xfrm_user.c 54.9 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9
/* xfrm_user.c: User interface to configure xfrm engine.
 *
 * Copyright (C) 2002 David S. Miller (davem@redhat.com)
 *
 * Changes:
 *	Mitsuru KANDA @USAGI
 * 	Kazunori MIYAZAWA @USAGI
 * 	Kunihiro Ishiguro <kunihiro@ipinfusion.com>
 * 		IPv6 support
10
 *
L
Linus Torvalds 已提交
11 12
 */

13
#include <linux/crypto.h>
L
Linus Torvalds 已提交
14 15 16 17 18 19 20 21 22 23 24 25 26 27
#include <linux/module.h>
#include <linux/kernel.h>
#include <linux/types.h>
#include <linux/slab.h>
#include <linux/socket.h>
#include <linux/string.h>
#include <linux/net.h>
#include <linux/skbuff.h>
#include <linux/pfkeyv2.h>
#include <linux/ipsec.h>
#include <linux/init.h>
#include <linux/security.h>
#include <net/sock.h>
#include <net/xfrm.h>
28
#include <net/netlink.h>
L
Linus Torvalds 已提交
29
#include <asm/uaccess.h>
30 31 32
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
#include <linux/in6.h>
#endif
L
Linus Torvalds 已提交
33

34
static int verify_one_alg(struct nlattr **attrs, enum xfrm_attr_type_t type)
L
Linus Torvalds 已提交
35
{
36
	struct nlattr *rt = attrs[type];
L
Linus Torvalds 已提交
37 38 39 40 41
	struct xfrm_algo *algp;

	if (!rt)
		return 0;

42
	algp = nla_data(rt);
43
	if (nla_len(rt) < xfrm_alg_len(algp))
44 45
		return -EINVAL;

L
Linus Torvalds 已提交
46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64
	switch (type) {
	case XFRMA_ALG_AUTH:
		if (!algp->alg_key_len &&
		    strcmp(algp->alg_name, "digest_null") != 0)
			return -EINVAL;
		break;

	case XFRMA_ALG_CRYPT:
		if (!algp->alg_key_len &&
		    strcmp(algp->alg_name, "cipher_null") != 0)
			return -EINVAL;
		break;

	case XFRMA_ALG_COMP:
		/* Zero length keys are legal.  */
		break;

	default:
		return -EINVAL;
65
	}
L
Linus Torvalds 已提交
66 67 68 69 70

	algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
	return 0;
}

71
static void verify_one_addr(struct nlattr **attrs, enum xfrm_attr_type_t type,
72 73
			   xfrm_address_t **addrp)
{
74
	struct nlattr *rt = attrs[type];
75

76
	if (rt && addrp)
77
		*addrp = nla_data(rt);
78
}
79

80
static inline int verify_sec_ctx_len(struct nlattr **attrs)
81
{
82
	struct nlattr *rt = attrs[XFRMA_SEC_CTX];
83 84 85 86 87
	struct xfrm_user_sec_ctx *uctx;

	if (!rt)
		return 0;

88
	uctx = nla_data(rt);
89
	if (uctx->len != (sizeof(struct xfrm_user_sec_ctx) + uctx->ctx_len))
90 91 92 93 94 95
		return -EINVAL;

	return 0;
}


L
Linus Torvalds 已提交
96
static int verify_newsa_info(struct xfrm_usersa_info *p,
97
			     struct nlattr **attrs)
L
Linus Torvalds 已提交
98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115
{
	int err;

	err = -EINVAL;
	switch (p->family) {
	case AF_INET:
		break;

	case AF_INET6:
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
		break;
#else
		err = -EAFNOSUPPORT;
		goto out;
#endif

	default:
		goto out;
116
	}
L
Linus Torvalds 已提交
117 118 119 120

	err = -EINVAL;
	switch (p->id.proto) {
	case IPPROTO_AH:
121 122 123
		if (!attrs[XFRMA_ALG_AUTH]	||
		    attrs[XFRMA_ALG_CRYPT]	||
		    attrs[XFRMA_ALG_COMP])
L
Linus Torvalds 已提交
124 125 126 127
			goto out;
		break;

	case IPPROTO_ESP:
128 129 130
		if ((!attrs[XFRMA_ALG_AUTH] &&
		     !attrs[XFRMA_ALG_CRYPT])	||
		    attrs[XFRMA_ALG_COMP])
L
Linus Torvalds 已提交
131 132 133 134
			goto out;
		break;

	case IPPROTO_COMP:
135 136 137
		if (!attrs[XFRMA_ALG_COMP]	||
		    attrs[XFRMA_ALG_AUTH]	||
		    attrs[XFRMA_ALG_CRYPT])
L
Linus Torvalds 已提交
138 139 140
			goto out;
		break;

141 142 143
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
	case IPPROTO_DSTOPTS:
	case IPPROTO_ROUTING:
144 145 146 147 148 149
		if (attrs[XFRMA_ALG_COMP]	||
		    attrs[XFRMA_ALG_AUTH]	||
		    attrs[XFRMA_ALG_CRYPT]	||
		    attrs[XFRMA_ENCAP]		||
		    attrs[XFRMA_SEC_CTX]	||
		    !attrs[XFRMA_COADDR])
150 151 152 153
			goto out;
		break;
#endif

L
Linus Torvalds 已提交
154 155
	default:
		goto out;
156
	}
L
Linus Torvalds 已提交
157

158
	if ((err = verify_one_alg(attrs, XFRMA_ALG_AUTH)))
L
Linus Torvalds 已提交
159
		goto out;
160
	if ((err = verify_one_alg(attrs, XFRMA_ALG_CRYPT)))
L
Linus Torvalds 已提交
161
		goto out;
162
	if ((err = verify_one_alg(attrs, XFRMA_ALG_COMP)))
L
Linus Torvalds 已提交
163
		goto out;
164
	if ((err = verify_sec_ctx_len(attrs)))
165
		goto out;
L
Linus Torvalds 已提交
166 167 168

	err = -EINVAL;
	switch (p->mode) {
169 170
	case XFRM_MODE_TRANSPORT:
	case XFRM_MODE_TUNNEL:
171
	case XFRM_MODE_ROUTEOPTIMIZATION:
D
Diego Beltrami 已提交
172
	case XFRM_MODE_BEET:
L
Linus Torvalds 已提交
173 174 175 176
		break;

	default:
		goto out;
177
	}
L
Linus Torvalds 已提交
178 179 180 181 182 183 184 185 186

	err = 0;

out:
	return err;
}

static int attach_one_algo(struct xfrm_algo **algpp, u8 *props,
			   struct xfrm_algo_desc *(*get_byname)(char *, int),
187
			   struct nlattr *rta)
L
Linus Torvalds 已提交
188 189 190 191 192 193 194
{
	struct xfrm_algo *p, *ualg;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

195
	ualg = nla_data(rta);
L
Linus Torvalds 已提交
196 197 198 199 200 201

	algo = get_byname(ualg->alg_name, 1);
	if (!algo)
		return -ENOSYS;
	*props = algo->desc.sadb_alg_id;

202
	p = kmemdup(ualg, xfrm_alg_len(ualg), GFP_KERNEL);
L
Linus Torvalds 已提交
203 204 205
	if (!p)
		return -ENOMEM;

206
	strcpy(p->alg_name, algo->name);
L
Linus Torvalds 已提交
207 208 209 210
	*algpp = p;
	return 0;
}

211
static inline int xfrm_user_sec_ctx_size(struct xfrm_sec_ctx *xfrm_ctx)
212 213 214 215 216 217 218 219 220 221
{
	int len = 0;

	if (xfrm_ctx) {
		len += sizeof(struct xfrm_user_sec_ctx);
		len += xfrm_ctx->ctx_len;
	}
	return len;
}

L
Linus Torvalds 已提交
222 223 224 225 226 227 228 229 230
static void copy_from_user_state(struct xfrm_state *x, struct xfrm_usersa_info *p)
{
	memcpy(&x->id, &p->id, sizeof(x->id));
	memcpy(&x->sel, &p->sel, sizeof(x->sel));
	memcpy(&x->lft, &p->lft, sizeof(x->lft));
	x->props.mode = p->mode;
	x->props.replay_window = p->replay_window;
	x->props.reqid = p->reqid;
	x->props.family = p->family;
231
	memcpy(&x->props.saddr, &p->saddr, sizeof(x->props.saddr));
L
Linus Torvalds 已提交
232
	x->props.flags = p->flags;
233 234 235 236 237 238 239

	/*
	 * Set inner address family if the KM left it as zero.
	 * See comment in validate_tmpl.
	 */
	if (!x->sel.family)
		x->sel.family = p->family;
L
Linus Torvalds 已提交
240 241
}

J
Jamal Hadi Salim 已提交
242 243 244 245 246
/*
 * someday when pfkey also has support, we could have the code
 * somehow made shareable and move it to xfrm_state.c - JHS
 *
*/
247
static void xfrm_update_ae_params(struct xfrm_state *x, struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
248
{
249 250 251 252
	struct nlattr *rp = attrs[XFRMA_REPLAY_VAL];
	struct nlattr *lt = attrs[XFRMA_LTIME_VAL];
	struct nlattr *et = attrs[XFRMA_ETIMER_THRESH];
	struct nlattr *rt = attrs[XFRMA_REPLAY_THRESH];
J
Jamal Hadi Salim 已提交
253 254 255

	if (rp) {
		struct xfrm_replay_state *replay;
256
		replay = nla_data(rp);
J
Jamal Hadi Salim 已提交
257 258 259 260 261 262
		memcpy(&x->replay, replay, sizeof(*replay));
		memcpy(&x->preplay, replay, sizeof(*replay));
	}

	if (lt) {
		struct xfrm_lifetime_cur *ltime;
263
		ltime = nla_data(lt);
J
Jamal Hadi Salim 已提交
264 265 266 267 268 269
		x->curlft.bytes = ltime->bytes;
		x->curlft.packets = ltime->packets;
		x->curlft.add_time = ltime->add_time;
		x->curlft.use_time = ltime->use_time;
	}

270
	if (et)
271
		x->replay_maxage = nla_get_u32(et);
J
Jamal Hadi Salim 已提交
272

273
	if (rt)
274
		x->replay_maxdiff = nla_get_u32(rt);
J
Jamal Hadi Salim 已提交
275 276
}

L
Linus Torvalds 已提交
277
static struct xfrm_state *xfrm_state_construct(struct xfrm_usersa_info *p,
278
					       struct nlattr **attrs,
L
Linus Torvalds 已提交
279 280 281 282 283 284 285 286 287 288 289 290
					       int *errp)
{
	struct xfrm_state *x = xfrm_state_alloc();
	int err = -ENOMEM;

	if (!x)
		goto error_no_put;

	copy_from_user_state(x, p);

	if ((err = attach_one_algo(&x->aalg, &x->props.aalgo,
				   xfrm_aalg_get_byname,
291
				   attrs[XFRMA_ALG_AUTH])))
L
Linus Torvalds 已提交
292 293 294
		goto error;
	if ((err = attach_one_algo(&x->ealg, &x->props.ealgo,
				   xfrm_ealg_get_byname,
295
				   attrs[XFRMA_ALG_CRYPT])))
L
Linus Torvalds 已提交
296 297 298
		goto error;
	if ((err = attach_one_algo(&x->calg, &x->props.calgo,
				   xfrm_calg_get_byname,
299
				   attrs[XFRMA_ALG_COMP])))
L
Linus Torvalds 已提交
300
		goto error;
301 302 303 304 305 306 307 308 309 310 311 312 313 314 315

	if (attrs[XFRMA_ENCAP]) {
		x->encap = kmemdup(nla_data(attrs[XFRMA_ENCAP]),
				   sizeof(*x->encap), GFP_KERNEL);
		if (x->encap == NULL)
			goto error;
	}

	if (attrs[XFRMA_COADDR]) {
		x->coaddr = kmemdup(nla_data(attrs[XFRMA_COADDR]),
				    sizeof(*x->coaddr), GFP_KERNEL);
		if (x->coaddr == NULL)
			goto error;
	}

H
Herbert Xu 已提交
316
	err = xfrm_init_state(x);
L
Linus Torvalds 已提交
317 318 319
	if (err)
		goto error;

