Commit | Line | Data |
---|---|---|
1ccea77e | 1 | // SPDX-License-Identifier: GPL-2.0-or-later |
96cb8e33 PM |
2 | /* |
3 | * NetLabel CIPSO/IPv4 Support | |
4 | * | |
5 | * This file defines the CIPSO/IPv4 functions for the NetLabel system. The | |
6 | * NetLabel system manages static and dynamic label mappings for network | |
7 | * protocols such as CIPSO and RIPSO. | |
8 | * | |
82c21bfa | 9 | * Author: Paul Moore <paul@paul-moore.com> |
96cb8e33 PM |
10 | */ |
11 | ||
12 | /* | |
13 | * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 | |
96cb8e33 PM |
14 | */ |
15 | ||
16 | #include <linux/types.h> | |
17 | #include <linux/socket.h> | |
18 | #include <linux/string.h> | |
19 | #include <linux/skbuff.h> | |
32f50cde | 20 | #include <linux/audit.h> |
5a0e3ad6 | 21 | #include <linux/slab.h> |
96cb8e33 PM |
22 | #include <net/sock.h> |
23 | #include <net/netlink.h> | |
24 | #include <net/genetlink.h> | |
25 | #include <net/netlabel.h> | |
26 | #include <net/cipso_ipv4.h> | |
60063497 | 27 | #include <linux/atomic.h> |
96cb8e33 PM |
28 | |
29 | #include "netlabel_user.h" | |
30 | #include "netlabel_cipso_v4.h" | |
23bcdc1a | 31 | #include "netlabel_mgmt.h" |
b1edeb10 | 32 | #include "netlabel_domainhash.h" |
96cb8e33 | 33 | |
fd385855 PM |
34 | /* Argument struct for cipso_v4_doi_walk() */ |
35 | struct netlbl_cipsov4_doiwalk_arg { | |
36 | struct netlink_callback *nl_cb; | |
37 | struct sk_buff *skb; | |
38 | u32 seq; | |
39 | }; | |
40 | ||
b1edeb10 PM |
41 | /* Argument struct for netlbl_domhsh_walk() */ |
42 | struct netlbl_domhsh_walk_arg { | |
43 | struct netlbl_audit *audit_info; | |
44 | u32 doi; | |
45 | }; | |
46 | ||
96cb8e33 | 47 | /* NetLabel Generic NETLINK CIPSOv4 family */ |
489111e5 | 48 | static struct genl_family netlbl_cipsov4_gnl_family; |
fd385855 | 49 | /* NetLabel Netlink attribute policy */ |
ef7c79ed | 50 | static const struct nla_policy netlbl_cipsov4_genl_policy[NLBL_CIPSOV4_A_MAX + 1] = { |
fd385855 PM |
51 | [NLBL_CIPSOV4_A_DOI] = { .type = NLA_U32 }, |
52 | [NLBL_CIPSOV4_A_MTYPE] = { .type = NLA_U32 }, | |
53 | [NLBL_CIPSOV4_A_TAG] = { .type = NLA_U8 }, | |
54 | [NLBL_CIPSOV4_A_TAGLST] = { .type = NLA_NESTED }, | |
55 | [NLBL_CIPSOV4_A_MLSLVLLOC] = { .type = NLA_U32 }, | |
56 | [NLBL_CIPSOV4_A_MLSLVLREM] = { .type = NLA_U32 }, | |
57 | [NLBL_CIPSOV4_A_MLSLVL] = { .type = NLA_NESTED }, | |
58 | [NLBL_CIPSOV4_A_MLSLVLLST] = { .type = NLA_NESTED }, | |
59 | [NLBL_CIPSOV4_A_MLSCATLOC] = { .type = NLA_U32 }, | |
60 | [NLBL_CIPSOV4_A_MLSCATREM] = { .type = NLA_U32 }, | |
61 | [NLBL_CIPSOV4_A_MLSCAT] = { .type = NLA_NESTED }, | |
62 | [NLBL_CIPSOV4_A_MLSCATLST] = { .type = NLA_NESTED }, | |
63 | }; | |
96cb8e33 PM |
64 | |
65 | /* | |
66 | * Helper Functions | |
67 | */ | |
68 | ||
fd385855 PM |
69 | /** |
70 | * netlbl_cipsov4_add_common - Parse the common sections of a ADD message | |
71 | * @info: the Generic NETLINK info block | |
72 | * @doi_def: the CIPSO V4 DOI definition | |
73 | * | |
74 | * Description: | |
75 | * Parse the common sections of a ADD message and fill in the related values | |
76 | * in @doi_def. Returns zero on success, negative values on failure. | |
77 | * | |
78 | */ | |
79 | static int netlbl_cipsov4_add_common(struct genl_info *info, | |
80 | struct cipso_v4_doi *doi_def) | |
81 | { | |
82 | struct nlattr *nla; | |
83 | int nla_rem; | |
84 | u32 iter = 0; | |
85 | ||
86 | doi_def->doi = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_DOI]); | |
87 | ||
8cb08174 JB |
88 | if (nla_validate_nested_deprecated(info->attrs[NLBL_CIPSOV4_A_TAGLST], |
89 | NLBL_CIPSOV4_A_MAX, | |
90 | netlbl_cipsov4_genl_policy, | |
91 | NULL) != 0) | |
fd385855 PM |
92 | return -EINVAL; |
93 | ||
94 | nla_for_each_nested(nla, info->attrs[NLBL_CIPSOV4_A_TAGLST], nla_rem) | |
