67d02a45eb
Most tools used for compliance and SBOM generation use SPDX identifiers This change brings us a step closer to an easy SBOM generation. Signed-off-by: Alin Jerpelea <alin.jerpelea@sony.com>
335 lines
7.9 KiB
C
335 lines
7.9 KiB
C
/****************************************************************************
|
|
* net/netlink/netlink_attr.c
|
|
*
|
|
* SPDX-License-Identifier: Apache-2.0
|
|
*
|
|
* Licensed to the Apache Software Foundation (ASF) under one or more
|
|
* contributor license agreements. See the NOTICE file distributed with
|
|
* this work for additional information regarding copyright ownership. The
|
|
* ASF licenses this file to you under the Apache License, Version 2.0 (the
|
|
* "License"); you may not use this file except in compliance with the
|
|
* License. You may obtain a copy of the License at
|
|
*
|
|
* http://www.apache.org/licenses/LICENSE-2.0
|
|
*
|
|
* Unless required by applicable law or agreed to in writing, software
|
|
* distributed under the License is distributed on an "AS IS" BASIS, WITHOUT
|
|
* WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the
|
|
* License for the specific language governing permissions and limitations
|
|
* under the License.
|
|
*
|
|
****************************************************************************/
|
|
|
|
/****************************************************************************
|
|
* Included Files
|
|
****************************************************************************/
|
|
|
|
#include <nuttx/config.h>
|
|
|
|
#include <sys/types.h>
|
|
#include <string.h>
|
|
#include <assert.h>
|
|
#include <errno.h>
|
|
#include <debug.h>
|
|
|
|
#include <nuttx/sched.h>
|
|
#include <nuttx/net/netlink.h>
|
|
|
|
#include "netlink.h"
|
|
|
|
/****************************************************************************
|
|
* Private Data
|
|
****************************************************************************/
|
|
|
|
#ifdef CONFIG_NETLINK_VALIDATE_POLICY
|
|
static const uint8_t g_nla_attr_len[NLA_TYPE_MAX + 1] =
|
|
{
|
|
0,
|
|
sizeof(uint8_t),
|
|
sizeof(uint16_t),
|
|
sizeof(uint32_t),
|
|
sizeof(uint64_t),
|
|
0, 0, 0, 0, 0, 0, 0,
|
|
sizeof(int8_t),
|
|
sizeof(int16_t),
|
|
sizeof(int32_t),
|
|
sizeof(int64_t),
|
|
};
|
|
|
|
static const uint8_t g_nla_attr_minlen[NLA_TYPE_MAX + 1] =
|
|
{
|
|
0,
|
|
sizeof(uint8_t),
|
|
sizeof(uint16_t),
|
|
sizeof(uint32_t),
|
|
sizeof(uint64_t),
|
|
0, 0,
|
|
sizeof(uint64_t),
|
|
NLA_HDRLEN,
|
|
0, 0, 0,
|
|
sizeof(int8_t),
|
|
sizeof(int16_t),
|
|
sizeof(int32_t),
|
|
sizeof(int64_t),
|
|
};
|
|
|
|
/****************************************************************************
|
|
* Private Functions
|
|
****************************************************************************/
|
|
|
|
static int validate_nla_bitfield32(FAR const struct nlattr *nla,
|
|
FAR uint32_t *valid_flags_mask)
|
|
{
|
|
FAR const struct nla_bitfield32 *bf = nla_data(nla);
|
|
|
|
if (!valid_flags_mask)
|
|
{
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* disallow invalid bit selector */
|
|
|
|
if (bf->selector & ~*valid_flags_mask)
|
|
{
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* disallow invalid bit values */
|
|
|
|
if (bf->value & ~*valid_flags_mask)
|
|
{
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* disallow valid bit values that are not selected */
|
|
|
|
if (bf->value & ~bf->selector)
|
|
{
|
|
return -EINVAL;
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
static int validate_nla(FAR const struct nlattr *nla, int maxtype,
|
|
FAR const struct nla_policy *policy)
|
|
{
|
|
FAR const struct nla_policy *pt;
|
|
int minlen = 0;
|
|
int attrlen = nla_len(nla);
|
|
int type = nla_type(nla);
|
|
|
|
if (type <= 0 || type > maxtype)
|
|
{
|
|
return -EINVAL;
|
|
}
|
|
|
|
pt = &policy[type];
|
|
|
|
DEBUGASSERT(pt->type <= NLA_TYPE_MAX);
|
|
|
|
if (g_nla_attr_len[pt->type] && attrlen != g_nla_attr_len[pt->type])
|
|
{
|
|
nwarn("netlink: '%d': attribute type %d has an invalid length.\n",
|
|
nxsched_getpid(), type);
|
|
return -EINVAL;
