xfrm_user.c 66.8 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9
/* xfrm_user.c: User interface to configure xfrm engine.
 *
 * Copyright (C) 2002 David S. Miller (davem@redhat.com)
 *
 * Changes:
 *	Mitsuru KANDA @USAGI
 * 	Kazunori MIYAZAWA @USAGI
 * 	Kunihiro Ishiguro <kunihiro@ipinfusion.com>
 * 		IPv6 support
10
 *
L
Linus Torvalds 已提交
11 12
 */

13
#include <linux/crypto.h>
L
Linus Torvalds 已提交
14 15 16 17 18 19 20 21 22 23 24 25 26 27
#include <linux/module.h>
#include <linux/kernel.h>
#include <linux/types.h>
#include <linux/slab.h>
#include <linux/socket.h>
#include <linux/string.h>
#include <linux/net.h>
#include <linux/skbuff.h>
#include <linux/pfkeyv2.h>
#include <linux/ipsec.h>
#include <linux/init.h>
#include <linux/security.h>
#include <net/sock.h>
#include <net/xfrm.h>
28
#include <net/netlink.h>
29
#include <net/ah.h>
L
Linus Torvalds 已提交
30
#include <asm/uaccess.h>
31 32 33
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
#include <linux/in6.h>
#endif
L
Linus Torvalds 已提交
34

35 36 37 38 39
static inline int aead_len(struct xfrm_algo_aead *alg)
{
	return sizeof(*alg) + ((alg->alg_key_len + 7) / 8);
}

40
static int verify_one_alg(struct nlattr **attrs, enum xfrm_attr_type_t type)
L
Linus Torvalds 已提交
41
{
42
	struct nlattr *rt = attrs[type];
L
Linus Torvalds 已提交
43 44 45 46 47
	struct xfrm_algo *algp;

	if (!rt)
		return 0;

48
	algp = nla_data(rt);
49
	if (nla_len(rt) < xfrm_alg_len(algp))
50 51
		return -EINVAL;

L
Linus Torvalds 已提交
52 53 54 55 56 57 58 59
	switch (type) {
	case XFRMA_ALG_AUTH:
	case XFRMA_ALG_CRYPT:
	case XFRMA_ALG_COMP:
		break;

	default:
		return -EINVAL;
60
	}
L
Linus Torvalds 已提交
61 62 63 64 65

	algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
	return 0;
}

66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81
static int verify_auth_trunc(struct nlattr **attrs)
{
	struct nlattr *rt = attrs[XFRMA_ALG_AUTH_TRUNC];
	struct xfrm_algo_auth *algp;

	if (!rt)
		return 0;

	algp = nla_data(rt);
	if (nla_len(rt) < xfrm_alg_auth_len(algp))
		return -EINVAL;

	algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
	return 0;
}

82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97
static int verify_aead(struct nlattr **attrs)
{
	struct nlattr *rt = attrs[XFRMA_ALG_AEAD];
	struct xfrm_algo_aead *algp;

	if (!rt)
		return 0;

	algp = nla_data(rt);
	if (nla_len(rt) < aead_len(algp))
		return -EINVAL;

	algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
	return 0;
}

98
static void verify_one_addr(struct nlattr **attrs, enum xfrm_attr_type_t type,
99 100
			   xfrm_address_t **addrp)
{
101
	struct nlattr *rt = attrs[type];
102

103
	if (rt && addrp)
104
		*addrp = nla_data(rt);
105
}
106

107
static inline int verify_sec_ctx_len(struct nlattr **attrs)
108
{
109
	struct nlattr *rt = attrs[XFRMA_SEC_CTX];
110 111 112 113 114
	struct xfrm_user_sec_ctx *uctx;

	if (!rt)
		return 0;

115
	uctx = nla_data(rt);
116
	if (uctx->len != (sizeof(struct xfrm_user_sec_ctx) + uctx->ctx_len))
117 118 119 120 121 122
		return -EINVAL;

	return 0;
}


L
Linus Torvalds 已提交
123
static int verify_newsa_info(struct xfrm_usersa_info *p,
124
			     struct nlattr **attrs)
L
Linus Torvalds 已提交
125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142
{
	int err;

	err = -EINVAL;
	switch (p->family) {
	case AF_INET:
		break;

	case AF_INET6:
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
		break;
#else
		err = -EAFNOSUPPORT;
		goto out;
#endif

	default:
		goto out;
143
	}
L
Linus Torvalds 已提交
144 145 146 147

	err = -EINVAL;
	switch (p->id.proto) {
	case IPPROTO_AH:
148 149
		if ((!attrs[XFRMA_ALG_AUTH]	&&
		     !attrs[XFRMA_ALG_AUTH_TRUNC]) ||
150
		    attrs[XFRMA_ALG_AEAD]	||
151
		    attrs[XFRMA_ALG_CRYPT]	||
152 153
		    attrs[XFRMA_ALG_COMP]	||
		    attrs[XFRMA_TFCPAD])
L
Linus Torvalds 已提交
154 155 156 157
			goto out;
		break;

	case IPPROTO_ESP:
158 159 160
		if (attrs[XFRMA_ALG_COMP])
			goto out;
		if (!attrs[XFRMA_ALG_AUTH] &&
161
		    !attrs[XFRMA_ALG_AUTH_TRUNC] &&
162 163 164 165
		    !attrs[XFRMA_ALG_CRYPT] &&
		    !attrs[XFRMA_ALG_AEAD])
			goto out;
		if ((attrs[XFRMA_ALG_AUTH] ||
166
		     attrs[XFRMA_ALG_AUTH_TRUNC] ||
167 168
		     attrs[XFRMA_ALG_CRYPT]) &&
		    attrs[XFRMA_ALG_AEAD])
L
Linus Torvalds 已提交
169
			goto out;
170 171 172
		if (attrs[XFRMA_TFCPAD] &&
		    p->mode != XFRM_MODE_TUNNEL)
			goto out;
L
Linus Torvalds 已提交
173 174 175
		break;

	case IPPROTO_COMP:
176
		if (!attrs[XFRMA_ALG_COMP]	||
177
		    attrs[XFRMA_ALG_AEAD]	||
178
		    attrs[XFRMA_ALG_AUTH]	||
179
		    attrs[XFRMA_ALG_AUTH_TRUNC]	||
180 181
		    attrs[XFRMA_ALG_CRYPT]	||
		    attrs[XFRMA_TFCPAD])
L
Linus Torvalds 已提交
182 183 184
			goto out;
		break;

185 186 187
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
	case IPPROTO_DSTOPTS:
	case IPPROTO_ROUTING:
188 189
		if (attrs[XFRMA_ALG_COMP]	||
		    attrs[XFRMA_ALG_AUTH]	||
190
		    attrs[XFRMA_ALG_AUTH_TRUNC]	||
191
		    attrs[XFRMA_ALG_AEAD]	||
192 193 194
		    attrs[XFRMA_ALG_CRYPT]	||
		    attrs[XFRMA_ENCAP]		||
		    attrs[XFRMA_SEC_CTX]	||
195
		    attrs[XFRMA_TFCPAD]		||
196
		    !attrs[XFRMA_COADDR])
197 198 199 200
			goto out;
		break;
#endif

L
Linus Torvalds 已提交
201 202
	default:
		goto out;
203
	}
L
Linus Torvalds 已提交
204

205 206
	if ((err = verify_aead(attrs)))
		goto out;
207 208
	if ((err = verify_auth_trunc(attrs)))
		goto out;
209
	if ((err = verify_one_alg(attrs, XFRMA_ALG_AUTH)))
L
Linus Torvalds 已提交
210
		goto out;
211
	if ((err = verify_one_alg(attrs, XFRMA_ALG_CRYPT)))
L
Linus Torvalds 已提交
212
		goto out;
213
	if ((err = verify_one_alg(attrs, XFRMA_ALG_COMP)))
L
Linus Torvalds 已提交
214
		goto out;
215
	if ((err = verify_sec_ctx_len(attrs)))
216
		goto out;
L
Linus Torvalds 已提交
217 218 219

	err = -EINVAL;
	switch (p->mode) {
220 221
	case XFRM_MODE_TRANSPORT:
	case XFRM_MODE_TUNNEL:
222
	case XFRM_MODE_ROUTEOPTIMIZATION:
D
Diego Beltrami 已提交
223
	case XFRM_MODE_BEET:
L
Linus Torvalds 已提交
224 225 226 227
		break;

	default:
		goto out;
228
	}
L
Linus Torvalds 已提交
229 230 231 232 233 234 235 236

	err = 0;

out:
	return err;
}

static int attach_one_algo(struct xfrm_algo **algpp, u8 *props,
237
			   struct xfrm_algo_desc *(*get_byname)(const char *, int),
238
			   struct nlattr *rta)
L
Linus Torvalds 已提交
239 240 241 242 243 244 245
{
	struct xfrm_algo *p, *ualg;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

246
	ualg = nla_data(rta);
L
Linus Torvalds 已提交
247 248 249 250 251 252

	algo = get_byname(ualg->alg_name, 1);
	if (!algo)
		return -ENOSYS;
	*props = algo->desc.sadb_alg_id;

253
	p = kmemdup(ualg, xfrm_alg_len(ualg), GFP_KERNEL);
L
Linus Torvalds 已提交
254 255 256
	if (!p)
		return -ENOMEM;

257
	strcpy(p->alg_name, algo->name);
L
Linus Torvalds 已提交
258 259 260 261
	*algpp = p;
	return 0;
}

262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305
static int attach_auth(struct xfrm_algo_auth **algpp, u8 *props,
		       struct nlattr *rta)
{
	struct xfrm_algo *ualg;
	struct xfrm_algo_auth *p;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

	ualg = nla_data(rta);

	algo = xfrm_aalg_get_byname(ualg->alg_name, 1);
	if (!algo)
		return -ENOSYS;
	*props = algo->desc.sadb_alg_id;

	p = kmalloc(sizeof(*p) + (ualg->alg_key_len + 7) / 8, GFP_KERNEL);
	if (!p)
		return -ENOMEM;

	strcpy(p->alg_name, algo->name);
	p->alg_key_len = ualg->alg_key_len;
	p->alg_trunc_len = algo->uinfo.auth.icv_truncbits;
	memcpy(p->alg_key, ualg->alg_key, (ualg->alg_key_len + 7) / 8);

	*algpp = p;
	return 0;
}

static int attach_auth_trunc(struct xfrm_algo_auth **algpp, u8 *props,
			     struct nlattr *rta)
{
	struct xfrm_algo_auth *p, *ualg;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

	ualg = nla_data(rta);

	algo = xfrm_aalg_get_byname(ualg->alg_name, 1);
	if (!algo)
		return -ENOSYS;
306 307
	if ((ualg->alg_trunc_len / 8) > MAX_AH_AUTH_LEN ||
	    ualg->alg_trunc_len > algo->uinfo.auth.icv_fullbits)
308 309 310 311 312 313 314 315 316 317 318 319 320 321 322
		return -EINVAL;
	*props = algo->desc.sadb_alg_id;

	p = kmemdup(ualg, xfrm_alg_auth_len(ualg), GFP_KERNEL);
	if (!p)
		return -ENOMEM;

	strcpy(p->alg_name, algo->name);
	if (!p->alg_trunc_len)
		p->alg_trunc_len = algo->uinfo.auth.icv_truncbits;

	*algpp = p;
	return 0;
}

323 324 325 326 327 328 329 330 331 332 333 334 335 336 337 338 339 340 341 342 343 344 345 346 347
static int attach_aead(struct xfrm_algo_aead **algpp, u8 *props,
		       struct nlattr *rta)
{
	struct xfrm_algo_aead *p, *ualg;
	struct xfrm_algo_desc *algo;

	if (!rta)
		return 0;

	ualg = nla_data(rta);

	algo = xfrm_aead_get_byname(ualg->alg_name, ualg->alg_icv_len, 1);
	if (!algo)
		return -ENOSYS;
	*props = algo->desc.sadb_alg_id;

	p = kmemdup(ualg, aead_len(ualg), GFP_KERNEL);
	if (!p)
		return -ENOMEM;

	strcpy(p->alg_name, algo->name);
	*algpp = p;
	return 0;
}

348
static inline int xfrm_user_sec_ctx_size(struct xfrm_sec_ctx *xfrm_ctx)
349 350 351 352 353 354 355 356 357 358
{
	int len = 0;

	if (xfrm_ctx) {
		len += sizeof(struct xfrm_user_sec_ctx);
		len += xfrm_ctx->ctx_len;
	}
	return len;
}

L
Linus Torvalds 已提交
359 360 361 362 363 364 365 366 367
static void copy_from_user_state(struct xfrm_state *x, struct xfrm_usersa_info *p)
{
	memcpy(&x->id, &p->id, sizeof(x->id));
	memcpy(&x->sel, &p->sel, sizeof(x->sel));
	memcpy(&x->lft, &p->lft, sizeof(x->lft));
	x->props.mode = p->mode;
	x->props.replay_window = p->replay_window;
	x->props.reqid = p->reqid;
	x->props.family = p->family;
368
	memcpy(&x->props.saddr, &p->saddr, sizeof(x->props.saddr));
L
Linus Torvalds 已提交
369
	x->props.flags = p->flags;
370

371
	if (!x->sel.family && !(p->flags & XFRM_STATE_AF_UNSPEC))
372
		x->sel.family = p->family;
L
Linus Torvalds 已提交
373 374
}

J
Jamal Hadi Salim 已提交
375 376 377 378 379
/*
 * someday when pfkey also has support, we could have the code
 * somehow made shareable and move it to xfrm_state.c - JHS
 *
*/
380
static void xfrm_update_ae_params(struct xfrm_state *x, struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
381
{
382 383 384 385
	struct nlattr *rp = attrs[XFRMA_REPLAY_VAL];
	struct nlattr *lt = attrs[XFRMA_LTIME_VAL];
	struct nlattr *et = attrs[XFRMA_ETIMER_THRESH];
	struct nlattr *rt = attrs[XFRMA_REPLAY_THRESH];
J
Jamal Hadi Salim 已提交
386 387 388

	if (rp) {
		struct xfrm_replay_state *replay;
389
		replay = nla_data(rp);
J
Jamal Hadi Salim 已提交
390 391 392 393 394 395
		memcpy(&x->replay, replay, sizeof(*replay));
		memcpy(&x->preplay, replay, sizeof(*replay));
	}

	if (lt) {
		struct xfrm_lifetime_cur *ltime;
396
		ltime = nla_data(lt);
J
Jamal Hadi Salim 已提交
397 398 399 400 401 402
		x->curlft.bytes = ltime->bytes;
		x->curlft.packets = ltime->packets;
		x->curlft.add_time = ltime->add_time;
		x->curlft.use_time = ltime->use_time;
	}

403
	if (et)
404
		x->replay_maxage = nla_get_u32(et);
J
Jamal Hadi Salim 已提交
405

406
	if (rt)
407
		x->replay_maxdiff = nla_get_u32(rt);
J
Jamal Hadi Salim 已提交
408 409
}

