1 // SPDX-License-Identifier: GPL-2.0-or-later 2 /* 3 * NetLabel Unlabeled Support 4 * 5 * This file defines functions for dealing with unlabeled packets for the 6 * NetLabel system. The NetLabel system manages static and dynamic label 7 * mappings for network protocols such as CIPSO and RIPSO. 8 * 9 * Author: Paul Moore <paul@paul-moore.com> 10 */ 11 12 /* 13 * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 - 2008 14 */ 15 16 #include <linux/types.h> 17 #include <linux/rcupdate.h> 18 #include <linux/list.h> 19 #include <linux/spinlock.h> 20 #include <linux/socket.h> 21 #include <linux/string.h> 22 #include <linux/skbuff.h> 23 #include <linux/audit.h> 24 #include <linux/in.h> 25 #include <linux/in6.h> 26 #include <linux/ip.h> 27 #include <linux/ipv6.h> 28 #include <linux/notifier.h> 29 #include <linux/netdevice.h> 30 #include <linux/security.h> 31 #include <linux/slab.h> 32 #include <net/sock.h> 33 #include <net/netlink.h> 34 #include <net/genetlink.h> 35 #include <net/ip.h> 36 #include <net/ipv6.h> 37 #include <net/net_namespace.h> 38 #include <net/netlabel.h> 39 #include <asm/bug.h> 40 #include <linux/atomic.h> 41 42 #include "netlabel_user.h" 43 #include "netlabel_addrlist.h" 44 #include "netlabel_domainhash.h" 45 #include "netlabel_unlabeled.h" 46 #include "netlabel_mgmt.h" 47 48 /* NOTE: at present we always use init's network namespace since we don't 49 * presently support different namespaces even though the majority of 50 * the functions in this file are "namespace safe" */ 51 52 /* The unlabeled connection hash table which we use to map network interfaces 53 * and addresses of unlabeled packets to a user specified secid value for the 54 * LSM. The hash table is used to lookup the network interface entry 55 * (struct netlbl_unlhsh_iface) and then the interface entry is used to 56 * lookup an IP address match from an ordered list. If a network interface 57 * match can not be found in the hash table then the default entry 58 * (netlbl_unlhsh_def) is used. The IP address entry list 59 * (struct netlbl_unlhsh_addr) is ordered such that the entries with a 60 * larger netmask come first. 61 */ 62 struct netlbl_unlhsh_tbl { 63 struct list_head *tbl; 64 u32 size; 65 }; 66 #define netlbl_unlhsh_addr4_entry(iter) \ 67 container_of(iter, struct netlbl_unlhsh_addr4, list) 68 struct netlbl_unlhsh_addr4 { 69 u32 secid; 70 71 struct netlbl_af4list list; 72 struct rcu_head rcu; 73 }; 74 #define netlbl_unlhsh_addr6_entry(iter) \ 75 container_of(iter, struct netlbl_unlhsh_addr6, list) 76 struct netlbl_unlhsh_addr6 { 77 u32 secid; 78 79 struct netlbl_af6list list; 80 struct rcu_head rcu; 81 }; 82 struct netlbl_unlhsh_iface { 83 int ifindex; 84 struct list_head addr4_list; 85 struct list_head addr6_list; 86 87 u32 valid; 88 struct list_head list; 89 struct rcu_head rcu; 90 }; 91 92 /* Argument struct for netlbl_unlhsh_walk() */ 93 struct netlbl_unlhsh_walk_arg { 94 struct netlink_callback *nl_cb; 95 struct sk_buff *skb; 96 u32 seq; 97 }; 98 99 /* Unlabeled connection hash table */ 100 /* updates should be so rare that having one spinlock for the entire 101 * hash table should be okay */ 102 static DEFINE_SPINLOCK(netlbl_unlhsh_lock); 103 #define netlbl_unlhsh_rcu_deref(p) \ 104 rcu_dereference_check(p, lockdep_is_held(&netlbl_unlhsh_lock)) 105 static struct netlbl_unlhsh_tbl __rcu *netlbl_unlhsh; 106 static struct netlbl_unlhsh_iface __rcu *netlbl_unlhsh_def; 107 108 /* Accept unlabeled packets flag */ 109 static u8 netlabel_unlabel_acceptflg; 110 111 /* NetLabel Generic NETLINK unlabeled family */ 112 static struct genl_family netlbl_unlabel_gnl_family; 113 114 /* NetLabel Netlink attribute policy */ 115 static const struct nla_policy netlbl_unlabel_genl_policy[NLBL_UNLABEL_A_MAX + 1] = { 116 [NLBL_UNLABEL_A_ACPTFLG] = { .type = NLA_U8 }, 117 [NLBL_UNLABEL_A_IPV6ADDR] = { .type = NLA_BINARY, 118 .len = sizeof(struct in6_addr) }, 119 [NLBL_UNLABEL_A_IPV6MASK] = { .type = NLA_BINARY, 120 .len = sizeof(struct in6_addr) }, 121 [NLBL_UNLABEL_A_IPV4ADDR] = { .type = NLA_BINARY, 122 .len = sizeof(struct in_addr) }, 123 [NLBL_UNLABEL_A_IPV4MASK] = { .type = NLA_BINARY, 124 .len = sizeof(struct in_addr) }, 125 [NLBL_UNLABEL_A_IFACE] = { .type = NLA_NUL_STRING, 126 .len = IFNAMSIZ - 1 }, 127 [NLBL_UNLABEL_A_SECCTX] = { .type = NLA_BINARY } 128 }; 129 130 /* 131 * Unlabeled Connection Hash Table Functions 132 */ 133 134 /** 135 * netlbl_unlhsh_free_iface - Frees an interface entry from the hash table 136 * @entry: the entry's RCU field 137 * 138 * Description: 139 * This function is designed to be used as a callback to the call_rcu() 140 * function so that memory allocated to a hash table interface entry can be 141 * released safely. It is important to note that this function does not free 142 * the IPv4 and IPv6 address lists contained as part of an interface entry. It 143 * is up to the rest of the code to make sure an interface entry is only freed 144 * once it's address lists are empty. 