xfrm_replay.c 19 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * xfrm_replay.c - xfrm replay detection, derived from xfrm_state.c.
  4. *
  5. * Copyright (C) 2010 secunet Security Networks AG
  6. * Copyright (C) 2010 Steffen Klassert <[email protected]>
  7. */
  8. #include <linux/export.h>
  9. #include <net/xfrm.h>
  10. u32 xfrm_replay_seqhi(struct xfrm_state *x, __be32 net_seq)
  11. {
  12. u32 seq, seq_hi, bottom;
  13. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  14. if (!(x->props.flags & XFRM_STATE_ESN))
  15. return 0;
  16. seq = ntohl(net_seq);
  17. seq_hi = replay_esn->seq_hi;
  18. bottom = replay_esn->seq - replay_esn->replay_window + 1;
  19. if (likely(replay_esn->seq >= replay_esn->replay_window - 1)) {
  20. /* A. same subspace */
  21. if (unlikely(seq < bottom))
  22. seq_hi++;
  23. } else {
  24. /* B. window spans two subspaces */
  25. if (unlikely(seq >= bottom))
  26. seq_hi--;
  27. }
  28. return seq_hi;
  29. }
  30. EXPORT_SYMBOL(xfrm_replay_seqhi);
  31. static void xfrm_replay_notify_bmp(struct xfrm_state *x, int event);
  32. static void xfrm_replay_notify_esn(struct xfrm_state *x, int event);
  33. void xfrm_replay_notify(struct xfrm_state *x, int event)
  34. {
  35. struct km_event c;
  36. /* we send notify messages in case
  37. * 1. we updated on of the sequence numbers, and the seqno difference
  38. * is at least x->replay_maxdiff, in this case we also update the
  39. * timeout of our timer function
  40. * 2. if x->replay_maxage has elapsed since last update,
  41. * and there were changes
  42. *
  43. * The state structure must be locked!
  44. */
  45. switch (x->repl_mode) {
  46. case XFRM_REPLAY_MODE_LEGACY:
  47. break;
  48. case XFRM_REPLAY_MODE_BMP:
  49. xfrm_replay_notify_bmp(x, event);
  50. return;
  51. case XFRM_REPLAY_MODE_ESN:
  52. xfrm_replay_notify_esn(x, event);
  53. return;
  54. }
  55. switch (event) {
  56. case XFRM_REPLAY_UPDATE:
  57. if (!x->replay_maxdiff ||
  58. ((x->replay.seq - x->preplay.seq < x->replay_maxdiff) &&
  59. (x->replay.oseq - x->preplay.oseq < x->replay_maxdiff))) {
  60. if (x->xflags & XFRM_TIME_DEFER)
  61. event = XFRM_REPLAY_TIMEOUT;
  62. else
  63. return;
  64. }
  65. break;
  66. case XFRM_REPLAY_TIMEOUT:
  67. if (memcmp(&x->replay, &x->preplay,
  68. sizeof(struct xfrm_replay_state)) == 0) {
  69. x->xflags |= XFRM_TIME_DEFER;
  70. return;
  71. }
  72. break;
  73. }
  74. memcpy(&x->preplay, &x->replay, sizeof(struct xfrm_replay_state));
  75. c.event = XFRM_MSG_NEWAE;
  76. c.data.aevent = event;
  77. km_state_notify(x, &c);
  78. if (x->replay_maxage &&
  79. !mod_timer(&x->rtimer, jiffies + x->replay_maxage))
  80. x->xflags &= ~XFRM_TIME_DEFER;
  81. }
  82. static int __xfrm_replay_overflow(struct xfrm_state *x, struct sk_buff *skb)
  83. {
  84. int err = 0;
  85. struct net *net = xs_net(x);
  86. if (x->type->flags & XFRM_TYPE_REPLAY_PROT) {
  87. XFRM_SKB_CB(skb)->seq.output.low = ++x->replay.oseq;
  88. XFRM_SKB_CB(skb)->seq.output.hi = 0;
  89. if (unlikely(x->replay.oseq == 0) &&
  90. !(x->props.extra_flags & XFRM_SA_XFLAG_OSEQ_MAY_WRAP)) {
  91. x->replay.oseq--;
  92. xfrm_audit_state_replay_overflow(x, skb);
  93. err = -EOVERFLOW;
  94. return err;
  95. }
  96. if (xfrm_aevent_is_on(net))
  97. xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
  98. }
  99. return err;
  100. }
  101. static int xfrm_replay_check_legacy(struct xfrm_state *x,