|
|
}
|
|
|
|
switch (pt->type)
|
|
{
|
|
case NLA_FLAG:
|
|
if (attrlen > 0)
|
|
{
|
|
return -ERANGE;
|
|
}
|
|
break;
|
|
|
|
case NLA_BITFIELD32:
|
|
if (attrlen != sizeof(struct nla_bitfield32))
|
|
{
|
|
return -ERANGE;
|
|
}
|
|
|
|
if (validate_nla_bitfield32(nla, pt->validation_data) != 0)
|
|
{
|
|
return -EINVAL;
|
|
}
|
|
break;
|
|
|
|
case NLA_NUL_STRING:
|
|
if (pt->len)
|
|
{
|
|
minlen = MIN(attrlen, pt->len + 1);
|
|
}
|
|
else
|
|
{
|
|
minlen = attrlen;
|
|
}
|
|
|
|
if (!minlen || memchr(nla_data(nla), '\0', minlen) == NULL)
|
|
{
|
|
return -EINVAL;
|
|
}
|
|
|
|
/* fall through */
|
|
|
|
case NLA_STRING:
|
|
if (attrlen < 1)
|
|
{
|
|
return -ERANGE;
|
|
}
|
|
|
|
if (pt->len)
|
|
{
|
|
FAR char *buf = nla_data(nla);
|
|
|
|
if (buf[attrlen - 1] == '\0')
|
|
{
|
|
attrlen--;
|
|
}
|
|
|
|
if (attrlen > pt->len)
|
|
{
|
|
return -ERANGE;
|
|
}
|
|
}
|
|
break;
|
|
|
|
case NLA_BINARY:
|
|
if (pt->len && attrlen > pt->len)
|
|
{
|
|
return -ERANGE;
|
|
}
|
|
break;
|
|
|
|
case NLA_NESTED_COMPAT:
|
|
if (attrlen < pt->len)
|
|
{
|
|
return -ERANGE;
|
|
}
|
|
|
|
if (attrlen < NLA_ALIGN(pt->len))
|
|
{
|
|
break;
|
|
}
|
|
|
|
if (attrlen < NLA_ALIGN(pt->len) + NLA_HDRLEN)
|
|
{
|
|
return -ERANGE;
|
|
}
|
|
|
|
nla = nla_data(nla) + NLA_ALIGN(pt->len);
|
|
if (attrlen < NLA_ALIGN(pt->len) + NLA_HDRLEN + nla_len(nla))
|
|
{
|
|
return -ERANGE;
|
|
}
|
|
break;
|
|
|
|
case NLA_NESTED:
|
|
/* a nested attributes is allowed to be empty; if its not,
|
|
* it must have a size of at least NLA_HDRLEN.
|
|
*/
|
|
|
|
if (attrlen == 0)
|
|
{
|
|
break;
|
|
}
|
|
|
|
default:
|
|
if (pt->len)
|
|
{
|
|
minlen = pt->len;
|
|
}
|
|
else if (pt->type != NLA_UNSPEC)
|
|
{
|
|
minlen = g_nla_attr_minlen[pt->type];
|
|
}
|
|
|
|
if (attrlen < minlen)
|
|
{
|
|
return -ERANGE;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
#else
|
|
# define validate_nla(nla, maxtype, policy) 0
|
|
#endif
|
|
|
|
/****************************************************************************
|
|
* Public Functions
|
|
****************************************************************************/
|
|
|
|
/****************************************************************************
|
|
* Name: nla_next
|
|
*
|
|
* Description:
|
|
* Next netlink attribute in attribute stream.
|
|
*
|
|
* Input Parameters:
|
|
* nla - netlink attribute.
|
|
* remaining - number of bytes remaining in attribute stream.
|
|
*
|
|
* Returned Value:
|
|
* Returns the next netlink attribute in the attribute stream and
|
|
* decrements remaining by the size of the current attribute.
|
|
*
|
|
****************************************************************************/
|
|
|
|
FAR struct nlattr *nla_next(FAR const struct nlattr *nla,
|
|
FAR int *remaining)
|
|
{
|
|
unsigned int totlen = NLA_ALIGN(nla->nla_len);
|
|
|
|
*remaining -= totlen;
|
|
return (FAR struct nlattr *)((FAR char *)nla + totlen);
|
|
}
|
|
|
|
/****************************************************************************
|
|
* Name: nla_parse
|
|
*
|
|
* Description:
|
|
* Parse the nested netlink attribute.
|
|
*
|
|
****************************************************************************/
|
|
|
|
int nla_parse(FAR struct nlattr **tb, int maxtype,
|
|
FAR const struct nlattr *head,
|
|
int len, FAR const struct nla_policy *policy,
|
|
FAR struct netlink_ext_ack *extack)
|
|
{
|
|
FAR const struct nlattr *nla;
|
|
int rem;
|
|
int err = 0;
|
|
|
|
memset(tb, 0, sizeof(FAR struct nlattr *) * (maxtype + 1));
|
|
|
|
nla_for_each_attr(nla, head, len, rem)
|
|
{
|
|
uint16_t type = nla_type(nla);
|
|
|
|
if (type > 0 && type <= maxtype)
|
|
{
|
|
err = validate_nla(nla, maxtype, policy);
|
|
if (err < 0)
|
|
{
|
|
nl_set_err_msg_attr(extack, nla,
|
|
"Attribute failed policy validation");
|
|
goto errout;
|
|
}
|
|
|
|
tb[type] = (FAR struct nlattr *)nla;
|
|
}
|
|
}
|
|
|
|
if (rem > 0)
|
|
{
|
|
nwarn("netlink: %d bytes leftover after parsing attributes in "
|
|
"pid `%d'.\n", rem, nxsched_getpid());
|
|
}
|
|
|
|
errout:
|
|
return err;
|
|
}
|