso_doi_getdef(doi);
|
|
if (!doi_def) {
|
|
ret_val = -EINVAL;
|
|
goto list_failure;
|
|
}
|
|
|
|
ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
|
|
if (!ans_skb) {
|
|
ret_val = -ENOMEM;
|
|
goto list_failure_put;
|
|
}
|
|
data = genlmsg_put_reply(ans_skb, info, &netlbl_calipso_gnl_family,
|
|
0, NLBL_CALIPSO_C_LIST);
|
|
if (!data) {
|
|
ret_val = -ENOMEM;
|
|
goto list_failure_put;
|
|
}
|
|
|
|
ret_val = nla_put_u32(ans_skb, NLBL_CALIPSO_A_MTYPE, doi_def->type);
|
|
if (ret_val != 0)
|
|
goto list_failure_put;
|
|
|
|
calipso_doi_putdef(doi_def);
|
|
|
|
genlmsg_end(ans_skb, data);
|
|
return genlmsg_reply(ans_skb, info);
|
|
|
|
list_failure_put:
|
|
calipso_doi_putdef(doi_def);
|
|
list_failure:
|
|
kfree_skb(ans_skb);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* netlbl_calipso_listall_cb - calipso_doi_walk() callback for LISTALL
|
|
* @doi_def: the CALIPSO DOI definition
|
|
* @arg: the netlbl_calipso_doiwalk_arg structure
|
|
*
|
|
* Description:
|
|
* This function is designed to be used as a callback to the
|
|
* calipso_doi_walk() function for use in generating a response for a LISTALL
|
|
* message. Returns the size of the message on success, negative values on
|
|
* failure.
|
|
*
|
|
*/
|
|
static int netlbl_calipso_listall_cb(struct calipso_doi *doi_def, void *arg)
|
|
{
|
|
int ret_val = -ENOMEM;
|
|
struct netlbl_calipso_doiwalk_arg *cb_arg = arg;
|
|
void *data;
|
|
|
|
data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).portid,
|
|
cb_arg->seq, &netlbl_calipso_gnl_family,
|
|
NLM_F_MULTI, NLBL_CALIPSO_C_LISTALL);
|
|
if (!data)
|
|
goto listall_cb_failure;
|
|
|
|
ret_val = nla_put_u32(cb_arg->skb, NLBL_CALIPSO_A_DOI, doi_def->doi);
|
|
if (ret_val != 0)
|
|
goto listall_cb_failure;
|
|
ret_val = nla_put_u32(cb_arg->skb,
|
|
NLBL_CALIPSO_A_MTYPE,
|
|
doi_def->type);
|
|
if (ret_val != 0)
|
|
goto listall_cb_failure;
|
|
|
|
genlmsg_end(cb_arg->skb, data);
|
|
return 0;
|
|
|
|
listall_cb_failure:
|
|
genlmsg_cancel(cb_arg->skb, data);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* netlbl_calipso_listall - Handle a LISTALL message
|
|
* @skb: the NETLINK buffer
|
|
* @cb: the NETLINK callback
|
|
*
|
|
* Description:
|
|
* Process a user generated LISTALL message and respond accordingly. Returns
|
|
* zero on success and negative values on error.
|
|
*
|
|
*/
|
|
static int netlbl_calipso_listall(struct sk_buff *skb,
|
|
struct netlink_callback *cb)
|
|
{
|
|
struct netlbl_calipso_doiwalk_arg cb_arg;
|
|
u32 doi_skip = cb->args[0];
|
|
|
|
cb_arg.nl_cb = cb;
|
|
cb_arg.skb = skb;
|
|
cb_arg.seq = cb->nlh->nlmsg_seq;
|
|
|
|
calipso_doi_walk(&doi_skip, netlbl_calipso_listall_cb, &cb_arg);
|
|
|
|
cb->args[0] = doi_skip;
|
|
return skb->len;
|
|
}
|
|
|
|
/**
|
|
* netlbl_calipso_remove_cb - netlbl_calipso_remove() callback for REMOVE
|
|
* @entry: LSM domain mapping entry
|
|
* @arg: the netlbl_domhsh_walk_arg structure
|
|
*
|
|
* Description:
|
|
* This function is intended for use by netlbl_calipso_remove() as the callback
|
|
* for the netlbl_domhsh_walk() function; it removes LSM domain map entries
|
|
* which are associated with the CALIPSO DOI specified in @arg. Returns zero on
|
|
* success, negative values on failure.
