blob: fe63d4efbd4dbae12672a8aa69f02e19b4d998ae [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * Routines having to do with the 'struct sk_buff' memory handlers.
3 *
4 * Authors: Alan Cox <iiitac@pyr.swan.ac.uk>
5 * Florian La Roche <rzsfl@rz.uni-sb.de>
6 *
7 * Version: $Id: skbuff.c,v 1.90 2001/11/07 05:56:19 davem Exp $
8 *
9 * Fixes:
10 * Alan Cox : Fixed the worst of the load
11 * balancer bugs.
12 * Dave Platt : Interrupt stacking fix.
13 * Richard Kooijman : Timestamp fixes.
14 * Alan Cox : Changed buffer format.
15 * Alan Cox : destructor hook for AF_UNIX etc.
16 * Linus Torvalds : Better skb_clone.
17 * Alan Cox : Added skb_copy.
18 * Alan Cox : Added all the changed routines Linus
19 * only put in the headers
20 * Ray VanTassle : Fixed --skb->lock in free
21 * Alan Cox : skb_copy copy arp field
22 * Andi Kleen : slabified it.
23 * Robert Olsson : Removed skb_head_pool
24 *
25 * NOTE:
26 * The __skb_ routines should be called with interrupts
27 * disabled, or you better be *real* sure that the operation is atomic
28 * with respect to whatever list is being frobbed (e.g. via lock_sock()
29 * or via disabling bottom half handlers, etc).
30 *
31 * This program is free software; you can redistribute it and/or
32 * modify it under the terms of the GNU General Public License
33 * as published by the Free Software Foundation; either version
34 * 2 of the License, or (at your option) any later version.
35 */
36
37/*
38 * The functions in this file will not compile correctly with gcc 2.4.x
39 */
40
41#include <linux/config.h>
42#include <linux/module.h>
43#include <linux/types.h>
44#include <linux/kernel.h>
45#include <linux/sched.h>
46#include <linux/mm.h>
47#include <linux/interrupt.h>
48#include <linux/in.h>
49#include <linux/inet.h>
50#include <linux/slab.h>
51#include <linux/netdevice.h>
52#ifdef CONFIG_NET_CLS_ACT
53#include <net/pkt_sched.h>
54#endif
55#include <linux/string.h>
56#include <linux/skbuff.h>
57#include <linux/cache.h>
58#include <linux/rtnetlink.h>
59#include <linux/init.h>
60#include <linux/highmem.h>
61
62#include <net/protocol.h>
63#include <net/dst.h>
64#include <net/sock.h>
65#include <net/checksum.h>
66#include <net/xfrm.h>
67
68#include <asm/uaccess.h>
69#include <asm/system.h>
70
Eric Dumazetba899662005-08-26 12:05:31 -070071static kmem_cache_t *skbuff_head_cache __read_mostly;
72static kmem_cache_t *skbuff_fclone_cache __read_mostly;
Linus Torvalds1da177e2005-04-16 15:20:36 -070073
74/*
75 * Keep out-of-line to prevent kernel bloat.
76 * __builtin_return_address is not used because it is not always
77 * reliable.
78 */
79
80/**
81 * skb_over_panic - private function
82 * @skb: buffer
83 * @sz: size
84 * @here: address
85 *
86 * Out of line support code for skb_put(). Not user callable.
87 */
88void skb_over_panic(struct sk_buff *skb, int sz, void *here)
89{
Patrick McHardy26095452005-04-21 16:43:02 -070090 printk(KERN_EMERG "skb_over_panic: text:%p len:%d put:%d head:%p "
91 "data:%p tail:%p end:%p dev:%s\n",
92 here, skb->len, sz, skb->head, skb->data, skb->tail, skb->end,
93 skb->dev ? skb->dev->name : "<NULL>");
Linus Torvalds1da177e2005-04-16 15:20:36 -070094 BUG();
95}
96
97/**
98 * skb_under_panic - private function
99 * @skb: buffer
100 * @sz: size
101 * @here: address
102 *
103 * Out of line support code for skb_push(). Not user callable.
104 */
105
106void skb_under_panic(struct sk_buff *skb, int sz, void *here)
107{
Patrick McHardy26095452005-04-21 16:43:02 -0700108 printk(KERN_EMERG "skb_under_panic: text:%p len:%d put:%d head:%p "
109 "data:%p tail:%p end:%p dev:%s\n",
110 here, skb->len, sz, skb->head, skb->data, skb->tail, skb->end,
111 skb->dev ? skb->dev->name : "<NULL>");
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112 BUG();
113}
114
David S. Millerdc6de332006-04-20 00:10:50 -0700115void skb_truesize_bug(struct sk_buff *skb)
116{
117 printk(KERN_ERR "SKB BUG: Invalid truesize (%u) "
118 "len=%u, sizeof(sk_buff)=%Zd\n",
119 skb->truesize, skb->len, sizeof(struct sk_buff));
120}
121EXPORT_SYMBOL(skb_truesize_bug);
122
Linus Torvalds1da177e2005-04-16 15:20:36 -0700123/* Allocate a new skbuff. We do this ourselves so we can fill in a few
124 * 'private' fields and also do memory statistics to find all the
125 * [BEEP] leaks.
126 *
127 */
128
129/**
David S. Millerd179cd12005-08-17 14:57:30 -0700130 * __alloc_skb - allocate a network buffer
Linus Torvalds1da177e2005-04-16 15:20:36 -0700131 * @size: size to allocate
132 * @gfp_mask: allocation mask
Randy Dunlapc83c2482005-10-18 22:07:41 -0700133 * @fclone: allocate from fclone cache instead of head cache
134 * and allocate a cloned (child) skb
Linus Torvalds1da177e2005-04-16 15:20:36 -0700135 *
136 * Allocate a new &sk_buff. The returned buffer has no headroom and a
137 * tail room of size bytes. The object has a reference count of one.
138 * The return is the buffer. On a failure the return is %NULL.
139 *
140 * Buffers may only be allocated from interrupts using a @gfp_mask of
141 * %GFP_ATOMIC.
142 */
Al Virodd0fc662005-10-07 07:46:04 +0100143struct sk_buff *__alloc_skb(unsigned int size, gfp_t gfp_mask,
David S. Millerd179cd12005-08-17 14:57:30 -0700144 int fclone)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700145{
Herbert Xu8798b3f2006-01-23 16:32:45 -0800146 kmem_cache_t *cache;
Benjamin LaHaise4947d3e2006-01-03 14:06:50 -0800147 struct skb_shared_info *shinfo;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700148 struct sk_buff *skb;
149 u8 *data;
150
Herbert Xu8798b3f2006-01-23 16:32:45 -0800151 cache = fclone ? skbuff_fclone_cache : skbuff_head_cache;
152
Linus Torvalds1da177e2005-04-16 15:20:36 -0700153 /* Get the HEAD */
Herbert Xu8798b3f2006-01-23 16:32:45 -0800154 skb = kmem_cache_alloc(cache, gfp_mask & ~__GFP_DMA);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700155 if (!skb)
156 goto out;
157
158 /* Get the DATA. Size must match skb_add_mtu(). */
159 size = SKB_DATA_ALIGN(size);
Al Viro871751e2006-03-25 03:06:39 -0800160 data = ____kmalloc(size + sizeof(struct skb_shared_info), gfp_mask);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700161 if (!data)
162 goto nodata;
163
164 memset(skb, 0, offsetof(struct sk_buff, truesize));
165 skb->truesize = size + sizeof(struct sk_buff);
166 atomic_set(&skb->users, 1);
167 skb->head = data;
168 skb->data = data;
169 skb->tail = data;
170 skb->end = data + size;
Benjamin LaHaise4947d3e2006-01-03 14:06:50 -0800171 /* make sure we initialize shinfo sequentially */
172 shinfo = skb_shinfo(skb);
173 atomic_set(&shinfo->dataref, 1);
174 shinfo->nr_frags = 0;
175 shinfo->tso_size = 0;
176 shinfo->tso_segs = 0;
177 shinfo->ufo_size = 0;
178 shinfo->ip6_frag_id = 0;
179 shinfo->frag_list = NULL;
180
David S. Millerd179cd12005-08-17 14:57:30 -0700181 if (fclone) {
182 struct sk_buff *child = skb + 1;
183 atomic_t *fclone_ref = (atomic_t *) (child + 1);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700184
David S. Millerd179cd12005-08-17 14:57:30 -0700185 skb->fclone = SKB_FCLONE_ORIG;
186 atomic_set(fclone_ref, 1);
187
188 child->fclone = SKB_FCLONE_UNAVAILABLE;
189 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700190out:
191 return skb;
192nodata:
Herbert Xu8798b3f2006-01-23 16:32:45 -0800193 kmem_cache_free(cache, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700194 skb = NULL;
195 goto out;
196}
197
198/**
199 * alloc_skb_from_cache - allocate a network buffer
200 * @cp: kmem_cache from which to allocate the data area
201 * (object size must be big enough for @size bytes + skb overheads)
202 * @size: size to allocate
203 * @gfp_mask: allocation mask
204 *
205 * Allocate a new &sk_buff. The returned buffer has no headroom and
206 * tail room of size bytes. The object has a reference count of one.
