12874c5fdSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later 21da177e4SLinus Torvalds /* 31da177e4SLinus Torvalds * IPv6 output functions 41da177e4SLinus Torvalds * Linux INET6 implementation 51da177e4SLinus Torvalds * 61da177e4SLinus Torvalds * Authors: 71da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 81da177e4SLinus Torvalds * 91da177e4SLinus Torvalds * Based on linux/net/ipv4/ip_output.c 101da177e4SLinus Torvalds * 111da177e4SLinus Torvalds * Changes: 121da177e4SLinus Torvalds * A.N.Kuznetsov : airthmetics in fragmentation. 131da177e4SLinus Torvalds * extension headers are implemented. 141da177e4SLinus Torvalds * route changes now work. 151da177e4SLinus Torvalds * ip6_forward does not confuse sniffers. 161da177e4SLinus Torvalds * etc. 171da177e4SLinus Torvalds * 181da177e4SLinus Torvalds * H. von Brand : Added missing #include <linux/string.h> 191da177e4SLinus Torvalds * Imran Patel : frag id should be in NBO 201da177e4SLinus Torvalds * Kazunori MIYAZAWA @USAGI 211da177e4SLinus Torvalds * : add ip6_append_data and related functions 221da177e4SLinus Torvalds * for datagram xmit 231da177e4SLinus Torvalds */ 241da177e4SLinus Torvalds 251da177e4SLinus Torvalds #include <linux/errno.h> 26ef76bc23SHerbert Xu #include <linux/kernel.h> 271da177e4SLinus Torvalds #include <linux/string.h> 281da177e4SLinus Torvalds #include <linux/socket.h> 291da177e4SLinus Torvalds #include <linux/net.h> 301da177e4SLinus Torvalds #include <linux/netdevice.h> 311da177e4SLinus Torvalds #include <linux/if_arp.h> 321da177e4SLinus Torvalds #include <linux/in6.h> 331da177e4SLinus Torvalds #include <linux/tcp.h> 341da177e4SLinus Torvalds #include <linux/route.h> 35b59f45d0SHerbert Xu #include <linux/module.h> 365a0e3ad6STejun Heo #include <linux/slab.h> 371da177e4SLinus Torvalds 3833b48679SDaniel Mack #include <linux/bpf-cgroup.h> 391da177e4SLinus Torvalds #include <linux/netfilter.h> 401da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h> 411da177e4SLinus Torvalds 421da177e4SLinus Torvalds #include <net/sock.h> 431da177e4SLinus Torvalds #include <net/snmp.h> 441da177e4SLinus Torvalds 451da177e4SLinus Torvalds #include <net/ipv6.h> 461da177e4SLinus Torvalds #include <net/ndisc.h> 471da177e4SLinus Torvalds #include <net/protocol.h> 481da177e4SLinus Torvalds #include <net/ip6_route.h> 491da177e4SLinus Torvalds #include <net/addrconf.h> 501da177e4SLinus Torvalds #include <net/rawv6.h> 511da177e4SLinus Torvalds #include <net/icmp.h> 521da177e4SLinus Torvalds #include <net/xfrm.h> 531da177e4SLinus Torvalds #include <net/checksum.h> 547bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h> 55ca254490SDavid Ahern #include <net/l3mdev.h> 5614972cbdSRoopa Prabhu #include <net/lwtunnel.h> 57571912c6SMartin Varghese #include <net/ip_tunnels.h> 581da177e4SLinus Torvalds 597d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb) 601da177e4SLinus Torvalds { 61adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 621da177e4SLinus Torvalds struct net_device *dev = dst->dev; 63e415ed3aSVasily Averin struct inet6_dev *idev = ip6_dst_idev(dst); 645796015fSVasily Averin unsigned int hh_len = LL_RESERVED_SPACE(dev); 65e415ed3aSVasily Averin const struct in6_addr *daddr, *nexthop; 66e415ed3aSVasily Averin struct ipv6hdr *hdr; 67f6b72b62SDavid S. Miller struct neighbour *neigh; 686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 int ret; 691da177e4SLinus Torvalds 705796015fSVasily Averin /* Be paranoid, rather than too clever. */ 71e415ed3aSVasily Averin if (unlikely(hh_len > skb_headroom(skb)) && dev->header_ops) { 72e415ed3aSVasily Averin skb = skb_expand_head(skb, hh_len); 735796015fSVasily Averin if (!skb) { 74e415ed3aSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 755796015fSVasily Averin return -ENOMEM; 765796015fSVasily Averin } 775796015fSVasily Averin } 785796015fSVasily Averin 79e415ed3aSVasily Averin hdr = ipv6_hdr(skb); 80e415ed3aSVasily Averin daddr = &hdr->daddr; 81e415ed3aSVasily Averin if (ipv6_addr_is_multicast(daddr)) { 827026b1ddSDavid Miller if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) && 838571ab47SYuval Mintz ((mroute6_is_socket(net, skb) && 84bd91b8bfSBenjamin Thery !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) || 85e415ed3aSVasily Averin ipv6_chk_mcast_addr(dev, daddr, &hdr->saddr))) { 861da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 871da177e4SLinus Torvalds 881da177e4SLinus Torvalds /* Do not check for IFF_ALLMULTI; multicast routing 891da177e4SLinus Torvalds is not supported in any case. 901da177e4SLinus Torvalds */ 911da177e4SLinus Torvalds if (newskb) 92b2e0b385SJan Engelhardt NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING, 9329a26a56SEric W. Biederman net, sk, newskb, NULL, newskb->dev, 9495603e22SMichel Machado dev_loopback_xmit); 951da177e4SLinus Torvalds 96e415ed3aSVasily Averin if (hdr->hop_limit == 0) { 9778126c41SEric W. Biederman IP6_INC_STATS(net, idev, 983bd653c8SDenis V. Lunev IPSTATS_MIB_OUTDISCARDS); 991da177e4SLinus Torvalds kfree_skb(skb); 1001da177e4SLinus Torvalds return 0; 1011da177e4SLinus Torvalds } 1021da177e4SLinus Torvalds } 1031da177e4SLinus Torvalds 10478126c41SEric W. Biederman IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len); 105e415ed3aSVasily Averin if (IPV6_ADDR_MC_SCOPE(daddr) <= IPV6_ADDR_SCOPE_NODELOCAL && 106dd408515SHannes Frederic Sowa !(dev->flags & IFF_LOOPBACK)) { 107dd408515SHannes Frederic Sowa kfree_skb(skb); 108dd408515SHannes Frederic Sowa return 0; 109dd408515SHannes Frederic Sowa } 1101da177e4SLinus Torvalds } 1111da177e4SLinus Torvalds 11214972cbdSRoopa Prabhu if (lwtunnel_xmit_redirect(dst->lwtstate)) { 11314972cbdSRoopa Prabhu int res = lwtunnel_xmit(skb); 11414972cbdSRoopa Prabhu 11514972cbdSRoopa Prabhu if (res < 0 || res == LWTUNNEL_XMIT_DONE) 11614972cbdSRoopa Prabhu return res; 11714972cbdSRoopa Prabhu } 11814972cbdSRoopa Prabhu 1196fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 120e415ed3aSVasily Averin nexthop = rt6_nexthop((struct rt6_info *)dst, daddr); 121e415ed3aSVasily Averin neigh = __ipv6_neigh_lookup_noref(dev, nexthop); 1226fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(!neigh)) 123e415ed3aSVasily Averin neigh = __neigh_create(&nd_tbl, nexthop, dev, false); 1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (!IS_ERR(neigh)) { 1254ff06203SJulian Anastasov sock_confirm_neigh(skb, neigh); 1260353f282SDavid Ahern ret = neigh_output(neigh, skb, false); 1276fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1286fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 return ret; 1296fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 } 1306fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 13105e3aa09SDavid S. Miller 132e415ed3aSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTNOROUTES); 1335e187189SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_NEIGH_CREATEFAIL); 1349e508490SJan Engelhardt return -EINVAL; 1351da177e4SLinus Torvalds } 1361da177e4SLinus Torvalds 137b210de4fSAya Levin static int 138b210de4fSAya Levin ip6_finish_output_gso_slowpath_drop(struct net *net, struct sock *sk, 139b210de4fSAya Levin struct sk_buff *skb, unsigned int mtu) 140b210de4fSAya Levin { 141b210de4fSAya Levin struct sk_buff *segs, *nskb; 142b210de4fSAya Levin netdev_features_t features; 143b210de4fSAya Levin int ret = 0; 144b210de4fSAya Levin 145b210de4fSAya Levin /* Please see corresponding comment in ip_finish_output_gso 146b210de4fSAya Levin * describing the cases where GSO segment length exceeds the 147b210de4fSAya Levin * egress MTU. 148b210de4fSAya Levin */ 149b210de4fSAya Levin features = netif_skb_features(skb); 150b210de4fSAya Levin segs = skb_gso_segment(skb, features & ~NETIF_F_GSO_MASK); 151b210de4fSAya Levin if (IS_ERR_OR_NULL(segs)) { 152b210de4fSAya Levin kfree_skb(skb); 153b210de4fSAya Levin return -ENOMEM; 154b210de4fSAya Levin } 155b210de4fSAya Levin 156b210de4fSAya Levin consume_skb(skb); 157b210de4fSAya Levin 158b210de4fSAya Levin skb_list_walk_safe(segs, segs, nskb) { 159b210de4fSAya Levin int err; 160b210de4fSAya Levin 161b210de4fSAya Levin skb_mark_not_on_list(segs); 162b210de4fSAya Levin err = ip6_fragment(net, sk, segs, ip6_finish_output2); 163b210de4fSAya Levin if (err && ret == 0) 164b210de4fSAya Levin ret = err; 165b210de4fSAya Levin } 166b210de4fSAya Levin 167b210de4fSAya Levin return ret; 168b210de4fSAya Levin } 169b210de4fSAya Levin 170956fe219Sbrakmo static int __ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1719e508490SJan Engelhardt { 172b210de4fSAya Levin unsigned int mtu; 173b210de4fSAya Levin 17409ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM) 17509ee9dbaSTobias Brunner /* Policy lookup after SNAT yielded a new policy */ 17609ee9dbaSTobias Brunner if (skb_dst(skb)->xfrm) { 17719d36c5fSEric Dumazet IP6CB(skb)->flags |= IP6SKB_REROUTED; 17809ee9dbaSTobias Brunner return dst_output(net, sk, skb); 17909ee9dbaSTobias Brunner } 18009ee9dbaSTobias Brunner #endif 18109ee9dbaSTobias Brunner 182b210de4fSAya Levin mtu = ip6_skb_dst_mtu(skb); 183b210de4fSAya Levin if (skb_is_gso(skb) && !skb_gso_validate_network_len(skb, mtu)) 184b210de4fSAya Levin return ip6_finish_output_gso_slowpath_drop(net, sk, skb, mtu); 185b210de4fSAya Levin 186b210de4fSAya Levin if ((skb->len > mtu && !skb_is_gso(skb)) || 1879037c357SJiri Pirko dst_allfrag(skb_dst(skb)) || 1889037c357SJiri Pirko (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size)) 1897d8c6e39SEric W. Biederman return ip6_fragment(net, sk, skb, ip6_finish_output2); 1909e508490SJan Engelhardt else 1917d8c6e39SEric W. Biederman return ip6_finish_output2(net, sk, skb); 1929e508490SJan Engelhardt } 1939e508490SJan Engelhardt 194956fe219Sbrakmo static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 195956fe219Sbrakmo { 196956fe219Sbrakmo int ret; 197956fe219Sbrakmo 198956fe219Sbrakmo ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb); 199956fe219Sbrakmo switch (ret) { 200956fe219Sbrakmo case NET_XMIT_SUCCESS: 201956fe219Sbrakmo return __ip6_finish_output(net, sk, skb); 202956fe219Sbrakmo case NET_XMIT_CN: 203956fe219Sbrakmo return __ip6_finish_output(net, sk, skb) ? : ret; 204956fe219Sbrakmo default: 2055e187189SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_BPF_CGROUP_EGRESS); 206956fe219Sbrakmo return ret; 207956fe219Sbrakmo } 208956fe219Sbrakmo } 209956fe219Sbrakmo 210ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb) 2111da177e4SLinus Torvalds { 21228f8bfd1SPhil Sutter struct net_device *dev = skb_dst(skb)->dev, *indev = skb->dev; 213adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 214be10de0aSEric W. Biederman 21597a7a37aSChenbo Feng skb->protocol = htons(ETH_P_IPV6); 21697a7a37aSChenbo Feng skb->dev = dev; 21797a7a37aSChenbo Feng 218778d80beSYOSHIFUJI Hideaki if (unlikely(idev->cnf.disable_ipv6)) { 21919a0644cSEric W. Biederman IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 2205e187189SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_IPV6DISABLED); 221778d80beSYOSHIFUJI Hideaki return 0; 222778d80beSYOSHIFUJI Hideaki } 223778d80beSYOSHIFUJI Hideaki 22429a26a56SEric W. Biederman return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING, 22528f8bfd1SPhil Sutter net, sk, skb, indev, dev, 2269c6eb28aSJan Engelhardt ip6_finish_output, 2279c6eb28aSJan Engelhardt !(IP6CB(skb)->flags & IP6SKB_REROUTED)); 2281da177e4SLinus Torvalds } 2296585d7dcSBrian Vazquez EXPORT_SYMBOL(ip6_output); 2301da177e4SLinus Torvalds 231e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np) 232513674b5SShaohua Li { 233513674b5SShaohua Li if (!np->autoflowlabel_set) 234513674b5SShaohua Li return ip6_default_np_autolabel(net); 235513674b5SShaohua Li else 236513674b5SShaohua Li return np->autoflowlabel; 237513674b5SShaohua Li } 238513674b5SShaohua Li 2391da177e4SLinus Torvalds /* 240b5d43998SShan Wei * xmit an sk_buff (used by TCP, SCTP and DCCP) 2411c1e9d2bSEric Dumazet * Note : socket lock is not held for SYNACK packets, but might be modified 2421c1e9d2bSEric Dumazet * by calls to skb_set_owner_w() and ipv6_local_error(), 2431c1e9d2bSEric Dumazet * which are using proper atomic operations or spinlocks. 