12874c5fdSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later 21da177e4SLinus Torvalds /* 31da177e4SLinus Torvalds * IPv6 output functions 41da177e4SLinus Torvalds * Linux INET6 implementation 51da177e4SLinus Torvalds * 61da177e4SLinus Torvalds * Authors: 71da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 81da177e4SLinus Torvalds * 91da177e4SLinus Torvalds * Based on linux/net/ipv4/ip_output.c 101da177e4SLinus Torvalds * 111da177e4SLinus Torvalds * Changes: 121da177e4SLinus Torvalds * A.N.Kuznetsov : airthmetics in fragmentation. 131da177e4SLinus Torvalds * extension headers are implemented. 141da177e4SLinus Torvalds * route changes now work. 151da177e4SLinus Torvalds * ip6_forward does not confuse sniffers. 161da177e4SLinus Torvalds * etc. 171da177e4SLinus Torvalds * 181da177e4SLinus Torvalds * H. von Brand : Added missing #include <linux/string.h> 191da177e4SLinus Torvalds * Imran Patel : frag id should be in NBO 201da177e4SLinus Torvalds * Kazunori MIYAZAWA @USAGI 211da177e4SLinus Torvalds * : add ip6_append_data and related functions 221da177e4SLinus Torvalds * for datagram xmit 231da177e4SLinus Torvalds */ 241da177e4SLinus Torvalds 251da177e4SLinus Torvalds #include <linux/errno.h> 26ef76bc23SHerbert Xu #include <linux/kernel.h> 271da177e4SLinus Torvalds #include <linux/string.h> 281da177e4SLinus Torvalds #include <linux/socket.h> 291da177e4SLinus Torvalds #include <linux/net.h> 301da177e4SLinus Torvalds #include <linux/netdevice.h> 311da177e4SLinus Torvalds #include <linux/if_arp.h> 321da177e4SLinus Torvalds #include <linux/in6.h> 331da177e4SLinus Torvalds #include <linux/tcp.h> 341da177e4SLinus Torvalds #include <linux/route.h> 35b59f45d0SHerbert Xu #include <linux/module.h> 365a0e3ad6STejun Heo #include <linux/slab.h> 371da177e4SLinus Torvalds 3833b48679SDaniel Mack #include <linux/bpf-cgroup.h> 391da177e4SLinus Torvalds #include <linux/netfilter.h> 401da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h> 411da177e4SLinus Torvalds 421da177e4SLinus Torvalds #include <net/sock.h> 431da177e4SLinus Torvalds #include <net/snmp.h> 441da177e4SLinus Torvalds 451da177e4SLinus Torvalds #include <net/ipv6.h> 461da177e4SLinus Torvalds #include <net/ndisc.h> 471da177e4SLinus Torvalds #include <net/protocol.h> 481da177e4SLinus Torvalds #include <net/ip6_route.h> 491da177e4SLinus Torvalds #include <net/addrconf.h> 501da177e4SLinus Torvalds #include <net/rawv6.h> 511da177e4SLinus Torvalds #include <net/icmp.h> 521da177e4SLinus Torvalds #include <net/xfrm.h> 531da177e4SLinus Torvalds #include <net/checksum.h> 547bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h> 55ca254490SDavid Ahern #include <net/l3mdev.h> 5614972cbdSRoopa Prabhu #include <net/lwtunnel.h> 57571912c6SMartin Varghese #include <net/ip_tunnels.h> 581da177e4SLinus Torvalds 597d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb) 601da177e4SLinus Torvalds { 61adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 621da177e4SLinus Torvalds struct net_device *dev = dst->dev; 63e415ed3aSVasily Averin struct inet6_dev *idev = ip6_dst_idev(dst); 645796015fSVasily Averin unsigned int hh_len = LL_RESERVED_SPACE(dev); 65e415ed3aSVasily Averin const struct in6_addr *daddr, *nexthop; 66e415ed3aSVasily Averin struct ipv6hdr *hdr; 67f6b72b62SDavid S. Miller struct neighbour *neigh; 686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 int ret; 691da177e4SLinus Torvalds 705796015fSVasily Averin /* Be paranoid, rather than too clever. */ 71e415ed3aSVasily Averin if (unlikely(hh_len > skb_headroom(skb)) && dev->header_ops) { 72e415ed3aSVasily Averin skb = skb_expand_head(skb, hh_len); 735796015fSVasily Averin if (!skb) { 74e415ed3aSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 755796015fSVasily Averin return -ENOMEM; 765796015fSVasily Averin } 775796015fSVasily Averin } 785796015fSVasily Averin 79e415ed3aSVasily Averin hdr = ipv6_hdr(skb); 80e415ed3aSVasily Averin daddr = &hdr->daddr; 81e415ed3aSVasily Averin if (ipv6_addr_is_multicast(daddr)) { 827026b1ddSDavid Miller if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) && 838571ab47SYuval Mintz ((mroute6_is_socket(net, skb) && 84bd91b8bfSBenjamin Thery !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) || 85e415ed3aSVasily Averin ipv6_chk_mcast_addr(dev, daddr, &hdr->saddr))) { 861da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 871da177e4SLinus Torvalds 881da177e4SLinus Torvalds /* Do not check for IFF_ALLMULTI; multicast routing 891da177e4SLinus Torvalds is not supported in any case. 901da177e4SLinus Torvalds */ 911da177e4SLinus Torvalds if (newskb) 92b2e0b385SJan Engelhardt NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING, 9329a26a56SEric W. Biederman net, sk, newskb, NULL, newskb->dev, 9495603e22SMichel Machado dev_loopback_xmit); 951da177e4SLinus Torvalds 96e415ed3aSVasily Averin if (hdr->hop_limit == 0) { 9778126c41SEric W. Biederman IP6_INC_STATS(net, idev, 983bd653c8SDenis V. Lunev IPSTATS_MIB_OUTDISCARDS); 991da177e4SLinus Torvalds kfree_skb(skb); 1001da177e4SLinus Torvalds return 0; 1011da177e4SLinus Torvalds } 1021da177e4SLinus Torvalds } 1031da177e4SLinus Torvalds 10478126c41SEric W. Biederman IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len); 105e415ed3aSVasily Averin if (IPV6_ADDR_MC_SCOPE(daddr) <= IPV6_ADDR_SCOPE_NODELOCAL && 106dd408515SHannes Frederic Sowa !(dev->flags & IFF_LOOPBACK)) { 107dd408515SHannes Frederic Sowa kfree_skb(skb); 108dd408515SHannes Frederic Sowa return 0; 109dd408515SHannes Frederic Sowa } 1101da177e4SLinus Torvalds } 1111da177e4SLinus Torvalds 11214972cbdSRoopa Prabhu if (lwtunnel_xmit_redirect(dst->lwtstate)) { 11314972cbdSRoopa Prabhu int res = lwtunnel_xmit(skb); 11414972cbdSRoopa Prabhu 11514972cbdSRoopa Prabhu if (res < 0 || res == LWTUNNEL_XMIT_DONE) 11614972cbdSRoopa Prabhu return res; 11714972cbdSRoopa Prabhu } 11814972cbdSRoopa Prabhu 1196fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 120e415ed3aSVasily Averin nexthop = rt6_nexthop((struct rt6_info *)dst, daddr); 121e415ed3aSVasily Averin neigh = __ipv6_neigh_lookup_noref(dev, nexthop); 12258f71be5SPavel Begunkov 12358f71be5SPavel Begunkov if (unlikely(IS_ERR_OR_NULL(neigh))) { 1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(!neigh)) 125e415ed3aSVasily Averin neigh = __neigh_create(&nd_tbl, nexthop, dev, false); 12658f71be5SPavel Begunkov if (IS_ERR(neigh)) { 12758f71be5SPavel Begunkov rcu_read_unlock_bh(); 12858f71be5SPavel Begunkov IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTNOROUTES); 12958f71be5SPavel Begunkov kfree_skb_reason(skb, SKB_DROP_REASON_NEIGH_CREATEFAIL); 13058f71be5SPavel Begunkov return -EINVAL; 13158f71be5SPavel Begunkov } 13258f71be5SPavel Begunkov } 1334ff06203SJulian Anastasov sock_confirm_neigh(skb, neigh); 1340353f282SDavid Ahern ret = neigh_output(neigh, skb, false); 1356fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1366fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 return ret; 1376fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 } 1381da177e4SLinus Torvalds 139b210de4fSAya Levin static int 140b210de4fSAya Levin ip6_finish_output_gso_slowpath_drop(struct net *net, struct sock *sk, 141b210de4fSAya Levin struct sk_buff *skb, unsigned int mtu) 142b210de4fSAya Levin { 143b210de4fSAya Levin struct sk_buff *segs, *nskb; 144b210de4fSAya Levin netdev_features_t features; 145b210de4fSAya Levin int ret = 0; 146b210de4fSAya Levin 147b210de4fSAya Levin /* Please see corresponding comment in ip_finish_output_gso 148b210de4fSAya Levin * describing the cases where GSO segment length exceeds the 149b210de4fSAya Levin * egress MTU. 150b210de4fSAya Levin */ 151b210de4fSAya Levin features = netif_skb_features(skb); 152b210de4fSAya Levin segs = skb_gso_segment(skb, features & ~NETIF_F_GSO_MASK); 153b210de4fSAya Levin if (IS_ERR_OR_NULL(segs)) { 154b210de4fSAya Levin kfree_skb(skb); 155b210de4fSAya Levin return -ENOMEM; 156b210de4fSAya Levin } 157b210de4fSAya Levin 158b210de4fSAya Levin consume_skb(skb); 159b210de4fSAya Levin 160b210de4fSAya Levin skb_list_walk_safe(segs, segs, nskb) { 161b210de4fSAya Levin int err; 162b210de4fSAya Levin 163b210de4fSAya Levin skb_mark_not_on_list(segs); 164b210de4fSAya Levin err = ip6_fragment(net, sk, segs, ip6_finish_output2); 165b210de4fSAya Levin if (err && ret == 0) 166b210de4fSAya Levin ret = err; 167b210de4fSAya Levin } 168b210de4fSAya Levin 169b210de4fSAya Levin return ret; 170b210de4fSAya Levin } 171b210de4fSAya Levin 172956fe219Sbrakmo static int __ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1739e508490SJan Engelhardt { 174b210de4fSAya Levin unsigned int mtu; 175b210de4fSAya Levin 17609ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM) 17709ee9dbaSTobias Brunner /* Policy lookup after SNAT yielded a new policy */ 17809ee9dbaSTobias Brunner if (skb_dst(skb)->xfrm) { 17919d36c5fSEric Dumazet IP6CB(skb)->flags |= IP6SKB_REROUTED; 18009ee9dbaSTobias Brunner return dst_output(net, sk, skb); 18109ee9dbaSTobias Brunner } 18209ee9dbaSTobias Brunner #endif 18309ee9dbaSTobias Brunner 184b210de4fSAya Levin mtu = ip6_skb_dst_mtu(skb); 18580e425b6SCoco Li if (skb_is_gso(skb) && 18680e425b6SCoco Li !(IP6CB(skb)->flags & IP6SKB_FAKEJUMBO) && 18780e425b6SCoco Li !skb_gso_validate_network_len(skb, mtu)) 188b210de4fSAya Levin return ip6_finish_output_gso_slowpath_drop(net, sk, skb, mtu); 189b210de4fSAya Levin 190b210de4fSAya Levin if ((skb->len > mtu && !skb_is_gso(skb)) || 1919037c357SJiri Pirko dst_allfrag(skb_dst(skb)) || 1929037c357SJiri Pirko (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size)) 1937d8c6e39SEric W. Biederman return ip6_fragment(net, sk, skb, ip6_finish_output2); 1949e508490SJan Engelhardt else 1957d8c6e39SEric W. Biederman return ip6_finish_output2(net, sk, skb); 1969e508490SJan Engelhardt } 1979e508490SJan Engelhardt 198956fe219Sbrakmo static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 199956fe219Sbrakmo { 200956fe219Sbrakmo int ret; 201956fe219Sbrakmo 202956fe219Sbrakmo ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb); 203956fe219Sbrakmo switch (ret) { 204956fe219Sbrakmo case NET_XMIT_SUCCESS: 205956fe219Sbrakmo case NET_XMIT_CN: 206956fe219Sbrakmo return __ip6_finish_output(net, sk, skb) ? : ret; 207956fe219Sbrakmo default: 2085e187189SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_BPF_CGROUP_EGRESS); 209956fe219Sbrakmo return ret; 210956fe219Sbrakmo } 211956fe219Sbrakmo } 212956fe219Sbrakmo 213ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb) 2141da177e4SLinus Torvalds { 21528f8bfd1SPhil Sutter struct net_device *dev = skb_dst(skb)->dev, *indev = skb->dev; 216adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 217be10de0aSEric W. Biederman 21897a7a37aSChenbo Feng skb->protocol = htons(ETH_P_IPV6); 21997a7a37aSChenbo Feng skb->dev = dev; 22097a7a37aSChenbo Feng 221778d80beSYOSHIFUJI Hideaki if (unlikely(idev->cnf.disable_ipv6)) { 22219a0644cSEric W. Biederman IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 2235e187189SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_IPV6DISABLED); 224778d80beSYOSHIFUJI Hideaki return 0; 225778d80beSYOSHIFUJI Hideaki } 226778d80beSYOSHIFUJI Hideaki 22729a26a56SEric W. Biederman return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING, 22828f8bfd1SPhil Sutter net, sk, skb, indev, dev, 2299c6eb28aSJan Engelhardt ip6_finish_output, 2309c6eb28aSJan Engelhardt !(IP6CB(skb)->flags & IP6SKB_REROUTED)); 2311da177e4SLinus Torvalds } 2326585d7dcSBrian Vazquez EXPORT_SYMBOL(ip6_output); 2331da177e4SLinus Torvalds 234e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np) 235513674b5SShaohua Li { 236513674b5SShaohua Li if (!np->autoflowlabel_set) 237513674b5SShaohua Li return ip6_default_np_autolabel(net); 238513674b5SShaohua Li else 239513674b5SShaohua Li return np->autoflowlabel; 240513674b5SShaohua Li } 241513674b5SShaohua Li 2421da177e4SLinus Torvalds /* 243b5d43998SShan Wei * xmit an sk_buff (used by TCP, SCTP and DCCP) 2441c1e9d2bSEric Dumazet * Note : socket lock is not held for SYNACK packets, but might be modified 2451c1e9d2bSEric Dumazet * by calls to skb_set_owner_w() and ipv6_local_error(), 2461c1e9d2bSEric Dumazet * which are using proper atomic operations or spinlocks. 