111a03f78SPaul Moore /* 211a03f78SPaul Moore * NetLabel System 311a03f78SPaul Moore * 411a03f78SPaul Moore * The NetLabel system manages static and dynamic label mappings for network 511a03f78SPaul Moore * protocols such as CIPSO and RIPSO. 611a03f78SPaul Moore * 711a03f78SPaul Moore * Author: Paul Moore <paul.moore@hp.com> 811a03f78SPaul Moore * 911a03f78SPaul Moore */ 1011a03f78SPaul Moore 1111a03f78SPaul Moore /* 1263c41688SPaul Moore * (c) Copyright Hewlett-Packard Development Company, L.P., 2006, 2008 1311a03f78SPaul Moore * 1411a03f78SPaul Moore * This program is free software; you can redistribute it and/or modify 1511a03f78SPaul Moore * it under the terms of the GNU General Public License as published by 1611a03f78SPaul Moore * the Free Software Foundation; either version 2 of the License, or 1711a03f78SPaul Moore * (at your option) any later version. 1811a03f78SPaul Moore * 1911a03f78SPaul Moore * This program is distributed in the hope that it will be useful, 2011a03f78SPaul Moore * but WITHOUT ANY WARRANTY; without even the implied warranty of 2111a03f78SPaul Moore * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See 2211a03f78SPaul Moore * the GNU General Public License for more details. 2311a03f78SPaul Moore * 2411a03f78SPaul Moore * You should have received a copy of the GNU General Public License 2511a03f78SPaul Moore * along with this program; if not, write to the Free Software 2611a03f78SPaul Moore * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 2711a03f78SPaul Moore * 2811a03f78SPaul Moore */ 2911a03f78SPaul Moore 3011a03f78SPaul Moore #ifndef _NETLABEL_H 3111a03f78SPaul Moore #define _NETLABEL_H 3211a03f78SPaul Moore 3311a03f78SPaul Moore #include <linux/types.h> 347a0e1d60SPaul Moore #include <linux/net.h> 3511a03f78SPaul Moore #include <linux/skbuff.h> 3611a03f78SPaul Moore #include <net/netlink.h> 37ffb733c6Spaul.moore@hp.com #include <asm/atomic.h> 3811a03f78SPaul Moore 39eda61d32SPaul Moore struct cipso_v4_doi; 40eda61d32SPaul Moore 4111a03f78SPaul Moore /* 4211a03f78SPaul Moore * NetLabel - A management interface for maintaining network packet label 4311a03f78SPaul Moore * mapping tables for explicit packet labling protocols. 4411a03f78SPaul Moore * 4511a03f78SPaul Moore * Network protocols such as CIPSO and RIPSO require a label translation layer 4611a03f78SPaul Moore * to convert the label on the packet into something meaningful on the host 4711a03f78SPaul Moore * machine. In the current Linux implementation these mapping tables live 4811a03f78SPaul Moore * inside the kernel; NetLabel provides a mechanism for user space applications 4911a03f78SPaul Moore * to manage these mapping tables. 5011a03f78SPaul Moore * 5111a03f78SPaul Moore * NetLabel makes use of the Generic NETLINK mechanism as a transport layer to 5211a03f78SPaul Moore * send messages between kernel and user space. The general format of a 5311a03f78SPaul Moore * NetLabel message is shown below: 5411a03f78SPaul Moore * 5511a03f78SPaul Moore * +-----------------+-------------------+--------- --- -- - 5611a03f78SPaul Moore * | struct nlmsghdr | struct genlmsghdr | payload 5711a03f78SPaul Moore * +-----------------+-------------------+--------- --- -- - 5811a03f78SPaul Moore * 5911a03f78SPaul Moore * The 'nlmsghdr' and 'genlmsghdr' structs should be dealt with like normal. 