11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * INET An implementation of the TCP/IP protocol suite for the LINUX 31da177e4SLinus Torvalds * operating system. INET is implemented using the BSD Socket 41da177e4SLinus Torvalds * interface as the means of communication with the user level. 51da177e4SLinus Torvalds * 61da177e4SLinus Torvalds * The Internet Protocol (IP) output module. 71da177e4SLinus Torvalds * 802c30a84SJesper Juhl * Authors: Ross Biro 91da177e4SLinus Torvalds * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG> 101da177e4SLinus Torvalds * Donald Becker, <becker@super.org> 111da177e4SLinus Torvalds * Alan Cox, <Alan.Cox@linux.org> 121da177e4SLinus Torvalds * Richard Underwood 131da177e4SLinus Torvalds * Stefan Becker, <stefanb@yello.ping.de> 141da177e4SLinus Torvalds * Jorge Cwik, <jorge@laser.satlink.net> 151da177e4SLinus Torvalds * Arnt Gulbrandsen, <agulbra@nvg.unit.no> 161da177e4SLinus Torvalds * Hirokazu Takahashi, <taka@valinux.co.jp> 171da177e4SLinus Torvalds * 181da177e4SLinus Torvalds * See ip_input.c for original log 191da177e4SLinus Torvalds * 201da177e4SLinus Torvalds * Fixes: 211da177e4SLinus Torvalds * Alan Cox : Missing nonblock feature in ip_build_xmit. 221da177e4SLinus Torvalds * Mike Kilburn : htons() missing in ip_build_xmit. 231da177e4SLinus Torvalds * Bradford Johnson: Fix faulty handling of some frames when 241da177e4SLinus Torvalds * no route is found. 251da177e4SLinus Torvalds * Alexander Demenshin: Missing sk/skb free in ip_queue_xmit 261da177e4SLinus Torvalds * (in case if packet not accepted by 271da177e4SLinus Torvalds * output firewall rules) 281da177e4SLinus Torvalds * Mike McLagan : Routing by source 291da177e4SLinus Torvalds * Alexey Kuznetsov: use new route cache 301da177e4SLinus Torvalds * Andi Kleen: Fix broken PMTU recovery and remove 311da177e4SLinus Torvalds * some redundant tests. 321da177e4SLinus Torvalds * Vitaly E. Lavrov : Transparent proxy revived after year coma. 331da177e4SLinus Torvalds * Andi Kleen : Replace ip_reply with ip_send_reply. 341da177e4SLinus Torvalds * Andi Kleen : Split fast and slow ip_build_xmit path 351da177e4SLinus Torvalds * for decreased register pressure on x86 361da177e4SLinus Torvalds * and more readibility. 371da177e4SLinus Torvalds * Marc Boucher : When call_out_firewall returns FW_QUEUE, 381da177e4SLinus Torvalds * silently drop skb instead of failing with -EPERM. 391da177e4SLinus Torvalds * Detlev Wengorz : Copy protocol for fragments. 401da177e4SLinus Torvalds * Hirokazu Takahashi: HW checksumming for outgoing UDP 411da177e4SLinus Torvalds * datagrams. 421da177e4SLinus Torvalds * Hirokazu Takahashi: sendfile() on UDP works now. 431da177e4SLinus Torvalds */ 441da177e4SLinus Torvalds 451da177e4SLinus Torvalds #include <asm/uaccess.h> 461da177e4SLinus Torvalds #include <asm/system.h> 471da177e4SLinus Torvalds #include <linux/module.h> 481da177e4SLinus Torvalds #include <linux/types.h> 491da177e4SLinus Torvalds #include <linux/kernel.h> 501da177e4SLinus Torvalds #include <linux/mm.h> 511da177e4SLinus Torvalds #include <linux/string.h> 521da177e4SLinus Torvalds #include <linux/errno.h> 53a1f8e7f7SAl Viro #include <linux/highmem.h> 545a0e3ad6STejun Heo #include <linux/slab.h> 551da177e4SLinus Torvalds 561da177e4SLinus Torvalds #include <linux/socket.h> 571da177e4SLinus Torvalds #include <linux/sockios.h> 581da177e4SLinus Torvalds #include <linux/in.h> 591da177e4SLinus Torvalds #include <linux/inet.h> 601da177e4SLinus Torvalds #include <linux/netdevice.h> 611da177e4SLinus Torvalds #include <linux/etherdevice.h> 621da177e4SLinus Torvalds #include <linux/proc_fs.h> 631da177e4SLinus Torvalds #include <linux/stat.h> 641da177e4SLinus Torvalds #include <linux/init.h> 651da177e4SLinus Torvalds 661da177e4SLinus Torvalds #include <net/snmp.h> 671da177e4SLinus Torvalds #include <net/ip.h> 681da177e4SLinus Torvalds #include <net/protocol.h> 691da177e4SLinus Torvalds #include <net/route.h> 70cfacb057SPatrick McHardy #include <net/xfrm.h> 711da177e4SLinus Torvalds #include <linux/skbuff.h> 721da177e4SLinus Torvalds #include <net/sock.h> 731da177e4SLinus Torvalds #include <net/arp.h> 741da177e4SLinus Torvalds #include <net/icmp.h> 751da177e4SLinus Torvalds #include <net/checksum.h> 761da177e4SLinus Torvalds #include <net/inetpeer.h> 771da177e4SLinus Torvalds #include <linux/igmp.h> 781da177e4SLinus Torvalds #include <linux/netfilter_ipv4.h> 791da177e4SLinus Torvalds #include <linux/netfilter_bridge.h> 801da177e4SLinus Torvalds #include <linux/mroute.h> 811da177e4SLinus Torvalds #include <linux/netlink.h> 826cbb0df7SArnaldo Carvalho de Melo #include <linux/tcp.h> 831da177e4SLinus Torvalds 84ab32ea5dSBrian Haley int sysctl_ip_default_ttl __read_mostly = IPDEFTTL; 851da177e4SLinus Torvalds 861da177e4SLinus Torvalds /* Generate a checksum for an outgoing IP datagram. */ 871da177e4SLinus Torvalds __inline__ void ip_send_check(struct iphdr *iph) 881da177e4SLinus Torvalds { 891da177e4SLinus Torvalds iph->check = 0; 901da177e4SLinus Torvalds iph->check = ip_fast_csum((unsigned char *)iph, iph->ihl); 911da177e4SLinus Torvalds } 921da177e4SLinus Torvalds 93c439cb2eSHerbert Xu int __ip_local_out(struct sk_buff *skb) 94c439cb2eSHerbert Xu { 95c439cb2eSHerbert Xu struct iphdr *iph = ip_hdr(skb); 96c439cb2eSHerbert Xu 97c439cb2eSHerbert Xu iph->tot_len = htons(skb->len); 98c439cb2eSHerbert Xu ip_send_check(iph); 999bbc768aSJan Engelhardt return nf_hook(NFPROTO_IPV4, NF_INET_LOCAL_OUT, skb, NULL, 1009bbc768aSJan Engelhardt skb_dst(skb)->dev, dst_output); 101c439cb2eSHerbert Xu } 102c439cb2eSHerbert Xu 103c439cb2eSHerbert Xu int ip_local_out(struct sk_buff *skb) 104c439cb2eSHerbert Xu { 105c439cb2eSHerbert Xu int err; 106c439cb2eSHerbert Xu 107c439cb2eSHerbert Xu err = __ip_local_out(skb); 108c439cb2eSHerbert Xu if (likely(err == 1)) 109c439cb2eSHerbert Xu err = dst_output(skb); 110c439cb2eSHerbert Xu 111c439cb2eSHerbert Xu return err; 112c439cb2eSHerbert Xu } 113c439cb2eSHerbert Xu EXPORT_SYMBOL_GPL(ip_local_out); 114c439cb2eSHerbert Xu 1151da177e4SLinus Torvalds /* dev_loopback_xmit for use with netfilter. */ 1161da177e4SLinus Torvalds static int ip_dev_loopback_xmit(struct sk_buff *newskb) 1171da177e4SLinus Torvalds { 118459a98edSArnaldo Carvalho de Melo skb_reset_mac_header(newskb); 119bbe735e4SArnaldo Carvalho de Melo __skb_pull(newskb, skb_network_offset(newskb)); 1201da177e4SLinus Torvalds newskb->pkt_type = PACKET_LOOPBACK; 1211da177e4SLinus Torvalds newskb->ip_summed = CHECKSUM_UNNECESSARY; 122adf30907SEric Dumazet WARN_ON(!skb_dst(newskb)); 1231da177e4SLinus Torvalds netif_rx(newskb); 1241da177e4SLinus Torvalds return 0; 1251da177e4SLinus Torvalds } 1261da177e4SLinus Torvalds 1271da177e4SLinus Torvalds static inline int ip_select_ttl(struct inet_sock *inet, struct dst_entry *dst) 1281da177e4SLinus Torvalds { 1291da177e4SLinus Torvalds int ttl = inet->uc_ttl; 1301da177e4SLinus Torvalds 1311da177e4SLinus Torvalds if (ttl < 0) 1321da177e4SLinus Torvalds ttl = dst_metric(dst, RTAX_HOPLIMIT); 1331da177e4SLinus Torvalds return ttl; 1341da177e4SLinus Torvalds } 1351da177e4SLinus Torvalds 1361da177e4SLinus Torvalds /* 1371da177e4SLinus Torvalds * Add an ip header to a skbuff and send it out. 1381da177e4SLinus Torvalds * 1391da177e4SLinus Torvalds */ 1401da177e4SLinus Torvalds int ip_build_and_send_pkt(struct sk_buff *skb, struct sock *sk, 14113d8eaa0SAl Viro __be32 saddr, __be32 daddr, struct ip_options *opt) 1421da177e4SLinus Torvalds { 1431da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 144511c3f92SEric Dumazet struct rtable *rt = skb_rtable(skb); 1451da177e4SLinus Torvalds struct iphdr *iph; 1461da177e4SLinus Torvalds 1471da177e4SLinus Torvalds /* Build the IP header. */ 1488856dfa3SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct iphdr) + (opt ? opt->optlen : 0)); 1498856dfa3SArnaldo Carvalho de Melo skb_reset_network_header(skb); 150eddc9ec5SArnaldo Carvalho de Melo iph = ip_hdr(skb); 1511da177e4SLinus Torvalds iph->version = 4; 1521da177e4SLinus Torvalds iph->ihl = 5; 1531da177e4SLinus Torvalds iph->tos = inet->tos; 1541da177e4SLinus Torvalds if (ip_dont_fragment(sk, &rt->u.dst)) 1551da177e4SLinus Torvalds iph->frag_off = htons(IP_DF); 1561da177e4SLinus Torvalds else 1571da177e4SLinus Torvalds iph->frag_off = 0; 1581da177e4SLinus Torvalds iph->ttl = ip_select_ttl(inet, &rt->u.dst); 1591da177e4SLinus Torvalds iph->daddr = rt->rt_dst; 1601da177e4SLinus Torvalds iph->saddr = rt->rt_src; 1611da177e4SLinus Torvalds iph->protocol = sk->sk_protocol; 1621da177e4SLinus Torvalds ip_select_ident(iph, &rt->u.dst, sk); 1631da177e4SLinus Torvalds 1641da177e4SLinus Torvalds if (opt && opt->optlen) { 1651da177e4SLinus Torvalds iph->ihl += opt->optlen>>2; 1661da177e4SLinus Torvalds ip_options_build(skb, opt, daddr, rt, 0); 1671da177e4SLinus Torvalds } 1681da177e4SLinus Torvalds 1691da177e4SLinus Torvalds skb->priority = sk->sk_priority; 1704a19ec58SLaszlo Attila Toth skb->mark = sk->sk_mark; 1711da177e4SLinus Torvalds 1721da177e4SLinus Torvalds /* Send it out. */ 173c439cb2eSHerbert Xu return ip_local_out(skb); 1741da177e4SLinus Torvalds } 1751da177e4SLinus