  102. struct sk_buff *skb, __be32 net_seq)
  103. {
  104. u32 diff;
  105. u32 seq = ntohl(net_seq);
  106. if (!x->props.replay_window)
  107. return 0;
  108. if (unlikely(seq == 0))
  109. goto err;
  110. if (likely(seq > x->replay.seq))
  111. return 0;
  112. diff = x->replay.seq - seq;
  113. if (diff >= x->props.replay_window) {
  114. x->stats.replay_window++;
  115. goto err;
  116. }
  117. if (x->replay.bitmap & (1U << diff)) {
  118. x->stats.replay++;
  119. goto err;
  120. }
  121. return 0;
  122. err:
  123. xfrm_audit_state_replay(x, skb, net_seq);
  124. return -EINVAL;
  125. }
  126. static void xfrm_replay_advance_bmp(struct xfrm_state *x, __be32 net_seq);
  127. static void xfrm_replay_advance_esn(struct xfrm_state *x, __be32 net_seq);
  128. void xfrm_replay_advance(struct xfrm_state *x, __be32 net_seq)
  129. {
  130. u32 diff, seq;
  131. switch (x->repl_mode) {
  132. case XFRM_REPLAY_MODE_LEGACY:
  133. break;
  134. case XFRM_REPLAY_MODE_BMP:
  135. return xfrm_replay_advance_bmp(x, net_seq);
  136. case XFRM_REPLAY_MODE_ESN:
  137. return xfrm_replay_advance_esn(x, net_seq);
  138. }
  139. if (!x->props.replay_window)
  140. return;
  141. seq = ntohl(net_seq);
  142. if (seq > x->replay.seq) {
  143. diff = seq - x->replay.seq;
  144. if (diff < x->props.replay_window)
  145. x->replay.bitmap = ((x->replay.bitmap) << diff) | 1;
  146. else
  147. x->replay.bitmap = 1;
  148. x->replay.seq = seq;
  149. } else {
  150. diff = x->replay.seq - seq;
  151. x->replay.bitmap |= (1U << diff);
  152. }
  153. if (xfrm_aevent_is_on(xs_net(x)))
  154. xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
  155. }
  156. static int xfrm_replay_overflow_bmp(struct xfrm_state *x, struct sk_buff *skb)
  157. {
  158. int err = 0;
  159. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  160. struct net *net = xs_net(x);
  161. if (x->type->flags & XFRM_TYPE_REPLAY_PROT) {
  162. XFRM_SKB_CB(skb)->seq.output.low = ++replay_esn->oseq;
  163. XFRM_SKB_CB(skb)->seq.output.hi = 0;
  164. if (unlikely(replay_esn->oseq == 0) &&
  165. !(x->props.extra_flags & XFRM_SA_XFLAG_OSEQ_MAY_WRAP)) {
  166. replay_esn->oseq--;
  167. xfrm_audit_state_replay_overflow(x, skb);
  168. err = -EOVERFLOW;
  169. return err;
  170. }
  171. if (xfrm_aevent_is_on(net))
  172. xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
  173. }
  174. return err;
  175. }
  176. static int xfrm_replay_check_bmp(struct xfrm_state *x,
  177. struct sk_buff *skb, __be32 net_seq)
  178. {
  179. unsigned int bitnr, nr;
  180. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  181. u32 pos;
  182. u32 seq = ntohl(net_seq);
  183. u32 diff = replay_esn->seq - seq;
  184. if (!replay_esn->replay_window)
  185. return 0;
  186. if (unlikely(seq == 0))
  187. goto err;
  188. if (likely(seq > replay_esn->seq))
  189. return 0;
  190. if (diff >= replay_esn->replay_window) {
  191. x->stats.replay_window++;
  192. goto err;
  193. }
  194. pos = (replay_esn->seq - 1) % replay_esn->replay_window;
  195. if (pos >= diff)
  196. bitnr = (pos - diff) % replay_esn->replay_window;
  197. else
  198. bitnr = replay_esn->replay_window - (diff - pos);
  199. nr = bitnr >> 5;
  200. bitnr = bitnr & 0x1F;
  201. if (replay_esn->bmp[nr] & (1U << bitnr))
  202. goto err_replay;
  203. return 0;
  204. err_replay:
  205. x->stats.replay++;
  206. err:
  207. xfrm_audit_state_replay(x, skb, net_seq);
  208. return -EINVAL;
  209. }