207 * The return is the buffer. On a failure the return is %NULL.
208 *
209 * Buffers may only be allocated from interrupts using a @gfp_mask of
210 * %GFP_ATOMIC.
211 */
212struct sk_buff *alloc_skb_from_cache(kmem_cache_t *cp,
Victor Fusco86a76ca2005-07-08 14:57:47 -0700213 unsigned int size,
Al Virodd0fc662005-10-07 07:46:04 +0100214 gfp_t gfp_mask)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700215{
216 struct sk_buff *skb;
217 u8 *data;
218
219 /* Get the HEAD */
220 skb = kmem_cache_alloc(skbuff_head_cache,
221 gfp_mask & ~__GFP_DMA);
222 if (!skb)
223 goto out;
224
225 /* Get the DATA. */
226 size = SKB_DATA_ALIGN(size);
227 data = kmem_cache_alloc(cp, gfp_mask);
228 if (!data)
229 goto nodata;
230
231 memset(skb, 0, offsetof(struct sk_buff, truesize));
232 skb->truesize = size + sizeof(struct sk_buff);
233 atomic_set(&skb->users, 1);
234 skb->head = data;
235 skb->data = data;
236 skb->tail = data;
237 skb->end = data + size;
238
239 atomic_set(&(skb_shinfo(skb)->dataref), 1);
240 skb_shinfo(skb)->nr_frags = 0;
241 skb_shinfo(skb)->tso_size = 0;
242 skb_shinfo(skb)->tso_segs = 0;
243 skb_shinfo(skb)->frag_list = NULL;
244out:
245 return skb;
246nodata:
247 kmem_cache_free(skbuff_head_cache, skb);
248 skb = NULL;
249 goto out;
250}
251
252
253static void skb_drop_fraglist(struct sk_buff *skb)
254{
255 struct sk_buff *list = skb_shinfo(skb)->frag_list;
256
257 skb_shinfo(skb)->frag_list = NULL;
258
259 do {
260 struct sk_buff *this = list;
261 list = list->next;
262 kfree_skb(this);
263 } while (list);
264}
265
266static void skb_clone_fraglist(struct sk_buff *skb)
267{
268 struct sk_buff *list;
269
270 for (list = skb_shinfo(skb)->frag_list; list; list = list->next)
271 skb_get(list);
272}
273
274void skb_release_data(struct sk_buff *skb)
275{
276 if (!skb->cloned ||
277 !atomic_sub_return(skb->nohdr ? (1 << SKB_DATAREF_SHIFT) + 1 : 1,
278 &skb_shinfo(skb)->dataref)) {
279 if (skb_shinfo(skb)->nr_frags) {
280 int i;
281 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++)
282 put_page(skb_shinfo(skb)->frags[i].page);
283 }
284
285 if (skb_shinfo(skb)->frag_list)
286 skb_drop_fraglist(skb);
287
288 kfree(skb->head);
289 }
290}
291
292/*
293 * Free an skbuff by memory without cleaning the state.
294 */
295void kfree_skbmem(struct sk_buff *skb)
296{
David S. Millerd179cd12005-08-17 14:57:30 -0700297 struct sk_buff *other;
298 atomic_t *fclone_ref;
299
Linus Torvalds1da177e2005-04-16 15:20:36 -0700300 skb_release_data(skb);
David S. Millerd179cd12005-08-17 14:57:30 -0700301 switch (skb->fclone) {
302 case SKB_FCLONE_UNAVAILABLE:
303 kmem_cache_free(skbuff_head_cache, skb);
304 break;
305
306 case SKB_FCLONE_ORIG:
307 fclone_ref = (atomic_t *) (skb + 2);
308 if (atomic_dec_and_test(fclone_ref))
309 kmem_cache_free(skbuff_fclone_cache, skb);
310 break;
311
312 case SKB_FCLONE_CLONE:
313 fclone_ref = (atomic_t *) (skb + 1);
314 other = skb - 1;
315
316 /* The clone portion is available for
317 * fast-cloning again.
318 */
319 skb->fclone = SKB_FCLONE_UNAVAILABLE;
320
321 if (atomic_dec_and_test(fclone_ref))
322 kmem_cache_free(skbuff_fclone_cache, other);
323 break;
324 };
Linus Torvalds1da177e2005-04-16 15:20:36 -0700325}
326
327/**
328 * __kfree_skb - private function
329 * @skb: buffer
330 *
331 * Free an sk_buff. Release anything attached to the buffer.
332 * Clean the state. This is an internal helper function. Users should
333 * always call kfree_skb
334 */
335
336void __kfree_skb(struct sk_buff *skb)
337{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700338 dst_release(skb->dst);
339#ifdef CONFIG_XFRM
340 secpath_put(skb->sp);
341#endif
Stephen Hemminger9c2b3322005-04-19 22:39:42 -0700342 if (skb->destructor) {
343 WARN_ON(in_irq());
Linus Torvalds1da177e2005-04-16 15:20:36 -0700344 skb->destructor(skb);
345 }
346#ifdef CONFIG_NETFILTER
347 nf_conntrack_put(skb->nfct);
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800348#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
349 nf_conntrack_put_reasm(skb->nfct_reasm);
350#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700351#ifdef CONFIG_BRIDGE_NETFILTER
352 nf_bridge_put(skb->nf_bridge);
353#endif
354#endif
355/* XXX: IS this still necessary? - JHS */
356#ifdef CONFIG_NET_SCHED
357 skb->tc_index = 0;
358#ifdef CONFIG_NET_CLS_ACT
359 skb->tc_verd = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700360#endif
361#endif
362
363 kfree_skbmem(skb);
364}
365
366/**
Jörn Engel231d06a2006-03-20 21:28:35 -0800367 * kfree_skb - free an sk_buff
368 * @skb: buffer to free
369 *
370 * Drop a reference to the buffer and free it if the usage count has
371 * hit zero.
372 */
373void kfree_skb(struct sk_buff *skb)
374{
375 if (unlikely(!skb))
376 return;
377 if (likely(atomic_read(&skb->users) == 1))
378 smp_rmb();
379 else if (likely(!atomic_dec_and_test(&skb->users)))
380 return;
381 __kfree_skb(skb);
382}
383
384/**
Linus Torvalds1da177e2005-04-16 15:20:36 -0700385 * skb_clone - duplicate an sk_buff
386 * @skb: buffer to clone
387 * @gfp_mask: allocation priority
388 *
389 * Duplicate an &sk_buff. The new one is not owned by a socket. Both
390 * copies share the same packet data but not structure. The new
391 * buffer has a reference count of 1. If the allocation fails the
392 * function returns %NULL otherwise the new buffer is returned.
393 *
394 * If this function is called from an interrupt gfp_mask() must be
395 * %GFP_ATOMIC.