320 321
	if (attrs[XFRMA_SEC_CTX] &&
	    security_xfrm_state_alloc(x, nla_data(attrs[XFRMA_SEC_CTX])))
322 323
		goto error;

L
Linus Torvalds 已提交
324
	x->km.seq = p->seq;
J
Jamal Hadi Salim 已提交
325 326 327 328 329 330 331 332 333
	x->replay_maxdiff = sysctl_xfrm_aevent_rseqth;
	/* sysctl_xfrm_aevent_etime is in 100ms units */
	x->replay_maxage = (sysctl_xfrm_aevent_etime*HZ)/XFRM_AE_ETH_M;
	x->preplay.bitmap = 0;
	x->preplay.seq = x->replay.seq+x->replay_maxdiff;
	x->preplay.oseq = x->replay.oseq +x->replay_maxdiff;

	/* override default values from above */

334
	xfrm_update_ae_params(x, attrs);
L
Linus Torvalds 已提交
335 336 337 338 339 340 341 342 343 344 345

	return x;

error:
	x->km.state = XFRM_STATE_DEAD;
	xfrm_state_put(x);
error_no_put:
	*errp = err;
	return NULL;
}

346
static int xfrm_add_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
347
		struct nlattr **attrs)
L
Linus Torvalds 已提交
348
{
349
	struct xfrm_usersa_info *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
350 351
	struct xfrm_state *x;
	int err;
352
	struct km_event c;
L
Linus Torvalds 已提交
353

354
	err = verify_newsa_info(p, attrs);
L
Linus Torvalds 已提交
355 356 357
	if (err)
		return err;

358
	x = xfrm_state_construct(p, attrs, &err);
L
Linus Torvalds 已提交
359 360 361
	if (!x)
		return err;

362
	xfrm_state_hold(x);
L
Linus Torvalds 已提交
363 364 365 366 367
	if (nlh->nlmsg_type == XFRM_MSG_NEWSA)
		err = xfrm_state_add(x);
	else
		err = xfrm_state_update(x);

J
Joy Latten 已提交
368 369
	xfrm_audit_state_add(x, err ? 0 : 1, NETLINK_CB(skb).loginuid,
			     NETLINK_CB(skb).sid);
J
Joy Latten 已提交
370

L
Linus Torvalds 已提交
371 372
	if (err < 0) {
		x->km.state = XFRM_STATE_DEAD;
373
		__xfrm_state_put(x);
374
		goto out;
L
Linus Torvalds 已提交
375 376
	}

377 378
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
379
	c.event = nlh->nlmsg_type;
380 381

	km_state_notify(x, &c);
382
out:
383
	xfrm_state_put(x);
L
Linus Torvalds 已提交
384 385 386
	return err;
}

387
static struct xfrm_state *xfrm_user_state_lookup(struct xfrm_usersa_id *p,
388
						 struct nlattr **attrs,
389 390 391 392 393 394 395 396 397 398 399
						 int *errp)
{
	struct xfrm_state *x = NULL;
	int err;

	if (xfrm_id_proto_match(p->proto, IPSEC_PROTO_ANY)) {
		err = -ESRCH;
		x = xfrm_state_lookup(&p->daddr, p->spi, p->proto, p->family);
	} else {
		xfrm_address_t *saddr = NULL;

400
		verify_one_addr(attrs, XFRMA_SRCADDR, &saddr);
401 402 403 404 405
		if (!saddr) {
			err = -EINVAL;
			goto out;
		}

406
		err = -ESRCH;
407 408 409 410 411 412 413 414 415 416
		x = xfrm_state_lookup_byaddr(&p->daddr, saddr, p->proto,
					     p->family);
	}

 out:
	if (!x && errp)
		*errp = err;
	return x;
}

417
static int xfrm_del_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
418
		struct nlattr **attrs)
L
Linus Torvalds 已提交
419 420
{
	struct xfrm_state *x;
421
	int err = -ESRCH;
422
	struct km_event c;
423
	struct xfrm_usersa_id *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
424

425
	x = xfrm_user_state_lookup(p, attrs, &err);
L
Linus Torvalds 已提交
426
	if (x == NULL)
427
		return err;
L
Linus Torvalds 已提交
428

429
	if ((err = security_xfrm_state_delete(x)) != 0)
C
Catherine Zhang 已提交
430 431
		goto out;

L
Linus Torvalds 已提交
432
	if (xfrm_state_kern(x)) {
C
Catherine Zhang 已提交
433 434
		err = -EPERM;
		goto out;
L
Linus Torvalds 已提交
435 436
	}

437
	err = xfrm_state_delete(x);
J
Joy Latten 已提交
438

C
Catherine Zhang 已提交
439 440
	if (err < 0)
		goto out;
441 442 443

	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
444
	c.event = nlh->nlmsg_type;
445
	km_state_notify(x, &c);
L
Linus Torvalds 已提交
446

C
Catherine Zhang 已提交
447
out:
J
Joy Latten 已提交
448 449
	xfrm_audit_state_delete(x, err ? 0 : 1, NETLINK_CB(skb).loginuid,
				NETLINK_CB(skb).sid);
C
Catherine Zhang 已提交
450
	xfrm_state_put(x);
451
	return err;
L
Linus Torvalds 已提交
452 453 454 455 456 457 458 459 460
}

static void copy_to_user_state(struct xfrm_state *x, struct xfrm_usersa_info *p)
{
	memcpy(&p->id, &x->id, sizeof(p->id));
	memcpy(&p->sel, &x->sel, sizeof(p->sel));
	memcpy(&p->lft, &x->lft, sizeof(p->lft));
	memcpy(&p->curlft, &x->curlft, sizeof(p->curlft));
	memcpy(&p->stats, &x->stats, sizeof(p->stats));
461
	memcpy(&p->saddr, &x->props.saddr, sizeof(p->saddr));
L
Linus Torvalds 已提交
462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478
	p->mode = x->props.mode;
	p->replay_window = x->props.replay_window;
	p->reqid = x->props.reqid;
	p->family = x->props.family;
	p->flags = x->props.flags;
	p->seq = x->km.seq;
}

struct xfrm_dump_info {
	struct sk_buff *in_skb;
	struct sk_buff *out_skb;
	u32 nlmsg_seq;
	u16 nlmsg_flags;
	int start_idx;
	int this_idx;
};

479 480 481 482
static int copy_sec_ctx(struct xfrm_sec_ctx *s, struct sk_buff *skb)
{
	struct xfrm_user_sec_ctx *uctx;
	struct nlattr *attr;
483
	int ctx_size = sizeof(*uctx) + s->ctx_len;
484 485 486 487 488 489 490 491 492 493 494 495 496 497 498 499

	attr = nla_reserve(skb, XFRMA_SEC_CTX, ctx_size);
	if (attr == NULL)
		return -EMSGSIZE;

	uctx = nla_data(attr);
	uctx->exttype = XFRMA_SEC_CTX;
	uctx->len = ctx_size;
	uctx->ctx_doi = s->ctx_doi;
	uctx->ctx_alg = s->ctx_alg;
	uctx->ctx_len = s->ctx_len;
	memcpy(uctx + 1, s->ctx_str, s->ctx_len);

	return 0;
}

500 501 502 503
/* Don't change this without updating xfrm_sa_len! */
static int copy_to_user_state_extra(struct xfrm_state *x,
				    struct xfrm_usersa_info *p,
				    struct sk_buff *skb)
L
Linus Torvalds 已提交
504 505 506
{
	copy_to_user_state(x, p);

507 508 509 510 511 512
	if (x->coaddr)
		NLA_PUT(skb, XFRMA_COADDR, sizeof(*x->coaddr), x->coaddr);

	if (x->lastused)
		NLA_PUT_U64(skb, XFRMA_LASTUSED, x->lastused);

L
Linus Torvalds 已提交
513
	if (x->aalg)
514
		NLA_PUT(skb, XFRMA_ALG_AUTH, xfrm_alg_len(x->aalg), x->aalg);
L
Linus Torvalds 已提交
515
	if (x->ealg)
516
		NLA_PUT(skb, XFRMA_ALG_CRYPT, xfrm_alg_len(x->ealg), x->ealg);
L
Linus Torvalds 已提交
517
	if (x->calg)
518
		NLA_PUT(skb, XFRMA_ALG_COMP, sizeof(*(x->calg)), x->calg);
L
Linus Torvalds 已提交
519 520

	if (x->encap)
521
		NLA_PUT(skb, XFRMA_ENCAP, sizeof(*x->encap), x->encap);
L
Linus Torvalds 已提交
522

523 524
	if (x->security && copy_sec_ctx(x->security, skb) < 0)
		goto nla_put_failure;
525

526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554
	return 0;

nla_put_failure:
	return -EMSGSIZE;
}

static int dump_one_state(struct xfrm_state *x, int count, void *ptr)
{
	struct xfrm_dump_info *sp = ptr;
	struct sk_buff *in_skb = sp->in_skb;
	struct sk_buff *skb = sp->out_skb;
	struct xfrm_usersa_info *p;
	struct nlmsghdr *nlh;
	int err;

	if (sp->this_idx < sp->start_idx)
		goto out;

	nlh = nlmsg_put(skb, NETLINK_CB(in_skb).pid, sp->nlmsg_seq,
			XFRM_MSG_NEWSA, sizeof(*p), sp->nlmsg_flags);
	if (nlh == NULL)
		return -EMSGSIZE;

	p = nlmsg_data(nlh);

	err = copy_to_user_state_extra(x, p, skb);
	if (err)
		goto nla_put_failure;

555
	nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
556 557 558 559
out:
	sp->this_idx++;
	return 0;

560
nla_put_failure:
561
	nlmsg_cancel(skb, nlh);
562
	return err;
L
Linus Torvalds 已提交
563 564 565 566 567 568 569 570 571 572 573 574
}

static int xfrm_dump_sa(struct sk_buff *skb, struct netlink_callback *cb)
{
	struct xfrm_dump_info info;

	info.in_skb = cb->skb;
	info.out_skb = skb;
	info.nlmsg_seq = cb->nlh->nlmsg_seq;
	info.nlmsg_flags = NLM_F_MULTI;
	info.this_idx = 0;
	info.start_idx = cb->args[0];
575
	(void) xfrm_state_walk(0, dump_one_state, &info);
L
Linus Torvalds 已提交
576 577 578 579 580 581 582 583 584 585 586
	cb->args[0] = info.this_idx;

	return skb->len;
}

static struct sk_buff *xfrm_state_netlink(struct sk_buff *in_skb,
					  struct xfrm_state *x, u32 seq)
{
	struct xfrm_dump_info info;
	struct sk_buff *skb;

587
	skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
L
Linus Torvalds 已提交
588 589 590 591 592 593 594 595 596 597 598 599 600 601 602 603 604
	if (!skb)
		return ERR_PTR(-ENOMEM);

	info.in_skb = in_skb;
	info.out_skb = skb;
	info.nlmsg_seq = seq;
	info.nlmsg_flags = 0;
	info.this_idx = info.start_idx = 0;

	if (dump_one_state(x, 0, &info)) {
		kfree_skb(skb);
		return NULL;
	}

	return skb;
}

605 606 607 608 609 610 611
static inline size_t xfrm_spdinfo_msgsize(void)
{
	return NLMSG_ALIGN(4)
	       + nla_total_size(sizeof(struct xfrmu_spdinfo))
	       + nla_total_size(sizeof(struct xfrmu_spdhinfo));
}

J
Jamal Hadi Salim 已提交
612 613
static int build_spdinfo(struct sk_buff *skb, u32 pid, u32 seq, u32 flags)
{
614 615 616
	struct xfrmk_spdinfo si;
	struct xfrmu_spdinfo spc;
	struct xfrmu_spdhinfo sph;
J
Jamal Hadi Salim 已提交
617 618 619 620 621 622 623 624 625 626
	struct nlmsghdr *nlh;
	u32 *f;

	nlh = nlmsg_put(skb, pid, seq, XFRM_MSG_NEWSPDINFO, sizeof(u32), 0);
	if (nlh == NULL) /* shouldnt really happen ... */
		return -EMSGSIZE;

	f = nlmsg_data(nlh);
	*f = flags;
	xfrm_spd_getinfo(&si);
627 628 629 630 631 632 633 634 635 636 637
	spc.incnt = si.incnt;
	spc.outcnt = si.outcnt;
	spc.fwdcnt = si.fwdcnt;
	spc.inscnt = si.inscnt;
	spc.outscnt = si.outscnt;
	spc.fwdscnt = si.fwdscnt;
	sph.spdhcnt = si.spdhcnt;
	sph.spdhmcnt = si.spdhmcnt;

