]> bbs.cooldavid.org Git - net-next-2.6.git/blame - net/ipv4/ip_output.c
net: use the macros defined for the members of flowi
[net-next-2.6.git] / net / ipv4 / ip_output.c
CommitLineData
1da177e4
LT
1/*
2 * INET An implementation of the TCP/IP protocol suite for the LINUX
3 * operating system. INET is implemented using the BSD Socket
4 * interface as the means of communication with the user level.
5 *
6 * The Internet Protocol (IP) output module.
7 *
02c30a84 8 * Authors: Ross Biro
1da177e4
LT
9 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
10 * Donald Becker, <becker@super.org>
11 * Alan Cox, <Alan.Cox@linux.org>
12 * Richard Underwood
13 * Stefan Becker, <stefanb@yello.ping.de>
14 * Jorge Cwik, <jorge@laser.satlink.net>
15 * Arnt Gulbrandsen, <agulbra@nvg.unit.no>
16 * Hirokazu Takahashi, <taka@valinux.co.jp>
17 *
18 * See ip_input.c for original log
19 *
20 * Fixes:
21 * Alan Cox : Missing nonblock feature in ip_build_xmit.
22 * Mike Kilburn : htons() missing in ip_build_xmit.
e905a9ed 23 * Bradford Johnson: Fix faulty handling of some frames when
1da177e4
LT
24 * no route is found.
25 * Alexander Demenshin: Missing sk/skb free in ip_queue_xmit
26 * (in case if packet not accepted by
27 * output firewall rules)
28 * Mike McLagan : Routing by source
29 * Alexey Kuznetsov: use new route cache
30 * Andi Kleen: Fix broken PMTU recovery and remove
31 * some redundant tests.
32 * Vitaly E. Lavrov : Transparent proxy revived after year coma.
33 * Andi Kleen : Replace ip_reply with ip_send_reply.
e905a9ed
YH
34 * Andi Kleen : Split fast and slow ip_build_xmit path
35 * for decreased register pressure on x86
36 * and more readibility.
1da177e4
LT
37 * Marc Boucher : When call_out_firewall returns FW_QUEUE,
38 * silently drop skb instead of failing with -EPERM.
39 * Detlev Wengorz : Copy protocol for fragments.
40 * Hirokazu Takahashi: HW checksumming for outgoing UDP
41 * datagrams.
42 * Hirokazu Takahashi: sendfile() on UDP works now.
43 */
44
45#include <asm/uaccess.h>
46#include <asm/system.h>
47#include <linux/module.h>
48#include <linux/types.h>
49#include <linux/kernel.h>
1da177e4
LT
50#include <linux/mm.h>
51#include <linux/string.h>
52#include <linux/errno.h>
a1f8e7f7 53#include <linux/highmem.h>
5a0e3ad6 54#include <linux/slab.h>
1da177e4
LT
55
56#include <linux/socket.h>
57#include <linux/sockios.h>
58#include <linux/in.h>
59#include <linux/inet.h>
60#include <linux/netdevice.h>
61#include <linux/etherdevice.h>
62#include <linux/proc_fs.h>
63#include <linux/stat.h>
64#include <linux/init.h>
65
66#include <net/snmp.h>
67#include <net/ip.h>
68#include <net/protocol.h>
69#include <net/route.h>
cfacb057 70#include <net/xfrm.h>
1da177e4
LT
71#include <linux/skbuff.h>
72#include <net/sock.h>
73#include <net/arp.h>
74#include <net/icmp.h>
1da177e4
LT
75#include <net/checksum.h>
76#include <net/inetpeer.h>
1da177e4
LT
77#include <linux/igmp.h>
78#include <linux/netfilter_ipv4.h>
79#include <linux/netfilter_bridge.h>
80#include <linux/mroute.h>
81#include <linux/netlink.h>
6cbb0df7 82#include <linux/tcp.h>
1da177e4 83
ab32ea5d 84int sysctl_ip_default_ttl __read_mostly = IPDEFTTL;
1da177e4
LT
85
86/* Generate a checksum for an outgoing IP datagram. */
87__inline__ void ip_send_check(struct iphdr *iph)
88{
89 iph->check = 0;
90 iph->check = ip_fast_csum((unsigned char *)iph, iph->ihl);
91}
4bc2f18b 92EXPORT_SYMBOL(ip_send_check);
1da177e4 93
c439cb2e
HX
94int __ip_local_out(struct sk_buff *skb)
95{
96 struct iphdr *iph = ip_hdr(skb);
97
98 iph->tot_len = htons(skb->len);
99 ip_send_check(iph);
9bbc768a
JE
100 return nf_hook(NFPROTO_IPV4, NF_INET_LOCAL_OUT, skb, NULL,
101 skb_dst(skb)->dev, dst_output);
c439cb2e
HX
102}
103
104int ip_local_out(struct sk_buff *skb)
105{
106 int err;
107
108 err = __ip_local_out(skb);
109 if (likely(err == 1))
110 err = dst_output(skb);
111
112 return err;
113}
114EXPORT_SYMBOL_GPL(ip_local_out);
115
1da177e4
LT
116/* dev_loopback_xmit for use with netfilter. */
117static int ip_dev_loopback_xmit(struct sk_buff *newskb)
118{
459a98ed 119 skb_reset_mac_header(newskb);
bbe735e4 120 __skb_pull(newskb, skb_network_offset(newskb));
1da177e4
LT
121 newskb->pkt_type = PACKET_LOOPBACK;
122 newskb->ip_summed = CHECKSUM_UNNECESSARY;
adf30907 123 WARN_ON(!skb_dst(newskb));
e30b38c2 124 netif_rx_ni(newskb);
1da177e4
LT
125 return 0;
126}
127
128static inline int ip_select_ttl(struct inet_sock *inet, struct dst_entry *dst)
129{
130 int ttl = inet->uc_ttl;
131
132 if (ttl < 0)
133 ttl = dst_metric(dst, RTAX_HOPLIMIT);
134 return ttl;
135}
136
e905a9ed 137/*
1da177e4
LT
138 * Add an ip header to a skbuff and send it out.
