]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * Routines to compress and uncompress tcp packets (for transmission | |
3 | * over low speed serial lines). | |
4 | * | |
5 | * Copyright (c) 1989 Regents of the University of California. | |
6 | * All rights reserved. | |
7 | * | |
8 | * Redistribution and use in source and binary forms are permitted | |
9 | * provided that the above copyright notice and this paragraph are | |
10 | * duplicated in all such forms and that any documentation, | |
11 | * advertising materials, and other materials related to such | |
12 | * distribution and use acknowledge that the software was developed | |
13 | * by the University of California, Berkeley. The name of the | |
14 | * University may not be used to endorse or promote products derived | |
15 | * from this software without specific prior written permission. | |
16 | * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR | |
17 | * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED | |
18 | * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. | |
19 | * | |
20 | * Van Jacobson ([email protected]), Dec 31, 1989: | |
21 | * - Initial distribution. | |
22 | * | |
23 | * | |
24 | * modified for KA9Q Internet Software Package by | |
25 | * Katie Stevens ([email protected]) | |
26 | * University of California, Davis | |
27 | * Computing Services | |
28 | * - 01-31-90 initial adaptation (from 1.19) | |
29 | * PPP.05 02-15-90 [ks] | |
30 | * PPP.08 05-02-90 [ks] use PPP protocol field to signal compression | |
31 | * PPP.15 09-90 [ks] improve mbuf handling | |
32 | * PPP.16 11-02 [karn] substantially rewritten to use NOS facilities | |
33 | * | |
34 | * - Feb 1991 [email protected] | |
35 | * variable number of conversation slots | |
36 | * allow zero or one slots | |
37 | * separate routines | |
38 | * status display | |
39 | * - Jul 1994 Dmitry Gorodchanin | |
40 | * Fixes for memory leaks. | |
41 | * - Oct 1994 Dmitry Gorodchanin | |
42 | * Modularization. | |
43 | * - Jan 1995 Bjorn Ekwall | |
44 | * Use ip_fast_csum from ip.h | |
6aa20a22 | 45 | * - July 1995 Christos A. Polyzols |
1da177e4 LT |
46 | * Spotted bug in tcp option checking |
47 | * | |
48 | * | |
49 | * This module is a difficult issue. It's clearly inet code but it's also clearly | |
50 | * driver code belonging close to PPP and SLIP | |
51 | */ | |
52 | ||
1da177e4 | 53 | #include <linux/module.h> |
5a0e3ad6 | 54 | #include <linux/slab.h> |
1da177e4 LT |
55 | #include <linux/types.h> |
56 | #include <linux/string.h> | |
57 | #include <linux/errno.h> | |
58 | #include <linux/kernel.h> | |
59 | #include <net/slhc_vj.h> | |
60 | ||
61 | #ifdef CONFIG_INET | |
62 | /* Entire module is for IP only */ | |
63 | #include <linux/mm.h> | |
64 | #include <linux/socket.h> | |
65 | #include <linux/sockios.h> | |
66 | #include <linux/termios.h> | |
67 | #include <linux/in.h> | |
68 | #include <linux/fcntl.h> | |
69 | #include <linux/inet.h> | |
70 | #include <linux/netdevice.h> | |
71 | #include <net/ip.h> | |
72 | #include <net/protocol.h> | |
73 | #include <net/icmp.h> | |
74 | #include <net/tcp.h> | |
75 | #include <linux/skbuff.h> | |
76 | #include <net/sock.h> | |
77 | #include <linux/timer.h> | |
7c0f6ba6 | 78 | #include <linux/uaccess.h> |
1da177e4 | 79 | #include <net/checksum.h> |
5f60d5f6 | 80 | #include <linux/unaligned.h> |
1da177e4 LT |
81 | |