	NLA_PUT(skb, XFRMA_SPD_INFO, sizeof(spc), &spc);
	NLA_PUT(skb, XFRMA_SPD_HINFO, sizeof(sph), &sph);
J
Jamal Hadi Salim 已提交
638 639 640 641 642 643 644 645 646

	return nlmsg_end(skb, nlh);

nla_put_failure:
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
}

static int xfrm_get_spdinfo(struct sk_buff *skb, struct nlmsghdr *nlh,
647
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
648 649
{
	struct sk_buff *r_skb;
650
	u32 *flags = nlmsg_data(nlh);
J
Jamal Hadi Salim 已提交
651 652 653
	u32 spid = NETLINK_CB(skb).pid;
	u32 seq = nlh->nlmsg_seq;

654
	r_skb = nlmsg_new(xfrm_spdinfo_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
655 656 657 658 659 660 661 662 663
	if (r_skb == NULL)
		return -ENOMEM;

	if (build_spdinfo(r_skb, spid, seq, *flags) < 0)
		BUG();

	return nlmsg_unicast(xfrm_nl, r_skb, spid);
}

664 665 666 667 668 669 670
static inline size_t xfrm_sadinfo_msgsize(void)
{
	return NLMSG_ALIGN(4)
	       + nla_total_size(sizeof(struct xfrmu_sadhinfo))
	       + nla_total_size(4); /* XFRMA_SAD_CNT */
}

J
Jamal Hadi Salim 已提交
671 672
static int build_sadinfo(struct sk_buff *skb, u32 pid, u32 seq, u32 flags)
{
673 674
	struct xfrmk_sadinfo si;
	struct xfrmu_sadhinfo sh;
J
Jamal Hadi Salim 已提交
675 676 677 678 679 680 681 682 683 684 685
	struct nlmsghdr *nlh;
	u32 *f;

	nlh = nlmsg_put(skb, pid, seq, XFRM_MSG_NEWSADINFO, sizeof(u32), 0);
	if (nlh == NULL) /* shouldnt really happen ... */
		return -EMSGSIZE;

	f = nlmsg_data(nlh);
	*f = flags;
	xfrm_sad_getinfo(&si);

686 687 688 689 690
	sh.sadhmcnt = si.sadhmcnt;
	sh.sadhcnt = si.sadhcnt;

	NLA_PUT_U32(skb, XFRMA_SAD_CNT, si.sadcnt);
	NLA_PUT(skb, XFRMA_SAD_HINFO, sizeof(sh), &sh);
J
Jamal Hadi Salim 已提交
691 692 693 694 695 696 697 698 699

	return nlmsg_end(skb, nlh);

nla_put_failure:
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
}

static int xfrm_get_sadinfo(struct sk_buff *skb, struct nlmsghdr *nlh,
700
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
701 702
{
	struct sk_buff *r_skb;
703
	u32 *flags = nlmsg_data(nlh);
J
Jamal Hadi Salim 已提交
704 705 706
	u32 spid = NETLINK_CB(skb).pid;
	u32 seq = nlh->nlmsg_seq;

707
	r_skb = nlmsg_new(xfrm_sadinfo_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
708 709 710 711 712 713 714 715 716
	if (r_skb == NULL)
		return -ENOMEM;

	if (build_sadinfo(r_skb, spid, seq, *flags) < 0)
		BUG();

	return nlmsg_unicast(xfrm_nl, r_skb, spid);
}

717
static int xfrm_get_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
718
		struct nlattr **attrs)
L
Linus Torvalds 已提交
719
{
720
	struct xfrm_usersa_id *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
721 722
	struct xfrm_state *x;
	struct sk_buff *resp_skb;
723
	int err = -ESRCH;
L
Linus Torvalds 已提交
724

725
	x = xfrm_user_state_lookup(p, attrs, &err);
L
Linus Torvalds 已提交
726 727 728 729 730 731 732
	if (x == NULL)
		goto out_noput;

	resp_skb = xfrm_state_netlink(skb, x, nlh->nlmsg_seq);
	if (IS_ERR(resp_skb)) {
		err = PTR_ERR(resp_skb);
	} else {
733
		err = nlmsg_unicast(xfrm_nl, resp_skb, NETLINK_CB(skb).pid);
L
Linus Torvalds 已提交
734 735 736 737 738 739 740 741 742 743 744 745 746 747 748 749 750 751 752 753 754
	}
	xfrm_state_put(x);
out_noput:
	return err;
}

static int verify_userspi_info(struct xfrm_userspi_info *p)
{
	switch (p->info.id.proto) {
	case IPPROTO_AH:
	case IPPROTO_ESP:
		break;

	case IPPROTO_COMP:
		/* IPCOMP spi is 16-bits. */
		if (p->max >= 0x10000)
			return -EINVAL;
		break;

	default:
		return -EINVAL;
755
	}
L
Linus Torvalds 已提交
756 757 758 759 760 761 762

	if (p->min > p->max)
		return -EINVAL;

	return 0;
}

763
static int xfrm_alloc_userspi(struct sk_buff *skb, struct nlmsghdr *nlh,
764
		struct nlattr **attrs)
L
Linus Torvalds 已提交
765 766 767 768 769 770 771 772
{
	struct xfrm_state *x;
	struct xfrm_userspi_info *p;
	struct sk_buff *resp_skb;
	xfrm_address_t *daddr;
	int family;
	int err;

773
	p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
774 775 776 777 778 779 780 781 782 783 784 785 786 787 788 789 790 791 792 793 794 795 796 797 798
	err = verify_userspi_info(p);
	if (err)
		goto out_noput;

	family = p->info.family;
	daddr = &p->info.id.daddr;

	x = NULL;
	if (p->info.seq) {
		x = xfrm_find_acq_byseq(p->info.seq);
		if (x && xfrm_addr_cmp(&x->id.daddr, daddr, family)) {
			xfrm_state_put(x);
			x = NULL;
		}
	}

	if (!x)
		x = xfrm_find_acq(p->info.mode, p->info.reqid,
				  p->info.id.proto, daddr,
				  &p->info.saddr, 1,
				  family);
	err = -ENOENT;
	if (x == NULL)
		goto out_noput;

799 800 801
	err = xfrm_alloc_spi(x, p->min, p->max);
	if (err)
		goto out;
L
Linus Torvalds 已提交
802

803
	resp_skb = xfrm_state_netlink(skb, x, nlh->nlmsg_seq);
L
Linus Torvalds 已提交
804 805 806 807 808
	if (IS_ERR(resp_skb)) {
		err = PTR_ERR(resp_skb);
		goto out;
	}

809
	err = nlmsg_unicast(xfrm_nl, resp_skb, NETLINK_CB(skb).pid);
L
Linus Torvalds 已提交
810 811 812 813 814 815 816

out:
	xfrm_state_put(x);
out_noput:
	return err;
}

817
static int verify_policy_dir(u8 dir)
L
Linus Torvalds 已提交
818 819 820 821 822 823 824 825 826
{
	switch (dir) {
	case XFRM_POLICY_IN:
	case XFRM_POLICY_OUT:
	case XFRM_POLICY_FWD:
		break;

	default:
		return -EINVAL;
827
	}
L
Linus Torvalds 已提交
828 829 830 831

	return 0;
}

832
static int verify_policy_type(u8 type)
833 834 835 836 837 838 839 840 841 842
{
	switch (type) {
	case XFRM_POLICY_TYPE_MAIN:
#ifdef CONFIG_XFRM_SUB_POLICY
	case XFRM_POLICY_TYPE_SUB:
#endif
		break;

	default:
		return -EINVAL;
843
	}
844 845 846 847

	return 0;
}

L
Linus Torvalds 已提交
848 849 850 851 852 853 854 855 856 857 858
static int verify_newpolicy_info(struct xfrm_userpolicy_info *p)
{
	switch (p->share) {
	case XFRM_SHARE_ANY:
	case XFRM_SHARE_SESSION:
	case XFRM_SHARE_USER:
	case XFRM_SHARE_UNIQUE:
		break;

	default:
		return -EINVAL;
859
	}
L
Linus Torvalds 已提交
860 861 862 863 864 865 866 867

	switch (p->action) {
	case XFRM_POLICY_ALLOW:
	case XFRM_POLICY_BLOCK:
		break;

	default:
		return -EINVAL;
868
	}
L
Linus Torvalds 已提交
869 870 871 872 873 874 875 876 877 878 879 880 881 882

	switch (p->sel.family) {
	case AF_INET:
		break;

	case AF_INET6:
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
		break;
#else
		return  -EAFNOSUPPORT;
#endif

	default:
		return -EINVAL;
883
	}
L
Linus Torvalds 已提交
884 885 886 887

	return verify_policy_dir(p->dir);
}

888
static int copy_from_user_sec_ctx(struct xfrm_policy *pol, struct nlattr **attrs)
889
{
890
	struct nlattr *rt = attrs[XFRMA_SEC_CTX];
891 892 893 894 895
	struct xfrm_user_sec_ctx *uctx;

	if (!rt)
		return 0;

896
	uctx = nla_data(rt);
897 898 899
	return security_xfrm_policy_alloc(pol, uctx);
}

L
Linus Torvalds 已提交
900 901 902 903 904 905 906 907 908 909 910 911 912 913 914 915 916 917 918
static void copy_templates(struct xfrm_policy *xp, struct xfrm_user_tmpl *ut,
			   int nr)
{
	int i;

	xp->xfrm_nr = nr;
	for (i = 0; i < nr; i++, ut++) {
		struct xfrm_tmpl *t = &xp->xfrm_vec[i];

		memcpy(&t->id, &ut->id, sizeof(struct xfrm_id));
		memcpy(&t->saddr, &ut->saddr,
		       sizeof(xfrm_address_t));
		t->reqid = ut->reqid;
		t->mode = ut->mode;
		t->share = ut->share;
		t->optional = ut->optional;
		t->aalgos = ut->aalgos;
		t->ealgos = ut->ealgos;
		t->calgos = ut->calgos;
919
		t->encap_family = ut->family;
L
Linus Torvalds 已提交
920 921 922
	}
}

923 924 925 926 927 928 929 930 931 932 933 934 935 936 937 938 939 940 941 942 943 944 945 946 947 948 949
static int validate_tmpl(int nr, struct xfrm_user_tmpl *ut, u16 family)
{
	int i;

	if (nr > XFRM_MAX_DEPTH)
		return -EINVAL;

	for (i = 0; i < nr; i++) {
		/* We never validated the ut->family value, so many
		 * applications simply leave it at zero.  The check was
		 * never made and ut->family was ignored because all
		 * templates could be assumed to have the same family as
		 * the policy itself.  Now that we will have ipv4-in-ipv6
		 * and ipv6-in-ipv4 tunnels, this is no longer true.
		 */
		if (!ut[i].family)
			ut[i].family = family;

		switch (ut[i].family) {
		case AF_INET:
			break;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
		case AF_INET6:
			break;
#endif
		default:
			return -EINVAL;
950
		}
951 952 953 954 955
	}

	return 0;
}

956
static int copy_from_user_tmpl(struct xfrm_policy *pol, struct nlattr **attrs)
L
Linus Torvalds 已提交
957
{
958
	struct nlattr *rt = attrs[XFRMA_TMPL];
L
Linus Torvalds 已提交
959 960 961 962

	if (!rt) {
		pol->xfrm_nr = 0;
	} else {
963 964
		struct xfrm_user_tmpl *utmpl = nla_data(rt);
		int nr = nla_len(rt) / sizeof(*utmpl);
965
		int err;
L
Linus Torvalds 已提交
966

967 968 969
		err = validate_tmpl(nr, utmpl, pol->family);
		if (err)
			return err;
L
Linus Torvalds 已提交
970

971
		copy_templates(pol, utmpl, nr);
L
Linus Torvalds 已提交
972 973 974 975
	}
	return 0;
}

