ipcomp.c 4.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186
  1. /*
  2. * IP Payload Compression Protocol (IPComp) - RFC3173.
  3. *
  4. * Copyright (c) 2003 James Morris <jmorris@intercode.com.au>
  5. *
  6. * This program is free software; you can redistribute it and/or modify it
  7. * under the terms of the GNU General Public License as published by the Free
  8. * Software Foundation; either version 2 of the License, or (at your option)
  9. * any later version.
  10. *
  11. * Todo:
  12. * - Tunable compression parameters.
  13. * - Compression stats.
  14. * - Adaptive compression.
  15. */
  16. #include <linux/module.h>
  17. #include <linux/err.h>
  18. #include <linux/rtnetlink.h>
  19. #include <net/ip.h>
  20. #include <net/xfrm.h>
  21. #include <net/icmp.h>
  22. #include <net/ipcomp.h>
  23. #include <net/protocol.h>
  24. #include <net/sock.h>
  25. static void ipcomp4_err(struct sk_buff *skb, u32 info)
  26. {
  27. struct net *net = dev_net(skb->dev);
  28. __be32 spi;
  29. const struct iphdr *iph = (const struct iphdr *)skb->data;
  30. struct ip_comp_hdr *ipch = (struct ip_comp_hdr *)(skb->data+(iph->ihl<<2));
  31. struct xfrm_state *x;
  32. if (icmp_hdr(skb)->type != ICMP_DEST_UNREACH ||
  33. icmp_hdr(skb)->code != ICMP_FRAG_NEEDED)
  34. return;
  35. spi = htonl(ntohs(ipch->cpi));
  36. x = xfrm_state_lookup(net, skb->mark, (const xfrm_address_t *)&iph->daddr,
  37. spi, IPPROTO_COMP, AF_INET);
  38. if (!x)
  39. return;
  40. NETDEBUG(KERN_DEBUG "pmtu discovery on SA IPCOMP/%08x/%pI4\n",
  41. spi, &iph->daddr);
  42. xfrm_state_put(x);
  43. }
  44. /* We always hold one tunnel user reference to indicate a tunnel */
  45. static struct xfrm_state *ipcomp_tunnel_create(struct xfrm_state *x)
  46. {
  47. struct net *net = xs_net(x);
  48. struct xfrm_state *t;
  49. t = xfrm_state_alloc(net);
  50. if (t == NULL)
  51. goto out;
  52. t->id.proto = IPPROTO_IPIP;
  53. t->id.spi = x->props.saddr.a4;
  54. t->id.daddr.a4 = x->id.daddr.a4;
  55. memcpy(&t->sel, &x->sel, sizeof(t->sel));
  56. t->props.family = AF_INET;
  57. t->props.mode = x->props.mode;
  58. t->props.saddr.a4 = x->props.saddr.a4;
  59. t->props.flags = x->props.flags;
  60. memcpy(&t->mark, &x->mark, sizeof(t->mark));
  61. if (xfrm_init_state(t))
  62. goto error;
  63. atomic_set(&t->tunnel_users, 1);
  64. out:
  65. return t;
  66. error:
  67. t->km.state = XFRM_STATE_DEAD;
  68. xfrm_state_put(t);
  69. t = NULL;
  70. goto out;
  71. }
  72. /*
  73. * Must be protected by xfrm_cfg_mutex. State and tunnel user references are
  74. * always incremented on success.
  75. */
  76. static int ipcomp_tunnel_attach(struct xfrm_state *x)
  77. {
  78. struct net *net = xs_net(x);
  79. int err = 0;
  80. struct xfrm_state *t;
  81. u32 mark = x->mark.v & x->mark.m;
  82. t = xfrm_state_lookup(net, mark, (xfrm_address_t *)&x->id.daddr.a4,
  83. x->props.saddr.a4, IPPROTO_IPIP, AF_INET);
  84. if (!t) {
  85. t = ipcomp_tunnel_create(x);
  86. if (!t) {
  87. err = -EINVAL;
  88. goto out;
  89. }
  90. xfrm_state_insert(t);
  91. xfrm_state_hold(t);
  92. }
  93. x->tunnel = t;
  94. atomic_inc(&t->tunnel_users);
  95. out:
  96. return err;
  97. }
  98. static int ipcomp4_init_state(struct xfrm_state *x)
  99. {
  100. int err = -EINVAL;
  101. x->props.header_len = 0;
  102. switch (x->props.mode) {
  103. case XFRM_MODE_TRANSPORT:
  104. break;
  105. case XFRM_MODE_TUNNEL:
  106. x->props.header_len += sizeof(struct iphdr);
  107. break;
  108. default:
  109. goto out;
  110. }
  111. err = ipcomp_init_state(x);
  112. if (err)
  113. goto out;
  114. if (x->props.mode == XFRM_MODE_TUNNEL) {
  115. err = ipcomp_tunnel_attach(x);
  116. if (err)
  117. goto out;
  118. }
  119. err = 0;
  120. out:
  121. return err;
  122. }
  123. static const struct xfrm_type ipcomp_type = {
  124. .description = "IPCOMP4",
  125. .owner = THIS_MODULE,
  126. .proto = IPPROTO_COMP,
  127. .init_state = ipcomp4_init_state,
  128. .destructor = ipcomp_destroy,
  129. .input = ipcomp_input,
  130. .output = ipcomp_output
  131. };
  132. static const struct net_protocol ipcomp4_protocol = {
  133. .handler = xfrm4_rcv,
  134. .err_handler = ipcomp4_err,
  135. .no_policy = 1,
  136. };
  137. static int __init ipcomp4_init(void)
  138. {
  139. if (xfrm_register_type(&ipcomp_type, AF_INET) < 0) {
  140. printk(KERN_INFO "ipcomp init: can't add xfrm type\n");
  141. return -EAGAIN;
  142. }
  143. if (inet_add_protocol(&ipcomp4_protocol, IPPROTO_COMP) < 0) {
  144. printk(KERN_INFO "ipcomp init: can't add protocol\n");
  145. xfrm_unregister_type(&ipcomp_type, AF_INET);
  146. return -EAGAIN;
  147. }
  148. return 0;
  149. }
  150. static void __exit ipcomp4_fini(void)
  151. {
  152. if (inet_del_protocol(&ipcomp4_protocol, IPPROTO_COMP) < 0)
  153. printk(KERN_INFO "ip ipcomp close: can't remove protocol\n");
  154. if (xfrm_unregister_type(&ipcomp_type, AF_INET) < 0)
  155. printk(KERN_INFO "ip ipcomp close: can't remove xfrm type\n");
  156. }
  157. module_init(ipcomp4_init);
  158. module_exit(ipcomp4_fini);
  159. MODULE_LICENSE("GPL");
  160. MODULE_DESCRIPTION("IP Payload Compression Protocol (IPComp/IPv4) - RFC3173");
  161. MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");
  162. MODULE_ALIAS_XFRM_TYPE(AF_INET, XFRM_PROTO_COMP);