12874c5fdSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later 21da177e4SLinus Torvalds /* 31da177e4SLinus Torvalds * IPv6 output functions 41da177e4SLinus Torvalds * Linux INET6 implementation 51da177e4SLinus Torvalds * 61da177e4SLinus Torvalds * Authors: 71da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 81da177e4SLinus Torvalds * 91da177e4SLinus Torvalds * Based on linux/net/ipv4/ip_output.c 101da177e4SLinus Torvalds * 111da177e4SLinus Torvalds * Changes: 121da177e4SLinus Torvalds * A.N.Kuznetsov : airthmetics in fragmentation. 131da177e4SLinus Torvalds * extension headers are implemented. 141da177e4SLinus Torvalds * route changes now work. 151da177e4SLinus Torvalds * ip6_forward does not confuse sniffers. 161da177e4SLinus Torvalds * etc. 171da177e4SLinus Torvalds * 181da177e4SLinus Torvalds * H. von Brand : Added missing #include <linux/string.h> 191da177e4SLinus Torvalds * Imran Patel : frag id should be in NBO 201da177e4SLinus Torvalds * Kazunori MIYAZAWA @USAGI 211da177e4SLinus Torvalds * : add ip6_append_data and related functions 221da177e4SLinus Torvalds * for datagram xmit 231da177e4SLinus Torvalds */ 241da177e4SLinus Torvalds 251da177e4SLinus Torvalds #include <linux/errno.h> 26ef76bc23SHerbert Xu #include <linux/kernel.h> 271da177e4SLinus Torvalds #include <linux/string.h> 281da177e4SLinus Torvalds #include <linux/socket.h> 291da177e4SLinus Torvalds #include <linux/net.h> 301da177e4SLinus Torvalds #include <linux/netdevice.h> 311da177e4SLinus Torvalds #include <linux/if_arp.h> 321da177e4SLinus Torvalds #include <linux/in6.h> 331da177e4SLinus Torvalds #include <linux/tcp.h> 341da177e4SLinus Torvalds #include <linux/route.h> 35b59f45d0SHerbert Xu #include <linux/module.h> 365a0e3ad6STejun Heo #include <linux/slab.h> 371da177e4SLinus Torvalds 3833b48679SDaniel Mack #include <linux/bpf-cgroup.h> 391da177e4SLinus Torvalds #include <linux/netfilter.h> 401da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h> 411da177e4SLinus Torvalds 421da177e4SLinus Torvalds #include <net/sock.h> 431da177e4SLinus Torvalds #include <net/snmp.h> 441da177e4SLinus Torvalds 451da177e4SLinus Torvalds #include <net/ipv6.h> 461da177e4SLinus Torvalds #include <net/ndisc.h> 471da177e4SLinus Torvalds #include <net/protocol.h> 481da177e4SLinus Torvalds #include <net/ip6_route.h> 491da177e4SLinus Torvalds #include <net/addrconf.h> 501da177e4SLinus Torvalds #include <net/rawv6.h> 511da177e4SLinus Torvalds #include <net/icmp.h> 521da177e4SLinus Torvalds #include <net/xfrm.h> 531da177e4SLinus Torvalds #include <net/checksum.h> 547bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h> 55ca254490SDavid Ahern #include <net/l3mdev.h> 5614972cbdSRoopa Prabhu #include <net/lwtunnel.h> 57571912c6SMartin Varghese #include <net/ip_tunnels.h> 581da177e4SLinus Torvalds 597d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb) 601da177e4SLinus Torvalds { 61adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 621da177e4SLinus Torvalds struct net_device *dev = dst->dev; 63e415ed3aSVasily Averin struct inet6_dev *idev = ip6_dst_idev(dst); 645796015fSVasily Averin unsigned int hh_len = LL_RESERVED_SPACE(dev); 65e415ed3aSVasily Averin const struct in6_addr *daddr, *nexthop; 66e415ed3aSVasily Averin struct ipv6hdr *hdr; 67f6b72b62SDavid S. Miller struct neighbour *neigh; 686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 int ret; 691da177e4SLinus Torvalds 705796015fSVasily Averin /* Be paranoid, rather than too clever. */ 71e415ed3aSVasily Averin if (unlikely(hh_len > skb_headroom(skb)) && dev->header_ops) { 72e415ed3aSVasily Averin skb = skb_expand_head(skb, hh_len); 735796015fSVasily Averin if (!skb) { 74e415ed3aSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 755796015fSVasily Averin return -ENOMEM; 765796015fSVasily Averin } 775796015fSVasily Averin } 785796015fSVasily Averin 79e415ed3aSVasily Averin hdr = ipv6_hdr(skb); 80e415ed3aSVasily Averin daddr = &hdr->daddr; 81e415ed3aSVasily Averin if (ipv6_addr_is_multicast(daddr)) { 827026b1ddSDavid Miller if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) && 838571ab47SYuval Mintz ((mroute6_is_socket(net, skb) && 84bd91b8bfSBenjamin Thery !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) || 85e415ed3aSVasily Averin ipv6_chk_mcast_addr(dev, daddr, &hdr->saddr))) { 861da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 871da177e4SLinus Torvalds 881da177e4SLinus Torvalds /* Do not check for IFF_ALLMULTI; multicast routing 891da177e4SLinus Torvalds is not supported in any case. 901da177e4SLinus Torvalds */ 911da177e4SLinus Torvalds if (newskb) 92b2e0b385SJan Engelhardt NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING, 9329a26a56SEric W. Biederman net, sk, newskb, NULL, newskb->dev, 9495603e22SMichel Machado dev_loopback_xmit); 951da177e4SLinus Torvalds 96e415ed3aSVasily Averin if (hdr->hop_limit == 0) { 9778126c41SEric W. Biederman IP6_INC_STATS(net, idev, 983bd653c8SDenis V. Lunev IPSTATS_MIB_OUTDISCARDS); 991da177e4SLinus Torvalds kfree_skb(skb); 1001da177e4SLinus Torvalds return 0; 1011da177e4SLinus Torvalds } 1021da177e4SLinus Torvalds } 1031da177e4SLinus Torvalds 10478126c41SEric W. Biederman IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len); 105e415ed3aSVasily Averin if (IPV6_ADDR_MC_SCOPE(daddr) <= IPV6_ADDR_SCOPE_NODELOCAL && 106dd408515SHannes Frederic Sowa !(dev->flags & IFF_LOOPBACK)) { 107dd408515SHannes Frederic Sowa kfree_skb(skb); 108dd408515SHannes Frederic Sowa return 0; 109dd408515SHannes Frederic Sowa } 1101da177e4SLinus Torvalds } 1111da177e4SLinus Torvalds 11214972cbdSRoopa Prabhu if (lwtunnel_xmit_redirect(dst->lwtstate)) { 11314972cbdSRoopa Prabhu int res = lwtunnel_xmit(skb); 11414972cbdSRoopa Prabhu 11514972cbdSRoopa Prabhu if (res < 0 || res == LWTUNNEL_XMIT_DONE) 11614972cbdSRoopa Prabhu return res; 11714972cbdSRoopa Prabhu } 11814972cbdSRoopa Prabhu 1196fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 120e415ed3aSVasily Averin nexthop = rt6_nexthop((struct rt6_info *)dst, daddr); 121e415ed3aSVasily Averin neigh = __ipv6_neigh_lookup_noref(dev, nexthop); 122*58f71be5SPavel Begunkov 123*58f71be5SPavel Begunkov if (unlikely(IS_ERR_OR_NULL(neigh))) { 1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(!neigh)) 125e415ed3aSVasily Averin neigh = __neigh_create(&nd_tbl, nexthop, dev, false); 126*58f71be5SPavel Begunkov if (IS_ERR(neigh)) { 127*58f71be5SPavel Begunkov rcu_read_unlock_bh(); 128*58f71be5SPavel Begunkov IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTNOROUTES); 129*58f71be5SPavel Begunkov kfree_skb_reason(skb, SKB_DROP_REASON_NEIGH_CREATEFAIL); 130*58f71be5SPavel Begunkov return -EINVAL; 131*58f71be5SPavel Begunkov } 132*58f71be5SPavel Begunkov } 1334ff06203SJulian Anastasov sock_confirm_neigh(skb, neigh); 1340353f282SDavid Ahern ret = neigh_output(neigh, skb, false); 1356fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1366fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 return ret; 1376fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 } 1381da177e4SLinus Torvalds 139b210de4fSAya Levin static int 140b210de4fSAya Levin ip6_finish_output_gso_slowpath_drop(struct net *net, struct sock *sk, 141b210de4fSAya Levin struct sk_buff *skb, unsigned int mtu) 142b210de4fSAya Levin { 143b210de4fSAya Levin struct sk_buff *segs, *nskb; 144b210de4fSAya Levin netdev_features_t features; 145b210de4fSAya Levin int ret = 0; 146b210de4fSAya Levin 147b210de4fSAya Levin /* Please see corresponding comment in ip_finish_output_gso 148b210de4fSAya Levin * describing the cases where GSO segment length exceeds the 149b210de4fSAya Levin * egress MTU. 150b210de4fSAya Levin */ 151b210de4fSAya Levin features = netif_skb_features(skb); 152b210de4fSAya Levin segs = skb_gso_segment(skb, features & ~NETIF_F_GSO_MASK); 153b210de4fSAya Levin if (IS_ERR_OR_NULL(segs)) { 154b210de4fSAya Levin kfree_skb(skb); 155b210de4fSAya Levin return -ENOMEM; 156b210de4fSAya Levin } 157b210de4fSAya Levin 158b210de4fSAya Levin consume_skb(skb); 159b210de4fSAya Levin 160b210de4fSAya Levin skb_list_walk_safe(segs, segs, nskb) { 161b210de4fSAya Levin int err; 162b210de4fSAya Levin 163b210de4fSAya Levin skb_mark_not_on_list(segs); 164b210de4fSAya Levin err = ip6_fragment(net, sk, segs, ip6_finish_output2); 165b210de4fSAya Levin if (err && ret == 0) 166b210de4fSAya Levin ret = err; 167b210de4fSAya Levin } 168b210de4fSAya Levin 169b210de4fSAya Levin return ret; 170b210de4fSAya Levin } 171b210de4fSAya Levin 172956fe219Sbrakmo static int __ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1739e508490SJan Engelhardt { 174b210de4fSAya Levin unsigned int mtu; 175b210de4fSAya Levin 17609ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM) 17709ee9dbaSTobias Brunner /* Policy lookup after SNAT yielded a new policy */ 17809ee9dbaSTobias Brunner if (skb_dst(skb)->xfrm) { 17919d36c5fSEric Dumazet IP6CB(skb)->flags |= IP6SKB_REROUTED; 18009ee9dbaSTobias Brunner return dst_output(net, sk, skb); 18109ee9dbaSTobias Brunner } 18209ee9dbaSTobias Brunner #endif 18309ee9dbaSTobias Brunner 184b210de4fSAya Levin mtu = ip6_skb_dst_mtu(skb); 185b210de4fSAya Levin if (skb_is_gso(skb) && !skb_gso_validate_network_len(skb, mtu)) 186b210de4fSAya Levin return ip6_finish_output_gso_slowpath_drop(net, sk, skb, mtu); 187b210de4fSAya Levin 188b210de4fSAya Levin if ((skb->len > mtu && !skb_is_gso(skb)) || 1899037c357SJiri Pirko dst_allfrag(skb_dst(skb)) || 1909037c357SJiri Pirko (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size)) 1917d8c6e39SEric W. Biederman return ip6_fragment(net, sk, skb, ip6_finish_output2); 1929e508490SJan Engelhardt else 1937d8c6e39SEric W. Biederman return ip6_finish_output2(net, sk, skb); 1949e508490SJan Engelhardt } 1959e508490SJan Engelhardt 196956fe219Sbrakmo static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 197956fe219Sbrakmo { 198956fe219Sbrakmo int ret; 199956fe219Sbrakmo 200956fe219Sbrakmo ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb); 201956fe219Sbrakmo switch (ret) { 202956fe219Sbrakmo case NET_XMIT_SUCCESS: 203956fe219Sbrakmo case NET_XMIT_CN: 204956fe219Sbrakmo return __ip6_finish_output(net, sk, skb) ? : ret; 205956fe219Sbrakmo default: 2065e187189SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_BPF_CGROUP_EGRESS); 207956fe219Sbrakmo return ret; 208956fe219Sbrakmo } 209956fe219Sbrakmo } 210956fe219Sbrakmo 211ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb) 2121da177e4SLinus Torvalds { 21328f8bfd1SPhil Sutter struct net_device *dev = skb_dst(skb)->dev, *indev = skb->dev; 214adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 215be10de0aSEric W. Biederman 21697a7a37aSChenbo Feng skb->protocol = htons(ETH_P_IPV6); 21797a7a37aSChenbo Feng skb->dev = dev; 21897a7a37aSChenbo Feng 219778d80beSYOSHIFUJI Hideaki if (unlikely(idev->cnf.disable_ipv6)) { 22019a0644cSEric W. Biederman IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 2215e187189SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_IPV6DISABLED); 222778d80beSYOSHIFUJI Hideaki return 0; 223778d80beSYOSHIFUJI Hideaki } 224778d80beSYOSHIFUJI Hideaki 22529a26a56SEric W. Biederman return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING, 22628f8bfd1SPhil Sutter net, sk, skb, indev, dev, 2279c6eb28aSJan Engelhardt ip6_finish_output, 2289c6eb28aSJan Engelhardt !(IP6CB(skb)->flags & IP6SKB_REROUTED)); 2291da177e4SLinus Torvalds } 2306585d7dcSBrian Vazquez EXPORT_SYMBOL(ip6_output); 2311da177e4SLinus Torvalds 232e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np) 233513674b5SShaohua Li { 234513674b5SShaohua Li if (!np->autoflowlabel_set) 235513674b5SShaohua Li return ip6_default_np_autolabel(net); 236513674b5SShaohua Li else 237513674b5SShaohua Li return np->autoflowlabel; 238513674b5SShaohua Li } 239513674b5SShaohua Li 2401da177e4SLinus Torvalds /* 241b5d43998SShan Wei * xmit an sk_buff (used by TCP, SCTP and DCCP) 2421c1e9d2bSEric Dumazet * Note : socket lock is not held for SYNACK packets, but might be modified 2431c1e9d2bSEric Dumazet * by calls to skb_set_owner_w() and ipv6_local_error(), 2441c1e9d2bSEric Dumazet * which are using proper atomic operations or spinlocks. 