11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * INET An implementation of the TCP/IP protocol suite for the LINUX 31da177e4SLinus Torvalds * operating system. INET is implemented using the BSD Socket 41da177e4SLinus Torvalds * interface as the means of communication with the user level. 51da177e4SLinus Torvalds * 61da177e4SLinus Torvalds * The Internet Protocol (IP) output module. 71da177e4SLinus Torvalds * 81da177e4SLinus Torvalds * Version: $Id: ip_output.c,v 1.100 2002/02/01 22:01:03 davem Exp $ 91da177e4SLinus Torvalds * 1002c30a84SJesper Juhl * Authors: Ross Biro 111da177e4SLinus Torvalds * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG> 121da177e4SLinus Torvalds * Donald Becker, <becker@super.org> 131da177e4SLinus Torvalds * Alan Cox, <Alan.Cox@linux.org> 141da177e4SLinus Torvalds * Richard Underwood 151da177e4SLinus Torvalds * Stefan Becker, <stefanb@yello.ping.de> 161da177e4SLinus Torvalds * Jorge Cwik, <jorge@laser.satlink.net> 171da177e4SLinus Torvalds * Arnt Gulbrandsen, <agulbra@nvg.unit.no> 181da177e4SLinus Torvalds * Hirokazu Takahashi, <taka@valinux.co.jp> 191da177e4SLinus Torvalds * 201da177e4SLinus Torvalds * See ip_input.c for original log 211da177e4SLinus Torvalds * 221da177e4SLinus Torvalds * Fixes: 231da177e4SLinus Torvalds * Alan Cox : Missing nonblock feature in ip_build_xmit. 241da177e4SLinus Torvalds * Mike Kilburn : htons() missing in ip_build_xmit. 251da177e4SLinus Torvalds * Bradford Johnson: Fix faulty handling of some frames when 261da177e4SLinus Torvalds * no route is found. 271da177e4SLinus Torvalds * Alexander Demenshin: Missing sk/skb free in ip_queue_xmit 281da177e4SLinus Torvalds * (in case if packet not accepted by 291da177e4SLinus Torvalds * output firewall rules) 301da177e4SLinus Torvalds * Mike McLagan : Routing by source 311da177e4SLinus Torvalds * Alexey Kuznetsov: use new route cache 321da177e4SLinus Torvalds * Andi Kleen: Fix broken PMTU recovery and remove 331da177e4SLinus Torvalds * some redundant tests. 341da177e4SLinus Torvalds * Vitaly E. Lavrov : Transparent proxy revived after year coma. 351da177e4SLinus Torvalds * Andi Kleen : Replace ip_reply with ip_send_reply. 361da177e4SLinus Torvalds * Andi Kleen : Split fast and slow ip_build_xmit path 371da177e4SLinus Torvalds * for decreased register pressure on x86 381da177e4SLinus Torvalds * and more readibility. 391da177e4SLinus Torvalds * Marc Boucher : When call_out_firewall returns FW_QUEUE, 401da177e4SLinus Torvalds * silently drop skb instead of failing with -EPERM. 411da177e4SLinus Torvalds * Detlev Wengorz : Copy protocol for fragments. 421da177e4SLinus Torvalds * Hirokazu Takahashi: HW checksumming for outgoing UDP 431da177e4SLinus Torvalds * datagrams. 441da177e4SLinus Torvalds * Hirokazu Takahashi: sendfile() on UDP works now. 451da177e4SLinus Torvalds */ 461da177e4SLinus Torvalds 471da177e4SLinus Torvalds #include <asm/uaccess.h> 481da177e4SLinus Torvalds #include <asm/system.h> 491da177e4SLinus Torvalds #include <linux/module.h> 501da177e4SLinus Torvalds #include <linux/types.h> 511da177e4SLinus Torvalds #include <linux/kernel.h> 521da177e4SLinus Torvalds #include <linux/mm.h> 531da177e4SLinus Torvalds #include <linux/string.h> 541da177e4SLinus Torvalds #include <linux/errno.h> 55a1f8e7f7SAl Viro #include <linux/highmem.h> 561da177e4SLinus Torvalds 571da177e4SLinus Torvalds #include <linux/socket.h> 581da177e4SLinus Torvalds #include <linux/sockios.h> 591da177e4SLinus Torvalds #include <linux/in.h> 601da177e4SLinus Torvalds #include <linux/inet.h> 611da177e4SLinus Torvalds #include <linux/netdevice.h> 621da177e4SLinus Torvalds #include <linux/etherdevice.h> 631da177e4SLinus Torvalds #include <linux/proc_fs.h> 641da177e4SLinus Torvalds #include <linux/stat.h> 651da177e4SLinus Torvalds #include <linux/init.h> 661da177e4SLinus Torvalds 671da177e4SLinus Torvalds #include <net/snmp.h> 681da177e4SLinus Torvalds #include <net/ip.h> 691da177e4SLinus Torvalds #include <net/protocol.h> 701da177e4SLinus Torvalds #include <net/route.h> 71cfacb057SPatrick McHardy #include <net/xfrm.h> 721da177e4SLinus Torvalds #include <linux/skbuff.h> 731da177e4SLinus Torvalds #include <net/sock.h> 741da177e4SLinus Torvalds #include <net/arp.h> 751da177e4SLinus Torvalds #include <net/icmp.h> 761da177e4SLinus Torvalds #include <net/checksum.h> 771da177e4SLinus Torvalds #include <net/inetpeer.h> 781da177e4SLinus Torvalds #include <net/checksum.h> 791da177e4SLinus Torvalds #include <linux/igmp.h> 801da177e4SLinus Torvalds #include <linux/netfilter_ipv4.h> 811da177e4SLinus Torvalds #include <linux/netfilter_bridge.h> 821da177e4SLinus Torvalds #include <linux/mroute.h> 831da177e4SLinus Torvalds #include <linux/netlink.h> 846cbb0df7SArnaldo Carvalho de Melo #include <linux/tcp.h> 851da177e4SLinus Torvalds 86ab32ea5dSBrian Haley int sysctl_ip_default_ttl __read_mostly = IPDEFTTL; 871da177e4SLinus Torvalds 881da177e4SLinus Torvalds /* Generate a checksum for an outgoing IP datagram. */ 891da177e4SLinus Torvalds __inline__ void ip_send_check(struct iphdr *iph) 901da177e4SLinus Torvalds { 911da177e4SLinus Torvalds iph->check = 0; 921da177e4SLinus Torvalds iph->check = ip_fast_csum((unsigned char *)iph, iph->ihl); 931da177e4SLinus Torvalds } 941da177e4SLinus Torvalds 951da177e4SLinus Torvalds /* dev_loopback_xmit for use with netfilter. */ 961da177e4SLinus Torvalds static int ip_dev_loopback_xmit(struct sk_buff *newskb) 971da177e4SLinus Torvalds { 98459a98edSArnaldo Carvalho de Melo skb_reset_mac_header(newskb); 99bbe735e4SArnaldo Carvalho de Melo __skb_pull(newskb, skb_network_offset(newskb)); 1001da177e4SLinus Torvalds newskb->pkt_type = PACKET_LOOPBACK; 1011da177e4SLinus Torvalds newskb->ip_summed = CHECKSUM_UNNECESSARY; 1021da177e4SLinus Torvalds BUG_TRAP(newskb->dst); 1031da177e4SLinus Torvalds netif_rx(newskb); 1041da177e4SLinus Torvalds return 0; 1051da177e4SLinus Torvalds } 1061da177e4SLinus Torvalds 1071da177e4SLinus Torvalds static inline int ip_select_ttl(struct inet_sock *inet, struct dst_entry *dst) 1081da177e4SLinus Torvalds { 1091da177e4SLinus Torvalds int ttl = inet->uc_ttl; 1101da177e4SLinus Torvalds 1111da177e4SLinus Torvalds if (ttl < 0) 1121da177e4SLinus Torvalds ttl = dst_metric(dst, RTAX_HOPLIMIT); 1131da177e4SLinus Torvalds return ttl; 1141da177e4SLinus Torvalds } 1151da177e4SLinus Torvalds 1161da177e4SLinus Torvalds /* 1171da177e4SLinus Torvalds * Add an ip header to a skbuff and send it out. 1181da177e4SLinus Torvalds * 1191da177e4SLinus Torvalds */ 1201da177e4SLinus Torvalds int ip_build_and_send_pkt(struct sk_buff *skb, struct sock *sk, 12113d8eaa0SAl Viro __be32 saddr, __be32 daddr, struct ip_options *opt) 1221da177e4SLinus Torvalds { 1231da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 1241da177e4SLinus Torvalds struct rtable *rt = (struct rtable *)skb->dst; 1251da177e4SLinus Torvalds struct iphdr *iph; 1261da177e4SLinus Torvalds 1271da177e4SLinus Torvalds /* Build the IP header. */ 1288856dfa3SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct iphdr) + (opt ? opt->optlen : 0)); 1298856dfa3SArnaldo Carvalho de Melo skb_reset_network_header(skb); 130eddc9ec5SArnaldo Carvalho de Melo iph = ip_hdr(skb); 1311da177e4SLinus Torvalds iph->version = 4; 1321da177e4SLinus Torvalds iph->ihl = 5; 1331da177e4SLinus Torvalds iph->tos = inet->tos; 1341da177e4SLinus Torvalds if (ip_dont_fragment(sk, &rt->u.dst)) 1351da177e4SLinus Torvalds iph->frag_off = htons(IP_DF); 1361da177e4SLinus Torvalds else 1371da177e4SLinus Torvalds iph->frag_off = 0; 1381da177e4SLinus Torvalds iph->ttl = ip_select_ttl(inet, &rt->u.dst); 1391da177e4SLinus Torvalds iph->daddr = rt->rt_dst; 1401da177e4SLinus Torvalds iph->saddr = rt->rt_src; 1411da177e4SLinus Torvalds iph->protocol = sk->sk_protocol; 1421da177e4SLinus Torvalds iph->tot_len = htons(skb->len); 1431da177e4SLinus Torvalds ip_select_ident(iph, &rt->u.dst, sk); 1441da177e4SLinus Torvalds 1451da177e4SLinus Torvalds if (opt && opt->optlen) { 1461da177e4SLinus Torvalds iph->ihl += opt->optlen>>2; 1471da177e4SLinus Torvalds ip_options_build(skb, opt, daddr, rt, 0); 1481da177e4SLinus Torvalds } 1491da177e4SLinus Torvalds ip_send_check(iph); 1501da177e4SLinus Torvalds 1511da177e4SLinus Torvalds skb->priority = sk->sk_priority; 1521da177e4SLinus Torvalds 1531da177e4SLinus Torvalds /* Send it out. */ 1541da177e4SLinus Torvalds return NF_HOOK(PF_INET, NF_IP_LOCAL_OUT, skb, NULL, rt->u.dst.dev, 1551da177e4SLinus Torvalds dst_output); 1561da177e4SLinus Torvalds } 1571da177e4SLinus Torvalds 158d8c97a94SArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip_build_and_send_pkt); 159d8c97a94SArnaldo Carvalho de Melo 1601da177e4SLinus Torvalds static inline int ip_finish_output2(struct sk_buff *skb) 1611da177e4SLinus Torvalds { 1621da177e4SLinus Torvalds struct dst_entry *dst = skb->dst; 16380787ebcSMitsuru Chinen struct rtable *rt = (struct rtable *)dst; 1641da177e4SLinus Torvalds struct net_device *dev = dst->dev; 1651da177e4SLinus Torvalds int hh_len = LL_RESERVED_SPACE(dev); 1661da177e4SLinus Torvalds 16780787ebcSMitsuru Chinen if (rt->rt_type == RTN_MULTICAST) 16880787ebcSMitsuru Chinen IP_INC_STATS(IPSTATS_MIB_OUTMCASTPKTS); 16980787ebcSMitsuru Chinen else if (rt->rt_type == RTN_BROADCAST) 17080787ebcSMitsuru Chinen IP_INC_STATS(IPSTATS_MIB_OUTBCASTPKTS); 17180787ebcSMitsuru Chinen 1721da177e4SLinus Torvalds /* Be paranoid, rather than too clever. */ 1731da177e4SLinus Torvalds if (unlikely(skb_headroom(skb) < hh_len && dev->hard_header)) { 1741da177e4SLinus Torvalds struct sk_buff *skb2; 1751da177e4SLinus Torvalds 1761da177e4SLinus Torvalds skb2 = skb_realloc_headroom(skb, LL_RESERVED_SPACE(dev)); 1771da177e4SLinus Torvalds if (skb2 == NULL) { 1781da177e4SLinus Torvalds kfree_skb(skb); 1791da177e4SLinus Torvalds return -ENOMEM; 1801da177e4SLinus Torvalds } 1811da177e4SLinus Torvalds if (skb->sk) 1821da177e4SLinus Torvalds skb_set_owner_w(skb2, skb->sk); 1831da177e4SLinus Torvalds kfree_skb(skb); 1841da177e4SLinus Torvalds skb = skb2; 1851da177e4SLinus Torvalds } 1861da177e4SLinus Torvalds 1873644f0ceSStephen Hemminger if (dst->hh) 1883644f0ceSStephen Hemminger return neigh_hh_output(dst->hh, skb); 1893644f0ceSStephen Hemminger else if (dst->neighbour) 1901da177e4SLinus Torvalds return dst->neighbour->output(skb); 1911da177e4SLinus Torvalds 1921da177e4SLinus Torvalds if (net_ratelimit()) 1931da177e4SLinus Torvalds printk(KERN_DEBUG "ip_finish_output2: No header cache and no neighbour!\n"); 1941da177e4SLinus Torvalds kfree_skb(skb); 1951da177e4SLinus Torvalds return -EINVAL; 1961da177e4SLinus Torvalds } 1971da177e4SLinus Torvalds 198628a5c56SJohn Heffner static inline int ip_skb_dst_mtu(struct sk_buff *skb) 199628a5c56SJohn Heffner { 200628a5c56SJohn Heffner struct inet_sock *inet = skb->sk ? inet_sk(skb->sk) : NULL; 201628a5c56SJohn Heffner 202628a5c56SJohn Heffner return (inet && inet->pmtudisc == IP_PMTUDISC_PROBE) ? 203628a5c56SJohn Heffner skb->dst->dev->mtu : dst_mtu(skb->dst); 204628a5c56SJohn Heffner } 205628a5c56SJohn Heffner 20633d043d6SThomas Graf static inline int ip_finish_output(struct sk_buff *skb) 2071da177e4SLinus Torvalds { 2085c901daaSPatrick McHardy #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM) 2095c901daaSPatrick McHardy /* Policy lookup after SNAT yielded a new policy */ 21048d5cad8SPatrick McHardy if (skb->dst->xfrm != NULL) { 21148d5cad8SPatrick McHardy IPCB(skb)->flags |= IPSKB_REROUTED; 21248d5cad8SPatrick McHardy return dst_output(skb); 21348d5cad8SPatrick McHardy } 2145c901daaSPatrick McHardy #endif 215628a5c56SJohn Heffner if (skb->len > ip_skb_dst_mtu(skb) && !skb_is_gso(skb)) 2161bd9bef6SPatrick McHardy return ip_fragment(skb, ip_finish_output2); 2171bd9bef6SPatrick McHardy else 2181bd9bef6SPatrick McHardy return ip_finish_output2(skb); 2191da177e4SLinus Torvalds } 2201da177e4SLinus Torvalds 2211da177e4SLinus Torvalds int ip_mc_output(struct sk_buff *skb) 2221da177e4SLinus Torvalds { 2231da177e4SLinus Torvalds struct sock *sk = skb->sk; 2241da177e4SLinus Torvalds struct rtable *rt = (struct rtable*)skb->dst; 2251da177e4SLinus Torvalds struct net_device *dev = rt->u.dst.dev; 2261da177e4SLinus Torvalds 2271da177e4SLinus Torvalds /* 2281da177e4SLinus Torvalds * If the indicated interface is up and running, send the packet. 2291da177e4SLinus Torvalds */ 2301da177e4SLinus Torvalds IP_INC_STATS(IPSTATS_MIB_OUTREQUESTS); 2311da177e4SLinus Torvalds 2321da177e4SLinus Torvalds skb->dev = dev; 2331da177e4SLinus Torvalds skb->protocol = htons(ETH_P_IP); 2341da177e4SLinus Torvalds 2351da177e4SLinus Torvalds /* 2361da177e4SLinus Torvalds * Multicasts are looped back for other local users 2371da177e4SLinus Torvalds */ 2381da177e4SLinus Torvalds 2391da177e4SLinus Torvalds if (rt->rt_flags&RTCF_MULTICAST) { 2401da177e4SLinus Torvalds if ((!sk || inet_sk(sk)->mc_loop) 2411da177e4SLinus Torvalds #ifdef CONFIG_IP_MROUTE 2421da177e4SLinus Torvalds /* Small optimization: do not loopback not local frames, 2431da177e4SLinus Torvalds which returned after forwarding; they will be dropped 2441da177e4SLinus Torvalds by ip_mr_input in any case. 2451da177e4SLinus Torvalds Note, that local frames are looped back to be delivered 2461da177e4SLinus Torvalds to local recipients. 2471da177e4SLinus Torvalds 2481da177e4SLinus Torvalds This check is duplicated in ip_mr_input at the moment. 2491da177e4SLinus Torvalds */ 2501da177e4SLinus Torvalds && ((rt->rt_flags&RTCF_LOCAL) || !(IPCB(skb)->flags&IPSKB_FORWARDED)) 2511da177e4SLinus Torvalds #endif 2521da177e4SLinus Torvalds ) { 2531da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 2541da177e4SLinus Torvalds if (newskb) 2551da177e4SLinus Torvalds NF_HOOK(PF_INET, NF_IP_POST_ROUTING, newskb, NULL, 2561da177e4SLinus Torvalds newskb->dev, 2571da177e4SLinus Torvalds ip_dev_loopback_xmit); 2581da177e4SLinus Torvalds } 2591da177e4SLinus Torvalds 2601da177e4SLinus Torvalds /* Multicasts with ttl 0 must not go beyond the host */ 2611da177e4SLinus Torvalds 262eddc9ec5SArnaldo Carvalho de Melo if (ip_hdr(skb)->ttl == 0) { 2631da177e4SLinus Torvalds kfree_skb(skb); 2641da177e4SLinus Torvalds return 0; 2651da177e4SLinus Torvalds } 2661da177e4SLinus Torvalds } 2671da177e4SLinus Torvalds 2681da177e4SLinus Torvalds if (rt->rt_flags&RTCF_BROADCAST) { 2691da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 2701da177e4SLinus Torvalds if (newskb) 2711da177e4SLinus Torvalds NF_HOOK(PF_INET, NF_IP_POST_ROUTING, newskb, NULL, 2721da177e4SLinus Torvalds newskb->dev, ip_dev_loopback_xmit); 2731da177e4SLinus Torvalds } 2741da177e4SLinus Torvalds 27548d5cad8SPatrick McHardy return NF_HOOK_COND(PF_INET, NF_IP_POST_ROUTING, skb, NULL, skb->dev, 27648d5cad8SPatrick McHardy ip_finish_output, 27748d5cad8SPatrick McHardy !(IPCB(skb)->flags & IPSKB_REROUTED)); 2781da177e4SLinus Torvalds } 2791da177e4SLinus Torvalds 2801da177e4SLinus Torvalds int ip_output(struct sk_buff *skb) 2811da177e4SLinus Torvalds { 2821bd9bef6SPatrick McHardy struct net_device *dev = skb->dst->dev; 2831bd9bef6SPatrick McHardy 2841da177e4SLinus Torvalds IP_INC_STATS(IPSTATS_MIB_OUTREQUESTS); 2851da177e4SLinus Torvalds 2861bd9bef6SPatrick McHardy skb->dev = dev; 2871bd9bef6SPatrick McHardy skb->protocol = htons(ETH_P_IP); 2881bd9bef6SPatrick McHardy 28948d5cad8SPatrick McHardy return NF_HOOK_COND(PF_INET, NF_IP_POST_ROUTING, skb, NULL, dev, 29048d5cad8SPatrick McHardy ip_finish_output, 29148d5cad8SPatrick McHardy !(IPCB(skb)->flags & IPSKB_REROUTED)); 2921da177e4SLinus Torvalds } 2931da177e4SLinus Torvalds 294e89862f4SDavid S. Miller int ip_queue_xmit(struct sk_buff *skb, int ipfragok) 2951da177e4SLinus Torvalds { 296e89862f4SDavid S. Miller struct sock *sk = skb->sk; 2971da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 2981da177e4SLinus Torvalds struct ip_options *opt = inet->opt; 2991da177e4SLinus Torvalds struct rtable *rt; 3001da177e4SLinus Torvalds struct iphdr *iph; 3011da177e4SLinus Torvalds 3021da177e4SLinus Torvalds /* Skip all of this if the packet is already routed, 3031da177e4SLinus Torvalds * f.e. by something like SCTP. 3041da177e4SLinus Torvalds */ 3051da177e4SLinus Torvalds rt = (struct rtable *) skb->dst; 3061da177e4SLinus Torvalds if (rt != NULL) 3071da177e4SLinus Torvalds goto packet_routed; 3081da177e4SLinus Torvalds 3091da177e4SLinus Torvalds /* Make sure we can route this packet. */ 3101da177e4SLinus Torvalds rt = (struct rtable *)__sk_dst_check(sk, 0); 3111da177e4SLinus Torvalds if (rt == NULL) { 3123ca3c68eSAl Viro __be32 daddr; 3131da177e4SLinus Torvalds 3141da177e4SLinus Torvalds /* Use correct destination address if we have options. */ 3151da177e4SLinus Torvalds daddr = inet->daddr; 3161da177e4SLinus Torvalds if(opt && opt->srr) 3171da177e4SLinus Torvalds daddr = opt->faddr; 3181da177e4SLinus Torvalds 3191da177e4SLinus Torvalds { 3201da177e4SLinus Torvalds struct flowi fl = { .oif = sk->sk_bound_dev_if, 3211da177e4SLinus Torvalds .nl_u = { .ip4_u = 3221da177e4SLinus Torvalds { .daddr = daddr, 3231da177e4SLinus Torvalds .saddr = inet->saddr, 3241da177e4SLinus Torvalds .tos = RT_CONN_FLAGS(sk) } }, 3251da177e4SLinus Torvalds .proto = sk->sk_protocol, 3261da177e4SLinus Torvalds .uli_u = { .ports = 3271da177e4SLinus Torvalds { .sport = inet->sport, 3281da177e4SLinus Torvalds .dport = inet->dport } } }; 3291da177e4SLinus Torvalds 3301da177e4SLinus Torvalds /* If this fails, retransmit mechanism of transport layer will 3311da177e4SLinus Torvalds * keep trying until route appears or the connection times 3321da177e4SLinus Torvalds * itself out. 3331da177e4SLinus Torvalds */ 334beb8d13bSVenkat Yekkirala security_sk_classify_flow(sk, &fl); 3351da177e4SLinus Torvalds if (ip_route_output_flow(&rt, &fl, sk, 0)) 3361da177e4SLinus Torvalds goto no_route; 3371da177e4SLinus Torvalds } 3386cbb0df7SArnaldo