linux/net/netlabel/netlabel_calipso.c
<<
>>
Prefs
   1/*
   2 * NetLabel CALIPSO/IPv6 Support
   3 *
   4 * This file defines the CALIPSO/IPv6 functions for the NetLabel system.  The
   5 * NetLabel system manages static and dynamic label mappings for network
   6 * protocols such as CIPSO and CALIPSO.
   7 *
   8 * Authors: Paul Moore <paul@paul-moore.com>
   9 *          Huw Davies <huw@codeweavers.com>
  10 *
  11 */
  12
  13/* (c) Copyright Hewlett-Packard Development Company, L.P., 2006
  14 * (c) Copyright Huw Davies <huw@codeweavers.com>, 2015
  15 *
  16 * This program is free software;  you can redistribute it and/or modify
  17 * it under the terms of the GNU General Public License as published by
  18 * the Free Software Foundation; either version 2 of the License, or
  19 * (at your option) any later version.
  20 *
  21 * This program is distributed in the hope that it will be useful,
  22 * but WITHOUT ANY WARRANTY;  without even the implied warranty of
  23 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See
  24 * the GNU General Public License for more details.
  25 *
  26 * You should have received a copy of the GNU General Public License
  27 * along with this program;  if not, see <http://www.gnu.org/licenses/>.
  28 *
  29 */
  30
  31#include <linux/types.h>
  32#include <linux/socket.h>
  33#include <linux/string.h>
  34#include <linux/skbuff.h>
  35#include <linux/audit.h>
  36#include <linux/slab.h>
  37#include <net/sock.h>
  38#include <net/netlink.h>
  39#include <net/genetlink.h>
  40#include <net/netlabel.h>
  41#include <net/calipso.h>
  42#include <linux/atomic.h>
  43
  44#include "netlabel_user.h"
  45#include "netlabel_calipso.h"
  46#include "netlabel_mgmt.h"
  47#include "netlabel_domainhash.h"
  48
  49/* Argument struct for calipso_doi_walk() */
  50struct netlbl_calipso_doiwalk_arg {
  51        struct netlink_callback *nl_cb;
  52        struct sk_buff *skb;
  53        u32 seq;
  54};
  55
  56/* Argument struct for netlbl_domhsh_walk() */
  57struct netlbl_domhsh_walk_arg {
  58        struct netlbl_audit *audit_info;
  59        u32 doi;
  60};
  61
  62/* NetLabel Generic NETLINK CALIPSO family */
  63static struct genl_family netlbl_calipso_gnl_family;
  64
  65/* NetLabel Netlink attribute policy */
  66static const struct nla_policy calipso_genl_policy[NLBL_CALIPSO_A_MAX + 1] = {
  67        [NLBL_CALIPSO_A_DOI] = { .type = NLA_U32 },
  68        [NLBL_CALIPSO_A_MTYPE] = { .type = NLA_U32 },
  69};
  70
  71/* NetLabel Command Handlers
  72 */
  73/**
  74 * netlbl_calipso_add_pass - Adds a CALIPSO pass DOI definition
  75 * @info: the Generic NETLINK info block
  76 * @audit_info: NetLabel audit information
  77 *
  78 * Description:
  79 * Create a new CALIPSO_MAP_PASS DOI definition based on the given ADD message
  80 * and add it to the CALIPSO engine.  Return zero on success and non-zero on
  81 * error.
  82 *
  83 */
  84static int netlbl_calipso_add_pass(struct genl_info *info,
  85                                   struct netlbl_audit *audit_info)
  86{
  87        int ret_val;
  88        struct calipso_doi *doi_def = NULL;
  89
  90        doi_def = kmalloc(sizeof(*doi_def), GFP_KERNEL);
  91        if (!doi_def)
  92                return -ENOMEM;
  93        doi_def->type = CALIPSO_MAP_PASS;
  94        doi_def->doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
  95        ret_val = calipso_doi_add(doi_def, audit_info);
  96        if (ret_val != 0)
  97                calipso_doi_free(doi_def);
  98
  99        return ret_val;
 100}
 101
 102/**
 103 * netlbl_calipso_add - Handle an ADD message
 104 * @skb: the NETLINK buffer
 105 * @info: the Generic NETLINK info block
 106 *
 107 * Description:
 108 * Create a new DOI definition based on the given ADD message and add it to the
 109 * CALIPSO engine.  Returns zero on success, negative values on failure.
