treewide: Replace GPLv2 boilerplate/reference with SPDX - rule 13
[linux-2.6-block.git] / net / netlabel / netlabel_mgmt.c
CommitLineData
1ccea77e 1// SPDX-License-Identifier: GPL-2.0-or-later
d15c345f
PM
2/*
3 * NetLabel Management Support
4 *
5 * This file defines the management functions for the NetLabel system. The
6 * NetLabel system manages static and dynamic label mappings for network
7 * protocols such as CIPSO and RIPSO.
8 *
82c21bfa 9 * Author: Paul Moore <paul@paul-moore.com>
d15c345f
PM
10 */
11
12/*
63c41688 13 * (c) Copyright Hewlett-Packard Development Company, L.P., 2006, 2008
d15c345f
PM
14 */
15
16#include <linux/types.h>
17#include <linux/socket.h>
18#include <linux/string.h>
19#include <linux/skbuff.h>
63c41688
PM
20#include <linux/in.h>
21#include <linux/in6.h>
5a0e3ad6 22#include <linux/slab.h>
d15c345f
PM
23#include <net/sock.h>
24#include <net/netlink.h>
25#include <net/genetlink.h>
63c41688
PM
26#include <net/ip.h>
27#include <net/ipv6.h>
d15c345f
PM
28#include <net/netlabel.h>
29#include <net/cipso_ipv4.h>
dc7de73f 30#include <net/calipso.h>
60063497 31#include <linux/atomic.h>
d15c345f 32
dc7de73f 33#include "netlabel_calipso.h"
d15c345f
PM
34#include "netlabel_domainhash.h"
35#include "netlabel_user.h"
36#include "netlabel_mgmt.h"
37
c783f1ce
PM
38/* NetLabel configured protocol counter */
39atomic_t netlabel_mgmt_protocount = ATOMIC_INIT(0);
23bcdc1a 40
fd385855
PM
41/* Argument struct for netlbl_domhsh_walk() */
42struct netlbl_domhsh_walk_arg {
43 struct netlink_callback *nl_cb;
44 struct sk_buff *skb;
45 u32 seq;
46};
47
d15c345f 48/* NetLabel Generic NETLINK CIPSOv4 family */
489111e5 49static struct genl_family netlbl_mgmt_gnl_family;
d15c345f 50
fd385855 51/* NetLabel Netlink attribute policy */
ef7c79ed 52static const struct nla_policy netlbl_mgmt_genl_policy[NLBL_MGMT_A_MAX + 1] = {
fd385855
PM
53 [NLBL_MGMT_A_DOMAIN] = { .type = NLA_NUL_STRING },
54 [NLBL_MGMT_A_PROTOCOL] = { .type = NLA_U32 },
55 [NLBL_MGMT_A_VERSION] = { .type = NLA_U32 },
56 [NLBL_MGMT_A_CV4DOI] = { .type = NLA_U32 },
8f18e675 57 [NLBL_MGMT_A_FAMILY] = { .type = NLA_U16 },
dc7de73f 58 [NLBL_MGMT_A_CLPDOI] = { .type = NLA_U32 },
fd385855 59};
d15c345f
PM
60
61/*
63c41688 62 * Helper Functions
d15c345f
PM
63 */
64
65/**
66 * netlbl_mgmt_add - Handle an ADD message
d15c345f 67 * @info: the Generic NETLINK info block
63c41688 68 * @audit_info: NetLabel audit information
d15c345f
PM
69 *
70 * Description:
63c41688
PM
71 * Helper function for the ADD and ADDDEF messages to add the domain mappings
72 * from the message to the hash table. See netlabel.h for a description of the
73 * message format. Returns zero on success, negative values on failure.
