forked from mirrors/linux
		
	If IPv6 support is disabled at boot (ipv6.disable=1),
the calipso_init() -> netlbl_calipso_ops_register() function isn't called,
and the netlbl_calipso_ops_get() function always returns NULL.
In this case, the netlbl_calipso_add_pass() function allocates memory
for the doi_def variable but doesn't free it with the calipso_doi_free().
BUG: memory leak
unreferenced object 0xffff888011d68180 (size 64):
  comm "syz-executor.1", pid 10746, jiffies 4295410986 (age 17.928s)
  hex dump (first 32 bytes):
    00 00 00 00 02 00 00 00 00 00 00 00 00 00 00 00  ................
    00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00  ................
  backtrace:
    [<...>] kmalloc include/linux/slab.h:552 [inline]
    [<...>] netlbl_calipso_add_pass net/netlabel/netlabel_calipso.c:76 [inline]
    [<...>] netlbl_calipso_add+0x22e/0x4f0 net/netlabel/netlabel_calipso.c:111
    [<...>] genl_family_rcv_msg_doit+0x22f/0x330 net/netlink/genetlink.c:739
    [<...>] genl_family_rcv_msg net/netlink/genetlink.c:783 [inline]
    [<...>] genl_rcv_msg+0x341/0x5a0 net/netlink/genetlink.c:800
    [<...>] netlink_rcv_skb+0x14d/0x440 net/netlink/af_netlink.c:2515
    [<...>] genl_rcv+0x29/0x40 net/netlink/genetlink.c:811
    [<...>] netlink_unicast_kernel net/netlink/af_netlink.c:1313 [inline]
    [<...>] netlink_unicast+0x54b/0x800 net/netlink/af_netlink.c:1339
    [<...>] netlink_sendmsg+0x90a/0xdf0 net/netlink/af_netlink.c:1934
    [<...>] sock_sendmsg_nosec net/socket.c:651 [inline]
    [<...>] sock_sendmsg+0x157/0x190 net/socket.c:671
    [<...>] ____sys_sendmsg+0x712/0x870 net/socket.c:2342
    [<...>] ___sys_sendmsg+0xf8/0x170 net/socket.c:2396
    [<...>] __sys_sendmsg+0xea/0x1b0 net/socket.c:2429
    [<...>] do_syscall_64+0x30/0x40 arch/x86/entry/common.c:46
    [<...>] entry_SYSCALL_64_after_hwframe+0x61/0xc6
Found by InfoTeCS on behalf of Linux Verification Center
(linuxtesting.org) with Syzkaller
Fixes: cb72d38211 ("netlabel: Initial support for the CALIPSO netlink protocol.")
Signed-off-by: Gavrilov Ilia <Ilia.Gavrilov@infotecs.ru>
[PM: merged via the LSM tree at Jakub Kicinski request]
Signed-off-by: Paul Moore <paul@paul-moore.com>
		
	
			
		
			
				
	
	
		
			735 lines
		
	
	
	
		
			19 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			735 lines
		
	
	
	
		
			19 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
// SPDX-License-Identifier: GPL-2.0-or-later
 | 
						|
/*
 | 
						|
 * NetLabel CALIPSO/IPv6 Support
 | 
						|
 *
 | 
						|
 * This file defines the CALIPSO/IPv6 functions for the NetLabel system.  The
 | 
						|
 * NetLabel system manages static and dynamic label mappings for network
 | 
						|
 * protocols such as CIPSO and CALIPSO.