 110 *
 111 */
 112static int netlbl_calipso_add(struct sk_buff *skb, struct genl_info *info)
 113
 114{
 115        int ret_val = -EINVAL;
 116        struct netlbl_audit audit_info;
 117
 118        if (!info->attrs[NLBL_CALIPSO_A_DOI] ||
 119            !info->attrs[NLBL_CALIPSO_A_MTYPE])
 120                return -EINVAL;
 121
 122        netlbl_netlink_auditinfo(skb, &audit_info);
 123        switch (nla_get_u32(info->attrs[NLBL_CALIPSO_A_MTYPE])) {
 124        case CALIPSO_MAP_PASS:
 125                ret_val = netlbl_calipso_add_pass(info, &audit_info);
 126                break;
 127        }
 128        if (ret_val == 0)
 129                atomic_inc(&netlabel_mgmt_protocount);
 130
 131        return ret_val;
 132}
 133
 134/**
 135 * netlbl_calipso_list - Handle a LIST message
 136 * @skb: the NETLINK buffer
 137 * @info: the Generic NETLINK info block
 138 *
 139 * Description:
 140 * Process a user generated LIST message and respond accordingly.
 141 * Returns zero on success and negative values on error.
 142 *
 143 */
 144static int netlbl_calipso_list(struct sk_buff *skb, struct genl_info *info)
 145{
 146        int ret_val;
 147        struct sk_buff *ans_skb = NULL;
 148        void *data;
 149        u32 doi;
 150        struct calipso_doi *doi_def;
 151
 152        if (!info->attrs[NLBL_CALIPSO_A_DOI]) {
 153                ret_val = -EINVAL;
 154                goto list_failure;
 155        }
 156
 157        doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
 158
 159        doi_def = calipso_doi_getdef(doi);
 160        if (!doi_def) {
 161                ret_val = -EINVAL;
 162                goto list_failure;
 163        }
 164
 165        ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
 166        if (!ans_skb) {
 167                ret_val = -ENOMEM;
 168                goto list_failure_put;
 169        }
 170        data = genlmsg_put_reply(ans_skb, info, &netlbl_calipso_gnl_family,
 171                                 0, NLBL_CALIPSO_C_LIST);
 172        if (!data) {
 173                ret_val = -ENOMEM;
 174                goto list_failure_put;
 175        }
 176
 177        ret_val = nla_put_u32(ans_skb, NLBL_CALIPSO_A_MTYPE, doi_def->type);
 178        if (ret_val != 0)
 179                goto list_failure_put;
 180
 181        calipso_doi_putdef(doi_def);
 182
 183        genlmsg_end(ans_skb, data);
 184        return genlmsg_reply(ans_skb, info);
 185
 186list_failure_put:
 187        calipso_doi_putdef(doi_def);
 188list_failure:
 189        kfree_skb(ans_skb);
 190        return ret_val;
 191}
 192
 193/**
 194 * netlbl_calipso_listall_cb - calipso_doi_walk() callback for LISTALL
 195 * @doi_def: the CALIPSO DOI definition
 196 * @arg: the netlbl_calipso_doiwalk_arg structure
 197 *
 198 * Description:
 199 * This function is designed to be used as a callback to the
 200 * calipso_doi_walk() function for use in generating a response for a LISTALL
 201 * message.  Returns the size of the message on success, negative values on
 202 * failure.
 203 *
 204 */
 205static int netlbl_calipso_listall_cb(struct calipso_doi *doi_def, void *arg)
 206{
 207        int ret_val = -ENOMEM;
 208        struct netlbl_calipso_doiwalk_arg *cb_arg = arg;
 209        void *data;
 210
 211        data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).portid,
 212                           cb_arg->seq, &netlbl_calipso_gnl_family,
 213                           NLM_F_MULTI, NLBL_CALIPSO_C_LISTALL);
 214        if (!data)
 215                goto listall_cb_failure;
 216
 217        ret_val = nla_put_u32(cb_arg->skb, NLBL_CALIPSO_A_DOI, doi_def->doi);
 218        if (ret_val != 0)
 219                goto listall_cb_failure;
 220        ret_val = nla_put_u32(cb_arg->skb,
 221                              NLBL_CALIPSO_A_MTYPE,
 222                              doi_def->type);
 223        if (ret_val != 0)
 224                goto listall_cb_failure;
 225
 226        genlmsg_end(cb_arg->skb, data);
 227        return 0;
 228
 229listall_cb_failure:
 230        genlmsg_cancel(cb_arg->skb, data);
 231        return ret_val;
 232}
 233
 234/**
 235 * netlbl_calipso_listall - Handle a LISTALL message
 236 * @skb: the NETLINK buffer
 237 * @cb: the NETLINK callback
 238 *
 239 * Description:
 240 * Process a user generated LISTALL message and respond accordingly.  Returns
 241 * zero on success and negative values on error.
 242 *
 243 */
 244static int netlbl_calipso_listall(struct sk_buff *skb,
 245                                  struct netlink_callback *cb)
 246{
 247        struct netlbl_calipso_doiwalk_arg cb_arg;
 248        u32 doi_skip = cb->args[0];
 249
 250        cb_arg.nl_cb = cb;
 251        cb_arg.skb = skb;
 252        cb_arg.seq = cb->nlh->nlmsg_seq;
 253
 254        calipso_doi_walk(&doi_skip, netlbl_calipso_listall_cb, &cb_arg);
 255
 256        cb->args[0] = doi_skip;
 257        return skb->len;
 258}
 259
 260/**
 261 * netlbl_calipso_remove_cb - netlbl_calipso_remove() callback for REMOVE
 262 * @entry: LSM domain mapping entry
 263 * @arg: the netlbl_domhsh_walk_arg structure
 264 *
 265 * Description:
 266 * This function is intended for use by netlbl_calipso_remove() as the callback
 267 * for the netlbl_domhsh_walk() function; it removes LSM domain map entries
 268 * which are associated with the CALIPSO DOI specified in @arg.  Returns zero on
 269 * success, negative values on failure.
 270 *
 271 */
 272static int netlbl_calipso_remove_cb(struct netlbl_dom_map *entry, void *arg)
 273{
 274        struct netlbl_domhsh_walk_arg *cb_arg = arg;
 275
 276        if (entry->def.type == NETLBL_NLTYPE_CALIPSO &&
 277            entry->def.calipso->doi == cb_arg->doi)
 278                return netlbl_domhsh_remove_entry(entry, cb_arg->audit_info);
 279
 280        return 0;
 281}
 282
 283/**
 284 * netlbl_calipso_remove - Handle a REMOVE message
 285 * @skb: the NETLINK buffer
 286 * @info: the Generic NETLINK info block
 287 *
 288 * Description:
 289 * Process a user generated REMOVE message and respond accordingly.  Returns
 290 * zero on success, negative values on failure.
 291 *
 292 */
 293static int netlbl_calipso_remove(struct sk_buff *skb, struct genl_info *info)
 294{
 295        int ret_val = -EINVAL;
 296        struct netlbl_domhsh_walk_arg cb_arg;
 297        struct netlbl_audit audit_info;
 298        u32 skip_bkt = 0;
 299        u32 skip_chain = 0;
 300
 301        if (!info->attrs[NLBL_CALIPSO_A_DOI])
 302                return -EINVAL;
 303
 304        netlbl_netlink_auditinfo(skb, &audit_info);
 305        cb_arg.doi = nla_get_u32(info->attrs[NLBL_CALIPSO_A_DOI]);
 306        cb_arg.audit_info = &audit_info;
 307        ret_val = netlbl_domhsh_walk(&skip_bkt, &skip_chain,
 308                                     netlbl_calipso_remove_cb, &cb_arg);
 309        if (ret_val == 0 || ret_val == -ENOENT) {
 310                ret_val = calipso_doi_remove(cb_arg.doi, &audit_info);
 311                if (ret_val == 0)
 312                        atomic_dec(&netlabel_mgmt_protocount);
 313        }
 314
 315        return ret_val;
 316}
 317
 318/* NetLabel Generic NETLINK Command Definitions
 319 */
 320
 321static const struct genl_ops netlbl_calipso_ops[] = {
 322        {
 323        .cmd = NLBL_CALIPSO_C_ADD,
 324        .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
 325        .flags = GENL_ADMIN_PERM,
 326        .doit = netlbl_calipso_add,
 327        .dumpit = NULL,
 328        },
 329        {
 330        .cmd = NLBL_CALIPSO_C_REMOVE,
 331        .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
 332        .flags = GENL_ADMIN_PERM,
 333        .doit = netlbl_calipso_remove,
 334        .dumpit = NULL,
 335        },
 336        {
 337        .cmd = NLBL_CALIPSO_C_LIST,
 338        .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
 339        .flags = 0,
 340        .doit = netlbl_calipso_list,
 341        .dumpit = NULL,
 342        },
 343        {
 344        .cmd = NLBL_CALIPSO_C_LISTALL,
 345        .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
 346        .flags = 0,
 347        .doit = NULL,
 348        .dumpit = netlbl_calipso_listall,
 349        },
 350};
 351
 352static struct genl_family netlbl_calipso_gnl_family __ro_after_init = {
 353        .hdrsize = 0,
 354        .name = NETLBL_NLTYPE_CALIPSO_NAME,
 355        .version = NETLBL_PROTO_VERSION,
 356        .maxattr = NLBL_CALIPSO_A_MAX,
 357        .policy = calipso_genl_policy,
 358        .module = THIS_MODULE,
 359        .ops = netlbl_calipso_ops,
 360        .n_ops = ARRAY_SIZE(netlbl_calipso_ops),
 361};
 362
 363/* NetLabel Generic NETLINK Protocol Functions
 364 */
 365
 366/**
 367 * netlbl_calipso_genl_init - Register the CALIPSO NetLabel component
 368 *
 369 * Description:
 370 * Register the CALIPSO packet NetLabel component with the Generic NETLINK
 371 * mechanism.  Returns zero on success, negative values on failure.