145 * 146 */ 147 static void netlbl_unlhsh_free_iface(struct rcu_head *entry) 148 { 149 struct netlbl_unlhsh_iface *iface; 150 struct netlbl_af4list *iter4; 151 struct netlbl_af4list *tmp4; 152 #if IS_ENABLED(CONFIG_IPV6) 153 struct netlbl_af6list *iter6; 154 struct netlbl_af6list *tmp6; 155 #endif /* IPv6 */ 156 157 iface = container_of(entry, struct netlbl_unlhsh_iface, rcu); 158 159 /* no need for locks here since we are the only one with access to this 160 * structure */ 161 162 netlbl_af4list_foreach_safe(iter4, tmp4, &iface->addr4_list) { 163 netlbl_af4list_remove_entry(iter4); 164 kfree(netlbl_unlhsh_addr4_entry(iter4)); 165 } 166 #if IS_ENABLED(CONFIG_IPV6) 167 netlbl_af6list_foreach_safe(iter6, tmp6, &iface->addr6_list) { 168 netlbl_af6list_remove_entry(iter6); 169 kfree(netlbl_unlhsh_addr6_entry(iter6)); 170 } 171 #endif /* IPv6 */ 172 kfree(iface); 173 } 174 175 /** 176 * netlbl_unlhsh_hash - Hashing function for the hash table 177 * @ifindex: the network interface/device to hash 178 * 179 * Description: 180 * This is the hashing function for the unlabeled hash table, it returns the 181 * bucket number for the given device/interface. The caller is responsible for 182 * ensuring that the hash table is protected with either a RCU read lock or 183 * the hash table lock. 184 * 185 */ 186 static u32 netlbl_unlhsh_hash(int ifindex) 187 { 188 return ifindex & (netlbl_unlhsh_rcu_deref(netlbl_unlhsh)->size - 1); 189 } 190 191 /** 192 * netlbl_unlhsh_search_iface - Search for a matching interface entry 193 * @ifindex: the network interface 194 * 195 * Description: 196 * Searches the unlabeled connection hash table and returns a pointer to the 197 * interface entry which matches @ifindex, otherwise NULL is returned. The 198 * caller is responsible for ensuring that the hash table is protected with 199 * either a RCU read lock or the hash table lock. 200 * 201 */ 202 static struct netlbl_unlhsh_iface *netlbl_unlhsh_search_iface(int ifindex) 203 { 204 u32 bkt; 205 struct list_head *bkt_list; 206 struct netlbl_unlhsh_iface *iter; 207 208 bkt = netlbl_unlhsh_hash(ifindex); 209 bkt_list = &netlbl_unlhsh_rcu_deref(netlbl_unlhsh)->tbl[bkt]; 210 list_for_each_entry_rcu(iter, bkt_list, list, 211 lockdep_is_held(&netlbl_unlhsh_lock)) 212 if (iter->valid && iter->ifindex == ifindex) 213 return iter; 214 215 return NULL; 216 } 217 218 /** 219 * netlbl_unlhsh_add_addr4 - Add a new IPv4 address entry to the hash table 220 * @iface: the associated interface entry 221 * @addr: IPv4 address in network byte order 222 * @mask: IPv4 address mask in network byte order 223 * @secid: LSM secid value for entry 224 * 225 * Description: 226 * Add a new address entry into the unlabeled connection hash table using the 227 * interface entry specified by @iface. On success zero is returned, otherwise 228 * a negative value is returned. 229 * 230 */ 231 static int netlbl_unlhsh_add_addr4(struct netlbl_unlhsh_iface *iface, 232 const struct in_addr *addr, 233 const struct in_addr *mask, 234 u32 secid) 235 { 236 int ret_val; 237 struct netlbl_unlhsh_addr4 *entry; 238 239 entry = kzalloc(sizeof(*entry), GFP_ATOMIC); 240 if (entry == NULL) 241 return -ENOMEM; 242 243 entry->list.addr = addr->s_addr & mask->s_addr; 244 entry->list.mask = mask->s_addr; 245 entry->list.valid = 1; 246 entry->secid = secid; 247 248 spin_lock(&netlbl_unlhsh_lock); 249 ret_val = netlbl_af4list_add(&entry->list, &iface->addr4_list); 250 spin_unlock(&netlbl_unlhsh_lock); 251 252 if (ret_val != 0) 253 kfree(entry); 254 return ret_val; 255 } 256 257 #if IS_ENABLED(CONFIG_IPV6) 258 /** 259 * netlbl_unlhsh_add_addr6 - Add a new IPv6 address entry to the hash table 260 * @iface: the associated interface entry 261 * @addr: IPv6 address in network byte order 262 * @mask: IPv6 address mask in network byte order 263 * @secid: LSM secid value for entry 264 * 265 * Description: 266 * Add a new address entry into the unlabeled connection hash table using the 267 * interface entry specified by @iface. On success zero is returned, otherwise 268 * a negative value is returned. 269 * 270 */ 271 static int netlbl_unlhsh_add_addr6(struct netlbl_unlhsh_iface *iface, 272 const struct in6_addr *addr, 273 const struct in6_addr *mask, 274 u32 secid) 275 { 276 int ret_val; 277 struct netlbl_unlhsh_addr6 *entry; 278 279 entry = kzalloc(sizeof(*entry), GFP_ATOMIC); 280 if (entry == NULL) 281 return -ENOMEM; 282 283 entry->list.addr = *addr; 284 entry->list.addr.s6_addr32[0] &= mask->s6_addr32[0]; 285 entry->list.addr.s6_addr32[1] &= mask->s6_addr32[1]; 286 entry->list.addr.s6_addr32[2] &= mask->s6_addr32[2]; 287 entry->list.addr.s6_addr32[3] &= mask->s6_addr32[3]; 288 entry->list.mask = *mask; 289 entry->list.valid = 1; 290 entry->secid = secid; 291 292 spin_lock(&netlbl_unlhsh_lock); 293 ret_val = netlbl_af6list_add(&entry->list, &iface->addr6_list); 294 spin_unlock(&netlbl_unlhsh_lock); 295 296 if (ret_val != 0) 297 kfree(entry); 298 return 0; 299 } 300 #endif /* IPv6 */ 301 302 /** 303 * netlbl_unlhsh_add_iface - Adds a new interface entry to the hash table 304 * @ifindex: network interface 305 * 306 * Description: 307 * Add a new, empty, interface entry into the unlabeled connection hash table. 308 * On success a pointer to the new interface entry is returned, on failure NULL 309 * is returned. 310 * 311 */ 312 static struct netlbl_unlhsh_iface *netlbl_unlhsh_add_iface(int ifindex) 313 { 314 u32 bkt; 315 struct netlbl_unlhsh_iface *iface; 316 317 iface = kzalloc(sizeof(*iface), GFP_ATOMIC); 318 if (iface == NULL) 319 return NULL; 320 321 iface->ifindex = ifindex; 322 INIT_LIST_HEAD(&iface->addr4_list); 323 INIT_LIST_HEAD(&iface->addr6_list); 324 iface->valid = 1; 325 326 spin_lock(&netlbl_unlhsh_lock); 327 if (ifindex > 0) { 328 bkt = netlbl_unlhsh_hash(ifindex); 329 if (netlbl_unlhsh_search_iface(ifindex) != NULL) 330 goto add_iface_failure; 331 list_add_tail_rcu(&iface->list, 332 &netlbl_unlhsh_rcu_deref(netlbl_unlhsh)->tbl[bkt]); 333 } else { 334 INIT_LIST_HEAD(&iface->list); 335 if (netlbl_unlhsh_rcu_deref(netlbl_unlhsh_def) != NULL) 336 goto add_iface_failure; 337 rcu_assign_pointer(netlbl_unlhsh_def, iface); 338 } 339 spin_unlock(&netlbl_unlhsh_lock); 340 341 return iface; 342 343 add_iface_failure: 344 spin_unlock(&netlbl_unlhsh_lock); 345 kfree(iface); 346 return NULL; 347 } 348 349 /** 350 * netlbl_unlhsh_add - Adds a new entry to the unlabeled connection hash table 351 * @net: network namespace 352 * @dev_name: interface name 353 * @addr: IP address in network byte order 354 * @mask: address mask in network byte order 355 * @addr_len: length of address/mask (4 for IPv4, 16 for IPv6) 356 * @secid: LSM secid value for the entry 357 * @audit_info: NetLabel audit information 358 * 359 * Description: 360 * Adds a new entry to the unlabeled connection hash table. Returns zero on 361 * success, negative values on failure. 