82 | static unsigned char *encode(unsigned char *cp, unsigned short n); | |
83 | static long decode(unsigned char **cpp); | |
84 | static unsigned char * put16(unsigned char *cp, unsigned short x); | |
85 | static unsigned short pull16(unsigned char **cpp); | |
86 | ||
4ab42d78 | 87 | /* Allocate compression data structure |
1da177e4 | 88 | * slots must be in range 0 to 255 (zero meaning no compression) |
4ab42d78 | 89 | * Returns pointer to structure or ERR_PTR() on error. |
1da177e4 LT |
90 | */ |
91 | struct slcompress * | |
92 | slhc_init(int rslots, int tslots) | |
93 | { | |
9d2f1123 AD |
94 | short i; |
95 | struct cstate *ts; | |
1da177e4 LT |
96 | struct slcompress *comp; |
97 | ||
4ab42d78 BH |
98 | if (rslots < 0 || rslots > 255 || tslots < 0 || tslots > 255) |
99 | return ERR_PTR(-EINVAL); | |
100 | ||
79690602 | 101 | comp = kzalloc(sizeof(struct slcompress), GFP_KERNEL); |
1da177e4 LT |
102 | if (! comp) |
103 | goto out_fail; | |
1da177e4 | 104 | |
4ab42d78 | 105 | if (rslots > 0) { |
1da177e4 | 106 | size_t rsize = rslots * sizeof(struct cstate); |
79690602 | 107 | comp->rstate = kzalloc(rsize, GFP_KERNEL); |
1da177e4 LT |
108 | if (! comp->rstate) |
109 | goto out_free; | |
1da177e4 LT |
110 | comp->rslot_limit = rslots - 1; |
111 | } | |
112 | ||
4ab42d78 | 113 | if (tslots > 0) { |
1da177e4 | 114 | size_t tsize = tslots * sizeof(struct cstate); |
79690602 | 115 | comp->tstate = kzalloc(tsize, GFP_KERNEL); |
1da177e4 LT |
116 | if (! comp->tstate) |
117 | goto out_free2; | |
1da177e4 LT |
118 | comp->tslot_limit = tslots - 1; |
119 | } | |
120 | ||
121 | comp->xmit_oldest = 0; | |
122 | comp->xmit_current = 255; | |
123 | comp->recv_current = 255; | |
124 | /* | |
125 | * don't accept any packets with implicit index until we get | |
126 | * one with an explicit index. Otherwise the uncompress code | |
127 | * will try to use connection 255, which is almost certainly | |
128 | * out of range | |
129 | */ | |
130 | comp->flags |= SLF_TOSS; | |
131 | ||
132 | if ( tslots > 0 ) { | |
133 | ts = comp->tstate; | |
134 | for(i = comp->tslot_limit; i > 0; --i){ | |
135 | ts[i].cs_this = i; | |
136 | ts[i].next = &(ts[i - 1]); | |
137 | } | |
138 | ts[0].next = &(ts[comp->tslot_limit]); | |
139 | ts[0].cs_this = 0; | |
140 | } | |
141 | return comp; | |
142 | ||
143 | out_free2: | |
79690602 | 144 | kfree(comp->rstate); |
1da177e4 | 145 | out_free: |
79690602 | 146 | kfree(comp); |
1da177e4 | 147 | out_fail: |
4ab42d78 | 148 | return ERR_PTR(-ENOMEM); |
1da177e4 LT |
149 | } |
150 | ||
151 | ||
152 | /* Free a compression data structure */ | |
153 | void | |
154 | slhc_free(struct slcompress *comp) | |
155 | { | |
baf76f0c | 156 | if ( IS_ERR_OR_NULL(comp) ) |
1da177e4 LT |
157 | return; |
158 | ||
159 | if ( comp->tstate != NULLSLSTATE ) | |
160 | kfree( comp->tstate ); | |
161 | ||
162 | if ( comp->rstate != NULLSLSTATE ) | |
163 | kfree( comp->rstate ); | |
164 | ||
165 | kfree( comp ); | |
166 | } | |
167 | ||
168 | ||
169 | /* Put a short in host order into a char array in network order */ | |
170 | static inline unsigned char * | |
171 | put16(unsigned char *cp, unsigned short x) | |
172 | { | |
173 | *cp++ = x >> 8; | |
174 | *cp++ = x; | |
175 | ||
176 | return cp; | |
177 | } | |
178 | ||
179 | ||
180 | /* Encode a number */ | |
3c582b30 | 181 | static unsigned char * |
1da177e4 LT |
182 | encode(unsigned char *cp, unsigned short n) |
183 | { | |