|
|
*
|
|
*/
|
|
static int netlbl_calipso_remove_cb(struct netlbl_dom_map *entry, void *arg)
|
|
{
|
|
struct netlbl_domhsh_walk_arg *cb_arg = arg;
|
|
|
|
if (entry->def.type == NETLBL_NLTYPE_CALIPSO &&
|
|
entry->def.calipso->doi == cb_arg->doi)
|
|
return netlbl_domhsh_remove_entry(entry, cb_arg->audit_info);
|
|
|
|
return 0;
|
|
}
|
|
|
|
/**
|
|
* netlbl_calipso_remove - Handle a REMOVE message
|
|
* @skb: the NETLINK buffer
|
|
* @info: the Generic NETLINK info block
|
|
*
|
|
* Description:
|
|
* Process a user generated REMOVE message and respond accordingly. Returns
|
|
* zero on success, negative values on failure.
|
|
*
|
|
*/
|
|
static int netlbl_calipso_remove(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
int ret_val = -EINVAL;
|
|
struct netlbl_domhsh_walk_arg cb_arg;
|
|
struct netlbl_audit audit_info;
|
|
u32 skip_bkt = 0;
|
|
u32 skip_chain = 0;
|
|
|
|
if (!info->attrs[NLBL_CALIPSO_A_DOI])
|
|
return -EINVAL;
|
|
|
|
netlbl_netlink_auditinfo(&audit_info);
|
|
cb_arg.doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
|
|
cb_arg.audit_info = &audit_info;
|
|
ret_val = netlbl_domhsh_walk(&skip_bkt, &skip_chain,
|
|
netlbl_calipso_remove_cb, &cb_arg);
|
|
if (ret_val == 0 || ret_val == -ENOENT) {
|
|
ret_val = calipso_doi_remove(cb_arg.doi, &audit_info);
|
|
if (ret_val == 0)
|
|
atomic_dec(&netlabel_mgmt_protocount);
|
|
}
|
|
|
|
return ret_val;
|
|
}
|
|
|
|
/* NetLabel Generic NETLINK Command Definitions
|
|
*/
|
|
|
|
static const struct genl_small_ops netlbl_calipso_ops[] = {
|
|
{
|
|
.cmd = NLBL_CALIPSO_C_ADD,
|
|
.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
|
|
.flags = GENL_ADMIN_PERM,
|
|
.doit = netlbl_calipso_add,
|
|
.dumpit = NULL,
|
|
},
|
|
{
|
|
.cmd = NLBL_CALIPSO_C_REMOVE,
|
|
.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
|
|
.flags = GENL_ADMIN_PERM,
|
|
.doit = netlbl_calipso_remove,
|
|
.dumpit = NULL,
|
|
},
|
|
{
|
|
.cmd = NLBL_CALIPSO_C_LIST,
|
|
.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
|
|
.flags = 0,
|
|
.doit = netlbl_calipso_list,
|
|
.dumpit = NULL,
|
|
},
|
|
{
|
|
.cmd = NLBL_CALIPSO_C_LISTALL,
|
|
.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
|
|
.flags = 0,
|
|
.doit = NULL,
|
|
.dumpit = netlbl_calipso_listall,
|
|
},
|
|
};
|
|
|
|
static struct genl_family netlbl_calipso_gnl_family __ro_after_init = {
|
|
.hdrsize = 0,
|
|
.name = NETLBL_NLTYPE_CALIPSO_NAME,
|
|
.version = NETLBL_PROTO_VERSION,
|
|
.maxattr = NLBL_CALIPSO_A_MAX,
|
|
.policy = calipso_genl_policy,
|
|
.module = THIS_MODULE,
|
|
.small_ops = netlbl_calipso_ops,
|
|
.n_small_ops = ARRAY_SIZE(netlbl_calipso_ops),
|
|
.resv_start_op = NLBL_CALIPSO_C_LISTALL + 1,
|
|
};
|
|
|
|
/* NetLabel Generic NETLINK Protocol Functions
|
|
*/
|
|
|
|
/**
|
|
* netlbl_calipso_genl_init - Register the CALIPSO NetLabel component
|
|
*
|
|
* Description:
|
|
* Register the CALIPSO packet NetLabel component with the Generic NETLINK
|
|
* mechanism. Returns zero on success, negative values on failure.
