aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
-rw-r--r--include/net/xfrm.h24
-rw-r--r--net/xfrm/Makefile2
-rw-r--r--net/xfrm/xfrm_input.c5
-rw-r--r--net/xfrm/xfrm_output.c15
-rw-r--r--net/xfrm/xfrm_replay.c141
-rw-r--r--net/xfrm/xfrm_state.c111
-rw-r--r--net/xfrm/xfrm_user.c4
7 files changed, 174 insertions, 128 deletions
diff --git a/include/net/xfrm.h b/include/net/xfrm.h
index cb6d9b3fc55..41def092b82 100644
--- a/include/net/xfrm.h
+++ b/include/net/xfrm.h
@@ -192,6 +192,9 @@ struct xfrm_state {
192 struct xfrm_replay_state preplay; 192 struct xfrm_replay_state preplay;
193 struct xfrm_replay_state_esn *preplay_esn; 193 struct xfrm_replay_state_esn *preplay_esn;
194 194
195 /* The functions for replay detection. */
196 struct xfrm_replay *repl;
197
195 /* internal flag that only holds state for delayed aevent at the 198 /* internal flag that only holds state for delayed aevent at the
196 * moment 199 * moment
197 */ 200 */
@@ -261,6 +264,15 @@ struct km_event {
261 struct net *net; 264 struct net *net;
262}; 265};
263 266
267struct xfrm_replay {
268 void (*advance)(struct xfrm_state *x, __be32 net_seq);
269 int (*check)(struct xfrm_state *x,
270 struct sk_buff *skb,
271 __be32 net_seq);
272 void (*notify)(struct xfrm_state *x, int event);
273 int (*overflow)(struct xfrm_state *x, struct sk_buff *skb);
274};
275
264struct net_device; 276struct net_device;
265struct xfrm_type; 277struct xfrm_type;
266struct xfrm_dst; 278struct xfrm_dst;
@@ -693,6 +705,8 @@ extern void xfrm_audit_state_delete(struct xfrm_state *x, int result,
693 u32 auid, u32 ses, u32 secid); 705 u32 auid, u32 ses, u32 secid);
694extern void xfrm_audit_state_replay_overflow(struct xfrm_state *x, 706extern void xfrm_audit_state_replay_overflow(struct xfrm_state *x,
695 struct sk_buff *skb); 707 struct sk_buff *skb);
708extern void xfrm_audit_state_replay(struct xfrm_state *x,
709 struct sk_buff *skb, __be32 net_seq);
696extern void xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family); 710extern void xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family);
697extern void xfrm_audit_state_notfound(struct sk_buff *skb, u16 family, 711extern void xfrm_audit_state_notfound(struct sk_buff *skb, u16 family,
698 __be32 net_spi, __be32 net_seq); 712 __be32 net_spi, __be32 net_seq);
@@ -725,6 +739,11 @@ static inline void xfrm_audit_state_replay_overflow(struct xfrm_state *x,
725{ 739{
726} 740}
727 741
742static inline void xfrm_audit_state_replay(struct xfrm_state *x,
743 struct sk_buff *skb, __be32 net_seq)
744{
745}
746
728static inline void xfrm_audit_state_notfound_simple(struct sk_buff *skb, 747static inline void xfrm_audit_state_notfound_simple(struct sk_buff *skb,
729 u16 family) 748 u16 family)
730{ 749{
@@ -1408,10 +1427,7 @@ extern int xfrm_state_delete(struct xfrm_state *x);
1408extern int xfrm_state_flush(struct net *net, u8 proto, struct xfrm_audit *audit_info); 1427extern int xfrm_state_flush(struct net *net, u8 proto, struct xfrm_audit *audit_info);
1409extern void xfrm_sad_getinfo(struct net *net, struct xfrmk_sadinfo *si); 1428extern void xfrm_sad_getinfo(struct net *net, struct xfrmk_sadinfo *si);
1410extern void xfrm_spd_getinfo(struct net *net, struct xfrmk_spdinfo *si); 1429extern void xfrm_spd_getinfo(struct net *net, struct xfrmk_spdinfo *si);
1411extern int xfrm_replay_check(struct xfrm_state *x, 1430extern int xfrm_init_replay(struct xfrm_state *x);