410 411
static struct xfrm_state *xfrm_state_construct(struct net *net,
					       struct xfrm_usersa_info *p,
412
					       struct nlattr **attrs,
L
Linus Torvalds 已提交
413 414
					       int *errp)
{
415
	struct xfrm_state *x = xfrm_state_alloc(net);
L
Linus Torvalds 已提交
416 417 418 419 420 421 422
	int err = -ENOMEM;

	if (!x)
		goto error_no_put;

	copy_from_user_state(x, p);

423 424 425
	if ((err = attach_aead(&x->aead, &x->props.ealgo,
			       attrs[XFRMA_ALG_AEAD])))
		goto error;
426 427
	if ((err = attach_auth_trunc(&x->aalg, &x->props.aalgo,
				     attrs[XFRMA_ALG_AUTH_TRUNC])))
L
Linus Torvalds 已提交
428
		goto error;
429 430 431 432 433
	if (!x->props.aalgo) {
		if ((err = attach_auth(&x->aalg, &x->props.aalgo,
				       attrs[XFRMA_ALG_AUTH])))
			goto error;
	}
L
Linus Torvalds 已提交
434 435
	if ((err = attach_one_algo(&x->ealg, &x->props.ealgo,
				   xfrm_ealg_get_byname,
436
				   attrs[XFRMA_ALG_CRYPT])))
L
Linus Torvalds 已提交
437 438 439
		goto error;
	if ((err = attach_one_algo(&x->calg, &x->props.calgo,
				   xfrm_calg_get_byname,
440
				   attrs[XFRMA_ALG_COMP])))
L
Linus Torvalds 已提交
441
		goto error;
442 443 444 445 446 447 448 449

	if (attrs[XFRMA_ENCAP]) {
		x->encap = kmemdup(nla_data(attrs[XFRMA_ENCAP]),
				   sizeof(*x->encap), GFP_KERNEL);
		if (x->encap == NULL)
			goto error;
	}

450 451 452
	if (attrs[XFRMA_TFCPAD])
		x->tfcpad = nla_get_u32(attrs[XFRMA_TFCPAD]);

453 454 455 456 457 458 459
	if (attrs[XFRMA_COADDR]) {
		x->coaddr = kmemdup(nla_data(attrs[XFRMA_COADDR]),
				    sizeof(*x->coaddr), GFP_KERNEL);
		if (x->coaddr == NULL)
			goto error;
	}

460 461
	xfrm_mark_get(attrs, &x->mark);

H
Herbert Xu 已提交
462
	err = xfrm_init_state(x);
L
Linus Torvalds 已提交
463 464 465
	if (err)
		goto error;

466 467
	if (attrs[XFRMA_SEC_CTX] &&
	    security_xfrm_state_alloc(x, nla_data(attrs[XFRMA_SEC_CTX])))
468 469
		goto error;

L
Linus Torvalds 已提交
470
	x->km.seq = p->seq;
A
Alexey Dobriyan 已提交
471
	x->replay_maxdiff = net->xfrm.sysctl_aevent_rseqth;
J
Jamal Hadi Salim 已提交
472
	/* sysctl_xfrm_aevent_etime is in 100ms units */
A
Alexey Dobriyan 已提交
473
	x->replay_maxage = (net->xfrm.sysctl_aevent_etime*HZ)/XFRM_AE_ETH_M;
J
Jamal Hadi Salim 已提交
474 475 476 477 478 479
	x->preplay.bitmap = 0;
	x->preplay.seq = x->replay.seq+x->replay_maxdiff;
	x->preplay.oseq = x->replay.oseq +x->replay_maxdiff;

	/* override default values from above */

480
	xfrm_update_ae_params(x, attrs);
L
Linus Torvalds 已提交
481 482 483 484 485 486 487 488 489 490 491

	return x;

error:
	x->km.state = XFRM_STATE_DEAD;
	xfrm_state_put(x);
error_no_put:
	*errp = err;
	return NULL;
}

492
static int xfrm_add_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
493
		struct nlattr **attrs)
L
Linus Torvalds 已提交
494
{
495
	struct net *net = sock_net(skb->sk);
496
	struct xfrm_usersa_info *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
497 498
	struct xfrm_state *x;
	int err;
499
	struct km_event c;
500 501 502
	uid_t loginuid = audit_get_loginuid(current);
	u32 sessionid = audit_get_sessionid(current);
	u32 sid;
L
Linus Torvalds 已提交
503

504
	err = verify_newsa_info(p, attrs);
L
Linus Torvalds 已提交
505 506 507
	if (err)
		return err;

508
	x = xfrm_state_construct(net, p, attrs, &err);
L
Linus Torvalds 已提交
509 510 511
	if (!x)
		return err;

512
	xfrm_state_hold(x);
L
Linus Torvalds 已提交
513 514 515 516 517
	if (nlh->nlmsg_type == XFRM_MSG_NEWSA)
		err = xfrm_state_add(x);
	else
		err = xfrm_state_update(x);

518
	security_task_getsecid(current, &sid);
519
	xfrm_audit_state_add(x, err ? 0 : 1, loginuid, sessionid, sid);
J
Joy Latten 已提交
520

L
Linus Torvalds 已提交
521 522
	if (err < 0) {
		x->km.state = XFRM_STATE_DEAD;
523
		__xfrm_state_put(x);
524
		goto out;
L
Linus Torvalds 已提交
525 526
	}

527 528
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
529
	c.event = nlh->nlmsg_type;
530 531

	km_state_notify(x, &c);
532
out:
533
	xfrm_state_put(x);
L
Linus Torvalds 已提交
534 535 536
	return err;
}

537 538
static struct xfrm_state *xfrm_user_state_lookup(struct net *net,
						 struct xfrm_usersa_id *p,
539
						 struct nlattr **attrs,
540 541 542
						 int *errp)
{
	struct xfrm_state *x = NULL;
543
	struct xfrm_mark m;
544
	int err;
545
	u32 mark = xfrm_mark_get(attrs, &m);
546 547 548

	if (xfrm_id_proto_match(p->proto, IPSEC_PROTO_ANY)) {
		err = -ESRCH;
549
		x = xfrm_state_lookup(net, mark, &p->daddr, p->spi, p->proto, p->family);
550 551 552
	} else {
		xfrm_address_t *saddr = NULL;

553
		verify_one_addr(attrs, XFRMA_SRCADDR, &saddr);
554 555 556 557 558
		if (!saddr) {
			err = -EINVAL;
			goto out;
		}

559
		err = -ESRCH;
560 561
		x = xfrm_state_lookup_byaddr(net, mark,
					     &p->daddr, saddr,
562
					     p->proto, p->family);
563 564 565 566 567 568 569 570
	}

 out:
	if (!x && errp)
		*errp = err;
	return x;
}

571
static int xfrm_del_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
572
		struct nlattr **attrs)
L
Linus Torvalds 已提交
573
{
574
	struct net *net = sock_net(skb->sk);
L
Linus Torvalds 已提交
575
	struct xfrm_state *x;
576
	int err = -ESRCH;
577
	struct km_event c;
578
	struct xfrm_usersa_id *p = nlmsg_data(nlh);
579 580 581
	uid_t loginuid = audit_get_loginuid(current);
	u32 sessionid = audit_get_sessionid(current);
	u32 sid;
L
Linus Torvalds 已提交
582

583
	x = xfrm_user_state_lookup(net, p, attrs, &err);
L
Linus Torvalds 已提交
584
	if (x == NULL)
585
		return err;
L
Linus Torvalds 已提交
586

587
	if ((err = security_xfrm_state_delete(x)) != 0)
C
Catherine Zhang 已提交
588 589
		goto out;

L
Linus Torvalds 已提交
590
	if (xfrm_state_kern(x)) {
C
Catherine Zhang 已提交
591 592
		err = -EPERM;
		goto out;
L
Linus Torvalds 已提交
593 594
	}

595
	err = xfrm_state_delete(x);
J
Joy Latten 已提交
596

C
Catherine Zhang 已提交
597 598
	if (err < 0)
		goto out;
599 600 601

	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
602
	c.event = nlh->nlmsg_type;
603
	km_state_notify(x, &c);
L
Linus Torvalds 已提交
604

C
Catherine Zhang 已提交
605
out:
606
	security_task_getsecid(current, &sid);
607
	xfrm_audit_state_delete(x, err ? 0 : 1, loginuid, sessionid, sid);
C
Catherine Zhang 已提交
608
	xfrm_state_put(x);
609
	return err;
L
Linus Torvalds 已提交
610 611 612 613 614 615 616 617 618
}

static void copy_to_user_state(struct xfrm_state *x, struct xfrm_usersa_info *p)
{
	memcpy(&p->id, &x->id, sizeof(p->id));
	memcpy(&p->sel, &x->sel, sizeof(p->sel));
	memcpy(&p->lft, &x->lft, sizeof(p->lft));
	memcpy(&p->curlft, &x->curlft, sizeof(p->curlft));
	memcpy(&p->stats, &x->stats, sizeof(p->stats));
619
	memcpy(&p->saddr, &x->props.saddr, sizeof(p->saddr));
L
Linus Torvalds 已提交
620 621 622 623 624 625 626 627 628 629 630 631 632 633 634
	p->mode = x->props.mode;
	p->replay_window = x->props.replay_window;
	p->reqid = x->props.reqid;
	p->family = x->props.family;
	p->flags = x->props.flags;
	p->seq = x->km.seq;
}

struct xfrm_dump_info {
	struct sk_buff *in_skb;
	struct sk_buff *out_skb;
	u32 nlmsg_seq;
	u16 nlmsg_flags;
};

635 636 637 638
static int copy_sec_ctx(struct xfrm_sec_ctx *s, struct sk_buff *skb)
{
	struct xfrm_user_sec_ctx *uctx;
	struct nlattr *attr;
639
	int ctx_size = sizeof(*uctx) + s->ctx_len;
640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655

	attr = nla_reserve(skb, XFRMA_SEC_CTX, ctx_size);
	if (attr == NULL)
		return -EMSGSIZE;

	uctx = nla_data(attr);
	uctx->exttype = XFRMA_SEC_CTX;
	uctx->len = ctx_size;
	uctx->ctx_doi = s->ctx_doi;
	uctx->ctx_alg = s->ctx_alg;
	uctx->ctx_len = s->ctx_len;
	memcpy(uctx + 1, s->ctx_str, s->ctx_len);

	return 0;
}

656 657 658 659 660 661 662 663 664 665 666 667 668 669 670 671 672 673
static int copy_to_user_auth(struct xfrm_algo_auth *auth, struct sk_buff *skb)
{
	struct xfrm_algo *algo;
	struct nlattr *nla;

	nla = nla_reserve(skb, XFRMA_ALG_AUTH,
			  sizeof(*algo) + (auth->alg_key_len + 7) / 8);
	if (!nla)
		return -EMSGSIZE;

	algo = nla_data(nla);
	strcpy(algo->alg_name, auth->alg_name);
	memcpy(algo->alg_key, auth->alg_key, (auth->alg_key_len + 7) / 8);
	algo->alg_key_len = auth->alg_key_len;

	return 0;
}

674 675 676 677
/* Don't change this without updating xfrm_sa_len! */
static int copy_to_user_state_extra(struct xfrm_state *x,
				    struct xfrm_usersa_info *p,
				    struct sk_buff *skb)
L
Linus Torvalds 已提交
678 679 680
{
	copy_to_user_state(x, p);

681 682 683 684 685 686
	if (x->coaddr)
		NLA_PUT(skb, XFRMA_COADDR, sizeof(*x->coaddr), x->coaddr);

	if (x->lastused)
		NLA_PUT_U64(skb, XFRMA_LASTUSED, x->lastused);

687 688
	if (x->aead)
		NLA_PUT(skb, XFRMA_ALG_AEAD, aead_len(x->aead), x->aead);
689 690 691 692 693 694 695
	if (x->aalg) {
		if (copy_to_user_auth(x->aalg, skb))
			goto nla_put_failure;

		NLA_PUT(skb, XFRMA_ALG_AUTH_TRUNC,
			xfrm_alg_auth_len(x->aalg), x->aalg);
	}
L
Linus Torvalds 已提交
696
	if (x->ealg)
697
		NLA_PUT(skb, XFRMA_ALG_CRYPT, xfrm_alg_len(x->ealg), x->ealg);
L
Linus Torvalds 已提交
698
	if (x->calg)
699
		NLA_PUT(skb, XFRMA_ALG_COMP, sizeof(*(x->calg)), x->calg);
L
Linus Torvalds 已提交
700 701

	if (x->encap)
702
		NLA_PUT(skb, XFRMA_ENCAP, sizeof(*x->encap), x->encap);
L
Linus Torvalds 已提交
703

704 705 706
	if (x->tfcpad)
		NLA_PUT_U32(skb, XFRMA_TFCPAD, x->tfcpad);

707 708 709
	if (xfrm_mark_put(skb, &x->mark))
		goto nla_put_failure;

710 711
	if (x->security && copy_sec_ctx(x->security, skb) < 0)
		goto nla_put_failure;
712

713 714 715 716 717 718 719 720 721 722 723 724 725 726 727 728 729 730 731 732 733 734 735 736 737 738
	return 0;

nla_put_failure:
	return -EMSGSIZE;
}

static int dump_one_state(struct xfrm_state *x, int count, void *ptr)
{
	struct xfrm_dump_info *sp = ptr;
	struct sk_buff *in_skb = sp->in_skb;
	struct sk_buff *skb = sp->out_skb;
	struct xfrm_usersa_info *p;
	struct nlmsghdr *nlh;
	int err;

	nlh = nlmsg_put(skb, NETLINK_CB(in_skb).pid, sp->nlmsg_seq,
			XFRM_MSG_NEWSA, sizeof(*p), sp->nlmsg_flags);
	if (nlh == NULL)
		return -EMSGSIZE;

	p = nlmsg_data(nlh);

	err = copy_to_user_state_extra(x, p, skb);
	if (err)
		goto nla_put_failure;

739
	nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
740 741
	return 0;

742
nla_put_failure:
743
	nlmsg_cancel(skb, nlh);
744
	return err;
L
Linus Torvalds 已提交
745 746
}

747 748 749 750 751 752 753
static int xfrm_dump_sa_done(struct netlink_callback *cb)
{
	struct xfrm_state_walk *walk = (struct xfrm_state_walk *) &cb->args[1];
	xfrm_state_walk_done(walk);
	return 0;
}

L
Linus Torvalds 已提交
754 755
static int xfrm_dump_sa(struct sk_buff *skb, struct netlink_callback *cb)
{
756
	struct net *net = sock_net(skb->sk);
757
	struct xfrm_state_walk *walk = (struct xfrm_state_walk *) &cb->args[1];
L
Linus Torvalds 已提交
758 759
	struct xfrm_dump_info info;

760 761 762
	BUILD_BUG_ON(sizeof(struct xfrm_state_walk) >
		     sizeof(cb->args) - sizeof(cb->args[0]));

