11da177e4SLinus Torvalds #ifndef _NET_XFRM_H 21da177e4SLinus Torvalds #define _NET_XFRM_H 31da177e4SLinus Torvalds 4aabc9761SHerbert Xu #include <linux/compiler.h> 514c85021SArnaldo Carvalho de Melo #include <linux/in.h> 61da177e4SLinus Torvalds #include <linux/xfrm.h> 71da177e4SLinus Torvalds #include <linux/spinlock.h> 81da177e4SLinus Torvalds #include <linux/list.h> 91da177e4SLinus Torvalds #include <linux/skbuff.h> 1014c85021SArnaldo Carvalho de Melo #include <linux/socket.h> 111da177e4SLinus Torvalds #include <linux/pfkeyv2.h> 125794708fSMasahide NAKAMURA #include <linux/ipsec.h> 131da177e4SLinus Torvalds #include <linux/in6.h> 144a3e2f71SArjan van de Ven #include <linux/mutex.h> 151da177e4SLinus Torvalds 161da177e4SLinus Torvalds #include <net/sock.h> 171da177e4SLinus Torvalds #include <net/dst.h> 181da177e4SLinus Torvalds #include <net/route.h> 191da177e4SLinus Torvalds #include <net/ipv6.h> 201da177e4SLinus Torvalds #include <net/ip6_fib.h> 211da177e4SLinus Torvalds 221da177e4SLinus Torvalds #define XFRM_ALIGN8(len) (((len) + 7) & ~7) 23b59f45d0SHerbert Xu #define MODULE_ALIAS_XFRM_MODE(family, encap) \ 24b59f45d0SHerbert Xu MODULE_ALIAS("xfrm-mode-" __stringify(family) "-" __stringify(encap)) 251da177e4SLinus Torvalds 26f8cd5488SJamal Hadi Salim extern struct sock *xfrm_nl; 27f8cd5488SJamal Hadi Salim extern u32 sysctl_xfrm_aevent_etime; 28f8cd5488SJamal Hadi Salim extern u32 sysctl_xfrm_aevent_rseqth; 29f8cd5488SJamal Hadi Salim 304a3e2f71SArjan van de Ven extern struct mutex xfrm_cfg_mutex; 311da177e4SLinus Torvalds 321da177e4SLinus Torvalds /* Organization of SPD aka "XFRM rules" 331da177e4SLinus Torvalds ------------------------------------ 341da177e4SLinus Torvalds 351da177e4SLinus Torvalds Basic objects: 361da177e4SLinus Torvalds - policy rule, struct xfrm_policy (=SPD entry) 371da177e4SLinus Torvalds - bundle of transformations, struct dst_entry == struct xfrm_dst (=SA bundle) 381da177e4SLinus Torvalds - instance of a transformer, struct xfrm_state (=SA) 391da177e4SLinus Torvalds - template to clone xfrm_state, struct xfrm_tmpl 401da177e4SLinus Torvalds 411da177e4SLinus Torvalds SPD is plain linear list of xfrm_policy rules, ordered by priority. 421da177e4SLinus Torvalds (To be compatible with existing pfkeyv2 implementations, 431da177e4SLinus Torvalds many rules with priority of 0x7fffffff are allowed to exist and 441da177e4SLinus Torvalds such rules are ordered in an unpredictable way, thanks to bsd folks.) 451da177e4SLinus Torvalds 461da177e4SLinus Torvalds Lookup is plain linear search until the first match with selector. 471da177e4SLinus Torvalds 481da177e4SLinus Torvalds If "action" is "block", then we prohibit the flow, otherwise: 491da177e4SLinus Torvalds if "xfrms_nr" is zero, the flow passes untransformed. Otherwise, 501da177e4SLinus Torvalds policy entry has list of up to XFRM_MAX_DEPTH transformations, 511da177e4SLinus Torvalds described by templates xfrm_tmpl. Each template is resolved 521da177e4SLinus Torvalds to a complete xfrm_state (see below) and we pack bundle of transformations 531da177e4SLinus Torvalds to a dst_entry returned to requestor. 541da177e4SLinus Torvalds 551da177e4SLinus Torvalds dst -. xfrm .-> xfrm_state #1 561da177e4SLinus Torvalds |---. child .-> dst -. xfrm .-> xfrm_state #2 571da177e4SLinus Torvalds |---. child .-> dst -. xfrm .-> xfrm_state #3 581da177e4SLinus Torvalds |---. child .-> NULL 591da177e4SLinus Torvalds 601da177e4SLinus Torvalds Bundles are cached at xrfm_policy struct (field ->bundles). 611da177e4SLinus Torvalds 621da177e4SLinus Torvalds 631da177e4SLinus Torvalds Resolution of xrfm_tmpl 641da177e4SLinus Torvalds ----------------------- 651da177e4SLinus Torvalds Template contains: 661da177e4SLinus Torvalds 1. ->mode Mode: transport or tunnel 671da177e4SLinus Torvalds 2. ->id.proto Protocol: AH/ESP/IPCOMP 681da177e4SLinus Torvalds 3. ->id.daddr Remote tunnel endpoint, ignored for transport mode. 691da177e4SLinus Torvalds Q: allow to resolve security gateway? 701da177e4SLinus Torvalds 4. ->id.spi If not zero, static SPI. 711da177e4SLinus Torvalds 5. ->saddr Local tunnel endpoint, ignored for transport mode. 721da177e4SLinus Torvalds 6. ->algos List of allowed algos. Plain bitmask now. 731da177e4SLinus Torvalds Q: ealgos, aalgos, calgos. What a mess... 741da177e4SLinus Torvalds 7. ->share Sharing mode. 751da177e4SLinus Torvalds Q: how to implement private sharing mode? To add struct sock* to 761da177e4SLinus Torvalds flow id? 771da177e4SLinus Torvalds 781da177e4SLinus Torvalds Having this template we search through SAD searching for entries 791da177e4SLinus Torvalds with appropriate mode/proto/algo, permitted by selector. 801da177e4SLinus Torvalds If no appropriate entry found, it is requested from key manager. 811da177e4SLinus Torvalds 821da177e4SLinus Torvalds PROBLEMS: 831da177e4SLinus Torvalds Q: How to find all the bundles referring to a physical path for 841da177e4SLinus Torvalds PMTU discovery? Seems, dst should contain list of all parents... 851da177e4SLinus Torvalds and enter to infinite locking hierarchy disaster. 861da177e4SLinus Torvalds No! It is easier, we will not search for them, let them find us. 871da177e4SLinus Torvalds We add genid to each dst plus pointer to genid of raw IP route, 881da177e4SLinus Torvalds pmtu disc will update pmtu on raw IP route and increase its genid. 891da177e4SLinus Torvalds dst_check() will see this for top level and trigger resyncing 901da177e4SLinus Torvalds metrics. Plus, it will be made via sk->sk_dst_cache. Solved. 911da177e4SLinus Torvalds */ 921da177e4SLinus Torvalds 931da177e4SLinus Torvalds /* Full description of state of transformer. */ 941da177e4SLinus Torvalds struct xfrm_state 951da177e4SLinus Torvalds { 961da177e4SLinus Torvalds /* Note: bydst is re-used during gc */ 978f126e37SDavid S. Miller struct hlist_node bydst; 988f126e37SDavid S. Miller struct hlist_node bysrc; 998f126e37SDavid S. Miller struct hlist_node byspi; 1001da177e4SLinus Torvalds 1011da177e4SLinus Torvalds atomic_t refcnt; 1021da177e4SLinus Torvalds spinlock_t lock; 1031da177e4SLinus Torvalds 1041da177e4SLinus Torvalds struct xfrm_id id; 1051da177e4SLinus Torvalds struct xfrm_selector sel; 1061da177e4SLinus Torvalds 1079d4a706dSDavid S. Miller u32 genid; 1089d4a706dSDavid S. Miller 1091da177e4SLinus Torvalds /* Key manger bits */ 1101da177e4SLinus Torvalds struct { 1111da177e4SLinus Torvalds u8 state; 1121da177e4SLinus Torvalds u8 dying; 1131da177e4SLinus Torvalds u32 seq; 1141da177e4SLinus Torvalds } km; 1151da177e4SLinus Torvalds 1161da177e4SLinus Torvalds /* Parameters of this state. */ 1171da177e4SLinus Torvalds struct { 1181da177e4SLinus Torvalds u32 reqid; 1191da177e4SLinus Torvalds u8 mode; 1201da177e4SLinus Torvalds u8 replay_window; 1211da177e4SLinus Torvalds u8 aalgo, ealgo, calgo; 1221da177e4SLinus Torvalds u8 flags; 1231da177e4SLinus Torvalds u16 family; 1241da177e4SLinus Torvalds xfrm_address_t saddr; 1251da177e4SLinus Torvalds int header_len; 1261da177e4SLinus Torvalds int trailer_len; 1271da177e4SLinus Torvalds } props; 