396 */
397
Al Virodd0fc662005-10-07 07:46:04 +0100398struct sk_buff *skb_clone(struct sk_buff *skb, gfp_t gfp_mask)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700399{
David S. Millerd179cd12005-08-17 14:57:30 -0700400 struct sk_buff *n;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700401
David S. Millerd179cd12005-08-17 14:57:30 -0700402 n = skb + 1;
403 if (skb->fclone == SKB_FCLONE_ORIG &&
404 n->fclone == SKB_FCLONE_UNAVAILABLE) {
405 atomic_t *fclone_ref = (atomic_t *) (n + 1);
406 n->fclone = SKB_FCLONE_CLONE;
407 atomic_inc(fclone_ref);
408 } else {
409 n = kmem_cache_alloc(skbuff_head_cache, gfp_mask);
410 if (!n)
411 return NULL;
412 n->fclone = SKB_FCLONE_UNAVAILABLE;
413 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700414
415#define C(x) n->x = skb->x
416
417 n->next = n->prev = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700418 n->sk = NULL;
Patrick McHardya61bbcf2005-08-14 17:24:31 -0700419 C(tstamp);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700420 C(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700421 C(h);
422 C(nh);
423 C(mac);
424 C(dst);
425 dst_clone(skb->dst);
426 C(sp);
427#ifdef CONFIG_INET
428 secpath_get(skb->sp);
429#endif
430 memcpy(n->cb, skb->cb, sizeof(skb->cb));
431 C(len);
432 C(data_len);
433 C(csum);
434 C(local_df);
435 n->cloned = 1;
436 n->nohdr = 0;
437 C(pkt_type);
438 C(ip_summed);
439 C(priority);
YOSHIFUJI Hideakia8372f02006-02-19 22:32:06 -0800440#if defined(CONFIG_IP_VS) || defined(CONFIG_IP_VS_MODULE)
441 C(ipvs_property);
442#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700443 C(protocol);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700444 n->destructor = NULL;
445#ifdef CONFIG_NETFILTER
446 C(nfmark);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700447 C(nfct);
448 nf_conntrack_get(skb->nfct);
449 C(nfctinfo);
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800450#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
451 C(nfct_reasm);
452 nf_conntrack_get_reasm(skb->nfct_reasm);
453#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700454#ifdef CONFIG_BRIDGE_NETFILTER
455 C(nf_bridge);
456 nf_bridge_get(skb->nf_bridge);
457#endif
458#endif /*CONFIG_NETFILTER*/
Linus Torvalds1da177e2005-04-16 15:20:36 -0700459#ifdef CONFIG_NET_SCHED
460 C(tc_index);
461#ifdef CONFIG_NET_CLS_ACT
462 n->tc_verd = SET_TC_VERD(skb->tc_verd,0);
David S. Millerb72f6ec2005-07-19 14:13:54 -0700463 n->tc_verd = CLR_TC_OK2MUNGE(n->tc_verd);
464 n->tc_verd = CLR_TC_MUNGED(n->tc_verd);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700465 C(input_dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700466#endif
James Morris984bc162006-06-09 00:29:17 -0700467 skb_copy_secmark(n, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700468#endif
469 C(truesize);
470 atomic_set(&n->users, 1);
471 C(head);
472 C(data);
473 C(tail);
474 C(end);
475
476 atomic_inc(&(skb_shinfo(skb)->dataref));
477 skb->cloned = 1;
478
479 return n;
480}
481
482static void copy_skb_header(struct sk_buff *new, const struct sk_buff *old)
483{
484 /*
485 * Shift between the two data areas in bytes
486 */
487 unsigned long offset = new->data - old->data;
488
Linus Torvalds1da177e2005-04-16 15:20:36 -0700489 new->sk = NULL;
490 new->dev = old->dev;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700491 new->priority = old->priority;
492 new->protocol = old->protocol;
493 new->dst = dst_clone(old->dst);
494#ifdef CONFIG_INET
495 new->sp = secpath_get(old->sp);
496#endif
497 new->h.raw = old->h.raw + offset;
498 new->nh.raw = old->nh.raw + offset;
499 new->mac.raw = old->mac.raw + offset;
500 memcpy(new->cb, old->cb, sizeof(old->cb));
501 new->local_df = old->local_df;
David S. Millerd179cd12005-08-17 14:57:30 -0700502 new->fclone = SKB_FCLONE_UNAVAILABLE;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700503 new->pkt_type = old->pkt_type;
Patrick McHardya61bbcf2005-08-14 17:24:31 -0700504 new->tstamp = old->tstamp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700505 new->destructor = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700506#ifdef CONFIG_NETFILTER
507 new->nfmark = old->nfmark;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700508 new->nfct = old->nfct;
509 nf_conntrack_get(old->nfct);
510 new->nfctinfo = old->nfctinfo;
Yasuyuki Kozakai9fb9cbb2005-11-09 16:38:16 -0800511#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
512 new->nfct_reasm = old->nfct_reasm;
513 nf_conntrack_get_reasm(old->nfct_reasm);
514#endif
Julian Anastasovc98d80e2005-10-22 13:39:21 +0300515#if defined(CONFIG_IP_VS) || defined(CONFIG_IP_VS_MODULE)
516 new->ipvs_property = old->ipvs_property;
517#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -0700518#ifdef CONFIG_BRIDGE_NETFILTER
519 new->nf_bridge = old->nf_bridge;
520 nf_bridge_get(old->nf_bridge);
521#endif
522#endif
523#ifdef CONFIG_NET_SCHED
524#ifdef CONFIG_NET_CLS_ACT
525 new->tc_verd = old->tc_verd;
526#endif
527 new->tc_index = old->tc_index;
528#endif
James Morris984bc162006-06-09 00:29:17 -0700529 skb_copy_secmark(new, old);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700530 atomic_set(&new->users, 1);
531 skb_shinfo(new)->tso_size = skb_shinfo(old)->tso_size;
532 skb_shinfo(new)->tso_segs = skb_shinfo(old)->tso_segs;
533}
534
535/**
536 * skb_copy - create private copy of an sk_buff
537 * @skb: buffer to copy
538 * @gfp_mask: allocation priority
539 *
540 * Make a copy of both an &sk_buff and its data. This is used when the
541 * caller wishes to modify the data and needs a private copy of the
542 * data to alter. Returns %NULL on failure or the pointer to the buffer
543 * on success. The returned buffer has a reference count of 1.
544 *
545 * As by-product this function converts non-linear &sk_buff to linear
546 * one, so that &sk_buff becomes completely private and caller is allowed
547 * to modify all the data of returned buffer. This means that this
548 * function is not recommended for use in circumstances when only
549 * header is going to be modified. Use pskb_copy() instead.
550 */
551
Al Virodd0fc662005-10-07 07:46:04 +0100552struct sk_buff *skb_copy(const struct sk_buff *skb, gfp_t gfp_mask)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700553{
554 int headerlen = skb->data - skb->head;
555 /*
556 * Allocate the copy buffer
557 */
558 struct sk_buff *n = alloc_skb(skb->end - skb->head + skb->data_len,
559 gfp_mask);
560 if (!n)
561 return NULL;
562
563 /* Set the data pointer */
564 skb_reserve(n, headerlen);
565 /* Set the tail pointer and length */
566 skb_put(n, skb->len);
567 n->csum = skb->csum;
568 n->ip_summed = skb->ip_summed;
569
570 if (skb_copy_bits(skb, -headerlen, n->head, headerlen + skb->len))
571 BUG();
572
573 copy_skb_header(n, skb);
574 return n;
575}
576
577
578/**
579 * pskb_copy - create copy of an sk_buff with private head.
580 * @skb: buffer to copy
581 * @gfp_mask: allocation priority
582 *
583 * Make a copy of both an &sk_buff and part of its data, located
584 * in header. Fragmented data remain shared. This is used when
585 * the caller wishes to modify only header of &sk_buff and needs
586 * private copy of the header to alter. Returns %NULL on failure
587 * or the pointer to the buffer on success.
588 * The returned buffer has a reference count of 1.
589 */
590
Al Virodd0fc662005-10-07 07:46:04 +0100591struct sk_buff *pskb_copy(struct sk_buff *skb, gfp_t gfp_mask)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700592{
593 /*
594 * Allocate the copy buffer
595 */
596 struct sk_buff *n = alloc_skb(skb->end - skb->head, gfp_mask);
597
598 if (!n)
599 goto out;
600
601 /* Set the data pointer */
602 skb_reserve(n, skb->data - skb->head);
603 /* Set the tail pointer and length */
604 skb_put(n, skb_headlen(skb));
605 /* Copy the bytes */
606 memcpy(n->data, skb->data, n->len);
607 n->csum = skb->csum;
608 n->ip_summed = skb->ip_summed;
609
610 n->data_len = skb->data_len;
611 n->len = skb->len;
612
613 if (skb_shinfo(skb)->nr_frags) {
614 int i;
615
616 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
617 skb_shinfo(n)->frags[i] = skb_shinfo(skb)->frags[i];
618 get_page(skb_shinfo(n)->frags[i].page);
619 }
620 skb_shinfo(n)->nr_frags = i;
621 }
622
623 if (skb_shinfo(skb)->frag_list) {
624 skb_shinfo(n)->frag_list = skb_shinfo(skb)->frag_list;
625 skb_clone_fraglist(n);
626 }
627
628 copy_skb_header(n, skb);
629out:
630 return n;
631}
632
633/**
634 * pskb_expand_head - reallocate header of &sk_buff
635 * @skb: buffer to reallocate
636 * @nhead: room to add at head
637 * @ntail: room to add at tail
638 * @gfp_mask: allocation priority
639 *
640 * Expands (or creates identical copy, if &nhead and &ntail are zero)
641 * header of skb. &sk_buff itself is not changed. &sk_buff MUST have
642 * reference count of 1. Returns zero in the case of success or error,
643 * if expansion failed. In the last case, &sk_buff is not changed.
644 *
645 * All the pointers pointing into skb header may change and must be
646 * reloaded after call to this function.