184 | if(n >= 256 || n == 0){ | |
185 | *cp++ = 0; | |
186 | cp = put16(cp,n); | |
187 | } else { | |
188 | *cp++ = n; | |
189 | } | |
190 | return cp; | |
191 | } | |
192 | ||
193 | /* Pull a 16-bit integer in host order from buffer in network byte order */ | |
194 | static unsigned short | |
195 | pull16(unsigned char **cpp) | |
196 | { | |
197 | short rval; | |
198 | ||
199 | rval = *(*cpp)++; | |
200 | rval <<= 8; | |
201 | rval |= *(*cpp)++; | |
202 | return rval; | |
203 | } | |
204 | ||
205 | /* Decode a number */ | |
3c582b30 | 206 | static long |
1da177e4 LT |
207 | decode(unsigned char **cpp) |
208 | { | |
9d2f1123 | 209 | int x; |
1da177e4 LT |
210 | |
211 | x = *(*cpp)++; | |
212 | if(x == 0){ | |
213 | return pull16(cpp) & 0xffff; /* pull16 returns -1 on error */ | |
214 | } else { | |
215 | return x & 0xff; /* -1 if PULLCHAR returned error */ | |
216 | } | |
217 | } | |
218 | ||
219 | /* | |
220 | * icp and isize are the original packet. | |
221 | * ocp is a place to put a copy if necessary. | |
222 | * cpp is initially a pointer to icp. If the copy is used, | |
223 | * change it to ocp. | |
224 | */ | |
225 | ||
226 | int | |
227 | slhc_compress(struct slcompress *comp, unsigned char *icp, int isize, | |
228 | unsigned char *ocp, unsigned char **cpp, int compress_cid) | |
229 | { | |
9d2f1123 AD |
230 | struct cstate *ocs = &(comp->tstate[comp->xmit_oldest]); |
231 | struct cstate *lcs = ocs; | |
232 | struct cstate *cs = lcs->next; | |
233 | unsigned long deltaS, deltaA; | |
234 | short changes = 0; | |
110a40df | 235 | int nlen, hlen; |
1da177e4 | 236 | unsigned char new_seq[16]; |
9d2f1123 | 237 | unsigned char *cp = new_seq; |
1da177e4 LT |
238 | struct iphdr *ip; |
239 | struct tcphdr *th, *oth; | |
7cd61888 | 240 | __sum16 csum; |
1da177e4 LT |
241 | |
242 | ||
243 | /* | |
244 | * Don't play with runt packets. | |
245 | */ | |
6aa20a22 | 246 | |
1da177e4 LT |
247 | if(isize<sizeof(struct iphdr)) |
248 | return isize; | |
6aa20a22 | 249 | |
1da177e4 | 250 | ip = (struct iphdr *) icp; |
110a40df ED |
251 | if (ip->version != 4 || ip->ihl < 5) |
252 | return isize; | |
1da177e4 LT |
253 | |
254 | /* Bail if this packet isn't TCP, or is an IP fragment */ | |
255 | if (ip->protocol != IPPROTO_TCP || (ntohs(ip->frag_off) & 0x3fff)) { | |
256 | /* Send as regular IP */ | |
257 | if(ip->protocol != IPPROTO_TCP) | |
258 | comp->sls_o_nontcp++; | |
259 | else | |
260 | comp->sls_o_tcp++; | |
261 | return isize; | |
262 | } | |
110a40df ED |
263 | nlen = ip->ihl * 4; |
264 | if (isize < nlen + sizeof(*th)) | |
265 | return isize; | |
1da177e4 | 266 | |
110a40df ED |
267 | th = (struct tcphdr *)(icp + nlen); |
268 | if (th->doff < sizeof(struct tcphdr) / 4) | |
269 | return isize; | |
270 | hlen = nlen + th->doff * 4; | |
1da177e4 LT |
271 | |
272 | /* Bail if the TCP packet isn't `compressible' (i.e., ACK isn't set or | |
273 | * some other control bit is set). Also uncompressible if | |
274 | * it's a runt. | |
275 | */ | |
276 | if(hlen > isize || th->syn || th->fin || th->rst || | |
277 | ! (th->ack)){ | |
278 | /* TCP connection stuff; send as regular IP */ | |
279 | comp->sls_o_tcp++; | |
280 | return isize; | |
281 | } | |
282 | /* | |
283 | * Packet is compressible -- we're going to send either a | |
284 | * COMPRESSED_TCP or UNCOMPRESSED_TCP packet. Either way, | |
285 | * we need to locate (or create) the connection state. | |
286 | * | |