Carvalho de Melo sk_setup_caps(sk, &rt->u.dst); 3391da177e4SLinus Torvalds } 3401da177e4SLinus Torvalds skb->dst = dst_clone(&rt->u.dst); 3411da177e4SLinus Torvalds 3421da177e4SLinus Torvalds packet_routed: 3431da177e4SLinus Torvalds if (opt && opt->is_strictroute && rt->rt_dst != rt->rt_gateway) 3441da177e4SLinus Torvalds goto no_route; 3451da177e4SLinus Torvalds 3461da177e4SLinus Torvalds /* OK, we know where to send it, allocate and build IP header. */ 3478856dfa3SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct iphdr) + (opt ? opt->optlen : 0)); 3488856dfa3SArnaldo Carvalho de Melo skb_reset_network_header(skb); 349eddc9ec5SArnaldo Carvalho de Melo iph = ip_hdr(skb); 350714e85beSAl Viro *((__be16 *)iph) = htons((4 << 12) | (5 << 8) | (inet->tos & 0xff)); 3511da177e4SLinus Torvalds iph->tot_len = htons(skb->len); 3521da177e4SLinus Torvalds if (ip_dont_fragment(sk, &rt->u.dst) && !ipfragok) 3531da177e4SLinus Torvalds iph->frag_off = htons(IP_DF); 3541da177e4SLinus Torvalds else 3551da177e4SLinus Torvalds iph->frag_off = 0; 3561da177e4SLinus Torvalds iph->ttl = ip_select_ttl(inet, &rt->u.dst); 3571da177e4SLinus Torvalds iph->protocol = sk->sk_protocol; 3581da177e4SLinus Torvalds iph->saddr = rt->rt_src; 3591da177e4SLinus Torvalds iph->daddr = rt->rt_dst; 3601da177e4SLinus Torvalds /* Transport layer set skb->h.foo itself. */ 3611da177e4SLinus Torvalds 3621da177e4SLinus Torvalds if (opt && opt->optlen) { 3631da177e4SLinus Torvalds iph->ihl += opt->optlen >> 2; 3641da177e4SLinus Torvalds ip_options_build(skb, opt, inet->daddr, rt, 0); 3651da177e4SLinus Torvalds } 3661da177e4SLinus Torvalds 36789f5f0aeSHerbert Xu ip_select_ident_more(iph, &rt->u.dst, sk, 3687967168cSHerbert Xu (skb_shinfo(skb)->gso_segs ?: 1) - 1); 3691da177e4SLinus Torvalds 3701da177e4SLinus Torvalds /* Add an IP checksum. */ 3711da177e4SLinus Torvalds ip_send_check(iph); 3721da177e4SLinus Torvalds 3731da177e4SLinus Torvalds skb->priority = sk->sk_priority; 3741da177e4SLinus Torvalds 3751da177e4SLinus Torvalds return NF_HOOK(PF_INET, NF_IP_LOCAL_OUT, skb, NULL, rt->u.dst.dev, 3761da177e4SLinus Torvalds dst_output); 3771da177e4SLinus Torvalds 3781da177e4SLinus Torvalds no_route: 3791da177e4SLinus Torvalds IP_INC_STATS(IPSTATS_MIB_OUTNOROUTES); 3801da177e4SLinus Torvalds kfree_skb(skb); 3811da177e4SLinus Torvalds return -EHOSTUNREACH; 3821da177e4SLinus Torvalds } 3831da177e4SLinus Torvalds 3841da177e4SLinus Torvalds 3851da177e4SLinus Torvalds static void ip_copy_metadata(struct sk_buff *to, struct sk_buff *from) 3861da177e4SLinus Torvalds { 3871da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 3881da177e4SLinus Torvalds to->priority = from->priority; 3891da177e4SLinus Torvalds to->protocol = from->protocol; 3901da177e4SLinus Torvalds dst_release(to->dst); 3911da177e4SLinus Torvalds to->dst = dst_clone(from->dst); 3921da177e4SLinus Torvalds to->dev = from->dev; 39382e91ffeSThomas Graf to->mark = from->mark; 3941da177e4SLinus Torvalds 3951da177e4SLinus Torvalds /* Copy the flags to each fragment. */ 3961da177e4SLinus Torvalds IPCB(to)->flags = IPCB(from)->flags; 3971da177e4SLinus Torvalds 3981da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 3991da177e4SLinus Torvalds to->tc_index = from->tc_index; 4001da177e4SLinus Torvalds #endif 401e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 402c98d80edSJulian Anastasov #if defined(CONFIG_IP_VS) || defined(CONFIG_IP_VS_MODULE) 403c98d80edSJulian Anastasov to->ipvs_property = from->ipvs_property; 404c98d80edSJulian Anastasov #endif 405984bc16cSJames Morris skb_copy_secmark(to, from); 4061da177e4SLinus Torvalds } 4071da177e4SLinus Torvalds 4081da177e4SLinus Torvalds /* 4091da177e4SLinus Torvalds * This IP datagram is too large to be sent in one piece. Break it up into 4101da177e4SLinus Torvalds * smaller pieces (each of size equal to IP header plus 4111da177e4SLinus Torvalds * a block of the data of the original IP data part) that will yet fit in a 4121da177e4SLinus Torvalds * single device frame, and queue such a frame for sending. 4131da177e4SLinus Torvalds */ 4141da177e4SLinus Torvalds 4152e2f7aefSPatrick McHardy int ip_fragment(struct sk_buff *skb, int (*output)(struct sk_buff*)) 4161da177e4SLinus Torvalds { 4171da177e4SLinus Torvalds struct iphdr *iph; 4181da177e4SLinus Torvalds int raw = 0; 4191da177e4SLinus Torvalds int ptr; 4201da177e4SLinus Torvalds struct net_device *dev; 4211da177e4SLinus Torvalds struct sk_buff *skb2; 4229bcfcaf5SStephen Hemminger unsigned int mtu, hlen, left, len, ll_rs, pad; 4231da177e4SLinus Torvalds int offset; 42476ab608dSAlexey Dobriyan __be16 not_last_frag; 4251da177e4SLinus Torvalds struct rtable *rt = (struct rtable*)skb->dst; 4261da177e4SLinus Torvalds int err = 0; 4271da177e4SLinus Torvalds 4281da177e4SLinus Torvalds dev = rt->u.dst.dev; 4291da177e4SLinus Torvalds 4301da177e4SLinus Torvalds /* 4311da177e4SLinus Torvalds * Point into the IP datagram header. 4321da177e4SLinus Torvalds */ 4331da177e4SLinus Torvalds 434eddc9ec5SArnaldo Carvalho de Melo iph = ip_hdr(skb); 4351da177e4SLinus Torvalds 4361da177e4SLinus Torvalds if (unlikely((iph->frag_off & htons(IP_DF)) && !skb->local_df)) { 4370668b472SWei Dong IP_INC_STATS(IPSTATS_MIB_FRAGFAILS); 4381da177e4SLinus Torvalds icmp_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED, 439628a5c56SJohn Heffner htonl(ip_skb_dst_mtu(skb))); 4401da177e4SLinus Torvalds kfree_skb(skb); 4411da177e4SLinus Torvalds return -EMSGSIZE; 4421da177e4SLinus Torvalds } 4431da177e4SLinus Torvalds 4441da177e4SLinus Torvalds /* 4451da177e4SLinus Torvalds * Setup starting values. 4461da177e4SLinus Torvalds */ 4471da177e4SLinus Torvalds 4481da177e4SLinus Torvalds hlen = iph->ihl * 4; 4491da177e4SLinus Torvalds mtu = dst_mtu(&rt->u.dst) - hlen; /* Size of data space */ 45089cee8b1SHerbert Xu IPCB(skb)->flags |= IPSKB_FRAG_COMPLETE; 4511da177e4SLinus Torvalds 4521da177e4SLinus Torvalds /* When frag_list is given, use it. First, check its validity: 4531da177e4SLinus Torvalds * some transformers could create wrong frag_list or break existing 4541da177e4SLinus Torvalds * one, it is not prohibited. In this case fall back to copying. 4551da177e4SLinus Torvalds * 4561da177e4SLinus Torvalds * LATER: this step can be merged to real generation of fragments, 4571da177e4SLinus Torvalds * we can switch to copy when see the first bad fragment. 4581da177e4SLinus Torvalds */ 4591da177e4SLinus Torvalds if (skb_shinfo(skb)->frag_list) { 4601da177e4SLinus Torvalds struct sk_buff *frag; 4611da177e4SLinus Torvalds int first_len = skb_pagelen(skb); 4621da177e4SLinus Torvalds 4631da177e4SLinus Torvalds if (first_len - hlen > mtu || 4641da177e4SLinus Torvalds ((first_len - hlen) & 7) || 4651da177e4SLinus Torvalds (iph->frag_off & htons(IP_MF|IP_OFFSET)) || 4661da177e4SLinus Torvalds skb_cloned(skb)) 4671da177e4SLinus Torvalds goto slow_path; 4681da177e4SLinus Torvalds 4691da177e4SLinus Torvalds for (frag = skb_shinfo(skb)->frag_list; frag; frag = frag->next) { 4701da177e4SLinus Torvalds /* Correct geometry. */ 4711da177e4SLinus Torvalds if (frag->len > mtu || 4721da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 4731da177e4SLinus Torvalds skb_headroom(frag) < hlen) 4741da177e4SLinus Torvalds goto slow_path; 4751da177e4SLinus Torvalds 4761da177e4SLinus Torvalds /* Partially cloned skb? */ 4771da177e4SLinus Torvalds if (skb_shared(frag)) 4781da177e4SLinus Torvalds goto slow_path; 4792fdba6b0SHerbert Xu 4802fdba6b0SHerbert Xu BUG_ON(frag->sk); 4812fdba6b0SHerbert Xu if (skb->sk) { 4822fdba6b0SHerbert Xu sock_hold(skb->sk); 4832fdba6b0SHerbert Xu frag->sk = skb->sk; 4842fdba6b0SHerbert Xu frag->destructor = sock_wfree; 4852fdba6b0SHerbert Xu skb->truesize -= frag->truesize; 4862fdba6b0SHerbert Xu } 4871da177e4SLinus Torvalds } 4881da177e4SLinus Torvalds 4891da177e4SLinus Torvalds /* Everything is OK. Generate! */ 4901da177e4SLinus Torvalds 4911da177e4SLinus Torvalds err = 0; 4921da177e4SLinus Torvalds offset = 0; 4931da177e4SLinus Torvalds frag = skb_shinfo(skb)->frag_list; 4941da177e4SLinus Torvalds skb_shinfo(skb)->frag_list = NULL; 4951da177e4SLinus Torvalds skb->data_len = first_len - skb_headlen(skb); 4961da177e4SLinus Torvalds skb->len = first_len; 4971da177e4SLinus Torvalds iph->tot_len = htons(first_len); 4981da177e4SLinus Torvalds iph->frag_off = htons(IP_MF); 4991da177e4SLinus Torvalds ip_send_check(iph); 5001da177e4SLinus Torvalds 5011da177e4SLinus Torvalds for (;;) { 5021da177e4SLinus Torvalds /* Prepare header of the next frame, 5031da177e4SLinus Torvalds * before previous one went down. */ 5041da177e4SLinus Torvalds if (frag) { 5051da177e4SLinus Torvalds frag->ip_summed = CHECKSUM_NONE; 506badff6d0SArnaldo Carvalho de Melo skb_reset_transport_header(frag); 507e2d1bca7SArnaldo Carvalho de Melo __skb_push(frag, hlen); 508e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(frag); 