976
static int copy_from_user_policy_type(u8 *tp, struct nlattr **attrs)
977
{
978
	struct nlattr *rt = attrs[XFRMA_POLICY_TYPE];
979
	struct xfrm_userpolicy_type *upt;
980
	u8 type = XFRM_POLICY_TYPE_MAIN;
981 982 983
	int err;

	if (rt) {
984
		upt = nla_data(rt);
985 986 987 988 989 990 991 992 993 994 995
		type = upt->type;
	}

	err = verify_policy_type(type);
	if (err)
		return err;

	*tp = type;
	return 0;
}

L
Linus Torvalds 已提交
996 997 998 999 1000 1001 1002 1003 1004 1005 1006 1007 1008 1009 1010 1011 1012 1013 1014 1015 1016 1017 1018 1019 1020 1021
static void copy_from_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p)
{
	xp->priority = p->priority;
	xp->index = p->index;
	memcpy(&xp->selector, &p->sel, sizeof(xp->selector));
	memcpy(&xp->lft, &p->lft, sizeof(xp->lft));
	xp->action = p->action;
	xp->flags = p->flags;
	xp->family = p->sel.family;
	/* XXX xp->share = p->share; */
}

static void copy_to_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p, int dir)
{
	memcpy(&p->sel, &xp->selector, sizeof(p->sel));
	memcpy(&p->lft, &xp->lft, sizeof(p->lft));
	memcpy(&p->curlft, &xp->curlft, sizeof(p->curlft));
	p->priority = xp->priority;
	p->index = xp->index;
	p->sel.family = xp->family;
	p->dir = dir;
	p->action = xp->action;
	p->flags = xp->flags;
	p->share = XFRM_SHARE_ANY; /* XXX xp->share */
}

1022
static struct xfrm_policy *xfrm_policy_construct(struct xfrm_userpolicy_info *p, struct nlattr **attrs, int *errp)
L
Linus Torvalds 已提交
1023 1024 1025 1026 1027 1028 1029 1030 1031 1032
{
	struct xfrm_policy *xp = xfrm_policy_alloc(GFP_KERNEL);
	int err;

	if (!xp) {
		*errp = -ENOMEM;
		return NULL;
	}

	copy_from_user_policy(xp, p);
1033

1034
	err = copy_from_user_policy_type(&xp->type, attrs);
1035 1036 1037
	if (err)
		goto error;

1038 1039
	if (!(err = copy_from_user_tmpl(xp, attrs)))
		err = copy_from_user_sec_ctx(xp, attrs);
1040 1041
	if (err)
		goto error;
L
Linus Torvalds 已提交
1042 1043

	return xp;
1044 1045 1046 1047
 error:
	*errp = err;
	kfree(xp);
	return NULL;
L
Linus Torvalds 已提交
1048 1049
}

1050
static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1051
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1052
{
1053
	struct xfrm_userpolicy_info *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1054
	struct xfrm_policy *xp;
1055
	struct km_event c;
L
Linus Torvalds 已提交
1056 1057 1058 1059
	int err;
	int excl;

	err = verify_newpolicy_info(p);
1060 1061
	if (err)
		return err;
1062
	err = verify_sec_ctx_len(attrs);
L
Linus Torvalds 已提交
1063 1064 1065
	if (err)
		return err;

1066
	xp = xfrm_policy_construct(p, attrs, &err);
L
Linus Torvalds 已提交
1067 1068 1069
	if (!xp)
		return err;

1070 1071 1072 1073
	/* shouldnt excl be based on nlh flags??
	 * Aha! this is anti-netlink really i.e  more pfkey derived
	 * in netlink excl is a flag and you wouldnt need
	 * a type XFRM_MSG_UPDPOLICY - JHS */
L
Linus Torvalds 已提交
1074 1075
	excl = nlh->nlmsg_type == XFRM_MSG_NEWPOLICY;
	err = xfrm_policy_insert(p->dir, xp, excl);
J
Joy Latten 已提交
1076 1077
	xfrm_audit_policy_add(xp, err ? 0 : 1, NETLINK_CB(skb).loginuid,
			      NETLINK_CB(skb).sid);
J
Joy Latten 已提交
1078

L
Linus Torvalds 已提交
1079
	if (err) {
1080
		security_xfrm_policy_free(xp);
L
Linus Torvalds 已提交
1081 1082 1083 1084
		kfree(xp);
		return err;
	}

1085
	c.event = nlh->nlmsg_type;
1086 1087 1088 1089
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
	km_policy_notify(xp, p->dir, &c);

L
Linus Torvalds 已提交
1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1101 1102 1103 1104 1105 1106 1107
	xfrm_pol_put(xp);

	return 0;
}

static int copy_to_user_tmpl(struct xfrm_policy *xp, struct sk_buff *skb)
{
	struct xfrm_user_tmpl vec[XFRM_MAX_DEPTH];
	int i;

	if (xp->xfrm_nr == 0)
		return 0;

	for (i = 0; i < xp->xfrm_nr; i++) {
		struct xfrm_user_tmpl *up = &vec[i];
		struct xfrm_tmpl *kp = &xp->xfrm_vec[i];

		memcpy(&up->id, &kp->id, sizeof(up->id));
1108
		up->family = kp->encap_family;
L
Linus Torvalds 已提交
1109 1110 1111 1112 1113 1114 1115 1116 1117
		memcpy(&up->saddr, &kp->saddr, sizeof(up->saddr));
		up->reqid = kp->reqid;
		up->mode = kp->mode;
		up->share = kp->share;
		up->optional = kp->optional;
		up->aalgos = kp->aalgos;
		up->ealgos = kp->ealgos;
		up->calgos = kp->calgos;
	}
1118

1119 1120
	return nla_put(skb, XFRMA_TMPL,
		       sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr, vec);
1121 1122 1123 1124 1125 1126
}

static inline int copy_to_user_state_sec_ctx(struct xfrm_state *x, struct sk_buff *skb)
{
	if (x->security) {
		return copy_sec_ctx(x->security, skb);
1127 1128
	}
	return 0;
1129
}
1130

1131 1132 1133 1134 1135 1136
static inline int copy_to_user_sec_ctx(struct xfrm_policy *xp, struct sk_buff *skb)
{
	if (xp->security) {
		return copy_sec_ctx(xp->security, skb);
	}
	return 0;
1137
}
1138 1139 1140 1141 1142 1143 1144 1145
static inline size_t userpolicy_type_attrsize(void)
{
#ifdef CONFIG_XFRM_SUB_POLICY
	return nla_total_size(sizeof(struct xfrm_userpolicy_type));
#else
	return 0;
#endif
}
1146

1147
#ifdef CONFIG_XFRM_SUB_POLICY
1148
static int copy_to_user_policy_type(u8 type, struct sk_buff *skb)
1149
{
1150 1151 1152
	struct xfrm_userpolicy_type upt = {
		.type = type,
	};
1153

1154
	return nla_put(skb, XFRMA_POLICY_TYPE, sizeof(upt), &upt);
1155 1156 1157
}

#else
1158
static inline int copy_to_user_policy_type(u8 type, struct sk_buff *skb)
1159 1160 1161 1162 1163
{
	return 0;
}
#endif

L
Linus Torvalds 已提交
1164 1165 1166 1167 1168 1169 1170 1171 1172 1173 1174
static int dump_one_policy(struct xfrm_policy *xp, int dir, int count, void *ptr)
{
	struct xfrm_dump_info *sp = ptr;
	struct xfrm_userpolicy_info *p;
	struct sk_buff *in_skb = sp->in_skb;
	struct sk_buff *skb = sp->out_skb;
	struct nlmsghdr *nlh;

	if (sp->this_idx < sp->start_idx)
		goto out;

1175 1176 1177 1178
	nlh = nlmsg_put(skb, NETLINK_CB(in_skb).pid, sp->nlmsg_seq,
			XFRM_MSG_NEWPOLICY, sizeof(*p), sp->nlmsg_flags);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
1179

1180
	p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1181 1182 1183
	copy_to_user_policy(xp, p, dir);
	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
1184 1185
	if (copy_to_user_sec_ctx(xp, skb))
		goto nlmsg_failure;
1186
	if (copy_to_user_policy_type(xp->type, skb) < 0)
1187
		goto nlmsg_failure;
L
Linus Torvalds 已提交
1188

1189
	nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
1190 1191 1192 1193 1194
out:
	sp->this_idx++;
	return 0;

nlmsg_failure:
1195 1196
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
L
Linus Torvalds 已提交
1197 1198 1199 1200 1201 1202 1203 1204 1205 1206 1207 1208
}

static int xfrm_dump_policy(struct sk_buff *skb, struct netlink_callback *cb)
{
	struct xfrm_dump_info info;

	info.in_skb = cb->skb;
	info.out_skb = skb;
	info.nlmsg_seq = cb->nlh->nlmsg_seq;
	info.nlmsg_flags = NLM_F_MULTI;
	info.this_idx = 0;
	info.start_idx = cb->args[0];
1209 1210 1211 1212
	(void) xfrm_policy_walk(XFRM_POLICY_TYPE_MAIN, dump_one_policy, &info);
#ifdef CONFIG_XFRM_SUB_POLICY
	(void) xfrm_policy_walk(XFRM_POLICY_TYPE_SUB, dump_one_policy, &info);
#endif
L
Linus Torvalds 已提交
1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224
	cb->args[0] = info.this_idx;

	return skb->len;
}

static struct sk_buff *xfrm_policy_netlink(struct sk_buff *in_skb,
					  struct xfrm_policy *xp,
					  int dir, u32 seq)
{
	struct xfrm_dump_info info;
	struct sk_buff *skb;

1225
	skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
L
Linus Torvalds 已提交
1226 1227 1228 1229 1230 1231 1232 1233 1234 1235 1236 1237 1238 1239 1240 1241 1242
	if (!skb)
		return ERR_PTR(-ENOMEM);

	info.in_skb = in_skb;
	info.out_skb = skb;
	info.nlmsg_seq = seq;
	info.nlmsg_flags = 0;
	info.this_idx = info.start_idx = 0;

	if (dump_one_policy(xp, dir, 0, &info) < 0) {
		kfree_skb(skb);
		return NULL;
	}

	return skb;
}

1243
static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1244
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1245 1246 1247
{
	struct xfrm_policy *xp;
	struct xfrm_userpolicy_id *p;
1248
	u8 type = XFRM_POLICY_TYPE_MAIN;
L
Linus Torvalds 已提交
1249
	int err;
1250
	struct km_event c;
L
Linus Torvalds 已提交
1251 1252
	int delete;

1253
	p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1254 1255
	delete = nlh->nlmsg_type == XFRM_MSG_DELPOLICY;

1256
	err = copy_from_user_policy_type(&type, attrs);
1257 1258 1259
	if (err)
		return err;

L
Linus Torvalds 已提交
1260 1261 1262 1263 1264
	err = verify_policy_dir(p->dir);
	if (err)
		return err;

	if (p->index)
1265
		xp = xfrm_policy_byid(type, p->dir, p->index, delete, &err);
1266
	else {
1267
		struct nlattr *rt = attrs[XFRMA_SEC_CTX];
1268 1269
		struct xfrm_policy tmp;

1270
		err = verify_sec_ctx_len(attrs);
1271 1272 1273 1274 1275
		if (err)
			return err;

		memset(&tmp, 0, sizeof(struct xfrm_policy));
		if (rt) {
1276
			struct xfrm_user_sec_ctx *uctx = nla_data(rt);
1277 1278 1279 1280

			if ((err = security_xfrm_policy_alloc(&tmp, uctx)))
				return err;
		}
1281 1282
		xp = xfrm_policy_bysel_ctx(type, p->dir, &p->sel, tmp.security,
					   delete, &err);
1283 1284
		security_xfrm_policy_free(&tmp);
	}
L
Linus Torvalds 已提交
1285 1286 1287 1288 1289 1290 1291 1292 1293 1294
	if (xp == NULL)
		return -ENOENT;

	if (!delete) {
		struct sk_buff *resp_skb;

		resp_skb = xfrm_policy_netlink(skb, xp, p->dir, nlh->nlmsg_seq);
		if (IS_ERR(resp_skb)) {
			err = PTR_ERR(resp_skb);
		} else {
1295 1296
			err = nlmsg_unicast(xfrm_nl, resp_skb,
					    NETLINK_CB(skb).pid);
L
Linus Torvalds 已提交
1297
		}
1298
	} else {
J
Joy Latten 已提交
1299 1300 1301
		xfrm_audit_policy_delete(xp, err ? 0 : 1,
					 NETLINK_CB(skb).loginuid,
					 NETLINK_CB(skb).sid);
1302 1303

		if (err != 0)
C
Catherine Zhang 已提交
1304
			goto out;
1305

1306
		c.data.byid = p->index;
1307
		c.event = nlh->nlmsg_type;
1308 1309 1310
		c.seq = nlh->nlmsg_seq;
		c.pid = nlh->nlmsg_pid;
		km_policy_notify(xp, p->dir, &c);
L
Linus Torvalds 已提交
1311 1312
	}