287 | * States are kept in a circularly linked list with | |
288 | * xmit_oldest pointing to the end of the list. The | |
289 | * list is kept in lru order by moving a state to the | |
290 | * head of the list whenever it is referenced. Since | |
291 | * the list is short and, empirically, the connection | |
292 | * we want is almost always near the front, we locate | |
293 | * states via linear search. If we don't find a state | |
294 | * for the datagram, the oldest state is (re-)used. | |
295 | */ | |
296 | for ( ; ; ) { | |
297 | if( ip->saddr == cs->cs_ip.saddr | |
298 | && ip->daddr == cs->cs_ip.daddr | |
299 | && th->source == cs->cs_tcp.source | |
300 | && th->dest == cs->cs_tcp.dest) | |
301 | goto found; | |
302 | ||
303 | /* if current equal oldest, at end of list */ | |
304 | if ( cs == ocs ) | |
305 | break; | |
306 | lcs = cs; | |
307 | cs = cs->next; | |
308 | comp->sls_o_searches++; | |
6403eab1 | 309 | } |
1da177e4 LT |
310 | /* |
311 | * Didn't find it -- re-use oldest cstate. Send an | |
312 | * uncompressed packet that tells the other side what | |
313 | * connection number we're using for this conversation. | |
314 | * | |
315 | * Note that since the state list is circular, the oldest | |
316 | * state points to the newest and we only need to set | |
317 | * xmit_oldest to update the lru linkage. | |
318 | */ | |
319 | comp->sls_o_misses++; | |
320 | comp->xmit_oldest = lcs->cs_this; | |
321 | goto uncompressed; | |
322 | ||
323 | found: | |
324 | /* | |
325 | * Found it -- move to the front on the connection list. | |
326 | */ | |
327 | if(lcs == ocs) { | |
1d314fc1 | 328 | /* found at most recently used */ |
1da177e4 LT |
329 | } else if (cs == ocs) { |
330 | /* found at least recently used */ | |
331 | comp->xmit_oldest = lcs->cs_this; | |
332 | } else { | |
333 | /* more than 2 elements */ | |
334 | lcs->next = cs->next; | |
335 | cs->next = ocs->next; | |
336 | ocs->next = cs; | |
337 | } | |
338 | ||
339 | /* | |
340 | * Make sure that only what we expect to change changed. | |
341 | * Check the following: | |
342 | * IP protocol version, header length & type of service. | |
343 | * The "Don't fragment" bit. | |
344 | * The time-to-live field. | |
345 | * The TCP header length. | |
346 | * IP options, if any. | |
347 | * TCP options, if any. | |
348 | * If any of these things are different between the previous & | |
349 | * current datagram, we send the current datagram `uncompressed'. | |
350 | */ | |
351 | oth = &cs->cs_tcp; | |
352 | ||
353 | if(ip->version != cs->cs_ip.version || ip->ihl != cs->cs_ip.ihl | |
354 | || ip->tos != cs->cs_ip.tos | |
355 | || (ip->frag_off & htons(0x4000)) != (cs->cs_ip.frag_off & htons(0x4000)) | |
356 | || ip->ttl != cs->cs_ip.ttl | |
357 | || th->doff != cs->cs_tcp.doff | |
358 | || (ip->ihl > 5 && memcmp(ip+1,cs->cs_ipopt,((ip->ihl)-5)*4) != 0) | |
359 | || (th->doff > 5 && memcmp(th+1,cs->cs_tcpopt,((th->doff)-5)*4) != 0)){ | |
360 | goto uncompressed; | |
361 | } | |
362 | ||
363 | /* | |
364 | * Figure out which of the changing fields changed. The | |
365 | * receiver expects changes in the order: urgent, window, | |
366 | * ack, seq (the order minimizes the number of temporaries | |
367 | * needed in this section of code). | |
368 | */ | |
369 | if(th->urg){ | |
370 | deltaS = ntohs(th->urg_ptr); | |
371 | cp = encode(cp,deltaS); | |
372 | changes |= NEW_U; | |