Torvalds 176d8c97a94SArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip_build_and_send_pkt); 177d8c97a94SArnaldo Carvalho de Melo 1781da177e4SLinus Torvalds static inline int ip_finish_output2(struct sk_buff *skb) 1791da177e4SLinus Torvalds { 180adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 18180787ebcSMitsuru Chinen struct rtable *rt = (struct rtable *)dst; 1821da177e4SLinus Torvalds struct net_device *dev = dst->dev; 183c2636b4dSChuck Lever unsigned int hh_len = LL_RESERVED_SPACE(dev); 1841da177e4SLinus Torvalds 185edf391ffSNeil Horman if (rt->rt_type == RTN_MULTICAST) { 186edf391ffSNeil Horman IP_UPD_PO_STATS(dev_net(dev), IPSTATS_MIB_OUTMCAST, skb->len); 187edf391ffSNeil Horman } else if (rt->rt_type == RTN_BROADCAST) 188edf391ffSNeil Horman IP_UPD_PO_STATS(dev_net(dev), IPSTATS_MIB_OUTBCAST, skb->len); 18980787ebcSMitsuru Chinen 1901da177e4SLinus Torvalds /* Be paranoid, rather than too clever. */ 1913b04dddeSStephen Hemminger if (unlikely(skb_headroom(skb) < hh_len && dev->header_ops)) { 1921da177e4SLinus Torvalds struct sk_buff *skb2; 1931da177e4SLinus Torvalds 1941da177e4SLinus Torvalds skb2 = skb_realloc_headroom(skb, LL_RESERVED_SPACE(dev)); 1951da177e4SLinus Torvalds if (skb2 == NULL) { 1961da177e4SLinus Torvalds kfree_skb(skb); 1971da177e4SLinus Torvalds return -ENOMEM; 1981da177e4SLinus Torvalds } 1991da177e4SLinus Torvalds if (skb->sk) 2001da177e4SLinus Torvalds skb_set_owner_w(skb2, skb->sk); 2011da177e4SLinus Torvalds kfree_skb(skb); 2021da177e4SLinus Torvalds skb = skb2; 2031da177e4SLinus Torvalds } 2041da177e4SLinus Torvalds 2053644f0ceSStephen Hemminger if (dst->hh) 2063644f0ceSStephen Hemminger return neigh_hh_output(dst->hh, skb); 2073644f0ceSStephen Hemminger else if (dst->neighbour) 2081da177e4SLinus Torvalds return dst->neighbour->output(skb); 2091da177e4SLinus Torvalds 2101da177e4SLinus Torvalds if (net_ratelimit()) 2111da177e4SLinus Torvalds printk(KERN_DEBUG "ip_finish_output2: No header cache and no neighbour!\n"); 2121da177e4SLinus Torvalds kfree_skb(skb); 2131da177e4SLinus Torvalds return -EINVAL; 2141da177e4SLinus Torvalds } 2151da177e4SLinus Torvalds 216628a5c56SJohn Heffner static inline int ip_skb_dst_mtu(struct sk_buff *skb) 217628a5c56SJohn Heffner { 218628a5c56SJohn Heffner struct inet_sock *inet = skb->sk ? inet_sk(skb->sk) : NULL; 219628a5c56SJohn Heffner 220628a5c56SJohn Heffner return (inet && inet->pmtudisc == IP_PMTUDISC_PROBE) ? 221adf30907SEric Dumazet skb_dst(skb)->dev->mtu : dst_mtu(skb_dst(skb)); 222628a5c56SJohn Heffner } 223628a5c56SJohn Heffner 224861d0486SPatrick McHardy static int ip_finish_output(struct sk_buff *skb) 2251da177e4SLinus Torvalds { 2265c901daaSPatrick McHardy #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM) 2275c901daaSPatrick McHardy /* Policy lookup after SNAT yielded a new policy */ 228adf30907SEric Dumazet if (skb_dst(skb)->xfrm != NULL) { 22948d5cad8SPatrick McHardy IPCB(skb)->flags |= IPSKB_REROUTED; 23048d5cad8SPatrick McHardy return dst_output(skb); 23148d5cad8SPatrick McHardy } 2325c901daaSPatrick McHardy #endif 233628a5c56SJohn Heffner if (skb->len > ip_skb_dst_mtu(skb) && !skb_is_gso(skb)) 2341bd9bef6SPatrick McHardy return ip_fragment(skb, ip_finish_output2); 2351bd9bef6SPatrick McHardy else 2361bd9bef6SPatrick McHardy return ip_finish_output2(skb); 2371da177e4SLinus Torvalds } 2381da177e4SLinus Torvalds 2391da177e4SLinus Torvalds int ip_mc_output(struct sk_buff *skb) 2401da177e4SLinus Torvalds { 2411da177e4SLinus Torvalds struct sock *sk = skb->sk; 242511c3f92SEric Dumazet struct rtable *rt = skb_rtable(skb); 2431da177e4SLinus Torvalds struct net_device *dev = rt->u.dst.dev; 2441da177e4SLinus Torvalds 2451da177e4SLinus Torvalds /* 2461da177e4SLinus Torvalds * If the indicated interface is up and running, send the packet. 2471da177e4SLinus Torvalds */ 248edf391ffSNeil Horman IP_UPD_PO_STATS(dev_net(dev), IPSTATS_MIB_OUT, skb->len); 2491da177e4SLinus Torvalds 2501da177e4SLinus Torvalds skb->dev = dev; 2511da177e4SLinus Torvalds skb->protocol = htons(ETH_P_IP); 2521da177e4SLinus Torvalds 2531da177e4SLinus Torvalds /* 2541da177e4SLinus Torvalds * Multicasts are looped back for other local users 2551da177e4SLinus Torvalds */ 2561da177e4SLinus Torvalds 2571da177e4SLinus Torvalds if (rt->rt_flags&RTCF_MULTICAST) { 2587ad6848cSOctavian Purdila if (sk_mc_loop(sk) 2591da177e4SLinus Torvalds #ifdef CONFIG_IP_MROUTE 2601da177e4SLinus Torvalds /* Small optimization: do not loopback not local frames, 2611da177e4SLinus Torvalds which returned after forwarding; they will be dropped 2621da177e4SLinus Torvalds by ip_mr_input in any case. 2631da177e4SLinus Torvalds Note, that local frames are looped back to be delivered 2641da177e4SLinus Torvalds to local recipients. 2651da177e4SLinus Torvalds 2661da177e4SLinus Torvalds This check is duplicated in ip_mr_input at the moment. 2671da177e4SLinus Torvalds */ 2689d4fb27dSJoe Perches && 2699d4fb27dSJoe Perches ((rt->rt_flags & RTCF_LOCAL) || 2709d4fb27dSJoe Perches !(IPCB(skb)->flags & IPSKB_FORWARDED)) 2711da177e4SLinus Torvalds #endif 2721da177e4SLinus Torvalds ) { 2731da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 2741da177e4SLinus Torvalds if (newskb) 2759bbc768aSJan Engelhardt NF_HOOK(NFPROTO_IPV4, NF_INET_POST_ROUTING, 2769bbc768aSJan Engelhardt newskb, NULL, newskb->dev, 2771da177e4SLinus Torvalds ip_dev_loopback_xmit); 2781da177e4SLinus Torvalds } 2791da177e4SLinus Torvalds 2801da177e4SLinus Torvalds /* Multicasts with ttl 0 must not go beyond the host */ 2811da177e4SLinus Torvalds 282eddc9ec5SArnaldo Carvalho de Melo if (ip_hdr(skb)->ttl == 0) { 2831da177e4SLinus Torvalds kfree_skb(skb); 2841da177e4SLinus Torvalds return 0; 2851da177e4SLinus Torvalds } 2861da177e4SLinus Torvalds } 2871da177e4SLinus Torvalds 2881da177e4SLinus Torvalds if (rt->rt_flags&RTCF_BROADCAST) { 2891da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 2901da177e4SLinus Torvalds if (newskb) 2919bbc768aSJan Engelhardt NF_HOOK(NFPROTO_IPV4, NF_INET_POST_ROUTING, newskb, 2929bbc768aSJan Engelhardt NULL, newskb->dev, ip_dev_loopback_xmit); 2931da177e4SLinus Torvalds } 2941da177e4SLinus Torvalds 2959bbc768aSJan Engelhardt return NF_HOOK_COND(NFPROTO_IPV4, NF_INET_POST_ROUTING, skb, NULL, 2969bbc768aSJan Engelhardt skb->dev, ip_finish_output, 29748d5cad8SPatrick McHardy !(IPCB(skb)->flags & IPSKB_REROUTED)); 2981da177e4SLinus Torvalds } 2991da177e4SLinus Torvalds 3001da177e4SLinus Torvalds int ip_output(struct sk_buff *skb) 3011da177e4SLinus Torvalds { 302adf30907SEric Dumazet struct net_device *dev = skb_dst(skb)->dev; 3031bd9bef6SPatrick McHardy 304edf391ffSNeil Horman IP_UPD_PO_STATS(dev_net(dev), IPSTATS_MIB_OUT, skb->len); 3051da177e4SLinus Torvalds 3061bd9bef6SPatrick McHardy skb->dev = dev; 3071bd9bef6SPatrick McHardy skb->protocol = htons(ETH_P_IP); 3081bd9bef6SPatrick McHardy 3099bbc768aSJan Engelhardt return NF_HOOK_COND(NFPROTO_IPV4, NF_INET_POST_ROUTING, skb, NULL, dev, 31048d5cad8SPatrick McHardy ip_finish_output, 31148d5cad8SPatrick McHardy !(IPCB(skb)->flags & IPSKB_REROUTED)); 3121da177e4SLinus Torvalds } 3131da177e4SLinus Torvalds 3144e15ed4dSShan Wei int ip_queue_xmit(struct sk_buff *skb) 3151da177e4SLinus Torvalds { 316e89862f4SDavid S. Miller struct sock *sk = skb->sk; 3171da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 3181da177e4SLinus Torvalds struct ip_options *opt = inet->opt; 3191da177e4SLinus Torvalds struct rtable *rt; 3201da177e4SLinus Torvalds struct iphdr *iph; 3211da177e4SLinus Torvalds 3221da177e4SLinus Torvalds /* Skip all of this if the packet is already routed, 3231da177e4SLinus Torvalds * f.e. by something like SCTP. 3241da177e4SLinus Torvalds */ 325511c3f92SEric Dumazet rt = skb_rtable(skb); 3261da177e4SLinus Torvalds if (rt != NULL) 3271da177e4SLinus Torvalds goto packet_routed; 3281da177e4SLinus Torvalds 3291da177e4SLinus Torvalds /* Make sure we can route this packet. */ 3301da177e4SLinus Torvalds rt = (struct rtable *)__sk_dst_check(sk, 0); 3311da177e4SLinus Torvalds if (rt == NULL) { 3323ca3c68eSAl Viro __be32 daddr; 3331da177e4SLinus Torvalds 3341da177e4SLinus Torvalds /* Use correct destination address if we have options. */ 335c720c7e8SEric Dumazet daddr = inet->inet_daddr; 3361da177e4SLinus Torvalds if(opt && opt->srr) 3371da177e4SLinus Torvalds daddr = opt->faddr; 3381da177e4SLinus Torvalds 3391da177e4SLinus Torvalds { 3401da177e4SLinus Torvalds struct flowi fl = { .oif = sk->sk_bound_dev_if, 341914a9ab3SAtis Elsts .mark = sk->sk_mark, 3421da177e4SLinus Torvalds .nl_u = { .ip4_u = 3431da177e4SLinus Torvalds { .daddr = daddr, 344c720c7e8SEric Dumazet .saddr = inet->inet_saddr, 3451da177e4SLinus Torvalds .tos = RT_CONN_FLAGS(sk) } }, 3461da177e4SLinus Torvalds .proto = sk->sk_protocol, 34786b08d86SKOVACS Krisztian .flags = inet_sk_flowi_flags(sk), 3481da177e4SLinus Torvalds .uli_u = { .ports = 349c720c7e8SEric Dumazet { .sport = inet->inet_sport, 350c720c7e8SEric Dumazet .dport = inet->inet_dport } } }; 3511da177e4SLinus Torvalds 3521da177e4SLinus Torvalds /* If this fails, retransmit mechanism of transport layer will 3531da177e4SLinus Torvalds * keep trying