1281da177e4SLinus Torvalds 1291da177e4SLinus Torvalds struct xfrm_lifetime_cfg lft; 1301da177e4SLinus Torvalds 1311da177e4SLinus Torvalds /* Data for transformer */ 1321da177e4SLinus Torvalds struct xfrm_algo *aalg; 1331da177e4SLinus Torvalds struct xfrm_algo *ealg; 1341da177e4SLinus Torvalds struct xfrm_algo *calg; 1351da177e4SLinus Torvalds 1361da177e4SLinus Torvalds /* Data for encapsulator */ 1371da177e4SLinus Torvalds struct xfrm_encap_tmpl *encap; 1381da177e4SLinus Torvalds 139060f02a3SNoriaki TAKAMIYA /* Data for care-of address */ 140060f02a3SNoriaki TAKAMIYA xfrm_address_t *coaddr; 141060f02a3SNoriaki TAKAMIYA 1421da177e4SLinus Torvalds /* IPComp needs an IPIP tunnel for handling uncompressed packets */ 1431da177e4SLinus Torvalds struct xfrm_state *tunnel; 1441da177e4SLinus Torvalds 1451da177e4SLinus Torvalds /* If a tunnel, number of users + 1 */ 1461da177e4SLinus Torvalds atomic_t tunnel_users; 1471da177e4SLinus Torvalds 1481da177e4SLinus Torvalds /* State for replay detection */ 1491da177e4SLinus Torvalds struct xfrm_replay_state replay; 1501da177e4SLinus Torvalds 151f8cd5488SJamal Hadi Salim /* Replay detection state at the time we sent the last notification */ 152f8cd5488SJamal Hadi Salim struct xfrm_replay_state preplay; 153f8cd5488SJamal Hadi Salim 1542717096aSJamal Hadi Salim /* internal flag that only holds state for delayed aevent at the 1552717096aSJamal Hadi Salim * moment 1562717096aSJamal Hadi Salim */ 1572717096aSJamal Hadi Salim u32 xflags; 1582717096aSJamal Hadi Salim 159f8cd5488SJamal Hadi Salim /* Replay detection notification settings */ 160f8cd5488SJamal Hadi Salim u32 replay_maxage; 161f8cd5488SJamal Hadi Salim u32 replay_maxdiff; 162f8cd5488SJamal Hadi Salim 163f8cd5488SJamal Hadi Salim /* Replay detection notification timer */ 164f8cd5488SJamal Hadi Salim struct timer_list rtimer; 165f8cd5488SJamal Hadi Salim 1661da177e4SLinus Torvalds /* Statistics */ 1671da177e4SLinus Torvalds struct xfrm_stats stats; 1681da177e4SLinus Torvalds 1691da177e4SLinus Torvalds struct xfrm_lifetime_cur curlft; 1701da177e4SLinus Torvalds struct timer_list timer; 1711da177e4SLinus Torvalds 1729afaca05SMasahide NAKAMURA /* Last used time */ 1739afaca05SMasahide NAKAMURA u64 lastused; 1749afaca05SMasahide NAKAMURA 1751da177e4SLinus Torvalds /* Reference to data common to all the instances of this 1761da177e4SLinus Torvalds * transformer. */ 1771da177e4SLinus Torvalds struct xfrm_type *type; 178b59f45d0SHerbert Xu struct xfrm_mode *mode; 1791da177e4SLinus Torvalds 180df71837dSTrent Jaeger /* Security context */ 181df71837dSTrent Jaeger struct xfrm_sec_ctx *security; 182df71837dSTrent Jaeger 1831da177e4SLinus Torvalds /* Private data of this transformer, format is opaque, 1841da177e4SLinus Torvalds * interpreted by xfrm_type methods. */ 1851da177e4SLinus Torvalds void *data; 1861da177e4SLinus Torvalds }; 1871da177e4SLinus Torvalds 1882717096aSJamal Hadi Salim /* xflags - make enum if more show up */ 1892717096aSJamal Hadi Salim #define XFRM_TIME_DEFER 1 1902717096aSJamal Hadi Salim 1911da177e4SLinus Torvalds enum { 1921da177e4SLinus Torvalds XFRM_STATE_VOID, 1931da177e4SLinus Torvalds XFRM_STATE_ACQ, 1941da177e4SLinus Torvalds XFRM_STATE_VALID, 1951da177e4SLinus Torvalds XFRM_STATE_ERROR, 1961da177e4SLinus Torvalds XFRM_STATE_EXPIRED, 1971da177e4SLinus Torvalds XFRM_STATE_DEAD 1981da177e4SLinus Torvalds }; 1991da177e4SLinus Torvalds 20026b15dadSJamal Hadi Salim /* callback structure passed from either netlink or pfkey */ 20126b15dadSJamal Hadi Salim struct km_event 20226b15dadSJamal Hadi Salim { 203bf08867fSHerbert Xu union { 204bf08867fSHerbert Xu u32 hard; 205bf08867fSHerbert Xu u32 proto; 206bf08867fSHerbert Xu u32 byid; 207f8cd5488SJamal Hadi Salim u32 aevent; 208f7b6983fSMasahide NAKAMURA u32 type; 209bf08867fSHerbert Xu } data; 210bf08867fSHerbert Xu 21126b15dadSJamal Hadi Salim u32 seq; 21226b15dadSJamal Hadi Salim u32 pid; 21326b15dadSJamal Hadi Salim u32 event; 21426b15dadSJamal Hadi Salim }; 21526b15dadSJamal Hadi Salim 2161da177e4SLinus Torvalds struct xfrm_type; 2171da177e4SLinus Torvalds struct xfrm_dst; 2181da177e4SLinus Torvalds struct xfrm_policy_afinfo { 2191da177e4SLinus Torvalds unsigned short family; 22073654d61SHerbert Xu struct xfrm_type *type_map[IPPROTO_MAX]; 221b59f45d0SHerbert Xu struct xfrm_mode *mode_map[XFRM_MODE_MAX]; 2221da177e4SLinus Torvalds struct dst_ops *dst_ops; 2231da177e4SLinus Torvalds void (*garbage_collect)(void); 2241da177e4SLinus Torvalds int (*dst_lookup)(struct xfrm_dst **dst, struct flowi *fl); 225a1e59abfSPatrick McHardy int (*get_saddr)(xfrm_address_t *saddr, xfrm_address_t *daddr); 2261da177e4SLinus Torvalds struct dst_entry *(*find_bundle)(struct flowi *fl, struct xfrm_policy *policy); 2271da177e4SLinus Torvalds int (*bundle_create)(struct xfrm_policy *policy, 2281da177e4SLinus Torvalds struct xfrm_state **xfrm, 2291da177e4SLinus Torvalds int nx, 2301da177e4SLinus Torvalds struct flowi *fl, 2311da177e4SLinus Torvalds struct dst_entry **dst_p); 2321da177e4SLinus Torvalds void (*decode_session)(struct sk_buff *skb, 2331da177e4SLinus Torvalds struct flowi *fl); 2341da177e4SLinus Torvalds }; 2351da177e4SLinus Torvalds 2361da177e4SLinus Torvalds extern int xfrm_policy_register_afinfo(struct xfrm_policy_afinfo *afinfo); 2371da177e4SLinus Torvalds extern int xfrm_policy_unregister_afinfo(struct xfrm_policy_afinfo *afinfo); 23826b15dadSJamal Hadi Salim extern void km_policy_notify(struct xfrm_policy *xp, int dir, struct km_event *c); 23926b15dadSJamal Hadi Salim extern void km_state_notify(struct xfrm_state *x, struct km_event *c); 2401da177e4SLinus Torvalds #define XFRM_ACQ_EXPIRES 30 2411da177e4SLinus Torvalds 2421da177e4SLinus Torvalds struct xfrm_tmpl; 243980ebd25SJamal Hadi Salim extern int km_query(struct xfrm_state *x, struct xfrm_tmpl *t, struct xfrm_policy *pol); 24453bc6b4dSJamal Hadi Salim extern void km_state_expired(struct xfrm_state *x, int hard, u32 pid); 24553bc6b4dSJamal Hadi Salim extern int __xfrm_state_delete(struct xfrm_state *x); 24653bc6b4dSJamal Hadi Salim 2471da177e4SLinus Torvalds struct xfrm_state_afinfo { 2481da177e4SLinus Torvalds unsigned short family; 249d094cd83SHerbert Xu int (*init_flags)(struct xfrm_state *x); 2501da177e4SLinus Torvalds void (*init_tempsel)(struct xfrm_state *x, struct flowi *fl, 2511da177e4SLinus Torvalds struct xfrm_tmpl *tmpl, 2521da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr); 25341a49cc3SMasahide NAKAMURA int (*tmpl_sort)(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n); 25441a49cc3SMasahide NAKAMURA int (*state_sort)(struct xfrm_state **dst, struct xfrm_state **src, int n); 2551da177e4SLinus Torvalds }; 2561da177e4SLinus Torvalds 2571da177e4SLinus Torvalds extern int xfrm_state_register_afinfo(struct xfrm_state_afinfo *afinfo); 2581da177e4SLinus Torvalds extern int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo); 2591da177e4SLinus Torvalds 2601da177e4SLinus Torvalds extern void xfrm_state_delete_tunnel(struct xfrm_state *x); 2611da177e4SLinus Torvalds 2621da177e4SLinus Torvalds struct xfrm_type 2631da177e4SLinus