2441da177e4SLinus Torvalds */ 2451c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6, 2464f6570d7SEric Dumazet __u32 mark, struct ipv6_txoptions *opt, int tclass, u32 priority) 2471da177e4SLinus Torvalds { 2483bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 2491c1e9d2bSEric Dumazet const struct ipv6_pinfo *np = inet6_sk(sk); 2504c9483b2SDavid S. Miller struct in6_addr *first_hop = &fl6->daddr; 251adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 2520c9f227bSVasily Averin struct net_device *dev = dst->dev; 2530c9f227bSVasily Averin struct inet6_dev *idev = ip6_dst_idev(dst); 25466033f47SStefano Brivio unsigned int head_room; 2551da177e4SLinus Torvalds struct ipv6hdr *hdr; 2564c9483b2SDavid S. Miller u8 proto = fl6->flowi6_proto; 2571da177e4SLinus Torvalds int seg_len = skb->len; 258e651f03aSGerrit Renker int hlimit = -1; 2591da177e4SLinus Torvalds u32 mtu; 2601da177e4SLinus Torvalds 2610c9f227bSVasily Averin head_room = sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dev); 26266033f47SStefano Brivio if (opt) 26366033f47SStefano Brivio head_room += opt->opt_nflen + opt->opt_flen; 2641da177e4SLinus Torvalds 2650c9f227bSVasily Averin if (unlikely(head_room > skb_headroom(skb))) { 2660c9f227bSVasily Averin skb = skb_expand_head(skb, head_room); 2670c9f227bSVasily Averin if (!skb) { 2680c9f227bSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 2691da177e4SLinus Torvalds return -ENOBUFS; 2701da177e4SLinus Torvalds } 2711da177e4SLinus Torvalds } 27266033f47SStefano Brivio 27366033f47SStefano Brivio if (opt) { 27466033f47SStefano Brivio seg_len += opt->opt_nflen + opt->opt_flen; 27566033f47SStefano Brivio 2761da177e4SLinus Torvalds if (opt->opt_flen) 2771da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 27866033f47SStefano Brivio 2791da177e4SLinus Torvalds if (opt->opt_nflen) 280613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop, 281613fa3caSDavid Lebrun &fl6->saddr); 2821da177e4SLinus Torvalds } 2831da177e4SLinus Torvalds 284e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 285e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 2860660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 2871da177e4SLinus Torvalds 2881da177e4SLinus Torvalds /* 2891da177e4SLinus Torvalds * Fill in the IPv6 header 2901da177e4SLinus Torvalds */ 291b903d324SEric Dumazet if (np) 2921da177e4SLinus Torvalds hlimit = np->hop_limit; 2931da177e4SLinus Torvalds if (hlimit < 0) 2946b75d090SYOSHIFUJI Hideaki hlimit = ip6_dst_hoplimit(dst); 2951da177e4SLinus Torvalds 296cb1ce2efSTom Herbert ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel, 297513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 29841a1f8eaSYOSHIFUJI Hideaki 2991da177e4SLinus Torvalds hdr->payload_len = htons(seg_len); 3001da177e4SLinus Torvalds hdr->nexthdr = proto; 3011da177e4SLinus Torvalds hdr->hop_limit = hlimit; 3021da177e4SLinus Torvalds 3034e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 3044e3fd7a0SAlexey Dobriyan hdr->daddr = *first_hop; 3051da177e4SLinus Torvalds 3069c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 3074f6570d7SEric Dumazet skb->priority = priority; 30892e55f41SPablo Neira skb->mark = mark; 309a2c2064fSPatrick McHardy 3101da177e4SLinus Torvalds mtu = dst_mtu(dst); 31160ff7467SWANG Cong if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) { 3120c9f227bSVasily Averin IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len); 313a8e3e1a9SDavid Ahern 314a8e3e1a9SDavid Ahern /* if egress device is enslaved to an L3 master device pass the 315a8e3e1a9SDavid Ahern * skb to its handler for processing 316a8e3e1a9SDavid Ahern */ 317a8e3e1a9SDavid Ahern skb = l3mdev_ip6_out((struct sock *)sk, skb); 318a8e3e1a9SDavid Ahern if (unlikely(!skb)) 319a8e3e1a9SDavid Ahern return 0; 320a8e3e1a9SDavid Ahern 3211c1e9d2bSEric Dumazet /* hooks should never assume socket lock is held. 3221c1e9d2bSEric Dumazet * we promote our socket to non const 3231c1e9d2bSEric Dumazet */ 32429a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, 3250c9f227bSVasily Averin net, (struct sock *)sk, skb, NULL, dev, 32613206b6bSEric W. Biederman dst_output); 3271da177e4SLinus Torvalds } 3281da177e4SLinus Torvalds 3290c9f227bSVasily Averin skb->dev = dev; 3301c1e9d2bSEric Dumazet /* ipv6_local_error() does not require socket lock, 3311c1e9d2bSEric Dumazet * we promote our socket to non const 3321c1e9d2bSEric Dumazet */ 3331c1e9d2bSEric Dumazet ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu); 3341c1e9d2bSEric Dumazet 3350c9f227bSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_FRAGFAILS); 3361da177e4SLinus Torvalds kfree_skb(skb); 3371da177e4SLinus Torvalds return -EMSGSIZE; 3381da177e4SLinus Torvalds } 3397159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit); 3407159039aSYOSHIFUJI Hideaki 3411da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel) 3421da177e4SLinus Torvalds { 3431da177e4SLinus Torvalds struct ip6_ra_chain *ra; 3441da177e4SLinus Torvalds struct sock *last = NULL; 3451da177e4SLinus Torvalds 3461da177e4SLinus Torvalds read_lock(&ip6_ra_lock); 3471da177e4SLinus Torvalds for (ra = ip6_ra_chain; ra; ra = ra->next) { 3481da177e4SLinus Torvalds struct sock *sk = ra->sk; 3490bd1b59bSAndrew McDonald if (sk && ra->sel == sel && 3500bd1b59bSAndrew McDonald (!sk->sk_bound_dev_if || 3510bd1b59bSAndrew McDonald sk->sk_bound_dev_if == skb->dev->ifindex)) { 3529036b2feSFrancesco Ruggeri struct ipv6_pinfo *np = inet6_sk(sk); 3539036b2feSFrancesco Ruggeri 3549036b2feSFrancesco Ruggeri if (np && np->rtalert_isolate && 3559036b2feSFrancesco Ruggeri !net_eq(sock_net(sk), dev_net(skb->dev))) { 3569036b2feSFrancesco Ruggeri continue; 3579036b2feSFrancesco Ruggeri } 3581da177e4SLinus Torvalds if (last) { 3591da177e4SLinus Torvalds struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC); 3601da177e4SLinus Torvalds if (skb2) 3611da177e4SLinus Torvalds rawv6_rcv(last, skb2); 3621da177e4SLinus Torvalds } 3631da177e4SLinus Torvalds last = sk; 3641da177e4SLinus Torvalds } 3651da177e4SLinus Torvalds } 3661da177e4SLinus Torvalds 3671da177e4SLinus Torvalds if (last) { 3681da177e4SLinus Torvalds rawv6_rcv(last, skb); 3691da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3701da177e4SLinus Torvalds return 1; 3711da177e4SLinus Torvalds } 3721da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3731da177e4SLinus Torvalds return 0; 3741da177e4SLinus Torvalds } 3751da177e4SLinus Torvalds 376e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb) 377e21e0b5fSVille Nuorvala { 3780660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 379e21e0b5fSVille Nuorvala u8 nexthdr = hdr->nexthdr; 38075f2811cSJesse Gross __be16 frag_off; 381e21e0b5fSVille Nuorvala int offset; 382e21e0b5fSVille Nuorvala 383e21e0b5fSVille Nuorvala if (ipv6_ext_hdr(nexthdr)) { 38475f2811cSJesse Gross offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off); 385e21e0b5fSVille Nuorvala if (offset < 0) 386e21e0b5fSVille Nuorvala return 0; 387e21e0b5fSVille Nuorvala } else 388e21e0b5fSVille Nuorvala offset = sizeof(struct ipv6hdr); 389e21e0b5fSVille Nuorvala 390e21e0b5fSVille Nuorvala if (nexthdr == IPPROTO_ICMPV6) { 391e21e0b5fSVille Nuorvala struct icmp6hdr *icmp6; 392e21e0b5fSVille Nuorvala 393d56f90a7SArnaldo Carvalho de Melo if (!pskb_may_pull(skb, (skb_network_header(skb) + 394d56f90a7SArnaldo Carvalho de Melo offset + 1 - skb->data))) 395e21e0b5fSVille Nuorvala return 0; 396e21e0b5fSVille Nuorvala 397d56f90a7SArnaldo Carvalho de Melo icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset); 398e21e0b5fSVille Nuorvala 399e21e0b5fSVille Nuorvala switch (icmp6->icmp6_type) { 400e21e0b5fSVille Nuorvala case NDISC_ROUTER_SOLICITATION: 401e21e0b5fSVille Nuorvala case NDISC_ROUTER_ADVERTISEMENT: 402e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_SOLICITATION: 403e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_ADVERTISEMENT: 404e21e0b5fSVille Nuorvala case NDISC_REDIRECT: 405e21e0b5fSVille Nuorvala /* For reaction involving unicast neighbor discovery 406e21e0b5fSVille Nuorvala * message destined to the proxied address, pass it to 407e21e0b5fSVille Nuorvala * input function. 408e21e0b5fSVille Nuorvala */ 409e21e0b5fSVille Nuorvala return 1; 410e21e0b5fSVille Nuorvala default: 411e21e0b5fSVille Nuorvala break; 412e21e0b5fSVille Nuorvala } 413e21e0b5fSVille Nuorvala } 414e21e0b5fSVille Nuorvala 41574553b09SVille Nuorvala /* 41674553b09SVille Nuorvala * The proxying router can't forward traffic sent to a link-local 41774553b09SVille Nuorvala * address, so signal the sender and discard the packet. This 41874553b09SVille Nuorvala * behavior is clarified by the MIPv6 specification. 41974553b09SVille Nuorvala */ 42074553b09SVille Nuorvala if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) { 42174553b09SVille Nuorvala dst_link_failure(skb); 42274553b09SVille Nuorvala return -1; 42374553b09SVille Nuorvala } 42474553b09SVille Nuorvala 425e21e0b5fSVille Nuorvala return 0; 426e21e0b5fSVille Nuorvala } 427e21e0b5fSVille Nuorvala 4280c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk, 4290c4b51f0SEric W. Biederman struct sk_buff *skb) 4301da177e4SLinus Torvalds { 43171a1c915SJeff Barnhill struct dst_entry *dst = skb_dst(skb); 43271a1c915SJeff Barnhill 43371a1c915SJeff Barnhill __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS); 43471a1c915SJeff Barnhill __IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len); 43571a1c915SJeff Barnhill 436f839a6c9SIdo Schimmel #ifdef CONFIG_NET_SWITCHDEV 437f839a6c9SIdo Schimmel if (skb->offload_l3_fwd_mark) { 438f839a6c9SIdo Schimmel consume_skb(skb); 439f839a6c9SIdo Schimmel return 0; 440f839a6c9SIdo Schimmel } 441f839a6c9SIdo Schimmel #endif 442f839a6c9SIdo Schimmel 443de799101SMartin KaFai Lau skb_clear_tstamp(skb); 44413206b6bSEric W. Biederman return dst_output(net, sk, skb); 4451da177e4SLinus Torvalds } 4461da177e4SLinus Torvalds 447fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu) 448fe6cc55fSFlorian Westphal { 449418a3156SFlorian Westphal if (skb->len <= mtu) 450fe6cc55fSFlorian Westphal return false; 451fe6cc55fSFlorian Westphal 45260ff7467SWANG Cong /* ipv6 conntrack defrag sets max_frag_size + ignore_df */ 453fe6cc55fSFlorian Westphal if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu) 454fe6cc55fSFlorian Westphal return true; 455fe6cc55fSFlorian Westphal 45660ff7467SWANG Cong if (skb->ignore_df) 457418a3156SFlorian Westphal return false; 458418a3156SFlorian Westphal 459779b7931SDaniel Axtens if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu)) 460fe6cc55fSFlorian Westphal return false; 461fe6cc55fSFlorian Westphal 462fe6cc55fSFlorian Westphal return true; 463fe6cc55fSFlorian Westphal } 464fe6cc55fSFlorian Westphal 4651da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb) 4661da177e4SLinus Torvalds { 467adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 4680660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 4691da177e4SLinus Torvalds struct inet6_skb_parm *opt = IP6CB(skb); 470c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(dst->dev); 4710857d6f8SStephen Suryaputra struct inet6_dev *idev; 472*2edc1a38SMenglong Dong SKB_DR(reason); 47314f3ad6fSUlrich Weber u32 mtu; 4741da177e4SLinus Torvalds 4750857d6f8SStephen Suryaputra idev = __in6_dev_get_safely(dev_get_by_index_rcu(net, IP6CB(skb)->iif)); 47653b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->forwarding == 0) 4771da177e4SLinus Torvalds goto error; 4781da177e4SLinus Torvalds 479090f1166SLi RongQing if (skb->pkt_type != PACKET_HOST) 480090f1166SLi RongQing goto drop; 481090f1166SLi RongQing 4829ef2e965SHannes Frederic Sowa if (unlikely(skb->sk)) 4839ef2e965SHannes Frederic Sowa goto drop; 4849ef2e965SHannes Frederic Sowa 4854497b076SBen Hutchings if (skb_warn_if_lro(skb)) 4864497b076SBen Hutchings goto drop; 4874497b076SBen Hutchings 488ccd27f05SNicolas Dichtel if (!net->ipv6.devconf_all->disable_policy && 489ccd27f05SNicolas Dichtel !idev->cnf.disable_policy && 490ccd27f05SNicolas Dichtel !xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) { 491bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 4921da177e4SLinus Torvalds goto drop; 4931da177e4SLinus Torvalds } 4941da177e4SLinus Torvalds 49535fc92a9SHerbert Xu skb_forward_csum(skb); 4961da177e4SLinus Torvalds 4971da177e4SLinus Torvalds /* 4981da177e4SLinus Torvalds * We DO NOT make any processing on 4991da177e4SLinus Torvalds * RA packets, pushing them to user level AS IS 5001da177e4SLinus Torvalds * without ane WARRANTY that application will be able 5011da177e4SLinus Torvalds * to interpret them. The reason is that we 5021da177e4SLinus Torvalds * cannot make anything clever here. 5031da177e4SLinus Torvalds * 5041da177e4SLinus Torvalds * We are not end-node, so that if packet contains 5051da177e4SLinus Torvalds * AH/ESP, we cannot make anything. 