2471da177e4SLinus Torvalds */ 2481c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6, 2494f6570d7SEric Dumazet __u32 mark, struct ipv6_txoptions *opt, int tclass, u32 priority) 2501da177e4SLinus Torvalds { 2513bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 2521c1e9d2bSEric Dumazet const struct ipv6_pinfo *np = inet6_sk(sk); 2534c9483b2SDavid S. Miller struct in6_addr *first_hop = &fl6->daddr; 254adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 2550c9f227bSVasily Averin struct net_device *dev = dst->dev; 2560c9f227bSVasily Averin struct inet6_dev *idev = ip6_dst_idev(dst); 25780e425b6SCoco Li struct hop_jumbo_hdr *hop_jumbo; 25880e425b6SCoco Li int hoplen = sizeof(*hop_jumbo); 25966033f47SStefano Brivio unsigned int head_room; 2601da177e4SLinus Torvalds struct ipv6hdr *hdr; 2614c9483b2SDavid S. Miller u8 proto = fl6->flowi6_proto; 2621da177e4SLinus Torvalds int seg_len = skb->len; 263e651f03aSGerrit Renker int hlimit = -1; 2641da177e4SLinus Torvalds u32 mtu; 2651da177e4SLinus Torvalds 26680e425b6SCoco Li head_room = sizeof(struct ipv6hdr) + hoplen + LL_RESERVED_SPACE(dev); 26766033f47SStefano Brivio if (opt) 26866033f47SStefano Brivio head_room += opt->opt_nflen + opt->opt_flen; 2691da177e4SLinus Torvalds 2700c9f227bSVasily Averin if (unlikely(head_room > skb_headroom(skb))) { 2710c9f227bSVasily Averin skb = skb_expand_head(skb, head_room); 2720c9f227bSVasily Averin if (!skb) { 2730c9f227bSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 2741da177e4SLinus Torvalds return -ENOBUFS; 2751da177e4SLinus Torvalds } 2761da177e4SLinus Torvalds } 27766033f47SStefano Brivio 27866033f47SStefano Brivio if (opt) { 27966033f47SStefano Brivio seg_len += opt->opt_nflen + opt->opt_flen; 28066033f47SStefano Brivio 2811da177e4SLinus Torvalds if (opt->opt_flen) 2821da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 28366033f47SStefano Brivio 2841da177e4SLinus Torvalds if (opt->opt_nflen) 285613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop, 286613fa3caSDavid Lebrun &fl6->saddr); 2871da177e4SLinus Torvalds } 2881da177e4SLinus Torvalds 28980e425b6SCoco Li if (unlikely(seg_len > IPV6_MAXPLEN)) { 29080e425b6SCoco Li hop_jumbo = skb_push(skb, hoplen); 29180e425b6SCoco Li 29280e425b6SCoco Li hop_jumbo->nexthdr = proto; 29380e425b6SCoco Li hop_jumbo->hdrlen = 0; 29480e425b6SCoco Li hop_jumbo->tlv_type = IPV6_TLV_JUMBO; 29580e425b6SCoco Li hop_jumbo->tlv_len = 4; 29680e425b6SCoco Li hop_jumbo->jumbo_payload_len = htonl(seg_len + hoplen); 29780e425b6SCoco Li 29880e425b6SCoco Li proto = IPPROTO_HOPOPTS; 29980e425b6SCoco Li seg_len = 0; 30080e425b6SCoco Li IP6CB(skb)->flags |= IP6SKB_FAKEJUMBO; 30180e425b6SCoco Li } 30280e425b6SCoco Li 303e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 304e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 3050660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 3061da177e4SLinus Torvalds 3071da177e4SLinus Torvalds /* 3081da177e4SLinus Torvalds * Fill in the IPv6 header 3091da177e4SLinus Torvalds */ 310b903d324SEric Dumazet if (np) 3111da177e4SLinus Torvalds hlimit = np->hop_limit; 3121da177e4SLinus Torvalds if (hlimit < 0) 3136b75d090SYOSHIFUJI Hideaki hlimit = ip6_dst_hoplimit(dst); 3141da177e4SLinus Torvalds 315cb1ce2efSTom Herbert ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel, 316513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 31741a1f8eaSYOSHIFUJI Hideaki 3181da177e4SLinus Torvalds hdr->payload_len = htons(seg_len); 3191da177e4SLinus Torvalds hdr->nexthdr = proto; 3201da177e4SLinus Torvalds hdr->hop_limit = hlimit; 3211da177e4SLinus Torvalds 3224e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 3234e3fd7a0SAlexey Dobriyan hdr->daddr = *first_hop; 3241da177e4SLinus Torvalds 3259c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 3264f6570d7SEric Dumazet skb->priority = priority; 32792e55f41SPablo Neira skb->mark = mark; 328a2c2064fSPatrick McHardy 3291da177e4SLinus Torvalds mtu = dst_mtu(dst); 33060ff7467SWANG Cong if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) { 3310c9f227bSVasily Averin IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len); 332a8e3e1a9SDavid Ahern 333a8e3e1a9SDavid Ahern /* if egress device is enslaved to an L3 master device pass the 334a8e3e1a9SDavid Ahern * skb to its handler for processing 335a8e3e1a9SDavid Ahern */ 336a8e3e1a9SDavid Ahern skb = l3mdev_ip6_out((struct sock *)sk, skb); 337a8e3e1a9SDavid Ahern if (unlikely(!skb)) 338a8e3e1a9SDavid Ahern return 0; 339a8e3e1a9SDavid Ahern 3401c1e9d2bSEric Dumazet /* hooks should never assume socket lock is held. 3411c1e9d2bSEric Dumazet * we promote our socket to non const 3421c1e9d2bSEric Dumazet */ 34329a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, 3440c9f227bSVasily Averin net, (struct sock *)sk, skb, NULL, dev, 34513206b6bSEric W. Biederman dst_output); 3461da177e4SLinus Torvalds } 3471da177e4SLinus Torvalds 3480c9f227bSVasily Averin skb->dev = dev; 3491c1e9d2bSEric Dumazet /* ipv6_local_error() does not require socket lock, 3501c1e9d2bSEric Dumazet * we promote our socket to non const 3511c1e9d2bSEric Dumazet */ 3521c1e9d2bSEric Dumazet ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu); 3531c1e9d2bSEric Dumazet 3540c9f227bSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_FRAGFAILS); 3551da177e4SLinus Torvalds kfree_skb(skb); 3561da177e4SLinus Torvalds return -EMSGSIZE; 3571da177e4SLinus Torvalds } 3587159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit); 3597159039aSYOSHIFUJI Hideaki 3601da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel) 3611da177e4SLinus Torvalds { 3621da177e4SLinus Torvalds struct ip6_ra_chain *ra; 3631da177e4SLinus Torvalds struct sock *last = NULL; 3641da177e4SLinus Torvalds 3651da177e4SLinus Torvalds read_lock(&ip6_ra_lock); 3661da177e4SLinus Torvalds for (ra = ip6_ra_chain; ra; ra = ra->next) { 3671da177e4SLinus Torvalds struct sock *sk = ra->sk; 3680bd1b59bSAndrew McDonald if (sk && ra->sel == sel && 3690bd1b59bSAndrew McDonald (!sk->sk_bound_dev_if || 3700bd1b59bSAndrew McDonald sk->sk_bound_dev_if == skb->dev->ifindex)) { 3719036b2feSFrancesco Ruggeri struct ipv6_pinfo *np = inet6_sk(sk); 3729036b2feSFrancesco Ruggeri 3739036b2feSFrancesco Ruggeri if (np && np->rtalert_isolate && 3749036b2feSFrancesco Ruggeri !net_eq(sock_net(sk), dev_net(skb->dev))) { 3759036b2feSFrancesco Ruggeri continue; 3769036b2feSFrancesco Ruggeri } 3771da177e4SLinus Torvalds if (last) { 3781da177e4SLinus Torvalds struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC); 3791da177e4SLinus Torvalds if (skb2) 3801da177e4SLinus Torvalds rawv6_rcv(last, skb2); 3811da177e4SLinus Torvalds } 3821da177e4SLinus Torvalds last = sk; 3831da177e4SLinus Torvalds } 3841da177e4SLinus Torvalds } 3851da177e4SLinus Torvalds 3861da177e4SLinus Torvalds if (last) { 3871da177e4SLinus Torvalds rawv6_rcv(last, skb); 3881da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3891da177e4SLinus Torvalds return 1; 3901da177e4SLinus Torvalds } 3911da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3921da177e4SLinus Torvalds return 0; 3931da177e4SLinus Torvalds } 3941da177e4SLinus Torvalds 395e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb) 396e21e0b5fSVille Nuorvala { 3970660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 398e21e0b5fSVille Nuorvala u8 nexthdr = hdr->nexthdr; 39975f2811cSJesse Gross __be16 frag_off; 400e21e0b5fSVille Nuorvala int offset; 401e21e0b5fSVille Nuorvala 402e21e0b5fSVille Nuorvala if (ipv6_ext_hdr(nexthdr)) { 40375f2811cSJesse Gross offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off); 404e21e0b5fSVille Nuorvala if (offset < 0) 405e21e0b5fSVille Nuorvala return 0; 406e21e0b5fSVille Nuorvala } else 407e21e0b5fSVille Nuorvala offset = sizeof(struct ipv6hdr); 408e21e0b5fSVille Nuorvala 409e21e0b5fSVille Nuorvala if (nexthdr == IPPROTO_ICMPV6) { 410e21e0b5fSVille Nuorvala struct icmp6hdr *icmp6; 411e21e0b5fSVille Nuorvala 412d56f90a7SArnaldo Carvalho de Melo if (!pskb_may_pull(skb, (skb_network_header(skb) + 413d56f90a7SArnaldo Carvalho de Melo offset + 1 - skb->data))) 414e21e0b5fSVille Nuorvala return 0; 415e21e0b5fSVille Nuorvala 416d56f90a7SArnaldo Carvalho de Melo icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset); 417e21e0b5fSVille Nuorvala 418e21e0b5fSVille Nuorvala switch (icmp6->icmp6_type) { 419e21e0b5fSVille Nuorvala case NDISC_ROUTER_SOLICITATION: 420e21e0b5fSVille Nuorvala case NDISC_ROUTER_ADVERTISEMENT: 421e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_SOLICITATION: 422e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_ADVERTISEMENT: 423e21e0b5fSVille Nuorvala case NDISC_REDIRECT: 424e21e0b5fSVille Nuorvala /* For reaction involving unicast neighbor discovery 425e21e0b5fSVille Nuorvala * message destined to the proxied address, pass it to 426e21e0b5fSVille Nuorvala * input function. 427e21e0b5fSVille Nuorvala */ 428e21e0b5fSVille Nuorvala return 1; 429e21e0b5fSVille Nuorvala default: 430e21e0b5fSVille Nuorvala break; 431e21e0b5fSVille Nuorvala } 432e21e0b5fSVille Nuorvala } 433e21e0b5fSVille Nuorvala 43474553b09SVille Nuorvala /* 43574553b09SVille Nuorvala * The proxying router can't forward traffic sent to a link-local 43674553b09SVille Nuorvala * address, so signal the sender and discard the packet. This 43774553b09SVille Nuorvala * behavior is clarified by the MIPv6 specification. 43874553b09SVille Nuorvala */ 43974553b09SVille Nuorvala if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) { 44074553b09SVille Nuorvala dst_link_failure(skb); 44174553b09SVille Nuorvala return -1; 44274553b09SVille Nuorvala } 44374553b09SVille Nuorvala 444e21e0b5fSVille Nuorvala return 0; 445e21e0b5fSVille Nuorvala } 446e21e0b5fSVille Nuorvala 4470c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk, 4480c4b51f0SEric W. Biederman struct sk_buff *skb) 4491da177e4SLinus Torvalds { 45071a1c915SJeff Barnhill struct dst_entry *dst = skb_dst(skb); 45171a1c915SJeff Barnhill 45271a1c915SJeff Barnhill __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS); 45371a1c915SJeff Barnhill __IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len); 45471a1c915SJeff Barnhill 455f839a6c9SIdo Schimmel #ifdef CONFIG_NET_SWITCHDEV 456f839a6c9SIdo Schimmel if (skb->offload_l3_fwd_mark) { 457f839a6c9SIdo Schimmel consume_skb(skb); 458f839a6c9SIdo Schimmel return 0; 459f839a6c9SIdo Schimmel } 460f839a6c9SIdo Schimmel #endif 461f839a6c9SIdo Schimmel 462de799101SMartin KaFai Lau skb_clear_tstamp(skb); 46313206b6bSEric W. Biederman return dst_output(net, sk, skb); 4641da177e4SLinus Torvalds } 4651da177e4SLinus Torvalds 466fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu) 467fe6cc55fSFlorian Westphal { 468418a3156SFlorian Westphal if (skb->len <= mtu) 469fe6cc55fSFlorian Westphal return false; 470fe6cc55fSFlorian Westphal 47160ff7467SWANG Cong /* ipv6 conntrack defrag sets max_frag_size + ignore_df */ 472fe6cc55fSFlorian Westphal if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu) 473fe6cc55fSFlorian Westphal return true; 474fe6cc55fSFlorian Westphal 47560ff7467SWANG Cong if (skb->ignore_df) 476418a3156SFlorian Westphal return false; 477418a3156SFlorian Westphal 478779b7931SDaniel Axtens if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu)) 479fe6cc55fSFlorian Westphal return false; 480fe6cc55fSFlorian Westphal 481fe6cc55fSFlorian Westphal return true; 482fe6cc55fSFlorian Westphal } 483fe6cc55fSFlorian Westphal 4841da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb) 4851da177e4SLinus Torvalds { 486adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 4870660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 4881da177e4SLinus Torvalds struct inet6_skb_parm *opt = IP6CB(skb); 489c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(dst->dev); 4900857d6f8SStephen Suryaputra struct inet6_dev *idev; 4912edc1a38SMenglong Dong SKB_DR(reason); 49214f3ad6fSUlrich Weber u32 mtu; 4931da177e4SLinus Torvalds 4940857d6f8SStephen Suryaputra idev = __in6_dev_get_safely(dev_get_by_index_rcu(net, IP6CB(skb)->iif)); 49553b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->forwarding == 0) 4961da177e4SLinus Torvalds goto error; 4971da177e4SLinus Torvalds 498090f1166SLi RongQing if (skb->pkt_type != PACKET_HOST) 499090f1166SLi RongQing goto drop; 500090f1166SLi RongQing 5019ef2e965SHannes Frederic Sowa if (unlikely(skb->sk)) 5029ef2e965SHannes Frederic Sowa goto drop; 5039ef2e965SHannes Frederic Sowa 5044497b076SBen Hutchings if (skb_warn_if_lro(skb)) 5054497b076SBen Hutchings goto drop; 5064497b076SBen Hutchings 507ccd27f05SNicolas Dichtel if (!net->ipv6.devconf_all->disable_policy && 508e3fa461dSNicolas Dichtel (!idev || !idev->cnf.disable_policy) && 509ccd27f05SNicolas Dichtel !xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) { 510bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 5111da177e4SLinus Torvalds goto drop; 5121da177e4SLinus Torvalds } 5131da177e4SLinus Torvalds 51435fc92a9SHerbert Xu skb_forward_csum(skb); 5151da177e4SLinus Torvalds 5161da177e4SLinus Torvalds /* 5171da177e4SLinus Torvalds * We DO NOT make any processing on 5181da177e4SLinus Torvalds * RA packets, pushing them to user level AS IS 5191da177e4SLinus Torvalds * without ane WARRANTY that application will be able 5201da177e4SLinus Torvalds * to interpret them. The reason is that we 5211da177e4SLinus Torvalds * cannot make anything clever here. 5221da177e4SLinus Torvalds * 5231da177e4SLinus Torvalds * We are not end-node, so that if packet contains 5241da177e4SLinus Torvalds * AH/ESP, we cannot make anything. 