xfrm_user.c 73.2 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9
/* xfrm_user.c: User interface to configure xfrm engine.
 *
 * Copyright (C) 2002 David S. Miller (davem@redhat.com)
 *
 * Changes:
 *	Mitsuru KANDA @USAGI
 * 	Kazunori MIYAZAWA @USAGI
 * 	Kunihiro Ishiguro <kunihiro@ipinfusion.com>
 * 		IPv6 support
10
 *
L
Linus Torvalds 已提交
11 12
 */

13
#include <linux/crypto.h>
L
Linus Torvalds 已提交
14 15 16 17 18 19 20 21 22 23 24 25 26 27
#include <linux/module.h>
#include <linux/kernel.h>
#include <linux/types.h>
#include <linux/slab.h>
#include <linux/socket.h>
#include <linux/string.h>
#include <linux/net.h>
#include <linux/skbuff.h>
#include <linux/pfkeyv2.h>
#include <linux/ipsec.h>
#include <linux/init.h>
#include <linux/security.h>
#include <net/sock.h>
#include <net/xfrm.h>
28
#include <net/netlink.h>
29
#include <net/ah.h>
30
#include <linux/uaccess.h>
E
Eric Dumazet 已提交
31
#if IS_ENABLED(CONFIG_IPV6)
32 33
#include <linux/in6.h>
#endif
34
#include <asm/unaligned.h>
L
Linus Torvalds 已提交
35

36
static int verify_one_alg(struct nlattr **attrs, enum xfrm_attr_type_t type)
L
Linus Torvalds 已提交
37
{
38
	struct nlattr *rt = attrs[type];
L
Linus Torvalds 已提交
39 40 41 42 43
	struct xfrm_algo *algp;

	if (!rt)
		return 0;

44
	algp = nla_data(rt);
45
	if (nla_len(rt) < xfrm_alg_len(algp))
46 47
		return -EINVAL;

L
Linus Torvalds 已提交
48 49 50 51 52 53 54 55
	switch (type) {
	case XFRMA_ALG_AUTH:
	case XFRMA_ALG_CRYPT:
	case XFRMA_ALG_COMP:
		break;

	default:
		return -EINVAL;
56
	}
L
Linus Torvalds 已提交
57 58 59 60 61

	algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
	return 0;
}

62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77
static int verify_auth_trunc(struct nlattr **attrs)
{
	struct nlattr *rt = attrs[XFRMA_ALG_AUTH_TRUNC];
	struct xfrm_algo_auth *algp;

	if (!rt)
		return 0;

	algp = nla_data(rt);
	if (nla_len(rt) < xfrm_alg_auth_len(algp))
		return -EINVAL;

	algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
	return 0;
}

78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93
static int verify_aead(struct nlattr **attrs)
{
	struct nlattr *rt = attrs[XFRMA_ALG_AEAD];
	struct xfrm_algo_aead *algp;

	if (!rt)
		return 0;

	algp = nla_data(rt);
	if (nla_len(rt) < aead_len(algp))
		return -EINVAL;

	algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
	return 0;
}

94
static void verify_one_addr(struct nlattr **attrs, enum xfrm_attr_type_t type,
95 96
			   xfrm_address_t **addrp)
{
97
	struct nlattr *rt = attrs[type];
98

99
	if (rt && addrp)
100
		*addrp = nla_data(rt);
101
}
102

103
static inline int verify_sec_ctx_len(struct nlattr **attrs)
104
{
105
	struct nlattr *rt = attrs[XFRMA_SEC_CTX];
106 107 108 109 110
	struct xfrm_user_sec_ctx *uctx;

	if (!rt)
		return 0;

111
	uctx = nla_data(rt);
112
	if (uctx->len != (sizeof(struct xfrm_user_sec_ctx) + uctx->ctx_len))
113 114 115 116 117
		return -EINVAL;

	return 0;
}

118 119 120 121
static inline int verify_replay(struct xfrm_usersa_info *p,
				struct nlattr **attrs)
{
	struct nlattr *rt = attrs[XFRMA_REPLAY_ESN_VAL];
122
	struct xfrm_replay_state_esn *rs;
123

124 125 126 127 128 129 130 131 132 133 134 135 136
	if (p->flags & XFRM_STATE_ESN) {
		if (!rt)
			return -EINVAL;

		rs = nla_data(rt);

		if (rs->bmp_len > XFRMA_REPLAY_ESN_MAX / sizeof(rs->bmp[0]) / 8)
			return -EINVAL;

		if (nla_len(rt) < xfrm_replay_state_esn_len(rs) &&
		    nla_len(rt) != sizeof(*rs))
			return -EINVAL;
	}
137

138 139 140
	if (!rt)
		return 0;

141 142
	/* As only ESP and AH support ESN feature. */
	if ((p->id.proto != IPPROTO_ESP) && (p->id.proto != IPPROTO_AH))
143 144
		return -EINVAL;

145 146 147 148 149
	if (p->replay_window != 0)
		return -EINVAL;

	return 0;
}
150

L
Linus Torvalds 已提交
151
static int verify_newsa_info(struct xfrm_usersa_info *p,
152
			     struct nlattr **attrs)
L
Linus Torvalds 已提交
153 154 155 156 157 158 159 160 161
{
	int err;

	err = -EINVAL;
	switch (p->family) {
	case AF_INET:
		break;

	case AF_INET6:
E
Eric Dumazet 已提交
162
#if IS_ENABLED(CONFIG_IPV6)
L
Linus Torvalds 已提交
163 164 165 166 167 168 169 170
		break;
#else
		err = -EAFNOSUPPORT;
		goto out;
#endif

	default:
		goto out;
171
	}
L
Linus Torvalds 已提交
172 173 174 175

	err = -EINVAL;
	switch (p->id.proto) {
	case IPPROTO_AH:
176 177
		if ((!attrs[XFRMA_ALG_AUTH]	&&
		     !attrs[XFRMA_ALG_AUTH_TRUNC]) ||
178
		    attrs[XFRMA_ALG_AEAD]	||
179
		    attrs[XFRMA_ALG_CRYPT]	||
180
		    attrs[XFRMA_ALG_COMP]	||
181
		    attrs[XFRMA_TFCPAD])
L
Linus Torvalds 已提交
182 183 184 185
			goto out;
		break;

	case IPPROTO_ESP:
186 187 188
		if (attrs[XFRMA_ALG_COMP])
			goto out;
		if (!attrs[XFRMA_ALG_AUTH] &&
189
		    !attrs[XFRMA_ALG_AUTH_TRUNC] &&
190 191 192 193
		    !attrs[XFRMA_ALG_CRYPT] &&
		    !attrs[XFRMA_ALG_AEAD])
			goto out;
		if ((attrs[XFRMA_ALG_AUTH] ||
194
		     attrs[XFRMA_ALG_AUTH_TRUNC] ||
195 196
		     attrs[XFRMA_ALG_CRYPT]) &&
		    attrs[XFRMA_ALG_AEAD])
L
Linus Torvalds 已提交
197
			goto out;
198 199 200
		if (attrs[XFRMA_TFCPAD] &&
		    p->mode != XFRM_MODE_TUNNEL)
			goto out;
L
Linus Torvalds 已提交
201 202 203
		break;

	case IPPROTO_COMP:
204
		if (!attrs[XFRMA_ALG_COMP]	||
205
		    attrs[XFRMA_ALG_AEAD]	||
206
		    attrs[XFRMA_ALG_AUTH]	||
207
		    attrs[XFRMA_ALG_AUTH_TRUNC]	||
208
		    attrs[XFRMA_ALG_CRYPT]	||
209 210
		    attrs[XFRMA_TFCPAD]		||
		    (ntohl(p->id.spi) >= 0x10000))
L
Linus Torvalds 已提交
211 212 213
			goto out;
		break;

E
Eric Dumazet 已提交
214
#if IS_ENABLED(CONFIG_IPV6)
215 216
	case IPPROTO_DSTOPTS:
	case IPPROTO_ROUTING:
217 218
		if (attrs[XFRMA_ALG_COMP]	||
		    attrs[XFRMA_ALG_AUTH]	||
219
		    attrs[XFRMA_ALG_AUTH_TRUNC]	||
220
		    attrs[XFRMA_ALG_AEAD]	||
221 222 223
		    attrs[XFRMA_ALG_CRYPT]	||
		    attrs[XFRMA_ENCAP]		||
		    attrs[XFRMA_SEC_CTX]	||
224
		    attrs[XFRMA_TFCPAD]		||
225
		    !attrs[XFRMA_COADDR])
226 227 228 229
			goto out;
		break;
#endif

L
Linus Torvalds 已提交
230 231
	default:
		goto out;
232
	}
L
Linus Torvalds 已提交
233

234 235
	if ((err = verify_aead(attrs)))
		goto out;
236 237
	if ((err = verify_auth_trunc(attrs)))
		goto out;
238
	if ((err = verify_one_alg(attrs, XFRMA_ALG_AUTH)))
L
Linus Torvalds 已提交
239
		goto out;
240
	if ((err = verify_one_alg(attrs, XFRMA_ALG_CRYPT)))
L
Linus Torvalds 已提交
241
		goto out;
242
	if ((err = verify_one_alg(attrs, XFRMA_ALG_COMP)))
L
Linus Torvalds 已提交
243
		goto out;
244
	if ((err = verify_sec_ctx_len(attrs)))
245
		goto out;
246 247
	if ((err = verify_replay(p, attrs)))
		goto out;
L
Linus Torvalds 已提交
248 249 250

	err = -EINVAL;
	switch (p->mode) {
251 252
	case XFRM_MODE_TRANSPORT:
	case XFRM_MODE_TUNNEL:
253
	case XFRM_MODE_ROUTEOPTIMIZATION:
D
Diego Beltrami 已提交
254
	case XFRM_MODE_BEET:
L
Linus Torvalds 已提交
255 256 257 258
		break;

	default:
		goto out;
259
	}
L
Linus Torvalds 已提交
260 261 262 263 264 265 266 267

	err = 0;

out:
	return err;
}

static int attach_one_algo(struct xfrm_algo **algpp, u8 *props,
268
			   struct xfrm_algo_desc *(*get_byname)(const char *, int),
269
			   struct nlattr *rta)
L
Linus Torvalds 已提交
270 271 272 273 274 275 276
{
	struct xfrm_algo *p, *ualg;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

277
	ualg = nla_data(rta);
L
Linus Torvalds 已提交
278 279 280 281 282 283

	algo = get_byname(ualg->alg_name, 1);
	if (!algo)
		return -ENOSYS;
	*props = algo->desc.sadb_alg_id;

284
	p = kmemdup(ualg, xfrm_alg_len(ualg), GFP_KERNEL);
L
Linus Torvalds 已提交
285 286 287
	if (!p)
		return -ENOMEM;

288
	strcpy(p->alg_name, algo->name);
L
Linus Torvalds 已提交
289 290 291 292
	*algpp = p;
	return 0;
}

293 294 295 296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312 313 314 315 316 317
static int attach_crypt(struct xfrm_state *x, struct nlattr *rta)
{
	struct xfrm_algo *p, *ualg;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

	ualg = nla_data(rta);

	algo = xfrm_ealg_get_byname(ualg->alg_name, 1);
	if (!algo)
		return -ENOSYS;
	x->props.ealgo = algo->desc.sadb_alg_id;

	p = kmemdup(ualg, xfrm_alg_len(ualg), GFP_KERNEL);
	if (!p)
		return -ENOMEM;

	strcpy(p->alg_name, algo->name);
	x->ealg = p;
	x->geniv = algo->uinfo.encr.geniv;
	return 0;
}

318 319 320 321 322 323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359 360 361
static int attach_auth(struct xfrm_algo_auth **algpp, u8 *props,
		       struct nlattr *rta)
{
	struct xfrm_algo *ualg;
	struct xfrm_algo_auth *p;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

	ualg = nla_data(rta);

	algo = xfrm_aalg_get_byname(ualg->alg_name, 1);
	if (!algo)
		return -ENOSYS;
	*props = algo->desc.sadb_alg_id;

	p = kmalloc(sizeof(*p) + (ualg->alg_key_len + 7) / 8, GFP_KERNEL);
	if (!p)
		return -ENOMEM;

	strcpy(p->alg_name, algo->name);
	p->alg_key_len = ualg->alg_key_len;
	p->alg_trunc_len = algo->uinfo.auth.icv_truncbits;
	memcpy(p->alg_key, ualg->alg_key, (ualg->alg_key_len + 7) / 8);

	*algpp = p;
	return 0;
}

static int attach_auth_trunc(struct xfrm_algo_auth **algpp, u8 *props,
			     struct nlattr *rta)
{
	struct xfrm_algo_auth *p, *ualg;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

	ualg = nla_data(rta);

	algo = xfrm_aalg_get_byname(ualg->alg_name, 1);
	if (!algo)
		return -ENOSYS;
362
	if (ualg->alg_trunc_len > algo->uinfo.auth.icv_fullbits)
363 364 365 366 367 368 369 370 371 372 373 374 375 376 377
		return -EINVAL;
	*props = algo->desc.sadb_alg_id;

	p = kmemdup(ualg, xfrm_alg_auth_len(ualg), GFP_KERNEL);
	if (!p)
		return -ENOMEM;

	strcpy(p->alg_name, algo->name);
	if (!p->alg_trunc_len)
		p->alg_trunc_len = algo->uinfo.auth.icv_truncbits;

	*algpp = p;
	return 0;
}

378
static int attach_aead(struct xfrm_state *x, struct nlattr *rta)
379 380 381 382 383 384 385 386 387 388 389 390
{
	struct xfrm_algo_aead *p, *ualg;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

	ualg = nla_data(rta);

	algo = xfrm_aead_get_byname(ualg->alg_name, ualg->alg_icv_len, 1);
	if (!algo)
		return -ENOSYS;
391
	x->props.ealgo = algo->desc.sadb_alg_id;
392 393 394 395 396 397

	p = kmemdup(ualg, aead_len(ualg), GFP_KERNEL);
	if (!p)
		return -ENOMEM;

	strcpy(p->alg_name, algo->name);
398 399
	x->aead = p;
	x->geniv = algo->uinfo.aead.geniv;
400 401 402
	return 0;
}

403 404 405 406
static inline int xfrm_replay_verify_len(struct xfrm_replay_state_esn *replay_esn,
					 struct nlattr *rp)
{
	struct xfrm_replay_state_esn *up;
407
	int ulen;
408 409 410 411 412

	if (!replay_esn || !rp)
		return 0;

	up = nla_data(rp);
413
	ulen = xfrm_replay_state_esn_len(up);
414

415
	if (nla_len(rp) < ulen || xfrm_replay_state_esn_len(replay_esn) != ulen)
416 417 418 419 420
		return -EINVAL;

	return 0;
}

421 422 423 424 425
static int xfrm_alloc_replay_state_esn(struct xfrm_replay_state_esn **replay_esn,
				       struct xfrm_replay_state_esn **preplay_esn,
				       struct nlattr *rta)
{
	struct xfrm_replay_state_esn *p, *pp, *up;
426
	int klen, ulen;
427 428 429 430 431

	if (!rta)
		return 0;

	up = nla_data(rta);
432 433
	klen = xfrm_replay_state_esn_len(up);
	ulen = nla_len(rta) >= klen ? klen : sizeof(*up);
434

435
	p = kzalloc(klen, GFP_KERNEL);
436 437 438
	if (!p)
		return -ENOMEM;

439
	pp = kzalloc(klen, GFP_KERNEL);
440 441 442 443 444
	if (!pp) {
		kfree(p);
		return -ENOMEM;
	}

445 446 447
	memcpy(p, up, ulen);
	memcpy(pp, up, ulen);

448 449 450 451 452 453
	*replay_esn = p;
	*preplay_esn = pp;

	return 0;
}

454
static inline int xfrm_user_sec_ctx_size(struct xfrm_sec_ctx *xfrm_ctx)
455 456 457 458 459 460 461 462 463 464
{
	int len = 0;

	if (xfrm_ctx) {
		len += sizeof(struct xfrm_user_sec_ctx);
		len += xfrm_ctx->ctx_len;
	}
	return len;
}

L
Linus Torvalds 已提交
465 466 467 468 469 470
static void copy_from_user_state(struct xfrm_state *x, struct xfrm_usersa_info *p)
{
	memcpy(&x->id, &p->id, sizeof(x->id));
	memcpy(&x->sel, &p->sel, sizeof(x->sel));
	memcpy(&x->lft, &p->lft, sizeof(x->lft));
	x->props.mode = p->mode;
471 472
	x->props.replay_window = min_t(unsigned int, p->replay_window,
					sizeof(x->replay.bitmap) * 8);
L
Linus Torvalds 已提交
473 474
	x->props.reqid = p->reqid;
	x->props.family = p->family;
475
	memcpy(&x->props.saddr, &p->saddr, sizeof(x->props.saddr));
L
Linus Torvalds 已提交
476
	x->props.flags = p->flags;
477