2451da177e4SLinus Torvalds */ 2461c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6, 2474f6570d7SEric Dumazet __u32 mark, struct ipv6_txoptions *opt, int tclass, u32 priority) 2481da177e4SLinus Torvalds { 2493bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 2501c1e9d2bSEric Dumazet const struct ipv6_pinfo *np = inet6_sk(sk); 2514c9483b2SDavid S. Miller struct in6_addr *first_hop = &fl6->daddr; 252adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 2530c9f227bSVasily Averin struct net_device *dev = dst->dev; 2540c9f227bSVasily Averin struct inet6_dev *idev = ip6_dst_idev(dst); 25566033f47SStefano Brivio unsigned int head_room; 2561da177e4SLinus Torvalds struct ipv6hdr *hdr; 2574c9483b2SDavid S. Miller u8 proto = fl6->flowi6_proto; 2581da177e4SLinus Torvalds int seg_len = skb->len; 259e651f03aSGerrit Renker int hlimit = -1; 2601da177e4SLinus Torvalds u32 mtu; 2611da177e4SLinus Torvalds 2620c9f227bSVasily Averin head_room = sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dev); 26366033f47SStefano Brivio if (opt) 26466033f47SStefano Brivio head_room += opt->opt_nflen + opt->opt_flen; 2651da177e4SLinus Torvalds 2660c9f227bSVasily Averin if (unlikely(head_room > skb_headroom(skb))) { 2670c9f227bSVasily Averin skb = skb_expand_head(skb, head_room); 2680c9f227bSVasily Averin if (!skb) { 2690c9f227bSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 2701da177e4SLinus Torvalds return -ENOBUFS; 2711da177e4SLinus Torvalds } 2721da177e4SLinus Torvalds } 27366033f47SStefano Brivio 27466033f47SStefano Brivio if (opt) { 27566033f47SStefano Brivio seg_len += opt->opt_nflen + opt->opt_flen; 27666033f47SStefano Brivio 2771da177e4SLinus Torvalds if (opt->opt_flen) 2781da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 27966033f47SStefano Brivio 2801da177e4SLinus Torvalds if (opt->opt_nflen) 281613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop, 282613fa3caSDavid Lebrun &fl6->saddr); 2831da177e4SLinus Torvalds } 2841da177e4SLinus Torvalds 285e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 286e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 2870660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 2881da177e4SLinus Torvalds 2891da177e4SLinus Torvalds /* 2901da177e4SLinus Torvalds * Fill in the IPv6 header 2911da177e4SLinus Torvalds */ 292b903d324SEric Dumazet if (np) 2931da177e4SLinus Torvalds hlimit = np->hop_limit; 2941da177e4SLinus Torvalds if (hlimit < 0) 2956b75d090SYOSHIFUJI Hideaki hlimit = ip6_dst_hoplimit(dst); 2961da177e4SLinus Torvalds 297cb1ce2efSTom Herbert ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel, 298513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 29941a1f8eaSYOSHIFUJI Hideaki 3001da177e4SLinus Torvalds hdr->payload_len = htons(seg_len); 3011da177e4SLinus Torvalds hdr->nexthdr = proto; 3021da177e4SLinus Torvalds hdr->hop_limit = hlimit; 3031da177e4SLinus Torvalds 3044e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 3054e3fd7a0SAlexey Dobriyan hdr->daddr = *first_hop; 3061da177e4SLinus Torvalds 3079c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 3084f6570d7SEric Dumazet skb->priority = priority; 30992e55f41SPablo Neira skb->mark = mark; 310a2c2064fSPatrick McHardy 3111da177e4SLinus Torvalds mtu = dst_mtu(dst); 31260ff7467SWANG Cong if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) { 3130c9f227bSVasily Averin IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len); 314a8e3e1a9SDavid Ahern 315a8e3e1a9SDavid Ahern /* if egress device is enslaved to an L3 master device pass the 316a8e3e1a9SDavid Ahern * skb to its handler for processing 317a8e3e1a9SDavid Ahern */ 318a8e3e1a9SDavid Ahern skb = l3mdev_ip6_out((struct sock *)sk, skb); 319a8e3e1a9SDavid Ahern if (unlikely(!skb)) 320a8e3e1a9SDavid Ahern return 0; 321a8e3e1a9SDavid Ahern 3221c1e9d2bSEric Dumazet /* hooks should never assume socket lock is held. 3231c1e9d2bSEric Dumazet * we promote our socket to non const 3241c1e9d2bSEric Dumazet */ 32529a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, 3260c9f227bSVasily Averin net, (struct sock *)sk, skb, NULL, dev, 32713206b6bSEric W. Biederman dst_output); 3281da177e4SLinus Torvalds } 3291da177e4SLinus Torvalds 3300c9f227bSVasily Averin skb->dev = dev; 3311c1e9d2bSEric Dumazet /* ipv6_local_error() does not require socket lock, 3321c1e9d2bSEric Dumazet * we promote our socket to non const 3331c1e9d2bSEric Dumazet */ 3341c1e9d2bSEric Dumazet ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu); 3351c1e9d2bSEric Dumazet 3360c9f227bSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_FRAGFAILS); 3371da177e4SLinus Torvalds kfree_skb(skb); 3381da177e4SLinus Torvalds return -EMSGSIZE; 3391da177e4SLinus Torvalds } 3407159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit); 3417159039aSYOSHIFUJI Hideaki 3421da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel) 3431da177e4SLinus Torvalds { 3441da177e4SLinus Torvalds struct ip6_ra_chain *ra; 3451da177e4SLinus Torvalds struct sock *last = NULL; 3461da177e4SLinus Torvalds 3471da177e4SLinus Torvalds read_lock(&ip6_ra_lock); 3481da177e4SLinus Torvalds for (ra = ip6_ra_chain; ra; ra = ra->next) { 3491da177e4SLinus Torvalds struct sock *sk = ra->sk; 3500bd1b59bSAndrew McDonald if (sk && ra->sel == sel && 3510bd1b59bSAndrew McDonald (!sk->sk_bound_dev_if || 3520bd1b59bSAndrew McDonald sk->sk_bound_dev_if == skb->dev->ifindex)) { 3539036b2feSFrancesco Ruggeri struct ipv6_pinfo *np = inet6_sk(sk); 3549036b2feSFrancesco Ruggeri 3559036b2feSFrancesco Ruggeri if (np && np->rtalert_isolate && 3569036b2feSFrancesco Ruggeri !net_eq(sock_net(sk), dev_net(skb->dev))) { 3579036b2feSFrancesco Ruggeri continue; 3589036b2feSFrancesco Ruggeri } 3591da177e4SLinus Torvalds if (last) { 3601da177e4SLinus Torvalds struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC); 3611da177e4SLinus Torvalds if (skb2) 3621da177e4SLinus Torvalds rawv6_rcv(last, skb2); 3631da177e4SLinus Torvalds } 3641da177e4SLinus Torvalds last = sk; 3651da177e4SLinus Torvalds } 3661da177e4SLinus Torvalds } 3671da177e4SLinus Torvalds 3681da177e4SLinus Torvalds if (last) { 3691da177e4SLinus Torvalds rawv6_rcv(last, skb); 3701da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3711da177e4SLinus Torvalds return 1; 3721da177e4SLinus Torvalds } 3731da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3741da177e4SLinus Torvalds return 0; 3751da177e4SLinus Torvalds } 3761da177e4SLinus Torvalds 377e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb) 378e21e0b5fSVille Nuorvala { 3790660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 380e21e0b5fSVille Nuorvala u8 nexthdr = hdr->nexthdr; 38175f2811cSJesse Gross __be16 frag_off; 382e21e0b5fSVille Nuorvala int offset; 383e21e0b5fSVille Nuorvala 384e21e0b5fSVille Nuorvala if (ipv6_ext_hdr(nexthdr)) { 38575f2811cSJesse Gross offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off); 386e21e0b5fSVille Nuorvala if (offset < 0) 387e21e0b5fSVille Nuorvala return 0; 388e21e0b5fSVille Nuorvala } else 389e21e0b5fSVille Nuorvala offset = sizeof(struct ipv6hdr); 390e21e0b5fSVille Nuorvala 391e21e0b5fSVille Nuorvala if (nexthdr == IPPROTO_ICMPV6) { 392e21e0b5fSVille Nuorvala struct icmp6hdr *icmp6; 393e21e0b5fSVille Nuorvala 394d56f90a7SArnaldo Carvalho de Melo if (!pskb_may_pull(skb, (skb_network_header(skb) + 395d56f90a7SArnaldo Carvalho de Melo offset + 1 - skb->data))) 396e21e0b5fSVille Nuorvala return 0; 397e21e0b5fSVille Nuorvala 398d56f90a7SArnaldo Carvalho de Melo icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset); 399e21e0b5fSVille Nuorvala 400e21e0b5fSVille Nuorvala switch (icmp6->icmp6_type) { 401e21e0b5fSVille Nuorvala case NDISC_ROUTER_SOLICITATION: 402e21e0b5fSVille Nuorvala case NDISC_ROUTER_ADVERTISEMENT: 403e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_SOLICITATION: 404e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_ADVERTISEMENT: 405e21e0b5fSVille Nuorvala case NDISC_REDIRECT: 406e21e0b5fSVille Nuorvala /* For reaction involving unicast neighbor discovery 407e21e0b5fSVille Nuorvala * message destined to the proxied address, pass it to 408e21e0b5fSVille Nuorvala * input function. 409e21e0b5fSVille Nuorvala */ 410e21e0b5fSVille Nuorvala return 1; 411e21e0b5fSVille Nuorvala default: 412e21e0b5fSVille Nuorvala break; 413e21e0b5fSVille Nuorvala } 414e21e0b5fSVille Nuorvala } 415e21e0b5fSVille Nuorvala 41674553b09SVille Nuorvala /* 41774553b09SVille Nuorvala * The proxying router can't forward traffic sent to a link-local 41874553b09SVille Nuorvala * address, so signal the sender and discard the packet. This 41974553b09SVille Nuorvala * behavior is clarified by the MIPv6 specification. 42074553b09SVille Nuorvala */ 42174553b09SVille Nuorvala if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) { 42274553b09SVille Nuorvala dst_link_failure(skb); 42374553b09SVille Nuorvala return -1; 42474553b09SVille Nuorvala } 42574553b09SVille Nuorvala 426e21e0b5fSVille Nuorvala return 0; 427e21e0b5fSVille Nuorvala } 428e21e0b5fSVille Nuorvala 4290c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk, 4300c4b51f0SEric W. Biederman struct sk_buff *skb) 4311da177e4SLinus Torvalds { 43271a1c915SJeff Barnhill struct dst_entry *dst = skb_dst(skb); 43371a1c915SJeff Barnhill 43471a1c915SJeff Barnhill __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS); 43571a1c915SJeff Barnhill __IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len); 43671a1c915SJeff Barnhill 437f839a6c9SIdo Schimmel #ifdef CONFIG_NET_SWITCHDEV 438f839a6c9SIdo Schimmel if (skb->offload_l3_fwd_mark) { 439f839a6c9SIdo Schimmel consume_skb(skb); 440f839a6c9SIdo Schimmel return 0; 441f839a6c9SIdo Schimmel } 442f839a6c9SIdo Schimmel #endif 443f839a6c9SIdo Schimmel 444de799101SMartin KaFai Lau skb_clear_tstamp(skb); 44513206b6bSEric W. Biederman return dst_output(net, sk, skb); 4461da177e4SLinus Torvalds } 4471da177e4SLinus Torvalds 448fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu) 449fe6cc55fSFlorian Westphal { 450418a3156SFlorian Westphal if (skb->len <= mtu) 451fe6cc55fSFlorian Westphal return false; 452fe6cc55fSFlorian Westphal 45360ff7467SWANG Cong /* ipv6 conntrack defrag sets max_frag_size + ignore_df */ 454fe6cc55fSFlorian Westphal if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu) 455fe6cc55fSFlorian Westphal return true; 456fe6cc55fSFlorian Westphal 45760ff7467SWANG Cong if (skb->ignore_df) 458418a3156SFlorian Westphal return false; 459418a3156SFlorian Westphal 460779b7931SDaniel Axtens if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu)) 461fe6cc55fSFlorian Westphal return false; 462fe6cc55fSFlorian Westphal 463fe6cc55fSFlorian Westphal return true; 464fe6cc55fSFlorian Westphal } 465fe6cc55fSFlorian Westphal 4661da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb) 4671da177e4SLinus Torvalds { 468adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 4690660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 4701da177e4SLinus Torvalds struct inet6_skb_parm *opt = IP6CB(skb); 471c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(dst->dev); 4720857d6f8SStephen Suryaputra struct inet6_dev *idev; 4732edc1a38SMenglong Dong SKB_DR(reason); 47414f3ad6fSUlrich Weber u32 mtu; 4751da177e4SLinus Torvalds 4760857d6f8SStephen Suryaputra idev = __in6_dev_get_safely(dev_get_by_index_rcu(net, IP6CB(skb)->iif)); 47753b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->forwarding == 0) 4781da177e4SLinus Torvalds goto error; 4791da177e4SLinus Torvalds 480090f1166SLi RongQing if (skb->pkt_type != PACKET_HOST) 481090f1166SLi RongQing goto drop; 482090f1166SLi RongQing 4839ef2e965SHannes Frederic Sowa if (unlikely(skb->sk)) 4849ef2e965SHannes Frederic Sowa goto drop; 4859ef2e965SHannes Frederic Sowa 4864497b076SBen Hutchings if (skb_warn_if_lro(skb)) 4874497b076SBen Hutchings goto drop; 4884497b076SBen Hutchings 489ccd27f05SNicolas Dichtel if (!net->ipv6.devconf_all->disable_policy && 490e3fa461dSNicolas Dichtel (!idev || !idev->cnf.disable_policy) && 491ccd27f05SNicolas Dichtel !xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) { 492bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 4931da177e4SLinus Torvalds goto drop; 4941da177e4SLinus Torvalds } 4951da177e4SLinus Torvalds 49635fc92a9SHerbert Xu skb_forward_csum(skb); 4971da177e4SLinus Torvalds 4981da177e4SLinus Torvalds /* 4991da177e4SLinus Torvalds * We DO NOT make any processing on 5001da177e4SLinus Torvalds * RA packets, pushing them to user level AS IS 5011da177e4SLinus Torvalds * without ane WARRANTY that application will be able 5021da177e4SLinus Torvalds * to interpret them. The reason is that we 5031da177e4SLinus Torvalds * cannot make anything clever here. 5041da177e4SLinus Torvalds * 5051da177e4SLinus Torvalds * We are not end-node, so that if packet contains 5061da177e4SLinus Torvalds * AH/ESP, we cannot make anything. 