  210. static void xfrm_replay_advance_bmp(struct xfrm_state *x, __be32 net_seq)
  211. {
  212. unsigned int bitnr, nr, i;
  213. u32 diff;
  214. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  215. u32 seq = ntohl(net_seq);
  216. u32 pos;
  217. if (!replay_esn->replay_window)
  218. return;
  219. pos = (replay_esn->seq - 1) % replay_esn->replay_window;
  220. if (seq > replay_esn->seq) {
  221. diff = seq - replay_esn->seq;
  222. if (diff < replay_esn->replay_window) {
  223. for (i = 1; i < diff; i++) {
  224. bitnr = (pos + i) % replay_esn->replay_window;
  225. nr = bitnr >> 5;
  226. bitnr = bitnr & 0x1F;
  227. replay_esn->bmp[nr] &= ~(1U << bitnr);
  228. }
  229. } else {
  230. nr = (replay_esn->replay_window - 1) >> 5;
  231. for (i = 0; i <= nr; i++)
  232. replay_esn->bmp[i] = 0;
  233. }
  234. bitnr = (pos + diff) % replay_esn->replay_window;
  235. replay_esn->seq = seq;
  236. } else {
  237. diff = replay_esn->seq - seq;
  238. if (pos >= diff)
  239. bitnr = (pos - diff) % replay_esn->replay_window;
  240. else
  241. bitnr = replay_esn->replay_window - (diff - pos);
  242. }
  243. nr = bitnr >> 5;
  244. bitnr = bitnr & 0x1F;
  245. replay_esn->bmp[nr] |= (1U << bitnr);
  246. if (xfrm_aevent_is_on(xs_net(x)))
  247. xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
  248. }
  249. static void xfrm_replay_notify_bmp(struct xfrm_state *x, int event)
  250. {
  251. struct km_event c;
  252. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  253. struct xfrm_replay_state_esn *preplay_esn = x->preplay_esn;
  254. /* we send notify messages in case
  255. * 1. we updated on of the sequence numbers, and the seqno difference
  256. * is at least x->replay_maxdiff, in this case we also update the
  257. * timeout of our timer function
  258. * 2. if x->replay_maxage has elapsed since last update,
  259. * and there were changes
  260. *
  261. * The state structure must be locked!
  262. */
  263. switch (event) {
  264. case XFRM_REPLAY_UPDATE:
  265. if (!x->replay_maxdiff ||
  266. ((replay_esn->seq - preplay_esn->seq < x->replay_maxdiff) &&
  267. (replay_esn->oseq - preplay_esn->oseq
  268. < x->replay_maxdiff))) {
  269. if (x->xflags & XFRM_TIME_DEFER)
  270. event = XFRM_REPLAY_TIMEOUT;
  271. else
  272. return;
  273. }
  274. break;
  275. case XFRM_REPLAY_TIMEOUT:
  276. if (memcmp(x->replay_esn, x->preplay_esn,
  277. xfrm_replay_state_esn_len(replay_esn)) == 0) {
  278. x->xflags |= XFRM_TIME_DEFER;
  279. return;
  280. }
  281. break;
  282. }
  283. memcpy(x->preplay_esn, x->replay_esn,
  284. xfrm_replay_state_esn_len(replay_esn));
  285. c.event = XFRM_MSG_NEWAE;
  286. c.data.aevent = event;
  287. km_state_notify(x, &c);
  288. if (x->replay_maxage &&
  289. !mod_timer(&x->rtimer, jiffies + x->replay_maxage))
  290. x->xflags &= ~XFRM_TIME_DEFER;
  291. }
  292. static void xfrm_replay_notify_esn(struct xfrm_state *x, int event)
  293. {
  294. u32 seq_diff, oseq_diff;
  295. struct km_event c;
  296. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  297. struct xfrm_replay_state_esn *preplay_esn = x->preplay_esn;
  298. /* we send notify messages in case
  299. * 1. we updated on of the sequence numbers, and the seqno difference
  300. * is at least x->replay_maxdiff, in this case we also update the
  301. * timeout of our timer function
  302. * 2. if x->replay_maxage has elapsed since last update,
  303. * and there were changes
  304. *
  305. * The state structure must be locked!
