11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * IPv6 output functions 31da177e4SLinus Torvalds * Linux INET6 implementation 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * Authors: 61da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 71da177e4SLinus Torvalds * 81da177e4SLinus Torvalds * Based on linux/net/ipv4/ip_output.c 91da177e4SLinus Torvalds * 101da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or 111da177e4SLinus Torvalds * modify it under the terms of the GNU General Public License 121da177e4SLinus Torvalds * as published by the Free Software Foundation; either version 131da177e4SLinus Torvalds * 2 of the License, or (at your option) any later version. 141da177e4SLinus Torvalds * 151da177e4SLinus Torvalds * Changes: 161da177e4SLinus Torvalds * A.N.Kuznetsov : airthmetics in fragmentation. 171da177e4SLinus Torvalds * extension headers are implemented. 181da177e4SLinus Torvalds * route changes now work. 191da177e4SLinus Torvalds * ip6_forward does not confuse sniffers. 201da177e4SLinus Torvalds * etc. 211da177e4SLinus Torvalds * 221da177e4SLinus Torvalds * H. von Brand : Added missing #include <linux/string.h> 231da177e4SLinus Torvalds * Imran Patel : frag id should be in NBO 241da177e4SLinus Torvalds * Kazunori MIYAZAWA @USAGI 251da177e4SLinus Torvalds * : add ip6_append_data and related functions 261da177e4SLinus Torvalds * for datagram xmit 271da177e4SLinus Torvalds */ 281da177e4SLinus Torvalds 291da177e4SLinus Torvalds #include <linux/errno.h> 30ef76bc23SHerbert Xu #include <linux/kernel.h> 311da177e4SLinus Torvalds #include <linux/string.h> 321da177e4SLinus Torvalds #include <linux/socket.h> 331da177e4SLinus Torvalds #include <linux/net.h> 341da177e4SLinus Torvalds #include <linux/netdevice.h> 351da177e4SLinus Torvalds #include <linux/if_arp.h> 361da177e4SLinus Torvalds #include <linux/in6.h> 371da177e4SLinus Torvalds #include <linux/tcp.h> 381da177e4SLinus Torvalds #include <linux/route.h> 39b59f45d0SHerbert Xu #include <linux/module.h> 405a0e3ad6STejun Heo #include <linux/slab.h> 411da177e4SLinus Torvalds 4233b48679SDaniel Mack #include <linux/bpf-cgroup.h> 431da177e4SLinus Torvalds #include <linux/netfilter.h> 441da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h> 451da177e4SLinus Torvalds 461da177e4SLinus Torvalds #include <net/sock.h> 471da177e4SLinus Torvalds #include <net/snmp.h> 481da177e4SLinus Torvalds 491da177e4SLinus Torvalds #include <net/ipv6.h> 501da177e4SLinus Torvalds #include <net/ndisc.h> 511da177e4SLinus Torvalds #include <net/protocol.h> 521da177e4SLinus Torvalds #include <net/ip6_route.h> 531da177e4SLinus Torvalds #include <net/addrconf.h> 541da177e4SLinus Torvalds #include <net/rawv6.h> 551da177e4SLinus Torvalds #include <net/icmp.h> 561da177e4SLinus Torvalds #include <net/xfrm.h> 571da177e4SLinus Torvalds #include <net/checksum.h> 587bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h> 59ca254490SDavid Ahern #include <net/l3mdev.h> 6014972cbdSRoopa Prabhu #include <net/lwtunnel.h> 611da177e4SLinus Torvalds 627d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb) 631da177e4SLinus Torvalds { 64adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 651da177e4SLinus Torvalds struct net_device *dev = dst->dev; 66f6b72b62SDavid S. Miller struct neighbour *neigh; 676fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 struct in6_addr *nexthop; 686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 int ret; 691da177e4SLinus Torvalds 701da177e4SLinus Torvalds skb->protocol = htons(ETH_P_IPV6); 711da177e4SLinus Torvalds skb->dev = dev; 721da177e4SLinus Torvalds 730660e03fSArnaldo Carvalho de Melo if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) { 74adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 751da177e4SLinus Torvalds 767026b1ddSDavid Miller if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) && 7778126c41SEric W. Biederman ((mroute6_socket(net, skb) && 78bd91b8bfSBenjamin Thery !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) || 790660e03fSArnaldo Carvalho de Melo ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr, 807bc570c8SYOSHIFUJI Hideaki &ipv6_hdr(skb)->saddr))) { 811da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 821da177e4SLinus Torvalds 831da177e4SLinus Torvalds /* Do not check for IFF_ALLMULTI; multicast routing 841da177e4SLinus Torvalds is not supported in any case. 851da177e4SLinus Torvalds */ 861da177e4SLinus Torvalds if (newskb) 87b2e0b385SJan Engelhardt NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING, 8829a26a56SEric W. Biederman net, sk, newskb, NULL, newskb->dev, 8995603e22SMichel Machado dev_loopback_xmit); 901da177e4SLinus Torvalds 910660e03fSArnaldo Carvalho de Melo if (ipv6_hdr(skb)->hop_limit == 0) { 9278126c41SEric W. Biederman IP6_INC_STATS(net, idev, 933bd653c8SDenis V. Lunev IPSTATS_MIB_OUTDISCARDS); 941da177e4SLinus Torvalds kfree_skb(skb); 951da177e4SLinus Torvalds return 0; 961da177e4SLinus Torvalds } 971da177e4SLinus Torvalds } 981da177e4SLinus Torvalds 9978126c41SEric W. Biederman IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len); 100dd408515SHannes Frederic Sowa 101dd408515SHannes Frederic Sowa if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <= 102dd408515SHannes Frederic Sowa IPV6_ADDR_SCOPE_NODELOCAL && 103dd408515SHannes Frederic Sowa !(dev->flags & IFF_LOOPBACK)) { 104dd408515SHannes Frederic Sowa kfree_skb(skb); 105dd408515SHannes Frederic Sowa return 0; 106dd408515SHannes Frederic Sowa } 1071da177e4SLinus Torvalds } 1081da177e4SLinus Torvalds 10914972cbdSRoopa Prabhu if (lwtunnel_xmit_redirect(dst->lwtstate)) { 11014972cbdSRoopa Prabhu int res = lwtunnel_xmit(skb); 11114972cbdSRoopa Prabhu 11214972cbdSRoopa Prabhu if (res < 0 || res == LWTUNNEL_XMIT_DONE) 11314972cbdSRoopa Prabhu return res; 11414972cbdSRoopa Prabhu } 11514972cbdSRoopa Prabhu 1166fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 1172647a9b0SMartin KaFai Lau nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr); 1186fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop); 1196fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(!neigh)) 1206fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false); 1216fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (!IS_ERR(neigh)) { 1226fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 ret = dst_neigh_output(dst, neigh, skb); 1236fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 return ret; 1256fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 } 1266fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 12705e3aa09SDavid S. Miller 12878126c41SEric W. Biederman IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES); 1299e508490SJan Engelhardt kfree_skb(skb); 1309e508490SJan Engelhardt return -EINVAL; 1311da177e4SLinus Torvalds } 1321da177e4SLinus Torvalds 1330c4b51f0SEric W. Biederman static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1349e508490SJan Engelhardt { 13533b48679SDaniel Mack int ret; 13633b48679SDaniel Mack 13733b48679SDaniel Mack ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb); 13833b48679SDaniel Mack if (ret) { 13933b48679SDaniel Mack kfree_skb(skb); 14033b48679SDaniel Mack return ret; 14133b48679SDaniel Mack } 14233b48679SDaniel Mack 1439e508490SJan Engelhardt if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) || 1449037c357SJiri Pirko dst_allfrag(skb_dst(skb)) || 1459037c357SJiri Pirko (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size)) 1467d8c6e39SEric W. Biederman return ip6_fragment(net, sk, skb, ip6_finish_output2); 1479e508490SJan Engelhardt else 1487d8c6e39SEric W. Biederman return ip6_finish_output2(net, sk, skb); 1499e508490SJan Engelhardt } 1509e508490SJan Engelhardt 151ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1521da177e4SLinus Torvalds { 1539e508490SJan Engelhardt struct net_device *dev = skb_dst(skb)->dev; 154adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 155be10de0aSEric W. Biederman 156778d80beSYOSHIFUJI Hideaki if (unlikely(idev->cnf.disable_ipv6)) { 15719a0644cSEric W. Biederman IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 158778d80beSYOSHIFUJI Hideaki kfree_skb(skb); 159778d80beSYOSHIFUJI Hideaki return 0; 160778d80beSYOSHIFUJI Hideaki } 161778d80beSYOSHIFUJI Hideaki 16229a26a56SEric W. Biederman return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING, 16329a26a56SEric W. Biederman net, sk, skb, NULL, dev, 1649c6eb28aSJan Engelhardt ip6_finish_output, 1659c6eb28aSJan Engelhardt !(IP6CB(skb)->flags & IP6SKB_REROUTED)); 1661da177e4SLinus Torvalds } 1671da177e4SLinus Torvalds 1681da177e4SLinus Torvalds /* 169b5d43998SShan Wei * xmit an sk_buff (used by TCP, SCTP and DCCP) 1701c1e9d2bSEric Dumazet * Note : socket lock is not held for SYNACK packets, but might be modified 1711c1e9d2bSEric Dumazet * by calls to skb_set_owner_w() and ipv6_local_error(), 1721c1e9d2bSEric Dumazet * which are using proper atomic operations or spinlocks. 1731da177e4SLinus Torvalds */ 1741c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6, 17592e55f41SPablo Neira __u32 mark, struct ipv6_txoptions *opt, int tclass) 1761da177e4SLinus Torvalds { 1773bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 1781c1e9d2bSEric Dumazet const struct ipv6_pinfo *np = inet6_sk(sk); 1794c9483b2SDavid S. Miller struct in6_addr *first_hop = &fl6->daddr; 180adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 1811da177e4SLinus Torvalds struct ipv6hdr *hdr; 1824c9483b2SDavid S. Miller u8 proto = fl6->flowi6_proto; 1831da177e4SLinus Torvalds int seg_len = skb->len; 184e651f03aSGerrit Renker int hlimit = -1; 1851da177e4SLinus Torvalds u32 mtu; 1861da177e4SLinus Torvalds 1871da177e4SLinus Torvalds if (opt) { 188c2636b4dSChuck Lever unsigned int head_room; 1891da177e4SLinus Torvalds 1901da177e4SLinus Torvalds /* First: exthdrs may take lots of space (~8K for now) 1911da177e4SLinus Torvalds MAX_HEADER is not enough. 