 372 *
 373 */
 374int __init netlbl_calipso_genl_init(void)
 375{
 376        return genl_register_family(&netlbl_calipso_gnl_family);
 377}
 378
 379static const struct netlbl_calipso_ops *calipso_ops;
 380
 381/**
 382 * netlbl_calipso_ops_register - Register the CALIPSO operations
 383 *
 384 * Description:
 385 * Register the CALIPSO packet engine operations.
 386 *
 387 */
 388const struct netlbl_calipso_ops *
 389netlbl_calipso_ops_register(const struct netlbl_calipso_ops *ops)
 390{
 391        return xchg(&calipso_ops, ops);
 392}
 393EXPORT_SYMBOL(netlbl_calipso_ops_register);
 394
 395static const struct netlbl_calipso_ops *netlbl_calipso_ops_get(void)
 396{
 397        return READ_ONCE(calipso_ops);
 398}
 399
 400/**
 401 * calipso_doi_add - Add a new DOI to the CALIPSO protocol engine
 402 * @doi_def: the DOI structure
 403 * @audit_info: NetLabel audit information
 404 *
 405 * Description:
 406 * The caller defines a new DOI for use by the CALIPSO engine and calls this
 407 * function to add it to the list of acceptable domains.  The caller must
 408 * ensure that the mapping table specified in @doi_def->map meets all of the
 409 * requirements of the mapping type (see calipso.h for details).  Returns
 410 * zero on success and non-zero on failure.
 411 *
 412 */
 413int calipso_doi_add(struct calipso_doi *doi_def,
 414                    struct netlbl_audit *audit_info)
 415{
 416        int ret_val = -ENOMSG;
 417        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 418
 419        if (ops)
 420                ret_val = ops->doi_add(doi_def, audit_info);
 421        return ret_val;
 422}
 423
 424/**
 425 * calipso_doi_free - Frees a DOI definition
 426 * @doi_def: the DOI definition
 427 *
 428 * Description:
 429 * This function frees all of the memory associated with a DOI definition.
 430 *
 431 */
 432void calipso_doi_free(struct calipso_doi *doi_def)
 433{
 434        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 435
 436        if (ops)
 437                ops->doi_free(doi_def);
 438}
 439
 440/**
 441 * calipso_doi_remove - Remove an existing DOI from the CALIPSO protocol engine
 442 * @doi: the DOI value
 443 * @audit_secid: the LSM secid to use in the audit message
 444 *
 445 * Description:
 446 * Removes a DOI definition from the CALIPSO engine.  The NetLabel routines will
 447 * be called to release their own LSM domain mappings as well as our own
 448 * domain list.  Returns zero on success and negative values on failure.
 449 *
 450 */
 451int calipso_doi_remove(u32 doi, struct netlbl_audit *audit_info)
 452{
 453        int ret_val = -ENOMSG;
 454        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 455
 456        if (ops)
 457                ret_val = ops->doi_remove(doi, audit_info);
 458        return ret_val;
 459}
 460
 461/**
 462 * calipso_doi_getdef - Returns a reference to a valid DOI definition
 463 * @doi: the DOI value
 464 *
 465 * Description:
 466 * Searches for a valid DOI definition and if one is found it is returned to
 467 * the caller.  Otherwise NULL is returned.  The caller must ensure that
 468 * calipso_doi_putdef() is called when the caller is done.
