]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/xfrm/xfrm_user.c
ipv6: AF_INET6 link address family
[net-next-2.6.git] / net / xfrm / xfrm_user.c
CommitLineData
1da177e4
LT
1/* xfrm_user.c: User interface to configure xfrm engine.
2 *
3 * Copyright (C) 2002 David S. Miller (davem@redhat.com)
4 *
5 * Changes:
6 * Mitsuru KANDA @USAGI
7 * Kazunori MIYAZAWA @USAGI
8 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
9 * IPv6 support
df71837d 10 *
1da177e4
LT
11 */
12
9409f38a 13#include <linux/crypto.h>
1da177e4
LT
14#include <linux/module.h>
15#include <linux/kernel.h>
16#include <linux/types.h>
17#include <linux/slab.h>
18#include <linux/socket.h>
19#include <linux/string.h>
20#include <linux/net.h>
21#include <linux/skbuff.h>
1da177e4
LT
22#include <linux/pfkeyv2.h>
23#include <linux/ipsec.h>
24#include <linux/init.h>
25#include <linux/security.h>
26#include <net/sock.h>
27#include <net/xfrm.h>
88fc2c84 28#include <net/netlink.h>
1da177e4 29#include <asm/uaccess.h>
e23c7194
MN
30#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
31#include <linux/in6.h>
32#endif
1da177e4 33
1a6509d9
HX
34static inline int aead_len(struct xfrm_algo_aead *alg)
35{
36 return sizeof(*alg) + ((alg->alg_key_len + 7) / 8);
37}
38
5424f32e 39static int verify_one_alg(struct nlattr **attrs, enum xfrm_attr_type_t type)
1da177e4 40{
5424f32e 41 struct nlattr *rt = attrs[type];
1da177e4
LT
42 struct xfrm_algo *algp;
43
44 if (!rt)
45 return 0;
46
5424f32e 47 algp = nla_data(rt);
0f99be0d 48 if (nla_len(rt) < xfrm_alg_len(algp))
31c26852
HX
49 return -EINVAL;
50
1da177e4
LT
51 switch (type) {
52 case XFRMA_ALG_AUTH:
1da177e4 53 case XFRMA_ALG_CRYPT:
1da177e4 54 case XFRMA_ALG_COMP:
1da177e4
LT
55 break;
56
57 default:
58 return -EINVAL;
3ff50b79 59 }
1da177e4
LT
60
61 algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
62 return 0;
63}
64
4447bb33
MW
65static int verify_auth_trunc(struct nlattr **attrs)
66{
67 struct nlattr *rt = attrs[XFRMA_ALG_AUTH_TRUNC];
68 struct xfrm_algo_auth *algp;
69
70 if (!rt)
71 return 0;
72
73 algp = nla_data(rt);
74 if (nla_len(rt) < xfrm_alg_auth_len(algp))
75 return -EINVAL;
76
77 algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
78 return 0;
79}
80
1a6509d9
HX
81static int verify_aead(struct nlattr **attrs)
82{
83 struct nlattr *rt = attrs[XFRMA_ALG_AEAD];
84 struct xfrm_algo_aead *algp;
85
86 if (!rt)
87 return 0;
88
89 algp = nla_data(rt);
90 if (nla_len(rt) < aead_len(algp))
91 return -EINVAL;
92
93 algp->alg_name[CRYPTO_MAX_ALG_NAME - 1] = '\0';
94 return 0;
95}
96
5424f32e 97static void verify_one_addr(struct nlattr **attrs, enum xfrm_attr_type_t type,
eb2971b6
MN
98 xfrm_address_t **addrp)
99{
5424f32e 100 struct nlattr *rt = attrs[type];
eb2971b6 101
cf5cb79f 102 if (rt && addrp)
5424f32e 103 *addrp = nla_data(rt);
eb2971b6 104}
df71837d 105
5424f32e 106static inline int verify_sec_ctx_len(struct nlattr **attrs)
df71837d 107{
5424f32e 108 struct nlattr *rt = attrs[XFRMA_SEC_CTX];
df71837d 109 struct xfrm_user_sec_ctx *uctx;
df71837d
TJ
110
111 if (!rt)
112 return 0;
113
5424f32e 114 uctx = nla_data(rt);
cf5cb79f 115 if (uctx->len != (sizeof(struct xfrm_user_sec_ctx) + uctx->ctx_len))
df71837d
TJ
116 return -EINVAL;
117
118 return 0;
119}
120
121
1da177e4 122static int verify_newsa_info(struct xfrm_usersa_info *p,
5424f32e 123 struct nlattr **attrs)
1da177e4
LT
124{
125 int err;
126
127 err = -EINVAL;
128 switch (p->family) {
129 case AF_INET:
130 break;
131
132 case AF_INET6:
133#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
134 break;
135#else
136 err = -EAFNOSUPPORT;
137 goto out;
138#endif
139
140 default:
141 goto out;
3ff50b79 142 }
1da177e4
LT
143
144 err = -EINVAL;
145 switch (p->id.proto) {
146 case IPPROTO_AH:
4447bb33
MW
147 if ((!attrs[XFRMA_ALG_AUTH] &&
148 !attrs[XFRMA_ALG_AUTH_TRUNC]) ||
1a6509d9 149 attrs[XFRMA_ALG_AEAD] ||
35a7aa08
TG
150 attrs[XFRMA_ALG_CRYPT] ||
151 attrs[XFRMA_ALG_COMP])
1da177e4
LT
152 goto out;
153 break;
154
155 case IPPROTO_ESP:
1a6509d9
HX
156 if (attrs[XFRMA_ALG_COMP])
157 goto out;
158 if (!attrs[XFRMA_ALG_AUTH] &&
4447bb33 159 !attrs[XFRMA_ALG_AUTH_TRUNC] &&
1a6509d9
HX
160 !attrs[XFRMA_ALG_CRYPT] &&
161 !attrs[XFRMA_ALG_AEAD])
162 goto out;
163 if ((attrs[XFRMA_ALG_AUTH] ||
4447bb33 164 attrs[XFRMA_ALG_AUTH_TRUNC] ||
1a6509d9
HX
165 attrs[XFRMA_ALG_CRYPT]) &&
166 attrs[XFRMA_ALG_AEAD])
1da177e4
LT
167 goto out;
168 break;
169
170 case IPPROTO_COMP:
35a7aa08 171 if (!attrs[XFRMA_ALG_COMP] ||
1a6509d9 172 attrs[XFRMA_ALG_AEAD] ||
35a7aa08 173 attrs[XFRMA_ALG_AUTH] ||
4447bb33 174 attrs[XFRMA_ALG_AUTH_TRUNC] ||
35a7aa08 175 attrs[XFRMA_ALG_CRYPT])
1da177e4
LT
176 goto out;
177 break;
178
e23c7194
MN
179#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
180 case IPPROTO_DSTOPTS:
181 case IPPROTO_ROUTING:
35a7aa08
TG
182 if (attrs[XFRMA_ALG_COMP] ||
183 attrs[XFRMA_ALG_AUTH] ||
4447bb33 184 attrs[XFRMA_ALG_AUTH_TRUNC] ||
1a6509d9 185 attrs[XFRMA_ALG_AEAD] ||
35a7aa08
TG
186 attrs[XFRMA_ALG_CRYPT] ||
187 attrs[XFRMA_ENCAP] ||
188 attrs[XFRMA_SEC_CTX] ||
189 !attrs[XFRMA_COADDR])
e23c7194
MN
190 goto out;
191 break;
192#endif
193
1da177e4
LT
194 default:
195 goto out;
3ff50b79 196 }
1da177e4 197
1a6509d9
HX
198 if ((err = verify_aead(attrs)))
199 goto out;
4447bb33
MW
200 if ((err = verify_auth_trunc(attrs)))
201 goto out;
35a7aa08 202 if ((err = verify_one_alg(attrs, XFRMA_ALG_AUTH)))
1da177e4 203 goto out;
35a7aa08 204 if ((err = verify_one_alg(attrs, XFRMA_ALG_CRYPT)))
1da177e4 205 goto out;
35a7aa08 206 if ((err = verify_one_alg(attrs, XFRMA_ALG_COMP)))
1da177e4 207 goto out;
35a7aa08 208 if ((err = verify_sec_ctx_len(attrs)))
df71837d 209 goto out;
1da177e4
LT
210
211 err = -EINVAL;
212 switch (p->mode) {
7e49e6de
MN
213 case XFRM_MODE_TRANSPORT:
214 case XFRM_MODE_TUNNEL:
060f02a3 215 case XFRM_MODE_ROUTEOPTIMIZATION:
0a69452c 216 case XFRM_MODE_BEET:
1da177e4
LT
217 break;
218
219 default:
220 goto out;
3ff50b79 221 }
1da177e4
LT
222
223 err = 0;
224
225out:
226 return err;
227}
228
229static int attach_one_algo(struct xfrm_algo **algpp, u8 *props,
230 struct xfrm_algo_desc *(*get_byname)(char *, int),
5424f32e 231 struct nlattr *rta)
1da177e4 232{
1da177e4
LT
233 struct xfrm_algo *p, *ualg;
234 struct xfrm_algo_desc *algo;
235
236 if (!rta)
237 return 0;
238
5424f32e 239 ualg = nla_data(rta);
1da177e4
LT
240
241 algo = get_byname(ualg->alg_name, 1);
242 if (!algo)
243 return -ENOSYS;
244 *props = algo->desc.sadb_alg_id;
245
0f99be0d 246 p = kmemdup(ualg, xfrm_alg_len(ualg), GFP_KERNEL);
1da177e4
LT
247 if (!p)
248 return -ENOMEM;
249
04ff1260 250 strcpy(p->alg_name, algo->name);
1da177e4
LT
251 *algpp = p;
252 return 0;
253}
254
4447bb33
MW
255static int attach_auth(struct xfrm_algo_auth **algpp, u8 *props,
256 struct nlattr *rta)
257{
258 struct xfrm_algo *ualg;
259 struct xfrm_algo_auth *p;
260 struct xfrm_algo_desc *algo;
261
262 if (!rta)
263 return 0;
264
265 ualg = nla_data(rta);
266
267 algo = xfrm_aalg_get_byname(ualg->alg_name, 1);
268 if (!algo)
269 return -ENOSYS;
270 *props = algo->desc.sadb_alg_id;
271
272 p = kmalloc(sizeof(*p) + (ualg->alg_key_len + 7) / 8, GFP_KERNEL);
273 if (!p)
274 return -ENOMEM;
275
276 strcpy(p->alg_name, algo->name);
277 p->alg_key_len = ualg->alg_key_len;
278 p->alg_trunc_len = algo->uinfo.auth.icv_truncbits;
279 memcpy(p->alg_key, ualg->alg_key, (ualg->alg_key_len + 7) / 8);
280
281 *algpp = p;
282 return 0;
283}
284
285static int attach_auth_trunc(struct xfrm_algo_auth **algpp, u8 *props,
286 struct nlattr *rta)
287{
288 struct xfrm_algo_auth *p, *ualg;
289 struct xfrm_algo_desc *algo;
290
291 if (!rta)
292 return 0;
293
294 ualg = nla_data(rta);
295
296 algo = xfrm_aalg_get_byname(ualg->alg_name, 1);
297 if (!algo)
298 return -ENOSYS;
299 if (ualg->alg_trunc_len > algo->uinfo.auth.icv_fullbits)
300 return -EINVAL;
301 *props = algo->desc.sadb_alg_id;
302
303 p = kmemdup(ualg, xfrm_alg_auth_len(ualg), GFP_KERNEL);
304 if (!p)
305 return -ENOMEM;
306
307 strcpy(p->alg_name, algo->name);
308 if (!p->alg_trunc_len)
309 p->alg_trunc_len = algo->uinfo.auth.icv_truncbits;
310
311 *algpp = p;
312 return 0;
313}
314
1a6509d9
HX
315static int attach_aead(struct xfrm_algo_aead **algpp, u8 *props,
316 struct nlattr *rta)
317{
318 struct xfrm_algo_aead *p, *ualg;
319 struct xfrm_algo_desc *algo;
320
321 if (!rta)
322 return 0;
323
324 ualg = nla_data(rta);
325
326 algo = xfrm_aead_get_byname(ualg->alg_name, ualg->alg_icv_len, 1);
327 if (!algo)
328 return -ENOSYS;
329 *props = algo->desc.sadb_alg_id;
330
331 p = kmemdup(ualg, aead_len(ualg), GFP_KERNEL);
332 if (!p)
333 return -ENOMEM;
334
335 strcpy(p->alg_name, algo->name);
336 *algpp = p;
337 return 0;
338}
339
661697f7 340static inline int xfrm_user_sec_ctx_size(struct xfrm_sec_ctx *xfrm_ctx)
df71837d 341{
df71837d
TJ
342 int len = 0;
343
344 if (xfrm_ctx) {
345 len += sizeof(struct xfrm_user_sec_ctx);
346 len += xfrm_ctx->ctx_len;
347 }
348 return len;
349}
350
1da177e4
LT
351static void copy_from_user_state(struct xfrm_state *x, struct xfrm_usersa_info *p)
352{
353 memcpy(&x->id, &p->id, sizeof(x->id));
354 memcpy(&x->sel, &p->sel, sizeof(x->sel));
355 memcpy(&x->lft, &p->lft, sizeof(x->lft));
356 x->props.mode = p->mode;
357 x->props.replay_window = p->replay_window;
358 x->props.reqid = p->reqid;
359 x->props.family = p->family;
54489c14 360 memcpy(&x->props.saddr, &p->saddr, sizeof(x->props.saddr));
1da177e4 361 x->props.flags = p->flags;
196b0036 362
ccf9b3b8 363 if (!x->sel.family && !(p->flags & XFRM_STATE_AF_UNSPEC))
196b0036 364 x->sel.family = p->family;
1da177e4
LT
365}
366
d51d081d
JHS
367/*
368 * someday when pfkey also has support, we could have the code
369 * somehow made shareable and move it to xfrm_state.c - JHS
370 *
371*/
5424f32e 372static void xfrm_update_ae_params(struct xfrm_state *x, struct nlattr **attrs)
d51d081d 373{
5424f32e
TG
374 struct nlattr *rp = attrs[XFRMA_REPLAY_VAL];
375 struct nlattr *lt = attrs[XFRMA_LTIME_VAL];
376 struct nlattr *et = attrs[XFRMA_ETIMER_THRESH];
377 struct nlattr *rt = attrs[XFRMA_REPLAY_THRESH];
d51d081d
JHS
378
379 if (rp) {
380 struct xfrm_replay_state *replay;
5424f32e 381 replay = nla_data(rp);
d51d081d
JHS
382 memcpy(&x->replay, replay, sizeof(*replay));
383 memcpy(&x->preplay, replay, sizeof(*replay));
384 }
385
386 if (lt) {
387 struct xfrm_lifetime_cur *ltime;
5424f32e 388 ltime = nla_data(lt);
d51d081d
JHS
389 x->curlft.bytes = ltime->bytes;
390 x->curlft.packets = ltime->packets;
391 x->curlft.add_time = ltime->add_time;
392 x->curlft.use_time = ltime->use_time;
393 }
394
cf5cb79f 395 if (et)
5424f32e 396 x->replay_maxage = nla_get_u32(et);
d51d081d 397
cf5cb79f 398 if (rt)
5424f32e 399 x->replay_maxdiff = nla_get_u32(rt);
d51d081d
JHS
400}
401
fc34acd3
AD
402static struct xfrm_state *xfrm_state_construct(struct net *net,
403 struct xfrm_usersa_info *p,
5424f32e 404 struct nlattr **attrs,
1da177e4
LT
405 int *errp)
406{
fc34acd3 407 struct xfrm_state *x = xfrm_state_alloc(net);
1da177e4
LT
408 int err = -ENOMEM;
409
410 if (!x)
411 goto error_no_put;
412
413 copy_from_user_state(x, p);
414
1a6509d9
HX
415 if ((err = attach_aead(&x->aead, &x->props.ealgo,
416 attrs[XFRMA_ALG_AEAD])))
417 goto error;
4447bb33
MW
418 if ((err = attach_auth_trunc(&x->aalg, &x->props.aalgo,
419 attrs[XFRMA_ALG_AUTH_TRUNC])))
1da177e4 420 goto error;
4447bb33
MW
421 if (!x->props.aalgo) {
422 if ((err = attach_auth(&x->aalg, &x->props.aalgo,
423 attrs[XFRMA_ALG_AUTH])))
424 goto error;
425 }
1da177e4
LT
426 if ((err = attach_one_algo(&x->ealg, &x->props.ealgo,
427 xfrm_ealg_get_byname,
35a7aa08 428 attrs[XFRMA_ALG_CRYPT])))
1da177e4
LT
429 goto error;
430 if ((err = attach_one_algo(&x->calg, &x->props.calgo,
431 xfrm_calg_get_byname,
35a7aa08 432 attrs[XFRMA_ALG_COMP])))
1da177e4 433 goto error;
fd21150a
TG
434