L
Linus Torvalds 已提交
763 764 765 766
	info.in_skb = cb->skb;
	info.out_skb = skb;
	info.nlmsg_seq = cb->nlh->nlmsg_seq;
	info.nlmsg_flags = NLM_F_MULTI;
767 768 769 770 771 772

	if (!cb->args[0]) {
		cb->args[0] = 1;
		xfrm_state_walk_init(walk, 0);
	}

773
	(void) xfrm_state_walk(net, walk, dump_one_state, &info);
L
Linus Torvalds 已提交
774 775 776 777 778 779 780 781 782 783

	return skb->len;
}

static struct sk_buff *xfrm_state_netlink(struct sk_buff *in_skb,
					  struct xfrm_state *x, u32 seq)
{
	struct xfrm_dump_info info;
	struct sk_buff *skb;

784
	skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
L
Linus Torvalds 已提交
785 786 787 788 789 790 791 792 793 794 795 796 797 798 799 800
	if (!skb)
		return ERR_PTR(-ENOMEM);

	info.in_skb = in_skb;
	info.out_skb = skb;
	info.nlmsg_seq = seq;
	info.nlmsg_flags = 0;

	if (dump_one_state(x, 0, &info)) {
		kfree_skb(skb);
		return NULL;
	}

	return skb;
}

801 802 803 804 805 806 807
static inline size_t xfrm_spdinfo_msgsize(void)
{
	return NLMSG_ALIGN(4)
	       + nla_total_size(sizeof(struct xfrmu_spdinfo))
	       + nla_total_size(sizeof(struct xfrmu_spdhinfo));
}

808 809
static int build_spdinfo(struct sk_buff *skb, struct net *net,
			 u32 pid, u32 seq, u32 flags)
J
Jamal Hadi Salim 已提交
810
{
811 812 813
	struct xfrmk_spdinfo si;
	struct xfrmu_spdinfo spc;
	struct xfrmu_spdhinfo sph;
J
Jamal Hadi Salim 已提交
814 815 816 817 818 819 820 821 822
	struct nlmsghdr *nlh;
	u32 *f;

	nlh = nlmsg_put(skb, pid, seq, XFRM_MSG_NEWSPDINFO, sizeof(u32), 0);
	if (nlh == NULL) /* shouldnt really happen ... */
		return -EMSGSIZE;

	f = nlmsg_data(nlh);
	*f = flags;
823
	xfrm_spd_getinfo(net, &si);
824 825 826 827 828 829 830 831 832 833 834
	spc.incnt = si.incnt;
	spc.outcnt = si.outcnt;
	spc.fwdcnt = si.fwdcnt;
	spc.inscnt = si.inscnt;
	spc.outscnt = si.outscnt;
	spc.fwdscnt = si.fwdscnt;
	sph.spdhcnt = si.spdhcnt;
	sph.spdhmcnt = si.spdhmcnt;

	NLA_PUT(skb, XFRMA_SPD_INFO, sizeof(spc), &spc);
	NLA_PUT(skb, XFRMA_SPD_HINFO, sizeof(sph), &sph);
J
Jamal Hadi Salim 已提交
835 836 837 838 839 840 841 842 843

	return nlmsg_end(skb, nlh);

nla_put_failure:
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
}

static int xfrm_get_spdinfo(struct sk_buff *skb, struct nlmsghdr *nlh,
844
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
845
{
846
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
847
	struct sk_buff *r_skb;
848
	u32 *flags = nlmsg_data(nlh);
J
Jamal Hadi Salim 已提交
849 850 851
	u32 spid = NETLINK_CB(skb).pid;
	u32 seq = nlh->nlmsg_seq;

852
	r_skb = nlmsg_new(xfrm_spdinfo_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
853 854 855
	if (r_skb == NULL)
		return -ENOMEM;

856
	if (build_spdinfo(r_skb, net, spid, seq, *flags) < 0)
J
Jamal Hadi Salim 已提交
857 858
		BUG();

859
	return nlmsg_unicast(net->xfrm.nlsk, r_skb, spid);
J
Jamal Hadi Salim 已提交
860 861
}

862 863 864 865 866 867 868
static inline size_t xfrm_sadinfo_msgsize(void)
{
	return NLMSG_ALIGN(4)
	       + nla_total_size(sizeof(struct xfrmu_sadhinfo))
	       + nla_total_size(4); /* XFRMA_SAD_CNT */
}

869 870
static int build_sadinfo(struct sk_buff *skb, struct net *net,
			 u32 pid, u32 seq, u32 flags)
J
Jamal Hadi Salim 已提交
871
{
872 873
	struct xfrmk_sadinfo si;
	struct xfrmu_sadhinfo sh;
J
Jamal Hadi Salim 已提交
874 875 876 877 878 879 880 881 882
	struct nlmsghdr *nlh;
	u32 *f;

	nlh = nlmsg_put(skb, pid, seq, XFRM_MSG_NEWSADINFO, sizeof(u32), 0);
	if (nlh == NULL) /* shouldnt really happen ... */
		return -EMSGSIZE;

	f = nlmsg_data(nlh);
	*f = flags;
883
	xfrm_sad_getinfo(net, &si);
J
Jamal Hadi Salim 已提交
884

885 886 887 888 889
	sh.sadhmcnt = si.sadhmcnt;
	sh.sadhcnt = si.sadhcnt;

	NLA_PUT_U32(skb, XFRMA_SAD_CNT, si.sadcnt);
	NLA_PUT(skb, XFRMA_SAD_HINFO, sizeof(sh), &sh);
J
Jamal Hadi Salim 已提交
890 891 892 893 894 895 896 897 898

	return nlmsg_end(skb, nlh);

nla_put_failure:
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
}

static int xfrm_get_sadinfo(struct sk_buff *skb, struct nlmsghdr *nlh,
899
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
900
{
901
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
902
	struct sk_buff *r_skb;
903
	u32 *flags = nlmsg_data(nlh);
J
Jamal Hadi Salim 已提交
904 905 906
	u32 spid = NETLINK_CB(skb).pid;
	u32 seq = nlh->nlmsg_seq;

907
	r_skb = nlmsg_new(xfrm_sadinfo_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
908 909 910
	if (r_skb == NULL)
		return -ENOMEM;

911
	if (build_sadinfo(r_skb, net, spid, seq, *flags) < 0)
J
Jamal Hadi Salim 已提交
912 913
		BUG();

914
	return nlmsg_unicast(net->xfrm.nlsk, r_skb, spid);
J
Jamal Hadi Salim 已提交
915 916
}

917
static int xfrm_get_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
918
		struct nlattr **attrs)
L
Linus Torvalds 已提交
919
{
920
	struct net *net = sock_net(skb->sk);
921
	struct xfrm_usersa_id *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
922 923
	struct xfrm_state *x;
	struct sk_buff *resp_skb;
924
	int err = -ESRCH;
L
Linus Torvalds 已提交
925

926
	x = xfrm_user_state_lookup(net, p, attrs, &err);
L
Linus Torvalds 已提交
927 928 929 930 931 932 933
	if (x == NULL)
		goto out_noput;

	resp_skb = xfrm_state_netlink(skb, x, nlh->nlmsg_seq);
	if (IS_ERR(resp_skb)) {
		err = PTR_ERR(resp_skb);
	} else {
934
		err = nlmsg_unicast(net->xfrm.nlsk, resp_skb, NETLINK_CB(skb).pid);
L
Linus Torvalds 已提交
935 936 937 938 939 940 941 942 943 944 945 946 947 948 949 950 951 952 953 954 955
	}
	xfrm_state_put(x);
out_noput:
	return err;
}

static int verify_userspi_info(struct xfrm_userspi_info *p)
{
	switch (p->info.id.proto) {
	case IPPROTO_AH:
	case IPPROTO_ESP:
		break;

	case IPPROTO_COMP:
		/* IPCOMP spi is 16-bits. */
		if (p->max >= 0x10000)
			return -EINVAL;
		break;

	default:
		return -EINVAL;
956
	}
L
Linus Torvalds 已提交
957 958 959 960 961 962 963

	if (p->min > p->max)
		return -EINVAL;

	return 0;
}

964
static int xfrm_alloc_userspi(struct sk_buff *skb, struct nlmsghdr *nlh,
965
		struct nlattr **attrs)
L
Linus Torvalds 已提交
966
{
967
	struct net *net = sock_net(skb->sk);
L
Linus Torvalds 已提交
968 969 970 971 972 973
	struct xfrm_state *x;
	struct xfrm_userspi_info *p;
	struct sk_buff *resp_skb;
	xfrm_address_t *daddr;
	int family;
	int err;
974 975
	u32 mark;
	struct xfrm_mark m;
L
Linus Torvalds 已提交
976

977
	p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
978 979 980 981 982 983 984 985
	err = verify_userspi_info(p);
	if (err)
		goto out_noput;

	family = p->info.family;
	daddr = &p->info.id.daddr;

	x = NULL;
986 987

	mark = xfrm_mark_get(attrs, &m);
L
Linus Torvalds 已提交
988
	if (p->info.seq) {
989
		x = xfrm_find_acq_byseq(net, mark, p->info.seq);
L
Linus Torvalds 已提交
990 991 992 993 994 995 996
		if (x && xfrm_addr_cmp(&x->id.daddr, daddr, family)) {
			xfrm_state_put(x);
			x = NULL;
		}
	}

	if (!x)
997
		x = xfrm_find_acq(net, &m, p->info.mode, p->info.reqid,
L
Linus Torvalds 已提交
998 999 1000 1001 1002 1003 1004
				  p->info.id.proto, daddr,
				  &p->info.saddr, 1,
				  family);
	err = -ENOENT;
	if (x == NULL)
		goto out_noput;

1005 1006 1007
	err = xfrm_alloc_spi(x, p->min, p->max);
	if (err)
		goto out;
L
Linus Torvalds 已提交
1008

1009
	resp_skb = xfrm_state_netlink(skb, x, nlh->nlmsg_seq);
L
Linus Torvalds 已提交
1010 1011 1012 1013 1014
	if (IS_ERR(resp_skb)) {
		err = PTR_ERR(resp_skb);
		goto out;
	}

1015
	err = nlmsg_unicast(net->xfrm.nlsk, resp_skb, NETLINK_CB(skb).pid);
L
Linus Torvalds 已提交
1016 1017 1018 1019 1020 1021 1022

out:
	xfrm_state_put(x);
out_noput:
	return err;
}

1023
static int verify_policy_dir(u8 dir)
L
Linus Torvalds 已提交
1024 1025 1026 1027 1028 1029 1030 1031 1032
{
	switch (dir) {
	case XFRM_POLICY_IN:
	case XFRM_POLICY_OUT:
	case XFRM_POLICY_FWD:
		break;

	default:
		return -EINVAL;
1033
	}
L
Linus Torvalds 已提交
1034 1035 1036 1037

	return 0;
}

1038
static int verify_policy_type(u8 type)
1039 1040 1041 1042 1043 1044 1045 1046 1047 1048
{
	switch (type) {
	case XFRM_POLICY_TYPE_MAIN:
#ifdef CONFIG_XFRM_SUB_POLICY
	case XFRM_POLICY_TYPE_SUB:
#endif
		break;

	default:
		return -EINVAL;
1049
	}
1050 1051 1052 1053

	return 0;
}

L
Linus Torvalds 已提交
1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064
static int verify_newpolicy_info(struct xfrm_userpolicy_info *p)
{
	switch (p->share) {
	case XFRM_SHARE_ANY:
	case XFRM_SHARE_SESSION:
	case XFRM_SHARE_USER:
	case XFRM_SHARE_UNIQUE:
		break;

	default:
		return -EINVAL;
1065
	}
L
Linus Torvalds 已提交
1066 1067 1068 1069 1070 1071 1072 1073

	switch (p->action) {
	case XFRM_POLICY_ALLOW:
	case XFRM_POLICY_BLOCK:
		break;

	default:
		return -EINVAL;
1074
	}
L
Linus Torvalds 已提交
1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088

	switch (p->sel.family) {
	case AF_INET:
		break;

	case AF_INET6:
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
		break;
#else
		return  -EAFNOSUPPORT;
#endif

	default:
		return -EINVAL;
1089
	}
L
Linus Torvalds 已提交
1090 1091 1092 1093

	return verify_policy_dir(p->dir);
}

1094
static int copy_from_user_sec_ctx(struct xfrm_policy *pol, struct nlattr **attrs)
1095
{
1096
	struct nlattr *rt = attrs[XFRMA_SEC_CTX];
1097 1098 1099 1100 1101
	struct xfrm_user_sec_ctx *uctx;

	if (!rt)
		return 0;

1102
	uctx = nla_data(rt);
1103
	return security_xfrm_policy_alloc(&pol->security, uctx);
1104 1105
}

L
Linus Torvalds 已提交
1106 1107 1108 1109 1110 1111 1112 1113 1114 1115 1116 1117 1118 1119 1120 1121 1122 1123 1124
static void copy_templates(struct xfrm_policy *xp, struct xfrm_user_tmpl *ut,
			   int nr)
{
	int i;

	xp->xfrm_nr = nr;
	for (i = 0; i < nr; i++, ut++) {
		struct xfrm_tmpl *t = &xp->xfrm_vec[i];

		memcpy(&t->id, &ut->id, sizeof(struct xfrm_id));
		memcpy(&t->saddr, &ut->saddr,
		       sizeof(xfrm_address_t));
		t->reqid = ut->reqid;
		t->mode = ut->mode;
		t->share = ut->share;
		t->optional = ut->optional;
		t->aalgos = ut->aalgos;
		t->ealgos = ut->ealgos;
		t->calgos = ut->calgos;
1125 1126
		/* If all masks are ~0, then we allow all algorithms. */
		t->allalgs = !~(t->aalgos & t->ealgos & t->calgos);
1127
		t->encap_family = ut->family;
L
Linus Torvalds 已提交
1128 1129 1130
	}
}

1131 1132 1133 1134 1135 1136 1137 1138 1139 1140 1141 1142 1143 1144 1145 1146 1147 1148 1149 1150 1151 1152 1153 1154 1155 1156 1157
static int validate_tmpl(int nr, struct xfrm_user_tmpl *ut, u16 family)
{
	int i;

	if (nr > XFRM_MAX_DEPTH)
		return -EINVAL;

	for (i = 0; i < nr; i++) {
		/* We never validated the ut->family value, so many
		 * applications simply leave it at zero.  The check was
		 * never made and ut->family was ignored because all
		 * templates could be assumed to have the same family as
		 * the policy itself.  Now that we will have ipv4-in-ipv6
		 * and ipv6-in-ipv4 tunnels, this is no longer true.
		 */
		if (!ut[i].family)
			ut[i].family = family;

		switch (ut[i].family) {
		case AF_INET:
			break;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
		case AF_INET6:
			break;
#endif
		default:
			return -EINVAL;
1158
		}
1159 1160 1161 1162 1163
	}

	return 0;
}

1164
static int copy_from_user_tmpl(struct xfrm_policy *pol, struct nlattr **attrs)
L
Linus Torvalds 已提交
1165
{
1166
	struct nlattr *rt = attrs[XFRMA_TMPL];
L
Linus Torvalds 已提交
1167 1168 1169 1170

	if (!rt) {
		pol->xfrm_nr = 0;
	} else {
1171 1172
		struct xfrm_user_tmpl *utmpl = nla_data(rt);
		int nr = nla_len(rt) / sizeof(*utmpl);
1173
		int err;
L
Linus Torvalds 已提交
1174