6011a03f78SPaul Moore * The payload is dependent on the subsystem specified in the 6111a03f78SPaul Moore * 'nlmsghdr->nlmsg_type' and should be defined below, supporting functions 6211a03f78SPaul Moore * should be defined in the corresponding net/netlabel/netlabel_<subsys>.h|c 63fcd48280SPaul Moore * file. All of the fields in the NetLabel payload are NETLINK attributes, see 64fcd48280SPaul Moore * the include/net/netlink.h file for more information on NETLINK attributes. 6511a03f78SPaul Moore * 6611a03f78SPaul Moore */ 6711a03f78SPaul Moore 6811a03f78SPaul Moore /* 6911a03f78SPaul Moore * NetLabel NETLINK protocol 7011a03f78SPaul Moore */ 7111a03f78SPaul Moore 728cc44579SPaul Moore /* NetLabel NETLINK protocol version 738cc44579SPaul Moore * 1: initial version 748cc44579SPaul Moore * 2: added static labels for unlabeled connections 75*d91d4079SPaul Moore * 3: network selectors added to the NetLabel/LSM domain mapping and the 76*d91d4079SPaul Moore * CIPSO_V4_MAP_LOCAL CIPSO mapping was added 778cc44579SPaul Moore */ 7863c41688SPaul Moore #define NETLBL_PROTO_VERSION 3 7911a03f78SPaul Moore 8011a03f78SPaul Moore /* NetLabel NETLINK types/families */ 8111a03f78SPaul Moore #define NETLBL_NLTYPE_NONE 0 8211a03f78SPaul Moore #define NETLBL_NLTYPE_MGMT 1 8311a03f78SPaul Moore #define NETLBL_NLTYPE_MGMT_NAME "NLBL_MGMT" 8411a03f78SPaul Moore #define NETLBL_NLTYPE_RIPSO 2 8511a03f78SPaul Moore #define NETLBL_NLTYPE_RIPSO_NAME "NLBL_RIPSO" 8611a03f78SPaul Moore #define NETLBL_NLTYPE_CIPSOV4 3 8711a03f78SPaul Moore #define NETLBL_NLTYPE_CIPSOV4_NAME "NLBL_CIPSOv4" 8811a03f78SPaul Moore #define NETLBL_NLTYPE_CIPSOV6 4 8911a03f78SPaul Moore #define NETLBL_NLTYPE_CIPSOV6_NAME "NLBL_CIPSOv6" 9011a03f78SPaul Moore #define NETLBL_NLTYPE_UNLABELED 5 9111a03f78SPaul Moore #define NETLBL_NLTYPE_UNLABELED_NAME "NLBL_UNLBL" 9263c41688SPaul Moore #define NETLBL_NLTYPE_ADDRSELECT 6 9363c41688SPaul Moore #define NETLBL_NLTYPE_ADDRSELECT_NAME "NLBL_ADRSEL" 9411a03f78SPaul Moore 9511a03f78SPaul Moore /* 9611a03f78SPaul Moore * NetLabel - Kernel API for accessing the network packet label mappings. 9711a03f78SPaul Moore * 9811a03f78SPaul Moore * The following functions are provided for use by other kernel modules, 9911a03f78SPaul Moore * specifically kernel LSM modules, to provide a consistent, transparent API 10011a03f78SPaul Moore * for dealing with explicit packet labeling protocols such as CIPSO and 10111a03f78SPaul Moore * RIPSO. The functions defined here are implemented in the 10211a03f78SPaul Moore * net/netlabel/netlabel_kapi.c file. 10311a03f78SPaul Moore * 10411a03f78SPaul Moore */ 10511a03f78SPaul Moore 10695d4e6beSPaul Moore /* NetLabel audit information */ 10795d4e6beSPaul Moore struct netlbl_audit { 10895d4e6beSPaul Moore u32 secid; 10995d4e6beSPaul Moore uid_t loginuid; 1102532386fSEric Paris u32 sessionid; 11195d4e6beSPaul Moore }; 11295d4e6beSPaul Moore 11316efd454SPaul Moore /* 11416efd454SPaul Moore * LSM security attributes 11516efd454SPaul Moore */ 11616efd454SPaul Moore 11716efd454SPaul Moore /** 11816efd454SPaul Moore * struct netlbl_lsm_cache - NetLabel LSM security