1921da177e4SLinus Torvalds */ 1931da177e4SLinus Torvalds head_room = opt->opt_nflen + opt->opt_flen; 1941da177e4SLinus Torvalds seg_len += head_room; 1951da177e4SLinus Torvalds head_room += sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev); 1961da177e4SLinus Torvalds 1971da177e4SLinus Torvalds if (skb_headroom(skb) < head_room) { 1981da177e4SLinus Torvalds struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room); 19963159f29SIan Morris if (!skb2) { 200adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 201a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 2021da177e4SLinus Torvalds kfree_skb(skb); 2031da177e4SLinus Torvalds return -ENOBUFS; 2041da177e4SLinus Torvalds } 205808db80aSEric Dumazet consume_skb(skb); 206a11d206dSYOSHIFUJI Hideaki skb = skb2; 2071c1e9d2bSEric Dumazet /* skb_set_owner_w() changes sk->sk_wmem_alloc atomically, 2081c1e9d2bSEric Dumazet * it is safe to call in our context (socket lock not held) 2091c1e9d2bSEric Dumazet */ 2101c1e9d2bSEric Dumazet skb_set_owner_w(skb, (struct sock *)sk); 2111da177e4SLinus Torvalds } 2121da177e4SLinus Torvalds if (opt->opt_flen) 2131da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 2141da177e4SLinus Torvalds if (opt->opt_nflen) 215613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop, 216613fa3caSDavid Lebrun &fl6->saddr); 2171da177e4SLinus Torvalds } 2181da177e4SLinus Torvalds 219e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 220e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 2210660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 2221da177e4SLinus Torvalds 2231da177e4SLinus Torvalds /* 2241da177e4SLinus Torvalds * Fill in the IPv6 header 2251da177e4SLinus Torvalds */ 226b903d324SEric Dumazet if (np) 2271da177e4SLinus Torvalds hlimit = np->hop_limit; 2281da177e4SLinus Torvalds if (hlimit < 0) 2296b75d090SYOSHIFUJI Hideaki hlimit = ip6_dst_hoplimit(dst); 2301da177e4SLinus Torvalds 231cb1ce2efSTom Herbert ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel, 23267800f9bSTom Herbert np->autoflowlabel, fl6)); 23341a1f8eaSYOSHIFUJI Hideaki 2341da177e4SLinus Torvalds hdr->payload_len = htons(seg_len); 2351da177e4SLinus Torvalds hdr->nexthdr = proto; 2361da177e4SLinus Torvalds hdr->hop_limit = hlimit; 2371da177e4SLinus Torvalds 2384e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 2394e3fd7a0SAlexey Dobriyan hdr->daddr = *first_hop; 2401da177e4SLinus Torvalds 2419c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 242a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 24392e55f41SPablo Neira skb->mark = mark; 244a2c2064fSPatrick McHardy 2451da177e4SLinus Torvalds mtu = dst_mtu(dst); 24660ff7467SWANG Cong if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) { 247adf30907SEric Dumazet IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)), 248edf391ffSNeil Horman IPSTATS_MIB_OUT, skb->len); 249a8e3e1a9SDavid Ahern 250a8e3e1a9SDavid Ahern /* if egress device is enslaved to an L3 master device pass the 251a8e3e1a9SDavid Ahern * skb to its handler for processing 252a8e3e1a9SDavid Ahern */ 253a8e3e1a9SDavid Ahern skb = l3mdev_ip6_out((struct sock *)sk, skb); 254a8e3e1a9SDavid Ahern if (unlikely(!skb)) 255a8e3e1a9SDavid Ahern return 0; 256a8e3e1a9SDavid Ahern 2571c1e9d2bSEric Dumazet /* hooks should never assume socket lock is held. 2581c1e9d2bSEric Dumazet * we promote our socket to non const 2591c1e9d2bSEric Dumazet */ 26029a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, 2611c1e9d2bSEric Dumazet net, (struct sock *)sk, skb, NULL, dst->dev, 26213206b6bSEric W. Biederman dst_output); 2631da177e4SLinus Torvalds } 2641da177e4SLinus Torvalds 2651da177e4SLinus Torvalds skb->dev = dst->dev; 2661c1e9d2bSEric Dumazet /* ipv6_local_error() does not require socket lock, 2671c1e9d2bSEric Dumazet * we promote our socket to non const 2681c1e9d2bSEric Dumazet */ 2691c1e9d2bSEric Dumazet ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu); 2701c1e9d2bSEric Dumazet 271adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS); 2721da177e4SLinus Torvalds kfree_skb(skb); 2731da177e4SLinus Torvalds return -EMSGSIZE; 2741da177e4SLinus Torvalds } 2757159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit); 2767159039aSYOSHIFUJI Hideaki 2771da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel) 2781da177e4SLinus Torvalds { 2791da177e4SLinus Torvalds struct ip6_ra_chain *ra; 2801da177e4SLinus Torvalds struct sock *last = NULL; 2811da177e4SLinus Torvalds 2821da177e4SLinus Torvalds read_lock(&ip6_ra_lock); 2831da177e4SLinus Torvalds for (ra = ip6_ra_chain; ra; ra = ra->next) { 2841da177e4SLinus Torvalds struct sock *sk = ra->sk; 2850bd1b59bSAndrew McDonald if (sk && ra->sel == sel && 2860bd1b59bSAndrew McDonald (!sk->sk_bound_dev_if || 2870bd1b59bSAndrew McDonald sk->sk_bound_dev_if == skb->dev->ifindex)) { 2881da177e4SLinus Torvalds if (last) { 2891da177e4SLinus Torvalds struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC); 2901da177e4SLinus Torvalds if (skb2) 2911da177e4SLinus Torvalds rawv6_rcv(last, skb2); 2921da177e4SLinus Torvalds } 2931da177e4SLinus Torvalds last = sk; 2941da177e4SLinus Torvalds } 2951da177e4SLinus Torvalds } 2961da177e4SLinus Torvalds 2971da177e4SLinus Torvalds if (last) { 2981da177e4SLinus Torvalds rawv6_rcv(last, skb); 2991da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3001da177e4SLinus Torvalds return 1; 3011da177e4SLinus Torvalds } 3021da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3031da177e4SLinus Torvalds return 0; 3041da177e4SLinus Torvalds } 3051da177e4SLinus Torvalds 306e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb) 307e21e0b5fSVille Nuorvala { 3080660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 309e21e0b5fSVille Nuorvala u8 nexthdr = hdr->nexthdr; 31075f2811cSJesse Gross __be16 frag_off; 311e21e0b5fSVille Nuorvala int offset; 312e21e0b5fSVille Nuorvala 313e21e0b5fSVille Nuorvala if (ipv6_ext_hdr(nexthdr)) { 31475f2811cSJesse Gross offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off); 315e21e0b5fSVille Nuorvala if (offset < 0) 316e21e0b5fSVille Nuorvala return 0; 317e21e0b5fSVille Nuorvala } else 318e21e0b5fSVille Nuorvala offset = sizeof(struct ipv6hdr); 319e21e0b5fSVille Nuorvala 320e21e0b5fSVille Nuorvala if (nexthdr == IPPROTO_ICMPV6) { 321e21e0b5fSVille Nuorvala struct icmp6hdr *icmp6; 322e21e0b5fSVille Nuorvala 323d56f90a7SArnaldo Carvalho de Melo if (!pskb_may_pull(skb, (skb_network_header(skb) + 324d56f90a7SArnaldo Carvalho de Melo offset + 1 - skb->data))) 325e21e0b5fSVille Nuorvala return 0; 326e21e0b5fSVille Nuorvala 327d56f90a7SArnaldo Carvalho de Melo icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset); 328e21e0b5fSVille Nuorvala 329e21e0b5fSVille Nuorvala switch (icmp6->icmp6_type) { 330e21e0b5fSVille Nuorvala case NDISC_ROUTER_SOLICITATION: 331e21e0b5fSVille Nuorvala case NDISC_ROUTER_ADVERTISEMENT: 332e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_SOLICITATION: 333e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_ADVERTISEMENT: 334e21e0b5fSVille Nuorvala case NDISC_REDIRECT: 335e21e0b5fSVille Nuorvala /* For reaction involving unicast neighbor discovery 336e21e0b5fSVille Nuorvala * message destined to the proxied address, pass it to 337e21e0b5fSVille Nuorvala * input function. 338e21e0b5fSVille Nuorvala */ 339e21e0b5fSVille Nuorvala return 1; 340e21e0b5fSVille Nuorvala default: 341e21e0b5fSVille Nuorvala break; 342e21e0b5fSVille Nuorvala } 343e21e0b5fSVille Nuorvala } 344e21e0b5fSVille Nuorvala 34574553b09SVille Nuorvala /* 34674553b09SVille Nuorvala * The proxying router can't forward traffic sent to a link-local 34774553b09SVille Nuorvala * address, so signal the sender and discard the packet. This 34874553b09SVille Nuorvala * behavior is clarified by the MIPv6 specification. 34974553b09SVille Nuorvala */ 35074553b09SVille Nuorvala if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) { 35174553b09SVille Nuorvala dst_link_failure(skb); 35274553b09SVille Nuorvala return -1; 35374553b09SVille Nuorvala } 35474553b09SVille Nuorvala 355e21e0b5fSVille Nuorvala return 0; 356e21e0b5fSVille Nuorvala } 357e21e0b5fSVille Nuorvala 3580c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk, 3590c4b51f0SEric W. Biederman struct sk_buff *skb) 3601da177e4SLinus Torvalds { 36113206b6bSEric W. Biederman return dst_output(net, sk, skb); 3621da177e4SLinus Torvalds } 3631da177e4SLinus Torvalds 3640954cf9cSHannes Frederic Sowa static unsigned int ip6_dst_mtu_forward(const struct dst_entry *dst) 3650954cf9cSHannes Frederic Sowa { 3660954cf9cSHannes Frederic Sowa unsigned int mtu; 3670954cf9cSHannes Frederic Sowa struct inet6_dev *idev; 3680954cf9cSHannes Frederic Sowa 3690954cf9cSHannes Frederic Sowa if (dst_metric_locked(dst, RTAX_MTU)) { 3700954cf9cSHannes Frederic Sowa mtu = dst_metric_raw(dst, RTAX_MTU); 3710954cf9cSHannes Frederic Sowa if (mtu) 3720954cf9cSHannes Frederic Sowa return mtu; 3730954cf9cSHannes Frederic Sowa } 3740954cf9cSHannes Frederic Sowa 3750954cf9cSHannes Frederic Sowa mtu = IPV6_MIN_MTU; 3760954cf9cSHannes Frederic Sowa rcu_read_lock(); 3770954cf9cSHannes Frederic Sowa idev = __in6_dev_get(dst->dev); 3780954cf9cSHannes Frederic Sowa if (idev) 3790954cf9cSHannes Frederic Sowa mtu = idev->cnf.mtu6; 3800954cf9cSHannes Frederic Sowa rcu_read_unlock(); 3810954cf9cSHannes Frederic Sowa 3820954cf9cSHannes Frederic Sowa return mtu; 3830954cf9cSHannes Frederic Sowa } 3840954cf9cSHannes Frederic Sowa 385fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu) 386fe6cc55fSFlorian Westphal { 387418a3156SFlorian Westphal if (skb->len <= mtu) 388fe6cc55fSFlorian Westphal return false; 389fe6cc55fSFlorian Westphal 39060ff7467SWANG Cong /* ipv6 conntrack defrag sets max_frag_size + ignore_df */ 391fe6cc55fSFlorian Westphal if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu) 392fe6cc55fSFlorian Westphal return true; 393fe6cc55fSFlorian Westphal 39460ff7467SWANG Cong if (skb->ignore_df) 395418a3156SFlorian Westphal return false; 396418a3156SFlorian Westphal 397ae7ef81eSMarcelo Ricardo Leitner if (skb_is_gso(skb) && skb_gso_validate_mtu(skb, mtu)) 398fe6cc55fSFlorian Westphal return false; 399fe6cc55fSFlorian Westphal 400fe6cc55fSFlorian Westphal return true; 401fe6cc55fSFlorian Westphal } 402fe6cc55fSFlorian Westphal 4031da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb) 4041da177e4SLinus Torvalds { 405adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 4060660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 4071da177e4SLinus Torvalds struct inet6_skb_parm *opt = IP6CB(skb); 408c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(dst->dev); 40914f3ad6fSUlrich Weber u32 mtu; 4101da177e4SLinus Torvalds 41153b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->forwarding == 0) 4121da177e4SLinus Torvalds goto error; 4131da177e4SLinus Torvalds 414090f1166SLi RongQing if (skb->pkt_type != PACKET_HOST) 415090f1166SLi RongQing goto drop; 416090f1166SLi RongQing 4179ef2e965SHannes Frederic Sowa if (unlikely(skb->sk)) 4189ef2e965SHannes Frederic Sowa goto drop; 4199ef2e965SHannes Frederic Sowa 4204497b076SBen Hutchings if (skb_warn_if_lro(skb)) 4214497b076SBen Hutchings goto drop; 4224497b076SBen Hutchings 4231da177e4SLinus Torvalds if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) { 4241d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 42515c77d8bSEric Dumazet IPSTATS_MIB_INDISCARDS); 4261da177e4SLinus Torvalds goto drop; 4271da177e4SLinus Torvalds } 4281da177e4SLinus Torvalds 42935fc92a9SHerbert Xu skb_forward_csum(skb); 4301da177e4SLinus Torvalds 4311da177e4SLinus Torvalds /* 4321da177e4SLinus Torvalds * We DO NOT make any processing on 4331da177e4SLinus Torvalds * RA packets, pushing them to user level AS IS 4341da177e4SLinus Torvalds * without ane WARRANTY that application will be able 4351da177e4SLinus Torvalds * to interpret them. The reason is that we 4361da177e4SLinus Torvalds * cannot make anything clever here. 4371da177e4SLinus Torvalds * 4381da177e4SLinus Torvalds * We are not end-node, so that if packet contains 4391da177e4SLinus Torvalds * AH/ESP, we cannot make anything. 