d15c345f
PM
74 *
75 */
63c41688
PM
76static int netlbl_mgmt_add_common(struct genl_info *info,
77 struct netlbl_audit *audit_info)
d15c345f
PM
78{
79 int ret_val = -EINVAL;
63c41688
PM
80 struct netlbl_domaddr_map *addrmap = NULL;
81 struct cipso_v4_doi *cipsov4 = NULL;
dc7de73f
HD
82#if IS_ENABLED(CONFIG_IPV6)
83 struct calipso_doi *calipso = NULL;
84#endif
d15c345f 85 u32 tmp_val;
4de46d5e 86 struct netlbl_dom_map *entry = kzalloc(sizeof(*entry), GFP_KERNEL);
95d4e6be 87
4de46d5e
ME
88 if (!entry)
89 return -ENOMEM;
6a8b7f0c 90 entry->def.type = nla_get_u32(info->attrs[NLBL_MGMT_A_PROTOCOL]);
63c41688
PM
91 if (info->attrs[NLBL_MGMT_A_DOMAIN]) {
92 size_t tmp_size = nla_len(info->attrs[NLBL_MGMT_A_DOMAIN]);
93 entry->domain = kmalloc(tmp_size, GFP_KERNEL);
94 if (entry->domain == NULL) {
95 ret_val = -ENOMEM;
4de46d5e 96 goto add_free_entry;
63c41688
PM
97 }
98 nla_strlcpy(entry->domain,
99 info->attrs[NLBL_MGMT_A_DOMAIN], tmp_size);
100 }
101
6a8b7f0c 102 /* NOTE: internally we allow/use a entry->def.type value of
63c41688
PM
103 * NETLBL_NLTYPE_ADDRSELECT but we don't currently allow users
104 * to pass that as a protocol value because we need to know the
105 * "real" protocol */
d15c345f 106
6a8b7f0c 107 switch (entry->def.type) {
fd385855 108 case NETLBL_NLTYPE_UNLABELED:
8f18e675
HD
109 if (info->attrs[NLBL_MGMT_A_FAMILY])
110 entry->family =
111 nla_get_u16(info->attrs[NLBL_MGMT_A_FAMILY]);
112 else
113 entry->family = AF_UNSPEC;
fd385855
PM
114 break;
115 case NETLBL_NLTYPE_CIPSOV4:
116 if (!info->attrs[NLBL_MGMT_A_CV4DOI])
4de46d5e 117 goto add_free_domain;
d15c345f 118
fd385855 119 tmp_val = nla_get_u32(info->attrs[NLBL_MGMT_A_CV4DOI]);
63c41688
PM
120 cipsov4 = cipso_v4_doi_getdef(tmp_val);
121 if (cipsov4 == NULL)
4de46d5e 122 goto add_free_domain;
8f18e675 123 entry->family = AF_INET;
6a8b7f0c 124 entry->def.cipso = cipsov4;
fd385855 125 break;
dc7de73f
HD
126#if IS_ENABLED(CONFIG_IPV6)
127 case NETLBL_NLTYPE_CALIPSO:
128 if (!info->attrs[NLBL_MGMT_A_CLPDOI])
129 goto add_free_domain;
130
131 tmp_val = nla_get_u32(info->attrs[NLBL_MGMT_A_CLPDOI]);
132 calipso = calipso_doi_getdef(tmp_val);
133 if (calipso == NULL)
134 goto add_free_domain;
135 entry->family = AF_INET6;
136 entry->def.calipso = calipso;
137 break;
138#endif /* IPv6 */
fd385855 139 default:
4de46d5e 140 goto add_free_domain;
d15c345f 141 }
63c41688 142
8f18e675
HD
143 if ((entry->family == AF_INET && info->attrs[NLBL_MGMT_A_IPV6ADDR]) ||
144 (entry->family == AF_INET6 && info->attrs[NLBL_MGMT_A_IPV4ADDR]))
145 goto add_doi_put_def;
146
63c41688
PM
147 if (info->attrs[NLBL_MGMT_A_IPV4ADDR]) {
148 struct in_addr *addr;
149 struct in_addr *mask;
150 struct netlbl_domaddr4_map *map;
151
152 addrmap = kzalloc(sizeof(*addrmap), GFP_KERNEL);
153 if (addrmap == NULL) {
154 ret_val = -ENOMEM;
4de46d5e 155 goto add_doi_put_def;
63c41688
PM
156 }
157 INIT_LIST_HEAD(&addrmap->list4);
158 INIT_LIST_HEAD(&addrmap->list6);
159
160 if (nla_len(info->attrs[NLBL_MGMT_A_IPV4ADDR]) !=
161 sizeof(struct in_addr)) {
162 ret_val = -EINVAL;
4de46d5e 163 goto add_free_addrmap;
63c41688
PM
164 }
165 if (nla_len(info->attrs[NLBL_MGMT_A_IPV4MASK]) !=
166 sizeof(struct in_addr)) {
167 ret_val = -EINVAL;
4de46d5e 168 goto add_free_addrmap;
63c41688
PM
169 }
170 addr = nla_data(info->attrs[NLBL_MGMT_A_IPV4ADDR]);
171 mask = nla_data(info->attrs[NLBL_MGMT_A_IPV4MASK]);
172