647 */
648
Victor Fusco86a76ca2005-07-08 14:57:47 -0700649int pskb_expand_head(struct sk_buff *skb, int nhead, int ntail,
Al Virodd0fc662005-10-07 07:46:04 +0100650 gfp_t gfp_mask)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700651{
652 int i;
653 u8 *data;
654 int size = nhead + (skb->end - skb->head) + ntail;
655 long off;
656
657 if (skb_shared(skb))
658 BUG();
659
660 size = SKB_DATA_ALIGN(size);
661
662 data = kmalloc(size + sizeof(struct skb_shared_info), gfp_mask);
663 if (!data)
664 goto nodata;
665
666 /* Copy only real data... and, alas, header. This should be
667 * optimized for the cases when header is void. */
668 memcpy(data + nhead, skb->head, skb->tail - skb->head);
669 memcpy(data + size, skb->end, sizeof(struct skb_shared_info));
670
671 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++)
672 get_page(skb_shinfo(skb)->frags[i].page);
673
674 if (skb_shinfo(skb)->frag_list)
675 skb_clone_fraglist(skb);
676
677 skb_release_data(skb);
678
679 off = (data + nhead) - skb->head;
680
681 skb->head = data;
682 skb->end = data + size;
683 skb->data += off;
684 skb->tail += off;
685 skb->mac.raw += off;
686 skb->h.raw += off;
687 skb->nh.raw += off;
688 skb->cloned = 0;
689 skb->nohdr = 0;
690 atomic_set(&skb_shinfo(skb)->dataref, 1);
691 return 0;
692
693nodata:
694 return -ENOMEM;
695}
696
697/* Make private copy of skb with writable head and some headroom */
698
699struct sk_buff *skb_realloc_headroom(struct sk_buff *skb, unsigned int headroom)
700{
701 struct sk_buff *skb2;
702 int delta = headroom - skb_headroom(skb);
703
704 if (delta <= 0)
705 skb2 = pskb_copy(skb, GFP_ATOMIC);
706 else {
707 skb2 = skb_clone(skb, GFP_ATOMIC);
708 if (skb2 && pskb_expand_head(skb2, SKB_DATA_ALIGN(delta), 0,
709 GFP_ATOMIC)) {
710 kfree_skb(skb2);
711 skb2 = NULL;
712 }
713 }
714 return skb2;
715}
716
717
718/**
719 * skb_copy_expand - copy and expand sk_buff
720 * @skb: buffer to copy
721 * @newheadroom: new free bytes at head
722 * @newtailroom: new free bytes at tail
723 * @gfp_mask: allocation priority
724 *
725 * Make a copy of both an &sk_buff and its data and while doing so
726 * allocate additional space.
727 *
728 * This is used when the caller wishes to modify the data and needs a
729 * private copy of the data to alter as well as more space for new fields.
730 * Returns %NULL on failure or the pointer to the buffer
731 * on success. The returned buffer has a reference count of 1.
732 *
733 * You must pass %GFP_ATOMIC as the allocation priority if this function
734 * is called from an interrupt.
735 *
736 * BUG ALERT: ip_summed is not copied. Why does this work? Is it used
737 * only by netfilter in the cases when checksum is recalculated? --ANK
738 */
739struct sk_buff *skb_copy_expand(const struct sk_buff *skb,
Victor Fusco86a76ca2005-07-08 14:57:47 -0700740 int newheadroom, int newtailroom,
Al Virodd0fc662005-10-07 07:46:04 +0100741 gfp_t gfp_mask)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700742{
743 /*
744 * Allocate the copy buffer
745 */
746 struct sk_buff *n = alloc_skb(newheadroom + skb->len + newtailroom,
747 gfp_mask);
748 int head_copy_len, head_copy_off;
749
750 if (!n)
751 return NULL;
752
753 skb_reserve(n, newheadroom);
754
755 /* Set the tail pointer and length */
756 skb_put(n, skb->len);
757
758 head_copy_len = skb_headroom(skb);
759 head_copy_off = 0;
760 if (newheadroom <= head_copy_len)
761 head_copy_len = newheadroom;
762 else
763 head_copy_off = newheadroom - head_copy_len;
764
765 /* Copy the linear header and data. */
766 if (skb_copy_bits(skb, -head_copy_len, n->head + head_copy_off,
767 skb->len + head_copy_len))
768 BUG();
769
770 copy_skb_header(n, skb);
771
772 return n;
773}
774
775/**
776 * skb_pad - zero pad the tail of an skb
777 * @skb: buffer to pad
778 * @pad: space to pad
779 *
780 * Ensure that a buffer is followed by a padding area that is zero
781 * filled. Used by network drivers which may DMA or transfer data
782 * beyond the buffer end onto the wire.
783 *
Herbert Xu5b057c62006-06-23 02:06:41 -0700784 * May return error in out of memory cases. The skb is freed on error.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700785 */
786
Herbert Xu5b057c62006-06-23 02:06:41 -0700787int skb_pad(struct sk_buff *skb, int pad)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700788{
Herbert Xu5b057c62006-06-23 02:06:41 -0700789 int err;
790 int ntail;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700791
792 /* If the skbuff is non linear tailroom is always zero.. */
Herbert Xu5b057c62006-06-23 02:06:41 -0700793 if (!skb_cloned(skb) && skb_tailroom(skb) >= pad) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700794 memset(skb->data+skb->len, 0, pad);
Herbert Xu5b057c62006-06-23 02:06:41 -0700795 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700796 }
Herbert Xu5b057c62006-06-23 02:06:41 -0700797
798 ntail = skb->data_len + pad - (skb->end - skb->tail);
799 if (likely(skb_cloned(skb) || ntail > 0)) {
800 err = pskb_expand_head(skb, 0, ntail, GFP_ATOMIC);
801 if (unlikely(err))
802 goto free_skb;
803 }
804
805 /* FIXME: The use of this function with non-linear skb's really needs
806 * to be audited.
807 */
808 err = skb_linearize(skb);
809 if (unlikely(err))
810 goto free_skb;
811
812 memset(skb->data + skb->len, 0, pad);
813 return 0;
814
815free_skb:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700816 kfree_skb(skb);
Herbert Xu5b057c62006-06-23 02:06:41 -0700817 return err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700818}
819
Herbert Xu3cc0e872006-06-09 16:13:38 -0700820/* Trims skb to length len. It can change skb pointers.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700821 */
822
Herbert Xu3cc0e872006-06-09 16:13:38 -0700823int ___pskb_trim(struct sk_buff *skb, unsigned int len)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700824{
825 int offset = skb_headlen(skb);
826 int nfrags = skb_shinfo(skb)->nr_frags;
827 int i;
828
829 for (i = 0; i < nfrags; i++) {
830 int end = offset + skb_shinfo(skb)->frags[i].size;
831 if (end > len) {
832 if (skb_cloned(skb)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700833 if (pskb_expand_head(skb, 0, 0, GFP_ATOMIC))
834 return -ENOMEM;
835 }
836 if (len <= offset) {
837 put_page(skb_shinfo(skb)->frags[i].page);
838 skb_shinfo(skb)->nr_frags--;
839 } else {
840 skb_shinfo(skb)->frags[i].size = len - offset;
841 }
842 }
843 offset = end;
844 }
845
846 if (offset < len) {
847 skb->data_len -= skb->len - len;
848 skb->len = len;
849 } else {
850 if (len <= skb_headlen(skb)) {
851 skb->len = len;
852 skb->data_len = 0;
853 skb->tail = skb->data + len;
854 if (skb_shinfo(skb)->frag_list && !skb_cloned(skb))
855 skb_drop_fraglist(skb);
856 } else {
857 skb->data_len -= skb->len - len;
858 skb->len = len;
859 }
860 }
861
862 return 0;
863}
864
865/**
866 * __pskb_pull_tail - advance tail of skb header
867 * @skb: buffer to reallocate
868 * @delta: number of bytes to advance tail
869 *
870 * The function makes a sense only on a fragmented &sk_buff,
871 * it expands header moving its tail forward and copying necessary
872 * data from fragmented part.
873 *
874 * &sk_buff MUST have reference count of 1.
875 *
876 * Returns %NULL (and &sk_buff does not change) if pull failed
877 * or value of new tail of skb in the case of success.
878 *
879 * All the pointers pointing into skb header may change and must be
880 * reloaded after call to this function.
881 */
882
883/* Moves tail of skb head forward, copying data from fragmented part,
884 * when it is necessary.
885 * 1. It may fail due to malloc failure.
886 * 2. It may change skb pointers.
887 *
888 * It is pretty complicated. Luckily, it is called only in exceptional cases.
889 */
890unsigned char *__pskb_pull_tail(struct sk_buff *skb, int delta)
891{
892 /* If skb has not enough free space at tail, get new one
893 * plus 128 bytes for future expansions. If we have enough
894 * room at tail, reallocate without expansion only if skb is cloned.
895 */
896 int i, k, eat = (skb->tail + delta) - skb->end;
897
898 if (eat > 0 || skb_cloned(skb)) {
899 if (pskb_expand_head(skb, 0, eat > 0 ? eat + 128 : 0,
900 GFP_ATOMIC))
901 return NULL;
902 }
903
904 if (skb_copy_bits(skb, skb_headlen(skb), skb->tail, delta))
905 BUG();
906
907 /* Optimization: no fragments, no reasons to preestimate
908 * size of pulled pages. Superb.
909 */
910 if (!skb_shinfo(skb)->frag_list)
911 goto pull_pages;
912
913 /* Estimate size of pulled pages. */
914 eat = delta;
915 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
916 if (skb_shinfo(skb)->frags[i].size >= eat)
917 goto pull_pages;
918 eat -= skb_shinfo(skb)->frags[i].size;
919 }
920
921 /* If we need update frag list, we are in troubles.
922 * Certainly, it possible to add an offset to skb data,
923 * but taking into account that pulling is expected to
924 * be very rare operation, it is worth to fight against
925 * further bloating skb head and crucify ourselves here instead.