4401da177e4SLinus Torvalds * Defragmentation also would be mistake, RA packets 4411da177e4SLinus Torvalds * cannot be fragmented, because there is no warranty 4421da177e4SLinus Torvalds * that different fragments will go along one path. --ANK 4431da177e4SLinus Torvalds */ 444ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) { 445ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (ip6_call_ra_chain(skb, ntohs(opt->ra))) 4461da177e4SLinus Torvalds return 0; 4471da177e4SLinus Torvalds } 4481da177e4SLinus Torvalds 4491da177e4SLinus Torvalds /* 4501da177e4SLinus Torvalds * check and decrement ttl 4511da177e4SLinus Torvalds */ 4521da177e4SLinus Torvalds if (hdr->hop_limit <= 1) { 4531da177e4SLinus Torvalds /* Force OUTPUT device used as source address */ 4541da177e4SLinus Torvalds skb->dev = dst->dev; 4553ffe533cSAlexey Dobriyan icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0); 4561d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 45715c77d8bSEric Dumazet IPSTATS_MIB_INHDRERRORS); 4581da177e4SLinus Torvalds 4591da177e4SLinus Torvalds kfree_skb(skb); 4601da177e4SLinus Torvalds return -ETIMEDOUT; 4611da177e4SLinus Torvalds } 4621da177e4SLinus Torvalds 463fbea49e1SYOSHIFUJI Hideaki /* XXX: idev->cnf.proxy_ndp? */ 46453b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->proxy_ndp && 4658a3edd80SDaniel Lezcano pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) { 46674553b09SVille Nuorvala int proxied = ip6_forward_proxy_check(skb); 46774553b09SVille Nuorvala if (proxied > 0) 468e21e0b5fSVille Nuorvala return ip6_input(skb); 46974553b09SVille Nuorvala else if (proxied < 0) { 4701d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 4713bd653c8SDenis V. Lunev IPSTATS_MIB_INDISCARDS); 47274553b09SVille Nuorvala goto drop; 47374553b09SVille Nuorvala } 474e21e0b5fSVille Nuorvala } 475e21e0b5fSVille Nuorvala 4761da177e4SLinus Torvalds if (!xfrm6_route_forward(skb)) { 4771d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 47815c77d8bSEric Dumazet IPSTATS_MIB_INDISCARDS); 4791da177e4SLinus Torvalds goto drop; 4801da177e4SLinus Torvalds } 481adf30907SEric Dumazet dst = skb_dst(skb); 4821da177e4SLinus Torvalds 4831da177e4SLinus Torvalds /* IPv6 specs say nothing about it, but it is clear that we cannot 4841da177e4SLinus Torvalds send redirects to source routed frames. 4851e5dc146SMasahide NAKAMURA We don't send redirects to frames decapsulated from IPsec. 4861da177e4SLinus Torvalds */ 487c45a3dfbSDavid S. Miller if (skb->dev == dst->dev && opt->srcrt == 0 && !skb_sec_path(skb)) { 4881da177e4SLinus Torvalds struct in6_addr *target = NULL; 489fbfe95a4SDavid S. Miller struct inet_peer *peer; 4901da177e4SLinus Torvalds struct rt6_info *rt; 4911da177e4SLinus Torvalds 4921da177e4SLinus Torvalds /* 4931da177e4SLinus Torvalds * incoming and outgoing devices are the same 4941da177e4SLinus Torvalds * send a redirect. 4951da177e4SLinus Torvalds */ 4961da177e4SLinus Torvalds 4971da177e4SLinus Torvalds rt = (struct rt6_info *) dst; 498c45a3dfbSDavid S. Miller if (rt->rt6i_flags & RTF_GATEWAY) 499c45a3dfbSDavid S. Miller target = &rt->rt6i_gateway; 5001da177e4SLinus Torvalds else 5011da177e4SLinus Torvalds target = &hdr->daddr; 5021da177e4SLinus Torvalds 503fd0273d7SMartin KaFai Lau peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1); 50492d86829SDavid S. Miller 5051da177e4SLinus Torvalds /* Limit redirects both by destination (here) 5061da177e4SLinus Torvalds and by source (inside ndisc_send_redirect) 5071da177e4SLinus Torvalds */ 508fbfe95a4SDavid S. Miller if (inet_peer_xrlim_allow(peer, 1*HZ)) 5094991969aSDavid S. Miller ndisc_send_redirect(skb, target); 5101d861aa4SDavid S. Miller if (peer) 5111d861aa4SDavid S. Miller inet_putpeer(peer); 5125bb1ab09SDavid L Stevens } else { 5135bb1ab09SDavid L Stevens int addrtype = ipv6_addr_type(&hdr->saddr); 5145bb1ab09SDavid L Stevens 5151da177e4SLinus Torvalds /* This check is security critical. */ 516f81b2e7dSYOSHIFUJI Hideaki if (addrtype == IPV6_ADDR_ANY || 517f81b2e7dSYOSHIFUJI Hideaki addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK)) 5181da177e4SLinus Torvalds goto error; 5195bb1ab09SDavid L Stevens if (addrtype & IPV6_ADDR_LINKLOCAL) { 5205bb1ab09SDavid L Stevens icmpv6_send(skb, ICMPV6_DEST_UNREACH, 5213ffe533cSAlexey Dobriyan ICMPV6_NOT_NEIGHBOUR, 0); 5225bb1ab09SDavid L Stevens goto error; 5235bb1ab09SDavid L Stevens } 5241da177e4SLinus Torvalds } 5251da177e4SLinus Torvalds 5260954cf9cSHannes Frederic Sowa mtu = ip6_dst_mtu_forward(dst); 52714f3ad6fSUlrich Weber if (mtu < IPV6_MIN_MTU) 52814f3ad6fSUlrich Weber mtu = IPV6_MIN_MTU; 52914f3ad6fSUlrich Weber 530fe6cc55fSFlorian Westphal if (ip6_pkt_too_big(skb, mtu)) { 5311da177e4SLinus Torvalds /* Again, force OUTPUT device used as source address */ 5321da177e4SLinus Torvalds skb->dev = dst->dev; 53314f3ad6fSUlrich Weber icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 5341d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 53515c77d8bSEric Dumazet IPSTATS_MIB_INTOOBIGERRORS); 5361d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 53715c77d8bSEric Dumazet IPSTATS_MIB_FRAGFAILS); 5381da177e4SLinus Torvalds kfree_skb(skb); 5391da177e4SLinus Torvalds return -EMSGSIZE; 5401da177e4SLinus Torvalds } 5411da177e4SLinus Torvalds 5421da177e4SLinus Torvalds if (skb_cow(skb, dst->dev->hard_header_len)) { 5431d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 54415c77d8bSEric Dumazet IPSTATS_MIB_OUTDISCARDS); 5451da177e4SLinus Torvalds goto drop; 5461da177e4SLinus Torvalds } 5471da177e4SLinus Torvalds 5480660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 5491da177e4SLinus Torvalds 5501da177e4SLinus Torvalds /* Mangling hops number delayed to point after skb COW */ 5511da177e4SLinus Torvalds 5521da177e4SLinus Torvalds hdr->hop_limit--; 5531da177e4SLinus Torvalds 5541d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS); 5551d015503SEric Dumazet __IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len); 55629a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, 55729a26a56SEric W. Biederman net, NULL, skb, skb->dev, dst->dev, 5586e23ae2aSPatrick McHardy ip6_forward_finish); 5591da177e4SLinus Torvalds 5601da177e4SLinus Torvalds error: 5611d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_INADDRERRORS); 5621da177e4SLinus Torvalds drop: 5631da177e4SLinus Torvalds kfree_skb(skb); 5641da177e4SLinus Torvalds return -EINVAL; 5651da177e4SLinus Torvalds } 5661da177e4SLinus Torvalds 5671da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from) 5681da177e4SLinus Torvalds { 5691da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 5701da177e4SLinus Torvalds to->priority = from->priority; 5711da177e4SLinus Torvalds to->protocol = from->protocol; 572adf30907SEric Dumazet skb_dst_drop(to); 573adf30907SEric Dumazet skb_dst_set(to, dst_clone(skb_dst(from))); 5741da177e4SLinus Torvalds to->dev = from->dev; 57582e91ffeSThomas Graf to->mark = from->mark; 5761da177e4SLinus Torvalds 5771da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 5781da177e4SLinus Torvalds to->tc_index = from->tc_index; 5791da177e4SLinus Torvalds #endif 580e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 581984bc16cSJames Morris skb_copy_secmark(to, from); 5821da177e4SLinus Torvalds } 5831da177e4SLinus Torvalds 5847d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, 5857d8c6e39SEric W. Biederman int (*output)(struct net *, struct sock *, struct sk_buff *)) 5861da177e4SLinus Torvalds { 5871da177e4SLinus Torvalds struct sk_buff *frag; 588adf30907SEric Dumazet struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 589f60e5990Shannes@stressinduktion.org struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? 590f60e5990Shannes@stressinduktion.org inet6_sk(skb->sk) : NULL; 5911da177e4SLinus Torvalds struct ipv6hdr *tmp_hdr; 5921da177e4SLinus Torvalds struct frag_hdr *fh; 5931da177e4SLinus Torvalds unsigned int mtu, hlen, left, len; 594a7ae1992SHerbert Xu int hroom, troom; 595286c2349SMartin KaFai Lau __be32 frag_id; 5961da177e4SLinus Torvalds int ptr, offset = 0, err = 0; 5971da177e4SLinus Torvalds u8 *prevhdr, nexthdr = 0; 5981da177e4SLinus Torvalds 5991da177e4SLinus Torvalds hlen = ip6_find_1stfragopt(skb, &prevhdr); 6001da177e4SLinus Torvalds nexthdr = *prevhdr; 6011da177e4SLinus Torvalds 602628a5c56SJohn Heffner mtu = ip6_skb_dst_mtu(skb); 603b881ef76SJohn Heffner 604b881ef76SJohn Heffner /* We must not fragment if the socket is set to force MTU discovery 60514f3ad6fSUlrich Weber * or if the skb it not generated by a local socket. 606b881ef76SJohn Heffner */ 607485fca66SFlorian Westphal if (unlikely(!skb->ignore_df && skb->len > mtu)) 608485fca66SFlorian Westphal goto fail_toobig; 609a34a101eSEric Dumazet 610485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size) { 611485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size > mtu) 612485fca66SFlorian Westphal goto fail_toobig; 613485fca66SFlorian Westphal 614485fca66SFlorian Westphal /* don't send fragments larger than what we received */ 615485fca66SFlorian Westphal mtu = IP6CB(skb)->frag_max_size; 616485fca66SFlorian Westphal if (mtu < IPV6_MIN_MTU) 617485fca66SFlorian Westphal mtu = IPV6_MIN_MTU; 618b881ef76SJohn Heffner } 619b881ef76SJohn Heffner 620d91675f9SYOSHIFUJI Hideaki if (np && np->frag_size < mtu) { 621d91675f9SYOSHIFUJI Hideaki if (np->frag_size) 622d91675f9SYOSHIFUJI Hideaki mtu = np->frag_size; 623d91675f9SYOSHIFUJI Hideaki } 62489bc7848SHannes Frederic Sowa if (mtu < hlen + sizeof(struct frag_hdr) + 8) 625b72a2b01SHannes Frederic Sowa goto fail_toobig; 6261e0d69a9SHannes Frederic Sowa mtu -= hlen + sizeof(struct frag_hdr); 6271da177e4SLinus Torvalds 628fd0273d7SMartin KaFai Lau frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr, 629fd0273d7SMartin KaFai Lau &ipv6_hdr(skb)->saddr); 630286c2349SMartin KaFai Lau 631405c92f7SHannes Frederic Sowa if (skb->ip_summed == CHECKSUM_PARTIAL && 632405c92f7SHannes Frederic Sowa (err = skb_checksum_help(skb))) 633405c92f7SHannes Frederic Sowa goto fail; 634405c92f7SHannes Frederic Sowa 6351d325d21SFlorian Westphal hroom = LL_RESERVED_SPACE(rt->dst.dev); 63621dc3301SDavid S. Miller if (skb_has_frag_list(skb)) { 637c72d8cdaSAlexey Dobriyan unsigned int first_len = skb_pagelen(skb); 6383d13008eSEric Dumazet struct sk_buff *frag2; 6391da177e4SLinus Torvalds 6401da177e4SLinus Torvalds if (first_len - hlen > mtu || 6411da177e4SLinus Torvalds ((first_len - hlen) & 7) || 6421d325d21SFlorian Westphal skb_cloned(skb) || 6431d325d21SFlorian Westphal skb_headroom(skb) < (hroom + sizeof(struct frag_hdr))) 6441da177e4SLinus Torvalds goto slow_path; 6451da177e4SLinus Torvalds 6464d9092bbSDavid S. Miller skb_walk_frags(skb, frag) { 6471da177e4SLinus Torvalds /* Correct geometry. */ 6481da177e4SLinus Torvalds if (frag->len > mtu || 6491da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 6501d325d21SFlorian Westphal skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr))) 6513d13008eSEric Dumazet goto slow_path_clean; 6521da177e4SLinus Torvalds 6531da177e4SLinus Torvalds /* Partially cloned skb? */ 6541da177e4SLinus Torvalds if (skb_shared(frag)) 6553d13008eSEric Dumazet goto slow_path_clean; 6562fdba6b0SHerbert Xu 6572fdba6b0SHerbert Xu BUG_ON(frag->sk); 6582fdba6b0SHerbert Xu if (skb->sk) { 6592fdba6b0SHerbert Xu frag->sk = skb->sk; 6602fdba6b0SHerbert Xu frag->destructor = sock_wfree; 6612fdba6b0SHerbert Xu } 6623d13008eSEric Dumazet skb->truesize -= frag->truesize; 6631da177e4SLinus Torvalds } 6641da177e4SLinus Torvalds 6651da177e4SLinus Torvalds err = 0; 6661da177e4SLinus Torvalds offset = 0; 6671da177e4SLinus Torvalds /* BUILD HEADER */ 6681da177e4SLinus Torvalds 6699a217a1cSYOSHIFUJI Hideaki *prevhdr = NEXTHDR_FRAGMENT; 670d56f90a7SArnaldo Carvalho de Melo tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC); 6711da177e4SLinus Torvalds if (!tmp_hdr) { 672adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 6733bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 6741d325d21SFlorian Westphal err = -ENOMEM; 6751d325d21SFlorian Westphal goto fail; 6761da177e4SLinus Torvalds } 6771d325d21SFlorian Westphal frag = skb_shinfo(skb)->frag_list; 6781d325d21SFlorian Westphal skb_frag_list_init(skb); 