478
	if (!x->sel.family && !(p->flags & XFRM_STATE_AF_UNSPEC))
479
		x->sel.family = p->family;
L
Linus Torvalds 已提交
480 481
}

J
Jamal Hadi Salim 已提交
482 483 484 485 486
/*
 * someday when pfkey also has support, we could have the code
 * somehow made shareable and move it to xfrm_state.c - JHS
 *
*/
487 488
static void xfrm_update_ae_params(struct xfrm_state *x, struct nlattr **attrs,
				  int update_esn)
J
Jamal Hadi Salim 已提交
489
{
490
	struct nlattr *rp = attrs[XFRMA_REPLAY_VAL];
491
	struct nlattr *re = update_esn ? attrs[XFRMA_REPLAY_ESN_VAL] : NULL;
492 493 494
	struct nlattr *lt = attrs[XFRMA_LTIME_VAL];
	struct nlattr *et = attrs[XFRMA_ETIMER_THRESH];
	struct nlattr *rt = attrs[XFRMA_REPLAY_THRESH];
J
Jamal Hadi Salim 已提交
495

496 497 498 499 500 501 502 503 504
	if (re) {
		struct xfrm_replay_state_esn *replay_esn;
		replay_esn = nla_data(re);
		memcpy(x->replay_esn, replay_esn,
		       xfrm_replay_state_esn_len(replay_esn));
		memcpy(x->preplay_esn, replay_esn,
		       xfrm_replay_state_esn_len(replay_esn));
	}

J
Jamal Hadi Salim 已提交
505 506
	if (rp) {
		struct xfrm_replay_state *replay;
507
		replay = nla_data(rp);
J
Jamal Hadi Salim 已提交
508 509 510 511 512 513
		memcpy(&x->replay, replay, sizeof(*replay));
		memcpy(&x->preplay, replay, sizeof(*replay));
	}

	if (lt) {
		struct xfrm_lifetime_cur *ltime;
514
		ltime = nla_data(lt);
J
Jamal Hadi Salim 已提交
515 516 517 518 519 520
		x->curlft.bytes = ltime->bytes;
		x->curlft.packets = ltime->packets;
		x->curlft.add_time = ltime->add_time;
		x->curlft.use_time = ltime->use_time;
	}

521
	if (et)
522
		x->replay_maxage = nla_get_u32(et);
J
Jamal Hadi Salim 已提交
523

524
	if (rt)
525
		x->replay_maxdiff = nla_get_u32(rt);
J
Jamal Hadi Salim 已提交
526 527
}

528 529
static struct xfrm_state *xfrm_state_construct(struct net *net,
					       struct xfrm_usersa_info *p,
530
					       struct nlattr **attrs,
L
Linus Torvalds 已提交
531 532
					       int *errp)
{
533
	struct xfrm_state *x = xfrm_state_alloc(net);
L
Linus Torvalds 已提交
534 535 536 537 538 539 540
	int err = -ENOMEM;

	if (!x)
		goto error_no_put;

	copy_from_user_state(x, p);

541 542 543
	if (attrs[XFRMA_SA_EXTRA_FLAGS])
		x->props.extra_flags = nla_get_u32(attrs[XFRMA_SA_EXTRA_FLAGS]);

544
	if ((err = attach_aead(x, attrs[XFRMA_ALG_AEAD])))
545
		goto error;
546 547
	if ((err = attach_auth_trunc(&x->aalg, &x->props.aalgo,
				     attrs[XFRMA_ALG_AUTH_TRUNC])))
L
Linus Torvalds 已提交
548
		goto error;
549 550 551 552 553
	if (!x->props.aalgo) {
		if ((err = attach_auth(&x->aalg, &x->props.aalgo,
				       attrs[XFRMA_ALG_AUTH])))
			goto error;
	}
554
	if ((err = attach_crypt(x, attrs[XFRMA_ALG_CRYPT])))
L
Linus Torvalds 已提交
555 556 557
		goto error;
	if ((err = attach_one_algo(&x->calg, &x->props.calgo,
				   xfrm_calg_get_byname,
558
				   attrs[XFRMA_ALG_COMP])))
L
Linus Torvalds 已提交
559
		goto error;
560 561 562 563 564 565 566 567

	if (attrs[XFRMA_ENCAP]) {
		x->encap = kmemdup(nla_data(attrs[XFRMA_ENCAP]),
				   sizeof(*x->encap), GFP_KERNEL);
		if (x->encap == NULL)
			goto error;
	}

568 569 570
	if (attrs[XFRMA_TFCPAD])
		x->tfcpad = nla_get_u32(attrs[XFRMA_TFCPAD]);

571 572 573 574 575 576 577
	if (attrs[XFRMA_COADDR]) {
		x->coaddr = kmemdup(nla_data(attrs[XFRMA_COADDR]),
				    sizeof(*x->coaddr), GFP_KERNEL);
		if (x->coaddr == NULL)
			goto error;
	}

578 579
	xfrm_mark_get(attrs, &x->mark);

580
	err = __xfrm_init_state(x, false);
L
Linus Torvalds 已提交
581 582 583
	if (err)
		goto error;

584 585 586 587 588 589
	if (attrs[XFRMA_SEC_CTX]) {
		err = security_xfrm_state_alloc(x,
						nla_data(attrs[XFRMA_SEC_CTX]));
		if (err)
			goto error;
	}
590

591 592 593 594
	if ((err = xfrm_alloc_replay_state_esn(&x->replay_esn, &x->preplay_esn,
					       attrs[XFRMA_REPLAY_ESN_VAL])))
		goto error;

L
Linus Torvalds 已提交
595
	x->km.seq = p->seq;
A
Alexey Dobriyan 已提交
596
	x->replay_maxdiff = net->xfrm.sysctl_aevent_rseqth;
J
Jamal Hadi Salim 已提交
597
	/* sysctl_xfrm_aevent_etime is in 100ms units */
A
Alexey Dobriyan 已提交
598
	x->replay_maxage = (net->xfrm.sysctl_aevent_etime*HZ)/XFRM_AE_ETH_M;
J
Jamal Hadi Salim 已提交
599

600 601
	if ((err = xfrm_init_replay(x)))
		goto error;
J
Jamal Hadi Salim 已提交
602

603
	/* override default values from above */
604
	xfrm_update_ae_params(x, attrs, 0);
L
Linus Torvalds 已提交
605 606 607 608 609 610 611 612 613 614 615

	return x;

error:
	x->km.state = XFRM_STATE_DEAD;
	xfrm_state_put(x);
error_no_put:
	*errp = err;
	return NULL;
}

616
static int xfrm_add_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
617
		struct nlattr **attrs)
L
Linus Torvalds 已提交
618
{
619
	struct net *net = sock_net(skb->sk);
620
	struct xfrm_usersa_info *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
621 622
	struct xfrm_state *x;
	int err;
623
	struct km_event c;
L
Linus Torvalds 已提交
624

625
	err = verify_newsa_info(p, attrs);
L
Linus Torvalds 已提交
626 627 628
	if (err)
		return err;

629
	x = xfrm_state_construct(net, p, attrs, &err);
L
Linus Torvalds 已提交
630 631 632
	if (!x)
		return err;

633
	xfrm_state_hold(x);
L
Linus Torvalds 已提交
634 635 636 637 638
	if (nlh->nlmsg_type == XFRM_MSG_NEWSA)
		err = xfrm_state_add(x);
	else
		err = xfrm_state_update(x);

639
	xfrm_audit_state_add(x, err ? 0 : 1, true);
J
Joy Latten 已提交
640

L
Linus Torvalds 已提交
641 642
	if (err < 0) {
		x->km.state = XFRM_STATE_DEAD;
643
		__xfrm_state_put(x);
644
		goto out;
L
Linus Torvalds 已提交
645 646
	}

647
	c.seq = nlh->nlmsg_seq;
648
	c.portid = nlh->nlmsg_pid;
649
	c.event = nlh->nlmsg_type;
650 651

	km_state_notify(x, &c);
652
out:
653
	xfrm_state_put(x);
L
Linus Torvalds 已提交
654 655 656
	return err;
}

657 658
static struct xfrm_state *xfrm_user_state_lookup(struct net *net,
						 struct xfrm_usersa_id *p,
659
						 struct nlattr **attrs,
660 661 662
						 int *errp)
{
	struct xfrm_state *x = NULL;
663
	struct xfrm_mark m;
664
	int err;
665
	u32 mark = xfrm_mark_get(attrs, &m);
666 667 668

	if (xfrm_id_proto_match(p->proto, IPSEC_PROTO_ANY)) {
		err = -ESRCH;
669
		x = xfrm_state_lookup(net, mark, &p->daddr, p->spi, p->proto, p->family);
670 671 672
	} else {
		xfrm_address_t *saddr = NULL;

673
		verify_one_addr(attrs, XFRMA_SRCADDR, &saddr);
674 675 676 677 678
		if (!saddr) {
			err = -EINVAL;
			goto out;
		}

679
		err = -ESRCH;
680 681
		x = xfrm_state_lookup_byaddr(net, mark,
					     &p->daddr, saddr,
682
					     p->proto, p->family);
683 684 685 686 687 688 689 690
	}

 out:
	if (!x && errp)
		*errp = err;
	return x;
}

691
static int xfrm_del_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
692
		struct nlattr **attrs)
L
Linus Torvalds 已提交
693
{
694
	struct net *net = sock_net(skb->sk);
L
Linus Torvalds 已提交
695
	struct xfrm_state *x;
696
	int err = -ESRCH;
697
	struct km_event c;
698
	struct xfrm_usersa_id *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
699

700
	x = xfrm_user_state_lookup(net, p, attrs, &err);
L
Linus Torvalds 已提交
701
	if (x == NULL)
702
		return err;
L
Linus Torvalds 已提交
703

704
	if ((err = security_xfrm_state_delete(x)) != 0)
C
Catherine Zhang 已提交
705 706
		goto out;

L
Linus Torvalds 已提交
707
	if (xfrm_state_kern(x)) {
C
Catherine Zhang 已提交
708 709
		err = -EPERM;
		goto out;
L
Linus Torvalds 已提交
710 711
	}

712
	err = xfrm_state_delete(x);
J
Joy Latten 已提交
713

C
Catherine Zhang 已提交
714 715
	if (err < 0)
		goto out;
716 717

	c.seq = nlh->nlmsg_seq;
718
	c.portid = nlh->nlmsg_pid;
719
	c.event = nlh->nlmsg_type;
720
	km_state_notify(x, &c);
L
Linus Torvalds 已提交
721

C
Catherine Zhang 已提交
722
out:
723
	xfrm_audit_state_delete(x, err ? 0 : 1, true);
C
Catherine Zhang 已提交
724
	xfrm_state_put(x);
725
	return err;
L
Linus Torvalds 已提交
726 727 728 729
}

static void copy_to_user_state(struct xfrm_state *x, struct xfrm_usersa_info *p)
{
730
	memset(p, 0, sizeof(*p));
L
Linus Torvalds 已提交
731 732 733 734
	memcpy(&p->id, &x->id, sizeof(p->id));
	memcpy(&p->sel, &x->sel, sizeof(p->sel));
	memcpy(&p->lft, &x->lft, sizeof(p->lft));
	memcpy(&p->curlft, &x->curlft, sizeof(p->curlft));
735 736 737
	put_unaligned(x->stats.replay_window, &p->stats.replay_window);
	put_unaligned(x->stats.replay, &p->stats.replay);
	put_unaligned(x->stats.integrity_failed, &p->stats.integrity_failed);
738
	memcpy(&p->saddr, &x->props.saddr, sizeof(p->saddr));
L
Linus Torvalds 已提交
739 740 741 742 743 744 745 746 747 748 749 750 751 752 753
	p->mode = x->props.mode;
	p->replay_window = x->props.replay_window;
	p->reqid = x->props.reqid;
	p->family = x->props.family;
	p->flags = x->props.flags;
	p->seq = x->km.seq;
}

struct xfrm_dump_info {
	struct sk_buff *in_skb;
	struct sk_buff *out_skb;
	u32 nlmsg_seq;
	u16 nlmsg_flags;
};

754 755 756 757
static int copy_sec_ctx(struct xfrm_sec_ctx *s, struct sk_buff *skb)
{
	struct xfrm_user_sec_ctx *uctx;
	struct nlattr *attr;
758
	int ctx_size = sizeof(*uctx) + s->ctx_len;
759 760 761 762 763 764 765 766 767 768 769 770 771 772 773 774

	attr = nla_reserve(skb, XFRMA_SEC_CTX, ctx_size);
	if (attr == NULL)
		return -EMSGSIZE;

	uctx = nla_data(attr);
	uctx->exttype = XFRMA_SEC_CTX;
	uctx->len = ctx_size;
	uctx->ctx_doi = s->ctx_doi;
	uctx->ctx_alg = s->ctx_alg;
	uctx->ctx_len = s->ctx_len;
	memcpy(uctx + 1, s->ctx_str, s->ctx_len);

	return 0;
}

775 776 777 778 779 780 781 782 783 784 785
static int copy_to_user_auth(struct xfrm_algo_auth *auth, struct sk_buff *skb)
{
	struct xfrm_algo *algo;
	struct nlattr *nla;

	nla = nla_reserve(skb, XFRMA_ALG_AUTH,
			  sizeof(*algo) + (auth->alg_key_len + 7) / 8);
	if (!nla)
		return -EMSGSIZE;

	algo = nla_data(nla);
786
	strncpy(algo->alg_name, auth->alg_name, sizeof(algo->alg_name));
787 788 789 790 791 792
	memcpy(algo->alg_key, auth->alg_key, (auth->alg_key_len + 7) / 8);
	algo->alg_key_len = auth->alg_key_len;

	return 0;
}

793 794 795 796
/* Don't change this without updating xfrm_sa_len! */
static int copy_to_user_state_extra(struct xfrm_state *x,
				    struct xfrm_usersa_info *p,
				    struct sk_buff *skb)
L
Linus Torvalds 已提交
797
{
798
	int ret = 0;
799

800
	copy_to_user_state(x, p);
801

802 803 804 805 806 807 808
	if (x->props.extra_flags) {
		ret = nla_put_u32(skb, XFRMA_SA_EXTRA_FLAGS,
				  x->props.extra_flags);
		if (ret)
			goto out;
	}

809 810 811 812 813 814
	if (x->coaddr) {
		ret = nla_put(skb, XFRMA_COADDR, sizeof(*x->coaddr), x->coaddr);
		if (ret)
			goto out;
	}
	if (x->lastused) {
815 816
		ret = nla_put_u64_64bit(skb, XFRMA_LASTUSED, x->lastused,
					XFRMA_PAD);
817 818 819 820 821 822 823 824 825 826 827 828 829 830 831 832 833 834 835 836 837 838 839 840 841 842 843 844 845 846 847 848 849 850 851 852 853 854 855
		if (ret)
			goto out;
	}
	if (x->aead) {
		ret = nla_put(skb, XFRMA_ALG_AEAD, aead_len(x->aead), x->aead);
		if (ret)
			goto out;
	}
	if (x->aalg) {
		ret = copy_to_user_auth(x->aalg, skb);
		if (!ret)
			ret = nla_put(skb, XFRMA_ALG_AUTH_TRUNC,
				      xfrm_alg_auth_len(x->aalg), x->aalg);
		if (ret)
			goto out;
	}
	if (x->ealg) {
		ret = nla_put(skb, XFRMA_ALG_CRYPT, xfrm_alg_len(x->ealg), x->ealg);
		if (ret)
			goto out;
	}
	if (x->calg) {
		ret = nla_put(skb, XFRMA_ALG_COMP, sizeof(*(x->calg)), x->calg);
		if (ret)
			goto out;
	}
	if (x->encap) {
		ret = nla_put(skb, XFRMA_ENCAP, sizeof(*x->encap), x->encap);
		if (ret)
			goto out;
	}
	if (x->tfcpad) {
		ret = nla_put_u32(skb, XFRMA_TFCPAD, x->tfcpad);
		if (ret)
			goto out;
	}
	ret = xfrm_mark_put(skb, &x->mark);
	if (ret)
		goto out;
856
	if (x->replay_esn)
857 858 859
		ret = nla_put(skb, XFRMA_REPLAY_ESN_VAL,
			      xfrm_replay_state_esn_len(x->replay_esn),
			      x->replay_esn);
860 861 862 863 864
	else
		ret = nla_put(skb, XFRMA_REPLAY_VAL, sizeof(x->replay),
			      &x->replay);
	if (ret)
		goto out;
865 866 867 868
	if (x->security)
		ret = copy_sec_ctx(x->security, skb);
out:
	return ret;
869 870 871 872 873 874 875 876 877 878 879
}

static int dump_one_state(struct xfrm_state *x, int count, void *ptr)
{
	struct xfrm_dump_info *sp = ptr;
	struct sk_buff *in_skb = sp->in_skb;
	struct sk_buff *skb = sp->out_skb;
	struct xfrm_usersa_info *p;
	struct nlmsghdr *nlh;
	int err;