926 * Pure masohism, indeed. 8)8)
927 */
928 if (eat) {
929 struct sk_buff *list = skb_shinfo(skb)->frag_list;
930 struct sk_buff *clone = NULL;
931 struct sk_buff *insp = NULL;
932
933 do {
Kris Katterjohn09a62662006-01-08 22:24:28 -0800934 BUG_ON(!list);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700935
936 if (list->len <= eat) {
937 /* Eaten as whole. */
938 eat -= list->len;
939 list = list->next;
940 insp = list;
941 } else {
942 /* Eaten partially. */
943
944 if (skb_shared(list)) {
945 /* Sucks! We need to fork list. :-( */
946 clone = skb_clone(list, GFP_ATOMIC);
947 if (!clone)
948 return NULL;
949 insp = list->next;
950 list = clone;
951 } else {
952 /* This may be pulled without
953 * problems. */
954 insp = list;
955 }
956 if (!pskb_pull(list, eat)) {
957 if (clone)
958 kfree_skb(clone);
959 return NULL;
960 }
961 break;
962 }
963 } while (eat);
964
965 /* Free pulled out fragments. */
966 while ((list = skb_shinfo(skb)->frag_list) != insp) {
967 skb_shinfo(skb)->frag_list = list->next;
968 kfree_skb(list);
969 }
970 /* And insert new clone at head. */
971 if (clone) {
972 clone->next = list;
973 skb_shinfo(skb)->frag_list = clone;
974 }
975 }
976 /* Success! Now we may commit changes to skb data. */
977
978pull_pages:
979 eat = delta;
980 k = 0;
981 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
982 if (skb_shinfo(skb)->frags[i].size <= eat) {
983 put_page(skb_shinfo(skb)->frags[i].page);
984 eat -= skb_shinfo(skb)->frags[i].size;
985 } else {
986 skb_shinfo(skb)->frags[k] = skb_shinfo(skb)->frags[i];
987 if (eat) {
988 skb_shinfo(skb)->frags[k].page_offset += eat;
989 skb_shinfo(skb)->frags[k].size -= eat;
990 eat = 0;
991 }
992 k++;
993 }
994 }
995 skb_shinfo(skb)->nr_frags = k;
996
997 skb->tail += delta;
998 skb->data_len -= delta;
999
1000 return skb->tail;
1001}
1002
1003/* Copy some data bits from skb to kernel buffer. */
1004
1005int skb_copy_bits(const struct sk_buff *skb, int offset, void *to, int len)
1006{
1007 int i, copy;
1008 int start = skb_headlen(skb);
1009
1010 if (offset > (int)skb->len - len)
1011 goto fault;
1012
1013 /* Copy header. */
1014 if ((copy = start - offset) > 0) {
1015 if (copy > len)
1016 copy = len;
1017 memcpy(to, skb->data + offset, copy);
1018 if ((len -= copy) == 0)
1019 return 0;
1020 offset += copy;
1021 to += copy;
1022 }
1023
1024 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
1025 int end;
1026
1027 BUG_TRAP(start <= offset + len);
1028
1029 end = start + skb_shinfo(skb)->frags[i].size;
1030 if ((copy = end - offset) > 0) {
1031 u8 *vaddr;
1032
1033 if (copy > len)
1034 copy = len;
1035
1036 vaddr = kmap_skb_frag(&skb_shinfo(skb)->frags[i]);
1037 memcpy(to,
1038 vaddr + skb_shinfo(skb)->frags[i].page_offset+
1039 offset - start, copy);
1040 kunmap_skb_frag(vaddr);
1041
1042 if ((len -= copy) == 0)
1043 return 0;
1044 offset += copy;
1045 to += copy;
1046 }
1047 start = end;
1048 }
1049
1050 if (skb_shinfo(skb)->frag_list) {
1051 struct sk_buff *list = skb_shinfo(skb)->frag_list;
1052
1053 for (; list; list = list->next) {
1054 int end;
1055
1056 BUG_TRAP(start <= offset + len);
1057
1058 end = start + list->len;
1059 if ((copy = end - offset) > 0) {
1060 if (copy > len)
1061 copy = len;
1062 if (skb_copy_bits(list, offset - start,
1063 to, copy))
1064 goto fault;
1065 if ((len -= copy) == 0)
1066 return 0;
1067 offset += copy;
1068 to += copy;
1069 }
1070 start = end;
1071 }
1072 }
1073 if (!len)
1074 return 0;
1075
1076fault:
1077 return -EFAULT;
1078}
1079
Herbert Xu357b40a2005-04-19 22:30:14 -07001080/**
1081 * skb_store_bits - store bits from kernel buffer to skb
1082 * @skb: destination buffer
1083 * @offset: offset in destination
1084 * @from: source buffer
1085 * @len: number of bytes to copy
1086 *
1087 * Copy the specified number of bytes from the source buffer to the
1088 * destination skb. This function handles all the messy bits of
1089 * traversing fragment lists and such.
1090 */
1091
1092int skb_store_bits(const struct sk_buff *skb, int offset, void *from, int len)
1093{
1094 int i, copy;
1095 int start = skb_headlen(skb);
1096
1097 if (offset > (int)skb->len - len)
1098 goto fault;
1099
1100 if ((copy = start - offset) > 0) {
1101 if (copy > len)
1102 copy = len;
1103 memcpy(skb->data + offset, from, copy);
1104 if ((len -= copy) == 0)
1105 return 0;
1106 offset += copy;
1107 from += copy;
1108 }
1109
1110 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
1111 skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
1112 int end;
1113
1114 BUG_TRAP(start <= offset + len);
1115
1116 end = start + frag->size;
1117 if ((copy = end - offset) > 0) {
1118 u8 *vaddr;
1119
1120 if (copy > len)
1121 copy = len;
1122
1123 vaddr = kmap_skb_frag(frag);
1124 memcpy(vaddr + frag->page_offset + offset - start,
1125 from, copy);
1126 kunmap_skb_frag(vaddr);
1127
1128 if ((len -= copy) == 0)
1129 return 0;
1130 offset += copy;
1131 from += copy;
1132 }
1133 start = end;
1134 }
1135
1136 if (skb_shinfo(skb)->frag_list) {
1137 struct sk_buff *list = skb_shinfo(skb)->frag_list;
1138
1139 for (; list; list = list->next) {
1140 int end;
1141
1142 BUG_TRAP(start <= offset + len);
1143
1144 end = start + list->len;
1145 if ((copy = end - offset) > 0) {
1146 if (copy > len)
1147 copy = len;
1148 if (skb_store_bits(list, offset - start,
1149 from, copy))
1150 goto fault;
1151 if ((len -= copy) == 0)
1152 return 0;
1153 offset += copy;
1154 from += copy;
1155 }
1156 start = end;
1157 }
1158 }
1159 if (!len)
1160 return 0;
1161
1162fault:
1163 return -EFAULT;
1164}
1165
1166EXPORT_SYMBOL(skb_store_bits);
1167
Linus Torvalds1da177e2005-04-16 15:20:36 -07001168/* Checksum skb data. */
1169
1170unsigned int skb_checksum(const struct sk_buff *skb, int offset,
1171 int len, unsigned int csum)
1172{
1173 int start = skb_headlen(skb);
1174 int i, copy = start - offset;
1175 int pos = 0;
1176
1177 /* Checksum header. */
1178 if (copy > 0) {
1179 if (copy > len)
1180 copy = len;
1181 csum = csum_partial(skb->data + offset, copy, csum);
1182 if ((len -= copy) == 0)
1183 return csum;
1184 offset += copy;
1185 pos = copy;
1186 }
1187
1188 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
1189 int end;
1190
1191 BUG_TRAP(start <= offset + len);
1192
1193 end = start + skb_shinfo(skb)->frags[i].size;
1194 if ((copy = end - offset) > 0) {
1195 unsigned int csum2;
1196 u8 *vaddr;
1197 skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
1198
1199 if (copy > len)
1200 copy = len;
1201 vaddr = kmap_skb_frag(frag);
1202 csum2 = csum_partial(vaddr + frag->page_offset +
1203 offset - start, copy, 0);
1204 kunmap_skb_frag(vaddr);
1205 csum = csum_block_add(csum, csum2, pos);
1206 if (!(len -= copy))
1207 return csum;
1208 offset += copy;
1209 pos += copy;
1210 }
1211 start = end;
1212 }
1213
1214 if (skb_shinfo(skb)->frag_list) {
1215 struct sk_buff *list = skb_shinfo(skb)->frag_list;
1216
1217 for (; list; list = list->next) {
1218 int end;
1219
1220 BUG_TRAP(start <= offset + len);
1221
1222 end = start + list->len;
1223 if ((copy = end - offset) > 0) {
1224 unsigned int csum2;
1225 if (copy > len)
1226 copy = len;
1227 csum2 = skb_checksum(list, offset - start,
1228 copy, 0);
1229 csum = csum_block_add(csum, csum2, pos);
1230 if ((len -= copy) == 0)
1231 return csum;
1232 offset += copy;
1233 pos += copy;
1234 }
1235 start = end;
1236 }
1237 }
Kris Katterjohn09a62662006-01-08 22:24:28 -08001238 BUG_ON(len);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001239