5251da177e4SLinus Torvalds * Defragmentation also would be mistake, RA packets 5261da177e4SLinus Torvalds * cannot be fragmented, because there is no warranty 5271da177e4SLinus Torvalds * that different fragments will go along one path. --ANK 5281da177e4SLinus Torvalds */ 529ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) { 530ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (ip6_call_ra_chain(skb, ntohs(opt->ra))) 5311da177e4SLinus Torvalds return 0; 5321da177e4SLinus Torvalds } 5331da177e4SLinus Torvalds 5341da177e4SLinus Torvalds /* 5351da177e4SLinus Torvalds * check and decrement ttl 5361da177e4SLinus Torvalds */ 5371da177e4SLinus Torvalds if (hdr->hop_limit <= 1) { 5383ffe533cSAlexey Dobriyan icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0); 539bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS); 5401da177e4SLinus Torvalds 5412edc1a38SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_IP_INHDR); 5421da177e4SLinus Torvalds return -ETIMEDOUT; 5431da177e4SLinus Torvalds } 5441da177e4SLinus Torvalds 545fbea49e1SYOSHIFUJI Hideaki /* XXX: idev->cnf.proxy_ndp? */ 54653b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->proxy_ndp && 5478a3edd80SDaniel Lezcano pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) { 54874553b09SVille Nuorvala int proxied = ip6_forward_proxy_check(skb); 54946c7655fSKangmin Park if (proxied > 0) { 55046c7655fSKangmin Park hdr->hop_limit--; 551e21e0b5fSVille Nuorvala return ip6_input(skb); 55246c7655fSKangmin Park } else if (proxied < 0) { 553bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 55474553b09SVille Nuorvala goto drop; 55574553b09SVille Nuorvala } 556e21e0b5fSVille Nuorvala } 557e21e0b5fSVille Nuorvala 5581da177e4SLinus Torvalds if (!xfrm6_route_forward(skb)) { 559bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 5602edc1a38SMenglong Dong SKB_DR_SET(reason, XFRM_POLICY); 5611da177e4SLinus Torvalds goto drop; 5621da177e4SLinus Torvalds } 563adf30907SEric Dumazet dst = skb_dst(skb); 5641da177e4SLinus Torvalds 5651da177e4SLinus Torvalds /* IPv6 specs say nothing about it, but it is clear that we cannot 5661da177e4SLinus Torvalds send redirects to source routed frames. 5671e5dc146SMasahide NAKAMURA We don't send redirects to frames decapsulated from IPsec. 5681da177e4SLinus Torvalds */ 5692f17becfSStephen Suryaputra if (IP6CB(skb)->iif == dst->dev->ifindex && 5702f17becfSStephen Suryaputra opt->srcrt == 0 && !skb_sec_path(skb)) { 5711da177e4SLinus Torvalds struct in6_addr *target = NULL; 572fbfe95a4SDavid S. Miller struct inet_peer *peer; 5731da177e4SLinus Torvalds struct rt6_info *rt; 5741da177e4SLinus Torvalds 5751da177e4SLinus Torvalds /* 5761da177e4SLinus Torvalds * incoming and outgoing devices are the same 5771da177e4SLinus Torvalds * send a redirect. 5781da177e4SLinus Torvalds */ 5791da177e4SLinus Torvalds 5801da177e4SLinus Torvalds rt = (struct rt6_info *) dst; 581c45a3dfbSDavid S. Miller if (rt->rt6i_flags & RTF_GATEWAY) 582c45a3dfbSDavid S. Miller target = &rt->rt6i_gateway; 5831da177e4SLinus Torvalds else 5841da177e4SLinus Torvalds target = &hdr->daddr; 5851da177e4SLinus Torvalds 586fd0273d7SMartin KaFai Lau peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1); 58792d86829SDavid S. Miller 5881da177e4SLinus Torvalds /* Limit redirects both by destination (here) 5891da177e4SLinus Torvalds and by source (inside ndisc_send_redirect) 5901da177e4SLinus Torvalds */ 591fbfe95a4SDavid S. Miller if (inet_peer_xrlim_allow(peer, 1*HZ)) 5924991969aSDavid S. Miller ndisc_send_redirect(skb, target); 5931d861aa4SDavid S. Miller if (peer) 5941d861aa4SDavid S. Miller inet_putpeer(peer); 5955bb1ab09SDavid L Stevens } else { 5965bb1ab09SDavid L Stevens int addrtype = ipv6_addr_type(&hdr->saddr); 5975bb1ab09SDavid L Stevens 5981da177e4SLinus Torvalds /* This check is security critical. */ 599f81b2e7dSYOSHIFUJI Hideaki if (addrtype == IPV6_ADDR_ANY || 600f81b2e7dSYOSHIFUJI Hideaki addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK)) 6011da177e4SLinus Torvalds goto error; 6025bb1ab09SDavid L Stevens if (addrtype & IPV6_ADDR_LINKLOCAL) { 6035bb1ab09SDavid L Stevens icmpv6_send(skb, ICMPV6_DEST_UNREACH, 6043ffe533cSAlexey Dobriyan ICMPV6_NOT_NEIGHBOUR, 0); 6055bb1ab09SDavid L Stevens goto error; 6065bb1ab09SDavid L Stevens } 6071da177e4SLinus Torvalds } 6081da177e4SLinus Torvalds 609427faee1SVadim Fedorenko mtu = ip6_dst_mtu_maybe_forward(dst, true); 61014f3ad6fSUlrich Weber if (mtu < IPV6_MIN_MTU) 61114f3ad6fSUlrich Weber mtu = IPV6_MIN_MTU; 61214f3ad6fSUlrich Weber 613fe6cc55fSFlorian Westphal if (ip6_pkt_too_big(skb, mtu)) { 6141da177e4SLinus Torvalds /* Again, force OUTPUT device used as source address */ 6151da177e4SLinus Torvalds skb->dev = dst->dev; 61614f3ad6fSUlrich Weber icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 617bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS); 6181d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 61915c77d8bSEric Dumazet IPSTATS_MIB_FRAGFAILS); 6202edc1a38SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_PKT_TOO_BIG); 6211da177e4SLinus Torvalds return -EMSGSIZE; 6221da177e4SLinus Torvalds } 6231da177e4SLinus Torvalds 6241da177e4SLinus Torvalds if (skb_cow(skb, dst->dev->hard_header_len)) { 6251d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 62615c77d8bSEric Dumazet IPSTATS_MIB_OUTDISCARDS); 6271da177e4SLinus Torvalds goto drop; 6281da177e4SLinus Torvalds } 6291da177e4SLinus Torvalds 6300660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 6311da177e4SLinus Torvalds 6321da177e4SLinus Torvalds /* Mangling hops number delayed to point after skb COW */ 6331da177e4SLinus Torvalds 6341da177e4SLinus Torvalds hdr->hop_limit--; 6351da177e4SLinus Torvalds 63629a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, 63729a26a56SEric W. Biederman net, NULL, skb, skb->dev, dst->dev, 6386e23ae2aSPatrick McHardy ip6_forward_finish); 6391da177e4SLinus Torvalds 6401da177e4SLinus Torvalds error: 641bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS); 6422edc1a38SMenglong Dong SKB_DR_SET(reason, IP_INADDRERRORS); 6431da177e4SLinus Torvalds drop: 6442edc1a38SMenglong Dong kfree_skb_reason(skb, reason); 6451da177e4SLinus Torvalds return -EINVAL; 6461da177e4SLinus Torvalds } 6471da177e4SLinus Torvalds 6481da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from) 6491da177e4SLinus Torvalds { 6501da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 6511da177e4SLinus Torvalds to->priority = from->priority; 6521da177e4SLinus Torvalds to->protocol = from->protocol; 653adf30907SEric Dumazet skb_dst_drop(to); 654adf30907SEric Dumazet skb_dst_set(to, dst_clone(skb_dst(from))); 6551da177e4SLinus Torvalds to->dev = from->dev; 65682e91ffeSThomas Graf to->mark = from->mark; 6571da177e4SLinus Torvalds 6583dd1c9a1SPaolo Abeni skb_copy_hash(to, from); 6593dd1c9a1SPaolo Abeni 6601da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 6611da177e4SLinus Torvalds to->tc_index = from->tc_index; 6621da177e4SLinus Torvalds #endif 663e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 664df5042f4SFlorian Westphal skb_ext_copy(to, from); 665984bc16cSJames Morris skb_copy_secmark(to, from); 6661da177e4SLinus Torvalds } 6671da177e4SLinus Torvalds 6680feca619SPablo Neira Ayuso int ip6_fraglist_init(struct sk_buff *skb, unsigned int hlen, u8 *prevhdr, 6690feca619SPablo Neira Ayuso u8 nexthdr, __be32 frag_id, 6700feca619SPablo Neira Ayuso struct ip6_fraglist_iter *iter) 6710feca619SPablo Neira Ayuso { 6720feca619SPablo Neira Ayuso unsigned int first_len; 6730feca619SPablo Neira Ayuso struct frag_hdr *fh; 6740feca619SPablo Neira Ayuso 6750feca619SPablo Neira Ayuso /* BUILD HEADER */ 6760feca619SPablo Neira Ayuso *prevhdr = NEXTHDR_FRAGMENT; 6770feca619SPablo Neira Ayuso iter->tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC); 6780feca619SPablo Neira Ayuso if (!iter->tmp_hdr) 6790feca619SPablo Neira Ayuso return -ENOMEM; 6800feca619SPablo Neira Ayuso 681b7034146SEric Dumazet iter->frag = skb_shinfo(skb)->frag_list; 6820feca619SPablo Neira Ayuso skb_frag_list_init(skb); 6830feca619SPablo Neira Ayuso 6840feca619SPablo Neira Ayuso iter->offset = 0; 6850feca619SPablo Neira Ayuso iter->hlen = hlen; 6860feca619SPablo Neira Ayuso iter->frag_id = frag_id; 6870feca619SPablo Neira Ayuso iter->nexthdr = nexthdr; 6880feca619SPablo Neira Ayuso 6890feca619SPablo Neira Ayuso __skb_pull(skb, hlen); 6900feca619SPablo Neira Ayuso fh = __skb_push(skb, sizeof(struct frag_hdr)); 6910feca619SPablo Neira Ayuso __skb_push(skb, hlen); 6920feca619SPablo Neira Ayuso skb_reset_network_header(skb); 6930feca619SPablo Neira Ayuso memcpy(skb_network_header(skb), iter->tmp_hdr, hlen); 6940feca619SPablo Neira Ayuso 6950feca619SPablo Neira Ayuso fh->nexthdr = nexthdr; 6960feca619SPablo Neira Ayuso fh->reserved = 0; 6970feca619SPablo Neira Ayuso fh->frag_off = htons(IP6_MF); 6980feca619SPablo Neira Ayuso fh->identification = frag_id; 6990feca619SPablo Neira Ayuso 7000feca619SPablo Neira Ayuso first_len = skb_pagelen(skb); 7010feca619SPablo Neira Ayuso skb->data_len = first_len - skb_headlen(skb); 7020feca619SPablo Neira Ayuso skb->len = first_len; 7030feca619SPablo Neira Ayuso ipv6_hdr(skb)->payload_len = htons(first_len - sizeof(struct ipv6hdr)); 7040feca619SPablo Neira Ayuso 7050feca619SPablo Neira Ayuso return 0; 7060feca619SPablo Neira Ayuso } 7070feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_init); 7080feca619SPablo Neira Ayuso 7090feca619SPablo Neira Ayuso void ip6_fraglist_prepare(struct sk_buff *skb, 7100feca619SPablo Neira Ayuso struct ip6_fraglist_iter *iter) 7110feca619SPablo Neira Ayuso { 7120feca619SPablo Neira Ayuso struct sk_buff *frag = iter->frag; 7130feca619SPablo Neira Ayuso unsigned int hlen = iter->hlen; 7140feca619SPablo Neira Ayuso struct frag_hdr *fh; 7150feca619SPablo Neira Ayuso 7160feca619SPablo Neira Ayuso frag->ip_summed = CHECKSUM_NONE; 7170feca619SPablo Neira Ayuso skb_reset_transport_header(frag); 7180feca619SPablo Neira Ayuso fh = __skb_push(frag, sizeof(struct frag_hdr)); 7190feca619SPablo Neira Ayuso __skb_push(frag, hlen); 7200feca619SPablo Neira Ayuso skb_reset_network_header(frag); 7210feca619SPablo Neira Ayuso memcpy(skb_network_header(frag), iter->tmp_hdr, hlen); 7220feca619SPablo Neira Ayuso iter->offset += skb->len - hlen - sizeof(struct frag_hdr); 7230feca619SPablo Neira Ayuso fh->nexthdr = iter->nexthdr; 7240feca619SPablo Neira Ayuso fh->reserved = 0; 7250feca619SPablo Neira Ayuso fh->frag_off = htons(iter->offset); 7260feca619SPablo Neira Ayuso if (frag->next) 7270feca619SPablo Neira Ayuso fh->frag_off |= htons(IP6_MF); 7280feca619SPablo Neira Ayuso fh->identification = iter->frag_id; 7290feca619SPablo Neira Ayuso ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr)); 7300feca619SPablo Neira Ayuso ip6_copy_metadata(frag, skb); 7310feca619SPablo Neira Ayuso } 7320feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_prepare); 7330feca619SPablo Neira Ayuso 7348a6a1f17SPablo Neira Ayuso void ip6_frag_init(struct sk_buff *skb, unsigned int hlen, unsigned int mtu, 7358a6a1f17SPablo Neira Ayuso unsigned short needed_tailroom, int hdr_room, u8 *prevhdr, 7368a6a1f17SPablo Neira Ayuso u8 nexthdr, __be32 frag_id, struct ip6_frag_state *state) 7378a6a1f17SPablo Neira Ayuso { 7388a6a1f17SPablo Neira Ayuso state->prevhdr = prevhdr; 7398a6a1f17SPablo Neira Ayuso state->nexthdr = nexthdr; 7408a6a1f17SPablo Neira Ayuso state->frag_id = frag_id; 7418a6a1f17SPablo Neira Ayuso 7428a6a1f17SPablo Neira Ayuso state->hlen = hlen; 7438a6a1f17SPablo Neira Ayuso state->mtu = mtu; 7448a6a1f17SPablo Neira Ayuso 7458a6a1f17SPablo Neira Ayuso state->left = skb->len - hlen; /* Space per frame */ 7468a6a1f17SPablo Neira Ayuso state->ptr = hlen; /* Where to start from */ 7478a6a1f17SPablo Neira Ayuso 7488a6a1f17SPablo Neira Ayuso state->hroom = hdr_room; 7498a6a1f17SPablo Neira Ayuso state->troom = needed_tailroom; 7508a6a1f17SPablo Neira Ayuso 7518a6a1f17SPablo Neira Ayuso state->offset = 0; 7528a6a1f17SPablo Neira Ayuso } 7538a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_init); 7548a6a1f17SPablo Neira Ayuso 7558a6a1f17SPablo Neira Ayuso struct sk_buff *ip6_frag_next(struct sk_buff *skb, struct ip6_frag_state *state) 7568a6a1f17SPablo Neira Ayuso { 7578a6a1f17SPablo Neira Ayuso u8 *prevhdr = state->prevhdr, *fragnexthdr_offset; 7588a6a1f17SPablo Neira Ayuso struct sk_buff *frag; 7598a6a1f17SPablo Neira Ayuso struct frag_hdr *fh; 7608a6a1f17SPablo Neira Ayuso unsigned int len; 7618a6a1f17SPablo Neira Ayuso 7628a6a1f17SPablo Neira Ayuso len = state->left; 7638a6a1f17SPablo Neira Ayuso /* IF: it doesn't fit, use 'mtu' - the data space left */ 7648a6a1f17SPablo Neira Ayuso if (len > state->mtu) 7658a6a1f17SPablo Neira Ayuso len = state->mtu; 7668a6a1f17SPablo Neira Ayuso /* IF: we are not sending up to and including the packet end 7678a6a1f17SPablo Neira Ayuso then align the next start on an eight byte boundary */ 7688a6a1f17SPablo Neira Ayuso if (len < state->left) 7698a6a1f17SPablo Neira Ayuso len &= ~7; 7708a6a1f17SPablo Neira Ayuso 7718a6a1f17SPablo Neira Ayuso /* Allocate buffer */ 7728a6a1f17SPablo Neira Ayuso frag = alloc_skb(len + state->hlen + sizeof(struct frag_hdr) + 7738a6a1f17SPablo Neira Ayuso state->hroom + state->troom, GFP_ATOMIC); 7748a6a1f17SPablo Neira Ayuso if (!frag) 7758a6a1f17SPablo Neira Ayuso return ERR_PTR(-ENOMEM); 7768a6a1f17SPablo Neira Ayuso 7778a6a1f17SPablo Neira Ayuso /* 7788a6a1f17SPablo Neira Ayuso * Set up data on packet 7798a6a1f17SPablo Neira Ayuso */ 7808a6a1f17SPablo Neira Ayuso 7818a6a1f17SPablo Neira Ayuso ip6_copy_metadata(frag, skb); 7828a6a1f17SPablo Neira Ayuso skb_reserve(frag, state->hroom); 7838a6a1f17SPablo Neira Ayuso skb_put(frag, len + state->hlen + sizeof(struct frag_hdr)); 7848a6a1f17SPablo Neira Ayuso skb_reset_network_header(frag); 7858a6a1f17SPablo Neira Ayuso fh = (struct frag_hdr *)(skb_network_header(frag) + state->hlen); 7868a6a1f17SPablo Neira Ayuso frag->transport_header = (frag->network_header + state->hlen + 7878a6a1f17SPablo Neira Ayuso sizeof(struct frag_hdr)); 7888a6a1f17SPablo Neira Ayuso 7898a6a1f17SPablo Neira Ayuso /* 7908a6a1f17SPablo Neira Ayuso * Charge the memory for the fragment to any owner 7918a6a1f17SPablo Neira Ayuso * it might possess 7928a6a1f17SPablo Neira Ayuso */ 7938a6a1f17SPablo Neira Ayuso if (skb->sk) 7948a6a1f17SPablo Neira Ayuso skb_set_owner_w(frag, skb->sk); 7958a6a1f17SPablo Neira Ayuso 7968a6a1f17SPablo Neira Ayuso /* 7978a6a1f17SPablo Neira Ayuso * Copy the packet header into the new buffer. 