Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at 772920e594df25f2011ca49abd9c8b85c4820cdc 261 lines 7.6 kB view raw
1/* 2 * NetLabel System 3 * 4 * The NetLabel system manages static and dynamic label mappings for network 5 * protocols such as CIPSO and RIPSO. 6 * 7 * Author: Paul Moore <paul.moore@hp.com> 8 * 9 */ 10 11/* 12 * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 13 * 14 * This program is free software; you can redistribute it and/or modify 15 * it under the terms of the GNU General Public License as published by 16 * the Free Software Foundation; either version 2 of the License, or 17 * (at your option) any later version. 18 * 19 * This program is distributed in the hope that it will be useful, 20 * but WITHOUT ANY WARRANTY; without even the implied warranty of 21 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See 22 * the GNU General Public License for more details. 23 * 24 * You should have received a copy of the GNU General Public License 25 * along with this program; if not, write to the Free Software 26 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA 27 * 28 */ 29 30#ifndef _NETLABEL_H 31#define _NETLABEL_H 32 33#include <linux/types.h> 34#include <linux/net.h> 35#include <linux/skbuff.h> 36#include <net/netlink.h> 37 38/* 39 * NetLabel - A management interface for maintaining network packet label 40 * mapping tables for explicit packet labling protocols. 41 * 42 * Network protocols such as CIPSO and RIPSO require a label translation layer 43 * to convert the label on the packet into something meaningful on the host 44 * machine. In the current Linux implementation these mapping tables live 45 * inside the kernel; NetLabel provides a mechanism for user space applications 46 * to manage these mapping tables. 47 * 48 * NetLabel makes use of the Generic NETLINK mechanism as a transport layer to 49 * send messages between kernel and user space. The general format of a 50 * NetLabel message is shown below: 51 * 52 * +-----------------+-------------------+--------- --- -- - 53 * | struct nlmsghdr | struct genlmsghdr | payload 54 * +-----------------+-------------------+--------- --- -- - 55 * 56 * The 'nlmsghdr' and 'genlmsghdr' structs should be dealt with like normal. 57 * The payload is dependent on the subsystem specified in the 58 * 'nlmsghdr->nlmsg_type' and should be defined below, supporting functions 59 * should be defined in the corresponding net/netlabel/netlabel_<subsys>.h|c 60 * file. All of the fields in the NetLabel payload are NETLINK attributes, see 61 * the include/net/netlink.h file for more information on NETLINK attributes. 62 * 63 */ 64 65/* 66 * NetLabel NETLINK protocol 67 */ 68 69#define NETLBL_PROTO_VERSION 1 70 71/* NetLabel NETLINK types/families */ 72#define NETLBL_NLTYPE_NONE 0 73#define NETLBL_NLTYPE_MGMT 1 74#define NETLBL_NLTYPE_MGMT_NAME "NLBL_MGMT" 75#define NETLBL_NLTYPE_RIPSO 2 76#define NETLBL_NLTYPE_RIPSO_NAME "NLBL_RIPSO" 77#define NETLBL_NLTYPE_CIPSOV4 3 78#define NETLBL_NLTYPE_CIPSOV4_NAME "NLBL_CIPSOv4" 79#define NETLBL_NLTYPE_CIPSOV6 4 80#define NETLBL_NLTYPE_CIPSOV6_NAME "NLBL_CIPSOv6" 81#define NETLBL_NLTYPE_UNLABELED 5 82#define NETLBL_NLTYPE_UNLABELED_NAME "NLBL_UNLBL" 83 84/* 85 * NetLabel - Kernel API for accessing the network packet label mappings. 86 * 87 * The following functions are provided for use by other kernel modules, 88 * specifically kernel LSM modules, to provide a consistent, transparent API 89 * for dealing with explicit packet labeling protocols such as CIPSO and 90 * RIPSO. The functions defined here are implemented in the 91 * net/netlabel/netlabel_kapi.c file. 92 * 93 */ 94 95/* NetLabel audit information */ 96struct netlbl_audit { 97 u32 secid; 98 uid_t loginuid; 99}; 100 101/* Domain mapping definition struct */ 102struct netlbl_dom_map; 103 104/* Domain mapping operations */ 105int netlbl_domhsh_remove(const char *domain, struct netlbl_audit *audit_info); 106 107/* LSM security attributes */ 108struct netlbl_lsm_cache { 109 void (*free) (const void *data); 110 void *data; 111}; 112struct netlbl_lsm_secattr { 113 char *domain; 114 115 u32 mls_lvl; 116 u32 mls_lvl_vld; 117 unsigned char *mls_cat; 118 size_t mls_cat_len; 119 120 struct netlbl_lsm_cache cache; 121}; 122 123/* 124 * LSM security attribute operations 125 */ 126 127 128/** 129 * netlbl_secattr_init - Initialize a netlbl_lsm_secattr struct 130 * @secattr: the struct to initialize 131 * 132 * Description: 133 * Initialize an already allocated netlbl_lsm_secattr struct. Returns zero on 134 * success, negative values on error. 135 * 136 */ 137static inline int netlbl_secattr_init(struct netlbl_lsm_secattr *secattr) 138{ 139 memset(secattr, 0, sizeof(*secattr)); 140 return 0; 141} 142 143/** 144 * netlbl_secattr_destroy - Clears a netlbl_lsm_secattr struct 145 * @secattr: the struct to clear 146 * @clear_cache: cache clear flag 147 * 148 * Description: 149 * Destroys the @secattr struct, including freeing all of the internal buffers. 150 * If @clear_cache is true then free the cache fields, otherwise leave them 151 * intact. The struct must be reset with a call to netlbl_secattr_init() 152 * before reuse. 153 * 154 */ 155static inline void netlbl_secattr_destroy(struct netlbl_lsm_secattr *secattr, 156 u32 clear_cache) 157{ 158 if (clear_cache && secattr->cache.data != NULL && secattr->cache.free) 159 secattr->cache.free(secattr->cache.data); 160 kfree(secattr->domain); 161 kfree(secattr->mls_cat); 162} 163 164/** 165 * netlbl_secattr_alloc - Allocate and initialize a netlbl_lsm_secattr struct 166 * @flags: the memory allocation flags 167 * 168 * Description: 169 * Allocate and initialize a netlbl_lsm_secattr struct. Returns a valid 170 * pointer on success, or NULL on failure. 171 * 172 */ 173static inline struct netlbl_lsm_secattr *netlbl_secattr_alloc(int flags) 174{ 175 return kzalloc(sizeof(struct netlbl_lsm_secattr), flags); 176} 177 178/** 179 * netlbl_secattr_free - Frees a netlbl_lsm_secattr struct 180 * @secattr: the struct to free 181 * @clear_cache: cache clear flag 182 * 183 * Description: 184 * Frees @secattr including all of the internal buffers. If @clear_cache is 185 * true then free the cache fields, otherwise leave them intact. 186 * 187 */ 188static inline void netlbl_secattr_free(struct netlbl_lsm_secattr *secattr, 189 u32 clear_cache) 190{ 191 netlbl_secattr_destroy(secattr, clear_cache); 192 kfree(secattr); 193} 194 195/* 196 * LSM protocol operations 197 */ 198 199#ifdef CONFIG_NETLABEL 200int netlbl_socket_setattr(const struct socket *sock, 201 const struct netlbl_lsm_secattr *secattr); 202int netlbl_sock_getattr(struct sock *sk, 203 struct netlbl_lsm_secattr *secattr); 204int netlbl_socket_getattr(const struct socket *sock, 205 struct netlbl_lsm_secattr *secattr); 206int netlbl_skbuff_getattr(const struct sk_buff *skb, 207 struct netlbl_lsm_secattr *secattr); 208void netlbl_skbuff_err(struct sk_buff *skb, int error); 209#else 210static inline int netlbl_socket_setattr(const struct socket *sock, 211 const struct netlbl_lsm_secattr *secattr) 212{ 213 return -ENOSYS; 214} 215 216static inline int netlbl_sock_getattr(struct sock *sk, 217 struct netlbl_lsm_secattr *secattr) 218{ 219 return -ENOSYS; 220} 221 222static inline int netlbl_socket_getattr(const struct socket *sock, 223 struct netlbl_lsm_secattr *secattr) 224{ 225 return -ENOSYS; 226} 227 228static inline int netlbl_skbuff_getattr(const struct sk_buff *skb, 229 struct netlbl_lsm_secattr *secattr) 230{ 231 return -ENOSYS; 232} 233 234static inline void netlbl_skbuff_err(struct sk_buff *skb, int error) 235{ 236 return; 237} 238#endif /* CONFIG_NETLABEL */ 239 240/* 241 * LSM label mapping cache operations 242 */ 243 244#ifdef CONFIG_NETLABEL 245void netlbl_cache_invalidate(void); 246int netlbl_cache_add(const struct sk_buff *skb, 247 const struct netlbl_lsm_secattr *secattr); 248#else 249static inline void netlbl_cache_invalidate(void) 250{ 251 return; 252} 253 254static inline int netlbl_cache_add(const struct sk_buff *skb, 255 const struct netlbl_lsm_secattr *secattr) 256{ 257 return 0; 258} 259#endif /* CONFIG_NETLABEL */ 260 261#endif /* _NETLABEL_H */