8f4c1f9b | 95 | if (nla_type(nla) == NLBL_CIPSOV4_A_TAG) { |
2a2f11c2 | 96 | if (iter >= CIPSO_V4_TAG_MAXCNT) |
fd385855 PM |
97 | return -EINVAL; |
98 | doi_def->tags[iter++] = nla_get_u8(nla); | |
99 | } | |
2a2f11c2 PM |
100 | while (iter < CIPSO_V4_TAG_MAXCNT) |
101 | doi_def->tags[iter++] = CIPSO_V4_TAG_INVALID; | |
fd385855 PM |
102 | |
103 | return 0; | |
104 | } | |
96cb8e33 PM |
105 | |
106 | /* | |
107 | * NetLabel Command Handlers | |
108 | */ | |
109 | ||
110 | /** | |
111 | * netlbl_cipsov4_add_std - Adds a CIPSO V4 DOI definition | |
fd385855 | 112 | * @info: the Generic NETLINK info block |
6c2e8ac0 | 113 | * @audit_info: NetLabel audit information |
96cb8e33 PM |
114 | * |
115 | * Description: | |
15c45f7b PM |
116 | * Create a new CIPSO_V4_MAP_TRANS DOI definition based on the given ADD |
117 | * message and add it to the CIPSO V4 engine. Return zero on success and | |
118 | * non-zero on error. | |
96cb8e33 PM |
119 | * |
120 | */ | |
6c2e8ac0 PM |
121 | static int netlbl_cipsov4_add_std(struct genl_info *info, |
122 | struct netlbl_audit *audit_info) | |
96cb8e33 PM |
123 | { |
124 | int ret_val = -EINVAL; | |
96cb8e33 | 125 | struct cipso_v4_doi *doi_def = NULL; |
fd385855 PM |
126 | struct nlattr *nla_a; |
127 | struct nlattr *nla_b; | |
128 | int nla_a_rem; | |
129 | int nla_b_rem; | |
caff5b6a | 130 | u32 iter; |
96cb8e33 | 131 | |
32f50cde | 132 | if (!info->attrs[NLBL_CIPSOV4_A_TAGLST] || |
fd385855 PM |
133 | !info->attrs[NLBL_CIPSOV4_A_MLSLVLLST]) |
134 | return -EINVAL; | |
135 | ||
8cb08174 JB |
136 | if (nla_validate_nested_deprecated(info->attrs[NLBL_CIPSOV4_A_MLSLVLLST], |
137 | NLBL_CIPSOV4_A_MAX, | |
138 | netlbl_cipsov4_genl_policy, | |
139 | NULL) != 0) | |
fd385855 | 140 | return -EINVAL; |
96cb8e33 PM |
141 | |
142 | doi_def = kmalloc(sizeof(*doi_def), GFP_KERNEL); | |
fd385855 PM |
143 | if (doi_def == NULL) |
144 | return -ENOMEM; | |
96cb8e33 PM |
145 | doi_def->map.std = kzalloc(sizeof(*doi_def->map.std), GFP_KERNEL); |
146 | if (doi_def->map.std == NULL) { | |
e842cb60 | 147 | kfree(doi_def); |
148 | return -ENOMEM; | |
96cb8e33 | 149 | } |
15c45f7b | 150 | doi_def->type = CIPSO_V4_MAP_TRANS; |
96cb8e33 | 151 | |
fd385855 PM |
152 | ret_val = netlbl_cipsov4_add_common(info, doi_def); |
153 | if (ret_val != 0) | |
96cb8e33 | 154 | goto add_std_failure; |
1fd2a25b | 155 | ret_val = -EINVAL; |
96cb8e33 | 156 | |
fd385855 PM |
157 | nla_for_each_nested(nla_a, |
158 | info->attrs[NLBL_CIPSOV4_A_MLSLVLLST], | |
159 | nla_a_rem) | |
8f4c1f9b | 160 | if (nla_type(nla_a) == NLBL_CIPSOV4_A_MLSLVL) { |
8cb08174 JB |
161 | if (nla_validate_nested_deprecated(nla_a, |
162 | NLBL_CIPSOV4_A_MAX, | |
163 | netlbl_cipsov4_genl_policy, | |
164 | NULL) != 0) | |
fceb6435 | 165 | goto add_std_failure; |
fd385855 | 166 | nla_for_each_nested(nla_b, nla_a, nla_b_rem) |
8f4c1f9b | 167 | switch (nla_type(nla_b)) { |
fd385855 | 168 | case NLBL_CIPSOV4_A_MLSLVLLOC: |
1fd2a25b PM |
169 | if (nla_get_u32(nla_b) > |
170 | CIPSO_V4_MAX_LOC_LVLS) | |
171 | goto add_std_failure; | |
fd385855 PM |
172 | if (nla_get_u32(nla_b) >= |
173 | doi_def->map.std->lvl.local_size) | |
174 | doi_def->map.std->lvl.local_size = | |
175 | nla_get_u32(nla_b) + 1; | |
176 | break; | |
177 | case NLBL_CIPSOV4_A_MLSLVLREM: | |
1fd2a25b PM |
178 | if (nla_get_u32(nla_b) > |
179 | CIPSO_V4_MAX_REM_LVLS) | |
180 | goto add_std_failure; | |
fd385855 PM |
181 | if (nla_get_u32(nla_b) >= |
182 | doi_def->map.std->lvl.cipso_size) | |
183 | doi_def->map.std->lvl.cipso_size = | |
184 | nla_get_u32(nla_b) + 1; | |
185 | break; | |
186 | } | |
187 | } | |
96cb8e33 PM |
188 | doi_def->map.std->lvl.local = kcalloc(doi_def->map.std->lvl.local_size, |
189 | sizeof(u32), | |
8ca34a13 | 190 | GFP_KERNEL | __GFP_NOWARN); |
96cb8e33 PM |
191 | if (doi_def->map.std->lvl.local == NULL) { |