|
|
*
|
|
*/
|
|
int __init netlbl_calipso_genl_init(void)
|
|
{
|
|
return genl_register_family(&netlbl_calipso_gnl_family);
|
|
}
|
|
|
|
/**
|
|
* calipso_doi_add - Add a new DOI to the CALIPSO protocol engine
|
|
* @doi_def: the DOI structure
|
|
* @audit_info: NetLabel audit information
|
|
*
|
|
* Description:
|
|
* The caller defines a new DOI for use by the CALIPSO engine and calls this
|
|
* function to add it to the list of acceptable domains. The caller must
|
|
* ensure that the mapping table specified in @doi_def->map meets all of the
|
|
* requirements of the mapping type (see calipso.h for details). Returns
|
|
* zero on success and non-zero on failure.
|
|
*
|
|
*/
|
|
int calipso_doi_add(struct calipso_doi *doi_def,
|
|
struct netlbl_audit *audit_info)
|
|
{
|
|
int ret_val = -ENOMSG;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->doi_add(doi_def, audit_info);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* calipso_doi_free - Frees a DOI definition
|
|
* @doi_def: the DOI definition
|
|
*
|
|
* Description:
|
|
* This function frees all of the memory associated with a DOI definition.
|
|
*
|
|
*/
|
|
void calipso_doi_free(struct calipso_doi *doi_def)
|
|
{
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ops->doi_free(doi_def);
|
|
}
|
|
|
|
/**
|
|
* calipso_doi_remove - Remove an existing DOI from the CALIPSO protocol engine
|
|
* @doi: the DOI value
|
|
* @audit_info: NetLabel audit information
|
|
*
|
|
* Description:
|
|
* Removes a DOI definition from the CALIPSO engine. The NetLabel routines will
|
|
* be called to release their own LSM domain mappings as well as our own
|
|
* domain list. Returns zero on success and negative values on failure.
|
|
*
|
|
*/
|
|
int calipso_doi_remove(u32 doi, struct netlbl_audit *audit_info)
|
|
{
|
|
int ret_val = -ENOMSG;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->doi_remove(doi, audit_info);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* calipso_doi_getdef - Returns a reference to a valid DOI definition
|
|
* @doi: the DOI value
|
|
*
|
|
* Description:
|
|
* Searches for a valid DOI definition and if one is found it is returned to
|
|
* the caller. Otherwise NULL is returned. The caller must ensure that
|
|
* calipso_doi_putdef() is called when the caller is done.
|
|
*
|
|
*/
|
|
struct calipso_doi *calipso_doi_getdef(u32 doi)
|
|
{
|
|
struct calipso_doi *ret_val = NULL;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->doi_getdef(doi);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* calipso_doi_putdef - Releases a reference for the given DOI definition
|
|
* @doi_def: the DOI definition
|
|
*
|
|
* Description:
|
|
* Releases a DOI definition reference obtained from calipso_doi_getdef().
