1*4882a593Smuzhiyun // SPDX-License-Identifier: GPL-2.0
2*4882a593Smuzhiyun /*
3*4882a593Smuzhiyun * NETLINK Netlink attributes
4*4882a593Smuzhiyun *
5*4882a593Smuzhiyun * Authors: Thomas Graf <tgraf@suug.ch>
6*4882a593Smuzhiyun * Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
7*4882a593Smuzhiyun */
8*4882a593Smuzhiyun
9*4882a593Smuzhiyun #include <linux/export.h>
10*4882a593Smuzhiyun #include <linux/kernel.h>
11*4882a593Smuzhiyun #include <linux/errno.h>
12*4882a593Smuzhiyun #include <linux/jiffies.h>
13*4882a593Smuzhiyun #include <linux/skbuff.h>
14*4882a593Smuzhiyun #include <linux/string.h>
15*4882a593Smuzhiyun #include <linux/types.h>
16*4882a593Smuzhiyun #include <net/netlink.h>
17*4882a593Smuzhiyun
18*4882a593Smuzhiyun /* For these data types, attribute length should be exactly the given
19*4882a593Smuzhiyun * size. However, to maintain compatibility with broken commands, if the
20*4882a593Smuzhiyun * attribute length does not match the expected size a warning is emitted
21*4882a593Smuzhiyun * to the user that the command is sending invalid data and needs to be fixed.
22*4882a593Smuzhiyun */
23*4882a593Smuzhiyun static const u8 nla_attr_len[NLA_TYPE_MAX+1] = {
24*4882a593Smuzhiyun [NLA_U8] = sizeof(u8),
25*4882a593Smuzhiyun [NLA_U16] = sizeof(u16),
26*4882a593Smuzhiyun [NLA_U32] = sizeof(u32),
27*4882a593Smuzhiyun [NLA_U64] = sizeof(u64),
28*4882a593Smuzhiyun [NLA_S8] = sizeof(s8),
29*4882a593Smuzhiyun [NLA_S16] = sizeof(s16),
30*4882a593Smuzhiyun [NLA_S32] = sizeof(s32),
31*4882a593Smuzhiyun [NLA_S64] = sizeof(s64),
32*4882a593Smuzhiyun };
33*4882a593Smuzhiyun
34*4882a593Smuzhiyun static const u8 nla_attr_minlen[NLA_TYPE_MAX+1] = {
35*4882a593Smuzhiyun [NLA_U8] = sizeof(u8),
36*4882a593Smuzhiyun [NLA_U16] = sizeof(u16),
37*4882a593Smuzhiyun [NLA_U32] = sizeof(u32),
38*4882a593Smuzhiyun [NLA_U64] = sizeof(u64),
39*4882a593Smuzhiyun [NLA_MSECS] = sizeof(u64),
40*4882a593Smuzhiyun [NLA_NESTED] = NLA_HDRLEN,
41*4882a593Smuzhiyun [NLA_S8] = sizeof(s8),
42*4882a593Smuzhiyun [NLA_S16] = sizeof(s16),
43*4882a593Smuzhiyun [NLA_S32] = sizeof(s32),
44*4882a593Smuzhiyun [NLA_S64] = sizeof(s64),
45*4882a593Smuzhiyun };
46*4882a593Smuzhiyun
47*4882a593Smuzhiyun /*
48*4882a593Smuzhiyun * Nested policies might refer back to the original
49*4882a593Smuzhiyun * policy in some cases, and userspace could try to
50*4882a593Smuzhiyun * abuse that and recurse by nesting in the right
51*4882a593Smuzhiyun * ways. Limit recursion to avoid this problem.
52*4882a593Smuzhiyun */
53*4882a593Smuzhiyun #define MAX_POLICY_RECURSION_DEPTH 10
54*4882a593Smuzhiyun
55*4882a593Smuzhiyun static int __nla_validate_parse(const struct nlattr *head, int len, int maxtype,
56*4882a593Smuzhiyun const struct nla_policy *policy,
57*4882a593Smuzhiyun unsigned int validate,
58*4882a593Smuzhiyun struct netlink_ext_ack *extack,
59*4882a593Smuzhiyun struct nlattr **tb, unsigned int depth);
60*4882a593Smuzhiyun
validate_nla_bitfield32(const struct nlattr * nla,const u32 valid_flags_mask)61*4882a593Smuzhiyun static int validate_nla_bitfield32(const struct nlattr *nla,
62*4882a593Smuzhiyun const u32 valid_flags_mask)
63*4882a593Smuzhiyun {
64*4882a593Smuzhiyun const struct nla_bitfield32 *bf = nla_data(nla);
65*4882a593Smuzhiyun
66*4882a593Smuzhiyun if (!valid_flags_mask)
67*4882a593Smuzhiyun return -EINVAL;
68*4882a593Smuzhiyun
69*4882a593Smuzhiyun /*disallow invalid bit selector */
70*4882a593Smuzhiyun if (bf->selector & ~valid_flags_mask)
71*4882a593Smuzhiyun return -EINVAL;
72*4882a593Smuzhiyun
73*4882a593Smuzhiyun /*disallow invalid bit values */
74*4882a593Smuzhiyun if (bf->value & ~valid_flags_mask)
75*4882a593Smuzhiyun return -EINVAL;
76*4882a593Smuzhiyun
77*4882a593Smuzhiyun /*disallow valid bit values that are not selected*/
78*4882a593Smuzhiyun if (bf->value & ~bf->selector)
79*4882a593Smuzhiyun return -EINVAL;
80*4882a593Smuzhiyun
81*4882a593Smuzhiyun return 0;
82*4882a593Smuzhiyun }
83*4882a593Smuzhiyun
nla_validate_array(const struct nlattr * head,int len,int maxtype,const struct nla_policy * policy,struct netlink_ext_ack * extack,unsigned int validate,unsigned int depth)84*4882a593Smuzhiyun static int nla_validate_array(const struct nlattr *head, int len, int maxtype,
85*4882a593Smuzhiyun const struct nla_policy *policy,
86*4882a593Smuzhiyun struct netlink_ext_ack *extack,
87*4882a593Smuzhiyun unsigned int validate, unsigned int depth)
88*4882a593Smuzhiyun {
89*4882a593Smuzhiyun const struct nlattr *entry;
90*4882a593Smuzhiyun int rem;
91*4882a593Smuzhiyun
92*4882a593Smuzhiyun nla_for_each_attr(entry, head, len, rem) {
93*4882a593Smuzhiyun int ret;
94*4882a593Smuzhiyun
95*4882a593Smuzhiyun if (nla_len(entry) == 0)
96*4882a593Smuzhiyun continue;
97*4882a593Smuzhiyun
98*4882a593Smuzhiyun if (nla_len(entry) < NLA_HDRLEN) {
99*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR_POL(extack, entry, policy,
100*4882a593Smuzhiyun "Array element too short");
101*4882a593Smuzhiyun return -ERANGE;
102*4882a593Smuzhiyun }
103*4882a593Smuzhiyun
104*4882a593Smuzhiyun ret = __nla_validate_parse(nla_data(entry), nla_len(entry),
105*4882a593Smuzhiyun maxtype, policy, validate, extack,
106*4882a593Smuzhiyun NULL, depth + 1);
107*4882a593Smuzhiyun if (ret < 0)
108*4882a593Smuzhiyun return ret;
109*4882a593Smuzhiyun }
110*4882a593Smuzhiyun
111*4882a593Smuzhiyun return 0;
112*4882a593Smuzhiyun }
113*4882a593Smuzhiyun
nla_get_range_unsigned(const struct nla_policy * pt,struct netlink_range_validation * range)114*4882a593Smuzhiyun void nla_get_range_unsigned(const struct nla_policy *pt,
115*4882a593Smuzhiyun struct netlink_range_validation *range)
116*4882a593Smuzhiyun {
117*4882a593Smuzhiyun WARN_ON_ONCE(pt->validation_type != NLA_VALIDATE_RANGE_PTR &&
118*4882a593Smuzhiyun (pt->min < 0 || pt->max < 0));
119*4882a593Smuzhiyun
120*4882a593Smuzhiyun range->min = 0;
121*4882a593Smuzhiyun
122*4882a593Smuzhiyun switch (pt->type) {
123*4882a593Smuzhiyun case NLA_U8:
124*4882a593Smuzhiyun range->max = U8_MAX;
125*4882a593Smuzhiyun break;
126*4882a593Smuzhiyun case NLA_U16:
127*4882a593Smuzhiyun case NLA_BINARY:
128*4882a593Smuzhiyun range->max = U16_MAX;
129*4882a593Smuzhiyun break;
130*4882a593Smuzhiyun case NLA_U32:
131*4882a593Smuzhiyun range->max = U32_MAX;
132*4882a593Smuzhiyun break;
133*4882a593Smuzhiyun case NLA_U64:
134*4882a593Smuzhiyun case NLA_MSECS:
135*4882a593Smuzhiyun range->max = U64_MAX;
136*4882a593Smuzhiyun break;
137*4882a593Smuzhiyun default:
138*4882a593Smuzhiyun WARN_ON_ONCE(1);
139*4882a593Smuzhiyun return;
140*4882a593Smuzhiyun }
141*4882a593Smuzhiyun
142*4882a593Smuzhiyun switch (pt->validation_type) {
143*4882a593Smuzhiyun case NLA_VALIDATE_RANGE:
144*4882a593Smuzhiyun case NLA_VALIDATE_RANGE_WARN_TOO_LONG:
145*4882a593Smuzhiyun range->min = pt->min;
146*4882a593Smuzhiyun range->max = pt->max;
147*4882a593Smuzhiyun break;