192 | ret_val = -ENOMEM; | |
193 | goto add_std_failure; | |
194 | } | |
96cb8e33 PM |
195 | doi_def->map.std->lvl.cipso = kcalloc(doi_def->map.std->lvl.cipso_size, |
196 | sizeof(u32), | |
8ca34a13 | 197 | GFP_KERNEL | __GFP_NOWARN); |
96cb8e33 PM |
198 | if (doi_def->map.std->lvl.cipso == NULL) { |
199 | ret_val = -ENOMEM; | |
200 | goto add_std_failure; | |
201 | } | |
caff5b6a PM |
202 | for (iter = 0; iter < doi_def->map.std->lvl.local_size; iter++) |
203 | doi_def->map.std->lvl.local[iter] = CIPSO_V4_INV_LVL; | |
204 | for (iter = 0; iter < doi_def->map.std->lvl.cipso_size; iter++) | |
205 | doi_def->map.std->lvl.cipso[iter] = CIPSO_V4_INV_LVL; | |
fd385855 PM |
206 | nla_for_each_nested(nla_a, |
207 | info->attrs[NLBL_CIPSOV4_A_MLSLVLLST], | |
208 | nla_a_rem) | |
8f4c1f9b | 209 | if (nla_type(nla_a) == NLBL_CIPSOV4_A_MLSLVL) { |
fd385855 PM |
210 | struct nlattr *lvl_loc; |
211 | struct nlattr *lvl_rem; | |
212 | ||
fd385855 PM |
213 | lvl_loc = nla_find_nested(nla_a, |
214 | NLBL_CIPSOV4_A_MLSLVLLOC); | |
215 | lvl_rem = nla_find_nested(nla_a, | |
216 | NLBL_CIPSOV4_A_MLSLVLREM); | |
217 | if (lvl_loc == NULL || lvl_rem == NULL) | |
218 | goto add_std_failure; | |
219 | doi_def->map.std->lvl.local[nla_get_u32(lvl_loc)] = | |
220 | nla_get_u32(lvl_rem); | |
221 | doi_def->map.std->lvl.cipso[nla_get_u32(lvl_rem)] = | |
222 | nla_get_u32(lvl_loc); | |
223 | } | |
96cb8e33 | 224 | |
fd385855 | 225 | if (info->attrs[NLBL_CIPSOV4_A_MLSCATLST]) { |
8cb08174 JB |
226 | if (nla_validate_nested_deprecated(info->attrs[NLBL_CIPSOV4_A_MLSCATLST], |
227 | NLBL_CIPSOV4_A_MAX, | |
228 | netlbl_cipsov4_genl_policy, | |
229 | NULL) != 0) | |
fd385855 PM |
230 | goto add_std_failure; |
231 | ||
232 | nla_for_each_nested(nla_a, | |
233 | info->attrs[NLBL_CIPSOV4_A_MLSCATLST], | |
234 | nla_a_rem) | |
8f4c1f9b | 235 | if (nla_type(nla_a) == NLBL_CIPSOV4_A_MLSCAT) { |
8cb08174 JB |
236 | if (nla_validate_nested_deprecated(nla_a, |
237 | NLBL_CIPSOV4_A_MAX, | |
238 | netlbl_cipsov4_genl_policy, | |
239 | NULL) != 0) | |
fd385855 PM |
240 | goto add_std_failure; |
241 | nla_for_each_nested(nla_b, nla_a, nla_b_rem) | |
8f4c1f9b | 242 | switch (nla_type(nla_b)) { |
fd385855 | 243 | case NLBL_CIPSOV4_A_MLSCATLOC: |
1fd2a25b PM |
244 | if (nla_get_u32(nla_b) > |
245 | CIPSO_V4_MAX_LOC_CATS) | |
246 | goto add_std_failure; | |
fd385855 PM |
247 | if (nla_get_u32(nla_b) >= |
248 | doi_def->map.std->cat.local_size) | |
249 | doi_def->map.std->cat.local_size = | |
250 | nla_get_u32(nla_b) + 1; | |
251 | break; | |
252 | case NLBL_CIPSOV4_A_MLSCATREM: | |
1fd2a25b PM |
253 | if (nla_get_u32(nla_b) > |
254 | CIPSO_V4_MAX_REM_CATS) | |
255 | goto add_std_failure; | |
fd385855 PM |
256 | if (nla_get_u32(nla_b) >= |
257 | doi_def->map.std->cat.cipso_size) | |
258 | doi_def->map.std->cat.cipso_size = | |
259 | nla_get_u32(nla_b) + 1; | |
260 | break; | |
261 | } | |
262 | } | |
fd385855 | 263 | doi_def->map.std->cat.local = kcalloc( |
e1a95265 | 264 | doi_def->map.std->cat.local_size, |
96cb8e33 | 265 | sizeof(u32), |
8ca34a13 | 266 | GFP_KERNEL | __GFP_NOWARN); |
fd385855 PM |
267 | if (doi_def->map.std->cat.local == NULL) { |
268 | ret_val = -ENOMEM; | |
269 | goto add_std_failure; | |
270 | } | |
271 | doi_def->map.std->cat.cipso = kcalloc( | |
e1a95265 | 272 | doi_def->map.std->cat.cipso_size, |
96cb8e33 | 273 | sizeof(u32), |
8ca34a13 | 274 | GFP_KERNEL | __GFP_NOWARN); |
fd385855 PM |
275 | if (doi_def->map.std->cat.cipso == NULL) { |
276 | ret_val = -ENOMEM; | |
96cb8e33 | 277 | goto add_std_failure; |
fd385855 | 278 | } |
caff5b6a PM |
279 | for (iter = 0; iter < doi_def->map.std->cat.local_size; iter++) |
280 | doi_def->map.std->cat.local[iter] = CIPSO_V4_INV_CAT; | |
281 | for (iter = 0; iter < doi_def->map.std->cat.cipso_size; iter++) | |
