2005-04-17 02:20:36 +04:00
/*
* IP Payload Compression Protocol ( IPComp ) for IPv6 - RFC3173
*
* Copyright ( C ) 2003 USAGI / WIDE Project
*
* Author Mitsuru KANDA < mk @ linux - ipv6 . org >
*
* This program is free software ; you can redistribute it and / or modify
* it under the terms of the GNU General Public License as published by
* the Free Software Foundation ; either version 2 of the License , or
* ( at your option ) any later version .
2007-02-09 17:24:49 +03:00
*
2005-04-17 02:20:36 +04:00
* This program is distributed in the hope that it will be useful ,
* but WITHOUT ANY WARRANTY ; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE . See the
* GNU General Public License for more details .
2007-02-09 17:24:49 +03:00
*
2005-04-17 02:20:36 +04:00
* You should have received a copy of the GNU General Public License
* along with this program ; if not , write to the Free Software
* Foundation , Inc . , 59 Temple Place , Suite 330 , Boston , MA 02111 - 1307 USA
*/
2007-02-09 17:24:49 +03:00
/*
2005-04-17 02:20:36 +04:00
* [ Memo ]
*
* Outbound :
2007-02-09 17:24:49 +03:00
* The compression of IP datagram MUST be done before AH / ESP processing ,
* fragmentation , and the addition of Hop - by - Hop / Routing header .
2005-04-17 02:20:36 +04:00
*
* Inbound :
2007-02-09 17:24:49 +03:00
* The decompression of IP datagram MUST be done after the reassembly ,
2005-04-17 02:20:36 +04:00
* AH / ESP processing .
*/
# include <linux/module.h>
# include <net/ip.h>
# include <net/xfrm.h>
# include <net/ipcomp.h>
# include <asm/semaphore.h>
# include <linux/crypto.h>
2007-11-07 13:21:47 +03:00
# include <linux/err.h>
2005-04-17 02:20:36 +04:00
# include <linux/pfkeyv2.h>
# include <linux/random.h>
# include <linux/percpu.h>
# include <linux/smp.h>
# include <linux/list.h>
# include <linux/vmalloc.h>
# include <linux/rtnetlink.h>
# include <net/icmp.h>
# include <net/ipv6.h>
2005-12-27 07:43:12 +03:00
# include <net/protocol.h>
2005-04-17 02:20:36 +04:00
# include <linux/ipv6.h>
# include <linux/icmpv6.h>
2006-03-21 09:33:17 +03:00
# include <linux/mutex.h>
2005-04-17 02:20:36 +04:00
struct ipcomp6_tfms {
struct list_head list ;
2006-08-26 12:12:40 +04:00
struct crypto_comp * * tfms ;
2005-04-17 02:20:36 +04:00
int users ;
} ;
2006-03-21 09:33:17 +03:00
static DEFINE_MUTEX ( ipcomp6_resource_mutex ) ;
2005-04-17 02:20:36 +04:00
static void * * ipcomp6_scratches ;
static int ipcomp6_scratch_users ;
static LIST_HEAD ( ipcomp6_tfms_list ) ;
2006-04-01 12:52:46 +04:00
static int ipcomp6_input ( struct xfrm_state * x , struct sk_buff * skb )
2005-04-17 02:20:36 +04:00
{
2006-06-10 03:10:40 +04:00
int err = - ENOMEM ;