|
|
*
|
|
*/
|
|
void calipso_doi_putdef(struct calipso_doi *doi_def)
|
|
{
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ops->doi_putdef(doi_def);
|
|
}
|
|
|
|
/**
|
|
* calipso_doi_walk - Iterate through the DOI definitions
|
|
* @skip_cnt: skip past this number of DOI definitions, updated
|
|
* @callback: callback for each DOI definition
|
|
* @cb_arg: argument for the callback function
|
|
*
|
|
* Description:
|
|
* Iterate over the DOI definition list, skipping the first @skip_cnt entries.
|
|
* For each entry call @callback, if @callback returns a negative value stop
|
|
* 'walking' through the list and return. Updates the value in @skip_cnt upon
|
|
* return. Returns zero on success, negative values on failure.
|
|
*
|
|
*/
|
|
int calipso_doi_walk(u32 *skip_cnt,
|
|
int (*callback)(struct calipso_doi *doi_def, void *arg),
|
|
void *cb_arg)
|
|
{
|
|
int ret_val = -ENOMSG;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->doi_walk(skip_cnt, callback, cb_arg);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* calipso_sock_getattr - Get the security attributes from a sock
|
|
* @sk: the sock
|
|
* @secattr: the security attributes
|
|
*
|
|
* Description:
|
|
* Query @sk to see if there is a CALIPSO option attached to the sock and if
|
|
* there is return the CALIPSO security attributes in @secattr. This function
|
|
* requires that @sk be locked, or privately held, but it does not do any
|
|
* locking itself. Returns zero on success and negative values on failure.
|
|
*
|
|
*/
|
|
int calipso_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
|
|
{
|
|
int ret_val = -ENOMSG;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->sock_getattr(sk, secattr);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* calipso_sock_setattr - Add a CALIPSO option to a socket
|
|
* @sk: the socket
|
|
* @doi_def: the CALIPSO DOI to use
|
|
* @secattr: the specific security attributes of the socket
|
|
*
|
|
* Description:
|
|
* Set the CALIPSO option on the given socket using the DOI definition and
|
|
* security attributes passed to the function. This function requires
|
|
* exclusive access to @sk, which means it either needs to be in the
|
|
* process of being created or locked. Returns zero on success and negative
|
|
* values on failure.
|
|
*
|
|
*/
|
|
int calipso_sock_setattr(struct sock *sk,
|
|
const struct calipso_doi *doi_def,
|
|
const struct netlbl_lsm_secattr *secattr)
|
|
{
|
|
int ret_val = -ENOMSG;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->sock_setattr(sk, doi_def, secattr);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* calipso_sock_delattr - Delete the CALIPSO option from a socket
|
|
* @sk: the socket
|
|
*
|
|
* Description:
|
|
* Removes the CALIPSO option from a socket, if present.
|
|
*
|
|
*/
|
|
void calipso_sock_delattr(struct sock *sk)
|
|
{
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ops->sock_delattr(sk);
|
|
}
|
|
|
|
/**
|
|
* calipso_req_setattr - Add a CALIPSO option to a connection request socket
|
|
* @req: the connection request socket
|
|
* @doi_def: the CALIPSO DOI to use
|
|
* @secattr: the specific security attributes of the socket
|
|
*
|
|
* Description:
|
|
* Set the CALIPSO option on the given socket using the DOI definition and
|
|
* security attributes passed to the function. Returns zero on success and
|
|
* negative values on failure.
|
|
*
|
|
*/
|
|
int calipso_req_setattr(struct request_sock *req,
|
|
const struct calipso_doi *doi_def,
|
|
const struct netlbl_lsm_secattr *secattr)
|
|
{
|
|
int ret_val = -ENOMSG;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->req_setattr(req, doi_def, secattr);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* calipso_req_delattr - Delete the CALIPSO option from a request socket
|
|
* @req: the request socket
|
|
*
|
|
* Description:
|
|
* Removes the CALIPSO option from a request socket, if present.