509d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(frag), iph, hlen); 510eddc9ec5SArnaldo Carvalho de Melo iph = ip_hdr(frag); 5111da177e4SLinus Torvalds iph->tot_len = htons(frag->len); 5121da177e4SLinus Torvalds ip_copy_metadata(frag, skb); 5131da177e4SLinus Torvalds if (offset == 0) 5141da177e4SLinus Torvalds ip_options_fragment(frag); 5151da177e4SLinus Torvalds offset += skb->len - hlen; 5161da177e4SLinus Torvalds iph->frag_off = htons(offset>>3); 5171da177e4SLinus Torvalds if (frag->next != NULL) 5181da177e4SLinus Torvalds iph->frag_off |= htons(IP_MF); 5191da177e4SLinus Torvalds /* Ready, complete checksum */ 5201da177e4SLinus Torvalds ip_send_check(iph); 5211da177e4SLinus Torvalds } 5221da177e4SLinus Torvalds 5231da177e4SLinus Torvalds err = output(skb); 5241da177e4SLinus Torvalds 525dafee490SWei Dong if (!err) 526dafee490SWei Dong IP_INC_STATS(IPSTATS_MIB_FRAGCREATES); 5271da177e4SLinus Torvalds if (err || !frag) 5281da177e4SLinus Torvalds break; 5291da177e4SLinus Torvalds 5301da177e4SLinus Torvalds skb = frag; 5311da177e4SLinus Torvalds frag = skb->next; 5321da177e4SLinus Torvalds skb->next = NULL; 5331da177e4SLinus Torvalds } 5341da177e4SLinus Torvalds 5351da177e4SLinus Torvalds if (err == 0) { 5361da177e4SLinus Torvalds IP_INC_STATS(IPSTATS_MIB_FRAGOKS); 5371da177e4SLinus Torvalds return 0; 5381da177e4SLinus Torvalds } 5391da177e4SLinus Torvalds 5401da177e4SLinus Torvalds while (frag) { 5411da177e4SLinus Torvalds skb = frag->next; 5421da177e4SLinus Torvalds kfree_skb(frag); 5431da177e4SLinus Torvalds frag = skb; 5441da177e4SLinus Torvalds } 5451da177e4SLinus Torvalds IP_INC_STATS(IPSTATS_MIB_FRAGFAILS); 5461da177e4SLinus Torvalds return err; 5471da177e4SLinus Torvalds } 5481da177e4SLinus Torvalds 5491da177e4SLinus Torvalds slow_path: 5501da177e4SLinus Torvalds left = skb->len - hlen; /* Space per frame */ 5511da177e4SLinus Torvalds ptr = raw + hlen; /* Where to start from */ 5521da177e4SLinus Torvalds 5531da177e4SLinus Torvalds /* for bridged IP traffic encapsulated inside f.e. a vlan header, 5549bcfcaf5SStephen Hemminger * we need to make room for the encapsulating header 5559bcfcaf5SStephen Hemminger */ 5569bcfcaf5SStephen Hemminger pad = nf_bridge_pad(skb); 5579bcfcaf5SStephen Hemminger ll_rs = LL_RESERVED_SPACE_EXTRA(rt->u.dst.dev, pad); 5589bcfcaf5SStephen Hemminger mtu -= pad; 5599bcfcaf5SStephen Hemminger 5601da177e4SLinus Torvalds /* 5611da177e4SLinus Torvalds * Fragment the datagram. 5621da177e4SLinus Torvalds */ 5631da177e4SLinus Torvalds 5641da177e4SLinus Torvalds offset = (ntohs(iph->frag_off) & IP_OFFSET) << 3; 5651da177e4SLinus Torvalds not_last_frag = iph->frag_off & htons(IP_MF); 5661da177e4SLinus Torvalds 5671da177e4SLinus Torvalds /* 5681da177e4SLinus Torvalds * Keep copying data until we run out. 5691da177e4SLinus Torvalds */ 5701da177e4SLinus Torvalds 5711da177e4SLinus Torvalds while (left > 0) { 5721da177e4SLinus Torvalds len = left; 5731da177e4SLinus Torvalds /* IF: it doesn't fit, use 'mtu' - the data space left */ 5741da177e4SLinus Torvalds if (len > mtu) 5751da177e4SLinus Torvalds len = mtu; 5761da177e4SLinus Torvalds /* IF: we are not sending upto and including the packet end 5771da177e4SLinus Torvalds then align the next start on an eight byte boundary */ 5781da177e4SLinus Torvalds if (len < left) { 5791da177e4SLinus Torvalds len &= ~7; 5801da177e4SLinus Torvalds } 5811da177e4SLinus Torvalds /* 5821da177e4SLinus Torvalds * Allocate buffer. 5831da177e4SLinus Torvalds */ 5841da177e4SLinus Torvalds 5851da177e4SLinus Torvalds if ((skb2 = alloc_skb(len+hlen+ll_rs, GFP_ATOMIC)) == NULL) { 58664ce2073SPatrick McHardy NETDEBUG(KERN_INFO "IP: frag: no memory for new fragment!\n"); 5871da177e4SLinus Torvalds err = -ENOMEM; 5881da177e4SLinus Torvalds goto fail; 5891da177e4SLinus Torvalds } 5901da177e4SLinus Torvalds 5911da177e4SLinus Torvalds /* 5921da177e4SLinus Torvalds * Set up data on packet 5931da177e4SLinus Torvalds */ 5941da177e4SLinus Torvalds 5951da177e4SLinus Torvalds ip_copy_metadata(skb2, skb); 5961da177e4SLinus Torvalds skb_reserve(skb2, ll_rs); 5971da177e4SLinus Torvalds skb_put(skb2, len + hlen); 598c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(skb2); 599b0e380b1SArnaldo Carvalho de Melo skb2->transport_header = skb2->network_header + hlen; 6001da177e4SLinus Torvalds 6011da177e4SLinus Torvalds /* 6021da177e4SLinus Torvalds * Charge the memory for the fragment to any owner 6031da177e4SLinus Torvalds * it might possess 6041da177e4SLinus Torvalds */ 6051da177e4SLinus Torvalds 6061da177e4SLinus Torvalds if (skb->sk) 6071da177e4SLinus Torvalds skb_set_owner_w(skb2, skb->sk); 6081da177e4SLinus Torvalds 6091da177e4SLinus Torvalds /* 6101da177e4SLinus Torvalds * Copy the packet header into the new buffer. 6111da177e4SLinus Torvalds */ 6121da177e4SLinus Torvalds 613d626f62bSArnaldo Carvalho de Melo skb_copy_from_linear_data(skb, skb_network_header(skb2), hlen); 6141da177e4SLinus Torvalds 6151da177e4SLinus Torvalds /* 6161da177e4SLinus Torvalds * Copy a block of the IP datagram. 6171da177e4SLinus Torvalds */ 618bff9b61cSArnaldo Carvalho de Melo if (skb_copy_bits(skb, ptr, skb_transport_header(skb2), len)) 6191da177e4SLinus Torvalds BUG(); 6201da177e4SLinus Torvalds left -= len; 6211da177e4SLinus Torvalds 6221da177e4SLinus Torvalds /* 6231da177e4SLinus Torvalds * Fill in the new header fields. 6241da177e4SLinus Torvalds */ 625eddc9ec5SArnaldo Carvalho de Melo iph = ip_hdr(skb2); 6261da177e4SLinus Torvalds iph->frag_off = htons((offset >> 3)); 6271da177e4SLinus Torvalds 6281da177e4SLinus Torvalds /* ANK: dirty, but effective trick. Upgrade options only if 6291da177e4SLinus Torvalds * the segment to be fragmented was THE FIRST (otherwise, 6301da177e4SLinus Torvalds * options are already fixed) and make it ONCE 6311da177e4SLinus Torvalds * on the initial skb, so that all the following fragments 6321da177e4SLinus Torvalds * will inherit fixed options. 6331da177e4SLinus Torvalds */ 6341da177e4SLinus Torvalds if (offset == 0) 6351da177e4SLinus Torvalds ip_options_fragment(skb); 6361da177e4SLinus Torvalds 6371da177e4SLinus Torvalds /* 6381da177e4SLinus Torvalds * Added AC : If we are fragmenting a fragment that's not the 6391da177e4SLinus Torvalds * last fragment then keep MF on each bit 6401da177e4SLinus Torvalds */ 6411da177e4SLinus Torvalds if (left > 0 || not_last_frag) 6421da177e4SLinus Torvalds iph->frag_off |= htons(IP_MF); 6431da177e4SLinus Torvalds ptr += len; 6441da177e4SLinus Torvalds offset += len; 6451da177e4SLinus Torvalds 6461da177e4SLinus Torvalds /* 6471da177e4SLinus Torvalds * Put this fragment into the sending queue. 6481da177e4SLinus Torvalds */ 6491da177e4SLinus Torvalds iph->tot_len = htons(len + hlen); 6501da177e4SLinus Torvalds 6511da177e4SLinus Torvalds ip_send_check(iph); 6521da177e4SLinus Torvalds 6531da177e4SLinus Torvalds err = output(skb2); 6541da177e4SLinus Torvalds if (err) 6551da177e4SLinus Torvalds goto fail; 656dafee490SWei Dong 657dafee490SWei Dong IP_INC_STATS(IPSTATS_MIB_FRAGCREATES); 6581da177e4SLinus Torvalds } 6591da177e4SLinus Torvalds kfree_skb(skb); 6601da177e4SLinus Torvalds IP_INC_STATS(IPSTATS_MIB_FRAGOKS); 6611da177e4SLinus Torvalds return err; 6621da177e4SLinus Torvalds 6631da177e4SLinus Torvalds fail: 6641da177e4SLinus Torvalds kfree_skb(skb); 6651da177e4SLinus Torvalds IP_INC_STATS(IPSTATS_MIB_FRAGFAILS); 6661da177e4SLinus Torvalds return err; 6671da177e4SLinus Torvalds } 6681da177e4SLinus Torvalds 6692e2f7aefSPatrick McHardy EXPORT_SYMBOL(ip_fragment); 6702e2f7aefSPatrick McHardy 6711da177e4SLinus Torvalds int 6721da177e4SLinus Torvalds ip_generic_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb) 6731da177e4SLinus Torvalds { 6741da177e4SLinus Torvalds struct iovec *iov = from; 6751da177e4SLinus Torvalds 67684fa7933SPatrick McHardy if (skb->ip_summed == CHECKSUM_PARTIAL) { 6771da177e4SLinus Torvalds if (memcpy_fromiovecend(to, iov, offset, len) < 0) 6781da177e4SLinus Torvalds return -EFAULT; 6791da177e4SLinus Torvalds } else { 68044bb9363SAl Viro __wsum csum = 0; 6811da177e4SLinus Torvalds if (csum_partial_copy_fromiovecend(to, iov, offset, len, &csum) < 0) 6821da177e4SLinus Torvalds return -EFAULT; 6831da177e4SLinus Torvalds skb->csum = csum_block_add(skb->csum, csum, odd); 6841da177e4SLinus Torvalds } 6851da177e4SLinus Torvalds return 0; 6861da177e4SLinus Torvalds } 6871da177e4SLinus Torvalds 68844bb9363SAl Viro static inline __wsum 6891da177e4SLinus Torvalds csum_page(struct page *page, int offset, int copy) 6901da177e4SLinus Torvalds { 6911da177e4SLinus Torvalds char *kaddr; 69244bb9363SAl Viro __wsum csum; 6931da177e4SLinus Torvalds kaddr = kmap(page); 6941da177e4SLinus Torvalds csum = csum_partial(kaddr + offset, copy, 0); 6951da177e4SLinus Torvalds kunmap(page); 6961da177e4SLinus Torvalds return csum; 6971da177e4SLinus Torvalds } 6981da177e4SLinus Torvalds 6994b30b1c6SAdrian Bunk static inline int