  306. */
  307. switch (event) {
  308. case XFRM_REPLAY_UPDATE:
  309. if (x->replay_maxdiff) {
  310. if (replay_esn->seq_hi == preplay_esn->seq_hi)
  311. seq_diff = replay_esn->seq - preplay_esn->seq;
  312. else
  313. seq_diff = ~preplay_esn->seq + replay_esn->seq
  314. + 1;
  315. if (replay_esn->oseq_hi == preplay_esn->oseq_hi)
  316. oseq_diff = replay_esn->oseq
  317. - preplay_esn->oseq;
  318. else
  319. oseq_diff = ~preplay_esn->oseq
  320. + replay_esn->oseq + 1;
  321. if (seq_diff >= x->replay_maxdiff ||
  322. oseq_diff >= x->replay_maxdiff)
  323. break;
  324. }
  325. if (x->xflags & XFRM_TIME_DEFER)
  326. event = XFRM_REPLAY_TIMEOUT;
  327. else
  328. return;
  329. break;
  330. case XFRM_REPLAY_TIMEOUT:
  331. if (memcmp(x->replay_esn, x->preplay_esn,
  332. xfrm_replay_state_esn_len(replay_esn)) == 0) {
  333. x->xflags |= XFRM_TIME_DEFER;
  334. return;
  335. }
  336. break;
  337. }
  338. memcpy(x->preplay_esn, x->replay_esn,
  339. xfrm_replay_state_esn_len(replay_esn));
  340. c.event = XFRM_MSG_NEWAE;
  341. c.data.aevent = event;
  342. km_state_notify(x, &c);
  343. if (x->replay_maxage &&
  344. !mod_timer(&x->rtimer, jiffies + x->replay_maxage))
  345. x->xflags &= ~XFRM_TIME_DEFER;
  346. }
  347. static int xfrm_replay_overflow_esn(struct xfrm_state *x, struct sk_buff *skb)
  348. {
  349. int err = 0;
  350. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  351. struct net *net = xs_net(x);
  352. if (x->type->flags & XFRM_TYPE_REPLAY_PROT) {
  353. XFRM_SKB_CB(skb)->seq.output.low = ++replay_esn->oseq;
  354. XFRM_SKB_CB(skb)->seq.output.hi = replay_esn->oseq_hi;
  355. if (unlikely(replay_esn->oseq == 0)) {
  356. XFRM_SKB_CB(skb)->seq.output.hi = ++replay_esn->oseq_hi;
  357. if (replay_esn->oseq_hi == 0) {
  358. replay_esn->oseq--;
  359. replay_esn->oseq_hi--;
  360. xfrm_audit_state_replay_overflow(x, skb);
  361. err = -EOVERFLOW;
  362. return err;
  363. }
  364. }
  365. if (xfrm_aevent_is_on(net))
  366. xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
  367. }
  368. return err;
  369. }
  370. static int xfrm_replay_check_esn(struct xfrm_state *x,
  371. struct sk_buff *skb, __be32 net_seq)
  372. {
  373. unsigned int bitnr, nr;
  374. u32 diff;
  375. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  376. u32 pos;
  377. u32 seq = ntohl(net_seq);
  378. u32 wsize = replay_esn->replay_window;
  379. u32 top = replay_esn->seq;
  380. u32 bottom = top - wsize + 1;
  381. if (!wsize)
  382. return 0;
  383. if (unlikely(seq == 0 && replay_esn->seq_hi == 0 &&
  384. (replay_esn->seq < replay_esn->replay_window - 1)))
  385. goto err;
  386. diff = top - seq;
  387. if (likely(top >= wsize - 1)) {
  388. /* A. same subspace */
  389. if (likely(seq > top) || seq < bottom)
  390. return 0;
  391. } else {
  392. /* B. window spans two subspaces */
  393. if (likely(seq > top && seq < bottom))
  394. return 0;
  395. if (seq >= bottom)