7988a6a1f17SPablo Neira Ayuso */ 7998a6a1f17SPablo Neira Ayuso skb_copy_from_linear_data(skb, skb_network_header(frag), state->hlen); 8008a6a1f17SPablo Neira Ayuso 8018a6a1f17SPablo Neira Ayuso fragnexthdr_offset = skb_network_header(frag); 8028a6a1f17SPablo Neira Ayuso fragnexthdr_offset += prevhdr - skb_network_header(skb); 8038a6a1f17SPablo Neira Ayuso *fragnexthdr_offset = NEXTHDR_FRAGMENT; 8048a6a1f17SPablo Neira Ayuso 8058a6a1f17SPablo Neira Ayuso /* 8068a6a1f17SPablo Neira Ayuso * Build fragment header. 8078a6a1f17SPablo Neira Ayuso */ 8088a6a1f17SPablo Neira Ayuso fh->nexthdr = state->nexthdr; 8098a6a1f17SPablo Neira Ayuso fh->reserved = 0; 8108a6a1f17SPablo Neira Ayuso fh->identification = state->frag_id; 8118a6a1f17SPablo Neira Ayuso 8128a6a1f17SPablo Neira Ayuso /* 8138a6a1f17SPablo Neira Ayuso * Copy a block of the IP datagram. 8148a6a1f17SPablo Neira Ayuso */ 8158a6a1f17SPablo Neira Ayuso BUG_ON(skb_copy_bits(skb, state->ptr, skb_transport_header(frag), 8168a6a1f17SPablo Neira Ayuso len)); 8178a6a1f17SPablo Neira Ayuso state->left -= len; 8188a6a1f17SPablo Neira Ayuso 8198a6a1f17SPablo Neira Ayuso fh->frag_off = htons(state->offset); 8208a6a1f17SPablo Neira Ayuso if (state->left > 0) 8218a6a1f17SPablo Neira Ayuso fh->frag_off |= htons(IP6_MF); 8228a6a1f17SPablo Neira Ayuso ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr)); 8238a6a1f17SPablo Neira Ayuso 8248a6a1f17SPablo Neira Ayuso state->ptr += len; 8258a6a1f17SPablo Neira Ayuso state->offset += len; 8268a6a1f17SPablo Neira Ayuso 8278a6a1f17SPablo Neira Ayuso return frag; 8288a6a1f17SPablo Neira Ayuso } 8298a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_next); 8308a6a1f17SPablo Neira Ayuso 8317d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, 8327d8c6e39SEric W. Biederman int (*output)(struct net *, struct sock *, struct sk_buff *)) 8331da177e4SLinus Torvalds { 8341da177e4SLinus Torvalds struct sk_buff *frag; 835adf30907SEric Dumazet struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 836f60e5990Shannes@stressinduktion.org struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? 837f60e5990Shannes@stressinduktion.org inet6_sk(skb->sk) : NULL; 838a1ac9c8aSMartin KaFai Lau bool mono_delivery_time = skb->mono_delivery_time; 8398a6a1f17SPablo Neira Ayuso struct ip6_frag_state state; 8408a6a1f17SPablo Neira Ayuso unsigned int mtu, hlen, nexthdr_offset; 8419669fffcSEric Dumazet ktime_t tstamp = skb->tstamp; 8428a6a1f17SPablo Neira Ayuso int hroom, err = 0; 843286c2349SMartin KaFai Lau __be32 frag_id; 8441da177e4SLinus Torvalds u8 *prevhdr, nexthdr = 0; 8451da177e4SLinus Torvalds 8467dd7eb95SDavid S. Miller err = ip6_find_1stfragopt(skb, &prevhdr); 8477dd7eb95SDavid S. Miller if (err < 0) 8482423496aSCraig Gallek goto fail; 8497dd7eb95SDavid S. Miller hlen = err; 8501da177e4SLinus Torvalds nexthdr = *prevhdr; 851ef0efcd3SJunwei Hu nexthdr_offset = prevhdr - skb_network_header(skb); 8521da177e4SLinus Torvalds 853628a5c56SJohn Heffner mtu = ip6_skb_dst_mtu(skb); 854b881ef76SJohn Heffner 855b881ef76SJohn Heffner /* We must not fragment if the socket is set to force MTU discovery 85614f3ad6fSUlrich Weber * or if the skb it not generated by a local socket. 857b881ef76SJohn Heffner */ 858485fca66SFlorian Westphal if (unlikely(!skb->ignore_df && skb->len > mtu)) 859485fca66SFlorian Westphal goto fail_toobig; 860a34a101eSEric Dumazet 861485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size) { 862485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size > mtu) 863485fca66SFlorian Westphal goto fail_toobig; 864485fca66SFlorian Westphal 865485fca66SFlorian Westphal /* don't send fragments larger than what we received */ 866485fca66SFlorian Westphal mtu = IP6CB(skb)->frag_max_size; 867485fca66SFlorian Westphal if (mtu < IPV6_MIN_MTU) 868485fca66SFlorian Westphal mtu = IPV6_MIN_MTU; 869b881ef76SJohn Heffner } 870b881ef76SJohn Heffner 871d91675f9SYOSHIFUJI Hideaki if (np && np->frag_size < mtu) { 872d91675f9SYOSHIFUJI Hideaki if (np->frag_size) 873d91675f9SYOSHIFUJI Hideaki mtu = np->frag_size; 874d91675f9SYOSHIFUJI Hideaki } 87589bc7848SHannes Frederic Sowa if (mtu < hlen + sizeof(struct frag_hdr) + 8) 876b72a2b01SHannes Frederic Sowa goto fail_toobig; 8771e0d69a9SHannes Frederic Sowa mtu -= hlen + sizeof(struct frag_hdr); 8781da177e4SLinus Torvalds 879fd0273d7SMartin KaFai Lau frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr, 880fd0273d7SMartin KaFai Lau &ipv6_hdr(skb)->saddr); 881286c2349SMartin KaFai Lau 882405c92f7SHannes Frederic Sowa if (skb->ip_summed == CHECKSUM_PARTIAL && 883405c92f7SHannes Frederic Sowa (err = skb_checksum_help(skb))) 884405c92f7SHannes Frederic Sowa goto fail; 885405c92f7SHannes Frederic Sowa 886ef0efcd3SJunwei Hu prevhdr = skb_network_header(skb) + nexthdr_offset; 8871d325d21SFlorian Westphal hroom = LL_RESERVED_SPACE(rt->dst.dev); 88821dc3301SDavid S. Miller if (skb_has_frag_list(skb)) { 889c72d8cdaSAlexey Dobriyan unsigned int first_len = skb_pagelen(skb); 8900feca619SPablo Neira Ayuso struct ip6_fraglist_iter iter; 8913d13008eSEric Dumazet struct sk_buff *frag2; 8921da177e4SLinus Torvalds 8931da177e4SLinus Torvalds if (first_len - hlen > mtu || 8941da177e4SLinus Torvalds ((first_len - hlen) & 7) || 8951d325d21SFlorian Westphal skb_cloned(skb) || 8961d325d21SFlorian Westphal skb_headroom(skb) < (hroom + sizeof(struct frag_hdr))) 8971da177e4SLinus Torvalds goto slow_path; 8981da177e4SLinus Torvalds 8994d9092bbSDavid S. Miller skb_walk_frags(skb, frag) { 9001da177e4SLinus Torvalds /* Correct geometry. */ 9011da177e4SLinus Torvalds if (frag->len > mtu || 9021da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 9031d325d21SFlorian Westphal skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr))) 9043d13008eSEric Dumazet goto slow_path_clean; 9051da177e4SLinus Torvalds 9061da177e4SLinus Torvalds /* Partially cloned skb? */ 9071da177e4SLinus Torvalds if (skb_shared(frag)) 9083d13008eSEric Dumazet goto slow_path_clean; 9092fdba6b0SHerbert Xu 9102fdba6b0SHerbert Xu BUG_ON(frag->sk); 9112fdba6b0SHerbert Xu if (skb->sk) { 9122fdba6b0SHerbert Xu frag->sk = skb->sk; 9132fdba6b0SHerbert Xu frag->destructor = sock_wfree; 9142fdba6b0SHerbert Xu } 9153d13008eSEric Dumazet skb->truesize -= frag->truesize; 9161da177e4SLinus Torvalds } 9171da177e4SLinus Torvalds 9180feca619SPablo Neira Ayuso err = ip6_fraglist_init(skb, hlen, prevhdr, nexthdr, frag_id, 9190feca619SPablo Neira Ayuso &iter); 9200feca619SPablo Neira Ayuso if (err < 0) 9211d325d21SFlorian Westphal goto fail; 9221da177e4SLinus Torvalds 9231da177e4SLinus Torvalds for (;;) { 9241da177e4SLinus Torvalds /* Prepare header of the next frame, 9251da177e4SLinus Torvalds * before previous one went down. */ 9260feca619SPablo Neira Ayuso if (iter.frag) 9270feca619SPablo Neira Ayuso ip6_fraglist_prepare(skb, &iter); 9281da177e4SLinus Torvalds 929a1ac9c8aSMartin KaFai Lau skb_set_delivery_time(skb, tstamp, mono_delivery_time); 9307d8c6e39SEric W. Biederman err = output(net, sk, skb); 931dafee490SWei Dong if (!err) 932d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9333bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 934dafee490SWei Dong 9350feca619SPablo Neira Ayuso if (err || !iter.frag) 9361da177e4SLinus Torvalds break; 9371da177e4SLinus Torvalds 9380feca619SPablo Neira Ayuso skb = ip6_fraglist_next(&iter); 9391da177e4SLinus Torvalds } 9401da177e4SLinus Torvalds 9410feca619SPablo Neira Ayuso kfree(iter.tmp_hdr); 9421da177e4SLinus Torvalds 9431da177e4SLinus Torvalds if (err == 0) { 944d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9453bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGOKS); 9461da177e4SLinus Torvalds return 0; 9471da177e4SLinus Torvalds } 9481da177e4SLinus Torvalds 949b7034146SEric Dumazet kfree_skb_list(iter.frag); 9501da177e4SLinus Torvalds 951d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9523bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 9531da177e4SLinus Torvalds return err; 9543d13008eSEric Dumazet 9553d13008eSEric Dumazet slow_path_clean: 9563d13008eSEric Dumazet skb_walk_frags(skb, frag2) { 9573d13008eSEric Dumazet if (frag2 == frag) 9583d13008eSEric Dumazet break; 9593d13008eSEric Dumazet frag2->sk = NULL; 9603d13008eSEric Dumazet frag2->destructor = NULL; 9613d13008eSEric Dumazet skb->truesize += frag2->truesize; 9623d13008eSEric Dumazet } 9631da177e4SLinus Torvalds } 9641da177e4SLinus Torvalds 9651da177e4SLinus Torvalds slow_path: 9661da177e4SLinus Torvalds /* 9671da177e4SLinus Torvalds * Fragment the datagram. 9681da177e4SLinus Torvalds */ 9691da177e4SLinus Torvalds 9708a6a1f17SPablo Neira Ayuso ip6_frag_init(skb, hlen, mtu, rt->dst.dev->needed_tailroom, 9718a6a1f17SPablo Neira Ayuso LL_RESERVED_SPACE(rt->dst.dev), prevhdr, nexthdr, frag_id, 9728a6a1f17SPablo Neira Ayuso &state); 9731da177e4SLinus Torvalds 9741da177e4SLinus Torvalds /* 9751da177e4SLinus Torvalds * Keep copying data until we run out. 9761da177e4SLinus Torvalds */ 97779e49503SFlorian Westphal 9788a6a1f17SPablo Neira Ayuso while (state.left > 0) { 9798a6a1f17SPablo Neira Ayuso frag = ip6_frag_next(skb, &state); 9808a6a1f17SPablo Neira Ayuso if (IS_ERR(frag)) { 9818a6a1f17SPablo Neira Ayuso err = PTR_ERR(frag); 9821da177e4SLinus Torvalds goto fail; 9831da177e4SLinus Torvalds } 9841da177e4SLinus Torvalds 9851da177e4SLinus Torvalds /* 9861da177e4SLinus Torvalds * Put this fragment into the sending queue. 9871da177e4SLinus Torvalds */ 988a1ac9c8aSMartin KaFai Lau skb_set_delivery_time(frag, tstamp, mono_delivery_time); 9897d8c6e39SEric W. Biederman err = output(net, sk, frag); 9901da177e4SLinus Torvalds if (err) 9911da177e4SLinus Torvalds goto fail; 992dafee490SWei Dong 993adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 9943bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 9951da177e4SLinus Torvalds } 996adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 997a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGOKS); 998808db80aSEric Dumazet consume_skb(skb); 9991da177e4SLinus Torvalds return err; 10001da177e4SLinus Torvalds 1001485fca66SFlorian Westphal fail_toobig: 1002485fca66SFlorian Westphal if (skb->sk && dst_allfrag(skb_dst(skb))) 1003aba54656SEric Dumazet sk_gso_disable(skb->sk); 1004485fca66SFlorian Westphal 1005485fca66SFlorian Westphal icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 1006485fca66SFlorian Westphal err = -EMSGSIZE; 1007485fca66SFlorian Westphal 10081da177e4SLinus Torvalds fail: 1009adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 1010a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 10111da177e4SLinus Torvalds kfree_skb(skb); 10121da177e4SLinus Torvalds return err; 10131da177e4SLinus Torvalds } 10141da177e4SLinus Torvalds 1015b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key, 1016b71d1d42SEric Dumazet const struct in6_addr *fl_addr, 1017b71d1d42SEric Dumazet const struct in6_addr *addr_cache) 1018cf6b1982SYOSHIFUJI Hideaki { 1019a02cec21SEric Dumazet return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) && 102063159f29SIan Morris (!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache)); 1021cf6b1982SYOSHIFUJI Hideaki } 1022cf6b1982SYOSHIFUJI Hideaki 1023497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk, 1024497c615aSHerbert Xu struct dst_entry *dst, 1025b71d1d42SEric Dumazet const struct flowi6 *fl6) 10261da177e4SLinus Torvalds { 10271da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 1028a963a37dSEric Dumazet struct rt6_info *rt; 10291da177e4SLinus Torvalds 1030497c615aSHerbert Xu if (!dst) 1031497c615aSHerbert Xu goto out; 10321da177e4SLinus Torvalds 1033a963a37dSEric Dumazet if (dst->ops->family != AF_INET6) { 1034a963a37dSEric Dumazet dst_release(dst); 1035a963a37dSEric Dumazet return NULL; 1036a963a37dSEric Dumazet } 1037a963a37dSEric Dumazet 1038a963a37dSEric Dumazet rt = (struct rt6_info *)dst; 10391da177e4SLinus Torvalds /* Yes, checking route validity in not connected 1040d76e60a5SDavid S. Miller * case is not very simple. Take into account, 1041d76e60a5SDavid S. Miller * that we do not support routing by source, TOS, 1042d76e60a5SDavid S. Miller * and MSG_DONTROUTE --ANK (980726) 1043d76e60a5SDavid S. Miller * 1044cf6b1982SYOSHIFUJI Hideaki * 1. ip6_rt_check(): If route was host route, 1045cf6b1982SYOSHIFUJI Hideaki * check that cached destination is current. 