attribute cache 11916efd454SPaul Moore * @refcount: atomic reference counter 12016efd454SPaul Moore * @free: LSM supplied function to free the cache data 12116efd454SPaul Moore * @data: LSM supplied cache data 12216efd454SPaul Moore * 12316efd454SPaul Moore * Description: 12416efd454SPaul Moore * This structure is provided for LSMs which wish to make use of the NetLabel 12516efd454SPaul Moore * caching mechanism to store LSM specific data/attributes in the NetLabel 12616efd454SPaul Moore * cache. If the LSM has to perform a lot of translation from the NetLabel 12716efd454SPaul Moore * security attributes into it's own internal representation then the cache 12816efd454SPaul Moore * mechanism can provide a way to eliminate some or all of that translation 12916efd454SPaul Moore * overhead on a cache hit. 13016efd454SPaul Moore * 13116efd454SPaul Moore */ 13211a03f78SPaul Moore struct netlbl_lsm_cache { 133ffb733c6Spaul.moore@hp.com atomic_t refcount; 13411a03f78SPaul Moore void (*free) (const void *data); 13511a03f78SPaul Moore void *data; 13611a03f78SPaul Moore }; 13716efd454SPaul Moore 13816efd454SPaul Moore /** 13916efd454SPaul Moore * struct netlbl_lsm_secattr_catmap - NetLabel LSM secattr category bitmap 14016efd454SPaul Moore * @startbit: the value of the lowest order bit in the bitmap 14116efd454SPaul Moore * @bitmap: the category bitmap 14216efd454SPaul Moore * @next: pointer to the next bitmap "node" or NULL 14316efd454SPaul Moore * 14416efd454SPaul Moore * Description: 14516efd454SPaul Moore * This structure is used to represent category bitmaps. Due to the large 14616efd454SPaul Moore * number of categories supported by most labeling protocols it is not 14716efd454SPaul Moore * practical to transfer a full bitmap internally so NetLabel adopts a sparse 14816efd454SPaul Moore * bitmap structure modeled after SELinux's ebitmap structure. 14916efd454SPaul Moore * The catmap bitmap field MUST be a power of two in length and large 15002752760SPaul Moore * enough to hold at least 240 bits. Special care (i.e. check the code!) 15102752760SPaul Moore * should be used when changing these values as the LSM implementation 15202752760SPaul Moore * probably has functions which rely on the sizes of these types to speed 15316efd454SPaul Moore * processing. 15416efd454SPaul Moore * 15516efd454SPaul Moore */ 15602752760SPaul Moore #define NETLBL_CATMAP_MAPTYPE u64 15702752760SPaul Moore #define NETLBL_CATMAP_MAPCNT 4 15802752760SPaul Moore #define NETLBL_CATMAP_MAPSIZE (sizeof(NETLBL_CATMAP_MAPTYPE) * 8) 15902752760SPaul Moore #define NETLBL_CATMAP_SIZE (NETLBL_CATMAP_MAPSIZE * \ 16002752760SPaul Moore NETLBL_CATMAP_MAPCNT) 16102752760SPaul Moore #define NETLBL_CATMAP_BIT (NETLBL_CATMAP_MAPTYPE)0x01 16202752760SPaul Moore struct netlbl_lsm_secattr_catmap { 16302752760SPaul Moore u32 startbit; 16402752760SPaul Moore NETLBL_CATMAP_MAPTYPE bitmap[NETLBL_CATMAP_MAPCNT]; 16502752760SPaul Moore struct netlbl_lsm_secattr_catmap *next; 16602752760SPaul Moore }; 16716efd454SPaul Moore 16816efd454SPaul Moore /** 16916efd454SPaul Moore * struct netlbl_lsm_secattr - NetLabel LSM security attributes 17000447872SPaul Moore * @flags: indicate structure attributes, see NETLBL_SECATTR_* 