6791da177e4SLinus Torvalds 6801da177e4SLinus Torvalds __skb_pull(skb, hlen); 6811da177e4SLinus Torvalds fh = (struct frag_hdr *)__skb_push(skb, sizeof(struct frag_hdr)); 682e2d1bca7SArnaldo Carvalho de Melo __skb_push(skb, hlen); 683e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 684d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(skb), tmp_hdr, hlen); 6851da177e4SLinus Torvalds 6861da177e4SLinus Torvalds fh->nexthdr = nexthdr; 6871da177e4SLinus Torvalds fh->reserved = 0; 6881da177e4SLinus Torvalds fh->frag_off = htons(IP6_MF); 689286c2349SMartin KaFai Lau fh->identification = frag_id; 6901da177e4SLinus Torvalds 6911da177e4SLinus Torvalds first_len = skb_pagelen(skb); 6921da177e4SLinus Torvalds skb->data_len = first_len - skb_headlen(skb); 6931da177e4SLinus Torvalds skb->len = first_len; 6940660e03fSArnaldo Carvalho de Melo ipv6_hdr(skb)->payload_len = htons(first_len - 6950660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 6961da177e4SLinus Torvalds 697d8d1f30bSChangli Gao dst_hold(&rt->dst); 6981da177e4SLinus Torvalds 6991da177e4SLinus Torvalds for (;;) { 7001da177e4SLinus Torvalds /* Prepare header of the next frame, 7011da177e4SLinus Torvalds * before previous one went down. */ 7021da177e4SLinus Torvalds if (frag) { 7031da177e4SLinus Torvalds frag->ip_summed = CHECKSUM_NONE; 704badff6d0SArnaldo Carvalho de Melo skb_reset_transport_header(frag); 7051da177e4SLinus Torvalds fh = (struct frag_hdr *)__skb_push(frag, sizeof(struct frag_hdr)); 706e2d1bca7SArnaldo Carvalho de Melo __skb_push(frag, hlen); 707e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(frag); 708d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(frag), tmp_hdr, 709d56f90a7SArnaldo Carvalho de Melo hlen); 7101da177e4SLinus Torvalds offset += skb->len - hlen - sizeof(struct frag_hdr); 7111da177e4SLinus Torvalds fh->nexthdr = nexthdr; 7121da177e4SLinus Torvalds fh->reserved = 0; 7131da177e4SLinus Torvalds fh->frag_off = htons(offset); 71453b24b8fSIan Morris if (frag->next) 7151da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 7161da177e4SLinus Torvalds fh->identification = frag_id; 7170660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = 7180660e03fSArnaldo Carvalho de Melo htons(frag->len - 7190660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 7201da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 7211da177e4SLinus Torvalds } 7221da177e4SLinus Torvalds 7237d8c6e39SEric W. Biederman err = output(net, sk, skb); 724dafee490SWei Dong if (!err) 725d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7263bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 727dafee490SWei Dong 7281da177e4SLinus Torvalds if (err || !frag) 7291da177e4SLinus Torvalds break; 7301da177e4SLinus Torvalds 7311da177e4SLinus Torvalds skb = frag; 7321da177e4SLinus Torvalds frag = skb->next; 7331da177e4SLinus Torvalds skb->next = NULL; 7341da177e4SLinus Torvalds } 7351da177e4SLinus Torvalds 7361da177e4SLinus Torvalds kfree(tmp_hdr); 7371da177e4SLinus Torvalds 7381da177e4SLinus Torvalds if (err == 0) { 739d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7403bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGOKS); 74194e187c0SAmerigo Wang ip6_rt_put(rt); 7421da177e4SLinus Torvalds return 0; 7431da177e4SLinus Torvalds } 7441da177e4SLinus Torvalds 74546cfd725SFlorian Westphal kfree_skb_list(frag); 7461da177e4SLinus Torvalds 747d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7483bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 74994e187c0SAmerigo Wang ip6_rt_put(rt); 7501da177e4SLinus Torvalds return err; 7513d13008eSEric Dumazet 7523d13008eSEric Dumazet slow_path_clean: 7533d13008eSEric Dumazet skb_walk_frags(skb, frag2) { 7543d13008eSEric Dumazet if (frag2 == frag) 7553d13008eSEric Dumazet break; 7563d13008eSEric Dumazet frag2->sk = NULL; 7573d13008eSEric Dumazet frag2->destructor = NULL; 7583d13008eSEric Dumazet skb->truesize += frag2->truesize; 7593d13008eSEric Dumazet } 7601da177e4SLinus Torvalds } 7611da177e4SLinus Torvalds 7621da177e4SLinus Torvalds slow_path: 7631da177e4SLinus Torvalds left = skb->len - hlen; /* Space per frame */ 7641da177e4SLinus Torvalds ptr = hlen; /* Where to start from */ 7651da177e4SLinus Torvalds 7661da177e4SLinus Torvalds /* 7671da177e4SLinus Torvalds * Fragment the datagram. 7681da177e4SLinus Torvalds */ 7691da177e4SLinus Torvalds 7701da177e4SLinus Torvalds *prevhdr = NEXTHDR_FRAGMENT; 771a7ae1992SHerbert Xu troom = rt->dst.dev->needed_tailroom; 7721da177e4SLinus Torvalds 7731da177e4SLinus Torvalds /* 7741da177e4SLinus Torvalds * Keep copying data until we run out. 7751da177e4SLinus Torvalds */ 7761da177e4SLinus Torvalds while (left > 0) { 7771da177e4SLinus Torvalds len = left; 7781da177e4SLinus Torvalds /* IF: it doesn't fit, use 'mtu' - the data space left */ 7791da177e4SLinus Torvalds if (len > mtu) 7801da177e4SLinus Torvalds len = mtu; 7811da177e4SLinus Torvalds /* IF: we are not sending up to and including the packet end 7821da177e4SLinus Torvalds then align the next start on an eight byte boundary */ 7831da177e4SLinus Torvalds if (len < left) { 7841da177e4SLinus Torvalds len &= ~7; 7851da177e4SLinus Torvalds } 7861da177e4SLinus Torvalds 787cbffccc9SJoe Perches /* Allocate buffer */ 788cbffccc9SJoe Perches frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) + 789cbffccc9SJoe Perches hroom + troom, GFP_ATOMIC); 790cbffccc9SJoe Perches if (!frag) { 791adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 792a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 7931da177e4SLinus Torvalds err = -ENOMEM; 7941da177e4SLinus Torvalds goto fail; 7951da177e4SLinus Torvalds } 7961da177e4SLinus Torvalds 7971da177e4SLinus Torvalds /* 7981da177e4SLinus Torvalds * Set up data on packet 7991da177e4SLinus Torvalds */ 8001da177e4SLinus Torvalds 8011da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 802a7ae1992SHerbert Xu skb_reserve(frag, hroom); 8031da177e4SLinus Torvalds skb_put(frag, len + hlen + sizeof(struct frag_hdr)); 804c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(frag); 805badff6d0SArnaldo Carvalho de Melo fh = (struct frag_hdr *)(skb_network_header(frag) + hlen); 806b0e380b1SArnaldo Carvalho de Melo frag->transport_header = (frag->network_header + hlen + 807b0e380b1SArnaldo Carvalho de Melo sizeof(struct frag_hdr)); 8081da177e4SLinus Torvalds 8091da177e4SLinus Torvalds /* 8101da177e4SLinus Torvalds * Charge the memory for the fragment to any owner 8111da177e4SLinus Torvalds * it might possess 8121da177e4SLinus Torvalds */ 8131da177e4SLinus Torvalds if (skb->sk) 8141da177e4SLinus Torvalds skb_set_owner_w(frag, skb->sk); 8151da177e4SLinus Torvalds 8161da177e4SLinus Torvalds /* 8171da177e4SLinus Torvalds * Copy the packet header into the new buffer. 8181da177e4SLinus Torvalds */ 819d626f62bSArnaldo Carvalho de Melo skb_copy_from_linear_data(skb, skb_network_header(frag), hlen); 8201da177e4SLinus Torvalds 8211da177e4SLinus Torvalds /* 8221da177e4SLinus Torvalds * Build fragment header. 8231da177e4SLinus Torvalds */ 8241da177e4SLinus Torvalds fh->nexthdr = nexthdr; 8251da177e4SLinus Torvalds fh->reserved = 0; 8261da177e4SLinus Torvalds fh->identification = frag_id; 8271da177e4SLinus Torvalds 8281da177e4SLinus Torvalds /* 8291da177e4SLinus Torvalds * Copy a block of the IP datagram. 8301da177e4SLinus Torvalds */ 831e3f0b86bSHimangi Saraogi BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag), 832e3f0b86bSHimangi Saraogi len)); 8331da177e4SLinus Torvalds left -= len; 8341da177e4SLinus Torvalds 8351da177e4SLinus Torvalds fh->frag_off = htons(offset); 8361da177e4SLinus Torvalds if (left > 0) 8371da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 8380660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = htons(frag->len - 8390660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 8401da177e4SLinus Torvalds 8411da177e4SLinus Torvalds ptr += len; 8421da177e4SLinus Torvalds offset += len; 8431da177e4SLinus Torvalds 8441da177e4SLinus Torvalds /* 8451da177e4SLinus Torvalds * Put this fragment into the sending queue. 8461da177e4SLinus Torvalds */ 8477d8c6e39SEric W. Biederman err = output(net, sk, frag); 8481da177e4SLinus Torvalds if (err) 8491da177e4SLinus Torvalds goto fail; 850dafee490SWei Dong 851adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 8523bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 8531da177e4SLinus Torvalds } 854adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 855a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGOKS); 856808db80aSEric Dumazet consume_skb(skb); 8571da177e4SLinus Torvalds return err; 8581da177e4SLinus Torvalds 859485fca66SFlorian Westphal fail_toobig: 860485fca66SFlorian Westphal if (skb->sk && dst_allfrag(skb_dst(skb))) 861485fca66SFlorian Westphal sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK); 862485fca66SFlorian Westphal 863485fca66SFlorian Westphal skb->dev = skb_dst(skb)->dev; 864485fca66SFlorian Westphal icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 865485fca66SFlorian Westphal err = -EMSGSIZE; 866485fca66SFlorian Westphal 8671da177e4SLinus Torvalds fail: 868adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 869a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 8701da177e4SLinus Torvalds kfree_skb(skb); 8711da177e4SLinus Torvalds return err; 8721da177e4SLinus Torvalds } 8731da177e4SLinus Torvalds 874b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key, 875b71d1d42SEric Dumazet const struct in6_addr *fl_addr, 876b71d1d42SEric Dumazet const struct in6_addr *addr_cache) 877cf6b1982SYOSHIFUJI Hideaki { 878a02cec21SEric Dumazet return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) && 87963159f29SIan Morris (!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache)); 880cf6b1982SYOSHIFUJI Hideaki } 881cf6b1982SYOSHIFUJI Hideaki 882497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk, 883497c615aSHerbert Xu struct dst_entry *dst, 884b71d1d42SEric Dumazet const struct flowi6 *fl6) 8851da177e4SLinus Torvalds { 8861da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 887a963a37dSEric Dumazet struct rt6_info *rt; 8881da177e4SLinus Torvalds 889497c615aSHerbert Xu if (!dst) 890497c615aSHerbert Xu goto out; 8911da177e4SLinus Torvalds 892a963a37dSEric Dumazet if (dst->ops->family != AF_INET6) { 893a963a37dSEric Dumazet dst_release(dst); 894a963a37dSEric Dumazet return NULL; 895a963a37dSEric Dumazet } 896a963a37dSEric Dumazet 897a963a37dSEric Dumazet rt = (struct rt6_info *)dst; 8981da177e4SLinus Torvalds /* Yes, checking route validity in not connected 899d76e60a5SDavid S. Miller * case is not very simple. Take into account, 900d76e60a5SDavid S. Miller * that we do not support routing by source, TOS, 901d76e60a5SDavid S. Miller * and MSG_DONTROUTE --ANK (980726) 902d76e60a5SDavid S. Miller * 903cf6b1982SYOSHIFUJI Hideaki * 1. ip6_rt_check(): If route was host route, 904cf6b1982SYOSHIFUJI Hideaki * check that cached destination is current. 905d76e60a5SDavid S. Miller * If it is network route, we still may 906d76e60a5SDavid S. Miller * check its validity using saved pointer 907d76e60a5SDavid S. Miller * to the last used address: daddr_cache. 908d76e60a5SDavid S. Miller * We do not want to save whole address now, 909d76e60a5SDavid S. Miller * (because main consumer of this service 910d76e60a5SDavid S. Miller * is tcp, which has not this problem), 911d76e60a5SDavid S. Miller * so that the last trick works only on connected 912d76e60a5SDavid S. Miller * sockets. 