1175 1176 1177
		err = validate_tmpl(nr, utmpl, pol->family);
		if (err)
			return err;
L
Linus Torvalds 已提交
1178

1179
		copy_templates(pol, utmpl, nr);
L
Linus Torvalds 已提交
1180 1181 1182 1183
	}
	return 0;
}

1184
static int copy_from_user_policy_type(u8 *tp, struct nlattr **attrs)
1185
{
1186
	struct nlattr *rt = attrs[XFRMA_POLICY_TYPE];
1187
	struct xfrm_userpolicy_type *upt;
1188
	u8 type = XFRM_POLICY_TYPE_MAIN;
1189 1190 1191
	int err;

	if (rt) {
1192
		upt = nla_data(rt);
1193 1194 1195 1196 1197 1198 1199 1200 1201 1202 1203
		type = upt->type;
	}

	err = verify_policy_type(type);
	if (err)
		return err;

	*tp = type;
	return 0;
}

L
Linus Torvalds 已提交
1204 1205 1206 1207 1208 1209 1210 1211 1212 1213 1214 1215 1216 1217 1218 1219 1220 1221 1222 1223 1224 1225 1226 1227 1228 1229
static void copy_from_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p)
{
	xp->priority = p->priority;
	xp->index = p->index;
	memcpy(&xp->selector, &p->sel, sizeof(xp->selector));
	memcpy(&xp->lft, &p->lft, sizeof(xp->lft));
	xp->action = p->action;
	xp->flags = p->flags;
	xp->family = p->sel.family;
	/* XXX xp->share = p->share; */
}

static void copy_to_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p, int dir)
{
	memcpy(&p->sel, &xp->selector, sizeof(p->sel));
	memcpy(&p->lft, &xp->lft, sizeof(p->lft));
	memcpy(&p->curlft, &xp->curlft, sizeof(p->curlft));
	p->priority = xp->priority;
	p->index = xp->index;
	p->sel.family = xp->family;
	p->dir = dir;
	p->action = xp->action;
	p->flags = xp->flags;
	p->share = XFRM_SHARE_ANY; /* XXX xp->share */
}

1230
static struct xfrm_policy *xfrm_policy_construct(struct net *net, struct xfrm_userpolicy_info *p, struct nlattr **attrs, int *errp)
L
Linus Torvalds 已提交
1231
{
1232
	struct xfrm_policy *xp = xfrm_policy_alloc(net, GFP_KERNEL);
L
Linus Torvalds 已提交
1233 1234 1235 1236 1237 1238 1239 1240
	int err;

	if (!xp) {
		*errp = -ENOMEM;
		return NULL;
	}

	copy_from_user_policy(xp, p);
1241

1242
	err = copy_from_user_policy_type(&xp->type, attrs);
1243 1244 1245
	if (err)
		goto error;

1246 1247
	if (!(err = copy_from_user_tmpl(xp, attrs)))
		err = copy_from_user_sec_ctx(xp, attrs);
1248 1249
	if (err)
		goto error;
L
Linus Torvalds 已提交
1250

1251 1252
	xfrm_mark_get(attrs, &xp->mark);

L
Linus Torvalds 已提交
1253
	return xp;
1254 1255
 error:
	*errp = err;
H
Herbert Xu 已提交
1256
	xp->walk.dead = 1;
1257
	xfrm_policy_destroy(xp);
1258
	return NULL;
L
Linus Torvalds 已提交
1259 1260
}

1261
static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1262
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1263
{
1264
	struct net *net = sock_net(skb->sk);
1265
	struct xfrm_userpolicy_info *p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1266
	struct xfrm_policy *xp;
1267
	struct km_event c;
L
Linus Torvalds 已提交
1268 1269
	int err;
	int excl;
1270 1271 1272
	uid_t loginuid = audit_get_loginuid(current);
	u32 sessionid = audit_get_sessionid(current);
	u32 sid;
L
Linus Torvalds 已提交
1273 1274

	err = verify_newpolicy_info(p);
1275 1276
	if (err)
		return err;
1277
	err = verify_sec_ctx_len(attrs);
L
Linus Torvalds 已提交
1278 1279 1280
	if (err)
		return err;

1281
	xp = xfrm_policy_construct(net, p, attrs, &err);
L
Linus Torvalds 已提交
1282 1283 1284
	if (!xp)
		return err;

1285 1286 1287 1288
	/* shouldnt excl be based on nlh flags??
	 * Aha! this is anti-netlink really i.e  more pfkey derived
	 * in netlink excl is a flag and you wouldnt need
	 * a type XFRM_MSG_UPDPOLICY - JHS */
L
Linus Torvalds 已提交
1289 1290
	excl = nlh->nlmsg_type == XFRM_MSG_NEWPOLICY;
	err = xfrm_policy_insert(p->dir, xp, excl);
1291
	security_task_getsecid(current, &sid);
1292
	xfrm_audit_policy_add(xp, err ? 0 : 1, loginuid, sessionid, sid);
J
Joy Latten 已提交
1293

L
Linus Torvalds 已提交
1294
	if (err) {
1295
		security_xfrm_policy_free(xp->security);
L
Linus Torvalds 已提交
1296 1297 1298 1299
		kfree(xp);
		return err;
	}

1300
	c.event = nlh->nlmsg_type;
1301 1302 1303 1304
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
	km_policy_notify(xp, p->dir, &c);

L
Linus Torvalds 已提交
1305 1306 1307 1308 1309 1310 1311 1312 1313 1314 1315 1316 1317 1318 1319 1320 1321 1322
	xfrm_pol_put(xp);

	return 0;
}

static int copy_to_user_tmpl(struct xfrm_policy *xp, struct sk_buff *skb)
{
	struct xfrm_user_tmpl vec[XFRM_MAX_DEPTH];
	int i;

	if (xp->xfrm_nr == 0)
		return 0;

	for (i = 0; i < xp->xfrm_nr; i++) {
		struct xfrm_user_tmpl *up = &vec[i];
		struct xfrm_tmpl *kp = &xp->xfrm_vec[i];

		memcpy(&up->id, &kp->id, sizeof(up->id));
1323
		up->family = kp->encap_family;
L
Linus Torvalds 已提交
1324 1325 1326 1327 1328 1329 1330 1331 1332
		memcpy(&up->saddr, &kp->saddr, sizeof(up->saddr));
		up->reqid = kp->reqid;
		up->mode = kp->mode;
		up->share = kp->share;
		up->optional = kp->optional;
		up->aalgos = kp->aalgos;
		up->ealgos = kp->ealgos;
		up->calgos = kp->calgos;
	}
1333

1334 1335
	return nla_put(skb, XFRMA_TMPL,
		       sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr, vec);
1336 1337 1338 1339 1340 1341
}

static inline int copy_to_user_state_sec_ctx(struct xfrm_state *x, struct sk_buff *skb)
{
	if (x->security) {
		return copy_sec_ctx(x->security, skb);
1342 1343
	}
	return 0;
1344
}
1345

1346 1347 1348 1349 1350 1351
static inline int copy_to_user_sec_ctx(struct xfrm_policy *xp, struct sk_buff *skb)
{
	if (xp->security) {
		return copy_sec_ctx(xp->security, skb);
	}
	return 0;
1352
}
1353 1354 1355 1356 1357 1358 1359 1360
static inline size_t userpolicy_type_attrsize(void)
{
#ifdef CONFIG_XFRM_SUB_POLICY
	return nla_total_size(sizeof(struct xfrm_userpolicy_type));
#else
	return 0;
#endif
}
1361

1362
#ifdef CONFIG_XFRM_SUB_POLICY
1363
static int copy_to_user_policy_type(u8 type, struct sk_buff *skb)
1364
{
1365 1366 1367
	struct xfrm_userpolicy_type upt = {
		.type = type,
	};
1368

1369
	return nla_put(skb, XFRMA_POLICY_TYPE, sizeof(upt), &upt);
1370 1371 1372
}

#else
1373
static inline int copy_to_user_policy_type(u8 type, struct sk_buff *skb)
1374 1375 1376 1377 1378
{
	return 0;
}
#endif

L
Linus Torvalds 已提交
1379 1380 1381 1382 1383 1384 1385 1386
static int dump_one_policy(struct xfrm_policy *xp, int dir, int count, void *ptr)
{
	struct xfrm_dump_info *sp = ptr;
	struct xfrm_userpolicy_info *p;
	struct sk_buff *in_skb = sp->in_skb;
	struct sk_buff *skb = sp->out_skb;
	struct nlmsghdr *nlh;

1387 1388 1389 1390
	nlh = nlmsg_put(skb, NETLINK_CB(in_skb).pid, sp->nlmsg_seq,
			XFRM_MSG_NEWPOLICY, sizeof(*p), sp->nlmsg_flags);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
1391

1392
	p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1393 1394 1395
	copy_to_user_policy(xp, p, dir);
	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
1396 1397
	if (copy_to_user_sec_ctx(xp, skb))
		goto nlmsg_failure;
1398
	if (copy_to_user_policy_type(xp->type, skb) < 0)
1399
		goto nlmsg_failure;
1400 1401
	if (xfrm_mark_put(skb, &xp->mark))
		goto nla_put_failure;
L
Linus Torvalds 已提交
1402

1403
	nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
1404 1405
	return 0;

1406
nla_put_failure:
L
Linus Torvalds 已提交
1407
nlmsg_failure:
1408 1409
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
L
Linus Torvalds 已提交
1410 1411
}

1412 1413 1414 1415 1416 1417 1418 1419
static int xfrm_dump_policy_done(struct netlink_callback *cb)
{
	struct xfrm_policy_walk *walk = (struct xfrm_policy_walk *) &cb->args[1];

	xfrm_policy_walk_done(walk);
	return 0;
}

L
Linus Torvalds 已提交
1420 1421
static int xfrm_dump_policy(struct sk_buff *skb, struct netlink_callback *cb)
{
1422
	struct net *net = sock_net(skb->sk);
1423
	struct xfrm_policy_walk *walk = (struct xfrm_policy_walk *) &cb->args[1];
L
Linus Torvalds 已提交
1424 1425
	struct xfrm_dump_info info;

1426 1427 1428
	BUILD_BUG_ON(sizeof(struct xfrm_policy_walk) >
		     sizeof(cb->args) - sizeof(cb->args[0]));

L
Linus Torvalds 已提交
1429 1430 1431 1432
	info.in_skb = cb->skb;
	info.out_skb = skb;
	info.nlmsg_seq = cb->nlh->nlmsg_seq;
	info.nlmsg_flags = NLM_F_MULTI;
1433 1434 1435 1436 1437 1438

	if (!cb->args[0]) {
		cb->args[0] = 1;
		xfrm_policy_walk_init(walk, XFRM_POLICY_TYPE_ANY);
	}

1439
	(void) xfrm_policy_walk(net, walk, dump_one_policy, &info);
L
Linus Torvalds 已提交
1440 1441 1442 1443 1444 1445 1446 1447 1448 1449 1450

	return skb->len;
}

static struct sk_buff *xfrm_policy_netlink(struct sk_buff *in_skb,
					  struct xfrm_policy *xp,
					  int dir, u32 seq)
{
	struct xfrm_dump_info info;
	struct sk_buff *skb;

1451
	skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
L
Linus Torvalds 已提交
1452 1453 1454 1455 1456 1457 1458 1459 1460 1461 1462 1463 1464 1465 1466 1467
	if (!skb)
		return ERR_PTR(-ENOMEM);

	info.in_skb = in_skb;
	info.out_skb = skb;
	info.nlmsg_seq = seq;
	info.nlmsg_flags = 0;

	if (dump_one_policy(xp, dir, 0, &info) < 0) {
		kfree_skb(skb);
		return NULL;
	}

	return skb;
}

1468
static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1469
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1470
{
1471
	struct net *net = sock_net(skb->sk);
L
Linus Torvalds 已提交
1472 1473
	struct xfrm_policy *xp;
	struct xfrm_userpolicy_id *p;
1474
	u8 type = XFRM_POLICY_TYPE_MAIN;
L
Linus Torvalds 已提交
1475
	int err;
1476
	struct km_event c;
L
Linus Torvalds 已提交
1477
	int delete;
1478 1479
	struct xfrm_mark m;
	u32 mark = xfrm_mark_get(attrs, &m);
L
Linus Torvalds 已提交
1480

1481
	p = nlmsg_data(nlh);
L
Linus Torvalds 已提交
1482 1483
	delete = nlh->nlmsg_type == XFRM_MSG_DELPOLICY;

1484
	err = copy_from_user_policy_type(&type, attrs);
1485 1486 1487
	if (err)
		return err;

L
Linus Torvalds 已提交
1488 1489 1490 1491 1492
	err = verify_policy_dir(p->dir);
	if (err)
		return err;

	if (p->index)
1493
		xp = xfrm_policy_byid(net, mark, type, p->dir, p->index, delete, &err);
1494
	else {
1495
		struct nlattr *rt = attrs[XFRMA_SEC_CTX];
1496
		struct xfrm_sec_ctx *ctx;
1497

1498
		err = verify_sec_ctx_len(attrs);
1499 1500 1501
		if (err)
			return err;

1502
		ctx = NULL;
1503
		if (rt) {
1504
			struct xfrm_user_sec_ctx *uctx = nla_data(rt);
1505

1506 1507
			err = security_xfrm_policy_alloc(&ctx, uctx);
			if (err)
1508
				return err;
1509
		}
1510
		xp = xfrm_policy_bysel_ctx(net, mark, type, p->dir, &p->sel,
1511
					   ctx, delete, &err);
1512
		security_xfrm_policy_free(ctx);
1513
	}
L
Linus Torvalds 已提交
1514 1515 1516 1517 1518 1519 1520 1521 1522 1523
	if (xp == NULL)
		return -ENOENT;

	if (!delete) {
		struct sk_buff *resp_skb;

		resp_skb = xfrm_policy_netlink(skb, xp, p->dir, nlh->nlmsg_seq);
		if (IS_ERR(resp_skb)) {
			err = PTR_ERR(resp_skb);
		} else {
1524
			err = nlmsg_unicast(net->xfrm.nlsk, resp_skb,
1525
					    NETLINK_CB(skb).pid);
L
Linus Torvalds 已提交
1526
		}
1527
	} else {
1528 1529 1530
		uid_t loginuid = audit_get_loginuid(current);
		u32 sessionid = audit_get_sessionid(current);
		u32 sid;
1531