880
	nlh = nlmsg_put(skb, NETLINK_CB(in_skb).portid, sp->nlmsg_seq,
881 882 883 884 885 886 887
			XFRM_MSG_NEWSA, sizeof(*p), sp->nlmsg_flags);
	if (nlh == NULL)
		return -EMSGSIZE;

	p = nlmsg_data(nlh);

	err = copy_to_user_state_extra(x, p, skb);
888 889 890 891
	if (err) {
		nlmsg_cancel(skb, nlh);
		return err;
	}
892
	nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
893 894 895
	return 0;
}

896 897 898
static int xfrm_dump_sa_done(struct netlink_callback *cb)
{
	struct xfrm_state_walk *walk = (struct xfrm_state_walk *) &cb->args[1];
F
Fan Du 已提交
899 900 901
	struct sock *sk = cb->skb->sk;
	struct net *net = sock_net(sk);

902 903
	if (cb->args[0])
		xfrm_state_walk_done(walk, net);
904 905 906
	return 0;
}

907
static const struct nla_policy xfrma_policy[XFRMA_MAX+1];
L
Linus Torvalds 已提交
908 909
static int xfrm_dump_sa(struct sk_buff *skb, struct netlink_callback *cb)
{
910
	struct net *net = sock_net(skb->sk);
911
	struct xfrm_state_walk *walk = (struct xfrm_state_walk *) &cb->args[1];
L
Linus Torvalds 已提交
912 913
	struct xfrm_dump_info info;

914 915 916
	BUILD_BUG_ON(sizeof(struct xfrm_state_walk) >
		     sizeof(cb->args) - sizeof(cb->args[0]));

L
Linus Torvalds 已提交
917 918 919 920
	info.in_skb = cb->skb;
	info.out_skb = skb;
	info.nlmsg_seq = cb->nlh->nlmsg_seq;
	info.nlmsg_flags = NLM_F_MULTI;
921 922

	if (!cb->args[0]) {
923
		struct nlattr *attrs[XFRMA_MAX+1];
924
		struct xfrm_address_filter *filter = NULL;
925 926 927 928 929 930 931 932
		u8 proto = 0;
		int err;

		err = nlmsg_parse(cb->nlh, 0, attrs, XFRMA_MAX,
				  xfrma_policy);
		if (err < 0)
			return err;

933
		if (attrs[XFRMA_ADDRESS_FILTER]) {
934 935
			filter = kmemdup(nla_data(attrs[XFRMA_ADDRESS_FILTER]),
					 sizeof(*filter), GFP_KERNEL);
936 937 938 939 940 941 942 943
			if (filter == NULL)
				return -ENOMEM;
		}

		if (attrs[XFRMA_PROTO])
			proto = nla_get_u8(attrs[XFRMA_PROTO]);

		xfrm_state_walk_init(walk, proto, filter);
944
		cb->args[0] = 1;
945 946
	}

947
	(void) xfrm_state_walk(net, walk, dump_one_state, &info);
L
Linus Torvalds 已提交
948 949 950 951 952 953 954 955 956

	return skb->len;
}

static struct sk_buff *xfrm_state_netlink(struct sk_buff *in_skb,
					  struct xfrm_state *x, u32 seq)
{
	struct xfrm_dump_info info;
	struct sk_buff *skb;
957
	int err;
L
Linus Torvalds 已提交
958

959
	skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
L
Linus Torvalds 已提交
960 961 962 963 964 965 966 967
	if (!skb)
		return ERR_PTR(-ENOMEM);

	info.in_skb = in_skb;
	info.out_skb = skb;
	info.nlmsg_seq = seq;
	info.nlmsg_flags = 0;

968 969
	err = dump_one_state(x, 0, &info);
	if (err) {
L
Linus Torvalds 已提交
970
		kfree_skb(skb);
971
		return ERR_PTR(err);
L
Linus Torvalds 已提交
972 973 974 975 976
	}

	return skb;
}

977 978 979 980 981 982 983 984 985 986 987 988 989 990
/* A wrapper for nlmsg_multicast() checking that nlsk is still available.
 * Must be called with RCU read lock.
 */
static inline int xfrm_nlmsg_multicast(struct net *net, struct sk_buff *skb,
				       u32 pid, unsigned int group)
{
	struct sock *nlsk = rcu_dereference(net->xfrm.nlsk);

	if (nlsk)
		return nlmsg_multicast(nlsk, skb, pid, group, GFP_ATOMIC);
	else
		return -1;
}

991 992 993 994
static inline size_t xfrm_spdinfo_msgsize(void)
{
	return NLMSG_ALIGN(4)
	       + nla_total_size(sizeof(struct xfrmu_spdinfo))
995 996 997
	       + nla_total_size(sizeof(struct xfrmu_spdhinfo))
	       + nla_total_size(sizeof(struct xfrmu_spdhthresh))
	       + nla_total_size(sizeof(struct xfrmu_spdhthresh));
998 999
}

1000
static int build_spdinfo(struct sk_buff *skb, struct net *net,
1001
			 u32 portid, u32 seq, u32 flags)
J
Jamal Hadi Salim 已提交
1002
{
1003 1004 1005
	struct xfrmk_spdinfo si;
	struct xfrmu_spdinfo spc;
	struct xfrmu_spdhinfo sph;
1006
	struct xfrmu_spdhthresh spt4, spt6;
J
Jamal Hadi Salim 已提交
1007
	struct nlmsghdr *nlh;
1008
	int err;
J
Jamal Hadi Salim 已提交
1009
	u32 *f;
1010
	unsigned lseq;
J
Jamal Hadi Salim 已提交
1011

1012
	nlh = nlmsg_put(skb, portid, seq, XFRM_MSG_NEWSPDINFO, sizeof(u32), 0);
L
Lucas De Marchi 已提交
1013
	if (nlh == NULL) /* shouldn't really happen ... */
J
Jamal Hadi Salim 已提交
1014 1015 1016 1017
		return -EMSGSIZE;

	f = nlmsg_data(nlh);
	*f = flags;
1018
	xfrm_spd_getinfo(net, &si);
1019 1020 1021 1022 1023 1024 1025 1026 1027
	spc.incnt = si.incnt;
	spc.outcnt = si.outcnt;
	spc.fwdcnt = si.fwdcnt;
	spc.inscnt = si.inscnt;
	spc.outscnt = si.outscnt;
	spc.fwdscnt = si.fwdscnt;
	sph.spdhcnt = si.spdhcnt;
	sph.spdhmcnt = si.spdhmcnt;

1028 1029 1030 1031 1032 1033 1034 1035 1036
	do {
		lseq = read_seqbegin(&net->xfrm.policy_hthresh.lock);

		spt4.lbits = net->xfrm.policy_hthresh.lbits4;
		spt4.rbits = net->xfrm.policy_hthresh.rbits4;
		spt6.lbits = net->xfrm.policy_hthresh.lbits6;
		spt6.rbits = net->xfrm.policy_hthresh.rbits6;
	} while (read_seqretry(&net->xfrm.policy_hthresh.lock, lseq));

1037 1038 1039
	err = nla_put(skb, XFRMA_SPD_INFO, sizeof(spc), &spc);
	if (!err)
		err = nla_put(skb, XFRMA_SPD_HINFO, sizeof(sph), &sph);
1040 1041 1042 1043
	if (!err)
		err = nla_put(skb, XFRMA_SPD_IPV4_HTHRESH, sizeof(spt4), &spt4);
	if (!err)
		err = nla_put(skb, XFRMA_SPD_IPV6_HTHRESH, sizeof(spt6), &spt6);
1044 1045 1046 1047
	if (err) {
		nlmsg_cancel(skb, nlh);
		return err;
	}
J
Jamal Hadi Salim 已提交
1048

1049 1050
	nlmsg_end(skb, nlh);
	return 0;
J
Jamal Hadi Salim 已提交
1051 1052
}

1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097
static int xfrm_set_spdinfo(struct sk_buff *skb, struct nlmsghdr *nlh,
			    struct nlattr **attrs)
{
	struct net *net = sock_net(skb->sk);
	struct xfrmu_spdhthresh *thresh4 = NULL;
	struct xfrmu_spdhthresh *thresh6 = NULL;

	/* selector prefixlen thresholds to hash policies */
	if (attrs[XFRMA_SPD_IPV4_HTHRESH]) {
		struct nlattr *rta = attrs[XFRMA_SPD_IPV4_HTHRESH];

		if (nla_len(rta) < sizeof(*thresh4))
			return -EINVAL;
		thresh4 = nla_data(rta);
		if (thresh4->lbits > 32 || thresh4->rbits > 32)
			return -EINVAL;
	}
	if (attrs[XFRMA_SPD_IPV6_HTHRESH]) {
		struct nlattr *rta = attrs[XFRMA_SPD_IPV6_HTHRESH];

		if (nla_len(rta) < sizeof(*thresh6))
			return -EINVAL;
		thresh6 = nla_data(rta);
		if (thresh6->lbits > 128 || thresh6->rbits > 128)
			return -EINVAL;
	}

	if (thresh4 || thresh6) {
		write_seqlock(&net->xfrm.policy_hthresh.lock);
		if (thresh4) {
			net->xfrm.policy_hthresh.lbits4 = thresh4->lbits;
			net->xfrm.policy_hthresh.rbits4 = thresh4->rbits;
		}
		if (thresh6) {
			net->xfrm.policy_hthresh.lbits6 = thresh6->lbits;
			net->xfrm.policy_hthresh.rbits6 = thresh6->rbits;
		}
		write_sequnlock(&net->xfrm.policy_hthresh.lock);

		xfrm_policy_hash_rebuild(net);
	}

	return 0;
}

J
Jamal Hadi Salim 已提交
1098
static int xfrm_get_spdinfo(struct sk_buff *skb, struct nlmsghdr *nlh,
1099
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
1100
{
1101
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
1102
	struct sk_buff *r_skb;
1103
	u32 *flags = nlmsg_data(nlh);
1104
	u32 sportid = NETLINK_CB(skb).portid;
J
Jamal Hadi Salim 已提交
1105 1106
	u32 seq = nlh->nlmsg_seq;

1107
	r_skb = nlmsg_new(xfrm_spdinfo_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
1108 1109 1110
	if (r_skb == NULL)
		return -ENOMEM;

1111
	if (build_spdinfo(r_skb, net, sportid, seq, *flags) < 0)
J
Jamal Hadi Salim 已提交
1112 1113
		BUG();

1114
	return nlmsg_unicast(net->xfrm.nlsk, r_skb, sportid);
J
Jamal Hadi Salim 已提交
1115 1116
}

1117 1118 1119 1120 1121 1122 1123
static inline size_t xfrm_sadinfo_msgsize(void)
{
	return NLMSG_ALIGN(4)
	       + nla_total_size(sizeof(struct xfrmu_sadhinfo))
	       + nla_total_size(4); /* XFRMA_SAD_CNT */
}

1124
static int build_sadinfo(struct sk_buff *skb, struct net *net,
1125
			 u32 portid, u32 seq, u32 flags)
J
Jamal Hadi Salim 已提交
1126
{
1127 1128
	struct xfrmk_sadinfo si;
	struct xfrmu_sadhinfo sh;
J
Jamal Hadi Salim 已提交
1129
	struct nlmsghdr *nlh;
1130
	int err;
J
Jamal Hadi Salim 已提交
1131 1132
	u32 *f;

1133
	nlh = nlmsg_put(skb, portid, seq, XFRM_MSG_NEWSADINFO, sizeof(u32), 0);
L
Lucas De Marchi 已提交
1134
	if (nlh == NULL) /* shouldn't really happen ... */
J
Jamal Hadi Salim 已提交
1135 1136 1137 1138
		return -EMSGSIZE;

	f = nlmsg_data(nlh);
	*f = flags;
1139
	xfrm_sad_getinfo(net, &si);
J
Jamal Hadi Salim 已提交
1140

1141 1142 1143
	sh.sadhmcnt = si.sadhmcnt;
	sh.sadhcnt = si.sadhcnt;

1144 1145 1146 1147 1148 1149 1150
	err = nla_put_u32(skb, XFRMA_SAD_CNT, si.sadcnt);
	if (!err)
		err = nla_put(skb, XFRMA_SAD_HINFO, sizeof(sh), &sh);
	if (err) {
		nlmsg_cancel(skb, nlh);
		return err;
	}
J
Jamal Hadi Salim 已提交
1151

1152 1153
	nlmsg_end(skb, nlh);
	return 0;
J
Jamal Hadi Salim 已提交
1154 1155 1156
}

static int xfrm_get_sadinfo(struct sk_buff *skb, struct nlmsghdr *nlh,
1157
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
1158
{
1159
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
1160
	struct sk_buff *r_skb;
1161
	u32 *flags = nlmsg_data(nlh);
1162
	u32 sportid = NETLINK_CB(skb).portid;
J
Jamal Hadi Salim 已提交
1163 1164
	u32 seq = nlh->nlmsg_seq;

1165
	r_skb = nlmsg_new(xfrm_sadinfo_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
1166 1167 1168
	if (r_skb == NULL)
		return -ENOMEM;

1169
	if (build_sadinfo(r_skb, net, sportid, seq, *flags) < 0)
J
Jamal Hadi Salim 已提交
1170 1171
		BUG();

1172
	return nlmsg_unicast(net->xfrm.nlsk, r_skb, sportid);
J
Jamal Hadi Salim 已提交
1173 1174
}

1175
static int xfrm_get_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
1176
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1177
{
1178
	struct net *net = sock_net(skb->sk);
1179
	struct xfrm_usersa_id *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1180 1181
	struct xfrm_state *x;
	struct sk_buff *resp_skb;
1182
	int err = -ESRCH;
L
Linus Torvalds 已提交
1183

1184
	x = xfrm_user_state_lookup(net, p, attrs, &err);
L
Linus Torvalds 已提交
1185 1186 1187 1188 1189 1190 1191
	if (x == NULL)
		goto out_noput;

	resp_skb = xfrm_state_netlink(skb, x, nlh->nlmsg_seq);
	if (IS_ERR(resp_skb)) {
		err = PTR_ERR(resp_skb);
	} else {
1192
		err = nlmsg_unicast(net->xfrm.nlsk, resp_skb, NETLINK_CB(skb).portid);
L
Linus Torvalds 已提交
1193 1194 1195 1196 1197 1198
	}
	xfrm_state_put(x);
out_noput:
	return err;
}

1199
static int xfrm_alloc_userspi(struct sk_buff *skb, struct nlmsghdr *nlh,
1200
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1201
{
1202
	struct net *net = sock_net(skb->sk);
L
Linus Torvalds 已提交
1203 1204 1205 1206 1207 1208
	struct xfrm_state *x;
	struct xfrm_userspi_info *p;
	struct sk_buff *resp_skb;
	xfrm_address_t *daddr;
	int family;
	int err;
1209 1210
	u32 mark;
	struct xfrm_mark m;
L
Linus Torvalds 已提交
1211

1212
	p = nlmsg_data(nlh);
1213
	err = verify_spi_info(p->info.id.proto, p->min, p->max);
L
Linus Torvalds 已提交
1214 1215 1216 1217 1218 1219 1220
	if (err)
		goto out_noput;

	family = p->info.family;
	daddr = &p->info.id.daddr;

	x = NULL;
1221 1222

	mark = xfrm_mark_get(attrs, &m);
L
Linus Torvalds 已提交
1223
	if (p->info.seq) {
1224
		x = xfrm_find_acq_byseq(net, mark, p->info.seq);
1225
		if (x && !xfrm_addr_equal(&x->id.daddr, daddr, family)) {
L
Linus Torvalds 已提交
1226 1227 1228 1229 1230 1231
			xfrm_state_put(x);
			x = NULL;
		}
	}

	if (!x)
1232
		x = xfrm_find_acq(net, &m, p->info.mode, p->info.reqid,
L
Linus Torvalds 已提交
1233 1234 1235 1236 1237 1238 1239
				  p->info.id.proto, daddr,
				  &p->info.saddr, 1,
				  family);
	err = -ENOENT;
	if (x == NULL)
		goto out_noput;

1240 1241 1242
	err = xfrm_alloc_spi(x, p->min, p->max);
	if (err)
		goto out;
L
Linus Torvalds 已提交
1243