5071da177e4SLinus Torvalds * Defragmentation also would be mistake, RA packets 5081da177e4SLinus Torvalds * cannot be fragmented, because there is no warranty 5091da177e4SLinus Torvalds * that different fragments will go along one path. --ANK 5101da177e4SLinus Torvalds */ 511ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) { 512ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (ip6_call_ra_chain(skb, ntohs(opt->ra))) 5131da177e4SLinus Torvalds return 0; 5141da177e4SLinus Torvalds } 5151da177e4SLinus Torvalds 5161da177e4SLinus Torvalds /* 5171da177e4SLinus Torvalds * check and decrement ttl 5181da177e4SLinus Torvalds */ 5191da177e4SLinus Torvalds if (hdr->hop_limit <= 1) { 5203ffe533cSAlexey Dobriyan icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0); 521bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS); 5221da177e4SLinus Torvalds 5232edc1a38SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_IP_INHDR); 5241da177e4SLinus Torvalds return -ETIMEDOUT; 5251da177e4SLinus Torvalds } 5261da177e4SLinus Torvalds 527fbea49e1SYOSHIFUJI Hideaki /* XXX: idev->cnf.proxy_ndp? */ 52853b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->proxy_ndp && 5298a3edd80SDaniel Lezcano pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) { 53074553b09SVille Nuorvala int proxied = ip6_forward_proxy_check(skb); 53146c7655fSKangmin Park if (proxied > 0) { 53246c7655fSKangmin Park hdr->hop_limit--; 533e21e0b5fSVille Nuorvala return ip6_input(skb); 53446c7655fSKangmin Park } else if (proxied < 0) { 535bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 53674553b09SVille Nuorvala goto drop; 53774553b09SVille Nuorvala } 538e21e0b5fSVille Nuorvala } 539e21e0b5fSVille Nuorvala 5401da177e4SLinus Torvalds if (!xfrm6_route_forward(skb)) { 541bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 5422edc1a38SMenglong Dong SKB_DR_SET(reason, XFRM_POLICY); 5431da177e4SLinus Torvalds goto drop; 5441da177e4SLinus Torvalds } 545adf30907SEric Dumazet dst = skb_dst(skb); 5461da177e4SLinus Torvalds 5471da177e4SLinus Torvalds /* IPv6 specs say nothing about it, but it is clear that we cannot 5481da177e4SLinus Torvalds send redirects to source routed frames. 5491e5dc146SMasahide NAKAMURA We don't send redirects to frames decapsulated from IPsec. 5501da177e4SLinus Torvalds */ 5512f17becfSStephen Suryaputra if (IP6CB(skb)->iif == dst->dev->ifindex && 5522f17becfSStephen Suryaputra opt->srcrt == 0 && !skb_sec_path(skb)) { 5531da177e4SLinus Torvalds struct in6_addr *target = NULL; 554fbfe95a4SDavid S. Miller struct inet_peer *peer; 5551da177e4SLinus Torvalds struct rt6_info *rt; 5561da177e4SLinus Torvalds 5571da177e4SLinus Torvalds /* 5581da177e4SLinus Torvalds * incoming and outgoing devices are the same 5591da177e4SLinus Torvalds * send a redirect. 5601da177e4SLinus Torvalds */ 5611da177e4SLinus Torvalds 5621da177e4SLinus Torvalds rt = (struct rt6_info *) dst; 563c45a3dfbSDavid S. Miller if (rt->rt6i_flags & RTF_GATEWAY) 564c45a3dfbSDavid S. Miller target = &rt->rt6i_gateway; 5651da177e4SLinus Torvalds else 5661da177e4SLinus Torvalds target = &hdr->daddr; 5671da177e4SLinus Torvalds 568fd0273d7SMartin KaFai Lau peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1); 56992d86829SDavid S. Miller 5701da177e4SLinus Torvalds /* Limit redirects both by destination (here) 5711da177e4SLinus Torvalds and by source (inside ndisc_send_redirect) 5721da177e4SLinus Torvalds */ 573fbfe95a4SDavid S. Miller if (inet_peer_xrlim_allow(peer, 1*HZ)) 5744991969aSDavid S. Miller ndisc_send_redirect(skb, target); 5751d861aa4SDavid S. Miller if (peer) 5761d861aa4SDavid S. Miller inet_putpeer(peer); 5775bb1ab09SDavid L Stevens } else { 5785bb1ab09SDavid L Stevens int addrtype = ipv6_addr_type(&hdr->saddr); 5795bb1ab09SDavid L Stevens 5801da177e4SLinus Torvalds /* This check is security critical. */ 581f81b2e7dSYOSHIFUJI Hideaki if (addrtype == IPV6_ADDR_ANY || 582f81b2e7dSYOSHIFUJI Hideaki addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK)) 5831da177e4SLinus Torvalds goto error; 5845bb1ab09SDavid L Stevens if (addrtype & IPV6_ADDR_LINKLOCAL) { 5855bb1ab09SDavid L Stevens icmpv6_send(skb, ICMPV6_DEST_UNREACH, 5863ffe533cSAlexey Dobriyan ICMPV6_NOT_NEIGHBOUR, 0); 5875bb1ab09SDavid L Stevens goto error; 5885bb1ab09SDavid L Stevens } 5891da177e4SLinus Torvalds } 5901da177e4SLinus Torvalds 591427faee1SVadim Fedorenko mtu = ip6_dst_mtu_maybe_forward(dst, true); 59214f3ad6fSUlrich Weber if (mtu < IPV6_MIN_MTU) 59314f3ad6fSUlrich Weber mtu = IPV6_MIN_MTU; 59414f3ad6fSUlrich Weber 595fe6cc55fSFlorian Westphal if (ip6_pkt_too_big(skb, mtu)) { 5961da177e4SLinus Torvalds /* Again, force OUTPUT device used as source address */ 5971da177e4SLinus Torvalds skb->dev = dst->dev; 59814f3ad6fSUlrich Weber icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 599bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS); 6001d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 60115c77d8bSEric Dumazet IPSTATS_MIB_FRAGFAILS); 6022edc1a38SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_PKT_TOO_BIG); 6031da177e4SLinus Torvalds return -EMSGSIZE; 6041da177e4SLinus Torvalds } 6051da177e4SLinus Torvalds 6061da177e4SLinus Torvalds if (skb_cow(skb, dst->dev->hard_header_len)) { 6071d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 60815c77d8bSEric Dumazet IPSTATS_MIB_OUTDISCARDS); 6091da177e4SLinus Torvalds goto drop; 6101da177e4SLinus Torvalds } 6111da177e4SLinus Torvalds 6120660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 6131da177e4SLinus Torvalds 6141da177e4SLinus Torvalds /* Mangling hops number delayed to point after skb COW */ 6151da177e4SLinus Torvalds 6161da177e4SLinus Torvalds hdr->hop_limit--; 6171da177e4SLinus Torvalds 61829a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, 61929a26a56SEric W. Biederman net, NULL, skb, skb->dev, dst->dev, 6206e23ae2aSPatrick McHardy ip6_forward_finish); 6211da177e4SLinus Torvalds 6221da177e4SLinus Torvalds error: 623bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS); 6242edc1a38SMenglong Dong SKB_DR_SET(reason, IP_INADDRERRORS); 6251da177e4SLinus Torvalds drop: 6262edc1a38SMenglong Dong kfree_skb_reason(skb, reason); 6271da177e4SLinus Torvalds return -EINVAL; 6281da177e4SLinus Torvalds } 6291da177e4SLinus Torvalds 6301da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from) 6311da177e4SLinus Torvalds { 6321da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 6331da177e4SLinus Torvalds to->priority = from->priority; 6341da177e4SLinus Torvalds to->protocol = from->protocol; 635adf30907SEric Dumazet skb_dst_drop(to); 636adf30907SEric Dumazet skb_dst_set(to, dst_clone(skb_dst(from))); 6371da177e4SLinus Torvalds to->dev = from->dev; 63882e91ffeSThomas Graf to->mark = from->mark; 6391da177e4SLinus Torvalds 6403dd1c9a1SPaolo Abeni skb_copy_hash(to, from); 6413dd1c9a1SPaolo Abeni 6421da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 6431da177e4SLinus Torvalds to->tc_index = from->tc_index; 6441da177e4SLinus Torvalds #endif 645e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 646df5042f4SFlorian Westphal skb_ext_copy(to, from); 647984bc16cSJames Morris skb_copy_secmark(to, from); 6481da177e4SLinus Torvalds } 6491da177e4SLinus Torvalds 6500feca619SPablo Neira Ayuso int ip6_fraglist_init(struct sk_buff *skb, unsigned int hlen, u8 *prevhdr, 6510feca619SPablo Neira Ayuso u8 nexthdr, __be32 frag_id, 6520feca619SPablo Neira Ayuso struct ip6_fraglist_iter *iter) 6530feca619SPablo Neira Ayuso { 6540feca619SPablo Neira Ayuso unsigned int first_len; 6550feca619SPablo Neira Ayuso struct frag_hdr *fh; 6560feca619SPablo Neira Ayuso 6570feca619SPablo Neira Ayuso /* BUILD HEADER */ 6580feca619SPablo Neira Ayuso *prevhdr = NEXTHDR_FRAGMENT; 6590feca619SPablo Neira Ayuso iter->tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC); 6600feca619SPablo Neira Ayuso if (!iter->tmp_hdr) 6610feca619SPablo Neira Ayuso return -ENOMEM; 6620feca619SPablo Neira Ayuso 663b7034146SEric Dumazet iter->frag = skb_shinfo(skb)->frag_list; 6640feca619SPablo Neira Ayuso skb_frag_list_init(skb); 6650feca619SPablo Neira Ayuso 6660feca619SPablo Neira Ayuso iter->offset = 0; 6670feca619SPablo Neira Ayuso iter->hlen = hlen; 6680feca619SPablo Neira Ayuso iter->frag_id = frag_id; 6690feca619SPablo Neira Ayuso iter->nexthdr = nexthdr; 6700feca619SPablo Neira Ayuso 6710feca619SPablo Neira Ayuso __skb_pull(skb, hlen); 6720feca619SPablo Neira Ayuso fh = __skb_push(skb, sizeof(struct frag_hdr)); 6730feca619SPablo Neira Ayuso __skb_push(skb, hlen); 6740feca619SPablo Neira Ayuso skb_reset_network_header(skb); 6750feca619SPablo Neira Ayuso memcpy(skb_network_header(skb), iter->tmp_hdr, hlen); 6760feca619SPablo Neira Ayuso 6770feca619SPablo Neira Ayuso fh->nexthdr = nexthdr; 6780feca619SPablo Neira Ayuso fh->reserved = 0; 6790feca619SPablo Neira Ayuso fh->frag_off = htons(IP6_MF); 6800feca619SPablo Neira Ayuso fh->identification = frag_id; 6810feca619SPablo Neira Ayuso 6820feca619SPablo Neira Ayuso first_len = skb_pagelen(skb); 6830feca619SPablo Neira Ayuso skb->data_len = first_len - skb_headlen(skb); 6840feca619SPablo Neira Ayuso skb->len = first_len; 6850feca619SPablo Neira Ayuso ipv6_hdr(skb)->payload_len = htons(first_len - sizeof(struct ipv6hdr)); 6860feca619SPablo Neira Ayuso 6870feca619SPablo Neira Ayuso return 0; 6880feca619SPablo Neira Ayuso } 6890feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_init); 6900feca619SPablo Neira Ayuso 6910feca619SPablo Neira Ayuso void ip6_fraglist_prepare(struct sk_buff *skb, 6920feca619SPablo Neira Ayuso struct ip6_fraglist_iter *iter) 6930feca619SPablo Neira Ayuso { 6940feca619SPablo Neira Ayuso struct sk_buff *frag = iter->frag; 6950feca619SPablo Neira Ayuso unsigned int hlen = iter->hlen; 6960feca619SPablo Neira Ayuso struct frag_hdr *fh; 6970feca619SPablo Neira Ayuso 6980feca619SPablo Neira Ayuso frag->ip_summed = CHECKSUM_NONE; 6990feca619SPablo Neira Ayuso skb_reset_transport_header(frag); 7000feca619SPablo Neira Ayuso fh = __skb_push(frag, sizeof(struct frag_hdr)); 7010feca619SPablo Neira Ayuso __skb_push(frag, hlen); 7020feca619SPablo Neira Ayuso skb_reset_network_header(frag); 7030feca619SPablo Neira Ayuso memcpy(skb_network_header(frag), iter->tmp_hdr, hlen); 7040feca619SPablo Neira Ayuso iter->offset += skb->len - hlen - sizeof(struct frag_hdr); 7050feca619SPablo Neira Ayuso fh->nexthdr = iter->nexthdr; 7060feca619SPablo Neira Ayuso fh->reserved = 0; 7070feca619SPablo Neira Ayuso fh->frag_off = htons(iter->offset); 7080feca619SPablo Neira Ayuso if (frag->next) 7090feca619SPablo Neira Ayuso fh->frag_off |= htons(IP6_MF); 7100feca619SPablo Neira Ayuso fh->identification = iter->frag_id; 7110feca619SPablo Neira Ayuso ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr)); 7120feca619SPablo Neira Ayuso ip6_copy_metadata(frag, skb); 7130feca619SPablo Neira Ayuso } 7140feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_prepare); 7150feca619SPablo Neira Ayuso 7168a6a1f17SPablo Neira Ayuso void ip6_frag_init(struct sk_buff *skb, unsigned int hlen, unsigned int mtu, 7178a6a1f17SPablo Neira Ayuso unsigned short needed_tailroom, int hdr_room, u8 *prevhdr, 7188a6a1f17SPablo Neira Ayuso u8 nexthdr, __be32 frag_id, struct ip6_frag_state *state) 7198a6a1f17SPablo Neira Ayuso { 7208a6a1f17SPablo Neira Ayuso state->prevhdr = prevhdr; 7218a6a1f17SPablo Neira Ayuso state->nexthdr = nexthdr; 7228a6a1f17SPablo Neira Ayuso state->frag_id = frag_id; 7238a6a1f17SPablo Neira Ayuso 7248a6a1f17SPablo Neira Ayuso state->hlen = hlen; 7258a6a1f17SPablo Neira Ayuso state->mtu = mtu; 7268a6a1f17SPablo Neira Ayuso 7278a6a1f17SPablo Neira Ayuso state->left = skb->len - hlen; /* Space per frame */ 7288a6a1f17SPablo Neira Ayuso state->ptr = hlen; /* Where to start from */ 7298a6a1f17SPablo Neira Ayuso 7308a6a1f17SPablo Neira Ayuso state->hroom = hdr_room; 7318a6a1f17SPablo Neira Ayuso state->troom = needed_tailroom; 7328a6a1f17SPablo Neira Ayuso 7338a6a1f17SPablo Neira Ayuso state->offset = 0; 7348a6a1f17SPablo Neira Ayuso } 7358a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_init); 7368a6a1f17SPablo Neira Ayuso 7378a6a1f17SPablo Neira Ayuso struct sk_buff *ip6_frag_next(struct sk_buff *skb, struct ip6_frag_state *state) 7388a6a1f17SPablo Neira Ayuso { 7398a6a1f17SPablo Neira Ayuso u8 *prevhdr = state->prevhdr, *fragnexthdr_offset; 7408a6a1f17SPablo Neira Ayuso struct sk_buff *frag; 7418a6a1f17SPablo Neira Ayuso struct frag_hdr *fh; 7428a6a1f17SPablo Neira Ayuso unsigned int len; 7438a6a1f17SPablo Neira Ayuso 7448a6a1f17SPablo Neira Ayuso len = state->left; 7458a6a1f17SPablo Neira Ayuso /* IF: it doesn't fit, use 'mtu' - the data space left */ 7468a6a1f17SPablo Neira Ayuso if (len > state->mtu) 7478a6a1f17SPablo Neira Ayuso len = state->mtu; 7488a6a1f17SPablo Neira Ayuso /* IF: we are not sending up to and including the packet end 7498a6a1f17SPablo Neira Ayuso then align the next start on an eight byte boundary */ 7508a6a1f17SPablo Neira Ayuso if (len < state->left) 7518a6a1f17SPablo Neira Ayuso len &= ~7; 7528a6a1f17SPablo Neira Ayuso 7538a6a1f17SPablo Neira Ayuso /* Allocate buffer */ 7548a6a1f17SPablo Neira Ayuso frag = alloc_skb(len + state->hlen + sizeof(struct frag_hdr) + 7558a6a1f17SPablo Neira Ayuso state->hroom + state->troom, GFP_ATOMIC); 7568a6a1f17SPablo Neira Ayuso if (!frag) 7578a6a1f17SPablo Neira Ayuso return ERR_PTR(-ENOMEM); 7588a6a1f17SPablo Neira Ayuso 7598a6a1f17SPablo Neira Ayuso /* 7608a6a1f17SPablo Neira Ayuso * Set up data on packet 7618a6a1f17SPablo Neira Ayuso */ 7628a6a1f17SPablo Neira Ayuso 7638a6a1f17SPablo Neira Ayuso ip6_copy_metadata(frag, skb); 7648a6a1f17SPablo Neira Ayuso skb_reserve(frag, state->hroom); 7658a6a1f17SPablo Neira Ayuso skb_put(frag, len + state->hlen + sizeof(struct frag_hdr)); 7668a6a1f17SPablo Neira Ayuso skb_reset_network_header(frag); 7678a6a1f17SPablo Neira Ayuso fh = (struct frag_hdr *)(skb_network_header(frag) + state->hlen); 7688a6a1f17SPablo Neira Ayuso frag->transport_header = (frag->network_header + state->hlen + 7698a6a1f17SPablo Neira Ayuso sizeof(struct frag_hdr)); 7708a6a1f17SPablo Neira Ayuso 7718a6a1f17SPablo Neira Ayuso /* 7728a6a1f17SPablo Neira Ayuso * Charge the memory for the fragment to any owner 7738a6a1f17SPablo Neira Ayuso * it might possess 7748a6a1f17SPablo Neira Ayuso */ 7758a6a1f17SPablo Neira Ayuso if (skb->sk) 7768a6a1f17SPablo Neira Ayuso skb_set_owner_w(frag, skb->sk); 7778a6a1f17SPablo Neira Ayuso 7788a6a1f17SPablo Neira Ayuso /* 7798a6a1f17SPablo Neira Ayuso * Copy the packet header into the new buffer. 