until route appears or the connection times 3541da177e4SLinus Torvalds * itself out. 3551da177e4SLinus Torvalds */ 356beb8d13bSVenkat Yekkirala security_sk_classify_flow(sk, &fl); 3573b1e0a65SYOSHIFUJI Hideaki if (ip_route_output_flow(sock_net(sk), &rt, &fl, sk, 0)) 3581da177e4SLinus Torvalds goto no_route; 3591da177e4SLinus Torvalds } 3606cbb0df7SArnaldo Carvalho de Melo sk_setup_caps(sk, &rt->u.dst); 3611da177e4SLinus Torvalds } 362adf30907SEric Dumazet skb_dst_set(skb, dst_clone(&rt->u.dst)); 3631da177e4SLinus Torvalds 3641da177e4SLinus Torvalds packet_routed: 3651da177e4SLinus Torvalds if (opt && opt->is_strictroute && rt->rt_dst != rt->rt_gateway) 3661da177e4SLinus Torvalds goto no_route; 3671da177e4SLinus Torvalds 3681da177e4SLinus Torvalds /* OK, we know where to send it, allocate and build IP header. */ 3698856dfa3SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct iphdr) + (opt ? opt->optlen : 0)); 3708856dfa3SArnaldo Carvalho de Melo skb_reset_network_header(skb); 371eddc9ec5SArnaldo Carvalho de Melo iph = ip_hdr(skb); 372714e85beSAl Viro *((__be16 *)iph) = htons((4 << 12) | (5 << 8) | (inet->tos & 0xff)); 3734e15ed4dSShan Wei if (ip_dont_fragment(sk, &rt->u.dst) && !skb->local_df) 3741da177e4SLinus Torvalds iph->frag_off = htons(IP_DF); 3751da177e4SLinus Torvalds else 3761da177e4SLinus Torvalds iph->frag_off = 0; 3771da177e4SLinus Torvalds iph->ttl = ip_select_ttl(inet, &rt->u.dst); 3781da177e4SLinus Torvalds iph->protocol = sk->sk_protocol; 3791da177e4SLinus Torvalds iph->saddr = rt->rt_src; 3801da177e4SLinus Torvalds iph->daddr = rt->rt_dst; 3811da177e4SLinus Torvalds /* Transport layer set skb->h.foo itself. */ 3821da177e4SLinus Torvalds 3831da177e4SLinus Torvalds if (opt && opt->optlen) { 3841da177e4SLinus Torvalds iph->ihl += opt->optlen >> 2; 385c720c7e8SEric Dumazet ip_options_build(skb, opt, inet->inet_daddr, rt, 0); 3861da177e4SLinus Torvalds } 3871da177e4SLinus Torvalds 38889f5f0aeSHerbert Xu ip_select_ident_more(iph, &rt->u.dst, sk, 3897967168cSHerbert Xu (skb_shinfo(skb)->gso_segs ?: 1) - 1); 3901da177e4SLinus Torvalds 3911da177e4SLinus Torvalds skb->priority = sk->sk_priority; 3924a19ec58SLaszlo Attila Toth skb->mark = sk->sk_mark; 3931da177e4SLinus Torvalds 394c439cb2eSHerbert Xu return ip_local_out(skb); 3951da177e4SLinus Torvalds 3961da177e4SLinus Torvalds no_route: 3975e38e270SPavel Emelyanov IP_INC_STATS(sock_net(sk), IPSTATS_MIB_OUTNOROUTES); 3981da177e4SLinus Torvalds kfree_skb(skb); 3991da177e4SLinus Torvalds return -EHOSTUNREACH; 4001da177e4SLinus Torvalds } 4011da177e4SLinus Torvalds 4021da177e4SLinus Torvalds 4031da177e4SLinus Torvalds static void ip_copy_metadata(struct sk_buff *to, struct sk_buff *from) 4041da177e4SLinus Torvalds { 4051da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 4061da177e4SLinus Torvalds to->priority = from->priority; 4071da177e4SLinus Torvalds to->protocol = from->protocol; 408adf30907SEric Dumazet skb_dst_drop(to); 409adf30907SEric Dumazet skb_dst_set(to, dst_clone(skb_dst(from))); 4101da177e4SLinus Torvalds to->dev = from->dev; 41182e91ffeSThomas Graf to->mark = from->mark; 4121da177e4SLinus Torvalds 4131da177e4SLinus Torvalds /* Copy the flags to each fragment. */ 4141da177e4SLinus Torvalds IPCB(to)->flags = IPCB(from)->flags; 4151da177e4SLinus Torvalds 4161da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 4171da177e4SLinus Torvalds to->tc_index = from->tc_index; 4181da177e4SLinus Torvalds #endif 419e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 420ba9dda3aSJozsef Kadlecsik #if defined(CONFIG_NETFILTER_XT_TARGET_TRACE) || \ 421ba9dda3aSJozsef Kadlecsik defined(CONFIG_NETFILTER_XT_TARGET_TRACE_MODULE) 422ba9dda3aSJozsef Kadlecsik to->nf_trace = from->nf_trace; 423ba9dda3aSJozsef Kadlecsik #endif 424c98d80edSJulian Anastasov #if defined(CONFIG_IP_VS) || defined(CONFIG_IP_VS_MODULE) 425c98d80edSJulian Anastasov to->ipvs_property = from->ipvs_property; 426c98d80edSJulian Anastasov #endif 427984bc16cSJames Morris skb_copy_secmark(to, from); 4281da177e4SLinus Torvalds } 4291da177e4SLinus Torvalds 4301da177e4SLinus Torvalds /* 4311da177e4SLinus Torvalds * This IP datagram is too large to be sent in one piece. Break it up into 4321da177e4SLinus Torvalds * smaller pieces (each of size equal to IP header plus 4331da177e4SLinus Torvalds * a block of the data of the original IP data part) that will yet fit in a 4341da177e4SLinus Torvalds * single device frame, and queue such a frame for sending. 4351da177e4SLinus Torvalds */ 4361da177e4SLinus Torvalds 4372e2f7aefSPatrick McHardy int ip_fragment(struct sk_buff *skb, int (*output)(struct sk_buff *)) 4381da177e4SLinus Torvalds { 4391da177e4SLinus Torvalds struct iphdr *iph; 4401da177e4SLinus Torvalds int raw = 0; 4411da177e4SLinus Torvalds int ptr; 4421da177e4SLinus Torvalds struct net_device *dev; 4431da177e4SLinus Torvalds struct sk_buff *skb2; 4449bcfcaf5SStephen Hemminger unsigned int mtu, hlen, left, len, ll_rs, pad; 4451da177e4SLinus Torvalds int offset; 44676ab608dSAlexey Dobriyan __be16 not_last_frag; 447511c3f92SEric Dumazet struct rtable *rt = skb_rtable(skb); 4481da177e4SLinus Torvalds int err = 0; 4491da177e4SLinus Torvalds 4501da177e4SLinus Torvalds dev = rt->u.dst.dev; 4511da177e4SLinus Torvalds 4521da177e4SLinus Torvalds /* 4531da177e4SLinus Torvalds * Point into the IP datagram header. 4541da177e4SLinus Torvalds */ 4551da177e4SLinus Torvalds 456eddc9ec5SArnaldo Carvalho de Melo iph = ip_hdr(skb); 4571da177e4SLinus Torvalds 4581da177e4SLinus Torvalds if (unlikely((iph->frag_off & htons(IP_DF)) && !skb->local_df)) { 4595e38e270SPavel Emelyanov IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGFAILS); 4601da177e4SLinus Torvalds icmp_send(skb, ICMP_DEST_UNREACH, ICMP_FRAG_NEEDED, 461628a5c56SJohn Heffner htonl(ip_skb_dst_mtu(skb))); 4621da177e4SLinus Torvalds kfree_skb(skb); 4631da177e4SLinus Torvalds return -EMSGSIZE; 4641da177e4SLinus Torvalds } 4651da177e4SLinus Torvalds 4661da177e4SLinus Torvalds /* 4671da177e4SLinus Torvalds * Setup starting values. 4681da177e4SLinus Torvalds */ 4691da177e4SLinus Torvalds 4701da177e4SLinus Torvalds hlen = iph->ihl * 4; 4711da177e4SLinus Torvalds mtu = dst_mtu(&rt->u.dst) - hlen; /* Size of data space */ 472*6c79bf0fSBart De Schuymer #ifdef CONFIG_BRIDGE_NETFILTER 473*6c79bf0fSBart De Schuymer if (skb->nf_bridge) 474*6c79bf0fSBart De Schuymer mtu -= nf_bridge_mtu_reduction(skb); 475*6c79bf0fSBart De Schuymer #endif 47689cee8b1SHerbert Xu IPCB(skb)->flags |= IPSKB_FRAG_COMPLETE; 4771da177e4SLinus Torvalds 4781da177e4SLinus Torvalds /* When frag_list is given, use it. First, check its validity: 4791da177e4SLinus Torvalds * some transformers could create wrong frag_list or break existing 4801da177e4SLinus Torvalds * one, it is not prohibited. In this case fall back to copying. 4811da177e4SLinus Torvalds * 4821da177e4SLinus Torvalds * LATER: this step can be merged to real generation of fragments, 4831da177e4SLinus Torvalds * we can switch to copy when see the first bad fragment. 4841da177e4SLinus Torvalds */ 485d7fcf1a5SDavid S. Miller if (skb_has_frags(skb)) { 4861da177e4SLinus Torvalds struct sk_buff *frag; 4871da177e4SLinus Torvalds int first_len = skb_pagelen(skb); 48829ffe1a5SHerbert Xu int truesizes = 0; 4891da177e4SLinus Torvalds 4901da177e4SLinus Torvalds if (first_len - hlen > mtu || 4911da177e4SLinus Torvalds ((first_len - hlen) & 7) || 4921da177e4SLinus Torvalds (iph->frag_off & htons(IP_MF|IP_OFFSET)) || 4931da177e4SLinus Torvalds skb_cloned(skb)) 4941da177e4SLinus Torvalds goto slow_path; 4951da177e4SLinus Torvalds 496d7fcf1a5SDavid S. Miller skb_walk_frags(skb, frag) { 4971da177e4SLinus Torvalds /* Correct geometry. */ 4981da177e4SLinus Torvalds if (frag->len > mtu || 4991da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 5001da177e4SLinus Torvalds skb_headroom(frag) < hlen) 5011da177e4SLinus Torvalds goto slow_path; 5021da177e4SLinus Torvalds 5031da177e4SLinus Torvalds /* Partially cloned skb? */ 5041da177e4SLinus Torvalds if (skb_shared(frag)) 5051da177e4SLinus Torvalds goto slow_path; 5062fdba6b0SHerbert Xu 5072fdba6b0SHerbert Xu BUG_ON(frag->sk); 5082fdba6b0SHerbert Xu if (skb->sk) { 5092fdba6b0SHerbert Xu frag->sk = skb->sk; 5102fdba6b0SHerbert Xu frag->destructor = sock_wfree; 5112fdba6b0SHerbert Xu } 512b2722b1cSPatrick McHardy truesizes += frag->truesize; 5131da177e4SLinus Torvalds } 5141da177e4SLinus Torvalds 5151da177e4SLinus Torvalds /* Everything is OK. Generate! */ 5161da177e4SLinus Torvalds 5171da177e4SLinus Torvalds err = 0; 5181da177e4SLinus Torvalds offset = 0; 5191da177e4SLinus Torvalds frag = skb_shinfo(skb)->frag_list; 520d7fcf1a5SDavid S. Miller skb_frag_list_init(skb); 5211da177e4SLinus Torvalds skb->data_len = first_len - skb_headlen(skb); 52229ffe1a5SHerbert Xu skb->truesize -= truesizes; 5231da177e4SLinus Torvalds skb->len = first_len; 5241da177e4SLinus Torvalds iph->tot_len = htons(first_len); 5251da177e4SLinus Torvalds iph->frag_off = htons(IP_MF); 5261da177e4SLinus Torvalds ip_send_check(iph); 5271da177e4SLinus Torvalds 5281da177e4SLinus Torvalds for (;;) { 5291da177e4SLinus Torvalds /* Prepare header of