148*4882a593Smuzhiyun case NLA_VALIDATE_RANGE_PTR:
149*4882a593Smuzhiyun *range = *pt->range;
150*4882a593Smuzhiyun break;
151*4882a593Smuzhiyun case NLA_VALIDATE_MIN:
152*4882a593Smuzhiyun range->min = pt->min;
153*4882a593Smuzhiyun break;
154*4882a593Smuzhiyun case NLA_VALIDATE_MAX:
155*4882a593Smuzhiyun range->max = pt->max;
156*4882a593Smuzhiyun break;
157*4882a593Smuzhiyun default:
158*4882a593Smuzhiyun break;
159*4882a593Smuzhiyun }
160*4882a593Smuzhiyun }
161*4882a593Smuzhiyun
nla_validate_range_unsigned(const struct nla_policy * pt,const struct nlattr * nla,struct netlink_ext_ack * extack,unsigned int validate)162*4882a593Smuzhiyun static int nla_validate_range_unsigned(const struct nla_policy *pt,
163*4882a593Smuzhiyun const struct nlattr *nla,
164*4882a593Smuzhiyun struct netlink_ext_ack *extack,
165*4882a593Smuzhiyun unsigned int validate)
166*4882a593Smuzhiyun {
167*4882a593Smuzhiyun struct netlink_range_validation range;
168*4882a593Smuzhiyun u64 value;
169*4882a593Smuzhiyun
170*4882a593Smuzhiyun switch (pt->type) {
171*4882a593Smuzhiyun case NLA_U8:
172*4882a593Smuzhiyun value = nla_get_u8(nla);
173*4882a593Smuzhiyun break;
174*4882a593Smuzhiyun case NLA_U16:
175*4882a593Smuzhiyun value = nla_get_u16(nla);
176*4882a593Smuzhiyun break;
177*4882a593Smuzhiyun case NLA_U32:
178*4882a593Smuzhiyun value = nla_get_u32(nla);
179*4882a593Smuzhiyun break;
180*4882a593Smuzhiyun case NLA_U64:
181*4882a593Smuzhiyun case NLA_MSECS:
182*4882a593Smuzhiyun value = nla_get_u64(nla);
183*4882a593Smuzhiyun break;
184*4882a593Smuzhiyun case NLA_BINARY:
185*4882a593Smuzhiyun value = nla_len(nla);
186*4882a593Smuzhiyun break;
187*4882a593Smuzhiyun default:
188*4882a593Smuzhiyun return -EINVAL;
189*4882a593Smuzhiyun }
190*4882a593Smuzhiyun
191*4882a593Smuzhiyun nla_get_range_unsigned(pt, &range);
192*4882a593Smuzhiyun
193*4882a593Smuzhiyun if (pt->validation_type == NLA_VALIDATE_RANGE_WARN_TOO_LONG &&
194*4882a593Smuzhiyun pt->type == NLA_BINARY && value > range.max) {
195*4882a593Smuzhiyun pr_warn_ratelimited("netlink: '%s': attribute type %d has an invalid length.\n",
196*4882a593Smuzhiyun current->comm, pt->type);
197*4882a593Smuzhiyun if (validate & NL_VALIDATE_STRICT_ATTRS) {
198*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR_POL(extack, nla, pt,
199*4882a593Smuzhiyun "invalid attribute length");
200*4882a593Smuzhiyun return -EINVAL;
201*4882a593Smuzhiyun }
202*4882a593Smuzhiyun
203*4882a593Smuzhiyun /* this assumes min <= max (don't validate against min) */
204*4882a593Smuzhiyun return 0;
205*4882a593Smuzhiyun }
206*4882a593Smuzhiyun
207*4882a593Smuzhiyun if (value < range.min || value > range.max) {
208*4882a593Smuzhiyun bool binary = pt->type == NLA_BINARY;
209*4882a593Smuzhiyun
210*4882a593Smuzhiyun if (binary)
211*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR_POL(extack, nla, pt,
212*4882a593Smuzhiyun "binary attribute size out of range");
213*4882a593Smuzhiyun else
214*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR_POL(extack, nla, pt,
215*4882a593Smuzhiyun "integer out of range");
216*4882a593Smuzhiyun
217*4882a593Smuzhiyun return -ERANGE;
218*4882a593Smuzhiyun }
219*4882a593Smuzhiyun
220*4882a593Smuzhiyun return 0;
221*4882a593Smuzhiyun }
222*4882a593Smuzhiyun
nla_get_range_signed(const struct nla_policy * pt,struct netlink_range_validation_signed * range)223*4882a593Smuzhiyun void nla_get_range_signed(const struct nla_policy *pt,
224*4882a593Smuzhiyun struct netlink_range_validation_signed *range)
225*4882a593Smuzhiyun {
226*4882a593Smuzhiyun switch (pt->type) {
227*4882a593Smuzhiyun case NLA_S8:
228*4882a593Smuzhiyun range->min = S8_MIN;
229*4882a593Smuzhiyun range->max = S8_MAX;
230*4882a593Smuzhiyun break;
231*4882a593Smuzhiyun case NLA_S16:
232*4882a593Smuzhiyun range->min = S16_MIN;
233*4882a593Smuzhiyun range->max = S16_MAX;
234*4882a593Smuzhiyun break;
235*4882a593Smuzhiyun case NLA_S32:
236*4882a593Smuzhiyun range->min = S32_MIN;
237*4882a593Smuzhiyun range->max = S32_MAX;
238*4882a593Smuzhiyun break;
239*4882a593Smuzhiyun case NLA_S64:
240*4882a593Smuzhiyun range->min = S64_MIN;
241*4882a593Smuzhiyun range->max = S64_MAX;
242*4882a593Smuzhiyun break;
243*4882a593Smuzhiyun default:
244*4882a593Smuzhiyun WARN_ON_ONCE(1);
245*4882a593Smuzhiyun return;
246*4882a593Smuzhiyun }
247*4882a593Smuzhiyun
248*4882a593Smuzhiyun switch (pt->validation_type) {
249*4882a593Smuzhiyun case NLA_VALIDATE_RANGE:
250*4882a593Smuzhiyun range->min = pt->min;
251*4882a593Smuzhiyun range->max = pt->max;
252*4882a593Smuzhiyun break;
253*4882a593Smuzhiyun case NLA_VALIDATE_RANGE_PTR:
254*4882a593Smuzhiyun *range = *pt->range_signed;
255*4882a593Smuzhiyun break;
256*4882a593Smuzhiyun case NLA_VALIDATE_MIN:
257*4882a593Smuzhiyun range->min = pt->min;
258*4882a593Smuzhiyun break;
259*4882a593Smuzhiyun case NLA_VALIDATE_MAX:
260*4882a593Smuzhiyun range->max = pt->max;
261*4882a593Smuzhiyun break;
262*4882a593Smuzhiyun default:
263*4882a593Smuzhiyun break;
264*4882a593Smuzhiyun }
265*4882a593Smuzhiyun }
266*4882a593Smuzhiyun
nla_validate_int_range_signed(const struct nla_policy * pt,const struct nlattr * nla,struct netlink_ext_ack * extack)267*4882a593Smuzhiyun static int nla_validate_int_range_signed(const struct nla_policy *pt,
268*4882a593Smuzhiyun const struct nlattr *nla,
269*4882a593Smuzhiyun struct netlink_ext_ack *extack)
270*4882a593Smuzhiyun {
271*4882a593Smuzhiyun struct netlink_range_validation_signed range;
272*4882a593Smuzhiyun s64 value;
273*4882a593Smuzhiyun
274*4882a593Smuzhiyun switch (pt->type) {
275*4882a593Smuzhiyun case NLA_S8:
276*4882a593Smuzhiyun value = nla_get_s8(nla);
277*4882a593Smuzhiyun break;
278*4882a593Smuzhiyun case NLA_S16:
279*4882a593Smuzhiyun value = nla_get_s16(nla);
280*4882a593Smuzhiyun break;
281*4882a593Smuzhiyun case NLA_S32:
282*4882a593Smuzhiyun value = nla_get_s32(nla);
283*4882a593Smuzhiyun break;
284*4882a593Smuzhiyun case NLA_S64:
285*4882a593Smuzhiyun value = nla_get_s64(nla);
286*4882a593Smuzhiyun break;
287*4882a593Smuzhiyun default:
288*4882a593Smuzhiyun return -EINVAL;
289*4882a593Smuzhiyun }
290*4882a593Smuzhiyun
291*4882a593Smuzhiyun nla_get_range_signed(pt, &range);
292*4882a593Smuzhiyun
293*4882a593Smuzhiyun if (value < range.min || value > range.max) {
294*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR_POL(extack, nla, pt,
295*4882a593Smuzhiyun "integer out of range");
296*4882a593Smuzhiyun return -ERANGE;
297*4882a593Smuzhiyun }
298*4882a593Smuzhiyun
299*4882a593Smuzhiyun return 0;
300*4882a593Smuzhiyun }
301*4882a593Smuzhiyun
nla_validate_int_range(const struct nla_policy * pt,const struct nlattr * nla,struct netlink_ext_ack * extack,unsigned int validate)302*4882a593Smuzhiyun static int nla_validate_int_range(const struct nla_policy *pt,
303*4882a593Smuzhiyun const struct nlattr *nla,
304*4882a593Smuzhiyun struct netlink_ext_ack *extack,