435 if (attrs[XFRMA_ENCAP]) {
436 x->encap = kmemdup(nla_data(attrs[XFRMA_ENCAP]),
437 sizeof(*x->encap), GFP_KERNEL);
438 if (x->encap == NULL)
439 goto error;
440 }
441
442 if (attrs[XFRMA_COADDR]) {
443 x->coaddr = kmemdup(nla_data(attrs[XFRMA_COADDR]),
444 sizeof(*x->coaddr), GFP_KERNEL);
445 if (x->coaddr == NULL)
446 goto error;
447 }
448
6f26b61e
JHS
449 xfrm_mark_get(attrs, &x->mark);
450
72cb6962 451 err = xfrm_init_state(x);
1da177e4
LT
452 if (err)
453 goto error;
454
fd21150a
TG
455 if (attrs[XFRMA_SEC_CTX] &&
456 security_xfrm_state_alloc(x, nla_data(attrs[XFRMA_SEC_CTX])))
df71837d
TJ
457 goto error;
458
1da177e4 459 x->km.seq = p->seq;
b27aeadb 460 x->replay_maxdiff = net->xfrm.sysctl_aevent_rseqth;
d51d081d 461 /* sysctl_xfrm_aevent_etime is in 100ms units */
b27aeadb 462 x->replay_maxage = (net->xfrm.sysctl_aevent_etime*HZ)/XFRM_AE_ETH_M;
d51d081d
JHS
463 x->preplay.bitmap = 0;
464 x->preplay.seq = x->replay.seq+x->replay_maxdiff;
465 x->preplay.oseq = x->replay.oseq +x->replay_maxdiff;
466
467 /* override default values from above */
468
5424f32e 469 xfrm_update_ae_params(x, attrs);
1da177e4
LT
470
471 return x;
472
473error:
474 x->km.state = XFRM_STATE_DEAD;
475 xfrm_state_put(x);
476error_no_put:
477 *errp = err;
478 return NULL;
479}
480
22e70050 481static int xfrm_add_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 482 struct nlattr **attrs)
1da177e4 483{
fc34acd3 484 struct net *net = sock_net(skb->sk);
7b67c857 485 struct xfrm_usersa_info *p = nlmsg_data(nlh);
1da177e4
LT
486 struct xfrm_state *x;
487 int err;
26b15dad 488 struct km_event c;
2532386f
EP
489 uid_t loginuid = NETLINK_CB(skb).loginuid;
490 u32 sessionid = NETLINK_CB(skb).sessionid;
491 u32 sid = NETLINK_CB(skb).sid;
1da177e4 492
35a7aa08 493 err = verify_newsa_info(p, attrs);
1da177e4
LT
494 if (err)
495 return err;
496
fc34acd3 497 x = xfrm_state_construct(net, p, attrs, &err);
1da177e4
LT
498 if (!x)
499 return err;
500
26b15dad 501 xfrm_state_hold(x);
1da177e4
LT
502 if (nlh->nlmsg_type == XFRM_MSG_NEWSA)
503 err = xfrm_state_add(x);
504 else
505 err = xfrm_state_update(x);
506
2532386f 507 xfrm_audit_state_add(x, err ? 0 : 1, loginuid, sessionid, sid);
161a09e7 508
1da177e4
LT
509 if (err < 0) {
510 x->km.state = XFRM_STATE_DEAD;
21380b81 511 __xfrm_state_put(x);
7d6dfe1f 512 goto out;
1da177e4
LT
513 }
514
26b15dad
JHS
515 c.seq = nlh->nlmsg_seq;
516 c.pid = nlh->nlmsg_pid;
f60f6b8f 517 c.event = nlh->nlmsg_type;
26b15dad
JHS
518
519 km_state_notify(x, &c);
7d6dfe1f 520out:
26b15dad 521 xfrm_state_put(x);
1da177e4
LT
522 return err;
523}
524
fc34acd3
AD
525static struct xfrm_state *xfrm_user_state_lookup(struct net *net,
526 struct xfrm_usersa_id *p,
5424f32e 527 struct nlattr **attrs,
eb2971b6
MN
528 int *errp)
529{
530 struct xfrm_state *x = NULL;
6f26b61e 531 struct xfrm_mark m;
eb2971b6 532 int err;
6f26b61e 533 u32 mark = xfrm_mark_get(attrs, &m);
eb2971b6
MN
534
535 if (xfrm_id_proto_match(p->proto, IPSEC_PROTO_ANY)) {
536 err = -ESRCH;
6f26b61e 537 x = xfrm_state_lookup(net, mark, &p->daddr, p->spi, p->proto, p->family);
eb2971b6
MN
538 } else {
539 xfrm_address_t *saddr = NULL;
540
35a7aa08 541 verify_one_addr(attrs, XFRMA_SRCADDR, &saddr);
eb2971b6
MN
542 if (!saddr) {
543 err = -EINVAL;
544 goto out;
545 }
546
9abbffee 547 err = -ESRCH;
6f26b61e
JHS
548 x = xfrm_state_lookup_byaddr(net, mark,
549 &p->daddr, saddr,
221df1ed 550 p->proto, p->family);
eb2971b6
MN
551 }
552
553 out:
554 if (!x && errp)
555 *errp = err;
556 return x;
557}
558
22e70050 559static int xfrm_del_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 560 struct nlattr **attrs)
1da177e4 561{
fc34acd3 562 struct net *net = sock_net(skb->sk);
1da177e4 563 struct xfrm_state *x;
eb2971b6 564 int err = -ESRCH;
26b15dad 565 struct km_event c;
7b67c857 566 struct xfrm_usersa_id *p = nlmsg_data(nlh);
2532386f
EP
567 uid_t loginuid = NETLINK_CB(skb).loginuid;
568 u32 sessionid = NETLINK_CB(skb).sessionid;
569 u32 sid = NETLINK_CB(skb).sid;
1da177e4 570
fc34acd3 571 x = xfrm_user_state_lookup(net, p, attrs, &err);
1da177e4 572 if (x == NULL)
eb2971b6 573 return err;
1da177e4 574
6f68dc37 575 if ((err = security_xfrm_state_delete(x)) != 0)
c8c05a8e
CZ
576 goto out;
577
1da177e4 578 if (xfrm_state_kern(x)) {
c8c05a8e
CZ
579 err = -EPERM;
580 goto out;
1da177e4
LT
581 }
582
26b15dad 583 err = xfrm_state_delete(x);
161a09e7 584
c8c05a8e
CZ
585 if (err < 0)
586 goto out;
26b15dad
JHS
587
588 c.seq = nlh->nlmsg_seq;
589 c.pid = nlh->nlmsg_pid;
f60f6b8f 590 c.event = nlh->nlmsg_type;
26b15dad 591 km_state_notify(x, &c);
1da177e4 592
c8c05a8e 593out:
2532386f 594 xfrm_audit_state_delete(x, err ? 0 : 1, loginuid, sessionid, sid);
c8c05a8e 595 xfrm_state_put(x);
26b15dad 596 return err;
1da177e4
LT
597}
598
599static void copy_to_user_state(struct xfrm_state *x, struct xfrm_usersa_info *p)
600{
601 memcpy(&p->id, &x->id, sizeof(p->id));
602 memcpy(&p->sel, &x->sel, sizeof(p->sel));
603 memcpy(&p->lft, &x->lft, sizeof(p->lft));
604 memcpy(&p->curlft, &x->curlft, sizeof(p->curlft));
605 memcpy(&p->stats, &x->stats, sizeof(p->stats));
54489c14 606 memcpy(&p->saddr, &x->props.saddr, sizeof(p->saddr));
1da177e4
LT
607 p->mode = x->props.mode;
608 p->replay_window = x->props.replay_window;
609 p->reqid = x->props.reqid;
610 p->family = x->props.family;
611 p->flags = x->props.flags;
612 p->seq = x->km.seq;
613}
614
615struct xfrm_dump_info {
616 struct sk_buff *in_skb;
617 struct sk_buff *out_skb;
618 u32 nlmsg_seq;
619 u16 nlmsg_flags;
1da177e4
LT
620};
621
c0144bea
TG
622static int copy_sec_ctx(struct xfrm_sec_ctx *s, struct sk_buff *skb)
623{
c0144bea
TG
624 struct xfrm_user_sec_ctx *uctx;
625 struct nlattr *attr;
68325d3b 626 int ctx_size = sizeof(*uctx) + s->ctx_len;
c0144bea
TG
627
628 attr = nla_reserve(skb, XFRMA_SEC_CTX, ctx_size);
629 if (attr == NULL)
630 return -EMSGSIZE;
631
632 uctx = nla_data(attr);
633 uctx->exttype = XFRMA_SEC_CTX;
634 uctx->len = ctx_size;
635 uctx->ctx_doi = s->ctx_doi;
636 uctx->ctx_alg = s->ctx_alg;
637 uctx->ctx_len = s->ctx_len;
638 memcpy(uctx + 1, s->ctx_str, s->ctx_len);
639
640 return 0;
641}
642
4447bb33
MW
643static int copy_to_user_auth(struct xfrm_algo_auth *auth, struct sk_buff *skb)
644{
645 struct xfrm_algo *algo;
646 struct nlattr *nla;
647
648 nla = nla_reserve(skb, XFRMA_ALG_AUTH,
649 sizeof(*algo) + (auth->alg_key_len + 7) / 8);
650 if (!nla)
651 return -EMSGSIZE;
652
653 algo = nla_data(nla);
654 strcpy(algo->alg_name, auth->alg_name);
655 memcpy(algo->alg_key, auth->alg_key, (auth->alg_key_len + 7) / 8);
656 algo->alg_key_len = auth->alg_key_len;
657
658 return 0;
659}
660
68325d3b
HX
661/* Don't change this without updating xfrm_sa_len! */
662static int copy_to_user_state_extra(struct xfrm_state *x,
663 struct xfrm_usersa_info *p,
664 struct sk_buff *skb)
1da177e4 665{
1da177e4
LT
666 copy_to_user_state(x, p);
667
050f009e
HX
668 if (x->coaddr)
669 NLA_PUT(skb, XFRMA_COADDR, sizeof(*x->coaddr), x->coaddr);
670
671 if (x->lastused)
672 NLA_PUT_U64(skb, XFRMA_LASTUSED, x->lastused);
050f009e 673
1a6509d9
HX
674 if (x->aead)
675 NLA_PUT(skb, XFRMA_ALG_AEAD, aead_len(x->aead), x->aead);
4447bb33
MW
676 if (x->aalg) {
677 if (copy_to_user_auth(x->aalg, skb))
678 goto nla_put_failure;
679
680 NLA_PUT(skb, XFRMA_ALG_AUTH_TRUNC,
681 xfrm_alg_auth_len(x->aalg), x->aalg);
682 }
1da177e4 683 if (x->ealg)
0f99be0d 684 NLA_PUT(skb, XFRMA_ALG_CRYPT, xfrm_alg_len(x->ealg), x->ealg);
1da177e4 685 if (x->calg)
c0144bea 686 NLA_PUT(skb, XFRMA_ALG_COMP, sizeof(*(x->calg)), x->calg);
1da177e4
LT
687
688 if (x->encap)
c0144bea 689 NLA_PUT(skb, XFRMA_ENCAP, sizeof(*x->encap), x->encap);
1da177e4 690
6f26b61e
JHS
691 if (xfrm_mark_put(skb, &x->mark))
692 goto nla_put_failure;
693
c0144bea
TG
694 if (x->security && copy_sec_ctx(x->security, skb) < 0)
695 goto nla_put_failure;
060f02a3 696
68325d3b
HX
697 return 0;
698
699nla_put_failure:
700 return -EMSGSIZE;
701}
702
703static int dump_one_state(struct xfrm_state *x, int count, void *ptr)
704{
705 struct xfrm_dump_info *sp = ptr;
706 struct sk_buff *in_skb = sp->in_skb;
707 struct sk_buff *skb = sp->out_skb;
708 struct xfrm_usersa_info *p;
709 struct nlmsghdr *nlh;
710 int err;
711
68325d3b
HX
712 nlh = nlmsg_put(skb, NETLINK_CB(in_skb).pid, sp->nlmsg_seq,
713 XFRM_MSG_NEWSA, sizeof(*p), sp->nlmsg_flags);
714 if (nlh == NULL)
715 return -EMSGSIZE;
716
717 p = nlmsg_data(nlh);
718
719 err = copy_to_user_state_extra(x, p, skb);
720 if (err)
721 goto nla_put_failure;
722
9825069d 723 nlmsg_end(skb, nlh);
1da177e4
LT
724 return 0;
725
c0144bea 726nla_put_failure:
9825069d 727 nlmsg_cancel(skb, nlh);
68325d3b 728 return err;
1da177e4
LT
729}
730
4c563f76
TT
731static int xfrm_dump_sa_done(struct netlink_callback *cb)
732{
733 struct xfrm_state_walk *walk = (struct xfrm_state_walk *) &cb->args[1];
734 xfrm_state_walk_done(walk);
735 return 0;
736}
737
1da177e4
LT
738static int xfrm_dump_sa(struct sk_buff *skb, struct netlink_callback *cb)
739{
fc34acd3 740 struct net *net = sock_net(skb->sk);
4c563f76 741 struct xfrm_state_walk *walk = (struct xfrm_state_walk *) &cb->args[1];
1da177e4
LT
742 struct xfrm_dump_info info;
743
4c563f76
TT
744 BUILD_BUG_ON(sizeof(struct xfrm_state_walk) >
745 sizeof(cb->args) - sizeof(cb->args[0]));
746
1da177e4
LT
747 info.in_skb = cb->skb;
748 info.out_skb = skb;
749 info.nlmsg_seq = cb->nlh->nlmsg_seq;
750 info.nlmsg_flags = NLM_F_MULTI;
4c563f76
TT
751
752 if (!cb->args[0]) {
753 cb->args[0] = 1;
754 xfrm_state_walk_init(walk, 0);
755 }
756
fc34acd3 757 (void) xfrm_state_walk(net, walk, dump_one_state, &info);
1da177e4
LT
758
759 return skb->len;
760}
761
762static struct sk_buff *xfrm_state_netlink(struct sk_buff *in_skb,
763 struct xfrm_state *x, u32 seq)
764{
765 struct xfrm_dump_info info;
766 struct sk_buff *skb;
767
7deb2264 768 skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
1da177e4
LT
769 if (!skb)
770 return ERR_PTR(-ENOMEM);
771
1da177e4
LT
772 info.in_skb = in_skb;
773 info.out_skb = skb;
774 info.nlmsg_seq = seq;
775 info.nlmsg_flags = 0;
1da177e4
LT
776
777 if (dump_one_state(x, 0, &info)) {
778 kfree_skb(skb);
779 return NULL;
780 }
781
782 return skb;
783}
784
7deb2264
TG
785static inline size_t xfrm_spdinfo_msgsize(void)
786{
787 return NLMSG_ALIGN(4)
788 + nla_total_size(sizeof(struct xfrmu_spdinfo))
789 + nla_total_size(sizeof(struct xfrmu_spdhinfo));
790}
791
e071041b
AD
792static int build_spdinfo(struct sk_buff *skb, struct net *net,
793 u32 pid, u32 seq, u32 flags)
ecfd6b18 794{
5a6d3416
JHS
795 struct xfrmk_spdinfo si;
796 struct xfrmu_spdinfo spc;
797 struct xfrmu_spdhinfo sph;
ecfd6b18
JHS
798 struct nlmsghdr *nlh;
799 u32 *f;
800
801 nlh = nlmsg_put(skb, pid, seq, XFRM_MSG_NEWSPDINFO, sizeof(u32), 0);
802 if (nlh == NULL) /* shouldnt really happen ... */
803 return -EMSGSIZE;
804
805 f = nlmsg_data(nlh);
806 *f = flags;
e071041b 807 xfrm_spd_getinfo(net, &si);
5a6d3416
JHS
808 spc.incnt = si.incnt;
809 spc.outcnt = si.outcnt;
810 spc.fwdcnt = si.fwdcnt;
811 spc.inscnt = si.inscnt;
812 spc.outscnt = si.outscnt;
813 spc.fwdscnt = si.fwdscnt;
814 sph.spdhcnt = si.spdhcnt;
815 sph.spdhmcnt = si.spdhmcnt;
816
817 NLA_PUT(skb, XFRMA_SPD_INFO, sizeof(spc), &spc);
818 NLA_PUT(skb, XFRMA_SPD_HINFO, sizeof(sph), &sph);
ecfd6b18
JHS
819
820 return nlmsg_end(skb, nlh);
821
822nla_put_failure:
823 nlmsg_cancel(skb, nlh);
824 return -EMSGSIZE;
825}
826
827static int xfrm_get_spdinfo(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 828 struct nlattr **attrs)
ecfd6b18 829{
a6483b79 830 struct net *net = sock_net(skb->sk);
ecfd6b18 831 struct sk_buff *r_skb;
7b67c857 832 u32 *flags = nlmsg_data(nlh);
ecfd6b18
JHS
833 u32 spid = NETLINK_CB(skb).pid;
834 u32 seq = nlh->nlmsg_seq;
ecfd6b18 835
7deb2264 836 r_skb = nlmsg_new(xfrm_spdinfo_msgsize(), GFP_ATOMIC);