913d76e60a5SDavid S. Miller * 2. oif also should be the same. 9141da177e4SLinus Torvalds */ 9154c9483b2SDavid S. Miller if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) || 9168e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES 9174c9483b2SDavid S. Miller ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) || 9188e1ef0a9SYOSHIFUJI Hideaki #endif 919ca254490SDavid Ahern (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) && 920ca254490SDavid Ahern (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) { 921497c615aSHerbert Xu dst_release(dst); 922497c615aSHerbert Xu dst = NULL; 9231da177e4SLinus Torvalds } 924497c615aSHerbert Xu 925497c615aSHerbert Xu out: 926497c615aSHerbert Xu return dst; 9271da177e4SLinus Torvalds } 928497c615aSHerbert Xu 9293aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, 9304c9483b2SDavid S. Miller struct dst_entry **dst, struct flowi6 *fl6) 931497c615aSHerbert Xu { 93269cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 93369cce1d1SDavid S. Miller struct neighbour *n; 93497cac082SDavid S. Miller struct rt6_info *rt; 93569cce1d1SDavid S. Miller #endif 93669cce1d1SDavid S. Miller int err; 9376f21c96aSPaolo Abeni int flags = 0; 9381da177e4SLinus Torvalds 939e16e888bSMarkus Stenberg /* The correct way to handle this would be to do 940e16e888bSMarkus Stenberg * ip6_route_get_saddr, and then ip6_route_output; however, 941e16e888bSMarkus Stenberg * the route-specific preferred source forces the 942e16e888bSMarkus Stenberg * ip6_route_output call _before_ ip6_route_get_saddr. 943e16e888bSMarkus Stenberg * 944e16e888bSMarkus Stenberg * In source specific routing (no src=any default route), 945e16e888bSMarkus Stenberg * ip6_route_output will fail given src=any saddr, though, so 946e16e888bSMarkus Stenberg * that's why we try it again later. 947e16e888bSMarkus Stenberg */ 948e16e888bSMarkus Stenberg if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) { 949e16e888bSMarkus Stenberg struct rt6_info *rt; 950e16e888bSMarkus Stenberg bool had_dst = *dst != NULL; 951e16e888bSMarkus Stenberg 952e16e888bSMarkus Stenberg if (!had_dst) 953e16e888bSMarkus Stenberg *dst = ip6_route_output(net, sk, fl6); 954e16e888bSMarkus Stenberg rt = (*dst)->error ? NULL : (struct rt6_info *)*dst; 955e16e888bSMarkus Stenberg err = ip6_route_get_saddr(net, rt, &fl6->daddr, 956e16e888bSMarkus Stenberg sk ? inet6_sk(sk)->srcprefs : 0, 957e16e888bSMarkus Stenberg &fl6->saddr); 958e16e888bSMarkus Stenberg if (err) 959e16e888bSMarkus Stenberg goto out_err_release; 960e16e888bSMarkus Stenberg 961e16e888bSMarkus Stenberg /* If we had an erroneous initial result, pretend it 962e16e888bSMarkus Stenberg * never existed and let the SA-enabled version take 963e16e888bSMarkus Stenberg * over. 964e16e888bSMarkus Stenberg */ 965e16e888bSMarkus Stenberg if (!had_dst && (*dst)->error) { 966e16e888bSMarkus Stenberg dst_release(*dst); 967e16e888bSMarkus Stenberg *dst = NULL; 968e16e888bSMarkus Stenberg } 9696f21c96aSPaolo Abeni 9706f21c96aSPaolo Abeni if (fl6->flowi6_oif) 9716f21c96aSPaolo Abeni flags |= RT6_LOOKUP_F_IFACE; 972e16e888bSMarkus Stenberg } 973e16e888bSMarkus Stenberg 97463159f29SIan Morris if (!*dst) 9756f21c96aSPaolo Abeni *dst = ip6_route_output_flags(net, sk, fl6, flags); 9761da177e4SLinus Torvalds 977e5d08d71SIan Morris err = (*dst)->error; 978e5d08d71SIan Morris if (err) 9791da177e4SLinus Torvalds goto out_err_release; 9801da177e4SLinus Torvalds 98195c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 98295c385b4SNeil Horman /* 98395c385b4SNeil Horman * Here if the dst entry we've looked up 98495c385b4SNeil Horman * has a neighbour entry that is in the INCOMPLETE 98595c385b4SNeil Horman * state and the src address from the flow is 98695c385b4SNeil Horman * marked as OPTIMISTIC, we release the found 98795c385b4SNeil Horman * dst entry and replace it instead with the 98895c385b4SNeil Horman * dst entry of the nexthop router 98995c385b4SNeil Horman */ 990c56bf6feSEric Dumazet rt = (struct rt6_info *) *dst; 991707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 9922647a9b0SMartin KaFai Lau n = __ipv6_neigh_lookup_noref(rt->dst.dev, 9932647a9b0SMartin KaFai Lau rt6_nexthop(rt, &fl6->daddr)); 994707be1ffSYOSHIFUJI Hideaki / 吉藤英明 err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0; 995707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 996707be1ffSYOSHIFUJI Hideaki / 吉藤英明 997707be1ffSYOSHIFUJI Hideaki / 吉藤英明 if (err) { 99895c385b4SNeil Horman struct inet6_ifaddr *ifp; 9994c9483b2SDavid S. Miller struct flowi6 fl_gw6; 100095c385b4SNeil Horman int redirect; 100195c385b4SNeil Horman 10024c9483b2SDavid S. Miller ifp = ipv6_get_ifaddr(net, &fl6->saddr, 10031cab3da6SDaniel Lezcano (*dst)->dev, 1); 100495c385b4SNeil Horman 100595c385b4SNeil Horman redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC); 100695c385b4SNeil Horman if (ifp) 100795c385b4SNeil Horman in6_ifa_put(ifp); 100895c385b4SNeil Horman 100995c385b4SNeil Horman if (redirect) { 101095c385b4SNeil Horman /* 101195c385b4SNeil Horman * We need to get the dst entry for the 101295c385b4SNeil Horman * default router instead 101395c385b4SNeil Horman */ 101495c385b4SNeil Horman dst_release(*dst); 10154c9483b2SDavid S. Miller memcpy(&fl_gw6, fl6, sizeof(struct flowi6)); 10164c9483b2SDavid S. Miller memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr)); 10174c9483b2SDavid S. Miller *dst = ip6_route_output(net, sk, &fl_gw6); 1018e5d08d71SIan Morris err = (*dst)->error; 1019e5d08d71SIan Morris if (err) 102095c385b4SNeil Horman goto out_err_release; 102195c385b4SNeil Horman } 102295c385b4SNeil Horman } 102395c385b4SNeil Horman #endif 102495c385b4SNeil Horman 10251da177e4SLinus Torvalds return 0; 10261da177e4SLinus Torvalds 10271da177e4SLinus Torvalds out_err_release: 10281da177e4SLinus Torvalds dst_release(*dst); 10291da177e4SLinus Torvalds *dst = NULL; 10308a966fc0SDavid Ahern 10310d240e78SDavid Ahern if (err == -ENETUNREACH) 10320d240e78SDavid Ahern IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES); 10331da177e4SLinus Torvalds return err; 10341da177e4SLinus Torvalds } 103534a0b3cdSAdrian Bunk 1036497c615aSHerbert Xu /** 1037497c615aSHerbert Xu * ip6_dst_lookup - perform route lookup on flow 1038497c615aSHerbert Xu * @sk: socket which provides route info 1039497c615aSHerbert Xu * @dst: pointer to dst_entry * for result 10404c9483b2SDavid S. Miller * @fl6: flow to lookup 1041497c615aSHerbert Xu * 1042497c615aSHerbert Xu * This function performs a route lookup on the given flow. 1043497c615aSHerbert Xu * 1044497c615aSHerbert Xu * It returns zero on success, or a standard errno code on error. 1045497c615aSHerbert Xu */ 1046343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst, 1047343d60aaSRoopa Prabhu struct flowi6 *fl6) 1048497c615aSHerbert Xu { 1049497c615aSHerbert Xu *dst = NULL; 1050343d60aaSRoopa Prabhu return ip6_dst_lookup_tail(net, sk, dst, fl6); 1051497c615aSHerbert Xu } 10523cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup); 10533cf3dc6cSArnaldo Carvalho de Melo 1054497c615aSHerbert Xu /** 105568d0c6d3SDavid S. Miller * ip6_dst_lookup_flow - perform route lookup on flow with ipsec 105668d0c6d3SDavid S. Miller * @sk: socket which provides route info 10574c9483b2SDavid S. Miller * @fl6: flow to lookup 105868d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 105968d0c6d3SDavid S. Miller * 106068d0c6d3SDavid S. Miller * This function performs a route lookup on the given flow. 106168d0c6d3SDavid S. Miller * 106268d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 106368d0c6d3SDavid S. Miller * error code. 106468d0c6d3SDavid S. Miller */ 10653aef934fSEric Dumazet struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6, 10660e0d44abSSteffen Klassert const struct in6_addr *final_dst) 106768d0c6d3SDavid S. Miller { 106868d0c6d3SDavid S. Miller struct dst_entry *dst = NULL; 106968d0c6d3SDavid S. Miller int err; 107068d0c6d3SDavid S. Miller 1071343d60aaSRoopa Prabhu err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6); 107268d0c6d3SDavid S. Miller if (err) 107368d0c6d3SDavid S. Miller return ERR_PTR(err); 107468d0c6d3SDavid S. Miller if (final_dst) 10754e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 10762774c131SDavid S. Miller 1077f92ee619SSteffen Klassert return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0); 107868d0c6d3SDavid S. Miller } 107968d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow); 108068d0c6d3SDavid S. Miller 108168d0c6d3SDavid S. Miller /** 108268d0c6d3SDavid S. Miller * ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow 108368d0c6d3SDavid S. Miller * @sk: socket which provides the dst cache and route info 10844c9483b2SDavid S. Miller * @fl6: flow to lookup 108568d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 1086497c615aSHerbert Xu * 1087497c615aSHerbert Xu * This function performs a route lookup on the given flow with the 1088497c615aSHerbert Xu * possibility of using the cached route in the socket if it is valid. 1089497c615aSHerbert Xu * It will take the socket dst lock when operating on the dst cache. 1090497c615aSHerbert Xu * As a result, this function can only be used in process context. 1091497c615aSHerbert Xu * 109268d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 109368d0c6d3SDavid S. Miller * error code. 1094497c615aSHerbert Xu */ 10954c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6, 10960e0d44abSSteffen Klassert const struct in6_addr *final_dst) 1097497c615aSHerbert Xu { 109868d0c6d3SDavid S. Miller struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie); 1099497c615aSHerbert Xu 11004c9483b2SDavid S. Miller dst = ip6_sk_dst_check(sk, dst, fl6); 110100bc0ef5SJakub Sitnicki if (!dst) 110200bc0ef5SJakub Sitnicki dst = ip6_dst_lookup_flow(sk, fl6, final_dst); 110368d0c6d3SDavid S. Miller 110400bc0ef5SJakub Sitnicki return dst; 110568d0c6d3SDavid S. Miller } 110668d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow); 1107497c615aSHerbert Xu 110834a0b3cdSAdrian Bunk static inline int ip6_ufo_append_data(struct sock *sk, 11090bbe84a6SVlad Yasevich struct sk_buff_head *queue, 1110e89e9cf5SAnanda Raju int getfrag(void *from, char *to, int offset, int len, 1111e89e9cf5SAnanda Raju int odd, struct sk_buff *skb), 1112e89e9cf5SAnanda Raju void *from, int length, int hh_len, int fragheaderlen, 11133ba3458fSJakub Sitnicki int exthdrlen, int transhdrlen, int mtu, 11143ba3458fSJakub Sitnicki unsigned int flags, const struct flowi6 *fl6) 1115e89e9cf5SAnanda Raju 1116e89e9cf5SAnanda Raju { 1117e89e9cf5SAnanda Raju struct sk_buff *skb; 1118e89e9cf5SAnanda Raju int err; 1119e89e9cf5SAnanda Raju 1120e89e9cf5SAnanda Raju /* There is support for UDP large send offload by network 1121e89e9cf5SAnanda Raju * device, so create one single skb packet containing complete 1122e89e9cf5SAnanda Raju * udp datagram 1123e89e9cf5SAnanda Raju */ 11240bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 112563159f29SIan Morris if (!skb) { 1126e89e9cf5SAnanda Raju skb = sock_alloc_send_skb(sk, 1127e89e9cf5SAnanda Raju hh_len + fragheaderlen + transhdrlen + 20, 1128e89e9cf5SAnanda Raju (flags & MSG_DONTWAIT), &err); 112963159f29SIan Morris if (!skb) 1130504744e4SZheng Yan return err; 1131e89e9cf5SAnanda Raju 1132e89e9cf5SAnanda Raju /* reserve space for Hardware header */ 1133e89e9cf5SAnanda Raju skb_reserve(skb, hh_len); 1134e89e9cf5SAnanda Raju 1135e89e9cf5SAnanda Raju /* create space for UDP/IP header */ 1136e89e9cf5SAnanda Raju skb_put(skb, fragheaderlen + transhdrlen); 1137e89e9cf5SAnanda Raju 1138e89e9cf5SAnanda Raju /* initialize network header pointer */ 11393ba3458fSJakub Sitnicki skb_set_network_header(skb, exthdrlen); 1140e89e9cf5SAnanda Raju 1141e89e9cf5SAnanda Raju /* initialize protocol header pointer */ 1142b0e380b1SArnaldo Carvalho de Melo skb->transport_header = skb->network_header + fragheaderlen; 1143e89e9cf5SAnanda Raju 11449c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 1145e89e9cf5SAnanda Raju skb->csum = 0; 1146e89e9cf5SAnanda Raju 11470bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 1148c547dbf5SJiri Pirko } else if (skb_is_gso(skb)) { 1149c547dbf5SJiri Pirko goto append; 1150c547dbf5SJiri Pirko } 1151c547dbf5SJiri Pirko 1152c547dbf5SJiri Pirko skb->ip_summed = CHECKSUM_PARTIAL; 1153c31d5326SSridhar Samudrala /* Specify the length of each IPv6 datagram fragment. 