Loading...
1/*
2 * NetLabel Management Support
3 *
4 * This file defines the management functions for the NetLabel system. The
5 * NetLabel system manages static and dynamic label mappings for network
6 * protocols such as CIPSO and RIPSO.
7 *
8 * Author: Paul Moore <paul@paul-moore.com>
9 *
10 */
11
12/*
13 * (c) Copyright Hewlett-Packard Development Company, L.P., 2006, 2008
14 *
15 * This program is free software; you can redistribute it and/or modify
16 * it under the terms of the GNU General Public License as published by
17 * the Free Software Foundation; either version 2 of the License, or
18 * (at your option) any later version.
19 *
20 * This program is distributed in the hope that it will be useful,
21 * but WITHOUT ANY WARRANTY; without even the implied warranty of
22 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See
23 * the GNU General Public License for more details.
24 *
25 * You should have received a copy of the GNU General Public License
26 * along with this program; if not, write to the Free Software
27 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
28 *
29 */
30
31#include <linux/types.h>
32#include <linux/socket.h>
33#include <linux/string.h>
34#include <linux/skbuff.h>
35#include <linux/in.h>
36#include <linux/in6.h>
37#include <linux/slab.h>
38#include <net/sock.h>
39#include <net/netlink.h>
40#include <net/genetlink.h>
41#include <net/ip.h>
42#include <net/ipv6.h>
43#include <net/netlabel.h>
44#include <net/cipso_ipv4.h>
45#include <linux/atomic.h>
46
47#include "netlabel_domainhash.h"
48#include "netlabel_user.h"
49#include "netlabel_mgmt.h"
50
51/* NetLabel configured protocol counter */
52atomic_t netlabel_mgmt_protocount = ATOMIC_INIT(0);
53
54/* Argument struct for netlbl_domhsh_walk() */
55struct netlbl_domhsh_walk_arg {
56 struct netlink_callback *nl_cb;
57 struct sk_buff *skb;
58 u32 seq;
59};
60
61/* NetLabel Generic NETLINK CIPSOv4 family */
62static struct genl_family netlbl_mgmt_gnl_family = {
63 .id = GENL_ID_GENERATE,
64 .hdrsize = 0,
65 .name = NETLBL_NLTYPE_MGMT_NAME,
66 .version = NETLBL_PROTO_VERSION,
67 .maxattr = NLBL_MGMT_A_MAX,
68};
69
70/* NetLabel Netlink attribute policy */
71static const struct nla_policy netlbl_mgmt_genl_policy[NLBL_MGMT_A_MAX + 1] = {
72 [NLBL_MGMT_A_DOMAIN] = { .type = NLA_NUL_STRING },
73 [NLBL_MGMT_A_PROTOCOL] = { .type = NLA_U32 },
74 [NLBL_MGMT_A_VERSION] = { .type = NLA_U32 },
75 [NLBL_MGMT_A_CV4DOI] = { .type = NLA_U32 },
76};
77
78/*
79 * Helper Functions
80 */
81
82/**
83 * netlbl_mgmt_add - Handle an ADD message
84 * @info: the Generic NETLINK info block
85 * @audit_info: NetLabel audit information
86 *
87 * Description:
88 * Helper function for the ADD and ADDDEF messages to add the domain mappings
89 * from the message to the hash table. See netlabel.h for a description of the
90 * message format. Returns zero on success, negative values on failure.
91 *
92 */
93static int netlbl_mgmt_add_common(struct genl_info *info,
94 struct netlbl_audit *audit_info)
95{
96 int ret_val = -EINVAL;
97 struct netlbl_dom_map *entry = NULL;
98 struct netlbl_domaddr_map *addrmap = NULL;
99 struct cipso_v4_doi *cipsov4 = NULL;
100 u32 tmp_val;
101
102 entry = kzalloc(sizeof(*entry), GFP_KERNEL);
103 if (entry == NULL) {
104 ret_val = -ENOMEM;
105 goto add_failure;
106 }
107 entry->type = nla_get_u32(info->attrs[NLBL_MGMT_A_PROTOCOL]);
108 if (info->attrs[NLBL_MGMT_A_DOMAIN]) {
109 size_t tmp_size = nla_len(info->attrs[NLBL_MGMT_A_DOMAIN]);
110 entry->domain = kmalloc(tmp_size, GFP_KERNEL);
111 if (entry->domain == NULL) {
112 ret_val = -ENOMEM;
113 goto add_failure;
114 }
115 nla_strlcpy(entry->domain,
116 info->attrs[NLBL_MGMT_A_DOMAIN], tmp_size);
117 }
118
119 /* NOTE: internally we allow/use a entry->type value of
120 * NETLBL_NLTYPE_ADDRSELECT but we don't currently allow users
121 * to pass that as a protocol value because we need to know the
122 * "real" protocol */
123
124 switch (entry->type) {
125 case NETLBL_NLTYPE_UNLABELED:
126 break;
127 case NETLBL_NLTYPE_CIPSOV4:
128 if (!info->attrs[NLBL_MGMT_A_CV4DOI])
129 goto add_failure;
130
131 tmp_val = nla_get_u32(info->attrs[NLBL_MGMT_A_CV4DOI]);
132 cipsov4 = cipso_v4_doi_getdef(tmp_val);
133 if (cipsov4 == NULL)
134 goto add_failure;
135 entry->type_def.cipsov4 = cipsov4;
136 break;
137 default:
138 goto add_failure;
139 }
140
141 if (info->attrs[NLBL_MGMT_A_IPV4ADDR]) {
142 struct in_addr *addr;
143 struct in_addr *mask;
144 struct netlbl_domaddr4_map *map;
145
146 addrmap = kzalloc(sizeof(*addrmap), GFP_KERNEL);
147 if (addrmap == NULL) {
148 ret_val = -ENOMEM;
149 goto add_failure;
150 }
151 INIT_LIST_HEAD(&addrmap->list4);
152 INIT_LIST_HEAD(&addrmap->list6);
153
154 if (nla_len(info->attrs[NLBL_MGMT_A_IPV4ADDR]) !=
155 sizeof(struct in_addr)) {
156 ret_val = -EINVAL;
157 goto add_failure;
158 }
159 if (nla_len(info->attrs[NLBL_MGMT_A_IPV4MASK]) !=
160 sizeof(struct in_addr)) {
161 ret_val = -EINVAL;
162 goto add_failure;
163 }
164 addr = nla_data(info->attrs[NLBL_MGMT_A_IPV4ADDR]);
165 mask = nla_data(info->attrs[NLBL_MGMT_A_IPV4MASK]);
166
167 map = kzalloc(sizeof(*map), GFP_KERNEL);
168 if (map == NULL) {
169 ret_val = -ENOMEM;
170 goto add_failure;
171 }
172 map->list.addr = addr->s_addr & mask->s_addr;
173 map->list.mask = mask->s_addr;
174 map->list.valid = 1;
175 map->type = entry->type;
176 if (cipsov4)
177 map->type_def.cipsov4 = cipsov4;
178
179 ret_val = netlbl_af4list_add(&map->list, &addrmap->list4);
180 if (ret_val != 0) {
181 kfree(map);
182 goto add_failure;
183 }
184
185 entry->type = NETLBL_NLTYPE_ADDRSELECT;