 | 
						|
 *
 | 
						|
 * Authors: Paul Moore <paul@paul-moore.com>
 | 
						|
 *          Huw Davies <huw@codeweavers.com>
 | 
						|
 */
 | 
						|
 | 
						|
/* (c) Copyright Hewlett-Packard Development Company, L.P., 2006
 | 
						|
 * (c) Copyright Huw Davies <huw@codeweavers.com>, 2015
 | 
						|
 */
 | 
						|
 | 
						|
#include <linux/types.h>
 | 
						|
#include <linux/socket.h>
 | 
						|
#include <linux/string.h>
 | 
						|
#include <linux/skbuff.h>
 | 
						|
#include <linux/audit.h>
 | 
						|
#include <linux/slab.h>
 | 
						|
#include <net/sock.h>
 | 
						|
#include <net/netlink.h>
 | 
						|
#include <net/genetlink.h>
 | 
						|
#include <net/netlabel.h>
 | 
						|
#include <net/calipso.h>
 | 
						|
#include <linux/atomic.h>
 | 
						|
 | 
						|
#include "netlabel_user.h"
 | 
						|
#include "netlabel_calipso.h"
 | 
						|
#include "netlabel_mgmt.h"
 | 
						|
#include "netlabel_domainhash.h"
 | 
						|
 | 
						|
/* Argument struct for calipso_doi_walk() */
 | 
						|
struct netlbl_calipso_doiwalk_arg {
 | 
						|
	struct netlink_callback *nl_cb;
 | 
						|
	struct sk_buff *skb;
 | 
						|
	u32 seq;
 | 
						|
};
 | 
						|
 | 
						|
/* Argument struct for netlbl_domhsh_walk() */
 | 
						|
struct netlbl_domhsh_walk_arg {
 | 
						|
	struct netlbl_audit *audit_info;
 | 
						|
	u32 doi;
 | 
						|
};
 | 
						|
 | 
						|
/* NetLabel Generic NETLINK CALIPSO family */
 | 
						|
static struct genl_family netlbl_calipso_gnl_family;
 | 
						|
 | 
						|
/* NetLabel Netlink attribute policy */
 | 
						|
static const struct nla_policy calipso_genl_policy[NLBL_CALIPSO_A_MAX + 1] = {
 | 
						|
	[NLBL_CALIPSO_A_DOI] = { .type = NLA_U32 },
 | 
						|
	[NLBL_CALIPSO_A_MTYPE] = { .type = NLA_U32 },
 | 
						|
};
 | 
						|
 | 
						|
static const struct netlbl_calipso_ops *calipso_ops;
 | 
						|
 | 
						|
/**
 | 
						|
 * netlbl_calipso_ops_register - Register the CALIPSO operations
 | 
						|
 * @ops: ops to register
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Register the CALIPSO packet engine operations.
 | 
						|
 *
 | 
						|
 */
 | 
						|
const struct netlbl_calipso_ops *
 | 
						|
netlbl_calipso_ops_register(const struct netlbl_calipso_ops *ops)
 | 
						|
{
 | 
						|
	return xchg(&calipso_ops, ops);
 | 
						|
}
 | 
						|
EXPORT_SYMBOL(netlbl_calipso_ops_register);
 | 
						|
 | 
						|
static const struct netlbl_calipso_ops *netlbl_calipso_ops_get(void)
 | 
						|
{
 | 
						|
	return READ_ONCE(calipso_ops);
 | 
						|
}
 | 
						|
 | 
						|
/* NetLabel Command Handlers
 | 
						|
 */
 | 
						|
/**
 | 
						|
 * netlbl_calipso_add_pass - Adds a CALIPSO pass DOI definition
 | 
						|
 * @info: the Generic NETLINK info block
 | 
						|
 * @audit_info: NetLabel audit information
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Create a new CALIPSO_MAP_PASS DOI definition based on the given ADD message
 | 
						|
 * and add it to the CALIPSO engine.  Return zero on success and non-zero on
 | 
						|
 * error.
 | 
						|
 *
 | 
						|
 */
 | 
						|
static int netlbl_calipso_add_pass(struct genl_info *info,
 | 
						|
				   struct netlbl_audit *audit_info)
 | 
						|
{
 | 
						|
	int ret_val;
 | 
						|
	struct calipso_doi *doi_def = NULL;
 | 
						|
 | 
						|
	doi_def = kmalloc(sizeof(*doi_def), GFP_KERNEL);
 | 
						|
	if (!doi_def)
 | 
						|
		return -ENOMEM;
 | 
						|
	doi_def->type = CALIPSO_MAP_PASS;
 | 
						|
	doi_def->doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
 | 
						|
	ret_val = calipso_doi_add(doi_def, audit_info);
 | 
						|
	if (ret_val != 0)
 | 
						|
		calipso_doi_free(doi_def);
 | 
						|
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * netlbl_calipso_add - Handle an ADD message
 | 
						|
 * @skb: the NETLINK buffer
 | 
						|
 * @info: the Generic NETLINK info block
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Create a new DOI definition based on the given ADD message and add it to the
 | 
						|
 * CALIPSO engine.  Returns zero on success, negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
static int netlbl_calipso_add(struct sk_buff *skb, struct genl_info *info)
 | 
						|
{
 | 
						|
	int ret_val = -EINVAL;
 | 
						|
	struct netlbl_audit audit_info;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (!info->attrs[NLBL_CALIPSO_A_DOI] ||
 | 
						|
	    !info->attrs[NLBL_CALIPSO_A_MTYPE])
 | 
						|
		return -EINVAL;
 | 
						|
 | 
						|
	if (!ops)
 | 
						|
		return -EOPNOTSUPP;
 | 
						|
 | 
						|
	netlbl_netlink_auditinfo(&audit_info);
 | 
						|
	switch (nla_get_u32(info->attrs[NLBL_CALIPSO_A_MTYPE])) {
 | 
						|
	case CALIPSO_MAP_PASS:
 | 
						|
		ret_val = netlbl_calipso_add_pass(info, &audit_info);
 | 
						|
		break;
 | 
						|
	}
 | 
						|
	if (ret_val == 0)
 | 
						|
		atomic_inc(&netlabel_mgmt_protocount);
 | 
						|
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * netlbl_calipso_list - Handle a LIST message
 | 
						|
 * @skb: the NETLINK buffer
 | 
						|
 * @info: the Generic NETLINK info block
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Process a user generated LIST message and respond accordingly.