373 | } else if(th->urg_ptr != oth->urg_ptr){ | |
374 | /* argh! URG not set but urp changed -- a sensible | |
375 | * implementation should never do this but RFC793 | |
376 | * doesn't prohibit the change so we have to deal | |
377 | * with it. */ | |
378 | goto uncompressed; | |
379 | } | |
380 | if((deltaS = ntohs(th->window) - ntohs(oth->window)) != 0){ | |
381 | cp = encode(cp,deltaS); | |
382 | changes |= NEW_W; | |
383 | } | |
384 | if((deltaA = ntohl(th->ack_seq) - ntohl(oth->ack_seq)) != 0L){ | |
385 | if(deltaA > 0x0000ffff) | |
386 | goto uncompressed; | |
387 | cp = encode(cp,deltaA); | |
388 | changes |= NEW_A; | |
389 | } | |
390 | if((deltaS = ntohl(th->seq) - ntohl(oth->seq)) != 0L){ | |
391 | if(deltaS > 0x0000ffff) | |
392 | goto uncompressed; | |
393 | cp = encode(cp,deltaS); | |
394 | changes |= NEW_S; | |
395 | } | |
396 | ||
397 | switch(changes){ | |
398 | case 0: /* Nothing changed. If this packet contains data and the | |
399 | * last one didn't, this is probably a data packet following | |
400 | * an ack (normal on an interactive connection) and we send | |
401 | * it compressed. Otherwise it's probably a retransmit, | |
402 | * retransmitted ack or window probe. Send it uncompressed | |
403 | * in case the other side missed the compressed version. | |
404 | */ | |
405 | if(ip->tot_len != cs->cs_ip.tot_len && | |
406 | ntohs(cs->cs_ip.tot_len) == hlen) | |
407 | break; | |
408 | goto uncompressed; | |
1da177e4 LT |
409 | case SPECIAL_I: |
410 | case SPECIAL_D: | |
411 | /* actual changes match one of our special case encodings -- | |
412 | * send packet uncompressed. | |
413 | */ | |
414 | goto uncompressed; | |
415 | case NEW_S|NEW_A: | |
416 | if(deltaS == deltaA && | |
417 | deltaS == ntohs(cs->cs_ip.tot_len) - hlen){ | |
418 | /* special case for echoed terminal traffic */ | |
419 | changes = SPECIAL_I; | |
420 | cp = new_seq; | |
421 | } | |
422 | break; | |
423 | case NEW_S: | |
424 | if(deltaS == ntohs(cs->cs_ip.tot_len) - hlen){ | |
425 | /* special case for data xfer */ | |
426 | changes = SPECIAL_D; | |
427 | cp = new_seq; | |
428 | } | |
429 | break; | |
430 | } | |
431 | deltaS = ntohs(ip->id) - ntohs(cs->cs_ip.id); | |
432 | if(deltaS != 1){ | |
433 | cp = encode(cp,deltaS); | |
434 | changes |= NEW_I; | |
435 | } | |
436 | if(th->psh) | |
437 | changes |= TCP_PUSH_BIT; | |
438 | /* Grab the cksum before we overwrite it below. Then update our | |
439 | * state with this packet's header. | |
440 | */ | |
7cd61888 | 441 | csum = th->check; |
1da177e4 LT |
442 | memcpy(&cs->cs_ip,ip,20); |
443 | memcpy(&cs->cs_tcp,th,20); | |
444 | /* We want to use the original packet as our compressed packet. | |
445 | * (cp - new_seq) is the number of bytes we need for compressed | |
446 | * sequence numbers. In addition we need one byte for the change | |
447 | * mask, one for the connection id and two for the tcp checksum. | |
448 | * So, (cp - new_seq) + 4 bytes of header are needed. | |
449 | */ | |
450 | deltaS = cp - new_seq; | |
451 | if(compress_cid == 0 || comp->xmit_current != cs->cs_this){ | |
452 | cp = ocp; | |
453 | *cpp = ocp; | |
454 | *cp++ = changes | NEW_C; | |
455 | *cp++ = cs->cs_this; | |
456 | comp->xmit_current = cs->cs_this; | |
457 | } else { | |
458 | cp = ocp; | |
459 | *cpp = ocp; | |
460 | *cp++ = changes; | |
461 | } | |
7cd61888 AV |
462 | *(__sum16 *)cp = csum; |
463 | cp += 2; | |
1da177e4 LT |