186 entry->type_def.addrsel = addrmap;
187#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
188 } else if (info->attrs[NLBL_MGMT_A_IPV6ADDR]) {
189 struct in6_addr *addr;
190 struct in6_addr *mask;
191 struct netlbl_domaddr6_map *map;
192
193 addrmap = kzalloc(sizeof(*addrmap), GFP_KERNEL);
194 if (addrmap == NULL) {
195 ret_val = -ENOMEM;
196 goto add_failure;
197 }
198 INIT_LIST_HEAD(&addrmap->list4);
199 INIT_LIST_HEAD(&addrmap->list6);
200
201 if (nla_len(info->attrs[NLBL_MGMT_A_IPV6ADDR]) !=
202 sizeof(struct in6_addr)) {
203 ret_val = -EINVAL;
204 goto add_failure;
205 }
206 if (nla_len(info->attrs[NLBL_MGMT_A_IPV6MASK]) !=
207 sizeof(struct in6_addr)) {
208 ret_val = -EINVAL;
209 goto add_failure;
210 }
211 addr = nla_data(info->attrs[NLBL_MGMT_A_IPV6ADDR]);
212 mask = nla_data(info->attrs[NLBL_MGMT_A_IPV6MASK]);
213
214 map = kzalloc(sizeof(*map), GFP_KERNEL);
215 if (map == NULL) {
216 ret_val = -ENOMEM;
217 goto add_failure;
218 }
219 ipv6_addr_copy(&map->list.addr, addr);
220 map->list.addr.s6_addr32[0] &= mask->s6_addr32[0];
221 map->list.addr.s6_addr32[1] &= mask->s6_addr32[1];
222 map->list.addr.s6_addr32[2] &= mask->s6_addr32[2];
223 map->list.addr.s6_addr32[3] &= mask->s6_addr32[3];
224 ipv6_addr_copy(&map->list.mask, mask);
225 map->list.valid = 1;
226 map->type = entry->type;
227
228 ret_val = netlbl_af6list_add(&map->list, &addrmap->list6);
229 if (ret_val != 0) {
230 kfree(map);
231 goto add_failure;
232 }
233
234 entry->type = NETLBL_NLTYPE_ADDRSELECT;
235 entry->type_def.addrsel = addrmap;
236#endif /* IPv6 */
237 }
238
239 ret_val = netlbl_domhsh_add(entry, audit_info);
240 if (ret_val != 0)
241 goto add_failure;
242
243 return 0;
244
245add_failure:
246 if (cipsov4)
247 cipso_v4_doi_putdef(cipsov4);
248 if (entry)
249 kfree(entry->domain);
250 kfree(addrmap);
251 kfree(entry);
252 return ret_val;
253}
254
255/**
256 * netlbl_mgmt_listentry - List a NetLabel/LSM domain map entry
257 * @skb: the NETLINK buffer
258 * @entry: the map entry
259 *
260 * Description:
261 * This function is a helper function used by the LISTALL and LISTDEF command
262 * handlers. The caller is responsible for ensuring that the RCU read lock
263 * is held. Returns zero on success, negative values on failure.
264 *
265 */
266static int netlbl_mgmt_listentry(struct sk_buff *skb,
267 struct netlbl_dom_map *entry)
268{
269 int ret_val = 0;
270 struct nlattr *nla_a;
271 struct nlattr *nla_b;
272 struct netlbl_af4list *iter4;
273#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
274 struct netlbl_af6list *iter6;
275#endif
276
277 if (entry->domain != NULL) {
278 ret_val = nla_put_string(skb,
279 NLBL_MGMT_A_DOMAIN, entry->domain);
280 if (ret_val != 0)
281 return ret_val;
282 }
283
284 switch (entry->type) {
285 case NETLBL_NLTYPE_ADDRSELECT:
286 nla_a = nla_nest_start(skb, NLBL_MGMT_A_SELECTORLIST);
287 if (nla_a == NULL)
288 return -ENOMEM;
289
290 netlbl_af4list_foreach_rcu(iter4,
291 &entry->type_def.addrsel->list4) {
292 struct netlbl_domaddr4_map *map4;
293 struct in_addr addr_struct;
294
295 nla_b = nla_nest_start(skb, NLBL_MGMT_A_ADDRSELECTOR);
296 if (nla_b == NULL)
297 return -ENOMEM;
298
299 addr_struct.s_addr = iter4->addr;
300 ret_val = nla_put(skb, NLBL_MGMT_A_IPV4ADDR,
301 sizeof(struct in_addr),
302 &addr_struct);
303 if (ret_val != 0)
304 return ret_val;
305 addr_struct.s_addr = iter4->mask;
306 ret_val = nla_put(skb, NLBL_MGMT_A_IPV4MASK,
307 sizeof(struct in_addr),
308 &addr_struct);
309 if (ret_val != 0)
310 return ret_val;
311 map4 = netlbl_domhsh_addr4_entry(iter4);
312 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
313 map4->type);
314 if (ret_val != 0)
315 return ret_val;
316 switch (map4->type) {
317 case NETLBL_NLTYPE_CIPSOV4:
318 ret_val = nla_put_u32(skb, NLBL_MGMT_A_CV4DOI,
319 map4->type_def.cipsov4->doi);
320 if (ret_val != 0)
321 return ret_val;
322 break;
323 }
324
325 nla_nest_end(skb, nla_b);
326 }
327#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
328 netlbl_af6list_foreach_rcu(iter6,
329 &entry->type_def.addrsel->list6) {
330 struct netlbl_domaddr6_map *map6;
331
332 nla_b = nla_nest_start(skb, NLBL_MGMT_A_ADDRSELECTOR);
333 if (nla_b == NULL)
334 return -ENOMEM;
335
336 ret_val = nla_put(skb, NLBL_MGMT_A_IPV6ADDR,
337 sizeof(struct in6_addr),
338 &iter6->addr);
339 if (ret_val != 0)
340 return ret_val;
341 ret_val = nla_put(skb, NLBL_MGMT_A_IPV6MASK,
342 sizeof(struct in6_addr),
343 &iter6->mask);
344 if (ret_val != 0)
345 return ret_val;
346 map6 = netlbl_domhsh_addr6_entry(iter6);
347 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
348 map6->type);
349 if (ret_val != 0)
350 return ret_val;
351
352 nla_nest_end(skb, nla_b);
353 }
354#endif /* IPv6 */
355
356 nla_nest_end(skb, nla_a);
357 break;
358 case NETLBL_NLTYPE_UNLABELED:
359 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL, entry->type);
360 break;
361 case NETLBL_NLTYPE_CIPSOV4:
362 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL, entry->type);
363 if (ret_val != 0)
364 return ret_val;
365 ret_val = nla_put_u32(skb, NLBL_MGMT_A_CV4DOI,
366 entry->type_def.cipsov4->doi);
367 break;
368 }
369
370 return ret_val;
371}
372
373/*
374 * NetLabel Command Handlers
375 */
376
377/**
378 * netlbl_mgmt_add - Handle an ADD message
379 * @skb: the NETLINK buffer
380 * @info: the Generic NETLINK info block
381 *
382 * Description:
383 * Process a user generated ADD message and add the domains from the message
384 * to the hash table. See netlabel.h for a description of the message format.
385 * Returns zero on success, negative values on failure.