ecfd6b18
JHS
837 if (r_skb == NULL)
838 return -ENOMEM;
839
e071041b 840 if (build_spdinfo(r_skb, net, spid, seq, *flags) < 0)
ecfd6b18
JHS
841 BUG();
842
a6483b79 843 return nlmsg_unicast(net->xfrm.nlsk, r_skb, spid);
ecfd6b18
JHS
844}
845
7deb2264
TG
846static inline size_t xfrm_sadinfo_msgsize(void)
847{
848 return NLMSG_ALIGN(4)
849 + nla_total_size(sizeof(struct xfrmu_sadhinfo))
850 + nla_total_size(4); /* XFRMA_SAD_CNT */
851}
852
e071041b
AD
853static int build_sadinfo(struct sk_buff *skb, struct net *net,
854 u32 pid, u32 seq, u32 flags)
28d8909b 855{
af11e316
JHS
856 struct xfrmk_sadinfo si;
857 struct xfrmu_sadhinfo sh;
28d8909b
JHS
858 struct nlmsghdr *nlh;
859 u32 *f;
860
861 nlh = nlmsg_put(skb, pid, seq, XFRM_MSG_NEWSADINFO, sizeof(u32), 0);
862 if (nlh == NULL) /* shouldnt really happen ... */
863 return -EMSGSIZE;
864
865 f = nlmsg_data(nlh);
866 *f = flags;
e071041b 867 xfrm_sad_getinfo(net, &si);
28d8909b 868
af11e316
JHS
869 sh.sadhmcnt = si.sadhmcnt;
870 sh.sadhcnt = si.sadhcnt;
871
872 NLA_PUT_U32(skb, XFRMA_SAD_CNT, si.sadcnt);
873 NLA_PUT(skb, XFRMA_SAD_HINFO, sizeof(sh), &sh);
28d8909b
JHS
874
875 return nlmsg_end(skb, nlh);
876
877nla_put_failure:
878 nlmsg_cancel(skb, nlh);
879 return -EMSGSIZE;
880}
881
882static int xfrm_get_sadinfo(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 883 struct nlattr **attrs)
28d8909b 884{
a6483b79 885 struct net *net = sock_net(skb->sk);
28d8909b 886 struct sk_buff *r_skb;
7b67c857 887 u32 *flags = nlmsg_data(nlh);
28d8909b
JHS
888 u32 spid = NETLINK_CB(skb).pid;
889 u32 seq = nlh->nlmsg_seq;
28d8909b 890
7deb2264 891 r_skb = nlmsg_new(xfrm_sadinfo_msgsize(), GFP_ATOMIC);
28d8909b
JHS
892 if (r_skb == NULL)
893 return -ENOMEM;
894
e071041b 895 if (build_sadinfo(r_skb, net, spid, seq, *flags) < 0)
28d8909b
JHS
896 BUG();
897
a6483b79 898 return nlmsg_unicast(net->xfrm.nlsk, r_skb, spid);
28d8909b
JHS
899}
900
22e70050 901static int xfrm_get_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 902 struct nlattr **attrs)
1da177e4 903{
fc34acd3 904 struct net *net = sock_net(skb->sk);
7b67c857 905 struct xfrm_usersa_id *p = nlmsg_data(nlh);
1da177e4
LT
906 struct xfrm_state *x;
907 struct sk_buff *resp_skb;
eb2971b6 908 int err = -ESRCH;
1da177e4 909
fc34acd3 910 x = xfrm_user_state_lookup(net, p, attrs, &err);
1da177e4
LT
911 if (x == NULL)
912 goto out_noput;
913
914 resp_skb = xfrm_state_netlink(skb, x, nlh->nlmsg_seq);
915 if (IS_ERR(resp_skb)) {
916 err = PTR_ERR(resp_skb);
917 } else {
a6483b79 918 err = nlmsg_unicast(net->xfrm.nlsk, resp_skb, NETLINK_CB(skb).pid);
1da177e4
LT
919 }
920 xfrm_state_put(x);
921out_noput:
922 return err;
923}
924
925static int verify_userspi_info(struct xfrm_userspi_info *p)
926{
927 switch (p->info.id.proto) {
928 case IPPROTO_AH:
929 case IPPROTO_ESP:
930 break;
931
932 case IPPROTO_COMP:
933 /* IPCOMP spi is 16-bits. */
934 if (p->max >= 0x10000)
935 return -EINVAL;
936 break;
937
938 default:
939 return -EINVAL;
3ff50b79 940 }
1da177e4
LT
941
942 if (p->min > p->max)
943 return -EINVAL;
944
945 return 0;
946}
947
22e70050 948static int xfrm_alloc_userspi(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 949 struct nlattr **attrs)
1da177e4 950{
fc34acd3 951 struct net *net = sock_net(skb->sk);
1da177e4
LT
952 struct xfrm_state *x;
953 struct xfrm_userspi_info *p;
954 struct sk_buff *resp_skb;
955 xfrm_address_t *daddr;
956 int family;
957 int err;
6f26b61e
JHS
958 u32 mark;
959 struct xfrm_mark m;
1da177e4 960
7b67c857 961 p = nlmsg_data(nlh);
1da177e4
LT
962 err = verify_userspi_info(p);
963 if (err)
964 goto out_noput;
965
966 family = p->info.family;
967 daddr = &p->info.id.daddr;
968
969 x = NULL;
6f26b61e
JHS
970
971 mark = xfrm_mark_get(attrs, &m);
1da177e4 972 if (p->info.seq) {
6f26b61e 973 x = xfrm_find_acq_byseq(net, mark, p->info.seq);
1da177e4
LT
974 if (x && xfrm_addr_cmp(&x->id.daddr, daddr, family)) {
975 xfrm_state_put(x);
976 x = NULL;
977 }
978 }
979
980 if (!x)
6f26b61e 981 x = xfrm_find_acq(net, &m, p->info.mode, p->info.reqid,
1da177e4
LT
982 p->info.id.proto, daddr,
983 &p->info.saddr, 1,
984 family);
985 err = -ENOENT;
986 if (x == NULL)
987 goto out_noput;
988
658b219e
HX
989 err = xfrm_alloc_spi(x, p->min, p->max);
990 if (err)
991 goto out;
1da177e4 992
658b219e 993 resp_skb = xfrm_state_netlink(skb, x, nlh->nlmsg_seq);
1da177e4
LT
994 if (IS_ERR(resp_skb)) {
995 err = PTR_ERR(resp_skb);
996 goto out;
997 }
998
a6483b79 999 err = nlmsg_unicast(net->xfrm.nlsk, resp_skb, NETLINK_CB(skb).pid);
1da177e4
LT
1000
1001out:
1002 xfrm_state_put(x);
1003out_noput:
1004 return err;
1005}
1006
b798a9ed 1007static int verify_policy_dir(u8 dir)
1da177e4
LT
1008{
1009 switch (dir) {
1010 case XFRM_POLICY_IN:
1011 case XFRM_POLICY_OUT:
1012 case XFRM_POLICY_FWD:
1013 break;
1014
1015 default:
1016 return -EINVAL;
3ff50b79 1017 }
1da177e4
LT
1018
1019 return 0;
1020}
1021
b798a9ed 1022static int verify_policy_type(u8 type)
f7b6983f
MN
1023{
1024 switch (type) {
1025 case XFRM_POLICY_TYPE_MAIN:
1026#ifdef CONFIG_XFRM_SUB_POLICY
1027 case XFRM_POLICY_TYPE_SUB:
1028#endif
1029 break;
1030
1031 default:
1032 return -EINVAL;
3ff50b79 1033 }
f7b6983f
MN
1034
1035 return 0;
1036}
1037
1da177e4
LT
1038static int verify_newpolicy_info(struct xfrm_userpolicy_info *p)
1039{
1040 switch (p->share) {
1041 case XFRM_SHARE_ANY:
1042 case XFRM_SHARE_SESSION:
1043 case XFRM_SHARE_USER:
1044 case XFRM_SHARE_UNIQUE:
1045 break;
1046
1047 default:
1048 return -EINVAL;
3ff50b79 1049 }
1da177e4
LT
1050
1051 switch (p->action) {
1052 case XFRM_POLICY_ALLOW:
1053 case XFRM_POLICY_BLOCK:
1054 break;
1055
1056 default:
1057 return -EINVAL;
3ff50b79 1058 }
1da177e4
LT
1059
1060 switch (p->sel.family) {
1061 case AF_INET:
1062 break;
1063
1064 case AF_INET6:
1065#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
1066 break;
1067#else
1068 return -EAFNOSUPPORT;
1069#endif
1070
1071 default:
1072 return -EINVAL;
3ff50b79 1073 }
1da177e4
LT
1074
1075 return verify_policy_dir(p->dir);
1076}
1077
5424f32e 1078static int copy_from_user_sec_ctx(struct xfrm_policy *pol, struct nlattr **attrs)
df71837d 1079{
5424f32e 1080 struct nlattr *rt = attrs[XFRMA_SEC_CTX];
df71837d
TJ
1081 struct xfrm_user_sec_ctx *uctx;
1082
1083 if (!rt)
1084 return 0;
1085
5424f32e 1086 uctx = nla_data(rt);
03e1ad7b 1087 return security_xfrm_policy_alloc(&pol->security, uctx);
df71837d
TJ
1088}
1089
1da177e4
LT
1090static void copy_templates(struct xfrm_policy *xp, struct xfrm_user_tmpl *ut,
1091 int nr)
1092{
1093 int i;
1094
1095 xp->xfrm_nr = nr;
1096 for (i = 0; i < nr; i++, ut++) {
1097 struct xfrm_tmpl *t = &xp->xfrm_vec[i];
1098
1099 memcpy(&t->id, &ut->id, sizeof(struct xfrm_id));
1100 memcpy(&t->saddr, &ut->saddr,
1101 sizeof(xfrm_address_t));
1102 t->reqid = ut->reqid;
1103 t->mode = ut->mode;
1104 t->share = ut->share;
1105 t->optional = ut->optional;
1106 t->aalgos = ut->aalgos;
1107 t->ealgos = ut->ealgos;
1108 t->calgos = ut->calgos;
c5d18e98
HX
1109 /* If all masks are ~0, then we allow all algorithms. */
1110 t->allalgs = !~(t->aalgos & t->ealgos & t->calgos);
8511d01d 1111 t->encap_family = ut->family;
1da177e4
LT
1112 }
1113}
1114
b4ad86bf
DM
1115static int validate_tmpl(int nr, struct xfrm_user_tmpl *ut, u16 family)
1116{
1117 int i;
1118
1119 if (nr > XFRM_MAX_DEPTH)
1120 return -EINVAL;
1121
1122 for (i = 0; i < nr; i++) {
1123 /* We never validated the ut->family value, so many
1124 * applications simply leave it at zero. The check was
1125 * never made and ut->family was ignored because all
1126 * templates could be assumed to have the same family as
1127 * the policy itself. Now that we will have ipv4-in-ipv6
1128 * and ipv6-in-ipv4 tunnels, this is no longer true.
1129 */
1130 if (!ut[i].family)
1131 ut[i].family = family;
1132
1133 switch (ut[i].family) {
1134 case AF_INET:
1135 break;
1136#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
1137 case AF_INET6:
1138 break;
1139#endif
1140 default:
1141 return -EINVAL;
3ff50b79 1142 }
b4ad86bf
DM
1143 }
1144
1145 return 0;
1146}
1147
5424f32e 1148static int copy_from_user_tmpl(struct xfrm_policy *pol, struct nlattr **attrs)
1da177e4 1149{
5424f32e 1150 struct nlattr *rt = attrs[XFRMA_TMPL];
1da177e4
LT
1151
1152 if (!rt) {
1153 pol->xfrm_nr = 0;
1154 } else {
5424f32e
TG
1155 struct xfrm_user_tmpl *utmpl = nla_data(rt);
1156 int nr = nla_len(rt) / sizeof(*utmpl);
b4ad86bf 1157 int err;
1da177e4 1158
b4ad86bf
DM
1159 err = validate_tmpl(nr, utmpl, pol->family);
1160 if (err)
1161 return err;
1da177e4 1162
5424f32e 1163 copy_templates(pol, utmpl, nr);
1da177e4
LT
1164 }
1165 return 0;
1166}
1167
5424f32e 1168static int copy_from_user_policy_type(u8 *tp, struct nlattr **attrs)
f7b6983f 1169{
5424f32e 1170 struct nlattr *rt = attrs[XFRMA_POLICY_TYPE];
f7b6983f 1171 struct xfrm_userpolicy_type *upt;
b798a9ed 1172 u8 type = XFRM_POLICY_TYPE_MAIN;
f7b6983f
MN
1173 int err;
1174
1175 if (rt) {
5424f32e 1176 upt = nla_data(rt);
f7b6983f
MN
1177 type = upt->type;
1178 }
1179
1180 err = verify_policy_type(type);
1181 if (err)
1182 return err;
1183
1184 *tp = type;
1185 return 0;
1186}
1187
1da177e4
LT
1188static void copy_from_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p)
1189{
1190 xp->priority = p->priority;
1191 xp->index = p->index;
1192 memcpy(&xp->selector, &p->sel, sizeof(xp->selector));
1193 memcpy(&xp->lft, &p->lft, sizeof(xp->lft));
1194 xp->action = p->action;
1195 xp->flags = p->flags;
1196 xp->family = p->sel.family;
1197 /* XXX xp->share = p->share; */
1198}
1199
1200static void copy_to_user_policy(struct xfrm_policy *xp, struct xfrm_userpolicy_info *p, int dir)
1201{
1202 memcpy(&p->sel, &xp->selector, sizeof(p->sel));
1203 memcpy(&p->lft, &xp->lft, sizeof(p->lft));
1204 memcpy(&p->curlft, &xp->curlft, sizeof(p->curlft));
1205 p->priority = xp->priority;
1206 p->index = xp->index;
1207 p->sel.family = xp->family;
1208 p->dir = dir;
1209 p->action = xp->action;
1210 p->flags = xp->flags;
1211 p->share = XFRM_SHARE_ANY; /* XXX xp->share */
1212}
1213
fc34acd3 1214static struct xfrm_policy *xfrm_policy_construct(struct net *net, struct xfrm_userpolicy_info *p, struct nlattr **attrs, int *errp)
1da177e4 1215{
fc34acd3 1216 struct xfrm_policy *xp = xfrm_policy_alloc(net, GFP_KERNEL);
1da177e4
LT
1217 int err;
1218
1219 if (!xp) {
1220 *errp = -ENOMEM;
1221 return NULL;
1222 }
1223
1224 copy_from_user_policy(xp, p);
df71837d 1225
35a7aa08 1226 err = copy_from_user_policy_type(&xp->type, attrs);
f7b6983f
MN
1227 if (err)
1228 goto error;
1229
35a7aa08
TG
1230 if (!(err = copy_from_user_tmpl(xp, attrs)))
1231 err = copy_from_user_sec_ctx(xp, attrs);
f7b6983f
MN
1232 if (err)
1233 goto error;
1da177e4 1234
295fae56
JHS
1235 xfrm_mark_get(attrs, &xp->mark);
1236
1da177e4 1237 return xp;
f7b6983f
MN
1238 error:
1239 *errp = err;
12a169e7 1240 xp->walk.dead = 1;
64c31b3f 1241 xfrm_policy_destroy(xp);
f7b6983f 1242 return NULL;
1da177e4
LT
1243}
1244
22e70050 1245static int xfrm_add_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 1246 struct nlattr **attrs)
1da177e4 1247{
fc34acd3 1248 struct net *net = sock_net(skb->sk);
7b67c857 1249 struct xfrm_userpolicy_info *p = nlmsg_data(nlh);
1da177e4 1250 struct xfrm_policy *xp;
26b15dad 1251 struct km_event c;
1da177e4
LT
1252 int err;
1253 int excl;
2532386f
EP
1254 uid_t loginuid = NETLINK_CB(skb).loginuid;
1255 u32 sessionid = NETLINK_CB(skb).sessionid;
1256 u32 sid = NETLINK_CB(skb).sid;
1da177e4
LT
1257
1258 err = verify_newpolicy_info(p);
df71837d
TJ
1259 if (err)
1260 return err;
35a7aa08 1261 err = verify_sec_ctx_len(attrs);
1da177e4
LT
1262 if (err)
1263 return err;
1264
fc34acd3 1265 xp = xfrm_policy_construct(net, p, attrs, &err);
1da177e4
LT
1266 if (!xp)
1267 return err;
1268
26b15dad
JHS
1269 /* shouldnt excl be based on nlh flags??