1244
	resp_skb = xfrm_state_netlink(skb, x, nlh->nlmsg_seq);
L
Linus Torvalds 已提交
1245 1246 1247 1248 1249
	if (IS_ERR(resp_skb)) {
		err = PTR_ERR(resp_skb);
		goto out;
	}

1250
	err = nlmsg_unicast(net->xfrm.nlsk, resp_skb, NETLINK_CB(skb).portid);
L
Linus Torvalds 已提交
1251 1252 1253 1254 1255 1256 1257

out:
	xfrm_state_put(x);
out_noput:
	return err;
}

1258
static int verify_policy_dir(u8 dir)
L
Linus Torvalds 已提交
1259 1260 1261 1262 1263 1264 1265 1266 1267
{
	switch (dir) {
	case XFRM_POLICY_IN:
	case XFRM_POLICY_OUT:
	case XFRM_POLICY_FWD:
		break;

	default:
		return -EINVAL;
1268
	}
L
Linus Torvalds 已提交
1269 1270 1271 1272

	return 0;
}

1273
static int verify_policy_type(u8 type)
1274 1275 1276 1277 1278 1279 1280 1281 1282 1283
{
	switch (type) {
	case XFRM_POLICY_TYPE_MAIN:
#ifdef CONFIG_XFRM_SUB_POLICY
	case XFRM_POLICY_TYPE_SUB:
#endif
		break;

	default:
		return -EINVAL;
1284
	}
1285 1286 1287 1288

	return 0;
}

L
Linus Torvalds 已提交
1289 1290
static int verify_newpolicy_info(struct xfrm_userpolicy_info *p)
{
1291 1292
	int ret;

L
Linus Torvalds 已提交
1293 1294 1295 1296 1297 1298 1299 1300 1301
	switch (p->share) {
	case XFRM_SHARE_ANY:
	case XFRM_SHARE_SESSION:
	case XFRM_SHARE_USER:
	case XFRM_SHARE_UNIQUE:
		break;

	default:
		return -EINVAL;
1302
	}
L
Linus Torvalds 已提交
1303 1304 1305 1306 1307 1308 1309 1310

	switch (p->action) {
	case XFRM_POLICY_ALLOW:
	case XFRM_POLICY_BLOCK:
		break;

	default:
		return -EINVAL;
1311
	}
L
Linus Torvalds 已提交
1312 1313 1314 1315 1316 1317

	switch (p->sel.family) {
	case AF_INET:
		break;

	case AF_INET6:
E
Eric Dumazet 已提交
1318
#if IS_ENABLED(CONFIG_IPV6)
L
Linus Torvalds 已提交
1319 1320 1321 1322 1323 1324 1325
		break;
#else
		return  -EAFNOSUPPORT;
#endif

	default:
		return -EINVAL;
1326
	}
L
Linus Torvalds 已提交
1327

1328 1329 1330 1331 1332 1333 1334
	ret = verify_policy_dir(p->dir);
	if (ret)
		return ret;
	if (p->index && ((p->index & XFRM_POLICY_MAX) != p->dir))
		return -EINVAL;

	return 0;
L
Linus Torvalds 已提交
1335 1336
}

1337
static int copy_from_user_sec_ctx(struct xfrm_policy *pol, struct nlattr **attrs)
1338
{
1339
	struct nlattr *rt = attrs[XFRMA_SEC_CTX];
1340 1341 1342 1343 1344
	struct xfrm_user_sec_ctx *uctx;

	if (!rt)
		return 0;

1345
	uctx = nla_data(rt);
1346
	return security_xfrm_policy_alloc(&pol->security, uctx, GFP_KERNEL);
1347 1348
}

L
Linus Torvalds 已提交
1349 1350 1351 1352 1353 1354 1355 1356 1357 1358 1359 1360 1361 1362 1363 1364 1365 1366 1367
static void copy_templates(struct xfrm_policy *xp, struct xfrm_user_tmpl *ut,
			   int nr)
{
	int i;

	xp->xfrm_nr = nr;
	for (i = 0; i < nr; i++, ut++) {
		struct xfrm_tmpl *t = &xp->xfrm_vec[i];

		memcpy(&t->id, &ut->id, sizeof(struct xfrm_id));
		memcpy(&t->saddr, &ut->saddr,
		       sizeof(xfrm_address_t));
		t->reqid = ut->reqid;
		t->mode = ut->mode;
		t->share = ut->share;
		t->optional = ut->optional;
		t->aalgos = ut->aalgos;
		t->ealgos = ut->ealgos;
		t->calgos = ut->calgos;
1368 1369
		/* If all masks are ~0, then we allow all algorithms. */
		t->allalgs = !~(t->aalgos & t->ealgos & t->calgos);
1370
		t->encap_family = ut->family;
L
Linus Torvalds 已提交
1371 1372 1373
	}
}

1374 1375 1376 1377 1378 1379 1380 1381 1382 1383 1384 1385 1386 1387 1388 1389 1390 1391 1392 1393 1394
static int validate_tmpl(int nr, struct xfrm_user_tmpl *ut, u16 family)
{
	int i;

	if (nr > XFRM_MAX_DEPTH)
		return -EINVAL;

	for (i = 0; i < nr; i++) {
		/* We never validated the ut->family value, so many
		 * applications simply leave it at zero.  The check was
		 * never made and ut->family was ignored because all
		 * templates could be assumed to have the same family as
		 * the policy itself.  Now that we will have ipv4-in-ipv6
		 * and ipv6-in-ipv4 tunnels, this is no longer true.
		 */
		if (!ut[i].family)
			ut[i].family = family;

		switch (ut[i].family) {
		case AF_INET:
			break;
E
Eric Dumazet 已提交
1395
#if IS_ENABLED(CONFIG_IPV6)
1396 1397 1398 1399 1400
		case AF_INET6:
			break;
#endif
		default:
			return -EINVAL;
1401
		}
1402 1403 1404 1405 1406
	}

	return 0;
}

1407
static int copy_from_user_tmpl(struct xfrm_policy *pol, struct nlattr **attrs)
L
Linus Torvalds 已提交
1408
{
1409
	struct nlattr *rt = attrs[XFRMA_TMPL];
L
Linus Torvalds 已提交
1410 1411 1412 1413

	if (!rt) {
		pol->xfrm_nr = 0;
	} else {
1414 1415
		struct xfrm_user_tmpl *utmpl = nla_data(rt);
		int nr = nla_len(rt) / sizeof(*utmpl);
1416
		int err;
L
Linus Torvalds 已提交
1417

1418 1419 1420
		err = validate_tmpl(nr, utmpl, pol->family);
		if (err)
			return err;
L
Linus Torvalds 已提交
1421

1422
		copy_templates(pol, utmpl, nr);
L
Linus Torvalds 已提交
1423 1424 1425 1426
	}
	return 0;
}

1427
static int copy_from_user_policy_type(u8 *tp, struct nlattr **attrs)
1428
{
1429
	struct nlattr *rt = attrs[XFRMA_POLICY_TYPE];
1430
	struct xfrm_userpolicy_type *upt;
1431
	u8 type = XFRM_POLICY_TYPE_MAIN;
1432 1433 1434
	int err;

	if (rt) {
1435
		upt = nla_data(rt);
1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446
		type = upt->type;
	}

	err = verify_policy_type(type);
	if (err)
		return err;

	*tp = type;
	return 0;
}

L
Linus Torvalds 已提交
1447 1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460
static void copy_from_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p)
{
	xp->priority = p->priority;
	xp->index = p->index;
	memcpy(&xp->selector, &p->sel, sizeof(xp->selector));
	memcpy(&xp->lft, &p->lft, sizeof(xp->lft));
	xp->action = p->action;
	xp->flags = p->flags;
	xp->family = p->sel.family;
	/* XXX xp->share = p->share; */
}

static void copy_to_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p, int dir)
{
1461
	memset(p, 0, sizeof(*p));
L
Linus Torvalds 已提交
1462 1463 1464 1465 1466 1467 1468 1469 1470 1471 1472 1473
	memcpy(&p->sel, &xp->selector, sizeof(p->sel));
	memcpy(&p->lft, &xp->lft, sizeof(p->lft));
	memcpy(&p->curlft, &xp->curlft, sizeof(p->curlft));
	p->priority = xp->priority;
	p->index = xp->index;
	p->sel.family = xp->family;
	p->dir = dir;
	p->action = xp->action;
	p->flags = xp->flags;
	p->share = XFRM_SHARE_ANY; /* XXX xp->share */
}

1474
static struct xfrm_policy *xfrm_policy_construct(struct net *net, struct xfrm_userpolicy_info *p, struct nlattr **attrs, int *errp)
L
Linus Torvalds 已提交
1475
{
1476
	struct xfrm_policy *xp = xfrm_policy_alloc(net, GFP_KERNEL);
L
Linus Torvalds 已提交
1477 1478 1479 1480 1481 1482 1483 1484
	int err;

	if (!xp) {
		*errp = -ENOMEM;
		return NULL;
	}

	copy_from_user_policy(xp, p);
1485

1486
	err = copy_from_user_policy_type(&xp->type, attrs);
1487 1488 1489
	if (err)
		goto error;

1490 1491
	if (!(err = copy_from_user_tmpl(xp, attrs)))
		err = copy_from_user_sec_ctx(xp, attrs);
1492 1493
	if (err)
		goto error;
L
Linus Torvalds 已提交
1494

1495 1496
	xfrm_mark_get(attrs, &xp->mark);

L
Linus Torvalds 已提交
1497
	return xp;
1498 1499
 error:
	*errp = err;
H
Herbert Xu 已提交
1500
	xp->walk.dead = 1;
1501
	xfrm_policy_destroy(xp);
1502
	return NULL;
L
Linus Torvalds 已提交
1503 1504
}

1505
static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1506
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1507
{
1508
	struct net *net = sock_net(skb->sk);
1509
	struct xfrm_userpolicy_info *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1510
	struct xfrm_policy *xp;
1511
	struct km_event c;
L
Linus Torvalds 已提交
1512 1513 1514 1515
	int err;
	int excl;

	err = verify_newpolicy_info(p);
1516 1517
	if (err)
		return err;
1518
	err = verify_sec_ctx_len(attrs);
L
Linus Torvalds 已提交
1519 1520 1521
	if (err)
		return err;

1522
	xp = xfrm_policy_construct(net, p, attrs, &err);
L
Linus Torvalds 已提交
1523 1524 1525
	if (!xp)
		return err;

L
Lucas De Marchi 已提交
1526
	/* shouldn't excl be based on nlh flags??
1527 1528 1529
	 * Aha! this is anti-netlink really i.e  more pfkey derived
	 * in netlink excl is a flag and you wouldnt need
	 * a type XFRM_MSG_UPDPOLICY - JHS */
L
Linus Torvalds 已提交
1530 1531
	excl = nlh->nlmsg_type == XFRM_MSG_NEWPOLICY;
	err = xfrm_policy_insert(p->dir, xp, excl);
1532
	xfrm_audit_policy_add(xp, err ? 0 : 1, true);
J
Joy Latten 已提交
1533

L
Linus Torvalds 已提交
1534
	if (err) {
1535
		security_xfrm_policy_free(xp->security);
L
Linus Torvalds 已提交
1536 1537 1538 1539
		kfree(xp);
		return err;
	}

1540
	c.event = nlh->nlmsg_type;
1541
	c.seq = nlh->nlmsg_seq;
1542
	c.portid = nlh->nlmsg_pid;
1543 1544
	km_policy_notify(xp, p->dir, &c);

L
Linus Torvalds 已提交
1545 1546 1547 1548 1549 1550 1551 1552 1553 1554 1555 1556 1557 1558 1559 1560 1561
	xfrm_pol_put(xp);

	return 0;
}

static int copy_to_user_tmpl(struct xfrm_policy *xp, struct sk_buff *skb)
{
	struct xfrm_user_tmpl vec[XFRM_MAX_DEPTH];
	int i;

	if (xp->xfrm_nr == 0)
		return 0;

	for (i = 0; i < xp->xfrm_nr; i++) {
		struct xfrm_user_tmpl *up = &vec[i];
		struct xfrm_tmpl *kp = &xp->xfrm_vec[i];

1562
		memset(up, 0, sizeof(*up));
L
Linus Torvalds 已提交
1563
		memcpy(&up->id, &kp->id, sizeof(up->id));
1564
		up->family = kp->encap_family;
L
Linus Torvalds 已提交
1565 1566 1567 1568 1569 1570 1571 1572 1573
		memcpy(&up->saddr, &kp->saddr, sizeof(up->saddr));
		up->reqid = kp->reqid;
		up->mode = kp->mode;
		up->share = kp->share;
		up->optional = kp->optional;
		up->aalgos = kp->aalgos;
		up->ealgos = kp->ealgos;
		up->calgos = kp->calgos;
	}
1574

1575 1576
	return nla_put(skb, XFRMA_TMPL,
		       sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr, vec);
1577 1578 1579 1580 1581 1582
}

static inline int copy_to_user_state_sec_ctx(struct xfrm_state *x, struct sk_buff *skb)
{
	if (x->security) {
		return copy_sec_ctx(x->security, skb);
1583 1584
	}
	return 0;
1585
}
1586

1587 1588
static inline int copy_to_user_sec_ctx(struct xfrm_policy *xp, struct sk_buff *skb)
{
1589
	if (xp->security)
1590 1591
		return copy_sec_ctx(xp->security, skb);
	return 0;
1592
}
1593 1594 1595 1596 1597 1598 1599 1600
static inline size_t userpolicy_type_attrsize(void)
{
#ifdef CONFIG_XFRM_SUB_POLICY
	return nla_total_size(sizeof(struct xfrm_userpolicy_type));
#else
	return 0;
#endif
}
1601

1602
#ifdef CONFIG_XFRM_SUB_POLICY
1603
static int copy_to_user_policy_type(u8 type, struct sk_buff *skb)
1604
{
1605 1606 1607
	struct xfrm_userpolicy_type upt = {
		.type = type,
	};
1608

1609
	return nla_put(skb, XFRMA_POLICY_TYPE, sizeof(upt), &upt);
1610 1611 1612
}

#else
1613
static inline int copy_to_user_policy_type(u8 type, struct sk_buff *skb)
1614 1615 1616 1617 1618
{
	return 0;
}
#endif

L
Linus Torvalds 已提交
1619 1620 1621 1622 1623 1624 1625
static int dump_one_policy(struct xfrm_policy *xp, int dir, int count, void *ptr)
{
	struct xfrm_dump_info *sp = ptr;
	struct xfrm_userpolicy_info *p;
	struct sk_buff *in_skb = sp->in_skb;
	struct sk_buff *skb = sp->out_skb;
	struct nlmsghdr *nlh;
1626
	int err;
L
Linus Torvalds 已提交
1627

1628
	nlh = nlmsg_put(skb, NETLINK_CB(in_skb).portid, sp->nlmsg_seq,
1629 1630 1631
			XFRM_MSG_NEWPOLICY, sizeof(*p), sp->nlmsg_flags);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
1632

1633
	p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1634
	copy_to_user_policy(xp, p, dir);
1635 1636 1637 1638 1639 1640 1641 1642 1643 1644 1645
	err = copy_to_user_tmpl(xp, skb);
	if (!err)
		err = copy_to_user_sec_ctx(xp, skb);
	if (!err)
		err = copy_to_user_policy_type(xp->type, skb);
	if (!err)
		err = xfrm_mark_put(skb, &xp->mark);
	if (err) {
		nlmsg_cancel(skb, nlh);
		return err;
	}
1646
	nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
1647 1648 1649
	return 0;
}

1650 1651 1652
static int xfrm_dump_policy_done(struct netlink_callback *cb)
{
	struct xfrm_policy_walk *walk = (struct xfrm_policy_walk *) &cb->args[1];
F
Fan Du 已提交
1653
	struct net *net = sock_net(cb->skb->sk);
1654

F
Fan Du 已提交
1655
	xfrm_policy_walk_done(walk, net);
1656 1657 1658
	return 0;
}

L
Linus Torvalds 已提交
1659 1660
static int xfrm_dump_policy(struct sk_buff *skb, struct netlink_callback *cb)
{
1661
	struct net *net = sock_net(skb->sk);
1662
	struct xfrm_policy_walk *walk = (struct xfrm_policy_walk *) &cb->args[1];
L
Linus Torvalds 已提交
1663 1664
	struct xfrm_dump_info info;

1665 1666 1667
	BUILD_BUG_ON(sizeof(struct xfrm_policy_walk) >
		     sizeof(cb->args) - sizeof(cb->args[0]));

L
Linus Torvalds 已提交
1668 1669 1670 1671
	info.in_skb = cb->skb;
	info.out_skb = skb;
	info.nlmsg_seq = cb->nlh->nlmsg_seq;
	info.nlmsg_flags = NLM_F_MULTI;
1672 1673 1674 1675 1676 1677

	if (!cb->args[0]) {
		cb->args[0] = 1;
		xfrm_policy_walk_init(walk, XFRM_POLICY_TYPE_ANY);
	}