17116efd454SPaul Moore * @type: indicate the NLTYPE of the attributes 17216efd454SPaul Moore * @domain: the NetLabel LSM domain 17316efd454SPaul Moore * @cache: NetLabel LSM specific cache 17416efd454SPaul Moore * @attr.mls: MLS sensitivity label 17516efd454SPaul Moore * @attr.mls.cat: MLS category bitmap 17616efd454SPaul Moore * @attr.mls.lvl: MLS sensitivity level 17716efd454SPaul Moore * @attr.secid: LSM specific secid token 17816efd454SPaul Moore * 17916efd454SPaul Moore * Description: 18016efd454SPaul Moore * This structure is used to pass security attributes between NetLabel and the 18116efd454SPaul Moore * LSM modules. The flags field is used to specify which fields within the 18216efd454SPaul Moore * struct are valid and valid values can be created by bitwise OR'ing the 18316efd454SPaul Moore * NETLBL_SECATTR_* defines. The domain field is typically set by the LSM to 18416efd454SPaul Moore * specify domain specific configuration settings and is not usually used by 18516efd454SPaul Moore * NetLabel itself when returning security attributes to the LSM. 18616efd454SPaul Moore * 18716efd454SPaul Moore */ 18800447872SPaul Moore struct netlbl_lsm_secattr { 18900447872SPaul Moore u32 flags; 19000447872SPaul Moore /* bitmap values for 'flags' */ 191701a90baSPaul Moore #define NETLBL_SECATTR_NONE 0x00000000 192701a90baSPaul Moore #define NETLBL_SECATTR_DOMAIN 0x00000001 19300447872SPaul Moore #define NETLBL_SECATTR_DOMAIN_CPY (NETLBL_SECATTR_DOMAIN | \ 19400447872SPaul Moore NETLBL_SECATTR_FREE_DOMAIN) 195701a90baSPaul Moore #define NETLBL_SECATTR_CACHE 0x00000002 196701a90baSPaul Moore #define NETLBL_SECATTR_MLS_LVL 0x00000004 197701a90baSPaul Moore #define NETLBL_SECATTR_MLS_CAT 0x00000008 19816efd454SPaul Moore #define NETLBL_SECATTR_SECID 0x00000010 19900447872SPaul Moore /* bitmap meta-values for 'flags' */ 20000447872SPaul Moore #define NETLBL_SECATTR_FREE_DOMAIN 0x01000000 2019534f71cSPaul Moore #define NETLBL_SECATTR_CACHEABLE (NETLBL_SECATTR_MLS_LVL | \ 20216efd454SPaul Moore NETLBL_SECATTR_MLS_CAT | \ 20316efd454SPaul Moore NETLBL_SECATTR_SECID) 20416efd454SPaul Moore u32 type; 20511a03f78SPaul Moore char *domain; 206ffb733c6Spaul.moore@hp.com struct netlbl_lsm_cache *cache; 2078d75899dSPaul Moore struct { 20816efd454SPaul Moore struct { 20916efd454SPaul Moore struct netlbl_lsm_secattr_catmap *cat; 21016efd454SPaul Moore u32 lvl; 21116efd454SPaul Moore } mls; 21216efd454SPaul Moore u32 secid; 21316efd454SPaul Moore } attr; 21411a03f78SPaul Moore }; 21511a03f78SPaul Moore 21611a03f78SPaul Moore /* 21723bcdc1aSPaul Moore * LSM security attribute operations (inline) 21811a03f78SPaul Moore */ 21911a03f78SPaul Moore 22011a03f78SPaul Moore /** 221ffb733c6Spaul.moore@hp.com * netlbl_secattr_cache_alloc - Allocate and initialize a secattr cache 222ffb733c6Spaul.moore@hp.com * @flags: the memory allocation flags 223ffb733c6Spaul.moore@hp.com * 224ffb733c6Spaul.moore@hp.com * Description: 225ffb733c6Spaul.moore@hp.com * Allocate and initialize a netlbl_lsm_cache structure. Returns a pointer 226ffb733c6Spaul.moore@hp.com * on success, NULL on failure. 