386 *
387 */
388static int netlbl_mgmt_add(struct sk_buff *skb, struct genl_info *info)
389{
390 struct netlbl_audit audit_info;
391
392 if ((!info->attrs[NLBL_MGMT_A_DOMAIN]) ||
393 (!info->attrs[NLBL_MGMT_A_PROTOCOL]) ||
394 (info->attrs[NLBL_MGMT_A_IPV4ADDR] &&
395 info->attrs[NLBL_MGMT_A_IPV6ADDR]) ||
396 (info->attrs[NLBL_MGMT_A_IPV4MASK] &&
397 info->attrs[NLBL_MGMT_A_IPV6MASK]) ||
398 ((info->attrs[NLBL_MGMT_A_IPV4ADDR] != NULL) ^
399 (info->attrs[NLBL_MGMT_A_IPV4MASK] != NULL)) ||
400 ((info->attrs[NLBL_MGMT_A_IPV6ADDR] != NULL) ^
401 (info->attrs[NLBL_MGMT_A_IPV6MASK] != NULL)))
402 return -EINVAL;
403
404 netlbl_netlink_auditinfo(skb, &audit_info);
405
406 return netlbl_mgmt_add_common(info, &audit_info);
407}
408
409/**
410 * netlbl_mgmt_remove - Handle a REMOVE message
411 * @skb: the NETLINK buffer
412 * @info: the Generic NETLINK info block
413 *
414 * Description:
415 * Process a user generated REMOVE message and remove the specified domain
416 * mappings. Returns zero on success, negative values on failure.
417 *
418 */
419static int netlbl_mgmt_remove(struct sk_buff *skb, struct genl_info *info)
420{
421 char *domain;
422 struct netlbl_audit audit_info;
423
424 if (!info->attrs[NLBL_MGMT_A_DOMAIN])
425 return -EINVAL;
426
427 netlbl_netlink_auditinfo(skb, &audit_info);
428
429 domain = nla_data(info->attrs[NLBL_MGMT_A_DOMAIN]);
430 return netlbl_domhsh_remove(domain, &audit_info);
431}
432
433/**
434 * netlbl_mgmt_listall_cb - netlbl_domhsh_walk() callback for LISTALL
435 * @entry: the domain mapping hash table entry
436 * @arg: the netlbl_domhsh_walk_arg structure
437 *
438 * Description:
439 * This function is designed to be used as a callback to the
440 * netlbl_domhsh_walk() function for use in generating a response for a LISTALL
441 * message. Returns the size of the message on success, negative values on
442 * failure.
443 *
444 */
445static int netlbl_mgmt_listall_cb(struct netlbl_dom_map *entry, void *arg)
446{
447 int ret_val = -ENOMEM;
448 struct netlbl_domhsh_walk_arg *cb_arg = arg;
449 void *data;
450
451 data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).pid,
452 cb_arg->seq, &netlbl_mgmt_gnl_family,
453 NLM_F_MULTI, NLBL_MGMT_C_LISTALL);
454 if (data == NULL)
455 goto listall_cb_failure;
456
457 ret_val = netlbl_mgmt_listentry(cb_arg->skb, entry);
458 if (ret_val != 0)
459 goto listall_cb_failure;
460
461 cb_arg->seq++;
462 return genlmsg_end(cb_arg->skb, data);
463
464listall_cb_failure:
465 genlmsg_cancel(cb_arg->skb, data);
466 return ret_val;
467}
468
469/**
470 * netlbl_mgmt_listall - Handle a LISTALL message
471 * @skb: the NETLINK buffer
472 * @cb: the NETLINK callback
473 *
474 * Description:
475 * Process a user generated LISTALL message and dumps the domain hash table in
476 * a form suitable for use in a kernel generated LISTALL message. Returns zero
477 * on success, negative values on failure.
478 *
479 */
480static int netlbl_mgmt_listall(struct sk_buff *skb,
481 struct netlink_callback *cb)
482{
483 struct netlbl_domhsh_walk_arg cb_arg;
484 u32 skip_bkt = cb->args[0];
485 u32 skip_chain = cb->args[1];
486
487 cb_arg.nl_cb = cb;
488 cb_arg.skb = skb;
489 cb_arg.seq = cb->nlh->nlmsg_seq;
490
491 netlbl_domhsh_walk(&skip_bkt,
492 &skip_chain,
493 netlbl_mgmt_listall_cb,
494 &cb_arg);
495
496 cb->args[0] = skip_bkt;
497 cb->args[1] = skip_chain;
498 return skb->len;
499}
500
501/**
502 * netlbl_mgmt_adddef - Handle an ADDDEF message
503 * @skb: the NETLINK buffer
504 * @info: the Generic NETLINK info block
505 *
506 * Description:
507 * Process a user generated ADDDEF message and respond accordingly. Returns
508 * zero on success, negative values on failure.
509 *
510 */
511static int netlbl_mgmt_adddef(struct sk_buff *skb, struct genl_info *info)
512{
513 struct netlbl_audit audit_info;
514
515 if ((!info->attrs[NLBL_MGMT_A_PROTOCOL]) ||
516 (info->attrs[NLBL_MGMT_A_IPV4ADDR] &&
517 info->attrs[NLBL_MGMT_A_IPV6ADDR]) ||
518 (info->attrs[NLBL_MGMT_A_IPV4MASK] &&
519 info->attrs[NLBL_MGMT_A_IPV6MASK]) ||
520 ((info->attrs[NLBL_MGMT_A_IPV4ADDR] != NULL) ^
521 (info->attrs[NLBL_MGMT_A_IPV4MASK] != NULL)) ||
522 ((info->attrs[NLBL_MGMT_A_IPV6ADDR] != NULL) ^
523 (info->attrs[NLBL_MGMT_A_IPV6MASK] != NULL)))
524 return -EINVAL;
525
526 netlbl_netlink_auditinfo(skb, &audit_info);
527
528 return netlbl_mgmt_add_common(info, &audit_info);
529}
530
531/**
532 * netlbl_mgmt_removedef - Handle a REMOVEDEF message
533 * @skb: the NETLINK buffer
534 * @info: the Generic NETLINK info block
535 *
536 * Description:
537 * Process a user generated REMOVEDEF message and remove the default domain
538 * mapping. Returns zero on success, negative values on failure.
539 *
540 */
541static int netlbl_mgmt_removedef(struct sk_buff *skb, struct genl_info *info)
542{
543 struct netlbl_audit audit_info;
544
545 netlbl_netlink_auditinfo(skb, &audit_info);
546
547 return netlbl_domhsh_remove_default(&audit_info);
548}
549
550/**
551 * netlbl_mgmt_listdef - Handle a LISTDEF message
552 * @skb: the NETLINK buffer
553 * @info: the Generic NETLINK info block
554 *
555 * Description:
556 * Process a user generated LISTDEF message and dumps the default domain
557 * mapping in a form suitable for use in a kernel generated LISTDEF message.
558 * Returns zero on success, negative values on failure.
559 *
560 */
561static int netlbl_mgmt_listdef(struct sk_buff *skb, struct genl_info *info)
562{
563 int ret_val = -ENOMEM;
564 struct sk_buff *ans_skb = NULL;
565 void *data;
566 struct netlbl_dom_map *entry;
567
568 ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
569 if (ans_skb == NULL)
570 return -ENOMEM;
571 data = genlmsg_put_reply(ans_skb, info, &netlbl_mgmt_gnl_family,
572 0, NLBL_MGMT_C_LISTDEF);
573 if (data == NULL)
574 goto listdef_failure;
575
576 rcu_read_lock();
577 entry = netlbl_domhsh_getentry(NULL);
578 if (entry == NULL) {
579 ret_val = -ENOENT;
580 goto listdef_failure_lock;
581 }
582 ret_val = netlbl_mgmt_listentry(ans_skb, entry);
583 rcu_read_unlock();
584 if (ret_val != 0)
585 goto listdef_failure;
586
587 genlmsg_end(ans_skb, data);
588 return genlmsg_reply(ans_skb, info);
589
590listdef_failure_lock:
591 rcu_read_unlock();
592listdef_failure:
593 kfree_skb(ans_skb);
594 return ret_val;
595}
596
597/**
598 * netlbl_mgmt_protocols_cb - Write an individual PROTOCOL message response
599 * @skb: the skb to write to
600 * @cb: the NETLINK callback
601 * @protocol: the NetLabel protocol to use in the message
602 *
603 * Description:
604 * This function is to be used in conjunction with netlbl_mgmt_protocols() to
605 * answer a application's PROTOCOLS message. Returns the size of the message
606 * on success, negative values on failure.