464 | /* deltaS is now the size of the change section of the compressed header */ |
465 | memcpy(cp,new_seq,deltaS); /* Write list of deltas */ | |
466 | memcpy(cp+deltaS,icp+hlen,isize-hlen); | |
467 | comp->sls_o_compressed++; | |
468 | ocp[0] |= SL_TYPE_COMPRESSED_TCP; | |
469 | return isize - hlen + deltaS + (cp - ocp); | |
470 | ||
471 | /* Update connection state cs & send uncompressed packet (i.e., | |
472 | * a regular ip/tcp packet but with the 'conversation id' we hope | |
473 | * to use on future compressed packets in the protocol field). | |
474 | */ | |
475 | uncompressed: | |
476 | memcpy(&cs->cs_ip,ip,20); | |
477 | memcpy(&cs->cs_tcp,th,20); | |
478 | if (ip->ihl > 5) | |
479 | memcpy(cs->cs_ipopt, ip+1, ((ip->ihl) - 5) * 4); | |
480 | if (th->doff > 5) | |
481 | memcpy(cs->cs_tcpopt, th+1, ((th->doff) - 5) * 4); | |
482 | comp->xmit_current = cs->cs_this; | |
483 | comp->sls_o_uncompressed++; | |
484 | memcpy(ocp, icp, isize); | |
485 | *cpp = ocp; | |
486 | ocp[9] = cs->cs_this; | |
487 | ocp[0] |= SL_TYPE_UNCOMPRESSED_TCP; | |
488 | return isize; | |
489 | } | |
490 | ||
491 | ||
492 | int | |
493 | slhc_uncompress(struct slcompress *comp, unsigned char *icp, int isize) | |
494 | { | |
9d2f1123 | 495 | int changes; |
1da177e4 | 496 | long x; |
9d2f1123 AD |
497 | struct tcphdr *thp; |
498 | struct iphdr *ip; | |
499 | struct cstate *cs; | |
1da177e4 LT |
500 | int len, hdrlen; |
501 | unsigned char *cp = icp; | |
502 | ||
503 | /* We've got a compressed packet; read the change byte */ | |
504 | comp->sls_i_compressed++; | |
505 | if(isize < 3){ | |
506 | comp->sls_i_error++; | |
507 | return 0; | |
508 | } | |
509 | changes = *cp++; | |
510 | if(changes & NEW_C){ | |
511 | /* Make sure the state index is in range, then grab the state. | |
512 | * If we have a good state index, clear the 'discard' flag. | |
513 | */ | |
514 | x = *cp++; /* Read conn index */ | |
515 | if(x < 0 || x > comp->rslot_limit) | |
516 | goto bad; | |
517 | ||
3f01ddb9 TT |
518 | /* Check if the cstate is initialized */ |
519 | if (!comp->rstate[x].initialized) | |
520 | goto bad; | |
521 | ||
1da177e4 LT |
522 | comp->flags &=~ SLF_TOSS; |
523 | comp->recv_current = x; | |
524 | } else { | |
525 | /* this packet has an implicit state index. If we've | |
526 | * had a line error since the last time we got an | |
527 | * explicit state index, we have to toss the packet. */ | |
528 | if(comp->flags & SLF_TOSS){ | |
529 | comp->sls_i_tossed++; | |
530 | return 0; | |
531 | } | |
532 | } | |
533 | cs = &comp->rstate[comp->recv_current]; | |
534 | thp = &cs->cs_tcp; | |
535 | ip = &cs->cs_ip; | |
536 | ||
7cd61888 AV |
537 | thp->check = *(__sum16 *)cp; |
538 | cp += 2; | |
1da177e4 LT |
539 | |
540 | thp->psh = (changes & TCP_PUSH_BIT) ? 1 : 0; | |
541 | /* | |
542 | * we can use the same number for the length of the saved header and | |
543 | * the current one, because the packet wouldn't have been sent | |
544 | * as compressed unless the options were the same as the previous one | |
545 | */ | |
546 | ||
547 | hdrlen = ip->ihl * 4 + thp->doff * 4; | |
548 | ||
549 | switch(changes & SPECIALS_MASK){ | |
550 | case SPECIAL_I: /* Echoed terminal traffic */ | |
551 | { | |
9d2f1123 | 552 | short i; |
1da177e4 LT |
553 | i = ntohs(ip->tot_len) - hdrlen; |
554 | thp->ack_seq = htonl( ntohl(thp->ack_seq) + i); | |
555 | thp->seq = htonl( ntohl(thp->seq) + i); | |