 | 
						|
 * Returns zero on success and negative values on error.
 | 
						|
 *
 | 
						|
 */
 | 
						|
static int netlbl_calipso_list(struct sk_buff *skb, struct genl_info *info)
 | 
						|
{
 | 
						|
	int ret_val;
 | 
						|
	struct sk_buff *ans_skb = NULL;
 | 
						|
	void *data;
 | 
						|
	u32 doi;
 | 
						|
	struct calipso_doi *doi_def;
 | 
						|
 | 
						|
	if (!info->attrs[NLBL_CALIPSO_A_DOI]) {
 | 
						|
		ret_val = -EINVAL;
 | 
						|
		goto list_failure;
 | 
						|
	}
 | 
						|
 | 
						|
	doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
 | 
						|
 | 
						|
	doi_def = calipso_doi_getdef(doi);
 | 
						|
	if (!doi_def) {
 | 
						|
		ret_val = -EINVAL;
 | 
						|
		goto list_failure;
 | 
						|
	}
 | 
						|
 | 
						|
	ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
 | 
						|
	if (!ans_skb) {
 | 
						|
		ret_val = -ENOMEM;
 | 
						|
		goto list_failure_put;
 | 
						|
	}
 | 
						|
	data = genlmsg_put_reply(ans_skb, info, &netlbl_calipso_gnl_family,
 | 
						|
				 0, NLBL_CALIPSO_C_LIST);
 | 
						|
	if (!data) {
 | 
						|
		ret_val = -ENOMEM;
 | 
						|
		goto list_failure_put;
 | 
						|
	}
 | 
						|
 | 
						|
	ret_val = nla_put_u32(ans_skb, NLBL_CALIPSO_A_MTYPE, doi_def->type);
 | 
						|
	if (ret_val != 0)
 | 
						|
		goto list_failure_put;
 | 
						|
 | 
						|
	calipso_doi_putdef(doi_def);
 | 
						|
 | 
						|
	genlmsg_end(ans_skb, data);
 | 
						|
	return genlmsg_reply(ans_skb, info);
 | 
						|
 | 
						|
list_failure_put:
 | 
						|
	calipso_doi_putdef(doi_def);
 | 
						|
list_failure:
 | 
						|
	kfree_skb(ans_skb);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * netlbl_calipso_listall_cb - calipso_doi_walk() callback for LISTALL
 | 
						|
 * @doi_def: the CALIPSO DOI definition
 | 
						|
 * @arg: the netlbl_calipso_doiwalk_arg structure
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * This function is designed to be used as a callback to the
 | 
						|
 * calipso_doi_walk() function for use in generating a response for a LISTALL
 | 
						|
 * message.  Returns the size of the message on success, negative values on
 | 
						|
 * failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
static int netlbl_calipso_listall_cb(struct calipso_doi *doi_def, void *arg)
 | 
						|
{
 | 
						|
	int ret_val = -ENOMEM;
 | 
						|
	struct netlbl_calipso_doiwalk_arg *cb_arg = arg;
 | 
						|
	void *data;
 | 
						|
 | 
						|
	data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).portid,
 | 
						|
			   cb_arg->seq, &netlbl_calipso_gnl_family,
 | 
						|
			   NLM_F_MULTI, NLBL_CALIPSO_C_LISTALL);
 | 
						|
	if (!data)
 | 
						|
		goto listall_cb_failure;
 | 
						|
 | 
						|
	ret_val = nla_put_u32(cb_arg->skb, NLBL_CALIPSO_A_DOI, doi_def->doi);
 | 
						|
	if (ret_val != 0)
 | 
						|
		goto listall_cb_failure;
 | 
						|
	ret_val = nla_put_u32(cb_arg->skb,
 | 
						|
			      NLBL_CALIPSO_A_MTYPE,
 | 
						|
			      doi_def->type);
 | 
						|
	if (ret_val != 0)
 | 
						|
		goto listall_cb_failure;
 | 
						|
 | 
						|
	genlmsg_end(cb_arg->skb, data);
 | 
						|
	return 0;
 | 
						|
 | 
						|
listall_cb_failure:
 | 
						|
	genlmsg_cancel(cb_arg->skb, data);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * netlbl_calipso_listall - Handle a LISTALL message
 | 
						|
 * @skb: the NETLINK buffer
 | 
						|
 * @cb: the NETLINK callback
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Process a user generated LISTALL message and respond accordingly.  Returns
 | 
						|
 * zero on success and negative values on error.