5061da177e4SLinus Torvalds * Defragmentation also would be mistake, RA packets 5071da177e4SLinus Torvalds * cannot be fragmented, because there is no warranty 5081da177e4SLinus Torvalds * that different fragments will go along one path. --ANK 5091da177e4SLinus Torvalds */ 510ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) { 511ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (ip6_call_ra_chain(skb, ntohs(opt->ra))) 5121da177e4SLinus Torvalds return 0; 5131da177e4SLinus Torvalds } 5141da177e4SLinus Torvalds 5151da177e4SLinus Torvalds /* 5161da177e4SLinus Torvalds * check and decrement ttl 5171da177e4SLinus Torvalds */ 5181da177e4SLinus Torvalds if (hdr->hop_limit <= 1) { 5193ffe533cSAlexey Dobriyan icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0); 520bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS); 5211da177e4SLinus Torvalds 522*2edc1a38SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_IP_INHDR); 5231da177e4SLinus Torvalds return -ETIMEDOUT; 5241da177e4SLinus Torvalds } 5251da177e4SLinus Torvalds 526fbea49e1SYOSHIFUJI Hideaki /* XXX: idev->cnf.proxy_ndp? */ 52753b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->proxy_ndp && 5288a3edd80SDaniel Lezcano pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) { 52974553b09SVille Nuorvala int proxied = ip6_forward_proxy_check(skb); 53046c7655fSKangmin Park if (proxied > 0) { 53146c7655fSKangmin Park hdr->hop_limit--; 532e21e0b5fSVille Nuorvala return ip6_input(skb); 53346c7655fSKangmin Park } else if (proxied < 0) { 534bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 53574553b09SVille Nuorvala goto drop; 53674553b09SVille Nuorvala } 537e21e0b5fSVille Nuorvala } 538e21e0b5fSVille Nuorvala 5391da177e4SLinus Torvalds if (!xfrm6_route_forward(skb)) { 540bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 541*2edc1a38SMenglong Dong SKB_DR_SET(reason, XFRM_POLICY); 5421da177e4SLinus Torvalds goto drop; 5431da177e4SLinus Torvalds } 544adf30907SEric Dumazet dst = skb_dst(skb); 5451da177e4SLinus Torvalds 5461da177e4SLinus Torvalds /* IPv6 specs say nothing about it, but it is clear that we cannot 5471da177e4SLinus Torvalds send redirects to source routed frames. 5481e5dc146SMasahide NAKAMURA We don't send redirects to frames decapsulated from IPsec. 5491da177e4SLinus Torvalds */ 5502f17becfSStephen Suryaputra if (IP6CB(skb)->iif == dst->dev->ifindex && 5512f17becfSStephen Suryaputra opt->srcrt == 0 && !skb_sec_path(skb)) { 5521da177e4SLinus Torvalds struct in6_addr *target = NULL; 553fbfe95a4SDavid S. Miller struct inet_peer *peer; 5541da177e4SLinus Torvalds struct rt6_info *rt; 5551da177e4SLinus Torvalds 5561da177e4SLinus Torvalds /* 5571da177e4SLinus Torvalds * incoming and outgoing devices are the same 5581da177e4SLinus Torvalds * send a redirect. 5591da177e4SLinus Torvalds */ 5601da177e4SLinus Torvalds 5611da177e4SLinus Torvalds rt = (struct rt6_info *) dst; 562c45a3dfbSDavid S. Miller if (rt->rt6i_flags & RTF_GATEWAY) 563c45a3dfbSDavid S. Miller target = &rt->rt6i_gateway; 5641da177e4SLinus Torvalds else 5651da177e4SLinus Torvalds target = &hdr->daddr; 5661da177e4SLinus Torvalds 567fd0273d7SMartin KaFai Lau peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1); 56892d86829SDavid S. Miller 5691da177e4SLinus Torvalds /* Limit redirects both by destination (here) 5701da177e4SLinus Torvalds and by source (inside ndisc_send_redirect) 5711da177e4SLinus Torvalds */ 572fbfe95a4SDavid S. Miller if (inet_peer_xrlim_allow(peer, 1*HZ)) 5734991969aSDavid S. Miller ndisc_send_redirect(skb, target); 5741d861aa4SDavid S. Miller if (peer) 5751d861aa4SDavid S. Miller inet_putpeer(peer); 5765bb1ab09SDavid L Stevens } else { 5775bb1ab09SDavid L Stevens int addrtype = ipv6_addr_type(&hdr->saddr); 5785bb1ab09SDavid L Stevens 5791da177e4SLinus Torvalds /* This check is security critical. */ 580f81b2e7dSYOSHIFUJI Hideaki if (addrtype == IPV6_ADDR_ANY || 581f81b2e7dSYOSHIFUJI Hideaki addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK)) 5821da177e4SLinus Torvalds goto error; 5835bb1ab09SDavid L Stevens if (addrtype & IPV6_ADDR_LINKLOCAL) { 5845bb1ab09SDavid L Stevens icmpv6_send(skb, ICMPV6_DEST_UNREACH, 5853ffe533cSAlexey Dobriyan ICMPV6_NOT_NEIGHBOUR, 0); 5865bb1ab09SDavid L Stevens goto error; 5875bb1ab09SDavid L Stevens } 5881da177e4SLinus Torvalds } 5891da177e4SLinus Torvalds 590427faee1SVadim Fedorenko mtu = ip6_dst_mtu_maybe_forward(dst, true); 59114f3ad6fSUlrich Weber if (mtu < IPV6_MIN_MTU) 59214f3ad6fSUlrich Weber mtu = IPV6_MIN_MTU; 59314f3ad6fSUlrich Weber 594fe6cc55fSFlorian Westphal if (ip6_pkt_too_big(skb, mtu)) { 5951da177e4SLinus Torvalds /* Again, force OUTPUT device used as source address */ 5961da177e4SLinus Torvalds skb->dev = dst->dev; 59714f3ad6fSUlrich Weber icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 598bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS); 5991d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 60015c77d8bSEric Dumazet IPSTATS_MIB_FRAGFAILS); 601*2edc1a38SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_PKT_TOO_BIG); 6021da177e4SLinus Torvalds return -EMSGSIZE; 6031da177e4SLinus Torvalds } 6041da177e4SLinus Torvalds 6051da177e4SLinus Torvalds if (skb_cow(skb, dst->dev->hard_header_len)) { 6061d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 60715c77d8bSEric Dumazet IPSTATS_MIB_OUTDISCARDS); 6081da177e4SLinus Torvalds goto drop; 6091da177e4SLinus Torvalds } 6101da177e4SLinus Torvalds 6110660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 6121da177e4SLinus Torvalds 6131da177e4SLinus Torvalds /* Mangling hops number delayed to point after skb COW */ 6141da177e4SLinus Torvalds 6151da177e4SLinus Torvalds hdr->hop_limit--; 6161da177e4SLinus Torvalds 61729a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, 61829a26a56SEric W. Biederman net, NULL, skb, skb->dev, dst->dev, 6196e23ae2aSPatrick McHardy ip6_forward_finish); 6201da177e4SLinus Torvalds 6211da177e4SLinus Torvalds error: 622bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS); 623*2edc1a38SMenglong Dong SKB_DR_SET(reason, IP_INADDRERRORS); 6241da177e4SLinus Torvalds drop: 625*2edc1a38SMenglong Dong kfree_skb_reason(skb, reason); 6261da177e4SLinus Torvalds return -EINVAL; 6271da177e4SLinus Torvalds } 6281da177e4SLinus Torvalds 6291da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from) 6301da177e4SLinus Torvalds { 6311da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 6321da177e4SLinus Torvalds to->priority = from->priority; 6331da177e4SLinus Torvalds to->protocol = from->protocol; 634adf30907SEric Dumazet skb_dst_drop(to); 635adf30907SEric Dumazet skb_dst_set(to, dst_clone(skb_dst(from))); 6361da177e4SLinus Torvalds to->dev = from->dev; 63782e91ffeSThomas Graf to->mark = from->mark; 6381da177e4SLinus Torvalds 6393dd1c9a1SPaolo Abeni skb_copy_hash(to, from); 6403dd1c9a1SPaolo Abeni 6411da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 6421da177e4SLinus Torvalds to->tc_index = from->tc_index; 6431da177e4SLinus Torvalds #endif 644e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 645df5042f4SFlorian Westphal skb_ext_copy(to, from); 646984bc16cSJames Morris skb_copy_secmark(to, from); 6471da177e4SLinus Torvalds } 6481da177e4SLinus Torvalds 6490feca619SPablo Neira Ayuso int ip6_fraglist_init(struct sk_buff *skb, unsigned int hlen, u8 *prevhdr, 6500feca619SPablo Neira Ayuso u8 nexthdr, __be32 frag_id, 6510feca619SPablo Neira Ayuso struct ip6_fraglist_iter *iter) 6520feca619SPablo Neira Ayuso { 6530feca619SPablo Neira Ayuso unsigned int first_len; 6540feca619SPablo Neira Ayuso struct frag_hdr *fh; 6550feca619SPablo Neira Ayuso 6560feca619SPablo Neira Ayuso /* BUILD HEADER */ 6570feca619SPablo Neira Ayuso *prevhdr = NEXTHDR_FRAGMENT; 6580feca619SPablo Neira Ayuso iter->tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC); 6590feca619SPablo Neira Ayuso if (!iter->tmp_hdr) 6600feca619SPablo Neira Ayuso return -ENOMEM; 6610feca619SPablo Neira Ayuso 662b7034146SEric Dumazet iter->frag = skb_shinfo(skb)->frag_list; 6630feca619SPablo Neira Ayuso skb_frag_list_init(skb); 6640feca619SPablo Neira Ayuso 6650feca619SPablo Neira Ayuso iter->offset = 0; 6660feca619SPablo Neira Ayuso iter->hlen = hlen; 6670feca619SPablo Neira Ayuso iter->frag_id = frag_id; 6680feca619SPablo Neira Ayuso iter->nexthdr = nexthdr; 6690feca619SPablo Neira Ayuso 6700feca619SPablo Neira Ayuso __skb_pull(skb, hlen); 6710feca619SPablo Neira Ayuso fh = __skb_push(skb, sizeof(struct frag_hdr)); 6720feca619SPablo Neira Ayuso __skb_push(skb, hlen); 6730feca619SPablo Neira Ayuso skb_reset_network_header(skb); 6740feca619SPablo Neira Ayuso memcpy(skb_network_header(skb), iter->tmp_hdr, hlen); 6750feca619SPablo Neira Ayuso 6760feca619SPablo Neira Ayuso fh->nexthdr = nexthdr; 6770feca619SPablo Neira Ayuso fh->reserved = 0; 6780feca619SPablo Neira Ayuso fh->frag_off = htons(IP6_MF); 6790feca619SPablo Neira Ayuso fh->identification = frag_id; 6800feca619SPablo Neira Ayuso 6810feca619SPablo Neira Ayuso first_len = skb_pagelen(skb); 6820feca619SPablo Neira Ayuso skb->data_len = first_len - skb_headlen(skb); 6830feca619SPablo Neira Ayuso skb->len = first_len; 6840feca619SPablo Neira Ayuso ipv6_hdr(skb)->payload_len = htons(first_len - sizeof(struct ipv6hdr)); 6850feca619SPablo Neira Ayuso 6860feca619SPablo Neira Ayuso return 0; 6870feca619SPablo Neira Ayuso } 6880feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_init); 6890feca619SPablo Neira Ayuso 6900feca619SPablo Neira Ayuso void ip6_fraglist_prepare(struct sk_buff *skb, 6910feca619SPablo Neira Ayuso struct ip6_fraglist_iter *iter) 6920feca619SPablo Neira Ayuso { 6930feca619SPablo Neira Ayuso struct sk_buff *frag = iter->frag; 6940feca619SPablo Neira Ayuso unsigned int hlen = iter->hlen; 6950feca619SPablo Neira Ayuso struct frag_hdr *fh; 6960feca619SPablo Neira Ayuso 6970feca619SPablo Neira Ayuso frag->ip_summed = CHECKSUM_NONE; 6980feca619SPablo Neira Ayuso skb_reset_transport_header(frag); 6990feca619SPablo Neira Ayuso fh = __skb_push(frag, sizeof(struct frag_hdr)); 7000feca619SPablo Neira Ayuso __skb_push(frag, hlen); 7010feca619SPablo Neira Ayuso skb_reset_network_header(frag); 7020feca619SPablo Neira Ayuso memcpy(skb_network_header(frag), iter->tmp_hdr, hlen); 7030feca619SPablo Neira Ayuso iter->offset += skb->len - hlen - sizeof(struct frag_hdr); 7040feca619SPablo Neira Ayuso fh->nexthdr = iter->nexthdr; 7050feca619SPablo Neira Ayuso fh->reserved = 0; 7060feca619SPablo Neira Ayuso fh->frag_off = htons(iter->offset); 7070feca619SPablo Neira Ayuso if (frag->next) 7080feca619SPablo Neira Ayuso fh->frag_off |= htons(IP6_MF); 7090feca619SPablo Neira Ayuso fh->identification = iter->frag_id; 7100feca619SPablo Neira Ayuso ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr)); 7110feca619SPablo Neira Ayuso ip6_copy_metadata(frag, skb); 7120feca619SPablo Neira Ayuso } 7130feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_prepare); 7140feca619SPablo Neira Ayuso 7158a6a1f17SPablo Neira Ayuso void ip6_frag_init(struct sk_buff *skb, unsigned int hlen, unsigned int mtu, 7168a6a1f17SPablo Neira Ayuso unsigned short needed_tailroom, int hdr_room, u8 *prevhdr, 7178a6a1f17SPablo Neira Ayuso u8 nexthdr, __be32 frag_id, struct ip6_frag_state *state) 7188a6a1f17SPablo Neira Ayuso { 7198a6a1f17SPablo Neira Ayuso state->prevhdr = prevhdr; 7208a6a1f17SPablo Neira Ayuso state->nexthdr = nexthdr; 7218a6a1f17SPablo Neira Ayuso state->frag_id = frag_id; 7228a6a1f17SPablo Neira Ayuso 7238a6a1f17SPablo Neira Ayuso state->hlen = hlen; 7248a6a1f17SPablo Neira Ayuso state->mtu = mtu; 7258a6a1f17SPablo Neira Ayuso 7268a6a1f17SPablo Neira Ayuso state->left = skb->len - hlen; /* Space per frame */ 7278a6a1f17SPablo Neira Ayuso state->ptr = hlen; /* Where to start from */ 7288a6a1f17SPablo Neira Ayuso 7298a6a1f17SPablo Neira Ayuso state->hroom = hdr_room; 7308a6a1f17SPablo Neira Ayuso state->troom = needed_tailroom; 7318a6a1f17SPablo Neira Ayuso 7328a6a1f17SPablo Neira Ayuso state->offset = 0; 7338a6a1f17SPablo Neira Ayuso } 7348a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_init); 7358a6a1f17SPablo Neira Ayuso 7368a6a1f17SPablo Neira Ayuso struct sk_buff *ip6_frag_next(struct sk_buff *skb, struct ip6_frag_state *state) 7378a6a1f17SPablo Neira Ayuso { 7388a6a1f17SPablo Neira Ayuso u8 *prevhdr = state->prevhdr, *fragnexthdr_offset; 7398a6a1f17SPablo Neira Ayuso struct sk_buff *frag; 7408a6a1f17SPablo Neira Ayuso struct frag_hdr *fh; 7418a6a1f17SPablo Neira Ayuso unsigned int len; 7428a6a1f17SPablo Neira Ayuso 7438a6a1f17SPablo Neira Ayuso len = state->left; 7448a6a1f17SPablo Neira Ayuso /* IF: it doesn't fit, use 'mtu' - the data space left */ 7458a6a1f17SPablo Neira Ayuso if (len > state->mtu) 7468a6a1f17SPablo Neira Ayuso len = state->mtu; 7478a6a1f17SPablo Neira Ayuso /* IF: we are not sending up to and including the packet end 7488a6a1f17SPablo Neira Ayuso then align the next start on an eight byte boundary */ 7498a6a1f17SPablo Neira Ayuso if (len < state->left) 7508a6a1f17SPablo Neira Ayuso len &= ~7; 7518a6a1f17SPablo Neira Ayuso 7528a6a1f17SPablo Neira Ayuso /* Allocate buffer */ 7538a6a1f17SPablo Neira Ayuso frag = alloc_skb(len + state->hlen + sizeof(struct frag_hdr) + 7548a6a1f17SPablo Neira Ayuso state->hroom + state->troom, GFP_ATOMIC); 7558a6a1f17SPablo Neira Ayuso if (!frag) 7568a6a1f17SPablo Neira Ayuso return ERR_PTR(-ENOMEM); 7578a6a1f17SPablo Neira Ayuso 7588a6a1f17SPablo Neira Ayuso /* 7598a6a1f17SPablo Neira Ayuso * Set up data on packet 7608a6a1f17SPablo Neira Ayuso */ 7618a6a1f17SPablo Neira Ayuso 7628a6a1f17SPablo Neira Ayuso ip6_copy_metadata(frag, skb); 7638a6a1f17SPablo Neira Ayuso skb_reserve(frag, state->hroom); 7648a6a1f17SPablo Neira Ayuso skb_put(frag, len + state->hlen + sizeof(struct frag_hdr)); 7658a6a1f17SPablo Neira Ayuso skb_reset_network_header(frag); 7668a6a1f17SPablo Neira Ayuso fh = (struct frag_hdr *)(skb_network_header(frag) + state->hlen); 7678a6a1f17SPablo Neira Ayuso frag->transport_header = (frag->network_header + state->hlen + 7688a6a1f17SPablo Neira Ayuso sizeof(struct frag_hdr)); 7698a6a1f17SPablo Neira Ayuso 7708a6a1f17SPablo Neira Ayuso /* 7718a6a1f17SPablo Neira Ayuso * Charge the memory for the fragment to any owner 7728a6a1f17SPablo Neira Ayuso * it might possess 7738a6a1f17SPablo Neira Ayuso */ 7748a6a1f17SPablo Neira Ayuso if (skb->sk) 7758a6a1f17SPablo Neira Ayuso skb_set_owner_w(frag, skb->sk); 7768a6a1f17SPablo Neira Ayuso 7778a6a1f17SPablo Neira Ayuso /* 7788a6a1f17SPablo Neira Ayuso * Copy the packet header into the new buffer. 