C
Catherine Zhang 已提交
1313
out:
1314
	xfrm_pol_put(xp);
L
Linus Torvalds 已提交
1315 1316 1317
	return err;
}

1318
static int xfrm_flush_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
1319
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1320
{
1321
	struct km_event c;
1322
	struct xfrm_usersa_flush *p = nlmsg_data(nlh);
J
Joy Latten 已提交
1323
	struct xfrm_audit audit_info;
1324
	int err;
L
Linus Torvalds 已提交
1325

J
Joy Latten 已提交
1326 1327
	audit_info.loginuid = NETLINK_CB(skb).loginuid;
	audit_info.secid = NETLINK_CB(skb).sid;
1328 1329 1330
	err = xfrm_state_flush(p->proto, &audit_info);
	if (err)
		return err;
1331
	c.data.proto = p->proto;
1332
	c.event = nlh->nlmsg_type;
1333 1334 1335 1336
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
	km_state_notify(NULL, &c);

L
Linus Torvalds 已提交
1337 1338 1339
	return 0;
}

1340 1341 1342 1343 1344 1345 1346 1347
static inline size_t xfrm_aevent_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_aevent_id))
	       + nla_total_size(sizeof(struct xfrm_replay_state))
	       + nla_total_size(sizeof(struct xfrm_lifetime_cur))
	       + nla_total_size(4) /* XFRM_AE_RTHR */
	       + nla_total_size(4); /* XFRM_AE_ETHR */
}
J
Jamal Hadi Salim 已提交
1348 1349 1350 1351 1352 1353

static int build_aevent(struct sk_buff *skb, struct xfrm_state *x, struct km_event *c)
{
	struct xfrm_aevent_id *id;
	struct nlmsghdr *nlh;

1354 1355 1356
	nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_NEWAE, sizeof(*id), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
J
Jamal Hadi Salim 已提交
1357

1358
	id = nlmsg_data(nlh);
1359
	memcpy(&id->sa_id.daddr, &x->id.daddr,sizeof(x->id.daddr));
J
Jamal Hadi Salim 已提交
1360 1361 1362
	id->sa_id.spi = x->id.spi;
	id->sa_id.family = x->props.family;
	id->sa_id.proto = x->id.proto;
1363 1364
	memcpy(&id->saddr, &x->props.saddr,sizeof(x->props.saddr));
	id->reqid = x->props.reqid;
J
Jamal Hadi Salim 已提交
1365 1366
	id->flags = c->data.aevent;

1367 1368
	NLA_PUT(skb, XFRMA_REPLAY_VAL, sizeof(x->replay), &x->replay);
	NLA_PUT(skb, XFRMA_LTIME_VAL, sizeof(x->curlft), &x->curlft);
J
Jamal Hadi Salim 已提交
1369

1370 1371
	if (id->flags & XFRM_AE_RTHR)
		NLA_PUT_U32(skb, XFRMA_REPLAY_THRESH, x->replay_maxdiff);
J
Jamal Hadi Salim 已提交
1372

1373 1374 1375
	if (id->flags & XFRM_AE_ETHR)
		NLA_PUT_U32(skb, XFRMA_ETIMER_THRESH,
			    x->replay_maxage * 10 / HZ);
J
Jamal Hadi Salim 已提交
1376

1377
	return nlmsg_end(skb, nlh);
J
Jamal Hadi Salim 已提交
1378

1379
nla_put_failure:
1380 1381
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
J
Jamal Hadi Salim 已提交
1382 1383
}

1384
static int xfrm_get_ae(struct sk_buff *skb, struct nlmsghdr *nlh,
1385
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
1386 1387 1388 1389 1390
{
	struct xfrm_state *x;
	struct sk_buff *r_skb;
	int err;
	struct km_event c;
1391
	struct xfrm_aevent_id *p = nlmsg_data(nlh);
J
Jamal Hadi Salim 已提交
1392 1393
	struct xfrm_usersa_id *id = &p->sa_id;

1394
	r_skb = nlmsg_new(xfrm_aevent_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
1395 1396 1397 1398 1399
	if (r_skb == NULL)
		return -ENOMEM;

	x = xfrm_state_lookup(&id->daddr, id->spi, id->proto, id->family);
	if (x == NULL) {
P
Patrick McHardy 已提交
1400
		kfree_skb(r_skb);
J
Jamal Hadi Salim 已提交
1401 1402 1403 1404 1405 1406 1407 1408 1409 1410 1411 1412 1413 1414 1415
		return -ESRCH;
	}

	/*
	 * XXX: is this lock really needed - none of the other
	 * gets lock (the concern is things getting updated
	 * while we are still reading) - jhs
	*/
	spin_lock_bh(&x->lock);
	c.data.aevent = p->flags;
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;

	if (build_aevent(r_skb, x, &c) < 0)
		BUG();
1416
	err = nlmsg_unicast(xfrm_nl, r_skb, NETLINK_CB(skb).pid);
J
Jamal Hadi Salim 已提交
1417 1418 1419 1420 1421
	spin_unlock_bh(&x->lock);
	xfrm_state_put(x);
	return err;
}

1422
static int xfrm_new_ae(struct sk_buff *skb, struct nlmsghdr *nlh,
1423
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
1424 1425 1426 1427
{
	struct xfrm_state *x;
	struct km_event c;
	int err = - EINVAL;
1428
	struct xfrm_aevent_id *p = nlmsg_data(nlh);
1429 1430
	struct nlattr *rp = attrs[XFRMA_REPLAY_VAL];
	struct nlattr *lt = attrs[XFRMA_LTIME_VAL];
J
Jamal Hadi Salim 已提交
1431 1432 1433 1434 1435 1436 1437 1438 1439 1440 1441 1442 1443 1444 1445 1446

	if (!lt && !rp)
		return err;

	/* pedantic mode - thou shalt sayeth replaceth */
	if (!(nlh->nlmsg_flags&NLM_F_REPLACE))
		return err;

	x = xfrm_state_lookup(&p->sa_id.daddr, p->sa_id.spi, p->sa_id.proto, p->sa_id.family);
	if (x == NULL)
		return -ESRCH;

	if (x->km.state != XFRM_STATE_VALID)
		goto out;

	spin_lock_bh(&x->lock);
1447
	xfrm_update_ae_params(x, attrs);
J
Jamal Hadi Salim 已提交
1448 1449 1450 1451 1452 1453 1454 1455 1456 1457 1458 1459 1460
	spin_unlock_bh(&x->lock);

	c.event = nlh->nlmsg_type;
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
	c.data.aevent = XFRM_AE_CU;
	km_state_notify(x, &c);
	err = 0;
out:
	xfrm_state_put(x);
	return err;
}

1461
static int xfrm_flush_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1462
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1463
{
1464
	struct km_event c;
1465
	u8 type = XFRM_POLICY_TYPE_MAIN;
1466
	int err;
J
Joy Latten 已提交
1467
	struct xfrm_audit audit_info;
1468

1469
	err = copy_from_user_policy_type(&type, attrs);
1470 1471
	if (err)
		return err;
1472

J
Joy Latten 已提交
1473 1474
	audit_info.loginuid = NETLINK_CB(skb).loginuid;
	audit_info.secid = NETLINK_CB(skb).sid;
1475 1476 1477
	err = xfrm_policy_flush(type, &audit_info);
	if (err)
		return err;
1478
	c.data.type = type;
1479
	c.event = nlh->nlmsg_type;
1480 1481 1482
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
	km_policy_notify(NULL, 0, &c);
L
Linus Torvalds 已提交
1483 1484 1485
	return 0;
}

1486
static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
1487
		struct nlattr **attrs)
1488 1489
{
	struct xfrm_policy *xp;
1490
	struct xfrm_user_polexpire *up = nlmsg_data(nlh);
1491
	struct xfrm_userpolicy_info *p = &up->pol;
1492
	u8 type = XFRM_POLICY_TYPE_MAIN;
1493 1494
	int err = -ENOENT;

1495
	err = copy_from_user_policy_type(&type, attrs);
1496 1497 1498
	if (err)
		return err;

1499
	if (p->index)
1500
		xp = xfrm_policy_byid(type, p->dir, p->index, 0, &err);
1501
	else {
1502
		struct nlattr *rt = attrs[XFRMA_SEC_CTX];
1503 1504
		struct xfrm_policy tmp;

1505
		err = verify_sec_ctx_len(attrs);
1506 1507 1508 1509 1510
		if (err)
			return err;

		memset(&tmp, 0, sizeof(struct xfrm_policy));
		if (rt) {
1511
			struct xfrm_user_sec_ctx *uctx = nla_data(rt);
1512 1513 1514 1515

			if ((err = security_xfrm_policy_alloc(&tmp, uctx)))
				return err;
		}
1516 1517
		xp = xfrm_policy_bysel_ctx(type, p->dir, &p->sel, tmp.security,
					   0, &err);
1518 1519 1520 1521
		security_xfrm_policy_free(&tmp);
	}

	if (xp == NULL)
1522 1523
		return -ENOENT;
	read_lock(&xp->lock);
1524 1525 1526 1527 1528 1529 1530 1531 1532
	if (xp->dead) {
		read_unlock(&xp->lock);
		goto out;
	}

	read_unlock(&xp->lock);
	err = 0;
	if (up->hard) {
		xfrm_policy_delete(xp, p->dir);
J
Joy Latten 已提交
1533 1534
		xfrm_audit_policy_delete(xp, 1, NETLINK_CB(skb).loginuid,
					 NETLINK_CB(skb).sid);
J
Joy Latten 已提交
1535

1536 1537 1538 1539 1540 1541 1542 1543 1544 1545 1546
	} else {
		// reset the timers here?
		printk("Dont know what to do with soft policy expire\n");
	}
	km_policy_expired(xp, p->dir, up->hard, current->pid);

out:
	xfrm_pol_put(xp);
	return err;
}

1547
static int xfrm_add_sa_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
1548
		struct nlattr **attrs)
1549 1550 1551
{
	struct xfrm_state *x;
	int err;
1552
	struct xfrm_user_expire *ue = nlmsg_data(nlh);
1553 1554 1555 1556
	struct xfrm_usersa_info *p = &ue->state;

	x = xfrm_state_lookup(&p->id.daddr, p->id.spi, p->id.proto, p->family);

1557
	err = -ENOENT;
1558 1559 1560 1561
	if (x == NULL)
		return err;

	spin_lock_bh(&x->lock);
1562
	err = -EINVAL;
1563 1564 1565 1566
	if (x->km.state != XFRM_STATE_VALID)
		goto out;
	km_state_expired(x, ue->hard, current->pid);

J
Joy Latten 已提交
1567
	if (ue->hard) {
1568
		__xfrm_state_delete(x);
J
Joy Latten 已提交
1569 1570
		xfrm_audit_state_delete(x, 1, NETLINK_CB(skb).loginuid,
					NETLINK_CB(skb).sid);
J
Joy Latten 已提交
1571
	}
1572
	err = 0;
1573 1574 1575 1576 1577 1578
out:
	spin_unlock_bh(&x->lock);
	xfrm_state_put(x);
	return err;
}

1579
static int xfrm_add_acquire(struct sk_buff *skb, struct nlmsghdr *nlh,
1580
		struct nlattr **attrs)
1581 1582 1583 1584
{
	struct xfrm_policy *xp;
	struct xfrm_user_tmpl *ut;
	int i;
1585
	struct nlattr *rt = attrs[XFRMA_TMPL];
1586

1587
	struct xfrm_user_acquire *ua = nlmsg_data(nlh);
1588 1589 1590 1591 1592 1593 1594 1595 1596 1597 1598 1599 1600 1601
	struct xfrm_state *x = xfrm_state_alloc();
	int err = -ENOMEM;

	if (!x)
		return err;

	err = verify_newpolicy_info(&ua->policy);
	if (err) {
		printk("BAD policy passed\n");
		kfree(x);
		return err;
	}