Torvalds { 2641da177e4SLinus Torvalds char *description; 2651da177e4SLinus Torvalds struct module *owner; 2661da177e4SLinus Torvalds __u8 proto; 2671b5c2299SMasahide NAKAMURA __u8 flags; 2681b5c2299SMasahide NAKAMURA #define XFRM_TYPE_NON_FRAGMENT 1 2691da177e4SLinus Torvalds 27072cb6962SHerbert Xu int (*init_state)(struct xfrm_state *x); 2711da177e4SLinus Torvalds void (*destructor)(struct xfrm_state *); 272e695633eSHerbert Xu int (*input)(struct xfrm_state *, struct sk_buff *skb); 2731da177e4SLinus Torvalds int (*output)(struct xfrm_state *, struct sk_buff *pskb); 274df0ba92aSMasahide NAKAMURA int (*reject)(struct xfrm_state *, struct sk_buff *, struct flowi *); 275aee5adb4SMasahide NAKAMURA int (*hdr_offset)(struct xfrm_state *, struct sk_buff *, u8 **); 27699505a84SMasahide NAKAMURA xfrm_address_t *(*local_addr)(struct xfrm_state *, xfrm_address_t *); 27799505a84SMasahide NAKAMURA xfrm_address_t *(*remote_addr)(struct xfrm_state *, xfrm_address_t *); 2781da177e4SLinus Torvalds /* Estimate maximal size of result of transformation of a dgram */ 2791da177e4SLinus Torvalds u32 (*get_max_size)(struct xfrm_state *, int size); 2801da177e4SLinus Torvalds }; 2811da177e4SLinus Torvalds 2821da177e4SLinus Torvalds extern int xfrm_register_type(struct xfrm_type *type, unsigned short family); 2831da177e4SLinus Torvalds extern int xfrm_unregister_type(struct xfrm_type *type, unsigned short family); 2841da177e4SLinus Torvalds extern struct xfrm_type *xfrm_get_type(u8 proto, unsigned short family); 2851da177e4SLinus Torvalds extern void xfrm_put_type(struct xfrm_type *type); 2861da177e4SLinus Torvalds 287b59f45d0SHerbert Xu struct xfrm_mode { 288b59f45d0SHerbert Xu int (*input)(struct xfrm_state *x, struct sk_buff *skb); 289eb878e84SJamal Hadi Salim int (*output)(struct xfrm_state *x,struct sk_buff *skb); 290b59f45d0SHerbert Xu 291b59f45d0SHerbert Xu struct module *owner; 292b59f45d0SHerbert Xu unsigned int encap; 293b59f45d0SHerbert Xu }; 294b59f45d0SHerbert Xu 295b59f45d0SHerbert Xu extern int xfrm_register_mode(struct xfrm_mode *mode, int family); 296b59f45d0SHerbert Xu extern int xfrm_unregister_mode(struct xfrm_mode *mode, int family); 297b59f45d0SHerbert Xu extern struct xfrm_mode *xfrm_get_mode(unsigned int encap, int family); 298b59f45d0SHerbert Xu extern void xfrm_put_mode(struct xfrm_mode *mode); 299b59f45d0SHerbert Xu 3001da177e4SLinus Torvalds struct xfrm_tmpl 3011da177e4SLinus Torvalds { 3021da177e4SLinus Torvalds /* id in template is interpreted as: 3031da177e4SLinus Torvalds * daddr - destination of tunnel, may be zero for transport mode. 3041da177e4SLinus Torvalds * spi - zero to acquire spi. Not zero if spi is static, then 3051da177e4SLinus Torvalds * daddr must be fixed too. 3061da177e4SLinus Torvalds * proto - AH/ESP/IPCOMP 3071da177e4SLinus Torvalds */ 3081da177e4SLinus Torvalds struct xfrm_id id; 3091da177e4SLinus Torvalds 3101da177e4SLinus Torvalds /* Source address of tunnel. Ignored, if it is not a tunnel. */ 3111da177e4SLinus Torvalds xfrm_address_t saddr; 3121da177e4SLinus Torvalds 31376b3f055SMiika Komu unsigned short encap_family; 31476b3f055SMiika Komu 3151da177e4SLinus Torvalds __u32 reqid; 3161da177e4SLinus Torvalds 3177e49e6deSMasahide NAKAMURA /* Mode: transport, tunnel etc. */ 3181da177e4SLinus Torvalds __u8 mode; 3191da177e4SLinus Torvalds 3201da177e4SLinus Torvalds /* Sharing mode: unique, this session only, this user only etc. */ 3211da177e4SLinus Torvalds __u8 share; 3221da177e4SLinus Torvalds 3231da177e4SLinus Torvalds /* May skip this transfomration if no SA is found */ 3241da177e4SLinus Torvalds __u8 optional; 3251da177e4SLinus Torvalds 3261da177e4SLinus Torvalds /* Bit mask of algos allowed for acquisition */ 3271da177e4SLinus Torvalds __u32 aalgos; 3281da177e4SLinus Torvalds __u32 ealgos; 3291da177e4SLinus Torvalds __u32 calgos; 3301da177e4SLinus Torvalds }; 3311da177e4SLinus Torvalds 332622dc828SMasahide NAKAMURA #define XFRM_MAX_DEPTH 6 3331da177e4SLinus Torvalds 3341da177e4SLinus Torvalds struct xfrm_policy 3351da177e4SLinus Torvalds { 3361da177e4SLinus Torvalds struct xfrm_policy *next; 3372518c7c2SDavid S. Miller struct hlist_node bydst; 3382518c7c2SDavid S. Miller struct hlist_node byidx; 3391da177e4SLinus Torvalds 3401da177e4SLinus Torvalds /* This lock only affects elements except for entry. */ 3411da177e4SLinus Torvalds rwlock_t lock; 3421da177e4SLinus Torvalds atomic_t refcnt; 3431da177e4SLinus Torvalds struct timer_list timer; 3441da177e4SLinus Torvalds 3451da177e4SLinus Torvalds u32 priority; 3461da177e4SLinus Torvalds u32 index; 3471da177e4SLinus Torvalds struct xfrm_selector selector; 3481da177e4SLinus Torvalds struct xfrm_lifetime_cfg lft; 3491da177e4SLinus Torvalds struct xfrm_lifetime_cur curlft; 3501da177e4SLinus Torvalds struct dst_entry *bundles; 35146ca5f5dSArnaldo Carvalho de Melo u16 family; 35246ca5f5dSArnaldo Carvalho de Melo u8 type; 35346ca5f5dSArnaldo Carvalho de Melo u8 action; 35446ca5f5dSArnaldo Carvalho de Melo u8 flags; 35546ca5f5dSArnaldo Carvalho de Melo u8 dead; 35646ca5f5dSArnaldo Carvalho de Melo u8 xfrm_nr; 35746ca5f5dSArnaldo Carvalho de Melo /* XXX 1 byte hole, try to pack */ 358df71837dSTrent Jaeger struct xfrm_sec_ctx *security; 3591da177e4SLinus Torvalds struct xfrm_tmpl xfrm_vec[XFRM_MAX_DEPTH]; 3601da177e4SLinus Torvalds }; 3611da177e4SLinus Torvalds 3621da177e4SLinus Torvalds #define XFRM_KM_TIMEOUT 30 363f8cd5488SJamal Hadi Salim /* which seqno */ 364f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_SEQ 1 365f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_OSEQ 2 366f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_SEQ_MASK 3 367f8cd5488SJamal Hadi Salim /* what happened */ 368f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_UPDATE XFRM_AE_CR 369f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_TIMEOUT XFRM_AE_CE 370f8cd5488SJamal Hadi Salim 371f8cd5488SJamal Hadi Salim /* default aevent timeout in units of 100ms */ 372f8cd5488SJamal Hadi Salim #define XFRM_AE_ETIME 10 373f8cd5488SJamal Hadi Salim /* Async Event timer multiplier */ 374f8cd5488SJamal Hadi Salim #define XFRM_AE_ETH_M 10 375f8cd5488SJamal Hadi Salim /* default seq threshold size */ 376f8cd5488SJamal Hadi Salim #define XFRM_AE_SEQT_SIZE 2 3771da177e4SLinus Torvalds 3781da177e4SLinus Torvalds struct xfrm_mgr 3791da177e4SLinus Torvalds { 3801da177e4SLinus Torvalds struct list_head list; 3811da177e4SLinus Torvalds char *id; 38226b15dadSJamal Hadi Salim int (*notify)(struct xfrm_state *x, struct km_event *c); 3831da177e4SLinus Torvalds int (*acquire)(struct xfrm_state *x, struct xfrm_tmpl *, struct xfrm_policy *xp, int dir); 384cb969f07SVenkat Yekkirala struct xfrm_policy *(*compile_policy)(struct sock *sk, int opt, u8 *data, int len, int *dir); 3855d36b180SAl Viro int (*new_mapping)(struct xfrm_state *x, xfrm_address_t *ipaddr, __be16 sport); 38626b15dadSJamal Hadi Salim int (*notify_policy)(struct xfrm_policy *x, int dir, struct km_event *c); 38797a64b45SMasahide NAKAMURA int (*report)(u8 proto, struct xfrm_selector *sel, xfrm_address_t *addr); 3881da177e4SLinus