7808a6a1f17SPablo Neira Ayuso */ 7818a6a1f17SPablo Neira Ayuso skb_copy_from_linear_data(skb, skb_network_header(frag), state->hlen); 7828a6a1f17SPablo Neira Ayuso 7838a6a1f17SPablo Neira Ayuso fragnexthdr_offset = skb_network_header(frag); 7848a6a1f17SPablo Neira Ayuso fragnexthdr_offset += prevhdr - skb_network_header(skb); 7858a6a1f17SPablo Neira Ayuso *fragnexthdr_offset = NEXTHDR_FRAGMENT; 7868a6a1f17SPablo Neira Ayuso 7878a6a1f17SPablo Neira Ayuso /* 7888a6a1f17SPablo Neira Ayuso * Build fragment header. 7898a6a1f17SPablo Neira Ayuso */ 7908a6a1f17SPablo Neira Ayuso fh->nexthdr = state->nexthdr; 7918a6a1f17SPablo Neira Ayuso fh->reserved = 0; 7928a6a1f17SPablo Neira Ayuso fh->identification = state->frag_id; 7938a6a1f17SPablo Neira Ayuso 7948a6a1f17SPablo Neira Ayuso /* 7958a6a1f17SPablo Neira Ayuso * Copy a block of the IP datagram. 7968a6a1f17SPablo Neira Ayuso */ 7978a6a1f17SPablo Neira Ayuso BUG_ON(skb_copy_bits(skb, state->ptr, skb_transport_header(frag), 7988a6a1f17SPablo Neira Ayuso len)); 7998a6a1f17SPablo Neira Ayuso state->left -= len; 8008a6a1f17SPablo Neira Ayuso 8018a6a1f17SPablo Neira Ayuso fh->frag_off = htons(state->offset); 8028a6a1f17SPablo Neira Ayuso if (state->left > 0) 8038a6a1f17SPablo Neira Ayuso fh->frag_off |= htons(IP6_MF); 8048a6a1f17SPablo Neira Ayuso ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr)); 8058a6a1f17SPablo Neira Ayuso 8068a6a1f17SPablo Neira Ayuso state->ptr += len; 8078a6a1f17SPablo Neira Ayuso state->offset += len; 8088a6a1f17SPablo Neira Ayuso 8098a6a1f17SPablo Neira Ayuso return frag; 8108a6a1f17SPablo Neira Ayuso } 8118a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_next); 8128a6a1f17SPablo Neira Ayuso 8137d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, 8147d8c6e39SEric W. Biederman int (*output)(struct net *, struct sock *, struct sk_buff *)) 8151da177e4SLinus Torvalds { 8161da177e4SLinus Torvalds struct sk_buff *frag; 817adf30907SEric Dumazet struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 818f60e5990Shannes@stressinduktion.org struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? 819f60e5990Shannes@stressinduktion.org inet6_sk(skb->sk) : NULL; 820a1ac9c8aSMartin KaFai Lau bool mono_delivery_time = skb->mono_delivery_time; 8218a6a1f17SPablo Neira Ayuso struct ip6_frag_state state; 8228a6a1f17SPablo Neira Ayuso unsigned int mtu, hlen, nexthdr_offset; 8239669fffcSEric Dumazet ktime_t tstamp = skb->tstamp; 8248a6a1f17SPablo Neira Ayuso int hroom, err = 0; 825286c2349SMartin KaFai Lau __be32 frag_id; 8261da177e4SLinus Torvalds u8 *prevhdr, nexthdr = 0; 8271da177e4SLinus Torvalds 8287dd7eb95SDavid S. Miller err = ip6_find_1stfragopt(skb, &prevhdr); 8297dd7eb95SDavid S. Miller if (err < 0) 8302423496aSCraig Gallek goto fail; 8317dd7eb95SDavid S. Miller hlen = err; 8321da177e4SLinus Torvalds nexthdr = *prevhdr; 833ef0efcd3SJunwei Hu nexthdr_offset = prevhdr - skb_network_header(skb); 8341da177e4SLinus Torvalds 835628a5c56SJohn Heffner mtu = ip6_skb_dst_mtu(skb); 836b881ef76SJohn Heffner 837b881ef76SJohn Heffner /* We must not fragment if the socket is set to force MTU discovery 83814f3ad6fSUlrich Weber * or if the skb it not generated by a local socket. 839b881ef76SJohn Heffner */ 840485fca66SFlorian Westphal if (unlikely(!skb->ignore_df && skb->len > mtu)) 841485fca66SFlorian Westphal goto fail_toobig; 842a34a101eSEric Dumazet 843485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size) { 844485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size > mtu) 845485fca66SFlorian Westphal goto fail_toobig; 846485fca66SFlorian Westphal 847485fca66SFlorian Westphal /* don't send fragments larger than what we received */ 848485fca66SFlorian Westphal mtu = IP6CB(skb)->frag_max_size; 849485fca66SFlorian Westphal if (mtu < IPV6_MIN_MTU) 850485fca66SFlorian Westphal mtu = IPV6_MIN_MTU; 851b881ef76SJohn Heffner } 852b881ef76SJohn Heffner 853d91675f9SYOSHIFUJI Hideaki if (np && np->frag_size < mtu) { 854d91675f9SYOSHIFUJI Hideaki if (np->frag_size) 855d91675f9SYOSHIFUJI Hideaki mtu = np->frag_size; 856d91675f9SYOSHIFUJI Hideaki } 85789bc7848SHannes Frederic Sowa if (mtu < hlen + sizeof(struct frag_hdr) + 8) 858b72a2b01SHannes Frederic Sowa goto fail_toobig; 8591e0d69a9SHannes Frederic Sowa mtu -= hlen + sizeof(struct frag_hdr); 8601da177e4SLinus Torvalds 861fd0273d7SMartin KaFai Lau frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr, 862fd0273d7SMartin KaFai Lau &ipv6_hdr(skb)->saddr); 863286c2349SMartin KaFai Lau 864405c92f7SHannes Frederic Sowa if (skb->ip_summed == CHECKSUM_PARTIAL && 865405c92f7SHannes Frederic Sowa (err = skb_checksum_help(skb))) 866405c92f7SHannes Frederic Sowa goto fail; 867405c92f7SHannes Frederic Sowa 868ef0efcd3SJunwei Hu prevhdr = skb_network_header(skb) + nexthdr_offset; 8691d325d21SFlorian Westphal hroom = LL_RESERVED_SPACE(rt->dst.dev); 87021dc3301SDavid S. Miller if (skb_has_frag_list(skb)) { 871c72d8cdaSAlexey Dobriyan unsigned int first_len = skb_pagelen(skb); 8720feca619SPablo Neira Ayuso struct ip6_fraglist_iter iter; 8733d13008eSEric Dumazet struct sk_buff *frag2; 8741da177e4SLinus Torvalds 8751da177e4SLinus Torvalds if (first_len - hlen > mtu || 8761da177e4SLinus Torvalds ((first_len - hlen) & 7) || 8771d325d21SFlorian Westphal skb_cloned(skb) || 8781d325d21SFlorian Westphal skb_headroom(skb) < (hroom + sizeof(struct frag_hdr))) 8791da177e4SLinus Torvalds goto slow_path; 8801da177e4SLinus Torvalds 8814d9092bbSDavid S. Miller skb_walk_frags(skb, frag) { 8821da177e4SLinus Torvalds /* Correct geometry. */ 8831da177e4SLinus Torvalds if (frag->len > mtu || 8841da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 8851d325d21SFlorian Westphal skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr))) 8863d13008eSEric Dumazet goto slow_path_clean; 8871da177e4SLinus Torvalds 8881da177e4SLinus Torvalds /* Partially cloned skb? */ 8891da177e4SLinus Torvalds if (skb_shared(frag)) 8903d13008eSEric Dumazet goto slow_path_clean; 8912fdba6b0SHerbert Xu 8922fdba6b0SHerbert Xu BUG_ON(frag->sk); 8932fdba6b0SHerbert Xu if (skb->sk) { 8942fdba6b0SHerbert Xu frag->sk = skb->sk; 8952fdba6b0SHerbert Xu frag->destructor = sock_wfree; 8962fdba6b0SHerbert Xu } 8973d13008eSEric Dumazet skb->truesize -= frag->truesize; 8981da177e4SLinus Torvalds } 8991da177e4SLinus Torvalds 9000feca619SPablo Neira Ayuso err = ip6_fraglist_init(skb, hlen, prevhdr, nexthdr, frag_id, 9010feca619SPablo Neira Ayuso &iter); 9020feca619SPablo Neira Ayuso if (err < 0) 9031d325d21SFlorian Westphal goto fail; 9041da177e4SLinus Torvalds 9051da177e4SLinus Torvalds for (;;) { 9061da177e4SLinus Torvalds /* Prepare header of the next frame, 9071da177e4SLinus Torvalds * before previous one went down. */ 9080feca619SPablo Neira Ayuso if (iter.frag) 9090feca619SPablo Neira Ayuso ip6_fraglist_prepare(skb, &iter); 9101da177e4SLinus Torvalds 911a1ac9c8aSMartin KaFai Lau skb_set_delivery_time(skb, tstamp, mono_delivery_time); 9127d8c6e39SEric W. Biederman err = output(net, sk, skb); 913dafee490SWei Dong if (!err) 914d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9153bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 916dafee490SWei Dong 9170feca619SPablo Neira Ayuso if (err || !iter.frag) 9181da177e4SLinus Torvalds break; 9191da177e4SLinus Torvalds 9200feca619SPablo Neira Ayuso skb = ip6_fraglist_next(&iter); 9211da177e4SLinus Torvalds } 9221da177e4SLinus Torvalds 9230feca619SPablo Neira Ayuso kfree(iter.tmp_hdr); 9241da177e4SLinus Torvalds 9251da177e4SLinus Torvalds if (err == 0) { 926d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9273bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGOKS); 9281da177e4SLinus Torvalds return 0; 9291da177e4SLinus Torvalds } 9301da177e4SLinus Torvalds 931b7034146SEric Dumazet kfree_skb_list(iter.frag); 9321da177e4SLinus Torvalds 933d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9343bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 9351da177e4SLinus Torvalds return err; 9363d13008eSEric Dumazet 9373d13008eSEric Dumazet slow_path_clean: 9383d13008eSEric Dumazet skb_walk_frags(skb, frag2) { 9393d13008eSEric Dumazet if (frag2 == frag) 9403d13008eSEric Dumazet break; 9413d13008eSEric Dumazet frag2->sk = NULL; 9423d13008eSEric Dumazet frag2->destructor = NULL; 9433d13008eSEric Dumazet skb->truesize += frag2->truesize; 9443d13008eSEric Dumazet } 9451da177e4SLinus Torvalds } 9461da177e4SLinus Torvalds 9471da177e4SLinus Torvalds slow_path: 9481da177e4SLinus Torvalds /* 9491da177e4SLinus Torvalds * Fragment the datagram. 9501da177e4SLinus Torvalds */ 9511da177e4SLinus Torvalds 9528a6a1f17SPablo Neira Ayuso ip6_frag_init(skb, hlen, mtu, rt->dst.dev->needed_tailroom, 9538a6a1f17SPablo Neira Ayuso LL_RESERVED_SPACE(rt->dst.dev), prevhdr, nexthdr, frag_id, 9548a6a1f17SPablo Neira Ayuso &state); 9551da177e4SLinus Torvalds 9561da177e4SLinus Torvalds /* 9571da177e4SLinus Torvalds * Keep copying data until we run out. 9581da177e4SLinus Torvalds */ 95979e49503SFlorian Westphal 9608a6a1f17SPablo Neira Ayuso while (state.left > 0) { 9618a6a1f17SPablo Neira Ayuso frag = ip6_frag_next(skb, &state); 9628a6a1f17SPablo Neira Ayuso if (IS_ERR(frag)) { 9638a6a1f17SPablo Neira Ayuso err = PTR_ERR(frag); 9641da177e4SLinus Torvalds goto fail; 9651da177e4SLinus Torvalds } 9661da177e4SLinus Torvalds 9671da177e4SLinus Torvalds /* 9681da177e4SLinus Torvalds * Put this fragment into the sending queue. 9691da177e4SLinus Torvalds */ 970a1ac9c8aSMartin KaFai Lau skb_set_delivery_time(frag, tstamp, mono_delivery_time); 9717d8c6e39SEric W. Biederman err = output(net, sk, frag); 9721da177e4SLinus Torvalds if (err) 9731da177e4SLinus Torvalds goto fail; 974dafee490SWei Dong 975adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 9763bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 9771da177e4SLinus Torvalds } 978adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 979a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGOKS); 980808db80aSEric Dumazet consume_skb(skb); 9811da177e4SLinus Torvalds return err; 9821da177e4SLinus Torvalds 983485fca66SFlorian Westphal fail_toobig: 984485fca66SFlorian Westphal if (skb->sk && dst_allfrag(skb_dst(skb))) 985aba54656SEric Dumazet sk_gso_disable(skb->sk); 986485fca66SFlorian Westphal 987485fca66SFlorian Westphal icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 988485fca66SFlorian Westphal err = -EMSGSIZE; 989485fca66SFlorian Westphal 9901da177e4SLinus Torvalds fail: 991adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 992a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 9931da177e4SLinus Torvalds kfree_skb(skb); 9941da177e4SLinus Torvalds return err; 9951da177e4SLinus Torvalds } 9961da177e4SLinus Torvalds 997b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key, 998b71d1d42SEric Dumazet const struct in6_addr *fl_addr, 999b71d1d42SEric Dumazet const struct in6_addr *addr_cache) 1000cf6b1982SYOSHIFUJI Hideaki { 1001a02cec21SEric Dumazet return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) && 100263159f29SIan Morris (!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache)); 1003cf6b1982SYOSHIFUJI Hideaki } 1004cf6b1982SYOSHIFUJI Hideaki 1005497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk, 1006497c615aSHerbert Xu struct dst_entry *dst, 1007b71d1d42SEric Dumazet const struct flowi6 *fl6) 10081da177e4SLinus Torvalds { 10091da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 1010a963a37dSEric Dumazet struct rt6_info *rt; 10111da177e4SLinus Torvalds 1012497c615aSHerbert Xu if (!dst) 1013497c615aSHerbert Xu goto out; 10141da177e4SLinus Torvalds 1015a963a37dSEric Dumazet if (dst->ops->family != AF_INET6) { 1016a963a37dSEric Dumazet dst_release(dst); 1017a963a37dSEric Dumazet return NULL; 1018a963a37dSEric Dumazet } 1019a963a37dSEric Dumazet 1020a963a37dSEric Dumazet rt = (struct rt6_info *)dst; 10211da177e4SLinus Torvalds /* Yes, checking route validity in not connected 1022d76e60a5SDavid S. Miller * case is not very simple. Take into account, 1023d76e60a5SDavid S. Miller * that we do not support routing by source, TOS, 1024d76e60a5SDavid S. Miller * and MSG_DONTROUTE --ANK (980726) 1025d76e60a5SDavid S. Miller * 1026cf6b1982SYOSHIFUJI Hideaki * 1. ip6_rt_check(): If route was host route, 1027cf6b1982SYOSHIFUJI Hideaki * check that cached destination is current. 