11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * IPv6 output functions 31da177e4SLinus Torvalds * Linux INET6 implementation 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * Authors: 61da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 71da177e4SLinus Torvalds * 81da177e4SLinus Torvalds * Based on linux/net/ipv4/ip_output.c 91da177e4SLinus Torvalds * 101da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or 111da177e4SLinus Torvalds * modify it under the terms of the GNU General Public License 121da177e4SLinus Torvalds * as published by the Free Software Foundation; either version 131da177e4SLinus Torvalds * 2 of the License, or (at your option) any later version. 141da177e4SLinus Torvalds * 151da177e4SLinus Torvalds * Changes: 161da177e4SLinus Torvalds * A.N.Kuznetsov : airthmetics in fragmentation. 171da177e4SLinus Torvalds * extension headers are implemented. 181da177e4SLinus Torvalds * route changes now work. 191da177e4SLinus Torvalds * ip6_forward does not confuse sniffers. 201da177e4SLinus Torvalds * etc. 211da177e4SLinus Torvalds * 221da177e4SLinus Torvalds * H. von Brand : Added missing #include <linux/string.h> 231da177e4SLinus Torvalds * Imran Patel : frag id should be in NBO 241da177e4SLinus Torvalds * Kazunori MIYAZAWA @USAGI 251da177e4SLinus Torvalds * : add ip6_append_data and related functions 261da177e4SLinus Torvalds * for datagram xmit 271da177e4SLinus Torvalds */ 281da177e4SLinus Torvalds 291da177e4SLinus Torvalds #include <linux/errno.h> 30ef76bc23SHerbert Xu #include <linux/kernel.h> 311da177e4SLinus Torvalds #include <linux/string.h> 321da177e4SLinus Torvalds #include <linux/socket.h> 331da177e4SLinus Torvalds #include <linux/net.h> 341da177e4SLinus Torvalds #include <linux/netdevice.h> 351da177e4SLinus Torvalds #include <linux/if_arp.h> 361da177e4SLinus Torvalds #include <linux/in6.h> 371da177e4SLinus Torvalds #include <linux/tcp.h> 381da177e4SLinus Torvalds #include <linux/route.h> 39b59f45d0SHerbert Xu #include <linux/module.h> 405a0e3ad6STejun Heo #include <linux/slab.h> 411da177e4SLinus Torvalds 421da177e4SLinus Torvalds #include <linux/netfilter.h> 431da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h> 441da177e4SLinus Torvalds 451da177e4SLinus Torvalds #include <net/sock.h> 461da177e4SLinus Torvalds #include <net/snmp.h> 471da177e4SLinus Torvalds 481da177e4SLinus Torvalds #include <net/ipv6.h> 491da177e4SLinus Torvalds #include <net/ndisc.h> 501da177e4SLinus Torvalds #include <net/protocol.h> 511da177e4SLinus Torvalds #include <net/ip6_route.h> 521da177e4SLinus Torvalds #include <net/addrconf.h> 531da177e4SLinus Torvalds #include <net/rawv6.h> 541da177e4SLinus Torvalds #include <net/icmp.h> 551da177e4SLinus Torvalds #include <net/xfrm.h> 561da177e4SLinus Torvalds #include <net/checksum.h> 577bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h> 58ca254490SDavid Ahern #include <net/l3mdev.h> 591da177e4SLinus Torvalds 607d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb) 611da177e4SLinus Torvalds { 62adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 631da177e4SLinus Torvalds struct net_device *dev = dst->dev; 64f6b72b62SDavid S. Miller struct neighbour *neigh; 656fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 struct in6_addr *nexthop; 666fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 int ret; 671da177e4SLinus Torvalds 681da177e4SLinus Torvalds skb->protocol = htons(ETH_P_IPV6); 691da177e4SLinus Torvalds skb->dev = dev; 701da177e4SLinus Torvalds 710660e03fSArnaldo Carvalho de Melo if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) { 72adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 731da177e4SLinus Torvalds 747026b1ddSDavid Miller if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) && 7578126c41SEric W. Biederman ((mroute6_socket(net, skb) && 76bd91b8bfSBenjamin Thery !