7798a6a1f17SPablo Neira Ayuso */ 7808a6a1f17SPablo Neira Ayuso skb_copy_from_linear_data(skb, skb_network_header(frag), state->hlen); 7818a6a1f17SPablo Neira Ayuso 7828a6a1f17SPablo Neira Ayuso fragnexthdr_offset = skb_network_header(frag); 7838a6a1f17SPablo Neira Ayuso fragnexthdr_offset += prevhdr - skb_network_header(skb); 7848a6a1f17SPablo Neira Ayuso *fragnexthdr_offset = NEXTHDR_FRAGMENT; 7858a6a1f17SPablo Neira Ayuso 7868a6a1f17SPablo Neira Ayuso /* 7878a6a1f17SPablo Neira Ayuso * Build fragment header. 7888a6a1f17SPablo Neira Ayuso */ 7898a6a1f17SPablo Neira Ayuso fh->nexthdr = state->nexthdr; 7908a6a1f17SPablo Neira Ayuso fh->reserved = 0; 7918a6a1f17SPablo Neira Ayuso fh->identification = state->frag_id; 7928a6a1f17SPablo Neira Ayuso 7938a6a1f17SPablo Neira Ayuso /* 7948a6a1f17SPablo Neira Ayuso * Copy a block of the IP datagram. 7958a6a1f17SPablo Neira Ayuso */ 7968a6a1f17SPablo Neira Ayuso BUG_ON(skb_copy_bits(skb, state->ptr, skb_transport_header(frag), 7978a6a1f17SPablo Neira Ayuso len)); 7988a6a1f17SPablo Neira Ayuso state->left -= len; 7998a6a1f17SPablo Neira Ayuso 8008a6a1f17SPablo Neira Ayuso fh->frag_off = htons(state->offset); 8018a6a1f17SPablo Neira Ayuso if (state->left > 0) 8028a6a1f17SPablo Neira Ayuso fh->frag_off |= htons(IP6_MF); 8038a6a1f17SPablo Neira Ayuso ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr)); 8048a6a1f17SPablo Neira Ayuso 8058a6a1f17SPablo Neira Ayuso state->ptr += len; 8068a6a1f17SPablo Neira Ayuso state->offset += len; 8078a6a1f17SPablo Neira Ayuso 8088a6a1f17SPablo Neira Ayuso return frag; 8098a6a1f17SPablo Neira Ayuso } 8108a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_next); 8118a6a1f17SPablo Neira Ayuso 8127d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, 8137d8c6e39SEric W. Biederman int (*output)(struct net *, struct sock *, struct sk_buff *)) 8141da177e4SLinus Torvalds { 8151da177e4SLinus Torvalds struct sk_buff *frag; 816adf30907SEric Dumazet struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 817f60e5990Shannes@stressinduktion.org struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? 818f60e5990Shannes@stressinduktion.org inet6_sk(skb->sk) : NULL; 819a1ac9c8aSMartin KaFai Lau bool mono_delivery_time = skb->mono_delivery_time; 8208a6a1f17SPablo Neira Ayuso struct ip6_frag_state state; 8218a6a1f17SPablo Neira Ayuso unsigned int mtu, hlen, nexthdr_offset; 8229669fffcSEric Dumazet ktime_t tstamp = skb->tstamp; 8238a6a1f17SPablo Neira Ayuso int hroom, err = 0; 824286c2349SMartin KaFai Lau __be32 frag_id; 8251da177e4SLinus Torvalds u8 *prevhdr, nexthdr = 0; 8261da177e4SLinus Torvalds 8277dd7eb95SDavid S. Miller err = ip6_find_1stfragopt(skb, &prevhdr); 8287dd7eb95SDavid S. Miller if (err < 0) 8292423496aSCraig Gallek goto fail; 8307dd7eb95SDavid S. Miller hlen = err; 8311da177e4SLinus Torvalds nexthdr = *prevhdr; 832ef0efcd3SJunwei Hu nexthdr_offset = prevhdr - skb_network_header(skb); 8331da177e4SLinus Torvalds 834628a5c56SJohn Heffner mtu = ip6_skb_dst_mtu(skb); 835b881ef76SJohn Heffner 836b881ef76SJohn Heffner /* We must not fragment if the socket is set to force MTU discovery 83714f3ad6fSUlrich Weber * or if the skb it not generated by a local socket. 838b881ef76SJohn Heffner */ 839485fca66SFlorian Westphal if (unlikely(!skb->ignore_df && skb->len > mtu)) 840485fca66SFlorian Westphal goto fail_toobig; 841a34a101eSEric Dumazet 842485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size) { 843485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size > mtu) 844485fca66SFlorian Westphal goto fail_toobig; 845485fca66SFlorian Westphal 846485fca66SFlorian Westphal /* don't send fragments larger than what we received */ 847485fca66SFlorian Westphal mtu = IP6CB(skb)->frag_max_size; 848485fca66SFlorian Westphal if (mtu < IPV6_MIN_MTU) 849485fca66SFlorian Westphal mtu = IPV6_MIN_MTU; 850b881ef76SJohn Heffner } 851b881ef76SJohn Heffner 852d91675f9SYOSHIFUJI Hideaki if (np && np->frag_size < mtu) { 853d91675f9SYOSHIFUJI Hideaki if (np->frag_size) 854d91675f9SYOSHIFUJI Hideaki mtu = np->frag_size; 855d91675f9SYOSHIFUJI Hideaki } 85689bc7848SHannes Frederic Sowa if (mtu < hlen + sizeof(struct frag_hdr) + 8) 857b72a2b01SHannes Frederic Sowa goto fail_toobig; 8581e0d69a9SHannes Frederic Sowa mtu -= hlen + sizeof(struct frag_hdr); 8591da177e4SLinus Torvalds 860fd0273d7SMartin KaFai Lau frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr, 861fd0273d7SMartin KaFai Lau &ipv6_hdr(skb)->saddr); 862286c2349SMartin KaFai Lau 863405c92f7SHannes Frederic Sowa if (skb->ip_summed == CHECKSUM_PARTIAL && 864405c92f7SHannes Frederic Sowa (err = skb_checksum_help(skb))) 865405c92f7SHannes Frederic Sowa goto fail; 866405c92f7SHannes Frederic Sowa 867ef0efcd3SJunwei Hu prevhdr = skb_network_header(skb) + nexthdr_offset; 8681d325d21SFlorian Westphal hroom = LL_RESERVED_SPACE(rt->dst.dev); 86921dc3301SDavid S. Miller if (skb_has_frag_list(skb)) { 870c72d8cdaSAlexey Dobriyan unsigned int first_len = skb_pagelen(skb); 8710feca619SPablo Neira Ayuso struct ip6_fraglist_iter iter; 8723d13008eSEric Dumazet struct sk_buff *frag2; 8731da177e4SLinus Torvalds 8741da177e4SLinus Torvalds if (first_len - hlen > mtu || 8751da177e4SLinus Torvalds ((first_len - hlen) & 7) || 8761d325d21SFlorian Westphal skb_cloned(skb) || 8771d325d21SFlorian Westphal skb_headroom(skb) < (hroom + sizeof(struct frag_hdr))) 8781da177e4SLinus Torvalds goto slow_path; 8791da177e4SLinus Torvalds 8804d9092bbSDavid S. Miller skb_walk_frags(skb, frag) { 8811da177e4SLinus Torvalds /* Correct geometry. */ 8821da177e4SLinus Torvalds if (frag->len > mtu || 8831da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 8841d325d21SFlorian Westphal skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr))) 8853d13008eSEric Dumazet goto slow_path_clean; 8861da177e4SLinus Torvalds 8871da177e4SLinus Torvalds /* Partially cloned skb? */ 8881da177e4SLinus Torvalds if (skb_shared(frag)) 8893d13008eSEric Dumazet goto slow_path_clean; 8902fdba6b0SHerbert Xu 8912fdba6b0SHerbert Xu BUG_ON(frag->sk); 8922fdba6b0SHerbert Xu if (skb->sk) { 8932fdba6b0SHerbert Xu frag->sk = skb->sk; 8942fdba6b0SHerbert Xu frag->destructor = sock_wfree; 8952fdba6b0SHerbert Xu } 8963d13008eSEric Dumazet skb->truesize -= frag->truesize; 8971da177e4SLinus Torvalds } 8981da177e4SLinus Torvalds 8990feca619SPablo Neira Ayuso err = ip6_fraglist_init(skb, hlen, prevhdr, nexthdr, frag_id, 9000feca619SPablo Neira Ayuso &iter); 9010feca619SPablo Neira Ayuso if (err < 0) 9021d325d21SFlorian Westphal goto fail; 9031da177e4SLinus Torvalds 9041da177e4SLinus Torvalds for (;;) { 9051da177e4SLinus Torvalds /* Prepare header of the next frame, 9061da177e4SLinus Torvalds * before previous one went down. */ 9070feca619SPablo Neira Ayuso if (iter.frag) 9080feca619SPablo Neira Ayuso ip6_fraglist_prepare(skb, &iter); 9091da177e4SLinus Torvalds 910a1ac9c8aSMartin KaFai Lau skb_set_delivery_time(skb, tstamp, mono_delivery_time); 9117d8c6e39SEric W. Biederman err = output(net, sk, skb); 912dafee490SWei Dong if (!err) 913d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9143bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 915dafee490SWei Dong 9160feca619SPablo Neira Ayuso if (err || !iter.frag) 9171da177e4SLinus Torvalds break; 9181da177e4SLinus Torvalds 9190feca619SPablo Neira Ayuso skb = ip6_fraglist_next(&iter); 9201da177e4SLinus Torvalds } 9211da177e4SLinus Torvalds 9220feca619SPablo Neira Ayuso kfree(iter.tmp_hdr); 9231da177e4SLinus Torvalds 9241da177e4SLinus Torvalds if (err == 0) { 925d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9263bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGOKS); 9271da177e4SLinus Torvalds return 0; 9281da177e4SLinus Torvalds } 9291da177e4SLinus Torvalds 930b7034146SEric Dumazet kfree_skb_list(iter.frag); 9311da177e4SLinus Torvalds 932d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9333bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 9341da177e4SLinus Torvalds return err; 9353d13008eSEric Dumazet 9363d13008eSEric Dumazet slow_path_clean: 9373d13008eSEric Dumazet skb_walk_frags(skb, frag2) { 9383d13008eSEric Dumazet if (frag2 == frag) 9393d13008eSEric Dumazet break; 9403d13008eSEric Dumazet frag2->sk = NULL; 9413d13008eSEric Dumazet frag2->destructor = NULL; 9423d13008eSEric Dumazet skb->truesize += frag2->truesize; 9433d13008eSEric Dumazet } 9441da177e4SLinus Torvalds } 9451da177e4SLinus Torvalds 9461da177e4SLinus Torvalds slow_path: 9471da177e4SLinus Torvalds /* 9481da177e4SLinus Torvalds * Fragment the datagram. 9491da177e4SLinus Torvalds */ 9501da177e4SLinus Torvalds 9518a6a1f17SPablo Neira Ayuso ip6_frag_init(skb, hlen, mtu, rt->dst.dev->needed_tailroom, 9528a6a1f17SPablo Neira Ayuso LL_RESERVED_SPACE(rt->dst.dev), prevhdr, nexthdr, frag_id, 9538a6a1f17SPablo Neira Ayuso &state); 9541da177e4SLinus Torvalds 9551da177e4SLinus Torvalds /* 9561da177e4SLinus Torvalds * Keep copying data until we run out. 9571da177e4SLinus Torvalds */ 95879e49503SFlorian Westphal 9598a6a1f17SPablo Neira Ayuso while (state.left > 0) { 9608a6a1f17SPablo Neira Ayuso frag = ip6_frag_next(skb, &state); 9618a6a1f17SPablo Neira Ayuso if (IS_ERR(frag)) { 9628a6a1f17SPablo Neira Ayuso err = PTR_ERR(frag); 9631da177e4SLinus Torvalds goto fail; 9641da177e4SLinus Torvalds } 9651da177e4SLinus Torvalds 9661da177e4SLinus Torvalds /* 9671da177e4SLinus Torvalds * Put this fragment into the sending queue. 9681da177e4SLinus Torvalds */ 969a1ac9c8aSMartin KaFai Lau skb_set_delivery_time(frag, tstamp, mono_delivery_time); 9707d8c6e39SEric W. Biederman err = output(net, sk, frag); 9711da177e4SLinus Torvalds if (err) 9721da177e4SLinus Torvalds goto fail; 973dafee490SWei Dong 974adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 9753bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 9761da177e4SLinus Torvalds } 977adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 978a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGOKS); 979808db80aSEric Dumazet consume_skb(skb); 9801da177e4SLinus Torvalds return err; 9811da177e4SLinus Torvalds 982485fca66SFlorian Westphal fail_toobig: 983485fca66SFlorian Westphal if (skb->sk && dst_allfrag(skb_dst(skb))) 984aba54656SEric Dumazet sk_gso_disable(skb->sk); 985485fca66SFlorian Westphal 986485fca66SFlorian Westphal icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 987485fca66SFlorian Westphal err = -EMSGSIZE; 988485fca66SFlorian Westphal 9891da177e4SLinus Torvalds fail: 990adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 991a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 9921da177e4SLinus Torvalds kfree_skb(skb); 9931da177e4SLinus Torvalds return err; 9941da177e4SLinus Torvalds } 9951da177e4SLinus Torvalds 996b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key, 997b71d1d42SEric Dumazet const struct in6_addr *fl_addr, 998b71d1d42SEric Dumazet const struct in6_addr *addr_cache) 999cf6b1982SYOSHIFUJI Hideaki { 1000a02cec21SEric Dumazet return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) && 100163159f29SIan Morris (!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache)); 1002cf6b1982SYOSHIFUJI Hideaki } 1003cf6b1982SYOSHIFUJI Hideaki 1004497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk, 1005497c615aSHerbert Xu struct dst_entry *dst, 1006b71d1d42SEric Dumazet const struct flowi6 *fl6) 10071da177e4SLinus Torvalds { 10081da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 1009a963a37dSEric Dumazet struct rt6_info *rt; 10101da177e4SLinus Torvalds 1011497c615aSHerbert Xu if (!dst) 1012497c615aSHerbert Xu goto out; 10131da177e4SLinus Torvalds 1014a963a37dSEric Dumazet if (dst->ops->family != AF_INET6) { 1015a963a37dSEric Dumazet dst_release(dst); 1016a963a37dSEric Dumazet return NULL; 1017a963a37dSEric Dumazet } 1018a963a37dSEric Dumazet 1019a963a37dSEric Dumazet rt = (struct rt6_info *)dst; 10201da177e4SLinus Torvalds /* Yes, checking route validity in not connected 1021d76e60a5SDavid S. Miller * case is not very simple. Take into account, 1022d76e60a5SDavid S. Miller * that we do not support routing by source, TOS, 1023d76e60a5SDavid S. Miller * and MSG_DONTROUTE --ANK (980726) 1024d76e60a5SDavid S. Miller * 1025cf6b1982SYOSHIFUJI Hideaki * 1. ip6_rt_check(): If route was host route, 1026cf6b1982SYOSHIFUJI Hideaki * check that cached destination is current. 