 | 
						|
 *
 | 
						|
 */
 | 
						|
static int netlbl_calipso_listall(struct sk_buff *skb,
 | 
						|
				  struct netlink_callback *cb)
 | 
						|
{
 | 
						|
	struct netlbl_calipso_doiwalk_arg cb_arg;
 | 
						|
	u32 doi_skip = cb->args[0];
 | 
						|
 | 
						|
	cb_arg.nl_cb = cb;
 | 
						|
	cb_arg.skb = skb;
 | 
						|
	cb_arg.seq = cb->nlh->nlmsg_seq;
 | 
						|
 | 
						|
	calipso_doi_walk(&doi_skip, netlbl_calipso_listall_cb, &cb_arg);
 | 
						|
 | 
						|
	cb->args[0] = doi_skip;
 | 
						|
	return skb->len;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * netlbl_calipso_remove_cb - netlbl_calipso_remove() callback for REMOVE
 | 
						|
 * @entry: LSM domain mapping entry
 | 
						|
 * @arg: the netlbl_domhsh_walk_arg structure
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * This function is intended for use by netlbl_calipso_remove() as the callback
 | 
						|
 * for the netlbl_domhsh_walk() function; it removes LSM domain map entries
 | 
						|
 * which are associated with the CALIPSO DOI specified in @arg.  Returns zero on
 | 
						|
 * success, negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
static int netlbl_calipso_remove_cb(struct netlbl_dom_map *entry, void *arg)
 | 
						|
{
 | 
						|
	struct netlbl_domhsh_walk_arg *cb_arg = arg;
 | 
						|
 | 
						|
	if (entry->def.type == NETLBL_NLTYPE_CALIPSO &&
 | 
						|
	    entry->def.calipso->doi == cb_arg->doi)
 | 
						|
		return netlbl_domhsh_remove_entry(entry, cb_arg->audit_info);
 | 
						|
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * netlbl_calipso_remove - Handle a REMOVE message
 | 
						|
 * @skb: the NETLINK buffer
 | 
						|
 * @info: the Generic NETLINK info block
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Process a user generated REMOVE message and respond accordingly.  Returns
 | 
						|
 * zero on success, negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
static int netlbl_calipso_remove(struct sk_buff *skb, struct genl_info *info)
 | 
						|
{
 | 
						|
	int ret_val = -EINVAL;
 | 
						|
	struct netlbl_domhsh_walk_arg cb_arg;
 | 
						|
	struct netlbl_audit audit_info;
 | 
						|
	u32 skip_bkt = 0;
 | 
						|
	u32 skip_chain = 0;
 | 
						|
 | 
						|
	if (!info->attrs[NLBL_CALIPSO_A_DOI])
 | 
						|
		return -EINVAL;
 | 
						|
 | 
						|
	netlbl_netlink_auditinfo(&audit_info);
 | 
						|
	cb_arg.doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
 | 
						|
	cb_arg.audit_info = &audit_info;
 | 
						|
	ret_val = netlbl_domhsh_walk(&skip_bkt, &skip_chain,
 | 
						|
				     netlbl_calipso_remove_cb, &cb_arg);
 | 
						|
	if (ret_val == 0 || ret_val == -ENOENT) {
 | 
						|
		ret_val = calipso_doi_remove(cb_arg.doi, &audit_info);
 | 
						|
		if (ret_val == 0)
 | 
						|
			atomic_dec(&netlabel_mgmt_protocount);
 | 
						|
	}
 | 
						|
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/* NetLabel Generic NETLINK Command Definitions
 | 
						|
 */
 | 
						|
 | 
						|
static const struct genl_small_ops netlbl_calipso_ops[] = {
 | 
						|
	{
 | 
						|
	.cmd = NLBL_CALIPSO_C_ADD,
 | 
						|