1028d76e60a5SDavid S. Miller * If it is network route, we still may 1029d76e60a5SDavid S. Miller * check its validity using saved pointer 1030d76e60a5SDavid S. Miller * to the last used address: daddr_cache. 1031d76e60a5SDavid S. Miller * We do not want to save whole address now, 1032d76e60a5SDavid S. Miller * (because main consumer of this service 1033d76e60a5SDavid S. Miller * is tcp, which has not this problem), 1034d76e60a5SDavid S. Miller * so that the last trick works only on connected 1035d76e60a5SDavid S. Miller * sockets. 1036d76e60a5SDavid S. Miller * 2. oif also should be the same. 10371da177e4SLinus Torvalds */ 10384c9483b2SDavid S. Miller if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) || 10398e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES 10404c9483b2SDavid S. Miller ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) || 10418e1ef0a9SYOSHIFUJI Hideaki #endif 104240867d74SDavid Ahern (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex)) { 1043497c615aSHerbert Xu dst_release(dst); 1044497c615aSHerbert Xu dst = NULL; 10451da177e4SLinus Torvalds } 1046497c615aSHerbert Xu 1047497c615aSHerbert Xu out: 1048497c615aSHerbert Xu return dst; 10491da177e4SLinus Torvalds } 1050497c615aSHerbert Xu 10513aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, 10524c9483b2SDavid S. Miller struct dst_entry **dst, struct flowi6 *fl6) 1053497c615aSHerbert Xu { 105469cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 105569cce1d1SDavid S. Miller struct neighbour *n; 105697cac082SDavid S. Miller struct rt6_info *rt; 105769cce1d1SDavid S. Miller #endif 105869cce1d1SDavid S. Miller int err; 10596f21c96aSPaolo Abeni int flags = 0; 10601da177e4SLinus Torvalds 1061e16e888bSMarkus Stenberg /* The correct way to handle this would be to do 1062e16e888bSMarkus Stenberg * ip6_route_get_saddr, and then ip6_route_output; however, 1063e16e888bSMarkus Stenberg * the route-specific preferred source forces the 1064e16e888bSMarkus Stenberg * ip6_route_output call _before_ ip6_route_get_saddr. 1065e16e888bSMarkus Stenberg * 1066e16e888bSMarkus Stenberg * In source specific routing (no src=any default route), 1067e16e888bSMarkus Stenberg * ip6_route_output will fail given src=any saddr, though, so 1068e16e888bSMarkus Stenberg * that's why we try it again later. 1069e16e888bSMarkus Stenberg */ 1070c305b9e6Szhang kai if (ipv6_addr_any(&fl6->saddr)) { 1071a68886a6SDavid Ahern struct fib6_info *from; 1072e16e888bSMarkus Stenberg struct rt6_info *rt; 1073e16e888bSMarkus Stenberg 1074e16e888bSMarkus Stenberg *dst = ip6_route_output(net, sk, fl6); 1075e16e888bSMarkus Stenberg rt = (*dst)->error ? NULL : (struct rt6_info *)*dst; 1076a68886a6SDavid Ahern 1077a68886a6SDavid Ahern rcu_read_lock(); 1078a68886a6SDavid Ahern from = rt ? rcu_dereference(rt->from) : NULL; 1079a68886a6SDavid Ahern err = ip6_route_get_saddr(net, from, &fl6->daddr, 1080e16e888bSMarkus Stenberg sk ? inet6_sk(sk)->srcprefs : 0, 1081e16e888bSMarkus Stenberg &fl6->saddr); 1082a68886a6SDavid Ahern rcu_read_unlock(); 1083a68886a6SDavid Ahern 1084e16e888bSMarkus Stenberg if (err) 1085e16e888bSMarkus Stenberg goto out_err_release; 1086e16e888bSMarkus Stenberg 1087e16e888bSMarkus Stenberg /* If we had an erroneous initial result, pretend it 1088e16e888bSMarkus Stenberg * never existed and let the SA-enabled version take 1089e16e888bSMarkus Stenberg * over. 1090e16e888bSMarkus Stenberg */ 1091c305b9e6Szhang kai if ((*dst)->error) { 1092e16e888bSMarkus Stenberg dst_release(*dst); 1093e16e888bSMarkus Stenberg *dst = NULL; 1094e16e888bSMarkus Stenberg } 10956f21c96aSPaolo Abeni 10966f21c96aSPaolo Abeni if (fl6->flowi6_oif) 10976f21c96aSPaolo Abeni flags |= RT6_LOOKUP_F_IFACE; 1098e16e888bSMarkus Stenberg } 1099e16e888bSMarkus Stenberg 110063159f29SIan Morris if (!*dst) 11016f21c96aSPaolo Abeni *dst = ip6_route_output_flags(net, sk, fl6, flags); 11021da177e4SLinus Torvalds 1103e5d08d71SIan Morris err = (*dst)->error; 1104e5d08d71SIan Morris if (err) 11051da177e4SLinus Torvalds goto out_err_release; 11061da177e4SLinus Torvalds 110795c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 110895c385b4SNeil Horman /* 110995c385b4SNeil Horman * Here if the dst entry we've looked up 111095c385b4SNeil Horman * has a neighbour entry that is in the INCOMPLETE 111195c385b4SNeil Horman * state and the src address from the flow is 111295c385b4SNeil Horman * marked as OPTIMISTIC, we release the found 111395c385b4SNeil Horman * dst entry and replace it instead with the 111495c385b4SNeil Horman * dst entry of the nexthop router 111595c385b4SNeil Horman */ 1116c56bf6feSEric Dumazet rt = (struct rt6_info *) *dst; 1117707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 11182647a9b0SMartin KaFai Lau n = __ipv6_neigh_lookup_noref(rt->dst.dev, 11192647a9b0SMartin KaFai Lau rt6_nexthop(rt, &fl6->daddr)); 1120707be1ffSYOSHIFUJI Hideaki / 吉藤英明 err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0; 1121707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1122707be1ffSYOSHIFUJI Hideaki / 吉藤英明 1123707be1ffSYOSHIFUJI Hideaki / 吉藤英明 if (err) { 112495c385b4SNeil Horman struct inet6_ifaddr *ifp; 11254c9483b2SDavid S. Miller struct flowi6 fl_gw6; 112695c385b4SNeil Horman int redirect; 112795c385b4SNeil Horman 11284c9483b2SDavid S. Miller ifp = ipv6_get_ifaddr(net, &fl6->saddr, 11291cab3da6SDaniel Lezcano (*dst)->dev, 1); 113095c385b4SNeil Horman 113195c385b4SNeil Horman redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC); 113295c385b4SNeil Horman if (ifp) 113395c385b4SNeil Horman in6_ifa_put(ifp); 113495c385b4SNeil Horman 113595c385b4SNeil Horman if (redirect) { 113695c385b4SNeil Horman /* 113795c385b4SNeil Horman * We need to get the dst entry for the 113895c385b4SNeil Horman * default router instead 113995c385b4SNeil Horman */ 114095c385b4SNeil Horman dst_release(*dst); 11414c9483b2SDavid S. Miller memcpy(&fl_gw6, fl6, sizeof(struct flowi6)); 11424c9483b2SDavid S. Miller memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr)); 11434c9483b2SDavid S. Miller *dst = ip6_route_output(net, sk, &fl_gw6); 1144e5d08d71SIan Morris err = (*dst)->error; 1145e5d08d71SIan Morris if (err) 114695c385b4SNeil Horman goto out_err_release; 114795c385b4SNeil Horman } 114895c385b4SNeil Horman } 114995c385b4SNeil Horman #endif 1150ec5e3b0aSJonathan T. Leighton if (ipv6_addr_v4mapped(&fl6->saddr) && 115100ea1ceeSWillem de Bruijn !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) { 115200ea1ceeSWillem de Bruijn err = -EAFNOSUPPORT; 115300ea1ceeSWillem de Bruijn goto out_err_release; 115400ea1ceeSWillem de Bruijn } 115595c385b4SNeil Horman 11561da177e4SLinus Torvalds return 0; 11571da177e4SLinus Torvalds 11581da177e4SLinus Torvalds out_err_release: 11591da177e4SLinus Torvalds dst_release(*dst); 11601da177e4SLinus Torvalds *dst = NULL; 11618a966fc0SDavid Ahern 11620d240e78SDavid Ahern if (err == -ENETUNREACH) 11630d240e78SDavid Ahern IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES); 11641da177e4SLinus Torvalds return err; 11651da177e4SLinus Torvalds } 116634a0b3cdSAdrian Bunk 1167497c615aSHerbert Xu /** 1168497c615aSHerbert Xu * ip6_dst_lookup - perform route lookup on flow 1169b51cd7c8SAndrew Lunn * @net: Network namespace to perform lookup in 1170497c615aSHerbert Xu * @sk: socket which provides route info 1171497c615aSHerbert Xu * @dst: pointer to dst_entry * for result 11724c9483b2SDavid S. Miller * @fl6: flow to lookup 1173497c615aSHerbert Xu * 1174497c615aSHerbert Xu * This function performs a route lookup on the given flow. 1175497c615aSHerbert Xu * 1176497c615aSHerbert Xu * It returns zero on success, or a standard errno code on error. 1177497c615aSHerbert Xu */ 1178343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst, 1179343d60aaSRoopa Prabhu struct flowi6 *fl6) 1180497c615aSHerbert Xu { 1181497c615aSHerbert Xu *dst = NULL; 1182343d60aaSRoopa Prabhu return ip6_dst_lookup_tail(net, sk, dst, fl6); 1183497c615aSHerbert Xu } 11843cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup); 11853cf3dc6cSArnaldo Carvalho de Melo 1186497c615aSHerbert Xu /** 118768d0c6d3SDavid S. Miller * ip6_dst_lookup_flow - perform route lookup on flow with ipsec 1188b51cd7c8SAndrew Lunn * @net: Network namespace to perform lookup in 118968d0c6d3SDavid S. Miller * @sk: socket which provides route info 11904c9483b2SDavid S. Miller * @fl6: flow to lookup 119168d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 119268d0c6d3SDavid S. Miller * 119368d0c6d3SDavid S. Miller * This function performs a route lookup on the given flow. 119468d0c6d3SDavid S. Miller * 119568d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 119668d0c6d3SDavid S. Miller * error code. 119768d0c6d3SDavid S. Miller */ 1198c4e85f73SSabrina Dubroca struct dst_entry *ip6_dst_lookup_flow(struct net *net, const struct sock *sk, struct flowi6 *fl6, 11990e0d44abSSteffen Klassert const struct in6_addr *final_dst) 120068d0c6d3SDavid S. Miller { 120168d0c6d3SDavid S. Miller struct dst_entry *dst = NULL; 120268d0c6d3SDavid S. Miller int err; 120368d0c6d3SDavid S. Miller 1204c4e85f73SSabrina Dubroca err = ip6_dst_lookup_tail(net, sk, &dst, fl6); 120568d0c6d3SDavid S. Miller if (err) 120668d0c6d3SDavid S. Miller return ERR_PTR(err); 120768d0c6d3SDavid S. Miller if (final_dst) 12084e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 12092774c131SDavid S. Miller 1210c4e85f73SSabrina Dubroca return xfrm_lookup_route(net, dst, flowi6_to_flowi(fl6), sk, 0); 121168d0c6d3SDavid S. Miller } 121268d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow); 121368d0c6d3SDavid S. Miller 121468d0c6d3SDavid S. Miller /** 121568d0c6d3SDavid S. Miller * ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow 121668d0c6d3SDavid S. Miller * @sk: socket which provides the dst cache and route info 12174c9483b2SDavid S. Miller * @fl6: flow to lookup 121868d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 121996818159SAlexey Kodanev * @connected: whether @sk is connected or not 1220497c615aSHerbert Xu * 1221497c615aSHerbert Xu * This function performs a route lookup on the given flow with the 1222497c615aSHerbert Xu * possibility of using the cached route in the socket if it is valid. 1223497c615aSHerbert Xu * It will take the socket dst lock when operating on the dst cache. 1224497c615aSHerbert Xu * As a result, this function can only be used in process context. 1225497c615aSHerbert Xu * 122696818159SAlexey Kodanev * In addition, for a connected socket, cache the dst in the socket 122796818159SAlexey Kodanev * if the current cache is not valid. 122896818159SAlexey Kodanev * 122968d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 123068d0c6d3SDavid S. Miller * error code. 1231497c615aSHerbert Xu */ 12324c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6, 123396818159SAlexey Kodanev const struct in6_addr *final_dst, 123496818159SAlexey Kodanev bool connected) 1235497c615aSHerbert Xu { 123668d0c6d3SDavid S. Miller struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie); 1237497c615aSHerbert Xu 12384c9483b2SDavid S. Miller dst = ip6_sk_dst_check(sk, dst, fl6); 123996818159SAlexey Kodanev if (dst) 124096818159SAlexey Kodanev return dst; 124196818159SAlexey Kodanev 1242c4e85f73SSabrina Dubroca dst = ip6_dst_lookup_flow(sock_net(sk), sk, fl6, final_dst); 124396818159SAlexey Kodanev if (connected && !IS_ERR(dst)) 124496818159SAlexey Kodanev ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6); 124568d0c6d3SDavid S. Miller 124600bc0ef5SJakub Sitnicki return dst; 124768d0c6d3SDavid S. Miller } 124868d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow); 1249497c615aSHerbert Xu 1250571912c6SMartin Varghese /** 1251571912c6SMartin Varghese * ip6_dst_lookup_tunnel - perform route lookup on tunnel 1252571912c6SMartin Varghese * @skb: Packet for which lookup is done 1253571912c6SMartin Varghese * @dev: Tunnel device 1254571912c6SMartin Varghese * @net: Network namespace of tunnel device 1255b51cd7c8SAndrew Lunn * @sock: Socket which provides route info 1256571912c6SMartin Varghese * @saddr: Memory to store the src ip address 1257571912c6SMartin Varghese * @info: Tunnel information 1258571912c6SMartin Varghese * @protocol: IP protocol 1259b51cd7c8SAndrew Lunn * @use_cache: Flag to enable cache usage 1260571912c6SMartin Varghese * This function performs a route lookup on a tunnel 1261571912c6SMartin Varghese * 1262571912c6SMartin Varghese * It returns a valid dst pointer and stores src address to be used in 1263571912c6SMartin Varghese * tunnel in param saddr on