607 *
608 */
609static int netlbl_mgmt_protocols_cb(struct sk_buff *skb,
610 struct netlink_callback *cb,
611 u32 protocol)
612{
613 int ret_val = -ENOMEM;
614 void *data;
615
616 data = genlmsg_put(skb, NETLINK_CB(cb->skb).pid, cb->nlh->nlmsg_seq,
617 &netlbl_mgmt_gnl_family, NLM_F_MULTI,
618 NLBL_MGMT_C_PROTOCOLS);
619 if (data == NULL)
620 goto protocols_cb_failure;
621
622 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL, protocol);
623 if (ret_val != 0)
624 goto protocols_cb_failure;
625
626 return genlmsg_end(skb, data);
627
628protocols_cb_failure:
629 genlmsg_cancel(skb, data);
630 return ret_val;
631}
632
633/**
634 * netlbl_mgmt_protocols - Handle a PROTOCOLS message
635 * @skb: the NETLINK buffer
636 * @cb: the NETLINK callback
637 *
638 * Description:
639 * Process a user generated PROTOCOLS message and respond accordingly.
640 *
641 */
642static int netlbl_mgmt_protocols(struct sk_buff *skb,
643 struct netlink_callback *cb)
644{
645 u32 protos_sent = cb->args[0];
646
647 if (protos_sent == 0) {
648 if (netlbl_mgmt_protocols_cb(skb,
649 cb,
650 NETLBL_NLTYPE_UNLABELED) < 0)
651 goto protocols_return;
652 protos_sent++;
653 }
654 if (protos_sent == 1) {
655 if (netlbl_mgmt_protocols_cb(skb,
656 cb,
657 NETLBL_NLTYPE_CIPSOV4) < 0)
658 goto protocols_return;
659 protos_sent++;
660 }
661
662protocols_return:
663 cb->args[0] = protos_sent;
664 return skb->len;
665}
666
667/**
668 * netlbl_mgmt_version - Handle a VERSION message
669 * @skb: the NETLINK buffer
670 * @info: the Generic NETLINK info block
671 *
672 * Description:
673 * Process a user generated VERSION message and respond accordingly. Returns
674 * zero on success, negative values on failure.
675 *
676 */
677static int netlbl_mgmt_version(struct sk_buff *skb, struct genl_info *info)
678{
679 int ret_val = -ENOMEM;
680 struct sk_buff *ans_skb = NULL;
681 void *data;
682
683 ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
684 if (ans_skb == NULL)
685 return -ENOMEM;
686 data = genlmsg_put_reply(ans_skb, info, &netlbl_mgmt_gnl_family,
687 0, NLBL_MGMT_C_VERSION);
688 if (data == NULL)
689 goto version_failure;
690
691 ret_val = nla_put_u32(ans_skb,
692 NLBL_MGMT_A_VERSION,
693 NETLBL_PROTO_VERSION);
694 if (ret_val != 0)
695 goto version_failure;
696
697 genlmsg_end(ans_skb, data);
698 return genlmsg_reply(ans_skb, info);
699
700version_failure:
701 kfree_skb(ans_skb);
702 return ret_val;
703}
704
705
706/*
707 * NetLabel Generic NETLINK Command Definitions
708 */
709
710static struct genl_ops netlbl_mgmt_genl_ops[] = {
711 {
712 .cmd = NLBL_MGMT_C_ADD,
713 .flags = GENL_ADMIN_PERM,
714 .policy = netlbl_mgmt_genl_policy,
715 .doit = netlbl_mgmt_add,
716 .dumpit = NULL,
717 },
718 {
719 .cmd = NLBL_MGMT_C_REMOVE,
720 .flags = GENL_ADMIN_PERM,
721 .policy = netlbl_mgmt_genl_policy,
722 .doit = netlbl_mgmt_remove,
723 .dumpit = NULL,
724 },
725 {
726 .cmd = NLBL_MGMT_C_LISTALL,
727 .flags = 0,
728 .policy = netlbl_mgmt_genl_policy,
729 .doit = NULL,
730 .dumpit = netlbl_mgmt_listall,
731 },
732 {
733 .cmd = NLBL_MGMT_C_ADDDEF,
734 .flags = GENL_ADMIN_PERM,
735 .policy = netlbl_mgmt_genl_policy,
736 .doit = netlbl_mgmt_adddef,
737 .dumpit = NULL,
738 },
739 {
740 .cmd = NLBL_MGMT_C_REMOVEDEF,
741 .flags = GENL_ADMIN_PERM,
742 .policy = netlbl_mgmt_genl_policy,
743 .doit = netlbl_mgmt_removedef,
744 .dumpit = NULL,
745 },
746 {
747 .cmd = NLBL_MGMT_C_LISTDEF,
748 .flags = 0,
749 .policy = netlbl_mgmt_genl_policy,
750 .doit = netlbl_mgmt_listdef,
751 .dumpit = NULL,
752 },
753 {
754 .cmd = NLBL_MGMT_C_PROTOCOLS,
755 .flags = 0,
756 .policy = netlbl_mgmt_genl_policy,
757 .doit = NULL,
758 .dumpit = netlbl_mgmt_protocols,
759 },
760 {
761 .cmd = NLBL_MGMT_C_VERSION,
762 .flags = 0,
763 .policy = netlbl_mgmt_genl_policy,
764 .doit = netlbl_mgmt_version,
765 .dumpit = NULL,
766 },
767};
768
769/*
770 * NetLabel Generic NETLINK Protocol Functions
771 */
772
773/**
774 * netlbl_mgmt_genl_init - Register the NetLabel management component
775 *
776 * Description:
777 * Register the NetLabel management component with the Generic NETLINK
778 * mechanism. Returns zero on success, negative values on failure.
779 *
780 */
781int __init netlbl_mgmt_genl_init(void)
782{
783 return genl_register_family_with_ops(&netlbl_mgmt_gnl_family,
784 netlbl_mgmt_genl_ops, ARRAY_SIZE(netlbl_mgmt_genl_ops));
785}
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * NetLabel Management Support
4 *
5 * This file defines the management functions for the NetLabel system. The
6 * NetLabel system manages static and dynamic label mappings for network
7 * protocols such as CIPSO and RIPSO.