1270 * Aha! this is anti-netlink really i.e more pfkey derived
1271 * in netlink excl is a flag and you wouldnt need
1272 * a type XFRM_MSG_UPDPOLICY - JHS */
1da177e4
LT
1273 excl = nlh->nlmsg_type == XFRM_MSG_NEWPOLICY;
1274 err = xfrm_policy_insert(p->dir, xp, excl);
2532386f 1275 xfrm_audit_policy_add(xp, err ? 0 : 1, loginuid, sessionid, sid);
161a09e7 1276
1da177e4 1277 if (err) {
03e1ad7b 1278 security_xfrm_policy_free(xp->security);
1da177e4
LT
1279 kfree(xp);
1280 return err;
1281 }
1282
f60f6b8f 1283 c.event = nlh->nlmsg_type;
26b15dad
JHS
1284 c.seq = nlh->nlmsg_seq;
1285 c.pid = nlh->nlmsg_pid;
1286 km_policy_notify(xp, p->dir, &c);
1287
1da177e4
LT
1288 xfrm_pol_put(xp);
1289
1290 return 0;
1291}
1292
1293static int copy_to_user_tmpl(struct xfrm_policy *xp, struct sk_buff *skb)
1294{
1295 struct xfrm_user_tmpl vec[XFRM_MAX_DEPTH];
1296 int i;
1297
1298 if (xp->xfrm_nr == 0)
1299 return 0;
1300
1301 for (i = 0; i < xp->xfrm_nr; i++) {
1302 struct xfrm_user_tmpl *up = &vec[i];
1303 struct xfrm_tmpl *kp = &xp->xfrm_vec[i];
1304
1305 memcpy(&up->id, &kp->id, sizeof(up->id));
8511d01d 1306 up->family = kp->encap_family;
1da177e4
LT
1307 memcpy(&up->saddr, &kp->saddr, sizeof(up->saddr));
1308 up->reqid = kp->reqid;
1309 up->mode = kp->mode;
1310 up->share = kp->share;
1311 up->optional = kp->optional;
1312 up->aalgos = kp->aalgos;
1313 up->ealgos = kp->ealgos;
1314 up->calgos = kp->calgos;
1315 }
df71837d 1316
c0144bea
TG
1317 return nla_put(skb, XFRMA_TMPL,
1318 sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr, vec);
0d681623
SH
1319}
1320
1321static inline int copy_to_user_state_sec_ctx(struct xfrm_state *x, struct sk_buff *skb)
1322{
1323 if (x->security) {
1324 return copy_sec_ctx(x->security, skb);
df71837d
TJ
1325 }
1326 return 0;
0d681623 1327}
df71837d 1328
0d681623
SH
1329static inline int copy_to_user_sec_ctx(struct xfrm_policy *xp, struct sk_buff *skb)
1330{
1331 if (xp->security) {
1332 return copy_sec_ctx(xp->security, skb);
1333 }
1334 return 0;
df71837d 1335}
cfbfd45a
TG
1336static inline size_t userpolicy_type_attrsize(void)
1337{
1338#ifdef CONFIG_XFRM_SUB_POLICY
1339 return nla_total_size(sizeof(struct xfrm_userpolicy_type));
1340#else
1341 return 0;
1342#endif
1343}
df71837d 1344
f7b6983f 1345#ifdef CONFIG_XFRM_SUB_POLICY
b798a9ed 1346static int copy_to_user_policy_type(u8 type, struct sk_buff *skb)
f7b6983f 1347{
c0144bea
TG
1348 struct xfrm_userpolicy_type upt = {
1349 .type = type,
1350 };
f7b6983f 1351
c0144bea 1352 return nla_put(skb, XFRMA_POLICY_TYPE, sizeof(upt), &upt);
f7b6983f
MN
1353}
1354
1355#else
b798a9ed 1356static inline int copy_to_user_policy_type(u8 type, struct sk_buff *skb)
f7b6983f
MN
1357{
1358 return 0;
1359}
1360#endif
1361
1da177e4
LT
1362static int dump_one_policy(struct xfrm_policy *xp, int dir, int count, void *ptr)
1363{
1364 struct xfrm_dump_info *sp = ptr;
1365 struct xfrm_userpolicy_info *p;
1366 struct sk_buff *in_skb = sp->in_skb;
1367 struct sk_buff *skb = sp->out_skb;
1368 struct nlmsghdr *nlh;
1da177e4 1369
79b8b7f4
TG
1370 nlh = nlmsg_put(skb, NETLINK_CB(in_skb).pid, sp->nlmsg_seq,
1371 XFRM_MSG_NEWPOLICY, sizeof(*p), sp->nlmsg_flags);
1372 if (nlh == NULL)
1373 return -EMSGSIZE;
1da177e4 1374
7b67c857 1375 p = nlmsg_data(nlh);
1da177e4
LT
1376 copy_to_user_policy(xp, p, dir);
1377 if (copy_to_user_tmpl(xp, skb) < 0)
1378 goto nlmsg_failure;
df71837d
TJ
1379 if (copy_to_user_sec_ctx(xp, skb))
1380 goto nlmsg_failure;
1459bb36 1381 if (copy_to_user_policy_type(xp->type, skb) < 0)
f7b6983f 1382 goto nlmsg_failure;
295fae56
JHS
1383 if (xfrm_mark_put(skb, &xp->mark))
1384 goto nla_put_failure;
1da177e4 1385
9825069d 1386 nlmsg_end(skb, nlh);
1da177e4
LT
1387 return 0;
1388
295fae56 1389nla_put_failure:
1da177e4 1390nlmsg_failure:
9825069d
TG
1391 nlmsg_cancel(skb, nlh);
1392 return -EMSGSIZE;
1da177e4
LT
1393}
1394
4c563f76
TT
1395static int xfrm_dump_policy_done(struct netlink_callback *cb)
1396{
1397 struct xfrm_policy_walk *walk = (struct xfrm_policy_walk *) &cb->args[1];
1398
1399 xfrm_policy_walk_done(walk);
1400 return 0;
1401}
1402
1da177e4
LT
1403static int xfrm_dump_policy(struct sk_buff *skb, struct netlink_callback *cb)
1404{
fc34acd3 1405 struct net *net = sock_net(skb->sk);
4c563f76 1406 struct xfrm_policy_walk *walk = (struct xfrm_policy_walk *) &cb->args[1];
1da177e4
LT
1407 struct xfrm_dump_info info;
1408
4c563f76
TT
1409 BUILD_BUG_ON(sizeof(struct xfrm_policy_walk) >
1410 sizeof(cb->args) - sizeof(cb->args[0]));
1411
1da177e4
LT
1412 info.in_skb = cb->skb;
1413 info.out_skb = skb;
1414 info.nlmsg_seq = cb->nlh->nlmsg_seq;
1415 info.nlmsg_flags = NLM_F_MULTI;
4c563f76
TT
1416
1417 if (!cb->args[0]) {
1418 cb->args[0] = 1;
1419 xfrm_policy_walk_init(walk, XFRM_POLICY_TYPE_ANY);
1420 }
1421
fc34acd3 1422 (void) xfrm_policy_walk(net, walk, dump_one_policy, &info);
1da177e4
LT
1423
1424 return skb->len;
1425}
1426
1427static struct sk_buff *xfrm_policy_netlink(struct sk_buff *in_skb,
1428 struct xfrm_policy *xp,
1429 int dir, u32 seq)
1430{
1431 struct xfrm_dump_info info;
1432 struct sk_buff *skb;
1433
7deb2264 1434 skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
1da177e4
LT
1435 if (!skb)
1436 return ERR_PTR(-ENOMEM);
1437
1da177e4
LT
1438 info.in_skb = in_skb;
1439 info.out_skb = skb;
1440 info.nlmsg_seq = seq;
1441 info.nlmsg_flags = 0;
1da177e4
LT
1442
1443 if (dump_one_policy(xp, dir, 0, &info) < 0) {
1444 kfree_skb(skb);
1445 return NULL;
1446 }
1447
1448 return skb;
1449}
1450
22e70050 1451static int xfrm_get_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 1452 struct nlattr **attrs)
1da177e4 1453{
fc34acd3 1454 struct net *net = sock_net(skb->sk);
1da177e4
LT
1455 struct xfrm_policy *xp;
1456 struct xfrm_userpolicy_id *p;
b798a9ed 1457 u8 type = XFRM_POLICY_TYPE_MAIN;
1da177e4 1458 int err;
26b15dad 1459 struct km_event c;
1da177e4 1460 int delete;
295fae56
JHS
1461 struct xfrm_mark m;
1462 u32 mark = xfrm_mark_get(attrs, &m);
1da177e4 1463
7b67c857 1464 p = nlmsg_data(nlh);
1da177e4
LT
1465 delete = nlh->nlmsg_type == XFRM_MSG_DELPOLICY;
1466
35a7aa08 1467 err = copy_from_user_policy_type(&type, attrs);
f7b6983f
MN
1468 if (err)
1469 return err;
1470
1da177e4
LT
1471 err = verify_policy_dir(p->dir);
1472 if (err)
1473 return err;
1474
1475 if (p->index)
295fae56 1476 xp = xfrm_policy_byid(net, mark, type, p->dir, p->index, delete, &err);
df71837d 1477 else {
5424f32e 1478 struct nlattr *rt = attrs[XFRMA_SEC_CTX];
03e1ad7b 1479 struct xfrm_sec_ctx *ctx;
df71837d 1480
35a7aa08 1481 err = verify_sec_ctx_len(attrs);
df71837d
TJ
1482 if (err)
1483 return err;
1484
2c8dd116 1485 ctx = NULL;
df71837d 1486 if (rt) {
5424f32e 1487 struct xfrm_user_sec_ctx *uctx = nla_data(rt);
df71837d 1488
03e1ad7b
PM
1489 err = security_xfrm_policy_alloc(&ctx, uctx);
1490 if (err)
df71837d 1491 return err;
2c8dd116 1492 }
295fae56 1493 xp = xfrm_policy_bysel_ctx(net, mark, type, p->dir, &p->sel,
6f26b61e 1494 ctx, delete, &err);
03e1ad7b 1495 security_xfrm_policy_free(ctx);
df71837d 1496 }
1da177e4
LT
1497 if (xp == NULL)
1498 return -ENOENT;
1499
1500 if (!delete) {
1501 struct sk_buff *resp_skb;
1502
1503 resp_skb = xfrm_policy_netlink(skb, xp, p->dir, nlh->nlmsg_seq);
1504 if (IS_ERR(resp_skb)) {
1505 err = PTR_ERR(resp_skb);
1506 } else {
a6483b79 1507 err = nlmsg_unicast(net->xfrm.nlsk, resp_skb,
082a1ad5 1508 NETLINK_CB(skb).pid);
1da177e4 1509 }
26b15dad 1510 } else {
2532386f
EP
1511 uid_t loginuid = NETLINK_CB(skb).loginuid;
1512 u32 sessionid = NETLINK_CB(skb).sessionid;
1513 u32 sid = NETLINK_CB(skb).sid;
1514
1515 xfrm_audit_policy_delete(xp, err ? 0 : 1, loginuid, sessionid,
1516 sid);
13fcfbb0
DM
1517
1518 if (err != 0)
c8c05a8e 1519 goto out;
13fcfbb0 1520
e7443892 1521 c.data.byid = p->index;
f60f6b8f 1522 c.event = nlh->nlmsg_type;
26b15dad
JHS
1523 c.seq = nlh->nlmsg_seq;
1524 c.pid = nlh->nlmsg_pid;
1525 km_policy_notify(xp, p->dir, &c);
1da177e4
LT
1526 }
1527
c8c05a8e 1528out:
ef41aaa0 1529 xfrm_pol_put(xp);
1da177e4
LT
1530 return err;
1531}
1532
22e70050 1533static int xfrm_flush_sa(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 1534 struct nlattr **attrs)
1da177e4 1535{
fc34acd3 1536 struct net *net = sock_net(skb->sk);
26b15dad 1537 struct km_event c;
7b67c857 1538 struct xfrm_usersa_flush *p = nlmsg_data(nlh);
161a09e7 1539 struct xfrm_audit audit_info;
4aa2e62c 1540 int err;
1da177e4 1541
161a09e7 1542 audit_info.loginuid = NETLINK_CB(skb).loginuid;
2532386f 1543 audit_info.sessionid = NETLINK_CB(skb).sessionid;
161a09e7 1544 audit_info.secid = NETLINK_CB(skb).sid;
fc34acd3 1545 err = xfrm_state_flush(net, p->proto, &audit_info);
9e64cc95
JHS
1546 if (err) {
1547 if (err == -ESRCH) /* empty table */
1548 return 0;
069c474e 1549 return err;
9e64cc95 1550 }
bf08867f 1551 c.data.proto = p->proto;
f60f6b8f 1552 c.event = nlh->nlmsg_type;
26b15dad
JHS
1553 c.seq = nlh->nlmsg_seq;
1554 c.pid = nlh->nlmsg_pid;
7067802e 1555 c.net = net;
26b15dad
JHS
1556 km_state_notify(NULL, &c);
1557
1da177e4
LT
1558 return 0;
1559}
1560
7deb2264
TG
1561static inline size_t xfrm_aevent_msgsize(void)
1562{
1563 return NLMSG_ALIGN(sizeof(struct xfrm_aevent_id))
1564 + nla_total_size(sizeof(struct xfrm_replay_state))
1565 + nla_total_size(sizeof(struct xfrm_lifetime_cur))
6f26b61e 1566 + nla_total_size(sizeof(struct xfrm_mark))
7deb2264
TG
1567 + nla_total_size(4) /* XFRM_AE_RTHR */
1568 + nla_total_size(4); /* XFRM_AE_ETHR */
1569}
d51d081d
JHS
1570
1571static int build_aevent(struct sk_buff *skb, struct xfrm_state *x, struct km_event *c)
1572{
1573 struct xfrm_aevent_id *id;
1574 struct nlmsghdr *nlh;
d51d081d 1575
79b8b7f4
TG
1576 nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_NEWAE, sizeof(*id), 0);
1577 if (nlh == NULL)
1578 return -EMSGSIZE;
d51d081d 1579
7b67c857 1580 id = nlmsg_data(nlh);
2b5f6dcc 1581 memcpy(&id->sa_id.daddr, &x->id.daddr,sizeof(x->id.daddr));
d51d081d
JHS
1582 id->sa_id.spi = x->id.spi;
1583 id->sa_id.family = x->props.family;
1584 id->sa_id.proto = x->id.proto;
2b5f6dcc
JHS
1585 memcpy(&id->saddr, &x->props.saddr,sizeof(x->props.saddr));
1586 id->reqid = x->props.reqid;
d51d081d
JHS
1587 id->flags = c->data.aevent;
1588
c0144bea
TG
1589 NLA_PUT(skb, XFRMA_REPLAY_VAL, sizeof(x->replay), &x->replay);
1590 NLA_PUT(skb, XFRMA_LTIME_VAL, sizeof(x->curlft), &x->curlft);
d51d081d 1591
c0144bea
TG
1592 if (id->flags & XFRM_AE_RTHR)