227ffb733c6Spaul.moore@hp.com * 228ffb733c6Spaul.moore@hp.com */ 229645408d1SAl Viro static inline struct netlbl_lsm_cache *netlbl_secattr_cache_alloc(gfp_t flags) 230ffb733c6Spaul.moore@hp.com { 231ffb733c6Spaul.moore@hp.com struct netlbl_lsm_cache *cache; 232ffb733c6Spaul.moore@hp.com 233ffb733c6Spaul.moore@hp.com cache = kzalloc(sizeof(*cache), flags); 234ffb733c6Spaul.moore@hp.com if (cache) 235ffb733c6Spaul.moore@hp.com atomic_set(&cache->refcount, 1); 236ffb733c6Spaul.moore@hp.com return cache; 237ffb733c6Spaul.moore@hp.com } 238ffb733c6Spaul.moore@hp.com 239ffb733c6Spaul.moore@hp.com /** 240ffb733c6Spaul.moore@hp.com * netlbl_secattr_cache_free - Frees a netlbl_lsm_cache struct 241ffb733c6Spaul.moore@hp.com * @cache: the struct to free 242ffb733c6Spaul.moore@hp.com * 243ffb733c6Spaul.moore@hp.com * Description: 244ffb733c6Spaul.moore@hp.com * Frees @secattr including all of the internal buffers. 245ffb733c6Spaul.moore@hp.com * 246ffb733c6Spaul.moore@hp.com */ 247ffb733c6Spaul.moore@hp.com static inline void netlbl_secattr_cache_free(struct netlbl_lsm_cache *cache) 248ffb733c6Spaul.moore@hp.com { 249ffb733c6Spaul.moore@hp.com if (!atomic_dec_and_test(&cache->refcount)) 250ffb733c6Spaul.moore@hp.com return; 251ffb733c6Spaul.moore@hp.com 252ffb733c6Spaul.moore@hp.com if (cache->free) 253ffb733c6Spaul.moore@hp.com cache->free(cache->data); 254ffb733c6Spaul.moore@hp.com kfree(cache); 255ffb733c6Spaul.moore@hp.com } 256ffb733c6Spaul.moore@hp.com 257ffb733c6Spaul.moore@hp.com /** 25802752760SPaul Moore * netlbl_secattr_catmap_alloc - Allocate a LSM secattr catmap 25902752760SPaul Moore * @flags: memory allocation flags 26002752760SPaul Moore * 26102752760SPaul Moore * Description: 26202752760SPaul Moore * Allocate memory for a LSM secattr catmap, returns a pointer on success, NULL 26302752760SPaul Moore * on failure. 26402752760SPaul Moore * 26502752760SPaul Moore */ 26602752760SPaul Moore static inline struct netlbl_lsm_secattr_catmap *netlbl_secattr_catmap_alloc( 26702752760SPaul Moore gfp_t flags) 26802752760SPaul Moore { 26902752760SPaul Moore return kzalloc(sizeof(struct netlbl_lsm_secattr_catmap), flags); 27002752760SPaul Moore } 27102752760SPaul Moore 27202752760SPaul Moore /** 27302752760SPaul Moore * netlbl_secattr_catmap_free - Free a LSM secattr catmap 27402752760SPaul Moore * @catmap: the category bitmap 27502752760SPaul Moore * 27602752760SPaul Moore * Description: 27702752760SPaul Moore * Free a LSM secattr catmap. 27802752760SPaul Moore * 27902752760SPaul Moore */ 28002752760SPaul Moore static inline void netlbl_secattr_catmap_free( 28102752760SPaul Moore struct netlbl_lsm_secattr_catmap *catmap) 28202752760SPaul Moore { 28302752760SPaul Moore struct netlbl_lsm_secattr_catmap *iter; 28402752760SPaul Moore 28502752760SPaul Moore do { 28602752760SPaul Moore iter = catmap; 28702752760SPaul Moore catmap = catmap->next; 28802752760SPaul Moore kfree(iter); 28902752760SPaul Moore } while (catmap); 29002752760SPaul Moore } 29102752760SPaul Moore 29202752760SPaul Moore /** 29311a03f78SPaul Moore * netlbl_secattr_init - Initialize a netlbl_lsm_secattr struct 29411a03f78SPaul Moore * @secattr: the struct to initialize 29511a03f78SPaul Moore * 29611a03f78SPaul Moore * Description: 297c6fa82a9SPaul Moore * Initialize an already allocated netlbl_lsm_secattr struct. 