11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * IPv6 output functions 31da177e4SLinus Torvalds * Linux INET6 implementation 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * Authors: 61da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 71da177e4SLinus Torvalds * 81da177e4SLinus Torvalds * Based on linux/net/ipv4/ip_output.c 91da177e4SLinus Torvalds * 101da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or 111da177e4SLinus Torvalds * modify it under the terms of the GNU General Public License 121da177e4SLinus Torvalds * as published by the Free Software Foundation; either version 131da177e4SLinus Torvalds * 2 of the License, or (at your option) any later version. 141da177e4SLinus Torvalds * 151da177e4SLinus Torvalds * Changes: 161da177e4SLinus Torvalds * A.N.Kuznetsov : airthmetics in fragmentation. 171da177e4SLinus Torvalds * extension headers are implemented. 181da177e4SLinus Torvalds * route changes now work. 191da177e4SLinus Torvalds * ip6_forward does not confuse sniffers. 201da177e4SLinus Torvalds * etc. 211da177e4SLinus Torvalds * 221da177e4SLinus Torvalds * H. von Brand : Added missing #include <linux/string.h> 231da177e4SLinus Torvalds * Imran Patel : frag id should be in NBO 241da177e4SLinus Torvalds * Kazunori MIYAZAWA @USAGI 251da177e4SLinus Torvalds * : add ip6_append_data and related functions 261da177e4SLinus Torvalds * for datagram xmit 271da177e4SLinus Torvalds */ 281da177e4SLinus Torvalds 291da177e4SLinus Torvalds #include <linux/errno.h> 30ef76bc23SHerbert Xu #include <linux/kernel.h> 311da177e4SLinus Torvalds #include <linux/string.h> 321da177e4SLinus Torvalds #include <linux/socket.h> 331da177e4SLinus Torvalds #include <linux/net.h> 341da177e4SLinus Torvalds #include <linux/netdevice.h> 351da177e4SLinus Torvalds #include <linux/if_arp.h> 361da177e4SLinus Torvalds #include <linux/in6.h> 371da177e4SLinus Torvalds #include <linux/tcp.h> 381da177e4SLinus Torvalds #include <linux/route.h> 39b59f45d0SHerbert Xu #include <linux/module.h> 405a0e3ad6STejun Heo #include <linux/slab.h> 411da177e4SLinus Torvalds 421da177e4SLinus Torvalds #include <linux/netfilter.h> 431da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h> 441da177e4SLinus Torvalds 451da177e4SLinus Torvalds #include <net/sock.h> 461da177e4SLinus Torvalds #include <net/snmp.h> 471da177e4SLinus Torvalds 481da177e4SLinus Torvalds #include <net/ipv6.h> 491da177e4SLinus Torvalds #include <net/ndisc.h> 501da177e4SLinus Torvalds #include <net/protocol.h> 511da177e4SLinus Torvalds #include <net/ip6_route.h> 521da177e4SLinus Torvalds #include <net/addrconf.h> 531da177e4SLinus Torvalds #include <net/rawv6.h> 541da177e4SLinus Torvalds #include <net/icmp.h> 551da177e4SLinus Torvalds #include <net/xfrm.h> 561da177e4SLinus Torvalds #include <net/checksum.h> 577bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h> 58ca254490SDavid Ahern #include <net/l3mdev.h> 591da177e4SLinus Torvalds 607d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb) 611da177e4SLinus Torvalds { 62adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 631da177e4SLinus Torvalds struct net_device *dev = dst->dev; 64f6b72b62SDavid S. Miller struct neighbour *neigh; 656fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 struct in6_addr *nexthop; 666fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 int ret; 671da177e4SLinus Torvalds 681da177e4SLinus Torvalds skb->protocol = htons(ETH_P_IPV6); 691da177e4SLinus Torvalds skb->dev = dev; 701da177e4SLinus Torvalds 710660e03fSArnaldo Carvalho de Melo if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) { 72adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 731da177e4SLinus Torvalds 747026b1ddSDavid Miller if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) && 7578126c41SEric W. Biederman ((mroute6_socket(net, skb) && 76bd91b8bfSBenjamin Thery !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) || 770660e03fSArnaldo Carvalho de Melo ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr, 787bc570c8SYOSHIFUJI Hideaki &ipv6_hdr(skb)->saddr))) { 791da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 801da177e4SLinus Torvalds 811da177e4SLinus Torvalds /* Do not check for IFF_ALLMULTI; multicast routing 821da177e4SLinus Torvalds is not supported in any case. 831da177e4SLinus Torvalds */ 841da177e4SLinus Torvalds if (newskb) 85b2e0b385SJan Engelhardt NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING, 8629a26a56SEric W. Biederman net, sk, newskb, NULL, newskb->dev, 8795603e22SMichel Machado dev_loopback_xmit); 881da177e4SLinus Torvalds 890660e03fSArnaldo Carvalho de Melo if (ipv6_hdr(skb)->hop_limit == 0) { 9078126c41SEric W. Biederman IP6_INC_STATS(net, idev, 913bd653c8SDenis V. Lunev IPSTATS_MIB_OUTDISCARDS); 921da177e4SLinus Torvalds kfree_skb(skb); 931da177e4SLinus Torvalds return 0; 941da177e4SLinus Torvalds } 951da177e4SLinus Torvalds } 961da177e4SLinus Torvalds 9778126c41SEric W. Biederman IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len); 98dd408515SHannes Frederic Sowa 99dd408515SHannes Frederic Sowa if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <= 100dd408515SHannes Frederic Sowa IPV6_ADDR_SCOPE_NODELOCAL && 101dd408515SHannes Frederic Sowa !(dev->flags & IFF_LOOPBACK)) { 102dd408515SHannes Frederic Sowa kfree_skb(skb); 103dd408515SHannes Frederic Sowa return 0; 104dd408515SHannes Frederic Sowa } 1051da177e4SLinus Torvalds } 1061da177e4SLinus Torvalds 1076fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 1082647a9b0SMartin KaFai Lau nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr); 1096fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop); 1106fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(!neigh)) 1116fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false); 1126fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (!IS_ERR(neigh)) { 1136fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 ret = dst_neigh_output(dst, neigh, skb); 1146fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1156fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 return ret; 1166fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 } 1176fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 11805e3aa09SDavid S. Miller 11978126c41SEric W. Biederman IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES); 1209e508490SJan Engelhardt kfree_skb(skb); 1219e508490SJan Engelhardt return -EINVAL; 1221da177e4SLinus Torvalds } 1231da177e4SLinus Torvalds 1240c4b51f0SEric W. Biederman static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1259e508490SJan Engelhardt { 1269e508490SJan Engelhardt if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) || 1279037c357SJiri Pirko dst_allfrag(skb_dst(skb)) || 1289037c357SJiri Pirko (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size)) 1297d8c6e39SEric W. Biederman return ip6_fragment(net, sk, skb, ip6_finish_output2); 1309e508490SJan Engelhardt else 1317d8c6e39SEric W. Biederman return ip6_finish_output2(net, sk, skb); 1329e508490SJan Engelhardt } 1339e508490SJan Engelhardt 134ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1351da177e4SLinus Torvalds { 1369e508490SJan Engelhardt struct net_device *dev = skb_dst(skb)->dev; 137adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 138be10de0aSEric W. Biederman 139778d80beSYOSHIFUJI Hideaki if (unlikely(idev->cnf.disable_ipv6)) { 14019a0644cSEric W. Biederman IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 141778d80beSYOSHIFUJI Hideaki kfree_skb(skb); 142778d80beSYOSHIFUJI Hideaki return 0; 143778d80beSYOSHIFUJI Hideaki } 144778d80beSYOSHIFUJI Hideaki 14529a26a56SEric W. Biederman return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING, 14629a26a56SEric W. Biederman net, sk, skb, NULL, dev, 1479c6eb28aSJan Engelhardt ip6_finish_output, 1489c6eb28aSJan Engelhardt !(IP6CB(skb)->flags & IP6SKB_REROUTED)); 1491da177e4SLinus Torvalds } 1501da177e4SLinus Torvalds 1511da177e4SLinus Torvalds /* 152b5d43998SShan Wei * xmit an sk_buff (used by TCP, SCTP and DCCP) 1531c1e9d2bSEric Dumazet * Note : socket lock is not held for SYNACK packets, but might be modified 1541c1e9d2bSEric Dumazet * by calls to skb_set_owner_w() and ipv6_local_error(), 1551c1e9d2bSEric Dumazet * which are using proper atomic operations or spinlocks. 1561da177e4SLinus Torvalds */ 1571c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6, 158b903d324SEric Dumazet struct ipv6_txoptions *opt, int tclass) 1591da177e4SLinus Torvalds { 1603bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 1611c1e9d2bSEric Dumazet const struct ipv6_pinfo *np = inet6_sk(sk); 1624c9483b2SDavid S. Miller struct in6_addr *first_hop = &fl6->daddr; 163adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 1641da177e4SLinus Torvalds struct ipv6hdr *hdr; 1654c9483b2SDavid S. Miller u8 proto = fl6->flowi6_proto; 1661da177e4SLinus Torvalds int seg_len = skb->len; 167e651f03aSGerrit Renker int hlimit = -1; 1681da177e4SLinus Torvalds u32 mtu; 1691da177e4SLinus Torvalds 1701da177e4SLinus Torvalds if (opt) { 171c2636b4dSChuck Lever unsigned int head_room; 1721da177e4SLinus Torvalds 1731da177e4SLinus Torvalds /* First: exthdrs may take lots of space (~8K for now) 1741da177e4SLinus Torvalds MAX_HEADER is not enough. 1751da177e4SLinus Torvalds */ 1761da177e4SLinus Torvalds head_room = opt->opt_nflen + opt->opt_flen; 1771da177e4SLinus Torvalds seg_len += head_room; 1781da177e4SLinus Torvalds head_room += sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev); 1791da177e4SLinus Torvalds 1801da177e4SLinus Torvalds if (skb_headroom(skb) < head_room) { 1811da177e4SLinus Torvalds struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room); 18263159f29SIan Morris if (!skb2) { 183adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 184a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 1851da177e4SLinus Torvalds kfree_skb(skb); 1861da177e4SLinus Torvalds return -ENOBUFS; 1871da177e4SLinus Torvalds } 188808db80aSEric Dumazet consume_skb(skb); 189a11d206dSYOSHIFUJI Hideaki skb = skb2; 1901c1e9d2bSEric Dumazet /* skb_set_owner_w() changes sk->sk_wmem_alloc atomically, 1911c1e9d2bSEric Dumazet * it is safe to call in our context (socket lock not held) 1921c1e9d2bSEric Dumazet */ 1931c1e9d2bSEric Dumazet skb_set_owner_w(skb, (struct sock *)sk); 1941da177e4SLinus Torvalds } 1951da177e4SLinus Torvalds if (opt->opt_flen) 1961da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 1971da177e4SLinus Torvalds if (opt->opt_nflen) 1981da177e4SLinus Torvalds ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop); 1991da177e4SLinus Torvalds } 2001da177e4SLinus Torvalds 201e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 202e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 2030660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 2041da177e4SLinus Torvalds 2051da177e4SLinus Torvalds /* 2061da177e4SLinus Torvalds * Fill in the IPv6 header 2071da177e4SLinus Torvalds */ 208b903d324SEric Dumazet if (np) 2091da177e4SLinus Torvalds hlimit = np->hop_limit; 2101da177e4SLinus Torvalds if (hlimit < 0) 2116b75d090SYOSHIFUJI Hideaki hlimit = ip6_dst_hoplimit(dst); 2121da177e4SLinus Torvalds 213cb1ce2efSTom Herbert ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel, 21467800f9bSTom Herbert np->autoflowlabel, fl6)); 21541a1f8eaSYOSHIFUJI Hideaki 