1046d76e60a5SDavid S. Miller * If it is network route, we still may 1047d76e60a5SDavid S. Miller * check its validity using saved pointer 1048d76e60a5SDavid S. Miller * to the last used address: daddr_cache. 1049d76e60a5SDavid S. Miller * We do not want to save whole address now, 1050d76e60a5SDavid S. Miller * (because main consumer of this service 1051d76e60a5SDavid S. Miller * is tcp, which has not this problem), 1052d76e60a5SDavid S. Miller * so that the last trick works only on connected 1053d76e60a5SDavid S. Miller * sockets. 1054d76e60a5SDavid S. Miller * 2. oif also should be the same. 10551da177e4SLinus Torvalds */ 10564c9483b2SDavid S. Miller if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) || 10578e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES 10584c9483b2SDavid S. Miller ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) || 10598e1ef0a9SYOSHIFUJI Hideaki #endif 106040867d74SDavid Ahern (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex)) { 1061497c615aSHerbert Xu dst_release(dst); 1062497c615aSHerbert Xu dst = NULL; 10631da177e4SLinus Torvalds } 1064497c615aSHerbert Xu 1065497c615aSHerbert Xu out: 1066497c615aSHerbert Xu return dst; 10671da177e4SLinus Torvalds } 1068497c615aSHerbert Xu 10693aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, 10704c9483b2SDavid S. Miller struct dst_entry **dst, struct flowi6 *fl6) 1071497c615aSHerbert Xu { 107269cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 107369cce1d1SDavid S. Miller struct neighbour *n; 107497cac082SDavid S. Miller struct rt6_info *rt; 107569cce1d1SDavid S. Miller #endif 107669cce1d1SDavid S. Miller int err; 10776f21c96aSPaolo Abeni int flags = 0; 10781da177e4SLinus Torvalds 1079e16e888bSMarkus Stenberg /* The correct way to handle this would be to do 1080e16e888bSMarkus Stenberg * ip6_route_get_saddr, and then ip6_route_output; however, 1081e16e888bSMarkus Stenberg * the route-specific preferred source forces the 1082e16e888bSMarkus Stenberg * ip6_route_output call _before_ ip6_route_get_saddr. 1083e16e888bSMarkus Stenberg * 1084e16e888bSMarkus Stenberg * In source specific routing (no src=any default route), 1085e16e888bSMarkus Stenberg * ip6_route_output will fail given src=any saddr, though, so 1086e16e888bSMarkus Stenberg * that's why we try it again later. 1087e16e888bSMarkus Stenberg */ 1088c305b9e6Szhang kai if (ipv6_addr_any(&fl6->saddr)) { 1089a68886a6SDavid Ahern struct fib6_info *from; 1090e16e888bSMarkus Stenberg struct rt6_info *rt; 1091e16e888bSMarkus Stenberg 1092e16e888bSMarkus Stenberg *dst = ip6_route_output(net, sk, fl6); 1093e16e888bSMarkus Stenberg rt = (*dst)->error ? NULL : (struct rt6_info *)*dst; 1094a68886a6SDavid Ahern 1095a68886a6SDavid Ahern rcu_read_lock(); 1096a68886a6SDavid Ahern from = rt ? rcu_dereference(rt->from) : NULL; 1097a68886a6SDavid Ahern err = ip6_route_get_saddr(net, from, &fl6->daddr, 1098e16e888bSMarkus Stenberg sk ? inet6_sk(sk)->srcprefs : 0, 1099e16e888bSMarkus Stenberg &fl6->saddr); 1100a68886a6SDavid Ahern rcu_read_unlock(); 1101a68886a6SDavid Ahern 1102e16e888bSMarkus Stenberg if (err) 1103e16e888bSMarkus Stenberg goto out_err_release; 1104e16e888bSMarkus Stenberg 1105e16e888bSMarkus Stenberg /* If we had an erroneous initial result, pretend it 1106e16e888bSMarkus Stenberg * never existed and let the SA-enabled version take 1107e16e888bSMarkus Stenberg * over. 1108e16e888bSMarkus Stenberg */ 1109c305b9e6Szhang kai if ((*dst)->error) { 1110e16e888bSMarkus Stenberg dst_release(*dst); 1111e16e888bSMarkus Stenberg *dst = NULL; 1112e16e888bSMarkus Stenberg } 11136f21c96aSPaolo Abeni 11146f21c96aSPaolo Abeni if (fl6->flowi6_oif) 11156f21c96aSPaolo Abeni flags |= RT6_LOOKUP_F_IFACE; 1116e16e888bSMarkus Stenberg } 1117e16e888bSMarkus Stenberg 111863159f29SIan Morris if (!*dst) 11196f21c96aSPaolo Abeni *dst = ip6_route_output_flags(net, sk, fl6, flags); 11201da177e4SLinus Torvalds 1121e5d08d71SIan Morris err = (*dst)->error; 1122e5d08d71SIan Morris if (err) 11231da177e4SLinus Torvalds goto out_err_release; 11241da177e4SLinus Torvalds 112595c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 112695c385b4SNeil Horman /* 112795c385b4SNeil Horman * Here if the dst entry we've looked up 112895c385b4SNeil Horman * has a neighbour entry that is in the INCOMPLETE 112995c385b4SNeil Horman * state and the src address from the flow is 113095c385b4SNeil Horman * marked as OPTIMISTIC, we release the found 113195c385b4SNeil Horman * dst entry and replace it instead with the 113295c385b4SNeil Horman * dst entry of the nexthop router 113395c385b4SNeil Horman */ 1134c56bf6feSEric Dumazet rt = (struct rt6_info *) *dst; 1135707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 11362647a9b0SMartin KaFai Lau n = __ipv6_neigh_lookup_noref(rt->dst.dev, 11372647a9b0SMartin KaFai Lau rt6_nexthop(rt, &fl6->daddr)); 1138707be1ffSYOSHIFUJI Hideaki / 吉藤英明 err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0; 1139707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1140707be1ffSYOSHIFUJI Hideaki / 吉藤英明 1141707be1ffSYOSHIFUJI Hideaki / 吉藤英明 if (err) { 114295c385b4SNeil Horman struct inet6_ifaddr *ifp; 11434c9483b2SDavid S. Miller struct flowi6 fl_gw6; 114495c385b4SNeil Horman int redirect; 114595c385b4SNeil Horman 11464c9483b2SDavid S. Miller ifp = ipv6_get_ifaddr(net, &fl6->saddr, 11471cab3da6SDaniel Lezcano (*dst)->dev, 1); 114895c385b4SNeil Horman 114995c385b4SNeil Horman redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC); 115095c385b4SNeil Horman if (ifp) 115195c385b4SNeil Horman in6_ifa_put(ifp); 115295c385b4SNeil Horman 115395c385b4SNeil Horman if (redirect) { 115495c385b4SNeil Horman /* 115595c385b4SNeil Horman * We need to get the dst entry for the 115695c385b4SNeil Horman * default router instead 115795c385b4SNeil Horman */ 115895c385b4SNeil Horman dst_release(*dst); 11594c9483b2SDavid S. Miller memcpy(&fl_gw6, fl6, sizeof(struct flowi6)); 11604c9483b2SDavid S. Miller memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr)); 11614c9483b2SDavid S. Miller *dst = ip6_route_output(net, sk, &fl_gw6); 1162e5d08d71SIan Morris err = (*dst)->error; 1163e5d08d71SIan Morris if (err) 116495c385b4SNeil Horman goto out_err_release; 116595c385b4SNeil Horman } 116695c385b4SNeil Horman } 116795c385b4SNeil Horman #endif 1168ec5e3b0aSJonathan T. Leighton if (ipv6_addr_v4mapped(&fl6->saddr) && 116900ea1ceeSWillem de Bruijn !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) { 117000ea1ceeSWillem de Bruijn err = -EAFNOSUPPORT; 117100ea1ceeSWillem de Bruijn goto out_err_release; 117200ea1ceeSWillem de Bruijn } 117395c385b4SNeil Horman 11741da177e4SLinus Torvalds return 0; 11751da177e4SLinus Torvalds 11761da177e4SLinus Torvalds out_err_release: 11771da177e4SLinus Torvalds dst_release(*dst); 11781da177e4SLinus Torvalds *dst = NULL; 11798a966fc0SDavid Ahern 11800d240e78SDavid Ahern if (err == -ENETUNREACH) 11810d240e78SDavid Ahern IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES); 11821da177e4SLinus Torvalds return err; 11831da177e4SLinus Torvalds } 118434a0b3cdSAdrian Bunk 1185497c615aSHerbert Xu /** 1186497c615aSHerbert Xu * ip6_dst_lookup - perform route lookup on flow 1187b51cd7c8SAndrew Lunn * @net: Network namespace to perform lookup in 1188497c615aSHerbert Xu * @sk: socket which provides route info 1189497c615aSHerbert Xu * @dst: pointer to dst_entry * for result 11904c9483b2SDavid S. Miller * @fl6: flow to lookup 1191497c615aSHerbert Xu * 1192497c615aSHerbert Xu * This function performs a route lookup on the given flow. 1193497c615aSHerbert Xu * 1194497c615aSHerbert Xu * It returns zero on success, or a standard errno code on error. 1195497c615aSHerbert Xu */ 1196343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst, 1197343d60aaSRoopa Prabhu struct flowi6 *fl6) 1198497c615aSHerbert Xu { 1199497c615aSHerbert Xu *dst = NULL; 1200343d60aaSRoopa Prabhu return ip6_dst_lookup_tail(net, sk, dst, fl6); 1201497c615aSHerbert Xu } 12023cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup); 12033cf3dc6cSArnaldo Carvalho de Melo 1204497c615aSHerbert Xu /** 120568d0c6d3SDavid S. Miller * ip6_dst_lookup_flow - perform route lookup on flow with ipsec 1206b51cd7c8SAndrew Lunn * @net: Network namespace to perform lookup in 120768d0c6d3SDavid S. Miller * @sk: socket which provides route info 12084c9483b2SDavid S. Miller * @fl6: flow to lookup 120968d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 121068d0c6d3SDavid S. Miller * 121168d0c6d3SDavid S. Miller * This function performs a route lookup on the given flow. 121268d0c6d3SDavid S. Miller * 121368d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 121468d0c6d3SDavid S. Miller * error code. 121568d0c6d3SDavid S. Miller */ 1216c4e85f73SSabrina Dubroca struct dst_entry *ip6_dst_lookup_flow(struct net *net, const struct sock *sk, struct flowi6 *fl6, 12170e0d44abSSteffen Klassert const struct in6_addr *final_dst) 121868d0c6d3SDavid S. Miller { 121968d0c6d3SDavid S. Miller struct dst_entry *dst = NULL; 122068d0c6d3SDavid S. Miller int err; 122168d0c6d3SDavid S. Miller 1222c4e85f73SSabrina Dubroca err = ip6_dst_lookup_tail(net, sk, &dst, fl6); 122368d0c6d3SDavid S. Miller if (err) 122468d0c6d3SDavid S. Miller return ERR_PTR(err); 122568d0c6d3SDavid S. Miller if (final_dst) 12264e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 12272774c131SDavid S. Miller 1228c4e85f73SSabrina Dubroca return xfrm_lookup_route(net, dst, flowi6_to_flowi(fl6), sk, 0); 122968d0c6d3SDavid S. Miller } 123068d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow); 123168d0c6d3SDavid S. Miller 123268d0c6d3SDavid S. Miller /** 123368d0c6d3SDavid S. Miller * ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow 123468d0c6d3SDavid S. Miller * @sk: socket which provides the dst cache and route info 12354c9483b2SDavid S. Miller * @fl6: flow to lookup 123668d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 123796818159SAlexey Kodanev * @connected: whether @sk is connected or not 1238497c615aSHerbert Xu * 1239497c615aSHerbert Xu * This function performs a route lookup on the given flow with the 1240497c615aSHerbert Xu * possibility of using the cached route in the socket if it is valid. 1241497c615aSHerbert Xu * It will take the socket dst lock when operating on the dst cache. 1242497c615aSHerbert Xu * As a result, this function can only be used in process context. 1243497c615aSHerbert Xu * 124496818159SAlexey Kodanev * In addition, for a connected socket, cache the dst in the socket 124596818159SAlexey Kodanev * if the current cache is not valid. 124696818159SAlexey Kodanev * 124768d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 124868d0c6d3SDavid S. Miller * error code. 1249497c615aSHerbert Xu */ 12504c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6, 125196818159SAlexey Kodanev const struct in6_addr *final_dst, 125296818159SAlexey Kodanev bool connected) 1253497c615aSHerbert Xu { 125468d0c6d3SDavid S. Miller struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie); 1255497c615aSHerbert Xu 12564c9483b2SDavid S. Miller dst = ip6_sk_dst_check(sk, dst, fl6); 125796818159SAlexey Kodanev if (dst) 125896818159SAlexey Kodanev return dst; 125996818159SAlexey Kodanev 1260c4e85f73SSabrina Dubroca dst = ip6_dst_lookup_flow(sock_net(sk), sk, fl6, final_dst); 126196818159SAlexey Kodanev if (connected && !IS_ERR(dst)) 126296818159SAlexey Kodanev ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6); 126368d0c6d3SDavid S. Miller 126400bc0ef5SJakub Sitnicki return dst; 126568d0c6d3SDavid S. Miller } 126668d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow); 1267497c615aSHerbert Xu 1268571912c6SMartin Varghese /** 1269571912c6SMartin Varghese * ip6_dst_lookup_tunnel - perform route lookup on tunnel 1270571912c6SMartin Varghese * @skb: Packet for which lookup is done 1271571912c6SMartin Varghese * @dev: Tunnel device 1272571912c6SMartin Varghese * @net: Network namespace of tunnel device 1273b51cd7c8SAndrew Lunn * @sock: Socket which provides route info 1274571912c6SMartin Varghese * @saddr: Memory to store the src ip address 1275571912c6SMartin Varghese * @info: Tunnel information 1276571912c6SMartin Varghese * @protocol: IP protocol 1277b51cd7c8SAndrew Lunn * @use_cache: Flag to enable cache usage 1278571912c6SMartin Varghese * This function performs a route lookup on a tunnel 1279571912c6SMartin Varghese * 1280571912c6SMartin Varghese * It returns a valid dst pointer and stores src address to be used in 1281571912c6SMartin Varghese * tunnel in param saddr on success, else a pointer encoded error code. 1282571912c6SMartin Varghese */ 1283571912c6SMartin Varghese 1284571912c6SMartin Varghese struct dst_entry *ip6_dst_lookup_tunnel(struct sk_buff *skb, 1285571912c6SMartin Varghese struct net_device *dev, 1286571912c6SMartin Varghese struct net *net, 1287571912c6SMartin Varghese struct socket *sock, 1288571912c6SMartin Varghese struct in6_addr *saddr, 1289571912c6SMartin Varghese const struct