ALSA: hda - Update descriptions about new position_fix values
[linux-2.6-block.git] / net / ipv4 / ipcomp.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
1da177e4
LT
2/*
3 * IP Payload Compression Protocol (IPComp) - RFC3173.
4 *
5 * Copyright (c) 2003 James Morris <jmorris@intercode.com.au>
6 *
1da177e4
LT
7 * Todo:
8 * - Tunable compression parameters.
9 * - Compression stats.
10 * - Adaptive compression.
11 */
1da177e4 12#include <linux/module.h>
4999f362 13#include <linux/err.h>
1da177e4
LT
14#include <linux/rtnetlink.h>
15#include <net/ip.h>
16#include <net/xfrm.h>
17#include <net/icmp.h>
18#include <net/ipcomp.h>
14c85021 19#include <net/protocol.h>
6fccab67 20#include <net/sock.h>
1da177e4 21
d099160e 22static int ipcomp4_err(struct sk_buff *skb, u32 info)
1da177e4 23{
a92df254 24 struct net *net = dev_net(skb->dev);
a94cfd19 25 __be32 spi;
b71d1d42 26 const struct iphdr *iph = (const struct iphdr *)skb->data;
1da177e4
LT
27 struct ip_comp_hdr *ipch = (struct ip_comp_hdr *)(skb->data+(iph->ihl<<2));
28 struct xfrm_state *x;
29
55be7a9c
DM
30 switch (icmp_hdr(skb)->type) {
31 case ICMP_DEST_UNREACH:
32 if (icmp_hdr(skb)->code != ICMP_FRAG_NEEDED)
d099160e 33 return 0;
55be7a9c
DM
34 case ICMP_REDIRECT:
35 break;
36 default:
d099160e 37 return 0;
55be7a9c 38 }
1da177e4 39
4195f814 40 spi = htonl(ntohs(ipch->cpi));
b71d1d42 41 x = xfrm_state_lookup(net, skb->mark, (const xfrm_address_t *)&iph->daddr,
e905a9ed 42 spi, IPPROTO_COMP, AF_INET);
1da177e4 43 if (!x)
d099160e 44 return 0;
55be7a9c 45
387aa65a 46 if (icmp_hdr(skb)->type == ICMP_DEST_UNREACH)
d888f396 47 ipv4_update_pmtu(skb, net, info, 0, IPPROTO_COMP);
387aa65a 48 else
1042caa7 49 ipv4_redirect(skb, net, 0, IPPROTO_COMP);
1da177e4 50 xfrm_state_put(x);
d099160e
SK
51
52 return 0;
1da177e4
LT
53}
54
e905a9ed 55/* We always hold one tunnel user reference to indicate a tunnel */
1da177e4
LT
56static struct xfrm_state *ipcomp_tunnel_create(struct xfrm_state *x)
57{
a92df254 58 struct net *net = xs_net(x);
1da177e4 59 struct xfrm_state *t;
e905a9ed 60
a92df254 61 t = xfrm_state_alloc(net);
51456b29 62 if (!t)
1da177e4
LT
63 goto out;
64
65 t->id.proto = IPPROTO_IPIP;
66 t->id.spi = x->props.saddr.a4;
67 t->id.daddr.a4 = x->id.daddr.a4;
68 memcpy(&t->sel, &x->sel, sizeof(t->sel));
69 t->props.family = AF_INET;
e40b3286 70 t->props.mode = x->props.mode;
1da177e4
LT
71 t->props.saddr.a4 = x->props.saddr.a4;
72 t->props.flags = x->props.flags;
a947b0a9 73 t->props.extra_flags = x->props.extra_flags;
bd55775c 74 memcpy(&t->mark, &x->mark, sizeof(t->mark));
72cb6962
HX
75
76 if (xfrm_init_state(t))
1da177e4
LT
77 goto error;
78
1da177e4
LT
79 atomic_set(&t->tunnel_users, 1);
80out:
81 return t;
82
83error:
84 t->km.state = XFRM_STATE_DEAD;
85 xfrm_state_put(t);
86 t = NULL;
87 goto out;
88}
89
90/*
4a3e2f71 91 * Must be protected by xfrm_cfg_mutex. State and tunnel user references are
1da177e4
LT
92 * always incremented on success.