1593 NLA_PUT_U32(skb, XFRMA_REPLAY_THRESH, x->replay_maxdiff);
d51d081d 1594
c0144bea
TG
1595 if (id->flags & XFRM_AE_ETHR)
1596 NLA_PUT_U32(skb, XFRMA_ETIMER_THRESH,
1597 x->replay_maxage * 10 / HZ);
d51d081d 1598
6f26b61e
JHS
1599 if (xfrm_mark_put(skb, &x->mark))
1600 goto nla_put_failure;
1601
9825069d 1602 return nlmsg_end(skb, nlh);
d51d081d 1603
c0144bea 1604nla_put_failure:
9825069d
TG
1605 nlmsg_cancel(skb, nlh);
1606 return -EMSGSIZE;
d51d081d
JHS
1607}
1608
22e70050 1609static int xfrm_get_ae(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 1610 struct nlattr **attrs)
d51d081d 1611{
fc34acd3 1612 struct net *net = sock_net(skb->sk);
d51d081d
JHS
1613 struct xfrm_state *x;
1614 struct sk_buff *r_skb;
1615 int err;
1616 struct km_event c;
6f26b61e
JHS
1617 u32 mark;
1618 struct xfrm_mark m;
7b67c857 1619 struct xfrm_aevent_id *p = nlmsg_data(nlh);
d51d081d
JHS
1620 struct xfrm_usersa_id *id = &p->sa_id;
1621
7deb2264 1622 r_skb = nlmsg_new(xfrm_aevent_msgsize(), GFP_ATOMIC);
d51d081d
JHS
1623 if (r_skb == NULL)
1624 return -ENOMEM;
1625
6f26b61e
JHS
1626 mark = xfrm_mark_get(attrs, &m);
1627
1628 x = xfrm_state_lookup(net, mark, &id->daddr, id->spi, id->proto, id->family);
d51d081d 1629 if (x == NULL) {
b08d5840 1630 kfree_skb(r_skb);
d51d081d
JHS
1631 return -ESRCH;
1632 }
1633
1634 /*
1635 * XXX: is this lock really needed - none of the other
1636 * gets lock (the concern is things getting updated
1637 * while we are still reading) - jhs
1638 */
1639 spin_lock_bh(&x->lock);
1640 c.data.aevent = p->flags;
1641 c.seq = nlh->nlmsg_seq;
1642 c.pid = nlh->nlmsg_pid;
1643
1644 if (build_aevent(r_skb, x, &c) < 0)
1645 BUG();
a6483b79 1646 err = nlmsg_unicast(net->xfrm.nlsk, r_skb, NETLINK_CB(skb).pid);
d51d081d
JHS
1647 spin_unlock_bh(&x->lock);
1648 xfrm_state_put(x);
1649 return err;
1650}
1651
22e70050 1652static int xfrm_new_ae(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 1653 struct nlattr **attrs)
d51d081d 1654{
fc34acd3 1655 struct net *net = sock_net(skb->sk);
d51d081d
JHS
1656 struct xfrm_state *x;
1657 struct km_event c;
1658 int err = - EINVAL;
6f26b61e
JHS
1659 u32 mark = 0;
1660 struct xfrm_mark m;
7b67c857 1661 struct xfrm_aevent_id *p = nlmsg_data(nlh);
5424f32e
TG
1662 struct nlattr *rp = attrs[XFRMA_REPLAY_VAL];
1663 struct nlattr *lt = attrs[XFRMA_LTIME_VAL];
d51d081d
JHS
1664
1665 if (!lt && !rp)
1666 return err;
1667
1668 /* pedantic mode - thou shalt sayeth replaceth */
1669 if (!(nlh->nlmsg_flags&NLM_F_REPLACE))
1670 return err;
1671
6f26b61e
JHS
1672 mark = xfrm_mark_get(attrs, &m);
1673
1674 x = xfrm_state_lookup(net, mark, &p->sa_id.daddr, p->sa_id.spi, p->sa_id.proto, p->sa_id.family);
d51d081d
JHS
1675 if (x == NULL)
1676 return -ESRCH;
1677
1678 if (x->km.state != XFRM_STATE_VALID)
1679 goto out;
1680
1681 spin_lock_bh(&x->lock);
35a7aa08 1682 xfrm_update_ae_params(x, attrs);
d51d081d 1683 spin_unlock_bh(&x->lock);
d51d081d
JHS
1684
1685 c.event = nlh->nlmsg_type;
1686 c.seq = nlh->nlmsg_seq;
1687 c.pid = nlh->nlmsg_pid;
1688 c.data.aevent = XFRM_AE_CU;
1689 km_state_notify(x, &c);
1690 err = 0;
1691out:
1692 xfrm_state_put(x);
1693 return err;
1694}
1695
22e70050 1696static int xfrm_flush_policy(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 1697 struct nlattr **attrs)
1da177e4 1698{
fc34acd3 1699 struct net *net = sock_net(skb->sk);
f7b6983f 1700 struct km_event c;
b798a9ed 1701 u8 type = XFRM_POLICY_TYPE_MAIN;
f7b6983f 1702 int err;
161a09e7 1703 struct xfrm_audit audit_info;
f7b6983f 1704
35a7aa08 1705 err = copy_from_user_policy_type(&type, attrs);
f7b6983f
MN
1706 if (err)
1707 return err;
26b15dad 1708
161a09e7 1709 audit_info.loginuid = NETLINK_CB(skb).loginuid;
2532386f 1710 audit_info.sessionid = NETLINK_CB(skb).sessionid;
161a09e7 1711 audit_info.secid = NETLINK_CB(skb).sid;
fc34acd3 1712 err = xfrm_policy_flush(net, type, &audit_info);
2f1eb65f
JHS
1713 if (err) {
1714 if (err == -ESRCH) /* empty table */
1715 return 0;
069c474e 1716 return err;
2f1eb65f
JHS
1717 }
1718
f7b6983f 1719 c.data.type = type;
f60f6b8f 1720 c.event = nlh->nlmsg_type;
26b15dad
JHS
1721 c.seq = nlh->nlmsg_seq;
1722 c.pid = nlh->nlmsg_pid;
7067802e 1723 c.net = net;
26b15dad 1724 km_policy_notify(NULL, 0, &c);
1da177e4
LT
1725 return 0;
1726}
1727
22e70050 1728static int xfrm_add_pol_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 1729 struct nlattr **attrs)
6c5c8ca7 1730{
fc34acd3 1731 struct net *net = sock_net(skb->sk);
6c5c8ca7 1732 struct xfrm_policy *xp;
7b67c857 1733 struct xfrm_user_polexpire *up = nlmsg_data(nlh);
6c5c8ca7 1734 struct xfrm_userpolicy_info *p = &up->pol;
b798a9ed 1735 u8 type = XFRM_POLICY_TYPE_MAIN;
6c5c8ca7 1736 int err = -ENOENT;
295fae56
JHS
1737 struct xfrm_mark m;
1738 u32 mark = xfrm_mark_get(attrs, &m);
6c5c8ca7 1739
35a7aa08 1740 err = copy_from_user_policy_type(&type, attrs);
f7b6983f
MN
1741 if (err)
1742 return err;
1743
c8bf4d04
TT
1744 err = verify_policy_dir(p->dir);
1745 if (err)
1746 return err;
1747
6c5c8ca7 1748 if (p->index)
295fae56 1749 xp = xfrm_policy_byid(net, mark, type, p->dir, p->index, 0, &err);
6c5c8ca7 1750 else {
5424f32e 1751 struct nlattr *rt = attrs[XFRMA_SEC_CTX];
03e1ad7b 1752 struct xfrm_sec_ctx *ctx;
6c5c8ca7 1753
35a7aa08 1754 err = verify_sec_ctx_len(attrs);
6c5c8ca7
JHS
1755 if (err)
1756 return err;
1757
2c8dd116 1758 ctx = NULL;
6c5c8ca7 1759 if (rt) {
5424f32e 1760 struct xfrm_user_sec_ctx *uctx = nla_data(rt);
6c5c8ca7 1761
03e1ad7b
PM
1762 err = security_xfrm_policy_alloc(&ctx, uctx);
1763 if (err)
6c5c8ca7 1764 return err;
2c8dd116 1765 }
295fae56 1766 xp = xfrm_policy_bysel_ctx(net, mark, type, p->dir,
6f26b61e 1767 &p->sel, ctx, 0, &err);
03e1ad7b 1768 security_xfrm_policy_free(ctx);
6c5c8ca7 1769 }
6c5c8ca7 1770 if (xp == NULL)
ef41aaa0 1771 return -ENOENT;
03e1ad7b 1772
ea2dea9d 1773 if (unlikely(xp->walk.dead))
6c5c8ca7 1774 goto out;
6c5c8ca7 1775
6c5c8ca7
JHS
1776 err = 0;
1777 if (up->hard) {
2532386f
EP
1778 uid_t loginuid = NETLINK_CB(skb).loginuid;
1779 uid_t sessionid = NETLINK_CB(skb).sessionid;
1780 u32 sid = NETLINK_CB(skb).sid;
6c5c8ca7 1781 xfrm_policy_delete(xp, p->dir);
2532386f 1782 xfrm_audit_policy_delete(xp, 1, loginuid, sessionid, sid);
161a09e7 1783
6c5c8ca7
JHS
1784 } else {
1785 // reset the timers here?
62db5cfd 1786 WARN(1, "Dont know what to do with soft policy expire\n");
6c5c8ca7
JHS
1787 }
1788 km_policy_expired(xp, p->dir, up->hard, current->pid);
1789
1790out:
1791 xfrm_pol_put(xp);
1792 return err;
1793}
1794
22e70050 1795static int xfrm_add_sa_expire(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 1796 struct nlattr **attrs)
53bc6b4d 1797{
fc34acd3 1798 struct net *net = sock_net(skb->sk);
53bc6b4d
JHS
1799 struct xfrm_state *x;
1800 int err;
7b67c857 1801 struct xfrm_user_expire *ue = nlmsg_data(nlh);
53bc6b4d 1802 struct xfrm_usersa_info *p = &ue->state;
6f26b61e 1803 struct xfrm_mark m;
928497f0 1804 u32 mark = xfrm_mark_get(attrs, &m);
53bc6b4d 1805
6f26b61e 1806 x = xfrm_state_lookup(net, mark, &p->id.daddr, p->id.spi, p->id.proto, p->family);
53bc6b4d 1807
3a765aa5 1808 err = -ENOENT;
53bc6b4d
JHS
1809 if (x == NULL)
1810 return err;
1811
53bc6b4d 1812 spin_lock_bh(&x->lock);
3a765aa5 1813 err = -EINVAL;
53bc6b4d
JHS
1814 if (x->km.state != XFRM_STATE_VALID)
1815 goto out;
1816 km_state_expired(x, ue->hard, current->pid);
1817
161a09e7 1818 if (ue->hard) {
2532386f
EP
1819 uid_t loginuid = NETLINK_CB(skb).loginuid;
1820 uid_t sessionid = NETLINK_CB(skb).sessionid;
1821 u32 sid = NETLINK_CB(skb).sid;
53bc6b4d 1822 __xfrm_state_delete(x);
2532386f 1823 xfrm_audit_state_delete(x, 1, loginuid, sessionid, sid);
161a09e7 1824 }
3a765aa5 1825 err = 0;
53bc6b4d
JHS
1826out:
1827 spin_unlock_bh(&x->lock);
1828 xfrm_state_put(x);
1829 return err;
1830}
1831
22e70050 1832static int xfrm_add_acquire(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 1833 struct nlattr **attrs)
980ebd25 1834{
fc34acd3 1835 struct net *net = sock_net(skb->sk);
980ebd25
JHS
1836 struct xfrm_policy *xp;
1837 struct xfrm_user_tmpl *ut;
1838 int i;
5424f32e 1839 struct nlattr *rt = attrs[XFRMA_TMPL];
6f26b61e 1840 struct xfrm_mark mark;
980ebd25 1841
7b67c857 1842 struct xfrm_user_acquire *ua = nlmsg_data(nlh);
fc34acd3 1843 struct xfrm_state *x = xfrm_state_alloc(net);
980ebd25
JHS
1844 int err = -ENOMEM;
1845
1846 if (!x)
d8eb9307 1847 goto nomem;
980ebd25 1848
6f26b61e
JHS
1849 xfrm_mark_get(attrs, &mark);
1850
980ebd25 1851 err = verify_newpolicy_info(&ua->policy);
d8eb9307
IJ
1852 if (err)
1853 goto bad_policy;
980ebd25
JHS
1854
1855 /* build an XP */
fc34acd3 1856 xp = xfrm_policy_construct(net, &ua->policy, attrs, &err);
d8eb9307
IJ
1857 if (!xp)
1858 goto free_state;
980ebd25
JHS
1859
1860 memcpy(&x->id, &ua->id, sizeof(ua->id));
1861 memcpy(&x->props.saddr, &ua->saddr, sizeof(ua->saddr));
1862 memcpy(&x->sel, &ua->sel, sizeof(ua->sel));
6f26b61e
JHS
1863 xp->mark.m = x->mark.m = mark.m;
1864 xp->mark.v = x->mark.v = mark.v;
5424f32e 1865 ut = nla_data(rt);
980ebd25
JHS
1866 /* extract the templates and for each call km_key */
1867 for (i = 0; i < xp->xfrm_nr; i++, ut++) {
1868 struct xfrm_tmpl *t = &xp->xfrm_vec[i];
1869 memcpy(&x->id, &t->id, sizeof(x->id));
1870 x->props.mode = t->mode;
1871 x->props.reqid = t->reqid;
1872 x->props.family = ut->family;
1873 t->aalgos = ua->aalgos;
1874 t->ealgos = ua->ealgos;
1875 t->calgos = ua->calgos;
1876 err = km_query(x, t, xp);
1877
1878 }
1879
1880 kfree(x);
1881 kfree(xp);
1882
1883 return 0;
d8eb9307
IJ
1884
1885bad_policy:
62db5cfd 1886 WARN(1, "BAD policy passed\n");
d8eb9307
IJ
1887free_state:
1888 kfree(x);
1889nomem:
1890 return err;
980ebd25
JHS
1891}
1892
5c79de6e 1893#ifdef CONFIG_XFRM_MIGRATE
5c79de6e 1894static int copy_from_user_migrate(struct xfrm_migrate *ma,
13c1d189 1895 struct xfrm_kmaddress *k,
5424f32e 1896 struct nlattr **attrs, int *num)
5c79de6e 1897{
5424f32e 1898 struct nlattr *rt = attrs[XFRMA_MIGRATE];
5c79de6e
SS
1899 struct xfrm_user_migrate *um;
1900 int i, num_migrate;
1901
13c1d189
AE
1902 if (k != NULL) {
1903 struct xfrm_user_kmaddress *uk;
1904
1905 uk = nla_data(attrs[XFRMA_KMADDRESS]);
1906 memcpy(&k->local, &uk->local, sizeof(k->local));
1907 memcpy(&k->remote, &uk->remote, sizeof(k->remote));
1908 k->family = uk->family;
1909 k->reserved = uk->reserved;
1910 }
1911
5424f32e
TG
1912 um = nla_data(rt);
1913 num_migrate = nla_len(rt) / sizeof(*um);
5c79de6e
SS
1914