1678
	(void) xfrm_policy_walk(net, walk, dump_one_policy, &info);
L
Linus Torvalds 已提交
1679 1680 1681 1682 1683 1684 1685 1686 1687 1688

	return skb->len;
}

static struct sk_buff *xfrm_policy_netlink(struct sk_buff *in_skb,
					  struct xfrm_policy *xp,
					  int dir, u32 seq)
{
	struct xfrm_dump_info info;
	struct sk_buff *skb;
1689
	int err;
L
Linus Torvalds 已提交
1690

1691
	skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
L
Linus Torvalds 已提交
1692 1693 1694 1695 1696 1697 1698 1699
	if (!skb)
		return ERR_PTR(-ENOMEM);

	info.in_skb = in_skb;
	info.out_skb = skb;
	info.nlmsg_seq = seq;
	info.nlmsg_flags = 0;

1700 1701
	err = dump_one_policy(xp, dir, 0, &info);
	if (err) {
L
Linus Torvalds 已提交
1702
		kfree_skb(skb);
1703
		return ERR_PTR(err);
L
Linus Torvalds 已提交
1704 1705 1706 1707 1708
	}

	return skb;
}

1709
static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1710
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1711
{
1712
	struct net *net = sock_net(skb->sk);
L
Linus Torvalds 已提交
1713 1714
	struct xfrm_policy *xp;
	struct xfrm_userpolicy_id *p;
1715
	u8 type = XFRM_POLICY_TYPE_MAIN;
L
Linus Torvalds 已提交
1716
	int err;
1717
	struct km_event c;
L
Linus Torvalds 已提交
1718
	int delete;
1719 1720
	struct xfrm_mark m;
	u32 mark = xfrm_mark_get(attrs, &m);
L
Linus Torvalds 已提交
1721

1722
	p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1723 1724
	delete = nlh->nlmsg_type == XFRM_MSG_DELPOLICY;

1725
	err = copy_from_user_policy_type(&type, attrs);
1726 1727 1728
	if (err)
		return err;

L
Linus Torvalds 已提交
1729 1730 1731 1732 1733
	err = verify_policy_dir(p->dir);
	if (err)
		return err;

	if (p->index)
1734
		xp = xfrm_policy_byid(net, mark, type, p->dir, p->index, delete, &err);
1735
	else {
1736
		struct nlattr *rt = attrs[XFRMA_SEC_CTX];
1737
		struct xfrm_sec_ctx *ctx;
1738

1739
		err = verify_sec_ctx_len(attrs);
1740 1741 1742
		if (err)
			return err;

1743
		ctx = NULL;
1744
		if (rt) {
1745
			struct xfrm_user_sec_ctx *uctx = nla_data(rt);
1746

1747
			err = security_xfrm_policy_alloc(&ctx, uctx, GFP_KERNEL);
1748
			if (err)
1749
				return err;
1750
		}
1751
		xp = xfrm_policy_bysel_ctx(net, mark, type, p->dir, &p->sel,
1752
					   ctx, delete, &err);
1753
		security_xfrm_policy_free(ctx);
1754
	}
L
Linus Torvalds 已提交
1755 1756 1757 1758 1759 1760 1761 1762 1763 1764
	if (xp == NULL)
		return -ENOENT;

	if (!delete) {
		struct sk_buff *resp_skb;

		resp_skb = xfrm_policy_netlink(skb, xp, p->dir, nlh->nlmsg_seq);
		if (IS_ERR(resp_skb)) {
			err = PTR_ERR(resp_skb);
		} else {
1765
			err = nlmsg_unicast(net->xfrm.nlsk, resp_skb,
1766
					    NETLINK_CB(skb).portid);
L
Linus Torvalds 已提交
1767
		}
1768
	} else {
1769
		xfrm_audit_policy_delete(xp, err ? 0 : 1, true);
1770 1771

		if (err != 0)
C
Catherine Zhang 已提交
1772
			goto out;
1773

1774
		c.data.byid = p->index;
1775
		c.event = nlh->nlmsg_type;
1776
		c.seq = nlh->nlmsg_seq;
1777
		c.portid = nlh->nlmsg_pid;
1778
		km_policy_notify(xp, p->dir, &c);
L
Linus Torvalds 已提交
1779 1780
	}

C
Catherine Zhang 已提交
1781
out:
1782
	xfrm_pol_put(xp);
1783 1784
	if (delete && err == 0)
		xfrm_garbage_collect(net);
L
Linus Torvalds 已提交
1785 1786 1787
	return err;
}

1788
static int xfrm_flush_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
1789
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1790
{
1791
	struct net *net = sock_net(skb->sk);
1792
	struct km_event c;
1793
	struct xfrm_usersa_flush *p = nlmsg_data(nlh);
1794
	int err;
L
Linus Torvalds 已提交
1795

1796
	err = xfrm_state_flush(net, p->proto, true);
1797 1798 1799
	if (err) {
		if (err == -ESRCH) /* empty table */
			return 0;
1800
		return err;
1801
	}
1802
	c.data.proto = p->proto;
1803
	c.event = nlh->nlmsg_type;
1804
	c.seq = nlh->nlmsg_seq;
1805
	c.portid = nlh->nlmsg_pid;
1806
	c.net = net;
1807 1808
	km_state_notify(NULL, &c);

L
Linus Torvalds 已提交
1809 1810 1811
	return 0;
}

1812
static inline size_t xfrm_aevent_msgsize(struct xfrm_state *x)
1813
{
1814 1815 1816 1817
	size_t replay_size = x->replay_esn ?
			      xfrm_replay_state_esn_len(x->replay_esn) :
			      sizeof(struct xfrm_replay_state);

1818
	return NLMSG_ALIGN(sizeof(struct xfrm_aevent_id))
1819
	       + nla_total_size(replay_size)
1820
	       + nla_total_size_64bit(sizeof(struct xfrm_lifetime_cur))
1821
	       + nla_total_size(sizeof(struct xfrm_mark))
1822 1823 1824
	       + nla_total_size(4) /* XFRM_AE_RTHR */
	       + nla_total_size(4); /* XFRM_AE_ETHR */
}
J
Jamal Hadi Salim 已提交
1825

1826
static int build_aevent(struct sk_buff *skb, struct xfrm_state *x, const struct km_event *c)
J
Jamal Hadi Salim 已提交
1827 1828 1829
{
	struct xfrm_aevent_id *id;
	struct nlmsghdr *nlh;
1830
	int err;
J
Jamal Hadi Salim 已提交
1831

1832
	nlh = nlmsg_put(skb, c->portid, c->seq, XFRM_MSG_NEWAE, sizeof(*id), 0);
1833 1834
	if (nlh == NULL)
		return -EMSGSIZE;
J
Jamal Hadi Salim 已提交
1835

1836
	id = nlmsg_data(nlh);
1837
	memcpy(&id->sa_id.daddr, &x->id.daddr, sizeof(x->id.daddr));
J
Jamal Hadi Salim 已提交
1838 1839 1840
	id->sa_id.spi = x->id.spi;
	id->sa_id.family = x->props.family;
	id->sa_id.proto = x->id.proto;
1841
	memcpy(&id->saddr, &x->props.saddr, sizeof(x->props.saddr));
1842
	id->reqid = x->props.reqid;
J
Jamal Hadi Salim 已提交
1843 1844
	id->flags = c->data.aevent;

1845
	if (x->replay_esn) {
1846 1847 1848
		err = nla_put(skb, XFRMA_REPLAY_ESN_VAL,
			      xfrm_replay_state_esn_len(x->replay_esn),
			      x->replay_esn);
1849
	} else {
1850 1851
		err = nla_put(skb, XFRMA_REPLAY_VAL, sizeof(x->replay),
			      &x->replay);
1852
	}
1853 1854
	if (err)
		goto out_cancel;
1855 1856
	err = nla_put_64bit(skb, XFRMA_LTIME_VAL, sizeof(x->curlft), &x->curlft,
			    XFRMA_PAD);
1857 1858
	if (err)
		goto out_cancel;
J
Jamal Hadi Salim 已提交
1859

1860 1861 1862 1863 1864 1865 1866 1867 1868 1869 1870 1871 1872 1873
	if (id->flags & XFRM_AE_RTHR) {
		err = nla_put_u32(skb, XFRMA_REPLAY_THRESH, x->replay_maxdiff);
		if (err)
			goto out_cancel;
	}
	if (id->flags & XFRM_AE_ETHR) {
		err = nla_put_u32(skb, XFRMA_ETIMER_THRESH,
				  x->replay_maxage * 10 / HZ);
		if (err)
			goto out_cancel;
	}
	err = xfrm_mark_put(skb, &x->mark);
	if (err)
		goto out_cancel;
1874

1875 1876
	nlmsg_end(skb, nlh);
	return 0;
J
Jamal Hadi Salim 已提交
1877

1878
out_cancel:
1879
	nlmsg_cancel(skb, nlh);
1880
	return err;
J
Jamal Hadi Salim 已提交
1881 1882
}

1883
static int xfrm_get_ae(struct sk_buff *skb, struct nlmsghdr *nlh,
1884
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
1885
{
1886
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
1887 1888 1889 1890
	struct xfrm_state *x;
	struct sk_buff *r_skb;
	int err;
	struct km_event c;
1891 1892
	u32 mark;
	struct xfrm_mark m;
1893
	struct xfrm_aevent_id *p = nlmsg_data(nlh);
J
Jamal Hadi Salim 已提交
1894 1895
	struct xfrm_usersa_id *id = &p->sa_id;

1896 1897 1898
	mark = xfrm_mark_get(attrs, &m);

	x = xfrm_state_lookup(net, mark, &id->daddr, id->spi, id->proto, id->family);
1899
	if (x == NULL)
J
Jamal Hadi Salim 已提交
1900
		return -ESRCH;
1901 1902 1903 1904 1905

	r_skb = nlmsg_new(xfrm_aevent_msgsize(x), GFP_ATOMIC);
	if (r_skb == NULL) {
		xfrm_state_put(x);
		return -ENOMEM;
J
Jamal Hadi Salim 已提交
1906 1907 1908 1909 1910 1911 1912 1913 1914 1915
	}

	/*
	 * XXX: is this lock really needed - none of the other
	 * gets lock (the concern is things getting updated
	 * while we are still reading) - jhs
	*/
	spin_lock_bh(&x->lock);
	c.data.aevent = p->flags;
	c.seq = nlh->nlmsg_seq;
1916
	c.portid = nlh->nlmsg_pid;
J
Jamal Hadi Salim 已提交
1917 1918 1919

	if (build_aevent(r_skb, x, &c) < 0)
		BUG();
1920
	err = nlmsg_unicast(net->xfrm.nlsk, r_skb, NETLINK_CB(skb).portid);
J
Jamal Hadi Salim 已提交
1921 1922 1923 1924 1925
	spin_unlock_bh(&x->lock);
	xfrm_state_put(x);
	return err;
}

1926
static int xfrm_new_ae(struct sk_buff *skb, struct nlmsghdr *nlh,
1927
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
1928
{
1929
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
1930 1931
	struct xfrm_state *x;
	struct km_event c;
1932
	int err = -EINVAL;
1933 1934
	u32 mark = 0;
	struct xfrm_mark m;
1935
	struct xfrm_aevent_id *p = nlmsg_data(nlh);
1936
	struct nlattr *rp = attrs[XFRMA_REPLAY_VAL];
1937
	struct nlattr *re = attrs[XFRMA_REPLAY_ESN_VAL];
1938
	struct nlattr *lt = attrs[XFRMA_LTIME_VAL];
1939 1940
	struct nlattr *et = attrs[XFRMA_ETIMER_THRESH];
	struct nlattr *rt = attrs[XFRMA_REPLAY_THRESH];
J
Jamal Hadi Salim 已提交
1941

1942
	if (!lt && !rp && !re && !et && !rt)
J
Jamal Hadi Salim 已提交
1943 1944 1945 1946 1947 1948
		return err;

	/* pedantic mode - thou shalt sayeth replaceth */
	if (!(nlh->nlmsg_flags&NLM_F_REPLACE))
		return err;

1949 1950 1951
	mark = xfrm_mark_get(attrs, &m);

	x = xfrm_state_lookup(net, mark, &p->sa_id.daddr, p->sa_id.spi, p->sa_id.proto, p->sa_id.family);
J
Jamal Hadi Salim 已提交
1952 1953 1954 1955 1956 1957
	if (x == NULL)
		return -ESRCH;

	if (x->km.state != XFRM_STATE_VALID)
		goto out;

1958
	err = xfrm_replay_verify_len(x->replay_esn, re);
1959 1960 1961
	if (err)
		goto out;

J
Jamal Hadi Salim 已提交
1962
	spin_lock_bh(&x->lock);
1963
	xfrm_update_ae_params(x, attrs, 1);
J
Jamal Hadi Salim 已提交
1964 1965 1966 1967
	spin_unlock_bh(&x->lock);

	c.event = nlh->nlmsg_type;
	c.seq = nlh->nlmsg_seq;
1968
	c.portid = nlh->nlmsg_pid;
J
Jamal Hadi Salim 已提交
1969 1970 1971 1972 1973 1974 1975 1976
	c.data.aevent = XFRM_AE_CU;
	km_state_notify(x, &c);
	err = 0;
out:
	xfrm_state_put(x);
	return err;
}

1977
static int xfrm_flush_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1978
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1979
{
1980
	struct net *net = sock_net(skb->sk);
1981
	struct km_event c;
1982
	u8 type = XFRM_POLICY_TYPE_MAIN;
1983 1984
	int err;

1985
	err = copy_from_user_policy_type(&type, attrs);
1986 1987
	if (err)
		return err;
1988

1989
	err = xfrm_policy_flush(net, type, true);
1990 1991 1992
	if (err) {
		if (err == -ESRCH) /* empty table */
			return 0;
1993
		return err;
1994 1995
	}

1996
	c.data.type = type;
1997
	c.event = nlh->nlmsg_type;
1998
	c.seq = nlh->nlmsg_seq;
1999
	c.portid = nlh->nlmsg_pid;
2000
	c.net = net;
2001
	km_policy_notify(NULL, 0, &c);
L
Linus Torvalds 已提交
2002 2003 2004
	return 0;
}

2005
static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
2006
		struct nlattr **attrs)
2007
{
2008
	struct net *net = sock_net(skb->sk);
2009
	struct xfrm_policy *xp;
2010
	struct xfrm_user_polexpire *up = nlmsg_data(nlh);
2011
	struct xfrm_userpolicy_info *p = &up->pol;
2012
	u8 type = XFRM_POLICY_TYPE_MAIN;
2013
	int err = -ENOENT;
2014 2015
	struct xfrm_mark m;
	u32 mark = xfrm_mark_get(attrs, &m);
2016

2017
	err = copy_from_user_policy_type(&type, attrs);
2018 2019 2020
	if (err)
		return err;

2021 2022 2023 2024
	err = verify_policy_dir(p->dir);
	if (err)
		return err;

2025
	if (p->index)
2026
		xp = xfrm_policy_byid(net, mark, type, p->dir, p->index, 0, &err);
2027
	else {
2028
		struct nlattr *rt = attrs[XFRMA_SEC_CTX];
2029
		struct xfrm_sec_ctx *ctx;
2030

2031
		err = verify_sec_ctx_len(attrs);
2032 2033 2034
		if (err)
			return err;

2035
		ctx = NULL;
2036
		if (rt) {
2037
			struct xfrm_user_sec_ctx *uctx = nla_data(rt);
2038

2039
			err = security_xfrm_policy_alloc(&ctx, uctx, GFP_KERNEL);
2040
			if (err)
2041
				return err;
2042
		}
2043
		xp = xfrm_policy_bysel_ctx(net, mark, type, p->dir,
2044
					   &p->sel, ctx, 0, &err);
2045
		security_xfrm_policy_free(ctx);
2046 2047
	}
	if (xp == NULL)
2048
		return -ENOENT;
2049

2050
	if (unlikely(xp->walk.dead))
2051 2052 2053 2054 2055
		goto out;

	err = 0;
	if (up->hard) {
		xfrm_policy_delete(xp, p->dir);
2056
		xfrm_audit_policy_delete(xp, 1, true);
2057
	}
2058
	km_policy_expired(xp, p->dir, up->hard, nlh->nlmsg_pid);
2059 2060 2061 2062 2063 2064

out:
	xfrm_pol_put(xp);
	return err;
}

2065
static int xfrm_add_sa_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
2066
		struct nlattr **attrs)
2067
{
2068
	struct net *net = sock_net(skb->sk);
2069 2070
	struct xfrm_state *x;
	int err;
2071
	struct xfrm_user_expire *ue = nlmsg_data(nlh);
2072
	struct xfrm_usersa_info *p = &ue->state;
2073
	struct xfrm_mark m;
2074
	u32 mark = xfrm_mark_get(attrs, &m);
2075