1532
		security_task_getsecid(current, &sid);
1533 1534
		xfrm_audit_policy_delete(xp, err ? 0 : 1, loginuid, sessionid,
					 sid);
1535 1536

		if (err != 0)
C
Catherine Zhang 已提交
1537
			goto out;
1538

1539
		c.data.byid = p->index;
1540
		c.event = nlh->nlmsg_type;
1541 1542 1543
		c.seq = nlh->nlmsg_seq;
		c.pid = nlh->nlmsg_pid;
		km_policy_notify(xp, p->dir, &c);
L
Linus Torvalds 已提交
1544 1545
	}

C
Catherine Zhang 已提交
1546
out:
1547
	xfrm_pol_put(xp);
L
Linus Torvalds 已提交
1548 1549 1550
	return err;
}

1551
static int xfrm_flush_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
1552
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1553
{
1554
	struct net *net = sock_net(skb->sk);
1555
	struct km_event c;
1556
	struct xfrm_usersa_flush *p = nlmsg_data(nlh);
J
Joy Latten 已提交
1557
	struct xfrm_audit audit_info;
1558
	int err;
L
Linus Torvalds 已提交
1559

1560 1561 1562
	audit_info.loginuid = audit_get_loginuid(current);
	audit_info.sessionid = audit_get_sessionid(current);
	security_task_getsecid(current, &audit_info.secid);
1563
	err = xfrm_state_flush(net, p->proto, &audit_info);
1564 1565 1566
	if (err) {
		if (err == -ESRCH) /* empty table */
			return 0;
1567
		return err;
1568
	}
1569
	c.data.proto = p->proto;
1570
	c.event = nlh->nlmsg_type;
1571 1572
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
1573
	c.net = net;
1574 1575
	km_state_notify(NULL, &c);

L
Linus Torvalds 已提交
1576 1577 1578
	return 0;
}

1579 1580 1581 1582 1583
static inline size_t xfrm_aevent_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_aevent_id))
	       + nla_total_size(sizeof(struct xfrm_replay_state))
	       + nla_total_size(sizeof(struct xfrm_lifetime_cur))
1584
	       + nla_total_size(sizeof(struct xfrm_mark))
1585 1586 1587
	       + nla_total_size(4) /* XFRM_AE_RTHR */
	       + nla_total_size(4); /* XFRM_AE_ETHR */
}
J
Jamal Hadi Salim 已提交
1588

1589
static int build_aevent(struct sk_buff *skb, struct xfrm_state *x, const struct km_event *c)
J
Jamal Hadi Salim 已提交
1590 1591 1592 1593
{
	struct xfrm_aevent_id *id;
	struct nlmsghdr *nlh;

1594 1595 1596
	nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_NEWAE, sizeof(*id), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
J
Jamal Hadi Salim 已提交
1597

1598
	id = nlmsg_data(nlh);
1599
	memcpy(&id->sa_id.daddr, &x->id.daddr,sizeof(x->id.daddr));
J
Jamal Hadi Salim 已提交
1600 1601 1602
	id->sa_id.spi = x->id.spi;
	id->sa_id.family = x->props.family;
	id->sa_id.proto = x->id.proto;
1603 1604
	memcpy(&id->saddr, &x->props.saddr,sizeof(x->props.saddr));
	id->reqid = x->props.reqid;
J
Jamal Hadi Salim 已提交
1605 1606
	id->flags = c->data.aevent;

1607 1608
	NLA_PUT(skb, XFRMA_REPLAY_VAL, sizeof(x->replay), &x->replay);
	NLA_PUT(skb, XFRMA_LTIME_VAL, sizeof(x->curlft), &x->curlft);
J
Jamal Hadi Salim 已提交
1609

1610 1611
	if (id->flags & XFRM_AE_RTHR)
		NLA_PUT_U32(skb, XFRMA_REPLAY_THRESH, x->replay_maxdiff);
J
Jamal Hadi Salim 已提交
1612

1613 1614 1615
	if (id->flags & XFRM_AE_ETHR)
		NLA_PUT_U32(skb, XFRMA_ETIMER_THRESH,
			    x->replay_maxage * 10 / HZ);
J
Jamal Hadi Salim 已提交
1616

1617 1618 1619
	if (xfrm_mark_put(skb, &x->mark))
		goto nla_put_failure;

1620
	return nlmsg_end(skb, nlh);
J
Jamal Hadi Salim 已提交
1621

1622
nla_put_failure:
1623 1624
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
J
Jamal Hadi Salim 已提交
1625 1626
}

1627
static int xfrm_get_ae(struct sk_buff *skb, struct nlmsghdr *nlh,
1628
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
1629
{
1630
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
1631 1632 1633 1634
	struct xfrm_state *x;
	struct sk_buff *r_skb;
	int err;
	struct km_event c;
1635 1636
	u32 mark;
	struct xfrm_mark m;
1637
	struct xfrm_aevent_id *p = nlmsg_data(nlh);
J
Jamal Hadi Salim 已提交
1638 1639
	struct xfrm_usersa_id *id = &p->sa_id;

1640
	r_skb = nlmsg_new(xfrm_aevent_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
1641 1642 1643
	if (r_skb == NULL)
		return -ENOMEM;

1644 1645 1646
	mark = xfrm_mark_get(attrs, &m);

	x = xfrm_state_lookup(net, mark, &id->daddr, id->spi, id->proto, id->family);
J
Jamal Hadi Salim 已提交
1647
	if (x == NULL) {
P
Patrick McHardy 已提交
1648
		kfree_skb(r_skb);
J
Jamal Hadi Salim 已提交
1649 1650 1651 1652 1653 1654 1655 1656 1657 1658 1659 1660 1661 1662 1663
		return -ESRCH;
	}

	/*
	 * XXX: is this lock really needed - none of the other
	 * gets lock (the concern is things getting updated
	 * while we are still reading) - jhs
	*/
	spin_lock_bh(&x->lock);
	c.data.aevent = p->flags;
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;

	if (build_aevent(r_skb, x, &c) < 0)
		BUG();
1664
	err = nlmsg_unicast(net->xfrm.nlsk, r_skb, NETLINK_CB(skb).pid);
J
Jamal Hadi Salim 已提交
1665 1666 1667 1668 1669
	spin_unlock_bh(&x->lock);
	xfrm_state_put(x);
	return err;
}

1670
static int xfrm_new_ae(struct sk_buff *skb, struct nlmsghdr *nlh,
1671
		struct nlattr **attrs)
J
Jamal Hadi Salim 已提交
1672
{
1673
	struct net *net = sock_net(skb->sk);
J
Jamal Hadi Salim 已提交
1674 1675 1676
	struct xfrm_state *x;
	struct km_event c;
	int err = - EINVAL;
1677 1678
	u32 mark = 0;
	struct xfrm_mark m;
1679
	struct xfrm_aevent_id *p = nlmsg_data(nlh);
1680 1681
	struct nlattr *rp = attrs[XFRMA_REPLAY_VAL];
	struct nlattr *lt = attrs[XFRMA_LTIME_VAL];
J
Jamal Hadi Salim 已提交
1682 1683 1684 1685 1686 1687 1688 1689

	if (!lt && !rp)
		return err;

	/* pedantic mode - thou shalt sayeth replaceth */
	if (!(nlh->nlmsg_flags&NLM_F_REPLACE))
		return err;

1690 1691 1692
	mark = xfrm_mark_get(attrs, &m);

	x = xfrm_state_lookup(net, mark, &p->sa_id.daddr, p->sa_id.spi, p->sa_id.proto, p->sa_id.family);
J
Jamal Hadi Salim 已提交
1693 1694 1695 1696 1697 1698 1699
	if (x == NULL)
		return -ESRCH;

	if (x->km.state != XFRM_STATE_VALID)
		goto out;

	spin_lock_bh(&x->lock);
1700
	xfrm_update_ae_params(x, attrs);
J
Jamal Hadi Salim 已提交
1701 1702 1703 1704 1705 1706 1707 1708 1709 1710 1711 1712 1713
	spin_unlock_bh(&x->lock);

	c.event = nlh->nlmsg_type;
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
	c.data.aevent = XFRM_AE_CU;
	km_state_notify(x, &c);
	err = 0;
out:
	xfrm_state_put(x);
	return err;
}

1714
static int xfrm_flush_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
1715
		struct nlattr **attrs)
L
Linus Torvalds 已提交
1716
{
1717
	struct net *net = sock_net(skb->sk);
1718
	struct km_event c;
1719
	u8 type = XFRM_POLICY_TYPE_MAIN;
1720
	int err;
J
Joy Latten 已提交
1721
	struct xfrm_audit audit_info;
1722

1723
	err = copy_from_user_policy_type(&type, attrs);
1724 1725
	if (err)
		return err;
1726

1727 1728 1729
	audit_info.loginuid = audit_get_loginuid(current);
	audit_info.sessionid = audit_get_sessionid(current);
	security_task_getsecid(current, &audit_info.secid);
1730
	err = xfrm_policy_flush(net, type, &audit_info);
1731 1732 1733
	if (err) {
		if (err == -ESRCH) /* empty table */
			return 0;
1734
		return err;
1735 1736
	}

1737
	c.data.type = type;
1738
	c.event = nlh->nlmsg_type;
1739 1740
	c.seq = nlh->nlmsg_seq;
	c.pid = nlh->nlmsg_pid;
1741
	c.net = net;
1742
	km_policy_notify(NULL, 0, &c);
L
Linus Torvalds 已提交
1743 1744 1745
	return 0;
}

1746
static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
1747
		struct nlattr **attrs)
1748
{
1749
	struct net *net = sock_net(skb->sk);
1750
	struct xfrm_policy *xp;
1751
	struct xfrm_user_polexpire *up = nlmsg_data(nlh);
1752
	struct xfrm_userpolicy_info *p = &up->pol;
1753
	u8 type = XFRM_POLICY_TYPE_MAIN;
1754
	int err = -ENOENT;
1755 1756
	struct xfrm_mark m;
	u32 mark = xfrm_mark_get(attrs, &m);
1757

1758
	err = copy_from_user_policy_type(&type, attrs);
1759 1760 1761
	if (err)
		return err;

1762 1763 1764 1765
	err = verify_policy_dir(p->dir);
	if (err)
		return err;

1766
	if (p->index)
1767
		xp = xfrm_policy_byid(net, mark, type, p->dir, p->index, 0, &err);
1768
	else {
1769
		struct nlattr *rt = attrs[XFRMA_SEC_CTX];
1770
		struct xfrm_sec_ctx *ctx;
1771

1772
		err = verify_sec_ctx_len(attrs);
1773 1774 1775
		if (err)
			return err;

1776
		ctx = NULL;
1777
		if (rt) {
1778
			struct xfrm_user_sec_ctx *uctx = nla_data(rt);
1779

1780 1781
			err = security_xfrm_policy_alloc(&ctx, uctx);
			if (err)
1782
				return err;
1783
		}
1784
		xp = xfrm_policy_bysel_ctx(net, mark, type, p->dir,
1785
					   &p->sel, ctx, 0, &err);
1786
		security_xfrm_policy_free(ctx);
1787 1788
	}
	if (xp == NULL)
1789
		return -ENOENT;
1790

1791
	if (unlikely(xp->walk.dead))
1792 1793 1794 1795
		goto out;

	err = 0;
	if (up->hard) {
1796 1797 1798 1799 1800
		uid_t loginuid = audit_get_loginuid(current);
		u32 sessionid = audit_get_sessionid(current);
		u32 sid;

		security_task_getsecid(current, &sid);
1801
		xfrm_policy_delete(xp, p->dir);
1802
		xfrm_audit_policy_delete(xp, 1, loginuid, sessionid, sid);
J
Joy Latten 已提交
1803

1804 1805
	} else {
		// reset the timers here?
S
stephen hemminger 已提交
1806
		WARN(1, "Dont know what to do with soft policy expire\n");
1807 1808 1809 1810 1811 1812 1813 1814
	}
	km_policy_expired(xp, p->dir, up->hard, current->pid);

out:
	xfrm_pol_put(xp);
	return err;
}

1815
static int xfrm_add_sa_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
1816
		struct nlattr **attrs)
1817
{
1818
	struct net *net = sock_net(skb->sk);
1819 1820
	struct xfrm_state *x;
	int err;
1821
	struct xfrm_user_expire *ue = nlmsg_data(nlh);
1822
	struct xfrm_usersa_info *p = &ue->state;
1823
	struct xfrm_mark m;
1824
	u32 mark = xfrm_mark_get(attrs, &m);
1825

1826
	x = xfrm_state_lookup(net, mark, &p->id.daddr, p->id.spi, p->id.proto, p->family);
1827

1828
	err = -ENOENT;
1829 1830 1831 1832
	if (x == NULL)
		return err;

	spin_lock_bh(&x->lock);
1833
	err = -EINVAL;
1834 1835 1836 1837
	if (x->km.state != XFRM_STATE_VALID)
		goto out;
	km_state_expired(x, ue->hard, current->pid);

J
Joy Latten 已提交
1838
	if (ue->hard) {
1839 1840 1841 1842 1843
		uid_t loginuid = audit_get_loginuid(current);
		u32 sessionid = audit_get_sessionid(current);
		u32 sid;

		security_task_getsecid(current, &sid);
1844
		__xfrm_state_delete(x);
1845
		xfrm_audit_state_delete(x, 1, loginuid, sessionid, sid);
J
Joy Latten 已提交
1846
	}
1847
	err = 0;
1848 1849 1850 1851 1852 1853
out:
	spin_unlock_bh(&x->lock);
	xfrm_state_put(x);
	return err;
}

1854
static int xfrm_add_acquire(struct sk_buff *skb, struct nlmsghdr *nlh,
1855
		struct nlattr **attrs)
1856
{
1857
	struct net *net = sock_net(skb->sk);
1858 1859 1860
	struct xfrm_policy *xp;
	struct xfrm_user_tmpl *ut;
	int i;
1861
	struct nlattr *rt = attrs[XFRMA_TMPL];
1862
	struct xfrm_mark mark;
1863

1864
	struct xfrm_user_acquire *ua = nlmsg_data(nlh);
1865
	struct xfrm_state *x = xfrm_state_alloc(net);
1866 1867 1868
	int err = -ENOMEM;

	if (!x)
I
Ilpo Järvinen 已提交
1869
		goto nomem;
1870

1871 1872
	xfrm_mark_get(attrs, &mark);

1873
	err = verify_newpolicy_info(&ua->policy);
I
Ilpo Järvinen 已提交
1874 1875
	if (err)
		goto bad_policy;
1876 1877