|
|
*
|
|
*/
|
|
void calipso_req_delattr(struct request_sock *req)
|
|
{
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ops->req_delattr(req);
|
|
}
|
|
|
|
/**
|
|
* calipso_optptr - Find the CALIPSO option in the packet
|
|
* @skb: the packet
|
|
*
|
|
* Description:
|
|
* Parse the packet's IP header looking for a CALIPSO option. Returns a pointer
|
|
* to the start of the CALIPSO option on success, NULL if one if not found.
|
|
*
|
|
*/
|
|
unsigned char *calipso_optptr(const struct sk_buff *skb)
|
|
{
|
|
unsigned char *ret_val = NULL;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->skbuff_optptr(skb);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* calipso_getattr - Get the security attributes from a memory block.
|
|
* @calipso: the CALIPSO option
|
|
* @secattr: the security attributes
|
|
*
|
|
* Description:
|
|
* Inspect @calipso and return the security attributes in @secattr.
|
|
* Returns zero on success and negative values on failure.
|
|
*
|
|
*/
|
|
int calipso_getattr(const unsigned char *calipso,
|
|
struct netlbl_lsm_secattr *secattr)
|
|
{
|
|
int ret_val = -ENOMSG;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->opt_getattr(calipso, secattr);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* calipso_skbuff_setattr - Set the CALIPSO option on a packet
|
|
* @skb: the packet
|
|
* @doi_def: the CALIPSO DOI to use
|
|
* @secattr: the security attributes
|
|
*
|
|
* Description:
|
|
* Set the CALIPSO option on the given packet based on the security attributes.
|
|
* Returns a pointer to the IP header on success and NULL on failure.
|
|
*
|
|
*/
|
|
int calipso_skbuff_setattr(struct sk_buff *skb,
|
|
const struct calipso_doi *doi_def,
|
|
const struct netlbl_lsm_secattr *secattr)
|
|
{
|
|
int ret_val = -ENOMSG;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->skbuff_setattr(skb, doi_def, secattr);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* calipso_skbuff_delattr - Delete any CALIPSO options from a packet
|
|
* @skb: the packet
|
|
*
|
|
* Description:
|
|
* Removes any and all CALIPSO options from the given packet. Returns zero on
|
|
* success, negative values on failure.
|
|
*
|
|
*/
|
|
int calipso_skbuff_delattr(struct sk_buff *skb)
|
|
{
|
|
int ret_val = -ENOMSG;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->skbuff_delattr(skb);
|
|
return ret_val;
|
|
}
|
|
|
|
/**
|
|
* calipso_cache_invalidate - Invalidates the current CALIPSO cache
|
|
*
|
|
* Description:
|
|
* Invalidates and frees any entries in the CALIPSO cache. Returns zero on
|
|
* success and negative values on failure.
|
|
*
|
|
*/
|
|
void calipso_cache_invalidate(void)
|
|
{
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ops->cache_invalidate();
|
|
}
|
|
|
|
/**
|
|
* calipso_cache_add - Add an entry to the CALIPSO cache
|
|
* @calipso_ptr: the CALIPSO option
|
|
* @secattr: the packet's security attributes
|
|
*
|
|
* Description:
|
|
* Add a new entry into the CALIPSO label mapping cache.
|
|
* Returns zero on success, negative values on failure.
|
|
*
|
|
*/
|
|
int calipso_cache_add(const unsigned char *calipso_ptr,
|
|
const struct netlbl_lsm_secattr *secattr)
|
|
|
|
{
|
|
int ret_val = -ENOMSG;
|
|
const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
|
|
|
|
if (ops)
|
|
ret_val = ops->cache_add(calipso_ptr, secattr);
|
|
return ret_val;
|
|
}
|