Torvalds }; 3891da177e4SLinus Torvalds 3901da177e4SLinus Torvalds extern int xfrm_register_km(struct xfrm_mgr *km); 3911da177e4SLinus Torvalds extern int xfrm_unregister_km(struct xfrm_mgr *km); 3921da177e4SLinus Torvalds 3932518c7c2SDavid S. Miller extern unsigned int xfrm_policy_count[XFRM_POLICY_MAX*2]; 3941da177e4SLinus Torvalds 395161a09e7SJoy Latten /* Audit Information */ 396161a09e7SJoy Latten struct xfrm_audit 397161a09e7SJoy Latten { 398161a09e7SJoy Latten uid_t loginuid; 399161a09e7SJoy Latten u32 secid; 400161a09e7SJoy Latten }; 401c9204d9cSJoy Latten 402c9204d9cSJoy Latten #ifdef CONFIG_AUDITSYSCALL 403c9204d9cSJoy Latten extern void xfrm_audit_log(uid_t auid, u32 secid, int type, int result, 404161a09e7SJoy Latten struct xfrm_policy *xp, struct xfrm_state *x); 405c9204d9cSJoy Latten #else 406c9204d9cSJoy Latten #define xfrm_audit_log(a,s,t,r,p,x) do { ; } while (0) 407c9204d9cSJoy Latten #endif /* CONFIG_AUDITSYSCALL */ 408161a09e7SJoy Latten 4091da177e4SLinus Torvalds static inline void xfrm_pol_hold(struct xfrm_policy *policy) 4101da177e4SLinus Torvalds { 4111da177e4SLinus Torvalds if (likely(policy != NULL)) 4121da177e4SLinus Torvalds atomic_inc(&policy->refcnt); 4131da177e4SLinus Torvalds } 4141da177e4SLinus Torvalds 4151da177e4SLinus Torvalds extern void __xfrm_policy_destroy(struct xfrm_policy *policy); 4161da177e4SLinus Torvalds 4171da177e4SLinus Torvalds static inline void xfrm_pol_put(struct xfrm_policy *policy) 4181da177e4SLinus Torvalds { 4191da177e4SLinus Torvalds if (atomic_dec_and_test(&policy->refcnt)) 4201da177e4SLinus Torvalds __xfrm_policy_destroy(policy); 4211da177e4SLinus Torvalds } 4221da177e4SLinus Torvalds 4234e81bb83SMasahide NAKAMURA #ifdef CONFIG_XFRM_SUB_POLICY 4244e81bb83SMasahide NAKAMURA static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols) 4254e81bb83SMasahide NAKAMURA { 4264e81bb83SMasahide NAKAMURA int i; 4274e81bb83SMasahide NAKAMURA for (i = npols - 1; i >= 0; --i) 4284e81bb83SMasahide NAKAMURA xfrm_pol_put(pols[i]); 4294e81bb83SMasahide NAKAMURA } 4304e81bb83SMasahide NAKAMURA #else 4314e81bb83SMasahide NAKAMURA static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols) 4324e81bb83SMasahide NAKAMURA { 4334e81bb83SMasahide NAKAMURA xfrm_pol_put(pols[0]); 4344e81bb83SMasahide NAKAMURA } 4354e81bb83SMasahide NAKAMURA #endif 4364e81bb83SMasahide NAKAMURA 4371da177e4SLinus Torvalds extern void __xfrm_state_destroy(struct xfrm_state *); 4381da177e4SLinus Torvalds 43921380b81SHerbert Xu static inline void __xfrm_state_put(struct xfrm_state *x) 44021380b81SHerbert Xu { 44121380b81SHerbert Xu atomic_dec(&x->refcnt); 44221380b81SHerbert Xu } 44321380b81SHerbert Xu 4441da177e4SLinus Torvalds static inline void xfrm_state_put(struct xfrm_state *x) 4451da177e4SLinus Torvalds { 4461da177e4SLinus Torvalds if (atomic_dec_and_test(&x->refcnt)) 4471da177e4SLinus Torvalds __xfrm_state_destroy(x); 4481da177e4SLinus Torvalds } 4491da177e4SLinus Torvalds 4501da177e4SLinus Torvalds static inline void xfrm_state_hold(struct xfrm_state *x) 4511da177e4SLinus Torvalds { 4521da177e4SLinus Torvalds atomic_inc(&x->refcnt); 4531da177e4SLinus Torvalds } 4541da177e4SLinus Torvalds 4551da177e4SLinus Torvalds static __inline__ int addr_match(void *token1, void *token2, int prefixlen) 4561da177e4SLinus Torvalds { 4575f19343fSAl Viro __be32 *a1 = token1; 4585f19343fSAl Viro __be32 *a2 = token2; 4591da177e4SLinus Torvalds int pdw; 4601da177e4SLinus Torvalds int pbi; 4611da177e4SLinus Torvalds 4621da177e4SLinus Torvalds pdw = prefixlen >> 5; /* num of whole __u32 in prefix */ 4631da177e4SLinus Torvalds pbi = prefixlen & 0x1f; /* num of bits in incomplete u32 in prefix */ 4641da177e4SLinus Torvalds 4651da177e4SLinus Torvalds if (pdw) 4661da177e4SLinus Torvalds if (memcmp(a1, a2, pdw << 2)) 4671da177e4SLinus Torvalds return 0; 4681da177e4SLinus Torvalds 4691da177e4SLinus Torvalds if (pbi) { 4705f19343fSAl Viro __be32 mask; 4711da177e4SLinus Torvalds 4721da177e4SLinus Torvalds mask = htonl((0xffffffff) << (32 - pbi)); 4731da177e4SLinus Torvalds 4741da177e4SLinus Torvalds if ((a1[pdw] ^ a2[pdw]) & mask) 4751da177e4SLinus Torvalds return 0; 4761da177e4SLinus Torvalds } 4771da177e4SLinus Torvalds 4781da177e4SLinus Torvalds return 1; 4791da177e4SLinus Torvalds } 4801da177e4SLinus Torvalds 4811da177e4SLinus Torvalds static __inline__ 482f9d07e41SAl Viro __be16 xfrm_flowi_sport(struct flowi *fl) 4831da177e4SLinus Torvalds { 484f9d07e41SAl Viro __be16 port; 4851da177e4SLinus Torvalds switch(fl->proto) { 4861da177e4SLinus Torvalds case IPPROTO_TCP: 4871da177e4SLinus Torvalds case IPPROTO_UDP: 488ba4e58ecSGerrit Renker case IPPROTO_UDPLITE: 4891da177e4SLinus Torvalds case IPPROTO_SCTP: 4901da177e4SLinus Torvalds port = fl->fl_ip_sport; 4911da177e4SLinus Torvalds break; 4921da177e4SLinus Torvalds case IPPROTO_ICMP: 4931da177e4SLinus Torvalds case IPPROTO_ICMPV6: 4941da177e4SLinus Torvalds port = htons(fl->fl_icmp_type); 4951da177e4SLinus Torvalds break; 4962ce4272aSMasahide NAKAMURA #ifdef CONFIG_IPV6_MIP6 4972ce4272aSMasahide NAKAMURA case IPPROTO_MH: 4982ce4272aSMasahide NAKAMURA port = htons(fl->fl_mh_type); 4992ce4272aSMasahide NAKAMURA break; 5002ce4272aSMasahide NAKAMURA #endif 5011da177e4SLinus Torvalds default: 5021da177e4SLinus Torvalds port = 0; /*XXX*/ 5031da177e4SLinus Torvalds } 5041da177e4SLinus Torvalds return port; 5051da177e4SLinus Torvalds } 5061da177e4SLinus Torvalds 5071da177e4SLinus Torvalds static __inline__ 508f9d07e41SAl Viro __be16 xfrm_flowi_dport(struct flowi *fl) 5091da177e4SLinus Torvalds { 510f9d07e41SAl Viro __be16 port; 5111da177e4SLinus Torvalds switch(fl->proto) { 5121da177e4SLinus Torvalds case IPPROTO_TCP: 5131da177e4SLinus Torvalds case IPPROTO_UDP: 514ba4e58ecSGerrit Renker case IPPROTO_UDPLITE: 5151da177e4SLinus Torvalds case IPPROTO_SCTP: 5161da177e4SLinus Torvalds port = fl->fl_ip_dport; 5171da177e4SLinus Torvalds break; 5181da177e4SLinus Torvalds case IPPROTO_ICMP: 5191da177e4SLinus Torvalds case IPPROTO_ICMPV6: 5201da177e4SLinus Torvalds port = htons(fl->fl_icmp_code); 5211da177e4SLinus Torvalds break; 5221da177e4SLinus Torvalds default: 5231da177e4SLinus Torvalds port = 0; /*XXX*/ 5241da177e4SLinus Torvalds } 5251da177e4SLinus Torvalds return port; 5261da177e4SLinus Torvalds } 5271da177e4SLinus Torvalds 52877681021SAndrew Morton extern int xfrm_selector_match(struct xfrm_selector *sel, struct flowi *fl, 52977681021SAndrew Morton unsigned short family); 5301da177e4SLinus Torvalds 531df71837dSTrent Jaeger #ifdef CONFIG_SECURITY_NETWORK_XFRM 532df71837dSTrent Jaeger /* If neither has a context --> match 533df71837dSTrent Jaeger * Otherwise, both must have a context and the sids, doi, alg must match 534df71837dSTrent Jaeger */ 535df71837dSTrent Jaeger static inline int xfrm_sec_ctx_match(struct xfrm_sec_ctx *s1, struct xfrm_sec_ctx *s2) 536df71837dSTrent Jaeger { 537df71837dSTrent Jaeger return ((!s1 && !s2) || 538df71837dSTrent Jaeger (s1 && s2 && 539df71837dSTrent Jaeger (s1->ctx_sid == s2->ctx_sid) && 540df71837dSTrent Jaeger (s1->ctx_doi == s2->ctx_doi) && 541df71837dSTrent Jaeger (s1->ctx_alg == s2->ctx_alg))); 542df71837dSTrent Jaeger } 543df71837dSTrent Jaeger #else 544df71837dSTrent Jaeger static inline int xfrm_sec_ctx_match(struct xfrm_sec_ctx *s1, struct xfrm_sec_ctx *s2) 545df71837dSTrent Jaeger { 546df71837dSTrent Jaeger return 1; 547df71837dSTrent Jaeger } 548df71837dSTrent Jaeger #endif 549df71837dSTrent Jaeger 5501da177e4SLinus Torvalds /* A struct encoding bundle of transformations to apply to some set of flow. 5511da177e4SLinus Torvalds * 5521da177e4SLinus Torvalds * dst->child points to the next element of bundle. 