	/*   build an XP */
1878
	xp = xfrm_policy_construct(net, &ua->policy, attrs, &err);
I
Ilpo Järvinen 已提交
1879 1880
	if (!xp)
		goto free_state;
1881 1882 1883 1884

	memcpy(&x->id, &ua->id, sizeof(ua->id));
	memcpy(&x->props.saddr, &ua->saddr, sizeof(ua->saddr));
	memcpy(&x->sel, &ua->sel, sizeof(ua->sel));
1885 1886
	xp->mark.m = x->mark.m = mark.m;
	xp->mark.v = x->mark.v = mark.v;
1887
	ut = nla_data(rt);
1888 1889 1890 1891 1892 1893 1894 1895 1896 1897 1898 1899 1900 1901 1902 1903 1904 1905
	/* extract the templates and for each call km_key */
	for (i = 0; i < xp->xfrm_nr; i++, ut++) {
		struct xfrm_tmpl *t = &xp->xfrm_vec[i];
		memcpy(&x->id, &t->id, sizeof(x->id));
		x->props.mode = t->mode;
		x->props.reqid = t->reqid;
		x->props.family = ut->family;
		t->aalgos = ua->aalgos;
		t->ealgos = ua->ealgos;
		t->calgos = ua->calgos;
		err = km_query(x, t, xp);

	}

	kfree(x);
	kfree(xp);

	return 0;
I
Ilpo Järvinen 已提交
1906 1907

bad_policy:
S
stephen hemminger 已提交
1908
	WARN(1, "BAD policy passed\n");
I
Ilpo Järvinen 已提交
1909 1910 1911 1912
free_state:
	kfree(x);
nomem:
	return err;
1913 1914
}

1915 1916
#ifdef CONFIG_XFRM_MIGRATE
static int copy_from_user_migrate(struct xfrm_migrate *ma,
1917
				  struct xfrm_kmaddress *k,
1918
				  struct nlattr **attrs, int *num)
1919
{
1920
	struct nlattr *rt = attrs[XFRMA_MIGRATE];
1921 1922 1923
	struct xfrm_user_migrate *um;
	int i, num_migrate;

1924 1925 1926 1927 1928 1929 1930 1931 1932 1933
	if (k != NULL) {
		struct xfrm_user_kmaddress *uk;

		uk = nla_data(attrs[XFRMA_KMADDRESS]);
		memcpy(&k->local, &uk->local, sizeof(k->local));
		memcpy(&k->remote, &uk->remote, sizeof(k->remote));
		k->family = uk->family;
		k->reserved = uk->reserved;
	}

1934 1935
	um = nla_data(rt);
	num_migrate = nla_len(rt) / sizeof(*um);
1936 1937 1938 1939 1940 1941 1942 1943 1944 1945 1946 1947 1948 1949 1950 1951 1952 1953 1954 1955 1956 1957 1958

	if (num_migrate <= 0 || num_migrate > XFRM_MAX_DEPTH)
		return -EINVAL;

	for (i = 0; i < num_migrate; i++, um++, ma++) {
		memcpy(&ma->old_daddr, &um->old_daddr, sizeof(ma->old_daddr));
		memcpy(&ma->old_saddr, &um->old_saddr, sizeof(ma->old_saddr));
		memcpy(&ma->new_daddr, &um->new_daddr, sizeof(ma->new_daddr));
		memcpy(&ma->new_saddr, &um->new_saddr, sizeof(ma->new_saddr));

		ma->proto = um->proto;
		ma->mode = um->mode;
		ma->reqid = um->reqid;

		ma->old_family = um->old_family;
		ma->new_family = um->new_family;
	}

	*num = i;
	return 0;
}

static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh,
1959
			   struct nlattr **attrs)
1960
{
1961
	struct xfrm_userpolicy_id *pi = nlmsg_data(nlh);
1962
	struct xfrm_migrate m[XFRM_MAX_DEPTH];
1963
	struct xfrm_kmaddress km, *kmp;
1964 1965 1966 1967
	u8 type;
	int err;
	int n = 0;

1968
	if (attrs[XFRMA_MIGRATE] == NULL)
1969
		return -EINVAL;
1970

1971 1972
	kmp = attrs[XFRMA_KMADDRESS] ? &km : NULL;

1973
	err = copy_from_user_policy_type(&type, attrs);
1974 1975 1976
	if (err)
		return err;

1977
	err = copy_from_user_migrate((struct xfrm_migrate *)m, kmp, attrs, &n);
1978 1979 1980 1981 1982 1983
	if (err)
		return err;

	if (!n)
		return 0;

1984
	xfrm_migrate(&pi->sel, pi->dir, type, m, n, kmp);
1985 1986 1987 1988 1989

	return 0;
}
#else
static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh,
1990
			   struct nlattr **attrs)
1991 1992 1993 1994 1995 1996
{
	return -ENOPROTOOPT;
}
#endif

#ifdef CONFIG_XFRM_MIGRATE
1997
static int copy_to_user_migrate(const struct xfrm_migrate *m, struct sk_buff *skb)
1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2011
{
	struct xfrm_user_migrate um;

	memset(&um, 0, sizeof(um));
	um.proto = m->proto;
	um.mode = m->mode;
	um.reqid = m->reqid;
	um.old_family = m->old_family;
	memcpy(&um.old_daddr, &m->old_daddr, sizeof(um.old_daddr));
	memcpy(&um.old_saddr, &m->old_saddr, sizeof(um.old_saddr));
	um.new_family = m->new_family;
	memcpy(&um.new_daddr, &m->new_daddr, sizeof(um.new_daddr));
	memcpy(&um.new_saddr, &m->new_saddr, sizeof(um.new_saddr));

2012
	return nla_put(skb, XFRMA_MIGRATE, sizeof(um), &um);
2013 2014
}

2015
static int copy_to_user_kmaddress(const struct xfrm_kmaddress *k, struct sk_buff *skb)
2016 2017 2018 2019 2020 2021 2022
{
	struct xfrm_user_kmaddress uk;

	memset(&uk, 0, sizeof(uk));
	uk.family = k->family;
	uk.reserved = k->reserved;
	memcpy(&uk.local, &k->local, sizeof(uk.local));
2023
	memcpy(&uk.remote, &k->remote, sizeof(uk.remote));
2024 2025 2026 2027 2028

	return nla_put(skb, XFRMA_KMADDRESS, sizeof(uk), &uk);
}

static inline size_t xfrm_migrate_msgsize(int num_migrate, int with_kma)
2029 2030
{
	return NLMSG_ALIGN(sizeof(struct xfrm_userpolicy_id))
2031 2032 2033
	      + (with_kma ? nla_total_size(sizeof(struct xfrm_kmaddress)) : 0)
	      + nla_total_size(sizeof(struct xfrm_user_migrate) * num_migrate)
	      + userpolicy_type_attrsize();
2034 2035
}

2036 2037 2038
static int build_migrate(struct sk_buff *skb, const struct xfrm_migrate *m,
			 int num_migrate, const struct xfrm_kmaddress *k,
			 const struct xfrm_selector *sel, u8 dir, u8 type)
2039
{
2040
	const struct xfrm_migrate *mp;
2041 2042 2043 2044
	struct xfrm_userpolicy_id *pol_id;
	struct nlmsghdr *nlh;
	int i;

2045 2046 2047
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_MIGRATE, sizeof(*pol_id), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
2048

2049
	pol_id = nlmsg_data(nlh);
2050 2051 2052 2053 2054
	/* copy data from selector, dir, and type to the pol_id */
	memset(pol_id, 0, sizeof(*pol_id));
	memcpy(&pol_id->sel, sel, sizeof(pol_id->sel));
	pol_id->dir = dir;

2055 2056 2057
	if (k != NULL && (copy_to_user_kmaddress(k, skb) < 0))
			goto nlmsg_failure;

2058 2059 2060 2061 2062 2063 2064 2065
	if (copy_to_user_policy_type(type, skb) < 0)
		goto nlmsg_failure;

	for (i = 0, mp = m ; i < num_migrate; i++, mp++) {
		if (copy_to_user_migrate(mp, skb) < 0)
			goto nlmsg_failure;
	}

2066
	return nlmsg_end(skb, nlh);
2067
nlmsg_failure:
2068 2069
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
2070 2071
}

2072 2073 2074
static int xfrm_send_migrate(const struct xfrm_selector *sel, u8 dir, u8 type,
			     const struct xfrm_migrate *m, int num_migrate,
			     const struct xfrm_kmaddress *k)
2075
{
2076
	struct net *net = &init_net;
2077 2078
	struct sk_buff *skb;

2079
	skb = nlmsg_new(xfrm_migrate_msgsize(num_migrate, !!k), GFP_ATOMIC);
2080 2081 2082 2083
	if (skb == NULL)
		return -ENOMEM;

	/* build migrate */
2084
	if (build_migrate(skb, m, num_migrate, k, sel, dir, type) < 0)
2085 2086
		BUG();

2087
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_MIGRATE, GFP_ATOMIC);
2088 2089
}
#else
2090 2091 2092
static int xfrm_send_migrate(const struct xfrm_selector *sel, u8 dir, u8 type,
			     const struct xfrm_migrate *m, int num_migrate,
			     const struct xfrm_kmaddress *k)
2093 2094 2095 2096
{
	return -ENOPROTOOPT;
}
#endif
J
Jamal Hadi Salim 已提交
2097

2098
#define XMSGSIZE(type) sizeof(struct type)
2099 2100

static const int xfrm_msg_min[XFRM_NR_MSGTYPES] = {
2101
	[XFRM_MSG_NEWSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_info),
2102 2103 2104 2105 2106 2107
	[XFRM_MSG_DELSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_id),
	[XFRM_MSG_GETSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_id),
	[XFRM_MSG_NEWPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_info),
	[XFRM_MSG_DELPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
	[XFRM_MSG_GETPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
	[XFRM_MSG_ALLOCSPI    - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userspi_info),
2108
	[XFRM_MSG_ACQUIRE     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_acquire),
2109
	[XFRM_MSG_EXPIRE      - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_expire),
2110
	[XFRM_MSG_UPDPOLICY   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_info),
2111
	[XFRM_MSG_UPDSA       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_info),
2112
	[XFRM_MSG_POLEXPIRE   - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_polexpire),
2113
	[XFRM_MSG_FLUSHSA     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_flush),
2114
	[XFRM_MSG_FLUSHPOLICY - XFRM_MSG_BASE] = 0,
J
Jamal Hadi Salim 已提交
2115 2116
	[XFRM_MSG_NEWAE       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_aevent_id),
	[XFRM_MSG_GETAE       - XFRM_MSG_BASE] = XMSGSIZE(xfrm_aevent_id),
2117
	[XFRM_MSG_REPORT      - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_report),
2118
	[XFRM_MSG_MIGRATE     - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
2119 2120
	[XFRM_MSG_GETSADINFO  - XFRM_MSG_BASE] = sizeof(u32),
	[XFRM_MSG_GETSPDINFO  - XFRM_MSG_BASE] = sizeof(u32),
L
Linus Torvalds 已提交
2121 2122
};

2123 2124
#undef XMSGSIZE

2125
static const struct nla_policy xfrma_policy[XFRMA_MAX+1] = {
J
jamal 已提交
2126 2127 2128 2129
	[XFRMA_SA]		= { .len = sizeof(struct xfrm_usersa_info)},
	[XFRMA_POLICY]		= { .len = sizeof(struct xfrm_userpolicy_info)},
	[XFRMA_LASTUSED]	= { .type = NLA_U64},
	[XFRMA_ALG_AUTH_TRUNC]	= { .len = sizeof(struct xfrm_algo_auth)},
2130
	[XFRMA_ALG_AEAD]	= { .len = sizeof(struct xfrm_algo_aead) },
2131 2132 2133 2134 2135 2136 2137 2138 2139 2140 2141 2142 2143 2144
	[XFRMA_ALG_AUTH]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ALG_CRYPT]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ALG_COMP]	= { .len = sizeof(struct xfrm_algo) },
	[XFRMA_ENCAP]		= { .len = sizeof(struct xfrm_encap_tmpl) },
	[XFRMA_TMPL]		= { .len = sizeof(struct xfrm_user_tmpl) },
	[XFRMA_SEC_CTX]		= { .len = sizeof(struct xfrm_sec_ctx) },
	[XFRMA_LTIME_VAL]	= { .len = sizeof(struct xfrm_lifetime_cur) },
	[XFRMA_REPLAY_VAL]	= { .len = sizeof(struct xfrm_replay_state) },
	[XFRMA_REPLAY_THRESH]	= { .type = NLA_U32 },
	[XFRMA_ETIMER_THRESH]	= { .type = NLA_U32 },
	[XFRMA_SRCADDR]		= { .len = sizeof(xfrm_address_t) },
	[XFRMA_COADDR]		= { .len = sizeof(xfrm_address_t) },
	[XFRMA_POLICY_TYPE]	= { .len = sizeof(struct xfrm_userpolicy_type)},
	[XFRMA_MIGRATE]		= { .len = sizeof(struct xfrm_user_migrate) },
2145
	[XFRMA_KMADDRESS]	= { .len = sizeof(struct xfrm_user_kmaddress) },
2146
	[XFRMA_MARK]		= { .len = sizeof(struct xfrm_mark) },
2147
	[XFRMA_TFCPAD]		= { .type = NLA_U32 },
2148 2149
};

L
Linus Torvalds 已提交
2150
static struct xfrm_link {
2151
	int (*doit)(struct sk_buff *, struct nlmsghdr *, struct nlattr **);
L
Linus Torvalds 已提交
2152
	int (*dump)(struct sk_buff *, struct netlink_callback *);
2153
	int (*done)(struct netlink_callback *);
2154 2155 2156 2157
} xfrm_dispatch[XFRM_NR_MSGTYPES] = {
	[XFRM_MSG_NEWSA       - XFRM_MSG_BASE] = { .doit = xfrm_add_sa        },
	[XFRM_MSG_DELSA       - XFRM_MSG_BASE] = { .doit = xfrm_del_sa        },
	[XFRM_MSG_GETSA       - XFRM_MSG_BASE] = { .doit = xfrm_get_sa,
2158 2159
						   .dump = xfrm_dump_sa,
						   .done = xfrm_dump_sa_done  },
2160 2161 2162
	[XFRM_MSG_NEWPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_add_policy    },
	[XFRM_MSG_DELPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_get_policy    },
	[XFRM_MSG_GETPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_get_policy,
2163 2164
						   .dump = xfrm_dump_policy,
						   .done = xfrm_dump_policy_done },
2165
	[XFRM_MSG_ALLOCSPI    - XFRM_MSG_BASE] = { .doit = xfrm_alloc_userspi },
2166
	[XFRM_MSG_ACQUIRE     - XFRM_MSG_BASE] = { .doit = xfrm_add_acquire   },
2167
	[XFRM_MSG_EXPIRE      - XFRM_MSG_BASE] = { .doit = xfrm_add_sa_expire },
2168 2169
	[XFRM_MSG_UPDPOLICY   - XFRM_MSG_BASE] = { .doit = xfrm_add_policy    },
	[XFRM_MSG_UPDSA       - XFRM_MSG_BASE] = { .doit = xfrm_add_sa        },
2170
	[XFRM_MSG_POLEXPIRE   - XFRM_MSG_BASE] = { .doit = xfrm_add_pol_expire},
2171 2172
	[XFRM_MSG_FLUSHSA     - XFRM_MSG_BASE] = { .doit = xfrm_flush_sa      },
	[XFRM_MSG_FLUSHPOLICY - XFRM_MSG_BASE] = { .doit = xfrm_flush_policy  },
J
Jamal Hadi Salim 已提交
2173 2174
	[XFRM_MSG_NEWAE       - XFRM_MSG_BASE] = { .doit = xfrm_new_ae  },
	[XFRM_MSG_GETAE       - XFRM_MSG_BASE] = { .doit = xfrm_get_ae  },
2175
	[XFRM_MSG_MIGRATE     - XFRM_MSG_BASE] = { .doit = xfrm_do_migrate    },
2176
	[XFRM_MSG_GETSADINFO  - XFRM_MSG_BASE] = { .doit = xfrm_get_sadinfo   },
J
Jamal Hadi Salim 已提交
2177
	[XFRM_MSG_GETSPDINFO  - XFRM_MSG_BASE] = { .doit = xfrm_get_spdinfo   },
L
Linus Torvalds 已提交
2178 2179
};