	.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
 | 
						|
	.flags = GENL_ADMIN_PERM,
 | 
						|
	.doit = netlbl_calipso_add,
 | 
						|
	.dumpit = NULL,
 | 
						|
	},
 | 
						|
	{
 | 
						|
	.cmd = NLBL_CALIPSO_C_REMOVE,
 | 
						|
	.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
 | 
						|
	.flags = GENL_ADMIN_PERM,
 | 
						|
	.doit = netlbl_calipso_remove,
 | 
						|
	.dumpit = NULL,
 | 
						|
	},
 | 
						|
	{
 | 
						|
	.cmd = NLBL_CALIPSO_C_LIST,
 | 
						|
	.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
 | 
						|
	.flags = 0,
 | 
						|
	.doit = netlbl_calipso_list,
 | 
						|
	.dumpit = NULL,
 | 
						|
	},
 | 
						|
	{
 | 
						|
	.cmd = NLBL_CALIPSO_C_LISTALL,
 | 
						|
	.validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
 | 
						|
	.flags = 0,
 | 
						|
	.doit = NULL,
 | 
						|
	.dumpit = netlbl_calipso_listall,
 | 
						|
	},
 | 
						|
};
 | 
						|
 | 
						|
static struct genl_family netlbl_calipso_gnl_family __ro_after_init = {
 | 
						|
	.hdrsize = 0,
 | 
						|
	.name = NETLBL_NLTYPE_CALIPSO_NAME,
 | 
						|
	.version = NETLBL_PROTO_VERSION,
 | 
						|
	.maxattr = NLBL_CALIPSO_A_MAX,
 | 
						|
	.policy = calipso_genl_policy,
 | 
						|
	.module = THIS_MODULE,
 | 
						|
	.small_ops = netlbl_calipso_ops,
 | 
						|
	.n_small_ops = ARRAY_SIZE(netlbl_calipso_ops),
 | 
						|
	.resv_start_op = NLBL_CALIPSO_C_LISTALL + 1,
 | 
						|
};
 | 
						|
 | 
						|
/* NetLabel Generic NETLINK Protocol Functions
 | 
						|
 */
 | 
						|
 | 
						|
/**
 | 
						|
 * netlbl_calipso_genl_init - Register the CALIPSO NetLabel component
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Register the CALIPSO packet NetLabel component with the Generic NETLINK
 | 
						|
 * mechanism.  Returns zero on success, negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
int __init netlbl_calipso_genl_init(void)
 | 
						|
{
 | 
						|
	return genl_register_family(&netlbl_calipso_gnl_family);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_doi_add - Add a new DOI to the CALIPSO protocol engine
 | 
						|
 * @doi_def: the DOI structure
 | 
						|
 * @audit_info: NetLabel audit information
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * The caller defines a new DOI for use by the CALIPSO engine and calls this
 | 
						|
 * function to add it to the list of acceptable domains.  The caller must
 | 
						|
 * ensure that the mapping table specified in @doi_def->map meets all of the
 | 
						|
 * requirements of the mapping type (see calipso.h for details).  Returns
 | 
						|
 * zero on success and non-zero on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
int calipso_doi_add(struct calipso_doi *doi_def,
 | 
						|
		    struct netlbl_audit *audit_info)
 | 
						|
{
 | 
						|
	int ret_val = -ENOMSG;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->doi_add(doi_def, audit_info);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_doi_free - Frees a DOI definition
 | 
						|
 * @doi_def: the DOI definition
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * This function frees all of the memory associated with a DOI definition.