5531da177e4SLinus Torvalds * dst->xfrm points to an instanse of transformer. 5541da177e4SLinus Torvalds * 5551da177e4SLinus Torvalds * Due to unfortunate limitations of current routing cache, which we 5561da177e4SLinus Torvalds * have no time to fix, it mirrors struct rtable and bound to the same 5571da177e4SLinus Torvalds * routing key, including saddr,daddr. However, we can have many of 5581da177e4SLinus Torvalds * bundles differing by session id. All the bundles grow from a parent 5591da177e4SLinus Torvalds * policy rule. 5601da177e4SLinus Torvalds */ 5611da177e4SLinus Torvalds struct xfrm_dst 5621da177e4SLinus Torvalds { 5631da177e4SLinus Torvalds union { 5641da177e4SLinus Torvalds struct xfrm_dst *next; 5651da177e4SLinus Torvalds struct dst_entry dst; 5661da177e4SLinus Torvalds struct rtable rt; 5671da177e4SLinus Torvalds struct rt6_info rt6; 5681da177e4SLinus Torvalds } u; 5691da177e4SLinus Torvalds struct dst_entry *route; 5709d4a706dSDavid S. Miller u32 genid; 5711da177e4SLinus Torvalds u32 route_mtu_cached; 5721da177e4SLinus Torvalds u32 child_mtu_cached; 57392d63decSHideaki YOSHIFUJI u32 route_cookie; 57492d63decSHideaki YOSHIFUJI u32 path_cookie; 5751da177e4SLinus Torvalds }; 5761da177e4SLinus Torvalds 577aabc9761SHerbert Xu static inline void xfrm_dst_destroy(struct xfrm_dst *xdst) 578aabc9761SHerbert Xu { 579aabc9761SHerbert Xu dst_release(xdst->route); 580aabc9761SHerbert Xu if (likely(xdst->u.dst.xfrm)) 581aabc9761SHerbert Xu xfrm_state_put(xdst->u.dst.xfrm); 582aabc9761SHerbert Xu } 583aabc9761SHerbert Xu 584aabc9761SHerbert Xu extern void xfrm_dst_ifdown(struct dst_entry *dst, struct net_device *dev); 585aabc9761SHerbert Xu 5861da177e4SLinus Torvalds struct sec_path 5871da177e4SLinus Torvalds { 5881da177e4SLinus Torvalds atomic_t refcnt; 5891da177e4SLinus Torvalds int len; 590dbe5b4aaSHerbert Xu struct xfrm_state *xvec[XFRM_MAX_DEPTH]; 5911da177e4SLinus Torvalds }; 5921da177e4SLinus Torvalds 5931da177e4SLinus Torvalds static inline struct sec_path * 5941da177e4SLinus Torvalds secpath_get(struct sec_path *sp) 5951da177e4SLinus Torvalds { 5961da177e4SLinus Torvalds if (sp) 5971da177e4SLinus Torvalds atomic_inc(&sp->refcnt); 5981da177e4SLinus Torvalds return sp; 5991da177e4SLinus Torvalds } 6001da177e4SLinus Torvalds 6011da177e4SLinus Torvalds extern void __secpath_destroy(struct sec_path *sp); 6021da177e4SLinus Torvalds 6031da177e4SLinus Torvalds static inline void 6041da177e4SLinus Torvalds secpath_put(struct sec_path *sp) 6051da177e4SLinus Torvalds { 6061da177e4SLinus Torvalds if (sp && atomic_dec_and_test(&sp->refcnt)) 6071da177e4SLinus Torvalds __secpath_destroy(sp); 6081da177e4SLinus Torvalds } 6091da177e4SLinus Torvalds 6101da177e4SLinus Torvalds extern struct sec_path *secpath_dup(struct sec_path *src); 6111da177e4SLinus Torvalds 6121da177e4SLinus Torvalds static inline void 6131da177e4SLinus Torvalds secpath_reset(struct sk_buff *skb) 6141da177e4SLinus Torvalds { 6151da177e4SLinus Torvalds #ifdef CONFIG_XFRM 6161da177e4SLinus Torvalds secpath_put(skb->sp); 6171da177e4SLinus Torvalds skb->sp = NULL; 6181da177e4SLinus Torvalds #endif 6191da177e4SLinus Torvalds } 6201da177e4SLinus Torvalds 6211da177e4SLinus Torvalds static inline int 622a1e59abfSPatrick McHardy xfrm_addr_any(xfrm_address_t *addr, unsigned short family) 623a1e59abfSPatrick McHardy { 624a1e59abfSPatrick McHardy switch (family) { 625a1e59abfSPatrick McHardy case AF_INET: 626a1e59abfSPatrick McHardy return addr->a4 == 0; 627a1e59abfSPatrick McHardy case AF_INET6: 628a1e59abfSPatrick McHardy return ipv6_addr_any((struct in6_addr *)&addr->a6); 629a1e59abfSPatrick McHardy } 630a1e59abfSPatrick McHardy return 0; 631a1e59abfSPatrick McHardy } 632a1e59abfSPatrick McHardy 633a1e59abfSPatrick McHardy static inline int 6341da177e4SLinus Torvalds __xfrm4_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x) 6351da177e4SLinus Torvalds { 6361da177e4SLinus Torvalds return (tmpl->saddr.a4 && 6371da177e4SLinus Torvalds tmpl->saddr.a4 != x->props.saddr.a4); 6381da177e4SLinus Torvalds } 6391da177e4SLinus Torvalds 6401da177e4SLinus Torvalds static inline int 6411da177e4SLinus Torvalds __xfrm6_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x) 6421da177e4SLinus Torvalds { 6431da177e4SLinus Torvalds return (!ipv6_addr_any((struct in6_addr*)&tmpl->saddr) && 6441da177e4SLinus Torvalds ipv6_addr_cmp((struct in6_addr *)&tmpl->saddr, (struct in6_addr*)&x->props.saddr)); 6451da177e4SLinus Torvalds } 6461da177e4SLinus Torvalds 6471da177e4SLinus Torvalds static inline int 6481da177e4SLinus Torvalds xfrm_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x, unsigned short family) 6491da177e4SLinus Torvalds { 6501da177e4SLinus Torvalds switch (family) { 6511da177e4SLinus Torvalds case AF_INET: 6521da177e4SLinus Torvalds return __xfrm4_state_addr_cmp(tmpl, x); 6531da177e4SLinus Torvalds case AF_INET6: 6541da177e4SLinus Torvalds return __xfrm6_state_addr_cmp(tmpl, x); 6551da177e4SLinus Torvalds } 6561da177e4SLinus Torvalds return !0; 6571da177e4SLinus Torvalds } 6581da177e4SLinus Torvalds 6591da177e4SLinus Torvalds #ifdef CONFIG_XFRM 6601da177e4SLinus Torvalds 6611da177e4SLinus Torvalds extern int __xfrm_policy_check(struct sock *, int dir, struct sk_buff *skb, unsigned short family); 6621da177e4SLinus Torvalds 6631da177e4SLinus Torvalds static inline int xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) 6641da177e4SLinus Torvalds { 6651da177e4SLinus Torvalds if (sk && sk->sk_policy[XFRM_POLICY_IN]) 6661da177e4SLinus Torvalds return __xfrm_policy_check(sk, dir, skb, family); 6671da177e4SLinus Torvalds 6682518c7c2SDavid S. Miller return (!xfrm_policy_count[dir] && !skb->sp) || 6691da177e4SLinus Torvalds (skb->dst->flags & DST_NOPOLICY) || 6701da177e4SLinus Torvalds __xfrm_policy_check(sk, dir, skb, family); 6711da177e4SLinus Torvalds } 6721da177e4SLinus Torvalds 6731da177e4SLinus Torvalds static inline int xfrm4_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 6741da177e4SLinus Torvalds { 6751da177e4SLinus Torvalds return xfrm_policy_check(sk, dir, skb, AF_INET); 6761da177e4SLinus Torvalds } 6771da177e4SLinus Torvalds 6781da177e4SLinus Torvalds static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 6791da177e4SLinus Torvalds { 6801da177e4SLinus Torvalds return xfrm_policy_check(sk, dir, skb, AF_INET6); 6811da177e4SLinus Torvalds } 6821da177e4SLinus Torvalds 6833e3850e9SPatrick McHardy extern int xfrm_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family); 6841da177e4SLinus Torvalds extern