1412 struct sk_buff *skb, __be32 seq);
1413extern void xfrm_replay_advance(struct xfrm_state *x, __be32 seq);
1414extern void xfrm_replay_notify(struct xfrm_state *x, int event);
1415extern int xfrm_state_mtu(struct xfrm_state *x, int mtu); 1431extern int xfrm_state_mtu(struct xfrm_state *x, int mtu);
1416extern int xfrm_init_state(struct xfrm_state *x); 1432extern int xfrm_init_state(struct xfrm_state *x);
1417extern int xfrm_prepare_input(struct xfrm_state *x, struct sk_buff *skb); 1433extern int xfrm_prepare_input(struct xfrm_state *x, struct sk_buff *skb);
diff --git a/net/xfrm/Makefile b/net/xfrm/Makefile
index c631047e1b2..aa429eefe91 100644
--- a/net/xfrm/Makefile
+++ b/net/xfrm/Makefile
@@ -4,7 +4,7 @@
4 4
5obj-$(CONFIG_XFRM) := xfrm_policy.o xfrm_state.o xfrm_hash.o \ 5obj-$(CONFIG_XFRM) := xfrm_policy.o xfrm_state.o xfrm_hash.o \
6 xfrm_input.o xfrm_output.o xfrm_algo.o \ 6 xfrm_input.o xfrm_output.o xfrm_algo.o \
7 xfrm_sysctl.o 7 xfrm_sysctl.o xfrm_replay.o
8obj-$(CONFIG_XFRM_STATISTICS) += xfrm_proc.o 8obj-$(CONFIG_XFRM_STATISTICS) += xfrm_proc.o
9obj-$(CONFIG_XFRM_USER) += xfrm_user.o 9obj-$(CONFIG_XFRM_USER) += xfrm_user.o
10obj-$(CONFIG_XFRM_IPCOMP) += xfrm_ipcomp.o 10obj-$(CONFIG_XFRM_IPCOMP) += xfrm_ipcomp.o
diff --git a/net/xfrm/xfrm_input.c b/net/xfrm/xfrm_input.c
index b173b7fdc43..55d5f5c3d11 100644
--- a/net/xfrm/xfrm_input.c
+++ b/net/xfrm/xfrm_input.c
@@ -172,7 +172,7 @@ int xfrm_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type)
172 goto drop_unlock; 172 goto drop_unlock;
173 } 173 }
174 174
175 if (x->props.replay_window && xfrm_replay_check(x, skb, seq)) { 175 if (x->props.replay_window && x->repl->check(x, skb, seq)) {
176 XFRM_INC_STATS(net, LINUX_MIB_XFRMINSTATESEQERROR); 176 XFRM_INC_STATS(net, LINUX_MIB_XFRMINSTATESEQERROR);
177 goto drop_unlock; 177 goto drop_unlock;
178 } 178 }
@@ -206,8 +206,7 @@ resume:
206 /* only the first xfrm gets the encap type */ 206 /* only the first xfrm gets the encap type */
207 encap_type = 0; 207 encap_type = 0;
208 208
209 if (x->props.replay_window) 209 x->repl->advance(x, seq);
210 xfrm_replay_advance(x, seq);
211 210
212 x->curlft.bytes += skb->len; 211 x->curlft.bytes += skb->len;
213 x->curlft.packets++; 212 x->curlft.packets++;
diff --git a/net/xfrm/xfrm_output.c b/net/xfrm/xfrm_output.c
index 4b63776a026..1aba03f449c 100644
--- a/net/xfrm/xfrm_output.c
+++ b/net/xfrm/xfrm_output.c
@@ -67,17 +67,10 @@ static int xfrm_output_one(struct sk_buff *skb, int err)
67 goto error; 67 goto error;
68 } 68 }
69 69
70 if (x->type->flags & XFRM_TYPE_REPLAY_PROT) { 70 err = x->repl->overflow(x, skb);
71 XFRM_SKB_CB(skb)->seq.output.low = ++x->replay.oseq; 71 if (err) {
72 if (unlikely(x->replay.oseq == 0)) { 72 XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTSTATESEQERROR);
73 XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTSTATESEQERROR); 73 goto error;
74 x->replay.oseq--;
75 xfrm_audit_state_replay_overflow(x, skb);
76 err = -EOVERFLOW;
77 goto error;
78 }
79 if (xfrm_aevent_is_on(net))
80 xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
81 } 74 }
82 75
83 x->curlft.bytes += skb->len; 76 x->curlft.bytes += skb->len;
diff --git a/net/xfrm/xfrm_replay.c b/net/xfrm/xfrm_replay.c
new file mode 100644
index 00000000000..42d68f32487
--- /dev/null
+++ b/net/xfrm/xfrm_replay.c
@@ -0,0 +1,141 @@
1/*
2 * xfrm_replay.c - xfrm replay detection, derived from xfrm_state.c.