ip_tunnel_info *info, 1290571912c6SMartin Varghese u8 protocol, 1291571912c6SMartin Varghese bool use_cache) 1292571912c6SMartin Varghese { 1293571912c6SMartin Varghese struct dst_entry *dst = NULL; 1294571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1295571912c6SMartin Varghese struct dst_cache *dst_cache; 1296571912c6SMartin Varghese #endif 1297571912c6SMartin Varghese struct flowi6 fl6; 1298571912c6SMartin Varghese __u8 prio; 1299571912c6SMartin Varghese 1300571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1301571912c6SMartin Varghese dst_cache = (struct dst_cache *)&info->dst_cache; 1302571912c6SMartin Varghese if (use_cache) { 1303571912c6SMartin Varghese dst = dst_cache_get_ip6(dst_cache, saddr); 1304571912c6SMartin Varghese if (dst) 1305571912c6SMartin Varghese return dst; 1306571912c6SMartin Varghese } 1307571912c6SMartin Varghese #endif 1308571912c6SMartin Varghese memset(&fl6, 0, sizeof(fl6)); 1309571912c6SMartin Varghese fl6.flowi6_mark = skb->mark; 1310571912c6SMartin Varghese fl6.flowi6_proto = protocol; 1311571912c6SMartin Varghese fl6.daddr = info->key.u.ipv6.dst; 1312571912c6SMartin Varghese fl6.saddr = info->key.u.ipv6.src; 1313571912c6SMartin Varghese prio = info->key.tos; 1314571912c6SMartin Varghese fl6.flowlabel = ip6_make_flowinfo(RT_TOS(prio), 1315571912c6SMartin Varghese info->key.label); 1316571912c6SMartin Varghese 1317571912c6SMartin Varghese dst = ipv6_stub->ipv6_dst_lookup_flow(net, sock->sk, &fl6, 1318571912c6SMartin Varghese NULL); 1319571912c6SMartin Varghese if (IS_ERR(dst)) { 1320571912c6SMartin Varghese netdev_dbg(dev, "no route to %pI6\n", &fl6.daddr); 1321571912c6SMartin Varghese return ERR_PTR(-ENETUNREACH); 1322571912c6SMartin Varghese } 1323571912c6SMartin Varghese if (dst->dev == dev) { /* is this necessary? */ 1324571912c6SMartin Varghese netdev_dbg(dev, "circular route to %pI6\n", &fl6.daddr); 1325571912c6SMartin Varghese dst_release(dst); 1326571912c6SMartin Varghese return ERR_PTR(-ELOOP); 1327571912c6SMartin Varghese } 1328571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1329571912c6SMartin Varghese if (use_cache) 1330571912c6SMartin Varghese dst_cache_set_ip6(dst_cache, dst, &fl6.saddr); 1331571912c6SMartin Varghese #endif 1332571912c6SMartin Varghese *saddr = fl6.saddr; 1333571912c6SMartin Varghese return dst; 1334571912c6SMartin Varghese } 1335571912c6SMartin Varghese EXPORT_SYMBOL_GPL(ip6_dst_lookup_tunnel); 1336571912c6SMartin Varghese 13370178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src, 13380178b695SHerbert Xu gfp_t gfp) 13390178b695SHerbert Xu { 13400178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 13410178b695SHerbert Xu } 13420178b695SHerbert Xu 13430178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src, 13440178b695SHerbert Xu gfp_t gfp) 13450178b695SHerbert Xu { 13460178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 13470178b695SHerbert Xu } 13480178b695SHerbert Xu 134975a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu, 13500c183379SGao feng int *maxfraglen, 13510c183379SGao feng unsigned int fragheaderlen, 13520c183379SGao feng struct sk_buff *skb, 135375a493e6SHannes Frederic Sowa struct rt6_info *rt, 1354e367c2d0Slucien unsigned int orig_mtu) 13550c183379SGao feng { 13560c183379SGao feng if (!(rt->dst.flags & DST_XFRM_TUNNEL)) { 135763159f29SIan Morris if (!skb) { 13580c183379SGao feng /* first fragment, reserve header_len */ 1359e367c2d0Slucien *mtu = orig_mtu - rt->dst.header_len; 13600c183379SGao feng 13610c183379SGao feng } else { 13620c183379SGao feng /* 13630c183379SGao feng * this fragment is not first, the headers 13640c183379SGao feng * space is regarded as data space. 13650c183379SGao feng */ 1366e367c2d0Slucien *mtu = orig_mtu; 13670c183379SGao feng } 13680c183379SGao feng *maxfraglen = ((*mtu - fragheaderlen) & ~7) 13690c183379SGao feng + fragheaderlen - sizeof(struct frag_hdr); 13700c183379SGao feng } 13710c183379SGao feng } 13720c183379SGao feng 1373366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork, 137426879da5SWei Wang struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6, 1375f37a4cc6SPavel Begunkov struct rt6_info *rt) 1376366e41d9SVlad Yasevich { 1377366e41d9SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 1378366e41d9SVlad Yasevich unsigned int mtu; 1379d656b2eaSPavel Begunkov struct ipv6_txoptions *nopt, *opt = ipc6->opt; 1380366e41d9SVlad Yasevich 138140ac240cSPavel Begunkov /* callers pass dst together with a reference, set it first so 138240ac240cSPavel Begunkov * ip6_cork_release() can put it down even in case of an error. 138340ac240cSPavel Begunkov */ 138440ac240cSPavel Begunkov cork->base.dst = &rt->dst; 138540ac240cSPavel Begunkov 1386366e41d9SVlad Yasevich /* 1387366e41d9SVlad Yasevich * setup for corking 1388366e41d9SVlad Yasevich */ 1389366e41d9SVlad Yasevich if (opt) { 1390366e41d9SVlad Yasevich if (WARN_ON(v6_cork->opt)) 1391366e41d9SVlad Yasevich return -EINVAL; 1392366e41d9SVlad Yasevich 1393d656b2eaSPavel Begunkov nopt = v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation); 1394d656b2eaSPavel Begunkov if (unlikely(!nopt)) 1395366e41d9SVlad Yasevich return -ENOBUFS; 1396366e41d9SVlad Yasevich 1397d656b2eaSPavel Begunkov nopt->tot_len = sizeof(*opt); 1398d656b2eaSPavel Begunkov nopt->opt_flen = opt->opt_flen; 1399d656b2eaSPavel Begunkov nopt->opt_nflen = opt->opt_nflen; 1400366e41d9SVlad Yasevich 1401d656b2eaSPavel Begunkov nopt->dst0opt = ip6_opt_dup(opt->dst0opt, sk->sk_allocation); 1402d656b2eaSPavel Begunkov if (opt->dst0opt && !nopt->dst0opt) 1403366e41d9SVlad Yasevich return -ENOBUFS; 1404366e41d9SVlad Yasevich 1405d656b2eaSPavel Begunkov nopt->dst1opt = ip6_opt_dup(opt->dst1opt, sk->sk_allocation); 1406d656b2eaSPavel Begunkov if (opt->dst1opt && !nopt->dst1opt) 1407366e41d9SVlad Yasevich return -ENOBUFS; 1408366e41d9SVlad Yasevich 1409d656b2eaSPavel Begunkov nopt->hopopt = ip6_opt_dup(opt->hopopt, sk->sk_allocation); 1410d656b2eaSPavel Begunkov if (opt->hopopt && !nopt->hopopt) 1411366e41d9SVlad Yasevich return -ENOBUFS; 1412366e41d9SVlad Yasevich 1413d656b2eaSPavel Begunkov nopt->srcrt = ip6_rthdr_dup(opt->srcrt, sk->sk_allocation); 1414d656b2eaSPavel Begunkov if (opt->srcrt && !nopt->srcrt) 1415366e41d9SVlad Yasevich return -ENOBUFS; 1416366e41d9SVlad Yasevich 1417366e41d9SVlad Yasevich /* need source address above miyazawa*/ 1418366e41d9SVlad Yasevich } 141926879da5SWei Wang v6_cork->hop_limit = ipc6->hlimit; 142026879da5SWei Wang v6_cork->tclass = ipc6->tclass; 1421366e41d9SVlad Yasevich if (rt->dst.flags & DST_XFRM_TUNNEL) 1422366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1423749439bfSMike Maloney READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst); 1424366e41d9SVlad Yasevich else 1425366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1426c02b3741SDavid S. Miller READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst)); 1427366e41d9SVlad Yasevich if (np->frag_size < mtu) { 1428366e41d9SVlad Yasevich if (np->frag_size) 1429366e41d9SVlad Yasevich mtu = np->frag_size; 1430366e41d9SVlad Yasevich } 1431366e41d9SVlad Yasevich cork->base.fragsize = mtu; 1432fbf47813SWillem de Bruijn cork->base.gso_size = ipc6->gso_size; 1433678ca42dSWillem de Bruijn cork->base.tx_flags = 0; 1434c6af0c22SWillem de Bruijn cork->base.mark = ipc6->sockc.mark; 1435678ca42dSWillem de Bruijn sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags); 1436bec1f6f6SWillem de Bruijn 14370f6c480fSDavid Miller if (dst_allfrag(xfrm_dst_path(&rt->dst))) 1438366e41d9SVlad Yasevich cork->base.flags |= IPCORK_ALLFRAG; 1439366e41d9SVlad Yasevich cork->base.length = 0; 1440366e41d9SVlad Yasevich 14415fdaa88dSWillem de Bruijn cork->base.transmit_time = ipc6->sockc.transmit_time; 1442a818f75eSJesus Sanchez-Palencia 1443366e41d9SVlad Yasevich return 0; 1444366e41d9SVlad Yasevich } 1445366e41d9SVlad Yasevich 14460bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk, 14470bbe84a6SVlad Yasevich struct sk_buff_head *queue, 1448f3b46a3eSPavel Begunkov struct inet_cork_full *cork_full, 14490bbe84a6SVlad Yasevich struct inet6_cork *v6_cork, 14500bbe84a6SVlad Yasevich struct page_frag *pfrag, 14510bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, 14520bbe84a6SVlad Yasevich int len, int odd, struct sk_buff *skb), 1453f93431c8SWang Yufen void *from, size_t length, int transhdrlen, 14545fdaa88dSWillem de Bruijn unsigned int flags, struct ipcm6_cookie *ipc6) 14551da177e4SLinus Torvalds { 14560c183379SGao feng struct sk_buff *skb, *skb_prev = NULL; 1457f3b46a3eSPavel Begunkov struct inet_cork *cork = &cork_full->base; 1458f37a4cc6SPavel Begunkov struct flowi6 *fl6 = &cork_full->fl.u.ip6; 145910b8a3deSPaolo Abeni unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu; 1460b5947e5dSWillem de Bruijn struct ubuf_info *uarg = NULL; 14610bbe84a6SVlad Yasevich int exthdrlen = 0; 14620bbe84a6SVlad Yasevich int dst_exthdrlen = 0; 14631da177e4SLinus Torvalds int hh_len; 14641da177e4SLinus Torvalds int copy; 14651da177e4SLinus Torvalds int err; 14661da177e4SLinus Torvalds int offset = 0; 1467773ba4feSPavel Begunkov bool zc = false; 146809c2d251SWillem de Bruijn u32 tskey = 0; 14690bbe84a6SVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->dst; 14700bbe84a6SVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 147132dce968SVlad Yasevich int csummode = CHECKSUM_NONE; 1472682b1a9dSHannes Frederic Sowa unsigned int maxnonfragsize, headersize; 14731f4c6eb2SEric Dumazet unsigned int wmem_alloc_delta = 0; 1474100f6d8eSWillem de Bruijn bool paged, extra_uref = false; 14751da177e4SLinus Torvalds 14760bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 14770bbe84a6SVlad Yasevich if (!skb) { 14780bbe84a6SVlad Yasevich exthdrlen = opt ? opt->opt_flen : 0; 14797efdba5bSRomain KUNTZ dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len; 14801da177e4SLinus Torvalds } 14810bbe84a6SVlad Yasevich 148215e36f5bSWillem de Bruijn paged = !!cork->gso_size; 1483bec1f6f6SWillem de Bruijn mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize; 1484e367c2d0Slucien orig_mtu = mtu; 14851da177e4SLinus Torvalds 1486678ca42dSWillem de Bruijn if (cork->tx_flags & SKBTX_ANY_SW_TSTAMP && 1487678ca42dSWillem de Bruijn sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID) 1488a1cdec57SEric Dumazet tskey = atomic_inc_return(&sk->sk_tskey) - 1; 1489678ca42dSWillem de Bruijn 1490d8d1f30bSChangli Gao hh_len = LL_RESERVED_SPACE(rt->dst.dev); 14911da177e4SLinus Torvalds 1492a1b05140SMasahide NAKAMURA fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len + 1493b4ce9277SHerbert Xu (opt ? opt->opt_nflen : 0); 14941da177e4SLinus Torvalds 14954df98e76SHannes Frederic Sowa headersize = sizeof(struct ipv6hdr) + 14963a1cebe7SHannes Frederic Sowa (opt ? opt->opt_flen + opt->opt_nflen : 0) + 14974df98e76SHannes Frederic Sowa (dst_allfrag(&rt->dst) ? 14984df98e76SHannes Frederic Sowa sizeof(struct frag_hdr) : 0) + 14994df98e76SHannes Frederic Sowa rt->rt6i_nfheader_len; 15004df98e76SHannes Frederic Sowa 15015e34af41STadeusz Struk if (mtu <= fragheaderlen || 15025e34af41STadeusz Struk ((mtu - fragheaderlen) & ~7) + fragheaderlen <= sizeof(struct frag_hdr)) 15036596a022SJiri Bohac goto emsgsize; 15046596a022SJiri Bohac 15056596a022SJiri Bohac maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen - 15066596a022SJiri Bohac sizeof(struct frag_hdr); 15076596a022SJiri Bohac 150810b8a3deSPaolo Abeni /* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit 150910b8a3deSPaolo Abeni * the first fragment 151010b8a3deSPaolo Abeni */ 151110b8a3deSPaolo Abeni if (headersize + transhdrlen > mtu) 151210b8a3deSPaolo Abeni goto emsgsize; 151310b8a3deSPaolo Abeni 151426879da5SWei Wang if (cork->length + length > mtu - headersize && ipc6->dontfrag && 15154df98e76SHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP || 151613651224SJakub Kicinski sk->sk_protocol == IPPROTO_ICMPV6 || 15174df98e76SHannes Frederic Sowa sk->sk_protocol == IPPROTO_RAW)) { 15184df98e76SHannes Frederic Sowa ipv6_local_rxpmtu(sk, fl6, mtu - headersize + 15194df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 15204df98e76SHannes Frederic Sowa goto emsgsize; 15214df98e76SHannes Frederic Sowa } 15224df98e76SHannes Frederic Sowa 1523682b1a9dSHannes Frederic Sowa if (ip6_sk_ignore_df(sk)) 1524682b1a9dSHannes Frederic Sowa maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN; 1525682b1a9dSHannes Frederic Sowa else 1526682b1a9dSHannes Frederic Sowa maxnonfragsize = mtu; 1527682b1a9dSHannes Frederic Sowa 15284df98e76SHannes Frederic Sowa if (cork->length + length > maxnonfragsize - headersize) { 15294df98e76SHannes Frederic Sowa emsgsize: 153010b8a3deSPaolo Abeni pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0); 153110b8a3deSPaolo Abeni ipv6_local_error(sk, EMSGSIZE, fl6, pmtu); 15321da177e4SLinus Torvalds return -EMSGSIZE; 15331da177e4SLinus Torvalds } 1534682b1a9dSHannes Frederic Sowa 1535682b1a9dSHannes Frederic Sowa /* CHECKSUM_PARTIAL only with no extension headers and when 1536682b1a9dSHannes Frederic Sowa * we are not going to fragment 1537682b1a9dSHannes Frederic Sowa */ 1538682b1a9dSHannes Frederic Sowa if (transhdrlen && sk->sk_protocol == IPPROTO_UDP && 1539682b1a9dSHannes Frederic Sowa headersize == sizeof(struct ipv6hdr) && 15402b89ed65SVlad Yasevich length <= mtu - headersize && 1541bec1f6f6SWillem de Bruijn (!