the next frame, 5301da177e4SLinus Torvalds * before previous one went down. */ 5311da177e4SLinus Torvalds if (frag) { 5321da177e4SLinus Torvalds frag->ip_summed = CHECKSUM_NONE; 533badff6d0SArnaldo Carvalho de Melo skb_reset_transport_header(frag); 534e2d1bca7SArnaldo Carvalho de Melo __skb_push(frag, hlen); 535e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(frag); 536d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(frag), iph, hlen); 537eddc9ec5SArnaldo Carvalho de Melo iph = ip_hdr(frag); 5381da177e4SLinus Torvalds iph->tot_len = htons(frag->len); 5391da177e4SLinus Torvalds ip_copy_metadata(frag, skb); 5401da177e4SLinus Torvalds if (offset == 0) 5411da177e4SLinus Torvalds ip_options_fragment(frag); 5421da177e4SLinus Torvalds offset += skb->len - hlen; 5431da177e4SLinus Torvalds iph->frag_off = htons(offset>>3); 5441da177e4SLinus Torvalds if (frag->next != NULL) 5451da177e4SLinus Torvalds iph->frag_off |= htons(IP_MF); 5461da177e4SLinus Torvalds /* Ready, complete checksum */ 5471da177e4SLinus Torvalds ip_send_check(iph); 5481da177e4SLinus Torvalds } 5491da177e4SLinus Torvalds 5501da177e4SLinus Torvalds err = output(skb); 5511da177e4SLinus Torvalds 552dafee490SWei Dong if (!err) 5535e38e270SPavel Emelyanov IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGCREATES); 5541da177e4SLinus Torvalds if (err || !frag) 5551da177e4SLinus Torvalds break; 5561da177e4SLinus Torvalds 5571da177e4SLinus Torvalds skb = frag; 5581da177e4SLinus Torvalds frag = skb->next; 5591da177e4SLinus Torvalds skb->next = NULL; 5601da177e4SLinus Torvalds } 5611da177e4SLinus Torvalds 5621da177e4SLinus Torvalds if (err == 0) { 5635e38e270SPavel Emelyanov IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGOKS); 5641da177e4SLinus Torvalds return 0; 5651da177e4SLinus Torvalds } 5661da177e4SLinus Torvalds 5671da177e4SLinus Torvalds while (frag) { 5681da177e4SLinus Torvalds skb = frag->next; 5691da177e4SLinus Torvalds kfree_skb(frag); 5701da177e4SLinus Torvalds frag = skb; 5711da177e4SLinus Torvalds } 5725e38e270SPavel Emelyanov IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGFAILS); 5731da177e4SLinus Torvalds return err; 5741da177e4SLinus Torvalds } 5751da177e4SLinus Torvalds 5761da177e4SLinus Torvalds slow_path: 5771da177e4SLinus Torvalds left = skb->len - hlen; /* Space per frame */ 5781da177e4SLinus Torvalds ptr = raw + hlen; /* Where to start from */ 5791da177e4SLinus Torvalds 5801da177e4SLinus Torvalds /* for bridged IP traffic encapsulated inside f.e. a vlan header, 5819bcfcaf5SStephen Hemminger * we need to make room for the encapsulating header 5829bcfcaf5SStephen Hemminger */ 5839bcfcaf5SStephen Hemminger pad = nf_bridge_pad(skb); 5849bcfcaf5SStephen Hemminger ll_rs = LL_RESERVED_SPACE_EXTRA(rt->u.dst.dev, pad); 5859bcfcaf5SStephen Hemminger mtu -= pad; 5869bcfcaf5SStephen Hemminger 5871da177e4SLinus Torvalds /* 5881da177e4SLinus Torvalds * Fragment the datagram. 5891da177e4SLinus Torvalds */ 5901da177e4SLinus Torvalds 5911da177e4SLinus Torvalds offset = (ntohs(iph->frag_off) & IP_OFFSET) << 3; 5921da177e4SLinus Torvalds not_last_frag = iph->frag_off & htons(IP_MF); 5931da177e4SLinus Torvalds 5941da177e4SLinus Torvalds /* 5951da177e4SLinus Torvalds * Keep copying data until we run out. 5961da177e4SLinus Torvalds */ 5971da177e4SLinus Torvalds 5981da177e4SLinus Torvalds while (left > 0) { 5991da177e4SLinus Torvalds len = left; 6001da177e4SLinus Torvalds /* IF: it doesn't fit, use 'mtu' - the data space left */ 6011da177e4SLinus Torvalds if (len > mtu) 6021da177e4SLinus Torvalds len = mtu; 6031da177e4SLinus Torvalds /* IF: we are not sending upto and including the packet end 6041da177e4SLinus Torvalds then align the next start on an eight byte boundary */ 6051da177e4SLinus Torvalds if (len < left) { 6061da177e4SLinus Torvalds len &= ~7; 6071da177e4SLinus Torvalds } 6081da177e4SLinus Torvalds /* 6091da177e4SLinus Torvalds * Allocate buffer. 6101da177e4SLinus Torvalds */ 6111da177e4SLinus Torvalds 6121da177e4SLinus Torvalds if ((skb2 = alloc_skb(len+hlen+ll_rs, GFP_ATOMIC)) == NULL) { 61364ce2073SPatrick McHardy NETDEBUG(KERN_INFO "IP: frag: no memory for new fragment!\n"); 6141da177e4SLinus Torvalds err = -ENOMEM; 6151da177e4SLinus Torvalds goto fail; 6161da177e4SLinus Torvalds } 6171da177e4SLinus Torvalds 6181da177e4SLinus Torvalds /* 6191da177e4SLinus Torvalds * Set up data on packet 6201da177e4SLinus Torvalds */ 6211da177e4SLinus Torvalds 6221da177e4SLinus Torvalds ip_copy_metadata(skb2, skb); 6231da177e4SLinus Torvalds skb_reserve(skb2, ll_rs); 6241da177e4SLinus Torvalds skb_put(skb2, len + hlen); 625c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(skb2); 626b0e380b1SArnaldo Carvalho de Melo skb2->transport_header = skb2->network_header + hlen; 6271da177e4SLinus Torvalds 6281da177e4SLinus Torvalds /* 6291da177e4SLinus Torvalds * Charge the memory for the fragment to any owner 6301da177e4SLinus Torvalds * it might possess 6311da177e4SLinus Torvalds */ 6321da177e4SLinus Torvalds 6331da177e4SLinus Torvalds if (skb->sk) 6341da177e4SLinus Torvalds skb_set_owner_w(skb2, skb->sk); 6351da177e4SLinus Torvalds 6361da177e4SLinus Torvalds /* 6371da177e4SLinus Torvalds * Copy the packet header into the new buffer. 6381da177e4SLinus Torvalds */ 6391da177e4SLinus Torvalds 640d626f62bSArnaldo Carvalho de Melo skb_copy_from_linear_data(skb, skb_network_header(skb2), hlen); 6411da177e4SLinus Torvalds 6421da177e4SLinus Torvalds /* 6431da177e4SLinus Torvalds * Copy a block of the IP datagram. 6441da177e4SLinus Torvalds */ 645bff9b61cSArnaldo Carvalho de Melo if (skb_copy_bits(skb, ptr, skb_transport_header(skb2), len)) 6461da177e4SLinus Torvalds BUG(); 6471da177e4SLinus Torvalds left -= len; 6481da177e4SLinus Torvalds 6491da177e4SLinus Torvalds /* 6501da177e4SLinus Torvalds * Fill in the new header fields. 6511da177e4SLinus Torvalds */ 652eddc9ec5SArnaldo Carvalho de Melo iph = ip_hdr(skb2); 6531da177e4SLinus Torvalds iph->frag_off = htons((offset >> 3)); 6541da177e4SLinus Torvalds 6551da177e4SLinus Torvalds /* ANK: dirty, but effective trick. Upgrade options only if 6561da177e4SLinus Torvalds * the segment to be fragmented was THE FIRST (otherwise, 6571da177e4SLinus Torvalds * options are already fixed) and make it ONCE 6581da177e4SLinus Torvalds * on the initial skb, so that all the following fragments 6591da177e4SLinus Torvalds * will inherit fixed options. 6601da177e4SLinus Torvalds */ 6611da177e4SLinus Torvalds if (offset == 0) 6621da177e4SLinus Torvalds ip_options_fragment(skb); 6631da177e4SLinus Torvalds 6641da177e4SLinus Torvalds /* 6651da177e4SLinus Torvalds * Added AC : If we are fragmenting a fragment that's not the 6661da177e4SLinus Torvalds * last fragment then keep MF on each bit 6671da177e4SLinus Torvalds */ 6681da177e4SLinus Torvalds if (left > 0 || not_last_frag) 6691da177e4SLinus Torvalds iph->frag_off |= htons(IP_MF); 6701da177e4SLinus Torvalds ptr += len; 6711da177e4SLinus Torvalds offset += len; 6721da177e4SLinus Torvalds 6731da177e4SLinus Torvalds /* 6741da177e4SLinus Torvalds * Put this fragment into the sending queue. 6751da177e4SLinus Torvalds */ 6761da177e4SLinus Torvalds iph->tot_len = htons(len + hlen); 6771da177e4SLinus Torvalds 6781da177e4SLinus Torvalds ip_send_check(iph); 6791da177e4SLinus Torvalds 6801da177e4SLinus Torvalds err = output(skb2); 6811da177e4SLinus Torvalds if (err) 6821da177e4SLinus Torvalds goto fail; 683dafee490SWei Dong 6845e38e270SPavel Emelyanov IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGCREATES); 6851da177e4SLinus Torvalds } 6861da177e4SLinus Torvalds kfree_skb(skb); 6875e38e270SPavel Emelyanov IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGOKS); 6881da177e4SLinus Torvalds return err; 6891da177e4SLinus Torvalds 6901da177e4SLinus Torvalds fail: 6911da177e4SLinus Torvalds kfree_skb(skb); 6925e38e270SPavel Emelyanov IP_INC_STATS(dev_net(dev), IPSTATS_MIB_FRAGFAILS); 6931da177e4SLinus Torvalds return err; 6941da177e4SLinus Torvalds } 6951da177e4SLinus Torvalds 6962e2f7aefSPatrick McHardy EXPORT_SYMBOL(ip_fragment); 6972e2f7aefSPatrick McHardy 6981da177e4SLinus Torvalds int 6991da177e4SLinus Torvalds ip_generic_getfrag(void *from, char *to, int offset, int len, int odd, struct sk_buff *skb) 7001da177e4SLinus Torvalds { 7011da177e4SLinus Torvalds struct iovec *iov = from; 7021da177e4SLinus Torvalds 70384fa7933SPatrick McHardy if (skb->ip_summed == CHECKSUM_PARTIAL) { 7041da177e4SLinus Torvalds if (memcpy_fromiovecend(to, iov, offset, len) < 0) 7051da177e4SLinus Torvalds return -EFAULT; 7061da177e4SLinus Torvalds } else { 70744bb9363SAl Viro __wsum csum = 0; 7081da177e4SLinus Torvalds if (csum_partial_copy_fromiovecend(to, iov, offset, len, &csum) < 0) 7091da177e4SLinus Torvalds return -EFAULT; 7101da177e4SLinus Torvalds skb->csum = csum_block_add(skb->csum, csum, odd); 7111da177e4SLinus Torvalds } 7121da177e4SLinus Torvalds return 0; 7131da177e4SLinus Torvalds } 7141da177e4SLinus Torvalds 71544bb9363SAl Viro static inline __wsum 7161da177e4SLinus Torvalds csum_page(struct page *page, int offset, int copy) 7171da177e4SLinus Torvalds { 7181da177e4SLinus Torvalds char *kaddr; 