282 | doi_def->map.std->cat.cipso[iter] = CIPSO_V4_INV_CAT; | |
fd385855 PM |
283 | nla_for_each_nested(nla_a, |
284 | info->attrs[NLBL_CIPSOV4_A_MLSCATLST], | |
285 | nla_a_rem) | |
8f4c1f9b | 286 | if (nla_type(nla_a) == NLBL_CIPSOV4_A_MLSCAT) { |
fd385855 PM |
287 | struct nlattr *cat_loc; |
288 | struct nlattr *cat_rem; | |
289 | ||
290 | cat_loc = nla_find_nested(nla_a, | |
291 | NLBL_CIPSOV4_A_MLSCATLOC); | |
292 | cat_rem = nla_find_nested(nla_a, | |
293 | NLBL_CIPSOV4_A_MLSCATREM); | |
294 | if (cat_loc == NULL || cat_rem == NULL) | |
295 | goto add_std_failure; | |
296 | doi_def->map.std->cat.local[ | |
e1a95265 | 297 | nla_get_u32(cat_loc)] = |
fd385855 PM |
298 | nla_get_u32(cat_rem); |
299 | doi_def->map.std->cat.cipso[ | |
e1a95265 | 300 | nla_get_u32(cat_rem)] = |
fd385855 PM |
301 | nla_get_u32(cat_loc); |
302 | } | |
96cb8e33 PM |
303 | } |
304 | ||
6c2e8ac0 | 305 | ret_val = cipso_v4_doi_add(doi_def, audit_info); |
96cb8e33 PM |
306 | if (ret_val != 0) |
307 | goto add_std_failure; | |
308 | return 0; | |
309 | ||
310 | add_std_failure: | |
7a11b1d3 | 311 | cipso_v4_doi_free(doi_def); |
96cb8e33 PM |
312 | return ret_val; |
313 | } | |
314 | ||
315 | /** | |
316 | * netlbl_cipsov4_add_pass - Adds a CIPSO V4 DOI definition | |
fd385855 | 317 | * @info: the Generic NETLINK info block |
6c2e8ac0 | 318 | * @audit_info: NetLabel audit information |
96cb8e33 PM |
319 | * |
320 | * Description: | |
321 | * Create a new CIPSO_V4_MAP_PASS DOI definition based on the given ADD message | |
322 | * and add it to the CIPSO V4 engine. Return zero on success and non-zero on | |
323 | * error. | |
324 | * | |
325 | */ | |
6c2e8ac0 PM |
326 | static int netlbl_cipsov4_add_pass(struct genl_info *info, |
327 | struct netlbl_audit *audit_info) | |
96cb8e33 | 328 | { |
fd385855 | 329 | int ret_val; |
96cb8e33 | 330 | struct cipso_v4_doi *doi_def = NULL; |
96cb8e33 | 331 | |
32f50cde | 332 | if (!info->attrs[NLBL_CIPSOV4_A_TAGLST]) |
fd385855 | 333 | return -EINVAL; |
96cb8e33 PM |
334 | |
335 | doi_def = kmalloc(sizeof(*doi_def), GFP_KERNEL); | |
fd385855 PM |
336 | if (doi_def == NULL) |
337 | return -ENOMEM; | |
96cb8e33 PM |
338 | doi_def->type = CIPSO_V4_MAP_PASS; |
339 | ||
fd385855 PM |
340 | ret_val = netlbl_cipsov4_add_common(info, doi_def); |
341 | if (ret_val != 0) | |
342 | goto add_pass_failure; | |
96cb8e33 | 343 | |
6c2e8ac0 | 344 | ret_val = cipso_v4_doi_add(doi_def, audit_info); |
96cb8e33 PM |
345 | if (ret_val != 0) |
346 | goto add_pass_failure; | |
347 | return 0; | |
348 | ||
349 | add_pass_failure: | |
b1edeb10 | 350 | cipso_v4_doi_free(doi_def); |
96cb8e33 PM |
351 | return ret_val; |
352 | } | |
353 | ||
d91d4079 PM |
354 | /** |
355 | * netlbl_cipsov4_add_local - Adds a CIPSO V4 DOI definition | |
356 | * @info: the Generic NETLINK info block | |
6c2e8ac0 | 357 | * @audit_info: NetLabel audit information |
d91d4079 PM |
358 | * |
359 | * Description: | |
360 | * Create a new CIPSO_V4_MAP_LOCAL DOI definition based on the given ADD | |
361 | * message and add it to the CIPSO V4 engine. Return zero on success and | |
362 | * non-zero on error. | |
363 | * | |
364 | */ | |
6c2e8ac0 PM |
365 | static int netlbl_cipsov4_add_local(struct genl_info *info, |
366 | struct netlbl_audit *audit_info) | |
d91d4079 PM |
367 | { |
368 | int ret_val; | |
369 | struct cipso_v4_doi *doi_def = NULL; | |
370 | ||
371 | if (!info->attrs[NLBL_CIPSOV4_A_TAGLST]) | |
372 | return -EINVAL; | |
373 | ||
374 | doi_def = kmalloc(sizeof(*doi_def), GFP_KERNEL); | |
375 | if (doi_def == NULL) | |
376 | return -ENOMEM; | |
377 | doi_def->type = CIPSO_V4_MAP_LOCAL; | |
378 | ||
379 | ret_val = netlbl_cipsov4_add_common(info, doi_def); | |
380 | if (ret_val != 0) | |
381 | goto add_local_failure; | |
382 | ||
6c2e8ac0 | 383 | ret_val = cipso_v4_doi_add(doi_def, audit_info); |
