ipcomp.c 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187
  1. /*
  2. * IP Payload Compression Protocol (IPComp) - RFC3173.
  3. *
  4. * Copyright (c) 2003 James Morris <jmorris@intercode.com.au>
  5. *
  6. * This program is free software; you can redistribute it and/or modify it
  7. * under the terms of the GNU General Public License as published by the Free
  8. * Software Foundation; either version 2 of the License, or (at your option)
  9. * any later version.
  10. *
  11. * Todo:
  12. * - Tunable compression parameters.
  13. * - Compression stats.
  14. * - Adaptive compression.
  15. */
  16. #include <linux/module.h>
  17. #include <linux/err.h>
  18. #include <linux/rtnetlink.h>
  19. #include <net/ip.h>
  20. #include <net/xfrm.h>
  21. #include <net/icmp.h>
  22. #include <net/ipcomp.h>
  23. #include <net/protocol.h>
  24. #include <net/sock.h>
  25. static void ipcomp4_err(struct sk_buff *skb, u32 info)
  26. {
  27. struct net *net = dev_net(skb->dev);
  28. __be32 spi;
  29. const struct iphdr *iph = (const struct iphdr *)skb->data;
  30. struct ip_comp_hdr *ipch = (struct ip_comp_hdr *)(skb->data+(iph->ihl<<2));
  31. struct xfrm_state *x;
  32. if (icmp_hdr(skb)->type != ICMP_DEST_UNREACH ||
  33. icmp_hdr(skb)->code != ICMP_FRAG_NEEDED)
  34. return;
  35. spi = htonl(ntohs(ipch->cpi));
  36. x = xfrm_state_lookup(net, skb->mark, (const xfrm_address_t *)&iph->daddr,
  37. spi, IPPROTO_COMP, AF_INET);
  38. if (!x)
  39. return;
  40. NETDEBUG(KERN_DEBUG "pmtu discovery on SA IPCOMP/%08x/%pI4\n",
  41. spi, &iph->daddr);
  42. xfrm_state_put(x);
  43. }
  44. /* We always hold one tunnel user reference to indicate a tunnel */
  45. static struct xfrm_state *ipcomp_tunnel_create(struct xfrm_state *x)
  46. {
  47. struct net *net = xs_net(x);
  48. struct xfrm_state *t;
  49. t = xfrm_state_alloc(net);
  50. if (t == NULL)
  51. goto out;
  52. t->id.proto = IPPROTO_IPIP;
  53. t->id.spi = x->props.saddr.a4;
  54. t->id.daddr.a4 = x->id.daddr.a4;
  55. memcpy(&t->sel, &x->sel, sizeof(t->sel));
  56. t->props.family = AF_INET;
  57. t->props.mode = x->props.mode;
  58. t->props.saddr.a4 = x->props.saddr.a4;
  59. t->props.flags = x->props.flags;
  60. t->props.extra_flags = x->props.extra_flags;
  61. memcpy(&t->mark, &x->mark, sizeof(t->mark));
  62. if (xfrm_init_state(t))
  63. goto error;
  64. atomic_set(&t->tunnel_users, 1);
  65. out:
  66. return t;
  67. error:
  68. t->km.state = XFRM_STATE_DEAD;
  69. xfrm_state_put(t);
  70. t = NULL;
  71. goto out;
  72. }
  73. /*
  74. * Must be protected by xfrm_cfg_mutex. State and tunnel user references are
  75. * always incremented on success.
  76. */
  77. static int ipcomp_tunnel_attach(struct xfrm_state *x)
  78. {
  79. struct net *net = xs_net(x);
  80. int err = 0;
  81. struct xfrm_state *t;
  82. u32 mark = x->mark.v & x->mark.m;
  83. t = xfrm_state_lookup(net, mark, (xfrm_address_t *)&x->id.daddr.a4,
  84. x->props.saddr.a4, IPPROTO_IPIP, AF_INET);
  85. if (!t) {
  86. t = ipcomp_tunnel_create(x);
  87. if (!t) {
  88. err = -EINVAL;
  89. goto out;
  90. }
  91. xfrm_state_insert(t);
  92. xfrm_state_hold(t);
  93. }
  94. x->tunnel = t;
  95. atomic_inc(&t->tunnel_users);
  96. out:
  97. return err;
  98. }
  99. static int ipcomp4_init_state(struct xfrm_state *x)
  100. {
  101. int err = -EINVAL;
  102. x->props.header_len = 0;
  103. switch (x->props.mode) {
  104. case XFRM_MODE_TRANSPORT:
  105. break;
  106. case XFRM_MODE_TUNNEL:
  107. x->props.header_len += sizeof(struct iphdr);
  108. break;
  109. default:
  110. goto out;
  111. }
  112. err = ipcomp_init_state(x);
  113. if (err)
  114. goto out;
  115. if (x->props.mode == XFRM_MODE_TUNNEL) {
  116. err = ipcomp_tunnel_attach(x);
  117. if (err)
  118. goto out;
  119. }
  120. err = 0;
  121. out:
  122. return err;
  123. }
  124. static const struct xfrm_type ipcomp_type = {
  125. .description = "IPCOMP4",
  126. .owner = THIS_MODULE,
  127. .proto = IPPROTO_COMP,
  128. .init_state = ipcomp4_init_state,
  129. .destructor = ipcomp_destroy,
  130. .input = ipcomp_input,
  131. .output = ipcomp_output
  132. };
  133. static const struct net_protocol ipcomp4_protocol = {
  134. .handler = xfrm4_rcv,
  135. .err_handler = ipcomp4_err,
  136. .no_policy = 1,
  137. };
  138. static int __init ipcomp4_init(void)
  139. {
  140. if (xfrm_register_type(&ipcomp_type, AF_INET) < 0) {
  141. pr_info("%s: can't add xfrm type\n", __func__);
  142. return -EAGAIN;
  143. }
  144. if (inet_add_protocol(&ipcomp4_protocol, IPPROTO_COMP) < 0) {
  145. pr_info("%s: can't add protocol\n", __func__);
  146. xfrm_unregister_type(&ipcomp_type, AF_INET);
  147. return -EAGAIN;
  148. }
  149. return 0;
  150. }
  151. static void __exit ipcomp4_fini(void)
  152. {
  153. if (inet_del_protocol(&ipcomp4_protocol, IPPROTO_COMP) < 0)
  154. pr_info("%s: can't remove protocol\n", __func__);
  155. if (xfrm_unregister_type(&ipcomp_type, AF_INET) < 0)
  156. pr_info("%s: can't remove xfrm type\n", __func__);
  157. }
  158. module_init(ipcomp4_init);
  159. module_exit(ipcomp4_fini);
  160. MODULE_LICENSE("GPL");
  161. MODULE_DESCRIPTION("IP Payload Compression Protocol (IPComp/IPv4) - RFC3173");
  162. MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");
  163. MODULE_ALIAS_XFRM_TYPE(AF_INET, XFRM_PROTO_COMP);