⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 netlabel_mgmt.c

📁 linux 内核源代码
💻 C
📖 第 1 页 / 共 2 页
字号:
/* * NetLabel Management Support * * This file defines the management functions for the NetLabel system.  The * NetLabel system manages static and dynamic label mappings for network * protocols such as CIPSO and RIPSO. * * Author: Paul Moore <paul.moore@hp.com> * *//* * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 * * This program is free software;  you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY;  without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See * the GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program;  if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA * */#include <linux/types.h>#include <linux/socket.h>#include <linux/string.h>#include <linux/skbuff.h>#include <net/sock.h>#include <net/netlink.h>#include <net/genetlink.h>#include <net/netlabel.h>#include <net/cipso_ipv4.h>#include "netlabel_domainhash.h"#include "netlabel_user.h"#include "netlabel_mgmt.h"/* NetLabel configured protocol count */static DEFINE_SPINLOCK(netlabel_mgmt_protocount_lock);static u32 netlabel_mgmt_protocount = 0;/* Argument struct for netlbl_domhsh_walk() */struct netlbl_domhsh_walk_arg {	struct netlink_callback *nl_cb;	struct sk_buff *skb;	u32 seq;};/* NetLabel Generic NETLINK CIPSOv4 family */static struct genl_family netlbl_mgmt_gnl_family = {	.id = GENL_ID_GENERATE,	.hdrsize = 0,	.name = NETLBL_NLTYPE_MGMT_NAME,	.version = NETLBL_PROTO_VERSION,	.maxattr = NLBL_MGMT_A_MAX,};/* NetLabel Netlink attribute policy */static const struct nla_policy netlbl_mgmt_genl_policy[NLBL_MGMT_A_MAX + 1] = {	[NLBL_MGMT_A_DOMAIN] = { .type = NLA_NUL_STRING },	[NLBL_MGMT_A_PROTOCOL] = { .type = NLA_U32 },	[NLBL_MGMT_A_VERSION] = { .type = NLA_U32 },	[NLBL_MGMT_A_CV4DOI] = { .type = NLA_U32 },};/* * NetLabel Misc Management Functions *//** * netlbl_mgmt_protocount_inc - Increment the configured labeled protocol count * * Description: * Increment the number of labeled protocol configurations in the current * NetLabel configuration.  Keep track of this for use in determining if * NetLabel label enforcement should be active/enabled or not in the LSM. * */void netlbl_mgmt_protocount_inc(void){	spin_lock(&netlabel_mgmt_protocount_lock);	netlabel_mgmt_protocount++;	spin_unlock(&netlabel_mgmt_protocount_lock);}/** * netlbl_mgmt_protocount_dec - Decrement the configured labeled protocol count * * Description: * Decrement the number of labeled protocol configurations in the current * NetLabel configuration.  Keep track of this for use in determining if * NetLabel label enforcement should be active/enabled or not in the LSM. * */void netlbl_mgmt_protocount_dec(void){	spin_lock(&netlabel_mgmt_protocount_lock);	if (netlabel_mgmt_protocount > 0)		netlabel_mgmt_protocount--;	spin_unlock(&netlabel_mgmt_protocount_lock);}/** * netlbl_mgmt_protocount_value - Return the number of configured protocols * * Description: * Return the number of labeled protocols in the current NetLabel * configuration.  This value is useful in  determining if NetLabel label * enforcement should be active/enabled or not in the LSM. * */u32 netlbl_mgmt_protocount_value(void){	u32 val;	rcu_read_lock();	val = netlabel_mgmt_protocount;	rcu_read_unlock();	return val;}/* * NetLabel Command Handlers *//** * netlbl_mgmt_add - Handle an ADD message * @skb: the NETLINK buffer * @info: the Generic NETLINK info block * * Description: * Process a user generated ADD message and add the domains from the message * to the hash table.  See netlabel.h for a description of the message format. * Returns zero on success, negative values on failure. * */static int netlbl_mgmt_add(struct sk_buff *skb, struct genl_info *info){	int ret_val = -EINVAL;	struct netlbl_dom_map *entry = NULL;	size_t tmp_size;	u32 tmp_val;	struct netlbl_audit audit_info;	if (!info->attrs[NLBL_MGMT_A_DOMAIN] ||	    !info->attrs[NLBL_MGMT_A_PROTOCOL])		goto add_failure;	netlbl_netlink_auditinfo(skb, &audit_info);	entry = kzalloc(sizeof(*entry), GFP_KERNEL);	if (entry == NULL) {		ret_val = -ENOMEM;		goto add_failure;	}	tmp_size = nla_len(info->attrs[NLBL_MGMT_A_DOMAIN]);	entry->domain = kmalloc(tmp_size, GFP_KERNEL);	if (entry->domain == NULL) {		ret_val = -ENOMEM;		goto add_failure;	}	entry->type = nla_get_u32(info->attrs[NLBL_MGMT_A_PROTOCOL]);	nla_strlcpy(entry->domain, info->attrs[NLBL_MGMT_A_DOMAIN], tmp_size);	