d91d4079 PM |
384 | if (ret_val != 0) |
385 | goto add_local_failure; | |
386 | return 0; | |
387 | ||
388 | add_local_failure: | |
389 | cipso_v4_doi_free(doi_def); | |
390 | return ret_val; | |
391 | } | |
392 | ||
96cb8e33 PM |
393 | /** |
394 | * netlbl_cipsov4_add - Handle an ADD message | |
395 | * @skb: the NETLINK buffer | |
396 | * @info: the Generic NETLINK info block | |
397 | * | |
398 | * Description: | |
399 | * Create a new DOI definition based on the given ADD message and add it to the | |
400 | * CIPSO V4 engine. Returns zero on success, negative values on failure. | |
401 | * | |
402 | */ | |
403 | static int netlbl_cipsov4_add(struct sk_buff *skb, struct genl_info *info) | |
404 | ||
405 | { | |
406 | int ret_val = -EINVAL; | |
95d4e6be | 407 | struct netlbl_audit audit_info; |
96cb8e33 | 408 | |
32f50cde PM |
409 | if (!info->attrs[NLBL_CIPSOV4_A_DOI] || |
410 | !info->attrs[NLBL_CIPSOV4_A_MTYPE]) | |
fd385855 | 411 | return -EINVAL; |
96cb8e33 | 412 | |
f7e0318a | 413 | netlbl_netlink_auditinfo(&audit_info); |
6c2e8ac0 | 414 | switch (nla_get_u32(info->attrs[NLBL_CIPSOV4_A_MTYPE])) { |
15c45f7b | 415 | case CIPSO_V4_MAP_TRANS: |
6c2e8ac0 | 416 | ret_val = netlbl_cipsov4_add_std(info, &audit_info); |
96cb8e33 PM |
417 | break; |
418 | case CIPSO_V4_MAP_PASS: | |
6c2e8ac0 | 419 | ret_val = netlbl_cipsov4_add_pass(info, &audit_info); |
96cb8e33 | 420 | break; |
d91d4079 | 421 | case CIPSO_V4_MAP_LOCAL: |
6c2e8ac0 | 422 | ret_val = netlbl_cipsov4_add_local(info, &audit_info); |
d91d4079 | 423 | break; |
96cb8e33 | 424 | } |
23bcdc1a | 425 | if (ret_val == 0) |
c783f1ce | 426 | atomic_inc(&netlabel_mgmt_protocount); |
96cb8e33 | 427 | |
96cb8e33 PM |
428 | return ret_val; |
429 | } | |
430 | ||
431 | /** | |
432 | * netlbl_cipsov4_list - Handle a LIST message | |
433 | * @skb: the NETLINK buffer | |
434 | * @info: the Generic NETLINK info block | |
435 | * | |
436 | * Description: | |
fd385855 PM |
437 | * Process a user generated LIST message and respond accordingly. While the |
438 | * response message generated by the kernel is straightforward, determining | |
439 | * before hand the size of the buffer to allocate is not (we have to generate | |
440 | * the message to know the size). In order to keep this function sane what we | |
441 | * do is allocate a buffer of NLMSG_GOODSIZE and try to fit the response in | |
442 | * that size, if we fail then we restart with a larger buffer and try again. | |
443 | * We continue in this manner until we hit a limit of failed attempts then we | |
444 | * give up and just send an error message. Returns zero on success and | |
445 | * negative values on error. | |
96cb8e33 PM |
446 | * |
447 | */ | |
448 | static int netlbl_cipsov4_list(struct sk_buff *skb, struct genl_info *info) | |
449 | { | |
fd385855 PM |
450 | int ret_val; |
451 | struct sk_buff *ans_skb = NULL; | |
452 | u32 nlsze_mult = 1; | |
453 | void *data; | |
96cb8e33 | 454 | u32 doi; |
fd385855 PM |
455 | struct nlattr *nla_a; |
456 | struct nlattr *nla_b; | |
457 | struct cipso_v4_doi *doi_def; | |
458 | u32 iter; | |
96cb8e33 | 459 | |
fd385855 PM |
460 | if (!info->attrs[NLBL_CIPSOV4_A_DOI]) { |
461 | ret_val = -EINVAL; | |
96cb8e33 | 462 | goto list_failure; |
fd385855 | 463 | } |
96cb8e33 | 464 | |
fd385855 | 465 | list_start: |
339bf98f | 466 | ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE * nlsze_mult, GFP_KERNEL); |
96cb8e33 PM |
467 | if (ans_skb == NULL) { |
468 | ret_val = -ENOMEM; | |
469 | goto list_failure; | |
470 | } | |
17c157c8 TG |
471 | data = genlmsg_put_reply(ans_skb, info, &netlbl_cipsov4_gnl_family, |
472 | 0, NLBL_CIPSOV4_C_LIST); | |
fd385855 PM |
473 | if (data == NULL) { |
474 | ret_val = -ENOMEM; | |
475 | goto list_failure; | |
476 | } | |
477 | ||