139 *
140 */
141int ip_build_and_send_pkt(struct sk_buff *skb, struct sock *sk,
13d8eaa0 142 __be32 saddr, __be32 daddr, struct ip_options *opt)
1da177e4
LT
143{
144 struct inet_sock *inet = inet_sk(sk);
511c3f92 145 struct rtable *rt = skb_rtable(skb);
1da177e4
LT
146 struct iphdr *iph;
147
148 /* Build the IP header. */
8856dfa3
ACM
149 skb_push(skb, sizeof(struct iphdr) + (opt ? opt->optlen : 0));
150 skb_reset_network_header(skb);
eddc9ec5 151 iph = ip_hdr(skb);
1da177e4
LT
152 iph->version = 4;
153 iph->ihl = 5;
154 iph->tos = inet->tos;
d8d1f30b 155 if (ip_dont_fragment(sk, &rt->dst))
1da177e4
LT
156 iph->frag_off = htons(IP_DF);
157 else
158 iph->frag_off = 0;
d8d1f30b 159 iph->ttl = ip_select_ttl(inet, &rt->dst);
1da177e4
LT
160 iph->daddr = rt->rt_dst;
161 iph->saddr = rt->rt_src;
162 iph->protocol = sk->sk_protocol;
d8d1f30b 163 ip_select_ident(iph, &rt->dst, sk);
1da177e4
LT
164
165 if (opt && opt->optlen) {
166 iph->ihl += opt->optlen>>2;
167 ip_options_build(skb, opt, daddr, rt, 0);
168 }
1da177e4
LT
169
170 skb->priority = sk->sk_priority;
4a19ec58 171 skb->mark = sk->sk_mark;
1da177e4
LT
172
173 /* Send it out. */
c439cb2e 174 return ip_local_out(skb);
1da177e4 175}
d8c97a94
ACM
176EXPORT_SYMBOL_GPL(ip_build_and_send_pkt);
177
1da177e4
LT
178static inline int ip_finish_output2(struct sk_buff *skb)
179{
adf30907 180 struct dst_entry *dst = skb_dst(skb);
80787ebc 181 struct rtable *rt = (struct rtable *)dst;
1da177e4 182 struct net_device *dev = dst->dev;
c2636b4d 183 unsigned int hh_len = LL_RESERVED_SPACE(dev);
1da177e4 184
edf391ff
NH
185 if (rt->rt_type == RTN_MULTICAST) {
186 IP_UPD_PO_STATS(dev_net(dev), IPSTATS_MIB_OUTMCAST, skb->len);
187 } else if (rt->rt_type == RTN_BROADCAST)
188 IP_UPD_PO_STATS(dev_net(dev), IPSTATS_MIB_OUTBCAST, skb->len);
80787ebc 189
1da177e4 190 /* Be paranoid, rather than too clever. */
3b04ddde 191 if (unlikely(skb_headroom(skb) < hh_len && dev->header_ops)) {
1da177e4
LT
192 struct sk_buff *skb2;
193
194 skb2 = skb_realloc_headroom(skb, LL_RESERVED_SPACE(dev));
195 if (skb2 == NULL) {
196 kfree_skb(skb);
197 return -ENOMEM;
198 }
199 if (skb->sk)
200 skb_set_owner_w(skb2, skb->sk);
201 kfree_skb(skb);
202 skb = skb2;
203 }
204
3644f0ce
SH
205 if (dst->hh)
206 return neigh_hh_output(dst->hh, skb);
207 else if (dst->neighbour)
1da177e4
LT
208 return dst->neighbour->output(skb);
209
210 if (net_ratelimit())
211 printk(KERN_DEBUG "ip_finish_output2: No header cache and no neighbour!\n");
212 kfree_skb(skb);
213 return -EINVAL;
214}
215
628a5c56
JH
216static inline int ip_skb_dst_mtu(struct sk_buff *skb)
217{
218 struct inet_sock *inet = skb->sk ? inet_sk(skb->sk) : NULL;
219
220 return (inet && inet->pmtudisc == IP_PMTUDISC_PROBE) ?
adf30907 221 skb_dst(skb)->dev->mtu : dst_mtu(skb_dst(skb));
628a5c56
JH
222}
223
861d0486 224static int ip_finish_output(struct sk_buff *skb)
1da177e4 225{
5c901daa
PM
226#if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM)
227 /* Policy lookup after SNAT yielded a new policy */
adf30907 228 if (skb_dst(skb)->xfrm != NULL) {
48d5cad8
PM
229 IPCB(skb)->flags |= IPSKB_REROUTED;
230 return dst_output(skb);
231 }
5c901daa 232#endif
628a5c56 233 if (skb->len > ip_skb_dst_mtu(skb) && !skb_is_gso(skb))
1bd9bef6
PM
234 return ip_fragment(skb, ip_finish_output2);
235 else
236 return ip_finish_output2(skb);
1da177e4
LT
237}
238
239int ip_mc_output(struct sk_buff *skb)
240{
241 struct sock *sk = skb->sk;
511c3f92 242 struct rtable *rt = skb_rtable(skb);
d8d1f30b 243 struct net_device *dev = rt->dst.dev;
1da177e4
LT
244
245 /*
246 * If the indicated interface is up and running, send the packet.
247 */
edf391ff 248 IP_UPD_PO_STATS(dev_net(dev), IPSTATS_MIB_OUT, skb->len);
1da177e4
LT
249
250 skb->dev = dev;
251 skb->protocol = htons(ETH_P_IP);
252
253 /*
254 * Multicasts are looped back for other local users
255 */
256
257 if (rt->rt_flags&RTCF_MULTICAST) {
7ad6848c 258 if (sk_mc_loop(sk)
1da177e4
LT
259#ifdef CONFIG_IP_MROUTE
260 /* Small optimization: do not loopback not local frames,
261 which returned after forwarding; they will be dropped
262 by ip_mr_input in any case.
263 Note, that local frames are looped back to be delivered
264 to local recipients.
265
266 This check is duplicated in ip_mr_input at the moment.
267 */
9d4fb27d
JP
268 &&
269 ((rt->rt_flags & RTCF_LOCAL) ||
270 !(IPCB(skb)->flags & IPSKB_FORWARDED))
1da177e4 271#endif
9d4fb27d 272 ) {
1da177e4
LT
273 struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC);
274 if (newskb)
9bbc768a
JE
275 NF_HOOK(NFPROTO_IPV4, NF_INET_POST_ROUTING,
276 newskb, NULL, newskb->dev,
1da177e4
LT
277 ip_dev_loopback_xmit);
278 }
279
280 /* Multicasts with ttl 0 must not go beyond the host */
281
eddc9ec5 282 if (ip_hdr(skb)->ttl == 0) {
1da177e4
LT
283 kfree_skb(skb);
284 return 0;
285 }
286 }
287
288 if (rt->rt_flags&RTCF_BROADCAST) {
289 struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC);
290 if (newskb)
9bbc768a
JE
291 NF_HOOK(NFPROTO_IPV4, NF_INET_POST_ROUTING, newskb,
292 NULL, newskb->dev, ip_dev_loopback_xmit);
1da177e4
LT
293 }
294
9bbc768a
JE
295 return NF_HOOK_COND(NFPROTO_IPV4, NF_INET_POST_ROUTING, skb, NULL,
296 skb->dev, ip_finish_output,
48d5cad8 297 !(IPCB(skb)->flags & IPSKB_REROUTED));
1da177e4
LT
298}
299
300int ip_output(struct sk_buff *skb)
301{
adf30907 302 struct net_device *dev = skb_dst(skb)->dev;
1bd9bef6 303
edf391ff 304 IP_UPD_PO_STATS(dev_net(dev), IPSTATS_MIB_OUT, skb->len);
1da177e4 305
1bd9bef6
PM
306 skb->dev = dev;
307 skb->protocol = htons(ETH_P_IP);
308
9bbc768a 309 return NF_HOOK_COND(NFPROTO_IPV4, NF_INET_POST_ROUTING, skb, NULL, dev,
e905a9ed 310 ip_finish_output,
48d5cad8 311 !(IPCB(skb)->flags & IPSKB_REROUTED));
1da177e4
LT
312}
313
4e15ed4d 314int ip_queue_xmit(struct sk_buff *skb)
1da177e4 315{
e89862f4 316 struct sock *sk = skb->sk;
1da177e4
LT
317 struct inet_sock *inet = inet_sk(sk);
318 struct ip_options *opt = inet->opt;
319 struct rtable *rt;
320 struct iphdr *iph;
ab6e3feb 321 int res;
1da177e4
LT
322
323 /* Skip all of this if the packet is already routed,
324 * f.e. by something like SCTP.