305*4882a593Smuzhiyun unsigned int validate)
306*4882a593Smuzhiyun {
307*4882a593Smuzhiyun switch (pt->type) {
308*4882a593Smuzhiyun case NLA_U8:
309*4882a593Smuzhiyun case NLA_U16:
310*4882a593Smuzhiyun case NLA_U32:
311*4882a593Smuzhiyun case NLA_U64:
312*4882a593Smuzhiyun case NLA_MSECS:
313*4882a593Smuzhiyun case NLA_BINARY:
314*4882a593Smuzhiyun return nla_validate_range_unsigned(pt, nla, extack, validate);
315*4882a593Smuzhiyun case NLA_S8:
316*4882a593Smuzhiyun case NLA_S16:
317*4882a593Smuzhiyun case NLA_S32:
318*4882a593Smuzhiyun case NLA_S64:
319*4882a593Smuzhiyun return nla_validate_int_range_signed(pt, nla, extack);
320*4882a593Smuzhiyun default:
321*4882a593Smuzhiyun WARN_ON(1);
322*4882a593Smuzhiyun return -EINVAL;
323*4882a593Smuzhiyun }
324*4882a593Smuzhiyun }
325*4882a593Smuzhiyun
nla_validate_mask(const struct nla_policy * pt,const struct nlattr * nla,struct netlink_ext_ack * extack)326*4882a593Smuzhiyun static int nla_validate_mask(const struct nla_policy *pt,
327*4882a593Smuzhiyun const struct nlattr *nla,
328*4882a593Smuzhiyun struct netlink_ext_ack *extack)
329*4882a593Smuzhiyun {
330*4882a593Smuzhiyun u64 value;
331*4882a593Smuzhiyun
332*4882a593Smuzhiyun switch (pt->type) {
333*4882a593Smuzhiyun case NLA_U8:
334*4882a593Smuzhiyun value = nla_get_u8(nla);
335*4882a593Smuzhiyun break;
336*4882a593Smuzhiyun case NLA_U16:
337*4882a593Smuzhiyun value = nla_get_u16(nla);
338*4882a593Smuzhiyun break;
339*4882a593Smuzhiyun case NLA_U32:
340*4882a593Smuzhiyun value = nla_get_u32(nla);
341*4882a593Smuzhiyun break;
342*4882a593Smuzhiyun case NLA_U64:
343*4882a593Smuzhiyun value = nla_get_u64(nla);
344*4882a593Smuzhiyun break;
345*4882a593Smuzhiyun default:
346*4882a593Smuzhiyun return -EINVAL;
347*4882a593Smuzhiyun }
348*4882a593Smuzhiyun
349*4882a593Smuzhiyun if (value & ~(u64)pt->mask) {
350*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR(extack, nla, "reserved bit set");
351*4882a593Smuzhiyun return -EINVAL;
352*4882a593Smuzhiyun }
353*4882a593Smuzhiyun
354*4882a593Smuzhiyun return 0;
355*4882a593Smuzhiyun }
356*4882a593Smuzhiyun
validate_nla(const struct nlattr * nla,int maxtype,const struct nla_policy * policy,unsigned int validate,struct netlink_ext_ack * extack,unsigned int depth)357*4882a593Smuzhiyun static int validate_nla(const struct nlattr *nla, int maxtype,
358*4882a593Smuzhiyun const struct nla_policy *policy, unsigned int validate,
359*4882a593Smuzhiyun struct netlink_ext_ack *extack, unsigned int depth)
360*4882a593Smuzhiyun {
361*4882a593Smuzhiyun u16 strict_start_type = policy[0].strict_start_type;
362*4882a593Smuzhiyun const struct nla_policy *pt;
363*4882a593Smuzhiyun int minlen = 0, attrlen = nla_len(nla), type = nla_type(nla);
364*4882a593Smuzhiyun int err = -ERANGE;
365*4882a593Smuzhiyun
366*4882a593Smuzhiyun if (strict_start_type && type >= strict_start_type)
367*4882a593Smuzhiyun validate |= NL_VALIDATE_STRICT;
368*4882a593Smuzhiyun
369*4882a593Smuzhiyun if (type <= 0 || type > maxtype)
370*4882a593Smuzhiyun return 0;
371*4882a593Smuzhiyun
372*4882a593Smuzhiyun pt = &policy[type];
373*4882a593Smuzhiyun
374*4882a593Smuzhiyun BUG_ON(pt->type > NLA_TYPE_MAX);
375*4882a593Smuzhiyun
376*4882a593Smuzhiyun if (nla_attr_len[pt->type] && attrlen != nla_attr_len[pt->type]) {
377*4882a593Smuzhiyun pr_warn_ratelimited("netlink: '%s': attribute type %d has an invalid length.\n",
378*4882a593Smuzhiyun current->comm, type);
379*4882a593Smuzhiyun if (validate & NL_VALIDATE_STRICT_ATTRS) {
380*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR_POL(extack, nla, pt,
381*4882a593Smuzhiyun "invalid attribute length");
382*4882a593Smuzhiyun return -EINVAL;
383*4882a593Smuzhiyun }
384*4882a593Smuzhiyun }
385*4882a593Smuzhiyun
386*4882a593Smuzhiyun if (validate & NL_VALIDATE_NESTED) {
387*4882a593Smuzhiyun if ((pt->type == NLA_NESTED || pt->type == NLA_NESTED_ARRAY) &&
388*4882a593Smuzhiyun !(nla->nla_type & NLA_F_NESTED)) {
389*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR_POL(extack, nla, pt,
390*4882a593Smuzhiyun "NLA_F_NESTED is missing");
391*4882a593Smuzhiyun return -EINVAL;
392*4882a593Smuzhiyun }
393*4882a593Smuzhiyun if (pt->type != NLA_NESTED && pt->type != NLA_NESTED_ARRAY &&
394*4882a593Smuzhiyun pt->type != NLA_UNSPEC && (nla->nla_type & NLA_F_NESTED)) {
395*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR_POL(extack, nla, pt,
396*4882a593Smuzhiyun "NLA_F_NESTED not expected");
397*4882a593Smuzhiyun return -EINVAL;
398*4882a593Smuzhiyun }
399*4882a593Smuzhiyun }
400*4882a593Smuzhiyun
401*4882a593Smuzhiyun switch (pt->type) {
402*4882a593Smuzhiyun case NLA_REJECT:
403*4882a593Smuzhiyun if (extack && pt->reject_message) {
404*4882a593Smuzhiyun NL_SET_BAD_ATTR(extack, nla);
405*4882a593Smuzhiyun extack->_msg = pt->reject_message;
406*4882a593Smuzhiyun return -EINVAL;
407*4882a593Smuzhiyun }
408*4882a593Smuzhiyun err = -EINVAL;
409*4882a593Smuzhiyun goto out_err;
410*4882a593Smuzhiyun
411*4882a593Smuzhiyun case NLA_FLAG:
412*4882a593Smuzhiyun if (attrlen > 0)
413*4882a593Smuzhiyun goto out_err;
414*4882a593Smuzhiyun break;
415*4882a593Smuzhiyun
416*4882a593Smuzhiyun case NLA_BITFIELD32:
417*4882a593Smuzhiyun if (attrlen != sizeof(struct nla_bitfield32))
418*4882a593Smuzhiyun goto out_err;
419*4882a593Smuzhiyun
420*4882a593Smuzhiyun err = validate_nla_bitfield32(nla, pt->bitfield32_valid);
421*4882a593Smuzhiyun if (err)
422*4882a593Smuzhiyun goto out_err;
423*4882a593Smuzhiyun break;
424*4882a593Smuzhiyun
425*4882a593Smuzhiyun case NLA_NUL_STRING:
426*4882a593Smuzhiyun if (pt->len)
427*4882a593Smuzhiyun minlen = min_t(int, attrlen, pt->len + 1);
428*4882a593Smuzhiyun else
429*4882a593Smuzhiyun minlen = attrlen;
430*4882a593Smuzhiyun
431*4882a593Smuzhiyun if (!minlen || memchr(nla_data(nla), '\0', minlen) == NULL) {
432*4882a593Smuzhiyun err = -EINVAL;
433*4882a593Smuzhiyun goto out_err;
434*4882a593Smuzhiyun }
435*4882a593Smuzhiyun /* fall through */
436*4882a593Smuzhiyun
437*4882a593Smuzhiyun case NLA_STRING:
438*4882a593Smuzhiyun if (attrlen < 1)
439*4882a593Smuzhiyun goto out_err;
440*4882a593Smuzhiyun
441*4882a593Smuzhiyun if (pt->len) {
442*4882a593Smuzhiyun char *buf = nla_data(nla);
443*4882a593Smuzhiyun
444*4882a593Smuzhiyun if (buf[attrlen - 1] == '\0')
445*4882a593Smuzhiyun attrlen--;
446*4882a593Smuzhiyun
447*4882a593Smuzhiyun if (attrlen > pt->len)
448*4882a593Smuzhiyun goto out_err;
449*4882a593Smuzhiyun }
450*4882a593Smuzhiyun break;
451*4882a593Smuzhiyun
452*4882a593Smuzhiyun case NLA_BINARY:
453*4882a593Smuzhiyun if (pt->len && attrlen > pt->len)
454*4882a593Smuzhiyun goto out_err;
455*4882a593Smuzhiyun break;
456*4882a593Smuzhiyun
457*4882a593Smuzhiyun case NLA_NESTED:
458*4882a593Smuzhiyun /* a nested attributes is allowed to be empty; if its not,
459*4882a593Smuzhiyun * it must have a size of at least NLA_HDRLEN.
460*4882a593Smuzhiyun */
461*4882a593Smuzhiyun if (attrlen == 0)
462*4882a593Smuzhiyun break;
463*4882a593Smuzhiyun if (attrlen < NLA_HDRLEN)
464*4882a593Smuzhiyun goto out_err;
465*4882a593Smuzhiyun if (pt->nested_policy) {
466*4882a593Smuzhiyun err = __nla_validate_parse(nla_data(nla), nla_len(nla),
467*4882a593Smuzhiyun pt->len, pt->nested_policy,
468*4882a593Smuzhiyun validate, extack, NULL,
469*4882a593Smuzhiyun depth + 1);
470*4882a593Smuzhiyun if (err < 0) {
471*4882a593Smuzhiyun /*
472*4882a593Smuzhiyun * return directly to preserve the inner
473*4882a593Smuzhiyun * error message/attribute pointer
474*4882a593Smuzhiyun */
475*4882a593Smuzhiyun return err;
476*4882a593Smuzhiyun }
477*4882a593Smuzhiyun }
478*4882a593Smuzhiyun break;
479*4882a593Smuzhiyun case NLA_NESTED_ARRAY:
480*4882a593Smuzhiyun /* a nested array attribute is allowed to be empty; if its not,
481*4882a593Smuzhiyun * it must have a size of at least NLA_HDRLEN.
482*4882a593Smuzhiyun */
483*4882a593Smuzhiyun if (attrlen == 0)
484*4882a593Smuzhiyun break;
485*4882a593Smuzhiyun if (attrlen < NLA_HDRLEN)
486*4882a593Smuzhiyun goto out_err;
487*4882a593Smuzhiyun if (pt->nested_policy) {
488*4882a593Smuzhiyun int err;
489*4882a593Smuzhiyun
490*4882a593Smuzhiyun err = nla_validate_array(nla_data(nla), nla_len(nla),
491*4882a593Smuzhiyun pt->len, pt->nested_policy,
492*4882a593Smuzhiyun extack, validate, depth);
493*4882a593Smuzhiyun if (err < 0) {
494*4882a593Smuzhiyun /*
495*4882a593Smuzhiyun * return directly to preserve the inner
496*4882a593Smuzhiyun * error message/attribute pointer
497*4882a593Smuzhiyun */
498*4882a593Smuzhiyun return err;
499*4882a593Smuzhiyun }
500*4882a593Smuzhiyun }
501*4882a593Smuzhiyun break;
502*4882a593Smuzhiyun
503*4882a593Smuzhiyun case NLA_UNSPEC:
504*4882a593Smuzhiyun if (validate & NL_VALIDATE_UNSPEC) {
505*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR(extack, nla,
506*4882a593Smuzhiyun "Unsupported attribute");
507*4882a593Smuzhiyun return -EINVAL;
508*4882a593Smuzhiyun }
509*4882a593Smuzhiyun if (attrlen < pt->len)
510*4882a593Smuzhiyun goto out_err;
511*4882a593Smuzhiyun break;
512*4882a593Smuzhiyun
513*4882a593Smuzhiyun default:
514*4882a593Smuzhiyun if (pt->len)
515*4882a593Smuzhiyun minlen = pt->len;
516*4882a593Smuzhiyun else
517*4882a593Smuzhiyun minlen = nla_attr_minlen[pt->type];
518*4882a593Smuzhiyun
519*4882a593Smuzhiyun if (attrlen < minlen)
520*4882a593Smuzhiyun goto out_err;
521*4882a593Smuzhiyun }
522*4882a593Smuzhiyun
523*4882a593Smuzhiyun /* further validation */
524*4882a593Smuzhiyun switch (pt->validation_type) {
525*4882a593Smuzhiyun case NLA_VALIDATE_NONE:
526*4882a593Smuzhiyun /* nothing to do */
527*4882a593Smuzhiyun break;
528*4882a593Smuzhiyun case NLA_VALIDATE_RANGE_PTR:
529*4882a593Smuzhiyun case NLA_VALIDATE_RANGE:
530*4882a593Smuzhiyun case NLA_VALIDATE_RANGE_WARN_TOO_LONG:
531*4882a593Smuzhiyun case NLA_VALIDATE_MIN:
532*4882a593Smuzhiyun case NLA_VALIDATE_MAX:
533*4882a593Smuzhiyun err = nla_validate_int_range(pt, nla, extack, validate);
534*4882a593Smuzhiyun if (err)
535*4882a593Smuzhiyun return err;
536*4882a593Smuzhiyun break;
537*4882a593Smuzhiyun case NLA_VALIDATE_MASK:
538*4882a593Smuzhiyun err = nla_validate_mask(pt, nla, extack);
539*4882a593Smuzhiyun if (err)
540*4882a593Smuzhiyun return err;
541*4882a593Smuzhiyun break;
542*4882a593Smuzhiyun case NLA_VALIDATE_FUNCTION:
543*4882a593Smuzhiyun if (pt->validate) {
544*4882a593Smuzhiyun err = pt->validate(nla, extack);
545*4882a593Smuzhiyun if (err)
546*4882a593Smuzhiyun return err;
547*4882a593Smuzhiyun }
548*4882a593Smuzhiyun break;
549*4882a593Smuzhiyun }
550*4882a593Smuzhiyun
551*4882a593Smuzhiyun return 0;
552*4882a593Smuzhiyun out_err:
553*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR_POL(extack, nla, pt,
554*4882a593Smuzhiyun "Attribute failed policy validation");
555*4882a593Smuzhiyun return err;
556*4882a593Smuzhiyun }
557*4882a593Smuzhiyun
__nla_validate_parse(const struct nlattr * head,int len,int maxtype,const struct nla_policy * policy,unsigned int validate,struct netlink_ext_ack * extack,struct nlattr ** tb,unsigned int depth)558*4882a593Smuzhiyun static int __nla_validate_parse(const struct nlattr *head, int len, int maxtype,
559*4882a593Smuzhiyun const struct nla_policy *policy,
560*4882a593Smuzhiyun unsigned int validate,
561*4882a593Smuzhiyun struct netlink_ext_ack *extack,
562*4882a593Smuzhiyun struct nlattr **tb, unsigned int depth)
563*4882a593Smuzhiyun {
564*4882a593Smuzhiyun const struct nlattr *nla;
565*4882a593Smuzhiyun int rem;
566*4882a593Smuzhiyun
567*4882a593Smuzhiyun if (depth >= MAX_POLICY_RECURSION_DEPTH) {
568*4882a593Smuzhiyun NL_SET_ERR_MSG(extack,
569*4882a593Smuzhiyun "allowed policy recursion depth exceeded");
570*4882a593Smuzhiyun return -EINVAL;
571*4882a593Smuzhiyun }
572*4882a593Smuzhiyun
573*4882a593Smuzhiyun if (tb)
574*4882a593Smuzhiyun memset(tb, 0, sizeof(struct nlattr *) * (maxtype + 1));
575*4882a593Smuzhiyun
576*4882a593Smuzhiyun nla_for_each_attr(nla, head, len, rem) {
577*4882a593Smuzhiyun u16 type = nla_type(nla);
578*4882a593Smuzhiyun
579*4882a593Smuzhiyun if (type == 0 || type > maxtype) {
580*4882a593Smuzhiyun if (validate & NL_VALIDATE_MAXTYPE) {
581*4882a593Smuzhiyun NL_SET_ERR_MSG_ATTR(extack, nla,
582*4882a593Smuzhiyun "Unknown attribute type");
583*4882a593Smuzhiyun return -EINVAL;
584*4882a593Smuzhiyun }
585*4882a593Smuzhiyun continue;
586*4882a593Smuzhiyun }
587*4882a593Smuzhiyun if (policy) {
588*4882a593Smuzhiyun int err = validate_nla(nla, maxtype, policy,
589*4882a593Smuzhiyun validate, extack, depth);
590*4882a593Smuzhiyun
591*4882a593Smuzhiyun if (err < 0)
592*4882a593Smuzhiyun return err;
593*4882a593Smuzhiyun }
594*4882a593Smuzhiyun
595*4882a593Smuzhiyun if (tb)
596*4882a593Smuzhiyun tb[type] = (struct nlattr *)nla;
597*4882a593Smuzhiyun }
598*4882a593Smuzhiyun
599*4882a593Smuzhiyun if (unlikely(rem > 0)) {
600*4882a593Smuzhiyun pr_warn_ratelimited("netlink: %d bytes leftover after parsing attributes in process `%s'.\n",
601*4882a593Smuzhiyun rem, current->comm);
602*4882a593Smuzhiyun NL_SET_ERR_MSG(extack, "bytes leftover after parsing attributes");
603*4882a593Smuzhiyun if (validate & NL_VALIDATE_TRAILING)
604*4882a593Smuzhiyun return -EINVAL;
605*4882a593Smuzhiyun }
606*4882a593Smuzhiyun
607*4882a593Smuzhiyun return 0;
608*4882a593Smuzhiyun }
609*4882a593Smuzhiyun
610*4882a593Smuzhiyun /**
611*4882a593Smuzhiyun * __nla_validate - Validate a stream of attributes
612*4882a593Smuzhiyun * @head: head of attribute stream
613*4882a593Smuzhiyun * @len: length of attribute stream
614*4882a593Smuzhiyun * @maxtype: maximum attribute type to be expected
615*4882a593Smuzhiyun * @policy: validation policy
616*4882a593Smuzhiyun * @validate: validation strictness
617*4882a593Smuzhiyun * @extack: extended ACK report struct
618*4882a593Smuzhiyun *
619*4882a593Smuzhiyun * Validates all attributes in the specified attribute stream against the
620*4882a593Smuzhiyun * specified policy. Validation depends on the validate flags passed, see
621*4882a593Smuzhiyun * &enum netlink_validation for more details on that.
622*4882a593Smuzhiyun * See documenation of struct nla_policy for more details.
623*4882a593Smuzhiyun *
624*4882a593Smuzhiyun * Returns 0 on success or a negative error code.
625*4882a593Smuzhiyun */
__nla_validate(const struct nlattr * head,int len,int maxtype,const struct nla_policy * policy,unsigned int validate,struct netlink_ext_ack * extack)626*4882a593Smuzhiyun int __nla_validate(const struct nlattr *head, int len, int maxtype,
627*4882a593Smuzhiyun const struct nla_policy *policy, unsigned int validate,
628*4882a593Smuzhiyun struct netlink_ext_ack *extack)
629*4882a593Smuzhiyun {
630*4882a593Smuzhiyun return __nla_validate_parse(head, len, maxtype, policy, validate,
631*4882a593Smuzhiyun extack, NULL, 0);
632*4882a593Smuzhiyun }
633*4882a593Smuzhiyun EXPORT_SYMBOL(__nla_validate);
634*4882a593Smuzhiyun
635*4882a593Smuzhiyun /**
636*4882a593Smuzhiyun * nla_policy_len - Determin the max. length of a policy
637*4882a593Smuzhiyun * @policy: policy to use
638*4882a593Smuzhiyun * @n: number of policies
639*4882a593Smuzhiyun *
640*4882a593Smuzhiyun * Determines the max. length of the policy. It is currently used
641*4882a593Smuzhiyun * to allocated Netlink buffers roughly the size of the actual
642*4882a593Smuzhiyun * message.
643*4882a593Smuzhiyun *
644*4882a593Smuzhiyun * Returns 0 on success or a negative error code.
645*4882a593Smuzhiyun */
646*4882a593Smuzhiyun int
nla_policy_len(const struct nla_policy * p,int n)647*4882a593Smuzhiyun nla_policy_len(const struct nla_policy *p, int n)
648*4882a593Smuzhiyun {
649*4882a593Smuzhiyun int i, len = 0;
650*4882a593Smuzhiyun
651*4882a593Smuzhiyun for (i = 0; i < n; i++, p++) {
652*4882a593Smuzhiyun if (p->len)
653*4882a593Smuzhiyun len += nla_total_size(p->len);
654*4882a593Smuzhiyun else if (nla_attr_len[p->type])
655*4882a593Smuzhiyun len += nla_total_size(nla_attr_len[p->type]);
656*4882a593Smuzhiyun else if (nla_attr_minlen[p->type])
657*4882a593Smuzhiyun len += nla_total_size(nla_attr_minlen[p->type]);
658*4882a593Smuzhiyun }
659*4882a593Smuzhiyun
660*4882a593Smuzhiyun return len;
661*4882a593Smuzhiyun }
662*4882a593Smuzhiyun EXPORT_SYMBOL(nla_policy_len);
663*4882a593Smuzhiyun
664*4882a593Smuzhiyun /**
665*4882a593Smuzhiyun * __nla_parse - Parse a stream of attributes into a tb buffer
666*4882a593Smuzhiyun * @tb: destination array with maxtype+1 elements
667*4882a593Smuzhiyun * @maxtype: maximum attribute type to be expected
668*4882a593Smuzhiyun * @head: head of attribute stream
669*4882a593Smuzhiyun * @len: length of attribute stream
670*4882a593Smuzhiyun * @policy: validation policy
671*4882a593Smuzhiyun * @validate: validation strictness
672*4882a593Smuzhiyun * @extack: extended ACK pointer
673*4882a593Smuzhiyun *
674*4882a593Smuzhiyun * Parses a stream of attributes and stores a pointer to each attribute in
675*4882a593Smuzhiyun * the tb array accessible via the attribute type.
676*4882a593Smuzhiyun * Validation is controlled by the @validate parameter.
677*4882a593Smuzhiyun *
678*4882a593Smuzhiyun * Returns 0 on success or a negative error code.
679*4882a593Smuzhiyun */
__nla_parse(struct nlattr ** tb,int maxtype,const struct nlattr * head,int len,const struct nla_policy * policy,unsigned int validate,struct netlink_ext_ack * extack)680*4882a593Smuzhiyun int __nla_parse(struct nlattr **tb, int maxtype,
681*4882a593Smuzhiyun const struct nlattr *head, int len,
682*4882a593Smuzhiyun const struct nla_policy *policy, unsigned int validate,
683*4882a593Smuzhiyun struct netlink_ext_ack *extack)
684*4882a593Smuzhiyun {
685*4882a593Smuzhiyun return __nla_validate_parse(head, len, maxtype, policy, validate,
686*4882a593Smuzhiyun extack, tb, 0);
687*4882a593Smuzhiyun }
688*4882a593Smuzhiyun EXPORT_SYMBOL(__nla_parse);
689*4882a593Smuzhiyun
690*4882a593Smuzhiyun /**
691*4882a593Smuzhiyun * nla_find - Find a specific attribute in a stream of attributes
692*4882a593Smuzhiyun * @head: head of attribute stream
693*4882a593Smuzhiyun * @len: length of attribute stream
694*4882a593Smuzhiyun * @attrtype: type of attribute to look for
695*4882a593Smuzhiyun *
696*4882a593Smuzhiyun * Returns the first attribute in the stream matching the specified type.
697*4882a593Smuzhiyun */
nla_find(const struct nlattr * head,int len,int attrtype)698*4882a593Smuzhiyun struct nlattr *nla_find(const struct nlattr *head, int len, int attrtype)
699*4882a593Smuzhiyun {
700*4882a593Smuzhiyun const struct nlattr *nla;
701*4882a593Smuzhiyun int rem;
702*4882a593Smuzhiyun
703*4882a593Smuzhiyun nla_for_each_attr(nla, head, len, rem)
704*4882a593Smuzhiyun if (nla_type(nla) == attrtype)
705*4882a593Smuzhiyun return (struct nlattr *)nla;
706*4882a593Smuzhiyun
707*4882a593Smuzhiyun return NULL;
708*4882a593Smuzhiyun }
709*4882a593Smuzhiyun EXPORT_SYMBOL(nla_find);
710*4882a593Smuzhiyun
711*4882a593Smuzhiyun /**
712*4882a593Smuzhiyun * nla_strlcpy - Copy string attribute payload into a sized buffer
713*4882a593Smuzhiyun * @dst: where to copy the string to
714*4882a593Smuzhiyun * @nla: attribute to copy the string from
715*4882a593Smuzhiyun * @dstsize: size of destination buffer
716*4882a593Smuzhiyun *
717*4882a593Smuzhiyun * Copies at most dstsize - 1 bytes into the destination buffer.
718*4882a593Smuzhiyun * The result is always a valid NUL-terminated string. Unlike
719*4882a593Smuzhiyun * strlcpy the destination buffer is always padded out.
720*4882a593Smuzhiyun *
721*4882a593Smuzhiyun * Returns the length of the source buffer.
722*4882a593Smuzhiyun */
nla_strlcpy(char * dst,const struct nlattr * nla,size_t dstsize)723*4882a593Smuzhiyun size_t nla_strlcpy(char *dst, const struct nlattr *nla, size_t dstsize)
724*4882a593Smuzhiyun {
725*4882a593Smuzhiyun size_t srclen = nla_len(nla);
726*4882a593Smuzhiyun char *src = nla_data(nla);
727*4882a593Smuzhiyun
728*4882a593Smuzhiyun if (srclen > 0 && src[srclen - 1] == '\0')
729*4882a593Smuzhiyun srclen--;
730*4882a593Smuzhiyun
731*4882a593Smuzhiyun if (dstsize > 0) {
732*4882a593Smuzhiyun size_t len = (srclen >= dstsize) ? dstsize - 1 : srclen;
733*4882a593Smuzhiyun
734*4882a593Smuzhiyun memset(dst, 0, dstsize);
735*4882a593Smuzhiyun memcpy(dst, src, len);
736*4882a593Smuzhiyun }
737*4882a593Smuzhiyun
738*4882a593Smuzhiyun return srclen;
739*4882a593Smuzhiyun }
740*4882a593Smuzhiyun EXPORT_SYMBOL(nla_strlcpy);
741*4882a593Smuzhiyun
742*4882a593Smuzhiyun /**
743*4882a593Smuzhiyun * nla_strdup - Copy string attribute payload into a newly allocated buffer
744*4882a593Smuzhiyun * @nla: attribute to copy the string from
745*4882a593Smuzhiyun * @flags: the type of memory to allocate (see kmalloc).
746*4882a593Smuzhiyun *
747*4882a593Smuzhiyun * Returns a pointer to the allocated buffer or NULL on error.
748*4882a593Smuzhiyun */
nla_strdup(const struct nlattr * nla,gfp_t flags)749*4882a593Smuzhiyun char *nla_strdup(const struct nlattr *nla, gfp_t flags)
750*4882a593Smuzhiyun {
751*4882a593Smuzhiyun size_t srclen = nla_len(nla);
752*4882a593Smuzhiyun char *src = nla_data(nla), *dst;
753*4882a593Smuzhiyun
754*4882a593Smuzhiyun if (srclen > 0 && src[srclen - 1] == '\0')
755*4882a593Smuzhiyun srclen--;
756*4882a593Smuzhiyun
757*4882a593Smuzhiyun dst = kmalloc(srclen + 1, flags);
758*4882a593Smuzhiyun if (dst != NULL) {
759*4882a593Smuzhiyun memcpy(dst, src, srclen);
760*4882a593Smuzhiyun dst[srclen] = '\0';
761*4882a593Smuzhiyun }
762*4882a593Smuzhiyun return dst;
763*4882a593Smuzhiyun }
764*4882a593Smuzhiyun EXPORT_SYMBOL(nla_strdup);
765*4882a593Smuzhiyun
766*4882a593Smuzhiyun /**
767*4882a593Smuzhiyun * nla_memcpy - Copy a netlink attribute into another memory area
768*4882a593Smuzhiyun * @dest: where to copy to memcpy
769*4882a593Smuzhiyun * @src: netlink attribute to copy from
770*4882a593Smuzhiyun * @count: size of the destination area
771*4882a593Smuzhiyun *
772*4882a593Smuzhiyun * Note: The number of bytes copied is limited by the length of
773*4882a593Smuzhiyun * attribute's payload. memcpy
774*4882a593Smuzhiyun *
775*4882a593Smuzhiyun * Returns the number of bytes copied.
776*4882a593Smuzhiyun */
nla_memcpy(void * dest,const struct nlattr * src,int count)777*4882a593Smuzhiyun int nla_memcpy(void *dest, const struct nlattr *src, int count)
778*4882a593Smuzhiyun {
779*4882a593Smuzhiyun int minlen = min_t(int, count, nla_len(src));
780*4882a593Smuzhiyun
781*4882a593Smuzhiyun memcpy(dest, nla_data(src), minlen);
782*4882a593Smuzhiyun if (count > minlen)
783*4882a593Smuzhiyun memset(dest + minlen, 0, count - minlen);
784*4882a593Smuzhiyun
785*4882a593Smuzhiyun return minlen;
786*4882a593Smuzhiyun }
787*4882a593Smuzhiyun EXPORT_SYMBOL(nla_memcpy);
788*4882a593Smuzhiyun
789*4882a593Smuzhiyun /**
790*4882a593Smuzhiyun * nla_memcmp - Compare an attribute with sized memory area
791*4882a593Smuzhiyun * @nla: netlink attribute
792*4882a593Smuzhiyun * @data: memory area
793*4882a593Smuzhiyun * @size: size of memory area
794*4882a593Smuzhiyun */
nla_memcmp(const struct nlattr * nla,const void * data,size_t size)795*4882a593Smuzhiyun int nla_memcmp(const struct nlattr *nla, const void *data,
796*4882a593Smuzhiyun size_t size)
797*4882a593Smuzhiyun {
798*4882a593Smuzhiyun int d = nla_len(nla) - size;
799*4882a593Smuzhiyun
800*4882a593Smuzhiyun if (d == 0)
801*4882a593Smuzhiyun d = memcmp(nla_data(nla), data, size);
802*4882a593Smuzhiyun
803*4882a593Smuzhiyun return d;
804*4882a593Smuzhiyun }
805*4882a593Smuzhiyun EXPORT_SYMBOL(nla_memcmp);
806*4882a593Smuzhiyun
807*4882a593Smuzhiyun /**
808*4882a593Smuzhiyun * nla_strcmp - Compare a string attribute against a string
809*4882a593Smuzhiyun * @nla: netlink string attribute
810*4882a593Smuzhiyun * @str: another string
811*4882a593Smuzhiyun */
nla_strcmp(const struct nlattr * nla,const char * str)812*4882a593Smuzhiyun int nla_strcmp(const struct nlattr *nla, const char *str)
813*4882a593Smuzhiyun {
814*4882a593Smuzhiyun int len = strlen(str);
815*4882a593Smuzhiyun char *buf = nla_data(nla);
816*4882a593Smuzhiyun int attrlen = nla_len(nla);
817*4882a593Smuzhiyun int d;
818*4882a593Smuzhiyun
819*4882a593Smuzhiyun while (attrlen > 0 && buf[attrlen - 1] == '\0')
820*4882a593Smuzhiyun attrlen--;
821*4882a593Smuzhiyun
822*4882a593Smuzhiyun d = attrlen - len;
823*4882a593Smuzhiyun if (d == 0)
824*4882a593Smuzhiyun d = memcmp(nla_data(nla), str, len);
825*4882a593Smuzhiyun
826*4882a593Smuzhiyun return d;
827*4882a593Smuzhiyun }
828*4882a593Smuzhiyun EXPORT_SYMBOL(nla_strcmp);
829*4882a593Smuzhiyun
830*4882a593Smuzhiyun #ifdef CONFIG_NET
831*4882a593Smuzhiyun /**
832*4882a593Smuzhiyun * __nla_reserve - reserve room for attribute on the skb
833*4882a593Smuzhiyun * @skb: socket buffer to reserve room on
834*4882a593Smuzhiyun * @attrtype: attribute type
835*4882a593Smuzhiyun * @attrlen: length of attribute payload
836*4882a593Smuzhiyun *
837*4882a593Smuzhiyun * Adds a netlink attribute header to a socket buffer and reserves
838*4882a593Smuzhiyun * room for the payload but does not copy it.
839*4882a593Smuzhiyun *
840*4882a593Smuzhiyun * The caller is responsible to ensure that the skb provides enough
841*4882a593Smuzhiyun * tailroom for the attribute header and payload.
842*4882a593Smuzhiyun */
__nla_reserve(struct sk_buff * skb,int attrtype,int attrlen)843*4882a593Smuzhiyun struct nlattr *__nla_reserve(struct sk_buff *skb, int attrtype, int attrlen)
844*4882a593Smuzhiyun {
845*4882a593Smuzhiyun struct nlattr *nla;
846*4882a593Smuzhiyun
847*4882a593Smuzhiyun nla = skb_put(skb, nla_total_size(attrlen));
848*4882a593Smuzhiyun nla->nla_type = attrtype;
849*4882a593Smuzhiyun nla->nla_len = nla_attr_size(attrlen);
850*4882a593Smuzhiyun
851*4882a593Smuzhiyun memset((unsigned char *) nla + nla->nla_len, 0, nla_padlen(attrlen));
852*4882a593Smuzhiyun
853*4882a593Smuzhiyun return nla;
854*4882a593Smuzhiyun }
855*4882a593Smuzhiyun EXPORT_SYMBOL(__nla_reserve);
856*4882a593Smuzhiyun
857*4882a593Smuzhiyun /**
858*4882a593Smuzhiyun * __nla_reserve_64bit - reserve room for attribute on the skb and align it
859*4882a593Smuzhiyun * @skb: socket buffer to reserve room on
860*4882a593Smuzhiyun * @attrtype: attribute type
861*4882a593Smuzhiyun * @attrlen: length of attribute payload
862*4882a593Smuzhiyun * @padattr: attribute type for the padding
863*4882a593Smuzhiyun *
864*4882a593Smuzhiyun * Adds a netlink attribute header to a socket buffer and reserves
865*4882a593Smuzhiyun * room for the payload but does not copy it. It also ensure that this
866*4882a593Smuzhiyun * attribute will have a 64-bit aligned nla_data() area.