2180
static int xfrm_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
L
Linus Torvalds 已提交
2181
{
2182
	struct net *net = sock_net(skb->sk);
2183
	struct nlattr *attrs[XFRMA_MAX+1];
L
Linus Torvalds 已提交
2184
	struct xfrm_link *link;
2185
	int type, err;
L
Linus Torvalds 已提交
2186 2187 2188

	type = nlh->nlmsg_type;
	if (type > XFRM_MSG_MAX)
2189
		return -EINVAL;
L
Linus Torvalds 已提交
2190 2191 2192 2193 2194

	type -= XFRM_MSG_BASE;
	link = &xfrm_dispatch[type];

	/* All operations require privileges, even GET */
2195 2196
	if (security_netlink_recv(skb, CAP_NET_ADMIN))
		return -EPERM;
L
Linus Torvalds 已提交
2197

2198 2199
	if ((type == (XFRM_MSG_GETSA - XFRM_MSG_BASE) ||
	     type == (XFRM_MSG_GETPOLICY - XFRM_MSG_BASE)) &&
2200
	    (nlh->nlmsg_flags & NLM_F_DUMP)) {
L
Linus Torvalds 已提交
2201
		if (link->dump == NULL)
2202
			return -EINVAL;
2203

2204
		return netlink_dump_start(net->xfrm.nlsk, skb, nlh, link->dump, link->done);
L
Linus Torvalds 已提交
2205 2206
	}

2207
	err = nlmsg_parse(nlh, xfrm_msg_min[type], attrs, XFRMA_MAX,
2208
			  xfrma_policy);
2209 2210
	if (err < 0)
		return err;
L
Linus Torvalds 已提交
2211 2212

	if (link->doit == NULL)
2213
		return -EINVAL;
L
Linus Torvalds 已提交
2214

2215
	return link->doit(skb, nlh, attrs);
L
Linus Torvalds 已提交
2216 2217
}

2218
static void xfrm_netlink_rcv(struct sk_buff *skb)
L
Linus Torvalds 已提交
2219
{
2220 2221 2222
	mutex_lock(&xfrm_cfg_mutex);
	netlink_rcv_skb(skb, &xfrm_user_rcv_msg);
	mutex_unlock(&xfrm_cfg_mutex);
L
Linus Torvalds 已提交
2223 2224
}

2225 2226
static inline size_t xfrm_expire_msgsize(void)
{
2227 2228
	return NLMSG_ALIGN(sizeof(struct xfrm_user_expire))
	       + nla_total_size(sizeof(struct xfrm_mark));
2229 2230
}

2231
static int build_expire(struct sk_buff *skb, struct xfrm_state *x, const struct km_event *c)
L
Linus Torvalds 已提交
2232 2233 2234 2235
{
	struct xfrm_user_expire *ue;
	struct nlmsghdr *nlh;

2236 2237 2238
	nlh = nlmsg_put(skb, c->pid, 0, XFRM_MSG_EXPIRE, sizeof(*ue), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
2239

2240
	ue = nlmsg_data(nlh);
L
Linus Torvalds 已提交
2241
	copy_to_user_state(x, &ue->state);
J
Jamal Hadi Salim 已提交
2242
	ue->hard = (c->data.hard != 0) ? 1 : 0;
L
Linus Torvalds 已提交
2243

2244 2245 2246
	if (xfrm_mark_put(skb, &x->mark))
		goto nla_put_failure;

2247
	return nlmsg_end(skb, nlh);
2248 2249 2250

nla_put_failure:
	return -EMSGSIZE;
L
Linus Torvalds 已提交
2251 2252
}

2253
static int xfrm_exp_state_notify(struct xfrm_state *x, const struct km_event *c)
L
Linus Torvalds 已提交
2254
{
2255
	struct net *net = xs_net(x);
L
Linus Torvalds 已提交
2256 2257
	struct sk_buff *skb;

2258
	skb = nlmsg_new(xfrm_expire_msgsize(), GFP_ATOMIC);
L
Linus Torvalds 已提交
2259 2260 2261
	if (skb == NULL)
		return -ENOMEM;

2262 2263 2264 2265
	if (build_expire(skb, x, c) < 0) {
		kfree_skb(skb);
		return -EMSGSIZE;
	}
L
Linus Torvalds 已提交
2266

2267
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_EXPIRE, GFP_ATOMIC);
L
Linus Torvalds 已提交
2268 2269
}

2270
static int xfrm_aevent_state_notify(struct xfrm_state *x, const struct km_event *c)
J
Jamal Hadi Salim 已提交
2271
{
2272
	struct net *net = xs_net(x);
J
Jamal Hadi Salim 已提交
2273 2274
	struct sk_buff *skb;

2275
	skb = nlmsg_new(xfrm_aevent_msgsize(), GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
2276 2277 2278 2279 2280 2281
	if (skb == NULL)
		return -ENOMEM;

	if (build_aevent(skb, x, c) < 0)
		BUG();

2282
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_AEVENTS, GFP_ATOMIC);
J
Jamal Hadi Salim 已提交
2283 2284
}

2285
static int xfrm_notify_sa_flush(const struct km_event *c)
2286
{
2287
	struct net *net = c->net;
2288 2289 2290
	struct xfrm_usersa_flush *p;
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
2291
	int len = NLMSG_ALIGN(sizeof(struct xfrm_usersa_flush));
2292

2293
	skb = nlmsg_new(len, GFP_ATOMIC);
2294 2295 2296
	if (skb == NULL)
		return -ENOMEM;

2297 2298 2299 2300 2301
	nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_FLUSHSA, sizeof(*p), 0);
	if (nlh == NULL) {
		kfree_skb(skb);
		return -EMSGSIZE;
	}
2302

2303
	p = nlmsg_data(nlh);
2304
	p->proto = c->data.proto;
2305

2306
	nlmsg_end(skb, nlh);
2307

2308
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_SA, GFP_ATOMIC);
2309 2310
}

2311
static inline size_t xfrm_sa_len(struct xfrm_state *x)
2312
{
2313
	size_t l = 0;
2314 2315
	if (x->aead)
		l += nla_total_size(aead_len(x->aead));
2316 2317 2318 2319 2320
	if (x->aalg) {
		l += nla_total_size(sizeof(struct xfrm_algo) +
				    (x->aalg->alg_key_len + 7) / 8);
		l += nla_total_size(xfrm_alg_auth_len(x->aalg));
	}
2321
	if (x->ealg)
2322
		l += nla_total_size(xfrm_alg_len(x->ealg));
2323
	if (x->calg)
2324
		l += nla_total_size(sizeof(*x->calg));
2325
	if (x->encap)
2326
		l += nla_total_size(sizeof(*x->encap));
2327 2328
	if (x->tfcpad)
		l += nla_total_size(sizeof(x->tfcpad));
2329 2330 2331 2332 2333 2334
	if (x->security)
		l += nla_total_size(sizeof(struct xfrm_user_sec_ctx) +
				    x->security->ctx_len);
	if (x->coaddr)
		l += nla_total_size(sizeof(*x->coaddr));

2335 2336
	/* Must count x->lastused as it may become non-zero behind our back. */
	l += nla_total_size(sizeof(u64));
2337 2338 2339 2340

	return l;
}

2341
static int xfrm_notify_sa(struct xfrm_state *x, const struct km_event *c)
2342
{
2343
	struct net *net = xs_net(x);
2344
	struct xfrm_usersa_info *p;
2345
	struct xfrm_usersa_id *id;
2346 2347 2348
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
	int len = xfrm_sa_len(x);
2349 2350 2351 2352
	int headlen;

	headlen = sizeof(*p);
	if (c->event == XFRM_MSG_DELSA) {
2353
		len += nla_total_size(headlen);
2354
		headlen = sizeof(*id);
2355
		len += nla_total_size(sizeof(struct xfrm_mark));
2356
	}
2357
	len += NLMSG_ALIGN(headlen);
2358

2359
	skb = nlmsg_new(len, GFP_ATOMIC);
2360 2361 2362
	if (skb == NULL)
		return -ENOMEM;

2363 2364
	nlh = nlmsg_put(skb, c->pid, c->seq, c->event, headlen, 0);
	if (nlh == NULL)
2365
		goto nla_put_failure;
2366

2367
	p = nlmsg_data(nlh);
2368
	if (c->event == XFRM_MSG_DELSA) {
2369 2370
		struct nlattr *attr;

2371
		id = nlmsg_data(nlh);
2372 2373 2374 2375 2376
		memcpy(&id->daddr, &x->id.daddr, sizeof(id->daddr));
		id->spi = x->id.spi;
		id->family = x->props.family;
		id->proto = x->id.proto;

2377 2378 2379 2380 2381
		attr = nla_reserve(skb, XFRMA_SA, sizeof(*p));
		if (attr == NULL)
			goto nla_put_failure;

		p = nla_data(attr);
2382 2383
	}

2384 2385
	if (copy_to_user_state_extra(x, p, skb))
		goto nla_put_failure;
2386

2387
	nlmsg_end(skb, nlh);
2388

2389
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_SA, GFP_ATOMIC);
2390

2391
nla_put_failure:
2392 2393
	/* Somebody screwed up with xfrm_sa_len! */
	WARN_ON(1);
2394 2395 2396 2397
	kfree_skb(skb);
	return -1;
}

2398
static int xfrm_send_state_notify(struct xfrm_state *x, const struct km_event *c)
2399 2400 2401
{

	switch (c->event) {
2402
	case XFRM_MSG_EXPIRE:
2403
		return xfrm_exp_state_notify(x, c);
J
Jamal Hadi Salim 已提交
2404 2405
	case XFRM_MSG_NEWAE:
		return xfrm_aevent_state_notify(x, c);
2406 2407 2408
	case XFRM_MSG_DELSA:
	case XFRM_MSG_UPDSA:
	case XFRM_MSG_NEWSA:
2409
		return xfrm_notify_sa(x, c);
2410
	case XFRM_MSG_FLUSHSA:
2411 2412
		return xfrm_notify_sa_flush(c);
	default:
S
stephen hemminger 已提交
2413 2414 2415
		printk(KERN_NOTICE "xfrm_user: Unknown SA event %d\n",
		       c->event);
		break;
2416 2417 2418 2419 2420 2421
	}

	return 0;

}

2422 2423 2424 2425 2426
static inline size_t xfrm_acquire_msgsize(struct xfrm_state *x,
					  struct xfrm_policy *xp)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_acquire))
	       + nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr)
2427
	       + nla_total_size(sizeof(struct xfrm_mark))
2428 2429 2430 2431
	       + nla_total_size(xfrm_user_sec_ctx_size(x->security))
	       + userpolicy_type_attrsize();
}

L
Linus Torvalds 已提交
2432 2433 2434 2435 2436 2437 2438 2439
static int build_acquire(struct sk_buff *skb, struct xfrm_state *x,
			 struct xfrm_tmpl *xt, struct xfrm_policy *xp,
			 int dir)
{
	struct xfrm_user_acquire *ua;
	struct nlmsghdr *nlh;
	__u32 seq = xfrm_get_acqseq();

2440 2441 2442
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_ACQUIRE, sizeof(*ua), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
2443

2444
	ua = nlmsg_data(nlh);
L
Linus Torvalds 已提交
2445 2446 2447 2448 2449 2450 2451 2452 2453 2454 2455
	memcpy(&ua->id, &x->id, sizeof(ua->id));
	memcpy(&ua->saddr, &x->props.saddr, sizeof(ua->saddr));
	memcpy(&ua->sel, &x->sel, sizeof(ua->sel));
	copy_to_user_policy(xp, &ua->policy, dir);
	ua->aalgos = xt->aalgos;
	ua->ealgos = xt->ealgos;
	ua->calgos = xt->calgos;
	ua->seq = x->km.seq = seq;

	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
2456
	if (copy_to_user_state_sec_ctx(x, skb))
2457
		goto nlmsg_failure;
2458
	if (copy_to_user_policy_type(xp->type, skb) < 0)
2459
		goto nlmsg_failure;
2460 2461
	if (xfrm_mark_put(skb, &xp->mark))
		goto nla_put_failure;
L
Linus Torvalds 已提交
2462

2463
	return nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
2464

2465
nla_put_failure:
L
Linus Torvalds 已提交
2466
nlmsg_failure:
2467 2468
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
L
Linus Torvalds 已提交
2469 2470 2471 2472 2473
}

static int xfrm_send_acquire(struct xfrm_state *x, struct xfrm_tmpl *xt,
			     struct xfrm_policy *xp, int dir)
{
2474
	struct net *net = xs_net(x);
L
Linus Torvalds 已提交
2475 2476
	struct sk_buff *skb;

2477
	skb = nlmsg_new(xfrm_acquire_msgsize(x, xp), GFP_ATOMIC);
L
Linus Torvalds 已提交
2478 2479 2480 2481 2482 2483
	if (skb == NULL)
		return -ENOMEM;

	if (build_acquire(skb, x, xt, xp, dir) < 0)
		BUG();

2484
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_ACQUIRE, GFP_ATOMIC);
L
Linus Torvalds 已提交
2485 2486 2487 2488 2489
}

/* User gives us xfrm_user_policy_info followed by an array of 0
 * or more templates.
 */
2490
static struct xfrm_policy *xfrm_compile_policy(struct sock *sk, int opt,
L
Linus Torvalds 已提交
2491 2492
					       u8 *data, int len, int *dir)
{
2493
	struct net *net = sock_net(sk);
L
Linus Torvalds 已提交
2494 2495 2496 2497 2498
	struct xfrm_userpolicy_info *p = (struct xfrm_userpolicy_info *)data;
	struct xfrm_user_tmpl *ut = (struct xfrm_user_tmpl *) (p + 1);
	struct xfrm_policy *xp;
	int nr;