325 */
ab6e3feb 326 rcu_read_lock();
511c3f92 327 rt = skb_rtable(skb);
1da177e4
LT
328 if (rt != NULL)
329 goto packet_routed;
330
331 /* Make sure we can route this packet. */
332 rt = (struct rtable *)__sk_dst_check(sk, 0);
333 if (rt == NULL) {
3ca3c68e 334 __be32 daddr;
1da177e4
LT
335
336 /* Use correct destination address if we have options. */
c720c7e8 337 daddr = inet->inet_daddr;
1da177e4
LT
338 if(opt && opt->srr)
339 daddr = opt->faddr;
340
341 {
342 struct flowi fl = { .oif = sk->sk_bound_dev_if,
914a9ab3 343 .mark = sk->sk_mark,
5811662b
CG
344 .fl4_dst = daddr,
345 .fl4_src = inet->inet_saddr,
346 .fl4_tos = RT_CONN_FLAGS(sk),
1da177e4 347 .proto = sk->sk_protocol,
86b08d86 348 .flags = inet_sk_flowi_flags(sk),
5811662b
CG
349 .fl_ip_sport = inet->inet_sport,
350 .fl_ip_dport = inet->inet_dport };
1da177e4
LT
351
352 /* If this fails, retransmit mechanism of transport layer will
353 * keep trying until route appears or the connection times
354 * itself out.
355 */
beb8d13b 356 security_sk_classify_flow(sk, &fl);
3b1e0a65 357 if (ip_route_output_flow(sock_net(sk), &rt, &fl, sk, 0))
1da177e4
LT
358 goto no_route;
359 }
d8d1f30b 360 sk_setup_caps(sk, &rt->dst);
1da177e4 361 }
d8d1f30b 362 skb_dst_set_noref(skb, &rt->dst);
1da177e4
LT
363
364packet_routed:
365 if (opt && opt->is_strictroute && rt->rt_dst != rt->rt_gateway)
366 goto no_route;
367
368 /* OK, we know where to send it, allocate and build IP header. */
8856dfa3
ACM
369 skb_push(skb, sizeof(struct iphdr) + (opt ? opt->optlen : 0));
370 skb_reset_network_header(skb);
eddc9ec5 371 iph = ip_hdr(skb);
714e85be 372 *((__be16 *)iph) = htons((4 << 12) | (5 << 8) | (inet->tos & 0xff));
d8d1f30b 373 if (ip_dont_fragment(sk, &rt->dst) && !skb->local_df)
1da177e4
LT
374 iph->frag_off = htons(IP_DF);
375 else
376 iph->frag_off = 0;
d8d1f30b 377 iph->ttl = ip_select_ttl(inet, &rt->dst);
1da177e4
LT
378 iph->protocol = sk->sk_protocol;
379 iph->saddr = rt->rt_src;
380 iph->daddr = rt->rt_dst;
1da177e4
LT
381 /* Transport layer set skb->h.foo itself. */
382
383 if (opt && opt->optlen) {
384 iph->ihl += opt->optlen >> 2;
c720c7e8 385 ip_options_build(skb, opt, inet->inet_daddr, rt, 0);
1da177e4
LT
386 }
387
d8d1f30b 388 ip_select_ident_more(iph, &rt->dst, sk,
7967168c 389 (skb_shinfo(skb)->gso_segs ?: 1) - 1);
1da177e4 390
1da177e4 391 skb->priority = sk->sk_priority;
4a19ec58 392 skb->mark = sk->sk_mark;
1da177e4 393
ab6e3feb
ED
394 res = ip_local_out(skb);
395 rcu_read_unlock();
396 return res;
1da177e4
LT
397
398no_route:
ab6e3feb 399 rcu_read_unlock();
5e38e270 400 IP_INC_STATS(sock_net(sk), IPSTATS_MIB_OUTNOROUTES);
1da177e4
LT
401 kfree_skb(skb);
402 return -EHOSTUNREACH;
403}
4bc2f18b 404EXPORT_SYMBOL(ip_queue_xmit);
1da177e4
LT
405
406
407static void ip_copy_metadata(struct sk_buff *to, struct sk_buff *from)
408{
409 to->pkt_type = from->pkt_type;
410 to->priority = from->priority;
411 to->protocol = from->protocol;
adf30907 412 skb_dst_drop(to);
fe76cda3 413 skb_dst_copy(to, from);
1da177e4 414 to->dev = from->dev;
82e91ffe 415 to->mark = from->mark;
1da177e4
LT
416
417 /* Copy the flags to each fragment. */
418 IPCB(to)->flags = IPCB(from)->flags;
419
420#ifdef CONFIG_NET_SCHED
421 to->tc_index = from->tc_index;
422#endif
e7ac05f3 423 nf_copy(to, from);
ba9dda3a
JK
424#if defined(CONFIG_NETFILTER_XT_TARGET_TRACE) || \
425 defined(CONFIG_NETFILTER_XT_TARGET_TRACE_MODULE)
426 to->nf_trace = from->nf_trace;
427#endif
c98d80ed
JA
428#if defined(CONFIG_IP_VS) || defined(CONFIG_IP_VS_MODULE)
429 to->ipvs_property = from->ipvs_property;
1da177e4 430#endif
984bc16c 431 skb_copy_secmark(to, from);
1da177e4
LT
432}
433
434/*
435 * This IP datagram is too large to be sent in one piece. Break it up into
436 * smaller pieces (each of size equal to IP header plus
437 * a block of the data of the original IP data part) that will yet fit in a
438 * single device frame, and queue such a frame for sending.
439 */
440
d9319100 441int ip_fragment(struct sk_buff *skb, int (*output)(struct sk_buff *))
1da177e4
LT
442{
443 struct iphdr *iph;
1da177e4
LT
444 int ptr;
445 struct net_device *dev;
446 struct sk_buff *skb2;
c893b806 447 unsigned int mtu, hlen, left, len, ll_rs;
1da177e4 448 int offset;
76ab608d 449 __be16 not_last_frag;
511c3f92 450 struct rtable *rt = skb_rtable(skb);
1da177e4
LT
451 int err = 0;
452
d8d1f30b 453 dev = rt->dst.dev;
1da177e4
LT
454
455 /*
456 * Point into the IP datagram header.
457 */
458
eddc9ec5 459 iph = ip_hdr(skb);
1da177e4
LT
460
461 if (unlikely((iph->frag_off & htons(IP_DF)) && !skb->local_df)) {
5e38e270 462 IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGFAILS);
1da177e4 463 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED,
628a5c56 464 htonl(ip_skb_dst_mtu(skb)));
1da177e4
LT
465 kfree_skb(skb);
466 return -EMSGSIZE;
467 }
468
469 /*
470 * Setup starting values.
471 */
472
473 hlen = iph->ihl * 4;
d8d1f30b 474 mtu = dst_mtu(&rt->dst) - hlen; /* Size of data space */
6c79bf0f
BDS
475#ifdef CONFIG_BRIDGE_NETFILTER
476 if (skb->nf_bridge)
477 mtu -= nf_bridge_mtu_reduction(skb);
478#endif
89cee8b1 479 IPCB(skb)->flags |= IPSKB_FRAG_COMPLETE;
1da177e4
LT
480
481 /* When frag_list is given, use it. First, check its validity:
482 * some transformers could create wrong frag_list or break existing
483 * one, it is not prohibited. In this case fall back to copying.
484 *
485 * LATER: this step can be merged to real generation of fragments,
486 * we can switch to copy when see the first bad fragment.