173 map = kzalloc(sizeof(*map), GFP_KERNEL);
174 if (map == NULL) {
175 ret_val = -ENOMEM;
4de46d5e 176 goto add_free_addrmap;
63c41688
PM
177 }
178 map->list.addr = addr->s_addr & mask->s_addr;
179 map->list.mask = mask->s_addr;
180 map->list.valid = 1;
6a8b7f0c 181 map->def.type = entry->def.type;
63c41688 182 if (cipsov4)
6a8b7f0c 183 map->def.cipso = cipsov4;
63c41688
PM
184
185 ret_val = netlbl_af4list_add(&map->list, &addrmap->list4);
186 if (ret_val != 0) {
187 kfree(map);
4de46d5e 188 goto add_free_addrmap;
63c41688
PM
189 }
190
8f18e675 191 entry->family = AF_INET;
6a8b7f0c
PM
192 entry->def.type = NETLBL_NLTYPE_ADDRSELECT;
193 entry->def.addrsel = addrmap;
dfd56b8b 194#if IS_ENABLED(CONFIG_IPV6)
63c41688
PM
195 } else if (info->attrs[NLBL_MGMT_A_IPV6ADDR]) {
196 struct in6_addr *addr;
197 struct in6_addr *mask;
198 struct netlbl_domaddr6_map *map;
199
200 addrmap = kzalloc(sizeof(*addrmap), GFP_KERNEL);
201 if (addrmap == NULL) {
202 ret_val = -ENOMEM;
4de46d5e 203 goto add_doi_put_def;
63c41688
PM
204 }
205 INIT_LIST_HEAD(&addrmap->list4);
206 INIT_LIST_HEAD(&addrmap->list6);
207
208 if (nla_len(info->attrs[NLBL_MGMT_A_IPV6ADDR]) !=
209 sizeof(struct in6_addr)) {
210 ret_val = -EINVAL;
4de46d5e 211 goto add_free_addrmap;
63c41688
PM
212 }
213 if (nla_len(info->attrs[NLBL_MGMT_A_IPV6MASK]) !=
214 sizeof(struct in6_addr)) {
215 ret_val = -EINVAL;
4de46d5e 216 goto add_free_addrmap;
63c41688
PM
217 }
218 addr = nla_data(info->attrs[NLBL_MGMT_A_IPV6ADDR]);
219 mask = nla_data(info->attrs[NLBL_MGMT_A_IPV6MASK]);
220
221 map = kzalloc(sizeof(*map), GFP_KERNEL);
222 if (map == NULL) {
223 ret_val = -ENOMEM;
4de46d5e 224 goto add_free_addrmap;
63c41688 225 }
4e3fd7a0 226 map->list.addr = *addr;
63c41688
PM
227 map->list.addr.s6_addr32[0] &= mask->s6_addr32[0];
228 map->list.addr.s6_addr32[1] &= mask->s6_addr32[1];
229 map->list.addr.s6_addr32[2] &= mask->s6_addr32[2];
230 map->list.addr.s6_addr32[3] &= mask->s6_addr32[3];
4e3fd7a0 231 map->list.mask = *mask;
63c41688 232 map->list.valid = 1;
6a8b7f0c 233 map->def.type = entry->def.type;
dc7de73f
HD
234 if (calipso)
235 map->def.calipso = calipso;
63c41688
PM
236
237 ret_val = netlbl_af6list_add(&map->list, &addrmap->list6);
238 if (ret_val != 0) {
239 kfree(map);
4de46d5e 240 goto add_free_addrmap;
63c41688
PM
241 }
242
8f18e675 243 entry->family = AF_INET6;
6a8b7f0c
PM
244 entry->def.type = NETLBL_NLTYPE_ADDRSELECT;
245 entry->def.addrsel = addrmap;
63c41688
PM
246#endif /* IPv6 */
247 }
248
249 ret_val = netlbl_domhsh_add(entry, audit_info);
fd385855 250 if (ret_val != 0)
4de46d5e 251 goto add_free_addrmap;
d15c345f 252
d15c345f
PM
253 return 0;
254
4de46d5e 255add_free_addrmap:
63c41688 256 kfree(addrmap);
4de46d5e
ME
257add_doi_put_def:
258 cipso_v4_doi_putdef(cipsov4);
dc7de73f
HD
259#if IS_ENABLED(CONFIG_IPV6)
260 calipso_doi_putdef(calipso);
261#endif
4de46d5e
ME
262add_free_domain:
263 kfree(entry->domain);
264add_free_entry:
d15c345f 265 kfree(entry);
d15c345f
PM
266 return ret_val;
267}
268
63c41688
PM
269/**
270 * netlbl_mgmt_listentry - List a NetLabel/LSM domain map entry
271 * @skb: the NETLINK buffer
272 * @entry: the map entry
273 *
274 * Description:
275 * This function is a helper function used by the LISTALL and LISTDEF command
25985edc 276 * handlers. The caller is responsible for ensuring that the RCU read lock
63c41688
PM
277 * is held. Returns zero on success, negative values on failure.