1240 return csum;
1241}
1242
1243/* Both of above in one bottle. */
1244
1245unsigned int skb_copy_and_csum_bits(const struct sk_buff *skb, int offset,
1246 u8 *to, int len, unsigned int csum)
1247{
1248 int start = skb_headlen(skb);
1249 int i, copy = start - offset;
1250 int pos = 0;
1251
1252 /* Copy header. */
1253 if (copy > 0) {
1254 if (copy > len)
1255 copy = len;
1256 csum = csum_partial_copy_nocheck(skb->data + offset, to,
1257 copy, csum);
1258 if ((len -= copy) == 0)
1259 return csum;
1260 offset += copy;
1261 to += copy;
1262 pos = copy;
1263 }
1264
1265 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++) {
1266 int end;
1267
1268 BUG_TRAP(start <= offset + len);
1269
1270 end = start + skb_shinfo(skb)->frags[i].size;
1271 if ((copy = end - offset) > 0) {
1272 unsigned int csum2;
1273 u8 *vaddr;
1274 skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
1275
1276 if (copy > len)
1277 copy = len;
1278 vaddr = kmap_skb_frag(frag);
1279 csum2 = csum_partial_copy_nocheck(vaddr +
1280 frag->page_offset +
1281 offset - start, to,
1282 copy, 0);
1283 kunmap_skb_frag(vaddr);
1284 csum = csum_block_add(csum, csum2, pos);
1285 if (!(len -= copy))
1286 return csum;
1287 offset += copy;
1288 to += copy;
1289 pos += copy;
1290 }
1291 start = end;
1292 }
1293
1294 if (skb_shinfo(skb)->frag_list) {
1295 struct sk_buff *list = skb_shinfo(skb)->frag_list;
1296
1297 for (; list; list = list->next) {
1298 unsigned int csum2;
1299 int end;
1300
1301 BUG_TRAP(start <= offset + len);
1302
1303 end = start + list->len;
1304 if ((copy = end - offset) > 0) {
1305 if (copy > len)
1306 copy = len;
1307 csum2 = skb_copy_and_csum_bits(list,
1308 offset - start,
1309 to, copy, 0);
1310 csum = csum_block_add(csum, csum2, pos);
1311 if ((len -= copy) == 0)
1312 return csum;
1313 offset += copy;
1314 to += copy;
1315 pos += copy;
1316 }
1317 start = end;
1318 }
1319 }
Kris Katterjohn09a62662006-01-08 22:24:28 -08001320 BUG_ON(len);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001321 return csum;
1322}
1323
1324void skb_copy_and_csum_dev(const struct sk_buff *skb, u8 *to)
1325{
1326 unsigned int csum;
1327 long csstart;
1328
1329 if (skb->ip_summed == CHECKSUM_HW)
1330 csstart = skb->h.raw - skb->data;
1331 else
1332 csstart = skb_headlen(skb);
1333
Kris Katterjohn09a62662006-01-08 22:24:28 -08001334 BUG_ON(csstart > skb_headlen(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001335
1336 memcpy(to, skb->data, csstart);
1337
1338 csum = 0;
1339 if (csstart != skb->len)
1340 csum = skb_copy_and_csum_bits(skb, csstart, to + csstart,
1341 skb->len - csstart, 0);
1342
1343 if (skb->ip_summed == CHECKSUM_HW) {
1344 long csstuff = csstart + skb->csum;
1345
1346 *((unsigned short *)(to + csstuff)) = csum_fold(csum);
1347 }
1348}
1349
1350/**
1351 * skb_dequeue - remove from the head of the queue
1352 * @list: list to dequeue from
1353 *
1354 * Remove the head of the list. The list lock is taken so the function
1355 * may be used safely with other locking list functions. The head item is
1356 * returned or %NULL if the list is empty.
1357 */
1358
1359struct sk_buff *skb_dequeue(struct sk_buff_head *list)
1360{
1361 unsigned long flags;
1362 struct sk_buff *result;
1363
1364 spin_lock_irqsave(&list->lock, flags);
1365 result = __skb_dequeue(list);
1366 spin_unlock_irqrestore(&list->lock, flags);
1367 return result;
1368}
1369
1370/**
1371 * skb_dequeue_tail - remove from the tail of the queue
1372 * @list: list to dequeue from
1373 *
1374 * Remove the tail of the list. The list lock is taken so the function
1375 * may be used safely with other locking list functions. The tail item is
1376 * returned or %NULL if the list is empty.
1377 */
1378struct sk_buff *skb_dequeue_tail(struct sk_buff_head *list)
1379{
1380 unsigned long flags;
1381 struct sk_buff *result;
1382
1383 spin_lock_irqsave(&list->lock, flags);
1384 result = __skb_dequeue_tail(list);
1385 spin_unlock_irqrestore(&list->lock, flags);
1386 return result;
1387}
1388
1389/**
1390 * skb_queue_purge - empty a list
1391 * @list: list to empty
1392 *
1393 * Delete all buffers on an &sk_buff list. Each buffer is removed from
1394 * the list and one reference dropped. This function takes the list
1395 * lock and is atomic with respect to other list locking functions.
1396 */
1397void skb_queue_purge(struct sk_buff_head *list)
1398{
1399 struct sk_buff *skb;
1400 while ((skb = skb_dequeue(list)) != NULL)
1401 kfree_skb(skb);
1402}
1403
1404/**
1405 * skb_queue_head - queue a buffer at the list head
1406 * @list: list to use
1407 * @newsk: buffer to queue
1408 *
1409 * Queue a buffer at the start of the list. This function takes the
1410 * list lock and can be used safely with other locking &sk_buff functions
1411 * safely.
1412 *
1413 * A buffer cannot be placed on two lists at the same time.
1414 */
1415void skb_queue_head(struct sk_buff_head *list, struct sk_buff *newsk)
1416{
1417 unsigned long flags;
1418
1419 spin_lock_irqsave(&list->lock, flags);
1420 __skb_queue_head(list, newsk);
1421 spin_unlock_irqrestore(&list->lock, flags);
1422}
1423
1424/**
1425 * skb_queue_tail - queue a buffer at the list tail
1426 * @list: list to use
1427 * @newsk: buffer to queue
1428 *
1429 * Queue a buffer at the tail of the list. This function takes the
1430 * list lock and can be used safely with other locking &sk_buff functions
1431 * safely.
1432 *
1433 * A buffer cannot be placed on two lists at the same time.
1434 */
1435void skb_queue_tail(struct sk_buff_head *list, struct sk_buff *newsk)
1436{
1437 unsigned long flags;
1438
1439 spin_lock_irqsave(&list->lock, flags);
1440 __skb_queue_tail(list, newsk);
1441 spin_unlock_irqrestore(&list->lock, flags);
1442}
David S. Miller8728b832005-08-09 19:25:21 -07001443
Linus Torvalds1da177e2005-04-16 15:20:36 -07001444/**
1445 * skb_unlink - remove a buffer from a list
1446 * @skb: buffer to remove
David S. Miller8728b832005-08-09 19:25:21 -07001447 * @list: list to use
Linus Torvalds1da177e2005-04-16 15:20:36 -07001448 *
David S. Miller8728b832005-08-09 19:25:21 -07001449 * Remove a packet from a list. The list locks are taken and this
1450 * function is atomic with respect to other list locked calls
Linus Torvalds1da177e2005-04-16 15:20:36 -07001451 *
David S. Miller8728b832005-08-09 19:25:21 -07001452 * You must know what list the SKB is on.
Linus Torvalds1da177e2005-04-16 15:20:36 -07001453 */
David S. Miller8728b832005-08-09 19:25:21 -07001454void skb_unlink(struct sk_buff *skb, struct sk_buff_head *list)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001455{
David S. Miller8728b832005-08-09 19:25:21 -07001456 unsigned long flags;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001457
David S. Miller8728b832005-08-09 19:25:21 -07001458 spin_lock_irqsave(&list->lock, flags);
1459 __skb_unlink(skb, list);
1460 spin_unlock_irqrestore(&list->lock, flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001461}
1462
Linus Torvalds1da177e2005-04-16 15:20:36 -07001463/**
1464 * skb_append - append a buffer
1465 * @old: buffer to insert after
1466 * @newsk: buffer to insert
David S. Miller8728b832005-08-09 19:25:21 -07001467 * @list: list to use
Linus Torvalds1da177e2005-04-16 15:20:36 -07001468 *
1469 * Place a packet after a given packet in a list. The list locks are taken
1470 * and this function is atomic with respect to other list locked calls.
1471 * A buffer cannot be placed on two lists at the same time.