487 */
21dc3301 488 if (skb_has_frag_list(skb)) {
3d13008e 489 struct sk_buff *frag, *frag2;
1da177e4
LT
490 int first_len = skb_pagelen(skb);
491
492 if (first_len - hlen > mtu ||
493 ((first_len - hlen) & 7) ||
494 (iph->frag_off & htons(IP_MF|IP_OFFSET)) ||
495 skb_cloned(skb))
496 goto slow_path;
497
d7fcf1a5 498 skb_walk_frags(skb, frag) {
1da177e4
LT
499 /* Correct geometry. */
500 if (frag->len > mtu ||
501 ((frag->len & 7) && frag->next) ||
502 skb_headroom(frag) < hlen)
3d13008e 503 goto slow_path_clean;
1da177e4
LT
504
505 /* Partially cloned skb? */
506 if (skb_shared(frag))
3d13008e 507 goto slow_path_clean;
2fdba6b0
HX
508
509 BUG_ON(frag->sk);
510 if (skb->sk) {
2fdba6b0
HX
511 frag->sk = skb->sk;
512 frag->destructor = sock_wfree;
2fdba6b0 513 }
3d13008e 514 skb->truesize -= frag->truesize;
1da177e4
LT
515 }
516
517 /* Everything is OK. Generate! */
518
519 err = 0;
520 offset = 0;
521 frag = skb_shinfo(skb)->frag_list;
d7fcf1a5 522 skb_frag_list_init(skb);
1da177e4
LT
523 skb->data_len = first_len - skb_headlen(skb);
524 skb->len = first_len;
525 iph->tot_len = htons(first_len);
526 iph->frag_off = htons(IP_MF);
527 ip_send_check(iph);
528
529 for (;;) {
530 /* Prepare header of the next frame,
531 * before previous one went down. */
532 if (frag) {
533 frag->ip_summed = CHECKSUM_NONE;
badff6d0 534 skb_reset_transport_header(frag);
e2d1bca7
ACM
535 __skb_push(frag, hlen);
536 skb_reset_network_header(frag);
d56f90a7 537 memcpy(skb_network_header(frag), iph, hlen);
eddc9ec5 538 iph = ip_hdr(frag);
1da177e4
LT
539 iph->tot_len = htons(frag->len);
540 ip_copy_metadata(frag, skb);
541 if (offset == 0)
542 ip_options_fragment(frag);
543 offset += skb->len - hlen;
544 iph->frag_off = htons(offset>>3);
545 if (frag->next != NULL)
546 iph->frag_off |= htons(IP_MF);
547 /* Ready, complete checksum */
548 ip_send_check(iph);
549 }
550
551 err = output(skb);
552
dafee490 553 if (!err)
5e38e270 554 IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGCREATES);
1da177e4
LT
555 if (err || !frag)
556 break;
557
558 skb = frag;
559 frag = skb->next;
560 skb->next = NULL;
561 }
562
563 if (err == 0) {
5e38e270 564 IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGOKS);
1da177e4
LT
565 return 0;
566 }
567
568 while (frag) {
569 skb = frag->next;
570 kfree_skb(frag);
571 frag = skb;
572 }
5e38e270 573 IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGFAILS);
1da177e4 574 return err;
3d13008e
ED
575
576slow_path_clean:
577 skb_walk_frags(skb, frag2) {
578 if (frag2 == frag)
579 break;
580 frag2->sk = NULL;
581 frag2->destructor = NULL;
582 skb->truesize += frag2->truesize;
583 }
1da177e4
LT
584 }
585
586slow_path:
587 left = skb->len - hlen; /* Space per frame */
49085bd7 588 ptr = hlen; /* Where to start from */
1da177e4 589
1da177e4 590 /* for bridged IP traffic encapsulated inside f.e. a vlan header,
9bcfcaf5
SH
591 * we need to make room for the encapsulating header
592 */
c893b806 593 ll_rs = LL_RESERVED_SPACE_EXTRA(rt->dst.dev, nf_bridge_pad(skb));
9bcfcaf5 594
1da177e4
LT
595 /*
596 * Fragment the datagram.
597 */
598
599 offset = (ntohs(iph->frag_off) & IP_OFFSET) << 3;
600 not_last_frag = iph->frag_off & htons(IP_MF);
601
602 /*
603 * Keep copying data until we run out.
604 */
605
132adf54 606 while (left > 0) {
1da177e4
LT
607 len = left;
608 /* IF: it doesn't fit, use 'mtu' - the data space left */
609 if (len > mtu)
610 len = mtu;
611 /* IF: we are not sending upto and including the packet end
612 then align the next start on an eight byte boundary */
613 if (len < left) {
614 len &= ~7;
615 }
616 /*
617 * Allocate buffer.
618 */
619
620 if ((skb2 = alloc_skb(len+hlen+ll_rs, GFP_ATOMIC)) == NULL) {
64ce2073 621 NETDEBUG(KERN_INFO "IP: frag: no memory for new fragment!\n");
1da177e4
LT
622 err = -ENOMEM;
623 goto fail;
624 }
625
626 /*
627 * Set up data on packet
628 */
629
630 ip_copy_metadata(skb2, skb);
631 skb_reserve(skb2, ll_rs);
632 skb_put(skb2, len + hlen);
c1d2bbe1 633 skb_reset_network_header(skb2);
b0e380b1 634 skb2->transport_header = skb2->network_header + hlen;
1da177e4
LT
635
636 /*
637 * Charge the memory for the fragment to any owner
638 * it might possess
639 */
640
641 if (skb->sk)
642 skb_set_owner_w(skb2, skb->sk);
643
644 /*
645 * Copy the packet header into the new buffer.
646 */
647
d626f62b 648 skb_copy_from_linear_data(skb, skb_network_header(skb2), hlen);
1da177e4
LT
649
650 /*
651 * Copy a block of the IP datagram.
652 */
bff9b61c 653 if (skb_copy_bits(skb, ptr, skb_transport_header(skb2), len))
1da177e4
LT
654 BUG();
655 left -= len;
656
657 /*
658 * Fill in the new header fields.
659 */
eddc9ec5 660 iph = ip_hdr(skb2);
1da177e4
LT
661 iph->frag_off = htons((offset >> 3));
662
663 /* ANK: dirty, but effective trick. Upgrade options only if
664 * the segment to be fragmented was THE FIRST (otherwise,
665 * options are already fixed) and make it ONCE
666 * on the initial skb, so that all the following fragments
667 * will inherit fixed options.
668 */
669 if (offset == 0)
670 ip_options_fragment(skb);
671
672 /*
673 * Added AC : If we are fragmenting a fragment that's not the
674 * last fragment then keep MF on each bit
675 */
676 if (left > 0 || not_last_frag)
677 iph->frag_off |= htons(IP_MF);
678 ptr += len;
679 offset += len;
680
681 /*
682 * Put this fragment into the sending queue.