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) || 770660e03fSArnaldo Carvalho de Melo ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr, 787bc570c8SYOSHIFUJI Hideaki &ipv6_hdr(skb)->saddr))) { 791da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 801da177e4SLinus Torvalds 811da177e4SLinus Torvalds /* Do not check for IFF_ALLMULTI; multicast routing 821da177e4SLinus Torvalds is not supported in any case. 831da177e4SLinus Torvalds */ 841da177e4SLinus Torvalds if (newskb) 85b2e0b385SJan Engelhardt NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING, 8629a26a56SEric W. Biederman net, sk, newskb, NULL, newskb->dev, 8795603e22SMichel Machado dev_loopback_xmit); 881da177e4SLinus Torvalds 890660e03fSArnaldo Carvalho de Melo if (ipv6_hdr(skb)->hop_limit == 0) { 9078126c41SEric W. Biederman IP6_INC_STATS(net, idev, 913bd653c8SDenis V. Lunev IPSTATS_MIB_OUTDISCARDS); 921da177e4SLinus Torvalds kfree_skb(skb); 931da177e4SLinus Torvalds return 0; 941da177e4SLinus Torvalds } 951da177e4SLinus Torvalds } 961da177e4SLinus Torvalds 9778126c41SEric W. Biederman IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len); 98dd408515SHannes Frederic Sowa 99dd408515SHannes Frederic Sowa if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <= 100dd408515SHannes Frederic Sowa IPV6_ADDR_SCOPE_NODELOCAL && 101dd408515SHannes Frederic Sowa !(dev->flags & IFF_LOOPBACK)) { 102dd408515SHannes Frederic Sowa kfree_skb(skb); 103dd408515SHannes Frederic Sowa return 0; 104dd408515SHannes Frederic Sowa } 1051da177e4SLinus Torvalds } 1061da177e4SLinus Torvalds 1076fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 1082647a9b0SMartin KaFai Lau nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr); 1096fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop); 1106fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(!neigh)) 1116fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false); 1126fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (!IS_ERR(neigh)) { 1136fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 ret = dst_neigh_output(dst, neigh, skb); 1146fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1156fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 return ret; 1166fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 } 1176fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 11805e3aa09SDavid S. Miller 11978126c41SEric W. Biederman IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES); 1209e508490SJan Engelhardt kfree_skb(skb); 1219e508490SJan Engelhardt return -EINVAL; 1221da177e4SLinus Torvalds } 1231da177e4SLinus Torvalds 1240c4b51f0SEric W. Biederman static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1259e508490SJan Engelhardt { 1269e508490SJan Engelhardt if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) || 1279037c357SJiri Pirko dst_allfrag(skb_dst(skb)) || 1289037c357SJiri Pirko (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size)) 1297d8c6e39SEric W. Biederman return ip6_fragment(net, sk, skb, ip6_finish_output2); 1309e508490SJan Engelhardt else 1317d8c6e39SEric W. Biederman return ip6_finish_output2(net, sk, skb); 1329e508490SJan Engelhardt } 1339e508490SJan Engelhardt 134ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1351da177e4SLinus Torvalds { 1369e508490SJan Engelhardt struct net_device *dev = skb_dst(skb)->dev; 137adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 138be10de0aSEric W. Biederman 139778d80beSYOSHIFUJI Hideaki if (unlikely(idev->cnf.disable_ipv6)) { 14019a0644cSEric W. Biederman IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 141778d80beSYOSHIFUJI Hideaki kfree_skb(skb); 142778d80beSYOSHIFUJI Hideaki return 0; 143778d80beSYOSHIFUJI Hideaki } 144778d80beSYOSHIFUJI Hideaki 14529a26a56SEric W. Biederman return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING, 14629a26a56SEric W. Biederman net, sk, skb, NULL, dev, 1479c6eb28aSJan Engelhardt ip6_finish_output, 1489c6eb28aSJan Engelhardt !