1472 */
David S. Miller8728b832005-08-09 19:25:21 -07001473void skb_append(struct sk_buff *old, struct sk_buff *newsk, struct sk_buff_head *list)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001474{
1475 unsigned long flags;
1476
David S. Miller8728b832005-08-09 19:25:21 -07001477 spin_lock_irqsave(&list->lock, flags);
1478 __skb_append(old, newsk, list);
1479 spin_unlock_irqrestore(&list->lock, flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001480}
1481
1482
1483/**
1484 * skb_insert - insert a buffer
1485 * @old: buffer to insert before
1486 * @newsk: buffer to insert
David S. Miller8728b832005-08-09 19:25:21 -07001487 * @list: list to use
Linus Torvalds1da177e2005-04-16 15:20:36 -07001488 *
David S. Miller8728b832005-08-09 19:25:21 -07001489 * Place a packet before a given packet in a list. The list locks are
1490 * taken and this function is atomic with respect to other list locked
1491 * calls.
1492 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07001493 * A buffer cannot be placed on two lists at the same time.
1494 */
David S. Miller8728b832005-08-09 19:25:21 -07001495void skb_insert(struct sk_buff *old, struct sk_buff *newsk, struct sk_buff_head *list)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001496{
1497 unsigned long flags;
1498
David S. Miller8728b832005-08-09 19:25:21 -07001499 spin_lock_irqsave(&list->lock, flags);
1500 __skb_insert(newsk, old->prev, old, list);
1501 spin_unlock_irqrestore(&list->lock, flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001502}
1503
1504#if 0
1505/*
1506 * Tune the memory allocator for a new MTU size.
1507 */
1508void skb_add_mtu(int mtu)
1509{
1510 /* Must match allocation in alloc_skb */
1511 mtu = SKB_DATA_ALIGN(mtu) + sizeof(struct skb_shared_info);
1512
1513 kmem_add_cache_size(mtu);
1514}
1515#endif
1516
1517static inline void skb_split_inside_header(struct sk_buff *skb,
1518 struct sk_buff* skb1,
1519 const u32 len, const int pos)
1520{
1521 int i;
1522
1523 memcpy(skb_put(skb1, pos - len), skb->data + len, pos - len);
1524
1525 /* And move data appendix as is. */
1526 for (i = 0; i < skb_shinfo(skb)->nr_frags; i++)
1527 skb_shinfo(skb1)->frags[i] = skb_shinfo(skb)->frags[i];
1528
1529 skb_shinfo(skb1)->nr_frags = skb_shinfo(skb)->nr_frags;
1530 skb_shinfo(skb)->nr_frags = 0;
1531 skb1->data_len = skb->data_len;
1532 skb1->len += skb1->data_len;
1533 skb->data_len = 0;
1534 skb->len = len;
1535 skb->tail = skb->data + len;
1536}
1537
1538static inline void skb_split_no_header(struct sk_buff *skb,
1539 struct sk_buff* skb1,
1540 const u32 len, int pos)
1541{
1542 int i, k = 0;
1543 const int nfrags = skb_shinfo(skb)->nr_frags;
1544
1545 skb_shinfo(skb)->nr_frags = 0;
1546 skb1->len = skb1->data_len = skb->len - len;
1547 skb->len = len;
1548 skb->data_len = len - pos;
1549
1550 for (i = 0; i < nfrags; i++) {
1551 int size = skb_shinfo(skb)->frags[i].size;
1552
1553 if (pos + size > len) {
1554 skb_shinfo(skb1)->frags[k] = skb_shinfo(skb)->frags[i];
1555
1556 if (pos < len) {
1557 /* Split frag.
1558 * We have two variants in this case:
1559 * 1. Move all the frag to the second
1560 * part, if it is possible. F.e.
1561 * this approach is mandatory for TUX,
1562 * where splitting is expensive.
1563 * 2. Split is accurately. We make this.
1564 */
1565 get_page(skb_shinfo(skb)->frags[i].page);
1566 skb_shinfo(skb1)->frags[0].page_offset += len - pos;
1567 skb_shinfo(skb1)->frags[0].size -= len - pos;
1568 skb_shinfo(skb)->frags[i].size = len - pos;
1569 skb_shinfo(skb)->nr_frags++;
1570 }
1571 k++;
1572 } else
1573 skb_shinfo(skb)->nr_frags++;
1574 pos += size;
1575 }
1576 skb_shinfo(skb1)->nr_frags = k;
1577}
1578
1579/**
1580 * skb_split - Split fragmented skb to two parts at length len.
1581 * @skb: the buffer to split
1582 * @skb1: the buffer to receive the second part
1583 * @len: new length for skb
1584 */
1585void skb_split(struct sk_buff *skb, struct sk_buff *skb1, const u32 len)
1586{
1587 int pos = skb_headlen(skb);
1588
1589 if (len < pos) /* Split line is inside header. */
1590 skb_split_inside_header(skb, skb1, len, pos);
1591 else /* Second chunk has no header, nothing to copy. */
1592 skb_split_no_header(skb, skb1, len, pos);
1593}
1594
Thomas Graf677e90e2005-06-23 20:59:51 -07001595/**
1596 * skb_prepare_seq_read - Prepare a sequential read of skb data
1597 * @skb: the buffer to read
1598 * @from: lower offset of data to be read
1599 * @to: upper offset of data to be read
1600 * @st: state variable
1601 *
1602 * Initializes the specified state variable. Must be called before
1603 * invoking skb_seq_read() for the first time.
1604 */
1605void skb_prepare_seq_read(struct sk_buff *skb, unsigned int from,
1606 unsigned int to, struct skb_seq_state *st)
1607{
1608 st->lower_offset = from;
1609 st->upper_offset = to;
1610 st->root_skb = st->cur_skb = skb;
1611 st->frag_idx = st->stepped_offset = 0;
1612 st->frag_data = NULL;
1613}
1614
1615/**
1616 * skb_seq_read - Sequentially read skb data
1617 * @consumed: number of bytes consumed by the caller so far
1618 * @data: destination pointer for data to be returned
1619 * @st: state variable
1620 *
1621 * Reads a block of skb data at &consumed relative to the
1622 * lower offset specified to skb_prepare_seq_read(). Assigns
1623 * the head of the data block to &data and returns the length
1624 * of the block or 0 if the end of the skb data or the upper
1625 * offset has been reached.
1626 *
1627 * The caller is not required to consume all of the data
1628 * returned, i.e. &consumed is typically set to the number
1629 * of bytes already consumed and the next call to
1630 * skb_seq_read() will return the remaining part of the block.
1631 *
1632 * Note: The size of each block of data returned can be arbitary,
1633 * this limitation is the cost for zerocopy seqeuental
1634 * reads of potentially non linear data.
1635 *
1636 * Note: Fragment lists within fragments are not implemented
1637 * at the moment, state->root_skb could be replaced with
1638 * a stack for this purpose.
1639 */
1640unsigned int skb_seq_read(unsigned int consumed, const u8 **data,
1641 struct skb_seq_state *st)
1642{
1643 unsigned int block_limit, abs_offset = consumed + st->lower_offset;
1644 skb_frag_t *frag;
1645
1646 if (unlikely(abs_offset >= st->upper_offset))
1647 return 0;
1648
1649next_skb:
1650 block_limit = skb_headlen(st->cur_skb);
1651
1652 if (abs_offset < block_limit) {
1653 *data = st->cur_skb->data + abs_offset;
1654 return block_limit - abs_offset;
1655 }
1656
1657 if (st->frag_idx == 0 && !st->frag_data)
1658 st->stepped_offset += skb_headlen(st->cur_skb);
1659
1660 while (st->frag_idx < skb_shinfo(st->cur_skb)->nr_frags) {
1661 frag = &skb_shinfo(st->cur_skb)->frags[st->frag_idx];
1662 block_limit = frag->size + st->stepped_offset;
1663
1664 if (abs_offset < block_limit) {
1665 if (!st->frag_data)
1666 st->frag_data = kmap_skb_frag(frag);
1667
1668 *data = (u8 *) st->frag_data + frag->page_offset +
1669 (abs_offset - st->stepped_offset);
1670
1671 return block_limit - abs_offset;
1672 }
1673
1674 if (st->frag_data) {
1675 kunmap_skb_frag(st->frag_data);
1676 st->frag_data = NULL;
1677 }
1678
1679 st->frag_idx++;
1680 st->stepped_offset += frag->size;
1681 }
1682
1683 if (st->cur_skb->next) {
1684 st->cur_skb = st->cur_skb->next;
1685 st->frag_idx = 0;
1686 goto next_skb;
1687 } else if (st->root_skb == st->cur_skb &&
1688 skb_shinfo(st->root_skb)->frag_list) {
1689 st->cur_skb = skb_shinfo(st->root_skb)->frag_list;
1690 goto next_skb;
1691 }
1692
1693 return 0;
1694}
1695
1696/**
1697 * skb_abort_seq_read - Abort a sequential read of skb data
1698 * @st: state variable
1699 *
1700 * Must be called if skb_seq_read() was not called until it
1701 * returned 0.