3 */
4
5#include <net/xfrm.h>
6
7static void xfrm_replay_notify(struct xfrm_state *x, int event)
8{
9 struct km_event c;
10 /* we send notify messages in case
11 * 1. we updated on of the sequence numbers, and the seqno difference
12 * is at least x->replay_maxdiff, in this case we also update the
13 * timeout of our timer function
14 * 2. if x->replay_maxage has elapsed since last update,
15 * and there were changes
16 *
17 * The state structure must be locked!
18 */
19
20 switch (event) {
21 case XFRM_REPLAY_UPDATE:
22 if (x->replay_maxdiff &&
23 (x->replay.seq - x->preplay.seq < x->replay_maxdiff) &&
24 (x->replay.oseq - x->preplay.oseq < x->replay_maxdiff)) {
25 if (x->xflags & XFRM_TIME_DEFER)
26 event = XFRM_REPLAY_TIMEOUT;
27 else
28 return;
29 }
30
31 break;
32
33 case XFRM_REPLAY_TIMEOUT:
34 if (memcmp(&x->replay, &x->preplay,
35 sizeof(struct xfrm_replay_state)) == 0) {
36 x->xflags |= XFRM_TIME_DEFER;
37 return;
38 }
39
40 break;
41 }
42
43 memcpy(&x->preplay, &x->replay, sizeof(struct xfrm_replay_state));
44 c.event = XFRM_MSG_NEWAE;
45 c.data.aevent = event;
46 km_state_notify(x, &c);
47
48 if (x->replay_maxage &&
49 !mod_timer(&x->rtimer, jiffies + x->replay_maxage))
50 x->xflags &= ~XFRM_TIME_DEFER;
51}
52
53static int xfrm_replay_overflow(struct xfrm_state *x, struct sk_buff *skb)
54{
55 int err = 0;
56 struct net *net = xs_net(x);
57
58 if (x->type->flags & XFRM_TYPE_REPLAY_PROT) {
59 XFRM_SKB_CB(skb)->seq.output.low = ++x->replay.oseq;
60 if (unlikely(x->replay.oseq == 0)) {
61 x->replay.oseq--;
62 xfrm_audit_state_replay_overflow(x, skb);
63 err = -EOVERFLOW;
64
65 return err;
66 }
67 if (xfrm_aevent_is_on(net))
68 x->repl->notify(x, XFRM_REPLAY_UPDATE);
69 }
70
71 return err;
72}
73
74static int xfrm_replay_check(struct xfrm_state *x,
75 struct sk_buff *skb, __be32 net_seq)
76{
77 u32 diff;
78 u32 seq = ntohl(net_seq);
79
80 if (unlikely(seq == 0))
81 goto err;
82
83 if (likely(seq > x->replay.seq))
84 return 0;
85
86 diff = x->replay.seq - seq;
87 if (diff >= min_t(unsigned int, x->props.replay_window,
88 sizeof(x->replay.bitmap) * 8)) {
89 x->stats.replay_window++;
90 goto err;
91 }
92
93 if (x->replay.bitmap & (1U << diff)) {
94 x->stats.replay++;
95 goto err;
96 }
97 return 0;
98
99err:
100 xfrm_audit_state_replay(x, skb, net_seq);
101 return -EINVAL;
102}
103
104static void xfrm_replay_advance(struct xfrm_state *x, __be32 net_seq)
105{
106 u32 diff;
107 u32 seq = ntohl(net_seq);
108
109 if (!x->props.replay_window)
110 return;
111
112 if (seq > x->replay.seq) {
113 diff = seq - x->replay.seq;
114 if (diff < x->props.replay_window)
115 x->replay.bitmap = ((x->replay.bitmap) << diff) | 1;
116 else
117 x->replay.bitmap = 1;
118 x->replay.seq = seq;
119 } else {
120 diff = x->replay.seq - seq;
121 x->replay.bitmap |= (1U << diff);
122 }
123
124 if (xfrm_aevent_is_on(xs_net(x)))
125 xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
126}
127
128static struct xfrm_replay xfrm_replay_legacy = {
129 .advance = xfrm_replay_advance,
130 .check = xfrm_replay_check,
131 .notify = xfrm_replay_notify,
132 .overflow = xfrm_replay_overflow,
133};
134
135int xfrm_init_replay(struct xfrm_state *x)
136{
137 x->repl = &xfrm_replay_legacy;
138
139 return 0;
140}