683 */
1da177e4
LT
684 iph->tot_len = htons(len + hlen);
685
686 ip_send_check(iph);
687
688 err = output(skb2);
689 if (err)
690 goto fail;
dafee490 691
5e38e270 692 IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGCREATES);
1da177e4
LT
693 }
694 kfree_skb(skb);
5e38e270 695 IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGOKS);
1da177e4
LT
696 return err;
697
698fail:
e905a9ed 699 kfree_skb(skb);
5e38e270 700 IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGFAILS);
1da177e4
LT
701 return err;
702}
2e2f7aef
PM
703EXPORT_SYMBOL(ip_fragment);
704
1da177e4
LT
705int
706ip_generic_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb)
707{
708 struct iovec *iov = from;
709
84fa7933 710 if (skb->ip_summed == CHECKSUM_PARTIAL) {
1da177e4
LT
711 if (memcpy_fromiovecend(to, iov, offset, len) < 0)
712 return -EFAULT;
713 } else {
44bb9363 714 __wsum csum = 0;
1da177e4
LT
715 if (csum_partial_copy_fromiovecend(to, iov, offset, len, &csum) < 0)
716 return -EFAULT;
717 skb->csum = csum_block_add(skb->csum, csum, odd);
718 }
719 return 0;
720}
4bc2f18b 721EXPORT_SYMBOL(ip_generic_getfrag);
1da177e4 722
44bb9363 723static inline __wsum
1da177e4
LT
724csum_page(struct page *page, int offset, int copy)
725{
726 char *kaddr;
44bb9363 727 __wsum csum;
1da177e4
LT
728 kaddr = kmap(page);
729 csum = csum_partial(kaddr + offset, copy, 0);
730 kunmap(page);
731 return csum;
732}
733
4b30b1c6 734static inline int ip_ufo_append_data(struct sock *sk,
e89e9cf5
AR
735 int getfrag(void *from, char *to, int offset, int len,
736 int odd, struct sk_buff *skb),
737 void *from, int length, int hh_len, int fragheaderlen,
d9319100 738 int transhdrlen, int mtu, unsigned int flags)
e89e9cf5
AR
739{
740 struct sk_buff *skb;
741 int err;
742
743 /* There is support for UDP fragmentation offload by network
744 * device, so create one single skb packet containing complete
745 * udp datagram
746 */
747 if ((skb = skb_peek_tail(&sk->sk_write_queue)) == NULL) {
748 skb = sock_alloc_send_skb(sk,
749 hh_len + fragheaderlen + transhdrlen + 20,
750 (flags & MSG_DONTWAIT), &err);
751
752 if (skb == NULL)
753 return err;
754
755 /* reserve space for Hardware header */
756 skb_reserve(skb, hh_len);
757
758 /* create space for UDP/IP header */
d9319100 759 skb_put(skb, fragheaderlen + transhdrlen);
e89e9cf5
AR
760
761 /* initialize network header pointer */
c1d2bbe1 762 skb_reset_network_header(skb);
e89e9cf5
AR
763
764 /* initialize protocol header pointer */
b0e380b1 765 skb->transport_header = skb->network_header + fragheaderlen;
e89e9cf5 766
84fa7933 767 skb->ip_summed = CHECKSUM_PARTIAL;
e89e9cf5
AR
768 skb->csum = 0;
769 sk->sk_sndmsg_off = 0;
e89e9cf5 770
be9164e7 771 /* specify the length of each IP datagram fragment */
7967168c 772 skb_shinfo(skb)->gso_size = mtu - fragheaderlen;
f83ef8c0 773 skb_shinfo(skb)->gso_type = SKB_GSO_UDP;
e89e9cf5 774 __skb_queue_tail(&sk->sk_write_queue, skb);
e89e9cf5 775 }
be9164e7
K
776
777 return skb_append_datato_frags(sk, skb, getfrag, from,
778 (length - transhdrlen));
e89e9cf5
AR
779}
780
1da177e4
LT
781/*
782 * ip_append_data() and ip_append_page() can make one large IP datagram
783 * from many pieces of data. Each pieces will be holded on the socket
784 * until ip_push_pending_frames() is called. Each piece can be a page
785 * or non-page data.
e905a9ed 786 *
1da177e4
LT
787 * Not only UDP, other transport protocols - e.g. raw sockets - can use
788 * this interface potentially.
789 *
790 * LATER: length must be adjusted by pad at tail, when it is required.
791 */
792int ip_append_data(struct sock *sk,
793 int getfrag(void *from, char *to, int offset, int len,
794 int odd, struct sk_buff *skb),
795 void *from, int length, int transhdrlen,
2e77d89b 796 struct ipcm_cookie *ipc, struct rtable **rtp,
1da177e4
LT
797 unsigned int flags)
798{
799 struct inet_sock *inet = inet_sk(sk);
800 struct sk_buff *skb;
801
802 struct ip_options *opt = NULL;
803 int hh_len;
804 int exthdrlen;
805 int mtu;
806 int copy;
807 int err;
808 int offset = 0;
809 unsigned int maxfraglen, fragheaderlen;
810 int csummode = CHECKSUM_NONE;
2e77d89b 811 struct rtable *rt;
1da177e4
LT
812
813 if (flags&MSG_PROBE)
814 return 0;
815
816 if (skb_queue_empty(&sk->sk_write_queue)) {
817 /*
818 * setup for corking.
819 */
820 opt = ipc->opt;
821 if (opt) {
822 if (inet->cork.opt == NULL) {
823 inet->cork.opt = kmalloc(sizeof(struct ip_options) + 40, sk->sk_allocation);
824 if (unlikely(inet->cork.opt == NULL))
825 return -ENOBUFS;
826 }
827 memcpy(inet->cork.opt, opt, sizeof(struct ip_options)+opt->optlen);
828 inet->cork.flags |= IPCORK_OPT;
829 inet->cork.addr = ipc->addr;
830 }
2e77d89b 831 rt = *rtp;
788d908f
JT
832 if (unlikely(!rt))
833 return -EFAULT;
2e77d89b
ED
834 /*
835 * We steal reference to this route, caller should not release it
836 */
837 *rtp = NULL;
628a5c56 838 inet->cork.fragsize = mtu = inet->pmtudisc == IP_PMTUDISC_PROBE ?
d8d1f30b
CG
839 rt->dst.dev->mtu :
840 dst_mtu(rt->dst.path);
841 inet->cork.dst = &rt->dst;
1da177e4
LT
842 inet->cork.length = 0;
843 sk->sk_sndmsg_page = NULL;
844 sk->sk_sndmsg_off = 0;
ec550d24
ED
845 exthdrlen = rt->dst.header_len;
846 length += exthdrlen;
847 transhdrlen += exthdrlen;
1da177e4 848 } else {
c8cdaf99 849 rt = (struct rtable *)inet->cork.dst;
1da177e4
LT
850 if (inet->cork.flags & IPCORK_OPT)
851 opt = inet->cork.opt;
852
853 transhdrlen = 0;
854 exthdrlen = 0;
855 mtu = inet->cork.fragsize;
856 }
d8d1f30b 857 hh_len = LL_RESERVED_SPACE(rt->dst.dev);
1da177e4
LT
858
859 fragheaderlen = sizeof(struct iphdr) + (opt ? opt->optlen : 0);
860 maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen;
861
862 if (inet->cork.length + length > 0xFFFF - fragheaderlen) {
c720c7e8
ED
863 ip_local_error(sk, EMSGSIZE, rt->rt_dst, inet->inet_dport,
864 mtu-exthdrlen);
1da177e4
LT
865 return -EMSGSIZE;
866 }
867
868 /*
869 * transhdrlen > 0 means that this is the first fragment and we wish
870 * it won't be fragmented in the future.
871 */
872 if (transhdrlen &&
873 length + fragheaderlen <= mtu &&
d8d1f30b 874 rt->dst.dev->features & NETIF_F_V4_CSUM &&
1da177e4 875 !exthdrlen)
84fa7933 876 csummode = CHECKSUM_PARTIAL;
1da177e4 877
26cde9f7
HX
878 skb = skb_peek_tail(&sk->sk_write_queue);
879
1da177e4 880 inet->cork.length += length;
26cde9f7 881 if (((length > mtu) || (skb && skb_is_gso(skb))) &&
be9164e7 882 (sk->sk_protocol == IPPROTO_UDP) &&
d8d1f30b 883 (rt->dst.dev->features & NETIF_F_UFO)) {
baa829d8
PM
884 err = ip_ufo_append_data(sk, getfrag, from, length, hh_len,
885 fragheaderlen, transhdrlen, mtu,
886 flags);
887 if (err)
e89e9cf5 888 goto error;
e89e9cf5
AR
889 return 0;
890 }
1da177e4
LT
891
892 /* So, what's going on in the loop below?
893 *
894 * We use calculated fragment length to generate chained skb,
895 * each of segments is IP fragment ready for sending to network after
896 * adding appropriate IP header.