362 * 363 */ 364 int netlbl_unlhsh_add(struct net *net, 365 const char *dev_name, 366 const void *addr, 367 const void *mask, 368 u32 addr_len, 369 u32 secid, 370 struct netlbl_audit *audit_info) 371 { 372 int ret_val; 373 int ifindex; 374 struct net_device *dev; 375 struct netlbl_unlhsh_iface *iface; 376 struct audit_buffer *audit_buf = NULL; 377 char *secctx = NULL; 378 u32 secctx_len; 379 380 if (addr_len != sizeof(struct in_addr) && 381 addr_len != sizeof(struct in6_addr)) 382 return -EINVAL; 383 384 rcu_read_lock(); 385 if (dev_name != NULL) { 386 dev = dev_get_by_name_rcu(net, dev_name); 387 if (dev == NULL) { 388 ret_val = -ENODEV; 389 goto unlhsh_add_return; 390 } 391 ifindex = dev->ifindex; 392 iface = netlbl_unlhsh_search_iface(ifindex); 393 } else { 394 ifindex = 0; 395 iface = rcu_dereference(netlbl_unlhsh_def); 396 } 397 if (iface == NULL) { 398 iface = netlbl_unlhsh_add_iface(ifindex); 399 if (iface == NULL) { 400 ret_val = -ENOMEM; 401 goto unlhsh_add_return; 402 } 403 } 404 audit_buf = netlbl_audit_start_common(AUDIT_MAC_UNLBL_STCADD, 405 audit_info); 406 switch (addr_len) { 407 case sizeof(struct in_addr): { 408 const struct in_addr *addr4 = addr; 409 const struct in_addr *mask4 = mask; 410 411 ret_val = netlbl_unlhsh_add_addr4(iface, addr4, mask4, secid); 412 if (audit_buf != NULL) 413 netlbl_af4list_audit_addr(audit_buf, 1, 414 dev_name, 415 addr4->s_addr, 416 mask4->s_addr); 417 break; 418 } 419 #if IS_ENABLED(CONFIG_IPV6) 420 case sizeof(struct in6_addr): { 421 const struct in6_addr *addr6 = addr; 422 const struct in6_addr *mask6 = mask; 423 424 ret_val = netlbl_unlhsh_add_addr6(iface, addr6, mask6, secid); 425 if (audit_buf != NULL) 426 netlbl_af6list_audit_addr(audit_buf, 1, 427 dev_name, 428 addr6, mask6); 429 break; 430 } 431 #endif /* IPv6 */ 432 default: 433 ret_val = -EINVAL; 434 } 435 if (ret_val == 0) 436 atomic_inc(&netlabel_mgmt_protocount); 437 438 unlhsh_add_return: 439 rcu_read_unlock(); 440 if (audit_buf != NULL) { 441 if (security_secid_to_secctx(secid, 442 &secctx, 443 &secctx_len) == 0) { 444 audit_log_format(audit_buf, " sec_obj=%s", secctx); 445 security_release_secctx(secctx, secctx_len); 446 } 447 audit_log_format(audit_buf, " res=%u", ret_val == 0 ? 1 : 0); 448 audit_log_end(audit_buf); 449 } 450 return ret_val; 451 } 452 453 /** 454 * netlbl_unlhsh_remove_addr4 - Remove an IPv4 address entry 455 * @net: network namespace 456 * @iface: interface entry 457 * @addr: IP address 458 * @mask: IP address mask 459 * @audit_info: NetLabel audit information 460 * 461 * Description: 462 * Remove an IP address entry from the unlabeled connection hash table. 463 * Returns zero on success, negative values on failure. 464 * 465 */ 466 static int netlbl_unlhsh_remove_addr4(struct net *net, 467 struct netlbl_unlhsh_iface *iface, 468 const struct in_addr *addr, 469 const struct in_addr *mask, 470 struct netlbl_audit *audit_info) 471 { 472 struct netlbl_af4list *list_entry; 473 struct netlbl_unlhsh_addr4 *entry; 474 struct audit_buffer *audit_buf; 475 struct net_device *dev; 476 char *secctx; 477 u32 secctx_len; 478 479 spin_lock(&netlbl_unlhsh_lock); 480 list_entry = netlbl_af4list_remove(addr->s_addr, mask->s_addr, 481 &iface->addr4_list); 482 spin_unlock(&netlbl_unlhsh_lock); 483 if (list_entry != NULL) 484 entry = netlbl_unlhsh_addr4_entry(list_entry); 485 else 486 entry = NULL; 487 488 audit_buf = netlbl_audit_start_common(AUDIT_MAC_UNLBL_STCDEL, 489 audit_info); 490 if (audit_buf != NULL) { 491 dev = dev_get_by_index(net, iface->ifindex); 492 netlbl_af4list_audit_addr(audit_buf, 1, 493 (dev != NULL ? dev->name : NULL), 494 addr->s_addr, mask->s_addr); 495 if (dev != NULL) 496 dev_put(dev); 497 if (entry != NULL && 498 security_secid_to_secctx(entry->secid, 499 &secctx, &secctx_len) == 0) { 500 audit_log_format(audit_buf, " sec_obj=%s", secctx); 501 security_release_secctx(secctx, secctx_len); 502 } 503 audit_log_format(audit_buf, " res=%u", entry != NULL ? 1 : 0); 504 audit_log_end(audit_buf); 505 } 506 507 if (entry == NULL) 508 return -ENOENT; 509 510 kfree_rcu(entry, rcu); 511 return 0; 512 } 513 514 #if IS_ENABLED(CONFIG_IPV6) 515 /** 516 * netlbl_unlhsh_remove_addr6 - Remove an IPv6 address entry 517 * @net: network namespace 518 * @iface: interface entry 519 * @addr: IP address 520 * @mask: IP address mask 521 * @audit_info: NetLabel audit information 522 * 523 * Description: 524 * Remove an IP address entry from the unlabeled connection hash table. 525 * Returns zero on success, negative values on failure. 526 * 527 */ 528 static int netlbl_unlhsh_remove_addr6(struct net *net, 529 struct netlbl_unlhsh_iface *iface, 530 const struct in6_addr *addr, 531 const struct in6_addr *mask, 532 struct netlbl_audit *audit_info) 533 { 534 struct netlbl_af6list *list_entry; 535 struct netlbl_unlhsh_addr6 *entry; 536 struct audit_buffer *audit_buf; 537 struct net_device *dev; 538 char *secctx; 539 u32 secctx_len; 540 541 spin_lock(&netlbl_unlhsh_lock); 542 list_entry = netlbl_af6list_remove(addr, mask, &iface->addr6_list); 543 spin_unlock(&netlbl_unlhsh_lock); 544 if (list_entry != NULL) 545 entry = netlbl_unlhsh_addr6_entry(list_entry); 546 else 547 entry = NULL; 548 549 audit_buf = netlbl_audit_start_common(AUDIT_MAC_UNLBL_STCDEL, 550 audit_info); 551 if (audit_buf != NULL) { 552 dev = dev_get_by_index(net, iface->ifindex); 553 netlbl_af6list_audit_addr(audit_buf, 1, 554 (dev != NULL ? dev->name : NULL), 555 addr, mask); 556 if (dev != NULL) 557 dev_put(dev); 558 if (entry != NULL && 559 security_secid_to_secctx(entry->secid, 560 &secctx, &secctx_len) == 0) { 561 audit_log_format(audit_buf, " sec_obj=%s", secctx); 562 security_release_secctx(secctx, secctx_len); 563 } 564 audit_log_format(audit_buf, " res=%u", entry != NULL ? 