478 | doi = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_DOI]); | |
479 | ||
480 | rcu_read_lock(); | |
481 | doi_def = cipso_v4_doi_getdef(doi); | |
482 | if (doi_def == NULL) { | |
483 | ret_val = -EINVAL; | |
56196701 | 484 | goto list_failure_lock; |
fd385855 PM |
485 | } |
486 | ||
487 | ret_val = nla_put_u32(ans_skb, NLBL_CIPSOV4_A_MTYPE, doi_def->type); | |
488 | if (ret_val != 0) | |
489 | goto list_failure_lock; | |
490 | ||
ae0be8de | 491 | nla_a = nla_nest_start_noflag(ans_skb, NLBL_CIPSOV4_A_TAGLST); |
fd385855 PM |
492 | if (nla_a == NULL) { |
493 | ret_val = -ENOMEM; | |
494 | goto list_failure_lock; | |
495 | } | |
496 | for (iter = 0; | |
497 | iter < CIPSO_V4_TAG_MAXCNT && | |
498 | doi_def->tags[iter] != CIPSO_V4_TAG_INVALID; | |
499 | iter++) { | |
500 | ret_val = nla_put_u8(ans_skb, | |
501 | NLBL_CIPSOV4_A_TAG, | |
502 | doi_def->tags[iter]); | |
503 | if (ret_val != 0) | |
504 | goto list_failure_lock; | |
505 | } | |
506 | nla_nest_end(ans_skb, nla_a); | |
507 | ||
508 | switch (doi_def->type) { | |
15c45f7b | 509 | case CIPSO_V4_MAP_TRANS: |
ae0be8de MK |
510 | nla_a = nla_nest_start_noflag(ans_skb, |
511 | NLBL_CIPSOV4_A_MLSLVLLST); | |
fd385855 PM |
512 | if (nla_a == NULL) { |
513 | ret_val = -ENOMEM; | |
514 | goto list_failure_lock; | |
515 | } | |
516 | for (iter = 0; | |
517 | iter < doi_def->map.std->lvl.local_size; | |
518 | iter++) { | |
519 | if (doi_def->map.std->lvl.local[iter] == | |
520 | CIPSO_V4_INV_LVL) | |
521 | continue; | |
522 | ||
ae0be8de MK |
523 | nla_b = nla_nest_start_noflag(ans_skb, |
524 | NLBL_CIPSOV4_A_MLSLVL); | |
fd385855 PM |
525 | if (nla_b == NULL) { |
526 | ret_val = -ENOMEM; | |
527 | goto list_retry; | |
528 | } | |
529 | ret_val = nla_put_u32(ans_skb, | |
530 | NLBL_CIPSOV4_A_MLSLVLLOC, | |
531 | iter); | |
532 | if (ret_val != 0) | |
533 | goto list_retry; | |
534 | ret_val = nla_put_u32(ans_skb, | |
535 | NLBL_CIPSOV4_A_MLSLVLREM, | |
536 | doi_def->map.std->lvl.local[iter]); | |
537 | if (ret_val != 0) | |
538 | goto list_retry; | |
539 | nla_nest_end(ans_skb, nla_b); | |
540 | } | |
541 | nla_nest_end(ans_skb, nla_a); | |
542 | ||
ae0be8de MK |
543 | nla_a = nla_nest_start_noflag(ans_skb, |
544 | NLBL_CIPSOV4_A_MLSCATLST); | |
fd385855 PM |
545 | if (nla_a == NULL) { |
546 | ret_val = -ENOMEM; | |
547 | goto list_retry; | |
548 | } | |
549 | for (iter = 0; | |
550 | iter < doi_def->map.std->cat.local_size; | |
551 | iter++) { | |
552 | if (doi_def->map.std->cat.local[iter] == | |
553 | CIPSO_V4_INV_CAT) | |
554 | continue; | |
555 | ||
ae0be8de MK |
556 | nla_b = nla_nest_start_noflag(ans_skb, |
557 | NLBL_CIPSOV4_A_MLSCAT); | |
fd385855 PM |
558 | if (nla_b == NULL) { |
559 | ret_val = -ENOMEM; | |
560 | goto list_retry; | |
561 | } | |
562 | ret_val = nla_put_u32(ans_skb, | |
563 | NLBL_CIPSOV4_A_MLSCATLOC, | |
564 | iter); | |
565 | if (ret_val != 0) | |
566 | goto list_retry; | |
567 | ret_val = nla_put_u32(ans_skb, | |
568 | NLBL_CIPSOV4_A_MLSCATREM, | |
569 | doi_def->map.std->cat.local[iter]); | |
570 | if (ret_val != 0) | |
571 | goto list_retry; | |
572 | nla_nest_end(ans_skb, nla_b); | |
573 | } | |
574 | nla_nest_end(ans_skb, nla_a); | |
575 | ||
576 | break; | |
577 | } | |
ad5d07f4 | 578 | cipso_v4_doi_putdef(doi_def); |
fd385855 | 579 | rcu_read_unlock(); |
96cb8e33 | 580 | |
fd385855 | 581 | genlmsg_end(ans_skb, data); |
fe785bee | 582 | return genlmsg_reply(ans_skb, info); |
96cb8e33 | 583 | |
fd385855 PM |
584 | list_retry: |
585 | /* XXX - this limit is a guesstimate */ | |
586 | if (nlsze_mult < 4) { | |
ad5d07f4 | 587 | cipso_v4_doi_putdef(doi_def); |
fd385855 PM |
588 | rcu_read_unlock(); |
589 | kfree_skb(ans_skb); | |
83aa2e96 | 590 | nlsze_mult *= 2; |
fd385855 PM |
591 | goto list_start; |
592 | } | |
593 | list_failure_lock: | |
ad5d07f4 | 594 | cipso_v4_doi_putdef(doi_def); |