897 */
898
26cde9f7 899 if (!skb)
1da177e4
LT
900 goto alloc_new_skb;
901
902 while (length > 0) {
903 /* Check if the remaining data fits into current packet. */
904 copy = mtu - skb->len;
905 if (copy < length)
906 copy = maxfraglen - skb->len;
907 if (copy <= 0) {
908 char *data;
909 unsigned int datalen;
910 unsigned int fraglen;
911 unsigned int fraggap;
912 unsigned int alloclen;
913 struct sk_buff *skb_prev;
914alloc_new_skb:
915 skb_prev = skb;
916 if (skb_prev)
917 fraggap = skb_prev->len - maxfraglen;
918 else
919 fraggap = 0;
920
921 /*
922 * If remaining data exceeds the mtu,
923 * we know we need more fragment(s).
924 */
925 datalen = length + fraggap;
926 if (datalen > mtu - fragheaderlen)
927 datalen = maxfraglen - fragheaderlen;
928 fraglen = datalen + fragheaderlen;
929
e905a9ed 930 if ((flags & MSG_MORE) &&
d8d1f30b 931 !(rt->dst.dev->features&NETIF_F_SG))
1da177e4
LT
932 alloclen = mtu;
933 else
59104f06 934 alloclen = fraglen;
1da177e4
LT
935
936 /* The last fragment gets additional space at tail.
937 * Note, with MSG_MORE we overallocate on fragments,
938 * because we have no idea what fragment will be
939 * the last.
940 */
59104f06 941 if (datalen == length + fraggap) {
d8d1f30b 942 alloclen += rt->dst.trailer_len;
59104f06
ED
943 /* make sure mtu is not reached */
944 if (datalen > mtu - fragheaderlen - rt->dst.trailer_len)
945 datalen -= ALIGN(rt->dst.trailer_len, 8);
946 }
1da177e4 947 if (transhdrlen) {
e905a9ed 948 skb = sock_alloc_send_skb(sk,
1da177e4
LT
949 alloclen + hh_len + 15,
950 (flags & MSG_DONTWAIT), &err);
951 } else {
952 skb = NULL;
953 if (atomic_read(&sk->sk_wmem_alloc) <=
954 2 * sk->sk_sndbuf)
e905a9ed 955 skb = sock_wmalloc(sk,
1da177e4
LT
956 alloclen + hh_len + 15, 1,
957 sk->sk_allocation);
958 if (unlikely(skb == NULL))
959 err = -ENOBUFS;
51f31cab
PO
960 else
961 /* only the initial fragment is
962 time stamped */
2244d07b 963 ipc->tx_flags = 0;
1da177e4
LT
964 }
965 if (skb == NULL)
966 goto error;
967
968 /*
969 * Fill in the control structures
970 */
971 skb->ip_summed = csummode;
972 skb->csum = 0;
973 skb_reserve(skb, hh_len);
2244d07b 974 skb_shinfo(skb)->tx_flags = ipc->tx_flags;
1da177e4
LT
975
976 /*
977 * Find where to start putting bytes.
978 */
979 data = skb_put(skb, fraglen);
c14d2450 980 skb_set_network_header(skb, exthdrlen);
b0e380b1
ACM
981 skb->transport_header = (skb->network_header +
982 fragheaderlen);
1da177e4 983 data += fragheaderlen;
1da177e4
LT
984
985 if (fraggap) {
986 skb->csum = skb_copy_and_csum_bits(
987 skb_prev, maxfraglen,
988 data + transhdrlen, fraggap, 0);
989 skb_prev->csum = csum_sub(skb_prev->csum,
990 skb->csum);
991 data += fraggap;
e9fa4f7b 992 pskb_trim_unique(skb_prev, maxfraglen);
1da177e4
LT
993 }
994
995 copy = datalen - transhdrlen - fraggap;
996 if (copy > 0 && getfrag(from, data + transhdrlen, offset, copy, fraggap, skb) < 0) {
997 err = -EFAULT;
998 kfree_skb(skb);
999 goto error;
1000 }
1001
1002 offset += copy;
1003 length -= datalen - fraggap;
1004 transhdrlen = 0;
1005 exthdrlen = 0;
1006 csummode = CHECKSUM_NONE;
1007
1008 /*
1009 * Put the packet on the pending queue.
1010 */
1011 __skb_queue_tail(&sk->sk_write_queue, skb);
1012 continue;
1013 }
1014
1015 if (copy > length)
1016 copy = length;
1017
d8d1f30b 1018 if (!(rt->dst.dev->features&NETIF_F_SG)) {
1da177e4
LT
1019 unsigned int off;
1020
1021 off = skb->len;
e905a9ed 1022 if (getfrag(from, skb_put(skb, copy),
1da177e4
LT
1023 offset, copy, off, skb) < 0) {
1024 __skb_trim(skb, off);
1025 err = -EFAULT;
1026 goto error;
1027 }
1028 } else {
1029 int i = skb_shinfo(skb)->nr_frags;
1030 skb_frag_t *frag = &skb_shinfo(skb)->frags[i-1];
1031 struct page *page = sk->sk_sndmsg_page;
1032 int off = sk->sk_sndmsg_off;
1033 unsigned int left;
1034
1035 if (page && (left = PAGE_SIZE - off) > 0) {
1036 if (copy >= left)
1037 copy = left;
1038 if (page != frag->page) {
1039 if (i == MAX_SKB_FRAGS) {
1040 err = -EMSGSIZE;
1041 goto error;
1042 }
1043 get_page(page);
e905a9ed 1044 skb_fill_page_desc(skb, i, page, sk->sk_sndmsg_off, 0);
1da177e4
LT
1045 frag = &skb_shinfo(skb)->frags[i];
1046 }
1047 } else if (i < MAX_SKB_FRAGS) {
1048 if (copy > PAGE_SIZE)
1049 copy = PAGE_SIZE;
1050 page = alloc_pages(sk->sk_allocation, 0);
1051 if (page == NULL) {
1052 err = -ENOMEM;
1053 goto error;
1054 }
1055 sk->sk_sndmsg_page = page;
1056 sk->sk_sndmsg_off = 0;
1057
1058 skb_fill_page_desc(skb, i, page, 0, 0);
1059 frag = &skb_shinfo(skb)->frags[i];
1da177e4
LT
1060 } else {
1061 err = -EMSGSIZE;
1062 goto error;
1063 }
1064 if (getfrag(from, page_address(frag->page)+frag->page_offset+frag->size, offset, copy, skb->len, skb) < 0) {
1065 err = -EFAULT;
1066 goto error;
1067 }
1068 sk->sk_sndmsg_off += copy;
1069 frag->size += copy;
1070 skb->len += copy;
1071 skb->data_len += copy;
f945fa7a
HX
1072 skb->truesize += copy;
1073 atomic_add(copy, &sk->sk_wmem_alloc);
1da177e4
LT
1074 }
1075 offset += copy;
1076 length -= copy;
1077 }
1078
1079 return 0;
1080
1081error:
1082 inet->cork.length -= length;
5e38e270 1083 IP_INC_STATS(sock_net(sk), IPSTATS_MIB_OUTDISCARDS);
e905a9ed 1084 return err;
1da177e4
LT
1085}
1086
1087ssize_t ip_append_page(struct sock *sk, struct page *page,
1088 int offset, size_t size, int flags)
1089{
1090 struct inet_sock *inet = inet_sk(sk);
1091 struct sk_buff *skb;
1092 struct rtable *rt;
1093 struct ip_options *opt = NULL;
1094 int hh_len;
1095 int mtu;
1096 int len;
1097 int err;
1098 unsigned int maxfraglen, fragheaderlen, fraggap;
1099
1100 if (inet->hdrincl)
1101 return -EPERM;