141EXPORT_SYMBOL(xfrm_init_replay);
diff --git a/net/xfrm/xfrm_state.c b/net/xfrm/xfrm_state.c
index cd6be49f2ae..23779d19fe0 100644
--- a/net/xfrm/xfrm_state.c
+++ b/net/xfrm/xfrm_state.c
@@ -42,13 +42,6 @@ static unsigned int xfrm_state_hashmax __read_mostly = 1 * 1024 * 1024;
42static struct xfrm_state_afinfo *xfrm_state_get_afinfo(unsigned int family); 42static struct xfrm_state_afinfo *xfrm_state_get_afinfo(unsigned int family);
43static void xfrm_state_put_afinfo(struct xfrm_state_afinfo *afinfo); 43static void xfrm_state_put_afinfo(struct xfrm_state_afinfo *afinfo);
44 44
45#ifdef CONFIG_AUDITSYSCALL
46static void xfrm_audit_state_replay(struct xfrm_state *x,
47 struct sk_buff *skb, __be32 net_seq);
48#else
49#define xfrm_audit_state_replay(x, s, sq) do { ; } while (0)
50#endif /* CONFIG_AUDITSYSCALL */
51
52static inline unsigned int xfrm_dst_hash(struct net *net, 45static inline unsigned int xfrm_dst_hash(struct net *net,
53 const xfrm_address_t *daddr, 46 const xfrm_address_t *daddr,
54 const xfrm_address_t *saddr, 47 const xfrm_address_t *saddr,
@@ -1619,54 +1612,6 @@ void xfrm_state_walk_done(struct xfrm_state_walk *walk)
1619} 1612}
1620EXPORT_SYMBOL(xfrm_state_walk_done); 1613EXPORT_SYMBOL(xfrm_state_walk_done);
1621 1614
1622
1623void xfrm_replay_notify(struct xfrm_state *x, int event)
1624{
1625 struct km_event c;
1626 /* we send notify messages in case
1627 * 1. we updated on of the sequence numbers, and the seqno difference
1628 * is at least x->replay_maxdiff, in this case we also update the
1629 * timeout of our timer function
1630 * 2. if x->replay_maxage has elapsed since last update,
1631 * and there were changes
1632 *
1633 * The state structure must be locked!
1634 */
1635
1636 switch (event) {
1637 case XFRM_REPLAY_UPDATE:
1638 if (x->replay_maxdiff &&
1639 (x->replay.seq - x->preplay.seq < x->replay_maxdiff) &&
1640 (x->replay.oseq - x->preplay.oseq < x->replay_maxdiff)) {
1641 if (x->xflags & XFRM_TIME_DEFER)
1642 event = XFRM_REPLAY_TIMEOUT;
1643 else
1644 return;
1645 }
1646
1647 break;
1648
1649 case XFRM_REPLAY_TIMEOUT:
1650 if ((x->replay.seq == x->preplay.seq) &&
1651 (x->replay.bitmap == x->preplay.bitmap) &&
1652 (x->replay.oseq == x->preplay.oseq)) {
1653 x->xflags |= XFRM_TIME_DEFER;
1654 return;
1655 }
1656
1657 break;
1658 }
1659
1660 memcpy(&x->preplay, &x->replay, sizeof(struct xfrm_replay_state));
1661 c.event = XFRM_MSG_NEWAE;
1662 c.data.aevent = event;
1663 km_state_notify(x, &c);
1664
1665 if (x->replay_maxage &&
1666 !mod_timer(&x->rtimer, jiffies + x->replay_maxage))
1667 x->xflags &= ~XFRM_TIME_DEFER;
1668}
1669
1670static void xfrm_replay_timer_handler(unsigned long data) 1615static void xfrm_replay_timer_handler(unsigned long data)
1671{ 1616{
1672 struct xfrm_state *x = (struct xfrm_state*)data; 1617 struct xfrm_state *x = (struct xfrm_state*)data;
@@ -1675,7 +1620,7 @@ static void xfrm_replay_timer_handler(unsigned long data)
1675 1620
1676 if (x->km.state == XFRM_STATE_VALID) { 1621 if (x->km.state == XFRM_STATE_VALID) {
1677 if (xfrm_aevent_is_on(xs_net(x))) 1622 if (xfrm_aevent_is_on(xs_net(x)))
1678 xfrm_replay_notify(x, XFRM_REPLAY_TIMEOUT); 1623 x->repl->notify(x, XFRM_REPLAY_TIMEOUT);
1679 else 1624 else