 469 *
 470 */
 471struct calipso_doi *calipso_doi_getdef(u32 doi)
 472{
 473        struct calipso_doi *ret_val = NULL;
 474        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 475
 476        if (ops)
 477                ret_val = ops->doi_getdef(doi);
 478        return ret_val;
 479}
 480
 481/**
 482 * calipso_doi_putdef - Releases a reference for the given DOI definition
 483 * @doi_def: the DOI definition
 484 *
 485 * Description:
 486 * Releases a DOI definition reference obtained from calipso_doi_getdef().
 487 *
 488 */
 489void calipso_doi_putdef(struct calipso_doi *doi_def)
 490{
 491        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 492
 493        if (ops)
 494                ops->doi_putdef(doi_def);
 495}
 496
 497/**
 498 * calipso_doi_walk - Iterate through the DOI definitions
 499 * @skip_cnt: skip past this number of DOI definitions, updated
 500 * @callback: callback for each DOI definition
 501 * @cb_arg: argument for the callback function
 502 *
 503 * Description:
 504 * Iterate over the DOI definition list, skipping the first @skip_cnt entries.
 505 * For each entry call @callback, if @callback returns a negative value stop
 506 * 'walking' through the list and return.  Updates the value in @skip_cnt upon
 507 * return.  Returns zero on success, negative values on failure.
 508 *
 509 */
 510int calipso_doi_walk(u32 *skip_cnt,
 511                     int (*callback)(struct calipso_doi *doi_def, void *arg),
 512                     void *cb_arg)
 513{
 514        int ret_val = -ENOMSG;
 515        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 516
 517        if (ops)
 518                ret_val = ops->doi_walk(skip_cnt, callback, cb_arg);
 519        return ret_val;
 520}
 521
 522/**
 523 * calipso_sock_getattr - Get the security attributes from a sock
 524 * @sk: the sock
 525 * @secattr: the security attributes
 526 *
 527 * Description:
 528 * Query @sk to see if there is a CALIPSO option attached to the sock and if
 529 * there is return the CALIPSO security attributes in @secattr.  This function
 530 * requires that @sk be locked, or privately held, but it does not do any
 531 * locking itself.  Returns zero on success and negative values on failure.
 532 *
 533 */
 534int calipso_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
 535{
 536        int ret_val = -ENOMSG;
 537        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 538
 539        if (ops)
 540                ret_val = ops->sock_getattr(sk, secattr);
 541        return ret_val;
 542}
 543
 544/**
 545 * calipso_sock_setattr - Add a CALIPSO option to a socket
 546 * @sk: the socket
 547 * @doi_def: the CALIPSO DOI to use
 548 * @secattr: the specific security attributes of the socket
 549 *
 550 * Description:
 551 * Set the CALIPSO option on the given socket using the DOI definition and
 552 * security attributes passed to the function.  This function requires
 553 * exclusive access to @sk, which means it either needs to be in the
 554 * process of being created or locked.  Returns zero on success and negative
 555 * values on failure.
 556 *
 557 */
 558int calipso_sock_setattr(struct sock *sk,
 559                         const struct calipso_doi *doi_def,
 560                         const struct netlbl_lsm_secattr *secattr)
 561{
 562        int ret_val = -ENOMSG;
 563        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 564
 565        if (ops)
 566                ret_val = ops->sock_setattr(sk, doi_def, secattr);
 567        return ret_val;
 568}
 569
 570/**
 571 * calipso_sock_delattr - Delete the CALIPSO option from a socket
 572 * @sk: the socket
 573 *
 574 * Description:
 575 * Removes the CALIPSO option from a socket, if present.
 576 *
 577 */
 578void calipso_sock_delattr(struct sock *sk)
 579{
 580        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 581
 582        if (ops)
 583                ops->sock_delattr(sk);
 584}
 585
 586/**
 587 * calipso_req_setattr - Add a CALIPSO option to a connection request socket
 588 * @req: the connection request socket
 589 * @doi_def: the CALIPSO DOI to use
 590 * @secattr: the specific security attributes of the socket
 591 *
 592 * Description:
 593 * Set the CALIPSO option on the given socket using the DOI definition and
 594 * security attributes passed to the function.  Returns zero on success and
 595 * negative values on failure.