2007-10-11 02:45:25 +04:00
struct ip_comp_hdr * ipch ;
2005-04-17 02:20:36 +04:00
int plen , dlen ;
struct ipcomp_data * ipcd = x - > data ;
u8 * start , * scratch ;
2006-08-26 12:12:40 +04:00
struct crypto_comp * tfm ;
2005-04-17 02:20:36 +04:00
int cpu ;
2006-06-10 03:10:40 +04:00
if ( skb_linearize_cow ( skb ) )
2005-04-17 02:20:36 +04:00
goto out ;
skb - > ip_summed = CHECKSUM_NONE ;
/* Remove ipcomp header and decompress original payload */
2006-05-28 10:06:13 +04:00
ipch = ( void * ) skb - > data ;
2007-04-11 08:21:55 +04:00
skb - > transport_header = skb - > network_header + sizeof ( * ipch ) ;
2006-05-28 10:06:13 +04:00
__skb_pull ( skb , sizeof ( * ipch ) ) ;
2005-04-17 02:20:36 +04:00
/* decompression */
plen = skb - > len ;
dlen = IPCOMP_SCRATCH_SIZE ;
start = skb - > data ;
cpu = get_cpu ( ) ;
scratch = * per_cpu_ptr ( ipcomp6_scratches , cpu ) ;
tfm = * per_cpu_ptr ( ipcd - > tfms , cpu ) ;
err = crypto_comp_decompress ( tfm , start , plen , scratch , & dlen ) ;
2007-10-11 02:45:25 +04:00
if ( err )
2005-04-17 02:20:36 +04:00
goto out_put_cpu ;
2007-10-11 02:45:25 +04:00
if ( dlen < ( plen + sizeof ( * ipch ) ) ) {
2005-04-17 02:20:36 +04:00
err = - EINVAL ;
goto out_put_cpu ;
}
err = pskb_expand_head ( skb , 0 , dlen - plen , GFP_ATOMIC ) ;
if ( err ) {
goto out_put_cpu ;
}
2006-07-12 00:50:09 +04:00
skb - > truesize + = dlen - plen ;
__skb_put ( skb , dlen - plen ) ;
2007-03-31 18:55:19 +04:00
skb_copy_to_linear_data ( skb , scratch , dlen ) ;
2006-05-28 10:06:13 +04:00
err = ipch - > nexthdr ;
2005-04-17 02:20:36 +04:00
out_put_cpu :
put_cpu ( ) ;
out :
return err ;
}
static int ipcomp6_output ( struct xfrm_state * x , struct sk_buff * skb )
{
int err ;
2007-10-11 02:45:25 +04:00
struct ip_comp_hdr * ipch ;
2005-04-17 02:20:36 +04:00
struct ipcomp_data * ipcd = x - > data ;
int plen , dlen ;
u8 * start , * scratch ;
2006-08-26 12:12:40 +04:00
struct crypto_comp * tfm ;
2005-04-17 02:20:36 +04:00
int cpu ;
/* check whether datagram len is larger than threshold */
2007-10-11 02:45:52 +04:00
if ( skb - > len < ipcd - > threshold ) {
2005-04-17 02:20:36 +04:00
goto out_ok ;
}
2006-06-10 03:10:40 +04:00
if ( skb_linearize_cow ( skb ) )
2005-04-17 02:20:36 +04:00
goto out_ok ;
/* compression */
2007-10-11 02:45:52 +04:00
plen = skb - > len ;
2005-04-17 02:20:36 +04:00
dlen = IPCOMP_SCRATCH_SIZE ;
2007-10-11 02:45:52 +04:00
start = skb - > data ;
2005-04-17 02:20:36 +04:00
cpu = get_cpu ( ) ;
scratch = * per_cpu_ptr ( ipcomp6_scratches , cpu ) ;
tfm = * per_cpu_ptr ( ipcd - > tfms , cpu ) ;
err = crypto_comp_compress ( tfm , start , plen , scratch , & dlen ) ;
2007-10-11 02:45:25 +04:00