2076
	x = xfrm_state_lookup(net, mark, &p->id.daddr, p->id.spi, p->id.proto, p->family);
2077

2078
	err = -ENOENT;
2079 2080 2081 2082
	if (x == NULL)
		return err;

	spin_lock_bh(&x->lock);
2083
	err = -EINVAL;
2084 2085
	if (x->km.state != XFRM_STATE_VALID)
		goto out;
2086
	km_state_expired(x, ue->hard, nlh->nlmsg_pid);
2087

J
Joy Latten 已提交
2088
	if (ue->hard) {
2089
		__xfrm_state_delete(x);
2090
		xfrm_audit_state_delete(x, 1, true);
J
Joy Latten 已提交
2091
	}
2092
	err = 0;
2093 2094 2095 2096 2097 2098
out:
	spin_unlock_bh(&x->lock);
	xfrm_state_put(x);
	return err;
}

2099
static int xfrm_add_acquire(struct sk_buff *skb, struct nlmsghdr *nlh,
2100
		struct nlattr **attrs)
2101
{
2102
	struct net *net = sock_net(skb->sk);
2103 2104 2105
	struct xfrm_policy *xp;
	struct xfrm_user_tmpl *ut;
	int i;
2106
	struct nlattr *rt = attrs[XFRMA_TMPL];
2107
	struct xfrm_mark mark;
2108

2109
	struct xfrm_user_acquire *ua = nlmsg_data(nlh);
2110
	struct xfrm_state *x = xfrm_state_alloc(net);
2111 2112 2113
	int err = -ENOMEM;

	if (!x)
I
Ilpo Järvinen 已提交
2114
		goto nomem;
2115

2116 2117
	xfrm_mark_get(attrs, &mark);

2118
	err = verify_newpolicy_info(&ua->policy);
I
Ilpo Järvinen 已提交
2119
	if (err)
V
Vegard Nossum 已提交
2120
		goto free_state;
2121 2122

	/*   build an XP */
2123
	xp = xfrm_policy_construct(net, &ua->policy, attrs, &err);
I
Ilpo Järvinen 已提交
2124 2125
	if (!xp)
		goto free_state;
2126 2127 2128 2129

	memcpy(&x->id, &ua->id, sizeof(ua->id));
	memcpy(&x->props.saddr, &ua->saddr, sizeof(ua->saddr));
	memcpy(&x->sel, &ua->sel, sizeof(ua->sel));
2130 2131
	xp->mark.m = x->mark.m = mark.m;
	xp->mark.v = x->mark.v = mark.v;
2132
	ut = nla_data(rt);
2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143 2144 2145 2146 2147 2148 2149 2150
	/* extract the templates and for each call km_key */
	for (i = 0; i < xp->xfrm_nr; i++, ut++) {
		struct xfrm_tmpl *t = &xp->xfrm_vec[i];
		memcpy(&x->id, &t->id, sizeof(x->id));
		x->props.mode = t->mode;
		x->props.reqid = t->reqid;
		x->props.family = ut->family;
		t->aalgos = ua->aalgos;
		t->ealgos = ua->ealgos;
		t->calgos = ua->calgos;
		err = km_query(x, t, xp);

	}

	kfree(x);
	kfree(xp);

	return 0;
I
Ilpo Järvinen 已提交
2151 2152 2153 2154 2155

free_state:
	kfree(x);
nomem:
	return err;
2156 2157
}

2158 2159
#ifdef CONFIG_XFRM_MIGRATE
static int copy_from_user_migrate(struct xfrm_migrate *ma,
2160
				  struct xfrm_kmaddress *k,
2161
				  struct nlattr **attrs, int *num)
2162
{
2163
	struct nlattr *rt = attrs[XFRMA_MIGRATE];
2164 2165 2166
	struct xfrm_user_migrate *um;
	int i, num_migrate;

2167 2168 2169 2170 2171 2172 2173 2174 2175 2176
	if (k != NULL) {
		struct xfrm_user_kmaddress *uk;

		uk = nla_data(attrs[XFRMA_KMADDRESS]);
		memcpy(&k->local, &uk->local, sizeof(k->local));
		memcpy(&k->remote, &uk->remote, sizeof(k->remote));
		k->family = uk->family;
		k->reserved = uk->reserved;
	}

2177 2178
	um = nla_data(rt);
	num_migrate = nla_len(rt) / sizeof(*um);
2179 2180 2181 2182 2183 2184 2185 2186 2187 2188 2189 2190 2191 2192 2193 2194 2195 2196 2197 2198 2199 2200 2201

	if (num_migrate <= 0 || num_migrate > XFRM_MAX_DEPTH)
		return -EINVAL;

	for (i = 0; i < num_migrate; i++, um++, ma++) {
		memcpy(&ma->old_daddr, &um->old_daddr, sizeof(ma->old_daddr));
		memcpy(&ma->old_saddr, &um->old_saddr, sizeof(ma->old_saddr));
		memcpy(&ma->new_daddr, &um->new_daddr, sizeof(ma->new_daddr));
		memcpy(&ma->new_saddr, &um->new_saddr, sizeof(ma->new_saddr));

		ma->proto = um->proto;
		ma->mode = um->mode;
		ma->reqid = um->reqid;

		ma->old_family = um->old_family;
		ma->new_family = um->new_family;
	}

	*num = i;
	return 0;
}

static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh,
2202
			   struct nlattr **attrs)
2203
{
2204
	struct xfrm_userpolicy_id *pi = nlmsg_data(nlh);
2205
	struct xfrm_migrate m[XFRM_MAX_DEPTH];
2206
	struct xfrm_kmaddress km, *kmp;
2207 2208 2209
	u8 type;
	int err;
	int n = 0;
2210
	struct net *net = sock_net(skb->sk);
2211

2212
	if (attrs[XFRMA_MIGRATE] == NULL)
2213
		return -EINVAL;
2214

2215 2216
	kmp = attrs[XFRMA_KMADDRESS] ? &km : NULL;

2217
	err = copy_from_user_policy_type(&type, attrs);
2218 2219 2220
	if (err)
		return err;

2221
	err = copy_from_user_migrate((struct xfrm_migrate *)m, kmp, attrs, &n);
2222 2223 2224 2225 2226 2227
	if (err)
		return err;

	if (!n)
		return 0;

2228
	xfrm_migrate(&pi->sel, pi->dir, type, m, n, kmp, net);
2229 2230 2231 2232 2233

	return 0;
}
#else
static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh,
2234
			   struct nlattr **attrs)
2235 2236 2237 2238 2239 2240
{
	return -ENOPROTOOPT;
}
#endif

#ifdef CONFIG_XFRM_MIGRATE
2241
static int copy_to_user_migrate(const struct xfrm_migrate *m, struct sk_buff *skb)
2242 2243 2244 2245 2246 2247 2248 2249 2250 2251 2252 2253 2254 2255
{
	struct xfrm_user_migrate um;

	memset(&um, 0, sizeof(um));
	um.proto = m->proto;
	um.mode = m->mode;
	um.reqid = m->reqid;
	um.old_family = m->old_family;
	memcpy(&um.old_daddr, &m->old_daddr, sizeof(um.old_daddr));
	memcpy(&um.old_saddr, &m->old_saddr, sizeof(um.old_saddr));
	um.new_family = m->new_family;
	memcpy(&um.new_daddr, &m->new_daddr, sizeof(um.new_daddr));
	memcpy(&um.new_saddr, &m->new_saddr, sizeof(um.new_saddr));

2256
	return nla_put(skb, XFRMA_MIGRATE, sizeof(um), &um);
2257 2258
}

2259
static int copy_to_user_kmaddress(const struct xfrm_kmaddress *k, struct sk_buff *skb)
2260 2261 2262 2263 2264 2265 2266
{
	struct xfrm_user_kmaddress uk;

	memset(&uk, 0, sizeof(uk));
	uk.family = k->family;
	uk.reserved = k->reserved;
	memcpy(&uk.local, &k->local, sizeof(uk.local));
2267
	memcpy(&uk.remote, &k->remote, sizeof(uk.remote));
2268 2269 2270 2271 2272

	return nla_put(skb, XFRMA_KMADDRESS, sizeof(uk), &uk);
}

static inline size_t xfrm_migrate_msgsize(int num_migrate, int with_kma)
2273 2274
{
	return NLMSG_ALIGN(sizeof(struct xfrm_userpolicy_id))
2275 2276 2277
	      + (with_kma ? nla_total_size(sizeof(struct xfrm_kmaddress)) : 0)
	      + nla_total_size(sizeof(struct xfrm_user_migrate) * num_migrate)
	      + userpolicy_type_attrsize();
2278 2279
}

2280 2281 2282
static int build_migrate(struct sk_buff *skb, const struct xfrm_migrate *m,
			 int num_migrate, const struct xfrm_kmaddress *k,
			 const struct xfrm_selector *sel, u8 dir, u8 type)
2283
{
2284
	const struct xfrm_migrate *mp;
2285 2286
	struct xfrm_userpolicy_id *pol_id;
	struct nlmsghdr *nlh;
2287
	int i, err;
2288

2289 2290 2291
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_MIGRATE, sizeof(*pol_id), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
2292

2293
	pol_id = nlmsg_data(nlh);
2294 2295 2296 2297 2298
	/* copy data from selector, dir, and type to the pol_id */
	memset(pol_id, 0, sizeof(*pol_id));
	memcpy(&pol_id->sel, sel, sizeof(pol_id->sel));
	pol_id->dir = dir;

2299 2300 2301 2302 2303 2304 2305 2306
	if (k != NULL) {
		err = copy_to_user_kmaddress(k, skb);
		if (err)
			goto out_cancel;
	}
	err = copy_to_user_policy_type(type, skb);
	if (err)
		goto out_cancel;
2307
	for (i = 0, mp = m ; i < num_migrate; i++, mp++) {
2308 2309 2310
		err = copy_to_user_migrate(mp, skb);
		if (err)
			goto out_cancel;
2311 2312
	}

2313 2314
	nlmsg_end(skb, nlh);
	return 0;
2315 2316

out_cancel:
2317
	nlmsg_cancel(skb, nlh);
2318
	return err;
2319 2320
}

2321 2322 2323
static int xfrm_send_migrate(const struct xfrm_selector *sel, u8 dir, u8 type,
			     const struct xfrm_migrate *m, int num_migrate,
			     const struct xfrm_kmaddress *k)
2324
{
2325
	struct net *net = &init_net;
2326 2327
	struct sk_buff *skb;

2328
	skb = nlmsg_new(xfrm_migrate_msgsize(num_migrate, !!k), GFP_ATOMIC);
2329 2330 2331 2332
	if (skb == NULL)
		return -ENOMEM;

	/* build migrate */
2333
	if (build_migrate(skb, m, num_migrate, k, sel, dir, type) < 0)
2334 2335
		BUG();

2336
	return xfrm_nlmsg_multicast(net, skb, 0, XFRMNLGRP_MIGRATE);
2337 2338
}
#else
2339 2340 2341
static int xfrm_send_migrate(const struct xfrm_selector *sel, u8 dir, u8 type,
			     const struct xfrm_migrate *m, int num_migrate,
			     const struct xfrm_kmaddress *k)
2342 2343 2344 2345
{
	return -ENOPROTOOPT;
}
#endif
J
Jamal Hadi Salim 已提交
2346

2347
#define XMSGSIZE(type) sizeof(struct type)
2348 2349

static const int xfrm_msg_min[XFRM_NR_MSGTYPES] = {
2350
	[XFRM_MSG_NEWSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_info),
2351 2352 2353 2354 2355 2356
	[XFRM_MSG_DELSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_id),
	[XFRM_MSG_GETSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_id),
	[XFRM_MSG_NEWPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_info),
	[XFRM_MSG_DELPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
	[XFRM_MSG_GETPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
	[XFRM_MSG_ALLOCSPI    - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userspi_info),
2357
	[XFRM_MSG_ACQUIRE     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_acquire),
2358
	[XFRM_MSG_EXPIRE      - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_expire),
2359
	[XFRM_MSG_UPDPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_info),
2360
	[XFRM_MSG_UPDSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_info),
2361
	[XFRM_MSG_POLEXPIRE   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_polexpire),
2362
	[XFRM_MSG_FLUSHSA     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_flush),
2363
	[XFRM_MSG_FLUSHPOLICY - XFRM_MSG_BASE] = 0,
J
Jamal Hadi Salim 已提交
2364 2365
	[XFRM_MSG_NEWAE       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_aevent_id),
	[XFRM_MSG_GETAE       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_aevent_id),
2366
	[XFRM_MSG_REPORT      - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_report),
2367
	[XFRM_MSG_MIGRATE     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
2368
	[XFRM_MSG_GETSADINFO  - XFRM_MSG_BASE] = sizeof(u32),
2369
	[XFRM_MSG_NEWSPDINFO  - XFRM_MSG_BASE] = sizeof(u32),
2370
	[XFRM_MSG_GETSPDINFO  - XFRM_MSG_BASE] = sizeof(u32),
L
Linus Torvalds 已提交
2371 2372
};

2373 2374
#undef XMSGSIZE

2375
static const struct nla_policy xfrma_policy[XFRMA_MAX+1] = {
J
jamal 已提交
2376 2377 2378 2379
	[XFRMA_SA]		= { .len = sizeof(struct xfrm_usersa_info)},
	[XFRMA_POLICY]		= { .len = sizeof(struct xfrm_userpolicy_info)},
	[XFRMA_LASTUSED]	= { .type = NLA_U64},
	[XFRMA_ALG_AUTH_TRUNC]	= { .len = sizeof(struct xfrm_algo_auth)},
2380
	[XFRMA_ALG_AEAD]	= { .len = sizeof(struct xfrm_algo_aead) },
2381 2382 2383 2384 2385 2386 2387 2388 2389 2390 2391 2392 2393 2394
	[XFRMA_ALG_AUTH]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ALG_CRYPT]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ALG_COMP]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ENCAP]		= { .len = sizeof(struct xfrm_encap_tmpl) },
	[XFRMA_TMPL]		= { .len = sizeof(struct xfrm_user_tmpl) },
	[XFRMA_SEC_CTX]		= { .len = sizeof(struct xfrm_sec_ctx) },
	[XFRMA_LTIME_VAL]	= { .len = sizeof(struct xfrm_lifetime_cur) },
	[XFRMA_REPLAY_VAL]	= { .len = sizeof(struct xfrm_replay_state) },
	[XFRMA_REPLAY_THRESH]	= { .type = NLA_U32 },
	[XFRMA_ETIMER_THRESH]	= { .type = NLA_U32 },
	[XFRMA_SRCADDR]		= { .len = sizeof(xfrm_address_t) },
	[XFRMA_COADDR]		= { .len = sizeof(xfrm_address_t) },
	[XFRMA_POLICY_TYPE]	= { .len = sizeof(struct xfrm_userpolicy_type)},
	[XFRMA_MIGRATE]		= { .len = sizeof(struct xfrm_user_migrate) },
2395
	[XFRMA_KMADDRESS]	= { .len = sizeof(struct xfrm_user_kmaddress) },
2396
	[XFRMA_MARK]		= { .len = sizeof(struct xfrm_mark) },
2397
	[XFRMA_TFCPAD]		= { .type = NLA_U32 },
2398
	[XFRMA_REPLAY_ESN_VAL]	= { .len = sizeof(struct xfrm_replay_state_esn) },
2399
	[XFRMA_SA_EXTRA_FLAGS]	= { .type = NLA_U32 },
2400
	[XFRMA_PROTO]		= { .type = NLA_U8 },
2401
	[XFRMA_ADDRESS_FILTER]	= { .len = sizeof(struct xfrm_address_filter) },
2402 2403
};

2404 2405 2406 2407 2408
static const struct nla_policy xfrma_spd_policy[XFRMA_SPD_MAX+1] = {
	[XFRMA_SPD_IPV4_HTHRESH] = { .len = sizeof(struct xfrmu_spdhthresh) },
	[XFRMA_SPD_IPV6_HTHRESH] = { .len = sizeof(struct xfrmu_spdhthresh) },
};