8 *
9 * Author: Paul Moore <paul@paul-moore.com>
10 */
11
12/*
13 * (c) Copyright Hewlett-Packard Development Company, L.P., 2006, 2008
14 */
15
16#include <linux/types.h>
17#include <linux/socket.h>
18#include <linux/string.h>
19#include <linux/skbuff.h>
20#include <linux/in.h>
21#include <linux/in6.h>
22#include <linux/slab.h>
23#include <net/sock.h>
24#include <net/netlink.h>
25#include <net/genetlink.h>
26#include <net/ip.h>
27#include <net/ipv6.h>
28#include <net/netlabel.h>
29#include <net/cipso_ipv4.h>
30#include <net/calipso.h>
31#include <linux/atomic.h>
32
33#include "netlabel_calipso.h"
34#include "netlabel_domainhash.h"
35#include "netlabel_user.h"
36#include "netlabel_mgmt.h"
37
38/* NetLabel configured protocol counter */
39atomic_t netlabel_mgmt_protocount = ATOMIC_INIT(0);
40
41/* Argument struct for netlbl_domhsh_walk() */
42struct netlbl_domhsh_walk_arg {
43 struct netlink_callback *nl_cb;
44 struct sk_buff *skb;
45 u32 seq;
46};
47
48/* NetLabel Generic NETLINK CIPSOv4 family */
49static struct genl_family netlbl_mgmt_gnl_family;
50
51/* NetLabel Netlink attribute policy */
52static const struct nla_policy netlbl_mgmt_genl_policy[NLBL_MGMT_A_MAX + 1] = {
53 [NLBL_MGMT_A_DOMAIN] = { .type = NLA_NUL_STRING },
54 [NLBL_MGMT_A_PROTOCOL] = { .type = NLA_U32 },
55 [NLBL_MGMT_A_VERSION] = { .type = NLA_U32 },
56 [NLBL_MGMT_A_CV4DOI] = { .type = NLA_U32 },
57 [NLBL_MGMT_A_FAMILY] = { .type = NLA_U16 },
58 [NLBL_MGMT_A_CLPDOI] = { .type = NLA_U32 },
59};
60
61/*
62 * Helper Functions
63 */
64
65/**
66 * netlbl_mgmt_add - Handle an ADD message
67 * @info: the Generic NETLINK info block
68 * @audit_info: NetLabel audit information
69 *
70 * Description:
71 * Helper function for the ADD and ADDDEF messages to add the domain mappings
72 * from the message to the hash table. See netlabel.h for a description of the
73 * message format. Returns zero on success, negative values on failure.
74 *
75 */
76static int netlbl_mgmt_add_common(struct genl_info *info,
77 struct netlbl_audit *audit_info)
78{
79 int ret_val = -EINVAL;
80 struct netlbl_domaddr_map *addrmap = NULL;
81 struct cipso_v4_doi *cipsov4 = NULL;
82#if IS_ENABLED(CONFIG_IPV6)
83 struct calipso_doi *calipso = NULL;
84#endif
85 u32 tmp_val;
86 struct netlbl_dom_map *entry = kzalloc(sizeof(*entry), GFP_KERNEL);
87
88 if (!entry)
89 return -ENOMEM;
90 entry->def.type = nla_get_u32(info->attrs[NLBL_MGMT_A_PROTOCOL]);
91 if (info->attrs[NLBL_MGMT_A_DOMAIN]) {
92 size_t tmp_size = nla_len(info->attrs[NLBL_MGMT_A_DOMAIN]);
93 entry->domain = kmalloc(tmp_size, GFP_KERNEL);
94 if (entry->domain == NULL) {
95 ret_val = -ENOMEM;
96 goto add_free_entry;
97 }
98 nla_strlcpy(entry->domain,
99 info->attrs[NLBL_MGMT_A_DOMAIN], tmp_size);
100 }
101
102 /* NOTE: internally we allow/use a entry->def.type value of
103 * NETLBL_NLTYPE_ADDRSELECT but we don't currently allow users
104 * to pass that as a protocol value because we need to know the
105 * "real" protocol */
106
107 switch (entry->def.type) {
108 case NETLBL_NLTYPE_UNLABELED:
109 if (info->attrs[NLBL_MGMT_A_FAMILY])
110 entry->family =
111 nla_get_u16(info->attrs[NLBL_MGMT_A_FAMILY]);
112 else
113 entry->family = AF_UNSPEC;
114 break;
115 case NETLBL_NLTYPE_CIPSOV4:
116 if (!info->attrs[NLBL_MGMT_A_CV4DOI])
117 goto add_free_domain;
118
119 tmp_val = nla_get_u32(info->attrs[NLBL_MGMT_A_CV4DOI]);
120 cipsov4 = cipso_v4_doi_getdef(tmp_val);
121 if (cipsov4 == NULL)
122 goto add_free_domain;
123 entry->family = AF_INET;
124 entry->def.cipso = cipsov4;
125 break;
126#if IS_ENABLED(CONFIG_IPV6)
127 case NETLBL_NLTYPE_CALIPSO:
128 if (!info->attrs[NLBL_MGMT_A_CLPDOI])
129 goto add_free_domain;
130
131 tmp_val = nla_get_u32(info->attrs[NLBL_MGMT_A_CLPDOI]);
132 calipso = calipso_doi_getdef(tmp_val);
133 if (calipso == NULL)
134 goto add_free_domain;
135 entry->family = AF_INET6;
136 entry->def.calipso = calipso;
137 break;
138#endif /* IPv6 */
139 default:
140 goto add_free_domain;
141 }
142
143 if ((entry->family == AF_INET && info->attrs[NLBL_MGMT_A_IPV6ADDR]) ||
144 (entry->family == AF_INET6 && info->attrs[NLBL_MGMT_A_IPV4ADDR]))
145 goto add_doi_put_def;
146
147 if (info->attrs[NLBL_MGMT_A_IPV4ADDR]) {
148 struct in_addr *addr;
149 struct in_addr *mask;
150 struct netlbl_domaddr4_map *map;
151
152 addrmap = kzalloc(sizeof(*addrmap), GFP_KERNEL);
153 if (addrmap == NULL) {
154 ret_val = -ENOMEM;
155 goto add_doi_put_def;
156 }
157 INIT_LIST_HEAD(&addrmap->list4);
158 INIT_LIST_HEAD(&addrmap->list6);
159
160 if (nla_len(info->attrs[NLBL_MGMT_A_IPV4ADDR]) !=
161 sizeof(struct in_addr)) {
162 ret_val = -EINVAL;
163 goto add_free_addrmap;
164 }
165 if (nla_len(info->attrs[NLBL_MGMT_A_IPV4MASK]) !=
166 sizeof(struct in_addr)) {
167 ret_val = -EINVAL;
168 goto add_free_addrmap;
169 }
170 addr = nla_data(info->attrs[NLBL_MGMT_A_IPV4ADDR]);
171 mask = nla_data(info->attrs[NLBL_MGMT_A_IPV4MASK]);
172
173 map = kzalloc(sizeof(*map), GFP_KERNEL);
174 if (map == NULL) {
175 ret_val = -ENOMEM;
176 goto add_free_addrmap;
177 }
178 map->list.addr = addr->s_addr & mask->s_addr;
179 map->list.mask = mask->s_addr;
180 map->list.valid = 1;
181 map->def.type = entry->def.type;
182 if (cipsov4)
183 map->def.cipso = cipsov4;
184
185 ret_val = netlbl_af4list_add(&map->list, &addrmap->list4);
186 if (ret_val != 0) {
187 kfree(map);
188 goto add_free_addrmap;
189 }
190
191 entry->family = AF_INET;
192 entry->def.type = NETLBL_NLTYPE_ADDRSELECT;
193 entry->def.addrsel = addrmap;
194#if IS_ENABLED(CONFIG_IPV6)
195 } else if (info->attrs[NLBL_MGMT_A_IPV6ADDR]) {
196 struct in6_addr *addr;
197 struct in6_addr *mask;
198 struct netlbl_domaddr6_map *map;
199
200 addrmap = kzalloc(sizeof(*addrmap), GFP_KERNEL);
201 if (addrmap == NULL) {
202 ret_val = -ENOMEM;
203 goto add_doi_put_def;
204 }
205 INIT_LIST_HEAD(&addrmap->list4);