278 *
279 */
280static int netlbl_mgmt_listentry(struct sk_buff *skb,
281 struct netlbl_dom_map *entry)
282{
f8a02479 283 int ret_val = 0;
63c41688
PM
284 struct nlattr *nla_a;
285 struct nlattr *nla_b;
286 struct netlbl_af4list *iter4;
dfd56b8b 287#if IS_ENABLED(CONFIG_IPV6)
63c41688
PM
288 struct netlbl_af6list *iter6;
289#endif
290
291 if (entry->domain != NULL) {
292 ret_val = nla_put_string(skb,
293 NLBL_MGMT_A_DOMAIN, entry->domain);
294 if (ret_val != 0)
295 return ret_val;
296 }
297
8f18e675
HD
298 ret_val = nla_put_u16(skb, NLBL_MGMT_A_FAMILY, entry->family);
299 if (ret_val != 0)
300 return ret_val;
301
6a8b7f0c 302 switch (entry->def.type) {
63c41688 303 case NETLBL_NLTYPE_ADDRSELECT:
ae0be8de 304 nla_a = nla_nest_start_noflag(skb, NLBL_MGMT_A_SELECTORLIST);
63c41688
PM
305 if (nla_a == NULL)
306 return -ENOMEM;
307
6a8b7f0c 308 netlbl_af4list_foreach_rcu(iter4, &entry->def.addrsel->list4) {
63c41688
PM
309 struct netlbl_domaddr4_map *map4;
310 struct in_addr addr_struct;
311
ae0be8de
MK
312 nla_b = nla_nest_start_noflag(skb,
313 NLBL_MGMT_A_ADDRSELECTOR);
63c41688
PM
314 if (nla_b == NULL)
315 return -ENOMEM;
316
317 addr_struct.s_addr = iter4->addr;
930345ea
JB
318 ret_val = nla_put_in_addr(skb, NLBL_MGMT_A_IPV4ADDR,
319 addr_struct.s_addr);
63c41688
PM
320 if (ret_val != 0)
321 return ret_val;
322 addr_struct.s_addr = iter4->mask;
930345ea
JB
323 ret_val = nla_put_in_addr(skb, NLBL_MGMT_A_IPV4MASK,
324 addr_struct.s_addr);
63c41688
PM
325 if (ret_val != 0)
326 return ret_val;
327 map4 = netlbl_domhsh_addr4_entry(iter4);
328 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
6a8b7f0c 329 map4->def.type);
63c41688
PM
330 if (ret_val != 0)
331 return ret_val;
6a8b7f0c 332 switch (map4->def.type) {
63c41688
PM
333 case NETLBL_NLTYPE_CIPSOV4:
334 ret_val = nla_put_u32(skb, NLBL_MGMT_A_CV4DOI,
6a8b7f0c 335 map4->def.cipso->doi);
63c41688
PM
336 if (ret_val != 0)
337 return ret_val;
338 break;
339 }
340
341 nla_nest_end(skb, nla_b);
342 }
dfd56b8b 343#if IS_ENABLED(CONFIG_IPV6)
6a8b7f0c 344 netlbl_af6list_foreach_rcu(iter6, &entry->def.addrsel->list6) {
63c41688
PM
345 struct netlbl_domaddr6_map *map6;
346
ae0be8de
MK
347 nla_b = nla_nest_start_noflag(skb,
348 NLBL_MGMT_A_ADDRSELECTOR);
63c41688
PM
349 if (nla_b == NULL)
350 return -ENOMEM;
351
930345ea
JB
352 ret_val = nla_put_in6_addr(skb, NLBL_MGMT_A_IPV6ADDR,
353 &iter6->addr);
63c41688
PM
354 if (ret_val != 0)
355 return ret_val;
930345ea
JB
356 ret_val = nla_put_in6_addr(skb, NLBL_MGMT_A_IPV6MASK,
357 &iter6->mask);
63c41688
PM
358 if (ret_val != 0)
359 return ret_val;
360 map6 = netlbl_domhsh_addr6_entry(iter6);
361 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
6a8b7f0c 362 map6->def.type);
63c41688
PM
363 if (ret_val != 0)
364 return ret_val;
365
dc7de73f
HD
366 switch (map6->def.type) {
367 case NETLBL_NLTYPE_CALIPSO:
368 ret_val = nla_put_u32(skb, NLBL_MGMT_A_CLPDOI,
369 map6->def.calipso->doi);
370 if (ret_val != 0)
371 return ret_val;
372 break;
373 }
374
63c41688
PM
375 nla_nest_end(skb, nla_b);
376 }
377#endif /* IPv6 */
378
379 nla_nest_end(skb, nla_a);
380 break;
381 case NETLBL_NLTYPE_UNLABELED:
dc7de73f
HD
382 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
383 entry->def.type);
63c41688
PM
384 break;
385 case NETLBL_NLTYPE_CIPSOV4:
dc7de73f
HD
386 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
387 entry->def.type);
63c41688
PM
388 if (ret_val != 0)
389 return ret_val;
390 ret_val = nla_put_u32(skb, NLBL_MGMT_A_CV4DOI,
6a8b7f0c 391 entry->def.cipso->doi);
63c41688 392 break;
dc7de73f
HD
393 case NETLBL_NLTYPE_CALIPSO:
394 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
395 entry->def.type);
396 if (ret_val != 0)
397 return ret_val;
398 ret_val = nla_put_u32(skb, NLBL_MGMT_A_CLPDOI,
399 entry->def.calipso->doi);
400 break;
63c41688
PM
401 }
402
403 return ret_val;
404}
405
406/*
407 * NetLabel Command Handlers
408 */
409
410/**
411 * netlbl_mgmt_add - Handle an ADD message
412 * @skb: the NETLINK buffer
413 * @info: the Generic NETLINK info block
414 *
415 * Description:
416 * Process a user generated ADD message and add the domains from the message
417 * to the hash table. See netlabel.h for a description of the message format.