fd385855 | 595 | rcu_read_unlock(); |
96cb8e33 | 596 | list_failure: |
fd385855 PM |
597 | kfree_skb(ans_skb); |
598 | return ret_val; | |
599 | } | |
600 | ||
601 | /** | |
602 | * netlbl_cipsov4_listall_cb - cipso_v4_doi_walk() callback for LISTALL | |
603 | * @doi_def: the CIPSOv4 DOI definition | |
604 | * @arg: the netlbl_cipsov4_doiwalk_arg structure | |
605 | * | |
606 | * Description: | |
607 | * This function is designed to be used as a callback to the | |
608 | * cipso_v4_doi_walk() function for use in generating a response for a LISTALL | |
609 | * message. Returns the size of the message on success, negative values on | |
610 | * failure. | |
611 | * | |
612 | */ | |
613 | static int netlbl_cipsov4_listall_cb(struct cipso_v4_doi *doi_def, void *arg) | |
614 | { | |
615 | int ret_val = -ENOMEM; | |
616 | struct netlbl_cipsov4_doiwalk_arg *cb_arg = arg; | |
617 | void *data; | |
618 | ||
15e47304 | 619 | data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).portid, |
17c157c8 TG |
620 | cb_arg->seq, &netlbl_cipsov4_gnl_family, |
621 | NLM_F_MULTI, NLBL_CIPSOV4_C_LISTALL); | |
fd385855 PM |
622 | if (data == NULL) |
623 | goto listall_cb_failure; | |
624 | ||
625 | ret_val = nla_put_u32(cb_arg->skb, NLBL_CIPSOV4_A_DOI, doi_def->doi); | |
626 | if (ret_val != 0) | |
627 | goto listall_cb_failure; | |
628 | ret_val = nla_put_u32(cb_arg->skb, | |
629 | NLBL_CIPSOV4_A_MTYPE, | |
630 | doi_def->type); | |
631 | if (ret_val != 0) | |
632 | goto listall_cb_failure; | |
633 | ||
053c095a JB |
634 | genlmsg_end(cb_arg->skb, data); |
635 | return 0; | |
fd385855 PM |
636 | |
637 | listall_cb_failure: | |
638 | genlmsg_cancel(cb_arg->skb, data); | |
96cb8e33 PM |
639 | return ret_val; |
640 | } | |
641 | ||
642 | /** | |
643 | * netlbl_cipsov4_listall - Handle a LISTALL message | |
644 | * @skb: the NETLINK buffer | |
fd385855 | 645 | * @cb: the NETLINK callback |
96cb8e33 PM |
646 | * |
647 | * Description: | |
648 | * Process a user generated LISTALL message and respond accordingly. Returns | |
649 | * zero on success and negative values on error. | |
650 | * | |
651 | */ | |
fd385855 PM |
652 | static int netlbl_cipsov4_listall(struct sk_buff *skb, |
653 | struct netlink_callback *cb) | |
96cb8e33 | 654 | { |
fd385855 | 655 | struct netlbl_cipsov4_doiwalk_arg cb_arg; |
56196701 | 656 | u32 doi_skip = cb->args[0]; |
96cb8e33 | 657 | |
fd385855 PM |
658 | cb_arg.nl_cb = cb; |
659 | cb_arg.skb = skb; | |
660 | cb_arg.seq = cb->nlh->nlmsg_seq; | |
96cb8e33 | 661 | |
fd385855 | 662 | cipso_v4_doi_walk(&doi_skip, netlbl_cipsov4_listall_cb, &cb_arg); |
96cb8e33 | 663 | |
fd385855 PM |
664 | cb->args[0] = doi_skip; |
665 | return skb->len; | |
96cb8e33 PM |
666 | } |
667 | ||
b1edeb10 PM |
668 | /** |
669 | * netlbl_cipsov4_remove_cb - netlbl_cipsov4_remove() callback for REMOVE | |
670 | * @entry: LSM domain mapping entry | |
671 | * @arg: the netlbl_domhsh_walk_arg structure | |
672 | * | |
673 | * Description: | |
674 | * This function is intended for use by netlbl_cipsov4_remove() as the callback | |
675 | * for the netlbl_domhsh_walk() function; it removes LSM domain map entries | |
676 | * which are associated with the CIPSO DOI specified in @arg. Returns zero on | |
677 | * success, negative values on failure. | |
678 | * | |
679 | */ | |
680 | static int netlbl_cipsov4_remove_cb(struct netlbl_dom_map *entry, void *arg) | |
681 | { | |
682 | struct netlbl_domhsh_walk_arg *cb_arg = arg; | |
683 | ||
6a8b7f0c PM |
684 | if (entry->def.type == NETLBL_NLTYPE_CIPSOV4 && |
685 | entry->def.cipso->doi == cb_arg->doi) | |
b1edeb10 PM |
686 | return netlbl_domhsh_remove_entry(entry, cb_arg->audit_info); |
687 | ||
688 | return 0; | |
689 | } | |
690 | ||
96cb8e33 PM |
691 | /** |
692 | * netlbl_cipsov4_remove - Handle a REMOVE message | |