71944bb9363SAl Viro __wsum csum; 7201da177e4SLinus Torvalds kaddr = kmap(page); 7211da177e4SLinus Torvalds csum = csum_partial(kaddr + offset, copy, 0); 7221da177e4SLinus Torvalds kunmap(page); 7231da177e4SLinus Torvalds return csum; 7241da177e4SLinus Torvalds } 7251da177e4SLinus Torvalds 7264b30b1c6SAdrian Bunk static inline int ip_ufo_append_data(struct sock *sk, 727e89e9cf5SAnanda Raju int getfrag(void *from, char *to, int offset, int len, 728e89e9cf5SAnanda Raju int odd, struct sk_buff *skb), 729e89e9cf5SAnanda Raju void *from, int length, int hh_len, int fragheaderlen, 730e89e9cf5SAnanda Raju int transhdrlen, int mtu, unsigned int flags) 731e89e9cf5SAnanda Raju { 732e89e9cf5SAnanda Raju struct sk_buff *skb; 733e89e9cf5SAnanda Raju int err; 734e89e9cf5SAnanda Raju 735e89e9cf5SAnanda Raju /* There is support for UDP fragmentation offload by network 736e89e9cf5SAnanda Raju * device, so create one single skb packet containing complete 737e89e9cf5SAnanda Raju * udp datagram 738e89e9cf5SAnanda Raju */ 739e89e9cf5SAnanda Raju if ((skb = skb_peek_tail(&sk->sk_write_queue)) == NULL) { 740e89e9cf5SAnanda Raju skb = sock_alloc_send_skb(sk, 741e89e9cf5SAnanda Raju hh_len + fragheaderlen + transhdrlen + 20, 742e89e9cf5SAnanda Raju (flags & MSG_DONTWAIT), &err); 743e89e9cf5SAnanda Raju 744e89e9cf5SAnanda Raju if (skb == NULL) 745e89e9cf5SAnanda Raju return err; 746e89e9cf5SAnanda Raju 747e89e9cf5SAnanda Raju /* reserve space for Hardware header */ 748e89e9cf5SAnanda Raju skb_reserve(skb, hh_len); 749e89e9cf5SAnanda Raju 750e89e9cf5SAnanda Raju /* create space for UDP/IP header */ 751e89e9cf5SAnanda Raju skb_put(skb, fragheaderlen + transhdrlen); 752e89e9cf5SAnanda Raju 753e89e9cf5SAnanda Raju /* initialize network header pointer */ 754c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(skb); 755e89e9cf5SAnanda Raju 756e89e9cf5SAnanda Raju /* initialize protocol header pointer */ 757b0e380b1SArnaldo Carvalho de Melo skb->transport_header = skb->network_header + fragheaderlen; 758e89e9cf5SAnanda Raju 75984fa7933SPatrick McHardy skb->ip_summed = CHECKSUM_PARTIAL; 760e89e9cf5SAnanda Raju skb->csum = 0; 761e89e9cf5SAnanda Raju sk->sk_sndmsg_off = 0; 762e89e9cf5SAnanda Raju 763e89e9cf5SAnanda Raju /* specify the length of each IP datagram fragment */ 7647967168cSHerbert Xu skb_shinfo(skb)->gso_size = mtu - fragheaderlen; 765f83ef8c0SHerbert Xu skb_shinfo(skb)->gso_type = SKB_GSO_UDP; 766e89e9cf5SAnanda Raju __skb_queue_tail(&sk->sk_write_queue, skb); 767e89e9cf5SAnanda Raju } 768be9164e7SKostya B 769be9164e7SKostya B return skb_append_datato_frags(sk, skb, getfrag, from, 770be9164e7SKostya B (length - transhdrlen)); 771e89e9cf5SAnanda Raju } 772e89e9cf5SAnanda Raju 7731da177e4SLinus Torvalds /* 7741da177e4SLinus Torvalds * ip_append_data() and ip_append_page() can make one large IP datagram 7751da177e4SLinus Torvalds * from many pieces of data. Each pieces will be holded on the socket 7761da177e4SLinus Torvalds * until ip_push_pending_frames() is called. Each piece can be a page 7771da177e4SLinus Torvalds * or non-page data. 7781da177e4SLinus Torvalds * 7791da177e4SLinus Torvalds * Not only UDP, other transport protocols - e.g. raw sockets - can use 7801da177e4SLinus Torvalds * this interface potentially. 7811da177e4SLinus Torvalds * 7821da177e4SLinus Torvalds * LATER: length must be adjusted by pad at tail, when it is required. 7831da177e4SLinus Torvalds */ 7841da177e4SLinus Torvalds int ip_append_data(struct sock *sk, 7851da177e4SLinus Torvalds int getfrag(void *from, char *to, int offset, int len, 7861da177e4SLinus Torvalds int odd, struct sk_buff *skb), 7871da177e4SLinus Torvalds void *from, int length, int transhdrlen, 7882e77d89bSEric Dumazet struct ipcm_cookie *ipc, struct rtable **rtp, 7891da177e4SLinus Torvalds unsigned int flags) 7901da177e4SLinus Torvalds { 7911da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 7921da177e4SLinus Torvalds struct sk_buff *skb; 7931da177e4SLinus Torvalds 7941da177e4SLinus Torvalds struct ip_options *opt = NULL; 7951da177e4SLinus Torvalds int hh_len; 7961da177e4SLinus Torvalds int exthdrlen; 7971da177e4SLinus Torvalds int mtu; 7981da177e4SLinus Torvalds int copy; 7991da177e4SLinus Torvalds int err; 8001da177e4SLinus Torvalds int offset = 0; 8011da177e4SLinus Torvalds unsigned int maxfraglen, fragheaderlen; 8021da177e4SLinus Torvalds int csummode = CHECKSUM_NONE; 8032e77d89bSEric Dumazet struct rtable *rt; 8041da177e4SLinus Torvalds 8051da177e4SLinus Torvalds if (flags&MSG_PROBE) 8061da177e4SLinus Torvalds return 0; 8071da177e4SLinus Torvalds 8081da177e4SLinus Torvalds if (skb_queue_empty(&sk->sk_write_queue)) { 8091da177e4SLinus Torvalds /* 8101da177e4SLinus Torvalds * setup for corking. 8111da177e4SLinus Torvalds */ 8121da177e4SLinus Torvalds opt = ipc->opt; 8131da177e4SLinus Torvalds if (opt) { 8141da177e4SLinus Torvalds if (inet->cork.opt == NULL) { 8151da177e4SLinus Torvalds inet->cork.opt = kmalloc(sizeof(struct ip_options) + 40, sk->sk_allocation); 8161da177e4SLinus Torvalds if (unlikely(inet->cork.opt == NULL)) 8171da177e4SLinus Torvalds return -ENOBUFS; 8181da177e4SLinus Torvalds } 8191da177e4SLinus Torvalds memcpy(inet->cork.opt, opt, sizeof(struct ip_options)+opt->optlen); 8201da177e4SLinus Torvalds inet->cork.flags |= IPCORK_OPT; 8211da177e4SLinus Torvalds inet->cork.addr = ipc->addr; 8221da177e4SLinus Torvalds } 8232e77d89bSEric Dumazet rt = *rtp; 824788d908fSJulien TINNES if (unlikely(!rt)) 825788d908fSJulien TINNES return -EFAULT; 8262e77d89bSEric Dumazet /* 8272e77d89bSEric Dumazet * We steal reference to this route, caller should not release it 8282e77d89bSEric Dumazet */ 8292e77d89bSEric Dumazet *rtp = NULL; 830628a5c56SJohn Heffner inet->cork.fragsize = mtu = inet->pmtudisc == IP_PMTUDISC_PROBE ? 831628a5c56SJohn Heffner rt->u.dst.dev->mtu : 832628a5c56SJohn Heffner dst_mtu(rt->u.dst.path); 833c8cdaf99SYOSHIFUJI Hideaki inet->cork.dst = &rt->u.dst; 8341da177e4SLinus Torvalds inet->cork.length = 0; 8351da177e4SLinus Torvalds sk->sk_sndmsg_page = NULL; 8361da177e4SLinus Torvalds sk->sk_sndmsg_off = 0; 8371da177e4SLinus Torvalds if ((exthdrlen = rt->u.dst.header_len) != 0) { 8381da177e4SLinus Torvalds length += exthdrlen; 8391da177e4SLinus Torvalds transhdrlen += exthdrlen; 8401da177e4SLinus Torvalds } 8411da177e4SLinus Torvalds } else { 842c8cdaf99SYOSHIFUJI Hideaki rt = (struct rtable *)inet->cork.dst; 8431da177e4SLinus Torvalds if (inet->cork.flags & IPCORK_OPT) 8441da177e4SLinus Torvalds opt = inet->cork.opt; 8451da177e4SLinus Torvalds 8461da177e4SLinus Torvalds transhdrlen = 0; 8471da177e4SLinus Torvalds exthdrlen = 0; 8481da177e4SLinus Torvalds mtu = inet->cork.fragsize; 8491da177e4SLinus Torvalds } 8501da177e4SLinus Torvalds hh_len = LL_RESERVED_SPACE(rt->u.dst.dev); 8511da177e4SLinus Torvalds 8521da177e4SLinus Torvalds fragheaderlen = sizeof(struct iphdr) + (opt ? opt->optlen : 0); 8531da177e4SLinus Torvalds maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen; 8541da177e4SLinus Torvalds 8551da177e4SLinus Torvalds if (inet->cork.length + length > 0xFFFF - fragheaderlen) { 856c720c7e8SEric Dumazet ip_local_error(sk, EMSGSIZE, rt->rt_dst, inet->inet_dport, 857c720c7e8SEric Dumazet mtu-exthdrlen); 8581da177e4SLinus Torvalds return -EMSGSIZE; 8591da177e4SLinus Torvalds } 8601da177e4SLinus Torvalds 8611da177e4SLinus Torvalds /* 8621da177e4SLinus Torvalds * transhdrlen > 0 means that this is the first fragment and we wish 8631da177e4SLinus Torvalds * it won't be fragmented in the future. 8641da177e4SLinus Torvalds */ 8651da177e4SLinus Torvalds if (transhdrlen && 8661da177e4SLinus Torvalds length + fragheaderlen <= mtu && 867d212f87bSStephen Hemminger rt->u.dst.dev->features & NETIF_F_V4_CSUM && 8681da177e4SLinus Torvalds !exthdrlen) 86984fa7933SPatrick McHardy csummode = CHECKSUM_PARTIAL; 8701da177e4SLinus Torvalds 8711da177e4SLinus Torvalds inet->cork.length += length; 872be9164e7SKostya B if (((length> mtu) || !skb_queue_empty(&sk->sk_write_queue)) && 873be9164e7SKostya B (sk->sk_protocol == IPPROTO_UDP) && 874e89e9cf5SAnanda Raju (rt->u.dst.dev->features & NETIF_F_UFO)) { 875baa829d8SPatrick McHardy err = ip_ufo_append_data(sk, getfrag, from, length, hh_len, 876baa829d8SPatrick McHardy fragheaderlen, transhdrlen, mtu, 877baa829d8SPatrick McHardy flags); 878baa829d8SPatrick McHardy if (err) 879e89e9cf5SAnanda Raju goto error; 880e89e9cf5SAnanda Raju return 0; 881e89e9cf5SAnanda Raju } 8821da177e4SLinus Torvalds 8831da177e4SLinus Torvalds /* So, what's going on in the loop below? 8841da177e4SLinus Torvalds * 8851da177e4SLinus Torvalds * We use calculated fragment length to generate chained skb, 8861da177e4SLinus Torvalds * each of segments is IP fragment ready for sending to network after 8871da177e4SLinus Torvalds * adding appropriate IP header. 