1 : 0); 565 audit_log_end(audit_buf); 566 } 567 568 if (entry == NULL) 569 return -ENOENT; 570 571 kfree_rcu(entry, rcu); 572 return 0; 573 } 574 #endif /* IPv6 */ 575 576 /** 577 * netlbl_unlhsh_condremove_iface - Remove an interface entry 578 * @iface: the interface entry 579 * 580 * Description: 581 * Remove an interface entry from the unlabeled connection hash table if it is 582 * empty. An interface entry is considered to be empty if there are no 583 * address entries assigned to it. 584 * 585 */ 586 static void netlbl_unlhsh_condremove_iface(struct netlbl_unlhsh_iface *iface) 587 { 588 struct netlbl_af4list *iter4; 589 #if IS_ENABLED(CONFIG_IPV6) 590 struct netlbl_af6list *iter6; 591 #endif /* IPv6 */ 592 593 spin_lock(&netlbl_unlhsh_lock); 594 netlbl_af4list_foreach_rcu(iter4, &iface->addr4_list) 595 goto unlhsh_condremove_failure; 596 #if IS_ENABLED(CONFIG_IPV6) 597 netlbl_af6list_foreach_rcu(iter6, &iface->addr6_list) 598 goto unlhsh_condremove_failure; 599 #endif /* IPv6 */ 600 iface->valid = 0; 601 if (iface->ifindex > 0) 602 list_del_rcu(&iface->list); 603 else 604 RCU_INIT_POINTER(netlbl_unlhsh_def, NULL); 605 spin_unlock(&netlbl_unlhsh_lock); 606 607 call_rcu(&iface->rcu, netlbl_unlhsh_free_iface); 608 return; 609 610 unlhsh_condremove_failure: 611 spin_unlock(&netlbl_unlhsh_lock); 612 } 613 614 /** 615 * netlbl_unlhsh_remove - Remove an entry from the unlabeled hash table 616 * @net: network namespace 617 * @dev_name: interface name 618 * @addr: IP address in network byte order 619 * @mask: address mask in network byte order 620 * @addr_len: length of address/mask (4 for IPv4, 16 for IPv6) 621 * @audit_info: NetLabel audit information 622 * 623 * Description: 624 * Removes and existing entry from the unlabeled connection hash table. 625 * Returns zero on success, negative values on failure. 626 * 627 */ 628 int netlbl_unlhsh_remove(struct net *net, 629 const char *dev_name, 630 const void *addr, 631 const void *mask, 632 u32 addr_len, 633 struct netlbl_audit *audit_info) 634 { 635 int ret_val; 636 struct net_device *dev; 637 struct netlbl_unlhsh_iface *iface; 638 639 if (addr_len != sizeof(struct in_addr) && 640 addr_len != sizeof(struct in6_addr)) 641 return -EINVAL; 642 643 rcu_read_lock(); 644 if (dev_name != NULL) { 645 dev = dev_get_by_name_rcu(net, dev_name); 646 if (dev == NULL) { 647 ret_val = -ENODEV; 648 goto unlhsh_remove_return; 649 } 650 iface = netlbl_unlhsh_search_iface(dev->ifindex); 651 } else 652 iface = rcu_dereference(netlbl_unlhsh_def); 653 if (iface == NULL) { 654 ret_val = -ENOENT; 655 goto unlhsh_remove_return; 656 } 657 switch (addr_len) { 658 case sizeof(struct in_addr): 659 ret_val = netlbl_unlhsh_remove_addr4(net, 660 iface, addr, mask, 661 audit_info); 662 break; 663 #if IS_ENABLED(CONFIG_IPV6) 664 case sizeof(struct in6_addr): 665 ret_val = netlbl_unlhsh_remove_addr6(net, 666 iface, addr, mask, 667 audit_info); 668 break; 669 #endif /* IPv6 */ 670 default: 671 ret_val = -EINVAL; 672 } 673 if (ret_val == 0) { 674 netlbl_unlhsh_condremove_iface(iface); 675 atomic_dec(&netlabel_mgmt_protocount); 676 } 677 678 unlhsh_remove_return: 679 rcu_read_unlock(); 680 return ret_val; 681 } 682 683 /* 684 * General Helper Functions 685 */ 686 687 /** 688 * netlbl_unlhsh_netdev_handler - Network device notification handler 689 * @this: notifier block 690 * @event: the event 691 * @ptr: the netdevice notifier info (cast to void) 692 * 693 * Description: 694 * Handle network device events, although at present all we care about is a 695 * network device going away. In the case of a device going away we clear any 696 * related entries from the unlabeled connection hash table. 697 * 698 */ 699 static int netlbl_unlhsh_netdev_handler(struct notifier_block *this, 700 unsigned long event, void *ptr) 701 { 702 struct net_device *dev = netdev_notifier_info_to_dev(ptr); 703 struct netlbl_unlhsh_iface *iface = NULL; 704 705 if (!net_eq(dev_net(dev), &init_net)) 706 return NOTIFY_DONE; 707 708 /* XXX - should this be a check for NETDEV_DOWN or _UNREGISTER? */ 709 if (event == NETDEV_DOWN) { 710 spin_lock(&netlbl_unlhsh_lock); 711 iface = netlbl_unlhsh_search_iface(dev->ifindex); 712 if (iface != NULL && iface->valid) { 713 iface->valid = 0; 714 list_del_rcu(&iface->list); 715 } else 716 iface = NULL; 717 spin_unlock(&netlbl_unlhsh_lock); 718 } 719 720 if (iface != NULL) 721 call_rcu(&iface->rcu, netlbl_unlhsh_free_iface); 722 723 return NOTIFY_DONE; 724 } 725 726 /** 727 * netlbl_unlabel_acceptflg_set - Set the unlabeled accept flag 728 * @value: desired value 729 * @audit_info: NetLabel audit information 730 * 731 * Description: 732 * Set the value of the unlabeled accept flag to @value. 733 * 734 */ 735 static void netlbl_unlabel_acceptflg_set(u8 value, 736 struct netlbl_audit *audit_info) 737 { 738 struct audit_buffer *audit_buf; 739 u8 old_val; 740 741 old_val = netlabel_unlabel_acceptflg; 742 netlabel_unlabel_acceptflg = value; 743 audit_buf = netlbl_audit_start_common(AUDIT_MAC_UNLBL_ALLOW, 744 audit_info); 745 if (audit_buf != NULL) { 746 audit_log_format(audit_buf, 747 " unlbl_accept=%u old=%u", value, old_val); 748 audit_log_end(audit_buf); 749 } 750 } 751 752 /** 753 * netlbl_unlabel_addrinfo_get - Get the IPv4/6 address information 754 * @info: the Generic NETLINK info block 755 * @addr: the IP address 756 * @mask: the IP address mask 757 * @len: the address length 758 * 759 * Description: 760 * Examine the Generic NETLINK message and extract the IP address information. 761 * Returns zero on success, negative values on failure. 