418 * Returns zero on success, negative values on failure.
419 *
420 */
421static int netlbl_mgmt_add(struct sk_buff *skb, struct genl_info *info)
422{
423 struct netlbl_audit audit_info;
424
425 if ((!info->attrs[NLBL_MGMT_A_DOMAIN]) ||
426 (!info->attrs[NLBL_MGMT_A_PROTOCOL]) ||
427 (info->attrs[NLBL_MGMT_A_IPV4ADDR] &&
428 info->attrs[NLBL_MGMT_A_IPV6ADDR]) ||
429 (info->attrs[NLBL_MGMT_A_IPV4MASK] &&
430 info->attrs[NLBL_MGMT_A_IPV6MASK]) ||
431 ((info->attrs[NLBL_MGMT_A_IPV4ADDR] != NULL) ^
432 (info->attrs[NLBL_MGMT_A_IPV4MASK] != NULL)) ||
433 ((info->attrs[NLBL_MGMT_A_IPV6ADDR] != NULL) ^
434 (info->attrs[NLBL_MGMT_A_IPV6MASK] != NULL)))
435 return -EINVAL;
436
437 netlbl_netlink_auditinfo(skb, &audit_info);
438
439 return netlbl_mgmt_add_common(info, &audit_info);
440}
441
d15c345f
PM
442/**
443 * netlbl_mgmt_remove - Handle a REMOVE message
444 * @skb: the NETLINK buffer
445 * @info: the Generic NETLINK info block
446 *
447 * Description:
448 * Process a user generated REMOVE message and remove the specified domain
449 * mappings. Returns zero on success, negative values on failure.
450 *
451 */
452static int netlbl_mgmt_remove(struct sk_buff *skb, struct genl_info *info)
453{
fd385855 454 char *domain;
95d4e6be 455 struct netlbl_audit audit_info;
d15c345f 456
fd385855
PM
457 if (!info->attrs[NLBL_MGMT_A_DOMAIN])
458 return -EINVAL;
d15c345f 459
95d4e6be
PM
460 netlbl_netlink_auditinfo(skb, &audit_info);
461
fd385855 462 domain = nla_data(info->attrs[NLBL_MGMT_A_DOMAIN]);
8f18e675 463 return netlbl_domhsh_remove(domain, AF_UNSPEC, &audit_info);
fd385855
PM
464}
465
466/**
467 * netlbl_mgmt_listall_cb - netlbl_domhsh_walk() callback for LISTALL
468 * @entry: the domain mapping hash table entry
469 * @arg: the netlbl_domhsh_walk_arg structure
470 *
471 * Description:
472 * This function is designed to be used as a callback to the
473 * netlbl_domhsh_walk() function for use in generating a response for a LISTALL
474 * message. Returns the size of the message on success, negative values on
475 * failure.
476 *
477 */
478static int netlbl_mgmt_listall_cb(struct netlbl_dom_map *entry, void *arg)
479{
480 int ret_val = -ENOMEM;
481 struct netlbl_domhsh_walk_arg *cb_arg = arg;
482 void *data;
483
15e47304 484 data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).portid,
17c157c8
TG
485 cb_arg->seq, &netlbl_mgmt_gnl_family,
486 NLM_F_MULTI, NLBL_MGMT_C_LISTALL);
fd385855
PM
487 if (data == NULL)
488 goto listall_cb_failure;
489
63c41688 490 ret_val = netlbl_mgmt_listentry(cb_arg->skb, entry);
fd385855
PM
491 if (ret_val != 0)
492 goto listall_cb_failure;
d15c345f 493
fd385855 494 cb_arg->seq++;
053c095a
JB
495 genlmsg_end(cb_arg->skb, data);
496 return 0;
d15c345f 497
fd385855
PM
498listall_cb_failure:
499 genlmsg_cancel(cb_arg->skb, data);
d15c345f
PM
500 return ret_val;
501}
502
503/**
fd385855 504 * netlbl_mgmt_listall - Handle a LISTALL message
d15c345f 505 * @skb: the NETLINK buffer
fd385855 506 * @cb: the NETLINK callback
d15c345f
PM
507 *
508 * Description:
fd385855
PM
509 * Process a user generated LISTALL message and dumps the domain hash table in
510 * a form suitable for use in a kernel generated LISTALL message. Returns zero
511 * on success, negative values on failure.