556 | } | |
557 | break; | |
558 | ||
559 | case SPECIAL_D: /* Unidirectional data */ | |
560 | thp->seq = htonl( ntohl(thp->seq) + | |
561 | ntohs(ip->tot_len) - hdrlen); | |
562 | break; | |
563 | ||
564 | default: | |
565 | if(changes & NEW_U){ | |
566 | thp->urg = 1; | |
567 | if((x = decode(&cp)) == -1) { | |
568 | goto bad; | |
569 | } | |
570 | thp->urg_ptr = htons(x); | |
571 | } else | |
572 | thp->urg = 0; | |
573 | if(changes & NEW_W){ | |
574 | if((x = decode(&cp)) == -1) { | |
575 | goto bad; | |
576 | } | |
577 | thp->window = htons( ntohs(thp->window) + x); | |
578 | } | |
579 | if(changes & NEW_A){ | |
580 | if((x = decode(&cp)) == -1) { | |
581 | goto bad; | |
582 | } | |
583 | thp->ack_seq = htonl( ntohl(thp->ack_seq) + x); | |
584 | } | |
585 | if(changes & NEW_S){ | |
586 | if((x = decode(&cp)) == -1) { | |
587 | goto bad; | |
588 | } | |
589 | thp->seq = htonl( ntohl(thp->seq) + x); | |
590 | } | |
591 | break; | |
592 | } | |
593 | if(changes & NEW_I){ | |
594 | if((x = decode(&cp)) == -1) { | |
595 | goto bad; | |
596 | } | |
597 | ip->id = htons (ntohs (ip->id) + x); | |
598 | } else | |
599 | ip->id = htons (ntohs (ip->id) + 1); | |
600 | ||
601 | /* | |
602 | * At this point, cp points to the first byte of data in the | |
603 | * packet. Put the reconstructed TCP and IP headers back on the | |
604 | * packet. Recalculate IP checksum (but not TCP checksum). | |
605 | */ | |
606 | ||
607 | len = isize - (cp - icp); | |
608 | if (len < 0) | |
609 | goto bad; | |
610 | len += hdrlen; | |
611 | ip->tot_len = htons(len); | |
612 | ip->check = 0; | |
613 | ||
614 | memmove(icp + hdrlen, cp, len - hdrlen); | |
615 | ||
616 | cp = icp; | |
617 | memcpy(cp, ip, 20); | |
618 | cp += 20; | |
619 | ||
620 | if (ip->ihl > 5) { | |
621 | memcpy(cp, cs->cs_ipopt, (ip->ihl - 5) * 4); | |
622 | cp += (ip->ihl - 5) * 4; | |
623 | } | |
624 | ||
625 | put_unaligned(ip_fast_csum(icp, ip->ihl), | |
626 | &((struct iphdr *)icp)->check); | |
627 | ||
628 | memcpy(cp, thp, 20); | |
629 | cp += 20; | |
630 | ||
631 | if (thp->doff > 5) { | |
632 | memcpy(cp, cs->cs_tcpopt, ((thp->doff) - 5) * 4); | |
633 | cp += ((thp->doff) - 5) * 4; | |
634 | } | |
635 | ||
636 | return len; | |
637 | bad: | |
638 | comp->sls_i_error++; | |
639 | return slhc_toss( comp ); | |
640 | } | |
641 | ||
642 | ||
643 | int | |
644 | slhc_remember(struct slcompress *comp, unsigned char *icp, int isize) | |
645 | { | |
7d3fce8c | 646 | const struct tcphdr *th; |
1da177e4 | 647 | unsigned char index; |
7d3fce8c ED |
648 | struct iphdr *iph; |
649 | struct cstate *cs; | |
650 | unsigned int ihl; | |
1da177e4 | 651 | |
7d3fce8c ED |
652 | /* The packet is shorter than a legal IP header. |
653 | * Also make sure isize is positive. | |
654 | */ | |
655 | if (isize < (int)sizeof(struct iphdr)) { | |
656 | runt: | |
1da177e4 | 657 | comp->sls_i_runt++; |
7d3fce8c | 658 | return slhc_toss(comp); |
1da177e4 | 659 | } |
7d3fce8c | 660 | iph = (struct iphdr *)icp; |
1da177e4 | 661 | /* Peek at the IP header's IHL field to find its length */ |
7d3fce8c ED |
662 | ihl = iph->ihl; |
663 | /* The IP header length field is too small, | |
664 | * or packet is shorter than the IP header followed | |
665 | * by minimal tcp header. | |
666 | */ | |
667 | if (ihl < 5 || isize < ihl * 4 + sizeof(struct tcphdr)) | |
668 | goto runt; | |
669 | ||
670 | index = iph->protocol; | |