1915 if (num_migrate <= 0 || num_migrate > XFRM_MAX_DEPTH)
1916 return -EINVAL;
1917
1918 for (i = 0; i < num_migrate; i++, um++, ma++) {
1919 memcpy(&ma->old_daddr, &um->old_daddr, sizeof(ma->old_daddr));
1920 memcpy(&ma->old_saddr, &um->old_saddr, sizeof(ma->old_saddr));
1921 memcpy(&ma->new_daddr, &um->new_daddr, sizeof(ma->new_daddr));
1922 memcpy(&ma->new_saddr, &um->new_saddr, sizeof(ma->new_saddr));
1923
1924 ma->proto = um->proto;
1925 ma->mode = um->mode;
1926 ma->reqid = um->reqid;
1927
1928 ma->old_family = um->old_family;
1929 ma->new_family = um->new_family;
1930 }
1931
1932 *num = i;
1933 return 0;
1934}
1935
1936static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 1937 struct nlattr **attrs)
5c79de6e 1938{
7b67c857 1939 struct xfrm_userpolicy_id *pi = nlmsg_data(nlh);
5c79de6e 1940 struct xfrm_migrate m[XFRM_MAX_DEPTH];
13c1d189 1941 struct xfrm_kmaddress km, *kmp;
5c79de6e
SS
1942 u8 type;
1943 int err;
1944 int n = 0;
1945
35a7aa08 1946 if (attrs[XFRMA_MIGRATE] == NULL)
cf5cb79f 1947 return -EINVAL;
5c79de6e 1948
13c1d189
AE
1949 kmp = attrs[XFRMA_KMADDRESS] ? &km : NULL;
1950
5424f32e 1951 err = copy_from_user_policy_type(&type, attrs);
5c79de6e
SS
1952 if (err)
1953 return err;
1954
13c1d189 1955 err = copy_from_user_migrate((struct xfrm_migrate *)m, kmp, attrs, &n);
5c79de6e
SS
1956 if (err)
1957 return err;
1958
1959 if (!n)
1960 return 0;
1961
13c1d189 1962 xfrm_migrate(&pi->sel, pi->dir, type, m, n, kmp);
5c79de6e
SS
1963
1964 return 0;
1965}
1966#else
1967static int xfrm_do_migrate(struct sk_buff *skb, struct nlmsghdr *nlh,
5424f32e 1968 struct nlattr **attrs)
5c79de6e
SS
1969{
1970 return -ENOPROTOOPT;
1971}
1972#endif
1973
1974#ifdef CONFIG_XFRM_MIGRATE
1975static int copy_to_user_migrate(struct xfrm_migrate *m, struct sk_buff *skb)
1976{
1977 struct xfrm_user_migrate um;
1978
1979 memset(&um, 0, sizeof(um));
1980 um.proto = m->proto;
1981 um.mode = m->mode;
1982 um.reqid = m->reqid;
1983 um.old_family = m->old_family;
1984 memcpy(&um.old_daddr, &m->old_daddr, sizeof(um.old_daddr));
1985 memcpy(&um.old_saddr, &m->old_saddr, sizeof(um.old_saddr));
1986 um.new_family = m->new_family;
1987 memcpy(&um.new_daddr, &m->new_daddr, sizeof(um.new_daddr));
1988 memcpy(&um.new_saddr, &m->new_saddr, sizeof(um.new_saddr));
1989
c0144bea 1990 return nla_put(skb, XFRMA_MIGRATE, sizeof(um), &um);
5c79de6e
SS
1991}
1992
13c1d189
AE
1993static int copy_to_user_kmaddress(struct xfrm_kmaddress *k, struct sk_buff *skb)
1994{
1995 struct xfrm_user_kmaddress uk;
1996
1997 memset(&uk, 0, sizeof(uk));
1998 uk.family = k->family;
1999 uk.reserved = k->reserved;
2000 memcpy(&uk.local, &k->local, sizeof(uk.local));
a1caa322 2001 memcpy(&uk.remote, &k->remote, sizeof(uk.remote));
13c1d189
AE
2002
2003 return nla_put(skb, XFRMA_KMADDRESS, sizeof(uk), &uk);
2004}
2005
2006static inline size_t xfrm_migrate_msgsize(int num_migrate, int with_kma)
7deb2264
TG
2007{
2008 return NLMSG_ALIGN(sizeof(struct xfrm_userpolicy_id))
13c1d189
AE
2009 + (with_kma ? nla_total_size(sizeof(struct xfrm_kmaddress)) : 0)
2010 + nla_total_size(sizeof(struct xfrm_user_migrate) * num_migrate)
2011 + userpolicy_type_attrsize();
7deb2264
TG
2012}
2013
5c79de6e 2014static int build_migrate(struct sk_buff *skb, struct xfrm_migrate *m,
13c1d189
AE
2015 int num_migrate, struct xfrm_kmaddress *k,
2016 struct xfrm_selector *sel, u8 dir, u8 type)
5c79de6e
SS
2017{
2018 struct xfrm_migrate *mp;
2019 struct xfrm_userpolicy_id *pol_id;
2020 struct nlmsghdr *nlh;
5c79de6e
SS
2021 int i;
2022
79b8b7f4
TG
2023 nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_MIGRATE, sizeof(*pol_id), 0);
2024 if (nlh == NULL)
2025 return -EMSGSIZE;
5c79de6e 2026
7b67c857 2027 pol_id = nlmsg_data(nlh);
5c79de6e
SS
2028 /* copy data from selector, dir, and type to the pol_id */
2029 memset(pol_id, 0, sizeof(*pol_id));
2030 memcpy(&pol_id->sel, sel, sizeof(pol_id->sel));
2031 pol_id->dir = dir;
2032
13c1d189
AE
2033 if (k != NULL && (copy_to_user_kmaddress(k, skb) < 0))
2034 goto nlmsg_failure;
2035
5c79de6e
SS
2036 if (copy_to_user_policy_type(type, skb) < 0)
2037 goto nlmsg_failure;
2038
2039 for (i = 0, mp = m ; i < num_migrate; i++, mp++) {
2040 if (copy_to_user_migrate(mp, skb) < 0)
2041 goto nlmsg_failure;
2042 }
2043
9825069d 2044 return nlmsg_end(skb, nlh);
5c79de6e 2045nlmsg_failure:
9825069d
TG
2046 nlmsg_cancel(skb, nlh);
2047 return -EMSGSIZE;
5c79de6e
SS
2048}
2049
2050static int xfrm_send_migrate(struct xfrm_selector *sel, u8 dir, u8 type,
13c1d189
AE
2051 struct xfrm_migrate *m, int num_migrate,
2052 struct xfrm_kmaddress *k)
5c79de6e 2053{
a6483b79 2054 struct net *net = &init_net;
5c79de6e 2055 struct sk_buff *skb;
5c79de6e 2056
13c1d189 2057 skb = nlmsg_new(xfrm_migrate_msgsize(num_migrate, !!k), GFP_ATOMIC);
5c79de6e
SS
2058 if (skb == NULL)
2059 return -ENOMEM;
2060
2061 /* build migrate */
13c1d189 2062 if (build_migrate(skb, m, num_migrate, k, sel, dir, type) < 0)
5c79de6e
SS
2063 BUG();
2064
a6483b79 2065 return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_MIGRATE, GFP_ATOMIC);
5c79de6e
SS
2066}
2067#else
2068static int xfrm_send_migrate(struct xfrm_selector *sel, u8 dir, u8 type,
13c1d189
AE
2069 struct xfrm_migrate *m, int num_migrate,
2070 struct xfrm_kmaddress *k)
5c79de6e
SS
2071{
2072 return -ENOPROTOOPT;
2073}
2074#endif
d51d081d 2075
a7bd9a45 2076#define XMSGSIZE(type) sizeof(struct type)
492b558b
TG
2077
2078static const int xfrm_msg_min[XFRM_NR_MSGTYPES] = {
66f9a259 2079 [XFRM_MSG_NEWSA - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_info),
492b558b
TG
2080 [XFRM_MSG_DELSA - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_id),
2081 [XFRM_MSG_GETSA - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_id),
2082 [XFRM_MSG_NEWPOLICY - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_info),
2083 [XFRM_MSG_DELPOLICY - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
2084 [XFRM_MSG_GETPOLICY - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
2085 [XFRM_MSG_ALLOCSPI - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userspi_info),
980ebd25 2086 [XFRM_MSG_ACQUIRE - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_acquire),
53bc6b4d 2087 [XFRM_MSG_EXPIRE - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_expire),
492b558b 2088 [XFRM_MSG_UPDPOLICY - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_info),
66f9a259 2089 [XFRM_MSG_UPDSA - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_info),
6c5c8ca7 2090 [XFRM_MSG_POLEXPIRE - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_polexpire),
492b558b 2091 [XFRM_MSG_FLUSHSA - XFRM_MSG_BASE] = XMSGSIZE(xfrm_usersa_flush),
a7bd9a45 2092 [XFRM_MSG_FLUSHPOLICY - XFRM_MSG_BASE] = 0,
d51d081d
JHS
2093 [XFRM_MSG_NEWAE - XFRM_MSG_BASE] = XMSGSIZE(xfrm_aevent_id),
2094 [XFRM_MSG_GETAE - XFRM_MSG_BASE] = XMSGSIZE(xfrm_aevent_id),
97a64b45 2095 [XFRM_MSG_REPORT - XFRM_MSG_BASE] = XMSGSIZE(xfrm_user_report),
5c79de6e 2096 [XFRM_MSG_MIGRATE - XFRM_MSG_BASE] = XMSGSIZE(xfrm_userpolicy_id),
a7bd9a45
TG
2097 [XFRM_MSG_GETSADINFO - XFRM_MSG_BASE] = sizeof(u32),
2098 [XFRM_MSG_GETSPDINFO - XFRM_MSG_BASE] = sizeof(u32),
1da177e4
LT
2099};
2100
492b558b
TG
2101#undef XMSGSIZE
2102
cf5cb79f 2103static const struct nla_policy xfrma_policy[XFRMA_MAX+1] = {
c28e9304 2104 [XFRMA_SA] = { .len = sizeof(struct xfrm_usersa_info)},
2105 [XFRMA_POLICY] = { .len = sizeof(struct xfrm_userpolicy_info)},
2106 [XFRMA_LASTUSED] = { .type = NLA_U64},
2107 [XFRMA_ALG_AUTH_TRUNC] = { .len = sizeof(struct xfrm_algo_auth)},
1a6509d9 2108 [XFRMA_ALG_AEAD] = { .len = sizeof(struct xfrm_algo_aead) },
cf5cb79f
TG
2109 [XFRMA_ALG_AUTH] = { .len = sizeof(struct xfrm_algo) },
2110 [XFRMA_ALG_CRYPT] = { .len = sizeof(struct xfrm_algo) },
2111 [XFRMA_ALG_COMP] = { .len = sizeof(struct xfrm_algo) },
2112 [XFRMA_ENCAP] = { .len = sizeof(struct xfrm_encap_tmpl) },
2113 [XFRMA_TMPL] = { .len = sizeof(struct xfrm_user_tmpl) },
2114 [XFRMA_SEC_CTX] = { .len = sizeof(struct xfrm_sec_ctx) },
2115 [XFRMA_LTIME_VAL] = { .len = sizeof(struct xfrm_lifetime_cur) },
2116 [XFRMA_REPLAY_VAL] = { .len = sizeof(struct xfrm_replay_state) },
2117 [XFRMA_REPLAY_THRESH] = { .type = NLA_U32 },
2118 [XFRMA_ETIMER_THRESH] = { .type = NLA_U32 },
2119 [XFRMA_SRCADDR] = { .len = sizeof(xfrm_address_t) },
2120 [XFRMA_COADDR] = { .len = sizeof(xfrm_address_t) },
2121 [XFRMA_POLICY_TYPE] = { .len = sizeof(struct xfrm_userpolicy_type)},
2122 [XFRMA_MIGRATE] = { .len = sizeof(struct xfrm_user_migrate) },
13c1d189 2123 [XFRMA_KMADDRESS] = { .len = sizeof(struct xfrm_user_kmaddress) },
6f26b61e 2124 [XFRMA_MARK] = { .len = sizeof(struct xfrm_mark) },
cf5cb79f
TG
2125};
2126
1da177e4 2127static struct xfrm_link {
5424f32e 2128 int (*doit)(struct sk_buff *, struct nlmsghdr *, struct nlattr **);
1da177e4 2129 int (*dump)(struct sk_buff *, struct netlink_callback *);
4c563f76 2130 int (*done)(struct netlink_callback *);
492b558b
TG
2131} xfrm_dispatch[XFRM_NR_MSGTYPES] = {
2132 [XFRM_MSG_NEWSA - XFRM_MSG_BASE] = { .doit = xfrm_add_sa },
2133 [XFRM_MSG_DELSA - XFRM_MSG_BASE] = { .doit = xfrm_del_sa },
2134 [XFRM_MSG_GETSA - XFRM_MSG_BASE] = { .doit = xfrm_get_sa,
4c563f76
TT
2135 .dump = xfrm_dump_sa,
2136 .done = xfrm_dump_sa_done },
492b558b
TG
2137 [XFRM_MSG_NEWPOLICY - XFRM_MSG_BASE] = { .doit = xfrm_add_policy },
2138 [XFRM_MSG_DELPOLICY - XFRM_MSG_BASE] = { .doit = xfrm_get_policy },
2139 [XFRM_MSG_GETPOLICY - XFRM_MSG_BASE] = { .doit = xfrm_get_policy,
4c563f76
TT
2140 .dump = xfrm_dump_policy,
2141 .done = xfrm_dump_policy_done },
492b558b 2142 [XFRM_MSG_ALLOCSPI - XFRM_MSG_BASE] = { .doit = xfrm_alloc_userspi },
980ebd25 2143 [XFRM_MSG_ACQUIRE - XFRM_MSG_BASE] = { .doit = xfrm_add_acquire },
53bc6b4d 2144 [XFRM_MSG_EXPIRE - XFRM_MSG_BASE] = { .doit = xfrm_add_sa_expire },
492b558b
TG
2145 [XFRM_MSG_UPDPOLICY - XFRM_MSG_BASE] = { .doit = xfrm_add_policy },
2146 [XFRM_MSG_UPDSA - XFRM_MSG_BASE] = { .doit = xfrm_add_sa },
6c5c8ca7 2147 [XFRM_MSG_POLEXPIRE - XFRM_MSG_BASE] = { .doit = xfrm_add_pol_expire},
492b558b
TG
2148 [XFRM_MSG_FLUSHSA - XFRM_MSG_BASE] = { .doit = xfrm_flush_sa },
2149 [XFRM_MSG_FLUSHPOLICY - XFRM_MSG_BASE] = { .doit = xfrm_flush_policy },
d51d081d
JHS
2150 [XFRM_MSG_NEWAE - XFRM_MSG_BASE] = { .doit = xfrm_new_ae },
2151 [XFRM_MSG_GETAE - XFRM_MSG_BASE] = { .doit = xfrm_get_ae },
5c79de6e 2152 [XFRM_MSG_MIGRATE - XFRM_MSG_BASE] = { .doit = xfrm_do_migrate },