2499
	switch (sk->sk_family) {
L
Linus Torvalds 已提交
2500 2501 2502 2503 2504 2505 2506 2507 2508 2509 2510 2511 2512 2513 2514 2515 2516 2517 2518 2519 2520 2521 2522 2523 2524 2525
	case AF_INET:
		if (opt != IP_XFRM_POLICY) {
			*dir = -EOPNOTSUPP;
			return NULL;
		}
		break;
#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
	case AF_INET6:
		if (opt != IPV6_XFRM_POLICY) {
			*dir = -EOPNOTSUPP;
			return NULL;
		}
		break;
#endif
	default:
		*dir = -EINVAL;
		return NULL;
	}

	*dir = -EINVAL;

	if (len < sizeof(*p) ||
	    verify_newpolicy_info(p))
		return NULL;

	nr = ((len - sizeof(*p)) / sizeof(*ut));
2526
	if (validate_tmpl(nr, ut, p->sel.family))
L
Linus Torvalds 已提交
2527 2528
		return NULL;

2529 2530 2531
	if (p->dir > XFRM_POLICY_OUT)
		return NULL;

2532
	xp = xfrm_policy_alloc(net, GFP_ATOMIC);
L
Linus Torvalds 已提交
2533 2534 2535 2536 2537 2538
	if (xp == NULL) {
		*dir = -ENOBUFS;
		return NULL;
	}

	copy_from_user_policy(xp, p);
2539
	xp->type = XFRM_POLICY_TYPE_MAIN;
L
Linus Torvalds 已提交
2540 2541 2542 2543 2544 2545 2546
	copy_templates(xp, ut, nr);

	*dir = p->dir;

	return xp;
}

2547 2548 2549 2550 2551
static inline size_t xfrm_polexpire_msgsize(struct xfrm_policy *xp)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_polexpire))
	       + nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr)
	       + nla_total_size(xfrm_user_sec_ctx_size(xp->security))
2552
	       + nla_total_size(sizeof(struct xfrm_mark))
2553 2554 2555
	       + userpolicy_type_attrsize();
}

L
Linus Torvalds 已提交
2556
static int build_polexpire(struct sk_buff *skb, struct xfrm_policy *xp,
2557
			   int dir, const struct km_event *c)
L
Linus Torvalds 已提交
2558 2559 2560
{
	struct xfrm_user_polexpire *upe;
	struct nlmsghdr *nlh;
J
Jamal Hadi Salim 已提交
2561
	int hard = c->data.hard;
L
Linus Torvalds 已提交
2562

2563 2564 2565
	nlh = nlmsg_put(skb, c->pid, 0, XFRM_MSG_POLEXPIRE, sizeof(*upe), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
L
Linus Torvalds 已提交
2566

2567
	upe = nlmsg_data(nlh);
L
Linus Torvalds 已提交
2568 2569 2570
	copy_to_user_policy(xp, &upe->pol, dir);
	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
2571 2572
	if (copy_to_user_sec_ctx(xp, skb))
		goto nlmsg_failure;
2573
	if (copy_to_user_policy_type(xp->type, skb) < 0)
2574
		goto nlmsg_failure;
2575 2576
	if (xfrm_mark_put(skb, &xp->mark))
		goto nla_put_failure;
L
Linus Torvalds 已提交
2577 2578
	upe->hard = !!hard;

2579
	return nlmsg_end(skb, nlh);
L
Linus Torvalds 已提交
2580

2581
nla_put_failure:
L
Linus Torvalds 已提交
2582
nlmsg_failure:
2583 2584
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
L
Linus Torvalds 已提交
2585 2586
}

2587
static int xfrm_exp_policy_notify(struct xfrm_policy *xp, int dir, const struct km_event *c)
L
Linus Torvalds 已提交
2588
{
2589
	struct net *net = xp_net(xp);
L
Linus Torvalds 已提交
2590 2591
	struct sk_buff *skb;

2592
	skb = nlmsg_new(xfrm_polexpire_msgsize(xp), GFP_ATOMIC);
L
Linus Torvalds 已提交
2593 2594 2595
	if (skb == NULL)
		return -ENOMEM;

J
Jamal Hadi Salim 已提交
2596
	if (build_polexpire(skb, xp, dir, c) < 0)
L
Linus Torvalds 已提交
2597 2598
		BUG();

2599
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_EXPIRE, GFP_ATOMIC);
L
Linus Torvalds 已提交
2600 2601
}

2602
static int xfrm_notify_policy(struct xfrm_policy *xp, int dir, const struct km_event *c)
2603
{
2604
	struct net *net = xp_net(xp);
2605
	struct xfrm_userpolicy_info *p;
2606
	struct xfrm_userpolicy_id *id;
2607 2608
	struct nlmsghdr *nlh;
	struct sk_buff *skb;
2609
	int len = nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr);
2610 2611 2612 2613
	int headlen;

	headlen = sizeof(*p);
	if (c->event == XFRM_MSG_DELPOLICY) {
2614
		len += nla_total_size(headlen);
2615 2616
		headlen = sizeof(*id);
	}
2617
	len += userpolicy_type_attrsize();
2618
	len += nla_total_size(sizeof(struct xfrm_mark));
2619
	len += NLMSG_ALIGN(headlen);
2620

2621
	skb = nlmsg_new(len, GFP_ATOMIC);
2622 2623 2624
	if (skb == NULL)
		return -ENOMEM;

2625 2626 2627
	nlh = nlmsg_put(skb, c->pid, c->seq, c->event, headlen, 0);
	if (nlh == NULL)
		goto nlmsg_failure;
2628

2629
	p = nlmsg_data(nlh);
2630
	if (c->event == XFRM_MSG_DELPOLICY) {
2631 2632
		struct nlattr *attr;

2633
		id = nlmsg_data(nlh);
2634 2635 2636 2637 2638 2639 2640
		memset(id, 0, sizeof(*id));
		id->dir = dir;
		if (c->data.byid)
			id->index = xp->index;
		else
			memcpy(&id->sel, &xp->selector, sizeof(id->sel));

2641 2642 2643 2644 2645
		attr = nla_reserve(skb, XFRMA_POLICY, sizeof(*p));
		if (attr == NULL)
			goto nlmsg_failure;

		p = nla_data(attr);
2646
	}
2647 2648 2649 2650

	copy_to_user_policy(xp, p, dir);
	if (copy_to_user_tmpl(xp, skb) < 0)
		goto nlmsg_failure;
2651
	if (copy_to_user_policy_type(xp->type, skb) < 0)
2652
		goto nlmsg_failure;
2653

2654 2655 2656
	if (xfrm_mark_put(skb, &xp->mark))
		goto nla_put_failure;

2657
	nlmsg_end(skb, nlh);
2658

2659
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_POLICY, GFP_ATOMIC);
2660

2661
nla_put_failure:
2662 2663 2664 2665 2666
nlmsg_failure:
	kfree_skb(skb);
	return -1;
}

2667
static int xfrm_notify_policy_flush(const struct km_event *c)
2668
{
2669
	struct net *net = c->net;
2670 2671 2672
	struct nlmsghdr *nlh;
	struct sk_buff *skb;

2673
	skb = nlmsg_new(userpolicy_type_attrsize(), GFP_ATOMIC);
2674 2675 2676
	if (skb == NULL)
		return -ENOMEM;

2677 2678 2679
	nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_FLUSHPOLICY, 0, 0);
	if (nlh == NULL)
		goto nlmsg_failure;
2680 2681
	if (copy_to_user_policy_type(c->data.type, skb) < 0)
		goto nlmsg_failure;
2682

2683
	nlmsg_end(skb, nlh);
2684

2685
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_POLICY, GFP_ATOMIC);
2686 2687 2688 2689 2690 2691

nlmsg_failure:
	kfree_skb(skb);
	return -1;
}

2692
static int xfrm_send_policy_notify(struct xfrm_policy *xp, int dir, const struct km_event *c)
2693 2694 2695
{

	switch (c->event) {
2696 2697 2698
	case XFRM_MSG_NEWPOLICY:
	case XFRM_MSG_UPDPOLICY:
	case XFRM_MSG_DELPOLICY:
2699
		return xfrm_notify_policy(xp, dir, c);
2700
	case XFRM_MSG_FLUSHPOLICY:
2701
		return xfrm_notify_policy_flush(c);
2702
	case XFRM_MSG_POLEXPIRE:
2703 2704
		return xfrm_exp_policy_notify(xp, dir, c);
	default:
S
stephen hemminger 已提交
2705 2706
		printk(KERN_NOTICE "xfrm_user: Unknown Policy event %d\n",
		       c->event);
2707 2708 2709 2710 2711 2712
	}

	return 0;

}

2713 2714 2715 2716 2717
static inline size_t xfrm_report_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_report));
}

2718 2719 2720 2721 2722 2723
static int build_report(struct sk_buff *skb, u8 proto,
			struct xfrm_selector *sel, xfrm_address_t *addr)
{
	struct xfrm_user_report *ur;
	struct nlmsghdr *nlh;

2724 2725 2726
	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_REPORT, sizeof(*ur), 0);
	if (nlh == NULL)
		return -EMSGSIZE;
2727

2728
	ur = nlmsg_data(nlh);
2729 2730 2731 2732
	ur->proto = proto;
	memcpy(&ur->sel, sel, sizeof(ur->sel));

	if (addr)
2733
		NLA_PUT(skb, XFRMA_COADDR, sizeof(*addr), addr);
2734

2735
	return nlmsg_end(skb, nlh);
2736

2737
nla_put_failure:
2738 2739
	nlmsg_cancel(skb, nlh);
	return -EMSGSIZE;
2740 2741
}

2742 2743
static int xfrm_send_report(struct net *net, u8 proto,
			    struct xfrm_selector *sel, xfrm_address_t *addr)
2744 2745 2746
{
	struct sk_buff *skb;

2747
	skb = nlmsg_new(xfrm_report_msgsize(), GFP_ATOMIC);
2748 2749 2750 2751 2752 2753
	if (skb == NULL)
		return -ENOMEM;

	if (build_report(skb, proto, sel, addr) < 0)
		BUG();

2754
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_REPORT, GFP_ATOMIC);
2755 2756
}

2757 2758 2759 2760 2761 2762 2763 2764 2765 2766 2767 2768 2769 2770 2771 2772 2773 2774 2775 2776 2777 2778 2779 2780 2781 2782 2783 2784 2785 2786 2787 2788 2789
static inline size_t xfrm_mapping_msgsize(void)
{
	return NLMSG_ALIGN(sizeof(struct xfrm_user_mapping));
}

static int build_mapping(struct sk_buff *skb, struct xfrm_state *x,
			 xfrm_address_t *new_saddr, __be16 new_sport)
{
	struct xfrm_user_mapping *um;
	struct nlmsghdr *nlh;

	nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_MAPPING, sizeof(*um), 0);
	if (nlh == NULL)
		return -EMSGSIZE;

	um = nlmsg_data(nlh);

	memcpy(&um->id.daddr, &x->id.daddr, sizeof(um->id.daddr));
	um->id.spi = x->id.spi;
	um->id.family = x->props.family;
	um->id.proto = x->id.proto;
	memcpy(&um->new_saddr, new_saddr, sizeof(um->new_saddr));
	memcpy(&um->old_saddr, &x->props.saddr, sizeof(um->old_saddr));
	um->new_sport = new_sport;
	um->old_sport = x->encap->encap_sport;
	um->reqid = x->props.reqid;

	return nlmsg_end(skb, nlh);
}

static int xfrm_send_mapping(struct xfrm_state *x, xfrm_address_t *ipaddr,
			     __be16 sport)
{
2790
	struct net *net = xs_net(x);
2791 2792 2793 2794 2795 2796 2797 2798 2799 2800 2801 2802 2803 2804 2805
	struct sk_buff *skb;

	if (x->id.proto != IPPROTO_ESP)
		return -EINVAL;

	if (!x->encap)
		return -EINVAL;

	skb = nlmsg_new(xfrm_mapping_msgsize(), GFP_ATOMIC);
	if (skb == NULL)
		return -ENOMEM;

	if (build_mapping(skb, x, ipaddr, sport) < 0)
		BUG();

2806
	return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_MAPPING, GFP_ATOMIC);
2807 2808
}

L
Linus Torvalds 已提交
2809 2810 2811 2812 2813 2814
static struct xfrm_mgr netlink_mgr = {
	.id		= "netlink",
	.notify		= xfrm_send_state_notify,
	.acquire	= xfrm_send_acquire,
	.compile_policy	= xfrm_compile_policy,
	.notify_policy	= xfrm_send_policy_notify,
2815
	.report		= xfrm_send_report,
2816
	.migrate	= xfrm_send_migrate,
2817
	.new_mapping	= xfrm_send_mapping,
L
Linus Torvalds 已提交
2818 2819
};

2820
static int __net_init xfrm_user_net_init(struct net *net)
L
Linus Torvalds 已提交
2821
{
2822 2823
	struct sock *nlsk;

2824
	nlsk = netlink_kernel_create(net, NETLINK_XFRM, XFRMNLGRP_MAX,
2825
				     xfrm_netlink_rcv, NULL, THIS_MODULE);
2826
	if (nlsk == NULL)
L
Linus Torvalds 已提交
2827
		return -ENOMEM;
2828
	net->xfrm.nlsk_stash = nlsk; /* Don't set to NULL */
2829
	rcu_assign_pointer(net->xfrm.nlsk, nlsk);
L
Linus Torvalds 已提交
2830 2831 2832
	return 0;
}

2833
static void __net_exit xfrm_user_net_exit(struct list_head *net_exit_list)
L
Linus Torvalds 已提交
2834
{
2835 2836 2837 2838 2839 2840
	struct net *net;
	list_for_each_entry(net, net_exit_list, exit_list)
		rcu_assign_pointer(net->xfrm.nlsk, NULL);
	synchronize_net();
	list_for_each_entry(net, net_exit_list, exit_list)
		netlink_kernel_release(net->xfrm.nlsk_stash);
L
Linus Torvalds 已提交
2841 2842
}

2843
static struct pernet_operations xfrm_user_net_ops = {
2844 2845
	.init	    = xfrm_user_net_init,
	.exit_batch = xfrm_user_net_exit,
2846 2847 2848 2849 2850 2851 2852 2853 2854 2855 2856 2857 2858 2859 2860 2861 2862 2863 2864 2865 2866 2867 2868
};

static int __init xfrm_user_init(void)
{
	int rv;

	printk(KERN_INFO "Initializing XFRM netlink socket\n");

	rv = register_pernet_subsys(&xfrm_user_net_ops);
	if (rv < 0)
		return rv;
	rv = xfrm_register_km(&netlink_mgr);
	if (rv < 0)
		unregister_pernet_subsys(&xfrm_user_net_ops);
	return rv;
}

static void __exit xfrm_user_exit(void)
{
	xfrm_unregister_km(&netlink_mgr);
	unregister_pernet_subsys(&xfrm_user_net_ops);
}

L
Linus Torvalds 已提交
2869 2870 2871
module_init(xfrm_user_init);
module_exit(xfrm_user_exit);
MODULE_LICENSE("GPL");
2872
MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_XFRM);
2873