int __xfrm_route_forward(struct sk_buff *skb, unsigned short family); 6851da177e4SLinus Torvalds 6861da177e4SLinus Torvalds static inline int xfrm_route_forward(struct sk_buff *skb, unsigned short family) 6871da177e4SLinus Torvalds { 6882518c7c2SDavid S. Miller return !xfrm_policy_count[XFRM_POLICY_OUT] || 6891da177e4SLinus Torvalds (skb->dst->flags & DST_NOXFRM) || 6901da177e4SLinus Torvalds __xfrm_route_forward(skb, family); 6911da177e4SLinus Torvalds } 6921da177e4SLinus Torvalds 6931da177e4SLinus Torvalds static inline int xfrm4_route_forward(struct sk_buff *skb) 6941da177e4SLinus Torvalds { 6951da177e4SLinus Torvalds return xfrm_route_forward(skb, AF_INET); 6961da177e4SLinus Torvalds } 6971da177e4SLinus Torvalds 6981da177e4SLinus Torvalds static inline int xfrm6_route_forward(struct sk_buff *skb) 6991da177e4SLinus Torvalds { 7001da177e4SLinus Torvalds return xfrm_route_forward(skb, AF_INET6); 7011da177e4SLinus Torvalds } 7021da177e4SLinus Torvalds 7031da177e4SLinus Torvalds extern int __xfrm_sk_clone_policy(struct sock *sk); 7041da177e4SLinus Torvalds 7051da177e4SLinus Torvalds static inline int xfrm_sk_clone_policy(struct sock *sk) 7061da177e4SLinus Torvalds { 7071da177e4SLinus Torvalds if (unlikely(sk->sk_policy[0] || sk->sk_policy[1])) 7081da177e4SLinus Torvalds return __xfrm_sk_clone_policy(sk); 7091da177e4SLinus Torvalds return 0; 7101da177e4SLinus Torvalds } 7111da177e4SLinus Torvalds 7124666faabSHerbert Xu extern int xfrm_policy_delete(struct xfrm_policy *pol, int dir); 7131da177e4SLinus Torvalds 7141da177e4SLinus Torvalds static inline void xfrm_sk_free_policy(struct sock *sk) 7151da177e4SLinus Torvalds { 7161da177e4SLinus Torvalds if (unlikely(sk->sk_policy[0] != NULL)) { 7171da177e4SLinus Torvalds xfrm_policy_delete(sk->sk_policy[0], XFRM_POLICY_MAX); 7181da177e4SLinus Torvalds sk->sk_policy[0] = NULL; 7191da177e4SLinus Torvalds } 7201da177e4SLinus Torvalds if (unlikely(sk->sk_policy[1] != NULL)) { 7211da177e4SLinus Torvalds xfrm_policy_delete(sk->sk_policy[1], XFRM_POLICY_MAX+1); 7221da177e4SLinus Torvalds sk->sk_policy[1] = NULL; 7231da177e4SLinus Torvalds } 7241da177e4SLinus Torvalds } 7251da177e4SLinus Torvalds 7261da177e4SLinus Torvalds #else 7271da177e4SLinus Torvalds 7281da177e4SLinus Torvalds static inline void xfrm_sk_free_policy(struct sock *sk) {} 7291da177e4SLinus Torvalds static inline int xfrm_sk_clone_policy(struct sock *sk) { return 0; } 7301da177e4SLinus Torvalds static inline int xfrm6_route_forward(struct sk_buff *skb) { return 1; } 7311da177e4SLinus Torvalds static inline int xfrm4_route_forward(struct sk_buff *skb) { return 1; } 7321da177e4SLinus Torvalds static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 7331da177e4SLinus Torvalds { 7341da177e4SLinus Torvalds return 1; 7351da177e4SLinus Torvalds } 7361da177e4SLinus Torvalds static inline int xfrm4_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 7371da177e4SLinus Torvalds { 7381da177e4SLinus Torvalds return 1; 7391da177e4SLinus Torvalds } 7401da177e4SLinus Torvalds static inline int xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) 7411da177e4SLinus Torvalds { 7421da177e4SLinus Torvalds return 1; 7431da177e4SLinus Torvalds } 7441da177e4SLinus Torvalds #endif 7451da177e4SLinus Torvalds 7461da177e4SLinus Torvalds static __inline__ 7471da177e4SLinus Torvalds xfrm_address_t *xfrm_flowi_daddr(struct flowi *fl, unsigned short family) 7481da177e4SLinus Torvalds { 7491da177e4SLinus Torvalds switch (family){ 7501da177e4SLinus Torvalds case AF_INET: 7511da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl4_dst; 7521da177e4SLinus Torvalds case AF_INET6: 7531da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl6_dst; 7541da177e4SLinus Torvalds } 7551da177e4SLinus Torvalds return NULL; 7561da177e4SLinus Torvalds } 7571da177e4SLinus Torvalds 7581da177e4SLinus Torvalds static __inline__ 7591da177e4SLinus Torvalds xfrm_address_t *xfrm_flowi_saddr(struct flowi *fl, unsigned short family) 7601da177e4SLinus Torvalds { 7611da177e4SLinus Torvalds switch (family){ 7621da177e4SLinus Torvalds case AF_INET: 7631da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl4_src; 7641da177e4SLinus Torvalds case AF_INET6: 7651da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl6_src; 7661da177e4SLinus Torvalds } 7671da177e4SLinus Torvalds return NULL; 7681da177e4SLinus Torvalds } 7691da177e4SLinus Torvalds 7701da177e4SLinus Torvalds static __inline__ int 7711da177e4SLinus Torvalds __xfrm4_state_addr_check(struct xfrm_state *x, 7721da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr) 7731da177e4SLinus Torvalds { 7741da177e4SLinus Torvalds if (daddr->a4 == x->id.daddr.a4 && 7751da177e4SLinus Torvalds (saddr->a4 == x->props.saddr.a4 || !saddr->a4 || !x->props.saddr.a4)) 7761da177e4SLinus Torvalds return 1; 7771da177e4SLinus Torvalds return 0; 7781da177e4SLinus Torvalds } 7791da177e4SLinus Torvalds 7801da177e4SLinus Torvalds static __inline__ int 7811da177e4SLinus Torvalds __xfrm6_state_addr_check(struct xfrm_state *x, 7821da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr) 7831da177e4SLinus Torvalds { 7841da177e4SLinus Torvalds if (!ipv6_addr_cmp((struct in6_addr *)daddr, (struct in6_addr *)&x->id.daddr) && 7851da177e4SLinus Torvalds (!ipv6_addr_cmp((struct in6_addr *)saddr, (struct in6_addr *)&x->props.saddr)|| 7861da177e4SLinus Torvalds ipv6_addr_any((struct in6_addr *)saddr) || 7871da177e4SLinus Torvalds ipv6_addr_any((struct in6_addr *)&x->props.saddr))) 7881da177e4SLinus Torvalds return 1; 7891da177e4SLinus Torvalds return 0; 7901da177e4SLinus Torvalds } 7911da177e4SLinus Torvalds 7921da177e4SLinus Torvalds static __inline__ int 7931da177e4SLinus Torvalds xfrm_state_addr_check(struct xfrm_state *x, 7941da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr, 7951da177e4SLinus Torvalds unsigned short family) 7961da177e4SLinus Torvalds { 7971da177e4SLinus Torvalds switch (family) { 7981da177e4SLinus Torvalds case AF_INET: 7991da177e4SLinus Torvalds return __xfrm4_state_addr_check(x, daddr, saddr); 8001da177e4SLinus Torvalds case AF_INET6: 8011da177e4SLinus Torvalds return __xfrm6_state_addr_check(x, daddr, saddr); 8021da177e4SLinus Torvalds } 8031da177e4SLinus Torvalds return 0; 8041da177e4SLinus Torvalds } 8051da177e4SLinus Torvalds 806e53820deSMasahide NAKAMURA static __inline__ int 807e53820deSMasahide NAKAMURA xfrm_state_addr_flow_check(struct xfrm_state *x, struct flowi *fl, 808e53820deSMasahide NAKAMURA unsigned short family) 809e53820deSMasahide NAKAMURA { 810e53820deSMasahide NAKAMURA switch (family) { 811e53820deSMasahide NAKAMURA case AF_INET: 812e53820deSMasahide NAKAMURA return __xfrm4_state_addr_check(x, 813e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl4_dst, 814e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl4_src); 815e53820deSMasahide NAKAMURA case AF_INET6: 816e53820deSMasahide NAKAMURA return __xfrm6_state_addr_check(x, 817e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl6_dst, 818e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl6_src); 819e53820deSMasahide NAKAMURA } 820e53820deSMasahide