2409
static const struct xfrm_link {
2410
	int (*doit)(struct sk_buff *, struct nlmsghdr *, struct nlattr **);
L
Linus Torvalds 已提交
2411
	int (*dump)(struct sk_buff *, struct netlink_callback *);
2412
	int (*done)(struct netlink_callback *);
2413 2414
	const struct nla_policy *nla_pol;
	int nla_max;
2415 2416 2417 2418
} xfrm_dispatch[XFRM_NR_MSGTYPES] = {
	[XFRM_MSG_NEWSA       - XFRM_MSG_BASE] = { .doit = xfrm_add_sa        },
	[XFRM_MSG_DELSA       - XFRM_MSG_BASE] = { .doit = xfrm_del_sa        },
	[XFRM_MSG_GETSA       - XFRM_MSG_BASE] = { .doit = xfrm_get_sa,
2419 2420
						   .dump = xfrm_dump_sa,
						   .done = xfrm_dump_sa_done  },
2421 2422 2423
	[XFRM_MSG_NEWPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_add_policy    },
	[XFRM_MSG_DELPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_get_policy    },
	[XFRM_MSG_GETPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_get_policy,
2424 2425
						   .dump = xfrm_dump_policy,
						   .done = xfrm_dump_policy_done },
2426
	[XFRM_MSG_ALLOCSPI    - XFRM_MSG_BASE] = { .doit = xfrm_alloc_userspi },
2427
	[XFRM_MSG_ACQUIRE     - XFRM_MSG_BASE] = { .doit = xfrm_add_acquire   },
2428
	[XFRM_MSG_EXPIRE      - XFRM_MSG_BASE] = { .doit = xfrm_add_sa_expire },
2429 2430
	[XFRM_MSG_UPDPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_add_policy    },
	[XFRM_MSG_UPDSA       - XFRM_MSG_BASE] = { .doit = xfrm_add_sa        },
2431
	[XFRM_MSG_POLEXPIRE   - XFRM_MSG_BASE] = { .doit = xfrm_add_pol_expire},
2432 2433
	[XFRM_MSG_FLUSHSA     - XFRM_MSG_BASE] = { .doit = xfrm_flush_sa      },
	[XFRM_MSG_FLUSHPOLICY - XFRM_MSG_BASE] = { .doit = xfrm_flush_policy  },
J
Jamal Hadi Salim 已提交
2434 2435
	[XFRM_MSG_NEWAE       - XFRM_MSG_BASE] = { .doit = xfrm_new_ae  },
	[XFRM_MSG_GETAE       - XFRM_MSG_BASE] = { .doit = xfrm_get_ae  },
2436
	[XFRM_MSG_MIGRATE     - XFRM_MSG_BASE] = { .doit = xfrm_do_migrate    },
2437
	[XFRM_MSG_GETSADINFO  - XFRM_MSG_BASE] = { .doit = xfrm_get_sadinfo   },
2438 2439 2440
	[XFRM_MSG_NEWSPDINFO  - XFRM_MSG_BASE] = { .doit = xfrm_set_spdinfo,
						   .nla_pol = xfrma_spd_policy,
						   .nla_max = XFRMA_SPD_MAX },
J
Jamal Hadi Salim 已提交
2441
	[XFRM_MSG_GETSPDINFO  - XFRM_MSG_BASE] = { .doit = xfrm_get_spdinfo   },
L
Linus Torvalds 已提交
2442 2443
};

2444
static int xfrm_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
L
Linus Torvalds 已提交
2445
{
2446
	struct net *net = sock_net(skb->sk);
2447
	struct nlattr *attrs[XFRMA_MAX+1];
2448
	const struct xfrm_link *link;
2449
	int type, err;
L
Linus Torvalds 已提交
2450

2451
#ifdef CONFIG_COMPAT
2452
	if (in_compat_syscall())
2453
		return -EOPNOTSUPP;
2454 2455
#endif

L
Linus Torvalds 已提交
2456 2457
	type = nlh->nlmsg_type;
	if (type > XFRM_MSG_MAX)
2458
		return -EINVAL;
L
Linus Torvalds 已提交
2459 2460 2461 2462 2463

	type -= XFRM_MSG_BASE;
	link = &xfrm_dispatch[type];

	/* All operations require privileges, even GET */
2464
	if (!netlink_net_capable(skb, CAP_NET_ADMIN))
2465
		return -EPERM;
L
Linus Torvalds 已提交
2466

2467 2468
	if ((type == (XFRM_MSG_GETSA - XFRM_MSG_BASE) ||
	     type == (XFRM_MSG_GETPOLICY - XFRM_MSG_BASE)) &&
2469
	    (nlh->nlmsg_flags & NLM_F_DUMP)) {
L
Linus Torvalds 已提交
2470
		if (link->dump == NULL)
2471
			return -EINVAL;
2472

2473 2474 2475 2476 2477 2478 2479
		{
			struct netlink_dump_control c = {
				.dump = link->dump,
				.done = link->done,
			};
			return netlink_dump_start(net->xfrm.nlsk, skb, nlh, &c);
		}
L
Linus Torvalds 已提交
2480 2481
	}

2482 2483 2484
	err = nlmsg_parse(nlh, xfrm_msg_min[type], attrs,
			  link->nla_max ? : XFRMA_MAX,
			  link->nla_pol ? : xfrma_policy);
2485 2486
	if (err < 0)
		return err;
L
Linus Torvalds 已提交
2487 2488

	if (link->doit == NULL)
2489
		return -EINVAL;
L
Linus Torvalds 已提交
2490

2491
	return link->doit(skb, nlh, attrs);
L
Linus Torvalds 已提交
2492 2493
}

2494
static void xfrm_netlink_rcv(struct sk_buff *skb)
L
Linus Torvalds 已提交
2495
{
F
Fan Du 已提交
2496 2497 2498
	struct net *net = sock_net(skb->sk);

	mutex_lock(&net->xfrm.xfrm_cfg_mutex);
2499
	netlink_rcv_skb(skb, &xfrm_user_rcv_msg);
F
Fan Du 已提交
2500
	mutex_unlock(&net->xfrm.xfrm_cfg_mutex);
L
Linus Torvalds 已提交
2501 2502
}

2503 2504
static inline size_t xfrm_expire_msgsize(void)
{
2505 2506
	return NLMSG_ALIGN(sizeof(struct xfrm_user_expire))
	       + nla_total_size(sizeof(struct xfrm_mark));
2507 2508
}

2509
static int build_expire(struct sk_buff *skb, struct xfrm_state *x, const struct km_event *c)
L
Linus Torvalds 已提交
2510 2511 2512
{
	struct xfrm_user_expire *ue;
	struct nlmsghdr *nlh;
2513
	int err;
L
Linus Torvalds 已提交
2514

2515
	nlh = nlmsg_put(skb, c->portid, 0, XFRM_MSG_EXPIRE, sizeof(*ue), 0);
2516 2517
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
2518

2519
	ue = nlmsg_data(nlh);
L
Linus Torvalds 已提交
2520
	copy_to_user_state(x, &ue->state);
J
Jamal Hadi Salim 已提交
2521
	ue->hard = (c->data.hard != 0) ? 1 : 0;
L
Linus Torvalds 已提交
2522

2523 2524 2525
	err = xfrm_mark_put(skb, &x->mark);
	if (err)
		return err;
2526

2527 2528
	nlmsg_end(skb, nlh);
	return 0;
L
Linus Torvalds 已提交
2529 2530
}

2531
static int xfrm_exp_state_notify(struct xfrm_state *x, const struct km_event *c)
L
Linus Torvalds 已提交
2532
{
2533
	struct net *net = xs_net(x);
L
Linus Torvalds 已提交
2534 2535
	struct sk_buff *skb;

2536
	skb = nlmsg_new(xfrm_expire_msgsize(), GFP_ATOMIC);
L
Linus Torvalds 已提交
2537 2538 2539
	if (skb == NULL)
		return -ENOMEM;

2540 2541 2542 2543
	if (build_expire(skb, x, c) < 0) {
		kfree_skb(skb);
		return -EMSGSIZE;
	}
L
Linus Torvalds 已提交
2544

2545
	return xfrm_nlmsg_multicast(net, skb, 0, XFRMNLGRP_EXPIRE);
L
Linus Torvalds 已提交
2546 2547
}

2548
static int xfrm_aevent_state_notify(struct xfrm_state *x, const struct km_event *c)
J
Jamal Hadi Salim 已提交
2549
{
2550
	struct net *net = xs_net(x);
J
Jamal Hadi Salim 已提交
2551 2552
	struct sk_buff *skb;

2553
	skb = nlmsg_new(xfrm_aevent_msgsize(x), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
2554 2555 2556 2557 2558 2559
	if (skb == NULL)
		return -ENOMEM;

	if (build_aevent(skb, x, c) < 0)
		BUG();

2560
	return xfrm_nlmsg_multicast(net, skb, 0, XFRMNLGRP_AEVENTS);
J
Jamal Hadi Salim 已提交
2561 2562
}

2563
static int xfrm_notify_sa_flush(const struct km_event *c)
2564
{
2565
	struct net *net = c->net;
2566 2567 2568
	struct xfrm_usersa_flush *p;
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
2569
	int len = NLMSG_ALIGN(sizeof(struct xfrm_usersa_flush));
2570

2571
	skb = nlmsg_new(len, GFP_ATOMIC);
2572 2573 2574
	if (skb == NULL)
		return -ENOMEM;

2575
	nlh = nlmsg_put(skb, c->portid, c->seq, XFRM_MSG_FLUSHSA, sizeof(*p), 0);
2576 2577 2578 2579
	if (nlh == NULL) {
		kfree_skb(skb);
		return -EMSGSIZE;
	}
2580

2581
	p = nlmsg_data(nlh);
2582
	p->proto = c->data.proto;
2583

2584
	nlmsg_end(skb, nlh);
2585

2586
	return xfrm_nlmsg_multicast(net, skb, 0, XFRMNLGRP_SA);
2587 2588
}

2589
static inline size_t xfrm_sa_len(struct xfrm_state *x)
2590
{
2591
	size_t l = 0;
2592 2593
	if (x->aead)
		l += nla_total_size(aead_len(x->aead));
2594 2595 2596 2597 2598
	if (x->aalg) {
		l += nla_total_size(sizeof(struct xfrm_algo) +
				    (x->aalg->alg_key_len + 7) / 8);
		l += nla_total_size(xfrm_alg_auth_len(x->aalg));
	}
2599
	if (x->ealg)
2600
		l += nla_total_size(xfrm_alg_len(x->ealg));
2601
	if (x->calg)
2602
		l += nla_total_size(sizeof(*x->calg));
2603
	if (x->encap)
2604
		l += nla_total_size(sizeof(*x->encap));
2605 2606
	if (x->tfcpad)
		l += nla_total_size(sizeof(x->tfcpad));
2607 2608
	if (x->replay_esn)
		l += nla_total_size(xfrm_replay_state_esn_len(x->replay_esn));
2609 2610
	else
		l += nla_total_size(sizeof(struct xfrm_replay_state));
2611 2612 2613 2614 2615
	if (x->security)
		l += nla_total_size(sizeof(struct xfrm_user_sec_ctx) +
				    x->security->ctx_len);
	if (x->coaddr)
		l += nla_total_size(sizeof(*x->coaddr));
2616 2617
	if (x->props.extra_flags)
		l += nla_total_size(sizeof(x->props.extra_flags));
2618

2619
	/* Must count x->lastused as it may become non-zero behind our back. */
2620
	l += nla_total_size_64bit(sizeof(u64));
2621 2622 2623 2624

	return l;
}

2625
static int xfrm_notify_sa(struct xfrm_state *x, const struct km_event *c)
2626
{
2627
	struct net *net = xs_net(x);
2628
	struct xfrm_usersa_info *p;
2629
	struct xfrm_usersa_id *id;
2630 2631 2632
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
	int len = xfrm_sa_len(x);
2633
	int headlen, err;
2634 2635 2636

	headlen = sizeof(*p);
	if (c->event == XFRM_MSG_DELSA) {
2637
		len += nla_total_size(headlen);
2638
		headlen = sizeof(*id);
2639
		len += nla_total_size(sizeof(struct xfrm_mark));
2640
	}
2641
	len += NLMSG_ALIGN(headlen);
2642

2643
	skb = nlmsg_new(len, GFP_ATOMIC);
2644 2645 2646
	if (skb == NULL)
		return -ENOMEM;

2647
	nlh = nlmsg_put(skb, c->portid, c->seq, c->event, headlen, 0);
2648
	err = -EMSGSIZE;
2649
	if (nlh == NULL)
2650
		goto out_free_skb;
2651

2652
	p = nlmsg_data(nlh);
2653
	if (c->event == XFRM_MSG_DELSA) {
2654 2655
		struct nlattr *attr;

2656
		id = nlmsg_data(nlh);
2657 2658 2659 2660 2661
		memcpy(&id->daddr, &x->id.daddr, sizeof(id->daddr));
		id->spi = x->id.spi;
		id->family = x->props.family;
		id->proto = x->id.proto;

2662
		attr = nla_reserve(skb, XFRMA_SA, sizeof(*p));
2663
		err = -EMSGSIZE;
2664
		if (attr == NULL)
2665
			goto out_free_skb;
2666 2667

		p = nla_data(attr);
2668
	}
2669 2670 2671
	err = copy_to_user_state_extra(x, p, skb);
	if (err)
		goto out_free_skb;
2672

2673
	nlmsg_end(skb, nlh);
2674

2675
	return xfrm_nlmsg_multicast(net, skb, 0, XFRMNLGRP_SA);
2676

2677
out_free_skb:
2678
	kfree_skb(skb);
2679
	return err;
2680 2681
}

2682
static int xfrm_send_state_notify(struct xfrm_state *x, const struct km_event *c)
2683 2684 2685
{

	switch (c->event) {
2686
	case XFRM_MSG_EXPIRE:
2687
		return xfrm_exp_state_notify(x, c);
J
Jamal Hadi Salim 已提交
2688 2689
	case XFRM_MSG_NEWAE:
		return xfrm_aevent_state_notify(x, c);
2690 2691 2692
	case XFRM_MSG_DELSA:
	case XFRM_MSG_UPDSA:
	case XFRM_MSG_NEWSA:
2693
		return xfrm_notify_sa(x, c);
2694
	case XFRM_MSG_FLUSHSA:
2695 2696
		return xfrm_notify_sa_flush(c);
	default:
S
stephen hemminger 已提交
2697 2698 2699
		printk(KERN_NOTICE "xfrm_user: Unknown SA event %d\n",
		       c->event);
		break;
2700 2701 2702 2703 2704 2705
	}

	return 0;

}

2706 2707 2708 2709 2710
static inline size_t xfrm_acquire_msgsize(struct xfrm_state *x,
					  struct xfrm_policy *xp)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_acquire))
	       + nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr)
2711
	       + nla_total_size(sizeof(struct xfrm_mark))
2712 2713 2714 2715
	       + nla_total_size(xfrm_user_sec_ctx_size(x->security))
	       + userpolicy_type_attrsize();
}

L
Linus Torvalds 已提交
2716
static int build_acquire(struct sk_buff *skb, struct xfrm_state *x,
2717
			 struct xfrm_tmpl *xt, struct xfrm_policy *xp)
L
Linus Torvalds 已提交
2718
{
2719
	__u32 seq = xfrm_get_acqseq();
L
Linus Torvalds 已提交
2720 2721
	struct xfrm_user_acquire *ua;
	struct nlmsghdr *nlh;
2722
	int err;
L
Linus Torvalds 已提交
2723

2724 2725 2726
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_ACQUIRE, sizeof(*ua), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
2727

2728
	ua = nlmsg_data(nlh);
L
Linus Torvalds 已提交
2729 2730 2731
	memcpy(&ua->id, &x->id, sizeof(ua->id));
	memcpy(&ua->saddr, &x->props.saddr, sizeof(ua->saddr));
	memcpy(&ua->sel, &x->sel, sizeof(ua->sel));
2732
	copy_to_user_policy(xp, &ua->policy, XFRM_POLICY_OUT);
L
Linus Torvalds 已提交
2733 2734 2735 2736 2737
	ua->aalgos = xt->aalgos;
	ua->ealgos = xt->ealgos;
	ua->calgos = xt->calgos;
	ua->seq = x->km.seq = seq;

2738 2739 2740 2741 2742 2743 2744 2745 2746 2747 2748
	err = copy_to_user_tmpl(xp, skb);
	if (!err)
		err = copy_to_user_state_sec_ctx(x, skb);
	if (!err)
		err = copy_to_user_policy_type(xp->type, skb);
	if (!err)
		err = xfrm_mark_put(skb, &xp->mark);
	if (err) {
		nlmsg_cancel(skb, nlh);
		return err;
	}
L
Linus Torvalds 已提交
2749

2750 2751
	nlmsg_end(skb, nlh);
	return 0;
L
Linus Torvalds 已提交
2752 2753 2754
}

static int xfrm_send_acquire(struct xfrm_state *x, struct xfrm_tmpl *xt,
2755
			     struct xfrm_policy *xp)
L
Linus Torvalds 已提交
2756
{
2757
	struct net *net = xs_net(x);
L
Linus Torvalds 已提交
2758 2759
	struct sk_buff *skb;