(flags & MSG_MORE) || cork->gso_size) && 1542c8cd0989STom Herbert rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM)) 1543682b1a9dSHannes Frederic Sowa csummode = CHECKSUM_PARTIAL; 15441da177e4SLinus Torvalds 1545*1fd3ae8cSPavel Begunkov if ((flags & MSG_ZEROCOPY) && length) { 1546*1fd3ae8cSPavel Begunkov struct msghdr *msg = from; 1547*1fd3ae8cSPavel Begunkov 1548*1fd3ae8cSPavel Begunkov if (getfrag == ip_generic_getfrag && msg->msg_ubuf) { 1549*1fd3ae8cSPavel Begunkov if (skb_zcopy(skb) && msg->msg_ubuf != skb_zcopy(skb)) 1550*1fd3ae8cSPavel Begunkov return -EINVAL; 1551*1fd3ae8cSPavel Begunkov 1552*1fd3ae8cSPavel Begunkov /* Leave uarg NULL if can't zerocopy, callers should 1553*1fd3ae8cSPavel Begunkov * be able to handle it. 1554*1fd3ae8cSPavel Begunkov */ 1555*1fd3ae8cSPavel Begunkov if ((rt->dst.dev->features & NETIF_F_SG) && 1556*1fd3ae8cSPavel Begunkov csummode == CHECKSUM_PARTIAL) { 1557*1fd3ae8cSPavel Begunkov paged = true; 1558*1fd3ae8cSPavel Begunkov zc = true; 1559*1fd3ae8cSPavel Begunkov uarg = msg->msg_ubuf; 1560*1fd3ae8cSPavel Begunkov } 1561*1fd3ae8cSPavel Begunkov } else if (sock_flag(sk, SOCK_ZEROCOPY)) { 15628c793822SJonathan Lemon uarg = msg_zerocopy_realloc(sk, length, skb_zcopy(skb)); 1563b5947e5dSWillem de Bruijn if (!uarg) 1564b5947e5dSWillem de Bruijn return -ENOBUFS; 1565522924b5SWillem de Bruijn extra_uref = !skb_zcopy(skb); /* only ref on new uarg */ 1566b5947e5dSWillem de Bruijn if (rt->dst.dev->features & NETIF_F_SG && 1567b5947e5dSWillem de Bruijn csummode == CHECKSUM_PARTIAL) { 1568b5947e5dSWillem de Bruijn paged = true; 1569773ba4feSPavel Begunkov zc = true; 1570b5947e5dSWillem de Bruijn } else { 1571b5947e5dSWillem de Bruijn uarg->zerocopy = 0; 157252900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 1573b5947e5dSWillem de Bruijn } 1574b5947e5dSWillem de Bruijn } 1575*1fd3ae8cSPavel Begunkov } 1576b5947e5dSWillem de Bruijn 15771da177e4SLinus Torvalds /* 15781da177e4SLinus Torvalds * Let's try using as much space as possible. 15791da177e4SLinus Torvalds * Use MTU if total length of the message fits into the MTU. 15801da177e4SLinus Torvalds * Otherwise, we need to reserve fragment header and 15811da177e4SLinus Torvalds * fragment alignment (= 8-15 octects, in total). 15821da177e4SLinus Torvalds * 1583634a63e7SRandy Dunlap * Note that we may need to "move" the data from the tail 15841da177e4SLinus Torvalds * of the buffer to the new fragment when we split 15851da177e4SLinus Torvalds * the message. 15861da177e4SLinus Torvalds * 15871da177e4SLinus Torvalds * FIXME: It may be fragmented into multiple chunks 15881da177e4SLinus Torvalds * at once if non-fragmentable extension headers 15891da177e4SLinus Torvalds * are too large. 15901da177e4SLinus Torvalds * --yoshfuji 15911da177e4SLinus Torvalds */ 15921da177e4SLinus Torvalds 15932811ebacSHannes Frederic Sowa cork->length += length; 15942811ebacSHannes Frederic Sowa if (!skb) 15951da177e4SLinus Torvalds goto alloc_new_skb; 15961da177e4SLinus Torvalds 15971da177e4SLinus Torvalds while (length > 0) { 15981da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 1599bdc712b4SDavid S. Miller copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len; 16001da177e4SLinus Torvalds if (copy < length) 16011da177e4SLinus Torvalds copy = maxfraglen - skb->len; 16021da177e4SLinus Torvalds 16031da177e4SLinus Torvalds if (copy <= 0) { 16041da177e4SLinus Torvalds char *data; 16051da177e4SLinus Torvalds unsigned int datalen; 16061da177e4SLinus Torvalds unsigned int fraglen; 16071da177e4SLinus Torvalds unsigned int fraggap; 16086d123b81SJakub Kicinski unsigned int alloclen, alloc_extra; 1609aba36930SWillem de Bruijn unsigned int pagedlen; 16101da177e4SLinus Torvalds alloc_new_skb: 16111da177e4SLinus Torvalds /* There's no room in the current skb */ 16120c183379SGao feng if (skb) 16130c183379SGao feng fraggap = skb->len - maxfraglen; 16141da177e4SLinus Torvalds else 16151da177e4SLinus Torvalds fraggap = 0; 16160c183379SGao feng /* update mtu and maxfraglen if necessary */ 161763159f29SIan Morris if (!skb || !skb_prev) 16180c183379SGao feng ip6_append_data_mtu(&mtu, &maxfraglen, 161975a493e6SHannes Frederic Sowa fragheaderlen, skb, rt, 1620e367c2d0Slucien orig_mtu); 16210c183379SGao feng 16220c183379SGao feng skb_prev = skb; 16231da177e4SLinus Torvalds 16241da177e4SLinus Torvalds /* 16251da177e4SLinus Torvalds * If remaining data exceeds the mtu, 16261da177e4SLinus Torvalds * we know we need more fragment(s). 16271da177e4SLinus Torvalds */ 16281da177e4SLinus Torvalds datalen = length + fraggap; 16291da177e4SLinus Torvalds 16300c183379SGao feng if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen) 16310c183379SGao feng datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len; 163215e36f5bSWillem de Bruijn fraglen = datalen + fragheaderlen; 1633aba36930SWillem de Bruijn pagedlen = 0; 163415e36f5bSWillem de Bruijn 16356d123b81SJakub Kicinski alloc_extra = hh_len; 16366d123b81SJakub Kicinski alloc_extra += dst_exthdrlen; 16376d123b81SJakub Kicinski alloc_extra += rt->dst.trailer_len; 16386d123b81SJakub Kicinski 16396d123b81SJakub Kicinski /* We just reserve space for fragment header. 16406d123b81SJakub Kicinski * Note: this may be overallocation if the message 16416d123b81SJakub Kicinski * (without MSG_MORE) fits into the MTU. 16426d123b81SJakub Kicinski */ 16436d123b81SJakub Kicinski alloc_extra += sizeof(struct frag_hdr); 16446d123b81SJakub Kicinski 16451da177e4SLinus Torvalds if ((flags & MSG_MORE) && 1646d8d1f30bSChangli Gao !(rt->dst.dev->features&NETIF_F_SG)) 16471da177e4SLinus Torvalds alloclen = mtu; 16486d123b81SJakub Kicinski else if (!paged && 16496d123b81SJakub Kicinski (fraglen + alloc_extra < SKB_MAX_ALLOC || 16506d123b81SJakub Kicinski !(rt->dst.dev->features & NETIF_F_SG))) 165115e36f5bSWillem de Bruijn alloclen = fraglen; 1652773ba4feSPavel Begunkov else if (!zc) { 165315e36f5bSWillem de Bruijn alloclen = min_t(int, fraglen, MAX_HEADER); 165415e36f5bSWillem de Bruijn pagedlen = fraglen - alloclen; 1655773ba4feSPavel Begunkov } else { 1656773ba4feSPavel Begunkov alloclen = fragheaderlen + transhdrlen; 1657773ba4feSPavel Begunkov pagedlen = datalen - transhdrlen; 165815e36f5bSWillem de Bruijn } 16596d123b81SJakub Kicinski alloclen += alloc_extra; 1660299b0767SSteffen Klassert 16610c183379SGao feng if (datalen != length + fraggap) { 16621da177e4SLinus Torvalds /* 16630c183379SGao feng * this is not the last fragment, the trailer 16640c183379SGao feng * space is regarded as data space. 16651da177e4SLinus Torvalds */ 16660c183379SGao feng datalen += rt->dst.trailer_len; 16670c183379SGao feng } 16680c183379SGao feng 16690c183379SGao feng fraglen = datalen + fragheaderlen; 16701da177e4SLinus Torvalds 167115e36f5bSWillem de Bruijn copy = datalen - transhdrlen - fraggap - pagedlen; 1672232cd35dSEric Dumazet if (copy < 0) { 1673232cd35dSEric Dumazet err = -EINVAL; 1674232cd35dSEric Dumazet goto error; 1675232cd35dSEric Dumazet } 16761da177e4SLinus Torvalds if (transhdrlen) { 16776d123b81SJakub Kicinski skb = sock_alloc_send_skb(sk, alloclen, 16781da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 16791da177e4SLinus Torvalds } else { 16801da177e4SLinus Torvalds skb = NULL; 16811f4c6eb2SEric Dumazet if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <= 16821da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 16836d123b81SJakub Kicinski skb = alloc_skb(alloclen, 16841da177e4SLinus Torvalds sk->sk_allocation); 168563159f29SIan Morris if (unlikely(!skb)) 16861da177e4SLinus Torvalds err = -ENOBUFS; 16871da177e4SLinus Torvalds } 168863159f29SIan Morris if (!skb) 16891da177e4SLinus Torvalds goto error; 16901da177e4SLinus Torvalds /* 16911da177e4SLinus Torvalds * Fill in the control structures 16921da177e4SLinus Torvalds */ 16939c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 169432dce968SVlad Yasevich skb->ip_summed = csummode; 16951da177e4SLinus Torvalds skb->csum = 0; 16961f85851eSGao feng /* reserve for fragmentation and ipsec header */ 16971f85851eSGao feng skb_reserve(skb, hh_len + sizeof(struct frag_hdr) + 16981f85851eSGao feng dst_exthdrlen); 16991da177e4SLinus Torvalds 17001da177e4SLinus Torvalds /* 17011da177e4SLinus Torvalds * Find where to start putting bytes 17021da177e4SLinus Torvalds */ 170315e36f5bSWillem de Bruijn data = skb_put(skb, fraglen - pagedlen); 17041f85851eSGao feng skb_set_network_header(skb, exthdrlen); 17051f85851eSGao feng data += fragheaderlen; 1706b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1707b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 17081da177e4SLinus Torvalds if (fraggap) { 17091da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 17101da177e4SLinus Torvalds skb_prev, maxfraglen, 17118d5930dfSAl Viro data + transhdrlen, fraggap); 17121da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 17131da177e4SLinus Torvalds skb->csum); 17141da177e4SLinus Torvalds data += fraggap; 1715e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 17161da177e4SLinus Torvalds } 1717232cd35dSEric Dumazet if (copy > 0 && 1718232cd35dSEric Dumazet getfrag(from, data + transhdrlen, offset, 1719232cd35dSEric Dumazet copy, fraggap, skb) < 0) { 17201da177e4SLinus Torvalds err = -EFAULT; 17211da177e4SLinus Torvalds kfree_skb(skb); 17221da177e4SLinus Torvalds goto error; 17231da177e4SLinus Torvalds } 17241da177e4SLinus Torvalds 17251da177e4SLinus Torvalds offset += copy; 172615e36f5bSWillem de Bruijn length -= copy + transhdrlen; 17271da177e4SLinus Torvalds transhdrlen = 0; 17281da177e4SLinus Torvalds exthdrlen = 0; 1729299b0767SSteffen Klassert dst_exthdrlen = 0; 17301da177e4SLinus Torvalds 173152900d22SWillem de Bruijn /* Only the initial fragment is time stamped */ 173252900d22SWillem de Bruijn skb_shinfo(skb)->tx_flags = cork->tx_flags; 173352900d22SWillem de Bruijn cork->tx_flags = 0; 173452900d22SWillem de Bruijn skb_shinfo(skb)->tskey = tskey; 173552900d22SWillem de Bruijn tskey = 0; 173652900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 173752900d22SWillem de Bruijn 17380dec879fSJulian Anastasov if ((flags & MSG_CONFIRM) && !skb_prev) 17390dec879fSJulian Anastasov skb_set_dst_pending_confirm(skb, 1); 17400dec879fSJulian Anastasov 17411da177e4SLinus Torvalds /* 17421da177e4SLinus Torvalds * Put the packet on the pending queue 17431da177e4SLinus Torvalds */ 17441f4c6eb2SEric Dumazet if (!skb->destructor) { 17451f4c6eb2SEric Dumazet skb->destructor = sock_wfree; 17461f4c6eb2SEric Dumazet skb->sk = sk; 17471f4c6eb2SEric Dumazet wmem_alloc_delta += skb->truesize; 17481f4c6eb2SEric Dumazet } 17490bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 17501da177e4SLinus Torvalds continue; 17511da177e4SLinus Torvalds } 17521da177e4SLinus Torvalds 17531da177e4SLinus Torvalds if (copy > length) 17541da177e4SLinus Torvalds copy = length; 17551da177e4SLinus Torvalds 1756113f99c3SWillem de Bruijn if (!(rt->dst.dev->features&NETIF_F_SG) && 1757113f99c3SWillem de Bruijn skb_tailroom(skb) >= copy) { 17581da177e4SLinus Torvalds unsigned int off; 17591da177e4SLinus Torvalds 17601da177e4SLinus Torvalds off = skb->len; 17611da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 17621da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 17631da177e4SLinus Torvalds __skb_trim(skb, off); 17641da177e4SLinus Torvalds err = -EFAULT; 17651da177e4SLinus Torvalds goto error; 17661da177e4SLinus Torvalds } 1767*1fd3ae8cSPavel Begunkov } else if (!zc) { 17681da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 17691da177e4SLinus Torvalds 17701da177e4SLinus Torvalds err = -ENOMEM; 17715640f768SEric Dumazet if (!sk_page_frag_refill(sk, pfrag)) 17721da177e4SLinus Torvalds goto error; 17731da177e4SLinus Torvalds 1774*1fd3ae8cSPavel Begunkov skb_zcopy_downgrade_managed(skb); 17755640f768SEric Dumazet if (!skb_can_coalesce(skb, i, pfrag->page, 17765640f768SEric Dumazet pfrag->offset)) { 17771da177e4SLinus Torvalds err = -EMSGSIZE; 17785640f768SEric Dumazet if (i == MAX_SKB_FRAGS) 17791da177e4SLinus Torvalds goto error; 17805640f768SEric Dumazet 17815640f768SEric Dumazet __skb_fill_page_desc(skb, i, pfrag->page, 17825640f768SEric Dumazet pfrag->offset, 0); 17835640f768SEric Dumazet skb_shinfo(skb)->nr_frags = ++i; 17845640f768SEric Dumazet get_page(pfrag->page); 17851da177e4SLinus Torvalds } 17865640f768SEric Dumazet copy = min_t(int, copy, pfrag->size - pfrag->offset); 17879e903e08SEric Dumazet if (getfrag(from, 17885640f768SEric Dumazet page_address(pfrag->page) + pfrag->offset, 17895640f768SEric Dumazet offset, copy, skb->len, skb) < 0) 17905640f768SEric Dumazet goto error_efault; 17915640f768SEric Dumazet 17925640f768SEric Dumazet pfrag->offset += copy; 17935640f768SEric Dumazet skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy); 17941da177e4SLinus Torvalds skb->len += copy; 17951da177e4SLinus Torvalds skb->data_len += copy; 1796f945fa7aSHerbert Xu skb->truesize += copy; 17971f4c6eb2SEric