762 * 763 */ 764 static int netlbl_unlabel_addrinfo_get(struct genl_info *info, 765 void **addr, 766 void **mask, 767 u32 *len) 768 { 769 u32 addr_len; 770 771 if (info->attrs[NLBL_UNLABEL_A_IPV4ADDR] && 772 info->attrs[NLBL_UNLABEL_A_IPV4MASK]) { 773 addr_len = nla_len(info->attrs[NLBL_UNLABEL_A_IPV4ADDR]); 774 if (addr_len != sizeof(struct in_addr) && 775 addr_len != nla_len(info->attrs[NLBL_UNLABEL_A_IPV4MASK])) 776 return -EINVAL; 777 *len = addr_len; 778 *addr = nla_data(info->attrs[NLBL_UNLABEL_A_IPV4ADDR]); 779 *mask = nla_data(info->attrs[NLBL_UNLABEL_A_IPV4MASK]); 780 return 0; 781 } else if (info->attrs[NLBL_UNLABEL_A_IPV6ADDR]) { 782 addr_len = nla_len(info->attrs[NLBL_UNLABEL_A_IPV6ADDR]); 783 if (addr_len != sizeof(struct in6_addr) && 784 addr_len != nla_len(info->attrs[NLBL_UNLABEL_A_IPV6MASK])) 785 return -EINVAL; 786 *len = addr_len; 787 *addr = nla_data(info->attrs[NLBL_UNLABEL_A_IPV6ADDR]); 788 *mask = nla_data(info->attrs[NLBL_UNLABEL_A_IPV6MASK]); 789 return 0; 790 } 791 792 return -EINVAL; 793 } 794 795 /* 796 * NetLabel Command Handlers 797 */ 798 799 /** 800 * netlbl_unlabel_accept - Handle an ACCEPT message 801 * @skb: the NETLINK buffer 802 * @info: the Generic NETLINK info block 803 * 804 * Description: 805 * Process a user generated ACCEPT message and set the accept flag accordingly. 806 * Returns zero on success, negative values on failure. 807 * 808 */ 809 static int netlbl_unlabel_accept(struct sk_buff *skb, struct genl_info *info) 810 { 811 u8 value; 812 struct netlbl_audit audit_info; 813 814 if (info->attrs[NLBL_UNLABEL_A_ACPTFLG]) { 815 value = nla_get_u8(info->attrs[NLBL_UNLABEL_A_ACPTFLG]); 816 if (value == 1 || value == 0) { 817 netlbl_netlink_auditinfo(skb, &audit_info); 818 netlbl_unlabel_acceptflg_set(value, &audit_info); 819 return 0; 820 } 821 } 822 823 return -EINVAL; 824 } 825 826 /** 827 * netlbl_unlabel_list - Handle a LIST message 828 * @skb: the NETLINK buffer 829 * @info: the Generic NETLINK info block 830 * 831 * Description: 832 * Process a user generated LIST message and respond with the current status. 833 * Returns zero on success, negative values on failure. 834 * 835 */ 836 static int netlbl_unlabel_list(struct sk_buff *skb, struct genl_info *info) 837 { 838 int ret_val = -EINVAL; 839 struct sk_buff *ans_skb; 840 void *data; 841 842 ans_skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL); 843 if (ans_skb == NULL) 844 goto list_failure; 845 data = genlmsg_put_reply(ans_skb, info, &netlbl_unlabel_gnl_family, 846 0, NLBL_UNLABEL_C_LIST); 847 if (data == NULL) { 848 ret_val = -ENOMEM; 849 goto list_failure; 850 } 851 852 ret_val = nla_put_u8(ans_skb, 853 NLBL_UNLABEL_A_ACPTFLG, 854 netlabel_unlabel_acceptflg); 855 if (ret_val != 0) 856 goto list_failure; 857 858 genlmsg_end(ans_skb, data); 859 return genlmsg_reply(ans_skb, info); 860 861 list_failure: 862 kfree_skb(ans_skb); 863 return ret_val; 864 } 865 866 /** 867 * netlbl_unlabel_staticadd - Handle a STATICADD message 868 * @skb: the NETLINK buffer 869 * @info: the Generic NETLINK info block 870 * 871 * Description: 872 * Process a user generated STATICADD message and add a new unlabeled 873 * connection entry to the hash table. Returns zero on success, negative 874 * values on failure. 875 * 876 */ 877 static int netlbl_unlabel_staticadd(struct sk_buff *skb, 878 struct genl_info *info) 879 { 880 int ret_val; 881 char *dev_name; 882 void *addr; 883 void *mask; 884 u32 addr_len; 885 u32 secid; 886 struct netlbl_audit audit_info; 887 888 /* Don't allow users to add both IPv4 and IPv6 addresses for a 889 * single entry. However, allow users to create two entries, one each 890 * for IPv4 and IPv4, with the same LSM security context which should 891 * achieve the same result. */ 892 if (!info->attrs[NLBL_UNLABEL_A_SECCTX] || 893 !info->attrs[NLBL_UNLABEL_A_IFACE] || 894 !((!info->attrs[NLBL_UNLABEL_A_IPV4ADDR] || 895 !info->attrs[NLBL_UNLABEL_A_IPV4MASK]) ^ 896 (!info->attrs[NLBL_UNLABEL_A_IPV6ADDR] || 897 !info->attrs[NLBL_UNLABEL_A_IPV6MASK]))) 898 return -EINVAL; 899 900 netlbl_netlink_auditinfo(skb, &audit_info); 901 902 ret_val = netlbl_unlabel_addrinfo_get(info, &addr, &mask, &addr_len); 903 if (ret_val != 0) 904 return ret_val; 905 dev_name = nla_data(info->attrs[NLBL_UNLABEL_A_IFACE]); 906 ret_val = security_secctx_to_secid( 907 nla_data(info->attrs[NLBL_UNLABEL_A_SECCTX]), 908 nla_len(info->attrs[NLBL_UNLABEL_A_SECCTX]), 909 &secid); 910 if (ret_val != 0) 911 return ret_val; 912 913 return netlbl_unlhsh_add(&init_net, 914 dev_name, addr, mask, addr_len, secid, 915 &audit_info); 916 } 917 918 /** 919 * netlbl_unlabel_staticadddef - Handle a STATICADDDEF message 920 * @skb: the NETLINK buffer 921 * @info: the Generic NETLINK info block 922 * 923 * Description: 924 * Process a user generated STATICADDDEF message and add a new default 925 * unlabeled connection entry. Returns zero on success, negative values on 926 * failure. 927 * 928 */ 929 static int netlbl_unlabel_staticadddef(struct sk_buff *skb, 930 struct genl_info *info) 931 { 932 int ret_val; 933 void *addr; 934 void *mask; 935 u32 addr_len; 936 u32 secid; 937 struct netlbl_audit audit_info; 938 939 /* Don't allow users to add both IPv4 and IPv6 addresses for a 940 * single entry. However, allow users to create two entries, one each 941 * for IPv4 and IPv6, with the same LSM security context which should 942 * achieve the same result. */ 943 if (!info->attrs[NLBL_UNLABEL_A_SECCTX] || 944 !