1154c31d5326SSridhar Samudrala * It has to be a multiple of 8. 1155c31d5326SSridhar Samudrala */ 1156c31d5326SSridhar Samudrala skb_shinfo(skb)->gso_size = (mtu - fragheaderlen - 1157c31d5326SSridhar Samudrala sizeof(struct frag_hdr)) & ~7; 1158f83ef8c0SHerbert Xu skb_shinfo(skb)->gso_type = SKB_GSO_UDP; 1159fd0273d7SMartin KaFai Lau skb_shinfo(skb)->ip6_frag_id = ipv6_select_ident(sock_net(sk), 1160fd0273d7SMartin KaFai Lau &fl6->daddr, 1161fd0273d7SMartin KaFai Lau &fl6->saddr); 1162e89e9cf5SAnanda Raju 1163c547dbf5SJiri Pirko append: 11642811ebacSHannes Frederic Sowa return skb_append_datato_frags(sk, skb, getfrag, from, 11652811ebacSHannes Frederic Sowa (length - transhdrlen)); 1166e89e9cf5SAnanda Raju } 11671da177e4SLinus Torvalds 11680178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src, 11690178b695SHerbert Xu gfp_t gfp) 11700178b695SHerbert Xu { 11710178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11720178b695SHerbert Xu } 11730178b695SHerbert Xu 11740178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src, 11750178b695SHerbert Xu gfp_t gfp) 11760178b695SHerbert Xu { 11770178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11780178b695SHerbert Xu } 11790178b695SHerbert Xu 118075a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu, 11810c183379SGao feng int *maxfraglen, 11820c183379SGao feng unsigned int fragheaderlen, 11830c183379SGao feng struct sk_buff *skb, 118475a493e6SHannes Frederic Sowa struct rt6_info *rt, 1185e367c2d0Slucien unsigned int orig_mtu) 11860c183379SGao feng { 11870c183379SGao feng if (!(rt->dst.flags & DST_XFRM_TUNNEL)) { 118863159f29SIan Morris if (!skb) { 11890c183379SGao feng /* first fragment, reserve header_len */ 1190e367c2d0Slucien *mtu = orig_mtu - rt->dst.header_len; 11910c183379SGao feng 11920c183379SGao feng } else { 11930c183379SGao feng /* 11940c183379SGao feng * this fragment is not first, the headers 11950c183379SGao feng * space is regarded as data space. 11960c183379SGao feng */ 1197e367c2d0Slucien *mtu = orig_mtu; 11980c183379SGao feng } 11990c183379SGao feng *maxfraglen = ((*mtu - fragheaderlen) & ~7) 12000c183379SGao feng + fragheaderlen - sizeof(struct frag_hdr); 12010c183379SGao feng } 12020c183379SGao feng } 12030c183379SGao feng 1204366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork, 120526879da5SWei Wang struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6, 1206366e41d9SVlad Yasevich struct rt6_info *rt, struct flowi6 *fl6) 1207366e41d9SVlad Yasevich { 1208366e41d9SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 1209366e41d9SVlad Yasevich unsigned int mtu; 121026879da5SWei Wang struct ipv6_txoptions *opt = ipc6->opt; 1211366e41d9SVlad Yasevich 1212366e41d9SVlad Yasevich /* 1213366e41d9SVlad Yasevich * setup for corking 1214366e41d9SVlad Yasevich */ 1215366e41d9SVlad Yasevich if (opt) { 1216366e41d9SVlad Yasevich if (WARN_ON(v6_cork->opt)) 1217366e41d9SVlad Yasevich return -EINVAL; 1218366e41d9SVlad Yasevich 1219366e41d9SVlad Yasevich v6_cork->opt = kzalloc(opt->tot_len, sk->sk_allocation); 122063159f29SIan Morris if (unlikely(!v6_cork->opt)) 1221366e41d9SVlad Yasevich return -ENOBUFS; 1222366e41d9SVlad Yasevich 1223366e41d9SVlad Yasevich v6_cork->opt->tot_len = opt->tot_len; 1224366e41d9SVlad Yasevich v6_cork->opt->opt_flen = opt->opt_flen; 1225366e41d9SVlad Yasevich v6_cork->opt->opt_nflen = opt->opt_nflen; 1226366e41d9SVlad Yasevich 1227366e41d9SVlad Yasevich v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt, 1228366e41d9SVlad Yasevich sk->sk_allocation); 1229366e41d9SVlad Yasevich if (opt->dst0opt && !v6_cork->opt->dst0opt) 1230366e41d9SVlad Yasevich return -ENOBUFS; 1231366e41d9SVlad Yasevich 1232366e41d9SVlad Yasevich v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt, 1233366e41d9SVlad Yasevich sk->sk_allocation); 1234366e41d9SVlad Yasevich if (opt->dst1opt && !v6_cork->opt->dst1opt) 1235366e41d9SVlad Yasevich return -ENOBUFS; 1236366e41d9SVlad Yasevich 1237366e41d9SVlad Yasevich v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt, 1238366e41d9SVlad Yasevich sk->sk_allocation); 1239366e41d9SVlad Yasevich if (opt->hopopt && !v6_cork->opt->hopopt) 1240366e41d9SVlad Yasevich return -ENOBUFS; 1241366e41d9SVlad Yasevich 1242366e41d9SVlad Yasevich v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt, 1243366e41d9SVlad Yasevich sk->sk_allocation); 1244366e41d9SVlad Yasevich if (opt->srcrt && !v6_cork->opt->srcrt) 1245366e41d9SVlad Yasevich return -ENOBUFS; 1246366e41d9SVlad Yasevich 1247366e41d9SVlad Yasevich /* need source address above miyazawa*/ 1248366e41d9SVlad Yasevich } 1249366e41d9SVlad Yasevich dst_hold(&rt->dst); 1250366e41d9SVlad Yasevich cork->base.dst = &rt->dst; 1251366e41d9SVlad Yasevich cork->fl.u.ip6 = *fl6; 125226879da5SWei Wang v6_cork->hop_limit = ipc6->hlimit; 125326879da5SWei Wang v6_cork->tclass = ipc6->tclass; 1254366e41d9SVlad Yasevich if (rt->dst.flags & DST_XFRM_TUNNEL) 1255366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1256366e41d9SVlad Yasevich rt->dst.dev->mtu : dst_mtu(&rt->dst); 1257366e41d9SVlad Yasevich else 1258366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1259366e41d9SVlad Yasevich rt->dst.dev->mtu : dst_mtu(rt->dst.path); 1260366e41d9SVlad Yasevich if (np->frag_size < mtu) { 1261366e41d9SVlad Yasevich if (np->frag_size) 1262366e41d9SVlad Yasevich mtu = np->frag_size; 1263366e41d9SVlad Yasevich } 1264366e41d9SVlad Yasevich cork->base.fragsize = mtu; 1265366e41d9SVlad Yasevich if (dst_allfrag(rt->dst.path)) 1266366e41d9SVlad Yasevich cork->base.flags |= IPCORK_ALLFRAG; 1267366e41d9SVlad Yasevich cork->base.length = 0; 1268366e41d9SVlad Yasevich 1269366e41d9SVlad Yasevich return 0; 1270366e41d9SVlad Yasevich } 1271366e41d9SVlad Yasevich 12720bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk, 12730bbe84a6SVlad Yasevich struct flowi6 *fl6, 12740bbe84a6SVlad Yasevich struct sk_buff_head *queue, 12750bbe84a6SVlad Yasevich struct inet_cork *cork, 12760bbe84a6SVlad Yasevich struct inet6_cork *v6_cork, 12770bbe84a6SVlad Yasevich struct page_frag *pfrag, 12780bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, 12790bbe84a6SVlad Yasevich int len, int odd, struct sk_buff *skb), 12801da177e4SLinus Torvalds void *from, int length, int transhdrlen, 128126879da5SWei Wang unsigned int flags, struct ipcm6_cookie *ipc6, 1282c14ac945SSoheil Hassas Yeganeh const struct sockcm_cookie *sockc) 12831da177e4SLinus Torvalds { 12840c183379SGao feng struct sk_buff *skb, *skb_prev = NULL; 1285e367c2d0Slucien unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu; 12860bbe84a6SVlad Yasevich int exthdrlen = 0; 12870bbe84a6SVlad Yasevich int dst_exthdrlen = 0; 12881da177e4SLinus Torvalds int hh_len; 12891da177e4SLinus Torvalds int copy; 12901da177e4SLinus Torvalds int err; 12911da177e4SLinus Torvalds int offset = 0; 1292a693e698SAnders Berggren __u8 tx_flags = 0; 129309c2d251SWillem de Bruijn u32 tskey = 0; 12940bbe84a6SVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->dst; 12950bbe84a6SVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 129632dce968SVlad Yasevich int csummode = CHECKSUM_NONE; 1297682b1a9dSHannes Frederic Sowa unsigned int maxnonfragsize, headersize; 12981da177e4SLinus Torvalds 12990bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 13000bbe84a6SVlad Yasevich if (!skb) { 13010bbe84a6SVlad Yasevich exthdrlen = opt ? opt->opt_flen : 0; 13027efdba5bSRomain KUNTZ dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len; 13031da177e4SLinus Torvalds } 13040bbe84a6SVlad Yasevich 1305366e41d9SVlad Yasevich mtu = cork->fragsize; 1306e367c2d0Slucien orig_mtu = mtu; 13071da177e4SLinus Torvalds 1308d8d1f30bSChangli Gao hh_len = LL_RESERVED_SPACE(rt->dst.dev); 13091da177e4SLinus Torvalds 1310a1b05140SMasahide NAKAMURA fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len + 1311b4ce9277SHerbert Xu (opt ? opt->opt_nflen : 0); 13124df98e76SHannes Frederic Sowa maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen - 13134df98e76SHannes Frederic Sowa sizeof(struct frag_hdr); 13141da177e4SLinus Torvalds 13154df98e76SHannes Frederic Sowa headersize = sizeof(struct ipv6hdr) + 13163a1cebe7SHannes Frederic Sowa (opt ? opt->opt_flen + opt->opt_nflen : 0) + 13174df98e76SHannes Frederic Sowa (dst_allfrag(&rt->dst) ? 13184df98e76SHannes Frederic Sowa sizeof(struct frag_hdr) : 0) + 13194df98e76SHannes Frederic Sowa rt->rt6i_nfheader_len; 13204df98e76SHannes Frederic Sowa 132126879da5SWei Wang if (cork->length + length > mtu - headersize && ipc6->dontfrag && 13224df98e76SHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP || 13234df98e76SHannes Frederic Sowa sk->sk_protocol == IPPROTO_RAW)) { 13244df98e76SHannes Frederic Sowa ipv6_local_rxpmtu(sk, fl6, mtu - headersize + 13254df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 13264df98e76SHannes Frederic Sowa goto emsgsize; 13274df98e76SHannes Frederic Sowa } 13284df98e76SHannes Frederic Sowa 1329682b1a9dSHannes Frederic Sowa if (ip6_sk_ignore_df(sk)) 1330682b1a9dSHannes Frederic Sowa maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN; 1331682b1a9dSHannes Frederic Sowa else 1332682b1a9dSHannes Frederic Sowa maxnonfragsize = mtu; 1333682b1a9dSHannes Frederic Sowa 13344df98e76SHannes Frederic Sowa if (cork->length + length > maxnonfragsize - headersize) { 13354df98e76SHannes Frederic Sowa emsgsize: 13364df98e76SHannes Frederic Sowa ipv6_local_error(sk, EMSGSIZE, fl6, 13374df98e76SHannes Frederic Sowa mtu - headersize + 13384df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 13391da177e4SLinus Torvalds return -EMSGSIZE; 13401da177e4SLinus Torvalds } 1341682b1a9dSHannes Frederic Sowa 1342682b1a9dSHannes Frederic Sowa /* CHECKSUM_PARTIAL only with no extension headers and when 1343682b1a9dSHannes Frederic Sowa * we are not going to fragment 1344682b1a9dSHannes Frederic Sowa */ 1345682b1a9dSHannes Frederic Sowa if (transhdrlen && sk->sk_protocol == IPPROTO_UDP && 1346682b1a9dSHannes Frederic Sowa headersize == sizeof(struct ipv6hdr) && 1347*2b89ed65SVlad Yasevich length <= mtu - headersize && 1348682b1a9dSHannes Frederic Sowa !