206 INIT_LIST_HEAD(&addrmap->list6);
207
208 if (nla_len(info->attrs[NLBL_MGMT_A_IPV6ADDR]) !=
209 sizeof(struct in6_addr)) {
210 ret_val = -EINVAL;
211 goto add_free_addrmap;
212 }
213 if (nla_len(info->attrs[NLBL_MGMT_A_IPV6MASK]) !=
214 sizeof(struct in6_addr)) {
215 ret_val = -EINVAL;
216 goto add_free_addrmap;
217 }
218 addr = nla_data(info->attrs[NLBL_MGMT_A_IPV6ADDR]);
219 mask = nla_data(info->attrs[NLBL_MGMT_A_IPV6MASK]);
220
221 map = kzalloc(sizeof(*map), GFP_KERNEL);
222 if (map == NULL) {
223 ret_val = -ENOMEM;
224 goto add_free_addrmap;
225 }
226 map->list.addr = *addr;
227 map->list.addr.s6_addr32[0] &= mask->s6_addr32[0];
228 map->list.addr.s6_addr32[1] &= mask->s6_addr32[1];
229 map->list.addr.s6_addr32[2] &= mask->s6_addr32[2];
230 map->list.addr.s6_addr32[3] &= mask->s6_addr32[3];
231 map->list.mask = *mask;
232 map->list.valid = 1;
233 map->def.type = entry->def.type;
234 if (calipso)
235 map->def.calipso = calipso;
236
237 ret_val = netlbl_af6list_add(&map->list, &addrmap->list6);
238 if (ret_val != 0) {
239 kfree(map);
240 goto add_free_addrmap;
241 }
242
243 entry->family = AF_INET6;
244 entry->def.type = NETLBL_NLTYPE_ADDRSELECT;
245 entry->def.addrsel = addrmap;
246#endif /* IPv6 */
247 }
248
249 ret_val = netlbl_domhsh_add(entry, audit_info);
250 if (ret_val != 0)
251 goto add_free_addrmap;
252
253 return 0;
254
255add_free_addrmap:
256 kfree(addrmap);
257add_doi_put_def:
258 cipso_v4_doi_putdef(cipsov4);
259#if IS_ENABLED(CONFIG_IPV6)
260 calipso_doi_putdef(calipso);
261#endif
262add_free_domain:
263 kfree(entry->domain);
264add_free_entry:
265 kfree(entry);
266 return ret_val;
267}
268
269/**
270 * netlbl_mgmt_listentry - List a NetLabel/LSM domain map entry
271 * @skb: the NETLINK buffer
272 * @entry: the map entry
273 *
274 * Description:
275 * This function is a helper function used by the LISTALL and LISTDEF command
276 * handlers. The caller is responsible for ensuring that the RCU read lock
277 * is held. Returns zero on success, negative values on failure.
278 *
279 */
280static int netlbl_mgmt_listentry(struct sk_buff *skb,
281 struct netlbl_dom_map *entry)
282{
283 int ret_val = 0;
284 struct nlattr *nla_a;
285 struct nlattr *nla_b;
286 struct netlbl_af4list *iter4;
287#if IS_ENABLED(CONFIG_IPV6)
288 struct netlbl_af6list *iter6;
289#endif
290
291 if (entry->domain != NULL) {
292 ret_val = nla_put_string(skb,
293 NLBL_MGMT_A_DOMAIN, entry->domain);
294 if (ret_val != 0)
295 return ret_val;
296 }
297
298 ret_val = nla_put_u16(skb, NLBL_MGMT_A_FAMILY, entry->family);
299 if (ret_val != 0)
300 return ret_val;
301
302 switch (entry->def.type) {
303 case NETLBL_NLTYPE_ADDRSELECT:
304 nla_a = nla_nest_start_noflag(skb, NLBL_MGMT_A_SELECTORLIST);
305 if (nla_a == NULL)
306 return -ENOMEM;
307
308 netlbl_af4list_foreach_rcu(iter4, &entry->def.addrsel->list4) {
309 struct netlbl_domaddr4_map *map4;
310 struct in_addr addr_struct;
311
312 nla_b = nla_nest_start_noflag(skb,
313 NLBL_MGMT_A_ADDRSELECTOR);
314 if (nla_b == NULL)
315 return -ENOMEM;
316
317 addr_struct.s_addr = iter4->addr;
318 ret_val = nla_put_in_addr(skb, NLBL_MGMT_A_IPV4ADDR,
319 addr_struct.s_addr);
320 if (ret_val != 0)
321 return ret_val;
322 addr_struct.s_addr = iter4->mask;
323 ret_val = nla_put_in_addr(skb, NLBL_MGMT_A_IPV4MASK,
324 addr_struct.s_addr);
325 if (ret_val != 0)
326 return ret_val;
327 map4 = netlbl_domhsh_addr4_entry(iter4);
328 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
329 map4->def.type);
330 if (ret_val != 0)
331 return ret_val;
332 switch (map4->def.type) {
333 case NETLBL_NLTYPE_CIPSOV4:
334 ret_val = nla_put_u32(skb, NLBL_MGMT_A_CV4DOI,
335 map4->def.cipso->doi);
336 if (ret_val != 0)
337 return ret_val;
338 break;
339 }
340
341 nla_nest_end(skb, nla_b);
342 }
343#if IS_ENABLED(CONFIG_IPV6)
344 netlbl_af6list_foreach_rcu(iter6, &entry->def.addrsel->list6) {
345 struct netlbl_domaddr6_map *map6;
346
347 nla_b = nla_nest_start_noflag(skb,
348 NLBL_MGMT_A_ADDRSELECTOR);
349 if (nla_b == NULL)
350 return -ENOMEM;
351
352 ret_val = nla_put_in6_addr(skb, NLBL_MGMT_A_IPV6ADDR,
353 &iter6->addr);
354 if (ret_val != 0)
355 return ret_val;
356 ret_val = nla_put_in6_addr(skb, NLBL_MGMT_A_IPV6MASK,
357 &iter6->mask);
358 if (ret_val != 0)
359 return ret_val;
360 map6 = netlbl_domhsh_addr6_entry(iter6);
361 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
362 map6->def.type);
363 if (ret_val != 0)
364 return ret_val;
365
366 switch (map6->def.type) {
367 case NETLBL_NLTYPE_CALIPSO:
368 ret_val = nla_put_u32(skb, NLBL_MGMT_A_CLPDOI,
369 map6->def.calipso->doi);
370 if (ret_val != 0)
371 return ret_val;
372 break;
373 }
374
375 nla_nest_end(skb, nla_b);
376 }
377#endif /* IPv6 */
378
379 nla_nest_end(skb, nla_a);
380 break;
381 case NETLBL_NLTYPE_UNLABELED:
382 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
383 entry->def.type);
384 break;
385 case NETLBL_NLTYPE_CIPSOV4:
386 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
387 entry->def.type);
388 if (ret_val != 0)
389 return ret_val;
390 ret_val = nla_put_u32(skb, NLBL_MGMT_A_CV4DOI,
391 entry->def.cipso->doi);
392 break;
393 case NETLBL_NLTYPE_CALIPSO:
394 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL,
395 entry->def.type);
396 if (ret_val != 0)
397 return ret_val;
398 ret_val = nla_put_u32(skb, NLBL_MGMT_A_CLPDOI,
399 entry->def.calipso->doi);
400 break;
401 }
402
403 return ret_val;
404}
405
406/*
407 * NetLabel Command Handlers
408 */
409
410/**
411 * netlbl_mgmt_add - Handle an ADD message
412 * @skb: the NETLINK buffer
413 * @info: the Generic NETLINK info block
414 *
415 * Description:
416 * Process a user generated ADD message and add the domains from the message
417 * to the hash table. See netlabel.h for a description of the message format.
418 * Returns zero on success, negative values on failure.