ip_ufo_append_data(struct sock *sk, 700e89e9cf5SAnanda Raju int getfrag(void *from, char *to, int offset, int len, 701e89e9cf5SAnanda Raju int odd, struct sk_buff *skb), 702e89e9cf5SAnanda Raju void *from, int length, int hh_len, int fragheaderlen, 703e89e9cf5SAnanda Raju int transhdrlen, int mtu,unsigned int flags) 704e89e9cf5SAnanda Raju { 705e89e9cf5SAnanda Raju struct sk_buff *skb; 706e89e9cf5SAnanda Raju int err; 707e89e9cf5SAnanda Raju 708e89e9cf5SAnanda Raju /* There is support for UDP fragmentation offload by network 709e89e9cf5SAnanda Raju * device, so create one single skb packet containing complete 710e89e9cf5SAnanda Raju * udp datagram 711e89e9cf5SAnanda Raju */ 712e89e9cf5SAnanda Raju if ((skb = skb_peek_tail(&sk->sk_write_queue)) == NULL) { 713e89e9cf5SAnanda Raju skb = sock_alloc_send_skb(sk, 714e89e9cf5SAnanda Raju hh_len + fragheaderlen + transhdrlen + 20, 715e89e9cf5SAnanda Raju (flags & MSG_DONTWAIT), &err); 716e89e9cf5SAnanda Raju 717e89e9cf5SAnanda Raju if (skb == NULL) 718e89e9cf5SAnanda Raju return err; 719e89e9cf5SAnanda Raju 720e89e9cf5SAnanda Raju /* reserve space for Hardware header */ 721e89e9cf5SAnanda Raju skb_reserve(skb, hh_len); 722e89e9cf5SAnanda Raju 723e89e9cf5SAnanda Raju /* create space for UDP/IP header */ 724e89e9cf5SAnanda Raju skb_put(skb,fragheaderlen + transhdrlen); 725e89e9cf5SAnanda Raju 726e89e9cf5SAnanda Raju /* initialize network header pointer */ 727c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(skb); 728e89e9cf5SAnanda Raju 729e89e9cf5SAnanda Raju /* initialize protocol header pointer */ 730b0e380b1SArnaldo Carvalho de Melo skb->transport_header = skb->network_header + fragheaderlen; 731e89e9cf5SAnanda Raju 73284fa7933SPatrick McHardy skb->ip_summed = CHECKSUM_PARTIAL; 733e89e9cf5SAnanda Raju skb->csum = 0; 734e89e9cf5SAnanda Raju sk->sk_sndmsg_off = 0; 735e89e9cf5SAnanda Raju } 736e89e9cf5SAnanda Raju 737e89e9cf5SAnanda Raju err = skb_append_datato_frags(sk,skb, getfrag, from, 738e89e9cf5SAnanda Raju (length - transhdrlen)); 739e89e9cf5SAnanda Raju if (!err) { 740e89e9cf5SAnanda Raju /* specify the length of each IP datagram fragment*/ 7417967168cSHerbert Xu skb_shinfo(skb)->gso_size = mtu - fragheaderlen; 742f83ef8c0SHerbert Xu skb_shinfo(skb)->gso_type = SKB_GSO_UDP; 743e89e9cf5SAnanda Raju __skb_queue_tail(&sk->sk_write_queue, skb); 744e89e9cf5SAnanda Raju 745e89e9cf5SAnanda Raju return 0; 746e89e9cf5SAnanda Raju } 747e89e9cf5SAnanda Raju /* There is not enough support do UFO , 748e89e9cf5SAnanda Raju * so follow normal path 749e89e9cf5SAnanda Raju */ 750e89e9cf5SAnanda Raju kfree_skb(skb); 751e89e9cf5SAnanda Raju return err; 752e89e9cf5SAnanda Raju } 753e89e9cf5SAnanda Raju 7541da177e4SLinus Torvalds /* 7551da177e4SLinus Torvalds * ip_append_data() and ip_append_page() can make one large IP datagram 7561da177e4SLinus Torvalds * from many pieces of data. Each pieces will be holded on the socket 7571da177e4SLinus Torvalds * until ip_push_pending_frames() is called. Each piece can be a page 7581da177e4SLinus Torvalds * or non-page data. 7591da177e4SLinus Torvalds * 7601da177e4SLinus Torvalds * Not only UDP, other transport protocols - e.g. raw sockets - can use 7611da177e4SLinus Torvalds * this interface potentially. 7621da177e4SLinus Torvalds * 7631da177e4SLinus Torvalds * LATER: length must be adjusted by pad at tail, when it is required. 7641da177e4SLinus Torvalds */ 7651da177e4SLinus Torvalds int ip_append_data(struct sock *sk, 7661da177e4SLinus Torvalds int getfrag(void *from, char *to, int offset, int len, 7671da177e4SLinus Torvalds int odd, struct sk_buff *skb), 7681da177e4SLinus Torvalds void *from, int length, int transhdrlen, 7691da177e4SLinus Torvalds struct ipcm_cookie *ipc, struct rtable *rt, 7701da177e4SLinus Torvalds unsigned int flags) 7711da177e4SLinus Torvalds { 7721da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 7731da177e4SLinus Torvalds struct sk_buff *skb; 7741da177e4SLinus Torvalds 7751da177e4SLinus Torvalds struct ip_options *opt = NULL; 7761da177e4SLinus Torvalds int hh_len; 7771da177e4SLinus Torvalds int exthdrlen; 7781da177e4SLinus Torvalds int mtu; 7791da177e4SLinus Torvalds int copy; 7801da177e4SLinus Torvalds int err; 7811da177e4SLinus Torvalds int offset = 0; 7821da177e4SLinus Torvalds unsigned int maxfraglen, fragheaderlen; 7831da177e4SLinus Torvalds int csummode = CHECKSUM_NONE; 7841da177e4SLinus Torvalds 7851da177e4SLinus Torvalds if (flags&MSG_PROBE) 7861da177e4SLinus Torvalds return 0; 7871da177e4SLinus Torvalds 7881da177e4SLinus Torvalds if (skb_queue_empty(&sk->sk_write_queue)) { 7891da177e4SLinus Torvalds /* 7901da177e4SLinus Torvalds * setup for corking. 7911da177e4SLinus Torvalds */ 7921da177e4SLinus Torvalds opt = ipc->opt; 7931da177e4SLinus Torvalds if (opt) { 7941da177e4SLinus Torvalds if (inet->cork.opt == NULL) { 7951da177e4SLinus Torvalds inet->cork.opt = kmalloc(sizeof(struct ip_options) + 40, sk->sk_allocation); 7961da177e4SLinus Torvalds if (unlikely(inet->cork.opt == NULL)) 7971da177e4SLinus Torvalds return -ENOBUFS; 7981da177e4SLinus Torvalds } 7991da177e4SLinus Torvalds memcpy(inet->cork.opt, opt, sizeof(struct ip_options)+opt->optlen); 8001da177e4SLinus Torvalds inet->cork.flags |= IPCORK_OPT; 8011da177e4SLinus Torvalds inet->cork.addr = ipc->addr; 8021da177e4SLinus Torvalds } 8031da177e4SLinus Torvalds dst_hold(&rt->u.dst); 804628a5c56SJohn Heffner inet->cork.fragsize = mtu = inet->pmtudisc == IP_PMTUDISC_PROBE ? 805628a5c56SJohn Heffner rt->u.dst.dev->mtu : 806628a5c56SJohn Heffner dst_mtu(rt->u.dst.path); 8071da177e4SLinus Torvalds inet->cork.rt = rt; 8081da177e4SLinus Torvalds inet->cork.length = 0; 8091da177e4SLinus Torvalds sk->sk_sndmsg_page = NULL; 8101da177e4SLinus Torvalds sk->sk_sndmsg_off = 0; 8111da177e4SLinus Torvalds if ((exthdrlen = rt->u.dst.header_len) != 0) { 8121da177e4SLinus Torvalds length += exthdrlen; 8131da177e4SLinus Torvalds transhdrlen += exthdrlen; 8141da177e4SLinus Torvalds } 8151da177e4SLinus Torvalds } else { 8161da177e4SLinus Torvalds rt = inet->cork.rt; 8171da177e4SLinus Torvalds if (inet->cork.flags & IPCORK_OPT) 8181da177e4SLinus Torvalds opt = inet->cork.opt; 8191da177e4SLinus Torvalds 8201da177e4SLinus Torvalds transhdrlen = 0; 8211da177e4SLinus Torvalds exthdrlen = 0; 8221da177e4SLinus Torvalds mtu = inet->cork.fragsize; 8231da177e4SLinus Torvalds } 8241da177e4SLinus Torvalds hh_len = LL_RESERVED_SPACE(rt->u.dst.dev); 8251da177e4SLinus Torvalds 8261da177e4SLinus Torvalds fragheaderlen = sizeof(struct iphdr) + (opt ? opt->optlen : 0); 8271da177e4SLinus Torvalds maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen; 8281da177e4SLinus Torvalds 8291da177e4SLinus Torvalds if (inet->cork.length + length > 0xFFFF - fragheaderlen) { 8301da177e4SLinus Torvalds ip_local_error(sk, EMSGSIZE, rt->rt_dst, inet->dport, mtu-exthdrlen); 8311da177e4SLinus Torvalds return -EMSGSIZE; 8321da177e4SLinus Torvalds } 8331da177e4SLinus Torvalds 8341da177e4SLinus Torvalds /* 8351da177e4SLinus Torvalds * transhdrlen > 0 means that this is the first fragment and we wish 8361da177e4SLinus Torvalds * it won't be fragmented in the future. 8371da177e4SLinus Torvalds */ 8381da177e4SLinus Torvalds if (transhdrlen && 8391da177e4SLinus Torvalds length + fragheaderlen <= mtu && 8408648b305SHerbert Xu rt->u.dst.dev->features & NETIF_F_ALL_CSUM && 8411da177e4SLinus Torvalds !exthdrlen) 84284fa7933SPatrick McHardy csummode = CHECKSUM_PARTIAL; 8431da177e4SLinus Torvalds 8441da177e4SLinus Torvalds inet->cork.length += length; 845e89e9cf5SAnanda Raju if (((length > mtu) && (sk->sk_protocol == IPPROTO_UDP)) && 846e89e9cf5SAnanda Raju (rt->u.dst.dev->features & NETIF_F_UFO)) { 847e89e9cf5SAnanda Raju 848baa829d8SPatrick McHardy err = ip_ufo_append_data(sk, getfrag, from, length, hh_len, 849baa829d8SPatrick McHardy fragheaderlen, transhdrlen, mtu, 850baa829d8SPatrick McHardy flags); 851baa829d8SPatrick McHardy if (err) 852e89e9cf5SAnanda Raju goto error; 853e89e9cf5SAnanda Raju return 0; 854e89e9cf5SAnanda Raju } 8551da177e4SLinus Torvalds 8561da177e4SLinus Torvalds /* So, what's going on in the loop below? 8571da177e4SLinus Torvalds * 8581da177e4SLinus Torvalds * We use calculated fragment length to generate chained skb, 8591da177e4SLinus Torvalds * each of segments is IP fragment ready for sending to network after 8601da177e4SLinus Torvalds * adding appropriate IP header. 