	/*   build an XP */
1602
	xp = xfrm_policy_construct(&ua->policy, attrs, &err);
1603
	if (!xp) {
1604 1605 1606 1607 1608 1609 1610 1611
		kfree(x);
		return err;
	}

	memcpy(&x->id, &ua->id, sizeof(ua->id));
	memcpy(&x->props.saddr, &ua->saddr, sizeof(ua->saddr));
	memcpy(&x->sel, &ua->sel, sizeof(ua->sel));

1612
	ut = nla_data(rt);
1613 1614 1615 1616 1617 1618 1619 1620 1621 1622 1623 1624 1625 1626 1627 1628 1629 1630 1631 1632
	/* extract the templates and for each call km_key */
	for (i = 0; i < xp->xfrm_nr; i++, ut++) {
		struct xfrm_tmpl *t = &xp->xfrm_vec[i];
		memcpy(&x->id, &t->id, sizeof(x->id));
		x->props.mode = t->mode;
		x->props.reqid = t->reqid;
		x->props.family = ut->family;
		t->aalgos = ua->aalgos;
		t->ealgos = ua->ealgos;
		t->calgos = ua->calgos;
		err = km_query(x, t, xp);

	}

	kfree(x);
	kfree(xp);

	return 0;
}

1633 1634
#ifdef CONFIG_XFRM_MIGRATE
static int copy_from_user_migrate(struct xfrm_migrate *ma,
1635
				  struct nlattr **attrs, int *num)
1636
{
1637
	struct nlattr *rt = attrs[XFRMA_MIGRATE];
1638 1639 1640
	struct xfrm_user_migrate *um;
	int i, num_migrate;

1641 1642
	um = nla_data(rt);
	num_migrate = nla_len(rt) / sizeof(*um);
1643 1644 1645 1646 1647 1648 1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663 1664 1665

	if (num_migrate <= 0 || num_migrate > XFRM_MAX_DEPTH)
		return -EINVAL;

	for (i = 0; i < num_migrate; i++, um++, ma++) {
		memcpy(&ma->old_daddr, &um->old_daddr, sizeof(ma->old_daddr));
		memcpy(&ma->old_saddr, &um->old_saddr, sizeof(ma->old_saddr));
		memcpy(&ma->new_daddr, &um->new_daddr, sizeof(ma->new_daddr));
		memcpy(&ma->new_saddr, &um->new_saddr, sizeof(ma->new_saddr));

		ma->proto = um->proto;
		ma->mode = um->mode;
		ma->reqid = um->reqid;

		ma->old_family = um->old_family;
		ma->new_family = um->new_family;
	}

	*num = i;
	return 0;
}

static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh,
1666
			   struct nlattr **attrs)
1667
{
1668
	struct xfrm_userpolicy_id *pi = nlmsg_data(nlh);
1669 1670 1671 1672 1673
	struct xfrm_migrate m[XFRM_MAX_DEPTH];
	u8 type;
	int err;
	int n = 0;

1674
	if (attrs[XFRMA_MIGRATE] == NULL)
1675
		return -EINVAL;
1676

1677
	err = copy_from_user_policy_type(&type, attrs);
1678 1679 1680 1681
	if (err)
		return err;

	err = copy_from_user_migrate((struct xfrm_migrate *)m,
1682
				     attrs, &n);
1683 1684 1685 1686 1687 1688 1689 1690 1691 1692 1693 1694
	if (err)
		return err;

	if (!n)
		return 0;

	xfrm_migrate(&pi->sel, pi->dir, type, m, n);

	return 0;
}
#else
static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh,
1695
			   struct nlattr **attrs)
1696 1697 1698 1699 1700 1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713 1714 1715 1716
{
	return -ENOPROTOOPT;
}
#endif

#ifdef CONFIG_XFRM_MIGRATE
static int copy_to_user_migrate(struct xfrm_migrate *m, struct sk_buff *skb)
{
	struct xfrm_user_migrate um;

	memset(&um, 0, sizeof(um));
	um.proto = m->proto;
	um.mode = m->mode;
	um.reqid = m->reqid;
	um.old_family = m->old_family;
	memcpy(&um.old_daddr, &m->old_daddr, sizeof(um.old_daddr));
	memcpy(&um.old_saddr, &m->old_saddr, sizeof(um.old_saddr));
	um.new_family = m->new_family;
	memcpy(&um.new_daddr, &m->new_daddr, sizeof(um.new_daddr));
	memcpy(&um.new_saddr, &m->new_saddr, sizeof(um.new_saddr));

1717
	return nla_put(skb, XFRMA_MIGRATE, sizeof(um), &um);
1718 1719
}

1720 1721 1722 1723 1724 1725 1726
static inline size_t xfrm_migrate_msgsize(int num_migrate)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_userpolicy_id))
	       + nla_total_size(sizeof(struct xfrm_user_migrate) * num_migrate)
	       + userpolicy_type_attrsize();
}

1727 1728 1729 1730 1731 1732 1733 1734 1735
static int build_migrate(struct sk_buff *skb, struct xfrm_migrate *m,
			 int num_migrate, struct xfrm_selector *sel,
			 u8 dir, u8 type)
{
	struct xfrm_migrate *mp;
	struct xfrm_userpolicy_id *pol_id;
	struct nlmsghdr *nlh;
	int i;

1736 1737 1738
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_MIGRATE, sizeof(*pol_id), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
1739

1740
	pol_id = nlmsg_data(nlh);
1741 1742 1743 1744 1745 1746 1747 1748 1749 1750 1751 1752 1753
	/* copy data from selector, dir, and type to the pol_id */
	memset(pol_id, 0, sizeof(*pol_id));
	memcpy(&pol_id->sel, sel, sizeof(pol_id->sel));
	pol_id->dir = dir;

	if (copy_to_user_policy_type(type, skb) < 0)
		goto nlmsg_failure;

	for (i = 0, mp = m ; i < num_migrate; i++, mp++) {
		if (copy_to_user_migrate(mp, skb) < 0)
			goto nlmsg_failure;
	}

1754
	return nlmsg_end(skb, nlh);
1755
nlmsg_failure:
1756 1757
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
1758 1759 1760 1761 1762 1763 1764
}

static int xfrm_send_migrate(struct xfrm_selector *sel, u8 dir, u8 type,
			     struct xfrm_migrate *m, int num_migrate)
{
	struct sk_buff *skb;

1765
	skb = nlmsg_new(xfrm_migrate_msgsize(num_migrate), GFP_ATOMIC);
1766 1767 1768 1769 1770 1771 1772
	if (skb == NULL)
		return -ENOMEM;

	/* build migrate */
	if (build_migrate(skb, m, num_migrate, sel, dir, type) < 0)
		BUG();

1773
	return nlmsg_multicast(xfrm_nl, skb, 0, XFRMNLGRP_MIGRATE, GFP_ATOMIC);
1774 1775 1776 1777 1778 1779 1780 1781
}
#else
static int xfrm_send_migrate(struct xfrm_selector *sel, u8 dir, u8 type,
			     struct xfrm_migrate *m, int num_migrate)
{
	return -ENOPROTOOPT;
}
#endif
J
Jamal Hadi Salim 已提交
1782

1783
#define XMSGSIZE(type) sizeof(struct type)
1784 1785 1786 1787 1788 1789 1790 1791 1792

static const int xfrm_msg_min[XFRM_NR_MSGTYPES] = {
	[XFRM_MSG_NEWSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_info),
	[XFRM_MSG_DELSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_id),
	[XFRM_MSG_GETSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_id),
	[XFRM_MSG_NEWPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_info),
	[XFRM_MSG_DELPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
	[XFRM_MSG_GETPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
	[XFRM_MSG_ALLOCSPI    - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userspi_info),
1793
	[XFRM_MSG_ACQUIRE     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_acquire),
1794
	[XFRM_MSG_EXPIRE      - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_expire),
1795 1796
	[XFRM_MSG_UPDPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_info),
	[XFRM_MSG_UPDSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_info),
1797
	[XFRM_MSG_POLEXPIRE   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_polexpire),
1798
	[XFRM_MSG_FLUSHSA     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_flush),
1799
	[XFRM_MSG_FLUSHPOLICY - XFRM_MSG_BASE] = 0,
J
Jamal Hadi Salim 已提交
1800 1801
	[XFRM_MSG_NEWAE       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_aevent_id),
	[XFRM_MSG_GETAE       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_aevent_id),
1802
	[XFRM_MSG_REPORT      - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_report),
1803
	[XFRM_MSG_MIGRATE     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
1804 1805
	[XFRM_MSG_GETSADINFO  - XFRM_MSG_BASE] = sizeof(u32),
	[XFRM_MSG_GETSPDINFO  - XFRM_MSG_BASE] = sizeof(u32),
L
Linus Torvalds 已提交
1806 1807
};

1808 1809
#undef XMSGSIZE

1810 1811 1812 1813 1814 1815 1816 1817 1818 1819 1820 1821 1822 1823 1824 1825 1826
static const struct nla_policy xfrma_policy[XFRMA_MAX+1] = {
	[XFRMA_ALG_AUTH]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ALG_CRYPT]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ALG_COMP]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ENCAP]		= { .len = sizeof(struct xfrm_encap_tmpl) },
	[XFRMA_TMPL]		= { .len = sizeof(struct xfrm_user_tmpl) },
	[XFRMA_SEC_CTX]		= { .len = sizeof(struct xfrm_sec_ctx) },
	[XFRMA_LTIME_VAL]	= { .len = sizeof(struct xfrm_lifetime_cur) },
	[XFRMA_REPLAY_VAL]	= { .len = sizeof(struct xfrm_replay_state) },
	[XFRMA_REPLAY_THRESH]	= { .type = NLA_U32 },
	[XFRMA_ETIMER_THRESH]	= { .type = NLA_U32 },
	[XFRMA_SRCADDR]		= { .len = sizeof(xfrm_address_t) },
	[XFRMA_COADDR]		= { .len = sizeof(xfrm_address_t) },
	[XFRMA_POLICY_TYPE]	= { .len = sizeof(struct xfrm_userpolicy_type)},
	[XFRMA_MIGRATE]		= { .len = sizeof(struct xfrm_user_migrate) },
};

L
Linus Torvalds 已提交
1827
static struct xfrm_link {
1828
	int (*doit)(struct sk_buff *, struct nlmsghdr *, struct nlattr **);
L
Linus Torvalds 已提交
1829
	int (*dump)(struct sk_buff *, struct netlink_callback *);
1830 1831 1832 1833 1834 1835 1836 1837 1838 1839
} xfrm_dispatch[XFRM_NR_MSGTYPES] = {
	[XFRM_MSG_NEWSA       - XFRM_MSG_BASE] = { .doit = xfrm_add_sa        },
	[XFRM_MSG_DELSA       - XFRM_MSG_BASE] = { .doit = xfrm_del_sa        },
	[XFRM_MSG_GETSA       - XFRM_MSG_BASE] = { .doit = xfrm_get_sa,
						   .dump = xfrm_dump_sa       },
	[XFRM_MSG_NEWPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_add_policy    },
	[XFRM_MSG_DELPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_get_policy    },
	[XFRM_MSG_GETPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_get_policy,
						   .dump = xfrm_dump_policy   },
	[XFRM_MSG_ALLOCSPI    - XFRM_MSG_BASE] = { .doit = xfrm_alloc_userspi },
1840
	[XFRM_MSG_ACQUIRE     - XFRM_MSG_BASE] = { .doit = xfrm_add_acquire   },
1841
	[XFRM_MSG_EXPIRE      - XFRM_MSG_BASE] = { .doit = xfrm_add_sa_expire },
1842 1843
	[XFRM_MSG_UPDPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_add_policy    },
	[XFRM_MSG_UPDSA       - XFRM_MSG_BASE] = { .doit = xfrm_add_sa        },
1844
	[XFRM_MSG_POLEXPIRE   - XFRM_MSG_BASE] = { .doit = xfrm_add_pol_expire},
1845 1846
	[XFRM_MSG_FLUSHSA     - XFRM_MSG_BASE] = { .doit = xfrm_flush_sa      },
	[XFRM_MSG_FLUSHPOLICY - XFRM_MSG_BASE] = { .doit = xfrm_flush_policy  },
J
Jamal Hadi Salim 已提交
1847 1848
	[XFRM_MSG_NEWAE       - XFRM_MSG_BASE] = { .doit = xfrm_new_ae  },
	[XFRM_MSG_GETAE       - XFRM_MSG_BASE] = { .doit = xfrm_get_ae  },
1849
	[XFRM_MSG_MIGRATE     - XFRM_MSG_BASE] = { .doit = xfrm_do_migrate    },
1850
	[XFRM_MSG_GETSADINFO  - XFRM_MSG_BASE] = { .doit = xfrm_get_sadinfo   },
J
Jamal Hadi Salim 已提交
1851
	[XFRM_MSG_GETSPDINFO  - XFRM_MSG_BASE] = { .doit = xfrm_get_spdinfo   },
L
Linus Torvalds 已提交
1852 1853
};