566ec034 2153 [XFRM_MSG_GETSADINFO - XFRM_MSG_BASE] = { .doit = xfrm_get_sadinfo },
ecfd6b18 2154 [XFRM_MSG_GETSPDINFO - XFRM_MSG_BASE] = { .doit = xfrm_get_spdinfo },
1da177e4
LT
2155};
2156
1d00a4eb 2157static int xfrm_user_rcv_msg(struct sk_buff *skb, struct nlmsghdr *nlh)
1da177e4 2158{
a6483b79 2159 struct net *net = sock_net(skb->sk);
35a7aa08 2160 struct nlattr *attrs[XFRMA_MAX+1];
1da177e4 2161 struct xfrm_link *link;
a7bd9a45 2162 int type, err;
1da177e4 2163
1da177e4 2164 type = nlh->nlmsg_type;
1da177e4 2165 if (type > XFRM_MSG_MAX)
1d00a4eb 2166 return -EINVAL;
1da177e4
LT
2167
2168 type -= XFRM_MSG_BASE;
2169 link = &xfrm_dispatch[type];
2170
2171 /* All operations require privileges, even GET */
1d00a4eb
TG
2172 if (security_netlink_recv(skb, CAP_NET_ADMIN))
2173 return -EPERM;
1da177e4 2174
492b558b
TG
2175 if ((type == (XFRM_MSG_GETSA - XFRM_MSG_BASE) ||
2176 type == (XFRM_MSG_GETPOLICY - XFRM_MSG_BASE)) &&
2177 (nlh->nlmsg_flags & NLM_F_DUMP)) {
1da177e4 2178 if (link->dump == NULL)
1d00a4eb 2179 return -EINVAL;
88fc2c84 2180
a6483b79 2181 return netlink_dump_start(net->xfrm.nlsk, skb, nlh, link->dump, link->done);
1da177e4
LT
2182 }
2183
35a7aa08 2184 err = nlmsg_parse(nlh, xfrm_msg_min[type], attrs, XFRMA_MAX,
cf5cb79f 2185 xfrma_policy);
a7bd9a45
TG
2186 if (err < 0)
2187 return err;
1da177e4
LT
2188
2189 if (link->doit == NULL)
1d00a4eb 2190 return -EINVAL;
1da177e4 2191
5424f32e 2192 return link->doit(skb, nlh, attrs);
1da177e4
LT
2193}
2194
cd40b7d3 2195static void xfrm_netlink_rcv(struct sk_buff *skb)
1da177e4 2196{
cd40b7d3
DL
2197 mutex_lock(&xfrm_cfg_mutex);
2198 netlink_rcv_skb(skb, &xfrm_user_rcv_msg);
2199 mutex_unlock(&xfrm_cfg_mutex);
1da177e4
LT
2200}
2201
7deb2264
TG
2202static inline size_t xfrm_expire_msgsize(void)
2203{
6f26b61e
JHS
2204 return NLMSG_ALIGN(sizeof(struct xfrm_user_expire))
2205 + nla_total_size(sizeof(struct xfrm_mark));
7deb2264
TG
2206}
2207
d51d081d 2208static int build_expire(struct sk_buff *skb, struct xfrm_state *x, struct km_event *c)
1da177e4
LT
2209{
2210 struct xfrm_user_expire *ue;
2211 struct nlmsghdr *nlh;
1da177e4 2212
79b8b7f4
TG
2213 nlh = nlmsg_put(skb, c->pid, 0, XFRM_MSG_EXPIRE, sizeof(*ue), 0);
2214 if (nlh == NULL)
2215 return -EMSGSIZE;
1da177e4 2216
7b67c857 2217 ue = nlmsg_data(nlh);
1da177e4 2218 copy_to_user_state(x, &ue->state);
d51d081d 2219 ue->hard = (c->data.hard != 0) ? 1 : 0;
1da177e4 2220
6f26b61e
JHS
2221 if (xfrm_mark_put(skb, &x->mark))
2222 goto nla_put_failure;
2223
9825069d 2224 return nlmsg_end(skb, nlh);
6f26b61e
JHS
2225
2226nla_put_failure:
2227 return -EMSGSIZE;
1da177e4
LT
2228}
2229
26b15dad 2230static int xfrm_exp_state_notify(struct xfrm_state *x, struct km_event *c)
1da177e4 2231{
fc34acd3 2232 struct net *net = xs_net(x);
1da177e4
LT
2233 struct sk_buff *skb;
2234
7deb2264 2235 skb = nlmsg_new(xfrm_expire_msgsize(), GFP_ATOMIC);
1da177e4
LT
2236 if (skb == NULL)
2237 return -ENOMEM;
2238
6f26b61e
JHS
2239 if (build_expire(skb, x, c) < 0) {
2240 kfree_skb(skb);
2241 return -EMSGSIZE;
2242 }
1da177e4 2243
a6483b79 2244 return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_EXPIRE, GFP_ATOMIC);
1da177e4
LT
2245}
2246
d51d081d
JHS
2247static int xfrm_aevent_state_notify(struct xfrm_state *x, struct km_event *c)
2248{
fc34acd3 2249 struct net *net = xs_net(x);
d51d081d 2250 struct sk_buff *skb;
d51d081d 2251
7deb2264 2252 skb = nlmsg_new(xfrm_aevent_msgsize(), GFP_ATOMIC);
d51d081d
JHS
2253 if (skb == NULL)
2254 return -ENOMEM;
2255
2256 if (build_aevent(skb, x, c) < 0)
2257 BUG();
2258
a6483b79 2259 return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_AEVENTS, GFP_ATOMIC);
d51d081d
JHS
2260}
2261
26b15dad
JHS
2262static int xfrm_notify_sa_flush(struct km_event *c)
2263{
7067802e 2264 struct net *net = c->net;
26b15dad
JHS
2265 struct xfrm_usersa_flush *p;
2266 struct nlmsghdr *nlh;
2267 struct sk_buff *skb;
7deb2264 2268 int len = NLMSG_ALIGN(sizeof(struct xfrm_usersa_flush));
26b15dad 2269
7deb2264 2270 skb = nlmsg_new(len, GFP_ATOMIC);
26b15dad
JHS
2271 if (skb == NULL)
2272 return -ENOMEM;
26b15dad 2273
79b8b7f4
TG
2274 nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_FLUSHSA, sizeof(*p), 0);
2275 if (nlh == NULL) {
2276 kfree_skb(skb);
2277 return -EMSGSIZE;
2278 }
26b15dad 2279
7b67c857 2280 p = nlmsg_data(nlh);
bf08867f 2281 p->proto = c->data.proto;
26b15dad 2282
9825069d 2283 nlmsg_end(skb, nlh);
26b15dad 2284
a6483b79 2285 return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_SA, GFP_ATOMIC);
26b15dad
JHS
2286}
2287
7deb2264 2288static inline size_t xfrm_sa_len(struct xfrm_state *x)
26b15dad 2289{
7deb2264 2290 size_t l = 0;
1a6509d9
HX
2291 if (x->aead)
2292 l += nla_total_size(aead_len(x->aead));
4447bb33
MW
2293 if (x->aalg) {
2294 l += nla_total_size(sizeof(struct xfrm_algo) +
2295 (x->aalg->alg_key_len + 7) / 8);
2296 l += nla_total_size(xfrm_alg_auth_len(x->aalg));
2297 }
26b15dad 2298 if (x->ealg)
0f99be0d 2299 l += nla_total_size(xfrm_alg_len(x->ealg));
26b15dad 2300 if (x->calg)
7deb2264 2301 l += nla_total_size(sizeof(*x->calg));
26b15dad 2302 if (x->encap)
7deb2264 2303 l += nla_total_size(sizeof(*x->encap));
68325d3b
HX
2304 if (x->security)
2305 l += nla_total_size(sizeof(struct xfrm_user_sec_ctx) +
2306 x->security->ctx_len);
2307 if (x->coaddr)
2308 l += nla_total_size(sizeof(*x->coaddr));
2309
d26f3984
HX
2310 /* Must count x->lastused as it may become non-zero behind our back. */
2311 l += nla_total_size(sizeof(u64));
26b15dad
JHS
2312
2313 return l;
2314}
2315
2316static int xfrm_notify_sa(struct xfrm_state *x, struct km_event *c)
2317{
fc34acd3 2318 struct net *net = xs_net(x);
26b15dad 2319 struct xfrm_usersa_info *p;
0603eac0 2320 struct xfrm_usersa_id *id;
26b15dad
JHS
2321 struct nlmsghdr *nlh;
2322 struct sk_buff *skb;
26b15dad 2323 int len = xfrm_sa_len(x);
0603eac0
HX
2324 int headlen;
2325
2326 headlen = sizeof(*p);
2327 if (c->event == XFRM_MSG_DELSA) {
7deb2264 2328 len += nla_total_size(headlen);
0603eac0 2329 headlen = sizeof(*id);
6f26b61e 2330 len += nla_total_size(sizeof(struct xfrm_mark));
0603eac0 2331 }
7deb2264 2332 len += NLMSG_ALIGN(headlen);
26b15dad 2333
7deb2264 2334 skb = nlmsg_new(len, GFP_ATOMIC);
26b15dad
JHS
2335 if (skb == NULL)
2336 return -ENOMEM;
26b15dad 2337
79b8b7f4
TG
2338 nlh = nlmsg_put(skb, c->pid, c->seq, c->event, headlen, 0);
2339 if (nlh == NULL)
c0144bea 2340 goto nla_put_failure;
26b15dad 2341
7b67c857 2342 p = nlmsg_data(nlh);
0603eac0 2343 if (c->event == XFRM_MSG_DELSA) {
c0144bea
TG
2344 struct nlattr *attr;
2345
7b67c857 2346 id = nlmsg_data(nlh);
0603eac0
HX
2347 memcpy(&id->daddr, &x->id.daddr, sizeof(id->daddr));
2348 id->spi = x->id.spi;
2349 id->family = x->props.family;
2350 id->proto = x->id.proto;
2351
c0144bea
TG
2352 attr = nla_reserve(skb, XFRMA_SA, sizeof(*p));
2353 if (attr == NULL)
2354 goto nla_put_failure;
2355
2356 p = nla_data(attr);
0603eac0
HX
2357 }
2358
68325d3b
HX
2359 if (copy_to_user_state_extra(x, p, skb))
2360 goto nla_put_failure;
26b15dad 2361
9825069d 2362 nlmsg_end(skb, nlh);
26b15dad 2363
a6483b79 2364 return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_SA, GFP_ATOMIC);
26b15dad 2365
c0144bea 2366nla_put_failure:
68325d3b
HX
2367 /* Somebody screwed up with xfrm_sa_len! */
2368 WARN_ON(1);
26b15dad
JHS
2369 kfree_skb(skb);
2370 return -1;
2371}
2372
2373static int xfrm_send_state_notify(struct xfrm_state *x, struct km_event *c)
2374{
2375
2376 switch (c->event) {
f60f6b8f 2377 case XFRM_MSG_EXPIRE:
26b15dad 2378 return xfrm_exp_state_notify(x, c);
d51d081d
JHS
2379 case XFRM_MSG_NEWAE:
2380 return xfrm_aevent_state_notify(x, c);
f60f6b8f
HX
2381 case XFRM_MSG_DELSA:
2382 case XFRM_MSG_UPDSA:
2383 case XFRM_MSG_NEWSA:
26b15dad 2384 return xfrm_notify_sa(x, c);
f60f6b8f 2385 case XFRM_MSG_FLUSHSA:
26b15dad
JHS
2386 return xfrm_notify_sa_flush(c);
2387 default:
62db5cfd 2388 printk(KERN_NOTICE "xfrm_user: Unknown SA event %d\n",
2389 c->event);
2390 break;
26b15dad
JHS
2391 }
2392
2393 return 0;
2394
2395}
2396
7deb2264
TG
2397static inline size_t xfrm_acquire_msgsize(struct xfrm_state *x,
2398 struct xfrm_policy *xp)
2399{
2400 return NLMSG_ALIGN(sizeof(struct xfrm_user_acquire))
2401 + nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr)
6f26b61e 2402 + nla_total_size(sizeof(struct xfrm_mark))
7deb2264
TG
2403 + nla_total_size(xfrm_user_sec_ctx_size(x->security))
2404 + userpolicy_type_attrsize();
2405}
2406
1da177e4
LT
2407static int build_acquire(struct sk_buff *skb, struct xfrm_state *x,
2408 struct xfrm_tmpl *xt, struct xfrm_policy *xp,
2409 int dir)
2410{
2411 struct xfrm_user_acquire *ua;
2412 struct nlmsghdr *nlh;
1da177e4
LT
2413 __u32 seq = xfrm_get_acqseq();
2414
79b8b7f4
TG
2415 nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_ACQUIRE, sizeof(*ua), 0);
2416 if (nlh == NULL)
2417 return -EMSGSIZE;
1da177e4 2418
7b67c857 2419 ua = nlmsg_data(nlh);
1da177e4
LT
2420 memcpy(&ua->id, &x->id, sizeof(ua->id));
2421 memcpy(&ua->saddr, &x->props.saddr, sizeof(ua->saddr));
2422 memcpy(&ua->sel, &x->sel, sizeof(ua->sel));
2423 copy_to_user_policy(xp, &ua->policy, dir);
2424 ua->aalgos = xt->aalgos;
2425 ua->ealgos = xt->ealgos;
2426 ua->calgos = xt->calgos;
2427 ua->seq = x->km.seq = seq;
2428
2429 if (copy_to_user_tmpl(xp, skb) < 0)
2430 goto nlmsg_failure;
0d681623 2431 if (copy_to_user_state_sec_ctx(x, skb))
df71837d 2432 goto nlmsg_failure;
1459bb36 2433 if (copy_to_user_policy_type(xp->type, skb) < 0)
f7b6983f 2434 goto nlmsg_failure;
295fae56
JHS
2435 if (xfrm_mark_put(skb, &xp->mark))
2436 goto nla_put_failure;
1da177e4 2437
9825069d 2438 return nlmsg_end(skb, nlh);
1da177e4 2439
295fae56 2440nla_put_failure:
1da177e4 2441nlmsg_failure:
9825069d
TG
2442 nlmsg_cancel(skb, nlh);
2443 return -EMSGSIZE;
1da177e4
LT
2444}
2445
2446static int xfrm_send_acquire(struct xfrm_state *x, struct xfrm_tmpl *xt,
2447 struct xfrm_policy *xp, int dir)
2448{
a6483b79 2449 struct net *net = xs_net(x);
1da177e4 2450 struct sk_buff *skb;
1da177e4 2451
7deb2264 2452 skb = nlmsg_new(xfrm_acquire_msgsize(x, xp), GFP_ATOMIC);
1da177e4
LT
2453 if (skb == NULL)
2454 return -ENOMEM;
2455
2456 if (build_acquire(skb, x, xt, xp, dir) < 0)
2457 BUG();
2458
a6483b79 2459 return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_ACQUIRE, GFP_ATOMIC);
1da177e4
LT
2460}
2461
2462/* User gives us xfrm_user_policy_info followed by an array of 0
2463 * or more templates.