8611da177e4SLinus Torvalds */ 8621da177e4SLinus Torvalds 8631da177e4SLinus Torvalds if ((skb = skb_peek_tail(&sk->sk_write_queue)) == NULL) 8641da177e4SLinus Torvalds goto alloc_new_skb; 8651da177e4SLinus Torvalds 8661da177e4SLinus Torvalds while (length > 0) { 8671da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 8681da177e4SLinus Torvalds copy = mtu - skb->len; 8691da177e4SLinus Torvalds if (copy < length) 8701da177e4SLinus Torvalds copy = maxfraglen - skb->len; 8711da177e4SLinus Torvalds if (copy <= 0) { 8721da177e4SLinus Torvalds char *data; 8731da177e4SLinus Torvalds unsigned int datalen; 8741da177e4SLinus Torvalds unsigned int fraglen; 8751da177e4SLinus Torvalds unsigned int fraggap; 8761da177e4SLinus Torvalds unsigned int alloclen; 8771da177e4SLinus Torvalds struct sk_buff *skb_prev; 8781da177e4SLinus Torvalds alloc_new_skb: 8791da177e4SLinus Torvalds skb_prev = skb; 8801da177e4SLinus Torvalds if (skb_prev) 8811da177e4SLinus Torvalds fraggap = skb_prev->len - maxfraglen; 8821da177e4SLinus Torvalds else 8831da177e4SLinus Torvalds fraggap = 0; 8841da177e4SLinus Torvalds 8851da177e4SLinus Torvalds /* 8861da177e4SLinus Torvalds * If remaining data exceeds the mtu, 8871da177e4SLinus Torvalds * we know we need more fragment(s). 8881da177e4SLinus Torvalds */ 8891da177e4SLinus Torvalds datalen = length + fraggap; 8901da177e4SLinus Torvalds if (datalen > mtu - fragheaderlen) 8911da177e4SLinus Torvalds datalen = maxfraglen - fragheaderlen; 8921da177e4SLinus Torvalds fraglen = datalen + fragheaderlen; 8931da177e4SLinus Torvalds 8941da177e4SLinus Torvalds if ((flags & MSG_MORE) && 8951da177e4SLinus Torvalds !(rt->u.dst.dev->features&NETIF_F_SG)) 8961da177e4SLinus Torvalds alloclen = mtu; 8971da177e4SLinus Torvalds else 8981da177e4SLinus Torvalds alloclen = datalen + fragheaderlen; 8991da177e4SLinus Torvalds 9001da177e4SLinus Torvalds /* The last fragment gets additional space at tail. 9011da177e4SLinus Torvalds * Note, with MSG_MORE we overallocate on fragments, 9021da177e4SLinus Torvalds * because we have no idea what fragment will be 9031da177e4SLinus Torvalds * the last. 9041da177e4SLinus Torvalds */ 9053d9dd756SZach Brown if (datalen == length + fraggap) 9061da177e4SLinus Torvalds alloclen += rt->u.dst.trailer_len; 9071da177e4SLinus Torvalds 9081da177e4SLinus Torvalds if (transhdrlen) { 9091da177e4SLinus Torvalds skb = sock_alloc_send_skb(sk, 9101da177e4SLinus Torvalds alloclen + hh_len + 15, 9111da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 9121da177e4SLinus Torvalds } else { 9131da177e4SLinus Torvalds skb = NULL; 9141da177e4SLinus Torvalds if (atomic_read(&sk->sk_wmem_alloc) <= 9151da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 9161da177e4SLinus Torvalds skb = sock_wmalloc(sk, 9171da177e4SLinus Torvalds alloclen + hh_len + 15, 1, 9181da177e4SLinus Torvalds sk->sk_allocation); 9191da177e4SLinus Torvalds if (unlikely(skb == NULL)) 9201da177e4SLinus Torvalds err = -ENOBUFS; 9211da177e4SLinus Torvalds } 9221da177e4SLinus Torvalds if (skb == NULL) 9231da177e4SLinus Torvalds goto error; 9241da177e4SLinus Torvalds 9251da177e4SLinus Torvalds /* 9261da177e4SLinus Torvalds * Fill in the control structures 9271da177e4SLinus Torvalds */ 9281da177e4SLinus Torvalds skb->ip_summed = csummode; 9291da177e4SLinus Torvalds skb->csum = 0; 9301da177e4SLinus Torvalds skb_reserve(skb, hh_len); 9311da177e4SLinus Torvalds 9321da177e4SLinus Torvalds /* 9331da177e4SLinus Torvalds * Find where to start putting bytes. 9341da177e4SLinus Torvalds */ 9351da177e4SLinus Torvalds data = skb_put(skb, fraglen); 936c14d2450SArnaldo Carvalho de Melo skb_set_network_header(skb, exthdrlen); 937b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 938b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 9391da177e4SLinus Torvalds data += fragheaderlen; 9401da177e4SLinus Torvalds 9411da177e4SLinus Torvalds if (fraggap) { 9421da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 9431da177e4SLinus Torvalds skb_prev, maxfraglen, 9441da177e4SLinus Torvalds data + transhdrlen, fraggap, 0); 9451da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 9461da177e4SLinus Torvalds skb->csum); 9471da177e4SLinus Torvalds data += fraggap; 948e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 9491da177e4SLinus Torvalds } 9501da177e4SLinus Torvalds 9511da177e4SLinus Torvalds copy = datalen - transhdrlen - fraggap; 9521da177e4SLinus Torvalds if (copy > 0 && getfrag(from, data + transhdrlen, offset, copy, fraggap, skb) < 0) { 9531da177e4SLinus Torvalds err = -EFAULT; 9541da177e4SLinus Torvalds kfree_skb(skb); 9551da177e4SLinus Torvalds goto error; 9561da177e4SLinus Torvalds } 9571da177e4SLinus Torvalds 9581da177e4SLinus Torvalds offset += copy; 9591da177e4SLinus Torvalds length -= datalen - fraggap; 9601da177e4SLinus Torvalds transhdrlen = 0; 9611da177e4SLinus Torvalds exthdrlen = 0; 9621da177e4SLinus Torvalds csummode = CHECKSUM_NONE; 9631da177e4SLinus Torvalds 9641da177e4SLinus Torvalds /* 9651da177e4SLinus Torvalds * Put the packet on the pending queue. 9661da177e4SLinus Torvalds */ 9671da177e4SLinus Torvalds __skb_queue_tail(&sk->sk_write_queue, skb); 9681da177e4SLinus Torvalds continue; 9691da177e4SLinus Torvalds } 9701da177e4SLinus Torvalds 9711da177e4SLinus Torvalds if (copy > length) 9721da177e4SLinus Torvalds copy = length; 9731da177e4SLinus Torvalds 9741da177e4SLinus Torvalds if (!(rt->u.dst.dev->features&NETIF_F_SG)) { 9751da177e4SLinus Torvalds unsigned int off; 9761da177e4SLinus Torvalds 9771da177e4SLinus Torvalds off = skb->len; 9781da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 9791da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 9801da177e4SLinus Torvalds __skb_trim(skb, off); 9811da177e4SLinus Torvalds err = -EFAULT; 9821da177e4SLinus Torvalds goto error; 9831da177e4SLinus Torvalds } 9841da177e4SLinus Torvalds } else { 9851da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 9861da177e4SLinus Torvalds skb_frag_t *frag = &skb_shinfo(skb)->frags[i-1]; 9871da177e4SLinus Torvalds struct page *page = sk->sk_sndmsg_page; 9881da177e4SLinus Torvalds int off = sk->sk_sndmsg_off; 9891da177e4SLinus Torvalds unsigned int left; 9901da177e4SLinus Torvalds 9911da177e4SLinus Torvalds if (page && (left = PAGE_SIZE - off) > 0) { 9921da177e4SLinus Torvalds if (copy >= left) 9931da177e4SLinus Torvalds copy = left; 9941da177e4SLinus Torvalds if (page != frag->page) { 9951da177e4SLinus Torvalds if (i == MAX_SKB_FRAGS) { 9961da177e4SLinus Torvalds err = -EMSGSIZE; 9971da177e4SLinus Torvalds goto error; 9981da177e4SLinus Torvalds } 9991da177e4SLinus Torvalds get_page(page); 10001da177e4SLinus Torvalds skb_fill_page_desc(skb, i, page, sk->sk_sndmsg_off, 0); 10011da177e4SLinus Torvalds frag = &skb_shinfo(skb)->frags[i]; 10021da177e4SLinus Torvalds } 10031da177e4SLinus Torvalds } else if (i < MAX_SKB_FRAGS) { 10041da177e4SLinus Torvalds if (copy > PAGE_SIZE) 10051da177e4SLinus Torvalds copy = PAGE_SIZE; 10061da177e4SLinus Torvalds page = alloc_pages(sk->sk_allocation, 0); 10071da177e4SLinus Torvalds if (page == NULL) { 10081da177e4SLinus Torvalds err = -ENOMEM; 10091da177e4SLinus Torvalds goto error; 10101da177e4SLinus Torvalds } 10111da177e4SLinus Torvalds sk->sk_sndmsg_page = page; 10121da177e4SLinus Torvalds sk->sk_sndmsg_off = 0; 10131da177e4SLinus Torvalds 10141da177e4SLinus Torvalds skb_fill_page_desc(skb, i, page, 0, 0); 10151da177e4SLinus Torvalds frag = &skb_shinfo(skb)->frags[i]; 10161da177e4SLinus Torvalds skb->truesize += PAGE_SIZE; 10171da177e4SLinus Torvalds atomic_add(PAGE_SIZE, &sk->sk_wmem_alloc); 10181da177e4SLinus Torvalds } else { 10191da177e4SLinus Torvalds err = -EMSGSIZE; 10201da177e4SLinus Torvalds goto error; 10211da177e4SLinus Torvalds } 10221da177e4SLinus Torvalds if (getfrag(from, page_address(frag->page)+frag->page_offset+frag->size, offset, copy, skb->len, skb) < 0) { 10231da177e4SLinus Torvalds err = -EFAULT; 10241da177e4SLinus Torvalds goto error; 10251da177e4SLinus Torvalds } 10261da177e4SLinus Torvalds sk->sk_sndmsg_off += copy; 10271da177e4SLinus Torvalds frag->size += copy; 10281da177e4SLinus Torvalds skb->len += copy; 10291da177e4SLinus Torvalds skb->data_len += copy; 10301da177e4SLinus Torvalds } 10311da177e4SLinus Torvalds offset += copy; 10321da177e4SLinus Torvalds length -= copy; 10331da177e4SLinus Torvalds } 10341da177e4SLinus Torvalds 10351da177e4SLinus Torvalds return 0; 10361da177e4SLinus Torvalds 10371da177e4SLinus Torvalds error: 10381da177e4SLinus Torvalds inet->cork.length -= length; 10391da177e4SLinus Torvalds IP_INC_STATS(IPSTATS_MIB_OUTDISCARDS); 10401da177e4SLinus Torvalds return err; 10411da177e4SLinus Torvalds } 10421da177e4SLinus Torvalds 10431da177e4SLinus Torvalds ssize_t ip_append_page(struct sock *sk, struct page *page, 10441da177e4SLinus Torvalds int offset, size_t size, int flags) 10451da177e4SLinus Torvalds { 10461da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 10471da177e4SLinus Torvalds struct sk_buff *skb; 10481da177e4SLinus Torvalds struct rtable *rt; 10491da177e4SLinus Torvalds struct ip_options *opt = NULL; 10501da177e4SLinus Torvalds int hh_len; 10511da177e4SLinus Torvalds int mtu; 10521da177e4SLinus Torvalds int len; 10531da177e4SLinus Torvalds int err; 10541da177e4SLinus Torvalds unsigned int maxfraglen, fragheaderlen, fraggap; 10551da177e4SLinus Torvalds 10561da177e4SLinus Torvalds if (inet->hdrincl) 10571da177e4SLinus Torvalds return -EPERM; 10581da177e4SLinus Torvalds 10591da177e4SLinus Torvalds if (flags&MSG_PROBE) 10601da177e4SLinus Torvalds return 0; 10611da177e4SLinus Torvalds 10621da177e4SLinus Torvalds if (skb_queue_empty(&sk->sk_write_queue)) 10631da177e4SLinus Torvalds return -EINVAL; 10641da177e4SLinus Torvalds 10651da177e4SLinus Torvalds rt = inet->cork.rt; 10661da177e4SLinus Torvalds if (inet->cork.flags & IPCORK_OPT) 10671da177e4SLinus Torvalds opt = inet->cork.opt; 10681da177e4SLinus Torvalds 10691da177e4SLinus Torvalds if (!