1027d76e60a5SDavid S. Miller * If it is network route, we still may 1028d76e60a5SDavid S. Miller * check its validity using saved pointer 1029d76e60a5SDavid S. Miller * to the last used address: daddr_cache. 1030d76e60a5SDavid S. Miller * We do not want to save whole address now, 1031d76e60a5SDavid S. Miller * (because main consumer of this service 1032d76e60a5SDavid S. Miller * is tcp, which has not this problem), 1033d76e60a5SDavid S. Miller * so that the last trick works only on connected 1034d76e60a5SDavid S. Miller * sockets. 1035d76e60a5SDavid S. Miller * 2. oif also should be the same. 10361da177e4SLinus Torvalds */ 10374c9483b2SDavid S. Miller if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) || 10388e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES 10394c9483b2SDavid S. Miller ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) || 10408e1ef0a9SYOSHIFUJI Hideaki #endif 104140867d74SDavid Ahern (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex)) { 1042497c615aSHerbert Xu dst_release(dst); 1043497c615aSHerbert Xu dst = NULL; 10441da177e4SLinus Torvalds } 1045497c615aSHerbert Xu 1046497c615aSHerbert Xu out: 1047497c615aSHerbert Xu return dst; 10481da177e4SLinus Torvalds } 1049497c615aSHerbert Xu 10503aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, 10514c9483b2SDavid S. Miller struct dst_entry **dst, struct flowi6 *fl6) 1052497c615aSHerbert Xu { 105369cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 105469cce1d1SDavid S. Miller struct neighbour *n; 105597cac082SDavid S. Miller struct rt6_info *rt; 105669cce1d1SDavid S. Miller #endif 105769cce1d1SDavid S. Miller int err; 10586f21c96aSPaolo Abeni int flags = 0; 10591da177e4SLinus Torvalds 1060e16e888bSMarkus Stenberg /* The correct way to handle this would be to do 1061e16e888bSMarkus Stenberg * ip6_route_get_saddr, and then ip6_route_output; however, 1062e16e888bSMarkus Stenberg * the route-specific preferred source forces the 1063e16e888bSMarkus Stenberg * ip6_route_output call _before_ ip6_route_get_saddr. 1064e16e888bSMarkus Stenberg * 1065e16e888bSMarkus Stenberg * In source specific routing (no src=any default route), 1066e16e888bSMarkus Stenberg * ip6_route_output will fail given src=any saddr, though, so 1067e16e888bSMarkus Stenberg * that's why we try it again later. 1068e16e888bSMarkus Stenberg */ 1069c305b9e6Szhang kai if (ipv6_addr_any(&fl6->saddr)) { 1070a68886a6SDavid Ahern struct fib6_info *from; 1071e16e888bSMarkus Stenberg struct rt6_info *rt; 1072e16e888bSMarkus Stenberg 1073e16e888bSMarkus Stenberg *dst = ip6_route_output(net, sk, fl6); 1074e16e888bSMarkus Stenberg rt = (*dst)->error ? NULL : (struct rt6_info *)*dst; 1075a68886a6SDavid Ahern 1076a68886a6SDavid Ahern rcu_read_lock(); 1077a68886a6SDavid Ahern from = rt ? rcu_dereference(rt->from) : NULL; 1078a68886a6SDavid Ahern err = ip6_route_get_saddr(net, from, &fl6->daddr, 1079e16e888bSMarkus Stenberg sk ? inet6_sk(sk)->srcprefs : 0, 1080e16e888bSMarkus Stenberg &fl6->saddr); 1081a68886a6SDavid Ahern rcu_read_unlock(); 1082a68886a6SDavid Ahern 1083e16e888bSMarkus Stenberg if (err) 1084e16e888bSMarkus Stenberg goto out_err_release; 1085e16e888bSMarkus Stenberg 1086e16e888bSMarkus Stenberg /* If we had an erroneous initial result, pretend it 1087e16e888bSMarkus Stenberg * never existed and let the SA-enabled version take 1088e16e888bSMarkus Stenberg * over. 1089e16e888bSMarkus Stenberg */ 1090c305b9e6Szhang kai if ((*dst)->error) { 1091e16e888bSMarkus Stenberg dst_release(*dst); 1092e16e888bSMarkus Stenberg *dst = NULL; 1093e16e888bSMarkus Stenberg } 10946f21c96aSPaolo Abeni 10956f21c96aSPaolo Abeni if (fl6->flowi6_oif) 10966f21c96aSPaolo Abeni flags |= RT6_LOOKUP_F_IFACE; 1097e16e888bSMarkus Stenberg } 1098e16e888bSMarkus Stenberg 109963159f29SIan Morris if (!*dst) 11006f21c96aSPaolo Abeni *dst = ip6_route_output_flags(net, sk, fl6, flags); 11011da177e4SLinus Torvalds 1102e5d08d71SIan Morris err = (*dst)->error; 1103e5d08d71SIan Morris if (err) 11041da177e4SLinus Torvalds goto out_err_release; 11051da177e4SLinus Torvalds 110695c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 110795c385b4SNeil Horman /* 110895c385b4SNeil Horman * Here if the dst entry we've looked up 110995c385b4SNeil Horman * has a neighbour entry that is in the INCOMPLETE 111095c385b4SNeil Horman * state and the src address from the flow is 111195c385b4SNeil Horman * marked as OPTIMISTIC, we release the found 111295c385b4SNeil Horman * dst entry and replace it instead with the 111395c385b4SNeil Horman * dst entry of the nexthop router 111495c385b4SNeil Horman */ 1115c56bf6feSEric Dumazet rt = (struct rt6_info *) *dst; 1116707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 11172647a9b0SMartin KaFai Lau n = __ipv6_neigh_lookup_noref(rt->dst.dev, 11182647a9b0SMartin KaFai Lau rt6_nexthop(rt, &fl6->daddr)); 1119707be1ffSYOSHIFUJI Hideaki / 吉藤英明 err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0; 1120707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1121707be1ffSYOSHIFUJI Hideaki / 吉藤英明 1122707be1ffSYOSHIFUJI Hideaki / 吉藤英明 if (err) { 112395c385b4SNeil Horman struct inet6_ifaddr *ifp; 11244c9483b2SDavid S. Miller struct flowi6 fl_gw6; 112595c385b4SNeil Horman int redirect; 112695c385b4SNeil Horman 11274c9483b2SDavid S. Miller ifp = ipv6_get_ifaddr(net, &fl6->saddr, 11281cab3da6SDaniel Lezcano (*dst)->dev, 1); 112995c385b4SNeil Horman 113095c385b4SNeil Horman redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC); 113195c385b4SNeil Horman if (ifp) 113295c385b4SNeil Horman in6_ifa_put(ifp); 113395c385b4SNeil Horman 113495c385b4SNeil Horman if (redirect) { 113595c385b4SNeil Horman /* 113695c385b4SNeil Horman * We need to get the dst entry for the 113795c385b4SNeil Horman * default router instead 113895c385b4SNeil Horman */ 113995c385b4SNeil Horman dst_release(*dst); 11404c9483b2SDavid S. Miller memcpy(&fl_gw6, fl6, sizeof(struct flowi6)); 11414c9483b2SDavid S. Miller memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr)); 11424c9483b2SDavid S. Miller *dst = ip6_route_output(net, sk, &fl_gw6); 1143e5d08d71SIan Morris err = (*dst)->error; 1144e5d08d71SIan Morris if (err) 114595c385b4SNeil Horman goto out_err_release; 114695c385b4SNeil Horman } 114795c385b4SNeil Horman } 114895c385b4SNeil Horman #endif 1149ec5e3b0aSJonathan T. Leighton if (ipv6_addr_v4mapped(&fl6->saddr) && 115000ea1ceeSWillem de Bruijn !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) { 115100ea1ceeSWillem de Bruijn err = -EAFNOSUPPORT; 115200ea1ceeSWillem de Bruijn goto out_err_release; 115300ea1ceeSWillem de Bruijn } 115495c385b4SNeil Horman 11551da177e4SLinus Torvalds return 0; 11561da177e4SLinus Torvalds 11571da177e4SLinus Torvalds out_err_release: 11581da177e4SLinus Torvalds dst_release(*dst); 11591da177e4SLinus Torvalds *dst = NULL; 11608a966fc0SDavid Ahern 11610d240e78SDavid Ahern if (err == -ENETUNREACH) 11620d240e78SDavid Ahern IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES); 11631da177e4SLinus Torvalds return err; 11641da177e4SLinus Torvalds } 116534a0b3cdSAdrian Bunk 1166497c615aSHerbert Xu /** 1167497c615aSHerbert Xu * ip6_dst_lookup - perform route lookup on flow 1168b51cd7c8SAndrew Lunn * @net: Network namespace to perform lookup in 1169497c615aSHerbert Xu * @sk: socket which provides route info 1170497c615aSHerbert Xu * @dst: pointer to dst_entry * for result 11714c9483b2SDavid S. Miller * @fl6: flow to lookup 1172497c615aSHerbert Xu * 1173497c615aSHerbert Xu * This function performs a route lookup on the given flow. 1174497c615aSHerbert Xu * 1175497c615aSHerbert Xu * It returns zero on success, or a standard errno code on error. 1176497c615aSHerbert Xu */ 1177343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst, 1178343d60aaSRoopa Prabhu struct flowi6 *fl6) 1179497c615aSHerbert Xu { 1180497c615aSHerbert Xu *dst = NULL; 1181343d60aaSRoopa Prabhu return ip6_dst_lookup_tail(net, sk, dst, fl6); 1182497c615aSHerbert Xu } 11833cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup); 11843cf3dc6cSArnaldo Carvalho de Melo 1185497c615aSHerbert Xu /** 118668d0c6d3SDavid S. Miller * ip6_dst_lookup_flow - perform route lookup on flow with ipsec 1187b51cd7c8SAndrew Lunn * @net: Network namespace to perform lookup in 118868d0c6d3SDavid S. Miller * @sk: socket which provides route info 11894c9483b2SDavid S. Miller * @fl6: flow to lookup 119068d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 119168d0c6d3SDavid S. Miller * 119268d0c6d3SDavid S. Miller * This function performs a route lookup on the given flow. 119368d0c6d3SDavid S. Miller * 119468d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 119568d0c6d3SDavid S. Miller * error code. 119668d0c6d3SDavid S. Miller */ 1197c4e85f73SSabrina Dubroca struct dst_entry *ip6_dst_lookup_flow(struct net *net, const struct sock *sk, struct flowi6 *fl6, 11980e0d44abSSteffen Klassert const struct in6_addr *final_dst) 119968d0c6d3SDavid S. Miller { 120068d0c6d3SDavid S. Miller struct dst_entry *dst = NULL; 120168d0c6d3SDavid S. Miller int err; 120268d0c6d3SDavid S. Miller 1203c4e85f73SSabrina Dubroca err = ip6_dst_lookup_tail(net, sk, &dst, fl6); 120468d0c6d3SDavid S. Miller if (err) 120568d0c6d3SDavid S. Miller return ERR_PTR(err); 120668d0c6d3SDavid S. Miller if (final_dst) 12074e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 12082774c131SDavid S. Miller 1209c4e85f73SSabrina Dubroca return xfrm_lookup_route(net, dst, flowi6_to_flowi(fl6), sk, 0); 121068d0c6d3SDavid S. Miller } 121168d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow); 121268d0c6d3SDavid S. Miller 121368d0c6d3SDavid S. Miller /** 121468d0c6d3SDavid S. Miller * ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow 121568d0c6d3SDavid S. Miller * @sk: socket which provides the dst cache and route info 12164c9483b2SDavid S. Miller * @fl6: flow to lookup 121768d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 121896818159SAlexey Kodanev * @connected: whether @sk is connected or not 1219497c615aSHerbert Xu * 1220497c615aSHerbert Xu * This function performs a route lookup on the given flow with the 1221497c615aSHerbert Xu * possibility of using the cached route in the socket if it is valid. 1222497c615aSHerbert Xu * It will take the socket dst lock when operating on the dst cache. 1223497c615aSHerbert Xu * As a result, this function can only be used in process context. 1224497c615aSHerbert Xu * 122596818159SAlexey Kodanev * In addition, for a connected socket, cache the dst in the socket 122696818159SAlexey Kodanev * if the current cache is not valid. 122796818159SAlexey Kodanev * 122868d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 122968d0c6d3SDavid S. Miller * error code. 1230497c615aSHerbert Xu */ 12314c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6, 123296818159SAlexey Kodanev const struct in6_addr *final_dst, 123396818159SAlexey Kodanev bool connected) 1234497c615aSHerbert Xu { 123568d0c6d3SDavid S. Miller struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie); 1236497c615aSHerbert Xu 12374c9483b2SDavid S. Miller dst = ip6_sk_dst_check(sk, dst, fl6); 123896818159SAlexey Kodanev if (dst) 123996818159SAlexey Kodanev return dst; 124096818159SAlexey Kodanev 1241c4e85f73SSabrina Dubroca dst = ip6_dst_lookup_flow(sock_net(sk), sk, fl6, final_dst); 124296818159SAlexey Kodanev if (connected && !IS_ERR(dst)) 124396818159SAlexey Kodanev ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6); 124468d0c6d3SDavid S. Miller 124500bc0ef5SJakub Sitnicki return dst; 124668d0c6d3SDavid S. Miller } 124768d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow); 1248497c615aSHerbert Xu 1249571912c6SMartin Varghese /** 1250571912c6SMartin Varghese * ip6_dst_lookup_tunnel - perform route lookup on tunnel 1251571912c6SMartin Varghese * @skb: Packet for which lookup is done 1252571912c6SMartin Varghese * @dev: Tunnel device 1253571912c6SMartin Varghese * @net: Network namespace of tunnel device 1254b51cd7c8SAndrew Lunn * @sock: Socket which provides route info 1255571912c6SMartin Varghese * @saddr: Memory to store the src ip address 1256571912c6SMartin Varghese * @info: Tunnel information 1257571912c6SMartin Varghese * @protocol: IP protocol 1258b51cd7c8SAndrew Lunn * @use_cache: Flag to enable cache usage 1259571912c6SMartin Varghese * This function performs a route lookup on a tunnel 1260571912c6SMartin Varghese * 1261571912c6SMartin Varghese * It returns a valid dst pointer and stores src address to be used in 1262571912c6SMartin Varghese * tunnel in param saddr on success, else