((!info->attrs[NLBL_UNLABEL_A_IPV4ADDR] || 945 !info->attrs[NLBL_UNLABEL_A_IPV4MASK]) ^ 946 (!info->attrs[NLBL_UNLABEL_A_IPV6ADDR] || 947 !info->attrs[NLBL_UNLABEL_A_IPV6MASK]))) 948 return -EINVAL; 949 950 netlbl_netlink_auditinfo(skb, &audit_info); 951 952 ret_val = netlbl_unlabel_addrinfo_get(info, &addr, &mask, &addr_len); 953 if (ret_val != 0) 954 return ret_val; 955 ret_val = security_secctx_to_secid( 956 nla_data(info->attrs[NLBL_UNLABEL_A_SECCTX]), 957 nla_len(info->attrs[NLBL_UNLABEL_A_SECCTX]), 958 &secid); 959 if (ret_val != 0) 960 return ret_val; 961 962 return netlbl_unlhsh_add(&init_net, 963 NULL, addr, mask, addr_len, secid, 964 &audit_info); 965 } 966 967 /** 968 * netlbl_unlabel_staticremove - Handle a STATICREMOVE message 969 * @skb: the NETLINK buffer 970 * @info: the Generic NETLINK info block 971 * 972 * Description: 973 * Process a user generated STATICREMOVE message and remove the specified 974 * unlabeled connection entry. Returns zero on success, negative values on 975 * failure. 976 * 977 */ 978 static int netlbl_unlabel_staticremove(struct sk_buff *skb, 979 struct genl_info *info) 980 { 981 int ret_val; 982 char *dev_name; 983 void *addr; 984 void *mask; 985 u32 addr_len; 986 struct netlbl_audit audit_info; 987 988 /* See the note in netlbl_unlabel_staticadd() about not allowing both 989 * IPv4 and IPv6 in the same entry. */ 990 if (!info->attrs[NLBL_UNLABEL_A_IFACE] || 991 !((!info->attrs[NLBL_UNLABEL_A_IPV4ADDR] || 992 !info->attrs[NLBL_UNLABEL_A_IPV4MASK]) ^ 993 (!info->attrs[NLBL_UNLABEL_A_IPV6ADDR] || 994 !info->attrs[NLBL_UNLABEL_A_IPV6MASK]))) 995 return -EINVAL; 996 997 netlbl_netlink_auditinfo(skb, &audit_info); 998 999 ret_val = netlbl_unlabel_addrinfo_get(info, &addr, &mask, &addr_len); 1000 if (ret_val != 0) 1001 return ret_val; 1002 dev_name = nla_data(info->attrs[NLBL_UNLABEL_A_IFACE]); 1003 1004 return netlbl_unlhsh_remove(&init_net, 1005 dev_name, addr, mask, addr_len, 1006 &audit_info); 1007 } 1008 1009 /** 1010 * netlbl_unlabel_staticremovedef - Handle a STATICREMOVEDEF message 1011 * @skb: the NETLINK buffer 1012 * @info: the Generic NETLINK info block 1013 * 1014 * Description: 1015 * Process a user generated STATICREMOVEDEF message and remove the default 1016 * unlabeled connection entry. Returns zero on success, negative values on 1017 * failure. 1018 * 1019 */ 1020 static int netlbl_unlabel_staticremovedef(struct sk_buff *skb, 1021 struct genl_info *info) 1022 { 1023 int ret_val; 1024 void *addr; 1025 void *mask; 1026 u32 addr_len; 1027 struct netlbl_audit audit_info; 1028 1029 /* See the note in netlbl_unlabel_staticadd() about not allowing both 1030 * IPv4 and IPv6 in the same entry. */ 1031 if (!((!info->attrs[NLBL_UNLABEL_A_IPV4ADDR] || 1032 !info->attrs[NLBL_UNLABEL_A_IPV4MASK]) ^ 1033 (!info->attrs[NLBL_UNLABEL_A_IPV6ADDR] || 1034 !info->attrs[NLBL_UNLABEL_A_IPV6MASK]))) 1035 return -EINVAL; 1036 1037 netlbl_netlink_auditinfo(skb, &audit_info); 1038 1039 ret_val = netlbl_unlabel_addrinfo_get(info, &addr, &mask, &addr_len); 1040 if (ret_val != 0) 1041 return ret_val; 1042 1043 return netlbl_unlhsh_remove(&init_net, 1044 NULL, addr, mask, addr_len, 1045 &audit_info); 1046 } 1047 1048 1049 /** 1050 * netlbl_unlabel_staticlist_gen - Generate messages for STATICLIST[DEF] 1051 * @cmd: command/message 1052 * @iface: the interface entry 1053 * @addr4: the IPv4 address entry 1054 * @addr6: the IPv6 address entry 1055 * @arg: the netlbl_unlhsh_walk_arg structure 1056 * 1057 * Description: 1058 * This function is designed to be used to generate a response for a 1059 * STATICLIST or STATICLISTDEF message. When called either @addr4 or @addr6 1060 * can be specified, not both, the other unspecified entry should be set to 1061 * NULL by the caller. Returns the size of the message on success, negative 1062 * values on failure. 1063 * 1064 */ 1065 static int netlbl_unlabel_staticlist_gen(u32 cmd, 1066 const struct netlbl_unlhsh_iface *iface, 1067 const struct netlbl_unlhsh_addr4 *addr4, 1068 const struct netlbl_unlhsh_addr6 *addr6, 1069 void *arg) 1070 { 1071 int ret_val = -ENOMEM; 1072 struct netlbl_unlhsh_walk_arg *cb_arg = arg; 1073 struct net_device *dev; 1074 void *data; 1075 u32 secid; 1076 char *secctx; 1077 u32 secctx_len; 1078 1079 data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).portid, 1080 cb_arg->seq, &netlbl_unlabel_gnl_family, 1081 NLM_F_MULTI, cmd); 1082 if (data == NULL) 1083 goto list_cb_failure; 1084 1085 if (iface->ifindex > 0) { 1086 dev = dev_get_by_index(&init_net, iface->ifindex); 1087 if (!dev) { 1088 ret_val = -ENODEV; 1089 goto list_cb_failure; 1090 } 1091 ret_val = nla_put_string(cb_arg->skb, 1092 NLBL_UNLABEL_A_IFACE, dev->name); 1093 dev_put(dev); 1094 if (ret_val != 0) 1095 goto list_cb_failure; 1096 } 1097 1098 if (addr4) { 1099 struct in_addr addr_struct; 1100 1101 addr_struct.s_addr = addr4->list.addr; 1102 ret_val = nla_put_in_addr(cb_arg->skb, 1103 NLBL_UNLABEL_A_IPV4ADDR, 1104 addr_struct.s_addr); 1105 if (ret_val != 0) 1106 goto list_cb_failure; 1107 1108 addr_struct.s_addr = addr4->list.mask; 1109 ret_val = nla_put_in_addr(cb_arg->skb, 1110 NLBL_UNLABEL_A_IPV4MASK, 1111 addr_struct.s_addr); 1112 if (ret_val != 0) 1113 goto list_cb_failure; 1114 1115 secid = addr4->secid; 1116 } else { 1117 ret_val = nla_put_in6_addr(cb_arg->skb, 1118 NLBL_UNLABEL_A_IPV6ADDR, 1119 &addr6->list.addr); 1120 if (ret_val != 0) 1121 goto list_cb_failure; 1122 1123 ret_val = nla_put_in6_addr(cb_arg->skb, 1124 NLBL_UNLABEL_A_IPV6MASK, 1125 &addr6->list.mask); 1126 if (ret_val != 0) 1127 goto list_cb_failure; 1128 1129 secid = addr6->secid; 1130 } 1131 1132 ret_val = security_secid_to_secctx(secid, &secctx, &secctx_len); 1133 if (ret_val != 0) 1134 goto list_cb_failure; 1135 ret_val = nla_put(cb_arg->skb, 1136 NLBL_UNLABEL_A_SECCTX, 1137 secctx_len, 1138 secctx); 1139 security_release_secctx(secctx, secctx_len); 1140 if (ret_val != 0) 1141 goto list_cb_failure; 1142 1143 cb_arg->seq++; 1144 genlmsg_end(cb_arg->skb, data); 1145 return 0; 1146 1147 list_cb_failure: 1148 genlmsg_cancel(cb_arg->skb, data); 1149 return ret_val; 1150 } 1151 1152 /** 1153 * netlbl_unlabel_staticlist - Handle a STATICLIST message 1154 * @skb: the NETLINK