1854
static int xfrm_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
L
Linus Torvalds 已提交
1855
{
1856
	struct nlattr *attrs[XFRMA_MAX+1];
L
Linus Torvalds 已提交
1857
	struct xfrm_link *link;
1858
	int type, err;
L
Linus Torvalds 已提交
1859 1860 1861

	type = nlh->nlmsg_type;
	if (type > XFRM_MSG_MAX)
1862
		return -EINVAL;
L
Linus Torvalds 已提交
1863 1864 1865 1866 1867

	type -= XFRM_MSG_BASE;
	link = &xfrm_dispatch[type];

	/* All operations require privileges, even GET */
1868 1869
	if (security_netlink_recv(skb, CAP_NET_ADMIN))
		return -EPERM;
L
Linus Torvalds 已提交
1870

1871 1872 1873
	if ((type == (XFRM_MSG_GETSA - XFRM_MSG_BASE) ||
	     type == (XFRM_MSG_GETPOLICY - XFRM_MSG_BASE)) &&
	    (nlh->nlmsg_flags & NLM_F_DUMP)) {
L
Linus Torvalds 已提交
1874
		if (link->dump == NULL)
1875
			return -EINVAL;
1876

1877
		return netlink_dump_start(xfrm_nl, skb, nlh, link->dump, NULL);
L
Linus Torvalds 已提交
1878 1879
	}

1880
	err = nlmsg_parse(nlh, xfrm_msg_min[type], attrs, XFRMA_MAX,
1881
			  xfrma_policy);
1882 1883
	if (err < 0)
		return err;
L
Linus Torvalds 已提交
1884 1885

	if (link->doit == NULL)
1886
		return -EINVAL;
L
Linus Torvalds 已提交
1887

1888
	return link->doit(skb, nlh, attrs);
L
Linus Torvalds 已提交
1889 1890
}

1891
static void xfrm_netlink_rcv(struct sk_buff *skb)
L
Linus Torvalds 已提交
1892
{
1893 1894 1895
	mutex_lock(&xfrm_cfg_mutex);
	netlink_rcv_skb(skb, &xfrm_user_rcv_msg);
	mutex_unlock(&xfrm_cfg_mutex);
L
Linus Torvalds 已提交
1896 1897
}

1898 1899 1900 1901 1902
static inline size_t xfrm_expire_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_expire));
}

J
Jamal Hadi Salim 已提交
1903
static int build_expire(struct sk_buff *skb, struct xfrm_state *x, struct km_event *c)
L
Linus Torvalds 已提交
1904 1905 1906 1907
{
	struct xfrm_user_expire *ue;
	struct nlmsghdr *nlh;

1908 1909 1910
	nlh = nlmsg_put(skb, c->pid, 0, XFRM_MSG_EXPIRE, sizeof(*ue), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
1911

1912
	ue = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1913
	copy_to_user_state(x, &ue->state);
J
Jamal Hadi Salim 已提交
1914
	ue->hard = (c->data.hard != 0) ? 1 : 0;
L
Linus Torvalds 已提交
1915

1916
	return nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
1917 1918
}

1919
static int xfrm_exp_state_notify(struct xfrm_state *x, struct km_event *c)
L
Linus Torvalds 已提交
1920 1921 1922
{
	struct sk_buff *skb;

1923
	skb = nlmsg_new(xfrm_expire_msgsize(), GFP_ATOMIC);
L
Linus Torvalds 已提交
1924 1925 1926
	if (skb == NULL)
		return -ENOMEM;

J
Jamal Hadi Salim 已提交
1927
	if (build_expire(skb, x, c) < 0)
L
Linus Torvalds 已提交
1928 1929
		BUG();

1930
	return nlmsg_multicast(xfrm_nl, skb, 0, XFRMNLGRP_EXPIRE, GFP_ATOMIC);
L
Linus Torvalds 已提交
1931 1932
}

J
Jamal Hadi Salim 已提交
1933 1934 1935 1936
static int xfrm_aevent_state_notify(struct xfrm_state *x, struct km_event *c)
{
	struct sk_buff *skb;

1937
	skb = nlmsg_new(xfrm_aevent_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
1938 1939 1940 1941 1942 1943
	if (skb == NULL)
		return -ENOMEM;

	if (build_aevent(skb, x, c) < 0)
		BUG();

1944
	return nlmsg_multicast(xfrm_nl, skb, 0, XFRMNLGRP_AEVENTS, GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
1945 1946
}

1947 1948 1949 1950 1951
static int xfrm_notify_sa_flush(struct km_event *c)
{
	struct xfrm_usersa_flush *p;
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
1952
	int len = NLMSG_ALIGN(sizeof(struct xfrm_usersa_flush));
1953

1954
	skb = nlmsg_new(len, GFP_ATOMIC);
1955 1956 1957
	if (skb == NULL)
		return -ENOMEM;

1958 1959 1960 1961 1962
	nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_FLUSHSA, sizeof(*p), 0);
	if (nlh == NULL) {
		kfree_skb(skb);
		return -EMSGSIZE;
	}
1963

1964
	p = nlmsg_data(nlh);
1965
	p->proto = c->data.proto;
1966

1967
	nlmsg_end(skb, nlh);
1968

1969
	return nlmsg_multicast(xfrm_nl, skb, 0, XFRMNLGRP_SA, GFP_ATOMIC);
1970 1971
}

1972
static inline size_t xfrm_sa_len(struct xfrm_state *x)
1973
{
1974
	size_t l = 0;
1975
	if (x->aalg)
1976
		l += nla_total_size(xfrm_alg_len(x->aalg));
1977
	if (x->ealg)
1978
		l += nla_total_size(xfrm_alg_len(x->ealg));
1979
	if (x->calg)
1980
		l += nla_total_size(sizeof(*x->calg));
1981
	if (x->encap)
1982
		l += nla_total_size(sizeof(*x->encap));
1983 1984 1985 1986 1987 1988 1989 1990
	if (x->security)
		l += nla_total_size(sizeof(struct xfrm_user_sec_ctx) +
				    x->security->ctx_len);
	if (x->coaddr)
		l += nla_total_size(sizeof(*x->coaddr));

	/* Must count this as this may become non-zero behind our back. */
	l += nla_total_size(sizeof(x->lastused));
1991 1992 1993 1994 1995 1996 1997

	return l;
}

static int xfrm_notify_sa(struct xfrm_state *x, struct km_event *c)
{
	struct xfrm_usersa_info *p;
1998
	struct xfrm_usersa_id *id;
1999 2000 2001
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
	int len = xfrm_sa_len(x);
2002 2003 2004 2005
	int headlen;

	headlen = sizeof(*p);
	if (c->event == XFRM_MSG_DELSA) {
2006
		len += nla_total_size(headlen);
2007 2008
		headlen = sizeof(*id);
	}
2009
	len += NLMSG_ALIGN(headlen);
2010

2011
	skb = nlmsg_new(len, GFP_ATOMIC);
2012 2013 2014
	if (skb == NULL)
		return -ENOMEM;

2015 2016
	nlh = nlmsg_put(skb, c->pid, c->seq, c->event, headlen, 0);
	if (nlh == NULL)
2017
		goto nla_put_failure;
2018

2019
	p = nlmsg_data(nlh);
2020
	if (c->event == XFRM_MSG_DELSA) {
2021 2022
		struct nlattr *attr;

2023
		id = nlmsg_data(nlh);
2024 2025 2026 2027 2028
		memcpy(&id->daddr, &x->id.daddr, sizeof(id->daddr));
		id->spi = x->id.spi;
		id->family = x->props.family;
		id->proto = x->id.proto;

2029 2030 2031 2032 2033
		attr = nla_reserve(skb, XFRMA_SA, sizeof(*p));
		if (attr == NULL)
			goto nla_put_failure;

		p = nla_data(attr);
2034 2035
	}

2036 2037
	if (copy_to_user_state_extra(x, p, skb))
		goto nla_put_failure;
2038

2039
	nlmsg_end(skb, nlh);
2040

2041
	return nlmsg_multicast(xfrm_nl, skb, 0, XFRMNLGRP_SA, GFP_ATOMIC);
2042

2043
nla_put_failure:
2044 2045
	/* Somebody screwed up with xfrm_sa_len! */
	WARN_ON(1);
2046 2047 2048 2049 2050 2051 2052 2053
	kfree_skb(skb);
	return -1;
}

static int xfrm_send_state_notify(struct xfrm_state *x, struct km_event *c)
{

	switch (c->event) {
2054
	case XFRM_MSG_EXPIRE:
2055
		return xfrm_exp_state_notify(x, c);
J
Jamal Hadi Salim 已提交
2056 2057
	case XFRM_MSG_NEWAE:
		return xfrm_aevent_state_notify(x, c);
2058 2059 2060
	case XFRM_MSG_DELSA:
	case XFRM_MSG_UPDSA:
	case XFRM_MSG_NEWSA:
2061
		return xfrm_notify_sa(x, c);
2062
	case XFRM_MSG_FLUSHSA:
2063 2064 2065 2066 2067 2068 2069 2070 2071 2072
		return xfrm_notify_sa_flush(c);
	default:
		 printk("xfrm_user: Unknown SA event %d\n", c->event);
		 break;
	}

	return 0;

}

2073 2074 2075 2076 2077 2078 2079 2080 2081
static inline size_t xfrm_acquire_msgsize(struct xfrm_state *x,
					  struct xfrm_policy *xp)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_acquire))
	       + nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr)
	       + nla_total_size(xfrm_user_sec_ctx_size(x->security))
	       + userpolicy_type_attrsize();
}

L
Linus Torvalds 已提交
2082 2083 2084 2085 2086 2087 2088 2089
static int build_acquire(struct sk_buff *skb, struct xfrm_state *x,
			 struct xfrm_tmpl *xt, struct xfrm_policy *xp,
			 int dir)
{
	struct xfrm_user_acquire *ua;
	struct nlmsghdr *nlh;
	__u32 seq = xfrm_get_acqseq();

2090 2091 2092
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_ACQUIRE, sizeof(*ua), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
2093

2094
	ua = nlmsg_data(nlh);
L
Linus Torvalds 已提交
2095 2096 2097 2098 2099 2100 2101 2102 2103 2104 2105
	memcpy(&ua->id, &x->id, sizeof(ua->id));
	memcpy(&ua->saddr, &x->props.saddr, sizeof(ua->saddr));
	memcpy(&ua->sel, &x->sel, sizeof(ua->sel));
	copy_to_user_policy(xp, &ua->policy, dir);
	ua->aalgos = xt->aalgos;
	ua->ealgos = xt->ealgos;
	ua->calgos = xt->calgos;
	ua->seq = x->km.seq = seq;

	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
2106
	if (copy_to_user_state_sec_ctx(x, skb))
2107
		goto nlmsg_failure;
2108
	if (copy_to_user_policy_type(xp->type, skb) < 0)
2109
		goto nlmsg_failure;
L
Linus Torvalds 已提交
2110

2111
	return nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
2112 2113

nlmsg_failure:
2114 2115
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
L
Linus Torvalds 已提交
2116 2117 2118 2119 2120 2121 2122
}

static int xfrm_send_acquire(struct xfrm_state *x, struct xfrm_tmpl *xt,
			     struct xfrm_policy *xp, int dir)
{
	struct sk_buff *skb;