a pointer encoded error code. 1263571912c6SMartin Varghese */ 1264571912c6SMartin Varghese 1265571912c6SMartin Varghese struct dst_entry *ip6_dst_lookup_tunnel(struct sk_buff *skb, 1266571912c6SMartin Varghese struct net_device *dev, 1267571912c6SMartin Varghese struct net *net, 1268571912c6SMartin Varghese struct socket *sock, 1269571912c6SMartin Varghese struct in6_addr *saddr, 1270571912c6SMartin Varghese const struct ip_tunnel_info *info, 1271571912c6SMartin Varghese u8 protocol, 1272571912c6SMartin Varghese bool use_cache) 1273571912c6SMartin Varghese { 1274571912c6SMartin Varghese struct dst_entry *dst = NULL; 1275571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1276571912c6SMartin Varghese struct dst_cache *dst_cache; 1277571912c6SMartin Varghese #endif 1278571912c6SMartin Varghese struct flowi6 fl6; 1279571912c6SMartin Varghese __u8 prio; 1280571912c6SMartin Varghese 1281571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1282571912c6SMartin Varghese dst_cache = (struct dst_cache *)&info->dst_cache; 1283571912c6SMartin Varghese if (use_cache) { 1284571912c6SMartin Varghese dst = dst_cache_get_ip6(dst_cache, saddr); 1285571912c6SMartin Varghese if (dst) 1286571912c6SMartin Varghese return dst; 1287571912c6SMartin Varghese } 1288571912c6SMartin Varghese #endif 1289571912c6SMartin Varghese memset(&fl6, 0, sizeof(fl6)); 1290571912c6SMartin Varghese fl6.flowi6_mark = skb->mark; 1291571912c6SMartin Varghese fl6.flowi6_proto = protocol; 1292571912c6SMartin Varghese fl6.daddr = info->key.u.ipv6.dst; 1293571912c6SMartin Varghese fl6.saddr = info->key.u.ipv6.src; 1294571912c6SMartin Varghese prio = info->key.tos; 1295571912c6SMartin Varghese fl6.flowlabel = ip6_make_flowinfo(RT_TOS(prio), 1296571912c6SMartin Varghese info->key.label); 1297571912c6SMartin Varghese 1298571912c6SMartin Varghese dst = ipv6_stub->ipv6_dst_lookup_flow(net, sock->sk, &fl6, 1299571912c6SMartin Varghese NULL); 1300571912c6SMartin Varghese if (IS_ERR(dst)) { 1301571912c6SMartin Varghese netdev_dbg(dev, "no route to %pI6\n", &fl6.daddr); 1302571912c6SMartin Varghese return ERR_PTR(-ENETUNREACH); 1303571912c6SMartin Varghese } 1304571912c6SMartin Varghese if (dst->dev == dev) { /* is this necessary? */ 1305571912c6SMartin Varghese netdev_dbg(dev, "circular route to %pI6\n", &fl6.daddr); 1306571912c6SMartin Varghese dst_release(dst); 1307571912c6SMartin Varghese return ERR_PTR(-ELOOP); 1308571912c6SMartin Varghese } 1309571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1310571912c6SMartin Varghese if (use_cache) 1311571912c6SMartin Varghese dst_cache_set_ip6(dst_cache, dst, &fl6.saddr); 1312571912c6SMartin Varghese #endif 1313571912c6SMartin Varghese *saddr = fl6.saddr; 1314571912c6SMartin Varghese return dst; 1315571912c6SMartin Varghese } 1316571912c6SMartin Varghese EXPORT_SYMBOL_GPL(ip6_dst_lookup_tunnel); 1317571912c6SMartin Varghese 13180178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src, 13190178b695SHerbert Xu gfp_t gfp) 13200178b695SHerbert Xu { 13210178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 13220178b695SHerbert Xu } 13230178b695SHerbert Xu 13240178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src, 13250178b695SHerbert Xu gfp_t gfp) 13260178b695SHerbert Xu { 13270178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 13280178b695SHerbert Xu } 13290178b695SHerbert Xu 133075a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu, 13310c183379SGao feng int *maxfraglen, 13320c183379SGao feng unsigned int fragheaderlen, 13330c183379SGao feng struct sk_buff *skb, 133475a493e6SHannes Frederic Sowa struct rt6_info *rt, 1335e367c2d0Slucien unsigned int orig_mtu) 13360c183379SGao feng { 13370c183379SGao feng if (!(rt->dst.flags & DST_XFRM_TUNNEL)) { 133863159f29SIan Morris if (!skb) { 13390c183379SGao feng /* first fragment, reserve header_len */ 1340e367c2d0Slucien *mtu = orig_mtu - rt->dst.header_len; 13410c183379SGao feng 13420c183379SGao feng } else { 13430c183379SGao feng /* 13440c183379SGao feng * this fragment is not first, the headers 13450c183379SGao feng * space is regarded as data space. 13460c183379SGao feng */ 1347e367c2d0Slucien *mtu = orig_mtu; 13480c183379SGao feng } 13490c183379SGao feng *maxfraglen = ((*mtu - fragheaderlen) & ~7) 13500c183379SGao feng + fragheaderlen - sizeof(struct frag_hdr); 13510c183379SGao feng } 13520c183379SGao feng } 13530c183379SGao feng 1354366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork, 135526879da5SWei Wang struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6, 1356f37a4cc6SPavel Begunkov struct rt6_info *rt) 1357366e41d9SVlad Yasevich { 1358366e41d9SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 1359366e41d9SVlad Yasevich unsigned int mtu; 1360d656b2eaSPavel Begunkov struct ipv6_txoptions *nopt, *opt = ipc6->opt; 1361366e41d9SVlad Yasevich 136240ac240cSPavel Begunkov /* callers pass dst together with a reference, set it first so 136340ac240cSPavel Begunkov * ip6_cork_release() can put it down even in case of an error. 136440ac240cSPavel Begunkov */ 136540ac240cSPavel Begunkov cork->base.dst = &rt->dst; 136640ac240cSPavel Begunkov 1367366e41d9SVlad Yasevich /* 1368366e41d9SVlad Yasevich * setup for corking 1369366e41d9SVlad Yasevich */ 1370366e41d9SVlad Yasevich if (opt) { 1371366e41d9SVlad Yasevich if (WARN_ON(v6_cork->opt)) 1372366e41d9SVlad Yasevich return -EINVAL; 1373366e41d9SVlad Yasevich 1374d656b2eaSPavel Begunkov nopt = v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation); 1375d656b2eaSPavel Begunkov if (unlikely(!nopt)) 1376366e41d9SVlad Yasevich return -ENOBUFS; 1377366e41d9SVlad Yasevich 1378d656b2eaSPavel Begunkov nopt->tot_len = sizeof(*opt); 1379d656b2eaSPavel Begunkov nopt->opt_flen = opt->opt_flen; 1380d656b2eaSPavel Begunkov nopt->opt_nflen = opt->opt_nflen; 1381366e41d9SVlad Yasevich 1382d656b2eaSPavel Begunkov nopt->dst0opt = ip6_opt_dup(opt->dst0opt, sk->sk_allocation); 1383d656b2eaSPavel Begunkov if (opt->dst0opt && !nopt->dst0opt) 1384366e41d9SVlad Yasevich return -ENOBUFS; 1385366e41d9SVlad Yasevich 1386d656b2eaSPavel Begunkov nopt->dst1opt = ip6_opt_dup(opt->dst1opt, sk->sk_allocation); 1387d656b2eaSPavel Begunkov if (opt->dst1opt && !nopt->dst1opt) 1388366e41d9SVlad Yasevich return -ENOBUFS; 1389366e41d9SVlad Yasevich 1390d656b2eaSPavel Begunkov nopt->hopopt = ip6_opt_dup(opt->hopopt, sk->sk_allocation); 1391d656b2eaSPavel Begunkov if (opt->hopopt && !nopt->hopopt) 1392366e41d9SVlad Yasevich return -ENOBUFS; 1393366e41d9SVlad Yasevich 1394d656b2eaSPavel Begunkov nopt->srcrt = ip6_rthdr_dup(opt->srcrt, sk->sk_allocation); 1395d656b2eaSPavel Begunkov if (opt->srcrt && !nopt->srcrt) 1396366e41d9SVlad Yasevich return -ENOBUFS; 1397366e41d9SVlad Yasevich 1398366e41d9SVlad Yasevich /* need source address above miyazawa*/ 1399366e41d9SVlad Yasevich } 140026879da5SWei Wang v6_cork->hop_limit = ipc6->hlimit; 140126879da5SWei Wang v6_cork->tclass = ipc6->tclass; 1402366e41d9SVlad Yasevich if (rt->dst.flags & DST_XFRM_TUNNEL) 1403366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1404749439bfSMike Maloney READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst); 1405366e41d9SVlad Yasevich else 1406366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1407c02b3741SDavid S. Miller READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst)); 1408366e41d9SVlad Yasevich if (np->frag_size < mtu) { 1409366e41d9SVlad Yasevich if (np->frag_size) 1410366e41d9SVlad Yasevich mtu = np->frag_size; 1411366e41d9SVlad Yasevich } 1412366e41d9SVlad Yasevich cork->base.fragsize = mtu; 1413fbf47813SWillem de Bruijn cork->base.gso_size = ipc6->gso_size; 1414678ca42dSWillem de Bruijn cork->base.tx_flags = 0; 1415c6af0c22SWillem de Bruijn cork->base.mark = ipc6->sockc.mark; 1416678ca42dSWillem de Bruijn sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags); 1417bec1f6f6SWillem de Bruijn 14180f6c480fSDavid Miller if (dst_allfrag(xfrm_dst_path(&rt->dst))) 1419366e41d9SVlad Yasevich cork->base.flags |= IPCORK_ALLFRAG; 1420366e41d9SVlad Yasevich cork->base.length = 0; 1421366e41d9SVlad Yasevich 14225fdaa88dSWillem de Bruijn cork->base.transmit_time = ipc6->sockc.transmit_time; 1423a818f75eSJesus Sanchez-Palencia 1424366e41d9SVlad Yasevich return 0; 1425366e41d9SVlad Yasevich } 1426366e41d9SVlad Yasevich 14270bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk, 14280bbe84a6SVlad Yasevich struct sk_buff_head *queue, 1429f3b46a3eSPavel Begunkov struct inet_cork_full *cork_full, 14300bbe84a6SVlad Yasevich struct inet6_cork *v6_cork, 14310bbe84a6SVlad Yasevich struct page_frag *pfrag, 14320bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, 14330bbe84a6SVlad Yasevich int len, int odd, struct sk_buff *skb), 14341da177e4SLinus Torvalds void *from, int length, int transhdrlen, 14355fdaa88dSWillem de Bruijn unsigned int flags, struct ipcm6_cookie *ipc6) 14361da177e4SLinus Torvalds { 14370c183379SGao feng struct sk_buff *skb, *skb_prev = NULL; 1438f3b46a3eSPavel Begunkov struct inet_cork *cork = &cork_full->base; 1439f37a4cc6SPavel Begunkov struct flowi6 *fl6 = &cork_full->fl.u.ip6; 144010b8a3deSPaolo Abeni unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu; 1441b5947e5dSWillem de Bruijn struct ubuf_info *uarg = NULL; 14420bbe84a6SVlad Yasevich int exthdrlen = 0; 14430bbe84a6SVlad Yasevich int dst_exthdrlen = 0; 14441da177e4SLinus Torvalds int hh_len; 14451da177e4SLinus Torvalds int copy; 14461da177e4SLinus Torvalds int err; 14471da177e4SLinus Torvalds int offset = 0; 144809c2d251SWillem de Bruijn u32 tskey = 0; 14490bbe84a6SVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->dst; 14500bbe84a6SVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 145132dce968SVlad Yasevich int csummode = CHECKSUM_NONE; 1452682b1a9dSHannes Frederic Sowa unsigned int maxnonfragsize, headersize; 14531f4c6eb2SEric Dumazet unsigned int wmem_alloc_delta = 0; 1454100f6d8eSWillem de Bruijn bool paged, extra_uref = false; 14551da177e4SLinus Torvalds 14560bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 14570bbe84a6SVlad Yasevich if (!skb) { 14580bbe84a6SVlad Yasevich exthdrlen = opt ? opt->opt_flen : 0; 14597efdba5bSRomain KUNTZ dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len; 14601da177e4SLinus Torvalds } 14610bbe84a6SVlad Yasevich 146215e36f5bSWillem de Bruijn paged = !!cork->gso_size; 1463bec1f6f6SWillem de Bruijn mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize; 1464e367c2d0Slucien orig_mtu = mtu; 14651da177e4SLinus Torvalds 1466678ca42dSWillem de Bruijn if (cork->tx_flags & SKBTX_ANY_SW_TSTAMP && 1467678ca42dSWillem de Bruijn sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID) 1468a1cdec57SEric Dumazet tskey = atomic_inc_return(&sk->sk_tskey) - 1; 1469678ca42dSWillem de Bruijn 1470d8d1f30bSChangli Gao hh_len = LL_RESERVED_SPACE(rt->dst.dev); 14711da177e4SLinus Torvalds 1472a1b05140SMasahide NAKAMURA fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len + 1473b4ce9277SHerbert Xu (opt ? opt->opt_nflen : 0); 14741da177e4SLinus Torvalds 14754df98e76SHannes Frederic Sowa headersize = sizeof(struct ipv6hdr) + 14763a1cebe7SHannes Frederic Sowa (opt ? opt->opt_flen + opt->opt_nflen : 0) + 14774df98e76SHannes Frederic Sowa (dst_allfrag(&rt->dst) ? 14784df98e76SHannes Frederic Sowa sizeof(struct frag_hdr) : 0) + 14794df98e76SHannes Frederic Sowa rt->rt6i_nfheader_len; 14804df98e76SHannes Frederic Sowa 14815e34af41STadeusz Struk if (mtu <= fragheaderlen || 14825e34af41STadeusz Struk ((mtu - fragheaderlen) & ~7) + fragheaderlen <= sizeof(struct frag_hdr)) 14836596a022SJiri Bohac goto emsgsize; 14846596a022SJiri Bohac 14856596a022SJiri Bohac maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen - 14866596a022SJiri Bohac sizeof(struct frag_hdr); 14876596a022SJiri Bohac 148810b8a3deSPaolo Abeni /* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit 148910b8a3deSPaolo Abeni * the first fragment 149010b8a3deSPaolo Abeni */ 149110b8a3deSPaolo Abeni if (headersize + transhdrlen > mtu) 149210b8a3deSPaolo Abeni goto emsgsize; 149310b8a3deSPaolo Abeni 149426879da5SWei Wang if (cork->length + length > mtu - headersize && ipc6->dontfrag && 14954df98e76SHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP || 149613651224SJakub Kicinski sk->sk_protocol == IPPROTO_ICMPV6 || 14974df98e76SHannes Frederic Sowa sk->sk_protocol == IPPROTO_RAW)) { 14984df98e76SHannes Frederic Sowa ipv6_local_rxpmtu(sk, fl6, mtu - headersize + 14994df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 15004df98e76SHannes Frederic Sowa goto emsgsize; 15014df98e76SHannes Frederic Sowa } 15024df98e76SHannes Frederic Sowa 1503682b1a9dSHannes Frederic Sowa if (ip6_sk_ignore_df(sk)) 1504682b1a9dSHannes Frederic Sowa maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN; 1505682b1a9dSHannes Frederic Sowa else 1506682b1a9dSHannes Frederic Sowa maxnonfragsize = mtu; 1507682b1a9dSHannes Frederic Sowa 15084df98e76SHannes Frederic Sowa if (cork->length + length > maxnonfragsize - headersize) { 15094df98e76SHannes Frederic Sowa emsgsize: 151010b8a3deSPaolo Abeni pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0); 151110b8a3deSPaolo Abeni ipv6_local_error(sk, EMSGSIZE, fl6, pmtu); 15121da177e4SLinus Torvalds return -EMSGSIZE; 15131da177e4SLinus Torvalds } 1514682b1a9dSHannes Frederic Sowa 1515682b1a9dSHannes Frederic Sowa /* CHECKSUM_PARTIAL only with no extension headers and when 1516682b1a9dSHannes Frederic Sowa * we are not going to fragment 1517682b1a9dSHannes Frederic Sowa */ 1518682b1a9dSHannes Frederic Sowa if (transhdrlen && sk->sk_protocol == IPPROTO_UDP && 1519682b1a9dSHannes Frederic Sowa headersize == sizeof(struct ipv6hdr) && 15202b89ed65SVlad Yasevich length <= mtu - headersize && 1521bec1f6f6SWillem de Bruijn (!