buffer 1155 * @cb: the NETLINK callback 1156 * 1157 * Description: 1158 * Process a user generated STATICLIST message and dump the unlabeled 1159 * connection hash table in a form suitable for use in a kernel generated 1160 * STATICLIST message. Returns the length of @skb. 1161 * 1162 */ 1163 static int netlbl_unlabel_staticlist(struct sk_buff *skb, 1164 struct netlink_callback *cb) 1165 { 1166 struct netlbl_unlhsh_walk_arg cb_arg; 1167 u32 skip_bkt = cb->args[0]; 1168 u32 skip_chain = cb->args[1]; 1169 u32 iter_bkt; 1170 u32 iter_chain = 0, iter_addr4 = 0, iter_addr6 = 0; 1171 struct netlbl_unlhsh_iface *iface; 1172 struct list_head *iter_list; 1173 struct netlbl_af4list *addr4; 1174 #if IS_ENABLED(CONFIG_IPV6) 1175 struct netlbl_af6list *addr6; 1176 #endif 1177 1178 cb_arg.nl_cb = cb; 1179 cb_arg.skb = skb; 1180 cb_arg.seq = cb->nlh->nlmsg_seq; 1181 1182 rcu_read_lock(); 1183 for (iter_bkt = skip_bkt; 1184 iter_bkt < rcu_dereference(netlbl_unlhsh)->size; 1185 iter_bkt++, iter_chain = 0, iter_addr4 = 0, iter_addr6 = 0) { 1186 iter_list = &rcu_dereference(netlbl_unlhsh)->tbl[iter_bkt]; 1187 list_for_each_entry_rcu(iface, iter_list, list) { 1188 if (!iface->valid || 1189 iter_chain++ < skip_chain) 1190 continue; 1191 netlbl_af4list_foreach_rcu(addr4, 1192 &iface->addr4_list) { 1193 if (iter_addr4++ < cb->args[2]) 1194 continue; 1195 if (netlbl_unlabel_staticlist_gen( 1196 NLBL_UNLABEL_C_STATICLIST, 1197 iface, 1198 netlbl_unlhsh_addr4_entry(addr4), 1199 NULL, 1200 &cb_arg) < 0) { 1201 iter_addr4--; 1202 iter_chain--; 1203 goto unlabel_staticlist_return; 1204 } 1205 } 1206 #if IS_ENABLED(CONFIG_IPV6) 1207 netlbl_af6list_foreach_rcu(addr6, 1208 &iface->addr6_list) { 1209 if (iter_addr6++ < cb->args[3]) 1210 continue; 1211 if (netlbl_unlabel_staticlist_gen( 1212 NLBL_UNLABEL_C_STATICLIST, 1213 iface, 1214 NULL, 1215 netlbl_unlhsh_addr6_entry(addr6), 1216 &cb_arg) < 0) { 1217 iter_addr6--; 1218 iter_chain--; 1219 goto unlabel_staticlist_return; 1220 } 1221 } 1222 #endif /* IPv6 */ 1223 } 1224 } 1225 1226 unlabel_staticlist_return: 1227 rcu_read_unlock(); 1228 cb->args[0] = iter_bkt; 1229 cb->args[1] = iter_chain; 1230 cb->args[2] = iter_addr4; 1231 cb->args[3] = iter_addr6; 1232 return skb->len; 1233 } 1234 1235 /** 1236 * netlbl_unlabel_staticlistdef - Handle a STATICLISTDEF message 1237 * @skb: the NETLINK buffer 1238 * @cb: the NETLINK callback 1239 * 1240 * Description: 1241 * Process a user generated STATICLISTDEF message and dump the default 1242 * unlabeled connection entry in a form suitable for use in a kernel generated 1243 * STATICLISTDEF message. Returns the length of @skb. 1244 * 1245 */ 1246 static int netlbl_unlabel_staticlistdef(struct sk_buff *skb, 1247 struct netlink_callback *cb) 1248 { 1249 struct netlbl_unlhsh_walk_arg cb_arg; 1250 struct netlbl_unlhsh_iface *iface; 1251 u32 iter_addr4 = 0, iter_addr6 = 0; 1252 struct netlbl_af4list *addr4; 1253 #if IS_ENABLED(CONFIG_IPV6) 1254 struct netlbl_af6list *addr6; 1255 #endif 1256 1257 cb_arg.nl_cb = cb; 1258 cb_arg.skb = skb; 1259 cb_arg.seq = cb->nlh->nlmsg_seq; 1260 1261 rcu_read_lock(); 1262 iface = rcu_dereference(netlbl_unlhsh_def); 1263 if (iface == NULL || !iface->valid) 1264 goto unlabel_staticlistdef_return; 1265 1266 netlbl_af4list_foreach_rcu(addr4, &iface->addr4_list) { 1267 if (iter_addr4++ < cb->args[0]) 1268 continue; 1269 if (netlbl_unlabel_staticlist_gen(NLBL_UNLABEL_C_STATICLISTDEF, 1270 iface, 1271 netlbl_unlhsh_addr4_entry(addr4), 1272 NULL, 1273 &cb_arg) < 0) { 1274 iter_addr4--; 1275 goto unlabel_staticlistdef_return; 1276 } 1277 } 1278 #if IS_ENABLED(CONFIG_IPV6) 1279 netlbl_af6list_foreach_rcu(addr6, &iface->addr6_list) { 1280 if (iter_addr6++ < cb->args[1]) 1281 continue; 1282 if (netlbl_unlabel_staticlist_gen(NLBL_UNLABEL_C_STATICLISTDEF, 1283 iface, 1284 NULL, 1285 netlbl_unlhsh_addr6_entry(addr6), 1286 &cb_arg) < 0) { 1287 iter_addr6--; 1288 goto unlabel_staticlistdef_return; 1289 } 1290 } 1291 #endif /* IPv6 */ 1292 1293 unlabel_staticlistdef_return: 1294 rcu_read_unlock(); 1295 cb->args[0] = iter_addr4; 1296 cb->args[1] = iter_addr6; 1297 return skb->len; 1298 } 1299 1300 /* 1301 * NetLabel Generic NETLINK Command Definitions 1302 */ 1303 1304 static const struct genl_small_ops netlbl_unlabel_genl_ops[] = { 1305 { 1306 .cmd = NLBL_UNLABEL_C_STATICADD, 1307 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, 1308 .flags = GENL_ADMIN_PERM, 1309 .doit = netlbl_unlabel_staticadd, 1310 .dumpit = NULL, 1311 }, 1312 { 1313 .cmd = NLBL_UNLABEL_C_STATICREMOVE, 1314 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, 1315 .flags = GENL_ADMIN_PERM, 1316 .doit = netlbl_unlabel_staticremove, 1317 .dumpit = NULL, 1318 }, 1319 { 1320 .cmd = NLBL_UNLABEL_C_STATICLIST, 1321 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, 1322 .flags = 0, 1323 .doit = NULL, 1324 .dumpit = netlbl_unlabel_staticlist, 1325 }, 1326 { 1327 .cmd = NLBL_UNLABEL_C_STATICADDDEF, 1328 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, 1329 .flags = GENL_ADMIN_PERM, 1330 .doit = netlbl_unlabel_staticadddef, 1331 .dumpit = NULL, 1332 }, 1333 { 1334 .cmd = NLBL_UNLABEL_C_STATICREMOVEDEF, 1335 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, 1336 .flags = GENL_ADMIN_PERM, 1337 .doit = netlbl_unlabel_staticremovedef, 1338 .dumpit = NULL, 1339 }, 1340 { 1341 .cmd = NLBL_UNLABEL_C_STATICLISTDEF, 1342 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, 1343 .flags = 0, 1344 .doit = NULL, 1345 .dumpit = netlbl_unlabel_staticlistdef, 1346 }, 1347 { 1348 .cmd = NLBL_UNLABEL_C_ACCEPT, 1349 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, 1350 .flags = GENL_ADMIN_PERM, 1351 .doit = netlbl_unlabel_accept, 1352 .dumpit = NULL, 1353 }, 1354 { 1355 .cmd = NLBL_UNLABEL_C_LIST, 1356 .validate = GENL_DONT_VALIDATE_STRICT | GENL_DONT_VALIDATE_DUMP, 1357 .flags = 0, 1358 .doit = netlbl_unlabel_list, 1359 .dumpit = NULL, 1360 }, 1361 }; 1362 1363 static struct genl_family netlbl_unlabel_gnl_family __ro_after_init = { 1364 .hdrsize = 0, 1365 .name = NETLBL_NLTYPE_UNLABELED_NAME, 1366 .version = NETLBL_PROTO_VERSION, 1367 .maxattr = NLBL_UNLABEL_A_MAX, 1368 .policy = netlbl_unlabel_genl_policy, 1369 .module = THIS_MODULE, 1370 .small_ops = netlbl_unlabel_genl_ops, 1371 .n_small_ops = ARRAY_SIZE(netlbl_unlabel_genl_ops), 1372 }; 1373 1374 /* 1375 * NetLabel Generic NETLINK Protocol Functions 1376 */ 1377 1378 /** 1379 * netlbl_unlabel_genl_init - Register the Unlabeled NetLabel component 1380 * 1381 * Description: 1382 * Register the unlabeled packet NetLabel component with the Generic NETLINK 1383 * mechanism. Returns zero on success, negative values on failure. 