(rt->u.dst.dev->features&NETIF_F_SG)) 10701da177e4SLinus Torvalds return -EOPNOTSUPP; 10711da177e4SLinus Torvalds 10721da177e4SLinus Torvalds hh_len = LL_RESERVED_SPACE(rt->u.dst.dev); 10731da177e4SLinus Torvalds mtu = inet->cork.fragsize; 10741da177e4SLinus Torvalds 10751da177e4SLinus Torvalds fragheaderlen = sizeof(struct iphdr) + (opt ? opt->optlen : 0); 10761da177e4SLinus Torvalds maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen; 10771da177e4SLinus Torvalds 10781da177e4SLinus Torvalds if (inet->cork.length + size > 0xFFFF - fragheaderlen) { 10791da177e4SLinus Torvalds ip_local_error(sk, EMSGSIZE, rt->rt_dst, inet->dport, mtu); 10801da177e4SLinus Torvalds return -EMSGSIZE; 10811da177e4SLinus Torvalds } 10821da177e4SLinus Torvalds 10831da177e4SLinus Torvalds if ((skb = skb_peek_tail(&sk->sk_write_queue)) == NULL) 10841da177e4SLinus Torvalds return -EINVAL; 10851da177e4SLinus Torvalds 10861da177e4SLinus Torvalds inet->cork.length += size; 1087e89e9cf5SAnanda Raju if ((sk->sk_protocol == IPPROTO_UDP) && 10887967168cSHerbert Xu (rt->u.dst.dev->features & NETIF_F_UFO)) { 10897967168cSHerbert Xu skb_shinfo(skb)->gso_size = mtu - fragheaderlen; 1090f83ef8c0SHerbert Xu skb_shinfo(skb)->gso_type = SKB_GSO_UDP; 10917967168cSHerbert Xu } 1092e89e9cf5SAnanda Raju 10931da177e4SLinus Torvalds 10941da177e4SLinus Torvalds while (size > 0) { 10951da177e4SLinus Torvalds int i; 10961da177e4SLinus Torvalds 109789114afdSHerbert Xu if (skb_is_gso(skb)) 1098e89e9cf5SAnanda Raju len = size; 1099e89e9cf5SAnanda Raju else { 1100e89e9cf5SAnanda Raju 11011da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 11021da177e4SLinus Torvalds len = mtu - skb->len; 11031da177e4SLinus Torvalds if (len < size) 11041da177e4SLinus Torvalds len = maxfraglen - skb->len; 1105e89e9cf5SAnanda Raju } 11061da177e4SLinus Torvalds if (len <= 0) { 11071da177e4SLinus Torvalds struct sk_buff *skb_prev; 11081da177e4SLinus Torvalds int alloclen; 11091da177e4SLinus Torvalds 11101da177e4SLinus Torvalds skb_prev = skb; 11111da177e4SLinus Torvalds fraggap = skb_prev->len - maxfraglen; 11121da177e4SLinus Torvalds 11131da177e4SLinus Torvalds alloclen = fragheaderlen + hh_len + fraggap + 15; 11141da177e4SLinus Torvalds skb = sock_wmalloc(sk, alloclen, 1, sk->sk_allocation); 11151da177e4SLinus Torvalds if (unlikely(!skb)) { 11161da177e4SLinus Torvalds err = -ENOBUFS; 11171da177e4SLinus Torvalds goto error; 11181da177e4SLinus Torvalds } 11191da177e4SLinus Torvalds 11201da177e4SLinus Torvalds /* 11211da177e4SLinus Torvalds * Fill in the control structures 11221da177e4SLinus Torvalds */ 11231da177e4SLinus Torvalds skb->ip_summed = CHECKSUM_NONE; 11241da177e4SLinus Torvalds skb->csum = 0; 11251da177e4SLinus Torvalds skb_reserve(skb, hh_len); 11261da177e4SLinus Torvalds 11271da177e4SLinus Torvalds /* 11281da177e4SLinus Torvalds * Find where to start putting bytes. 11291da177e4SLinus Torvalds */ 1130967b05f6SArnaldo Carvalho de Melo skb_put(skb, fragheaderlen + fraggap); 11312ca9e6f2SArnaldo Carvalho de Melo skb_reset_network_header(skb); 1132b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1133b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 11341da177e4SLinus Torvalds if (fraggap) { 1135967b05f6SArnaldo Carvalho de Melo skb->csum = skb_copy_and_csum_bits(skb_prev, 1136967b05f6SArnaldo Carvalho de Melo maxfraglen, 11379c70220bSArnaldo Carvalho de Melo skb_transport_header(skb), 1138967b05f6SArnaldo Carvalho de Melo fraggap, 0); 11391da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 11401da177e4SLinus Torvalds skb->csum); 1141e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 11421da177e4SLinus Torvalds } 11431da177e4SLinus Torvalds 11441da177e4SLinus Torvalds /* 11451da177e4SLinus Torvalds * Put the packet on the pending queue. 11461da177e4SLinus Torvalds */ 11471da177e4SLinus Torvalds __skb_queue_tail(&sk->sk_write_queue, skb); 11481da177e4SLinus Torvalds continue; 11491da177e4SLinus Torvalds } 11501da177e4SLinus Torvalds 11511da177e4SLinus Torvalds i = skb_shinfo(skb)->nr_frags; 11521da177e4SLinus Torvalds if (len > size) 11531da177e4SLinus Torvalds len = size; 11541da177e4SLinus Torvalds if (skb_can_coalesce(skb, i, page, offset)) { 11551da177e4SLinus Torvalds skb_shinfo(skb)->frags[i-1].size += len; 11561da177e4SLinus Torvalds } else if (i < MAX_SKB_FRAGS) { 11571da177e4SLinus Torvalds get_page(page); 11581da177e4SLinus Torvalds skb_fill_page_desc(skb, i, page, offset, len); 11591da177e4SLinus Torvalds } else { 11601da177e4SLinus Torvalds err = -EMSGSIZE; 11611da177e4SLinus Torvalds goto error; 11621da177e4SLinus Torvalds } 11631da177e4SLinus Torvalds 11641da177e4SLinus Torvalds if (skb->ip_summed == CHECKSUM_NONE) { 116544bb9363SAl Viro __wsum csum; 11661da177e4SLinus Torvalds csum = csum_page(page, offset, len); 11671da177e4SLinus Torvalds skb->csum = csum_block_add(skb->csum, csum, skb->len); 11681da177e4SLinus Torvalds } 11691da177e4SLinus Torvalds 11701da177e4SLinus Torvalds skb->len += len; 11711da177e4SLinus Torvalds skb->data_len += len; 11721da177e4SLinus Torvalds offset += len; 11731da177e4SLinus Torvalds size -= len; 11741da177e4SLinus Torvalds } 11751da177e4SLinus Torvalds return 0; 11761da177e4SLinus Torvalds 11771da177e4SLinus Torvalds error: 11781da177e4SLinus Torvalds inet->cork.length -= size; 11791da177e4SLinus Torvalds IP_INC_STATS(IPSTATS_MIB_OUTDISCARDS); 11801da177e4SLinus Torvalds return err; 11811da177e4SLinus Torvalds } 11821da177e4SLinus Torvalds 11831da177e4SLinus Torvalds /* 11841da177e4SLinus Torvalds * Combined all pending IP fragments on the socket as one IP datagram 11851da177e4SLinus Torvalds * and push them out. 11861da177e4SLinus Torvalds */ 11871da177e4SLinus Torvalds int ip_push_pending_frames(struct sock *sk) 11881da177e4SLinus Torvalds { 11891da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 11901da177e4SLinus Torvalds struct sk_buff **tail_skb; 11911da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 11921da177e4SLinus Torvalds struct ip_options *opt = NULL; 11931da177e4SLinus Torvalds struct rtable *rt = inet->cork.rt; 11941da177e4SLinus Torvalds struct iphdr *iph; 119576ab608dSAlexey Dobriyan __be16 df = 0; 11961da177e4SLinus Torvalds __u8 ttl; 11971da177e4SLinus Torvalds int err = 0; 11981da177e4SLinus Torvalds 11991da177e4SLinus Torvalds if ((skb = __skb_dequeue(&sk->sk_write_queue)) == NULL) 12001da177e4SLinus Torvalds goto out; 12011da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 12021da177e4SLinus Torvalds 12031da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1204d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1205bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 12061da177e4SLinus Torvalds while ((tmp_skb = __skb_dequeue(&sk->sk_write_queue)) != NULL) { 1207cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 12081da177e4SLinus Torvalds *tail_skb = tmp_skb; 12091da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 12101da177e4SLinus Torvalds skb->len += tmp_skb->len; 12111da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 12121da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 12131da177e4SLinus Torvalds __sock_put(tmp_skb->sk); 12141da177e4SLinus Torvalds tmp_skb->destructor = NULL; 12151da177e4SLinus Torvalds tmp_skb->sk = NULL; 12161da177e4SLinus Torvalds } 12171da177e4SLinus Torvalds 12181da177e4SLinus Torvalds /* Unless user demanded real pmtu discovery (IP_PMTUDISC_DO), we allow 12191da177e4SLinus Torvalds * to fragment the frame generated here. No matter, what transforms 12201da177e4SLinus Torvalds * how transforms change size of the packet, it will come out. 12211da177e4SLinus Torvalds */ 1222628a5c56SJohn Heffner if (inet->pmtudisc < IP_PMTUDISC_DO) 12231da177e4SLinus Torvalds skb->local_df = 1; 12241da177e4SLinus Torvalds 12251da177e4SLinus Torvalds /* DF bit is set when we want to see DF on outgoing frames. 