 | 
						|
 *
 | 
						|
 */
 | 
						|
void calipso_doi_free(struct calipso_doi *doi_def)
 | 
						|
{
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ops->doi_free(doi_def);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_doi_remove - Remove an existing DOI from the CALIPSO protocol engine
 | 
						|
 * @doi: the DOI value
 | 
						|
 * @audit_info: NetLabel audit information
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Removes a DOI definition from the CALIPSO engine.  The NetLabel routines will
 | 
						|
 * be called to release their own LSM domain mappings as well as our own
 | 
						|
 * domain list.  Returns zero on success and negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
int calipso_doi_remove(u32 doi, struct netlbl_audit *audit_info)
 | 
						|
{
 | 
						|
	int ret_val = -ENOMSG;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->doi_remove(doi, audit_info);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_doi_getdef - Returns a reference to a valid DOI definition
 | 
						|
 * @doi: the DOI value
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Searches for a valid DOI definition and if one is found it is returned to
 | 
						|
 * the caller.  Otherwise NULL is returned.  The caller must ensure that
 | 
						|
 * calipso_doi_putdef() is called when the caller is done.
 | 
						|
 *
 | 
						|
 */
 | 
						|
struct calipso_doi *calipso_doi_getdef(u32 doi)
 | 
						|
{
 | 
						|
	struct calipso_doi *ret_val = NULL;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->doi_getdef(doi);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_doi_putdef - Releases a reference for the given DOI definition
 | 
						|
 * @doi_def: the DOI definition
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Releases a DOI definition reference obtained from calipso_doi_getdef().
 | 
						|
 *
 | 
						|
 */
 | 
						|
void calipso_doi_putdef(struct calipso_doi *doi_def)
 | 
						|
{
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ops->doi_putdef(doi_def);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_doi_walk - Iterate through the DOI definitions
 | 
						|
 * @skip_cnt: skip past this number of DOI definitions, updated
 | 
						|
 * @callback: callback for each DOI definition
 | 
						|
 * @cb_arg: argument for the callback function
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Iterate over the DOI definition list, skipping the first @skip_cnt entries.
 | 
						|
 * For each entry call @callback, if @callback returns a negative value stop
 | 
						|
 * 'walking' through the list and return.  Updates the value in @skip_cnt upon
 | 
						|
 * return.  Returns zero on success, negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
int calipso_doi_walk(u32 *skip_cnt,
 | 
						|
		     int (*callback)(struct calipso_doi *doi_def, void *arg),
 | 
						|
		     void *cb_arg)
 | 
						|
{
 | 
						|
	int ret_val = -ENOMSG;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->doi_walk(skip_cnt, callback, cb_arg);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_sock_getattr - Get the security attributes from a sock
 | 
						|
 * @sk: the sock
 | 
						|
 * @secattr: the security attributes
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Query @sk to see if there is a CALIPSO option attached to the sock and if
 | 
						|
 * there is return the CALIPSO security attributes in @secattr.  This function
 | 
						|
 * requires that @sk be locked, or privately held, but it does not do any
 | 
						|
 * locking itself.  Returns zero on success and negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
int calipso_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
 | 
						|
{
 | 
						|
	int ret_val = -ENOMSG;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->sock_getattr(sk, secattr);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_sock_setattr - Add a CALIPSO option to a socket
 | 
						|
 * @sk: the socket
 | 
						|
 * @doi_def: the CALIPSO DOI to use
 | 
						|
 * @secattr: the specific security attributes of the socket
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Set the CALIPSO option on the given socket using the DOI definition and
 | 
						|
 * security attributes passed to the function.  This function requires
 | 
						|
 * exclusive access to @sk, which means it either needs to be in the
 | 
						|
 * process of being created or locked.  Returns zero on success and negative
 | 
						|
 * values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
int calipso_sock_setattr(struct sock *sk,
 | 
						|
			 const struct calipso_doi *doi_def,
 | 
						|
			 const struct netlbl_lsm_secattr *secattr)
 | 
						|
{
 | 
						|
	int ret_val = -ENOMSG;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->sock_setattr(sk, doi_def, secattr);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_sock_delattr - Delete the CALIPSO option from a socket
 | 
						|
 * @sk: the socket
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Removes the CALIPSO option from a socket, if present.