switch (entry->type) {	case NETLBL_NLTYPE_UNLABELED:		ret_val = netlbl_domhsh_add(entry, &audit_info);		break;	case NETLBL_NLTYPE_CIPSOV4:		if (!info->attrs[NLBL_MGMT_A_CV4DOI])			goto add_failure;		tmp_val = nla_get_u32(info->attrs[NLBL_MGMT_A_CV4DOI]);		/* We should be holding a rcu_read_lock() here while we hold		 * the result but since the entry will always be deleted when		 * the CIPSO DOI is deleted we aren't going to keep the		 * lock. */		rcu_read_lock();		entry->type_def.cipsov4 = cipso_v4_doi_getdef(tmp_val);		if (entry->type_def.cipsov4 == NULL) {			rcu_read_unlock();			goto add_failure;		}		ret_val = netlbl_domhsh_add(entry, &audit_info);		rcu_read_unlock();		break;	default:		goto add_failure;	}	if (ret_val != 0)		goto add_failure;	return 0;add_failure:	if (entry)		kfree(entry->domain);	kfree(entry);	return ret_val;}/** * netlbl_mgmt_remove - Handle a REMOVE message * @skb: the NETLINK buffer * @info: the Generic NETLINK info block * * Description: * Process a user generated REMOVE message and remove the specified domain * mappings.  Returns zero on success, negative values on failure. * */static int netlbl_mgmt_remove(struct sk_buff *skb, struct genl_info *info){	char *domain;	struct netlbl_audit audit_info;	if (!info->attrs[NLBL_MGMT_A_DOMAIN])		return -EINVAL;	netlbl_netlink_auditinfo(skb, &audit_info);	domain = nla_data(info->attrs[NLBL_MGMT_A_DOMAIN]);	return netlbl_domhsh_remove(domain, &audit_info);}/** * netlbl_mgmt_listall_cb - netlbl_domhsh_walk() callback for LISTALL * @entry: the domain mapping hash table entry * @arg: the netlbl_domhsh_walk_arg structure * * Description: * This function is designed to be used as a callback to the * netlbl_domhsh_walk() function for use in generating a response for a LISTALL * message.  Returns the size of the message on success, negative values on * failure. * */static int netlbl_mgmt_listall_cb(struct netlbl_dom_map *entry, void *arg){	int ret_val = -ENOMEM;	struct netlbl_domhsh_walk_arg *cb_arg = arg;	void *data;	data = genlmsg_put(cb_arg->skb, NETLINK_CB(cb_arg->nl_cb->skb).pid,			   cb_arg->seq, &netlbl_mgmt_gnl_family,			   NLM_F_MULTI, NLBL_MGMT_C_LISTALL);	if (data == NULL)		goto listall_cb_failure;	ret_val = nla_put_string(cb_arg->skb,				 NLBL_MGMT_A_DOMAIN,				 entry->domain);	if (ret_val != 0)		goto listall_cb_failure;	ret_val = nla_put_u32(cb_arg->skb, NLBL_MGMT_A_PROTOCOL, entry->type);	if (ret_val != 0)		goto listall_cb_failure;	switch (entry->type) {	case NETLBL_NLTYPE_CIPSOV4:		ret_val = nla_put_u32(cb_arg->skb,				      NLBL_MGMT_A_CV4DOI,				      entry->type_def.cipsov4->doi);		if (ret_val != 0)			goto listall_cb_failure;		break;	}	cb_arg->seq++;	return genlmsg_end(cb_arg->skb, data);listall_cb_failure:	genlmsg_cancel(cb_arg->skb, data);	return ret_val;}/** * netlbl_mgmt_listall - Handle a LISTALL message * @skb: the NETLINK buffer * @cb: the NETLINK callback * * Description: * Process a user generated LISTALL message and dumps the domain hash table in * a form suitable for use in a kernel generated LISTALL message.  Returns zero * on success, negative values on failure. * */static int netlbl_mgmt_listall(struct sk_buff *skb,			       struct netlink_callback *cb){	struct netlbl_domhsh_walk_arg cb_arg;	u32 skip_bkt = cb->args[0];	u32 skip_chain = cb->args[1];	cb_arg.nl_cb = cb;	cb_arg.skb = skb;	cb_arg.seq = cb->nlh->nlmsg_seq;	netlbl_domhsh_walk(&skip_bkt,			   &skip_chain,			   netlbl_mgmt_listall_cb,			   &cb_arg);	cb->args[0] = skip_bkt;	cb->args[1] = skip_chain;	return skb->len;}/** * netlbl_mgmt_adddef - Handle an ADDDEF message * @skb: the NETLINK buffer * @info: the Generic NETLINK info block * * Description: * Process a user generated ADDDEF message and respond accordingly.  Returns * zero on success, negative values on failure. * */static int netlbl_mgmt_adddef(struct sk_buff *skb, struct genl_info *info){	int ret_val = -EINVAL;	struct netlbl_dom_map *entry = NULL;	u32 tmp_val;	struct netlbl_audit audit_info;	if (!info->attrs[NLBL_MGMT_A_PROTOCOL])		goto adddef_failure;	netlbl_netlink_auditinfo(skb, &audit_info);	entry = kzalloc(sizeof(*entry), GFP_KERNEL);	if (entry == NULL) {		ret_val = -ENOMEM;		goto adddef_failure;	}	entry->type = nla_get_u32(info->attrs[NLBL_MGMT_A_PROTOCOL]);	switch (entry->type) {	case NETLBL_NLTYPE_UNLABELED:		ret_val = netlbl_domhsh_add_default(entry, &audit_info);		break;

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -