blob: 01c67507dc43223628d254387b1602f37f32a925 [file] [log] [blame]
Thomas Grafbfa83a92005-11-10 02:25:51 +01001/*
2 * NETLINK Netlink attributes
3 *
4 * Authors: Thomas Graf <tgraf@suug.ch>
5 * Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
6 */
7
Paul Gortmaker8bc3bcc2011-11-16 21:29:17 -05008#include <linux/export.h>
Thomas Grafbfa83a92005-11-10 02:25:51 +01009#include <linux/kernel.h>
10#include <linux/errno.h>
11#include <linux/jiffies.h>
12#include <linux/netdevice.h>
13#include <linux/skbuff.h>
14#include <linux/string.h>
15#include <linux/types.h>
16#include <net/netlink.h>
17
Jan Engelhardt36546542010-11-16 09:52:32 -080018static const u16 nla_attr_minlen[NLA_TYPE_MAX+1] = {
Thomas Grafbfa83a92005-11-10 02:25:51 +010019 [NLA_U8] = sizeof(u8),
20 [NLA_U16] = sizeof(u16),
21 [NLA_U32] = sizeof(u32),
22 [NLA_U64] = sizeof(u64),
Johannes Bergc30bc942011-11-03 00:07:32 +000023 [NLA_MSECS] = sizeof(u64),
Thomas Grafbfa83a92005-11-10 02:25:51 +010024 [NLA_NESTED] = NLA_HDRLEN,
25};
26
Jan Engelhardt36546542010-11-16 09:52:32 -080027static int validate_nla(const struct nlattr *nla, int maxtype,
Patrick McHardyef7c79e2007-06-05 12:38:30 -070028 const struct nla_policy *policy)
Thomas Grafbfa83a92005-11-10 02:25:51 +010029{
Patrick McHardyef7c79e2007-06-05 12:38:30 -070030 const struct nla_policy *pt;
Thomas Graf8f4c1f92007-09-12 14:44:36 +020031 int minlen = 0, attrlen = nla_len(nla), type = nla_type(nla);
Thomas Grafbfa83a92005-11-10 02:25:51 +010032
Thomas Graf8f4c1f92007-09-12 14:44:36 +020033 if (type <= 0 || type > maxtype)
Thomas Grafbfa83a92005-11-10 02:25:51 +010034 return 0;
35
Thomas Graf8f4c1f92007-09-12 14:44:36 +020036 pt = &policy[type];
Thomas Grafbfa83a92005-11-10 02:25:51 +010037
38 BUG_ON(pt->type > NLA_TYPE_MAX);
39
Thomas Grafa5531a52006-08-26 20:11:47 -070040 switch (pt->type) {
41 case NLA_FLAG:
42 if (attrlen > 0)
43 return -ERANGE;
44 break;
Thomas Grafbfa83a92005-11-10 02:25:51 +010045
Thomas Grafa5531a52006-08-26 20:11:47 -070046 case NLA_NUL_STRING:
47 if (pt->len)
48 minlen = min_t(int, attrlen, pt->len + 1);
49 else
50 minlen = attrlen;
Thomas Grafbfa83a92005-11-10 02:25:51 +010051
Thomas Grafa5531a52006-08-26 20:11:47 -070052 if (!minlen || memchr(nla_data(nla), '\0', minlen) == NULL)
53 return -EINVAL;
54 /* fall through */
55
56 case NLA_STRING:
57 if (attrlen < 1)
58 return -ERANGE;
59
60 if (pt->len) {
61 char *buf = nla_data(nla);
62
63 if (buf[attrlen - 1] == '\0')
64 attrlen--;
65
66 if (attrlen > pt->len)
67 return -ERANGE;
68 }
69 break;
70
Johannes Bergd30045a2007-03-23 11:37:48 -070071 case NLA_BINARY:
72 if (pt->len && attrlen > pt->len)
73 return -ERANGE;
74 break;
75
Patrick McHardy1092cb22007-06-25 13:49:35 -070076 case NLA_NESTED_COMPAT:
77 if (attrlen < pt->len)
78 return -ERANGE;
79 if (attrlen < NLA_ALIGN(pt->len))
80 break;
81 if (attrlen < NLA_ALIGN(pt->len) + NLA_HDRLEN)
82 return -ERANGE;
83 nla = nla_data(nla) + NLA_ALIGN(pt->len);
84 if (attrlen < NLA_ALIGN(pt->len) + NLA_HDRLEN + nla_len(nla))
85 return -ERANGE;
86 break;
Patrick McHardyea5693c2008-11-28 03:05:19 -080087 case NLA_NESTED:
88 /* a nested attributes is allowed to be empty; if its not,
89 * it must have a size of at least NLA_HDRLEN.
90 */
91 if (attrlen == 0)
92 break;
Thomas Grafa5531a52006-08-26 20:11:47 -070093 default:
94 if (pt->len)
95 minlen = pt->len;
96 else if (pt->type != NLA_UNSPEC)
97 minlen = nla_attr_minlen[pt->type];
98
99 if (attrlen < minlen)
100 return -ERANGE;
101 }
Thomas Grafbfa83a92005-11-10 02:25:51 +0100102
103 return 0;
104}
105
106/**
107 * nla_validate - Validate a stream of attributes
108 * @head: head of attribute stream
109 * @len: length of attribute stream
110 * @maxtype: maximum attribute type to be expected
111 * @policy: validation policy
112 *
113 * Validates all attributes in the specified attribute stream against the
114 * specified policy. Attributes with a type exceeding maxtype will be
115 * ignored. See documenation of struct nla_policy for more details.
116 *
117 * Returns 0 on success or a negative error code.
118 */
Jan Engelhardt36546542010-11-16 09:52:32 -0800119int nla_validate(const struct nlattr *head, int len, int maxtype,
Patrick McHardyef7c79e2007-06-05 12:38:30 -0700120 const struct nla_policy *policy)
Thomas Grafbfa83a92005-11-10 02:25:51 +0100121{
Jan Engelhardt36546542010-11-16 09:52:32 -0800122 const struct nlattr *nla;
Thomas Grafbfa83a92005-11-10 02:25:51 +0100123 int rem, err;
124
125 nla_for_each_attr(nla, head, len, rem) {
126 err = validate_nla(nla, maxtype, policy);
127 if (err < 0)
128 goto errout;
129 }
130
131 err = 0;
132errout:
133 return err;
134}
135
136/**
Holger Eitzenbergere487eb92009-03-25 18:26:30 +0100137 * nla_policy_len - Determin the max. length of a policy
138 * @policy: policy to use
139 * @n: number of policies
140 *
141 * Determines the max. length of the policy. It is currently used
142 * to allocated Netlink buffers roughly the size of the actual
143 * message.
144 *
145 * Returns 0 on success or a negative error code.
146 */
147int
148nla_policy_len(const struct nla_policy *p, int n)
149{
150 int i, len = 0;
151
Lars Ellenberge3fa3af2011-02-28 12:38:25 -0800152 for (i = 0; i < n; i++, p++) {
Holger Eitzenbergere487eb92009-03-25 18:26:30 +0100153 if (p->len)
154 len += nla_total_size(p->len);
155 else if (nla_attr_minlen[p->type])
156 len += nla_total_size(nla_attr_minlen[p->type]);
157 }
158
159 return len;
160}
161
162/**
Thomas Grafbfa83a92005-11-10 02:25:51 +0100163 * nla_parse - Parse a stream of attributes into a tb buffer
164 * @tb: destination array with maxtype+1 elements
165 * @maxtype: maximum attribute type to be expected
166 * @head: head of attribute stream
167 * @len: length of attribute stream
Julius Volz10b595a2008-06-27 20:02:14 -0700168 * @policy: validation policy
Thomas Grafbfa83a92005-11-10 02:25:51 +0100169 *
170 * Parses a stream of attributes and stores a pointer to each attribute in
Uwe Kleine-Königb5950762010-11-01 15:38:34 -0400171 * the tb array accessible via the attribute type. Attributes with a type
Thomas Grafbfa83a92005-11-10 02:25:51 +0100172 * exceeding maxtype will be silently ignored for backwards compatibility
173 * reasons. policy may be set to NULL if no validation is required.
174 *
175 * Returns 0 on success or a negative error code.
176 */
Jan Engelhardt36546542010-11-16 09:52:32 -0800177int nla_parse(struct nlattr **tb, int maxtype, const struct nlattr *head,
178 int len, const struct nla_policy *policy)
Thomas Grafbfa83a92005-11-10 02:25:51 +0100179{
Jan Engelhardt36546542010-11-16 09:52:32 -0800180 const struct nlattr *nla;
Thomas Grafbfa83a92005-11-10 02:25:51 +0100181 int rem, err;
182
183 memset(tb, 0, sizeof(struct nlattr *) * (maxtype + 1));
184
185 nla_for_each_attr(nla, head, len, rem) {
Thomas Graf8f4c1f92007-09-12 14:44:36 +0200186 u16 type = nla_type(nla);
Thomas Grafbfa83a92005-11-10 02:25:51 +0100187
188 if (type > 0 && type <= maxtype) {
189 if (policy) {
190 err = validate_nla(nla, maxtype, policy);
191 if (err < 0)
192 goto errout;
193 }
194
Jan Engelhardt36546542010-11-16 09:52:32 -0800195 tb[type] = (struct nlattr *)nla;
Thomas Grafbfa83a92005-11-10 02:25:51 +0100196 }
197 }
198
199 if (unlikely(rem > 0))
200 printk(KERN_WARNING "netlink: %d bytes leftover after parsing "
201 "attributes.\n", rem);
202
203 err = 0;
204errout:
205 return err;
206}
207
208/**
209 * nla_find - Find a specific attribute in a stream of attributes
210 * @head: head of attribute stream
211 * @len: length of attribute stream
212 * @attrtype: type of attribute to look for
213 *
214 * Returns the first attribute in the stream matching the specified type.
215 */
Jan Engelhardt36546542010-11-16 09:52:32 -0800216struct nlattr *nla_find(const struct nlattr *head, int len, int attrtype)
Thomas Grafbfa83a92005-11-10 02:25:51 +0100217{
Jan Engelhardt36546542010-11-16 09:52:32 -0800218 const struct nlattr *nla;
Thomas Grafbfa83a92005-11-10 02:25:51 +0100219 int rem;
220
221 nla_for_each_attr(nla, head, len, rem)
Thomas Graf8f4c1f92007-09-12 14:44:36 +0200222 if (nla_type(nla) == attrtype)
Jan Engelhardt36546542010-11-16 09:52:32 -0800223 return (struct nlattr *)nla;
Thomas Grafbfa83a92005-11-10 02:25:51 +0100224
225 return NULL;
226}
227
228/**
229 * nla_strlcpy - Copy string attribute payload into a sized buffer
230 * @dst: where to copy the string to
Julius Volz10b595a2008-06-27 20:02:14 -0700231 * @nla: attribute to copy the string from
Thomas Grafbfa83a92005-11-10 02:25:51 +0100232 * @dstsize: size of destination buffer
233 *
234 * Copies at most dstsize - 1 bytes into the destination buffer.
235 * The result is always a valid NUL-terminated string. Unlike
236 * strlcpy the destination buffer is always padded out.
237 *
238 * Returns the length of the source buffer.
239 */
240size_t nla_strlcpy(char *dst, const struct nlattr *nla, size_t dstsize)
241{
242 size_t srclen = nla_len(nla);
243 char *src = nla_data(nla);
244
245 if (srclen > 0 && src[srclen - 1] == '\0')
246 srclen--;
247
248 if (dstsize > 0) {
249 size_t len = (srclen >= dstsize) ? dstsize - 1 : srclen;
250
251 memset(dst, 0, dstsize);
252 memcpy(dst, src, len);
253 }
254
255 return srclen;
256}
257
258/**
259 * nla_memcpy - Copy a netlink attribute into another memory area
260 * @dest: where to copy to memcpy
261 * @src: netlink attribute to copy from
262 * @count: size of the destination area
263 *
264 * Note: The number of bytes copied is limited by the length of
265 * attribute's payload. memcpy
266 *
267 * Returns the number of bytes copied.
268 */
Patrick McHardyb057efd2008-10-28 11:59:11 -0700269int nla_memcpy(void *dest, const struct nlattr *src, int count)
Thomas Grafbfa83a92005-11-10 02:25:51 +0100270{
271 int minlen = min_t(int, count, nla_len(src));
272
273 memcpy(dest, nla_data(src), minlen);
274
275 return minlen;
276}
277
278/**
279 * nla_memcmp - Compare an attribute with sized memory area
280 * @nla: netlink attribute
281 * @data: memory area
282 * @size: size of memory area
283 */
284int nla_memcmp(const struct nlattr *nla, const void *data,
285 size_t size)
286{
287 int d = nla_len(nla) - size;
288
289 if (d == 0)
290 d = memcmp(nla_data(nla), data, size);
291
292 return d;
293}
294
295/**
296 * nla_strcmp - Compare a string attribute against a string
297 * @nla: netlink string attribute
298 * @str: another string
299 */
300int nla_strcmp(const struct nlattr *nla, const char *str)
301{
Pablo Neira99df85b2014-04-01 19:38:44 +0200302 int len = strlen(str);
303 char *buf = nla_data(nla);
304 int attrlen = nla_len(nla);
305 int d;
Thomas Grafbfa83a92005-11-10 02:25:51 +0100306
Pablo Neira99df85b2014-04-01 19:38:44 +0200307 if (attrlen > 0 && buf[attrlen - 1] == '\0')
308 attrlen--;
309
310 d = attrlen - len;
Thomas Grafbfa83a92005-11-10 02:25:51 +0100311 if (d == 0)
312 d = memcmp(nla_data(nla), str, len);
313
314 return d;
315}
316
Herbert Xu90800212009-03-11 23:18:32 +0800317#ifdef CONFIG_NET
Thomas Grafbfa83a92005-11-10 02:25:51 +0100318/**
319 * __nla_reserve - reserve room for attribute on the skb
320 * @skb: socket buffer to reserve room on
321 * @attrtype: attribute type
322 * @attrlen: length of attribute payload
323 *
324 * Adds a netlink attribute header to a socket buffer and reserves
325 * room for the payload but does not copy it.
326 *
327 * The caller is responsible to ensure that the skb provides enough
328 * tailroom for the attribute header and payload.
329 */
330struct nlattr *__nla_reserve(struct sk_buff *skb, int attrtype, int attrlen)
331{
332 struct nlattr *nla;
333
334 nla = (struct nlattr *) skb_put(skb, nla_total_size(attrlen));
335 nla->nla_type = attrtype;
336 nla->nla_len = nla_attr_size(attrlen);
337
338 memset((unsigned char *) nla + nla->nla_len, 0, nla_padlen(attrlen));
339
340 return nla;
341}
Herbert Xu90800212009-03-11 23:18:32 +0800342EXPORT_SYMBOL(__nla_reserve);
Thomas Grafbfa83a92005-11-10 02:25:51 +0100343
344/**
Thomas Graffe4944e2006-08-04 23:03:05 -0700345 * __nla_reserve_nohdr - reserve room for attribute without header
346 * @skb: socket buffer to reserve room on
347 * @attrlen: length of attribute payload
348 *
349 * Reserves room for attribute payload without a header.
350 *
351 * The caller is responsible to ensure that the skb provides enough
352 * tailroom for the payload.
353 */
354void *__nla_reserve_nohdr(struct sk_buff *skb, int attrlen)
355{
356 void *start;
357
358 start = skb_put(skb, NLA_ALIGN(attrlen));
359 memset(start, 0, NLA_ALIGN(attrlen));
360
361 return start;
362}
Herbert Xu90800212009-03-11 23:18:32 +0800363EXPORT_SYMBOL(__nla_reserve_nohdr);
Thomas Graffe4944e2006-08-04 23:03:05 -0700364
365/**
Thomas Grafbfa83a92005-11-10 02:25:51 +0100366 * nla_reserve - reserve room for attribute on the skb
367 * @skb: socket buffer to reserve room on
368 * @attrtype: attribute type
369 * @attrlen: length of attribute payload
370 *
371 * Adds a netlink attribute header to a socket buffer and reserves
372 * room for the payload but does not copy it.
373 *
374 * Returns NULL if the tailroom of the skb is insufficient to store
375 * the attribute header and payload.
376 */
377struct nlattr *nla_reserve(struct sk_buff *skb, int attrtype, int attrlen)
378{
379 if (unlikely(skb_tailroom(skb) < nla_total_size(attrlen)))
380 return NULL;
381
382 return __nla_reserve(skb, attrtype, attrlen);
383}
Herbert Xu90800212009-03-11 23:18:32 +0800384EXPORT_SYMBOL(nla_reserve);
Thomas Grafbfa83a92005-11-10 02:25:51 +0100385
386/**
Julius Volz10b595a2008-06-27 20:02:14 -0700387 * nla_reserve_nohdr - reserve room for attribute without header
Thomas Graffe4944e2006-08-04 23:03:05 -0700388 * @skb: socket buffer to reserve room on
Julius Volz10b595a2008-06-27 20:02:14 -0700389 * @attrlen: length of attribute payload
Thomas Graffe4944e2006-08-04 23:03:05 -0700390 *
391 * Reserves room for attribute payload without a header.
392 *
393 * Returns NULL if the tailroom of the skb is insufficient to store
394 * the attribute payload.
395 */
396void *nla_reserve_nohdr(struct sk_buff *skb, int attrlen)
397{
398 if (unlikely(skb_tailroom(skb) < NLA_ALIGN(attrlen)))
399 return NULL;
400
401 return __nla_reserve_nohdr(skb, attrlen);
402}
Herbert Xu90800212009-03-11 23:18:32 +0800403EXPORT_SYMBOL(nla_reserve_nohdr);
Thomas Graffe4944e2006-08-04 23:03:05 -0700404
405/**
Thomas Grafbfa83a92005-11-10 02:25:51 +0100406 * __nla_put - Add a netlink attribute to a socket buffer
407 * @skb: socket buffer to add attribute to
408 * @attrtype: attribute type
409 * @attrlen: length of attribute payload
410 * @data: head of attribute payload
411 *
412 * The caller is responsible to ensure that the skb provides enough
413 * tailroom for the attribute header and payload.
414 */
415void __nla_put(struct sk_buff *skb, int attrtype, int attrlen,
416 const void *data)
417{
418 struct nlattr *nla;
419
420 nla = __nla_reserve(skb, attrtype, attrlen);
421 memcpy(nla_data(nla), data, attrlen);
422}
Herbert Xu90800212009-03-11 23:18:32 +0800423EXPORT_SYMBOL(__nla_put);
Thomas Grafbfa83a92005-11-10 02:25:51 +0100424
Thomas Graffe4944e2006-08-04 23:03:05 -0700425/**
426 * __nla_put_nohdr - Add a netlink attribute without header
427 * @skb: socket buffer to add attribute to
428 * @attrlen: length of attribute payload
429 * @data: head of attribute payload
430 *
431 * The caller is responsible to ensure that the skb provides enough
432 * tailroom for the attribute payload.
433 */
434void __nla_put_nohdr(struct sk_buff *skb, int attrlen, const void *data)
435{
436 void *start;
437
438 start = __nla_reserve_nohdr(skb, attrlen);
439 memcpy(start, data, attrlen);
440}
Herbert Xu90800212009-03-11 23:18:32 +0800441EXPORT_SYMBOL(__nla_put_nohdr);
Thomas Grafbfa83a92005-11-10 02:25:51 +0100442
443/**
444 * nla_put - Add a netlink attribute to a socket buffer
445 * @skb: socket buffer to add attribute to
446 * @attrtype: attribute type
447 * @attrlen: length of attribute payload
448 * @data: head of attribute payload
449 *
Thomas Grafbc3ed282008-06-03 16:36:54 -0700450 * Returns -EMSGSIZE if the tailroom of the skb is insufficient to store
Thomas Grafbfa83a92005-11-10 02:25:51 +0100451 * the attribute header and payload.
452 */
453int nla_put(struct sk_buff *skb, int attrtype, int attrlen, const void *data)
454{
455 if (unlikely(skb_tailroom(skb) < nla_total_size(attrlen)))
Thomas Grafbc3ed282008-06-03 16:36:54 -0700456 return -EMSGSIZE;
Thomas Grafbfa83a92005-11-10 02:25:51 +0100457
458 __nla_put(skb, attrtype, attrlen, data);
459 return 0;
460}
Herbert Xu90800212009-03-11 23:18:32 +0800461EXPORT_SYMBOL(nla_put);
Thomas Grafbfa83a92005-11-10 02:25:51 +0100462
Thomas Graffe4944e2006-08-04 23:03:05 -0700463/**
464 * nla_put_nohdr - Add a netlink attribute without header
465 * @skb: socket buffer to add attribute to
466 * @attrlen: length of attribute payload
467 * @data: head of attribute payload
468 *
Thomas Grafbc3ed282008-06-03 16:36:54 -0700469 * Returns -EMSGSIZE if the tailroom of the skb is insufficient to store
Thomas Graffe4944e2006-08-04 23:03:05 -0700470 * the attribute payload.
471 */
472int nla_put_nohdr(struct sk_buff *skb, int attrlen, const void *data)
473{
474 if (unlikely(skb_tailroom(skb) < NLA_ALIGN(attrlen)))
Thomas Grafbc3ed282008-06-03 16:36:54 -0700475 return -EMSGSIZE;
Thomas Graffe4944e2006-08-04 23:03:05 -0700476
477 __nla_put_nohdr(skb, attrlen, data);
478 return 0;
479}
Herbert Xu90800212009-03-11 23:18:32 +0800480EXPORT_SYMBOL(nla_put_nohdr);
Thomas Grafbfa83a92005-11-10 02:25:51 +0100481
Patrick McHardy01480e12008-01-22 22:10:59 -0800482/**
483 * nla_append - Add a netlink attribute without header or padding
484 * @skb: socket buffer to add attribute to
485 * @attrlen: length of attribute payload
486 * @data: head of attribute payload
487 *
Thomas Grafbc3ed282008-06-03 16:36:54 -0700488 * Returns -EMSGSIZE if the tailroom of the skb is insufficient to store
Patrick McHardy01480e12008-01-22 22:10:59 -0800489 * the attribute payload.
490 */
491int nla_append(struct sk_buff *skb, int attrlen, const void *data)
492{
493 if (unlikely(skb_tailroom(skb) < NLA_ALIGN(attrlen)))
Thomas Grafbc3ed282008-06-03 16:36:54 -0700494 return -EMSGSIZE;
Patrick McHardy01480e12008-01-22 22:10:59 -0800495
496 memcpy(skb_put(skb, attrlen), data, attrlen);
497 return 0;
498}
Herbert Xu90800212009-03-11 23:18:32 +0800499EXPORT_SYMBOL(nla_append);
500#endif
Patrick McHardy01480e12008-01-22 22:10:59 -0800501
Thomas Grafbfa83a92005-11-10 02:25:51 +0100502EXPORT_SYMBOL(nla_validate);
Holger Eitzenbergere487eb92009-03-25 18:26:30 +0100503EXPORT_SYMBOL(nla_policy_len);
Thomas Grafbfa83a92005-11-10 02:25:51 +0100504EXPORT_SYMBOL(nla_parse);
505EXPORT_SYMBOL(nla_find);
506EXPORT_SYMBOL(nla_strlcpy);
Thomas Grafbfa83a92005-11-10 02:25:51 +0100507EXPORT_SYMBOL(nla_memcpy);
508EXPORT_SYMBOL(nla_memcmp);
509EXPORT_SYMBOL(nla_strcmp);