 | 
						|
 *
 | 
						|
 */
 | 
						|
void calipso_sock_delattr(struct sock *sk)
 | 
						|
{
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ops->sock_delattr(sk);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_req_setattr - Add a CALIPSO option to a connection request socket
 | 
						|
 * @req: the connection request socket
 | 
						|
 * @doi_def: the CALIPSO DOI to use
 | 
						|
 * @secattr: the specific security attributes of the socket
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Set the CALIPSO option on the given socket using the DOI definition and
 | 
						|
 * security attributes passed to the function.  Returns zero on success and
 | 
						|
 * negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
int calipso_req_setattr(struct request_sock *req,
 | 
						|
			const struct calipso_doi *doi_def,
 | 
						|
			const struct netlbl_lsm_secattr *secattr)
 | 
						|
{
 | 
						|
	int ret_val = -ENOMSG;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->req_setattr(req, doi_def, secattr);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_req_delattr - Delete the CALIPSO option from a request socket
 | 
						|
 * @req: the request socket
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Removes the CALIPSO option from a request socket, if present.
 | 
						|
 *
 | 
						|
 */
 | 
						|
void calipso_req_delattr(struct request_sock *req)
 | 
						|
{
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ops->req_delattr(req);
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_optptr - Find the CALIPSO option in the packet
 | 
						|
 * @skb: the packet
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Parse the packet's IP header looking for a CALIPSO option.  Returns a pointer
 | 
						|
 * to the start of the CALIPSO option on success, NULL if one if not found.
 | 
						|
 *
 | 
						|
 */
 | 
						|
unsigned char *calipso_optptr(const struct sk_buff *skb)
 | 
						|
{
 | 
						|
	unsigned char *ret_val = NULL;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->skbuff_optptr(skb);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_getattr - Get the security attributes from a memory block.
 | 
						|
 * @calipso: the CALIPSO option
 | 
						|
 * @secattr: the security attributes
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Inspect @calipso and return the security attributes in @secattr.
 | 
						|
 * Returns zero on success and negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
int calipso_getattr(const unsigned char *calipso,
 | 
						|
		    struct netlbl_lsm_secattr *secattr)
 | 
						|
{
 | 
						|
	int ret_val = -ENOMSG;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->opt_getattr(calipso, secattr);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_skbuff_setattr - Set the CALIPSO option on a packet
 | 
						|
 * @skb: the packet
 | 
						|
 * @doi_def: the CALIPSO DOI to use
 | 
						|
 * @secattr: the security attributes
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Set the CALIPSO option on the given packet based on the security attributes.
 | 
						|
 * Returns a pointer to the IP header on success and NULL on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
int calipso_skbuff_setattr(struct sk_buff *skb,
 | 
						|
			   const struct calipso_doi *doi_def,
 | 
						|
			   const struct netlbl_lsm_secattr *secattr)
 | 
						|
{
 | 
						|
	int ret_val = -ENOMSG;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->skbuff_setattr(skb, doi_def, secattr);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_skbuff_delattr - Delete any CALIPSO options from a packet
 | 
						|
 * @skb: the packet
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Removes any and all CALIPSO options from the given packet.  Returns zero on
 | 
						|
 * success, negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
int calipso_skbuff_delattr(struct sk_buff *skb)
 | 
						|
{
 | 
						|
	int ret_val = -ENOMSG;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->skbuff_delattr(skb);
 | 
						|
	return ret_val;
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_cache_invalidate - Invalidates the current CALIPSO cache
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Invalidates and frees any entries in the CALIPSO cache.  Returns zero on
 | 
						|
 * success and negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
void calipso_cache_invalidate(void)
 | 
						|
{
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ops->cache_invalidate();
 | 
						|
}
 | 
						|
 | 
						|
/**
 | 
						|
 * calipso_cache_add - Add an entry to the CALIPSO cache
 | 
						|
 * @calipso_ptr: the CALIPSO option
 | 
						|
 * @secattr: the packet's security attributes
 | 
						|
 *
 | 
						|
 * Description:
 | 
						|
 * Add a new entry into the CALIPSO label mapping cache.
 | 
						|
 * Returns zero on success, negative values on failure.
 | 
						|
 *
 | 
						|
 */
 | 
						|
int calipso_cache_add(const unsigned char *calipso_ptr,
 | 
						|
		      const struct netlbl_lsm_secattr *secattr)
 | 
						|
 | 
						|
{
 | 
						|
	int ret_val = -ENOMSG;
 | 
						|
	const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 | 
						|
 | 
						|
	if (ops)
 | 
						|
		ret_val = ops->cache_add(calipso_ptr, secattr);
 | 
						|
	return ret_val;
 | 
						|
}
 |