2161da177e4SLinus Torvalds hdr->payload_len = htons(seg_len); 2171da177e4SLinus Torvalds hdr->nexthdr = proto; 2181da177e4SLinus Torvalds hdr->hop_limit = hlimit; 2191da177e4SLinus Torvalds 2204e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 2214e3fd7a0SAlexey Dobriyan hdr->daddr = *first_hop; 2221da177e4SLinus Torvalds 2239c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 224a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 2254a19ec58SLaszlo Attila Toth skb->mark = sk->sk_mark; 226a2c2064fSPatrick McHardy 2271da177e4SLinus Torvalds mtu = dst_mtu(dst); 22860ff7467SWANG Cong if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) { 229adf30907SEric Dumazet IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)), 230edf391ffSNeil Horman IPSTATS_MIB_OUT, skb->len); 2311c1e9d2bSEric Dumazet /* hooks should never assume socket lock is held. 2321c1e9d2bSEric Dumazet * we promote our socket to non const 2331c1e9d2bSEric Dumazet */ 23429a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, 2351c1e9d2bSEric Dumazet net, (struct sock *)sk, skb, NULL, dst->dev, 23613206b6bSEric W. Biederman dst_output); 2371da177e4SLinus Torvalds } 2381da177e4SLinus Torvalds 2391da177e4SLinus Torvalds skb->dev = dst->dev; 2401c1e9d2bSEric Dumazet /* ipv6_local_error() does not require socket lock, 2411c1e9d2bSEric Dumazet * we promote our socket to non const 2421c1e9d2bSEric Dumazet */ 2431c1e9d2bSEric Dumazet ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu); 2441c1e9d2bSEric Dumazet 245adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS); 2461da177e4SLinus Torvalds kfree_skb(skb); 2471da177e4SLinus Torvalds return -EMSGSIZE; 2481da177e4SLinus Torvalds } 2497159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit); 2507159039aSYOSHIFUJI Hideaki 2511da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel) 2521da177e4SLinus Torvalds { 2531da177e4SLinus Torvalds struct ip6_ra_chain *ra; 2541da177e4SLinus Torvalds struct sock *last = NULL; 2551da177e4SLinus Torvalds 2561da177e4SLinus Torvalds read_lock(&ip6_ra_lock); 2571da177e4SLinus Torvalds for (ra = ip6_ra_chain; ra; ra = ra->next) { 2581da177e4SLinus Torvalds struct sock *sk = ra->sk; 2590bd1b59bSAndrew McDonald if (sk && ra->sel == sel && 2600bd1b59bSAndrew McDonald (!sk->sk_bound_dev_if || 2610bd1b59bSAndrew McDonald sk->sk_bound_dev_if == skb->dev->ifindex)) { 2621da177e4SLinus Torvalds if (last) { 2631da177e4SLinus Torvalds struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC); 2641da177e4SLinus Torvalds if (skb2) 2651da177e4SLinus Torvalds rawv6_rcv(last, skb2); 2661da177e4SLinus Torvalds } 2671da177e4SLinus Torvalds last = sk; 2681da177e4SLinus Torvalds } 2691da177e4SLinus Torvalds } 2701da177e4SLinus Torvalds 2711da177e4SLinus Torvalds if (last) { 2721da177e4SLinus Torvalds rawv6_rcv(last, skb); 2731da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 2741da177e4SLinus Torvalds return 1; 2751da177e4SLinus Torvalds } 2761da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 2771da177e4SLinus Torvalds return 0; 2781da177e4SLinus Torvalds } 2791da177e4SLinus Torvalds 280e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb) 281e21e0b5fSVille Nuorvala { 2820660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 283e21e0b5fSVille Nuorvala u8 nexthdr = hdr->nexthdr; 28475f2811cSJesse Gross __be16 frag_off; 285e21e0b5fSVille Nuorvala int offset; 286e21e0b5fSVille Nuorvala 287e21e0b5fSVille Nuorvala if (ipv6_ext_hdr(nexthdr)) { 28875f2811cSJesse Gross offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off); 289e21e0b5fSVille Nuorvala if (offset < 0) 290e21e0b5fSVille Nuorvala return 0; 291e21e0b5fSVille Nuorvala } else 292e21e0b5fSVille Nuorvala offset = sizeof(struct ipv6hdr); 293e21e0b5fSVille Nuorvala 294e21e0b5fSVille Nuorvala if (nexthdr == IPPROTO_ICMPV6) { 295e21e0b5fSVille Nuorvala struct icmp6hdr *icmp6; 296e21e0b5fSVille Nuorvala 297d56f90a7SArnaldo Carvalho de Melo if (!pskb_may_pull(skb, (skb_network_header(skb) + 298d56f90a7SArnaldo Carvalho de Melo offset + 1 - skb->data))) 299e21e0b5fSVille Nuorvala return 0; 300e21e0b5fSVille Nuorvala 301d56f90a7SArnaldo Carvalho de Melo icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset); 302e21e0b5fSVille Nuorvala 303e21e0b5fSVille Nuorvala switch (icmp6->icmp6_type) { 304e21e0b5fSVille Nuorvala case NDISC_ROUTER_SOLICITATION: 305e21e0b5fSVille Nuorvala case NDISC_ROUTER_ADVERTISEMENT: 306e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_SOLICITATION: 307e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_ADVERTISEMENT: 308e21e0b5fSVille Nuorvala case NDISC_REDIRECT: 309e21e0b5fSVille Nuorvala /* For reaction involving unicast neighbor discovery 310e21e0b5fSVille Nuorvala * message destined to the proxied address, pass it to 311e21e0b5fSVille Nuorvala * input function. 312e21e0b5fSVille Nuorvala */ 313e21e0b5fSVille Nuorvala return 1; 314e21e0b5fSVille Nuorvala default: 315e21e0b5fSVille Nuorvala break; 316e21e0b5fSVille Nuorvala } 317e21e0b5fSVille Nuorvala } 318e21e0b5fSVille Nuorvala 31974553b09SVille Nuorvala /* 32074553b09SVille Nuorvala * The proxying router can't forward traffic sent to a link-local 32174553b09SVille Nuorvala * address, so signal the sender and discard the packet. This 32274553b09SVille Nuorvala * behavior is clarified by the MIPv6 specification. 32374553b09SVille Nuorvala */ 32474553b09SVille Nuorvala if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) { 32574553b09SVille Nuorvala dst_link_failure(skb); 32674553b09SVille Nuorvala return -1; 32774553b09SVille Nuorvala } 32874553b09SVille Nuorvala 329e21e0b5fSVille Nuorvala return 0; 330e21e0b5fSVille Nuorvala } 331e21e0b5fSVille Nuorvala 3320c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk, 3330c4b51f0SEric W. Biederman struct sk_buff *skb) 3341da177e4SLinus Torvalds { 33513206b6bSEric W. Biederman return dst_output(net, sk, skb); 3361da177e4SLinus Torvalds } 3371da177e4SLinus Torvalds 3380954cf9cSHannes Frederic Sowa static unsigned int ip6_dst_mtu_forward(const struct dst_entry *dst) 3390954cf9cSHannes Frederic Sowa { 3400954cf9cSHannes Frederic Sowa unsigned int mtu; 3410954cf9cSHannes Frederic Sowa struct inet6_dev *idev; 3420954cf9cSHannes Frederic Sowa 3430954cf9cSHannes Frederic Sowa if (dst_metric_locked(dst, RTAX_MTU)) { 3440954cf9cSHannes Frederic Sowa mtu = dst_metric_raw(dst, RTAX_MTU); 3450954cf9cSHannes Frederic Sowa if (mtu) 3460954cf9cSHannes Frederic Sowa return mtu; 3470954cf9cSHannes Frederic Sowa } 3480954cf9cSHannes Frederic Sowa 3490954cf9cSHannes Frederic Sowa mtu = IPV6_MIN_MTU; 3500954cf9cSHannes Frederic Sowa rcu_read_lock(); 3510954cf9cSHannes Frederic Sowa idev = __in6_dev_get(dst->dev); 3520954cf9cSHannes Frederic Sowa if (idev) 3530954cf9cSHannes Frederic Sowa mtu = idev->cnf.mtu6; 3540954cf9cSHannes Frederic Sowa rcu_read_unlock(); 3550954cf9cSHannes Frederic Sowa 3560954cf9cSHannes Frederic Sowa return mtu; 3570954cf9cSHannes Frederic Sowa } 3580954cf9cSHannes Frederic Sowa 359fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu) 360fe6cc55fSFlorian Westphal { 361418a3156SFlorian Westphal if (skb->len <= mtu) 362fe6cc55fSFlorian Westphal return false; 363fe6cc55fSFlorian Westphal 36460ff7467SWANG Cong /* ipv6 conntrack defrag sets max_frag_size + ignore_df */ 365fe6cc55fSFlorian Westphal if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu) 366fe6cc55fSFlorian Westphal return true; 367fe6cc55fSFlorian Westphal 36860ff7467SWANG Cong if (skb->ignore_df) 369418a3156SFlorian Westphal return false; 370418a3156SFlorian Westphal 371fe6cc55fSFlorian Westphal if (skb_is_gso(skb) && skb_gso_network_seglen(skb) <= mtu) 372fe6cc55fSFlorian Westphal return false; 373fe6cc55fSFlorian Westphal 374fe6cc55fSFlorian Westphal return true; 375fe6cc55fSFlorian Westphal } 376fe6cc55fSFlorian Westphal 3771da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb) 3781da177e4SLinus Torvalds { 379adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 3800660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 3811da177e4SLinus Torvalds struct inet6_skb_parm *opt = IP6CB(skb); 382c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(dst->dev); 38314f3ad6fSUlrich Weber u32 mtu; 3841da177e4SLinus Torvalds 38553b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->forwarding == 0) 3861da177e4SLinus Torvalds goto error; 3871da177e4SLinus Torvalds 388090f1166SLi RongQing if (skb->pkt_type != PACKET_HOST) 389090f1166SLi RongQing goto drop; 390090f1166SLi RongQing 3919ef2e965SHannes Frederic Sowa if (unlikely(skb->sk)) 3929ef2e965SHannes Frederic Sowa goto drop; 3939ef2e965SHannes Frederic Sowa 3944497b076SBen Hutchings if (skb_warn_if_lro(skb)) 3954497b076SBen Hutchings goto drop; 3964497b076SBen Hutchings 3971da177e4SLinus Torvalds if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) { 3981d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 39915c77d8bSEric Dumazet IPSTATS_MIB_INDISCARDS); 4001da177e4SLinus Torvalds goto drop; 4011da177e4SLinus Torvalds } 4021da177e4SLinus Torvalds 40335fc92a9SHerbert Xu skb_forward_csum(skb); 4041da177e4SLinus Torvalds 4051da177e4SLinus Torvalds /* 4061da177e4SLinus Torvalds * We DO NOT make any processing on 4071da177e4SLinus Torvalds * RA packets, pushing them to user level AS IS 4081da177e4SLinus Torvalds * without ane WARRANTY that application will be able 4091da177e4SLinus Torvalds * to interpret them. The reason is that we 4101da177e4SLinus Torvalds * cannot make anything clever here. 4111da177e4SLinus Torvalds * 4121da177e4SLinus Torvalds * We are not end-node, so that if packet contains 4131da177e4SLinus Torvalds * AH/ESP, we cannot make anything. 4141da177e4SLinus Torvalds * Defragmentation also would be mistake, RA packets 4151da177e4SLinus Torvalds * cannot be fragmented, because there is no warranty 4161da177e4SLinus Torvalds * that different fragments will go along one path. --ANK 4171da177e4SLinus Torvalds */ 418ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) { 419ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (ip6_call_ra_chain(skb, ntohs(opt->ra))) 4201da177e4SLinus Torvalds return 0; 4211da177e4SLinus Torvalds } 4221da177e4SLinus Torvalds 4231da177e4SLinus Torvalds /* 4241da177e4SLinus Torvalds * check and decrement ttl 4251da177e4SLinus Torvalds */ 4261da177e4SLinus Torvalds if (hdr->hop_limit <= 1) { 4271da177e4SLinus Torvalds /* Force OUTPUT device used as source address */ 4281da177e4SLinus Torvalds skb->dev = dst->dev; 4293ffe533cSAlexey Dobriyan icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0); 4301d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 43115c77d8bSEric Dumazet IPSTATS_MIB_INHDRERRORS); 4321da177e4SLinus Torvalds 4331da177e4SLinus Torvalds kfree_skb(skb); 4341da177e4SLinus Torvalds return -ETIMEDOUT; 4351da177e4SLinus Torvalds } 4361da177e4SLinus Torvalds 437fbea49e1SYOSHIFUJI Hideaki /* XXX: idev->cnf.proxy_ndp? */ 43853b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->proxy_ndp && 4398a3edd80SDaniel Lezcano pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) { 44074553b09SVille Nuorvala int proxied = ip6_forward_proxy_check(skb); 44174553b09SVille Nuorvala if (proxied > 0) 442e21e0b5fSVille Nuorvala return ip6_input(skb); 44374553b09SVille Nuorvala else if (proxied < 0) { 4441d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 4453bd653c8SDenis V. Lunev IPSTATS_MIB_INDISCARDS); 44674553b09SVille Nuorvala goto drop; 44774553b09SVille Nuorvala } 448e21e0b5fSVille Nuorvala } 449e21e0b5fSVille Nuorvala 4501da177e4SLinus Torvalds if (!xfrm6_route_forward(skb)) { 4511d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 45215c77d8bSEric Dumazet IPSTATS_MIB_INDISCARDS); 4531da177e4SLinus Torvalds goto drop; 4541da177e4SLinus Torvalds } 455adf30907SEric Dumazet dst = skb_dst(skb); 4561da177e4SLinus Torvalds 4571da177e4SLinus Torvalds /* IPv6 specs say nothing about it, but it is clear that we cannot 4581da177e4SLinus Torvalds send redirects to source routed frames. 