if ( err | | ( dlen + sizeof ( * ipch ) ) > = plen ) {
2005-04-17 02:20:36 +04:00
put_cpu ( ) ;
goto out_ok ;
}
memcpy ( start + sizeof ( struct ip_comp_hdr ) , scratch , dlen ) ;
put_cpu ( ) ;
2007-10-11 02:45:52 +04:00
pskb_trim ( skb , dlen + sizeof ( struct ip_comp_hdr ) ) ;
2005-04-17 02:20:36 +04:00
/* insert ipcomp header and replace datagram */
2007-10-11 02:45:25 +04:00
ipch = ip_comp_hdr ( skb ) ;
2007-10-10 00:25:59 +04:00
ipch - > nexthdr = * skb_mac_header ( skb ) ;
2005-04-17 02:20:36 +04:00
ipch - > flags = 0 ;
ipch - > cpi = htons ( ( u16 ) ntohl ( x - > id . spi ) ) ;
2007-10-10 00:25:59 +04:00
* skb_mac_header ( skb ) = IPPROTO_COMP ;
2005-04-17 02:20:36 +04:00
out_ok :
2007-10-11 02:45:52 +04:00
skb_push ( skb , - skb_network_offset ( skb ) ) ;
2005-04-17 02:20:36 +04:00
return 0 ;
}
static void ipcomp6_err ( struct sk_buff * skb , struct inet6_skb_parm * opt ,
2007-02-09 17:24:49 +03:00
int type , int code , int offset , __be32 info )
2005-04-17 02:20:36 +04:00
{
2006-09-28 05:47:24 +04:00
__be32 spi ;
2005-04-17 02:20:36 +04:00
struct ipv6hdr * iph = ( struct ipv6hdr * ) skb - > data ;
2007-10-11 02:45:25 +04:00
struct ip_comp_hdr * ipcomph =
( struct ip_comp_hdr * ) ( skb - > data + offset ) ;
2005-04-17 02:20:36 +04:00
struct xfrm_state * x ;
if ( type ! = ICMPV6_DEST_UNREACH & & type ! = ICMPV6_PKT_TOOBIG )
return ;
2006-05-23 03:53:22 +04:00
spi = htonl ( ntohs ( ipcomph - > cpi ) ) ;
2005-04-17 02:20:36 +04:00
x = xfrm_state_lookup ( ( xfrm_address_t * ) & iph - > daddr , spi , IPPROTO_COMP , AF_INET6 ) ;
if ( ! x )
return ;
2006-01-14 01:29:07 +03:00
printk ( KERN_DEBUG " pmtu discovery on SA IPCOMP/%08x/ " NIP6_FMT " \n " ,
2005-04-17 02:20:36 +04:00
spi , NIP6 ( iph - > daddr ) ) ;
xfrm_state_put ( x ) ;
}
static struct xfrm_state * ipcomp6_tunnel_create ( struct xfrm_state * x )
{
struct xfrm_state * t = NULL ;
2006-10-04 10:47:05 +04:00
u8 mode = XFRM_MODE_TUNNEL ;
2005-04-17 02:20:36 +04:00
t = xfrm_state_alloc ( ) ;
if ( ! t )
goto out ;
t - > id . proto = IPPROTO_IPV6 ;
t - > id . spi = xfrm6_tunnel_alloc_spi ( ( xfrm_address_t * ) & x - > props . saddr ) ;
2006-03-27 05:37:54 +04:00
if ( ! t - > id . spi )
goto error ;
2005-04-17 02:20:36 +04:00
memcpy ( t - > id . daddr . a6 , x - > id . daddr . a6 , sizeof ( struct in6_addr ) ) ;
memcpy ( & t - > sel , & x - > sel , sizeof ( t - > sel ) ) ;
t - > props . family = AF_INET6 ;
2006-10-04 10:47:05 +04:00
if ( x - > props . mode = = XFRM_MODE_BEET )
mode = x - > props . mode ;
t - > props . mode = mode ;
2005-04-17 02:20:36 +04:00
memcpy ( t - > props . saddr . a6 , x - > props . saddr . a6 , sizeof ( struct in6_addr ) ) ;