2760
	skb = nlmsg_new(xfrm_acquire_msgsize(x, xp), GFP_ATOMIC);
L
Linus Torvalds 已提交
2761 2762 2763
	if (skb == NULL)
		return -ENOMEM;

2764
	if (build_acquire(skb, x, xt, xp) < 0)
L
Linus Torvalds 已提交
2765 2766
		BUG();

2767
	return xfrm_nlmsg_multicast(net, skb, 0, XFRMNLGRP_ACQUIRE);
L
Linus Torvalds 已提交
2768 2769 2770 2771 2772
}

/* User gives us xfrm_user_policy_info followed by an array of 0
 * or more templates.
 */
2773
static struct xfrm_policy *xfrm_compile_policy(struct sock *sk, int opt,
L
Linus Torvalds 已提交
2774 2775
					       u8 *data, int len, int *dir)
{
2776
	struct net *net = sock_net(sk);
L
Linus Torvalds 已提交
2777 2778 2779 2780 2781
	struct xfrm_userpolicy_info *p = (struct xfrm_userpolicy_info *)data;
	struct xfrm_user_tmpl *ut = (struct xfrm_user_tmpl *) (p + 1);
	struct xfrm_policy *xp;
	int nr;

2782
	switch (sk->sk_family) {
L
Linus Torvalds 已提交
2783 2784 2785 2786 2787 2788
	case AF_INET:
		if (opt != IP_XFRM_POLICY) {
			*dir = -EOPNOTSUPP;
			return NULL;
		}
		break;
E
Eric Dumazet 已提交
2789
#if IS_ENABLED(CONFIG_IPV6)
L
Linus Torvalds 已提交
2790 2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805 2806 2807 2808
	case AF_INET6:
		if (opt != IPV6_XFRM_POLICY) {
			*dir = -EOPNOTSUPP;
			return NULL;
		}
		break;
#endif
	default:
		*dir = -EINVAL;
		return NULL;
	}

	*dir = -EINVAL;

	if (len < sizeof(*p) ||
	    verify_newpolicy_info(p))
		return NULL;

	nr = ((len - sizeof(*p)) / sizeof(*ut));
2809
	if (validate_tmpl(nr, ut, p->sel.family))
L
Linus Torvalds 已提交
2810 2811
		return NULL;

2812 2813 2814
	if (p->dir > XFRM_POLICY_OUT)
		return NULL;

2815
	xp = xfrm_policy_alloc(net, GFP_ATOMIC);
L
Linus Torvalds 已提交
2816 2817 2818 2819 2820 2821
	if (xp == NULL) {
		*dir = -ENOBUFS;
		return NULL;
	}

	copy_from_user_policy(xp, p);
2822
	xp->type = XFRM_POLICY_TYPE_MAIN;
L
Linus Torvalds 已提交
2823 2824 2825 2826 2827 2828 2829
	copy_templates(xp, ut, nr);

	*dir = p->dir;

	return xp;
}

2830 2831 2832 2833 2834
static inline size_t xfrm_polexpire_msgsize(struct xfrm_policy *xp)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_polexpire))
	       + nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr)
	       + nla_total_size(xfrm_user_sec_ctx_size(xp->security))
2835
	       + nla_total_size(sizeof(struct xfrm_mark))
2836 2837 2838
	       + userpolicy_type_attrsize();
}

L
Linus Torvalds 已提交
2839
static int build_polexpire(struct sk_buff *skb, struct xfrm_policy *xp,
2840
			   int dir, const struct km_event *c)
L
Linus Torvalds 已提交
2841 2842
{
	struct xfrm_user_polexpire *upe;
J
Jamal Hadi Salim 已提交
2843
	int hard = c->data.hard;
2844 2845
	struct nlmsghdr *nlh;
	int err;
L
Linus Torvalds 已提交
2846

2847
	nlh = nlmsg_put(skb, c->portid, 0, XFRM_MSG_POLEXPIRE, sizeof(*upe), 0);
2848 2849
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
2850

2851
	upe = nlmsg_data(nlh);
L
Linus Torvalds 已提交
2852
	copy_to_user_policy(xp, &upe->pol, dir);
2853 2854 2855 2856 2857 2858 2859 2860 2861 2862 2863
	err = copy_to_user_tmpl(xp, skb);
	if (!err)
		err = copy_to_user_sec_ctx(xp, skb);
	if (!err)
		err = copy_to_user_policy_type(xp->type, skb);
	if (!err)
		err = xfrm_mark_put(skb, &xp->mark);
	if (err) {
		nlmsg_cancel(skb, nlh);
		return err;
	}
L
Linus Torvalds 已提交
2864 2865
	upe->hard = !!hard;

2866 2867
	nlmsg_end(skb, nlh);
	return 0;
L
Linus Torvalds 已提交
2868 2869
}

2870
static int xfrm_exp_policy_notify(struct xfrm_policy *xp, int dir, const struct km_event *c)
L
Linus Torvalds 已提交
2871
{
2872
	struct net *net = xp_net(xp);
L
Linus Torvalds 已提交
2873 2874
	struct sk_buff *skb;

2875
	skb = nlmsg_new(xfrm_polexpire_msgsize(xp), GFP_ATOMIC);
L
Linus Torvalds 已提交
2876 2877 2878
	if (skb == NULL)
		return -ENOMEM;

J
Jamal Hadi Salim 已提交
2879
	if (build_polexpire(skb, xp, dir, c) < 0)
L
Linus Torvalds 已提交
2880 2881
		BUG();

2882
	return xfrm_nlmsg_multicast(net, skb, 0, XFRMNLGRP_EXPIRE);
L
Linus Torvalds 已提交
2883 2884
}

2885
static int xfrm_notify_policy(struct xfrm_policy *xp, int dir, const struct km_event *c)
2886
{
2887
	int len = nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr);
2888
	struct net *net = xp_net(xp);
2889
	struct xfrm_userpolicy_info *p;
2890
	struct xfrm_userpolicy_id *id;
2891 2892
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
2893
	int headlen, err;
2894 2895 2896

	headlen = sizeof(*p);
	if (c->event == XFRM_MSG_DELPOLICY) {
2897
		len += nla_total_size(headlen);
2898 2899
		headlen = sizeof(*id);
	}
2900
	len += userpolicy_type_attrsize();
2901
	len += nla_total_size(sizeof(struct xfrm_mark));
2902
	len += NLMSG_ALIGN(headlen);
2903

2904
	skb = nlmsg_new(len, GFP_ATOMIC);
2905 2906 2907
	if (skb == NULL)
		return -ENOMEM;

2908
	nlh = nlmsg_put(skb, c->portid, c->seq, c->event, headlen, 0);
2909
	err = -EMSGSIZE;
2910
	if (nlh == NULL)
2911
		goto out_free_skb;
2912

2913
	p = nlmsg_data(nlh);
2914
	if (c->event == XFRM_MSG_DELPOLICY) {
2915 2916
		struct nlattr *attr;

2917
		id = nlmsg_data(nlh);
2918 2919 2920 2921 2922 2923 2924
		memset(id, 0, sizeof(*id));
		id->dir = dir;
		if (c->data.byid)
			id->index = xp->index;
		else
			memcpy(&id->sel, &xp->selector, sizeof(id->sel));

2925
		attr = nla_reserve(skb, XFRMA_POLICY, sizeof(*p));
2926
		err = -EMSGSIZE;
2927
		if (attr == NULL)
2928
			goto out_free_skb;
2929 2930

		p = nla_data(attr);
2931
	}
2932 2933

	copy_to_user_policy(xp, p, dir);
2934 2935 2936 2937 2938 2939 2940
	err = copy_to_user_tmpl(xp, skb);
	if (!err)
		err = copy_to_user_policy_type(xp->type, skb);
	if (!err)
		err = xfrm_mark_put(skb, &xp->mark);
	if (err)
		goto out_free_skb;
2941

2942
	nlmsg_end(skb, nlh);
2943

2944
	return xfrm_nlmsg_multicast(net, skb, 0, XFRMNLGRP_POLICY);
2945

2946
out_free_skb:
2947
	kfree_skb(skb);
2948
	return err;
2949 2950
}

2951
static int xfrm_notify_policy_flush(const struct km_event *c)
2952
{
2953
	struct net *net = c->net;
2954 2955
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
2956
	int err;
2957

2958
	skb = nlmsg_new(userpolicy_type_attrsize(), GFP_ATOMIC);
2959 2960 2961
	if (skb == NULL)
		return -ENOMEM;

2962
	nlh = nlmsg_put(skb, c->portid, c->seq, XFRM_MSG_FLUSHPOLICY, 0, 0);
2963
	err = -EMSGSIZE;
2964
	if (nlh == NULL)
2965 2966 2967 2968
		goto out_free_skb;
	err = copy_to_user_policy_type(c->data.type, skb);
	if (err)
		goto out_free_skb;
2969

2970
	nlmsg_end(skb, nlh);
2971

2972
	return xfrm_nlmsg_multicast(net, skb, 0, XFRMNLGRP_POLICY);
2973

2974
out_free_skb:
2975
	kfree_skb(skb);
2976
	return err;
2977 2978
}

2979
static int xfrm_send_policy_notify(struct xfrm_policy *xp, int dir, const struct km_event *c)
2980 2981 2982
{

	switch (c->event) {
2983 2984 2985
	case XFRM_MSG_NEWPOLICY:
	case XFRM_MSG_UPDPOLICY:
	case XFRM_MSG_DELPOLICY:
2986
		return xfrm_notify_policy(xp, dir, c);
2987
	case XFRM_MSG_FLUSHPOLICY:
2988
		return xfrm_notify_policy_flush(c);
2989
	case XFRM_MSG_POLEXPIRE:
2990 2991
		return xfrm_exp_policy_notify(xp, dir, c);
	default:
S
stephen hemminger 已提交
2992 2993
		printk(KERN_NOTICE "xfrm_user: Unknown Policy event %d\n",
		       c->event);
2994 2995 2996 2997 2998 2999
	}

	return 0;

}

3000 3001 3002 3003 3004
static inline size_t xfrm_report_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_report));
}

3005 3006 3007 3008 3009 3010
static int build_report(struct sk_buff *skb, u8 proto,
			struct xfrm_selector *sel, xfrm_address_t *addr)
{
	struct xfrm_user_report *ur;
	struct nlmsghdr *nlh;

3011 3012 3013
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_REPORT, sizeof(*ur), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
3014

3015
	ur = nlmsg_data(nlh);
3016 3017 3018
	ur->proto = proto;
	memcpy(&ur->sel, sel, sizeof(ur->sel));

3019 3020 3021 3022 3023 3024 3025
	if (addr) {
		int err = nla_put(skb, XFRMA_COADDR, sizeof(*addr), addr);
		if (err) {
			nlmsg_cancel(skb, nlh);
			return err;
		}
	}
3026 3027
	nlmsg_end(skb, nlh);
	return 0;
3028 3029
}

3030 3031
static int xfrm_send_report(struct net *net, u8 proto,
			    struct xfrm_selector *sel, xfrm_address_t *addr)
3032 3033 3034
{
	struct sk_buff *skb;

3035
	skb = nlmsg_new(xfrm_report_msgsize(), GFP_ATOMIC);
3036 3037 3038 3039 3040 3041
	if (skb == NULL)
		return -ENOMEM;

	if (build_report(skb, proto, sel, addr) < 0)
		BUG();

3042
	return xfrm_nlmsg_multicast(net, skb, 0, XFRMNLGRP_REPORT);
3043 3044
}

3045 3046 3047 3048 3049 3050 3051 3052 3053 3054 3055 3056 3057 3058 3059 3060 3061 3062 3063 3064 3065 3066 3067 3068 3069 3070 3071
static inline size_t xfrm_mapping_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_mapping));
}

static int build_mapping(struct sk_buff *skb, struct xfrm_state *x,
			 xfrm_address_t *new_saddr, __be16 new_sport)
{
	struct xfrm_user_mapping *um;
	struct nlmsghdr *nlh;

	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_MAPPING, sizeof(*um), 0);
	if (nlh == NULL)
		return -EMSGSIZE;

	um = nlmsg_data(nlh);

	memcpy(&um->id.daddr, &x->id.daddr, sizeof(um->id.daddr));
	um->id.spi = x->id.spi;
	um->id.family = x->props.family;
	um->id.proto = x->id.proto;
	memcpy(&um->new_saddr, new_saddr, sizeof(um->new_saddr));
	memcpy(&um->old_saddr, &x->props.saddr, sizeof(um->old_saddr));
	um->new_sport = new_sport;
	um->old_sport = x->encap->encap_sport;
	um->reqid = x->props.reqid;

3072 3073
	nlmsg_end(skb, nlh);
	return 0;
3074 3075 3076 3077 3078
}

static int xfrm_send_mapping(struct xfrm_state *x, xfrm_address_t *ipaddr,
			     __be16 sport)
{
3079
	struct net *net = xs_net(x);
3080 3081 3082 3083 3084 3085 3086 3087 3088 3089 3090 3091 3092 3093 3094
	struct sk_buff *skb;

	if (x->id.proto != IPPROTO_ESP)
		return -EINVAL;

	if (!x->encap)
		return -EINVAL;

	skb = nlmsg_new(xfrm_mapping_msgsize(), GFP_ATOMIC);
	if (skb == NULL)
		return -ENOMEM;

	if (build_mapping(skb, x, ipaddr, sport) < 0)
		BUG();

3095
	return xfrm_nlmsg_multicast(net, skb, 0, XFRMNLGRP_MAPPING);
3096 3097
}

3098 3099 3100 3101 3102
static bool xfrm_is_alive(const struct km_event *c)
{
	return (bool)xfrm_acquire_is_on(c->net);
}

L
Linus Torvalds 已提交
3103 3104 3105 3106 3107 3108
static struct xfrm_mgr netlink_mgr = {
	.id		= "netlink",
	.notify		= xfrm_send_state_notify,
	.acquire	= xfrm_send_acquire,
	.compile_policy	= xfrm_compile_policy,
	.notify_policy	= xfrm_send_policy_notify,
3109
	.report		= xfrm_send_report,
3110
	.migrate	= xfrm_send_migrate,
3111
	.new_mapping	= xfrm_send_mapping,
3112
	.is_alive	= xfrm_is_alive,
L
Linus Torvalds 已提交
3113 3114
};

3115
static int __net_init xfrm_user_net_init(struct net *net)
L
Linus Torvalds 已提交
3116
{
3117
	struct sock *nlsk;
3118 3119 3120 3121
	struct netlink_kernel_cfg cfg = {
		.groups	= XFRMNLGRP_MAX,
		.input	= xfrm_netlink_rcv,
	};
3122

3123
	nlsk = netlink_kernel_create(net, NETLINK_XFRM, &cfg);
3124
	if (nlsk == NULL)
L
Linus Torvalds 已提交
3125
		return -ENOMEM;
3126
	net->xfrm.nlsk_stash = nlsk; /* Don't set to NULL */
3127
	rcu_assign_pointer(net->xfrm.nlsk, nlsk);
L
Linus Torvalds 已提交
3128 3129 3130
	return 0;
}

3131
static void __net_exit xfrm_user_net_exit(struct list_head *net_exit_list)
L
Linus Torvalds 已提交
3132
{
3133 3134
	struct net *net;
	list_for_each_entry(net, net_exit_list, exit_list)
3135
		RCU_INIT_POINTER(net->xfrm.nlsk, NULL);
3136 3137 3138
	synchronize_net();
	list_for_each_entry(net, net_exit_list, exit_list)
		netlink_kernel_release(net->xfrm.nlsk_stash);
L
Linus Torvalds 已提交
3139 3140
}

3141
static struct pernet_operations xfrm_user_net_ops = {
3142 3143
	.init	    = xfrm_user_net_init,
	.exit_batch = xfrm_user_net_exit,
3144 3145 3146 3147 3148 3149 3150 3151 3152 3153 3154 3155 3156 3157 3158 3159 3160 3161 3162 3163 3164 3165 3166
};

static int __init xfrm_user_init(void)
{
	int rv;

	printk(KERN_INFO "Initializing XFRM netlink socket\n");

	rv = register_pernet_subsys(&xfrm_user_net_ops);
	if (rv < 0)
		return rv;
	rv = xfrm_register_km(&netlink_mgr);
	if (rv < 0)
		unregister_pernet_subsys(&xfrm_user_net_ops);
	return rv;
}

static void __exit xfrm_user_exit(void)
{
	xfrm_unregister_km(&netlink_mgr);
	unregister_pernet_subsys(&xfrm_user_net_ops);
}

L
Linus Torvalds 已提交
3167 3168 3169
module_init(xfrm_user_init);
module_exit(xfrm_user_exit);
MODULE_LICENSE("GPL");
3170
MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_XFRM);
3171