4591e5dc146SMasahide NAKAMURA We don't send redirects to frames decapsulated from IPsec. 4601da177e4SLinus Torvalds */ 461c45a3dfbSDavid S. Miller if (skb->dev == dst->dev && opt->srcrt == 0 && !skb_sec_path(skb)) { 4621da177e4SLinus Torvalds struct in6_addr *target = NULL; 463fbfe95a4SDavid S. Miller struct inet_peer *peer; 4641da177e4SLinus Torvalds struct rt6_info *rt; 4651da177e4SLinus Torvalds 4661da177e4SLinus Torvalds /* 4671da177e4SLinus Torvalds * incoming and outgoing devices are the same 4681da177e4SLinus Torvalds * send a redirect. 4691da177e4SLinus Torvalds */ 4701da177e4SLinus Torvalds 4711da177e4SLinus Torvalds rt = (struct rt6_info *) dst; 472c45a3dfbSDavid S. Miller if (rt->rt6i_flags & RTF_GATEWAY) 473c45a3dfbSDavid S. Miller target = &rt->rt6i_gateway; 4741da177e4SLinus Torvalds else 4751da177e4SLinus Torvalds target = &hdr->daddr; 4761da177e4SLinus Torvalds 477fd0273d7SMartin KaFai Lau peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1); 47892d86829SDavid S. Miller 4791da177e4SLinus Torvalds /* Limit redirects both by destination (here) 4801da177e4SLinus Torvalds and by source (inside ndisc_send_redirect) 4811da177e4SLinus Torvalds */ 482fbfe95a4SDavid S. Miller if (inet_peer_xrlim_allow(peer, 1*HZ)) 4834991969aSDavid S. Miller ndisc_send_redirect(skb, target); 4841d861aa4SDavid S. Miller if (peer) 4851d861aa4SDavid S. Miller inet_putpeer(peer); 4865bb1ab09SDavid L Stevens } else { 4875bb1ab09SDavid L Stevens int addrtype = ipv6_addr_type(&hdr->saddr); 4885bb1ab09SDavid L Stevens 4891da177e4SLinus Torvalds /* This check is security critical. */ 490f81b2e7dSYOSHIFUJI Hideaki if (addrtype == IPV6_ADDR_ANY || 491f81b2e7dSYOSHIFUJI Hideaki addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK)) 4921da177e4SLinus Torvalds goto error; 4935bb1ab09SDavid L Stevens if (addrtype & IPV6_ADDR_LINKLOCAL) { 4945bb1ab09SDavid L Stevens icmpv6_send(skb, ICMPV6_DEST_UNREACH, 4953ffe533cSAlexey Dobriyan ICMPV6_NOT_NEIGHBOUR, 0); 4965bb1ab09SDavid L Stevens goto error; 4975bb1ab09SDavid L Stevens } 4981da177e4SLinus Torvalds } 4991da177e4SLinus Torvalds 5000954cf9cSHannes Frederic Sowa mtu = ip6_dst_mtu_forward(dst); 50114f3ad6fSUlrich Weber if (mtu < IPV6_MIN_MTU) 50214f3ad6fSUlrich Weber mtu = IPV6_MIN_MTU; 50314f3ad6fSUlrich Weber 504fe6cc55fSFlorian Westphal if (ip6_pkt_too_big(skb, mtu)) { 5051da177e4SLinus Torvalds /* Again, force OUTPUT device used as source address */ 5061da177e4SLinus Torvalds skb->dev = dst->dev; 50714f3ad6fSUlrich Weber icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 5081d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 50915c77d8bSEric Dumazet IPSTATS_MIB_INTOOBIGERRORS); 5101d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 51115c77d8bSEric Dumazet IPSTATS_MIB_FRAGFAILS); 5121da177e4SLinus Torvalds kfree_skb(skb); 5131da177e4SLinus Torvalds return -EMSGSIZE; 5141da177e4SLinus Torvalds } 5151da177e4SLinus Torvalds 5161da177e4SLinus Torvalds if (skb_cow(skb, dst->dev->hard_header_len)) { 5171d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 51815c77d8bSEric Dumazet IPSTATS_MIB_OUTDISCARDS); 5191da177e4SLinus Torvalds goto drop; 5201da177e4SLinus Torvalds } 5211da177e4SLinus Torvalds 5220660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 5231da177e4SLinus Torvalds 5241da177e4SLinus Torvalds /* Mangling hops number delayed to point after skb COW */ 5251da177e4SLinus Torvalds 5261da177e4SLinus Torvalds hdr->hop_limit--; 5271da177e4SLinus Torvalds 5281d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS); 5291d015503SEric Dumazet __IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len); 53029a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, 53129a26a56SEric W. Biederman net, NULL, skb, skb->dev, dst->dev, 5326e23ae2aSPatrick McHardy ip6_forward_finish); 5331da177e4SLinus Torvalds 5341da177e4SLinus Torvalds error: 5351d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_INADDRERRORS); 5361da177e4SLinus Torvalds drop: 5371da177e4SLinus Torvalds kfree_skb(skb); 5381da177e4SLinus Torvalds return -EINVAL; 5391da177e4SLinus Torvalds } 5401da177e4SLinus Torvalds 5411da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from) 5421da177e4SLinus Torvalds { 5431da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 5441da177e4SLinus Torvalds to->priority = from->priority; 5451da177e4SLinus Torvalds to->protocol = from->protocol; 546adf30907SEric Dumazet skb_dst_drop(to); 547adf30907SEric Dumazet skb_dst_set(to, dst_clone(skb_dst(from))); 5481da177e4SLinus Torvalds to->dev = from->dev; 54982e91ffeSThomas Graf to->mark = from->mark; 5501da177e4SLinus Torvalds 5511da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 5521da177e4SLinus Torvalds to->tc_index = from->tc_index; 5531da177e4SLinus Torvalds #endif 554e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 555984bc16cSJames Morris skb_copy_secmark(to, from); 5561da177e4SLinus Torvalds } 5571da177e4SLinus Torvalds 5587d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, 5597d8c6e39SEric W. Biederman int (*output)(struct net *, struct sock *, struct sk_buff *)) 5601da177e4SLinus Torvalds { 5611da177e4SLinus Torvalds struct sk_buff *frag; 562adf30907SEric Dumazet struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 563f60e5990Shannes@stressinduktion.org struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? 564f60e5990Shannes@stressinduktion.org inet6_sk(skb->sk) : NULL; 5651da177e4SLinus Torvalds struct ipv6hdr *tmp_hdr; 5661da177e4SLinus Torvalds struct frag_hdr *fh; 5671da177e4SLinus Torvalds unsigned int mtu, hlen, left, len; 568a7ae1992SHerbert Xu int hroom, troom; 569286c2349SMartin KaFai Lau __be32 frag_id; 5701da177e4SLinus Torvalds int ptr, offset = 0, err = 0; 5711da177e4SLinus Torvalds u8 *prevhdr, nexthdr = 0; 5721da177e4SLinus Torvalds 5731da177e4SLinus Torvalds hlen = ip6_find_1stfragopt(skb, &prevhdr); 5741da177e4SLinus Torvalds nexthdr = *prevhdr; 5751da177e4SLinus Torvalds 576628a5c56SJohn Heffner mtu = ip6_skb_dst_mtu(skb); 577b881ef76SJohn Heffner 578b881ef76SJohn Heffner /* We must not fragment if the socket is set to force MTU discovery 57914f3ad6fSUlrich Weber * or if the skb it not generated by a local socket. 580b881ef76SJohn Heffner */ 581485fca66SFlorian Westphal if (unlikely(!skb->ignore_df && skb->len > mtu)) 582485fca66SFlorian Westphal goto fail_toobig; 583a34a101eSEric Dumazet 584485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size) { 585485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size > mtu) 586485fca66SFlorian Westphal goto fail_toobig; 587485fca66SFlorian Westphal 588485fca66SFlorian Westphal /* don't send fragments larger than what we received */ 589485fca66SFlorian Westphal mtu = IP6CB(skb)->frag_max_size; 590485fca66SFlorian Westphal if (mtu < IPV6_MIN_MTU) 591485fca66SFlorian Westphal mtu = IPV6_MIN_MTU; 592b881ef76SJohn Heffner } 593b881ef76SJohn Heffner 594d91675f9SYOSHIFUJI Hideaki if (np && np->frag_size < mtu) { 595d91675f9SYOSHIFUJI Hideaki if (np->frag_size) 596d91675f9SYOSHIFUJI Hideaki mtu = np->frag_size; 597d91675f9SYOSHIFUJI Hideaki } 59889bc7848SHannes Frederic Sowa if (mtu < hlen + sizeof(struct frag_hdr) + 8) 599b72a2b01SHannes Frederic Sowa goto fail_toobig; 6001e0d69a9SHannes Frederic Sowa mtu -= hlen + sizeof(struct frag_hdr); 6011da177e4SLinus Torvalds 602fd0273d7SMartin KaFai Lau frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr, 603fd0273d7SMartin KaFai Lau &ipv6_hdr(skb)->saddr); 604286c2349SMartin KaFai Lau 605405c92f7SHannes Frederic Sowa if (skb->ip_summed == CHECKSUM_PARTIAL && 606405c92f7SHannes Frederic Sowa (err = skb_checksum_help(skb))) 607405c92f7SHannes Frederic Sowa goto fail; 608405c92f7SHannes Frederic Sowa 6091d325d21SFlorian Westphal hroom = LL_RESERVED_SPACE(rt->dst.dev); 61021dc3301SDavid S. Miller if (skb_has_frag_list(skb)) { 6111da177e4SLinus Torvalds int first_len = skb_pagelen(skb); 6123d13008eSEric Dumazet struct sk_buff *frag2; 6131da177e4SLinus Torvalds 6141da177e4SLinus Torvalds if (first_len - hlen > mtu || 6151da177e4SLinus Torvalds ((first_len - hlen) & 7) || 6161d325d21SFlorian Westphal skb_cloned(skb) || 6171d325d21SFlorian Westphal skb_headroom(skb) < (hroom + sizeof(struct frag_hdr))) 6181da177e4SLinus Torvalds goto slow_path; 6191da177e4SLinus Torvalds 6204d9092bbSDavid S. Miller skb_walk_frags(skb, frag) { 6211da177e4SLinus Torvalds /* Correct geometry. */ 6221da177e4SLinus Torvalds if (frag->len > mtu || 6231da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 6241d325d21SFlorian Westphal skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr))) 6253d13008eSEric Dumazet goto slow_path_clean; 6261da177e4SLinus Torvalds 6271da177e4SLinus Torvalds /* Partially cloned skb? */ 6281da177e4SLinus Torvalds if (skb_shared(frag)) 6293d13008eSEric Dumazet goto slow_path_clean; 6302fdba6b0SHerbert Xu 6312fdba6b0SHerbert Xu BUG_ON(frag->sk); 6322fdba6b0SHerbert Xu if (skb->sk) { 6332fdba6b0SHerbert Xu frag->sk = skb->sk; 6342fdba6b0SHerbert Xu frag->destructor = sock_wfree; 6352fdba6b0SHerbert Xu } 6363d13008eSEric Dumazet skb->truesize -= frag->truesize; 6371da177e4SLinus Torvalds } 6381da177e4SLinus Torvalds 6391da177e4SLinus Torvalds err = 0; 6401da177e4SLinus Torvalds offset = 0; 6411da177e4SLinus Torvalds /* BUILD HEADER */ 6421da177e4SLinus Torvalds 6439a217a1cSYOSHIFUJI Hideaki *prevhdr = NEXTHDR_FRAGMENT; 644d56f90a7SArnaldo Carvalho de Melo tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC); 6451da177e4SLinus Torvalds if (!tmp_hdr) { 646adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 6473bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 6481d325d21SFlorian Westphal err = -ENOMEM; 6491d325d21SFlorian Westphal goto fail; 6501da177e4SLinus Torvalds } 6511d325d21SFlorian Westphal frag = skb_shinfo(skb)->frag_list; 6521d325d21SFlorian Westphal skb_frag_list_init(skb); 6531da177e4SLinus Torvalds 6541da177e4SLinus Torvalds __skb_pull(skb, hlen); 6551da177e4SLinus Torvalds fh = (struct frag_hdr *)__skb_push(skb, sizeof(struct frag_hdr)); 656e2d1bca7SArnaldo Carvalho de Melo __skb_push(skb, hlen); 657e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 658d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(skb), tmp_hdr, hlen); 6591da177e4SLinus Torvalds 6601da177e4SLinus Torvalds fh->nexthdr = nexthdr; 6611da177e4SLinus Torvalds fh->reserved = 0; 6621da177e4SLinus Torvalds fh->frag_off = htons(IP6_MF); 663286c2349SMartin KaFai Lau fh->identification = frag_id; 6641da177e4SLinus Torvalds 6651da177e4SLinus Torvalds first_len = skb_pagelen(skb); 6661da177e4SLinus Torvalds skb->data_len = first_len - skb_headlen(skb); 6671da177e4SLinus Torvalds skb->len = first_len; 6680660e03fSArnaldo Carvalho de Melo ipv6_hdr(skb)->payload_len = htons(first_len - 6690660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 6701da177e4SLinus Torvalds 671d8d1f30bSChangli Gao dst_hold(&rt->dst); 6721da177e4SLinus Torvalds 6731da177e4SLinus Torvalds for (;;) { 6741da177e4SLinus Torvalds /* Prepare header of the next frame, 6751da177e4SLinus Torvalds * before previous one went down. */ 6761da177e4SLinus Torvalds if (frag) { 6771da177e4SLinus Torvalds frag->ip_summed = CHECKSUM_NONE; 678badff6d0SArnaldo Carvalho de Melo skb_reset_transport_header(frag); 6791da177e4SLinus Torvalds fh = (struct frag_hdr *)__skb_push(frag, sizeof(struct frag_hdr)); 680e2d1bca7SArnaldo Carvalho de Melo __skb_push(frag, hlen); 681e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(frag); 682d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(frag), tmp_hdr, 683d56f90a7SArnaldo Carvalho de Melo hlen); 6841da177e4SLinus Torvalds offset += skb->len - hlen - sizeof(struct frag_hdr); 6851da177e4SLinus Torvalds fh->nexthdr = nexthdr; 6861da177e4SLinus Torvalds fh->reserved = 0; 6871da177e4SLinus Torvalds fh->frag_off = htons(offset); 68853b24b8fSIan Morris if (frag->next) 6891da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 6901da177e4SLinus Torvalds fh->identification = frag_id; 6910660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = 6920660e03fSArnaldo Carvalho de Melo htons(frag->len - 6930660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 6941da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 6951da177e4SLinus Torvalds } 6961da177e4SLinus Torvalds 6977d8c6e39SEric W. Biederman err = output(net, sk, skb); 698dafee490SWei Dong if (!err) 699d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7003bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 701dafee490SWei Dong 7021da177e4SLinus Torvalds if (err || !frag) 7031da177e4SLinus Torvalds break; 7041da177e4SLinus Torvalds 7051da177e4SLinus Torvalds skb = frag; 7061da177e4SLinus Torvalds frag = skb->next; 7071da177e4SLinus Torvalds skb->next = NULL; 7081da177e4SLinus Torvalds } 7091da177e4SLinus Torvalds 7101da177e4SLinus Torvalds kfree(tmp_hdr); 7111da177e4SLinus Torvalds 7121da177e4SLinus Torvalds if (err == 0) { 713d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7143bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGOKS); 71594e187c0SAmerigo Wang ip6_rt_put(rt); 7161da177e4SLinus Torvalds return 0; 7171da177e4SLinus Torvalds } 7181da177e4SLinus Torvalds 71946cfd725SFlorian Westphal kfree_skb_list(frag); 7201da177e4SLinus Torvalds 721d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7223bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 72394e187c0SAmerigo Wang ip6_rt_put(rt); 7241da177e4SLinus Torvalds return err; 7253d13008eSEric Dumazet 7263d13008eSEric Dumazet slow_path_clean: 7273d13008eSEric Dumazet skb_walk_frags(skb, frag2) { 7283d13008eSEric Dumazet if (frag2 == frag) 7293d13008eSEric Dumazet break; 7303d13008eSEric Dumazet frag2->sk = NULL; 7313d13008eSEric Dumazet frag2->destructor = NULL; 7323d13008eSEric Dumazet skb->truesize += frag2->truesize; 7333d13008eSEric Dumazet } 7341da177e4SLinus Torvalds } 7351da177e4SLinus Torvalds 7361da177e4SLinus Torvalds slow_path: 7371da177e4SLinus Torvalds left = skb->len - hlen; /* Space per frame */ 7381da177e4SLinus Torvalds ptr = hlen; /* Where to start from */ 7391da177e4SLinus Torvalds 7401da177e4SLinus Torvalds /* 7411da177e4SLinus Torvalds * Fragment the datagram. 7421da177e4SLinus Torvalds */ 7431da177e4SLinus Torvalds 7441da177e4SLinus Torvalds *prevhdr = NEXTHDR_FRAGMENT; 745a7ae1992SHerbert Xu troom = rt->dst.dev->needed_tailroom; 7461da177e4SLinus Torvalds 7471da177e4SLinus Torvalds /* 7481da177e4SLinus Torvalds * Keep copying data until we run out. 7491da177e4SLinus Torvalds */ 7501da177e4SLinus Torvalds while (left > 0) { 7511da177e4SLinus Torvalds len = left; 7521da177e4SLinus Torvalds /* IF: it doesn't fit, use 'mtu' - the data space left */ 7531da177e4SLinus Torvalds if (len > mtu) 7541da177e4SLinus Torvalds len = mtu; 7551da177e4SLinus Torvalds /* IF: we are not sending up to and including the packet end 7561da177e4SLinus Torvalds then align the next start on an eight byte boundary */ 7571da177e4SLinus Torvalds if (len < left) { 7581da177e4SLinus Torvalds len &= ~7; 7591da177e4SLinus Torvalds } 7601da177e4SLinus Torvalds 761cbffccc9SJoe Perches /* Allocate buffer */ 762cbffccc9SJoe Perches frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) + 763cbffccc9SJoe Perches hroom + troom, GFP_ATOMIC); 764cbffccc9SJoe Perches if (!frag) { 765adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 766a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 7671da177e4SLinus Torvalds err = -ENOMEM; 7681da177e4SLinus Torvalds goto fail; 7691da177e4SLinus Torvalds } 7701da177e4SLinus Torvalds 7711da177e4SLinus Torvalds /* 7721da177e4SLinus Torvalds * Set up data on packet 7731da177e4SLinus Torvalds */ 7741da177e4SLinus Torvalds 7751da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 776a7ae1992SHerbert Xu skb_reserve(frag, hroom); 7771da177e4SLinus Torvalds skb_put(frag, len + hlen + sizeof(struct frag_hdr)); 778c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(frag); 779badff6d0SArnaldo Carvalho de Melo fh = (struct frag_hdr *)(skb_network_header(frag) + hlen); 780b0e380b1SArnaldo Carvalho de Melo frag->transport_header = (frag->network_header + hlen + 781b0e380b1SArnaldo Carvalho de Melo sizeof(struct frag_hdr)); 7821da177e4SLinus Torvalds 7831da177e4SLinus Torvalds /* 7841da177e4SLinus Torvalds * Charge the memory for the fragment to any owner 7851da177e4SLinus Torvalds * it might possess 7861da177e4SLinus Torvalds */ 7871da177e4SLinus Torvalds if (skb->sk) 7881da177e4SLinus Torvalds skb_set_owner_w(frag, skb->sk); 7891da177e4SLinus Torvalds 7901da177e4SLinus Torvalds /* 7911da177e4SLinus Torvalds * Copy the packet header into the new buffer. 7921da177e4SLinus Torvalds */ 793d626f62bSArnaldo Carvalho de Melo skb_copy_from_linear_data(skb, skb_network_header(frag), hlen); 7941da177e4SLinus Torvalds 7951da177e4SLinus Torvalds /* 7961da177e4SLinus Torvalds * Build fragment header. 7971da177e4SLinus Torvalds */ 7981da177e4SLinus Torvalds fh->nexthdr = nexthdr; 7991da177e4SLinus Torvalds fh->reserved = 0; 8001da177e4SLinus Torvalds fh->identification = frag_id; 8011da177e4SLinus Torvalds 8021da177e4SLinus Torvalds /* 8031da177e4SLinus Torvalds * Copy a block of the IP datagram. 8041da177e4SLinus Torvalds */ 805e3f0b86bSHimangi Saraogi BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag), 806e3f0b86bSHimangi Saraogi len)); 8071da177e4SLinus Torvalds left -= len; 8081da177e4SLinus Torvalds 8091da177e4SLinus Torvalds fh->frag_off = htons(offset); 8101da177e4SLinus Torvalds if (left > 0) 8111da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 8120660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = htons(frag->len - 8130660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 8141da177e4SLinus Torvalds 8151da177e4SLinus Torvalds ptr += len; 8161da177e4SLinus Torvalds offset += len; 8171da177e4SLinus Torvalds 8181da177e4SLinus Torvalds /* 8191da177e4SLinus Torvalds * Put this fragment into the sending queue. 8201da177e4SLinus Torvalds */ 8217d8c6e39SEric W. Biederman err = output(net, sk, frag); 8221da177e4SLinus Torvalds if (err) 8231da177e4SLinus Torvalds goto fail; 824dafee490SWei Dong 825adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 8263bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 8271da177e4SLinus Torvalds } 828adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 829a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGOKS); 830808db80aSEric Dumazet consume_skb(skb); 8311da177e4SLinus Torvalds return err; 8321da177e4SLinus Torvalds 833485fca66SFlorian Westphal fail_toobig: 834485fca66SFlorian Westphal if (skb->sk && dst_allfrag(skb_dst(skb))) 835485fca66SFlorian Westphal sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK); 836485fca66SFlorian Westphal 837485fca66SFlorian Westphal skb->dev = skb_dst(skb)->dev; 838485fca66SFlorian Westphal icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 839485fca66SFlorian Westphal err = -EMSGSIZE; 840485fca66SFlorian Westphal 8411da177e4SLinus Torvalds fail: 842adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 843a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 8441da177e4SLinus Torvalds kfree_skb(skb); 8451da177e4SLinus Torvalds return err; 8461da177e4SLinus Torvalds } 8471da177e4SLinus Torvalds 848b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key, 849b71d1d42SEric Dumazet const struct in6_addr *fl_addr, 850b71d1d42SEric Dumazet const struct in6_addr *addr_cache) 851cf6b1982SYOSHIFUJI Hideaki { 852a02cec21SEric Dumazet return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) && 85363159f29SIan Morris (!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache)); 854cf6b1982SYOSHIFUJI Hideaki } 855cf6b1982SYOSHIFUJI Hideaki 856497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk, 857497c615aSHerbert Xu struct dst_entry *dst, 858b71d1d42SEric Dumazet const struct flowi6 *fl6) 8591da177e4SLinus Torvalds { 8601da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 861a963a37dSEric Dumazet struct rt6_info *rt; 8621da177e4SLinus Torvalds 863497c615aSHerbert Xu if (!dst) 864497c615aSHerbert Xu goto out; 8651da177e4SLinus Torvalds 866a963a37dSEric Dumazet if (dst->ops->family != AF_INET6) { 867a963a37dSEric Dumazet dst_release(dst); 868a963a37dSEric Dumazet return NULL; 869a963a37dSEric Dumazet } 870a963a37dSEric Dumazet 871a963a37dSEric Dumazet rt = (struct rt6_info *)dst; 8721da177e4SLinus Torvalds /* Yes, checking route validity in not connected 873d76e60a5SDavid S. Miller * case is not very simple. Take into account, 874d76e60a5SDavid S. Miller * that we do not support routing by source, TOS, 875d76e60a5SDavid S. Miller * and MSG_DONTROUTE --ANK (980726) 876d76e60a5SDavid S. Miller * 877cf6b1982SYOSHIFUJI Hideaki * 1. ip6_rt_check(): If route was host route, 878cf6b1982SYOSHIFUJI Hideaki * check that cached destination is current. 879d76e60a5SDavid S. Miller * If it is network route, we still may 880d76e60a5SDavid S. Miller * check its validity using saved pointer 881d76e60a5SDavid S. Miller * to the last used address: daddr_cache. 882d76e60a5SDavid S. Miller * We do not want to save whole address now, 883d76e60a5SDavid S. Miller * (because main consumer of this service 884d76e60a5SDavid S. Miller * is tcp, which has not this problem), 885d76e60a5SDavid S. Miller * so that the last trick works only on connected 886d76e60a5SDavid S. Miller * sockets. 