29811a03f78SPaul Moore * 29911a03f78SPaul Moore */ 300c6fa82a9SPaul Moore static inline void netlbl_secattr_init(struct netlbl_lsm_secattr *secattr) 30111a03f78SPaul Moore { 30216efd454SPaul Moore memset(secattr, 0, sizeof(*secattr)); 30311a03f78SPaul Moore } 30411a03f78SPaul Moore 30511a03f78SPaul Moore /** 30611a03f78SPaul Moore * netlbl_secattr_destroy - Clears a netlbl_lsm_secattr struct 30711a03f78SPaul Moore * @secattr: the struct to clear 30811a03f78SPaul Moore * 30911a03f78SPaul Moore * Description: 31011a03f78SPaul Moore * Destroys the @secattr struct, including freeing all of the internal buffers. 311ffb733c6Spaul.moore@hp.com * The struct must be reset with a call to netlbl_secattr_init() before reuse. 31211a03f78SPaul Moore * 31311a03f78SPaul Moore */ 314ffb733c6Spaul.moore@hp.com static inline void netlbl_secattr_destroy(struct netlbl_lsm_secattr *secattr) 31511a03f78SPaul Moore { 31600447872SPaul Moore if (secattr->flags & NETLBL_SECATTR_FREE_DOMAIN) 31711a03f78SPaul Moore kfree(secattr->domain); 31816efd454SPaul Moore if (secattr->flags & NETLBL_SECATTR_CACHE) 31916efd454SPaul Moore netlbl_secattr_cache_free(secattr->cache); 32016efd454SPaul Moore if (secattr->flags & NETLBL_SECATTR_MLS_CAT) 32116efd454SPaul Moore netlbl_secattr_catmap_free(secattr->attr.mls.cat); 32211a03f78SPaul Moore } 32311a03f78SPaul Moore 32411a03f78SPaul Moore /** 32511a03f78SPaul Moore * netlbl_secattr_alloc - Allocate and initialize a netlbl_lsm_secattr struct 32611a03f78SPaul Moore * @flags: the memory allocation flags 32711a03f78SPaul Moore * 32811a03f78SPaul Moore * Description: 32911a03f78SPaul Moore * Allocate and initialize a netlbl_lsm_secattr struct. Returns a valid 33011a03f78SPaul Moore * pointer on success, or NULL on failure. 33111a03f78SPaul Moore * 33211a03f78SPaul Moore */ 3331f758d93SPaul Moore static inline struct netlbl_lsm_secattr *netlbl_secattr_alloc(gfp_t flags) 33411a03f78SPaul Moore { 33511a03f78SPaul Moore return kzalloc(sizeof(struct netlbl_lsm_secattr), flags); 33611a03f78SPaul Moore } 33711a03f78SPaul Moore 33811a03f78SPaul Moore /** 33911a03f78SPaul Moore * netlbl_secattr_free - Frees a netlbl_lsm_secattr struct 34011a03f78SPaul Moore * @secattr: the struct to free 34111a03f78SPaul Moore * 34211a03f78SPaul Moore * Description: 343ffb733c6Spaul.moore@hp.com * Frees @secattr including all of the internal buffers. 34411a03f78SPaul Moore * 34511a03f78SPaul Moore */ 346ffb733c6Spaul.moore@hp.com static inline void netlbl_secattr_free(struct netlbl_lsm_secattr *secattr) 34711a03f78SPaul Moore { 348ffb733c6Spaul.moore@hp.com netlbl_secattr_destroy(secattr); 34911a03f78SPaul Moore kfree(secattr); 35011a03f78SPaul Moore } 35111a03f78SPaul Moore 35202752760SPaul Moore #ifdef CONFIG_NETLABEL 35323bcdc1aSPaul Moore /* 354eda61d32SPaul Moore * LSM configuration operations 355eda61d32SPaul Moore */ 356eda61d32SPaul Moore int netlbl_cfg_map_del(const char *domain, struct netlbl_audit *audit_info); 357eda61d32SPaul Moore int netlbl_cfg_unlbl_add_map(const char *domain, 358eda61d32SPaul Moore struct netlbl_audit *audit_info); 359eda61d32SPaul Moore int netlbl_cfg_cipsov4_add_map(struct cipso_v4_doi *doi_def, 360eda61d32SPaul Moore const char *domain, 361eda61d32SPaul Moore struct netlbl_audit *audit_info); 362eda61d32SPaul Moore 363eda61d32SPaul Moore /* 36423bcdc1aSPaul Moore * LSM security attribute operations 36523bcdc1aSPaul Moore */ 36602752760SPaul Moore int netlbl_secattr_catmap_walk(struct netlbl_lsm_secattr_catmap *catmap, 36702752760SPaul Moore u32 offset); 36802752760SPaul Moore int netlbl_secattr_catmap_walk_rng(struct netlbl_lsm_secattr_catmap *catmap, 36902752760SPaul Moore u32 offset); 37002752760SPaul Moore int netlbl_secattr_catmap_setbit(struct netlbl_lsm_secattr_catmap *catmap, 37102752760SPaul Moore u32 bit, 37202752760SPaul Moore gfp_t flags); 37302752760SPaul Moore int netlbl_secattr_catmap_setrng(struct netlbl_lsm_secattr_catmap *catmap, 37402752760SPaul Moore u32 start, 37502752760SPaul Moore u32 end, 37602752760SPaul Moore gfp_t flags); 37723bcdc1aSPaul Moore 37823bcdc1aSPaul Moore /* 37916efd454SPaul Moore * LSM protocol operations (NetLabel LSM/kernel API) 38023bcdc1aSPaul Moore */ 38123bcdc1aSPaul Moore int netlbl_enabled(void); 38223bcdc1aSPaul Moore int netlbl_sock_setattr(struct sock *sk, 38323bcdc1aSPaul Moore const struct netlbl_lsm_secattr *secattr); 384014ab19aSPaul Moore void netlbl_sock_delattr(struct sock *sk); 38523bcdc1aSPaul Moore int netlbl_sock_getattr(struct sock *sk, 38623bcdc1aSPaul Moore struct netlbl_lsm_secattr *secattr); 387014ab19aSPaul Moore int netlbl_conn_setattr(struct sock *sk, 388014ab19aSPaul Moore struct sockaddr *addr, 389014ab19aSPaul Moore const struct netlbl_lsm_secattr *secattr); 390948bf85cSPaul Moore int netlbl_skbuff_setattr(struct sk_buff *skb, 391948bf85cSPaul Moore u16 family, 392948bf85cSPaul Moore const struct netlbl_lsm_secattr *secattr); 39323bcdc1aSPaul Moore int netlbl_skbuff_getattr(const struct sk_buff *skb, 39475e22910SPaul Moore u16 family, 39523bcdc1aSPaul Moore struct netlbl_lsm_secattr *secattr); 396dfaebe98SPaul Moore void netlbl_skbuff_err(struct sk_buff *skb, int error, int gateway); 39723bcdc1aSPaul Moore 39823bcdc1aSPaul Moore /* 39923bcdc1aSPaul Moore * LSM label mapping cache operations 40023bcdc1aSPaul Moore */ 40123bcdc1aSPaul Moore void netlbl_cache_invalidate(void); 40223bcdc1aSPaul Moore int netlbl_cache_add(const struct sk_buff *skb, 40323bcdc1aSPaul Moore const struct netlbl_lsm_secattr *secattr); 40402752760SPaul Moore #else 405eda61d32SPaul Moore static inline int netlbl_cfg_map_del(const char *domain, 406eda61d32SPaul Moore struct netlbl_audit *audit_info) 407eda61d32SPaul Moore { 408eda61d32SPaul Moore return -ENOSYS; 409eda61d32SPaul Moore } 410eda61d32SPaul Moore static inline int netlbl_cfg_unlbl_add_map(const char *domain, 411eda61d32SPaul Moore struct netlbl_audit *audit_info) 412eda61d32SPaul Moore { 413eda61d32SPaul Moore return -ENOSYS; 414eda61d32SPaul Moore } 415eda61d32SPaul Moore static inline int netlbl_cfg_cipsov4_add_map(struct cipso_v4_doi *doi_def, 416eda61d32SPaul Moore const char *domain, 417eda61d32SPaul Moore struct netlbl_audit *audit_info) 418eda61d32SPaul Moore { 419eda61d32SPaul Moore return -ENOSYS; 420eda61d32SPaul Moore } 42102752760SPaul Moore static inline int netlbl_secattr_catmap_walk( 42202752760SPaul Moore struct netlbl_lsm_secattr_catmap *catmap, 42302752760SPaul Moore u32 offset) 42402752760SPaul Moore { 42502752760SPaul