2005-06-21 00:18:08 +04:00
if ( xfrm_init_state ( t ) )
2005-04-17 02:20:36 +04:00
goto error ;
atomic_set ( & t - > tunnel_users , 1 ) ;
out :
return t ;
error :
2006-03-27 05:37:54 +04:00
t - > km . state = XFRM_STATE_DEAD ;
2005-04-17 02:20:36 +04:00
xfrm_state_put ( t ) ;
2006-03-27 05:37:54 +04:00
t = NULL ;
2005-04-17 02:20:36 +04:00
goto out ;
}
static int ipcomp6_tunnel_attach ( struct xfrm_state * x )
{
int err = 0 ;
struct xfrm_state * t = NULL ;
2006-09-28 05:47:24 +04:00
__be32 spi ;
2005-04-17 02:20:36 +04:00
spi = xfrm6_tunnel_spi_lookup ( ( xfrm_address_t * ) & x - > props . saddr ) ;
if ( spi )
t = xfrm_state_lookup ( ( xfrm_address_t * ) & x - > id . daddr ,
spi , IPPROTO_IPV6 , AF_INET6 ) ;
if ( ! t ) {
t = ipcomp6_tunnel_create ( x ) ;
if ( ! t ) {
err = - EINVAL ;
goto out ;
}
xfrm_state_insert ( t ) ;
xfrm_state_hold ( t ) ;
}
x - > tunnel = t ;
atomic_inc ( & t - > tunnel_users ) ;
out :
return err ;
}
static void ipcomp6_free_scratches ( void )
{
int i ;
void * * scratches ;
if ( - - ipcomp6_scratch_users )
return ;
scratches = ipcomp6_scratches ;
if ( ! scratches )
return ;
2006-04-11 09:52:50 +04:00
for_each_possible_cpu ( i ) {
2005-04-17 02:20:36 +04:00
void * scratch = * per_cpu_ptr ( scratches , i ) ;
2006-03-21 04:46:29 +03:00
vfree ( scratch ) ;
2005-04-17 02:20:36 +04:00
}
free_percpu ( scratches ) ;
}
static void * * ipcomp6_alloc_scratches ( void )
{
int i ;
void * * scratches ;
if ( ipcomp6_scratch_users + + )
return ipcomp6_scratches ;
scratches = alloc_percpu ( void * ) ;
if ( ! scratches )
return NULL ;
ipcomp6_scratches = scratches ;
2006-04-11 09:52:50 +04:00
for_each_possible_cpu ( i ) {
2005-04-17 02:20:36 +04:00
void * scratch = vmalloc ( IPCOMP_SCRATCH_SIZE ) ;
if ( ! scratch )
return NULL ;
* per_cpu_ptr ( scratches , i ) = scratch ;
}
return scratches ;
}
2006-08-26 12:12:40 +04:00
static void ipcomp6_free_tfms ( struct crypto_comp * * tfms )
2005-04-17 02:20:36 +04:00
{
struct ipcomp6_tfms * pos ;
int cpu ;
list_for_each_entry ( pos , & ipcomp6_tfms_list , list ) {
if ( pos - > tfms = = tfms )
break ;
}
BUG_TRAP ( pos ) ;
if ( - - pos - > users )
return ;
list_del ( & pos - > list ) ;
kfree ( pos ) ;
if ( ! tfms )
return ;
2006-04-11 09:52:50 +04:00
for_each_possible_cpu ( cpu ) {
2006-08-26 12:12:40 +04:00
struct crypto_comp * tfm = * per_cpu_ptr ( tfms , cpu ) ;
crypto_free_comp ( tfm ) ;
2005-04-17 02:20:36 +04:00
}
free_percpu ( tfms ) ;
}
2006-08-26 12:12:40 +04:00
static struct crypto_comp * * ipcomp6_alloc_tfms ( const char * alg_name )
2005-04-17 02:20:36 +04:00
{
struct ipcomp6_tfms * pos ;
2006-08-26 12:12:40 +04:00