1680 x->xflags |= XFRM_TIME_DEFER; 1625 x->xflags |= XFRM_TIME_DEFER;
1681 } 1626 }
@@ -1683,57 +1628,6 @@ static void xfrm_replay_timer_handler(unsigned long data)
1683 spin_unlock(&x->lock); 1628 spin_unlock(&x->lock);
1684} 1629}
1685 1630
1686int xfrm_replay_check(struct xfrm_state *x,
1687 struct sk_buff *skb, __be32 net_seq)
1688{
1689 u32 diff;
1690 u32 seq = ntohl(net_seq);
1691
1692 if (unlikely(seq == 0))
1693 goto err;
1694
1695 if (likely(seq > x->replay.seq))
1696 return 0;
1697
1698 diff = x->replay.seq - seq;
1699 if (diff >= min_t(unsigned int, x->props.replay_window,
1700 sizeof(x->replay.bitmap) * 8)) {
1701 x->stats.replay_window++;
1702 goto err;
1703 }
1704
1705 if (x->replay.bitmap & (1U << diff)) {
1706 x->stats.replay++;
1707 goto err;
1708 }
1709 return 0;
1710
1711err:
1712 xfrm_audit_state_replay(x, skb, net_seq);
1713 return -EINVAL;
1714}
1715
1716void xfrm_replay_advance(struct xfrm_state *x, __be32 net_seq)
1717{
1718 u32 diff;
1719 u32 seq = ntohl(net_seq);
1720
1721 if (seq > x->replay.seq) {
1722 diff = seq - x->replay.seq;
1723 if (diff < x->props.replay_window)
1724 x->replay.bitmap = ((x->replay.bitmap) << diff) | 1;
1725 else
1726 x->replay.bitmap = 1;
1727 x->replay.seq = seq;
1728 } else {
1729 diff = x->replay.seq - seq;
1730 x->replay.bitmap |= (1U << diff);
1731 }
1732
1733 if (xfrm_aevent_is_on(xs_net(x)))
1734 xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
1735}
1736
1737static LIST_HEAD(xfrm_km_list); 1631static LIST_HEAD(xfrm_km_list);
1738static DEFINE_RWLOCK(xfrm_km_lock); 1632static DEFINE_RWLOCK(xfrm_km_lock);
1739 1633
@@ -2246,7 +2140,7 @@ void xfrm_audit_state_replay_overflow(struct xfrm_state *x,
2246} 2140}
2247EXPORT_SYMBOL_GPL(xfrm_audit_state_replay_overflow); 2141EXPORT_SYMBOL_GPL(xfrm_audit_state_replay_overflow);
2248 2142
2249static void xfrm_audit_state_replay(struct xfrm_state *x, 2143void xfrm_audit_state_replay(struct xfrm_state *x,
2250 struct sk_buff *skb, __be32 net_seq) 2144 struct sk_buff *skb, __be32 net_seq)
2251{ 2145{
2252 struct audit_buffer *audit_buf; 2146 struct audit_buffer *audit_buf;
@@ -2261,6 +2155,7 @@ static void xfrm_audit_state_replay(struct xfrm_state *x,
2261 spi, spi, ntohl(net_seq)); 2155 spi, spi, ntohl(net_seq));
2262 audit_log_end(audit_buf); 2156 audit_log_end(audit_buf);
2263} 2157}
2158EXPORT_SYMBOL_GPL(xfrm_audit_state_replay);
2264 2159
2265void xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family) 2160void xfrm_audit_state_notfound_simple(struct sk_buff *skb, u16 family)
2266{ 2161{
diff --git a/net/xfrm/xfrm_user.c b/net/xfrm/xfrm_user.c
index 468ab60d3dc..f7b3c857c98 100644
--- a/net/xfrm/xfrm_user.c
+++ b/net/xfrm/xfrm_user.c
@@ -475,8 +475,10 @@ static struct xfrm_state *xfrm_state_construct(struct net *net,
475 x->preplay.seq = x->replay.seq+x->replay_maxdiff; 475 x->preplay.seq = x->replay.seq+x->replay_maxdiff;
476 x->preplay.oseq = x->replay.oseq +x->replay_maxdiff; 476 x->preplay.oseq = x->replay.oseq +x->replay_maxdiff;
477 477
478 /* override default values from above */ 478 if ((err = xfrm_init_replay(x)))
479 goto error;
479 480
481 /* override default values from above */
480 xfrm_update_ae_params(x, attrs); 482 xfrm_update_ae_params(x, attrs);
481 483
482 return x; 484 return x;