887d76e60a5SDavid S. Miller * 2. oif also should be the same. 8881da177e4SLinus Torvalds */ 8894c9483b2SDavid S. Miller if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) || 8908e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES 8914c9483b2SDavid S. Miller ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) || 8928e1ef0a9SYOSHIFUJI Hideaki #endif 893ca254490SDavid Ahern (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) && 894ca254490SDavid Ahern (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) { 895497c615aSHerbert Xu dst_release(dst); 896497c615aSHerbert Xu dst = NULL; 8971da177e4SLinus Torvalds } 898497c615aSHerbert Xu 899497c615aSHerbert Xu out: 900497c615aSHerbert Xu return dst; 9011da177e4SLinus Torvalds } 902497c615aSHerbert Xu 9033aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, 9044c9483b2SDavid S. Miller struct dst_entry **dst, struct flowi6 *fl6) 905497c615aSHerbert Xu { 90669cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 90769cce1d1SDavid S. Miller struct neighbour *n; 90897cac082SDavid S. Miller struct rt6_info *rt; 90969cce1d1SDavid S. Miller #endif 91069cce1d1SDavid S. Miller int err; 9116f21c96aSPaolo Abeni int flags = 0; 9121da177e4SLinus Torvalds 913e16e888bSMarkus Stenberg /* The correct way to handle this would be to do 914e16e888bSMarkus Stenberg * ip6_route_get_saddr, and then ip6_route_output; however, 915e16e888bSMarkus Stenberg * the route-specific preferred source forces the 916e16e888bSMarkus Stenberg * ip6_route_output call _before_ ip6_route_get_saddr. 917e16e888bSMarkus Stenberg * 918e16e888bSMarkus Stenberg * In source specific routing (no src=any default route), 919e16e888bSMarkus Stenberg * ip6_route_output will fail given src=any saddr, though, so 920e16e888bSMarkus Stenberg * that's why we try it again later. 921e16e888bSMarkus Stenberg */ 922e16e888bSMarkus Stenberg if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) { 923e16e888bSMarkus Stenberg struct rt6_info *rt; 924e16e888bSMarkus Stenberg bool had_dst = *dst != NULL; 925e16e888bSMarkus Stenberg 926e16e888bSMarkus Stenberg if (!had_dst) 927e16e888bSMarkus Stenberg *dst = ip6_route_output(net, sk, fl6); 928e16e888bSMarkus Stenberg rt = (*dst)->error ? NULL : (struct rt6_info *)*dst; 929e16e888bSMarkus Stenberg err = ip6_route_get_saddr(net, rt, &fl6->daddr, 930e16e888bSMarkus Stenberg sk ? inet6_sk(sk)->srcprefs : 0, 931e16e888bSMarkus Stenberg &fl6->saddr); 932e16e888bSMarkus Stenberg if (err) 933e16e888bSMarkus Stenberg goto out_err_release; 934e16e888bSMarkus Stenberg 935e16e888bSMarkus Stenberg /* If we had an erroneous initial result, pretend it 936e16e888bSMarkus Stenberg * never existed and let the SA-enabled version take 937e16e888bSMarkus Stenberg * over. 938e16e888bSMarkus Stenberg */ 939e16e888bSMarkus Stenberg if (!had_dst && (*dst)->error) { 940e16e888bSMarkus Stenberg dst_release(*dst); 941e16e888bSMarkus Stenberg *dst = NULL; 942e16e888bSMarkus Stenberg } 9436f21c96aSPaolo Abeni 9446f21c96aSPaolo Abeni if (fl6->flowi6_oif) 9456f21c96aSPaolo Abeni flags |= RT6_LOOKUP_F_IFACE; 946e16e888bSMarkus Stenberg } 947e16e888bSMarkus Stenberg 94863159f29SIan Morris if (!*dst) 9496f21c96aSPaolo Abeni *dst = ip6_route_output_flags(net, sk, fl6, flags); 9501da177e4SLinus Torvalds 951e5d08d71SIan Morris err = (*dst)->error; 952e5d08d71SIan Morris if (err) 9531da177e4SLinus Torvalds goto out_err_release; 9541da177e4SLinus Torvalds 95595c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 95695c385b4SNeil Horman /* 95795c385b4SNeil Horman * Here if the dst entry we've looked up 95895c385b4SNeil Horman * has a neighbour entry that is in the INCOMPLETE 95995c385b4SNeil Horman * state and the src address from the flow is 96095c385b4SNeil Horman * marked as OPTIMISTIC, we release the found 96195c385b4SNeil Horman * dst entry and replace it instead with the 96295c385b4SNeil Horman * dst entry of the nexthop router 96395c385b4SNeil Horman */ 964c56bf6feSEric Dumazet rt = (struct rt6_info *) *dst; 965707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 9662647a9b0SMartin KaFai Lau n = __ipv6_neigh_lookup_noref(rt->dst.dev, 9672647a9b0SMartin KaFai Lau rt6_nexthop(rt, &fl6->daddr)); 968707be1ffSYOSHIFUJI Hideaki / 吉藤英明 err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0; 969707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 970707be1ffSYOSHIFUJI Hideaki / 吉藤英明 971707be1ffSYOSHIFUJI Hideaki / 吉藤英明 if (err) { 97295c385b4SNeil Horman struct inet6_ifaddr *ifp; 9734c9483b2SDavid S. Miller struct flowi6 fl_gw6; 97495c385b4SNeil Horman int redirect; 97595c385b4SNeil Horman 9764c9483b2SDavid S. Miller ifp = ipv6_get_ifaddr(net, &fl6->saddr, 9771cab3da6SDaniel Lezcano (*dst)->dev, 1); 97895c385b4SNeil Horman 97995c385b4SNeil Horman redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC); 98095c385b4SNeil Horman if (ifp) 98195c385b4SNeil Horman in6_ifa_put(ifp); 98295c385b4SNeil Horman 98395c385b4SNeil Horman if (redirect) { 98495c385b4SNeil Horman /* 98595c385b4SNeil Horman * We need to get the dst entry for the 98695c385b4SNeil Horman * default router instead 98795c385b4SNeil Horman */ 98895c385b4SNeil Horman dst_release(*dst); 9894c9483b2SDavid S. Miller memcpy(&fl_gw6, fl6, sizeof(struct flowi6)); 9904c9483b2SDavid S. Miller memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr)); 9914c9483b2SDavid S. Miller *dst = ip6_route_output(net, sk, &fl_gw6); 992e5d08d71SIan Morris err = (*dst)->error; 993e5d08d71SIan Morris if (err) 99495c385b4SNeil Horman goto out_err_release; 99595c385b4SNeil Horman } 99695c385b4SNeil Horman } 99795c385b4SNeil Horman #endif 99895c385b4SNeil Horman 9991da177e4SLinus Torvalds return 0; 10001da177e4SLinus Torvalds 10011da177e4SLinus Torvalds out_err_release: 1002ca46f9c8SMitsuru Chinen if (err == -ENETUNREACH) 10035ac68e7cSJohn Stultz IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES); 10041da177e4SLinus Torvalds dst_release(*dst); 10051da177e4SLinus Torvalds *dst = NULL; 10061da177e4SLinus Torvalds return err; 10071da177e4SLinus Torvalds } 100834a0b3cdSAdrian Bunk 1009497c615aSHerbert Xu /** 1010497c615aSHerbert Xu * ip6_dst_lookup - perform route lookup on flow 1011497c615aSHerbert Xu * @sk: socket which provides route info 1012497c615aSHerbert Xu * @dst: pointer to dst_entry * for result 10134c9483b2SDavid S. Miller * @fl6: flow to lookup 1014497c615aSHerbert Xu * 1015497c615aSHerbert Xu * This function performs a route lookup on the given flow. 1016497c615aSHerbert Xu * 1017497c615aSHerbert Xu * It returns zero on success, or a standard errno code on error. 1018497c615aSHerbert Xu */ 1019343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst, 1020343d60aaSRoopa Prabhu struct flowi6 *fl6) 1021497c615aSHerbert Xu { 1022497c615aSHerbert Xu *dst = NULL; 1023343d60aaSRoopa Prabhu return ip6_dst_lookup_tail(net, sk, dst, fl6); 1024497c615aSHerbert Xu } 10253cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup); 10263cf3dc6cSArnaldo Carvalho de Melo 1027497c615aSHerbert Xu /** 102868d0c6d3SDavid S. Miller * ip6_dst_lookup_flow - perform route lookup on flow with ipsec 102968d0c6d3SDavid S. Miller * @sk: socket which provides route info 10304c9483b2SDavid S. Miller * @fl6: flow to lookup 103168d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 103268d0c6d3SDavid S. Miller * 103368d0c6d3SDavid S. Miller * This function performs a route lookup on the given flow. 103468d0c6d3SDavid S. Miller * 103568d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 103668d0c6d3SDavid S. Miller * error code. 103768d0c6d3SDavid S. Miller */ 10383aef934fSEric Dumazet struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6, 10390e0d44abSSteffen Klassert const struct in6_addr *final_dst) 104068d0c6d3SDavid S. Miller { 104168d0c6d3SDavid S. Miller struct dst_entry *dst = NULL; 104268d0c6d3SDavid S. Miller int err; 104368d0c6d3SDavid S. Miller 1044343d60aaSRoopa Prabhu err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6); 104568d0c6d3SDavid S. Miller if (err) 104668d0c6d3SDavid S. Miller return ERR_PTR(err); 104768d0c6d3SDavid S. Miller if (final_dst) 10484e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 1049a0a9f33bSPhil Sutter if (!fl6->flowi6_oif) 1050ca254490SDavid Ahern fl6->flowi6_oif = l3mdev_fib_oif(dst->dev); 10512774c131SDavid S. Miller 1052f92ee619SSteffen Klassert return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0); 105368d0c6d3SDavid S. Miller } 105468d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow); 105568d0c6d3SDavid S. Miller 105668d0c6d3SDavid S. Miller /** 105768d0c6d3SDavid S. Miller * ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow 105868d0c6d3SDavid S. Miller * @sk: socket which provides the dst cache and route info 10594c9483b2SDavid S. Miller * @fl6: flow to lookup 106068d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 1061497c615aSHerbert Xu * 1062497c615aSHerbert Xu * This function performs a route lookup on the given flow with the 1063497c615aSHerbert Xu * possibility of using the cached route in the socket if it is valid. 1064497c615aSHerbert Xu * It will take the socket dst lock when operating on the dst cache. 1065497c615aSHerbert Xu * As a result, this function can only be used in process context. 1066497c615aSHerbert Xu * 106768d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 106868d0c6d3SDavid S. Miller * error code. 1069497c615aSHerbert Xu */ 10704c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6, 10710e0d44abSSteffen Klassert const struct in6_addr *final_dst) 1072497c615aSHerbert Xu { 107368d0c6d3SDavid S. Miller struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie); 107468d0c6d3SDavid S. Miller int err; 1075497c615aSHerbert Xu 10764c9483b2SDavid S. Miller dst = ip6_sk_dst_check(sk, dst, fl6); 107768d0c6d3SDavid S. Miller 1078343d60aaSRoopa Prabhu err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6); 107968d0c6d3SDavid S. Miller if (err) 108068d0c6d3SDavid S. Miller return ERR_PTR(err); 108168d0c6d3SDavid S. Miller if (final_dst) 10824e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 10832774c131SDavid S. Miller 1084f92ee619SSteffen Klassert return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0); 108568d0c6d3SDavid S. Miller } 108668d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow); 1087497c615aSHerbert Xu 108834a0b3cdSAdrian Bunk static inline int ip6_ufo_append_data(struct sock *sk, 10890bbe84a6SVlad Yasevich struct sk_buff_head *queue, 1090e89e9cf5SAnanda Raju int getfrag(void *from, char *to, int offset, int len, 1091e89e9cf5SAnanda Raju int odd, struct sk_buff *skb), 1092e89e9cf5SAnanda Raju void *from, int length, int hh_len, int fragheaderlen, 10933ba3458fSJakub Sitnicki int exthdrlen, int transhdrlen, int mtu, 10943ba3458fSJakub Sitnicki unsigned int flags, const struct flowi6 *fl6) 1095e89e9cf5SAnanda Raju 1096e89e9cf5SAnanda Raju { 1097e89e9cf5SAnanda Raju struct sk_buff *skb; 1098e89e9cf5SAnanda Raju int err; 1099e89e9cf5SAnanda Raju 1100e89e9cf5SAnanda Raju /* There is support for UDP large send offload by network 1101e89e9cf5SAnanda Raju * device, so create one single skb packet containing complete 1102e89e9cf5SAnanda Raju * udp datagram 1103e89e9cf5SAnanda Raju */ 11040bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 110563159f29SIan Morris if (!skb) { 1106e89e9cf5SAnanda Raju skb = sock_alloc_send_skb(sk, 1107e89e9cf5SAnanda Raju hh_len + fragheaderlen + transhdrlen + 20, 1108e89e9cf5SAnanda Raju (flags & MSG_DONTWAIT), &err); 110963159f29SIan Morris if (!skb) 1110504744e4SZheng Yan return err; 1111e89e9cf5SAnanda Raju 1112e89e9cf5SAnanda Raju /* reserve space for Hardware header */ 1113e89e9cf5SAnanda Raju skb_reserve(skb, hh_len); 1114e89e9cf5SAnanda Raju 1115e89e9cf5SAnanda Raju /* create space for UDP/IP header */ 1116e89e9cf5SAnanda Raju skb_put(skb, fragheaderlen + transhdrlen); 1117e89e9cf5SAnanda Raju 1118e89e9cf5SAnanda Raju /* initialize network header pointer */ 11193ba3458fSJakub Sitnicki skb_set_network_header(skb, exthdrlen); 1120e89e9cf5SAnanda Raju 1121e89e9cf5SAnanda Raju /* initialize protocol header pointer */ 1122b0e380b1SArnaldo Carvalho de Melo skb->transport_header = skb->network_header + fragheaderlen; 1123e89e9cf5SAnanda Raju 11249c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 1125e89e9cf5SAnanda Raju skb->csum = 0; 1126e89e9cf5SAnanda Raju 11270bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 1128c547dbf5SJiri Pirko } else if (skb_is_gso(skb)) { 1129c547dbf5SJiri Pirko goto append; 1130c547dbf5SJiri Pirko } 1131c547dbf5SJiri Pirko 1132c547dbf5SJiri Pirko skb->ip_summed = CHECKSUM_PARTIAL; 1133c31d5326SSridhar Samudrala /* Specify the length of each IPv6 datagram fragment. 