struct crypto_comp * * tfms ;
2005-04-17 02:20:36 +04:00
int cpu ;
/* This can be any valid CPU ID so we don't need locking. */
2005-08-19 01:36:59 +04:00
cpu = raw_smp_processor_id ( ) ;
2005-04-17 02:20:36 +04:00
list_for_each_entry ( pos , & ipcomp6_tfms_list , list ) {
2006-08-26 12:12:40 +04:00
struct crypto_comp * tfm ;
2005-04-17 02:20:36 +04:00
tfms = pos - > tfms ;
tfm = * per_cpu_ptr ( tfms , cpu ) ;
2006-08-26 12:12:40 +04:00
if ( ! strcmp ( crypto_comp_name ( tfm ) , alg_name ) ) {
2005-04-17 02:20:36 +04:00
pos - > users + + ;
return tfms ;
}
}
pos = kmalloc ( sizeof ( * pos ) , GFP_KERNEL ) ;
if ( ! pos )
return NULL ;
pos - > users = 1 ;
INIT_LIST_HEAD ( & pos - > list ) ;
list_add ( & pos - > list , & ipcomp6_tfms_list ) ;
2006-08-26 12:12:40 +04:00
pos - > tfms = tfms = alloc_percpu ( struct crypto_comp * ) ;
2005-04-17 02:20:36 +04:00
if ( ! tfms )
goto error ;
2006-04-11 09:52:50 +04:00
for_each_possible_cpu ( cpu ) {
2006-08-26 12:12:40 +04:00
struct crypto_comp * tfm = crypto_alloc_comp ( alg_name , 0 ,
CRYPTO_ALG_ASYNC ) ;
2007-11-07 13:21:47 +03:00
if ( IS_ERR ( tfm ) )
2005-04-17 02:20:36 +04:00
goto error ;
* per_cpu_ptr ( tfms , cpu ) = tfm ;
}
return tfms ;
error :
ipcomp6_free_tfms ( tfms ) ;
return NULL ;
}
static void ipcomp6_free_data ( struct ipcomp_data * ipcd )
{
if ( ipcd - > tfms )
ipcomp6_free_tfms ( ipcd - > tfms ) ;
ipcomp6_free_scratches ( ) ;
}
static void ipcomp6_destroy ( struct xfrm_state * x )
{
struct ipcomp_data * ipcd = x - > data ;
if ( ! ipcd )
return ;
xfrm_state_delete_tunnel ( x ) ;
2006-03-21 09:33:17 +03:00
mutex_lock ( & ipcomp6_resource_mutex ) ;
2005-04-17 02:20:36 +04:00
ipcomp6_free_data ( ipcd ) ;
2006-03-21 09:33:17 +03:00
mutex_unlock ( & ipcomp6_resource_mutex ) ;
2005-04-17 02:20:36 +04:00
kfree ( ipcd ) ;
xfrm6_tunnel_free_spi ( ( xfrm_address_t * ) & x - > props . saddr ) ;
}
2005-06-21 00:18:08 +04:00
static int ipcomp6_init_state ( struct xfrm_state * x )
2005-04-17 02:20:36 +04:00
{
int err ;
struct ipcomp_data * ipcd ;
struct xfrm_algo_desc * calg_desc ;
err = - EINVAL ;
if ( ! x - > calg )
goto out ;
if ( x - > encap )
goto out ;
err = - ENOMEM ;
2006-03-21 10:01:32 +03:00
ipcd = kzalloc ( sizeof ( * ipcd ) , GFP_KERNEL ) ;
2005-04-17 02:20:36 +04:00
if ( ! ipcd )
goto out ;
x - > props . header_len = 0 ;
2007-10-18 08:35:15 +04:00
switch ( x - > props . mode ) {
case XFRM_MODE_BEET :
case XFRM_MODE_TRANSPORT :
break ;
case XFRM_MODE_TUNNEL :
2005-04-17 02:20:36 +04:00
x - > props . header_len + = sizeof ( struct ipv6hdr ) ;
2007-10-18 08:35:15 +04:00
default :
goto error ;
}
2007-02-09 17:24:49 +03:00
2006-03-21 09:33:17 +03:00