d15c345f
PM
512 *
513 */
fd385855
PM
514static int netlbl_mgmt_listall(struct sk_buff *skb,
515 struct netlink_callback *cb)
d15c345f 516{
fd385855
PM
517 struct netlbl_domhsh_walk_arg cb_arg;
518 u32 skip_bkt = cb->args[0];
519 u32 skip_chain = cb->args[1];
520
521 cb_arg.nl_cb = cb;
522 cb_arg.skb = skb;
523 cb_arg.seq = cb->nlh->nlmsg_seq;
524
525 netlbl_domhsh_walk(&skip_bkt,
526 &skip_chain,
527 netlbl_mgmt_listall_cb,
528 &cb_arg);
529
530 cb->args[0] = skip_bkt;
531 cb->args[1] = skip_chain;
532 return skb->len;
d15c345f
PM
533}
534
535/**
536 * netlbl_mgmt_adddef - Handle an ADDDEF message
537 * @skb: the NETLINK buffer
538 * @info: the Generic NETLINK info block
539 *
540 * Description:
541 * Process a user generated ADDDEF message and respond accordingly. Returns
542 * zero on success, negative values on failure.
543 *
544 */
545static int netlbl_mgmt_adddef(struct sk_buff *skb, struct genl_info *info)
546{
95d4e6be 547 struct netlbl_audit audit_info;
d15c345f 548
63c41688
PM
549 if ((!info->attrs[NLBL_MGMT_A_PROTOCOL]) ||
550 (info->attrs[NLBL_MGMT_A_IPV4ADDR] &&
551 info->attrs[NLBL_MGMT_A_IPV6ADDR]) ||
552 (info->attrs[NLBL_MGMT_A_IPV4MASK] &&
553 info->attrs[NLBL_MGMT_A_IPV6MASK]) ||
554 ((info->attrs[NLBL_MGMT_A_IPV4ADDR] != NULL) ^
555 (info->attrs[NLBL_MGMT_A_IPV4MASK] != NULL)) ||
556 ((info->attrs[NLBL_MGMT_A_IPV6ADDR] != NULL) ^
557 (info->attrs[NLBL_MGMT_A_IPV6MASK] != NULL)))
558 return -EINVAL;
d15c345f 559
95d4e6be
PM
560 netlbl_netlink_auditinfo(skb, &audit_info);
561
63c41688 562 return netlbl_mgmt_add_common(info, &audit_info);
d15c345f
PM
563}
564
565/**
566 * netlbl_mgmt_removedef - Handle a REMOVEDEF message
567 * @skb: the NETLINK buffer
568 * @info: the Generic NETLINK info block
569 *
570 * Description:
571 * Process a user generated REMOVEDEF message and remove the default domain
572 * mapping. Returns zero on success, negative values on failure.
573 *
574 */
575static int netlbl_mgmt_removedef(struct sk_buff *skb, struct genl_info *info)
576{
95d4e6be
PM
577 struct netlbl_audit audit_info;
578
579 netlbl_netlink_auditinfo(skb, &audit_info);
580
8f18e675 581 return netlbl_domhsh_remove_default(AF_UNSPEC, &audit_info);
d15c345f
PM
582}
583
584/**
585 * netlbl_mgmt_listdef - Handle a LISTDEF message
586 * @skb: the NETLINK buffer
587 * @info: the Generic NETLINK info block
588 *
589 * Description:
590 * Process a user generated LISTDEF message and dumps the default domain
591 * mapping in a form suitable for use in a kernel generated LISTDEF message.
592 * Returns zero on success, negative values on failure.