1134c31d5326SSridhar Samudrala * It has to be a multiple of 8. 1135c31d5326SSridhar Samudrala */ 1136c31d5326SSridhar Samudrala skb_shinfo(skb)->gso_size = (mtu - fragheaderlen - 1137c31d5326SSridhar Samudrala sizeof(struct frag_hdr)) & ~7; 1138f83ef8c0SHerbert Xu skb_shinfo(skb)->gso_type = SKB_GSO_UDP; 1139fd0273d7SMartin KaFai Lau skb_shinfo(skb)->ip6_frag_id = ipv6_select_ident(sock_net(sk), 1140fd0273d7SMartin KaFai Lau &fl6->daddr, 1141fd0273d7SMartin KaFai Lau &fl6->saddr); 1142e89e9cf5SAnanda Raju 1143c547dbf5SJiri Pirko append: 11442811ebacSHannes Frederic Sowa return skb_append_datato_frags(sk, skb, getfrag, from, 11452811ebacSHannes Frederic Sowa (length - transhdrlen)); 1146e89e9cf5SAnanda Raju } 11471da177e4SLinus Torvalds 11480178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src, 11490178b695SHerbert Xu gfp_t gfp) 11500178b695SHerbert Xu { 11510178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11520178b695SHerbert Xu } 11530178b695SHerbert Xu 11540178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src, 11550178b695SHerbert Xu gfp_t gfp) 11560178b695SHerbert Xu { 11570178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11580178b695SHerbert Xu } 11590178b695SHerbert Xu 116075a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu, 11610c183379SGao feng int *maxfraglen, 11620c183379SGao feng unsigned int fragheaderlen, 11630c183379SGao feng struct sk_buff *skb, 116475a493e6SHannes Frederic Sowa struct rt6_info *rt, 1165e367c2d0Slucien unsigned int orig_mtu) 11660c183379SGao feng { 11670c183379SGao feng if (!(rt->dst.flags & DST_XFRM_TUNNEL)) { 116863159f29SIan Morris if (!skb) { 11690c183379SGao feng /* first fragment, reserve header_len */ 1170e367c2d0Slucien *mtu = orig_mtu - rt->dst.header_len; 11710c183379SGao feng 11720c183379SGao feng } else { 11730c183379SGao feng /* 11740c183379SGao feng * this fragment is not first, the headers 11750c183379SGao feng * space is regarded as data space. 11760c183379SGao feng */ 1177e367c2d0Slucien *mtu = orig_mtu; 11780c183379SGao feng } 11790c183379SGao feng *maxfraglen = ((*mtu - fragheaderlen) & ~7) 11800c183379SGao feng + fragheaderlen - sizeof(struct frag_hdr); 11810c183379SGao feng } 11820c183379SGao feng } 11830c183379SGao feng 1184366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork, 1185*26879da5SWei Wang struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6, 1186366e41d9SVlad Yasevich struct rt6_info *rt, struct flowi6 *fl6) 1187366e41d9SVlad Yasevich { 1188366e41d9SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 1189366e41d9SVlad Yasevich unsigned int mtu; 1190*26879da5SWei Wang struct ipv6_txoptions *opt = ipc6->opt; 1191366e41d9SVlad Yasevich 1192366e41d9SVlad Yasevich /* 1193366e41d9SVlad Yasevich * setup for corking 1194366e41d9SVlad Yasevich */ 1195366e41d9SVlad Yasevich if (opt) { 1196366e41d9SVlad Yasevich if (WARN_ON(v6_cork->opt)) 1197366e41d9SVlad Yasevich return -EINVAL; 1198366e41d9SVlad Yasevich 1199366e41d9SVlad Yasevich v6_cork->opt = kzalloc(opt->tot_len, sk->sk_allocation); 120063159f29SIan Morris if (unlikely(!v6_cork->opt)) 1201366e41d9SVlad Yasevich return -ENOBUFS; 1202366e41d9SVlad Yasevich 1203366e41d9SVlad Yasevich v6_cork->opt->tot_len = opt->tot_len; 1204366e41d9SVlad Yasevich v6_cork->opt->opt_flen = opt->opt_flen; 1205366e41d9SVlad Yasevich v6_cork->opt->opt_nflen = opt->opt_nflen; 1206366e41d9SVlad Yasevich 1207366e41d9SVlad Yasevich v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt, 1208366e41d9SVlad Yasevich sk->sk_allocation); 1209366e41d9SVlad Yasevich if (opt->dst0opt && !v6_cork->opt->dst0opt) 1210366e41d9SVlad Yasevich return -ENOBUFS; 1211366e41d9SVlad Yasevich 1212366e41d9SVlad Yasevich v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt, 1213366e41d9SVlad Yasevich sk->sk_allocation); 1214366e41d9SVlad Yasevich if (opt->dst1opt && !v6_cork->opt->dst1opt) 1215366e41d9SVlad Yasevich return -ENOBUFS; 1216366e41d9SVlad Yasevich 1217366e41d9SVlad Yasevich v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt, 1218366e41d9SVlad Yasevich sk->sk_allocation); 1219366e41d9SVlad Yasevich if (opt->hopopt && !v6_cork->opt->hopopt) 1220366e41d9SVlad Yasevich return -ENOBUFS; 1221366e41d9SVlad Yasevich 1222366e41d9SVlad Yasevich v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt, 1223366e41d9SVlad Yasevich sk->sk_allocation); 1224366e41d9SVlad Yasevich if (opt->srcrt && !v6_cork->opt->srcrt) 1225366e41d9SVlad Yasevich return -ENOBUFS; 1226366e41d9SVlad Yasevich 1227366e41d9SVlad Yasevich /* need source address above miyazawa*/ 1228366e41d9SVlad Yasevich } 1229366e41d9SVlad Yasevich dst_hold(&rt->dst); 1230366e41d9SVlad Yasevich cork->base.dst = &rt->dst; 1231366e41d9SVlad Yasevich cork->fl.u.ip6 = *fl6; 1232*26879da5SWei Wang v6_cork->hop_limit = ipc6->hlimit; 1233*26879da5SWei Wang v6_cork->tclass = ipc6->tclass; 1234366e41d9SVlad Yasevich if (rt->dst.flags & DST_XFRM_TUNNEL) 1235366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1236366e41d9SVlad Yasevich rt->dst.dev->mtu : dst_mtu(&rt->dst); 1237366e41d9SVlad Yasevich else 1238366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1239366e41d9SVlad Yasevich rt->dst.dev->mtu : dst_mtu(rt->dst.path); 1240366e41d9SVlad Yasevich if (np->frag_size < mtu) { 1241366e41d9SVlad Yasevich if (np->frag_size) 1242366e41d9SVlad Yasevich mtu = np->frag_size; 1243366e41d9SVlad Yasevich } 1244366e41d9SVlad Yasevich cork->base.fragsize = mtu; 1245366e41d9SVlad Yasevich if (dst_allfrag(rt->dst.path)) 1246366e41d9SVlad Yasevich cork->base.flags |= IPCORK_ALLFRAG; 1247366e41d9SVlad Yasevich cork->base.length = 0; 1248366e41d9SVlad Yasevich 1249366e41d9SVlad Yasevich return 0; 1250366e41d9SVlad Yasevich } 1251366e41d9SVlad Yasevich 12520bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk, 12530bbe84a6SVlad Yasevich struct flowi6 *fl6, 12540bbe84a6SVlad Yasevich struct sk_buff_head *queue, 12550bbe84a6SVlad Yasevich struct inet_cork *cork, 12560bbe84a6SVlad Yasevich struct inet6_cork *v6_cork, 12570bbe84a6SVlad Yasevich struct page_frag *pfrag, 12580bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, 12590bbe84a6SVlad Yasevich int len, int odd, struct sk_buff *skb), 12601da177e4SLinus Torvalds void *from, int length, int transhdrlen, 1261*26879da5SWei Wang unsigned int flags, struct ipcm6_cookie *ipc6, 1262c14ac945SSoheil Hassas Yeganeh const struct sockcm_cookie *sockc) 12631da177e4SLinus Torvalds { 12640c183379SGao feng struct sk_buff *skb, *skb_prev = NULL; 1265e367c2d0Slucien unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu; 12660bbe84a6SVlad Yasevich int exthdrlen = 0; 12670bbe84a6SVlad Yasevich int dst_exthdrlen = 0; 12681da177e4SLinus Torvalds int hh_len; 12691da177e4SLinus Torvalds int copy; 12701da177e4SLinus Torvalds int err; 12711da177e4SLinus Torvalds int offset = 0; 1272a693e698SAnders Berggren __u8 tx_flags = 0; 127309c2d251SWillem de Bruijn u32 tskey = 0; 12740bbe84a6SVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->dst; 12750bbe84a6SVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 127632dce968SVlad Yasevich int csummode = CHECKSUM_NONE; 1277682b1a9dSHannes Frederic Sowa unsigned int maxnonfragsize, headersize; 12781da177e4SLinus Torvalds 12790bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 12800bbe84a6SVlad Yasevich if (!skb) { 12810bbe84a6SVlad Yasevich exthdrlen = opt ? opt->opt_flen : 0; 12827efdba5bSRomain KUNTZ dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len; 12831da177e4SLinus Torvalds } 12840bbe84a6SVlad Yasevich 1285366e41d9SVlad Yasevich mtu = cork->fragsize; 1286e367c2d0Slucien orig_mtu = mtu; 12871da177e4SLinus Torvalds 1288d8d1f30bSChangli Gao hh_len = LL_RESERVED_SPACE(rt->dst.dev); 12891da177e4SLinus Torvalds 1290a1b05140SMasahide NAKAMURA fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len + 1291b4ce9277SHerbert Xu (opt ? opt->opt_nflen : 0); 12924df98e76SHannes Frederic Sowa maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen - 12934df98e76SHannes Frederic Sowa sizeof(struct frag_hdr); 12941da177e4SLinus Torvalds 12954df98e76SHannes Frederic Sowa headersize = sizeof(struct ipv6hdr) + 12963a1cebe7SHannes Frederic Sowa (opt ? opt->opt_flen + opt->opt_nflen : 0) + 12974df98e76SHannes Frederic Sowa (dst_allfrag(&rt->dst) ? 12984df98e76SHannes Frederic Sowa sizeof(struct frag_hdr) : 0) + 12994df98e76SHannes Frederic Sowa rt->rt6i_nfheader_len; 13004df98e76SHannes Frederic Sowa 1301*26879da5SWei Wang if (cork->length + length > mtu - headersize && ipc6->dontfrag && 13024df98e76SHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP || 13034df98e76SHannes Frederic Sowa sk->sk_protocol == IPPROTO_RAW)) { 13044df98e76SHannes Frederic Sowa ipv6_local_rxpmtu(sk, fl6, mtu - headersize + 13054df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 13064df98e76SHannes Frederic Sowa goto emsgsize; 13074df98e76SHannes Frederic Sowa } 13084df98e76SHannes Frederic Sowa 1309682b1a9dSHannes Frederic Sowa if (ip6_sk_ignore_df(sk)) 1310682b1a9dSHannes Frederic Sowa maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN; 1311682b1a9dSHannes Frederic Sowa else 1312682b1a9dSHannes Frederic Sowa maxnonfragsize = mtu; 1313682b1a9dSHannes Frederic Sowa 13144df98e76SHannes Frederic Sowa if (cork->length + length > maxnonfragsize - headersize) { 13154df98e76SHannes Frederic Sowa emsgsize: 13164df98e76SHannes Frederic Sowa ipv6_local_error(sk, EMSGSIZE, fl6, 13174df98e76SHannes Frederic Sowa mtu - headersize + 13184df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 13191da177e4SLinus Torvalds return -EMSGSIZE; 13201da177e4SLinus Torvalds } 1321682b1a9dSHannes Frederic Sowa 1322682b1a9dSHannes Frederic Sowa /* CHECKSUM_PARTIAL only with no extension headers and when 1323682b1a9dSHannes Frederic Sowa * we are not going to fragment 1324682b1a9dSHannes Frederic Sowa */ 1325682b1a9dSHannes Frederic Sowa if (transhdrlen && sk->sk_protocol == IPPROTO_UDP && 1326682b1a9dSHannes Frederic Sowa headersize == sizeof(struct ipv6hdr) && 1327682b1a9dSHannes Frederic Sowa length < mtu - headersize && 1328682b1a9dSHannes Frederic Sowa !(flags & MSG_MORE) && 1329c8cd0989STom Herbert rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM)) 1330682b1a9dSHannes Frederic Sowa csummode = CHECKSUM_PARTIAL; 13311da177e4SLinus Torvalds 133209c2d251SWillem de Bruijn if (sk->sk_type == SOCK_DGRAM || sk->sk_type == SOCK_RAW) { 1333c14ac945SSoheil Hassas Yeganeh sock_tx_timestamp(sk, sockc->tsflags, &tx_flags); 133409c2d251SWillem de Bruijn if (tx_flags & SKBTX_ANY_SW_TSTAMP && 133509c2d251SWillem de Bruijn sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID) 133609c2d251SWillem de Bruijn tskey = sk->sk_tskey++; 133709c2d251SWillem de Bruijn } 1338a693e698SAnders Berggren 13391da177e4SLinus Torvalds /* 13401da177e4SLinus Torvalds * Let's try using as much space as possible. 