aboutsummaryrefslogtreecommitdiffstats
path: root/net/ipv4/cipso_ipv4.c
diff options
context:
space:
mode:
authorPaul Moore <paul.moore@hp.com>2007-09-16 00:45:13 -0400
committerDavid S. Miller <davem@sunset.davemloft.net>2007-10-10 19:51:17 -0400
commit63d804eade298208037045ab6728c933f2b6c27d (patch)
tree570c9b4a19abea4f9a12907368b59a50a4a16913 /net/ipv4/cipso_ipv4.c
parent88d3aafdae5c5e1d2dd9489a5c8a24e29d335f2e (diff)
[CIPSO]: remove duplicated code in the cipso_v4_*_getattr() functions
The bulk of the CIPSO option parsing/processing in the cipso_v4_sock_getattr() and cipso_v4_skb_getattr() functions are identical, the only real difference being where the functions obtain the CIPSO option itself. This patch creates a new function, cipso_v4_getattr(), which contains the common CIPSO option parsing/processing code and modifies the existing functions to call this new helper function. Signed-off-by: Paul Moore <paul.moore@hp.com> Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/ipv4/cipso_ipv4.c')
-rw-r--r--net/ipv4/cipso_ipv4.c115
1 files changed, 42 insertions, 73 deletions
diff --git a/net/ipv4/cipso_ipv4.c b/net/ipv4/cipso_ipv4.c
index ab56a052ce31..805a78e6ed55 100644
--- a/net/ipv4/cipso_ipv4.c
+++ b/net/ipv4/cipso_ipv4.c
@@ -1831,68 +1831,75 @@ socket_setattr_failure:
1831} 1831}
1832 1832
1833/** 1833/**
1834 * cipso_v4_sock_getattr - Get the security attributes from a sock 1834 * cipso_v4_getattr - Helper function for the cipso_v4_*_getattr functions
1835 * @sk: the sock 1835 * @cipso: the CIPSO v4 option
1836 * @secattr: the security attributes 1836 * @secattr: the security attributes
1837 * 1837 *
1838 * Description: 1838 * Description:
1839 * Query @sk to see if there is a CIPSO option attached to the sock and if 1839 * Inspect @cipso and return the security attributes in @secattr. Returns zero
1840 * there is return the CIPSO security attributes in @secattr. This function 1840 * on success and negative values on failure.
1841 * requires that @sk be locked, or privately held, but it does not do any
1842 * locking itself. Returns zero on success and negative values on failure.
1843 * 1841 *
1844 */ 1842 */
1845int cipso_v4_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr) 1843static int cipso_v4_getattr(const unsigned char *cipso,
1844 struct netlbl_lsm_secattr *secattr)
1846{ 1845{
1847 int ret_val = -ENOMSG; 1846 int ret_val = -ENOMSG;
1848 struct inet_sock *sk_inet;
1849 unsigned char *cipso_ptr;
1850 u32 doi; 1847 u32 doi;
1851 struct cipso_v4_doi *doi_def; 1848 struct cipso_v4_doi *doi_def;
1852 1849
1853 sk_inet = inet_sk(sk); 1850 if (cipso_v4_cache_check(cipso, cipso[1], secattr) == 0)
1854 if (sk_inet->opt == NULL || sk_inet->opt->cipso == 0) 1851 return 0;
1855 return -ENOMSG;
1856 cipso_ptr = sk_inet->opt->__data + sk_inet->opt->cipso -
1857 sizeof(struct iphdr);
1858 ret_val = cipso_v4_cache_check(cipso_ptr, cipso_ptr[1], secattr);
1859 if (ret_val == 0)
1860 return ret_val;
1861 1852
1862 doi = ntohl(get_unaligned((__be32 *)&cipso_ptr[2])); 1853 doi = ntohl(get_unaligned((__be32 *)&cipso[2]));
1863 rcu_read_lock(); 1854 rcu_read_lock();
1864 doi_def = cipso_v4_doi_search(doi); 1855 doi_def = cipso_v4_doi_search(doi);
1865 if (doi_def == NULL) { 1856 if (doi_def == NULL)
1866 rcu_read_unlock(); 1857 goto getattr_return;
1867 return -ENOMSG;
1868 }
1869
1870 /* XXX - This code assumes only one tag per CIPSO option which isn't 1858 /* XXX - This code assumes only one tag per CIPSO option which isn't
1871 * really a good assumption to make but since we only support the MAC 1859 * really a good assumption to make but since we only support the MAC