  396. diff = ~seq + top + 1;
  397. }
  398. if (diff >= replay_esn->replay_window) {
  399. x->stats.replay_window++;
  400. goto err;
  401. }
  402. pos = (replay_esn->seq - 1) % replay_esn->replay_window;
  403. if (pos >= diff)
  404. bitnr = (pos - diff) % replay_esn->replay_window;
  405. else
  406. bitnr = replay_esn->replay_window - (diff - pos);
  407. nr = bitnr >> 5;
  408. bitnr = bitnr & 0x1F;
  409. if (replay_esn->bmp[nr] & (1U << bitnr))
  410. goto err_replay;
  411. return 0;
  412. err_replay:
  413. x->stats.replay++;
  414. err:
  415. xfrm_audit_state_replay(x, skb, net_seq);
  416. return -EINVAL;
  417. }
  418. int xfrm_replay_check(struct xfrm_state *x,
  419. struct sk_buff *skb, __be32 net_seq)
  420. {
  421. switch (x->repl_mode) {
  422. case XFRM_REPLAY_MODE_LEGACY:
  423. break;
  424. case XFRM_REPLAY_MODE_BMP:
  425. return xfrm_replay_check_bmp(x, skb, net_seq);
  426. case XFRM_REPLAY_MODE_ESN:
  427. return xfrm_replay_check_esn(x, skb, net_seq);
  428. }
  429. return xfrm_replay_check_legacy(x, skb, net_seq);
  430. }
  431. static int xfrm_replay_recheck_esn(struct xfrm_state *x,
  432. struct sk_buff *skb, __be32 net_seq)
  433. {
  434. if (unlikely(XFRM_SKB_CB(skb)->seq.input.hi !=
  435. htonl(xfrm_replay_seqhi(x, net_seq)))) {
  436. x->stats.replay_window++;
  437. return -EINVAL;
  438. }
  439. return xfrm_replay_check_esn(x, skb, net_seq);
  440. }
  441. int xfrm_replay_recheck(struct xfrm_state *x,
  442. struct sk_buff *skb, __be32 net_seq)
  443. {
  444. switch (x->repl_mode) {
  445. case XFRM_REPLAY_MODE_LEGACY:
  446. break;
  447. case XFRM_REPLAY_MODE_BMP:
  448. /* no special recheck treatment */
  449. return xfrm_replay_check_bmp(x, skb, net_seq);
  450. case XFRM_REPLAY_MODE_ESN:
  451. return xfrm_replay_recheck_esn(x, skb, net_seq);
  452. }
  453. return xfrm_replay_check_legacy(x, skb, net_seq);
  454. }
  455. static void xfrm_replay_advance_esn(struct xfrm_state *x, __be32 net_seq)
  456. {
  457. unsigned int bitnr, nr, i;
  458. int wrap;
  459. u32 diff, pos, seq, seq_hi;
  460. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  461. if (!replay_esn->replay_window)
  462. return;
  463. seq = ntohl(net_seq);
  464. pos = (replay_esn->seq - 1) % replay_esn->replay_window;
  465. seq_hi = xfrm_replay_seqhi(x, net_seq);
  466. wrap = seq_hi - replay_esn->seq_hi;
  467. if ((!wrap && seq > replay_esn->seq) || wrap > 0) {
  468. if (likely(!wrap))
  469. diff = seq - replay_esn->seq;
  470. else
  471. diff = ~replay_esn->seq + seq + 1;
  472. if (diff < replay_esn->replay_window) {
  473. for (i = 1; i < diff; i++) {
  474. bitnr = (pos + i) % replay_esn->replay_window;
  475. nr = bitnr >> 5;
  476. bitnr = bitnr & 0x1F;
  477. replay_esn->bmp[nr] &= ~(1U << bitnr);
  478. }
  479. } else {
  480. nr = (replay_esn->replay_window - 1) >> 5;
  481. for (i = 0; i <= nr; i++)
  482. replay_esn->bmp[i] = 0;
  483. }