(IP6CB(skb)->flags & IP6SKB_REROUTED)); 1491da177e4SLinus Torvalds } 1501da177e4SLinus Torvalds 1511da177e4SLinus Torvalds /* 152b5d43998SShan Wei * xmit an sk_buff (used by TCP, SCTP and DCCP) 1531c1e9d2bSEric Dumazet * Note : socket lock is not held for SYNACK packets, but might be modified 1541c1e9d2bSEric Dumazet * by calls to skb_set_owner_w() and ipv6_local_error(), 1551c1e9d2bSEric Dumazet * which are using proper atomic operations or spinlocks. 1561da177e4SLinus Torvalds */ 1571c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6, 158b903d324SEric Dumazet struct ipv6_txoptions *opt, int tclass) 1591da177e4SLinus Torvalds { 1603bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 1611c1e9d2bSEric Dumazet const struct ipv6_pinfo *np = inet6_sk(sk); 1624c9483b2SDavid S. Miller struct in6_addr *first_hop = &fl6->daddr; 163adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 1641da177e4SLinus Torvalds struct ipv6hdr *hdr; 1654c9483b2SDavid S. Miller u8 proto = fl6->flowi6_proto; 1661da177e4SLinus Torvalds int seg_len = skb->len; 167e651f03aSGerrit Renker int hlimit = -1; 1681da177e4SLinus Torvalds u32 mtu; 1691da177e4SLinus Torvalds 1701da177e4SLinus Torvalds if (opt) { 171c2636b4dSChuck Lever unsigned int head_room; 1721da177e4SLinus Torvalds 1731da177e4SLinus Torvalds /* First: exthdrs may take lots of space (~8K for now) 1741da177e4SLinus Torvalds MAX_HEADER is not enough. 1751da177e4SLinus Torvalds */ 1761da177e4SLinus Torvalds head_room = opt->opt_nflen + opt->opt_flen; 1771da177e4SLinus Torvalds seg_len += head_room; 1781da177e4SLinus Torvalds head_room += sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev); 1791da177e4SLinus Torvalds 1801da177e4SLinus Torvalds if (skb_headroom(skb) < head_room) { 1811da177e4SLinus Torvalds struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room); 18263159f29SIan Morris if (!skb2) { 183adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 184a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 1851da177e4SLinus Torvalds kfree_skb(skb); 1861da177e4SLinus Torvalds return -ENOBUFS; 1871da177e4SLinus Torvalds } 188808db80aSEric Dumazet consume_skb(skb); 189a11d206dSYOSHIFUJI Hideaki skb = skb2; 1901c1e9d2bSEric Dumazet /* skb_set_owner_w() changes sk->sk_wmem_alloc atomically, 1911c1e9d2bSEric Dumazet * it is safe to call in our context (socket lock not held) 1921c1e9d2bSEric Dumazet */ 1931c1e9d2bSEric Dumazet skb_set_owner_w(skb, (struct sock *)sk); 1941da177e4SLinus Torvalds } 1951da177e4SLinus Torvalds if (opt->opt_flen) 1961da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 1971da177e4SLinus Torvalds if (opt->opt_nflen) 1981da177e4SLinus Torvalds ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop); 1991da177e4SLinus Torvalds } 2001da177e4SLinus Torvalds 201e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 202e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 2030660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 2041da177e4SLinus Torvalds 2051da177e4SLinus Torvalds /* 2061da177e4SLinus Torvalds * Fill in the IPv6 header 2071da177e4SLinus Torvalds */ 208b903d324SEric Dumazet if (np) 2091da177e4SLinus Torvalds hlimit = np->hop_limit; 2101da177e4SLinus Torvalds if (hlimit < 0) 2116b75d090SYOSHIFUJI Hideaki hlimit = ip6_dst_hoplimit(dst); 2121da177e4SLinus Torvalds 213cb1ce2efSTom Herbert ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel, 21467800f9bSTom Herbert np->autoflowlabel, fl6)); 21541a1f8eaSYOSHIFUJI Hideaki 2161da177e4SLinus Torvalds hdr->payload_len = htons(seg_len); 2171da177e4SLinus Torvalds hdr->nexthdr = proto; 2181da177e4SLinus Torvalds hdr->hop_limit = hlimit; 2191da177e4SLinus Torvalds 