2464 */
cb969f07 2465static struct xfrm_policy *xfrm_compile_policy(struct sock *sk, int opt,
1da177e4
LT
2466 u8 *data, int len, int *dir)
2467{
fc34acd3 2468 struct net *net = sock_net(sk);
1da177e4
LT
2469 struct xfrm_userpolicy_info *p = (struct xfrm_userpolicy_info *)data;
2470 struct xfrm_user_tmpl *ut = (struct xfrm_user_tmpl *) (p + 1);
2471 struct xfrm_policy *xp;
2472 int nr;
2473
cb969f07 2474 switch (sk->sk_family) {
1da177e4
LT
2475 case AF_INET:
2476 if (opt != IP_XFRM_POLICY) {
2477 *dir = -EOPNOTSUPP;
2478 return NULL;
2479 }
2480 break;
2481#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)
2482 case AF_INET6:
2483 if (opt != IPV6_XFRM_POLICY) {
2484 *dir = -EOPNOTSUPP;
2485 return NULL;
2486 }
2487 break;
2488#endif
2489 default:
2490 *dir = -EINVAL;
2491 return NULL;
2492 }
2493
2494 *dir = -EINVAL;
2495
2496 if (len < sizeof(*p) ||
2497 verify_newpolicy_info(p))
2498 return NULL;
2499
2500 nr = ((len - sizeof(*p)) / sizeof(*ut));
b4ad86bf 2501 if (validate_tmpl(nr, ut, p->sel.family))
1da177e4
LT
2502 return NULL;
2503
a4f1bac6
HX
2504 if (p->dir > XFRM_POLICY_OUT)
2505 return NULL;
2506
2f09a4d5 2507 xp = xfrm_policy_alloc(net, GFP_ATOMIC);
1da177e4
LT
2508 if (xp == NULL) {
2509 *dir = -ENOBUFS;
2510 return NULL;
2511 }
2512
2513 copy_from_user_policy(xp, p);
f7b6983f 2514 xp->type = XFRM_POLICY_TYPE_MAIN;
1da177e4
LT
2515 copy_templates(xp, ut, nr);
2516
2517 *dir = p->dir;
2518
2519 return xp;
2520}
2521
7deb2264
TG
2522static inline size_t xfrm_polexpire_msgsize(struct xfrm_policy *xp)
2523{
2524 return NLMSG_ALIGN(sizeof(struct xfrm_user_polexpire))
2525 + nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr)
2526 + nla_total_size(xfrm_user_sec_ctx_size(xp->security))
295fae56 2527 + nla_total_size(sizeof(struct xfrm_mark))
7deb2264
TG
2528 + userpolicy_type_attrsize();
2529}
2530
1da177e4 2531static int build_polexpire(struct sk_buff *skb, struct xfrm_policy *xp,
d51d081d 2532 int dir, struct km_event *c)
1da177e4
LT
2533{
2534 struct xfrm_user_polexpire *upe;
2535 struct nlmsghdr *nlh;
d51d081d 2536 int hard = c->data.hard;
1da177e4 2537
79b8b7f4
TG
2538 nlh = nlmsg_put(skb, c->pid, 0, XFRM_MSG_POLEXPIRE, sizeof(*upe), 0);
2539 if (nlh == NULL)
2540 return -EMSGSIZE;
1da177e4 2541
7b67c857 2542 upe = nlmsg_data(nlh);
1da177e4
LT
2543 copy_to_user_policy(xp, &upe->pol, dir);
2544 if (copy_to_user_tmpl(xp, skb) < 0)
2545 goto nlmsg_failure;
df71837d
TJ
2546 if (copy_to_user_sec_ctx(xp, skb))
2547 goto nlmsg_failure;
1459bb36 2548 if (copy_to_user_policy_type(xp->type, skb) < 0)
f7b6983f 2549 goto nlmsg_failure;
295fae56
JHS
2550 if (xfrm_mark_put(skb, &xp->mark))
2551 goto nla_put_failure;
1da177e4
LT
2552 upe->hard = !!hard;
2553
9825069d 2554 return nlmsg_end(skb, nlh);
1da177e4 2555
295fae56 2556nla_put_failure:
1da177e4 2557nlmsg_failure:
9825069d
TG
2558 nlmsg_cancel(skb, nlh);
2559 return -EMSGSIZE;
1da177e4
LT
2560}
2561
26b15dad 2562static int xfrm_exp_policy_notify(struct xfrm_policy *xp, int dir, struct km_event *c)
1da177e4 2563{
fc34acd3 2564 struct net *net = xp_net(xp);
1da177e4 2565 struct sk_buff *skb;
1da177e4 2566
7deb2264 2567 skb = nlmsg_new(xfrm_polexpire_msgsize(xp), GFP_ATOMIC);
1da177e4
LT
2568 if (skb == NULL)
2569 return -ENOMEM;
2570
d51d081d 2571 if (build_polexpire(skb, xp, dir, c) < 0)
1da177e4
LT
2572 BUG();
2573
a6483b79 2574 return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_EXPIRE, GFP_ATOMIC);
1da177e4
LT
2575}
2576
26b15dad
JHS
2577static int xfrm_notify_policy(struct xfrm_policy *xp, int dir, struct km_event *c)
2578{
fc34acd3 2579 struct net *net = xp_net(xp);
26b15dad 2580 struct xfrm_userpolicy_info *p;
0603eac0 2581 struct xfrm_userpolicy_id *id;
26b15dad
JHS
2582 struct nlmsghdr *nlh;
2583 struct sk_buff *skb;
7deb2264 2584 int len = nla_total_size(sizeof(struct xfrm_user_tmpl) * xp->xfrm_nr);
0603eac0
HX
2585 int headlen;
2586
2587 headlen = sizeof(*p);
2588 if (c->event == XFRM_MSG_DELPOLICY) {
7deb2264 2589 len += nla_total_size(headlen);
0603eac0
HX
2590 headlen = sizeof(*id);
2591 }
cfbfd45a 2592 len += userpolicy_type_attrsize();
295fae56 2593 len += nla_total_size(sizeof(struct xfrm_mark));
7deb2264 2594 len += NLMSG_ALIGN(headlen);
26b15dad 2595
7deb2264 2596 skb = nlmsg_new(len, GFP_ATOMIC);
26b15dad
JHS
2597 if (skb == NULL)
2598 return -ENOMEM;
26b15dad 2599
79b8b7f4
TG
2600 nlh = nlmsg_put(skb, c->pid, c->seq, c->event, headlen, 0);
2601 if (nlh == NULL)
2602 goto nlmsg_failure;
26b15dad 2603
7b67c857 2604 p = nlmsg_data(nlh);
0603eac0 2605 if (c->event == XFRM_MSG_DELPOLICY) {
c0144bea
TG
2606 struct nlattr *attr;
2607
7b67c857 2608 id = nlmsg_data(nlh);
0603eac0
HX
2609 memset(id, 0, sizeof(*id));
2610 id->dir = dir;
2611 if (c->data.byid)
2612 id->index = xp->index;
2613 else
2614 memcpy(&id->sel, &xp->selector, sizeof(id->sel));
2615
c0144bea
TG
2616 attr = nla_reserve(skb, XFRMA_POLICY, sizeof(*p));
2617 if (attr == NULL)
2618 goto nlmsg_failure;
2619
2620 p = nla_data(attr);
0603eac0 2621 }
26b15dad 2622
26b15dad
JHS
2623 copy_to_user_policy(xp, p, dir);
2624 if (copy_to_user_tmpl(xp, skb) < 0)
2625 goto nlmsg_failure;
1459bb36 2626 if (copy_to_user_policy_type(xp->type, skb) < 0)
f7b6983f 2627 goto nlmsg_failure;
26b15dad 2628
295fae56
JHS
2629 if (xfrm_mark_put(skb, &xp->mark))
2630 goto nla_put_failure;
2631
9825069d 2632 nlmsg_end(skb, nlh);
26b15dad 2633
a6483b79 2634 return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_POLICY, GFP_ATOMIC);
26b15dad 2635
295fae56 2636nla_put_failure:
26b15dad
JHS
2637nlmsg_failure:
2638 kfree_skb(skb);
2639 return -1;
2640}
2641
2642static int xfrm_notify_policy_flush(struct km_event *c)
2643{
7067802e 2644 struct net *net = c->net;
26b15dad
JHS
2645 struct nlmsghdr *nlh;
2646 struct sk_buff *skb;
26b15dad 2647
7deb2264 2648 skb = nlmsg_new(userpolicy_type_attrsize(), GFP_ATOMIC);
26b15dad
JHS
2649 if (skb == NULL)
2650 return -ENOMEM;
26b15dad 2651
79b8b7f4
TG
2652 nlh = nlmsg_put(skb, c->pid, c->seq, XFRM_MSG_FLUSHPOLICY, 0, 0);
2653 if (nlh == NULL)
2654 goto nlmsg_failure;
0c51f53c
JHS
2655 if (copy_to_user_policy_type(c->data.type, skb) < 0)
2656 goto nlmsg_failure;
26b15dad 2657
9825069d 2658 nlmsg_end(skb, nlh);
26b15dad 2659
a6483b79 2660 return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_POLICY, GFP_ATOMIC);
26b15dad
JHS
2661
2662nlmsg_failure:
2663 kfree_skb(skb);
2664 return -1;
2665}
2666
2667static int xfrm_send_policy_notify(struct xfrm_policy *xp, int dir, struct km_event *c)
2668{
2669
2670 switch (c->event) {
f60f6b8f
HX
2671 case XFRM_MSG_NEWPOLICY:
2672 case XFRM_MSG_UPDPOLICY:
2673 case XFRM_MSG_DELPOLICY:
26b15dad 2674 return xfrm_notify_policy(xp, dir, c);
f60f6b8f 2675 case XFRM_MSG_FLUSHPOLICY:
26b15dad 2676 return xfrm_notify_policy_flush(c);
f60f6b8f 2677 case XFRM_MSG_POLEXPIRE:
26b15dad
JHS
2678 return xfrm_exp_policy_notify(xp, dir, c);
2679 default:
62db5cfd 2680 printk(KERN_NOTICE "xfrm_user: Unknown Policy event %d\n",
2681 c->event);
26b15dad
JHS
2682 }
2683
2684 return 0;
2685
2686}
2687
7deb2264
TG
2688static inline size_t xfrm_report_msgsize(void)
2689{
2690 return NLMSG_ALIGN(sizeof(struct xfrm_user_report));
2691}
2692
97a64b45
MN
2693static int build_report(struct sk_buff *skb, u8 proto,
2694 struct xfrm_selector *sel, xfrm_address_t *addr)
2695{
2696 struct xfrm_user_report *ur;
2697 struct nlmsghdr *nlh;
97a64b45 2698
79b8b7f4
TG
2699 nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_REPORT, sizeof(*ur), 0);
2700 if (nlh == NULL)
2701 return -EMSGSIZE;
97a64b45 2702
7b67c857 2703 ur = nlmsg_data(nlh);
97a64b45
MN
2704 ur->proto = proto;
2705 memcpy(&ur->sel, sel, sizeof(ur->sel));
2706
2707 if (addr)
c0144bea 2708 NLA_PUT(skb, XFRMA_COADDR, sizeof(*addr), addr);
97a64b45 2709
9825069d 2710 return nlmsg_end(skb, nlh);
97a64b45 2711
c0144bea 2712nla_put_failure:
9825069d
TG
2713 nlmsg_cancel(skb, nlh);
2714 return -EMSGSIZE;
97a64b45
MN
2715}
2716
db983c11
AD
2717static int xfrm_send_report(struct net *net, u8 proto,
2718 struct xfrm_selector *sel, xfrm_address_t *addr)
97a64b45
MN
2719{
2720 struct sk_buff *skb;
97a64b45 2721
7deb2264 2722 skb = nlmsg_new(xfrm_report_msgsize(), GFP_ATOMIC);
97a64b45
MN
2723 if (skb == NULL)
2724 return -ENOMEM;
2725
2726 if (build_report(skb, proto, sel, addr) < 0)
2727 BUG();
2728
a6483b79 2729 return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_REPORT, GFP_ATOMIC);
97a64b45
MN
2730}
2731
3a2dfbe8
MW
2732static inline size_t xfrm_mapping_msgsize(void)
2733{
2734 return NLMSG_ALIGN(sizeof(struct xfrm_user_mapping));
2735}
2736
2737static int build_mapping(struct sk_buff *skb, struct xfrm_state *x,
2738 xfrm_address_t *new_saddr, __be16 new_sport)
2739{
2740 struct xfrm_user_mapping *um;
2741 struct nlmsghdr *nlh;
2742
2743 nlh = nlmsg_put(skb, 0, 0, XFRM_MSG_MAPPING, sizeof(*um), 0);
2744 if (nlh == NULL)
2745 return -EMSGSIZE;
2746
2747 um = nlmsg_data(nlh);
2748
2749 memcpy(&um->id.daddr, &x->id.daddr, sizeof(um->id.daddr));
2750 um->id.spi = x->id.spi;
2751 um->id.family = x->props.family;
2752 um->id.proto = x->id.proto;
2753 memcpy(&um->new_saddr, new_saddr, sizeof(um->new_saddr));
2754 memcpy(&um->old_saddr, &x->props.saddr, sizeof(um->old_saddr));
2755 um->new_sport = new_sport;
2756 um->old_sport = x->encap->encap_sport;
2757 um->reqid = x->props.reqid;
2758
2759 return nlmsg_end(skb, nlh);
2760}
2761
2762static int xfrm_send_mapping(struct xfrm_state *x, xfrm_address_t *ipaddr,
2763 __be16 sport)
2764{
a6483b79 2765 struct net *net = xs_net(x);
3a2dfbe8
MW
2766 struct sk_buff *skb;
2767
2768 if (x->id.proto != IPPROTO_ESP)
2769 return -EINVAL;
2770
2771 if (!x->encap)
2772 return -EINVAL;
2773
2774 skb = nlmsg_new(xfrm_mapping_msgsize(), GFP_ATOMIC);
2775 if (skb == NULL)
2776 return -ENOMEM;
2777
2778 if (build_mapping(skb, x, ipaddr, sport) < 0)
2779 BUG();
2780
a6483b79 2781 return nlmsg_multicast(net->xfrm.nlsk, skb, 0, XFRMNLGRP_MAPPING, GFP_ATOMIC);
3a2dfbe8
MW
2782}
2783
1da177e4
LT
2784static struct xfrm_mgr netlink_mgr = {
2785 .id = "netlink",
2786 .notify = xfrm_send_state_notify,
2787 .acquire = xfrm_send_acquire,
2788 .compile_policy = xfrm_compile_policy,
2789 .notify_policy = xfrm_send_policy_notify,
97a64b45 2790 .report = xfrm_send_report,
5c79de6e 2791 .migrate = xfrm_send_migrate,
3a2dfbe8 2792 .new_mapping = xfrm_send_mapping,
1da177e4
LT
2793};
2794
a6483b79 2795static int __net_init xfrm_user_net_init(struct net *net)
1da177e4 2796{
be33690d
PM
2797 struct sock *nlsk;
2798
a6483b79 2799 nlsk = netlink_kernel_create(net, NETLINK_XFRM, XFRMNLGRP_MAX,
af65bdfc 2800 xfrm_netlink_rcv, NULL, THIS_MODULE);
be33690d 2801 if (nlsk == NULL)
1da177e4 2802 return -ENOMEM;
d79d792e 2803 net->xfrm.nlsk_stash = nlsk; /* Don't set to NULL */
a6483b79 2804 rcu_assign_pointer(net->xfrm.nlsk, nlsk);
1da177e4
LT
2805 return 0;
2806}
2807
d79d792e 2808static void __net_exit xfrm_user_net_exit(struct list_head *net_exit_list)
1da177e4 2809{
d79d792e
EB
2810 struct net *net;
2811 list_for_each_entry(net, net_exit_list, exit_list)
2812 rcu_assign_pointer(net->xfrm.nlsk, NULL);
2813 synchronize_net();
2814 list_for_each_entry(net, net_exit_list, exit_list)
2815 netlink_kernel_release(net->xfrm.nlsk_stash);
1da177e4
LT
2816}
2817
a6483b79 2818static struct pernet_operations xfrm_user_net_ops = {
d79d792e
EB
2819 .init = xfrm_user_net_init,
2820 .exit_batch = xfrm_user_net_exit,
a6483b79
AD
2821};
2822
2823static int __init xfrm_user_init(void)
2824{
2825 int rv;
2826
2827 printk(KERN_INFO "Initializing XFRM netlink socket\n");
2828
2829 rv = register_pernet_subsys(&xfrm_user_net_ops);
2830 if (rv < 0)
2831 return rv;
2832 rv = xfrm_register_km(&netlink_mgr);
2833 if (rv < 0)
2834 unregister_pernet_subsys(&xfrm_user_net_ops);
2835 return rv;
2836}
2837
2838static void __exit xfrm_user_exit(void)
2839{
2840 xfrm_unregister_km(&netlink_mgr);
2841 unregister_pernet_subsys(&xfrm_user_net_ops);
2842}
2843
1da177e4
LT
2844module_init(xfrm_user_init);
2845module_exit(xfrm_user_exit);
2846MODULE_LICENSE("GPL");
4fdb3bb7 2847MODULE_ALIAS_NET_PF_PROTO(PF_NETLINK, NETLINK_XFRM);
f8cd5488 2848