(flags & MSG_MORE) && 1349c8cd0989STom Herbert rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM)) 1350682b1a9dSHannes Frederic Sowa csummode = CHECKSUM_PARTIAL; 13511da177e4SLinus Torvalds 135209c2d251SWillem de Bruijn if (sk->sk_type == SOCK_DGRAM || sk->sk_type == SOCK_RAW) { 1353c14ac945SSoheil Hassas Yeganeh sock_tx_timestamp(sk, sockc->tsflags, &tx_flags); 135409c2d251SWillem de Bruijn if (tx_flags & SKBTX_ANY_SW_TSTAMP && 135509c2d251SWillem de Bruijn sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID) 135609c2d251SWillem de Bruijn tskey = sk->sk_tskey++; 135709c2d251SWillem de Bruijn } 1358a693e698SAnders Berggren 13591da177e4SLinus Torvalds /* 13601da177e4SLinus Torvalds * Let's try using as much space as possible. 13611da177e4SLinus Torvalds * Use MTU if total length of the message fits into the MTU. 13621da177e4SLinus Torvalds * Otherwise, we need to reserve fragment header and 13631da177e4SLinus Torvalds * fragment alignment (= 8-15 octects, in total). 13641da177e4SLinus Torvalds * 13651da177e4SLinus Torvalds * Note that we may need to "move" the data from the tail of 13661da177e4SLinus Torvalds * of the buffer to the new fragment when we split 13671da177e4SLinus Torvalds * the message. 13681da177e4SLinus Torvalds * 13691da177e4SLinus Torvalds * FIXME: It may be fragmented into multiple chunks 13701da177e4SLinus Torvalds * at once if non-fragmentable extension headers 13711da177e4SLinus Torvalds * are too large. 13721da177e4SLinus Torvalds * --yoshfuji 13731da177e4SLinus Torvalds */ 13741da177e4SLinus Torvalds 13752811ebacSHannes Frederic Sowa cork->length += length; 1376e4c5e13aSZheng Li if ((((length + fragheaderlen) > mtu) || 13772811ebacSHannes Frederic Sowa (skb && skb_is_gso(skb))) && 13782811ebacSHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP) && 1379f89c56ceSJakub Sitnicki (rt->dst.dev->features & NETIF_F_UFO) && !rt->dst.header_len && 138040ba3302SMichal Kubeček (sk->sk_type == SOCK_DGRAM) && !udp_get_no_check6_tx(sk)) { 13810bbe84a6SVlad Yasevich err = ip6_ufo_append_data(sk, queue, getfrag, from, length, 13823ba3458fSJakub Sitnicki hh_len, fragheaderlen, exthdrlen, 1383fd0273d7SMartin KaFai Lau transhdrlen, mtu, flags, fl6); 1384baa829d8SPatrick McHardy if (err) 1385e89e9cf5SAnanda Raju goto error; 1386e89e9cf5SAnanda Raju return 0; 1387e89e9cf5SAnanda Raju } 13881da177e4SLinus Torvalds 13892811ebacSHannes Frederic Sowa if (!skb) 13901da177e4SLinus Torvalds goto alloc_new_skb; 13911da177e4SLinus Torvalds 13921da177e4SLinus Torvalds while (length > 0) { 13931da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 1394bdc712b4SDavid S. Miller copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len; 13951da177e4SLinus Torvalds if (copy < length) 13961da177e4SLinus Torvalds copy = maxfraglen - skb->len; 13971da177e4SLinus Torvalds 13981da177e4SLinus Torvalds if (copy <= 0) { 13991da177e4SLinus Torvalds char *data; 14001da177e4SLinus Torvalds unsigned int datalen; 14011da177e4SLinus Torvalds unsigned int fraglen; 14021da177e4SLinus Torvalds unsigned int fraggap; 14031da177e4SLinus Torvalds unsigned int alloclen; 14041da177e4SLinus Torvalds alloc_new_skb: 14051da177e4SLinus Torvalds /* There's no room in the current skb */ 14060c183379SGao feng if (skb) 14070c183379SGao feng fraggap = skb->len - maxfraglen; 14081da177e4SLinus Torvalds else 14091da177e4SLinus Torvalds fraggap = 0; 14100c183379SGao feng /* update mtu and maxfraglen if necessary */ 141163159f29SIan Morris if (!skb || !skb_prev) 14120c183379SGao feng ip6_append_data_mtu(&mtu, &maxfraglen, 141375a493e6SHannes Frederic Sowa fragheaderlen, skb, rt, 1414e367c2d0Slucien orig_mtu); 14150c183379SGao feng 14160c183379SGao feng skb_prev = skb; 14171da177e4SLinus Torvalds 14181da177e4SLinus Torvalds /* 14191da177e4SLinus Torvalds * If remaining data exceeds the mtu, 14201da177e4SLinus Torvalds * we know we need more fragment(s). 14211da177e4SLinus Torvalds */ 14221da177e4SLinus Torvalds datalen = length + fraggap; 14231da177e4SLinus Torvalds 14240c183379SGao feng if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen) 14250c183379SGao feng datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len; 14261da177e4SLinus Torvalds if ((flags & MSG_MORE) && 1427d8d1f30bSChangli Gao !(rt->dst.dev->features&NETIF_F_SG)) 14281da177e4SLinus Torvalds alloclen = mtu; 14291da177e4SLinus Torvalds else 14301da177e4SLinus Torvalds alloclen = datalen + fragheaderlen; 14311da177e4SLinus Torvalds 1432299b0767SSteffen Klassert alloclen += dst_exthdrlen; 1433299b0767SSteffen Klassert 14340c183379SGao feng if (datalen != length + fraggap) { 14351da177e4SLinus Torvalds /* 14360c183379SGao feng * this is not the last fragment, the trailer 14370c183379SGao feng * space is regarded as data space. 14381da177e4SLinus Torvalds */ 14390c183379SGao feng datalen += rt->dst.trailer_len; 14400c183379SGao feng } 14410c183379SGao feng 1442d8d1f30bSChangli Gao alloclen += rt->dst.trailer_len; 14430c183379SGao feng fraglen = datalen + fragheaderlen; 14441da177e4SLinus Torvalds 14451da177e4SLinus Torvalds /* 14461da177e4SLinus Torvalds * We just reserve space for fragment header. 14471da177e4SLinus Torvalds * Note: this may be overallocation if the message 14481da177e4SLinus Torvalds * (without MSG_MORE) fits into the MTU. 14491da177e4SLinus Torvalds */ 14501da177e4SLinus Torvalds alloclen += sizeof(struct frag_hdr); 14511da177e4SLinus Torvalds 14521da177e4SLinus Torvalds if (transhdrlen) { 14531da177e4SLinus Torvalds skb = sock_alloc_send_skb(sk, 14541da177e4SLinus Torvalds alloclen + hh_len, 14551da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 14561da177e4SLinus Torvalds } else { 14571da177e4SLinus Torvalds skb = NULL; 14581da177e4SLinus Torvalds if (atomic_read(&sk->sk_wmem_alloc) <= 14591da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 14601da177e4SLinus Torvalds skb = sock_wmalloc(sk, 14611da177e4SLinus Torvalds alloclen + hh_len, 1, 14621da177e4SLinus Torvalds sk->sk_allocation); 146363159f29SIan Morris if (unlikely(!skb)) 14641da177e4SLinus Torvalds err = -ENOBUFS; 14651da177e4SLinus Torvalds } 146663159f29SIan Morris if (!skb) 14671da177e4SLinus Torvalds goto error; 14681da177e4SLinus Torvalds /* 14691da177e4SLinus Torvalds * Fill in the control structures 14701da177e4SLinus Torvalds */ 14719c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 147232dce968SVlad Yasevich skb->ip_summed = csummode; 14731da177e4SLinus Torvalds skb->csum = 0; 14741f85851eSGao feng /* reserve for fragmentation and ipsec header */ 14751f85851eSGao feng skb_reserve(skb, hh_len + sizeof(struct frag_hdr) + 14761f85851eSGao feng dst_exthdrlen); 14771da177e4SLinus Torvalds 147811878b40SWillem de Bruijn /* Only the initial fragment is time stamped */ 1479a693e698SAnders Berggren skb_shinfo(skb)->tx_flags = tx_flags; 148011878b40SWillem de Bruijn tx_flags = 0; 148109c2d251SWillem de Bruijn skb_shinfo(skb)->tskey = tskey; 148209c2d251SWillem de Bruijn tskey = 0; 1483a693e698SAnders Berggren 14841da177e4SLinus Torvalds /* 14851da177e4SLinus Torvalds * Find where to start putting bytes 14861da177e4SLinus Torvalds */ 14871f85851eSGao feng data = skb_put(skb, fraglen); 14881f85851eSGao feng skb_set_network_header(skb, exthdrlen); 14891f85851eSGao feng data += fragheaderlen; 1490b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1491b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 14921da177e4SLinus Torvalds if (fraggap) { 14931da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 14941da177e4SLinus Torvalds skb_prev, maxfraglen, 14951da177e4SLinus Torvalds data + transhdrlen, fraggap, 0); 14961da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 14971da177e4SLinus Torvalds skb->csum); 14981da177e4SLinus Torvalds data += fraggap; 1499e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 15001da177e4SLinus Torvalds } 15011da177e4SLinus Torvalds copy = datalen - transhdrlen - fraggap; 1502299b0767SSteffen Klassert 15031da177e4SLinus Torvalds if (copy < 0) { 15041da177e4SLinus Torvalds err = -EINVAL; 15051da177e4SLinus Torvalds kfree_skb(skb); 15061da177e4SLinus Torvalds goto error; 15071da177e4SLinus Torvalds } else if (copy > 0 && getfrag(from, data + transhdrlen, offset, copy, fraggap, skb) < 0) { 15081da177e4SLinus Torvalds err = -EFAULT; 15091da177e4SLinus Torvalds kfree_skb(skb); 15101da177e4SLinus Torvalds goto error; 15111da177e4SLinus Torvalds } 15121da177e4SLinus Torvalds 15131da177e4SLinus Torvalds offset += copy; 15141da177e4SLinus Torvalds length -= datalen - fraggap; 15151da177e4SLinus Torvalds transhdrlen = 0; 15161da177e4SLinus Torvalds exthdrlen = 0; 1517299b0767SSteffen Klassert dst_exthdrlen = 0; 15181da177e4SLinus Torvalds 15191da177e4SLinus Torvalds /* 15201da177e4SLinus Torvalds * Put the packet on the pending queue 15211da177e4SLinus Torvalds */ 15220bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 15231da177e4SLinus Torvalds continue; 15241da177e4SLinus Torvalds } 15251da177e4SLinus Torvalds 15261da177e4SLinus Torvalds if (copy > length) 15271da177e4SLinus Torvalds copy = length; 15281da177e4SLinus Torvalds 1529d8d1f30bSChangli Gao if (!(rt->dst.dev->features&NETIF_F_SG)) { 15301da177e4SLinus Torvalds unsigned int off; 15311da177e4SLinus Torvalds 15321da177e4SLinus Torvalds off = skb->len; 15331da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 15341da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 15351da177e4SLinus Torvalds __skb_trim(skb, off); 15361da177e4SLinus Torvalds err = -EFAULT; 15371da177e4SLinus Torvalds goto error; 15381da177e4SLinus Torvalds } 15391da177e4SLinus Torvalds } else { 15401da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 15411da177e4SLinus Torvalds 15421da177e4SLinus Torvalds err = -ENOMEM; 15435640f768SEric Dumazet if (!sk_page_frag_refill(sk, pfrag)) 15441da177e4SLinus Torvalds goto error; 15451da177e4SLinus Torvalds 15465640f768SEric Dumazet if (!skb_can_coalesce(skb, i, pfrag->page, 15475640f768SEric Dumazet pfrag->offset)) { 15481da177e4SLinus Torvalds err = -EMSGSIZE; 15495640f768SEric Dumazet if (i == MAX_SKB_FRAGS) 15501da177e4SLinus Torvalds goto error; 15515640f768SEric Dumazet 15525640f768SEric Dumazet __skb_fill_page_desc(skb, i, pfrag->page, 15535640f768SEric Dumazet pfrag->offset, 0); 15545640f768SEric Dumazet skb_shinfo(skb)->nr_frags = ++i; 15555640f768SEric Dumazet get_page(pfrag->page); 15561da177e4SLinus Torvalds } 15575640f768SEric Dumazet copy = min_t(int, copy, pfrag->size - pfrag->offset); 15589e903e08SEric Dumazet if (getfrag(from, 15595640f768SEric Dumazet page_address(pfrag->page) + pfrag->offset, 15605640f768SEric Dumazet offset, copy, skb->len, skb) < 0) 15615640f768SEric Dumazet goto error_efault; 15625640f768SEric Dumazet 15635640f768SEric Dumazet pfrag->offset += copy; 15645640f768SEric Dumazet skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy); 15651da177e4SLinus Torvalds skb->len += copy; 15661da177e4SLinus Torvalds skb->data_len += copy; 1567f945fa7aSHerbert Xu skb->truesize += copy; 1568f945fa7aSHerbert Xu atomic_add(copy, &sk->sk_wmem_alloc); 15691da177e4SLinus Torvalds } 15701da177e4SLinus Torvalds offset += copy; 15711da177e4SLinus Torvalds length -= copy; 15721da177e4SLinus Torvalds } 15735640f768SEric Dumazet 15741da177e4SLinus Torvalds return 0; 15755640f768SEric Dumazet 15765640f768SEric Dumazet error_efault: 15775640f768SEric Dumazet err = -EFAULT; 15781da177e4SLinus Torvalds error: 1579bdc712b4SDavid S. Miller cork->length -= length; 15803bd653c8SDenis V. Lunev IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS); 15811da177e4SLinus Torvalds return err; 15821da177e4SLinus Torvalds } 15830bbe84a6SVlad Yasevich 15840bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk, 