mutex_lock ( & ipcomp6_resource_mutex ) ;
2005-04-17 02:20:36 +04:00
if ( ! ipcomp6_alloc_scratches ( ) )
goto error ;
ipcd - > tfms = ipcomp6_alloc_tfms ( x - > calg - > alg_name ) ;
if ( ! ipcd - > tfms )
goto error ;
2006-03-21 09:33:17 +03:00
mutex_unlock ( & ipcomp6_resource_mutex ) ;
2005-04-17 02:20:36 +04:00
2006-09-23 02:05:15 +04:00
if ( x - > props . mode = = XFRM_MODE_TUNNEL ) {
2005-04-17 02:20:36 +04:00
err = ipcomp6_tunnel_attach ( x ) ;
if ( err )
goto error_tunnel ;
}
calg_desc = xfrm_calg_get_byname ( x - > calg - > alg_name , 0 ) ;
BUG_ON ( ! calg_desc ) ;
ipcd - > threshold = calg_desc - > uinfo . comp . threshold ;
x - > data = ipcd ;
err = 0 ;
out :
return err ;
error_tunnel :
2006-03-21 09:33:17 +03:00
mutex_lock ( & ipcomp6_resource_mutex ) ;
2005-04-17 02:20:36 +04:00
error :
ipcomp6_free_data ( ipcd ) ;
2006-03-21 09:33:17 +03:00
mutex_unlock ( & ipcomp6_resource_mutex ) ;
2005-04-17 02:20:36 +04:00
kfree ( ipcd ) ;
goto out ;
}
2007-02-09 17:24:49 +03:00
static struct xfrm_type ipcomp6_type =
2005-04-17 02:20:36 +04:00
{
. description = " IPCOMP6 " ,
. owner = THIS_MODULE ,
. proto = IPPROTO_COMP ,
. init_state = ipcomp6_init_state ,
. destructor = ipcomp6_destroy ,
. input = ipcomp6_input ,
. output = ipcomp6_output ,
2006-08-24 04:57:28 +04:00
. hdr_offset = xfrm6_find_1stfragopt ,
2005-04-17 02:20:36 +04:00
} ;
2007-02-09 17:24:49 +03:00
static struct inet6_protocol ipcomp6_protocol =
2005-04-17 02:20:36 +04:00
{
. handler = xfrm6_rcv ,
. err_handler = ipcomp6_err ,
. flags = INET6_PROTO_NOPOLICY ,
} ;
static int __init ipcomp6_init ( void )
{
if ( xfrm_register_type ( & ipcomp6_type , AF_INET6 ) < 0 ) {
printk ( KERN_INFO " ipcomp6 init: can't add xfrm type \n " ) ;
return - EAGAIN ;
}
if ( inet6_add_protocol ( & ipcomp6_protocol , IPPROTO_COMP ) < 0 ) {
printk ( KERN_INFO " ipcomp6 init: can't add protocol \n " ) ;
xfrm_unregister_type ( & ipcomp6_type , AF_INET6 ) ;
return - EAGAIN ;
}
return 0 ;
}
static void __exit ipcomp6_fini ( void )
{
2007-02-09 17:24:49 +03:00
if ( inet6_del_protocol ( & ipcomp6_protocol , IPPROTO_COMP ) < 0 )
2005-04-17 02:20:36 +04:00
printk ( KERN_INFO " ipv6 ipcomp close: can't remove protocol \n " ) ;
if ( xfrm_unregister_type ( & ipcomp6_type , AF_INET6 ) < 0 )
printk ( KERN_INFO " ipv6 ipcomp close: can't remove xfrm type \n " ) ;
}
module_init ( ipcomp6_init ) ;
module_exit ( ipcomp6_fini ) ;
MODULE_LICENSE ( " GPL " ) ;
MODULE_DESCRIPTION ( " IP Payload Compression Protocol (IPComp) for IPv6 - RFC3173 " ) ;
MODULE_AUTHOR ( " Mitsuru KANDA <mk@linux-ipv6.org> " ) ;
2007-06-27 10:57:49 +04:00
MODULE_ALIAS_XFRM_TYPE ( AF_INET6 , XFRM_PROTO_COMP ) ;