8881da177e4SLinus Torvalds */ 8891da177e4SLinus Torvalds 8901da177e4SLinus Torvalds if ((skb = skb_peek_tail(&sk->sk_write_queue)) == NULL) 8911da177e4SLinus Torvalds goto alloc_new_skb; 8921da177e4SLinus Torvalds 8931da177e4SLinus Torvalds while (length > 0) { 8941da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 8951da177e4SLinus Torvalds copy = mtu - skb->len; 8961da177e4SLinus Torvalds if (copy < length) 8971da177e4SLinus Torvalds copy = maxfraglen - skb->len; 8981da177e4SLinus Torvalds if (copy <= 0) { 8991da177e4SLinus Torvalds char *data; 9001da177e4SLinus Torvalds unsigned int datalen; 9011da177e4SLinus Torvalds unsigned int fraglen; 9021da177e4SLinus Torvalds unsigned int fraggap; 9031da177e4SLinus Torvalds unsigned int alloclen; 9041da177e4SLinus Torvalds struct sk_buff *skb_prev; 9051da177e4SLinus Torvalds alloc_new_skb: 9061da177e4SLinus Torvalds skb_prev = skb; 9071da177e4SLinus Torvalds if (skb_prev) 9081da177e4SLinus Torvalds fraggap = skb_prev->len - maxfraglen; 9091da177e4SLinus Torvalds else 9101da177e4SLinus Torvalds fraggap = 0; 9111da177e4SLinus Torvalds 9121da177e4SLinus Torvalds /* 9131da177e4SLinus Torvalds * If remaining data exceeds the mtu, 9141da177e4SLinus Torvalds * we know we need more fragment(s). 9151da177e4SLinus Torvalds */ 9161da177e4SLinus Torvalds datalen = length + fraggap; 9171da177e4SLinus Torvalds if (datalen > mtu - fragheaderlen) 9181da177e4SLinus Torvalds datalen = maxfraglen - fragheaderlen; 9191da177e4SLinus Torvalds fraglen = datalen + fragheaderlen; 9201da177e4SLinus Torvalds 9211da177e4SLinus Torvalds if ((flags & MSG_MORE) && 9221da177e4SLinus Torvalds !(rt->u.dst.dev->features&NETIF_F_SG)) 9231da177e4SLinus Torvalds alloclen = mtu; 9241da177e4SLinus Torvalds else 9251da177e4SLinus Torvalds alloclen = datalen + fragheaderlen; 9261da177e4SLinus Torvalds 9271da177e4SLinus Torvalds /* The last fragment gets additional space at tail. 9281da177e4SLinus Torvalds * Note, with MSG_MORE we overallocate on fragments, 9291da177e4SLinus Torvalds * because we have no idea what fragment will be 9301da177e4SLinus Torvalds * the last. 9311da177e4SLinus Torvalds */ 9323d9dd756SZach Brown if (datalen == length + fraggap) 9331da177e4SLinus Torvalds alloclen += rt->u.dst.trailer_len; 9341da177e4SLinus Torvalds 9351da177e4SLinus Torvalds if (transhdrlen) { 9361da177e4SLinus Torvalds skb = sock_alloc_send_skb(sk, 9371da177e4SLinus Torvalds alloclen + hh_len + 15, 9381da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 9391da177e4SLinus Torvalds } else { 9401da177e4SLinus Torvalds skb = NULL; 9411da177e4SLinus Torvalds if (atomic_read(&sk->sk_wmem_alloc) <= 9421da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 9431da177e4SLinus Torvalds skb = sock_wmalloc(sk, 9441da177e4SLinus Torvalds alloclen + hh_len + 15, 1, 9451da177e4SLinus Torvalds sk->sk_allocation); 9461da177e4SLinus Torvalds if (unlikely(skb == NULL)) 9471da177e4SLinus Torvalds err = -ENOBUFS; 94851f31cabSPatrick Ohly else 94951f31cabSPatrick Ohly /* only the initial fragment is 95051f31cabSPatrick Ohly time stamped */ 95151f31cabSPatrick Ohly ipc->shtx.flags = 0; 9521da177e4SLinus Torvalds } 9531da177e4SLinus Torvalds if (skb == NULL) 9541da177e4SLinus Torvalds goto error; 9551da177e4SLinus Torvalds 9561da177e4SLinus Torvalds /* 9571da177e4SLinus Torvalds * Fill in the control structures 9581da177e4SLinus Torvalds */ 9591da177e4SLinus Torvalds skb->ip_summed = csummode; 9601da177e4SLinus Torvalds skb->csum = 0; 9611da177e4SLinus Torvalds skb_reserve(skb, hh_len); 96251f31cabSPatrick Ohly *skb_tx(skb) = ipc->shtx; 9631da177e4SLinus Torvalds 9641da177e4SLinus Torvalds /* 9651da177e4SLinus Torvalds * Find where to start putting bytes. 9661da177e4SLinus Torvalds */ 9671da177e4SLinus Torvalds data = skb_put(skb, fraglen); 968c14d2450SArnaldo Carvalho de Melo skb_set_network_header(skb, exthdrlen); 969b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 970b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 9711da177e4SLinus Torvalds data += fragheaderlen; 9721da177e4SLinus Torvalds 9731da177e4SLinus Torvalds if (fraggap) { 9741da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 9751da177e4SLinus Torvalds skb_prev, maxfraglen, 9761da177e4SLinus Torvalds data + transhdrlen, fraggap, 0); 9771da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 9781da177e4SLinus Torvalds skb->csum); 9791da177e4SLinus Torvalds data += fraggap; 980e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 9811da177e4SLinus Torvalds } 9821da177e4SLinus Torvalds 9831da177e4SLinus Torvalds copy = datalen - transhdrlen - fraggap; 9841da177e4SLinus Torvalds if (copy > 0 && getfrag(from, data + transhdrlen, offset, copy, fraggap, skb) < 0) { 9851da177e4SLinus Torvalds err = -EFAULT; 9861da177e4SLinus Torvalds kfree_skb(skb); 9871da177e4SLinus Torvalds goto error; 9881da177e4SLinus Torvalds } 9891da177e4SLinus Torvalds 9901da177e4SLinus Torvalds offset += copy; 9911da177e4SLinus Torvalds length -= datalen - fraggap; 9921da177e4SLinus Torvalds transhdrlen = 0; 9931da177e4SLinus Torvalds exthdrlen = 0; 9941da177e4SLinus Torvalds csummode = CHECKSUM_NONE; 9951da177e4SLinus Torvalds 9961da177e4SLinus Torvalds /* 9971da177e4SLinus Torvalds * Put the packet on the pending queue. 9981da177e4SLinus Torvalds */ 9991da177e4SLinus Torvalds __skb_queue_tail(&sk->sk_write_queue, skb); 10001da177e4SLinus Torvalds continue; 10011da177e4SLinus Torvalds } 10021da177e4SLinus Torvalds 10031da177e4SLinus Torvalds if (copy > length) 10041da177e4SLinus Torvalds copy = length; 10051da177e4SLinus Torvalds 10061da177e4SLinus Torvalds if (!(rt->u.dst.dev->features&NETIF_F_SG)) { 10071da177e4SLinus Torvalds unsigned int off; 10081da177e4SLinus Torvalds 10091da177e4SLinus Torvalds off = skb->len; 10101da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 10111da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 10121da177e4SLinus Torvalds __skb_trim(skb, off); 10131da177e4SLinus Torvalds err = -EFAULT; 10141da177e4SLinus Torvalds goto error; 10151da177e4SLinus Torvalds } 10161da177e4SLinus Torvalds } else { 10171da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 10181da177e4SLinus Torvalds skb_frag_t *frag = &skb_shinfo(skb)->frags[i-1]; 10191da177e4SLinus Torvalds struct page *page = sk->sk_sndmsg_page; 10201da177e4SLinus Torvalds int off = sk->sk_sndmsg_off; 10211da177e4SLinus Torvalds unsigned int left; 10221da177e4SLinus Torvalds 10231da177e4SLinus Torvalds if (page && (left = PAGE_SIZE - off) > 0) { 10241da177e4SLinus Torvalds if (copy >= left) 10251da177e4SLinus Torvalds copy = left; 10261da177e4SLinus Torvalds if (page != frag->page) { 10271da177e4SLinus Torvalds if (i == MAX_SKB_FRAGS) { 10281da177e4SLinus Torvalds err = -EMSGSIZE; 10291da177e4SLinus Torvalds goto error; 10301da177e4SLinus Torvalds } 10311da177e4SLinus Torvalds get_page(page); 10321da177e4SLinus Torvalds skb_fill_page_desc(skb, i, page, sk->sk_sndmsg_off, 0); 10331da177e4SLinus Torvalds frag = &skb_shinfo(skb)->frags[i]; 10341da177e4SLinus Torvalds } 10351da177e4SLinus Torvalds } else if (i < MAX_SKB_FRAGS) { 10361da177e4SLinus Torvalds if (copy > PAGE_SIZE) 10371da177e4SLinus Torvalds copy = PAGE_SIZE; 10381da177e4SLinus Torvalds page = alloc_pages(sk->sk_allocation, 0); 10391da177e4SLinus Torvalds if (page == NULL) { 10401da177e4SLinus Torvalds err = -ENOMEM; 10411da177e4SLinus Torvalds goto error; 10421da177e4SLinus Torvalds } 10431da177e4SLinus Torvalds sk->sk_sndmsg_page = page; 10441da177e4SLinus Torvalds sk->sk_sndmsg_off = 0; 10451da177e4SLinus Torvalds 10461da177e4SLinus Torvalds skb_fill_page_desc(skb, i, page, 0, 0); 10471da177e4SLinus Torvalds frag = &skb_shinfo(skb)->frags[i]; 10481da177e4SLinus Torvalds } else { 10491da177e4SLinus Torvalds err = -EMSGSIZE; 10501da177e4SLinus Torvalds goto error; 10511da177e4SLinus Torvalds } 10521da177e4SLinus Torvalds if (getfrag(from, page_address(frag->page)+frag->page_offset+frag->size, offset, copy, skb->len, skb) < 0) { 10531da177e4SLinus Torvalds err = -EFAULT; 10541da177e4SLinus Torvalds goto error; 10551da177e4SLinus Torvalds } 10561da177e4SLinus Torvalds sk->sk_sndmsg_off += copy; 10571da177e4SLinus Torvalds frag->size += copy; 10581da177e4SLinus Torvalds skb->len += copy; 10591da177e4SLinus Torvalds skb->data_len += copy; 1060f945fa7aSHerbert Xu skb->truesize += copy; 1061f945fa7aSHerbert Xu atomic_add(copy, &sk->sk_wmem_alloc); 10621da177e4SLinus Torvalds } 10631da177e4SLinus Torvalds offset += copy; 10641da177e4SLinus Torvalds length -= copy; 10651da177e4SLinus Torvalds } 10661da177e4SLinus Torvalds 10671da177e4SLinus Torvalds return 0; 10681da177e4SLinus Torvalds 10691da177e4SLinus Torvalds error: 10701da177e4SLinus Torvalds inet->cork.length -= length; 10715e38e270SPavel Emelyanov IP_INC_STATS(sock_net(sk), IPSTATS_MIB_OUTDISCARDS); 10721da177e4SLinus Torvalds return err; 10731da177e4SLinus Torvalds } 10741da177e4SLinus Torvalds 10751da177e4SLinus Torvalds ssize_t ip_append_page(struct sock *sk, struct page *page, 10761da177e4SLinus Torvalds int offset, size_t size, int flags) 10771da177e4SLinus Torvalds { 10781da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 10791da177e4SLinus Torvalds struct sk_buff *skb; 10801da177e4SLinus Torvalds struct rtable *rt; 10811da177e4SLinus Torvalds struct ip_options *opt = NULL; 10821da177e4SLinus Torvalds int hh_len; 10831da177e4SLinus Torvalds int mtu; 10841da177e4SLinus Torvalds int len; 10851da177e4SLinus Torvalds int err; 10861da177e4SLinus Torvalds unsigned int maxfraglen, fragheaderlen, fraggap; 10871da177e4SLinus Torvalds 10881da177e4SLinus Torvalds if (inet->hdrincl) 10891da177e4SLinus Torvalds return -EPERM; 10901da177e4SLinus Torvalds 10911da177e4SLinus Torvalds if (flags&MSG_PROBE) 10921da177e4SLinus Torvalds return 0; 10931da177e4SLinus Torvalds 10941da177e4SLinus Torvalds if (skb_queue_empty(&sk->sk_write_queue)) 10951da177e4SLinus Torvalds return -EINVAL; 10961da177e4SLinus Torvalds 1097c8cdaf99SYOSHIFUJI Hideaki rt = (struct rtable *)inet->cork.dst; 10981da177e4SLinus Torvalds if (inet->cork.flags & IPCORK_OPT) 10991da177e4SLinus Torvalds opt = inet->cork.opt; 11001da177e4SLinus Torvalds 11011da177e4SLinus Torvalds if (!