success, else a pointer encoded error code. 1264571912c6SMartin Varghese */ 1265571912c6SMartin Varghese 1266571912c6SMartin Varghese struct dst_entry *ip6_dst_lookup_tunnel(struct sk_buff *skb, 1267571912c6SMartin Varghese struct net_device *dev, 1268571912c6SMartin Varghese struct net *net, 1269571912c6SMartin Varghese struct socket *sock, 1270571912c6SMartin Varghese struct in6_addr *saddr, 1271571912c6SMartin Varghese const struct ip_tunnel_info *info, 1272571912c6SMartin Varghese u8 protocol, 1273571912c6SMartin Varghese bool use_cache) 1274571912c6SMartin Varghese { 1275571912c6SMartin Varghese struct dst_entry *dst = NULL; 1276571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1277571912c6SMartin Varghese struct dst_cache *dst_cache; 1278571912c6SMartin Varghese #endif 1279571912c6SMartin Varghese struct flowi6 fl6; 1280571912c6SMartin Varghese __u8 prio; 1281571912c6SMartin Varghese 1282571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1283571912c6SMartin Varghese dst_cache = (struct dst_cache *)&info->dst_cache; 1284571912c6SMartin Varghese if (use_cache) { 1285571912c6SMartin Varghese dst = dst_cache_get_ip6(dst_cache, saddr); 1286571912c6SMartin Varghese if (dst) 1287571912c6SMartin Varghese return dst; 1288571912c6SMartin Varghese } 1289571912c6SMartin Varghese #endif 1290571912c6SMartin Varghese memset(&fl6, 0, sizeof(fl6)); 1291571912c6SMartin Varghese fl6.flowi6_mark = skb->mark; 1292571912c6SMartin Varghese fl6.flowi6_proto = protocol; 1293571912c6SMartin Varghese fl6.daddr = info->key.u.ipv6.dst; 1294571912c6SMartin Varghese fl6.saddr = info->key.u.ipv6.src; 1295571912c6SMartin Varghese prio = info->key.tos; 1296571912c6SMartin Varghese fl6.flowlabel = ip6_make_flowinfo(RT_TOS(prio), 1297571912c6SMartin Varghese info->key.label); 1298571912c6SMartin Varghese 1299571912c6SMartin Varghese dst = ipv6_stub->ipv6_dst_lookup_flow(net, sock->sk, &fl6, 1300571912c6SMartin Varghese NULL); 1301571912c6SMartin Varghese if (IS_ERR(dst)) { 1302571912c6SMartin Varghese netdev_dbg(dev, "no route to %pI6\n", &fl6.daddr); 1303571912c6SMartin Varghese return ERR_PTR(-ENETUNREACH); 1304571912c6SMartin Varghese } 1305571912c6SMartin Varghese if (dst->dev == dev) { /* is this necessary? */ 1306571912c6SMartin Varghese netdev_dbg(dev, "circular route to %pI6\n", &fl6.daddr); 1307571912c6SMartin Varghese dst_release(dst); 1308571912c6SMartin Varghese return ERR_PTR(-ELOOP); 1309571912c6SMartin Varghese } 1310571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1311571912c6SMartin Varghese if (use_cache) 1312571912c6SMartin Varghese dst_cache_set_ip6(dst_cache, dst, &fl6.saddr); 1313571912c6SMartin Varghese #endif 1314571912c6SMartin Varghese *saddr = fl6.saddr; 1315571912c6SMartin Varghese return dst; 1316571912c6SMartin Varghese } 1317571912c6SMartin Varghese EXPORT_SYMBOL_GPL(ip6_dst_lookup_tunnel); 1318571912c6SMartin Varghese 13190178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src, 13200178b695SHerbert Xu gfp_t gfp) 13210178b695SHerbert Xu { 13220178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 13230178b695SHerbert Xu } 13240178b695SHerbert Xu 13250178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src, 13260178b695SHerbert Xu gfp_t gfp) 13270178b695SHerbert Xu { 13280178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 13290178b695SHerbert Xu } 13300178b695SHerbert Xu 133175a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu, 13320c183379SGao feng int *maxfraglen, 13330c183379SGao feng unsigned int fragheaderlen, 13340c183379SGao feng struct sk_buff *skb, 133575a493e6SHannes Frederic Sowa struct rt6_info *rt, 1336e367c2d0Slucien unsigned int orig_mtu) 13370c183379SGao feng { 13380c183379SGao feng if (!(rt->dst.flags & DST_XFRM_TUNNEL)) { 133963159f29SIan Morris if (!skb) { 13400c183379SGao feng /* first fragment, reserve header_len */ 1341e367c2d0Slucien *mtu = orig_mtu - rt->dst.header_len; 13420c183379SGao feng 13430c183379SGao feng } else { 13440c183379SGao feng /* 13450c183379SGao feng * this fragment is not first, the headers 13460c183379SGao feng * space is regarded as data space. 13470c183379SGao feng */ 1348e367c2d0Slucien *mtu = orig_mtu; 13490c183379SGao feng } 13500c183379SGao feng *maxfraglen = ((*mtu - fragheaderlen) & ~7) 13510c183379SGao feng + fragheaderlen - sizeof(struct frag_hdr); 13520c183379SGao feng } 13530c183379SGao feng } 13540c183379SGao feng 1355366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork, 135626879da5SWei Wang struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6, 1357f37a4cc6SPavel Begunkov struct rt6_info *rt) 1358366e41d9SVlad Yasevich { 1359366e41d9SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 1360366e41d9SVlad Yasevich unsigned int mtu; 1361d656b2eaSPavel Begunkov struct ipv6_txoptions *nopt, *opt = ipc6->opt; 1362366e41d9SVlad Yasevich 136340ac240cSPavel Begunkov /* callers pass dst together with a reference, set it first so 136440ac240cSPavel Begunkov * ip6_cork_release() can put it down even in case of an error. 136540ac240cSPavel Begunkov */ 136640ac240cSPavel Begunkov cork->base.dst = &rt->dst; 136740ac240cSPavel Begunkov 1368366e41d9SVlad Yasevich /* 1369366e41d9SVlad Yasevich * setup for corking 1370366e41d9SVlad Yasevich */ 1371366e41d9SVlad Yasevich if (opt) { 1372366e41d9SVlad Yasevich if (WARN_ON(v6_cork->opt)) 1373366e41d9SVlad Yasevich return -EINVAL; 1374366e41d9SVlad Yasevich 1375d656b2eaSPavel Begunkov nopt = v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation); 1376d656b2eaSPavel Begunkov if (unlikely(!nopt)) 1377366e41d9SVlad Yasevich return -ENOBUFS; 1378366e41d9SVlad Yasevich 1379d656b2eaSPavel Begunkov nopt->tot_len = sizeof(*opt); 1380d656b2eaSPavel Begunkov nopt->opt_flen = opt->opt_flen; 1381d656b2eaSPavel Begunkov nopt->opt_nflen = opt->opt_nflen; 1382366e41d9SVlad Yasevich 1383d656b2eaSPavel Begunkov nopt->dst0opt = ip6_opt_dup(opt->dst0opt, sk->sk_allocation); 1384d656b2eaSPavel Begunkov if (opt->dst0opt && !nopt->dst0opt) 1385366e41d9SVlad Yasevich return -ENOBUFS; 1386366e41d9SVlad Yasevich 1387d656b2eaSPavel Begunkov nopt->dst1opt = ip6_opt_dup(opt->dst1opt, sk->sk_allocation); 1388d656b2eaSPavel Begunkov if (opt->dst1opt && !nopt->dst1opt) 1389366e41d9SVlad Yasevich return -ENOBUFS; 1390366e41d9SVlad Yasevich 1391d656b2eaSPavel Begunkov nopt->hopopt = ip6_opt_dup(opt->hopopt, sk->sk_allocation); 1392d656b2eaSPavel Begunkov if (opt->hopopt && !nopt->hopopt) 1393366e41d9SVlad Yasevich return -ENOBUFS; 1394366e41d9SVlad Yasevich 1395d656b2eaSPavel Begunkov nopt->srcrt = ip6_rthdr_dup(opt->srcrt, sk->sk_allocation); 1396d656b2eaSPavel Begunkov if (opt->srcrt && !nopt->srcrt) 1397366e41d9SVlad Yasevich return -ENOBUFS; 1398366e41d9SVlad Yasevich 1399366e41d9SVlad Yasevich /* need source address above miyazawa*/ 1400366e41d9SVlad Yasevich } 140126879da5SWei Wang v6_cork->hop_limit = ipc6->hlimit; 140226879da5SWei Wang v6_cork->tclass = ipc6->tclass; 1403366e41d9SVlad Yasevich if (rt->dst.flags & DST_XFRM_TUNNEL) 1404366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1405749439bfSMike Maloney READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst); 1406366e41d9SVlad Yasevich else 1407366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1408c02b3741SDavid S. Miller READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst)); 1409366e41d9SVlad Yasevich if (np->frag_size < mtu) { 1410366e41d9SVlad Yasevich if (np->frag_size) 1411366e41d9SVlad Yasevich mtu = np->frag_size; 1412366e41d9SVlad Yasevich } 1413366e41d9SVlad Yasevich cork->base.fragsize = mtu; 1414fbf47813SWillem de Bruijn cork->base.gso_size = ipc6->gso_size; 1415678ca42dSWillem de Bruijn cork->base.tx_flags = 0; 1416c6af0c22SWillem de Bruijn cork->base.mark = ipc6->sockc.mark; 1417678ca42dSWillem de Bruijn sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags); 1418bec1f6f6SWillem de Bruijn 14190f6c480fSDavid Miller if (dst_allfrag(xfrm_dst_path(&rt->dst))) 1420366e41d9SVlad Yasevich cork->base.flags |= IPCORK_ALLFRAG; 1421366e41d9SVlad Yasevich cork->base.length = 0; 1422366e41d9SVlad Yasevich 14235fdaa88dSWillem de Bruijn cork->base.transmit_time = ipc6->sockc.transmit_time; 1424a818f75eSJesus Sanchez-Palencia 1425366e41d9SVlad Yasevich return 0; 1426366e41d9SVlad Yasevich } 1427366e41d9SVlad Yasevich 14280bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk, 14290bbe84a6SVlad Yasevich struct sk_buff_head *queue, 1430f3b46a3eSPavel Begunkov struct inet_cork_full *cork_full, 14310bbe84a6SVlad Yasevich struct inet6_cork *v6_cork, 14320bbe84a6SVlad Yasevich struct page_frag *pfrag, 14330bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, 14340bbe84a6SVlad Yasevich int len, int odd, struct sk_buff *skb), 14351da177e4SLinus Torvalds void *from, int length, int transhdrlen, 14365fdaa88dSWillem de Bruijn unsigned int flags, struct ipcm6_cookie *ipc6) 14371da177e4SLinus Torvalds { 14380c183379SGao feng struct sk_buff *skb, *skb_prev = NULL; 1439f3b46a3eSPavel Begunkov struct inet_cork *cork = &cork_full->base; 1440f37a4cc6SPavel Begunkov struct flowi6 *fl6 = &cork_full->fl.u.ip6; 144110b8a3deSPaolo Abeni unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu; 1442b5947e5dSWillem de Bruijn struct ubuf_info *uarg = NULL; 14430bbe84a6SVlad Yasevich int exthdrlen = 0; 14440bbe84a6SVlad Yasevich int dst_exthdrlen = 0; 14451da177e4SLinus Torvalds int hh_len; 14461da177e4SLinus Torvalds int copy; 14471da177e4SLinus Torvalds int err; 14481da177e4SLinus Torvalds int offset = 0; 144909c2d251SWillem de Bruijn u32 tskey = 0; 14500bbe84a6SVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->dst; 14510bbe84a6SVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 145232dce968SVlad Yasevich int csummode = CHECKSUM_NONE; 1453682b1a9dSHannes Frederic Sowa unsigned int maxnonfragsize, headersize; 14541f4c6eb2SEric Dumazet unsigned int wmem_alloc_delta = 0; 1455100f6d8eSWillem de Bruijn bool paged, extra_uref = false; 14561da177e4SLinus Torvalds 14570bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 14580bbe84a6SVlad Yasevich if (!skb) { 14590bbe84a6SVlad Yasevich exthdrlen = opt ? opt->opt_flen : 0; 14607efdba5bSRomain KUNTZ dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len; 14611da177e4SLinus Torvalds } 14620bbe84a6SVlad Yasevich 146315e36f5bSWillem de Bruijn paged = !!cork->gso_size; 1464bec1f6f6SWillem de Bruijn mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize; 1465e367c2d0Slucien orig_mtu = mtu; 14661da177e4SLinus Torvalds 1467678ca42dSWillem de Bruijn if (cork->tx_flags & SKBTX_ANY_SW_TSTAMP && 1468678ca42dSWillem de Bruijn sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID) 1469a1cdec57SEric Dumazet tskey = atomic_inc_return(&sk->sk_tskey) - 1; 1470678ca42dSWillem de Bruijn 1471d8d1f30bSChangli Gao hh_len = LL_RESERVED_SPACE(rt->dst.dev); 14721da177e4SLinus Torvalds 1473a1b05140SMasahide NAKAMURA fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len + 1474b4ce9277SHerbert Xu (opt ? opt->opt_nflen : 0); 14751da177e4SLinus Torvalds 14764df98e76SHannes Frederic Sowa headersize = sizeof(struct ipv6hdr) + 14773a1cebe7SHannes Frederic Sowa (opt ? opt->opt_flen + opt->opt_nflen : 0) + 14784df98e76SHannes Frederic Sowa (dst_allfrag(&rt->dst) ? 14794df98e76SHannes Frederic Sowa sizeof(struct frag_hdr) : 0) + 14804df98e76SHannes Frederic Sowa rt->rt6i_nfheader_len; 14814df98e76SHannes Frederic Sowa 14825e34af41STadeusz Struk if (mtu <= fragheaderlen || 14835e34af41STadeusz Struk ((mtu - fragheaderlen) & ~7) + fragheaderlen <= sizeof(struct frag_hdr)) 14846596a022SJiri Bohac goto emsgsize; 14856596a022SJiri Bohac 14866596a022SJiri Bohac maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen - 14876596a022SJiri Bohac sizeof(struct frag_hdr); 14886596a022SJiri Bohac 148910b8a3deSPaolo Abeni /* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit 149010b8a3deSPaolo Abeni * the first fragment 149110b8a3deSPaolo Abeni */ 149210b8a3deSPaolo Abeni if (headersize + transhdrlen > mtu) 149310b8a3deSPaolo Abeni goto emsgsize; 149410b8a3deSPaolo Abeni 149526879da5SWei Wang if (cork->length + length > mtu - headersize && ipc6->dontfrag && 14964df98e76SHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP || 149713651224SJakub Kicinski sk->sk_protocol == IPPROTO_ICMPV6 || 14984df98e76SHannes Frederic Sowa sk->sk_protocol == IPPROTO_RAW)) { 14994df98e76SHannes Frederic Sowa ipv6_local_rxpmtu(sk, fl6, mtu - headersize + 15004df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 15014df98e76SHannes Frederic Sowa goto emsgsize; 15024df98e76SHannes Frederic Sowa } 15034df98e76SHannes Frederic Sowa 1504682b1a9dSHannes Frederic Sowa if (ip6_sk_ignore_df(sk)) 1505682b1a9dSHannes Frederic Sowa maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN; 1506682b1a9dSHannes Frederic Sowa else 1507682b1a9dSHannes Frederic Sowa maxnonfragsize = mtu; 1508682b1a9dSHannes Frederic Sowa 15094df98e76SHannes Frederic Sowa if (cork->length + length > maxnonfragsize - headersize) { 15104df98e76SHannes Frederic Sowa emsgsize: 151110b8a3deSPaolo Abeni pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0); 151210b8a3deSPaolo Abeni ipv6_local_error(sk, EMSGSIZE, fl6, pmtu); 15131da177e4SLinus Torvalds return -EMSGSIZE; 15141da177e4SLinus Torvalds } 1515682b1a9dSHannes Frederic Sowa 1516682b1a9dSHannes Frederic Sowa /* CHECKSUM_PARTIAL only with no extension headers and when 1517682b1a9dSHannes Frederic Sowa * we are not going to fragment 1518682b1a9dSHannes Frederic Sowa */ 1519682b1a9dSHannes Frederic Sowa if (transhdrlen && sk->sk_protocol == IPPROTO_UDP && 1520682b1a9dSHannes Frederic Sowa headersize == sizeof(struct ipv6hdr) && 15212b89ed65SVlad Yasevich length <= mtu - headersize && 1522bec1f6f6SWillem de Bruijn (!