2123
	skb = nlmsg_new(xfrm_acquire_msgsize(x, xp), GFP_ATOMIC);
L
Linus Torvalds 已提交
2124 2125 2126 2127 2128 2129
	if (skb == NULL)
		return -ENOMEM;

	if (build_acquire(skb, x, xt, xp, dir) < 0)
		BUG();

2130
	return nlmsg_multicast(xfrm_nl, skb, 0, XFRMNLGRP_ACQUIRE, GFP_ATOMIC);
L
Linus Torvalds 已提交
2131 2132 2133 2134 2135
}

/* User gives us xfrm_user_policy_info followed by an array of 0
 * or more templates.
 */
2136
static struct xfrm_policy *xfrm_compile_policy(struct sock *sk, int opt,
L
Linus Torvalds 已提交
2137 2138 2139 2140 2141 2142 2143
					       u8 *data, int len, int *dir)
{
	struct xfrm_userpolicy_info *p = (struct xfrm_userpolicy_info *)data;
	struct xfrm_user_tmpl *ut = (struct xfrm_user_tmpl *) (p + 1);
	struct xfrm_policy *xp;
	int nr;

2144
	switch (sk->sk_family) {
L
Linus Torvalds 已提交
2145 2146 2147 2148 2149 2150 2151 2152 2153 2154 2155 2156 2157 2158 2159 2160 2161 2162 2163 2164 2165 2166 2167 2168 2169 2170
	case AF_INET:
		if (opt != IP_XFRM_POLICY) {
			*dir = -EOPNOTSUPP;
			return NULL;
		}
		break;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
	case AF_INET6:
		if (opt != IPV6_XFRM_POLICY) {
			*dir = -EOPNOTSUPP;
			return NULL;
		}
		break;
#endif
	default:
		*dir = -EINVAL;
		return NULL;
	}

	*dir = -EINVAL;

	if (len < sizeof(*p) ||
	    verify_newpolicy_info(p))
		return NULL;

	nr = ((len - sizeof(*p)) / sizeof(*ut));
2171
	if (validate_tmpl(nr, ut, p->sel.family))
L
Linus Torvalds 已提交
2172 2173
		return NULL;

2174 2175 2176
	if (p->dir > XFRM_POLICY_OUT)
		return NULL;

L
Linus Torvalds 已提交
2177 2178 2179 2180 2181 2182 2183
	xp = xfrm_policy_alloc(GFP_KERNEL);
	if (xp == NULL) {
		*dir = -ENOBUFS;
		return NULL;
	}

	copy_from_user_policy(xp, p);
2184
	xp->type = XFRM_POLICY_TYPE_MAIN;
L
Linus Torvalds 已提交
2185 2186 2187 2188 2189 2190 2191
	copy_templates(xp, ut, nr);

	*dir = p->dir;

	return xp;
}

2192 2193 2194 2195 2196 2197 2198 2199
static inline size_t xfrm_polexpire_msgsize(struct xfrm_policy *xp)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_polexpire))
	       + nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr)
	       + nla_total_size(xfrm_user_sec_ctx_size(xp->security))
	       + userpolicy_type_attrsize();
}

L
Linus Torvalds 已提交
2200
static int build_polexpire(struct sk_buff *skb, struct xfrm_policy *xp,
J
Jamal Hadi Salim 已提交
2201
			   int dir, struct km_event *c)
L
Linus Torvalds 已提交
2202 2203 2204
{
	struct xfrm_user_polexpire *upe;
	struct nlmsghdr *nlh;
J
Jamal Hadi Salim 已提交
2205
	int hard = c->data.hard;
L
Linus Torvalds 已提交
2206

2207 2208 2209
	nlh = nlmsg_put(skb, c->pid, 0, XFRM_MSG_POLEXPIRE, sizeof(*upe), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
2210

2211
	upe = nlmsg_data(nlh);
L
Linus Torvalds 已提交
2212 2213 2214
	copy_to_user_policy(xp, &upe->pol, dir);
	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
2215 2216
	if (copy_to_user_sec_ctx(xp, skb))
		goto nlmsg_failure;
2217
	if (copy_to_user_policy_type(xp->type, skb) < 0)
2218
		goto nlmsg_failure;
L
Linus Torvalds 已提交
2219 2220
	upe->hard = !!hard;

2221
	return nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
2222 2223

nlmsg_failure:
2224 2225
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
L
Linus Torvalds 已提交
2226 2227
}

2228
static int xfrm_exp_policy_notify(struct xfrm_policy *xp, int dir, struct km_event *c)
L
Linus Torvalds 已提交
2229 2230 2231
{
	struct sk_buff *skb;

2232
	skb = nlmsg_new(xfrm_polexpire_msgsize(xp), GFP_ATOMIC);
L
Linus Torvalds 已提交
2233 2234 2235
	if (skb == NULL)
		return -ENOMEM;

J
Jamal Hadi Salim 已提交
2236
	if (build_polexpire(skb, xp, dir, c) < 0)
L
Linus Torvalds 已提交
2237 2238
		BUG();

2239
	return nlmsg_multicast(xfrm_nl, skb, 0, XFRMNLGRP_EXPIRE, GFP_ATOMIC);
L
Linus Torvalds 已提交
2240 2241
}

2242 2243 2244
static int xfrm_notify_policy(struct xfrm_policy *xp, int dir, struct km_event *c)
{
	struct xfrm_userpolicy_info *p;
2245
	struct xfrm_userpolicy_id *id;
2246 2247
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
2248
	int len = nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr);
2249 2250 2251 2252
	int headlen;

	headlen = sizeof(*p);
	if (c->event == XFRM_MSG_DELPOLICY) {
2253
		len += nla_total_size(headlen);
2254 2255
		headlen = sizeof(*id);
	}
2256
	len += userpolicy_type_attrsize();
2257
	len += NLMSG_ALIGN(headlen);
2258

2259
	skb = nlmsg_new(len, GFP_ATOMIC);
2260 2261 2262
	if (skb == NULL)
		return -ENOMEM;

2263 2264 2265
	nlh = nlmsg_put(skb, c->pid, c->seq, c->event, headlen, 0);
	if (nlh == NULL)
		goto nlmsg_failure;
2266

2267
	p = nlmsg_data(nlh);
2268
	if (c->event == XFRM_MSG_DELPOLICY) {
2269 2270
		struct nlattr *attr;

2271
		id = nlmsg_data(nlh);
2272 2273 2274 2275 2276 2277 2278
		memset(id, 0, sizeof(*id));
		id->dir = dir;
		if (c->data.byid)
			id->index = xp->index;
		else
			memcpy(&id->sel, &xp->selector, sizeof(id->sel));

2279 2280 2281 2282 2283
		attr = nla_reserve(skb, XFRMA_POLICY, sizeof(*p));
		if (attr == NULL)
			goto nlmsg_failure;

		p = nla_data(attr);
2284
	}
2285 2286 2287 2288

	copy_to_user_policy(xp, p, dir);
	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
2289
	if (copy_to_user_policy_type(xp->type, skb) < 0)
2290
		goto nlmsg_failure;
2291

2292
	nlmsg_end(skb, nlh);
2293

2294
	return nlmsg_multicast(xfrm_nl, skb, 0, XFRMNLGRP_POLICY, GFP_ATOMIC);
2295 2296 2297 2298 2299 2300 2301 2302 2303 2304 2305

nlmsg_failure:
	kfree_skb(skb);
	return -1;
}

static int xfrm_notify_policy_flush(struct km_event *c)
{
	struct nlmsghdr *nlh;
	struct sk_buff *skb;

2306
	skb = nlmsg_new(userpolicy_type_attrsize(), GFP_ATOMIC);
2307 2308 2309
	if (skb == NULL)
		return -ENOMEM;

2310 2311 2312
	nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_FLUSHPOLICY, 0, 0);
	if (nlh == NULL)
		goto nlmsg_failure;
2313 2314
	if (copy_to_user_policy_type(c->data.type, skb) < 0)
		goto nlmsg_failure;
2315

2316
	nlmsg_end(skb, nlh);
2317

2318
	return nlmsg_multicast(xfrm_nl, skb, 0, XFRMNLGRP_POLICY, GFP_ATOMIC);
2319 2320 2321 2322 2323 2324 2325 2326 2327 2328

nlmsg_failure:
	kfree_skb(skb);
	return -1;
}

static int xfrm_send_policy_notify(struct xfrm_policy *xp, int dir, struct km_event *c)
{

	switch (c->event) {
2329 2330 2331
	case XFRM_MSG_NEWPOLICY:
	case XFRM_MSG_UPDPOLICY:
	case XFRM_MSG_DELPOLICY:
2332
		return xfrm_notify_policy(xp, dir, c);
2333
	case XFRM_MSG_FLUSHPOLICY:
2334
		return xfrm_notify_policy_flush(c);
2335
	case XFRM_MSG_POLEXPIRE:
2336 2337 2338 2339 2340 2341 2342 2343 2344
		return xfrm_exp_policy_notify(xp, dir, c);
	default:
		printk("xfrm_user: Unknown Policy event %d\n", c->event);
	}

	return 0;

}

2345 2346 2347 2348 2349
static inline size_t xfrm_report_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_report));
}

2350 2351 2352 2353 2354 2355
static int build_report(struct sk_buff *skb, u8 proto,
			struct xfrm_selector *sel, xfrm_address_t *addr)
{
	struct xfrm_user_report *ur;
	struct nlmsghdr *nlh;

2356 2357 2358
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_REPORT, sizeof(*ur), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
2359

2360
	ur = nlmsg_data(nlh);
2361 2362 2363 2364
	ur->proto = proto;
	memcpy(&ur->sel, sel, sizeof(ur->sel));

	if (addr)
2365
		NLA_PUT(skb, XFRMA_COADDR, sizeof(*addr), addr);
2366

2367
	return nlmsg_end(skb, nlh);
2368

2369
nla_put_failure:
2370 2371
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
2372 2373 2374 2375 2376 2377 2378
}

static int xfrm_send_report(u8 proto, struct xfrm_selector *sel,
			    xfrm_address_t *addr)
{
	struct sk_buff *skb;

2379
	skb = nlmsg_new(xfrm_report_msgsize(), GFP_ATOMIC);
2380 2381 2382 2383 2384 2385
	if (skb == NULL)
		return -ENOMEM;

	if (build_report(skb, proto, sel, addr) < 0)
		BUG();

2386
	return nlmsg_multicast(xfrm_nl, skb, 0, XFRMNLGRP_REPORT, GFP_ATOMIC);
2387 2388
}

L
Linus Torvalds 已提交
2389 2390 2391 2392 2393 2394
static struct xfrm_mgr netlink_mgr = {
	.id		= "netlink",
	.notify		= xfrm_send_state_notify,
	.acquire	= xfrm_send_acquire,
	.compile_policy	= xfrm_compile_policy,
	.notify_policy	= xfrm_send_policy_notify,
2395
	.report		= xfrm_send_report,
2396
	.migrate	= xfrm_send_migrate,
L
Linus Torvalds 已提交
2397 2398 2399 2400
};

static int __init xfrm_user_init(void)
{
2401 2402
	struct sock *nlsk;

2403
	printk(KERN_INFO "Initializing XFRM netlink socket\n");
L
Linus Torvalds 已提交
2404

2405
	nlsk = netlink_kernel_create(&init_net, NETLINK_XFRM, XFRMNLGRP_MAX,
2406
				     xfrm_netlink_rcv, NULL, THIS_MODULE);
2407
	if (nlsk == NULL)
L
Linus Torvalds 已提交
2408
		return -ENOMEM;
2409
	rcu_assign_pointer(xfrm_nl, nlsk);
L
Linus Torvalds 已提交
2410 2411 2412 2413 2414 2415 2416 2417

	xfrm_register_km(&netlink_mgr);

	return 0;
}

static void __exit xfrm_user_exit(void)
{
2418 2419
	struct sock *nlsk = xfrm_nl;

L
Linus Torvalds 已提交
2420
	xfrm_unregister_km(&netlink_mgr);
2421 2422 2423
	rcu_assign_pointer(xfrm_nl, NULL);
	synchronize_rcu();
	sock_release(nlsk->sk_socket);
L
Linus Torvalds 已提交
2424 2425 2426 2427 2428
}

module_init(xfrm_user_init);
module_exit(xfrm_user_exit);
MODULE_LICENSE("GPL");
2429
MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_XFRM);
2430