NAKAMURA return 0; 821e53820deSMasahide NAKAMURA } 822e53820deSMasahide NAKAMURA 8231da177e4SLinus Torvalds static inline int xfrm_state_kern(struct xfrm_state *x) 8241da177e4SLinus Torvalds { 8251da177e4SLinus Torvalds return atomic_read(&x->tunnel_users); 8261da177e4SLinus Torvalds } 8271da177e4SLinus Torvalds 8285794708fSMasahide NAKAMURA static inline int xfrm_id_proto_match(u8 proto, u8 userproto) 8295794708fSMasahide NAKAMURA { 830dc00a525SMasahide NAKAMURA return (!userproto || proto == userproto || 831dc00a525SMasahide NAKAMURA (userproto == IPSEC_PROTO_ANY && (proto == IPPROTO_AH || 832dc00a525SMasahide NAKAMURA proto == IPPROTO_ESP || 833dc00a525SMasahide NAKAMURA proto == IPPROTO_COMP))); 8345794708fSMasahide NAKAMURA } 8355794708fSMasahide NAKAMURA 8361da177e4SLinus Torvalds /* 8371da177e4SLinus Torvalds * xfrm algorithm information 8381da177e4SLinus Torvalds */ 8391da177e4SLinus Torvalds struct xfrm_algo_auth_info { 8401da177e4SLinus Torvalds u16 icv_truncbits; 8411da177e4SLinus Torvalds u16 icv_fullbits; 8421da177e4SLinus Torvalds }; 8431da177e4SLinus Torvalds 8441da177e4SLinus Torvalds struct xfrm_algo_encr_info { 8451da177e4SLinus Torvalds u16 blockbits; 8461da177e4SLinus Torvalds u16 defkeybits; 8471da177e4SLinus Torvalds }; 8481da177e4SLinus Torvalds 8491da177e4SLinus Torvalds struct xfrm_algo_comp_info { 8501da177e4SLinus Torvalds u16 threshold; 8511da177e4SLinus Torvalds }; 8521da177e4SLinus Torvalds 8531da177e4SLinus Torvalds struct xfrm_algo_desc { 8541da177e4SLinus Torvalds char *name; 85504ff1260SHerbert Xu char *compat; 8561da177e4SLinus Torvalds u8 available:1; 8571da177e4SLinus Torvalds union { 8581da177e4SLinus Torvalds struct xfrm_algo_auth_info auth; 8591da177e4SLinus Torvalds struct xfrm_algo_encr_info encr; 8601da177e4SLinus Torvalds struct xfrm_algo_comp_info comp; 8611da177e4SLinus Torvalds } uinfo; 8621da177e4SLinus Torvalds struct sadb_alg desc; 8631da177e4SLinus Torvalds }; 8641da177e4SLinus Torvalds 8651da177e4SLinus Torvalds /* XFRM tunnel handlers. */ 8661da177e4SLinus Torvalds struct xfrm_tunnel { 8671da177e4SLinus Torvalds int (*handler)(struct sk_buff *skb); 868d2acc347SHerbert Xu int (*err_handler)(struct sk_buff *skb, __u32 info); 869d2acc347SHerbert Xu 870d2acc347SHerbert Xu struct xfrm_tunnel *next; 871d2acc347SHerbert Xu int priority; 8721da177e4SLinus Torvalds }; 8731da177e4SLinus Torvalds 8741da177e4SLinus Torvalds struct xfrm6_tunnel { 875d2acc347SHerbert Xu int (*handler)(struct sk_buff *skb); 876d2acc347SHerbert Xu int (*err_handler)(struct sk_buff *skb, struct inet6_skb_parm *opt, 87704ce6909SAl Viro int type, int code, int offset, __be32 info); 878d2acc347SHerbert Xu struct xfrm6_tunnel *next; 879d2acc347SHerbert Xu int priority; 8801da177e4SLinus Torvalds }; 8811da177e4SLinus Torvalds 8821da177e4SLinus Torvalds extern void xfrm_init(void); 8831da177e4SLinus Torvalds extern void xfrm4_init(void); 8841da177e4SLinus Torvalds extern void xfrm6_init(void); 8851da177e4SLinus Torvalds extern void xfrm6_fini(void); 8861da177e4SLinus Torvalds extern void xfrm_state_init(void); 8871da177e4SLinus Torvalds extern void xfrm4_state_init(void); 8881da177e4SLinus Torvalds extern void xfrm6_state_init(void); 8891da177e4SLinus Torvalds extern void xfrm6_state_fini(void); 8901da177e4SLinus Torvalds 8911da177e4SLinus Torvalds extern int xfrm_state_walk(u8 proto, int (*func)(struct xfrm_state *, int, void*), void *); 8921da177e4SLinus Torvalds extern struct xfrm_state *xfrm_state_alloc(void); 8931da177e4SLinus Torvalds extern struct xfrm_state *xfrm_state_find(xfrm_address_t *daddr, xfrm_address_t *saddr, 8941da177e4SLinus Torvalds struct flowi *fl, struct xfrm_tmpl *tmpl, 8951da177e4SLinus Torvalds struct xfrm_policy *pol, int *err, 8961da177e4SLinus Torvalds unsigned short family); 8971da177e4SLinus Torvalds extern int xfrm_state_check_expire(struct xfrm_state *x); 8981da177e4SLinus Torvalds extern void xfrm_state_insert(struct xfrm_state *x); 8991da177e4SLinus Torvalds extern int xfrm_state_add(struct xfrm_state *x); 9001da177e4SLinus Torvalds extern int xfrm_state_update(struct xfrm_state *x); 901a94cfd19SAl Viro extern struct xfrm_state *xfrm_state_lookup(xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family); 902eb2971b6SMasahide NAKAMURA extern struct xfrm_state *xfrm_state_lookup_byaddr(xfrm_address_t *daddr, xfrm_address_t *saddr, u8 proto, unsigned short family); 90341a49cc3SMasahide NAKAMURA #ifdef CONFIG_XFRM_SUB_POLICY 90441a49cc3SMasahide NAKAMURA extern int xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, 90541a49cc3SMasahide NAKAMURA int n, unsigned short family); 90641a49cc3SMasahide NAKAMURA extern int xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, 90741a49cc3SMasahide NAKAMURA int n, unsigned short family); 90841a49cc3SMasahide NAKAMURA #else 90941a49cc3SMasahide NAKAMURA static inline int xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, 91041a49cc3SMasahide NAKAMURA int n, unsigned short family) 91141a49cc3SMasahide NAKAMURA { 91241a49cc3SMasahide NAKAMURA return -ENOSYS; 91341a49cc3SMasahide NAKAMURA } 91441a49cc3SMasahide NAKAMURA 91541a49cc3SMasahide NAKAMURA static inline int xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, 91641a49cc3SMasahide NAKAMURA int n, unsigned short family) 91741a49cc3SMasahide NAKAMURA { 91841a49cc3SMasahide NAKAMURA return -ENOSYS; 91941a49cc3SMasahide NAKAMURA } 92041a49cc3SMasahide NAKAMURA #endif 9211da177e4SLinus Torvalds extern struct xfrm_state *xfrm_find_acq_byseq(u32 seq); 92226b15dadSJamal Hadi Salim extern int xfrm_state_delete(struct xfrm_state *x); 923161a09e7SJoy Latten extern void xfrm_state_flush(u8 proto, struct xfrm_audit *audit_info); 924a252cc23SAl Viro extern int xfrm_replay_check(struct xfrm_state *x, __be32 seq); 92561f4627bSAl Viro extern void xfrm_replay_advance(struct xfrm_state *x, __be32 seq); 926f8cd5488SJamal Hadi Salim extern void xfrm_replay_notify(struct xfrm_state *x, int event); 9271da177e4SLinus Torvalds extern int xfrm_state_check(struct xfrm_state *x, struct sk_buff *skb); 9281da177e4SLinus Torvalds extern int xfrm_state_mtu(struct xfrm_state *x, int mtu); 92972cb6962SHerbert Xu extern int xfrm_init_state(struct xfrm_state *x); 9301da177e4SLinus Torvalds extern int xfrm4_rcv(struct sk_buff *skb); 9311da177e4SLinus Torvalds extern int xfrm4_output(struct sk_buff *skb); 9321da177e4SLinus Torvalds extern int xfrm4_tunnel_register(struct xfrm_tunnel *handler); 9331da177e4SLinus Torvalds extern int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler); 934a252cc23SAl Viro extern int xfrm6_rcv_spi(struct sk_buff *skb, __be32 spi); 935951dbc8aSPatrick McHardy extern int xfrm6_rcv(struct sk_buff **pskb); 936fbd9a5b4SMasahide NAKAMURA extern int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr, 937fbd9a5b4SMasahide NAKAMURA xfrm_address_t *saddr, u8 proto); 9381da177e4SLinus Torvalds extern int xfrm6_tunnel_register(struct xfrm6_tunnel *handler); 9391da177e4SLinus Torvalds extern int xfrm6_tunnel_deregister(struct xfrm6_tunnel *handler); 9408c689a6eSAl Viro extern __be32 