(flags & MSG_MORE) || cork->gso_size) && 1523c8cd0989STom Herbert rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM)) 1524682b1a9dSHannes Frederic Sowa csummode = CHECKSUM_PARTIAL; 15251da177e4SLinus Torvalds 1526b5947e5dSWillem de Bruijn if (flags & MSG_ZEROCOPY && length && sock_flag(sk, SOCK_ZEROCOPY)) { 15278c793822SJonathan Lemon uarg = msg_zerocopy_realloc(sk, length, skb_zcopy(skb)); 1528b5947e5dSWillem de Bruijn if (!uarg) 1529b5947e5dSWillem de Bruijn return -ENOBUFS; 1530522924b5SWillem de Bruijn extra_uref = !skb_zcopy(skb); /* only ref on new uarg */ 1531b5947e5dSWillem de Bruijn if (rt->dst.dev->features & NETIF_F_SG && 1532b5947e5dSWillem de Bruijn csummode == CHECKSUM_PARTIAL) { 1533b5947e5dSWillem de Bruijn paged = true; 1534b5947e5dSWillem de Bruijn } else { 1535b5947e5dSWillem de Bruijn uarg->zerocopy = 0; 153652900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 1537b5947e5dSWillem de Bruijn } 1538b5947e5dSWillem de Bruijn } 1539b5947e5dSWillem de Bruijn 15401da177e4SLinus Torvalds /* 15411da177e4SLinus Torvalds * Let's try using as much space as possible. 15421da177e4SLinus Torvalds * Use MTU if total length of the message fits into the MTU. 15431da177e4SLinus Torvalds * Otherwise, we need to reserve fragment header and 15441da177e4SLinus Torvalds * fragment alignment (= 8-15 octects, in total). 15451da177e4SLinus Torvalds * 1546634a63e7SRandy Dunlap * Note that we may need to "move" the data from the tail 15471da177e4SLinus Torvalds * of the buffer to the new fragment when we split 15481da177e4SLinus Torvalds * the message. 15491da177e4SLinus Torvalds * 15501da177e4SLinus Torvalds * FIXME: It may be fragmented into multiple chunks 15511da177e4SLinus Torvalds * at once if non-fragmentable extension headers 15521da177e4SLinus Torvalds * are too large. 15531da177e4SLinus Torvalds * --yoshfuji 15541da177e4SLinus Torvalds */ 15551da177e4SLinus Torvalds 15562811ebacSHannes Frederic Sowa cork->length += length; 15572811ebacSHannes Frederic Sowa if (!skb) 15581da177e4SLinus Torvalds goto alloc_new_skb; 15591da177e4SLinus Torvalds 15601da177e4SLinus Torvalds while (length > 0) { 15611da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 1562bdc712b4SDavid S. Miller copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len; 15631da177e4SLinus Torvalds if (copy < length) 15641da177e4SLinus Torvalds copy = maxfraglen - skb->len; 15651da177e4SLinus Torvalds 15661da177e4SLinus Torvalds if (copy <= 0) { 15671da177e4SLinus Torvalds char *data; 15681da177e4SLinus Torvalds unsigned int datalen; 15691da177e4SLinus Torvalds unsigned int fraglen; 15701da177e4SLinus Torvalds unsigned int fraggap; 15716d123b81SJakub Kicinski unsigned int alloclen, alloc_extra; 1572aba36930SWillem de Bruijn unsigned int pagedlen; 15731da177e4SLinus Torvalds alloc_new_skb: 15741da177e4SLinus Torvalds /* There's no room in the current skb */ 15750c183379SGao feng if (skb) 15760c183379SGao feng fraggap = skb->len - maxfraglen; 15771da177e4SLinus Torvalds else 15781da177e4SLinus Torvalds fraggap = 0; 15790c183379SGao feng /* update mtu and maxfraglen if necessary */ 158063159f29SIan Morris if (!skb || !skb_prev) 15810c183379SGao feng ip6_append_data_mtu(&mtu, &maxfraglen, 158275a493e6SHannes Frederic Sowa fragheaderlen, skb, rt, 1583e367c2d0Slucien orig_mtu); 15840c183379SGao feng 15850c183379SGao feng skb_prev = skb; 15861da177e4SLinus Torvalds 15871da177e4SLinus Torvalds /* 15881da177e4SLinus Torvalds * If remaining data exceeds the mtu, 15891da177e4SLinus Torvalds * we know we need more fragment(s). 15901da177e4SLinus Torvalds */ 15911da177e4SLinus Torvalds datalen = length + fraggap; 15921da177e4SLinus Torvalds 15930c183379SGao feng if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen) 15940c183379SGao feng datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len; 159515e36f5bSWillem de Bruijn fraglen = datalen + fragheaderlen; 1596aba36930SWillem de Bruijn pagedlen = 0; 159715e36f5bSWillem de Bruijn 15986d123b81SJakub Kicinski alloc_extra = hh_len; 15996d123b81SJakub Kicinski alloc_extra += dst_exthdrlen; 16006d123b81SJakub Kicinski alloc_extra += rt->dst.trailer_len; 16016d123b81SJakub Kicinski 16026d123b81SJakub Kicinski /* We just reserve space for fragment header. 16036d123b81SJakub Kicinski * Note: this may be overallocation if the message 16046d123b81SJakub Kicinski * (without MSG_MORE) fits into the MTU. 16056d123b81SJakub Kicinski */ 16066d123b81SJakub Kicinski alloc_extra += sizeof(struct frag_hdr); 16076d123b81SJakub Kicinski 16081da177e4SLinus Torvalds if ((flags & MSG_MORE) && 1609d8d1f30bSChangli Gao !(rt->dst.dev->features&NETIF_F_SG)) 16101da177e4SLinus Torvalds alloclen = mtu; 16116d123b81SJakub Kicinski else if (!paged && 16126d123b81SJakub Kicinski (fraglen + alloc_extra < SKB_MAX_ALLOC || 16136d123b81SJakub Kicinski !(rt->dst.dev->features & NETIF_F_SG))) 161415e36f5bSWillem de Bruijn alloclen = fraglen; 161515e36f5bSWillem de Bruijn else { 161615e36f5bSWillem de Bruijn alloclen = min_t(int, fraglen, MAX_HEADER); 161715e36f5bSWillem de Bruijn pagedlen = fraglen - alloclen; 161815e36f5bSWillem de Bruijn } 16196d123b81SJakub Kicinski alloclen += alloc_extra; 1620299b0767SSteffen Klassert 16210c183379SGao feng if (datalen != length + fraggap) { 16221da177e4SLinus Torvalds /* 16230c183379SGao feng * this is not the last fragment, the trailer 16240c183379SGao feng * space is regarded as data space. 16251da177e4SLinus Torvalds */ 16260c183379SGao feng datalen += rt->dst.trailer_len; 16270c183379SGao feng } 16280c183379SGao feng 16290c183379SGao feng fraglen = datalen + fragheaderlen; 16301da177e4SLinus Torvalds 163115e36f5bSWillem de Bruijn copy = datalen - transhdrlen - fraggap - pagedlen; 1632232cd35dSEric Dumazet if (copy < 0) { 1633232cd35dSEric Dumazet err = -EINVAL; 1634232cd35dSEric Dumazet goto error; 1635232cd35dSEric Dumazet } 16361da177e4SLinus Torvalds if (transhdrlen) { 16376d123b81SJakub Kicinski skb = sock_alloc_send_skb(sk, alloclen, 16381da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 16391da177e4SLinus Torvalds } else { 16401da177e4SLinus Torvalds skb = NULL; 16411f4c6eb2SEric Dumazet if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <= 16421da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 16436d123b81SJakub Kicinski skb = alloc_skb(alloclen, 16441da177e4SLinus Torvalds sk->sk_allocation); 164563159f29SIan Morris if (unlikely(!skb)) 16461da177e4SLinus Torvalds err = -ENOBUFS; 16471da177e4SLinus Torvalds } 164863159f29SIan Morris if (!skb) 16491da177e4SLinus Torvalds goto error; 16501da177e4SLinus Torvalds /* 16511da177e4SLinus Torvalds * Fill in the control structures 16521da177e4SLinus Torvalds */ 16539c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 165432dce968SVlad Yasevich skb->ip_summed = csummode; 16551da177e4SLinus Torvalds skb->csum = 0; 16561f85851eSGao feng /* reserve for fragmentation and ipsec header */ 16571f85851eSGao feng skb_reserve(skb, hh_len + sizeof(struct frag_hdr) + 16581f85851eSGao feng dst_exthdrlen); 16591da177e4SLinus Torvalds 16601da177e4SLinus Torvalds /* 16611da177e4SLinus Torvalds * Find where to start putting bytes 16621da177e4SLinus Torvalds */ 166315e36f5bSWillem de Bruijn data = skb_put(skb, fraglen - pagedlen); 16641f85851eSGao feng skb_set_network_header(skb, exthdrlen); 16651f85851eSGao feng data += fragheaderlen; 1666b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1667b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 16681da177e4SLinus Torvalds if (fraggap) { 16691da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 16701da177e4SLinus Torvalds skb_prev, maxfraglen, 16718d5930dfSAl Viro data + transhdrlen, fraggap); 16721da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 16731da177e4SLinus Torvalds skb->csum); 16741da177e4SLinus Torvalds data += fraggap; 1675e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 16761da177e4SLinus Torvalds } 1677232cd35dSEric Dumazet if (copy > 0 && 1678232cd35dSEric Dumazet getfrag(from, data + transhdrlen, offset, 1679232cd35dSEric Dumazet copy, fraggap, skb) < 0) { 16801da177e4SLinus Torvalds err = -EFAULT; 16811da177e4SLinus Torvalds kfree_skb(skb); 16821da177e4SLinus Torvalds goto error; 16831da177e4SLinus Torvalds } 16841da177e4SLinus Torvalds 16851da177e4SLinus Torvalds offset += copy; 168615e36f5bSWillem de Bruijn length -= copy + transhdrlen; 16871da177e4SLinus Torvalds transhdrlen = 0; 16881da177e4SLinus Torvalds exthdrlen = 0; 1689299b0767SSteffen Klassert dst_exthdrlen = 0; 16901da177e4SLinus Torvalds 169152900d22SWillem de Bruijn /* Only the initial fragment is time stamped */ 169252900d22SWillem de Bruijn skb_shinfo(skb)->tx_flags = cork->tx_flags; 169352900d22SWillem de Bruijn cork->tx_flags = 0; 169452900d22SWillem de Bruijn skb_shinfo(skb)->tskey = tskey; 169552900d22SWillem de Bruijn tskey = 0; 169652900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 169752900d22SWillem de Bruijn 16980dec879fSJulian Anastasov if ((flags & MSG_CONFIRM) && !skb_prev) 16990dec879fSJulian Anastasov skb_set_dst_pending_confirm(skb, 1); 17000dec879fSJulian Anastasov 17011da177e4SLinus Torvalds /* 17021da177e4SLinus Torvalds * Put the packet on the pending queue 17031da177e4SLinus Torvalds */ 17041f4c6eb2SEric Dumazet if (!skb->destructor) { 17051f4c6eb2SEric Dumazet skb->destructor = sock_wfree; 17061f4c6eb2SEric Dumazet skb->sk = sk; 17071f4c6eb2SEric Dumazet wmem_alloc_delta += skb->truesize; 17081f4c6eb2SEric Dumazet } 17090bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 17101da177e4SLinus Torvalds continue; 17111da177e4SLinus Torvalds } 17121da177e4SLinus Torvalds 17131da177e4SLinus Torvalds if (copy > length) 17141da177e4SLinus Torvalds copy = length; 17151da177e4SLinus Torvalds 1716113f99c3SWillem de Bruijn if (!(rt->dst.dev->features&NETIF_F_SG) && 1717113f99c3SWillem de Bruijn skb_tailroom(skb) >= copy) { 17181da177e4SLinus Torvalds unsigned int off; 17191da177e4SLinus Torvalds 17201da177e4SLinus Torvalds off = skb->len; 17211da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 17221da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 17231da177e4SLinus Torvalds __skb_trim(skb, off); 17241da177e4SLinus Torvalds err = -EFAULT; 17251da177e4SLinus Torvalds goto error; 17261da177e4SLinus Torvalds } 1727b5947e5dSWillem de Bruijn } else if (!uarg || !uarg->zerocopy) { 17281da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 17291da177e4SLinus Torvalds 17301da177e4SLinus Torvalds err = -ENOMEM; 17315640f768SEric Dumazet if (!sk_page_frag_refill(sk, pfrag)) 17321da177e4SLinus Torvalds goto error; 17331da177e4SLinus Torvalds 17345640f768SEric Dumazet if (!skb_can_coalesce(skb, i, pfrag->page, 17355640f768SEric Dumazet pfrag->offset)) { 17361da177e4SLinus Torvalds err = -EMSGSIZE; 17375640f768SEric Dumazet if (i == MAX_SKB_FRAGS) 17381da177e4SLinus Torvalds goto error; 17395640f768SEric Dumazet 17405640f768SEric Dumazet __skb_fill_page_desc(skb, i, pfrag->page, 17415640f768SEric Dumazet pfrag->offset, 0); 17425640f768SEric Dumazet skb_shinfo(skb)->nr_frags = ++i; 17435640f768SEric Dumazet get_page(pfrag->page); 17441da177e4SLinus Torvalds } 17455640f768SEric Dumazet copy = min_t(int, copy, pfrag->size - pfrag->offset); 17469e903e08SEric Dumazet if (getfrag(from, 17475640f768SEric Dumazet page_address(pfrag->page) + pfrag->offset, 17485640f768SEric Dumazet offset, copy, skb->len, skb) < 0) 17495640f768SEric Dumazet goto error_efault; 17505640f768SEric Dumazet 17515640f768SEric Dumazet pfrag->offset += copy; 17525640f768SEric Dumazet skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy); 17531da177e4SLinus Torvalds skb->len += copy; 17541da177e4SLinus Torvalds skb->data_len += copy; 1755f945fa7aSHerbert Xu skb->truesize += copy; 17561f4c6eb2SEric Dumazet wmem_alloc_delta += copy; 1757b5947e5dSWillem de Bruijn } else { 1758b5947e5dSWillem de Bruijn err = skb_zerocopy_iter_dgram(skb, from, copy); 1759b5947e5dSWillem de Bruijn if (err < 0) 1760b5947e5dSWillem de Bruijn goto error; 