  484. bitnr = (pos + diff) % replay_esn->replay_window;
  485. replay_esn->seq = seq;
  486. if (unlikely(wrap > 0))
  487. replay_esn->seq_hi++;
  488. } else {
  489. diff = replay_esn->seq - seq;
  490. if (pos >= diff)
  491. bitnr = (pos - diff) % replay_esn->replay_window;
  492. else
  493. bitnr = replay_esn->replay_window - (diff - pos);
  494. }
  495. xfrm_dev_state_advance_esn(x);
  496. nr = bitnr >> 5;
  497. bitnr = bitnr & 0x1F;
  498. replay_esn->bmp[nr] |= (1U << bitnr);
  499. if (xfrm_aevent_is_on(xs_net(x)))
  500. xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
  501. }
  502. #ifdef CONFIG_XFRM_OFFLOAD
  503. static int xfrm_replay_overflow_offload(struct xfrm_state *x, struct sk_buff *skb)
  504. {
  505. int err = 0;
  506. struct net *net = xs_net(x);
  507. struct xfrm_offload *xo = xfrm_offload(skb);
  508. __u32 oseq = x->replay.oseq;
  509. if (!xo)
  510. return __xfrm_replay_overflow(x, skb);
  511. if (x->type->flags & XFRM_TYPE_REPLAY_PROT) {
  512. if (!skb_is_gso(skb)) {
  513. XFRM_SKB_CB(skb)->seq.output.low = ++oseq;
  514. xo->seq.low = oseq;
  515. } else {
  516. XFRM_SKB_CB(skb)->seq.output.low = oseq + 1;
  517. xo->seq.low = oseq + 1;
  518. oseq += skb_shinfo(skb)->gso_segs;
  519. }
  520. XFRM_SKB_CB(skb)->seq.output.hi = 0;
  521. xo->seq.hi = 0;
  522. if (unlikely(oseq < x->replay.oseq) &&
  523. !(x->props.extra_flags & XFRM_SA_XFLAG_OSEQ_MAY_WRAP)) {
  524. xfrm_audit_state_replay_overflow(x, skb);
  525. err = -EOVERFLOW;
  526. return err;
  527. }
  528. x->replay.oseq = oseq;
  529. if (xfrm_aevent_is_on(net))
  530. xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
  531. }
  532. return err;
  533. }
  534. static int xfrm_replay_overflow_offload_bmp(struct xfrm_state *x, struct sk_buff *skb)
  535. {
  536. int err = 0;
  537. struct xfrm_offload *xo = xfrm_offload(skb);
  538. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  539. struct net *net = xs_net(x);
  540. __u32 oseq = replay_esn->oseq;
  541. if (!xo)
  542. return xfrm_replay_overflow_bmp(x, skb);
  543. if (x->type->flags & XFRM_TYPE_REPLAY_PROT) {
  544. if (!skb_is_gso(skb)) {
  545. XFRM_SKB_CB(skb)->seq.output.low = ++oseq;
  546. xo->seq.low = oseq;
  547. } else {
  548. XFRM_SKB_CB(skb)->seq.output.low = oseq + 1;
  549. xo->seq.low = oseq + 1;
  550. oseq += skb_shinfo(skb)->gso_segs;
  551. }
  552. XFRM_SKB_CB(skb)->seq.output.hi = 0;
  553. xo->seq.hi = 0;
  554. if (unlikely(oseq < replay_esn->oseq) &&
  555. !(x->props.extra_flags & XFRM_SA_XFLAG_OSEQ_MAY_WRAP)) {
  556. xfrm_audit_state_replay_overflow(x, skb);
  557. err = -EOVERFLOW;
  558. return err;
  559. } else {
  560. replay_esn->oseq = oseq;
  561. }
  562. if (xfrm_aevent_is_on(net))
  563. xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
  564. }
  565. return err;
  566. }
  567. static int xfrm_replay_overflow_offload_esn(struct xfrm_state *x, struct sk_buff *skb)
  568. {
  569. int err = 0;