671 | iph->protocol = IPPROTO_TCP; | |
1da177e4 LT |
672 | |
673 | if (ip_fast_csum(icp, ihl)) { | |
674 | /* Bad IP header checksum; discard */ | |
675 | comp->sls_i_badcheck++; | |
7d3fce8c | 676 | return slhc_toss(comp); |
1da177e4 | 677 | } |
7d3fce8c | 678 | if (index > comp->rslot_limit) { |
1da177e4 LT |
679 | comp->sls_i_error++; |
680 | return slhc_toss(comp); | |
681 | } | |
7d3fce8c ED |
682 | th = (struct tcphdr *)(icp + ihl * 4); |
683 | if (th->doff < sizeof(struct tcphdr) / 4) | |
684 | goto runt; | |
685 | if (isize < ihl * 4 + th->doff * 4) | |
686 | goto runt; | |
1da177e4 LT |
687 | /* Update local state */ |
688 | cs = &comp->rstate[comp->recv_current = index]; | |
689 | comp->flags &=~ SLF_TOSS; | |
7d3fce8c ED |
690 | memcpy(&cs->cs_ip, iph, sizeof(*iph)); |
691 | memcpy(&cs->cs_tcp, th, sizeof(*th)); | |
1da177e4 | 692 | if (ihl > 5) |
7d3fce8c ED |
693 | memcpy(cs->cs_ipopt, &iph[1], (ihl - 5) * 4); |
694 | if (th->doff > 5) | |
695 | memcpy(cs->cs_tcpopt, &th[1], (th->doff - 5) * 4); | |
696 | cs->cs_hsize = ihl*2 + th->doff*2; | |
3f01ddb9 | 697 | cs->initialized = true; |
1da177e4 LT |
698 | /* Put headers back on packet |
699 | * Neither header checksum is recalculated | |
700 | */ | |
701 | comp->sls_i_uncompressed++; | |
702 | return isize; | |
703 | } | |
704 | ||
705 | int | |
706 | slhc_toss(struct slcompress *comp) | |
707 | { | |
708 | if ( comp == NULLSLCOMPR ) | |
709 | return 0; | |
710 | ||
711 | comp->flags |= SLF_TOSS; | |
712 | return 0; | |
713 | } | |
714 | ||
1da177e4 LT |
715 | #else /* CONFIG_INET */ |
716 | ||
1da177e4 LT |
717 | int |
718 | slhc_toss(struct slcompress *comp) | |
719 | { | |
720 | printk(KERN_DEBUG "Called IP function on non IP-system: slhc_toss"); | |
721 | return -EINVAL; | |
722 | } | |
723 | int | |
724 | slhc_uncompress(struct slcompress *comp, unsigned char *icp, int isize) | |
725 | { | |
726 | printk(KERN_DEBUG "Called IP function on non IP-system: slhc_uncompress"); | |
727 | return -EINVAL; | |
728 | } | |
729 | int | |
730 | slhc_compress(struct slcompress *comp, unsigned char *icp, int isize, | |
731 | unsigned char *ocp, unsigned char **cpp, int compress_cid) | |
732 | { | |
733 | printk(KERN_DEBUG "Called IP function on non IP-system: slhc_compress"); | |
734 | return -EINVAL; | |
735 | } | |
736 | ||
737 | int | |
738 | slhc_remember(struct slcompress *comp, unsigned char *icp, int isize) | |
739 | { | |
740 | printk(KERN_DEBUG "Called IP function on non IP-system: slhc_remember"); | |
741 | return -EINVAL; | |
742 | } | |
743 | ||
744 | void | |
745 | slhc_free(struct slcompress *comp) | |
746 | { | |
747 | printk(KERN_DEBUG "Called IP function on non IP-system: slhc_free"); | |
1da177e4 LT |
748 | } |
749 | struct slcompress * | |
750 | slhc_init(int rslots, int tslots) | |
751 | { | |
752 | printk(KERN_DEBUG "Called IP function on non IP-system: slhc_init"); | |
753 | return NULL; | |
754 | } | |
7f8a688e DK |
755 | |
756 | #endif /* CONFIG_INET */ | |
757 | ||
758 | /* VJ header compression */ | |
1da177e4 LT |
759 | EXPORT_SYMBOL(slhc_init); |
760 | EXPORT_SYMBOL(slhc_free); | |
761 | EXPORT_SYMBOL(slhc_remember); | |
762 | EXPORT_SYMBOL(slhc_compress); | |
763 | EXPORT_SYMBOL(slhc_uncompress); | |
764 | EXPORT_SYMBOL(slhc_toss); | |
765 | ||
e1b1d282 | 766 | MODULE_DESCRIPTION("Compression helpers for SLIP (serial line)"); |
1da177e4 | 767 | MODULE_LICENSE("Dual BSD/GPL"); |