xfrm6_tunnel_alloc_spi(xfrm_address_t *saddr); 9411da177e4SLinus Torvalds extern void xfrm6_tunnel_free_spi(xfrm_address_t *saddr); 9428c689a6eSAl Viro extern __be32 xfrm6_tunnel_spi_lookup(xfrm_address_t *saddr); 9431da177e4SLinus Torvalds extern int xfrm6_output(struct sk_buff *skb); 944aee5adb4SMasahide NAKAMURA extern int xfrm6_find_1stfragopt(struct xfrm_state *x, struct sk_buff *skb, 945aee5adb4SMasahide NAKAMURA u8 **prevhdr); 9461da177e4SLinus Torvalds 9471da177e4SLinus Torvalds #ifdef CONFIG_XFRM 9481da177e4SLinus Torvalds extern int xfrm4_rcv_encap(struct sk_buff *skb, __u16 encap_type); 9491da177e4SLinus Torvalds extern int xfrm_user_policy(struct sock *sk, int optname, u8 __user *optval, int optlen); 9501da177e4SLinus Torvalds extern int xfrm_dst_lookup(struct xfrm_dst **dst, struct flowi *fl, unsigned short family); 9511da177e4SLinus Torvalds #else 9521da177e4SLinus Torvalds static inline int xfrm_user_policy(struct sock *sk, int optname, u8 __user *optval, int optlen) 9531da177e4SLinus Torvalds { 9541da177e4SLinus Torvalds return -ENOPROTOOPT; 9551da177e4SLinus Torvalds } 9561da177e4SLinus Torvalds 9571da177e4SLinus Torvalds static inline int xfrm4_rcv_encap(struct sk_buff *skb, __u16 encap_type) 9581da177e4SLinus Torvalds { 9591da177e4SLinus Torvalds /* should not happen */ 9601da177e4SLinus Torvalds kfree_skb(skb); 9611da177e4SLinus Torvalds return 0; 9621da177e4SLinus Torvalds } 9631da177e4SLinus Torvalds static inline int xfrm_dst_lookup(struct xfrm_dst **dst, struct flowi *fl, unsigned short family) 9641da177e4SLinus Torvalds { 9651da177e4SLinus Torvalds return -EINVAL; 9661da177e4SLinus Torvalds } 9671da177e4SLinus Torvalds #endif 9681da177e4SLinus Torvalds 969dd0fc66fSAl Viro struct xfrm_policy *xfrm_policy_alloc(gfp_t gfp); 9704e81bb83SMasahide NAKAMURA extern int xfrm_policy_walk(u8 type, int (*func)(struct xfrm_policy *, int, int, void*), void *); 9711da177e4SLinus Torvalds int xfrm_policy_insert(int dir, struct xfrm_policy *policy, int excl); 9724e81bb83SMasahide NAKAMURA struct xfrm_policy *xfrm_policy_bysel_ctx(u8 type, int dir, 9734e81bb83SMasahide NAKAMURA struct xfrm_selector *sel, 974df71837dSTrent Jaeger struct xfrm_sec_ctx *ctx, int delete); 9754e81bb83SMasahide NAKAMURA struct xfrm_policy *xfrm_policy_byid(u8, int dir, u32 id, int delete); 976161a09e7SJoy Latten void xfrm_policy_flush(u8 type, struct xfrm_audit *audit_info); 9771da177e4SLinus Torvalds u32 xfrm_get_acqseq(void); 97826977b4eSAl Viro void xfrm_alloc_spi(struct xfrm_state *x, __be32 minspi, __be32 maxspi); 9791da177e4SLinus Torvalds struct xfrm_state * xfrm_find_acq(u8 mode, u32 reqid, u8 proto, 9801da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr, 9811da177e4SLinus Torvalds int create, unsigned short family); 982161a09e7SJoy Latten extern void xfrm_policy_flush(u8 type, struct xfrm_audit *audit_info); 9831da177e4SLinus Torvalds extern int xfrm_sk_policy_insert(struct sock *sk, int dir, struct xfrm_policy *pol); 9845b368e61SVenkat Yekkirala extern int xfrm_bundle_ok(struct xfrm_policy *pol, struct xfrm_dst *xdst, 9855b368e61SVenkat Yekkirala struct flowi *fl, int family, int strict); 9861da177e4SLinus Torvalds extern void xfrm_init_pmtu(struct dst_entry *dst); 9871da177e4SLinus Torvalds 9881da177e4SLinus Torvalds extern wait_queue_head_t km_waitq; 9895d36b180SAl Viro extern int km_new_mapping(struct xfrm_state *x, xfrm_address_t *ipaddr, __be16 sport); 9906c5c8ca7SJamal Hadi Salim extern void km_policy_expired(struct xfrm_policy *pol, int dir, int hard, u32 pid); 99197a64b45SMasahide NAKAMURA extern int km_report(u8 proto, struct xfrm_selector *sel, xfrm_address_t *addr); 9921da177e4SLinus Torvalds 9931da177e4SLinus Torvalds extern void xfrm_input_init(void); 9946067b2baSAl Viro extern int xfrm_parse_spi(struct sk_buff *skb, u8 nexthdr, __be32 *spi, __be32 *seq); 9951da177e4SLinus Torvalds 9961da177e4SLinus Torvalds extern void xfrm_probe_algs(void); 9971da177e4SLinus Torvalds extern int xfrm_count_auth_supported(void); 9981da177e4SLinus Torvalds extern int xfrm_count_enc_supported(void); 9991da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byidx(unsigned int idx); 10001da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byidx(unsigned int idx); 10011da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byid(int alg_id); 10021da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byid(int alg_id); 10031da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_calg_get_byid(int alg_id); 10041da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byname(char *name, int probe); 10051da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byname(char *name, int probe); 10061da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_calg_get_byname(char *name, int probe); 10071da177e4SLinus Torvalds 100807d4ee58SHerbert Xu struct hash_desc; 10099409f38aSHerbert Xu struct scatterlist; 101007d4ee58SHerbert Xu typedef int (icv_update_fn_t)(struct hash_desc *, struct scatterlist *, 101107d4ee58SHerbert Xu unsigned int); 10121da177e4SLinus Torvalds 101307d4ee58SHerbert Xu extern int skb_icv_walk(const struct sk_buff *skb, struct hash_desc *tfm, 10141da177e4SLinus Torvalds int offset, int len, icv_update_fn_t icv_update); 10151da177e4SLinus Torvalds 10161da177e4SLinus Torvalds static inline int xfrm_addr_cmp(xfrm_address_t *a, xfrm_address_t *b, 10171da177e4SLinus Torvalds int family) 10181da177e4SLinus Torvalds { 10191da177e4SLinus Torvalds switch (family) { 10201da177e4SLinus Torvalds default: 10211da177e4SLinus Torvalds case AF_INET: 10228c689a6eSAl Viro return (__force __u32)a->a4 - (__force __u32)b->a4; 10231da177e4SLinus Torvalds case AF_INET6: 10241da177e4SLinus Torvalds return ipv6_addr_cmp((struct in6_addr *)a, 10251da177e4SLinus Torvalds (struct in6_addr *)b); 10261da177e4SLinus Torvalds } 10271da177e4SLinus Torvalds } 10281da177e4SLinus Torvalds 102977d8d7a6SHerbert Xu static inline int xfrm_policy_id2dir(u32 index) 103077d8d7a6SHerbert Xu { 103177d8d7a6SHerbert Xu return index & 7; 103277d8d7a6SHerbert Xu } 103377d8d7a6SHerbert Xu 1034f8cd5488SJamal Hadi Salim static inline int xfrm_aevent_is_on(void) 1035f8cd5488SJamal Hadi Salim { 1036be33690dSPatrick McHardy struct sock *nlsk; 1037be33690dSPatrick McHardy int ret = 0; 1038be33690dSPatrick McHardy 1039be33690dSPatrick McHardy rcu_read_lock(); 1040be33690dSPatrick McHardy nlsk = rcu_dereference(xfrm_nl); 1041be33690dSPatrick McHardy if (nlsk) 1042be33690dSPatrick McHardy ret = netlink_has_listeners(nlsk, XFRMNLGRP_AEVENTS); 1043be33690dSPatrick McHardy rcu_read_unlock(); 1044be33690dSPatrick McHardy return ret; 1045f8cd5488SJamal Hadi Salim } 1046f8cd5488SJamal Hadi Salim 1047f8cd5488SJamal Hadi Salim static inline void xfrm_aevent_doreplay(struct xfrm_state *x) 1048f8cd5488SJamal Hadi Salim { 1049f8cd5488SJamal Hadi Salim if (xfrm_aevent_is_on()) 1050f8cd5488SJamal Hadi Salim xfrm_replay_notify(x, XFRM_REPLAY_UPDATE); 1051f8cd5488SJamal Hadi Salim } 1052f8cd5488SJamal Hadi Salim 1053f8cd5488SJamal Hadi Salim 10541da177e4SLinus Torvalds #endif /* _NET_XFRM_H */ 1055