93 */
94static int ipcomp_tunnel_attach(struct xfrm_state *x)
95{
a92df254 96 struct net *net = xs_net(x);
1da177e4
LT
97 int err = 0;
98 struct xfrm_state *t;
bd55775c 99 u32 mark = x->mark.v & x->mark.m;
1da177e4 100
bd55775c 101 t = xfrm_state_lookup(net, mark, (xfrm_address_t *)&x->id.daddr.a4,
e905a9ed 102 x->props.saddr.a4, IPPROTO_IPIP, AF_INET);
1da177e4
LT
103 if (!t) {
104 t = ipcomp_tunnel_create(x);
105 if (!t) {
106 err = -EINVAL;
107 goto out;
108 }
109 xfrm_state_insert(t);
110 xfrm_state_hold(t);
111 }
112 x->tunnel = t;
113 atomic_inc(&t->tunnel_users);
114out:
115 return err;
116}
117
6fccab67 118static int ipcomp4_init_state(struct xfrm_state *x)
1da177e4 119{
2c3abab7 120 int err = -EINVAL;
1da177e4 121
e40b3286
HX
122 x->props.header_len = 0;
123 switch (x->props.mode) {
124 case XFRM_MODE_TRANSPORT:
125 break;
126 case XFRM_MODE_TUNNEL:
127 x->props.header_len += sizeof(struct iphdr);
128 break;
129 default:
130 goto out;
131 }
132
6fccab67
HX
133 err = ipcomp_init_state(x);
134 if (err)
1da177e4
LT
135 goto out;
136
7e49e6de 137 if (x->props.mode == XFRM_MODE_TUNNEL) {
1da177e4
LT
138 err = ipcomp_tunnel_attach(x);
139 if (err)
10e7454e 140 goto out;
1da177e4
LT
141 }
142
1da177e4
LT
143 err = 0;
144out:
145 return err;
1da177e4
LT
146}
147
d099160e
SK
148static int ipcomp4_rcv_cb(struct sk_buff *skb, int err)
149{
150 return 0;
151}
152
533cb5b0 153static const struct xfrm_type ipcomp_type = {
1da177e4
LT
154 .description = "IPCOMP4",
155 .owner = THIS_MODULE,
156 .proto = IPPROTO_COMP,
6fccab67 157 .init_state = ipcomp4_init_state,
1da177e4
LT
158 .destructor = ipcomp_destroy,
159 .input = ipcomp_input,
160 .output = ipcomp_output
161};
162
d099160e 163static struct xfrm4_protocol ipcomp4_protocol = {
1da177e4 164 .handler = xfrm4_rcv,
d099160e
SK
165 .input_handler = xfrm_input,
166 .cb_handler = ipcomp4_rcv_cb,
1da177e4 167 .err_handler = ipcomp4_err,
d099160e 168 .priority = 0,
1da177e4
LT
169};
170
171static int __init ipcomp4_init(void)
172{
173 if (xfrm_register_type(&ipcomp_type, AF_INET) < 0) {
058bd4d2 174 pr_info("%s: can't add xfrm type\n", __func__);
1da177e4
LT
175 return -EAGAIN;
176 }
d099160e 177 if (xfrm4_protocol_register(&ipcomp4_protocol, IPPROTO_COMP) < 0) {
058bd4d2 178 pr_info("%s: can't add protocol\n", __func__);
1da177e4
LT
179 xfrm_unregister_type(&ipcomp_type, AF_INET);
180 return -EAGAIN;
181 }
182 return 0;
183}
184
185static void __exit ipcomp4_fini(void)
186{
d099160e 187 if (xfrm4_protocol_deregister(&ipcomp4_protocol, IPPROTO_COMP) < 0)
058bd4d2 188 pr_info("%s: can't remove protocol\n", __func__);
4f518e80 189 xfrm_unregister_type(&ipcomp_type, AF_INET);
1da177e4
LT
190}
191
192module_init(ipcomp4_init);
193module_exit(ipcomp4_fini);
194
195MODULE_LICENSE("GPL");
6fccab67 196MODULE_DESCRIPTION("IP Payload Compression Protocol (IPComp/IPv4) - RFC3173");
1da177e4
LT
197MODULE_AUTHOR("James Morris <jmorris@intercode.com.au>");
198
d3d6dd3a 199MODULE_ALIAS_XFRM_TYPE(AF_INET, XFRM_PROTO_COMP);