17611da177e4SLinus Torvalds } 17621da177e4SLinus Torvalds offset += copy; 17631da177e4SLinus Torvalds length -= copy; 17641da177e4SLinus Torvalds } 17655640f768SEric Dumazet 17669e8445a5SPaolo Abeni if (wmem_alloc_delta) 17671f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 17681da177e4SLinus Torvalds return 0; 17695640f768SEric Dumazet 17705640f768SEric Dumazet error_efault: 17715640f768SEric Dumazet err = -EFAULT; 17721da177e4SLinus Torvalds error: 17738e044917SJonathan Lemon net_zcopy_put_abort(uarg, extra_uref); 1774bdc712b4SDavid S. Miller cork->length -= length; 17753bd653c8SDenis V. Lunev IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS); 17761f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 17771da177e4SLinus Torvalds return err; 17781da177e4SLinus Torvalds } 17790bbe84a6SVlad Yasevich 17800bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk, 17810bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, int len, 17820bbe84a6SVlad Yasevich int odd, struct sk_buff *skb), 178326879da5SWei Wang void *from, int length, int transhdrlen, 178426879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 17855fdaa88dSWillem de Bruijn struct rt6_info *rt, unsigned int flags) 17860bbe84a6SVlad Yasevich { 17870bbe84a6SVlad Yasevich struct inet_sock *inet = inet_sk(sk); 17880bbe84a6SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 17890bbe84a6SVlad Yasevich int exthdrlen; 17900bbe84a6SVlad Yasevich int err; 17910bbe84a6SVlad Yasevich 17920bbe84a6SVlad Yasevich if (flags&MSG_PROBE) 17930bbe84a6SVlad Yasevich return 0; 17940bbe84a6SVlad Yasevich if (skb_queue_empty(&sk->sk_write_queue)) { 17950bbe84a6SVlad Yasevich /* 17960bbe84a6SVlad Yasevich * setup for corking 17970bbe84a6SVlad Yasevich */ 179840ac240cSPavel Begunkov dst_hold(&rt->dst); 179926879da5SWei Wang err = ip6_setup_cork(sk, &inet->cork, &np->cork, 1800f37a4cc6SPavel Begunkov ipc6, rt); 18010bbe84a6SVlad Yasevich if (err) 18020bbe84a6SVlad Yasevich return err; 18030bbe84a6SVlad Yasevich 1804f37a4cc6SPavel Begunkov inet->cork.fl.u.ip6 = *fl6; 180526879da5SWei Wang exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 18060bbe84a6SVlad Yasevich length += exthdrlen; 18070bbe84a6SVlad Yasevich transhdrlen += exthdrlen; 18080bbe84a6SVlad Yasevich } else { 18090bbe84a6SVlad Yasevich transhdrlen = 0; 18100bbe84a6SVlad Yasevich } 18110bbe84a6SVlad Yasevich 1812f37a4cc6SPavel Begunkov return __ip6_append_data(sk, &sk->sk_write_queue, &inet->cork, 18130bbe84a6SVlad Yasevich &np->cork, sk_page_frag(sk), getfrag, 18145fdaa88dSWillem de Bruijn from, length, transhdrlen, flags, ipc6); 18150bbe84a6SVlad Yasevich } 1816a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data); 18171da177e4SLinus Torvalds 1818cd3c7480SPavel Begunkov static void ip6_cork_steal_dst(struct sk_buff *skb, struct inet_cork_full *cork) 1819cd3c7480SPavel Begunkov { 1820cd3c7480SPavel Begunkov struct dst_entry *dst = cork->base.dst; 1821cd3c7480SPavel Begunkov 1822cd3c7480SPavel Begunkov cork->base.dst = NULL; 1823cd3c7480SPavel Begunkov cork->base.flags &= ~IPCORK_ALLFRAG; 1824cd3c7480SPavel Begunkov skb_dst_set(skb, dst); 1825cd3c7480SPavel Begunkov } 1826cd3c7480SPavel Begunkov 1827366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork, 1828366e41d9SVlad Yasevich struct inet6_cork *v6_cork) 1829bf138862SPavel Emelyanov { 1830366e41d9SVlad Yasevich if (v6_cork->opt) { 1831d656b2eaSPavel Begunkov struct ipv6_txoptions *opt = v6_cork->opt; 1832d656b2eaSPavel Begunkov 1833d656b2eaSPavel Begunkov kfree(opt->dst0opt); 1834d656b2eaSPavel Begunkov kfree(opt->dst1opt); 1835d656b2eaSPavel Begunkov kfree(opt->hopopt); 1836d656b2eaSPavel Begunkov kfree(opt->srcrt); 1837d656b2eaSPavel Begunkov kfree(opt); 1838366e41d9SVlad Yasevich v6_cork->opt = NULL; 18390178b695SHerbert Xu } 18400178b695SHerbert Xu 1841366e41d9SVlad Yasevich if (cork->base.dst) { 1842366e41d9SVlad Yasevich dst_release(cork->base.dst); 1843366e41d9SVlad Yasevich cork->base.dst = NULL; 1844366e41d9SVlad Yasevich cork->base.flags &= ~IPCORK_ALLFRAG; 1845bf138862SPavel Emelyanov } 1846bf138862SPavel Emelyanov } 1847bf138862SPavel Emelyanov 18486422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk, 18496422398cSVlad Yasevich struct sk_buff_head *queue, 18506422398cSVlad Yasevich struct inet_cork_full *cork, 18516422398cSVlad Yasevich struct inet6_cork *v6_cork) 18521da177e4SLinus Torvalds { 18531da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 18541da177e4SLinus Torvalds struct sk_buff **tail_skb; 1855b60d4e58SPavel Begunkov struct in6_addr *final_dst; 18561da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 18573bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 18581da177e4SLinus Torvalds struct ipv6hdr *hdr; 18596422398cSVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 18606422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->base.dst; 18616422398cSVlad Yasevich struct flowi6 *fl6 = &cork->fl.u.ip6; 18624c9483b2SDavid S. Miller unsigned char proto = fl6->flowi6_proto; 18631da177e4SLinus Torvalds 18646422398cSVlad Yasevich skb = __skb_dequeue(queue); 186563159f29SIan Morris if (!skb) 18661da177e4SLinus Torvalds goto out; 18671da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 18681da177e4SLinus Torvalds 18691da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1870d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1871bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 18726422398cSVlad Yasevich while ((tmp_skb = __skb_dequeue(queue)) != NULL) { 1873cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 18741da177e4SLinus Torvalds *tail_skb = tmp_skb; 18751da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 18761da177e4SLinus Torvalds skb->len += tmp_skb->len; 18771da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 18781da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 18791da177e4SLinus Torvalds tmp_skb->destructor = NULL; 18801da177e4SLinus Torvalds tmp_skb->sk = NULL; 18811da177e4SLinus Torvalds } 18821da177e4SLinus Torvalds 188328a89453SHerbert Xu /* Allow local fragmentation. */ 188460ff7467SWANG Cong skb->ignore_df = ip6_sk_ignore_df(sk); 1885cfe1fc77SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_header_len(skb)); 1886b60d4e58SPavel Begunkov 1887b60d4e58SPavel Begunkov final_dst = &fl6->daddr; 18881da177e4SLinus Torvalds if (opt && opt->opt_flen) 18891da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 18901da177e4SLinus Torvalds if (opt && opt->opt_nflen) 1891613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr); 18921da177e4SLinus Torvalds 1893e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 1894e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 18950660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 18961da177e4SLinus Torvalds 18976422398cSVlad Yasevich ip6_flow_hdr(hdr, v6_cork->tclass, 1898cb1ce2efSTom Herbert ip6_make_flowlabel(net, skb, fl6->flowlabel, 1899513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 19006422398cSVlad Yasevich hdr->hop_limit = v6_cork->hop_limit; 19011da177e4SLinus Torvalds hdr->nexthdr = proto; 19024e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 19034e3fd7a0SAlexey Dobriyan hdr->daddr = *final_dst; 19041da177e4SLinus Torvalds 1905a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 1906c6af0c22SWillem de Bruijn skb->mark = cork->base.mark; 1907a818f75eSJesus Sanchez-Palencia skb->tstamp = cork->base.transmit_time; 1908a818f75eSJesus Sanchez-Palencia 1909cd3c7480SPavel Begunkov ip6_cork_steal_dst(skb, cork); 1910edf391ffSNeil Horman IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len); 191114878f75SDavid L Stevens if (proto == IPPROTO_ICMPV6) { 1912adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 191314878f75SDavid L Stevens 191443a43b60SHannes Frederic Sowa ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type); 191543a43b60SHannes Frederic Sowa ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS); 191614878f75SDavid L Stevens } 191714878f75SDavid L Stevens 19186422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 19196422398cSVlad Yasevich out: 19206422398cSVlad Yasevich return skb; 19216422398cSVlad Yasevich } 19226422398cSVlad Yasevich 19236422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb) 19246422398cSVlad Yasevich { 19256422398cSVlad Yasevich struct net *net = sock_net(skb->sk); 19266422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 19276422398cSVlad Yasevich int err; 19286422398cSVlad Yasevich 192933224b16SEric W. Biederman err = ip6_local_out(net, skb->sk, skb); 19301da177e4SLinus Torvalds if (err) { 19311da177e4SLinus Torvalds if (err > 0) 19326ce9e7b5SEric Dumazet err = net_xmit_errno(err); 19331da177e4SLinus Torvalds if (err) 19346422398cSVlad Yasevich IP6_INC_STATS(net, rt->rt6i_idev, 19356422398cSVlad Yasevich IPSTATS_MIB_OUTDISCARDS); 19361da177e4SLinus Torvalds } 19371da177e4SLinus Torvalds 19381da177e4SLinus Torvalds return err; 19396422398cSVlad Yasevich } 19406422398cSVlad Yasevich 19416422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk) 19426422398cSVlad Yasevich { 19436422398cSVlad Yasevich struct sk_buff *skb; 19446422398cSVlad Yasevich 19456422398cSVlad Yasevich skb = ip6_finish_skb(sk); 19466422398cSVlad Yasevich if (!skb) 19476422398cSVlad Yasevich return 0; 19486422398cSVlad Yasevich 19496422398cSVlad Yasevich return ip6_send_skb(skb); 19501da177e4SLinus Torvalds } 1951a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames); 19521da177e4SLinus Torvalds 19530bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk, 19546422398cSVlad Yasevich struct sk_buff_head *queue, 19556422398cSVlad Yasevich struct inet_cork_full *cork, 19566422398cSVlad Yasevich struct inet6_cork *v6_cork) 19571da177e4SLinus Torvalds { 19581da177e4SLinus Torvalds struct sk_buff *skb; 19591da177e4SLinus Torvalds 19600bbe84a6SVlad Yasevich while ((skb = __skb_dequeue_tail(queue)) != NULL) { 1961adf30907SEric Dumazet if (skb_dst(skb)) 1962adf30907SEric Dumazet IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)), 1963a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 19641da177e4SLinus Torvalds kfree_skb(skb); 19651da177e4SLinus Torvalds } 19661da177e4SLinus Torvalds 19676422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 19681da177e4SLinus Torvalds } 19690bbe84a6SVlad Yasevich 19700bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk) 19710bbe84a6SVlad Yasevich { 19726422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &sk->sk_write_queue, 19736422398cSVlad Yasevich &inet_sk(sk)->cork, &inet6_sk(sk)->cork); 19740bbe84a6SVlad Yasevich } 1975a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames); 19766422398cSVlad Yasevich 19776422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk, 19786422398cSVlad Yasevich int getfrag(void *from, char *to, int offset, 19796422398cSVlad Yasevich int len, int odd, struct sk_buff *skb), 19806422398cSVlad Yasevich void *from, int length, int transhdrlen, 1981f37a4cc6SPavel Begunkov struct ipcm6_cookie *ipc6, struct rt6_info *rt, 1982f37a4cc6SPavel Begunkov unsigned int flags, struct inet_cork_full *cork) 19836422398cSVlad Yasevich { 19846422398cSVlad Yasevich struct inet6_cork v6_cork; 19856422398cSVlad Yasevich struct sk_buff_head queue; 198626879da5SWei Wang int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 19876422398cSVlad Yasevich int err; 19886422398cSVlad Yasevich 198940ac240cSPavel Begunkov if (flags & MSG_PROBE) { 199040ac240cSPavel Begunkov dst_release(&rt->dst); 19916422398cSVlad Yasevich return NULL; 199240ac240cSPavel Begunkov } 19936422398cSVlad Yasevich 19946422398cSVlad Yasevich __skb_queue_head_init(&queue); 19956422398cSVlad Yasevich 19961cd7884dSWillem de Bruijn cork->base.flags = 0; 19971cd7884dSWillem de Bruijn cork->base.addr = 0; 19981cd7884dSWillem de Bruijn cork->base.opt = NULL; 19996422398cSVlad Yasevich v6_cork.opt = NULL; 2000f37a4cc6SPavel Begunkov err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt); 2001862c03eeSEric Dumazet if (err) { 20021cd7884dSWillem de Bruijn ip6_cork_release(cork, &v6_cork); 20036422398cSVlad Yasevich return ERR_PTR(err); 2004862c03eeSEric Dumazet } 200526879da5SWei Wang if (ipc6->dontfrag < 0) 200626879da5SWei Wang ipc6->dontfrag = inet6_sk(sk)->dontfrag; 20076422398cSVlad Yasevich 2008f37a4cc6SPavel Begunkov err = __ip6_append_data(sk, &queue, cork, &v6_cork, 20096422398cSVlad Yasevich ¤t->task_frag, getfrag, from, 20106422398cSVlad Yasevich length + exthdrlen, transhdrlen + exthdrlen, 20115fdaa88dSWillem de Bruijn flags, ipc6); 20126422398cSVlad Yasevich if (err) { 20131cd7884dSWillem de Bruijn __ip6_flush_pending_frames(sk, &queue, cork, &v6_cork); 20146422398cSVlad Yasevich return ERR_PTR(err); 20156422398cSVlad Yasevich } 20166422398cSVlad Yasevich 20171cd7884dSWillem de Bruijn return __ip6_make_skb(sk, &queue, cork, &v6_cork); 20186422398cSVlad Yasevich } 2019