867*4882a593Smuzhiyun *
868*4882a593Smuzhiyun * The caller is responsible to ensure that the skb provides enough
869*4882a593Smuzhiyun * tailroom for the attribute header and payload.
870*4882a593Smuzhiyun */
__nla_reserve_64bit(struct sk_buff * skb,int attrtype,int attrlen,int padattr)871*4882a593Smuzhiyun struct nlattr *__nla_reserve_64bit(struct sk_buff *skb, int attrtype,
872*4882a593Smuzhiyun int attrlen, int padattr)
873*4882a593Smuzhiyun {
874*4882a593Smuzhiyun nla_align_64bit(skb, padattr);
875*4882a593Smuzhiyun
876*4882a593Smuzhiyun return __nla_reserve(skb, attrtype, attrlen);
877*4882a593Smuzhiyun }
878*4882a593Smuzhiyun EXPORT_SYMBOL(__nla_reserve_64bit);
879*4882a593Smuzhiyun
880*4882a593Smuzhiyun /**
881*4882a593Smuzhiyun * __nla_reserve_nohdr - reserve room for attribute without header
882*4882a593Smuzhiyun * @skb: socket buffer to reserve room on
883*4882a593Smuzhiyun * @attrlen: length of attribute payload
884*4882a593Smuzhiyun *
885*4882a593Smuzhiyun * Reserves room for attribute payload without a header.
886*4882a593Smuzhiyun *
887*4882a593Smuzhiyun * The caller is responsible to ensure that the skb provides enough
888*4882a593Smuzhiyun * tailroom for the payload.
889*4882a593Smuzhiyun */
__nla_reserve_nohdr(struct sk_buff * skb,int attrlen)890*4882a593Smuzhiyun void *__nla_reserve_nohdr(struct sk_buff *skb, int attrlen)
891*4882a593Smuzhiyun {
892*4882a593Smuzhiyun return skb_put_zero(skb, NLA_ALIGN(attrlen));
893*4882a593Smuzhiyun }
894*4882a593Smuzhiyun EXPORT_SYMBOL(__nla_reserve_nohdr);
895*4882a593Smuzhiyun
896*4882a593Smuzhiyun /**
897*4882a593Smuzhiyun * nla_reserve - reserve room for attribute on the skb
898*4882a593Smuzhiyun * @skb: socket buffer to reserve room on
899*4882a593Smuzhiyun * @attrtype: attribute type
900*4882a593Smuzhiyun * @attrlen: length of attribute payload
901*4882a593Smuzhiyun *
902*4882a593Smuzhiyun * Adds a netlink attribute header to a socket buffer and reserves
903*4882a593Smuzhiyun * room for the payload but does not copy it.
904*4882a593Smuzhiyun *
905*4882a593Smuzhiyun * Returns NULL if the tailroom of the skb is insufficient to store
906*4882a593Smuzhiyun * the attribute header and payload.
907*4882a593Smuzhiyun */
nla_reserve(struct sk_buff * skb,int attrtype,int attrlen)908*4882a593Smuzhiyun struct nlattr *nla_reserve(struct sk_buff *skb, int attrtype, int attrlen)
909*4882a593Smuzhiyun {
910*4882a593Smuzhiyun if (unlikely(skb_tailroom(skb) < nla_total_size(attrlen)))
911*4882a593Smuzhiyun return NULL;
912*4882a593Smuzhiyun
913*4882a593Smuzhiyun return __nla_reserve(skb, attrtype, attrlen);
914*4882a593Smuzhiyun }
915*4882a593Smuzhiyun EXPORT_SYMBOL(nla_reserve);
916*4882a593Smuzhiyun
917*4882a593Smuzhiyun /**
918*4882a593Smuzhiyun * nla_reserve_64bit - reserve room for attribute on the skb and align it
919*4882a593Smuzhiyun * @skb: socket buffer to reserve room on
920*4882a593Smuzhiyun * @attrtype: attribute type
921*4882a593Smuzhiyun * @attrlen: length of attribute payload
922*4882a593Smuzhiyun * @padattr: attribute type for the padding
923*4882a593Smuzhiyun *
924*4882a593Smuzhiyun * Adds a netlink attribute header to a socket buffer and reserves
925*4882a593Smuzhiyun * room for the payload but does not copy it. It also ensure that this
926*4882a593Smuzhiyun * attribute will have a 64-bit aligned nla_data() area.
927*4882a593Smuzhiyun *
928*4882a593Smuzhiyun * Returns NULL if the tailroom of the skb is insufficient to store
929*4882a593Smuzhiyun * the attribute header and payload.
930*4882a593Smuzhiyun */
nla_reserve_64bit(struct sk_buff * skb,int attrtype,int attrlen,int padattr)931*4882a593Smuzhiyun struct nlattr *nla_reserve_64bit(struct sk_buff *skb, int attrtype, int attrlen,
932*4882a593Smuzhiyun int padattr)
933*4882a593Smuzhiyun {
934*4882a593Smuzhiyun size_t len;
935*4882a593Smuzhiyun
936*4882a593Smuzhiyun if (nla_need_padding_for_64bit(skb))
937*4882a593Smuzhiyun len = nla_total_size_64bit(attrlen);
938*4882a593Smuzhiyun else
939*4882a593Smuzhiyun len = nla_total_size(attrlen);
940*4882a593Smuzhiyun if (unlikely(skb_tailroom(skb) < len))
941*4882a593Smuzhiyun return NULL;
942*4882a593Smuzhiyun
943*4882a593Smuzhiyun return __nla_reserve_64bit(skb, attrtype, attrlen, padattr);
944*4882a593Smuzhiyun }
945*4882a593Smuzhiyun EXPORT_SYMBOL(nla_reserve_64bit);
946*4882a593Smuzhiyun
947*4882a593Smuzhiyun /**
948*4882a593Smuzhiyun * nla_reserve_nohdr - reserve room for attribute without header
949*4882a593Smuzhiyun * @skb: socket buffer to reserve room on
950*4882a593Smuzhiyun * @attrlen: length of attribute payload
951*4882a593Smuzhiyun *
952*4882a593Smuzhiyun * Reserves room for attribute payload without a header.
953*4882a593Smuzhiyun *
954*4882a593Smuzhiyun * Returns NULL if the tailroom of the skb is insufficient to store
955*4882a593Smuzhiyun * the attribute payload.
956*4882a593Smuzhiyun */
nla_reserve_nohdr(struct sk_buff * skb,int attrlen)957*4882a593Smuzhiyun void *nla_reserve_nohdr(struct sk_buff *skb, int attrlen)
958*4882a593Smuzhiyun {
959*4882a593Smuzhiyun if (unlikely(skb_tailroom(skb) < NLA_ALIGN(attrlen)))
960*4882a593Smuzhiyun return NULL;
961*4882a593Smuzhiyun
962*4882a593Smuzhiyun return __nla_reserve_nohdr(skb, attrlen);
963*4882a593Smuzhiyun }
964*4882a593Smuzhiyun EXPORT_SYMBOL(nla_reserve_nohdr);
965*4882a593Smuzhiyun
966*4882a593Smuzhiyun /**
967*4882a593Smuzhiyun * __nla_put - Add a netlink attribute to a socket buffer
968*4882a593Smuzhiyun * @skb: socket buffer to add attribute to
969*4882a593Smuzhiyun * @attrtype: attribute type
970*4882a593Smuzhiyun * @attrlen: length of attribute payload
971*4882a593Smuzhiyun * @data: head of attribute payload
972*4882a593Smuzhiyun *
973*4882a593Smuzhiyun * The caller is responsible to ensure that the skb provides enough
974*4882a593Smuzhiyun * tailroom for the attribute header and payload.
975*4882a593Smuzhiyun */
__nla_put(struct sk_buff * skb,int attrtype,int attrlen,const void * data)976*4882a593Smuzhiyun void __nla_put(struct sk_buff *skb, int attrtype, int attrlen,
977*4882a593Smuzhiyun const void *data)
978*4882a593Smuzhiyun {
979*4882a593Smuzhiyun struct nlattr *nla;
980*4882a593Smuzhiyun
981*4882a593Smuzhiyun nla = __nla_reserve(skb, attrtype, attrlen);
982*4882a593Smuzhiyun memcpy(nla_data(nla), data, attrlen);
983*4882a593Smuzhiyun }
984*4882a593Smuzhiyun EXPORT_SYMBOL(__nla_put);
985*4882a593Smuzhiyun
986*4882a593Smuzhiyun /**
987*4882a593Smuzhiyun * __nla_put_64bit - Add a netlink attribute to a socket buffer and align it
988*4882a593Smuzhiyun * @skb: socket buffer to add attribute to
989*4882a593Smuzhiyun * @attrtype: attribute type
990*4882a593Smuzhiyun * @attrlen: length of attribute payload
991*4882a593Smuzhiyun * @data: head of attribute payload
992*4882a593Smuzhiyun * @padattr: attribute type for the padding
993*4882a593Smuzhiyun *
994*4882a593Smuzhiyun * The caller is responsible to ensure that the skb provides enough
995*4882a593Smuzhiyun * tailroom for the attribute header and payload.