2204e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 2214e3fd7a0SAlexey Dobriyan hdr->daddr = *first_hop; 2221da177e4SLinus Torvalds 2239c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 224a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 2254a19ec58SLaszlo Attila Toth skb->mark = sk->sk_mark; 226a2c2064fSPatrick McHardy 2271da177e4SLinus Torvalds mtu = dst_mtu(dst); 22860ff7467SWANG Cong if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) { 229adf30907SEric Dumazet IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)), 230edf391ffSNeil Horman IPSTATS_MIB_OUT, skb->len); 2311c1e9d2bSEric Dumazet /* hooks should never assume socket lock is held. 2321c1e9d2bSEric Dumazet * we promote our socket to non const 2331c1e9d2bSEric Dumazet */ 23429a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, 2351c1e9d2bSEric Dumazet net, (struct sock *)sk, skb, NULL, dst->dev, 23613206b6bSEric W. Biederman dst_output); 2371da177e4SLinus Torvalds } 2381da177e4SLinus Torvalds 2391da177e4SLinus Torvalds skb->dev = dst->dev; 2401c1e9d2bSEric Dumazet /* ipv6_local_error() does not require socket lock, 2411c1e9d2bSEric Dumazet * we promote our socket to non const 2421c1e9d2bSEric Dumazet */ 2431c1e9d2bSEric Dumazet ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu); 2441c1e9d2bSEric Dumazet 245adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS); 2461da177e4SLinus Torvalds kfree_skb(skb); 2471da177e4SLinus Torvalds return -EMSGSIZE; 2481da177e4SLinus Torvalds } 2497159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit); 2507159039aSYOSHIFUJI Hideaki 2511da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel) 2521da177e4SLinus Torvalds { 2531da177e4SLinus Torvalds struct ip6_ra_chain *ra; 2541da177e4SLinus Torvalds struct sock *last = NULL; 2551da177e4SLinus Torvalds 2561da177e4SLinus Torvalds read_lock(&ip6_ra_lock); 2571da177e4SLinus Torvalds for (ra = ip6_ra_chain; ra; ra = ra->next) { 2581da177e4SLinus Torvalds struct sock *sk = ra->sk; 2590bd1b59bSAndrew McDonald if (sk && ra->sel == sel && 2600bd1b59bSAndrew McDonald (!sk->sk_bound_dev_if || 2610bd1b59bSAndrew McDonald sk->sk_bound_dev_if == skb->dev->ifindex)) { 2621da177e4SLinus Torvalds if (last) { 2631da177e4SLinus Torvalds struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC); 2641da177e4SLinus Torvalds if (skb2) 2651da177e4SLinus Torvalds rawv6_rcv(last, skb2); 2661da177e4SLinus Torvalds } 2671da177e4SLinus Torvalds last = sk; 2681da177e4SLinus Torvalds } 2691da177e4SLinus Torvalds } 2701da177e4SLinus Torvalds 2711da177e4SLinus Torvalds if (last) { 2721da177e4SLinus Torvalds rawv6_rcv(last, skb); 2731da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 2741da177e4SLinus Torvalds return 1; 2751da177e4SLinus Torvalds } 2761da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 2771da177e4SLinus Torvalds return 0; 2781da177e4SLinus Torvalds } 2791da177e4SLinus Torvalds 280e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb) 281e21e0b5fSVille Nuorvala { 2820660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 283e21e0b5fSVille Nuorvala u8 nexthdr = hdr->nexthdr; 28475f2811cSJesse Gross __be16 frag_off; 285e21e0b5fSVille Nuorvala int offset; 286e21e0b5fSVille Nuorvala 287e21e0b5fSVille Nuorvala if (ipv6_ext_hdr(nexthdr)) { 28875f2811cSJesse Gross offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off); 289e21e0b5fSVille Nuorvala if (offset < 0) 290e21e0b5fSVille Nuorvala return 0; 291e21e0b5fSVille Nuorvala } else 292e21e0b5fSVille Nuorvala offset = sizeof(struct ipv6hdr); 293e21e0b5fSVille Nuorvala 294e21e0b5fSVille Nuorvala if (nexthdr == IPPROTO_ICMPV6) { 295e21e0b5fSVille Nuorvala struct icmp6hdr *icmp6; 296e21e0b5fSVille Nuorvala 297d56f90a7SArnaldo Carvalho de Melo if (!pskb_may_pull(skb, (skb_network_header(skb) + 298d56f90a7SArnaldo Carvalho