1872 * tags right now it is a safe assumption. */ 1860 * tags right now it is a safe assumption. */
1873 switch (cipso_ptr[6]) { 1861 switch (cipso[6]) {
1874 case CIPSO_V4_TAG_RBITMAP: 1862 case CIPSO_V4_TAG_RBITMAP:
1875 ret_val = cipso_v4_parsetag_rbm(doi_def, 1863 ret_val = cipso_v4_parsetag_rbm(doi_def, &cipso[6], secattr);
1876 &cipso_ptr[6],
1877 secattr);
1878 break; 1864 break;
1879 case CIPSO_V4_TAG_ENUM: 1865 case CIPSO_V4_TAG_ENUM:
1880 ret_val = cipso_v4_parsetag_enum(doi_def, 1866 ret_val = cipso_v4_parsetag_enum(doi_def, &cipso[6], secattr);
1881 &cipso_ptr[6],
1882 secattr);
1883 break; 1867 break;
1884 case CIPSO_V4_TAG_RANGE: 1868 case CIPSO_V4_TAG_RANGE:
1885 ret_val = cipso_v4_parsetag_rng(doi_def, 1869 ret_val = cipso_v4_parsetag_rng(doi_def, &cipso[6], secattr);
1886 &cipso_ptr[6],
1887 secattr);
1888 break; 1870 break;
1889 } 1871 }
1890 rcu_read_unlock();
1891 1872
1873getattr_return:
1874 rcu_read_unlock();
1892 return ret_val; 1875 return ret_val;
1893} 1876}
1894 1877
1895/** 1878/**
1879 * cipso_v4_sock_getattr - Get the security attributes from a sock
1880 * @sk: the sock
1881 * @secattr: the security attributes
1882 *
1883 * Description:
1884 * Query @sk to see if there is a CIPSO option attached to the sock and if
1885 * there is return the CIPSO security attributes in @secattr. This function
1886 * requires that @sk be locked, or privately held, but it does not do any
1887 * locking itself. Returns zero on success and negative values on failure.
1888 *
1889 */
1890int cipso_v4_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
1891{
1892 struct ip_options *opt;
1893
1894 opt = inet_sk(sk)->opt;
1895 if (opt == NULL || opt->cipso == 0)
1896 return -ENOMSG;
1897
1898 return cipso_v4_getattr(opt->__data + opt->cipso - sizeof(struct iphdr),
1899 secattr);
1900}
1901
1902/**
1896 * cipso_v4_skbuff_getattr - Get the security attributes from the CIPSO option 1903 * cipso_v4_skbuff_getattr - Get the security attributes from the CIPSO option
1897 * @skb: the packet 1904 * @skb: the packet
1898 * @secattr: the security attributes 1905 * @secattr: the security attributes
@@ -1905,45 +1912,7 @@ int cipso_v4_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr)
1905int cipso_v4_skbuff_getattr(const struct sk_buff *skb, 1912int cipso_v4_skbuff_getattr(const struct sk_buff *skb,
1906 struct netlbl_lsm_secattr *secattr) 1913 struct netlbl_lsm_secattr *secattr)
1907{ 1914{
1908 int ret_val = -ENOMSG; 1915 return cipso_v4_getattr(CIPSO_V4_OPTPTR(skb), secattr);
1909 unsigned char *cipso_ptr;
1910 u32 doi;
1911 struct cipso_v4_doi *doi_def;
1912
1913 cipso_ptr = CIPSO_V4_OPTPTR(skb);
1914 if (cipso_v4_cache_check(cipso_ptr, cipso_ptr[1], secattr) == 0)
1915 return 0;
1916
1917 doi = ntohl(get_unaligned((__be32 *)&cipso_ptr[2]));
1918 rcu_read_lock();
1919 doi_def = cipso_v4_doi_search(doi);
1920 if (doi_def == NULL)
1921 goto skbuff_getattr_return;
1922
1923 /* XXX - This code assumes only one tag per CIPSO option which isn't
1924 * really a good assumption to make but since we only support the MAC
1925 * tags right now it is a safe assumption. */
1926 switch (cipso_ptr[6]) {
1927 case CIPSO_V4_TAG_RBITMAP:
1928 ret_val = cipso_v4_parsetag_rbm(doi_def,
1929 &cipso_ptr[6],
1930 secattr);
1931 break;
1932 case CIPSO_V4_TAG_ENUM:
1933 ret_val = cipso_v4_parsetag_enum(doi_def,
1934 &cipso_ptr[6],
1935 secattr);
1936 break;
1937 case CIPSO_V4_TAG_RANGE:
1938 ret_val = cipso_v4_parsetag_rng(doi_def,
1939 &cipso_ptr[6],
1940 secattr);
1941 break;
1942 }
1943
1944skbuff_getattr_return:
1945 rcu_read_unlock();
1946 return ret_val;
1947} 1916}
1948 1917
1949/* 1918/*