996*4882a593Smuzhiyun */
__nla_put_64bit(struct sk_buff * skb,int attrtype,int attrlen,const void * data,int padattr)997*4882a593Smuzhiyun void __nla_put_64bit(struct sk_buff *skb, int attrtype, int attrlen,
998*4882a593Smuzhiyun const void *data, int padattr)
999*4882a593Smuzhiyun {
1000*4882a593Smuzhiyun struct nlattr *nla;
1001*4882a593Smuzhiyun
1002*4882a593Smuzhiyun nla = __nla_reserve_64bit(skb, attrtype, attrlen, padattr);
1003*4882a593Smuzhiyun memcpy(nla_data(nla), data, attrlen);
1004*4882a593Smuzhiyun }
1005*4882a593Smuzhiyun EXPORT_SYMBOL(__nla_put_64bit);
1006*4882a593Smuzhiyun
1007*4882a593Smuzhiyun /**
1008*4882a593Smuzhiyun * __nla_put_nohdr - Add a netlink attribute without header
1009*4882a593Smuzhiyun * @skb: socket buffer to add attribute to
1010*4882a593Smuzhiyun * @attrlen: length of attribute payload
1011*4882a593Smuzhiyun * @data: head of attribute payload
1012*4882a593Smuzhiyun *
1013*4882a593Smuzhiyun * The caller is responsible to ensure that the skb provides enough
1014*4882a593Smuzhiyun * tailroom for the attribute payload.
1015*4882a593Smuzhiyun */
__nla_put_nohdr(struct sk_buff * skb,int attrlen,const void * data)1016*4882a593Smuzhiyun void __nla_put_nohdr(struct sk_buff *skb, int attrlen, const void *data)
1017*4882a593Smuzhiyun {
1018*4882a593Smuzhiyun void *start;
1019*4882a593Smuzhiyun
1020*4882a593Smuzhiyun start = __nla_reserve_nohdr(skb, attrlen);
1021*4882a593Smuzhiyun memcpy(start, data, attrlen);
1022*4882a593Smuzhiyun }
1023*4882a593Smuzhiyun EXPORT_SYMBOL(__nla_put_nohdr);
1024*4882a593Smuzhiyun
1025*4882a593Smuzhiyun /**
1026*4882a593Smuzhiyun * nla_put - Add a netlink attribute to a socket buffer
1027*4882a593Smuzhiyun * @skb: socket buffer to add attribute to
1028*4882a593Smuzhiyun * @attrtype: attribute type
1029*4882a593Smuzhiyun * @attrlen: length of attribute payload
1030*4882a593Smuzhiyun * @data: head of attribute payload
1031*4882a593Smuzhiyun *
1032*4882a593Smuzhiyun * Returns -EMSGSIZE if the tailroom of the skb is insufficient to store
1033*4882a593Smuzhiyun * the attribute header and payload.
1034*4882a593Smuzhiyun */
nla_put(struct sk_buff * skb,int attrtype,int attrlen,const void * data)1035*4882a593Smuzhiyun int nla_put(struct sk_buff *skb, int attrtype, int attrlen, const void *data)
1036*4882a593Smuzhiyun {
1037*4882a593Smuzhiyun if (unlikely(skb_tailroom(skb) < nla_total_size(attrlen)))
1038*4882a593Smuzhiyun return -EMSGSIZE;
1039*4882a593Smuzhiyun
1040*4882a593Smuzhiyun __nla_put(skb, attrtype, attrlen, data);
1041*4882a593Smuzhiyun return 0;
1042*4882a593Smuzhiyun }
1043*4882a593Smuzhiyun EXPORT_SYMBOL(nla_put);
1044*4882a593Smuzhiyun
1045*4882a593Smuzhiyun /**
1046*4882a593Smuzhiyun * nla_put_64bit - Add a netlink attribute to a socket buffer and align it
1047*4882a593Smuzhiyun * @skb: socket buffer to add attribute to
1048*4882a593Smuzhiyun * @attrtype: attribute type
1049*4882a593Smuzhiyun * @attrlen: length of attribute payload
1050*4882a593Smuzhiyun * @data: head of attribute payload
1051*4882a593Smuzhiyun * @padattr: attribute type for the padding
1052*4882a593Smuzhiyun *
1053*4882a593Smuzhiyun * Returns -EMSGSIZE if the tailroom of the skb is insufficient to store
1054*4882a593Smuzhiyun * the attribute header and payload.
1055*4882a593Smuzhiyun */
nla_put_64bit(struct sk_buff * skb,int attrtype,int attrlen,const void * data,int padattr)1056*4882a593Smuzhiyun int nla_put_64bit(struct sk_buff *skb, int attrtype, int attrlen,
1057*4882a593Smuzhiyun const void *data, int padattr)
1058*4882a593Smuzhiyun {
1059*4882a593Smuzhiyun size_t len;
1060*4882a593Smuzhiyun
1061*4882a593Smuzhiyun if (nla_need_padding_for_64bit(skb))
1062*4882a593Smuzhiyun len = nla_total_size_64bit(attrlen);
1063*4882a593Smuzhiyun else
1064*4882a593Smuzhiyun len = nla_total_size(attrlen);
1065*4882a593Smuzhiyun if (unlikely(skb_tailroom(skb) < len))
1066*4882a593Smuzhiyun return -EMSGSIZE;
1067*4882a593Smuzhiyun
1068*4882a593Smuzhiyun __nla_put_64bit(skb, attrtype, attrlen, data, padattr);
1069*4882a593Smuzhiyun return 0;
1070*4882a593Smuzhiyun }
1071*4882a593Smuzhiyun EXPORT_SYMBOL(nla_put_64bit);
1072*4882a593Smuzhiyun
1073*4882a593Smuzhiyun /**
1074*4882a593Smuzhiyun * nla_put_nohdr - Add a netlink attribute without header
1075*4882a593Smuzhiyun * @skb: socket buffer to add attribute to
1076*4882a593Smuzhiyun * @attrlen: length of attribute payload
1077*4882a593Smuzhiyun * @data: head of attribute payload
1078*4882a593Smuzhiyun *
1079*4882a593Smuzhiyun * Returns -EMSGSIZE if the tailroom of the skb is insufficient to store
1080*4882a593Smuzhiyun * the attribute payload.
1081*4882a593Smuzhiyun */
nla_put_nohdr(struct sk_buff * skb,int attrlen,const void * data)1082*4882a593Smuzhiyun int nla_put_nohdr(struct sk_buff *skb, int attrlen, const void *data)
1083*4882a593Smuzhiyun {
1084*4882a593Smuzhiyun if (unlikely(skb_tailroom(skb) < NLA_ALIGN(attrlen)))
1085*4882a593Smuzhiyun return -EMSGSIZE;
1086*4882a593Smuzhiyun
1087*4882a593Smuzhiyun __nla_put_nohdr(skb, attrlen, data);
1088*4882a593Smuzhiyun return 0;
1089*4882a593Smuzhiyun }
1090*4882a593Smuzhiyun EXPORT_SYMBOL(nla_put_nohdr);
1091*4882a593Smuzhiyun
1092*4882a593Smuzhiyun /**
1093*4882a593Smuzhiyun * nla_append - Add a netlink attribute without header or padding
1094*4882a593Smuzhiyun * @skb: socket buffer to add attribute to
1095*4882a593Smuzhiyun * @attrlen: length of attribute payload
1096*4882a593Smuzhiyun * @data: head of attribute payload
1097*4882a593Smuzhiyun *
1098*4882a593Smuzhiyun * Returns -EMSGSIZE if the tailroom of the skb is insufficient to store
1099*4882a593Smuzhiyun * the attribute payload.
1100*4882a593Smuzhiyun */
nla_append(struct sk_buff * skb,int attrlen,const void * data)1101*4882a593Smuzhiyun int nla_append(struct sk_buff *skb, int attrlen, const void *data)
1102*4882a593Smuzhiyun {
1103*4882a593Smuzhiyun if (unlikely(skb_tailroom(skb) < NLA_ALIGN(attrlen)))
1104*4882a593Smuzhiyun return -EMSGSIZE;
1105*4882a593Smuzhiyun
1106*4882a593Smuzhiyun skb_put_data(skb, data, attrlen);
1107*4882a593Smuzhiyun return 0;
1108*4882a593Smuzhiyun }
1109*4882a593Smuzhiyun EXPORT_SYMBOL(nla_append);
1110*4882a593Smuzhiyun #endif
1111