(rt->u.dst.dev->features&NETIF_F_SG)) 11021da177e4SLinus Torvalds return -EOPNOTSUPP; 11031da177e4SLinus Torvalds 11041da177e4SLinus Torvalds hh_len = LL_RESERVED_SPACE(rt->u.dst.dev); 11051da177e4SLinus Torvalds mtu = inet->cork.fragsize; 11061da177e4SLinus Torvalds 11071da177e4SLinus Torvalds fragheaderlen = sizeof(struct iphdr) + (opt ? opt->optlen : 0); 11081da177e4SLinus Torvalds maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen; 11091da177e4SLinus Torvalds 11101da177e4SLinus Torvalds if (inet->cork.length + size > 0xFFFF - fragheaderlen) { 1111c720c7e8SEric Dumazet ip_local_error(sk, EMSGSIZE, rt->rt_dst, inet->inet_dport, mtu); 11121da177e4SLinus Torvalds return -EMSGSIZE; 11131da177e4SLinus Torvalds } 11141da177e4SLinus Torvalds 11151da177e4SLinus Torvalds if ((skb = skb_peek_tail(&sk->sk_write_queue)) == NULL) 11161da177e4SLinus Torvalds return -EINVAL; 11171da177e4SLinus Torvalds 11181da177e4SLinus Torvalds inet->cork.length += size; 1119e89e9cf5SAnanda Raju if ((sk->sk_protocol == IPPROTO_UDP) && 11207967168cSHerbert Xu (rt->u.dst.dev->features & NETIF_F_UFO)) { 11217967168cSHerbert Xu skb_shinfo(skb)->gso_size = mtu - fragheaderlen; 1122f83ef8c0SHerbert Xu skb_shinfo(skb)->gso_type = SKB_GSO_UDP; 11237967168cSHerbert Xu } 1124e89e9cf5SAnanda Raju 11251da177e4SLinus Torvalds 11261da177e4SLinus Torvalds while (size > 0) { 11271da177e4SLinus Torvalds int i; 11281da177e4SLinus Torvalds 112989114afdSHerbert Xu if (skb_is_gso(skb)) 1130e89e9cf5SAnanda Raju len = size; 1131e89e9cf5SAnanda Raju else { 1132e89e9cf5SAnanda Raju 11331da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 11341da177e4SLinus Torvalds len = mtu - skb->len; 11351da177e4SLinus Torvalds if (len < size) 11361da177e4SLinus Torvalds len = maxfraglen - skb->len; 1137e89e9cf5SAnanda Raju } 11381da177e4SLinus Torvalds if (len <= 0) { 11391da177e4SLinus Torvalds struct sk_buff *skb_prev; 11401da177e4SLinus Torvalds int alloclen; 11411da177e4SLinus Torvalds 11421da177e4SLinus Torvalds skb_prev = skb; 11431da177e4SLinus Torvalds fraggap = skb_prev->len - maxfraglen; 11441da177e4SLinus Torvalds 11451da177e4SLinus Torvalds alloclen = fragheaderlen + hh_len + fraggap + 15; 11461da177e4SLinus Torvalds skb = sock_wmalloc(sk, alloclen, 1, sk->sk_allocation); 11471da177e4SLinus Torvalds if (unlikely(!skb)) { 11481da177e4SLinus Torvalds err = -ENOBUFS; 11491da177e4SLinus Torvalds goto error; 11501da177e4SLinus Torvalds } 11511da177e4SLinus Torvalds 11521da177e4SLinus Torvalds /* 11531da177e4SLinus Torvalds * Fill in the control structures 11541da177e4SLinus Torvalds */ 11551da177e4SLinus Torvalds skb->ip_summed = CHECKSUM_NONE; 11561da177e4SLinus Torvalds skb->csum = 0; 11571da177e4SLinus Torvalds skb_reserve(skb, hh_len); 11581da177e4SLinus Torvalds 11591da177e4SLinus Torvalds /* 11601da177e4SLinus Torvalds * Find where to start putting bytes. 11611da177e4SLinus Torvalds */ 1162967b05f6SArnaldo Carvalho de Melo skb_put(skb, fragheaderlen + fraggap); 11632ca9e6f2SArnaldo Carvalho de Melo skb_reset_network_header(skb); 1164b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1165b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 11661da177e4SLinus Torvalds if (fraggap) { 1167967b05f6SArnaldo Carvalho de Melo skb->csum = skb_copy_and_csum_bits(skb_prev, 1168967b05f6SArnaldo Carvalho de Melo maxfraglen, 11699c70220bSArnaldo Carvalho de Melo skb_transport_header(skb), 1170967b05f6SArnaldo Carvalho de Melo fraggap, 0); 11711da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 11721da177e4SLinus Torvalds skb->csum); 1173e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 11741da177e4SLinus Torvalds } 11751da177e4SLinus Torvalds 11761da177e4SLinus Torvalds /* 11771da177e4SLinus Torvalds * Put the packet on the pending queue. 11781da177e4SLinus Torvalds */ 11791da177e4SLinus Torvalds __skb_queue_tail(&sk->sk_write_queue, skb); 11801da177e4SLinus Torvalds continue; 11811da177e4SLinus Torvalds } 11821da177e4SLinus Torvalds 11831da177e4SLinus Torvalds i = skb_shinfo(skb)->nr_frags; 11841da177e4SLinus Torvalds if (len > size) 11851da177e4SLinus Torvalds len = size; 11861da177e4SLinus Torvalds if (skb_can_coalesce(skb, i, page, offset)) { 11871da177e4SLinus Torvalds skb_shinfo(skb)->frags[i-1].size += len; 11881da177e4SLinus Torvalds } else if (i < MAX_SKB_FRAGS) { 11891da177e4SLinus Torvalds get_page(page); 11901da177e4SLinus Torvalds skb_fill_page_desc(skb, i, page, offset, len); 11911da177e4SLinus Torvalds } else { 11921da177e4SLinus Torvalds err = -EMSGSIZE; 11931da177e4SLinus Torvalds goto error; 11941da177e4SLinus Torvalds } 11951da177e4SLinus Torvalds 11961da177e4SLinus Torvalds if (skb->ip_summed == CHECKSUM_NONE) { 119744bb9363SAl Viro __wsum csum; 11981da177e4SLinus Torvalds csum = csum_page(page, offset, len); 11991da177e4SLinus Torvalds skb->csum = csum_block_add(skb->csum, csum, skb->len); 12001da177e4SLinus Torvalds } 12011da177e4SLinus Torvalds 12021da177e4SLinus Torvalds skb->len += len; 12031da177e4SLinus Torvalds skb->data_len += len; 12041e34a11dSDavid S. Miller skb->truesize += len; 12051e34a11dSDavid S. Miller atomic_add(len, &sk->sk_wmem_alloc); 12061da177e4SLinus Torvalds offset += len; 12071da177e4SLinus Torvalds size -= len; 12081da177e4SLinus Torvalds } 12091da177e4SLinus Torvalds return 0; 12101da177e4SLinus Torvalds 12111da177e4SLinus Torvalds error: 12121da177e4SLinus Torvalds inet->cork.length -= size; 12135e38e270SPavel Emelyanov IP_INC_STATS(sock_net(sk), IPSTATS_MIB_OUTDISCARDS); 12141da177e4SLinus Torvalds return err; 12151da177e4SLinus Torvalds } 12161da177e4SLinus Torvalds 1217429f08e9SPavel Emelyanov static void ip_cork_release(struct inet_sock *inet) 1218429f08e9SPavel Emelyanov { 1219429f08e9SPavel Emelyanov inet->cork.flags &= ~IPCORK_OPT; 1220429f08e9SPavel Emelyanov kfree(inet->cork.opt); 1221429f08e9SPavel Emelyanov inet->cork.opt = NULL; 1222c8cdaf99SYOSHIFUJI Hideaki dst_release(inet->cork.dst); 1223c8cdaf99SYOSHIFUJI Hideaki inet->cork.dst = NULL; 1224429f08e9SPavel Emelyanov } 1225429f08e9SPavel Emelyanov 12261da177e4SLinus Torvalds /* 12271da177e4SLinus Torvalds * Combined all pending IP fragments on the socket as one IP datagram 12281da177e4SLinus Torvalds * and push them out. 12291da177e4SLinus Torvalds */ 12301da177e4SLinus Torvalds int ip_push_pending_frames(struct sock *sk) 12311da177e4SLinus Torvalds { 12321da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 12331da177e4SLinus Torvalds struct sk_buff **tail_skb; 12341da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 12350388b004SPavel Emelyanov struct net *net = sock_net(sk); 12361da177e4SLinus Torvalds struct ip_options *opt = NULL; 1237c8cdaf99SYOSHIFUJI Hideaki struct rtable *rt = (struct rtable *)inet->cork.dst; 12381da177e4SLinus Torvalds struct iphdr *iph; 123976ab608dSAlexey Dobriyan __be16 df = 0; 12401da177e4SLinus Torvalds __u8 ttl; 12411da177e4SLinus Torvalds int err = 0; 12421da177e4SLinus Torvalds 12431da177e4SLinus Torvalds if ((skb = __skb_dequeue(&sk->sk_write_queue)) == NULL) 12441da177e4SLinus Torvalds goto out; 12451da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 12461da177e4SLinus Torvalds 12471da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1248d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1249bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 12501da177e4SLinus Torvalds while ((tmp_skb = __skb_dequeue(&sk->sk_write_queue)) != NULL) { 1251cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 12521da177e4SLinus Torvalds *tail_skb = tmp_skb; 12531da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 12541da177e4SLinus Torvalds skb->len += tmp_skb->len; 12551da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 12561da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 12571da177e4SLinus Torvalds tmp_skb->destructor = NULL; 12581da177e4SLinus Torvalds tmp_skb->sk = NULL; 12591da177e4SLinus Torvalds } 12601da177e4SLinus Torvalds 12611da177e4SLinus Torvalds /* Unless user demanded real pmtu discovery (IP_PMTUDISC_DO), we allow 12621da177e4SLinus Torvalds * to fragment the frame generated here. No matter, what transforms 12631da177e4SLinus Torvalds * how transforms change size of the packet, it will come out. 12641da177e4SLinus Torvalds */ 1265628a5c56SJohn Heffner if (inet->pmtudisc < IP_PMTUDISC_DO) 12661da177e4SLinus Torvalds skb->local_df = 1; 12671da177e4SLinus Torvalds 12681da177e4SLinus Torvalds /* DF bit is set when we want to see DF on outgoing frames. 