593 *
594 */
595static int netlbl_mgmt_listdef(struct sk_buff *skb, struct genl_info *info)
596{
597 int ret_val = -ENOMEM;
fd385855
PM
598 struct sk_buff *ans_skb = NULL;
599 void *data;
600 struct netlbl_dom_map *entry;
8f18e675
HD
601 u16 family;
602
603 if (info->attrs[NLBL_MGMT_A_FAMILY])
604 family = nla_get_u16(info->attrs[NLBL_MGMT_A_FAMILY]);
605 else
606 family = AF_INET;
d15c345f 607
339bf98f 608 ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
d15c345f 609 if (ans_skb == NULL)
fd385855 610 return -ENOMEM;
17c157c8
TG
611 data = genlmsg_put_reply(ans_skb, info, &netlbl_mgmt_gnl_family,
612 0, NLBL_MGMT_C_LISTDEF);
fd385855 613 if (data == NULL)
d15c345f 614 goto listdef_failure;
d15c345f 615
fd385855 616 rcu_read_lock();
8f18e675 617 entry = netlbl_domhsh_getentry(NULL, family);
fd385855
PM
618 if (entry == NULL) {
619 ret_val = -ENOENT;
620 goto listdef_failure_lock;
621 }
63c41688 622 ret_val = netlbl_mgmt_listentry(ans_skb, entry);
fd385855 623 rcu_read_unlock();
63c41688
PM
624 if (ret_val != 0)
625 goto listdef_failure;
d15c345f 626
fd385855 627 genlmsg_end(ans_skb, data);
fe785bee 628 return genlmsg_reply(ans_skb, info);
d15c345f 629
fd385855
PM
630listdef_failure_lock:
631 rcu_read_unlock();
d15c345f 632listdef_failure:
fd385855 633 kfree_skb(ans_skb);
d15c345f
PM
634 return ret_val;
635}
636
637/**
fd385855
PM
638 * netlbl_mgmt_protocols_cb - Write an individual PROTOCOL message response
639 * @skb: the skb to write to
fd385855
PM
640 * @cb: the NETLINK callback
641 * @protocol: the NetLabel protocol to use in the message
d15c345f
PM
642 *
643 * Description:
fd385855
PM
644 * This function is to be used in conjunction with netlbl_mgmt_protocols() to
645 * answer a application's PROTOCOLS message. Returns the size of the message
646 * on success, negative values on failure.
d15c345f
PM
647 *
648 */
fd385855
PM
649static int netlbl_mgmt_protocols_cb(struct sk_buff *skb,
650 struct netlink_callback *cb,
651 u32 protocol)
d15c345f
PM
652{
653 int ret_val = -ENOMEM;
fd385855
PM
654 void *data;
655
15e47304 656 data = genlmsg_put(skb, NETLINK_CB(cb->skb).portid, cb->nlh->nlmsg_seq,
17c157c8
TG
657 &netlbl_mgmt_gnl_family, NLM_F_MULTI,
658 NLBL_MGMT_C_PROTOCOLS);
fd385855
PM
659 if (data == NULL)
660 goto protocols_cb_failure;
661
662 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL, protocol);
d15c345f 663 if (ret_val != 0)
fd385855 664 goto protocols_cb_failure;
d15c345f 665
053c095a
JB
666 genlmsg_end(skb, data);
667 return 0;
d15c345f 668
fd385855
PM
669protocols_cb_failure:
670 genlmsg_cancel(skb, data);
d15c345f
PM
671 return ret_val;
672}
673
fd385855
PM
674/**
675 * netlbl_mgmt_protocols - Handle a PROTOCOLS message
676 * @skb: the NETLINK buffer
677 * @cb: the NETLINK callback
678 *
679 * Description:
680 * Process a user generated PROTOCOLS message and respond accordingly.
681 *
682 */
683static int netlbl_mgmt_protocols(struct sk_buff *skb,
684 struct netlink_callback *cb)
685{
686 u32 protos_sent = cb->args[0];
687
688 if (protos_sent == 0) {
689 if (netlbl_mgmt_protocols_cb(skb,
690 cb,
691 NETLBL_NLTYPE_UNLABELED) < 0)
692 goto protocols_return;
693 protos_sent++;
694 }
695 if (protos_sent == 1) {
696 if (netlbl_mgmt_protocols_cb(skb,
697 cb,
698 NETLBL_NLTYPE_CIPSOV4) < 0)
699 goto protocols_return;
700 protos_sent++;
701 }
cb72d382
HD
702#if IS_ENABLED(CONFIG_IPV6)
703 if (protos_sent == 2) {
704 if (netlbl_mgmt_protocols_cb(skb,
705 cb,
706 NETLBL_NLTYPE_CALIPSO) < 0)
707 goto protocols_return;
708 protos_sent++;
709 }
710#endif
fd385855
PM
711
712protocols_return:
713 cb->args[0] = protos_sent;
714 return skb->len;
715}
716
d15c345f
PM
717/**
718 * netlbl_mgmt_version - Handle a VERSION message
719 * @skb: the NETLINK buffer
720 * @info: the Generic NETLINK info block
721 *
722 * Description:
723 * Process a user generated VERSION message and respond accordingly. Returns
724 * zero on success, negative values on failure.