(flags & MSG_MORE) || cork->gso_size) && 1522c8cd0989STom Herbert rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM)) 1523682b1a9dSHannes Frederic Sowa csummode = CHECKSUM_PARTIAL; 15241da177e4SLinus Torvalds 1525b5947e5dSWillem de Bruijn if (flags & MSG_ZEROCOPY && length && sock_flag(sk, SOCK_ZEROCOPY)) { 15268c793822SJonathan Lemon uarg = msg_zerocopy_realloc(sk, length, skb_zcopy(skb)); 1527b5947e5dSWillem de Bruijn if (!uarg) 1528b5947e5dSWillem de Bruijn return -ENOBUFS; 1529522924b5SWillem de Bruijn extra_uref = !skb_zcopy(skb); /* only ref on new uarg */ 1530b5947e5dSWillem de Bruijn if (rt->dst.dev->features & NETIF_F_SG && 1531b5947e5dSWillem de Bruijn csummode == CHECKSUM_PARTIAL) { 1532b5947e5dSWillem de Bruijn paged = true; 1533b5947e5dSWillem de Bruijn } else { 1534b5947e5dSWillem de Bruijn uarg->zerocopy = 0; 153552900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 1536b5947e5dSWillem de Bruijn } 1537b5947e5dSWillem de Bruijn } 1538b5947e5dSWillem de Bruijn 15391da177e4SLinus Torvalds /* 15401da177e4SLinus Torvalds * Let's try using as much space as possible. 15411da177e4SLinus Torvalds * Use MTU if total length of the message fits into the MTU. 15421da177e4SLinus Torvalds * Otherwise, we need to reserve fragment header and 15431da177e4SLinus Torvalds * fragment alignment (= 8-15 octects, in total). 15441da177e4SLinus Torvalds * 1545634a63e7SRandy Dunlap * Note that we may need to "move" the data from the tail 15461da177e4SLinus Torvalds * of the buffer to the new fragment when we split 15471da177e4SLinus Torvalds * the message. 15481da177e4SLinus Torvalds * 15491da177e4SLinus Torvalds * FIXME: It may be fragmented into multiple chunks 15501da177e4SLinus Torvalds * at once if non-fragmentable extension headers 15511da177e4SLinus Torvalds * are too large. 15521da177e4SLinus Torvalds * --yoshfuji 15531da177e4SLinus Torvalds */ 15541da177e4SLinus Torvalds 15552811ebacSHannes Frederic Sowa cork->length += length; 15562811ebacSHannes Frederic Sowa if (!skb) 15571da177e4SLinus Torvalds goto alloc_new_skb; 15581da177e4SLinus Torvalds 15591da177e4SLinus Torvalds while (length > 0) { 15601da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 1561bdc712b4SDavid S. Miller copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len; 15621da177e4SLinus Torvalds if (copy < length) 15631da177e4SLinus Torvalds copy = maxfraglen - skb->len; 15641da177e4SLinus Torvalds 15651da177e4SLinus Torvalds if (copy <= 0) { 15661da177e4SLinus Torvalds char *data; 15671da177e4SLinus Torvalds unsigned int datalen; 15681da177e4SLinus Torvalds unsigned int fraglen; 15691da177e4SLinus Torvalds unsigned int fraggap; 15706d123b81SJakub Kicinski unsigned int alloclen, alloc_extra; 1571aba36930SWillem de Bruijn unsigned int pagedlen; 15721da177e4SLinus Torvalds alloc_new_skb: 15731da177e4SLinus Torvalds /* There's no room in the current skb */ 15740c183379SGao feng if (skb) 15750c183379SGao feng fraggap = skb->len - maxfraglen; 15761da177e4SLinus Torvalds else 15771da177e4SLinus Torvalds fraggap = 0; 15780c183379SGao feng /* update mtu and maxfraglen if necessary */ 157963159f29SIan Morris if (!skb || !skb_prev) 15800c183379SGao feng ip6_append_data_mtu(&mtu, &maxfraglen, 158175a493e6SHannes Frederic Sowa fragheaderlen, skb, rt, 1582e367c2d0Slucien orig_mtu); 15830c183379SGao feng 15840c183379SGao feng skb_prev = skb; 15851da177e4SLinus Torvalds 15861da177e4SLinus Torvalds /* 15871da177e4SLinus Torvalds * If remaining data exceeds the mtu, 15881da177e4SLinus Torvalds * we know we need more fragment(s). 15891da177e4SLinus Torvalds */ 15901da177e4SLinus Torvalds datalen = length + fraggap; 15911da177e4SLinus Torvalds 15920c183379SGao feng if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen) 15930c183379SGao feng datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len; 159415e36f5bSWillem de Bruijn fraglen = datalen + fragheaderlen; 1595aba36930SWillem de Bruijn pagedlen = 0; 159615e36f5bSWillem de Bruijn 15976d123b81SJakub Kicinski alloc_extra = hh_len; 15986d123b81SJakub Kicinski alloc_extra += dst_exthdrlen; 15996d123b81SJakub Kicinski alloc_extra += rt->dst.trailer_len; 16006d123b81SJakub Kicinski 16016d123b81SJakub Kicinski /* We just reserve space for fragment header. 16026d123b81SJakub Kicinski * Note: this may be overallocation if the message 16036d123b81SJakub Kicinski * (without MSG_MORE) fits into the MTU. 16046d123b81SJakub Kicinski */ 16056d123b81SJakub Kicinski alloc_extra += sizeof(struct frag_hdr); 16066d123b81SJakub Kicinski 16071da177e4SLinus Torvalds if ((flags & MSG_MORE) && 1608d8d1f30bSChangli Gao !(rt->dst.dev->features&NETIF_F_SG)) 16091da177e4SLinus Torvalds alloclen = mtu; 16106d123b81SJakub Kicinski else if (!paged && 16116d123b81SJakub Kicinski (fraglen + alloc_extra < SKB_MAX_ALLOC || 16126d123b81SJakub Kicinski !(rt->dst.dev->features & NETIF_F_SG))) 161315e36f5bSWillem de Bruijn alloclen = fraglen; 161415e36f5bSWillem de Bruijn else { 161515e36f5bSWillem de Bruijn alloclen = min_t(int, fraglen, MAX_HEADER); 161615e36f5bSWillem de Bruijn pagedlen = fraglen - alloclen; 161715e36f5bSWillem de Bruijn } 16186d123b81SJakub Kicinski alloclen += alloc_extra; 1619299b0767SSteffen Klassert 16200c183379SGao feng if (datalen != length + fraggap) { 16211da177e4SLinus Torvalds /* 16220c183379SGao feng * this is not the last fragment, the trailer 16230c183379SGao feng * space is regarded as data space. 16241da177e4SLinus Torvalds */ 16250c183379SGao feng datalen += rt->dst.trailer_len; 16260c183379SGao feng } 16270c183379SGao feng 16280c183379SGao feng fraglen = datalen + fragheaderlen; 16291da177e4SLinus Torvalds 163015e36f5bSWillem de Bruijn copy = datalen - transhdrlen - fraggap - pagedlen; 1631232cd35dSEric Dumazet if (copy < 0) { 1632232cd35dSEric Dumazet err = -EINVAL; 1633232cd35dSEric Dumazet goto error; 1634232cd35dSEric Dumazet } 16351da177e4SLinus Torvalds if (transhdrlen) { 16366d123b81SJakub Kicinski skb = sock_alloc_send_skb(sk, alloclen, 16371da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 16381da177e4SLinus Torvalds } else { 16391da177e4SLinus Torvalds skb = NULL; 16401f4c6eb2SEric Dumazet if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <= 16411da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 16426d123b81SJakub Kicinski skb = alloc_skb(alloclen, 16431da177e4SLinus Torvalds sk->sk_allocation); 164463159f29SIan Morris if (unlikely(!skb)) 16451da177e4SLinus Torvalds err = -ENOBUFS; 16461da177e4SLinus Torvalds } 164763159f29SIan Morris if (!skb) 16481da177e4SLinus Torvalds goto error; 16491da177e4SLinus Torvalds /* 16501da177e4SLinus Torvalds * Fill in the control structures 16511da177e4SLinus Torvalds */ 16529c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 165332dce968SVlad Yasevich skb->ip_summed = csummode; 16541da177e4SLinus Torvalds skb->csum = 0; 16551f85851eSGao feng /* reserve for fragmentation and ipsec header */ 16561f85851eSGao feng skb_reserve(skb, hh_len + sizeof(struct frag_hdr) + 16571f85851eSGao feng dst_exthdrlen); 16581da177e4SLinus Torvalds 16591da177e4SLinus Torvalds /* 16601da177e4SLinus Torvalds * Find where to start putting bytes 16611da177e4SLinus Torvalds */ 166215e36f5bSWillem de Bruijn data = skb_put(skb, fraglen - pagedlen); 16631f85851eSGao feng skb_set_network_header(skb, exthdrlen); 16641f85851eSGao feng data += fragheaderlen; 1665b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1666b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 16671da177e4SLinus Torvalds if (fraggap) { 16681da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 16691da177e4SLinus Torvalds skb_prev, maxfraglen, 16708d5930dfSAl Viro data + transhdrlen, fraggap); 16711da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 16721da177e4SLinus Torvalds skb->csum); 16731da177e4SLinus Torvalds data += fraggap; 1674e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 16751da177e4SLinus Torvalds } 1676232cd35dSEric Dumazet if (copy > 0 && 1677232cd35dSEric Dumazet getfrag(from, data + transhdrlen, offset, 1678232cd35dSEric Dumazet copy, fraggap, skb) < 0) { 16791da177e4SLinus Torvalds err = -EFAULT; 16801da177e4SLinus Torvalds kfree_skb(skb); 16811da177e4SLinus Torvalds goto error; 16821da177e4SLinus Torvalds } 16831da177e4SLinus Torvalds 16841da177e4SLinus Torvalds offset += copy; 168515e36f5bSWillem de Bruijn length -= copy + transhdrlen; 16861da177e4SLinus Torvalds transhdrlen = 0; 16871da177e4SLinus Torvalds exthdrlen = 0; 1688299b0767SSteffen Klassert dst_exthdrlen = 0; 16891da177e4SLinus Torvalds 169052900d22SWillem de Bruijn /* Only the initial fragment is time stamped */ 169152900d22SWillem de Bruijn skb_shinfo(skb)->tx_flags = cork->tx_flags; 169252900d22SWillem de Bruijn cork->tx_flags = 0; 169352900d22SWillem de Bruijn skb_shinfo(skb)->tskey = tskey; 169452900d22SWillem de Bruijn tskey = 0; 169552900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 169652900d22SWillem de Bruijn 16970dec879fSJulian Anastasov if ((flags & MSG_CONFIRM) && !skb_prev) 16980dec879fSJulian Anastasov skb_set_dst_pending_confirm(skb, 1); 16990dec879fSJulian Anastasov 17001da177e4SLinus Torvalds /* 17011da177e4SLinus Torvalds * Put the packet on the pending queue 17021da177e4SLinus Torvalds */ 17031f4c6eb2SEric Dumazet if (!skb->destructor) { 17041f4c6eb2SEric Dumazet skb->destructor = sock_wfree; 17051f4c6eb2SEric Dumazet skb->sk = sk; 17061f4c6eb2SEric Dumazet wmem_alloc_delta += skb->truesize; 17071f4c6eb2SEric Dumazet } 17080bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 17091da177e4SLinus Torvalds continue; 17101da177e4SLinus Torvalds } 17111da177e4SLinus Torvalds 17121da177e4SLinus Torvalds if (copy > length) 17131da177e4SLinus Torvalds copy = length; 17141da177e4SLinus Torvalds 1715113f99c3SWillem de Bruijn if (!(rt->dst.dev->features&NETIF_F_SG) && 1716113f99c3SWillem de Bruijn skb_tailroom(skb) >= copy) { 17171da177e4SLinus Torvalds unsigned int off; 17181da177e4SLinus Torvalds 17191da177e4SLinus Torvalds off = skb->len; 17201da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 17211da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 17221da177e4SLinus Torvalds __skb_trim(skb, off); 17231da177e4SLinus Torvalds err = -EFAULT; 17241da177e4SLinus Torvalds goto error; 17251da177e4SLinus Torvalds } 1726b5947e5dSWillem de Bruijn } else if (!uarg || !uarg->zerocopy) { 17271da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 17281da177e4SLinus Torvalds 17291da177e4SLinus Torvalds err = -ENOMEM; 17305640f768SEric Dumazet if (!sk_page_frag_refill(sk, pfrag)) 17311da177e4SLinus Torvalds goto error; 17321da177e4SLinus Torvalds 17335640f768SEric Dumazet if (!skb_can_coalesce(skb, i, pfrag->page, 17345640f768SEric Dumazet pfrag->offset)) { 17351da177e4SLinus Torvalds err = -EMSGSIZE; 17365640f768SEric Dumazet if (i == MAX_SKB_FRAGS) 17371da177e4SLinus Torvalds goto error; 17385640f768SEric Dumazet 17395640f768SEric Dumazet __skb_fill_page_desc(skb, i, pfrag->page, 17405640f768SEric Dumazet pfrag->offset, 0); 17415640f768SEric Dumazet skb_shinfo(skb)->nr_frags = ++i; 17425640f768SEric Dumazet get_page(pfrag->page); 17431da177e4SLinus Torvalds } 17445640f768SEric Dumazet copy = min_t(int, copy, pfrag->size - pfrag->offset); 17459e903e08SEric Dumazet if (getfrag(from, 17465640f768SEric Dumazet page_address(pfrag->page) + pfrag->offset, 17475640f768SEric Dumazet offset, copy, skb->len, skb) < 0) 17485640f768SEric Dumazet goto error_efault; 17495640f768SEric Dumazet 17505640f768SEric Dumazet pfrag->offset += copy; 17515640f768SEric Dumazet skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy); 17521da177e4SLinus Torvalds skb->len += copy; 17531da177e4SLinus Torvalds skb->data_len += copy; 1754f945fa7aSHerbert Xu skb->truesize += copy; 17551f4c6eb2SEric Dumazet wmem_alloc_delta += copy; 1756b5947e5dSWillem de Bruijn } else { 1757b5947e5dSWillem de Bruijn err = skb_zerocopy_iter_dgram(skb, from, copy); 1758b5947e5dSWillem de Bruijn if (err < 0) 1759b5947e5dSWillem de Bruijn goto error; 