12691da177e4SLinus Torvalds * If local_df is set too, we still allow to fragment this frame 12701da177e4SLinus Torvalds * locally. */ 1271628a5c56SJohn Heffner if (inet->pmtudisc >= IP_PMTUDISC_DO || 12721da177e4SLinus Torvalds (skb->len <= dst_mtu(&rt->u.dst) && 12731da177e4SLinus Torvalds ip_dont_fragment(sk, &rt->u.dst))) 12741da177e4SLinus Torvalds df = htons(IP_DF); 12751da177e4SLinus Torvalds 12761da177e4SLinus Torvalds if (inet->cork.flags & IPCORK_OPT) 12771da177e4SLinus Torvalds opt = inet->cork.opt; 12781da177e4SLinus Torvalds 12791da177e4SLinus Torvalds if (rt->rt_type == RTN_MULTICAST) 12801da177e4SLinus Torvalds ttl = inet->mc_ttl; 12811da177e4SLinus Torvalds else 12821da177e4SLinus Torvalds ttl = ip_select_ttl(inet, &rt->u.dst); 12831da177e4SLinus Torvalds 12841da177e4SLinus Torvalds iph = (struct iphdr *)skb->data; 12851da177e4SLinus Torvalds iph->version = 4; 12861da177e4SLinus Torvalds iph->ihl = 5; 12871da177e4SLinus Torvalds if (opt) { 12881da177e4SLinus Torvalds iph->ihl += opt->optlen>>2; 12891da177e4SLinus Torvalds ip_options_build(skb, opt, inet->cork.addr, rt, 0); 12901da177e4SLinus Torvalds } 12911da177e4SLinus Torvalds iph->tos = inet->tos; 12921da177e4SLinus Torvalds iph->frag_off = df; 12931a55d57bSAlexey Kuznetsov ip_select_ident(iph, &rt->u.dst, sk); 12941da177e4SLinus Torvalds iph->ttl = ttl; 12951da177e4SLinus Torvalds iph->protocol = sk->sk_protocol; 12961da177e4SLinus Torvalds iph->saddr = rt->rt_src; 12971da177e4SLinus Torvalds iph->daddr = rt->rt_dst; 12981da177e4SLinus Torvalds 12991da177e4SLinus Torvalds skb->priority = sk->sk_priority; 13004a19ec58SLaszlo Attila Toth skb->mark = sk->sk_mark; 1301a21bba94SEric Dumazet /* 1302a21bba94SEric Dumazet * Steal rt from cork.dst to avoid a pair of atomic_inc/atomic_dec 1303a21bba94SEric Dumazet * on dst refcount 1304a21bba94SEric Dumazet */ 1305a21bba94SEric Dumazet inet->cork.dst = NULL; 1306adf30907SEric Dumazet skb_dst_set(skb, &rt->u.dst); 13071da177e4SLinus Torvalds 130896793b48SDavid L Stevens if (iph->protocol == IPPROTO_ICMP) 13090388b004SPavel Emelyanov icmp_out_count(net, ((struct icmphdr *) 131096793b48SDavid L Stevens skb_transport_header(skb))->type); 131196793b48SDavid L Stevens 13121da177e4SLinus Torvalds /* Netfilter gets whole the not fragmented skb. */ 1313c439cb2eSHerbert Xu err = ip_local_out(skb); 13141da177e4SLinus Torvalds if (err) { 13151da177e4SLinus Torvalds if (err > 0) 13166ce9e7b5SEric Dumazet err = net_xmit_errno(err); 13171da177e4SLinus Torvalds if (err) 13181da177e4SLinus Torvalds goto error; 13191da177e4SLinus Torvalds } 13201da177e4SLinus Torvalds 13211da177e4SLinus Torvalds out: 1322429f08e9SPavel Emelyanov ip_cork_release(inet); 13231da177e4SLinus Torvalds return err; 13241da177e4SLinus Torvalds 13251da177e4SLinus Torvalds error: 13265e38e270SPavel Emelyanov IP_INC_STATS(net, IPSTATS_MIB_OUTDISCARDS); 13271da177e4SLinus Torvalds goto out; 13281da177e4SLinus Torvalds } 13291da177e4SLinus Torvalds 13301da177e4SLinus Torvalds /* 13311da177e4SLinus Torvalds * Throw away all pending data on the socket. 13321da177e4SLinus Torvalds */ 13331da177e4SLinus Torvalds void ip_flush_pending_frames(struct sock *sk) 13341da177e4SLinus Torvalds { 13351da177e4SLinus Torvalds struct sk_buff *skb; 13361da177e4SLinus Torvalds 13371da177e4SLinus Torvalds while ((skb = __skb_dequeue_tail(&sk->sk_write_queue)) != NULL) 13381da177e4SLinus Torvalds kfree_skb(skb); 13391da177e4SLinus Torvalds 1340429f08e9SPavel Emelyanov ip_cork_release(inet_sk(sk)); 13411da177e4SLinus Torvalds } 13421da177e4SLinus Torvalds 13431da177e4SLinus Torvalds 13441da177e4SLinus Torvalds /* 13451da177e4SLinus Torvalds * Fetch data from kernel space and fill in checksum if needed. 13461da177e4SLinus Torvalds */ 13471da177e4SLinus Torvalds static int ip_reply_glue_bits(void *dptr, char *to, int offset, 13481da177e4SLinus Torvalds int len, int odd, struct sk_buff *skb) 13491da177e4SLinus Torvalds { 13505084205fSAl Viro __wsum csum; 13511da177e4SLinus Torvalds 13521da177e4SLinus Torvalds csum = csum_partial_copy_nocheck(dptr+offset, to, len, 0); 13531da177e4SLinus Torvalds skb->csum = csum_block_add(skb->csum, csum, odd); 13541da177e4SLinus Torvalds return 0; 13551da177e4SLinus Torvalds } 13561da177e4SLinus Torvalds 13571da177e4SLinus Torvalds /* 13581da177e4SLinus Torvalds * Generic function to send a packet as reply to another packet. 13591da177e4SLinus Torvalds * Used to send TCP resets so far. ICMP should use this function too. 13601da177e4SLinus Torvalds * 13611da177e4SLinus Torvalds * Should run single threaded per socket because it uses the sock 13621da177e4SLinus Torvalds * structure to pass arguments. 13631da177e4SLinus Torvalds */ 13641da177e4SLinus Torvalds void ip_send_reply(struct sock *sk, struct sk_buff *skb, struct ip_reply_arg *arg, 13651da177e4SLinus Torvalds unsigned int len) 13661da177e4SLinus Torvalds { 13671da177e4SLinus Torvalds struct inet_sock *inet = inet_sk(sk); 13681da177e4SLinus Torvalds struct { 13691da177e4SLinus Torvalds struct ip_options opt; 13701da177e4SLinus Torvalds char data[40]; 13711da177e4SLinus Torvalds } replyopts; 13721da177e4SLinus Torvalds struct ipcm_cookie ipc; 13733ca3c68eSAl Viro __be32 daddr; 1374511c3f92SEric Dumazet struct rtable *rt = skb_rtable(skb); 13751da177e4SLinus Torvalds 13761da177e4SLinus Torvalds if (ip_options_echo(&replyopts.opt, skb)) 13771da177e4SLinus Torvalds return; 13781da177e4SLinus Torvalds 13791da177e4SLinus Torvalds daddr = ipc.addr = rt->rt_src; 13801da177e4SLinus Torvalds ipc.opt = NULL; 138151f31cabSPatrick Ohly ipc.shtx.flags = 0; 13821da177e4SLinus Torvalds 13831da177e4SLinus Torvalds if (replyopts.opt.optlen) { 13841da177e4SLinus Torvalds ipc.opt = &replyopts.opt; 13851da177e4SLinus Torvalds 13861da177e4SLinus Torvalds if (ipc.opt->srr) 13871da177e4SLinus Torvalds daddr = replyopts.opt.faddr; 13881da177e4SLinus Torvalds } 13891da177e4SLinus Torvalds 13901da177e4SLinus Torvalds { 1391f0e48dbfSPatrick McHardy struct flowi fl = { .oif = arg->bound_dev_if, 1392f0e48dbfSPatrick McHardy .nl_u = { .ip4_u = 13931da177e4SLinus Torvalds { .daddr = daddr, 13941da177e4SLinus Torvalds .saddr = rt->rt_spec_dst, 1395eddc9ec5SArnaldo Carvalho de Melo .tos = RT_TOS(ip_hdr(skb)->tos) } }, 13961da177e4SLinus Torvalds /* Not quite clean, but right. */ 13971da177e4SLinus Torvalds .uli_u = { .ports = 1398aa8223c7SArnaldo Carvalho de Melo { .sport = tcp_hdr(skb)->dest, 1399aa8223c7SArnaldo Carvalho de Melo .dport = tcp_hdr(skb)->source } }, 140086b08d86SKOVACS Krisztian .proto = sk->sk_protocol, 140186b08d86SKOVACS Krisztian .flags = ip_reply_arg_flowi_flags(arg) }; 1402beb8d13bSVenkat Yekkirala security_skb_classify_flow(skb, &fl); 14033b1e0a65SYOSHIFUJI Hideaki if (ip_route_output_key(sock_net(sk), &rt, &fl)) 14041da177e4SLinus Torvalds return; 14051da177e4SLinus Torvalds } 14061da177e4SLinus Torvalds 14071da177e4SLinus Torvalds /* And let IP do all the hard work. 14081da177e4SLinus Torvalds 14091da177e4SLinus Torvalds This chunk is not reenterable, hence spinlock. 14101da177e4SLinus Torvalds Note that it uses the fact, that this function is called 14111da177e4SLinus Torvalds with locally disabled BH and that sk cannot be already spinlocked. 14121da177e4SLinus Torvalds */ 14131da177e4SLinus Torvalds bh_lock_sock(sk); 1414eddc9ec5SArnaldo Carvalho de Melo inet->tos = ip_hdr(skb)->tos; 14151da177e4SLinus Torvalds sk->sk_priority = skb->priority; 1416eddc9ec5SArnaldo Carvalho de Melo sk->sk_protocol = ip_hdr(skb)->protocol; 1417f0e48dbfSPatrick McHardy sk->sk_bound_dev_if = arg->bound_dev_if; 14181da177e4SLinus Torvalds ip_append_data(sk, ip_reply_glue_bits, arg->iov->iov_base, len, 0, 14192e77d89bSEric Dumazet &ipc, &rt, MSG_DONTWAIT); 14201da177e4SLinus Torvalds if ((skb = skb_peek(&sk->sk_write_queue)) != NULL) { 14211da177e4SLinus Torvalds if (arg->csumoffset >= 0) 14229c70220bSArnaldo Carvalho de Melo *((__sum16 *)skb_transport_header(skb) + 14239c70220bSArnaldo Carvalho de Melo arg->csumoffset) = csum_fold(csum_add(skb->csum, 14249c70220bSArnaldo Carvalho de Melo arg->csum)); 14251da177e4SLinus Torvalds skb->ip_summed = CHECKSUM_NONE; 14261da177e4SLinus Torvalds ip_push_pending_frames(sk); 14271da177e4SLinus Torvalds } 14281da177e4SLinus Torvalds 14291da177e4SLinus Torvalds bh_unlock_sock(sk); 14301da177e4SLinus Torvalds 14311da177e4SLinus Torvalds ip_rt_put(rt); 14321da177e4SLinus Torvalds } 14331da177e4SLinus Torvalds 14341da177e4SLinus Torvalds void __init ip_init(void) 14351da177e4SLinus Torvalds { 14361da177e4SLinus Torvalds ip_rt_init(); 14371da177e4SLinus Torvalds inet_initpeers(); 14381da177e4SLinus Torvalds 14391da177e4SLinus Torvalds #if defined(CONFIG_IP_MULTICAST) && defined(CONFIG_PROC_FS) 14401da177e4SLinus Torvalds igmp_mc_proc_init(); 14411da177e4SLinus Torvalds #endif 14421da177e4SLinus Torvalds } 14431da177e4SLinus Torvalds 14441da177e4SLinus Torvalds EXPORT_SYMBOL(ip_generic_getfrag); 14451da177e4SLinus Torvalds EXPORT_SYMBOL(ip_queue_xmit); 14461da177e4SLinus Torvalds EXPORT_SYMBOL(ip_send_check); 1447