 596 *
 597 */
 598int calipso_req_setattr(struct request_sock *req,
 599                        const struct calipso_doi *doi_def,
 600                        const struct netlbl_lsm_secattr *secattr)
 601{
 602        int ret_val = -ENOMSG;
 603        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 604
 605        if (ops)
 606                ret_val = ops->req_setattr(req, doi_def, secattr);
 607        return ret_val;
 608}
 609
 610/**
 611 * calipso_req_delattr - Delete the CALIPSO option from a request socket
 612 * @reg: the request socket
 613 *
 614 * Description:
 615 * Removes the CALIPSO option from a request socket, if present.
 616 *
 617 */
 618void calipso_req_delattr(struct request_sock *req)
 619{
 620        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 621
 622        if (ops)
 623                ops->req_delattr(req);
 624}
 625
 626/**
 627 * calipso_optptr - Find the CALIPSO option in the packet
 628 * @skb: the packet
 629 *
 630 * Description:
 631 * Parse the packet's IP header looking for a CALIPSO option.  Returns a pointer
 632 * to the start of the CALIPSO option on success, NULL if one if not found.
 633 *
 634 */
 635unsigned char *calipso_optptr(const struct sk_buff *skb)
 636{
 637        unsigned char *ret_val = NULL;
 638        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 639
 640        if (ops)
 641                ret_val = ops->skbuff_optptr(skb);
 642        return ret_val;
 643}
 644
 645/**
 646 * calipso_getattr - Get the security attributes from a memory block.
 647 * @calipso: the CALIPSO option
 648 * @secattr: the security attributes
 649 *
 650 * Description:
 651 * Inspect @calipso and return the security attributes in @secattr.
 652 * Returns zero on success and negative values on failure.
 653 *
 654 */
 655int calipso_getattr(const unsigned char *calipso,
 656                    struct netlbl_lsm_secattr *secattr)
 657{
 658        int ret_val = -ENOMSG;
 659        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 660
 661        if (ops)
 662                ret_val = ops->opt_getattr(calipso, secattr);
 663        return ret_val;
 664}
 665
 666/**
 667 * calipso_skbuff_setattr - Set the CALIPSO option on a packet
 668 * @skb: the packet
 669 * @doi_def: the CALIPSO DOI to use
 670 * @secattr: the security attributes
 671 *
 672 * Description:
 673 * Set the CALIPSO option on the given packet based on the security attributes.
 674 * Returns a pointer to the IP header on success and NULL on failure.
 675 *
 676 */
 677int calipso_skbuff_setattr(struct sk_buff *skb,
 678                           const struct calipso_doi *doi_def,
 679                           const struct netlbl_lsm_secattr *secattr)
 680{
 681        int ret_val = -ENOMSG;
 682        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 683
 684        if (ops)
 685                ret_val = ops->skbuff_setattr(skb, doi_def, secattr);
 686        return ret_val;
 687}
 688
 689/**
 690 * calipso_skbuff_delattr - Delete any CALIPSO options from a packet
 691 * @skb: the packet
 692 *
 693 * Description:
 694 * Removes any and all CALIPSO options from the given packet.  Returns zero on
 695 * success, negative values on failure.
 696 *
 697 */
 698int calipso_skbuff_delattr(struct sk_buff *skb)
 699{
 700        int ret_val = -ENOMSG;
 701        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 702
 703        if (ops)
 704                ret_val = ops->skbuff_delattr(skb);
 705        return ret_val;
 706}
 707
 708/**
 709 * calipso_cache_invalidate - Invalidates the current CALIPSO cache
 710 *
 711 * Description:
 712 * Invalidates and frees any entries in the CALIPSO cache.  Returns zero on
 713 * success and negative values on failure.
 714 *
 715 */
 716void calipso_cache_invalidate(void)
 717{
 718        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 719
 720        if (ops)
 721                ops->cache_invalidate();
 722}
 723
 724/**
 725 * calipso_cache_add - Add an entry to the CALIPSO cache
 726 * @calipso_ptr: the CALIPSO option
 727 * @secattr: the packet's security attributes
 728 *
 729 * Description:
 730 * Add a new entry into the CALIPSO label mapping cache.
 731 * Returns zero on success, negative values on failure.
 732 *
 733 */
 734int calipso_cache_add(const unsigned char *calipso_ptr,
 735                      const struct netlbl_lsm_secattr *secattr)
 736
 737{
 738        int ret_val = -ENOMSG;
 739        const struct netlbl_calipso_ops *ops = netlbl_calipso_ops_get();
 740
 741        if (ops)
 742                ret_val = ops->cache_add(calipso_ptr, secattr);
 743        return ret_val;
 744}
 745