Moore return -ENOENT; 42602752760SPaul Moore } 42702752760SPaul Moore static inline int netlbl_secattr_catmap_walk_rng( 42802752760SPaul Moore struct netlbl_lsm_secattr_catmap *catmap, 42902752760SPaul Moore u32 offset) 43002752760SPaul Moore { 43102752760SPaul Moore return -ENOENT; 43202752760SPaul Moore } 43302752760SPaul Moore static inline int netlbl_secattr_catmap_setbit( 43402752760SPaul Moore struct netlbl_lsm_secattr_catmap *catmap, 43502752760SPaul Moore u32 bit, 43602752760SPaul Moore gfp_t flags) 43702752760SPaul Moore { 43802752760SPaul Moore return 0; 43902752760SPaul Moore } 44002752760SPaul Moore static inline int netlbl_secattr_catmap_setrng( 44102752760SPaul Moore struct netlbl_lsm_secattr_catmap *catmap, 44202752760SPaul Moore u32 start, 44302752760SPaul Moore u32 end, 44402752760SPaul Moore gfp_t flags) 44502752760SPaul Moore { 44602752760SPaul Moore return 0; 44702752760SPaul Moore } 44823bcdc1aSPaul Moore static inline int netlbl_enabled(void) 44923bcdc1aSPaul Moore { 45023bcdc1aSPaul Moore return 0; 45123bcdc1aSPaul Moore } 452ba6ff9f2SPaul Moore static inline int netlbl_sock_setattr(struct sock *sk, 45311a03f78SPaul Moore const struct netlbl_lsm_secattr *secattr) 45411a03f78SPaul Moore { 45511a03f78SPaul Moore return -ENOSYS; 45611a03f78SPaul Moore } 457014ab19aSPaul Moore static inline void netlbl_sock_delattr(struct sock *sk) 458014ab19aSPaul Moore { 459014ab19aSPaul Moore } 46014a72f53SPaul Moore static inline int netlbl_sock_getattr(struct sock *sk, 46114a72f53SPaul Moore struct netlbl_lsm_secattr *secattr) 46214a72f53SPaul Moore { 46314a72f53SPaul Moore return -ENOSYS; 46414a72f53SPaul Moore } 465014ab19aSPaul Moore static inline int netlbl_conn_setattr(struct sock *sk, 466014ab19aSPaul Moore struct sockaddr *addr, 467014ab19aSPaul Moore const struct netlbl_lsm_secattr *secattr) 468014ab19aSPaul Moore { 469014ab19aSPaul Moore return -ENOSYS; 470014ab19aSPaul Moore } 471948bf85cSPaul Moore static inline int netlbl_skbuff_setattr(struct sk_buff *skb, 472948bf85cSPaul Moore u16 family, 473948bf85cSPaul Moore const struct netlbl_lsm_secattr *secattr) 474948bf85cSPaul Moore { 475948bf85cSPaul Moore return -ENOSYS; 476948bf85cSPaul Moore } 47711a03f78SPaul Moore static inline int netlbl_skbuff_getattr(const struct sk_buff *skb, 47875e22910SPaul Moore u16 family, 47911a03f78SPaul Moore struct netlbl_lsm_secattr *secattr) 48011a03f78SPaul Moore { 48111a03f78SPaul Moore return -ENOSYS; 48211a03f78SPaul Moore } 483dfaebe98SPaul Moore static inline void netlbl_skbuff_err(struct sk_buff *skb, 484dfaebe98SPaul Moore int error, 485dfaebe98SPaul Moore int gateway) 48611a03f78SPaul Moore { 48711a03f78SPaul Moore return; 48811a03f78SPaul Moore } 48911a03f78SPaul Moore static inline void netlbl_cache_invalidate(void) 49011a03f78SPaul Moore { 49111a03f78SPaul Moore return; 49211a03f78SPaul Moore } 49311a03f78SPaul Moore static inline int netlbl_cache_add(const struct sk_buff *skb, 49411a03f78SPaul Moore const struct netlbl_lsm_secattr *secattr) 49511a03f78SPaul Moore { 49611a03f78SPaul Moore return 0; 49711a03f78SPaul Moore } 49811a03f78SPaul Moore #endif /* CONFIG_NETLABEL */ 49911a03f78SPaul Moore 50011a03f78SPaul Moore #endif /* _NETLABEL_H */ 501