12261da177e4SLinus Torvalds * If local_df is set too, we still allow to fragment this frame 12271da177e4SLinus Torvalds * locally. */ 1228628a5c56SJohn Heffner if (inet->pmtudisc >= IP_PMTUDISC_DO || 12291da177e4SLinus Torvalds (skb->len <= dst_mtu(&rt->u.dst) && 12301da177e4SLinus Torvalds ip_dont_fragment(sk, &rt->u.dst))) 12311da177e4SLinus Torvalds df = htons(IP_DF); 12321da177e4SLinus Torvalds 12331da177e4SLinus Torvalds if (inet->cork.flags & IPCORK_OPT) 12341da177e4SLinus Torvalds opt = inet->cork.opt; 12351da177e4SLinus Torvalds 12361da177e4SLinus Torvalds if (rt->rt_type == RTN_MULTICAST) 12371da177e4SLinus Torvalds ttl = inet->mc_ttl; 12381da177e4SLinus Torvalds else 12391da177e4SLinus Torvalds ttl = ip_select_ttl(inet, &rt->u.dst); 12401da177e4SLinus Torvalds 12411da177e4SLinus Torvalds iph = (struct iphdr *)skb->data; 12421da177e4SLinus Torvalds iph->version = 4; 12431da177e4SLinus Torvalds iph->ihl = 5; 12441da177e4SLinus Torvalds if (opt) { 12451da177e4SLinus Torvalds iph->ihl += opt->optlen>>2; 12461da177e4SLinus Torvalds ip_options_build(skb, opt, inet->cork.addr, rt, 0); 12471da177e4SLinus Torvalds } 12481da177e4SLinus Torvalds iph->tos = inet->tos; 12491da177e4SLinus Torvalds iph->tot_len = htons(skb->len); 12501da177e4SLinus Torvalds iph->frag_off = df; 12511a55d57bSAlexey Kuznetsov ip_select_ident(iph, &rt->u.dst, sk); 12521da177e4SLinus Torvalds iph->ttl = ttl; 12531da177e4SLinus Torvalds iph->protocol = sk->sk_protocol; 12541da177e4SLinus Torvalds iph->saddr = rt->rt_src; 12551da177e4SLinus Torvalds iph->daddr = rt->rt_dst; 12561da177e4SLinus Torvalds ip_send_check(iph); 12571da177e4SLinus Torvalds 12581da177e4SLinus Torvalds skb->priority = sk->sk_priority; 12591da177e4SLinus Torvalds skb->dst = dst_clone(&rt->u.dst); 12601da177e4SLinus Torvalds 12611da177e4SLinus Torvalds /* Netfilter gets whole the not fragmented skb. */ 12621da177e4SLinus Torvalds err = NF_HOOK(PF_INET, NF_IP_LOCAL_OUT, skb, NULL, 12631da177e4SLinus Torvalds skb->dst->dev, dst_output); 12641da177e4SLinus Torvalds if (err) { 12651da177e4SLinus Torvalds if (err > 0) 12661da177e4SLinus Torvalds err = inet->recverr ? net_xmit_errno(err) : 0; 12671da177e4SLinus Torvalds if (err) 12681da177e4SLinus Torvalds goto error; 12691da177e4SLinus Torvalds } 12701da177e4SLinus Torvalds 12711da177e4SLinus Torvalds out: 12721da177e4SLinus Torvalds inet->cork.flags &= ~IPCORK_OPT; 12731da177e4SLinus Torvalds kfree(inet->cork.opt); 12741da177e4SLinus Torvalds inet->cork.opt = NULL; 12751da177e4SLinus Torvalds if (inet->cork.rt) { 12761da177e4SLinus Torvalds ip_rt_put(inet->cork.rt); 12771da177e4SLinus Torvalds inet->cork.rt = NULL; 12781da177e4SLinus Torvalds } 12791da177e4SLinus Torvalds return err; 12801da177e4SLinus Torvalds 12811da177e4SLinus Torvalds error: 12821da177e4SLinus Torvalds IP_INC_STATS(IPSTATS_MIB_OUTDISCARDS); 12831da177e4SLinus Torvalds goto out; 12841da177e4SLinus Torvalds } 12851da177e4SLinus Torvalds 12861da177e4SLinus Torvalds /* 12871da177e4SLinus Torvalds * Throw away all pending data on the socket. 12881da177e4SLinus Torvalds */ 12891da177e4SLinus Torvalds void ip_flush_pending_frames(struct sock *sk) 12901da177e4SLinus Torvalds { 12911da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 12921da177e4SLinus Torvalds struct sk_buff *skb; 12931da177e4SLinus Torvalds 12941da177e4SLinus Torvalds while ((skb = __skb_dequeue_tail(&sk->sk_write_queue)) != NULL) 12951da177e4SLinus Torvalds kfree_skb(skb); 12961da177e4SLinus Torvalds 12971da177e4SLinus Torvalds inet->cork.flags &= ~IPCORK_OPT; 12981da177e4SLinus Torvalds kfree(inet->cork.opt); 12991da177e4SLinus Torvalds inet->cork.opt = NULL; 13001da177e4SLinus Torvalds if (inet->cork.rt) { 13011da177e4SLinus Torvalds ip_rt_put(inet->cork.rt); 13021da177e4SLinus Torvalds inet->cork.rt = NULL; 13031da177e4SLinus Torvalds } 13041da177e4SLinus Torvalds } 13051da177e4SLinus Torvalds 13061da177e4SLinus Torvalds 13071da177e4SLinus Torvalds /* 13081da177e4SLinus Torvalds * Fetch data from kernel space and fill in checksum if needed. 13091da177e4SLinus Torvalds */ 13101da177e4SLinus Torvalds static int ip_reply_glue_bits(void *dptr, char *to, int offset, 13111da177e4SLinus Torvalds int len, int odd, struct sk_buff *skb) 13121da177e4SLinus Torvalds { 13135084205fSAl Viro __wsum csum; 13141da177e4SLinus Torvalds 13151da177e4SLinus Torvalds csum = csum_partial_copy_nocheck(dptr+offset, to, len, 0); 13161da177e4SLinus Torvalds skb->csum = csum_block_add(skb->csum, csum, odd); 13171da177e4SLinus Torvalds return 0; 13181da177e4SLinus Torvalds } 13191da177e4SLinus Torvalds 13201da177e4SLinus Torvalds /* 13211da177e4SLinus Torvalds * Generic function to send a packet as reply to another packet. 13221da177e4SLinus Torvalds * Used to send TCP resets so far. ICMP should use this function too. 13231da177e4SLinus Torvalds * 13241da177e4SLinus Torvalds * Should run single threaded per socket because it uses the sock 13251da177e4SLinus Torvalds * structure to pass arguments. 13261da177e4SLinus Torvalds * 13271da177e4SLinus Torvalds * LATER: switch from ip_build_xmit to ip_append_* 13281da177e4SLinus Torvalds */ 13291da177e4SLinus Torvalds void ip_send_reply(struct sock *sk, struct sk_buff *skb, struct ip_reply_arg *arg, 13301da177e4SLinus Torvalds unsigned int len) 13311da177e4SLinus Torvalds { 13321da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 13331da177e4SLinus Torvalds struct { 13341da177e4SLinus Torvalds struct ip_options opt; 13351da177e4SLinus Torvalds char data[40]; 13361da177e4SLinus Torvalds } replyopts; 13371da177e4SLinus Torvalds struct ipcm_cookie ipc; 13383ca3c68eSAl Viro __be32 daddr; 13391da177e4SLinus Torvalds struct rtable *rt = (struct rtable*)skb->dst; 13401da177e4SLinus Torvalds 13411da177e4SLinus Torvalds if (ip_options_echo(&replyopts.opt, skb)) 13421da177e4SLinus Torvalds return; 13431da177e4SLinus Torvalds 13441da177e4SLinus Torvalds daddr = ipc.addr = rt->rt_src; 13451da177e4SLinus Torvalds ipc.opt = NULL; 13461da177e4SLinus Torvalds 13471da177e4SLinus Torvalds if (replyopts.opt.optlen) { 13481da177e4SLinus Torvalds ipc.opt = &replyopts.opt; 13491da177e4SLinus Torvalds 13501da177e4SLinus Torvalds if (ipc.opt->srr) 13511da177e4SLinus Torvalds daddr = replyopts.opt.faddr; 13521da177e4SLinus Torvalds } 13531da177e4SLinus Torvalds 13541da177e4SLinus Torvalds { 1355*f0e48dbfSPatrick McHardy struct flowi fl = { .oif = arg->bound_dev_if, 1356*f0e48dbfSPatrick McHardy .nl_u = { .ip4_u = 13571da177e4SLinus Torvalds { .daddr = daddr, 13581da177e4SLinus Torvalds .saddr = rt->rt_spec_dst, 1359eddc9ec5SArnaldo Carvalho de Melo .tos = RT_TOS(ip_hdr(skb)->tos) } }, 13601da177e4SLinus Torvalds /* Not quite clean, but right. */ 13611da177e4SLinus Torvalds .uli_u = { .ports = 1362aa8223c7SArnaldo Carvalho de Melo { .sport = tcp_hdr(skb)->dest, 1363aa8223c7SArnaldo Carvalho de Melo .dport = tcp_hdr(skb)->source } }, 13641da177e4SLinus Torvalds .proto = sk->sk_protocol }; 1365beb8d13bSVenkat Yekkirala security_skb_classify_flow(skb, &fl); 13661da177e4SLinus Torvalds if (ip_route_output_key(&rt, &fl)) 13671da177e4SLinus Torvalds return; 13681da177e4SLinus Torvalds } 13691da177e4SLinus Torvalds 13701da177e4SLinus Torvalds /* And let IP do all the hard work. 13711da177e4SLinus Torvalds 13721da177e4SLinus Torvalds This chunk is not reenterable, hence spinlock. 13731da177e4SLinus Torvalds Note that it uses the fact, that this function is called 13741da177e4SLinus Torvalds with locally disabled BH and that sk cannot be already spinlocked. 13751da177e4SLinus Torvalds */ 13761da177e4SLinus Torvalds bh_lock_sock(sk); 1377eddc9ec5SArnaldo Carvalho de Melo inet->tos = ip_hdr(skb)->tos; 13781da177e4SLinus Torvalds sk->sk_priority = skb->priority; 1379eddc9ec5SArnaldo Carvalho de Melo sk->sk_protocol = ip_hdr(skb)->protocol; 1380*f0e48dbfSPatrick McHardy sk->sk_bound_dev_if = arg->bound_dev_if; 13811da177e4SLinus Torvalds ip_append_data(sk, ip_reply_glue_bits, arg->iov->iov_base, len, 0, 13821da177e4SLinus Torvalds &ipc, rt, MSG_DONTWAIT); 13831da177e4SLinus Torvalds if ((skb = skb_peek(&sk->sk_write_queue)) != NULL) { 13841da177e4SLinus Torvalds if (arg->csumoffset >= 0) 13859c70220bSArnaldo Carvalho de Melo *((__sum16 *)skb_transport_header(skb) + 13869c70220bSArnaldo Carvalho de Melo arg->csumoffset) = csum_fold(csum_add(skb->csum, 13879c70220bSArnaldo Carvalho de Melo arg->csum)); 13881da177e4SLinus Torvalds skb->ip_summed = CHECKSUM_NONE; 13891da177e4SLinus Torvalds ip_push_pending_frames(sk); 13901da177e4SLinus Torvalds } 13911da177e4SLinus Torvalds 13921da177e4SLinus Torvalds bh_unlock_sock(sk); 13931da177e4SLinus Torvalds 13941da177e4SLinus Torvalds ip_rt_put(rt); 13951da177e4SLinus Torvalds } 13961da177e4SLinus Torvalds 13971da177e4SLinus Torvalds void __init ip_init(void) 13981da177e4SLinus Torvalds { 13991da177e4SLinus Torvalds ip_rt_init(); 14001da177e4SLinus Torvalds inet_initpeers(); 14011da177e4SLinus Torvalds 14021da177e4SLinus Torvalds #if defined(CONFIG_IP_MULTICAST) && defined(CONFIG_PROC_FS) 14031da177e4SLinus Torvalds igmp_mc_proc_init(); 14041da177e4SLinus Torvalds #endif 14051da177e4SLinus Torvalds } 14061da177e4SLinus Torvalds 14071da177e4SLinus Torvalds EXPORT_SYMBOL(ip_generic_getfrag); 14081da177e4SLinus Torvalds EXPORT_SYMBOL(ip_queue_xmit); 14091da177e4SLinus Torvalds EXPORT_SYMBOL(ip_send_check); 1410