1384 * 1385 */ 1386 int __init netlbl_unlabel_genl_init(void) 1387 { 1388 return genl_register_family(&netlbl_unlabel_gnl_family); 1389 } 1390 1391 /* 1392 * NetLabel KAPI Hooks 1393 */ 1394 1395 static struct notifier_block netlbl_unlhsh_netdev_notifier = { 1396 .notifier_call = netlbl_unlhsh_netdev_handler, 1397 }; 1398 1399 /** 1400 * netlbl_unlabel_init - Initialize the unlabeled connection hash table 1401 * @size: the number of bits to use for the hash buckets 1402 * 1403 * Description: 1404 * Initializes the unlabeled connection hash table and registers a network 1405 * device notification handler. This function should only be called by the 1406 * NetLabel subsystem itself during initialization. Returns zero on success, 1407 * non-zero values on error. 1408 * 1409 */ 1410 int __init netlbl_unlabel_init(u32 size) 1411 { 1412 u32 iter; 1413 struct netlbl_unlhsh_tbl *hsh_tbl; 1414 1415 if (size == 0) 1416 return -EINVAL; 1417 1418 hsh_tbl = kmalloc(sizeof(*hsh_tbl), GFP_KERNEL); 1419 if (hsh_tbl == NULL) 1420 return -ENOMEM; 1421 hsh_tbl->size = 1 << size; 1422 hsh_tbl->tbl = kcalloc(hsh_tbl->size, 1423 sizeof(struct list_head), 1424 GFP_KERNEL); 1425 if (hsh_tbl->tbl == NULL) { 1426 kfree(hsh_tbl); 1427 return -ENOMEM; 1428 } 1429 for (iter = 0; iter < hsh_tbl->size; iter++) 1430 INIT_LIST_HEAD(&hsh_tbl->tbl[iter]); 1431 1432 spin_lock(&netlbl_unlhsh_lock); 1433 rcu_assign_pointer(netlbl_unlhsh, hsh_tbl); 1434 spin_unlock(&netlbl_unlhsh_lock); 1435 1436 register_netdevice_notifier(&netlbl_unlhsh_netdev_notifier); 1437 1438 return 0; 1439 } 1440 1441 /** 1442 * netlbl_unlabel_getattr - Get the security attributes for an unlabled packet 1443 * @skb: the packet 1444 * @family: protocol family 1445 * @secattr: the security attributes 1446 * 1447 * Description: 1448 * Determine the security attributes, if any, for an unlabled packet and return 1449 * them in @secattr. Returns zero on success and negative values on failure. 1450 * 1451 */ 1452 int netlbl_unlabel_getattr(const struct sk_buff *skb, 1453 u16 family, 1454 struct netlbl_lsm_secattr *secattr) 1455 { 1456 struct netlbl_unlhsh_iface *iface; 1457 1458 rcu_read_lock(); 1459 iface = netlbl_unlhsh_search_iface(skb->skb_iif); 1460 if (iface == NULL) 1461 iface = rcu_dereference(netlbl_unlhsh_def); 1462 if (iface == NULL || !iface->valid) 1463 goto unlabel_getattr_nolabel; 1464 1465 #if IS_ENABLED(CONFIG_IPV6) 1466 /* When resolving a fallback label, check the sk_buff version as 1467 * it is possible (e.g. SCTP) to have family = PF_INET6 while 1468 * receiving ip_hdr(skb)->version = 4. 1469 */ 1470 if (family == PF_INET6 && ip_hdr(skb)->version == 4) 1471 family = PF_INET; 1472 #endif /* IPv6 */ 1473 1474 switch (family) { 1475 case PF_INET: { 1476 struct iphdr *hdr4; 1477 struct netlbl_af4list *addr4; 1478 1479 hdr4 = ip_hdr(skb); 1480 addr4 = netlbl_af4list_search(hdr4->saddr, 1481 &iface->addr4_list); 1482 if (addr4 == NULL) 1483 goto unlabel_getattr_nolabel; 1484 secattr->attr.secid = netlbl_unlhsh_addr4_entry(addr4)->secid; 1485 break; 1486 } 1487 #if IS_ENABLED(CONFIG_IPV6) 1488 case PF_INET6: { 1489 struct ipv6hdr *hdr6; 1490 struct netlbl_af6list *addr6; 1491 1492 hdr6 = ipv6_hdr(skb); 1493 addr6 = netlbl_af6list_search(&hdr6->saddr, 1494 &iface->addr6_list); 1495 if (addr6 == NULL) 1496 goto unlabel_getattr_nolabel; 1497 secattr->attr.secid = netlbl_unlhsh_addr6_entry(addr6)->secid; 1498 break; 1499 } 1500 #endif /* IPv6 */ 1501 default: 1502 goto unlabel_getattr_nolabel; 1503 } 1504 rcu_read_unlock(); 1505 1506 secattr->flags |= NETLBL_SECATTR_SECID; 1507 secattr->type = NETLBL_NLTYPE_UNLABELED; 1508 return 0; 1509 1510 unlabel_getattr_nolabel: 1511 rcu_read_unlock(); 1512 if (netlabel_unlabel_acceptflg == 0) 1513 return -ENOMSG; 1514 secattr->type = NETLBL_NLTYPE_UNLABELED; 1515 return 0; 1516 } 1517 1518 /** 1519 * netlbl_unlabel_defconf - Set the default config to allow unlabeled packets 1520 * 1521 * Description: 1522 * Set the default NetLabel configuration to allow incoming unlabeled packets 1523 * and to send unlabeled network traffic by default. 1524 * 1525 */ 1526 int __init netlbl_unlabel_defconf(void) 1527 { 1528 int ret_val; 1529 struct netlbl_dom_map *entry; 1530 struct netlbl_audit audit_info; 1531 1532 /* Only the kernel is allowed to call this function and the only time 1533 * it is called is at bootup before the audit subsystem is reporting 1534 * messages so don't worry to much about these values. */ 1535 security_task_getsecid(current, &audit_info.secid); 1536 audit_info.loginuid = GLOBAL_ROOT_UID; 1537 audit_info.sessionid = 0; 1538 1539 entry = kzalloc(sizeof(*entry), GFP_KERNEL); 1540 if (entry == NULL) 1541 return -ENOMEM; 1542 entry->family = AF_UNSPEC; 1543 entry->def.type = NETLBL_NLTYPE_UNLABELED; 1544 ret_val = netlbl_domhsh_add_default(entry, &audit_info); 1545 if (ret_val != 0) 1546 return ret_val; 1547 1548 netlbl_unlabel_acceptflg_set(1, &audit_info); 1549 1550 return 0; 1551 } 1552