419 *
420 */
421static int netlbl_mgmt_add(struct sk_buff *skb, struct genl_info *info)
422{
423 struct netlbl_audit audit_info;
424
425 if ((!info->attrs[NLBL_MGMT_A_DOMAIN]) ||
426 (!info->attrs[NLBL_MGMT_A_PROTOCOL]) ||
427 (info->attrs[NLBL_MGMT_A_IPV4ADDR] &&
428 info->attrs[NLBL_MGMT_A_IPV6ADDR]) ||
429 (info->attrs[NLBL_MGMT_A_IPV4MASK] &&
430 info->attrs[NLBL_MGMT_A_IPV6MASK]) ||
431 ((info->attrs[NLBL_MGMT_A_IPV4ADDR] != NULL) ^
432 (info->attrs[NLBL_MGMT_A_IPV4MASK] != NULL)) ||
433 ((info->attrs[NLBL_MGMT_A_IPV6ADDR] != NULL) ^
434 (info->attrs[NLBL_MGMT_A_IPV6MASK] != NULL)))
435 return -EINVAL;
436
437 netlbl_netlink_auditinfo(skb, &audit_info);
438
439 return netlbl_mgmt_add_common(info, &audit_info);
440}
441
442/**
443 * netlbl_mgmt_remove - Handle a REMOVE message
444 * @skb: the NETLINK buffer
445 * @info: the Generic NETLINK info block
446 *
447 * Description:
448 * Process a user generated REMOVE message and remove the specified domain
449 * mappings. Returns zero on success, negative values on failure.
450 *
451 */
452static int netlbl_mgmt_remove(struct sk_buff *skb, struct genl_info *info)
453{
454 char *domain;
455 struct netlbl_audit audit_info;
456
457 if (!info->attrs[NLBL_MGMT_A_DOMAIN])
458 return -EINVAL;
459
460 netlbl_netlink_auditinfo(skb, &audit_info);
461
462 domain = nla_data(info->attrs[NLBL_MGMT_A_DOMAIN]);
463 return netlbl_domhsh_remove(domain, AF_UNSPEC, &audit_info);
464}
465
466/**
467 * netlbl_mgmt_listall_cb - netlbl_domhsh_walk() callback for LISTALL
468 * @entry: the domain mapping hash table entry
469 * @arg: the netlbl_domhsh_walk_arg structure
470 *
471 * Description:
472 * This function is designed to be used as a callback to the
473 * netlbl_domhsh_walk() function for use in generating a response for a LISTALL
474 * message. Returns the size of the message on success, negative values on
475 * failure.
476 *
477 */
478static int netlbl_mgmt_listall_cb(struct netlbl_dom_map *entry, void *arg)
479{
480 int ret_val = -ENOMEM;
481 struct netlbl_domhsh_walk_arg *cb_arg = arg;
482 void *data;
483
484 data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).portid,
485 cb_arg->seq, &netlbl_mgmt_gnl_family,
486 NLM_F_MULTI, NLBL_MGMT_C_LISTALL);
487 if (data == NULL)
488 goto listall_cb_failure;
489
490 ret_val = netlbl_mgmt_listentry(cb_arg->skb, entry);
491 if (ret_val != 0)
492 goto listall_cb_failure;
493
494 cb_arg->seq++;
495 genlmsg_end(cb_arg->skb, data);
496 return 0;
497
498listall_cb_failure:
499 genlmsg_cancel(cb_arg->skb, data);
500 return ret_val;
501}
502
503/**
504 * netlbl_mgmt_listall - Handle a LISTALL message
505 * @skb: the NETLINK buffer
506 * @cb: the NETLINK callback
507 *
508 * Description:
509 * Process a user generated LISTALL message and dumps the domain hash table in
510 * a form suitable for use in a kernel generated LISTALL message. Returns zero
511 * on success, negative values on failure.
512 *
513 */
514static int netlbl_mgmt_listall(struct sk_buff *skb,
515 struct netlink_callback *cb)
516{
517 struct netlbl_domhsh_walk_arg cb_arg;
518 u32 skip_bkt = cb->args[0];
519 u32 skip_chain = cb->args[1];
520
521 cb_arg.nl_cb = cb;
522 cb_arg.skb = skb;
523 cb_arg.seq = cb->nlh->nlmsg_seq;
524
525 netlbl_domhsh_walk(&skip_bkt,
526 &skip_chain,
527 netlbl_mgmt_listall_cb,
528 &cb_arg);
529
530 cb->args[0] = skip_bkt;
531 cb->args[1] = skip_chain;
532 return skb->len;
533}
534
535/**
536 * netlbl_mgmt_adddef - Handle an ADDDEF message
537 * @skb: the NETLINK buffer
538 * @info: the Generic NETLINK info block
539 *
540 * Description:
541 * Process a user generated ADDDEF message and respond accordingly. Returns
542 * zero on success, negative values on failure.
543 *
544 */
545static int netlbl_mgmt_adddef(struct sk_buff *skb, struct genl_info *info)
546{
547 struct netlbl_audit audit_info;
548
549 if ((!info->attrs[NLBL_MGMT_A_PROTOCOL]) ||
550 (info->attrs[NLBL_MGMT_A_IPV4ADDR] &&
551 info->attrs[NLBL_MGMT_A_IPV6ADDR]) ||
552 (info->attrs[NLBL_MGMT_A_IPV4MASK] &&
553 info->attrs[NLBL_MGMT_A_IPV6MASK]) ||
554 ((info->attrs[NLBL_MGMT_A_IPV4ADDR] != NULL) ^
555 (info->attrs[NLBL_MGMT_A_IPV4MASK] != NULL)) ||
556 ((info->attrs[NLBL_MGMT_A_IPV6ADDR] != NULL) ^
557 (info->attrs[NLBL_MGMT_A_IPV6MASK] != NULL)))
558 return -EINVAL;
559
560 netlbl_netlink_auditinfo(skb, &audit_info);
561
562 return netlbl_mgmt_add_common(info, &audit_info);
563}
564
565/**
566 * netlbl_mgmt_removedef - Handle a REMOVEDEF message
567 * @skb: the NETLINK buffer
568 * @info: the Generic NETLINK info block
569 *
570 * Description:
571 * Process a user generated REMOVEDEF message and remove the default domain
572 * mapping. Returns zero on success, negative values on failure.
573 *
574 */
575static int netlbl_mgmt_removedef(struct sk_buff *skb, struct genl_info *info)
576{
577 struct netlbl_audit audit_info;
578
579 netlbl_netlink_auditinfo(skb, &audit_info);
580
581 return netlbl_domhsh_remove_default(AF_UNSPEC, &audit_info);
582}
583
584/**
585 * netlbl_mgmt_listdef - Handle a LISTDEF message
586 * @skb: the NETLINK buffer
587 * @info: the Generic NETLINK info block
588 *
589 * Description:
590 * Process a user generated LISTDEF message and dumps the default domain
591 * mapping in a form suitable for use in a kernel generated LISTDEF message.
592 * Returns zero on success, negative values on failure.