693 | * @skb: the NETLINK buffer | |
694 | * @info: the Generic NETLINK info block | |
695 | * | |
696 | * Description: | |
697 | * Process a user generated REMOVE message and respond accordingly. Returns | |
698 | * zero on success, negative values on failure. | |
699 | * | |
700 | */ | |
701 | static int netlbl_cipsov4_remove(struct sk_buff *skb, struct genl_info *info) | |
702 | { | |
fd385855 | 703 | int ret_val = -EINVAL; |
b1edeb10 | 704 | struct netlbl_domhsh_walk_arg cb_arg; |
95d4e6be | 705 | struct netlbl_audit audit_info; |
b1edeb10 PM |
706 | u32 skip_bkt = 0; |
707 | u32 skip_chain = 0; | |
96cb8e33 | 708 | |
95d4e6be PM |
709 | if (!info->attrs[NLBL_CIPSOV4_A_DOI]) |
710 | return -EINVAL; | |
32f50cde | 711 | |
f7e0318a | 712 | netlbl_netlink_auditinfo(&audit_info); |
6c2e8ac0 | 713 | cb_arg.doi = nla_get_u32(info->attrs[NLBL_CIPSOV4_A_DOI]); |
b1edeb10 PM |
714 | cb_arg.audit_info = &audit_info; |
715 | ret_val = netlbl_domhsh_walk(&skip_bkt, &skip_chain, | |
716 | netlbl_cipsov4_remove_cb, &cb_arg); | |
717 | if (ret_val == 0 || ret_val == -ENOENT) { | |
6c2e8ac0 | 718 | ret_val = cipso_v4_doi_remove(cb_arg.doi, &audit_info); |
b1edeb10 PM |
719 | if (ret_val == 0) |
720 | atomic_dec(&netlabel_mgmt_protocount); | |
721 | } | |
95d4e6be | 722 | |
96cb8e33 PM |
723 | return ret_val; |
724 | } | |
725 | ||
726 | /* | |
727 | * NetLabel Generic NETLINK Command Definitions | |
728 | */ | |
729 | ||
66a9b928 | 730 | static const struct genl_small_ops netlbl_cipsov4_ops[] = { |
227c43c3 | 731 | { |
96cb8e33 | 732 | .cmd = NLBL_CIPSOV4_C_ADD, |
ef6243ac | 733 | .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, |
fd385855 | 734 | .flags = GENL_ADMIN_PERM, |
96cb8e33 PM |
735 | .doit = netlbl_cipsov4_add, |
736 | .dumpit = NULL, | |
227c43c3 PE |
737 | }, |
738 | { | |
96cb8e33 | 739 | .cmd = NLBL_CIPSOV4_C_REMOVE, |
ef6243ac | 740 | .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, |
fd385855 | 741 | .flags = GENL_ADMIN_PERM, |
96cb8e33 PM |
742 | .doit = netlbl_cipsov4_remove, |
743 | .dumpit = NULL, | |
227c43c3 PE |
744 | }, |
745 | { | |
96cb8e33 | 746 | .cmd = NLBL_CIPSOV4_C_LIST, |
ef6243ac | 747 | .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, |
96cb8e33 PM |
748 | .flags = 0, |
749 | .doit = netlbl_cipsov4_list, | |
750 | .dumpit = NULL, | |
227c43c3 PE |
751 | }, |
752 | { | |
96cb8e33 | 753 | .cmd = NLBL_CIPSOV4_C_LISTALL, |
ef6243ac | 754 | .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, |
96cb8e33 | 755 | .flags = 0, |
fd385855 PM |
756 | .doit = NULL, |
757 | .dumpit = netlbl_cipsov4_listall, | |
227c43c3 | 758 | }, |
96cb8e33 PM |
759 | }; |
760 | ||
56989f6d | 761 | static struct genl_family netlbl_cipsov4_gnl_family __ro_after_init = { |
489111e5 JB |
762 | .hdrsize = 0, |
763 | .name = NETLBL_NLTYPE_CIPSOV4_NAME, | |
764 | .version = NETLBL_PROTO_VERSION, | |
765 | .maxattr = NLBL_CIPSOV4_A_MAX, | |
3b0f31f2 | 766 | .policy = netlbl_cipsov4_genl_policy, |
489111e5 | 767 | .module = THIS_MODULE, |
66a9b928 JK |
768 | .small_ops = netlbl_cipsov4_ops, |
769 | .n_small_ops = ARRAY_SIZE(netlbl_cipsov4_ops), | |
9c5d03d3 | 770 | .resv_start_op = NLBL_CIPSOV4_C_LISTALL + 1, |
489111e5 JB |
771 | }; |
772 | ||
96cb8e33 PM |
773 | /* |
774 | * NetLabel Generic NETLINK Protocol Functions | |
775 | */ | |
776 | ||
777 | /** | |
778 | * netlbl_cipsov4_genl_init - Register the CIPSOv4 NetLabel component | |
779 | * | |
780 | * Description: | |
781 | * Register the CIPSOv4 packet NetLabel component with the Generic NETLINK | |
782 | * mechanism. Returns zero on success, negative values on failure. | |
783 | * | |
784 | */ | |
05705e4e | 785 | int __init netlbl_cipsov4_genl_init(void) |
96cb8e33 | 786 | { |
489111e5 | 787 | return genl_register_family(&netlbl_cipsov4_gnl_family); |
96cb8e33 | 788 | } |