1702 */
1703void skb_abort_seq_read(struct skb_seq_state *st)
1704{
1705 if (st->frag_data)
1706 kunmap_skb_frag(st->frag_data);
1707}
1708
Thomas Graf3fc7e8a2005-06-23 21:00:17 -07001709#define TS_SKB_CB(state) ((struct skb_seq_state *) &((state)->cb))
1710
1711static unsigned int skb_ts_get_next_block(unsigned int offset, const u8 **text,
1712 struct ts_config *conf,
1713 struct ts_state *state)
1714{
1715 return skb_seq_read(offset, text, TS_SKB_CB(state));
1716}
1717
1718static void skb_ts_finish(struct ts_config *conf, struct ts_state *state)
1719{
1720 skb_abort_seq_read(TS_SKB_CB(state));
1721}
1722
1723/**
1724 * skb_find_text - Find a text pattern in skb data
1725 * @skb: the buffer to look in
1726 * @from: search offset
1727 * @to: search limit
1728 * @config: textsearch configuration
1729 * @state: uninitialized textsearch state variable
1730 *
1731 * Finds a pattern in the skb data according to the specified
1732 * textsearch configuration. Use textsearch_next() to retrieve
1733 * subsequent occurrences of the pattern. Returns the offset
1734 * to the first occurrence or UINT_MAX if no match was found.
1735 */
1736unsigned int skb_find_text(struct sk_buff *skb, unsigned int from,
1737 unsigned int to, struct ts_config *config,
1738 struct ts_state *state)
1739{
1740 config->get_next_block = skb_ts_get_next_block;
1741 config->finish = skb_ts_finish;
1742
1743 skb_prepare_seq_read(skb, from, to, TS_SKB_CB(state));
1744
1745 return textsearch_find(config, state);
1746}
1747
Ananda Rajue89e9cf2005-10-18 15:46:41 -07001748/**
1749 * skb_append_datato_frags: - append the user data to a skb
1750 * @sk: sock structure
1751 * @skb: skb structure to be appened with user data.
1752 * @getfrag: call back function to be used for getting the user data
1753 * @from: pointer to user message iov
1754 * @length: length of the iov message
1755 *
1756 * Description: This procedure append the user data in the fragment part
1757 * of the skb if any page alloc fails user this procedure returns -ENOMEM
1758 */
1759int skb_append_datato_frags(struct sock *sk, struct sk_buff *skb,
Martin Waitzdab96302005-12-05 13:40:12 -08001760 int (*getfrag)(void *from, char *to, int offset,
Ananda Rajue89e9cf2005-10-18 15:46:41 -07001761 int len, int odd, struct sk_buff *skb),
1762 void *from, int length)
1763{
1764 int frg_cnt = 0;
1765 skb_frag_t *frag = NULL;
1766 struct page *page = NULL;
1767 int copy, left;
1768 int offset = 0;
1769 int ret;
1770
1771 do {
1772 /* Return error if we don't have space for new frag */
1773 frg_cnt = skb_shinfo(skb)->nr_frags;
1774 if (frg_cnt >= MAX_SKB_FRAGS)
1775 return -EFAULT;
1776
1777 /* allocate a new page for next frag */
1778 page = alloc_pages(sk->sk_allocation, 0);
1779
1780 /* If alloc_page fails just return failure and caller will
1781 * free previous allocated pages by doing kfree_skb()
1782 */
1783 if (page == NULL)
1784 return -ENOMEM;
1785
1786 /* initialize the next frag */
1787 sk->sk_sndmsg_page = page;
1788 sk->sk_sndmsg_off = 0;
1789 skb_fill_page_desc(skb, frg_cnt, page, 0, 0);
1790 skb->truesize += PAGE_SIZE;
1791 atomic_add(PAGE_SIZE, &sk->sk_wmem_alloc);
1792
1793 /* get the new initialized frag */
1794 frg_cnt = skb_shinfo(skb)->nr_frags;
1795 frag = &skb_shinfo(skb)->frags[frg_cnt - 1];
1796
1797 /* copy the user data to page */
1798 left = PAGE_SIZE - frag->page_offset;
1799 copy = (length > left)? left : length;
1800
1801 ret = getfrag(from, (page_address(frag->page) +
1802 frag->page_offset + frag->size),
1803 offset, copy, 0, skb);
1804 if (ret < 0)
1805 return -EFAULT;
1806
1807 /* copy was successful so update the size parameters */
1808 sk->sk_sndmsg_off += copy;
1809 frag->size += copy;
1810 skb->len += copy;
1811 skb->data_len += copy;
1812 offset += copy;
1813 length -= copy;
1814
1815 } while (length > 0);
1816
1817 return 0;
1818}
1819
Herbert Xucbb042f2006-03-20 22:43:56 -08001820/**
1821 * skb_pull_rcsum - pull skb and update receive checksum
1822 * @skb: buffer to update
1823 * @start: start of data before pull
1824 * @len: length of data pulled
1825 *
1826 * This function performs an skb_pull on the packet and updates
1827 * update the CHECKSUM_HW checksum. It should be used on receive
1828 * path processing instead of skb_pull unless you know that the
1829 * checksum difference is zero (e.g., a valid IP header) or you
1830 * are setting ip_summed to CHECKSUM_NONE.
1831 */
1832unsigned char *skb_pull_rcsum(struct sk_buff *skb, unsigned int len)
1833{
1834 BUG_ON(len > skb->len);
1835 skb->len -= len;
1836 BUG_ON(skb->len < skb->data_len);
1837 skb_postpull_rcsum(skb, skb->data, len);
1838 return skb->data += len;
1839}
1840
Arnaldo Carvalho de Melof94691a2006-03-20 22:47:55 -08001841EXPORT_SYMBOL_GPL(skb_pull_rcsum);
1842
Linus Torvalds1da177e2005-04-16 15:20:36 -07001843void __init skb_init(void)
1844{
1845 skbuff_head_cache = kmem_cache_create("skbuff_head_cache",
1846 sizeof(struct sk_buff),
1847 0,
1848 SLAB_HWCACHE_ALIGN,
1849 NULL, NULL);
1850 if (!skbuff_head_cache)
1851 panic("cannot create skbuff cache");
David S. Millerd179cd12005-08-17 14:57:30 -07001852
1853 skbuff_fclone_cache = kmem_cache_create("skbuff_fclone_cache",
1854 (2*sizeof(struct sk_buff)) +
1855 sizeof(atomic_t),
1856 0,
1857 SLAB_HWCACHE_ALIGN,
1858 NULL, NULL);
1859 if (!skbuff_fclone_cache)
1860 panic("cannot create skbuff cache");
Linus Torvalds1da177e2005-04-16 15:20:36 -07001861}
1862
1863EXPORT_SYMBOL(___pskb_trim);
1864EXPORT_SYMBOL(__kfree_skb);
Jörn Engel231d06a2006-03-20 21:28:35 -08001865EXPORT_SYMBOL(kfree_skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001866EXPORT_SYMBOL(__pskb_pull_tail);
David S. Millerd179cd12005-08-17 14:57:30 -07001867EXPORT_SYMBOL(__alloc_skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001868EXPORT_SYMBOL(pskb_copy);
1869EXPORT_SYMBOL(pskb_expand_head);
1870EXPORT_SYMBOL(skb_checksum);
1871EXPORT_SYMBOL(skb_clone);
1872EXPORT_SYMBOL(skb_clone_fraglist);
1873EXPORT_SYMBOL(skb_copy);
1874EXPORT_SYMBOL(skb_copy_and_csum_bits);
1875EXPORT_SYMBOL(skb_copy_and_csum_dev);
1876EXPORT_SYMBOL(skb_copy_bits);
1877EXPORT_SYMBOL(skb_copy_expand);
1878EXPORT_SYMBOL(skb_over_panic);
1879EXPORT_SYMBOL(skb_pad);
1880EXPORT_SYMBOL(skb_realloc_headroom);
1881EXPORT_SYMBOL(skb_under_panic);
1882EXPORT_SYMBOL(skb_dequeue);
1883EXPORT_SYMBOL(skb_dequeue_tail);
1884EXPORT_SYMBOL(skb_insert);
1885EXPORT_SYMBOL(skb_queue_purge);
1886EXPORT_SYMBOL(skb_queue_head);
1887EXPORT_SYMBOL(skb_queue_tail);
1888EXPORT_SYMBOL(skb_unlink);
1889EXPORT_SYMBOL(skb_append);
1890EXPORT_SYMBOL(skb_split);
Thomas Graf677e90e2005-06-23 20:59:51 -07001891EXPORT_SYMBOL(skb_prepare_seq_read);
1892EXPORT_SYMBOL(skb_seq_read);
1893EXPORT_SYMBOL(skb_abort_seq_read);
Thomas Graf3fc7e8a2005-06-23 21:00:17 -07001894EXPORT_SYMBOL(skb_find_text);
Ananda Rajue89e9cf2005-10-18 15:46:41 -07001895EXPORT_SYMBOL(skb_append_datato_frags);