725 *
726 */
727static int netlbl_mgmt_version(struct sk_buff *skb, struct genl_info *info)
728{
729 int ret_val = -ENOMEM;
730 struct sk_buff *ans_skb = NULL;
fd385855 731 void *data;
d15c345f 732
339bf98f 733 ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
d15c345f 734 if (ans_skb == NULL)
fd385855 735 return -ENOMEM;
17c157c8
TG
736 data = genlmsg_put_reply(ans_skb, info, &netlbl_mgmt_gnl_family,
737 0, NLBL_MGMT_C_VERSION);
fd385855 738 if (data == NULL)
d15c345f
PM
739 goto version_failure;
740
fd385855
PM
741 ret_val = nla_put_u32(ans_skb,
742 NLBL_MGMT_A_VERSION,
743 NETLBL_PROTO_VERSION);
d15c345f
PM
744 if (ret_val != 0)
745 goto version_failure;
746
fd385855 747 genlmsg_end(ans_skb, data);
fe785bee 748 return genlmsg_reply(ans_skb, info);
d15c345f
PM
749
750version_failure:
751 kfree_skb(ans_skb);
d15c345f
PM
752 return ret_val;
753}
754
755
756/*
757 * NetLabel Generic NETLINK Command Definitions
758 */
759
4534de83 760static const struct genl_ops netlbl_mgmt_genl_ops[] = {
227c43c3 761 {
d15c345f 762 .cmd = NLBL_MGMT_C_ADD,
ef6243ac 763 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
fd385855 764 .flags = GENL_ADMIN_PERM,
d15c345f
PM
765 .doit = netlbl_mgmt_add,
766 .dumpit = NULL,
227c43c3
PE
767 },
768 {
d15c345f 769 .cmd = NLBL_MGMT_C_REMOVE,
ef6243ac 770 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
fd385855 771 .flags = GENL_ADMIN_PERM,
d15c345f
PM
772 .doit = netlbl_mgmt_remove,
773 .dumpit = NULL,
227c43c3
PE
774 },
775 {
fd385855 776 .cmd = NLBL_MGMT_C_LISTALL,
ef6243ac 777 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
d15c345f 778 .flags = 0,
fd385855
PM
779 .doit = NULL,
780 .dumpit = netlbl_mgmt_listall,
227c43c3
PE
781 },
782 {
d15c345f 783 .cmd = NLBL_MGMT_C_ADDDEF,
ef6243ac 784 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
fd385855 785 .flags = GENL_ADMIN_PERM,
d15c345f
PM
786 .doit = netlbl_mgmt_adddef,
787 .dumpit = NULL,
227c43c3
PE
788 },
789 {
d15c345f 790 .cmd = NLBL_MGMT_C_REMOVEDEF,
ef6243ac 791 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
fd385855 792 .flags = GENL_ADMIN_PERM,
d15c345f
PM
793 .doit = netlbl_mgmt_removedef,
794 .dumpit = NULL,
227c43c3
PE
795 },
796 {
d15c345f 797 .cmd = NLBL_MGMT_C_LISTDEF,
ef6243ac 798 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
d15c345f
PM
799 .flags = 0,
800 .doit = netlbl_mgmt_listdef,
801 .dumpit = NULL,
227c43c3
PE
802 },
803 {
fd385855 804 .cmd = NLBL_MGMT_C_PROTOCOLS,
ef6243ac 805 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
d15c345f 806 .flags = 0,
fd385855
PM
807 .doit = NULL,
808 .dumpit = netlbl_mgmt_protocols,
227c43c3
PE
809 },
810 {
d15c345f 811 .cmd = NLBL_MGMT_C_VERSION,
ef6243ac 812 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
d15c345f
PM
813 .flags = 0,
814 .doit = netlbl_mgmt_version,
815 .dumpit = NULL,
227c43c3 816 },
d15c345f
PM
817};
818
56989f6d 819static struct genl_family netlbl_mgmt_gnl_family __ro_after_init = {
489111e5
JB
820 .hdrsize = 0,
821 .name = NETLBL_NLTYPE_MGMT_NAME,
822 .version = NETLBL_PROTO_VERSION,
823 .maxattr = NLBL_MGMT_A_MAX,
3b0f31f2 824 .policy = netlbl_mgmt_genl_policy,
489111e5
JB
825 .module = THIS_MODULE,
826 .ops = netlbl_mgmt_genl_ops,
827 .n_ops = ARRAY_SIZE(netlbl_mgmt_genl_ops),
828};
829
d15c345f
PM
830/*
831 * NetLabel Generic NETLINK Protocol Functions
832 */
833
834/**
835 * netlbl_mgmt_genl_init - Register the NetLabel management component
836 *
837 * Description:
838 * Register the NetLabel management component with the Generic NETLINK
839 * mechanism. Returns zero on success, negative values on failure.
840 *
841 */
05705e4e 842int __init netlbl_mgmt_genl_init(void)
d15c345f 843{
489111e5 844 return genl_register_family(&netlbl_mgmt_gnl_family);
d15c345f 845}