15850bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, int len, 15860bbe84a6SVlad Yasevich int odd, struct sk_buff *skb), 158726879da5SWei Wang void *from, int length, int transhdrlen, 158826879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 158926879da5SWei Wang struct rt6_info *rt, unsigned int flags, 1590c14ac945SSoheil Hassas Yeganeh const struct sockcm_cookie *sockc) 15910bbe84a6SVlad Yasevich { 15920bbe84a6SVlad Yasevich struct inet_sock *inet = inet_sk(sk); 15930bbe84a6SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 15940bbe84a6SVlad Yasevich int exthdrlen; 15950bbe84a6SVlad Yasevich int err; 15960bbe84a6SVlad Yasevich 15970bbe84a6SVlad Yasevich if (flags&MSG_PROBE) 15980bbe84a6SVlad Yasevich return 0; 15990bbe84a6SVlad Yasevich if (skb_queue_empty(&sk->sk_write_queue)) { 16000bbe84a6SVlad Yasevich /* 16010bbe84a6SVlad Yasevich * setup for corking 16020bbe84a6SVlad Yasevich */ 160326879da5SWei Wang err = ip6_setup_cork(sk, &inet->cork, &np->cork, 160426879da5SWei Wang ipc6, rt, fl6); 16050bbe84a6SVlad Yasevich if (err) 16060bbe84a6SVlad Yasevich return err; 16070bbe84a6SVlad Yasevich 160826879da5SWei Wang exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 16090bbe84a6SVlad Yasevich length += exthdrlen; 16100bbe84a6SVlad Yasevich transhdrlen += exthdrlen; 16110bbe84a6SVlad Yasevich } else { 16120bbe84a6SVlad Yasevich fl6 = &inet->cork.fl.u.ip6; 16130bbe84a6SVlad Yasevich transhdrlen = 0; 16140bbe84a6SVlad Yasevich } 16150bbe84a6SVlad Yasevich 16160bbe84a6SVlad Yasevich return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base, 16170bbe84a6SVlad Yasevich &np->cork, sk_page_frag(sk), getfrag, 161826879da5SWei Wang from, length, transhdrlen, flags, ipc6, sockc); 16190bbe84a6SVlad Yasevich } 1620a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data); 16211da177e4SLinus Torvalds 1622366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork, 1623366e41d9SVlad Yasevich struct inet6_cork *v6_cork) 1624bf138862SPavel Emelyanov { 1625366e41d9SVlad Yasevich if (v6_cork->opt) { 1626366e41d9SVlad Yasevich kfree(v6_cork->opt->dst0opt); 1627366e41d9SVlad Yasevich kfree(v6_cork->opt->dst1opt); 1628366e41d9SVlad Yasevich kfree(v6_cork->opt->hopopt); 1629366e41d9SVlad Yasevich kfree(v6_cork->opt->srcrt); 1630366e41d9SVlad Yasevich kfree(v6_cork->opt); 1631366e41d9SVlad Yasevich v6_cork->opt = NULL; 16320178b695SHerbert Xu } 16330178b695SHerbert Xu 1634366e41d9SVlad Yasevich if (cork->base.dst) { 1635366e41d9SVlad Yasevich dst_release(cork->base.dst); 1636366e41d9SVlad Yasevich cork->base.dst = NULL; 1637366e41d9SVlad Yasevich cork->base.flags &= ~IPCORK_ALLFRAG; 1638bf138862SPavel Emelyanov } 1639366e41d9SVlad Yasevich memset(&cork->fl, 0, sizeof(cork->fl)); 1640bf138862SPavel Emelyanov } 1641bf138862SPavel Emelyanov 16426422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk, 16436422398cSVlad Yasevich struct sk_buff_head *queue, 16446422398cSVlad Yasevich struct inet_cork_full *cork, 16456422398cSVlad Yasevich struct inet6_cork *v6_cork) 16461da177e4SLinus Torvalds { 16471da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 16481da177e4SLinus Torvalds struct sk_buff **tail_skb; 16491da177e4SLinus Torvalds struct in6_addr final_dst_buf, *final_dst = &final_dst_buf; 16501da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 16513bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 16521da177e4SLinus Torvalds struct ipv6hdr *hdr; 16536422398cSVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 16546422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->base.dst; 16556422398cSVlad Yasevich struct flowi6 *fl6 = &cork->fl.u.ip6; 16564c9483b2SDavid S. Miller unsigned char proto = fl6->flowi6_proto; 16571da177e4SLinus Torvalds 16586422398cSVlad Yasevich skb = __skb_dequeue(queue); 165963159f29SIan Morris if (!skb) 16601da177e4SLinus Torvalds goto out; 16611da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 16621da177e4SLinus Torvalds 16631da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1664d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1665bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 16666422398cSVlad Yasevich while ((tmp_skb = __skb_dequeue(queue)) != NULL) { 1667cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 16681da177e4SLinus Torvalds *tail_skb = tmp_skb; 16691da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 16701da177e4SLinus Torvalds skb->len += tmp_skb->len; 16711da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 16721da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 16731da177e4SLinus Torvalds tmp_skb->destructor = NULL; 16741da177e4SLinus Torvalds tmp_skb->sk = NULL; 16751da177e4SLinus Torvalds } 16761da177e4SLinus Torvalds 167728a89453SHerbert Xu /* Allow local fragmentation. */ 167860ff7467SWANG Cong skb->ignore_df = ip6_sk_ignore_df(sk); 167928a89453SHerbert Xu 16804e3fd7a0SAlexey Dobriyan *final_dst = fl6->daddr; 1681cfe1fc77SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_header_len(skb)); 16821da177e4SLinus Torvalds if (opt && opt->opt_flen) 16831da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 16841da177e4SLinus Torvalds if (opt && opt->opt_nflen) 1685613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr); 16861da177e4SLinus Torvalds 1687e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 1688e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 16890660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 16901da177e4SLinus Torvalds 16916422398cSVlad Yasevich ip6_flow_hdr(hdr, v6_cork->tclass, 1692cb1ce2efSTom Herbert ip6_make_flowlabel(net, skb, fl6->flowlabel, 169367800f9bSTom Herbert np->autoflowlabel, fl6)); 16946422398cSVlad Yasevich hdr->hop_limit = v6_cork->hop_limit; 16951da177e4SLinus Torvalds hdr->nexthdr = proto; 16964e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 16974e3fd7a0SAlexey Dobriyan hdr->daddr = *final_dst; 16981da177e4SLinus Torvalds 1699a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 17004a19ec58SLaszlo Attila Toth skb->mark = sk->sk_mark; 1701a2c2064fSPatrick McHardy 1702d8d1f30bSChangli Gao skb_dst_set(skb, dst_clone(&rt->dst)); 1703edf391ffSNeil Horman IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len); 170414878f75SDavid L Stevens if (proto == IPPROTO_ICMPV6) { 1705adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 170614878f75SDavid L Stevens 170743a43b60SHannes Frederic Sowa ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type); 170843a43b60SHannes Frederic Sowa ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS); 170914878f75SDavid L Stevens } 171014878f75SDavid L Stevens 17116422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 17126422398cSVlad Yasevich out: 17136422398cSVlad Yasevich return skb; 17146422398cSVlad Yasevich } 17156422398cSVlad Yasevich 17166422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb) 17176422398cSVlad Yasevich { 17186422398cSVlad Yasevich struct net *net = sock_net(skb->sk); 17196422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 17206422398cSVlad Yasevich int err; 17216422398cSVlad Yasevich 172233224b16SEric W. Biederman err = ip6_local_out(net, skb->sk, skb); 17231da177e4SLinus Torvalds if (err) { 17241da177e4SLinus Torvalds if (err > 0) 17256ce9e7b5SEric Dumazet err = net_xmit_errno(err); 17261da177e4SLinus Torvalds if (err) 17276422398cSVlad Yasevich IP6_INC_STATS(net, rt->rt6i_idev, 17286422398cSVlad Yasevich IPSTATS_MIB_OUTDISCARDS); 17291da177e4SLinus Torvalds } 17301da177e4SLinus Torvalds 17311da177e4SLinus Torvalds return err; 17326422398cSVlad Yasevich } 17336422398cSVlad Yasevich 17346422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk) 17356422398cSVlad Yasevich { 17366422398cSVlad Yasevich struct sk_buff *skb; 17376422398cSVlad Yasevich 17386422398cSVlad Yasevich skb = ip6_finish_skb(sk); 17396422398cSVlad Yasevich if (!skb) 17406422398cSVlad Yasevich return 0; 17416422398cSVlad Yasevich 17426422398cSVlad Yasevich return ip6_send_skb(skb); 17431da177e4SLinus Torvalds } 1744a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames); 17451da177e4SLinus Torvalds 17460bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk, 17476422398cSVlad Yasevich struct sk_buff_head *queue, 17486422398cSVlad Yasevich struct inet_cork_full *cork, 17496422398cSVlad Yasevich struct inet6_cork *v6_cork) 17501da177e4SLinus Torvalds { 17511da177e4SLinus Torvalds struct sk_buff *skb; 17521da177e4SLinus Torvalds 17530bbe84a6SVlad Yasevich while ((skb = __skb_dequeue_tail(queue)) != NULL) { 1754adf30907SEric Dumazet if (skb_dst(skb)) 1755adf30907SEric Dumazet IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)), 1756a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 17571da177e4SLinus Torvalds kfree_skb(skb); 17581da177e4SLinus Torvalds } 17591da177e4SLinus Torvalds 17606422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 17611da177e4SLinus Torvalds } 17620bbe84a6SVlad Yasevich 17630bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk) 17640bbe84a6SVlad Yasevich { 17656422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &sk->sk_write_queue, 17666422398cSVlad Yasevich &inet_sk(sk)->cork, &inet6_sk(sk)->cork); 17670bbe84a6SVlad Yasevich } 1768a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames); 17696422398cSVlad Yasevich 17706422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk, 17716422398cSVlad Yasevich int getfrag(void *from, char *to, int offset, 17726422398cSVlad Yasevich int len, int odd, struct sk_buff *skb), 17736422398cSVlad Yasevich void *from, int length, int transhdrlen, 177426879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 17756422398cSVlad Yasevich struct rt6_info *rt, unsigned int flags, 177626879da5SWei Wang const struct sockcm_cookie *sockc) 17776422398cSVlad Yasevich { 17786422398cSVlad Yasevich struct inet_cork_full cork; 17796422398cSVlad Yasevich struct inet6_cork v6_cork; 17806422398cSVlad Yasevich struct sk_buff_head queue; 178126879da5SWei Wang int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 17826422398cSVlad Yasevich int err; 17836422398cSVlad Yasevich 17846422398cSVlad Yasevich if (flags & MSG_PROBE) 17856422398cSVlad Yasevich return NULL; 17866422398cSVlad Yasevich 17876422398cSVlad Yasevich __skb_queue_head_init(&queue); 17886422398cSVlad Yasevich 17896422398cSVlad Yasevich cork.base.flags = 0; 17906422398cSVlad Yasevich cork.base.addr = 0; 17916422398cSVlad Yasevich cork.base.opt = NULL; 17926422398cSVlad Yasevich v6_cork.opt = NULL; 179326879da5SWei Wang err = ip6_setup_cork(sk, &cork, &v6_cork, ipc6, rt, fl6); 17946422398cSVlad Yasevich if (err) 17956422398cSVlad Yasevich return ERR_PTR(err); 17966422398cSVlad Yasevich 179726879da5SWei Wang if (ipc6->dontfrag < 0) 179826879da5SWei Wang ipc6->dontfrag = inet6_sk(sk)->dontfrag; 17996422398cSVlad Yasevich 18006422398cSVlad Yasevich err = __ip6_append_data(sk, fl6, &queue, &cork.base, &v6_cork, 18016422398cSVlad Yasevich ¤t->task_frag, getfrag, from, 18026422398cSVlad Yasevich length + exthdrlen, transhdrlen + exthdrlen, 180326879da5SWei Wang flags, ipc6, sockc); 18046422398cSVlad Yasevich if (err) { 18056422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &queue, &cork, &v6_cork); 18066422398cSVlad Yasevich return ERR_PTR(err); 18076422398cSVlad Yasevich } 18086422398cSVlad Yasevich 18096422398cSVlad Yasevich return __ip6_make_skb(sk, &queue, &cork, &v6_cork); 18106422398cSVlad Yasevich } 1811