1102
1103 if (flags&MSG_PROBE)
1104 return 0;
1105
1106 if (skb_queue_empty(&sk->sk_write_queue))
1107 return -EINVAL;
1108
c8cdaf99 1109 rt = (struct rtable *)inet->cork.dst;
1da177e4
LT
1110 if (inet->cork.flags & IPCORK_OPT)
1111 opt = inet->cork.opt;
1112
d8d1f30b 1113 if (!(rt->dst.dev->features&NETIF_F_SG))
1da177e4
LT
1114 return -EOPNOTSUPP;
1115
d8d1f30b 1116 hh_len = LL_RESERVED_SPACE(rt->dst.dev);
1da177e4
LT
1117 mtu = inet->cork.fragsize;
1118
1119 fragheaderlen = sizeof(struct iphdr) + (opt ? opt->optlen : 0);
1120 maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen;
1121
1122 if (inet->cork.length + size > 0xFFFF - fragheaderlen) {
c720c7e8 1123 ip_local_error(sk, EMSGSIZE, rt->rt_dst, inet->inet_dport, mtu);
1da177e4
LT
1124 return -EMSGSIZE;
1125 }
1126
1127 if ((skb = skb_peek_tail(&sk->sk_write_queue)) == NULL)
1128 return -EINVAL;
1129
1130 inet->cork.length += size;
26cde9f7
HX
1131 if ((size + skb->len > mtu) &&
1132 (sk->sk_protocol == IPPROTO_UDP) &&
d8d1f30b 1133 (rt->dst.dev->features & NETIF_F_UFO)) {
7967168c 1134 skb_shinfo(skb)->gso_size = mtu - fragheaderlen;
f83ef8c0 1135 skb_shinfo(skb)->gso_type = SKB_GSO_UDP;
7967168c 1136 }
e89e9cf5 1137
1da177e4
LT
1138
1139 while (size > 0) {
1140 int i;
1141
89114afd 1142 if (skb_is_gso(skb))
e89e9cf5
AR
1143 len = size;
1144 else {
1145
1146 /* Check if the remaining data fits into current packet. */
1147 len = mtu - skb->len;
1148 if (len < size)
1149 len = maxfraglen - skb->len;
1150 }
1da177e4
LT
1151 if (len <= 0) {
1152 struct sk_buff *skb_prev;
1da177e4
LT
1153 int alloclen;
1154
1155 skb_prev = skb;
0d0d2bba 1156 fraggap = skb_prev->len - maxfraglen;
1da177e4
LT
1157
1158 alloclen = fragheaderlen + hh_len + fraggap + 15;
1159 skb = sock_wmalloc(sk, alloclen, 1, sk->sk_allocation);
1160 if (unlikely(!skb)) {
1161 err = -ENOBUFS;
1162 goto error;
1163 }
1164
1165 /*
1166 * Fill in the control structures
1167 */
1168 skb->ip_summed = CHECKSUM_NONE;
1169 skb->csum = 0;
1170 skb_reserve(skb, hh_len);
1171
1172 /*
1173 * Find where to start putting bytes.
1174 */
967b05f6 1175 skb_put(skb, fragheaderlen + fraggap);
2ca9e6f2 1176 skb_reset_network_header(skb);
b0e380b1
ACM
1177 skb->transport_header = (skb->network_header +
1178 fragheaderlen);
1da177e4 1179 if (fraggap) {
967b05f6
ACM
1180 skb->csum = skb_copy_and_csum_bits(skb_prev,
1181 maxfraglen,
9c70220b 1182 skb_transport_header(skb),
967b05f6 1183 fraggap, 0);
1da177e4
LT
1184 skb_prev->csum = csum_sub(skb_prev->csum,
1185 skb->csum);
e9fa4f7b 1186 pskb_trim_unique(skb_prev, maxfraglen);
1da177e4
LT
1187 }
1188
1189 /*
1190 * Put the packet on the pending queue.
1191 */
1192 __skb_queue_tail(&sk->sk_write_queue, skb);
1193 continue;
1194 }
1195
1196 i = skb_shinfo(skb)->nr_frags;
1197 if (len > size)
1198 len = size;
1199 if (skb_can_coalesce(skb, i, page, offset)) {
1200 skb_shinfo(skb)->frags[i-1].size += len;
1201 } else if (i < MAX_SKB_FRAGS) {
1202 get_page(page);
1203 skb_fill_page_desc(skb, i, page, offset, len);
1204 } else {
1205 err = -EMSGSIZE;
1206 goto error;
1207 }
1208
1209 if (skb->ip_summed == CHECKSUM_NONE) {
44bb9363 1210 __wsum csum;
1da177e4
LT
1211 csum = csum_page(page, offset, len);
1212 skb->csum = csum_block_add(skb->csum, csum, skb->len);
1213 }
1214
1215 skb->len += len;
1216 skb->data_len += len;
1e34a11d
DM
1217 skb->truesize += len;
1218 atomic_add(len, &sk->sk_wmem_alloc);
1da177e4
LT
1219 offset += len;
1220 size -= len;
1221 }
1222 return 0;
1223
1224error:
1225 inet->cork.length -= size;
5e38e270 1226 IP_INC_STATS(sock_net(sk), IPSTATS_MIB_OUTDISCARDS);
1da177e4
LT
1227 return err;
1228}
1229
429f08e9
PE
1230static void ip_cork_release(struct inet_sock *inet)
1231{
1232 inet->cork.flags &= ~IPCORK_OPT;
1233 kfree(inet->cork.opt);
1234 inet->cork.opt = NULL;
c8cdaf99
YH
1235 dst_release(inet->cork.dst);
1236 inet->cork.dst = NULL;
429f08e9
PE
1237}
1238
1da177e4
LT
1239/*
1240 * Combined all pending IP fragments on the socket as one IP datagram
1241 * and push them out.
1242 */
1243int ip_push_pending_frames(struct sock *sk)
1244{
1245 struct sk_buff *skb, *tmp_skb;
1246 struct sk_buff **tail_skb;
1247 struct inet_sock *inet = inet_sk(sk);
0388b004 1248 struct net *net = sock_net(sk);
1da177e4 1249 struct ip_options *opt = NULL;
c8cdaf99 1250 struct rtable *rt = (struct rtable *)inet->cork.dst;
1da177e4 1251 struct iphdr *iph;
76ab608d 1252 __be16 df = 0;
1da177e4
LT
1253 __u8 ttl;
1254 int err = 0;
1255
1256 if ((skb = __skb_dequeue(&sk->sk_write_queue)) == NULL)
1257 goto out;
1258 tail_skb = &(skb_shinfo(skb)->frag_list);
1259
1260 /* move skb->data to ip header from ext header */
d56f90a7 1261 if (skb->data < skb_network_header(skb))
bbe735e4 1262 __skb_pull(skb, skb_network_offset(skb));
1da177e4 1263 while ((tmp_skb = __skb_dequeue(&sk->sk_write_queue)) != NULL) {
cfe1fc77 1264 __skb_pull(tmp_skb, skb_network_header_len(skb));
1da177e4
LT
1265 *tail_skb = tmp_skb;
1266 tail_skb = &(tmp_skb->next);
1267 skb->len += tmp_skb->len;
1268 skb->data_len += tmp_skb->len;
1269 skb->truesize += tmp_skb->truesize;
1da177e4
LT
1270 tmp_skb->destructor = NULL;
1271 tmp_skb->sk = NULL;
1272 }
1273
1274 /* Unless user demanded real pmtu discovery (IP_PMTUDISC_DO), we allow
1275 * to fragment the frame generated here. No matter, what transforms
1276 * how transforms change size of the packet, it will come out.
1277 */
628a5c56 1278 if (inet->pmtudisc < IP_PMTUDISC_DO)
1da177e4
LT
1279 skb->local_df = 1;
1280
1281 /* DF bit is set when we want to see DF on outgoing frames.