593 *
594 */
595static int netlbl_mgmt_listdef(struct sk_buff *skb, struct genl_info *info)
596{
597 int ret_val = -ENOMEM;
598 struct sk_buff *ans_skb = NULL;
599 void *data;
600 struct netlbl_dom_map *entry;
601 u16 family;
602
603 if (info->attrs[NLBL_MGMT_A_FAMILY])
604 family = nla_get_u16(info->attrs[NLBL_MGMT_A_FAMILY]);
605 else
606 family = AF_INET;
607
608 ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
609 if (ans_skb == NULL)
610 return -ENOMEM;
611 data = genlmsg_put_reply(ans_skb, info, &netlbl_mgmt_gnl_family,
612 0, NLBL_MGMT_C_LISTDEF);
613 if (data == NULL)
614 goto listdef_failure;
615
616 rcu_read_lock();
617 entry = netlbl_domhsh_getentry(NULL, family);
618 if (entry == NULL) {
619 ret_val = -ENOENT;
620 goto listdef_failure_lock;
621 }
622 ret_val = netlbl_mgmt_listentry(ans_skb, entry);
623 rcu_read_unlock();
624 if (ret_val != 0)
625 goto listdef_failure;
626
627 genlmsg_end(ans_skb, data);
628 return genlmsg_reply(ans_skb, info);
629
630listdef_failure_lock:
631 rcu_read_unlock();
632listdef_failure:
633 kfree_skb(ans_skb);
634 return ret_val;
635}
636
637/**
638 * netlbl_mgmt_protocols_cb - Write an individual PROTOCOL message response
639 * @skb: the skb to write to
640 * @cb: the NETLINK callback
641 * @protocol: the NetLabel protocol to use in the message
642 *
643 * Description:
644 * This function is to be used in conjunction with netlbl_mgmt_protocols() to
645 * answer a application's PROTOCOLS message. Returns the size of the message
646 * on success, negative values on failure.
647 *
648 */
649static int netlbl_mgmt_protocols_cb(struct sk_buff *skb,
650 struct netlink_callback *cb,
651 u32 protocol)
652{
653 int ret_val = -ENOMEM;
654 void *data;
655
656 data = genlmsg_put(skb, NETLINK_CB(cb->skb).portid, cb->nlh->nlmsg_seq,
657 &netlbl_mgmt_gnl_family, NLM_F_MULTI,
658 NLBL_MGMT_C_PROTOCOLS);
659 if (data == NULL)
660 goto protocols_cb_failure;
661
662 ret_val = nla_put_u32(skb, NLBL_MGMT_A_PROTOCOL, protocol);
663 if (ret_val != 0)
664 goto protocols_cb_failure;
665
666 genlmsg_end(skb, data);
667 return 0;
668
669protocols_cb_failure:
670 genlmsg_cancel(skb, data);
671 return ret_val;
672}
673
674/**
675 * netlbl_mgmt_protocols - Handle a PROTOCOLS message
676 * @skb: the NETLINK buffer
677 * @cb: the NETLINK callback
678 *
679 * Description:
680 * Process a user generated PROTOCOLS message and respond accordingly.
681 *
682 */
683static int netlbl_mgmt_protocols(struct sk_buff *skb,
684 struct netlink_callback *cb)
685{
686 u32 protos_sent = cb->args[0];
687
688 if (protos_sent == 0) {
689 if (netlbl_mgmt_protocols_cb(skb,
690 cb,
691 NETLBL_NLTYPE_UNLABELED) < 0)
692 goto protocols_return;
693 protos_sent++;
694 }
695 if (protos_sent == 1) {
696 if (netlbl_mgmt_protocols_cb(skb,
697 cb,
698 NETLBL_NLTYPE_CIPSOV4) < 0)
699 goto protocols_return;
700 protos_sent++;
701 }
702#if IS_ENABLED(CONFIG_IPV6)
703 if (protos_sent == 2) {
704 if (netlbl_mgmt_protocols_cb(skb,
705 cb,
706 NETLBL_NLTYPE_CALIPSO) < 0)
707 goto protocols_return;
708 protos_sent++;
709 }
710#endif
711
712protocols_return:
713 cb->args[0] = protos_sent;
714 return skb->len;
715}
716
717/**
718 * netlbl_mgmt_version - Handle a VERSION message
719 * @skb: the NETLINK buffer
720 * @info: the Generic NETLINK info block
721 *
722 * Description:
723 * Process a user generated VERSION message and respond accordingly. Returns
724 * zero on success, negative values on failure.
725 *
726 */
727static int netlbl_mgmt_version(struct sk_buff *skb, struct genl_info *info)
728{
729 int ret_val = -ENOMEM;
730 struct sk_buff *ans_skb = NULL;
731 void *data;
732
733 ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
734 if (ans_skb == NULL)
735 return -ENOMEM;
736 data = genlmsg_put_reply(ans_skb, info, &netlbl_mgmt_gnl_family,
737 0, NLBL_MGMT_C_VERSION);
738 if (data == NULL)
739 goto version_failure;
740
741 ret_val = nla_put_u32(ans_skb,
742 NLBL_MGMT_A_VERSION,
743 NETLBL_PROTO_VERSION);
744 if (ret_val != 0)
745 goto version_failure;
746
747 genlmsg_end(ans_skb, data);
748 return genlmsg_reply(ans_skb, info);
749
750version_failure:
751 kfree_skb(ans_skb);
752 return ret_val;
753}
754
755
756/*
757 * NetLabel Generic NETLINK Command Definitions
758 */
759
760static const struct genl_ops netlbl_mgmt_genl_ops[] = {
761 {
762 .cmd = NLBL_MGMT_C_ADD,
763 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
764 .flags = GENL_ADMIN_PERM,
765 .doit = netlbl_mgmt_add,
766 .dumpit = NULL,
767 },
768 {
769 .cmd = NLBL_MGMT_C_REMOVE,
770 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
771 .flags = GENL_ADMIN_PERM,
772 .doit = netlbl_mgmt_remove,
773 .dumpit = NULL,
774 },
775 {
776 .cmd = NLBL_MGMT_C_LISTALL,
777 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
778 .flags = 0,
779 .doit = NULL,
780 .dumpit = netlbl_mgmt_listall,
781 },
782 {
783 .cmd = NLBL_MGMT_C_ADDDEF,
784 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
785 .flags = GENL_ADMIN_PERM,
786 .doit = netlbl_mgmt_adddef,
787 .dumpit = NULL,
788 },
789 {
790 .cmd = NLBL_MGMT_C_REMOVEDEF,
791 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
792 .flags = GENL_ADMIN_PERM,
793 .doit = netlbl_mgmt_removedef,
794 .dumpit = NULL,
795 },
796 {
797 .cmd = NLBL_MGMT_C_LISTDEF,
798 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
799 .flags = 0,
800 .doit = netlbl_mgmt_listdef,
801 .dumpit = NULL,
802 },
803 {
804 .cmd = NLBL_MGMT_C_PROTOCOLS,
805 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
806 .flags = 0,
807 .doit = NULL,
808 .dumpit = netlbl_mgmt_protocols,
809 },
810 {
811 .cmd = NLBL_MGMT_C_VERSION,
812 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP,
813 .flags = 0,
814 .doit = netlbl_mgmt_version,
815 .dumpit = NULL,
816 },
817};
818
819static struct genl_family netlbl_mgmt_gnl_family __ro_after_init = {
820 .hdrsize = 0,
821 .name = NETLBL_NLTYPE_MGMT_NAME,
822 .version = NETLBL_PROTO_VERSION,
823 .maxattr = NLBL_MGMT_A_MAX,
824 .policy = netlbl_mgmt_genl_policy,
825 .module = THIS_MODULE,
826 .ops = netlbl_mgmt_genl_ops,
827 .n_ops = ARRAY_SIZE(netlbl_mgmt_genl_ops),
828};
829
830/*
831 * NetLabel Generic NETLINK Protocol Functions
832 */
833
834/**
835 * netlbl_mgmt_genl_init - Register the NetLabel management component
836 *
837 * Description:
838 * Register the NetLabel management component with the Generic NETLINK
839 * mechanism. Returns zero on success, negative values on failure.
840 *
841 */
842int __init netlbl_mgmt_genl_init(void)
843{
844 return genl_register_family(&netlbl_mgmt_gnl_family);
845}