17601da177e4SLinus Torvalds } 17611da177e4SLinus Torvalds offset += copy; 17621da177e4SLinus Torvalds length -= copy; 17631da177e4SLinus Torvalds } 17645640f768SEric Dumazet 17659e8445a5SPaolo Abeni if (wmem_alloc_delta) 17661f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 17671da177e4SLinus Torvalds return 0; 17685640f768SEric Dumazet 17695640f768SEric Dumazet error_efault: 17705640f768SEric Dumazet err = -EFAULT; 17711da177e4SLinus Torvalds error: 17728e044917SJonathan Lemon net_zcopy_put_abort(uarg, extra_uref); 1773bdc712b4SDavid S. Miller cork->length -= length; 17743bd653c8SDenis V. Lunev IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS); 17751f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 17761da177e4SLinus Torvalds return err; 17771da177e4SLinus Torvalds } 17780bbe84a6SVlad Yasevich 17790bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk, 17800bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, int len, 17810bbe84a6SVlad Yasevich int odd, struct sk_buff *skb), 178226879da5SWei Wang void *from, int length, int transhdrlen, 178326879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 17845fdaa88dSWillem de Bruijn struct rt6_info *rt, unsigned int flags) 17850bbe84a6SVlad Yasevich { 17860bbe84a6SVlad Yasevich struct inet_sock *inet = inet_sk(sk); 17870bbe84a6SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 17880bbe84a6SVlad Yasevich int exthdrlen; 17890bbe84a6SVlad Yasevich int err; 17900bbe84a6SVlad Yasevich 17910bbe84a6SVlad Yasevich if (flags&MSG_PROBE) 17920bbe84a6SVlad Yasevich return 0; 17930bbe84a6SVlad Yasevich if (skb_queue_empty(&sk->sk_write_queue)) { 17940bbe84a6SVlad Yasevich /* 17950bbe84a6SVlad Yasevich * setup for corking 17960bbe84a6SVlad Yasevich */ 179740ac240cSPavel Begunkov dst_hold(&rt->dst); 179826879da5SWei Wang err = ip6_setup_cork(sk, &inet->cork, &np->cork, 1799f37a4cc6SPavel Begunkov ipc6, rt); 18000bbe84a6SVlad Yasevich if (err) 18010bbe84a6SVlad Yasevich return err; 18020bbe84a6SVlad Yasevich 1803f37a4cc6SPavel Begunkov inet->cork.fl.u.ip6 = *fl6; 180426879da5SWei Wang exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 18050bbe84a6SVlad Yasevich length += exthdrlen; 18060bbe84a6SVlad Yasevich transhdrlen += exthdrlen; 18070bbe84a6SVlad Yasevich } else { 18080bbe84a6SVlad Yasevich transhdrlen = 0; 18090bbe84a6SVlad Yasevich } 18100bbe84a6SVlad Yasevich 1811f37a4cc6SPavel Begunkov return __ip6_append_data(sk, &sk->sk_write_queue, &inet->cork, 18120bbe84a6SVlad Yasevich &np->cork, sk_page_frag(sk), getfrag, 18135fdaa88dSWillem de Bruijn from, length, transhdrlen, flags, ipc6); 18140bbe84a6SVlad Yasevich } 1815a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data); 18161da177e4SLinus Torvalds 1817cd3c7480SPavel Begunkov static void ip6_cork_steal_dst(struct sk_buff *skb, struct inet_cork_full *cork) 1818cd3c7480SPavel Begunkov { 1819cd3c7480SPavel Begunkov struct dst_entry *dst = cork->base.dst; 1820cd3c7480SPavel Begunkov 1821cd3c7480SPavel Begunkov cork->base.dst = NULL; 1822cd3c7480SPavel Begunkov cork->base.flags &= ~IPCORK_ALLFRAG; 1823cd3c7480SPavel Begunkov skb_dst_set(skb, dst); 1824cd3c7480SPavel Begunkov } 1825cd3c7480SPavel Begunkov 1826366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork, 1827366e41d9SVlad Yasevich struct inet6_cork *v6_cork) 1828bf138862SPavel Emelyanov { 1829366e41d9SVlad Yasevich if (v6_cork->opt) { 1830d656b2eaSPavel Begunkov struct ipv6_txoptions *opt = v6_cork->opt; 1831d656b2eaSPavel Begunkov 1832d656b2eaSPavel Begunkov kfree(opt->dst0opt); 1833d656b2eaSPavel Begunkov kfree(opt->dst1opt); 1834d656b2eaSPavel Begunkov kfree(opt->hopopt); 1835d656b2eaSPavel Begunkov kfree(opt->srcrt); 1836d656b2eaSPavel Begunkov kfree(opt); 1837366e41d9SVlad Yasevich v6_cork->opt = NULL; 18380178b695SHerbert Xu } 18390178b695SHerbert Xu 1840366e41d9SVlad Yasevich if (cork->base.dst) { 1841366e41d9SVlad Yasevich dst_release(cork->base.dst); 1842366e41d9SVlad Yasevich cork->base.dst = NULL; 1843366e41d9SVlad Yasevich cork->base.flags &= ~IPCORK_ALLFRAG; 1844bf138862SPavel Emelyanov } 1845bf138862SPavel Emelyanov } 1846bf138862SPavel Emelyanov 18476422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk, 18486422398cSVlad Yasevich struct sk_buff_head *queue, 18496422398cSVlad Yasevich struct inet_cork_full *cork, 18506422398cSVlad Yasevich struct inet6_cork *v6_cork) 18511da177e4SLinus Torvalds { 18521da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 18531da177e4SLinus Torvalds struct sk_buff **tail_skb; 1854b60d4e58SPavel Begunkov struct in6_addr *final_dst; 18551da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 18563bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 18571da177e4SLinus Torvalds struct ipv6hdr *hdr; 18586422398cSVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 18596422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->base.dst; 18606422398cSVlad Yasevich struct flowi6 *fl6 = &cork->fl.u.ip6; 18614c9483b2SDavid S. Miller unsigned char proto = fl6->flowi6_proto; 18621da177e4SLinus Torvalds 18636422398cSVlad Yasevich skb = __skb_dequeue(queue); 186463159f29SIan Morris if (!skb) 18651da177e4SLinus Torvalds goto out; 18661da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 18671da177e4SLinus Torvalds 18681da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1869d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1870bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 18716422398cSVlad Yasevich while ((tmp_skb = __skb_dequeue(queue)) != NULL) { 1872cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 18731da177e4SLinus Torvalds *tail_skb = tmp_skb; 18741da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 18751da177e4SLinus Torvalds skb->len += tmp_skb->len; 18761da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 18771da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 18781da177e4SLinus Torvalds tmp_skb->destructor = NULL; 18791da177e4SLinus Torvalds tmp_skb->sk = NULL; 18801da177e4SLinus Torvalds } 18811da177e4SLinus Torvalds 188228a89453SHerbert Xu /* Allow local fragmentation. */ 188360ff7467SWANG Cong skb->ignore_df = ip6_sk_ignore_df(sk); 1884cfe1fc77SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_header_len(skb)); 1885b60d4e58SPavel Begunkov 1886b60d4e58SPavel Begunkov final_dst = &fl6->daddr; 18871da177e4SLinus Torvalds if (opt && opt->opt_flen) 18881da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 18891da177e4SLinus Torvalds if (opt && opt->opt_nflen) 1890613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr); 18911da177e4SLinus Torvalds 1892e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 1893e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 18940660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 18951da177e4SLinus Torvalds 18966422398cSVlad Yasevich ip6_flow_hdr(hdr, v6_cork->tclass, 1897cb1ce2efSTom Herbert ip6_make_flowlabel(net, skb, fl6->flowlabel, 1898513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 18996422398cSVlad Yasevich hdr->hop_limit = v6_cork->hop_limit; 19001da177e4SLinus Torvalds hdr->nexthdr = proto; 19014e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 19024e3fd7a0SAlexey Dobriyan hdr->daddr = *final_dst; 19031da177e4SLinus Torvalds 1904a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 1905c6af0c22SWillem de Bruijn skb->mark = cork->base.mark; 1906a818f75eSJesus Sanchez-Palencia skb->tstamp = cork->base.transmit_time; 1907a818f75eSJesus Sanchez-Palencia 1908cd3c7480SPavel Begunkov ip6_cork_steal_dst(skb, cork); 1909edf391ffSNeil Horman IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len); 191014878f75SDavid L Stevens if (proto == IPPROTO_ICMPV6) { 1911adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 191214878f75SDavid L Stevens 191343a43b60SHannes Frederic Sowa ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type); 191443a43b60SHannes Frederic Sowa ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS); 191514878f75SDavid L Stevens } 191614878f75SDavid L Stevens 19176422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 19186422398cSVlad Yasevich out: 19196422398cSVlad Yasevich return skb; 19206422398cSVlad Yasevich } 19216422398cSVlad Yasevich 19226422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb) 19236422398cSVlad Yasevich { 19246422398cSVlad Yasevich struct net *net = sock_net(skb->sk); 19256422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 19266422398cSVlad Yasevich int err; 19276422398cSVlad Yasevich 192833224b16SEric W. Biederman err = ip6_local_out(net, skb->sk, skb); 19291da177e4SLinus Torvalds if (err) { 19301da177e4SLinus Torvalds if (err > 0) 19316ce9e7b5SEric Dumazet err = net_xmit_errno(err); 19321da177e4SLinus Torvalds if (err) 19336422398cSVlad Yasevich IP6_INC_STATS(net, rt->rt6i_idev, 19346422398cSVlad Yasevich IPSTATS_MIB_OUTDISCARDS); 19351da177e4SLinus Torvalds } 19361da177e4SLinus Torvalds 19371da177e4SLinus Torvalds return err; 19386422398cSVlad Yasevich } 19396422398cSVlad Yasevich 19406422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk) 19416422398cSVlad Yasevich { 19426422398cSVlad Yasevich struct sk_buff *skb; 19436422398cSVlad Yasevich 19446422398cSVlad Yasevich skb = ip6_finish_skb(sk); 19456422398cSVlad Yasevich if (!skb) 19466422398cSVlad Yasevich return 0; 19476422398cSVlad Yasevich 19486422398cSVlad Yasevich return ip6_send_skb(skb); 19491da177e4SLinus Torvalds } 1950a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames); 19511da177e4SLinus Torvalds 19520bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk, 19536422398cSVlad Yasevich struct sk_buff_head *queue, 19546422398cSVlad Yasevich struct inet_cork_full *cork, 19556422398cSVlad Yasevich struct inet6_cork *v6_cork) 19561da177e4SLinus Torvalds { 19571da177e4SLinus Torvalds struct sk_buff *skb; 19581da177e4SLinus Torvalds 19590bbe84a6SVlad Yasevich while ((skb = __skb_dequeue_tail(queue)) != NULL) { 1960adf30907SEric Dumazet if (skb_dst(skb)) 1961adf30907SEric Dumazet IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)), 1962a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 19631da177e4SLinus Torvalds kfree_skb(skb); 19641da177e4SLinus Torvalds } 19651da177e4SLinus Torvalds 19666422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 19671da177e4SLinus Torvalds } 19680bbe84a6SVlad Yasevich 19690bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk) 19700bbe84a6SVlad Yasevich { 19716422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &sk->sk_write_queue, 19726422398cSVlad Yasevich &inet_sk(sk)->cork, &inet6_sk(sk)->cork); 19730bbe84a6SVlad Yasevich } 1974a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames); 19756422398cSVlad Yasevich 19766422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk, 19776422398cSVlad Yasevich int getfrag(void *from, char *to, int offset, 19786422398cSVlad Yasevich int len, int odd, struct sk_buff *skb), 19796422398cSVlad Yasevich void *from, int length, int transhdrlen, 1980f37a4cc6SPavel Begunkov struct ipcm6_cookie *ipc6, struct rt6_info *rt, 1981f37a4cc6SPavel Begunkov unsigned int flags, struct inet_cork_full *cork) 19826422398cSVlad Yasevich { 19836422398cSVlad Yasevich struct inet6_cork v6_cork; 19846422398cSVlad Yasevich struct sk_buff_head queue; 198526879da5SWei Wang int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 19866422398cSVlad Yasevich int err; 19876422398cSVlad Yasevich 198840ac240cSPavel Begunkov if (flags & MSG_PROBE) { 198940ac240cSPavel Begunkov dst_release(&rt->dst); 19906422398cSVlad Yasevich return NULL; 199140ac240cSPavel Begunkov } 19926422398cSVlad Yasevich 19936422398cSVlad Yasevich __skb_queue_head_init(&queue); 19946422398cSVlad Yasevich 19951cd7884dSWillem de Bruijn cork->base.flags = 0; 19961cd7884dSWillem de Bruijn cork->base.addr = 0; 19971cd7884dSWillem de Bruijn cork->base.opt = NULL; 19986422398cSVlad Yasevich v6_cork.opt = NULL; 1999f37a4cc6SPavel Begunkov err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt); 2000862c03eeSEric Dumazet if (err) { 20011cd7884dSWillem de Bruijn ip6_cork_release(cork, &v6_cork); 20026422398cSVlad Yasevich return ERR_PTR(err); 2003862c03eeSEric Dumazet } 200426879da5SWei Wang if (ipc6->dontfrag < 0) 200526879da5SWei Wang ipc6->dontfrag = inet6_sk(sk)->dontfrag; 20066422398cSVlad Yasevich 2007f37a4cc6SPavel Begunkov err = __ip6_append_data(sk, &queue, cork, &v6_cork, 20086422398cSVlad Yasevich ¤t->task_frag, getfrag, from, 20096422398cSVlad Yasevich length + exthdrlen, transhdrlen + exthdrlen, 20105fdaa88dSWillem de Bruijn flags, ipc6); 20116422398cSVlad Yasevich if (err) { 20121cd7884dSWillem de Bruijn __ip6_flush_pending_frames(sk, &queue, cork, &v6_cork); 20136422398cSVlad Yasevich return ERR_PTR(err); 20146422398cSVlad Yasevich } 20156422398cSVlad Yasevich 20161cd7884dSWillem de Bruijn return __ip6_make_skb(sk, &queue, cork, &v6_cork); 20176422398cSVlad Yasevich } 2018