Dumazet wmem_alloc_delta += copy; 1798b5947e5dSWillem de Bruijn } else { 1799b5947e5dSWillem de Bruijn err = skb_zerocopy_iter_dgram(skb, from, copy); 1800b5947e5dSWillem de Bruijn if (err < 0) 1801b5947e5dSWillem de Bruijn goto error; 18021da177e4SLinus Torvalds } 18031da177e4SLinus Torvalds offset += copy; 18041da177e4SLinus Torvalds length -= copy; 18051da177e4SLinus Torvalds } 18065640f768SEric Dumazet 18079e8445a5SPaolo Abeni if (wmem_alloc_delta) 18081f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 18091da177e4SLinus Torvalds return 0; 18105640f768SEric Dumazet 18115640f768SEric Dumazet error_efault: 18125640f768SEric Dumazet err = -EFAULT; 18131da177e4SLinus Torvalds error: 18148e044917SJonathan Lemon net_zcopy_put_abort(uarg, extra_uref); 1815bdc712b4SDavid S. Miller cork->length -= length; 18163bd653c8SDenis V. Lunev IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS); 18171f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 18181da177e4SLinus Torvalds return err; 18191da177e4SLinus Torvalds } 18200bbe84a6SVlad Yasevich 18210bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk, 18220bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, int len, 18230bbe84a6SVlad Yasevich int odd, struct sk_buff *skb), 1824f93431c8SWang Yufen void *from, size_t length, int transhdrlen, 182526879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 18265fdaa88dSWillem de Bruijn struct rt6_info *rt, unsigned int flags) 18270bbe84a6SVlad Yasevich { 18280bbe84a6SVlad Yasevich struct inet_sock *inet = inet_sk(sk); 18290bbe84a6SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 18300bbe84a6SVlad Yasevich int exthdrlen; 18310bbe84a6SVlad Yasevich int err; 18320bbe84a6SVlad Yasevich 18330bbe84a6SVlad Yasevich if (flags&MSG_PROBE) 18340bbe84a6SVlad Yasevich return 0; 18350bbe84a6SVlad Yasevich if (skb_queue_empty(&sk->sk_write_queue)) { 18360bbe84a6SVlad Yasevich /* 18370bbe84a6SVlad Yasevich * setup for corking 18380bbe84a6SVlad Yasevich */ 183940ac240cSPavel Begunkov dst_hold(&rt->dst); 184026879da5SWei Wang err = ip6_setup_cork(sk, &inet->cork, &np->cork, 1841f37a4cc6SPavel Begunkov ipc6, rt); 18420bbe84a6SVlad Yasevich if (err) 18430bbe84a6SVlad Yasevich return err; 18440bbe84a6SVlad Yasevich 1845f37a4cc6SPavel Begunkov inet->cork.fl.u.ip6 = *fl6; 184626879da5SWei Wang exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 18470bbe84a6SVlad Yasevich length += exthdrlen; 18480bbe84a6SVlad Yasevich transhdrlen += exthdrlen; 18490bbe84a6SVlad Yasevich } else { 18500bbe84a6SVlad Yasevich transhdrlen = 0; 18510bbe84a6SVlad Yasevich } 18520bbe84a6SVlad Yasevich 1853f37a4cc6SPavel Begunkov return __ip6_append_data(sk, &sk->sk_write_queue, &inet->cork, 18540bbe84a6SVlad Yasevich &np->cork, sk_page_frag(sk), getfrag, 18555fdaa88dSWillem de Bruijn from, length, transhdrlen, flags, ipc6); 18560bbe84a6SVlad Yasevich } 1857a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data); 18581da177e4SLinus Torvalds 1859cd3c7480SPavel Begunkov static void ip6_cork_steal_dst(struct sk_buff *skb, struct inet_cork_full *cork) 1860cd3c7480SPavel Begunkov { 1861cd3c7480SPavel Begunkov struct dst_entry *dst = cork->base.dst; 1862cd3c7480SPavel Begunkov 1863cd3c7480SPavel Begunkov cork->base.dst = NULL; 1864cd3c7480SPavel Begunkov cork->base.flags &= ~IPCORK_ALLFRAG; 1865cd3c7480SPavel Begunkov skb_dst_set(skb, dst); 1866cd3c7480SPavel Begunkov } 1867cd3c7480SPavel Begunkov 1868366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork, 1869366e41d9SVlad Yasevich struct inet6_cork *v6_cork) 1870bf138862SPavel Emelyanov { 1871366e41d9SVlad Yasevich if (v6_cork->opt) { 1872d656b2eaSPavel Begunkov struct ipv6_txoptions *opt = v6_cork->opt; 1873d656b2eaSPavel Begunkov 1874d656b2eaSPavel Begunkov kfree(opt->dst0opt); 1875d656b2eaSPavel Begunkov kfree(opt->dst1opt); 1876d656b2eaSPavel Begunkov kfree(opt->hopopt); 1877d656b2eaSPavel Begunkov kfree(opt->srcrt); 1878d656b2eaSPavel Begunkov kfree(opt); 1879366e41d9SVlad Yasevich v6_cork->opt = NULL; 18800178b695SHerbert Xu } 18810178b695SHerbert Xu 1882366e41d9SVlad Yasevich if (cork->base.dst) { 1883366e41d9SVlad Yasevich dst_release(cork->base.dst); 1884366e41d9SVlad Yasevich cork->base.dst = NULL; 1885366e41d9SVlad Yasevich cork->base.flags &= ~IPCORK_ALLFRAG; 1886bf138862SPavel Emelyanov } 1887bf138862SPavel Emelyanov } 1888bf138862SPavel Emelyanov 18896422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk, 18906422398cSVlad Yasevich struct sk_buff_head *queue, 18916422398cSVlad Yasevich struct inet_cork_full *cork, 18926422398cSVlad Yasevich struct inet6_cork *v6_cork) 18931da177e4SLinus Torvalds { 18941da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 18951da177e4SLinus Torvalds struct sk_buff **tail_skb; 1896b60d4e58SPavel Begunkov struct in6_addr *final_dst; 18971da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 18983bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 18991da177e4SLinus Torvalds struct ipv6hdr *hdr; 19006422398cSVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 19016422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->base.dst; 19026422398cSVlad Yasevich struct flowi6 *fl6 = &cork->fl.u.ip6; 19034c9483b2SDavid S. Miller unsigned char proto = fl6->flowi6_proto; 19041da177e4SLinus Torvalds 19056422398cSVlad Yasevich skb = __skb_dequeue(queue); 190663159f29SIan Morris if (!skb) 19071da177e4SLinus Torvalds goto out; 19081da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 19091da177e4SLinus Torvalds 19101da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1911d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1912bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 19136422398cSVlad Yasevich while ((tmp_skb = __skb_dequeue(queue)) != NULL) { 1914cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 19151da177e4SLinus Torvalds *tail_skb = tmp_skb; 19161da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 19171da177e4SLinus Torvalds skb->len += tmp_skb->len; 19181da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 19191da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 19201da177e4SLinus Torvalds tmp_skb->destructor = NULL; 19211da177e4SLinus Torvalds tmp_skb->sk = NULL; 19221da177e4SLinus Torvalds } 19231da177e4SLinus Torvalds 192428a89453SHerbert Xu /* Allow local fragmentation. */ 192560ff7467SWANG Cong skb->ignore_df = ip6_sk_ignore_df(sk); 1926cfe1fc77SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_header_len(skb)); 1927b60d4e58SPavel Begunkov 1928b60d4e58SPavel Begunkov final_dst = &fl6->daddr; 19291da177e4SLinus Torvalds if (opt && opt->opt_flen) 19301da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 19311da177e4SLinus Torvalds if (opt && opt->opt_nflen) 1932613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr); 19331da177e4SLinus Torvalds 1934e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 1935e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 19360660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 19371da177e4SLinus Torvalds 19386422398cSVlad Yasevich ip6_flow_hdr(hdr, v6_cork->tclass, 1939cb1ce2efSTom Herbert ip6_make_flowlabel(net, skb, fl6->flowlabel, 1940513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 19416422398cSVlad Yasevich hdr->hop_limit = v6_cork->hop_limit; 19421da177e4SLinus Torvalds hdr->nexthdr = proto; 19434e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 19444e3fd7a0SAlexey Dobriyan hdr->daddr = *final_dst; 19451da177e4SLinus Torvalds 1946a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 1947c6af0c22SWillem de Bruijn skb->mark = cork->base.mark; 1948a818f75eSJesus Sanchez-Palencia skb->tstamp = cork->base.transmit_time; 1949a818f75eSJesus Sanchez-Palencia 1950cd3c7480SPavel Begunkov ip6_cork_steal_dst(skb, cork); 1951edf391ffSNeil Horman IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len); 195214878f75SDavid L Stevens if (proto == IPPROTO_ICMPV6) { 1953adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 195414878f75SDavid L Stevens 195543a43b60SHannes Frederic Sowa ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type); 195643a43b60SHannes Frederic Sowa ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS); 195714878f75SDavid L Stevens } 195814878f75SDavid L Stevens 19596422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 19606422398cSVlad Yasevich out: 19616422398cSVlad Yasevich return skb; 19626422398cSVlad Yasevich } 19636422398cSVlad Yasevich 19646422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb) 19656422398cSVlad Yasevich { 19666422398cSVlad Yasevich struct net *net = sock_net(skb->sk); 19676422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 19686422398cSVlad Yasevich int err; 19696422398cSVlad Yasevich 197033224b16SEric W. Biederman err = ip6_local_out(net, skb->sk, skb); 19711da177e4SLinus Torvalds if (err) { 19721da177e4SLinus Torvalds if (err > 0) 19736ce9e7b5SEric Dumazet err = net_xmit_errno(err); 19741da177e4SLinus Torvalds if (err) 19756422398cSVlad Yasevich IP6_INC_STATS(net, rt->rt6i_idev, 19766422398cSVlad Yasevich IPSTATS_MIB_OUTDISCARDS); 19771da177e4SLinus Torvalds } 19781da177e4SLinus Torvalds 19791da177e4SLinus Torvalds return err; 19806422398cSVlad Yasevich } 19816422398cSVlad Yasevich 19826422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk) 19836422398cSVlad Yasevich { 19846422398cSVlad Yasevich struct sk_buff *skb; 19856422398cSVlad Yasevich 19866422398cSVlad Yasevich skb = ip6_finish_skb(sk); 19876422398cSVlad Yasevich if (!skb) 19886422398cSVlad Yasevich return 0; 19896422398cSVlad Yasevich 19906422398cSVlad Yasevich return ip6_send_skb(skb); 19911da177e4SLinus Torvalds } 1992a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames); 19931da177e4SLinus Torvalds 19940bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk, 19956422398cSVlad Yasevich struct sk_buff_head *queue, 19966422398cSVlad Yasevich struct inet_cork_full *cork, 19976422398cSVlad Yasevich struct inet6_cork *v6_cork) 19981da177e4SLinus Torvalds { 19991da177e4SLinus Torvalds struct sk_buff *skb; 20001da177e4SLinus Torvalds 20010bbe84a6SVlad Yasevich while ((skb = __skb_dequeue_tail(queue)) != NULL) { 2002adf30907SEric Dumazet if (skb_dst(skb)) 2003adf30907SEric Dumazet IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)), 2004a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 20051da177e4SLinus Torvalds kfree_skb(skb); 20061da177e4SLinus Torvalds } 20071da177e4SLinus Torvalds 20086422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 20091da177e4SLinus Torvalds } 20100bbe84a6SVlad Yasevich 20110bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk) 20120bbe84a6SVlad Yasevich { 20136422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &sk->sk_write_queue, 20146422398cSVlad Yasevich &inet_sk(sk)->cork, &inet6_sk(sk)->cork); 20150bbe84a6SVlad Yasevich } 2016a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames); 20176422398cSVlad Yasevich 20186422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk, 20196422398cSVlad Yasevich int getfrag(void *from, char *to, int offset, 20206422398cSVlad Yasevich int len, int odd, struct sk_buff *skb), 2021f93431c8SWang Yufen void *from, size_t length, int transhdrlen, 2022f37a4cc6SPavel Begunkov struct ipcm6_cookie *ipc6, struct rt6_info *rt, 2023f37a4cc6SPavel Begunkov unsigned int flags, struct inet_cork_full *cork) 20246422398cSVlad Yasevich { 20256422398cSVlad Yasevich struct inet6_cork v6_cork; 20266422398cSVlad Yasevich struct sk_buff_head queue; 202726879da5SWei Wang int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 20286422398cSVlad Yasevich int err; 20296422398cSVlad Yasevich 203040ac240cSPavel Begunkov if (flags & MSG_PROBE) { 203140ac240cSPavel Begunkov dst_release(&rt->dst); 20326422398cSVlad Yasevich return NULL; 203340ac240cSPavel Begunkov } 20346422398cSVlad Yasevich 20356422398cSVlad Yasevich __skb_queue_head_init(&queue); 20366422398cSVlad Yasevich 20371cd7884dSWillem de Bruijn cork->base.flags = 0; 20381cd7884dSWillem de Bruijn cork->base.addr = 0; 20391cd7884dSWillem de Bruijn cork->base.opt = NULL; 20406422398cSVlad Yasevich v6_cork.opt = NULL; 2041f37a4cc6SPavel Begunkov err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt); 2042862c03eeSEric Dumazet if (err) { 20431cd7884dSWillem de Bruijn ip6_cork_release(cork, &v6_cork); 20446422398cSVlad Yasevich return ERR_PTR(err); 2045862c03eeSEric Dumazet } 204626879da5SWei Wang if (ipc6->dontfrag < 0) 204726879da5SWei Wang ipc6->dontfrag = inet6_sk(sk)->dontfrag; 20486422398cSVlad Yasevich 2049f37a4cc6SPavel Begunkov err = __ip6_append_data(sk, &queue, cork, &v6_cork, 20506422398cSVlad Yasevich ¤t->task_frag, getfrag, from, 20516422398cSVlad Yasevich length + exthdrlen, transhdrlen + exthdrlen, 20525fdaa88dSWillem de Bruijn flags, ipc6); 20536422398cSVlad Yasevich if (err) { 20541cd7884dSWillem de Bruijn __ip6_flush_pending_frames(sk, &queue, cork, &v6_cork); 20556422398cSVlad Yasevich return ERR_PTR(err); 20566422398cSVlad Yasevich } 20576422398cSVlad Yasevich 20581cd7884dSWillem de Bruijn return __ip6_make_skb(sk, &queue, cork, &v6_cork); 20596422398cSVlad Yasevich } 2060