1282 * If local_df is set too, we still allow to fragment this frame
1283 * locally. */
628a5c56 1284 if (inet->pmtudisc >= IP_PMTUDISC_DO ||
d8d1f30b
CG
1285 (skb->len <= dst_mtu(&rt->dst) &&
1286 ip_dont_fragment(sk, &rt->dst)))
1da177e4
LT
1287 df = htons(IP_DF);
1288
1289 if (inet->cork.flags & IPCORK_OPT)
1290 opt = inet->cork.opt;
1291
1292 if (rt->rt_type == RTN_MULTICAST)
1293 ttl = inet->mc_ttl;
1294 else
d8d1f30b 1295 ttl = ip_select_ttl(inet, &rt->dst);
1da177e4
LT
1296
1297 iph = (struct iphdr *)skb->data;
1298 iph->version = 4;
1299 iph->ihl = 5;
1300 if (opt) {
1301 iph->ihl += opt->optlen>>2;
1302 ip_options_build(skb, opt, inet->cork.addr, rt, 0);
1303 }
1304 iph->tos = inet->tos;
1da177e4 1305 iph->frag_off = df;
d8d1f30b 1306 ip_select_ident(iph, &rt->dst, sk);
1da177e4
LT
1307 iph->ttl = ttl;
1308 iph->protocol = sk->sk_protocol;
1309 iph->saddr = rt->rt_src;
1310 iph->daddr = rt->rt_dst;
1da177e4
LT
1311
1312 skb->priority = sk->sk_priority;
4a19ec58 1313 skb->mark = sk->sk_mark;
a21bba94
ED
1314 /*
1315 * Steal rt from cork.dst to avoid a pair of atomic_inc/atomic_dec
1316 * on dst refcount
1317 */
1318 inet->cork.dst = NULL;
d8d1f30b 1319 skb_dst_set(skb, &rt->dst);
1da177e4 1320
96793b48 1321 if (iph->protocol == IPPROTO_ICMP)
0388b004 1322 icmp_out_count(net, ((struct icmphdr *)
96793b48
DS
1323 skb_transport_header(skb))->type);
1324
1da177e4 1325 /* Netfilter gets whole the not fragmented skb. */
c439cb2e 1326 err = ip_local_out(skb);
1da177e4
LT
1327 if (err) {
1328 if (err > 0)
6ce9e7b5 1329 err = net_xmit_errno(err);
1da177e4
LT
1330 if (err)
1331 goto error;
1332 }
1333
1334out:
429f08e9 1335 ip_cork_release(inet);
1da177e4
LT
1336 return err;
1337
1338error:
5e38e270 1339 IP_INC_STATS(net, IPSTATS_MIB_OUTDISCARDS);
1da177e4
LT
1340 goto out;
1341}
1342
1343/*
1344 * Throw away all pending data on the socket.
1345 */
1346void ip_flush_pending_frames(struct sock *sk)
1347{
1da177e4
LT
1348 struct sk_buff *skb;
1349
1350 while ((skb = __skb_dequeue_tail(&sk->sk_write_queue)) != NULL)
1351 kfree_skb(skb);
1352
429f08e9 1353 ip_cork_release(inet_sk(sk));
1da177e4
LT
1354}
1355
1356
1357/*
1358 * Fetch data from kernel space and fill in checksum if needed.
1359 */
e905a9ed 1360static int ip_reply_glue_bits(void *dptr, char *to, int offset,
1da177e4
LT
1361 int len, int odd, struct sk_buff *skb)
1362{
5084205f 1363 __wsum csum;
1da177e4
LT
1364
1365 csum = csum_partial_copy_nocheck(dptr+offset, to, len, 0);
1366 skb->csum = csum_block_add(skb->csum, csum, odd);
e905a9ed 1367 return 0;
1da177e4
LT
1368}
1369
e905a9ed 1370/*
1da177e4
LT
1371 * Generic function to send a packet as reply to another packet.
1372 * Used to send TCP resets so far. ICMP should use this function too.
1373 *
e905a9ed 1374 * Should run single threaded per socket because it uses the sock
1da177e4 1375 * structure to pass arguments.
1da177e4
LT
1376 */
1377void ip_send_reply(struct sock *sk, struct sk_buff *skb, struct ip_reply_arg *arg,
1378 unsigned int len)
1379{
1380 struct inet_sock *inet = inet_sk(sk);
1381 struct {
1382 struct ip_options opt;
1383 char data[40];
1384 } replyopts;
1385 struct ipcm_cookie ipc;
3ca3c68e 1386 __be32 daddr;
511c3f92 1387 struct rtable *rt = skb_rtable(skb);
1da177e4
LT
1388
1389 if (ip_options_echo(&replyopts.opt, skb))
1390 return;
1391
1392 daddr = ipc.addr = rt->rt_src;
1393 ipc.opt = NULL;
2244d07b 1394 ipc.tx_flags = 0;
1da177e4
LT
1395
1396 if (replyopts.opt.optlen) {
1397 ipc.opt = &replyopts.opt;
1398
1399 if (ipc.opt->srr)
1400 daddr = replyopts.opt.faddr;
1401 }
1402
1403 {
f0e48dbf 1404 struct flowi fl = { .oif = arg->bound_dev_if,
5811662b
CG
1405 .fl4_dst = daddr,
1406 .fl4_src = rt->rt_spec_dst,
1407 .fl4_tos = RT_TOS(ip_hdr(skb)->tos),
1408 .fl_ip_sport = tcp_hdr(skb)->dest,
1409 .fl_ip_dport = tcp_hdr(skb)->source,
86b08d86
KK
1410 .proto = sk->sk_protocol,
1411 .flags = ip_reply_arg_flowi_flags(arg) };
beb8d13b 1412 security_skb_classify_flow(skb, &fl);
3b1e0a65 1413 if (ip_route_output_key(sock_net(sk), &rt, &fl))
1da177e4
LT
1414 return;
1415 }
1416
1417 /* And let IP do all the hard work.
1418
1419 This chunk is not reenterable, hence spinlock.
1420 Note that it uses the fact, that this function is called
1421 with locally disabled BH and that sk cannot be already spinlocked.
1422 */
1423 bh_lock_sock(sk);
eddc9ec5 1424 inet->tos = ip_hdr(skb)->tos;
1da177e4 1425 sk->sk_priority = skb->priority;
eddc9ec5 1426 sk->sk_protocol = ip_hdr(skb)->protocol;
f0e48dbf 1427 sk->sk_bound_dev_if = arg->bound_dev_if;
1da177e4 1428 ip_append_data(sk, ip_reply_glue_bits, arg->iov->iov_base, len, 0,
2e77d89b 1429 &ipc, &rt, MSG_DONTWAIT);
1da177e4
LT
1430 if ((skb = skb_peek(&sk->sk_write_queue)) != NULL) {
1431 if (arg->csumoffset >= 0)
9c70220b
ACM
1432 *((__sum16 *)skb_transport_header(skb) +
1433 arg->csumoffset) = csum_fold(csum_add(skb->csum,
1434 arg->csum));
1da177e4
LT
1435 skb->ip_summed = CHECKSUM_NONE;
1436 ip_push_pending_frames(sk);
1437 }
1438
1439 bh_unlock_sock(sk);
1440
1441 ip_rt_put(rt);
1442}
1443
1da177e4
LT
1444void __init ip_init(void)
1445{
1da177e4
LT
1446 ip_rt_init();
1447 inet_initpeers();
1448
1449#if defined(CONFIG_IP_MULTICAST) && defined(CONFIG_PROC_FS)
1450 igmp_mc_proc_init();
1451#endif
1452}