  570. struct xfrm_offload *xo = xfrm_offload(skb);
  571. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  572. struct net *net = xs_net(x);
  573. __u32 oseq = replay_esn->oseq;
  574. __u32 oseq_hi = replay_esn->oseq_hi;
  575. if (!xo)
  576. return xfrm_replay_overflow_esn(x, skb);
  577. if (x->type->flags & XFRM_TYPE_REPLAY_PROT) {
  578. if (!skb_is_gso(skb)) {
  579. XFRM_SKB_CB(skb)->seq.output.low = ++oseq;
  580. XFRM_SKB_CB(skb)->seq.output.hi = oseq_hi;
  581. xo->seq.low = oseq;
  582. xo->seq.hi = oseq_hi;
  583. } else {
  584. XFRM_SKB_CB(skb)->seq.output.low = oseq + 1;
  585. XFRM_SKB_CB(skb)->seq.output.hi = oseq_hi;
  586. xo->seq.low = oseq + 1;
  587. xo->seq.hi = oseq_hi;
  588. oseq += skb_shinfo(skb)->gso_segs;
  589. }
  590. if (unlikely(xo->seq.low < replay_esn->oseq)) {
  591. XFRM_SKB_CB(skb)->seq.output.hi = ++oseq_hi;
  592. xo->seq.hi = oseq_hi;
  593. replay_esn->oseq_hi = oseq_hi;
  594. if (replay_esn->oseq_hi == 0) {
  595. replay_esn->oseq--;
  596. replay_esn->oseq_hi--;
  597. xfrm_audit_state_replay_overflow(x, skb);
  598. err = -EOVERFLOW;
  599. return err;
  600. }
  601. }
  602. replay_esn->oseq = oseq;
  603. if (xfrm_aevent_is_on(net))
  604. xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
  605. }
  606. return err;
  607. }
  608. int xfrm_replay_overflow(struct xfrm_state *x, struct sk_buff *skb)
  609. {
  610. switch (x->repl_mode) {
  611. case XFRM_REPLAY_MODE_LEGACY:
  612. break;
  613. case XFRM_REPLAY_MODE_BMP:
  614. return xfrm_replay_overflow_offload_bmp(x, skb);
  615. case XFRM_REPLAY_MODE_ESN:
  616. return xfrm_replay_overflow_offload_esn(x, skb);
  617. }
  618. return xfrm_replay_overflow_offload(x, skb);
  619. }
  620. #else
  621. int xfrm_replay_overflow(struct xfrm_state *x, struct sk_buff *skb)
  622. {
  623. switch (x->repl_mode) {
  624. case XFRM_REPLAY_MODE_LEGACY:
  625. break;
  626. case XFRM_REPLAY_MODE_BMP:
  627. return xfrm_replay_overflow_bmp(x, skb);
  628. case XFRM_REPLAY_MODE_ESN:
  629. return xfrm_replay_overflow_esn(x, skb);
  630. }
  631. return __xfrm_replay_overflow(x, skb);
  632. }
  633. #endif
  634. int xfrm_init_replay(struct xfrm_state *x, struct netlink_ext_ack *extack)
  635. {
  636. struct xfrm_replay_state_esn *replay_esn = x->replay_esn;
  637. if (replay_esn) {
  638. if (replay_esn->replay_window >
  639. replay_esn->bmp_len * sizeof(__u32) * 8) {
  640. NL_SET_ERR_MSG(extack, "ESN replay window is too large for the chosen bitmap size");
  641. return -EINVAL;
  642. }
  643. if (x->props.flags & XFRM_STATE_ESN) {
  644. if (replay_esn->replay_window == 0) {
  645. NL_SET_ERR_MSG(extack, "ESN replay window must be > 0");
  646. return -EINVAL;
  647. }
  648. x->repl_mode = XFRM_REPLAY_MODE_ESN;
  649. } else {
  650. x->repl_mode = XFRM_REPLAY_MODE_BMP;
  651. }
  652. } else {
  653. x->repl_mode = XFRM_REPLAY_MODE_LEGACY;
  654. }
  655. return 0;
  656. }
  657. EXPORT_SYMBOL(xfrm_init_replay);