13411da177e4SLinus Torvalds * Use MTU if total length of the message fits into the MTU. 13421da177e4SLinus Torvalds * Otherwise, we need to reserve fragment header and 13431da177e4SLinus Torvalds * fragment alignment (= 8-15 octects, in total). 13441da177e4SLinus Torvalds * 13451da177e4SLinus Torvalds * Note that we may need to "move" the data from the tail of 13461da177e4SLinus Torvalds * of the buffer to the new fragment when we split 13471da177e4SLinus Torvalds * the message. 13481da177e4SLinus Torvalds * 13491da177e4SLinus Torvalds * FIXME: It may be fragmented into multiple chunks 13501da177e4SLinus Torvalds * at once if non-fragmentable extension headers 13511da177e4SLinus Torvalds * are too large. 13521da177e4SLinus Torvalds * --yoshfuji 13531da177e4SLinus Torvalds */ 13541da177e4SLinus Torvalds 13552811ebacSHannes Frederic Sowa cork->length += length; 13562811ebacSHannes Frederic Sowa if (((length > mtu) || 13572811ebacSHannes Frederic Sowa (skb && skb_is_gso(skb))) && 13582811ebacSHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP) && 1359acf8dd0aSMichal Kubeček (rt->dst.dev->features & NETIF_F_UFO) && 136040ba3302SMichal Kubeček (sk->sk_type == SOCK_DGRAM) && !udp_get_no_check6_tx(sk)) { 13610bbe84a6SVlad Yasevich err = ip6_ufo_append_data(sk, queue, getfrag, from, length, 13623ba3458fSJakub Sitnicki hh_len, fragheaderlen, exthdrlen, 1363fd0273d7SMartin KaFai Lau transhdrlen, mtu, flags, fl6); 1364baa829d8SPatrick McHardy if (err) 1365e89e9cf5SAnanda Raju goto error; 1366e89e9cf5SAnanda Raju return 0; 1367e89e9cf5SAnanda Raju } 13681da177e4SLinus Torvalds 13692811ebacSHannes Frederic Sowa if (!skb) 13701da177e4SLinus Torvalds goto alloc_new_skb; 13711da177e4SLinus Torvalds 13721da177e4SLinus Torvalds while (length > 0) { 13731da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 1374bdc712b4SDavid S. Miller copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len; 13751da177e4SLinus Torvalds if (copy < length) 13761da177e4SLinus Torvalds copy = maxfraglen - skb->len; 13771da177e4SLinus Torvalds 13781da177e4SLinus Torvalds if (copy <= 0) { 13791da177e4SLinus Torvalds char *data; 13801da177e4SLinus Torvalds unsigned int datalen; 13811da177e4SLinus Torvalds unsigned int fraglen; 13821da177e4SLinus Torvalds unsigned int fraggap; 13831da177e4SLinus Torvalds unsigned int alloclen; 13841da177e4SLinus Torvalds alloc_new_skb: 13851da177e4SLinus Torvalds /* There's no room in the current skb */ 13860c183379SGao feng if (skb) 13870c183379SGao feng fraggap = skb->len - maxfraglen; 13881da177e4SLinus Torvalds else 13891da177e4SLinus Torvalds fraggap = 0; 13900c183379SGao feng /* update mtu and maxfraglen if necessary */ 139163159f29SIan Morris if (!skb || !skb_prev) 13920c183379SGao feng ip6_append_data_mtu(&mtu, &maxfraglen, 139375a493e6SHannes Frederic Sowa fragheaderlen, skb, rt, 1394e367c2d0Slucien orig_mtu); 13950c183379SGao feng 13960c183379SGao feng skb_prev = skb; 13971da177e4SLinus Torvalds 13981da177e4SLinus Torvalds /* 13991da177e4SLinus Torvalds * If remaining data exceeds the mtu, 14001da177e4SLinus Torvalds * we know we need more fragment(s). 14011da177e4SLinus Torvalds */ 14021da177e4SLinus Torvalds datalen = length + fraggap; 14031da177e4SLinus Torvalds 14040c183379SGao feng if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen) 14050c183379SGao feng datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len; 14061da177e4SLinus Torvalds if ((flags & MSG_MORE) && 1407d8d1f30bSChangli Gao !(rt->dst.dev->features&NETIF_F_SG)) 14081da177e4SLinus Torvalds alloclen = mtu; 14091da177e4SLinus Torvalds else 14101da177e4SLinus Torvalds alloclen = datalen + fragheaderlen; 14111da177e4SLinus Torvalds 1412299b0767SSteffen Klassert alloclen += dst_exthdrlen; 1413299b0767SSteffen Klassert 14140c183379SGao feng if (datalen != length + fraggap) { 14151da177e4SLinus Torvalds /* 14160c183379SGao feng * this is not the last fragment, the trailer 14170c183379SGao feng * space is regarded as data space. 14181da177e4SLinus Torvalds */ 14190c183379SGao feng datalen += rt->dst.trailer_len; 14200c183379SGao feng } 14210c183379SGao feng 1422d8d1f30bSChangli Gao alloclen += rt->dst.trailer_len; 14230c183379SGao feng fraglen = datalen + fragheaderlen; 14241da177e4SLinus Torvalds 14251da177e4SLinus Torvalds /* 14261da177e4SLinus Torvalds * We just reserve space for fragment header. 14271da177e4SLinus Torvalds * Note: this may be overallocation if the message 14281da177e4SLinus Torvalds * (without MSG_MORE) fits into the MTU. 14291da177e4SLinus Torvalds */ 14301da177e4SLinus Torvalds alloclen += sizeof(struct frag_hdr); 14311da177e4SLinus Torvalds 14321da177e4SLinus Torvalds if (transhdrlen) { 14331da177e4SLinus Torvalds skb = sock_alloc_send_skb(sk, 14341da177e4SLinus Torvalds alloclen + hh_len, 14351da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 14361da177e4SLinus Torvalds } else { 14371da177e4SLinus Torvalds skb = NULL; 14381da177e4SLinus Torvalds if (atomic_read(&sk->sk_wmem_alloc) <= 14391da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 14401da177e4SLinus Torvalds skb = sock_wmalloc(sk, 14411da177e4SLinus Torvalds alloclen + hh_len, 1, 14421da177e4SLinus Torvalds sk->sk_allocation); 144363159f29SIan Morris if (unlikely(!skb)) 14441da177e4SLinus Torvalds err = -ENOBUFS; 14451da177e4SLinus Torvalds } 144663159f29SIan Morris if (!skb) 14471da177e4SLinus Torvalds goto error; 14481da177e4SLinus Torvalds /* 14491da177e4SLinus Torvalds * Fill in the control structures 14501da177e4SLinus Torvalds */ 14519c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 145232dce968SVlad Yasevich skb->ip_summed = csummode; 14531da177e4SLinus Torvalds skb->csum = 0; 14541f85851eSGao feng /* reserve for fragmentation and ipsec header */ 14551f85851eSGao feng skb_reserve(skb, hh_len + sizeof(struct frag_hdr) + 14561f85851eSGao feng dst_exthdrlen); 14571da177e4SLinus Torvalds 145811878b40SWillem de Bruijn /* Only the initial fragment is time stamped */ 1459a693e698SAnders Berggren skb_shinfo(skb)->tx_flags = tx_flags; 146011878b40SWillem de Bruijn tx_flags = 0; 146109c2d251SWillem de Bruijn skb_shinfo(skb)->tskey = tskey; 146209c2d251SWillem de Bruijn tskey = 0; 1463a693e698SAnders Berggren 14641da177e4SLinus Torvalds /* 14651da177e4SLinus Torvalds * Find where to start putting bytes 14661da177e4SLinus Torvalds */ 14671f85851eSGao feng data = skb_put(skb, fraglen); 14681f85851eSGao feng skb_set_network_header(skb, exthdrlen); 14691f85851eSGao feng data += fragheaderlen; 1470b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1471b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 14721da177e4SLinus Torvalds if (fraggap) { 14731da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 14741da177e4SLinus Torvalds skb_prev, maxfraglen, 14751da177e4SLinus Torvalds data + transhdrlen, fraggap, 0); 14761da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 14771da177e4SLinus Torvalds skb->csum); 14781da177e4SLinus Torvalds data += fraggap; 1479e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 14801da177e4SLinus Torvalds } 14811da177e4SLinus Torvalds copy = datalen - transhdrlen - fraggap; 1482299b0767SSteffen Klassert 14831da177e4SLinus Torvalds if (copy < 0) { 14841da177e4SLinus Torvalds err = -EINVAL; 14851da177e4SLinus Torvalds kfree_skb(skb); 14861da177e4SLinus Torvalds goto error; 14871da177e4SLinus Torvalds } else if (copy > 0 && getfrag(from, data + transhdrlen, offset, copy, fraggap, skb) < 0) { 14881da177e4SLinus Torvalds err = -EFAULT; 14891da177e4SLinus Torvalds kfree_skb(skb); 14901da177e4SLinus Torvalds goto error; 14911da177e4SLinus Torvalds } 14921da177e4SLinus Torvalds 14931da177e4SLinus Torvalds offset += copy; 14941da177e4SLinus Torvalds length -= datalen - fraggap; 14951da177e4SLinus Torvalds transhdrlen = 0; 14961da177e4SLinus Torvalds exthdrlen = 0; 1497299b0767SSteffen Klassert dst_exthdrlen = 0; 14981da177e4SLinus Torvalds 14991da177e4SLinus Torvalds /* 15001da177e4SLinus Torvalds * Put the packet on the pending queue 15011da177e4SLinus Torvalds */ 15020bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 15031da177e4SLinus Torvalds continue; 15041da177e4SLinus Torvalds } 15051da177e4SLinus Torvalds 15061da177e4SLinus Torvalds if (copy > length) 15071da177e4SLinus Torvalds copy = length; 15081da177e4SLinus Torvalds 1509d8d1f30bSChangli Gao if (!(rt->dst.dev->features&NETIF_F_SG)) { 15101da177e4SLinus Torvalds unsigned int off; 15111da177e4SLinus Torvalds 15121da177e4SLinus Torvalds off = skb->len; 15131da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 15141da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 15151da177e4SLinus Torvalds __skb_trim(skb, off); 15161da177e4SLinus Torvalds err = -EFAULT; 15171da177e4SLinus Torvalds goto error; 15181da177e4SLinus Torvalds } 15191da177e4SLinus Torvalds } else { 15201da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 15211da177e4SLinus Torvalds 15221da177e4SLinus Torvalds err = -ENOMEM; 15235640f768SEric Dumazet if (!sk_page_frag_refill(sk, pfrag)) 15241da177e4SLinus Torvalds goto error; 15251da177e4SLinus Torvalds 15265640f768SEric Dumazet if (!skb_can_coalesce(skb, i, pfrag->page, 15275640f768SEric Dumazet pfrag->offset)) { 15281da177e4SLinus Torvalds err = -EMSGSIZE; 15295640f768SEric Dumazet if (i == MAX_SKB_FRAGS) 15301da177e4SLinus Torvalds goto error; 15315640f768SEric Dumazet 15325640f768SEric Dumazet __skb_fill_page_desc(skb, i, pfrag->page, 15335640f768SEric Dumazet pfrag->offset, 0); 15345640f768SEric Dumazet skb_shinfo(skb)->nr_frags = ++i; 15355640f768SEric Dumazet get_page(pfrag->page); 15361da177e4SLinus Torvalds } 15375640f768SEric Dumazet copy = min_t(int, copy, pfrag->size - pfrag->offset); 15389e903e08SEric Dumazet if (getfrag(from, 15395640f768SEric Dumazet page_address(pfrag->page) + pfrag->offset, 15405640f768SEric Dumazet offset, copy, skb->len, skb) < 0) 15415640f768SEric Dumazet goto error_efault; 15425640f768SEric Dumazet 15435640f768SEric Dumazet pfrag->offset += copy; 15445640f768SEric Dumazet skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy); 15451da177e4SLinus Torvalds skb->len += copy; 15461da177e4SLinus Torvalds skb->data_len += copy; 1547f945fa7aSHerbert Xu skb->truesize += copy; 1548f945fa7aSHerbert Xu atomic_add(copy, &sk->sk_wmem_alloc); 15491da177e4SLinus Torvalds } 15501da177e4SLinus Torvalds offset += copy; 15511da177e4SLinus Torvalds length -= copy; 15521da177e4SLinus Torvalds } 15535640f768SEric Dumazet 15541da177e4SLinus Torvalds return 0; 15555640f768SEric Dumazet 15565640f768SEric Dumazet error_efault: 15575640f768SEric Dumazet err = -EFAULT; 15581da177e4SLinus Torvalds error: 1559bdc712b4SDavid S. Miller cork->length -= length; 15603bd653c8SDenis V. Lunev IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS); 15611da177e4SLinus Torvalds return err; 15621da177e4SLinus Torvalds } 15630bbe84a6SVlad Yasevich 15640bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk, 15650bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, int len, 15660bbe84a6SVlad Yasevich int odd, struct sk_buff *skb), 1567*26879da5SWei Wang void *from, int length, int transhdrlen, 1568*26879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 1569*26879da5SWei Wang struct rt6_info *rt, unsigned int flags, 1570c14ac945SSoheil Hassas Yeganeh const struct sockcm_cookie *sockc) 15710bbe84a6SVlad Yasevich { 15720bbe84a6SVlad Yasevich struct inet_sock *inet = inet_sk(sk); 15730bbe84a6SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 15740bbe84a6SVlad Yasevich int exthdrlen; 15750bbe84a6SVlad Yasevich int err; 15760bbe84a6SVlad Yasevich 15770bbe84a6SVlad Yasevich if (flags&MSG_PROBE) 15780bbe84a6SVlad Yasevich return 0; 15790bbe84a6SVlad Yasevich if (skb_queue_empty(&sk->sk_write_queue)) { 15800bbe84a6SVlad Yasevich /* 15810bbe84a6SVlad Yasevich * setup for corking 15820bbe84a6SVlad Yasevich */ 1583*26879da5SWei Wang err = ip6_setup_cork(sk, &inet->cork, &np->cork, 1584*26879da5SWei Wang ipc6, rt, fl6); 15850bbe84a6SVlad Yasevich if (err) 15860bbe84a6SVlad Yasevich return err; 15870bbe84a6SVlad Yasevich 1588*26879da5SWei Wang exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 15890bbe84a6SVlad Yasevich length += exthdrlen; 15900bbe84a6SVlad Yasevich transhdrlen += exthdrlen; 15910bbe84a6SVlad Yasevich } else { 15920bbe84a6SVlad Yasevich fl6 = &inet->cork.fl.u.ip6; 15930bbe84a6SVlad Yasevich transhdrlen = 0; 15940bbe84a6SVlad Yasevich } 15950bbe84a6SVlad Yasevich 15960bbe84a6SVlad Yasevich return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base, 15970bbe84a6SVlad Yasevich &np->cork, sk_page_frag(sk), getfrag, 1598*26879da5SWei Wang from, length, transhdrlen, flags, ipc6, sockc); 15990bbe84a6SVlad Yasevich } 1600a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data); 16011da177e4SLinus Torvalds 1602366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork, 1603366e41d9SVlad Yasevich struct inet6_cork *v6_cork) 1604bf138862SPavel Emelyanov { 1605366e41d9SVlad Yasevich if (v6_cork->opt) { 1606366e41d9SVlad Yasevich kfree(v6_cork->opt->dst0opt); 1607366e41d9SVlad Yasevich kfree(v6_cork->opt->dst1opt); 1608366e41d9SVlad Yasevich kfree(v6_cork->opt->hopopt); 1609366e41d9SVlad Yasevich kfree(v6_cork->opt->srcrt); 1610366e41d9SVlad Yasevich kfree(v6_cork->opt); 1611366e41d9SVlad Yasevich v6_cork->opt = NULL; 16120178b695SHerbert Xu } 16130178b695SHerbert Xu 1614366e41d9SVlad Yasevich if (cork->base.dst) { 1615366e41d9SVlad Yasevich dst_release(cork->base.dst); 1616366e41d9SVlad Yasevich cork->base.dst = NULL; 1617366e41d9SVlad Yasevich cork->base.flags &= ~IPCORK_ALLFRAG; 1618bf138862SPavel Emelyanov } 1619366e41d9SVlad Yasevich memset(&cork->fl, 0, sizeof(cork->fl)); 1620bf138862SPavel Emelyanov } 1621bf138862SPavel Emelyanov 16226422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk, 16236422398cSVlad Yasevich struct sk_buff_head *queue, 16246422398cSVlad Yasevich struct inet_cork_full *cork, 16256422398cSVlad Yasevich struct inet6_cork *v6_cork) 16261da177e4SLinus Torvalds { 16271da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 16281da177e4SLinus Torvalds struct sk_buff **tail_skb; 16291da177e4SLinus Torvalds struct in6_addr final_dst_buf, *final_dst = &final_dst_buf; 16301da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 16313bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 16321da177e4SLinus Torvalds struct ipv6hdr *hdr; 16336422398cSVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 16346422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->base.dst; 16356422398cSVlad Yasevich struct flowi6 *fl6 = &cork->fl.u.ip6; 16364c9483b2SDavid S. Miller unsigned char proto = fl6->flowi6_proto; 16371da177e4SLinus Torvalds 16386422398cSVlad Yasevich skb = __skb_dequeue(queue); 163963159f29SIan Morris if (!skb) 16401da177e4SLinus Torvalds goto out; 16411da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 16421da177e4SLinus Torvalds 16431da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1644d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1645bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 16466422398cSVlad Yasevich while ((tmp_skb = __skb_dequeue(queue)) != NULL) { 1647cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 16481da177e4SLinus Torvalds *tail_skb = tmp_skb; 16491da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 16501da177e4SLinus Torvalds skb->len += tmp_skb->len; 16511da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 16521da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 16531da177e4SLinus Torvalds tmp_skb->destructor = NULL; 16541da177e4SLinus Torvalds tmp_skb->sk = NULL; 16551da177e4SLinus Torvalds } 16561da177e4SLinus Torvalds 165728a89453SHerbert Xu /* Allow local fragmentation. */ 165860ff7467SWANG Cong skb->ignore_df = ip6_sk_ignore_df(sk); 165928a89453SHerbert Xu 16604e3fd7a0SAlexey Dobriyan *final_dst = fl6->daddr; 1661cfe1fc77SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_header_len(skb)); 16621da177e4SLinus Torvalds if (opt && opt->opt_flen) 16631da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 16641da177e4SLinus Torvalds if (opt && opt->opt_nflen) 16651da177e4SLinus Torvalds ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst); 16661da177e4SLinus Torvalds 1667e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 1668e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 16690660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 16701da177e4SLinus Torvalds 16716422398cSVlad Yasevich ip6_flow_hdr(hdr, v6_cork->tclass, 1672cb1ce2efSTom Herbert ip6_make_flowlabel(net, skb, fl6->flowlabel, 167367800f9bSTom Herbert np->autoflowlabel, fl6)); 16746422398cSVlad Yasevich hdr->hop_limit = v6_cork->hop_limit; 16751da177e4SLinus Torvalds hdr->nexthdr = proto; 16764e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 16774e3fd7a0SAlexey Dobriyan hdr->daddr = *final_dst; 16781da177e4SLinus Torvalds 1679a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 16804a19ec58SLaszlo Attila Toth skb->mark = sk->sk_mark; 1681a2c2064fSPatrick McHardy 1682d8d1f30bSChangli Gao skb_dst_set(skb, dst_clone(&rt->dst)); 1683edf391ffSNeil Horman IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len); 168414878f75SDavid L Stevens if (proto == IPPROTO_ICMPV6) { 1685adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 168614878f75SDavid L Stevens 168743a43b60SHannes Frederic Sowa ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type); 168843a43b60SHannes Frederic Sowa ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS); 168914878f75SDavid L Stevens } 169014878f75SDavid L Stevens 16916422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 16926422398cSVlad Yasevich out: 16936422398cSVlad Yasevich return skb; 16946422398cSVlad Yasevich } 16956422398cSVlad Yasevich 16966422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb) 16976422398cSVlad Yasevich { 16986422398cSVlad Yasevich struct net *net = sock_net(skb->sk); 16996422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 17006422398cSVlad Yasevich int err; 17016422398cSVlad Yasevich 170233224b16SEric W. Biederman err = ip6_local_out(net, skb->sk, skb); 17031da177e4SLinus Torvalds if (err) { 17041da177e4SLinus Torvalds if (err > 0) 17056ce9e7b5SEric Dumazet err = net_xmit_errno(err); 17061da177e4SLinus Torvalds if (err) 17076422398cSVlad Yasevich IP6_INC_STATS(net, rt->rt6i_idev, 17086422398cSVlad Yasevich IPSTATS_MIB_OUTDISCARDS); 17091da177e4SLinus Torvalds } 17101da177e4SLinus Torvalds 17111da177e4SLinus Torvalds return err; 17126422398cSVlad Yasevich } 17136422398cSVlad Yasevich 17146422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk) 17156422398cSVlad Yasevich { 17166422398cSVlad Yasevich struct sk_buff *skb; 17176422398cSVlad Yasevich 17186422398cSVlad Yasevich skb = ip6_finish_skb(sk); 17196422398cSVlad Yasevich if (!skb) 17206422398cSVlad Yasevich return 0; 17216422398cSVlad Yasevich 17226422398cSVlad Yasevich return ip6_send_skb(skb); 17231da177e4SLinus Torvalds } 1724a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames); 17251da177e4SLinus Torvalds 17260bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk, 17276422398cSVlad Yasevich struct sk_buff_head *queue, 17286422398cSVlad Yasevich struct inet_cork_full *cork, 17296422398cSVlad Yasevich struct inet6_cork *v6_cork) 17301da177e4SLinus Torvalds { 17311da177e4SLinus Torvalds struct sk_buff *skb; 17321da177e4SLinus Torvalds 17330bbe84a6SVlad Yasevich while ((skb = __skb_dequeue_tail(queue)) != NULL) { 1734adf30907SEric Dumazet if (skb_dst(skb)) 1735adf30907SEric Dumazet IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)), 1736a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 17371da177e4SLinus Torvalds kfree_skb(skb); 17381da177e4SLinus Torvalds } 17391da177e4SLinus Torvalds 17406422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 17411da177e4SLinus Torvalds } 17420bbe84a6SVlad Yasevich 17430bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk) 17440bbe84a6SVlad Yasevich { 17456422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &sk->sk_write_queue, 17466422398cSVlad Yasevich &inet_sk(sk)->cork, &inet6_sk(sk)->cork); 17470bbe84a6SVlad Yasevich } 1748a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames); 17496422398cSVlad Yasevich 17506422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk, 17516422398cSVlad Yasevich int getfrag(void *from, char *to, int offset, 17526422398cSVlad Yasevich int len, int odd, struct sk_buff *skb), 17536422398cSVlad Yasevich void *from, int length, int transhdrlen, 1754*26879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 17556422398cSVlad Yasevich struct rt6_info *rt, unsigned int flags, 1756*26879da5SWei Wang const struct sockcm_cookie *sockc) 17576422398cSVlad Yasevich { 17586422398cSVlad Yasevich struct inet_cork_full cork; 17596422398cSVlad Yasevich struct inet6_cork v6_cork; 17606422398cSVlad Yasevich struct sk_buff_head queue; 1761*26879da5SWei Wang int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 17626422398cSVlad Yasevich int err; 17636422398cSVlad Yasevich 17646422398cSVlad Yasevich if (flags & MSG_PROBE) 17656422398cSVlad Yasevich return NULL; 17666422398cSVlad Yasevich 17676422398cSVlad Yasevich __skb_queue_head_init(&queue); 17686422398cSVlad Yasevich 17696422398cSVlad Yasevich cork.base.flags = 0; 17706422398cSVlad Yasevich cork.base.addr = 0; 17716422398cSVlad Yasevich cork.base.opt = NULL; 17726422398cSVlad Yasevich v6_cork.opt = NULL; 1773*26879da5SWei Wang err = ip6_setup_cork(sk, &cork, &v6_cork, ipc6, rt, fl6); 17746422398cSVlad Yasevich if (err) 17756422398cSVlad Yasevich return ERR_PTR(err); 17766422398cSVlad Yasevich 1777*26879da5SWei Wang if (ipc6->dontfrag < 0) 1778*26879da5SWei Wang ipc6->dontfrag = inet6_sk(sk)->dontfrag; 17796422398cSVlad Yasevich 17806422398cSVlad Yasevich err = __ip6_append_data(sk, fl6, &queue, &cork.base, &v6_cork, 17816422398cSVlad Yasevich ¤t->task_frag, getfrag, from, 17826422398cSVlad Yasevich length + exthdrlen, transhdrlen + exthdrlen, 1783*26879da5SWei Wang flags, ipc6, sockc); 17846422398cSVlad Yasevich if (err) { 17856422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &queue, &cork, &v6_cork); 17866422398cSVlad Yasevich return ERR_PTR(err); 17876422398cSVlad Yasevich } 17886422398cSVlad Yasevich 17896422398cSVlad Yasevich return __ip6_make_skb(sk, &queue, &cork, &v6_cork); 17906422398cSVlad Yasevich } 1791