de Melo offset + 1 - skb->data))) 299e21e0b5fSVille Nuorvala return 0; 300e21e0b5fSVille Nuorvala 301d56f90a7SArnaldo Carvalho de Melo icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset); 302e21e0b5fSVille Nuorvala 303e21e0b5fSVille Nuorvala switch (icmp6->icmp6_type) { 304e21e0b5fSVille Nuorvala case NDISC_ROUTER_SOLICITATION: 305e21e0b5fSVille Nuorvala case NDISC_ROUTER_ADVERTISEMENT: 306e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_SOLICITATION: 307e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_ADVERTISEMENT: 308e21e0b5fSVille Nuorvala case NDISC_REDIRECT: 309e21e0b5fSVille Nuorvala /* For reaction involving unicast neighbor discovery 310e21e0b5fSVille Nuorvala * message destined to the proxied address, pass it to 311e21e0b5fSVille Nuorvala * input function. 312e21e0b5fSVille Nuorvala */ 313e21e0b5fSVille Nuorvala return 1; 314e21e0b5fSVille Nuorvala default: 315e21e0b5fSVille Nuorvala break; 316e21e0b5fSVille Nuorvala } 317e21e0b5fSVille Nuorvala } 318e21e0b5fSVille Nuorvala 31974553b09SVille Nuorvala /* 32074553b09SVille Nuorvala * The proxying router can't forward traffic sent to a link-local 32174553b09SVille Nuorvala * address, so signal the sender and discard the packet. This 32274553b09SVille Nuorvala * behavior is clarified by the MIPv6 specification. 32374553b09SVille Nuorvala */ 32474553b09SVille Nuorvala if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) { 32574553b09SVille Nuorvala dst_link_failure(skb); 32674553b09SVille Nuorvala return -1; 32774553b09SVille Nuorvala } 32874553b09SVille Nuorvala 329e21e0b5fSVille Nuorvala return 0; 330e21e0b5fSVille Nuorvala } 331e21e0b5fSVille Nuorvala 3320c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk, 3330c4b51f0SEric W. Biederman struct sk_buff *skb) 3341da177e4SLinus Torvalds { 335c29390c6SEric Dumazet skb_sender_cpu_clear(skb); 33613206b6bSEric W. Biederman return dst_output(net, sk, skb); 3371da177e4SLinus Torvalds } 3381da177e4SLinus Torvalds 3390954cf9cSHannes Frederic Sowa static unsigned int ip6_dst_mtu_forward(const struct dst_entry *dst) 3400954cf9cSHannes Frederic Sowa { 3410954cf9cSHannes Frederic Sowa unsigned int mtu; 3420954cf9cSHannes Frederic Sowa struct inet6_dev *idev; 3430954cf9cSHannes Frederic Sowa 3440954cf9cSHannes Frederic Sowa if (dst_metric_locked(dst, RTAX_MTU)) { 3450954cf9cSHannes Frederic Sowa mtu = dst_metric_raw(dst, RTAX_MTU); 3460954cf9cSHannes Frederic Sowa if (mtu) 3470954cf9cSHannes Frederic Sowa return mtu; 3480954cf9cSHannes Frederic Sowa } 3490954cf9cSHannes Frederic Sowa 3500954cf9cSHannes Frederic Sowa mtu = IPV6_MIN_MTU; 3510954cf9cSHannes Frederic Sowa rcu_read_lock(); 3520954cf9cSHannes Frederic Sowa idev = __in6_dev_get(dst->dev); 3530954cf9cSHannes Frederic Sowa if (idev) 3540954cf9cSHannes Frederic Sowa mtu = idev->cnf.mtu6; 3550954cf9cSHannes Frederic Sowa rcu_read_unlock(); 3560954cf9cSHannes Frederic Sowa 3570954cf9cSHannes Frederic Sowa return mtu; 3580954cf9cSHannes Frederic Sowa } 3590954cf9cSHannes Frederic Sowa 360fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu) 361fe6cc55fSFlorian Westphal { 362418a3156SFlorian Westphal if (skb->len <= mtu) 363fe6cc55fSFlorian Westphal return false; 364fe6cc55fSFlorian Westphal 36560ff7467SWANG Cong /* ipv6 conntrack defrag sets max_frag_size + ignore_df */ 366fe6cc55fSFlorian Westphal if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu) 367fe6cc55fSFlorian Westphal return true; 368fe6cc55fSFlorian Westphal 36960ff7467SWANG Cong if (skb->ignore_df) 370418a3156SFlorian Westphal return false; 371418a3156SFlorian Westphal 372fe6cc55fSFlorian Westphal if (skb_is_gso(skb) && skb_gso_network_seglen(skb) <= mtu) 373fe6cc55fSFlorian Westphal return false; 374fe6cc55fSFlorian Westphal 375fe6cc55fSFlorian Westphal return true; 376fe6cc55fSFlorian Westphal } 377fe6cc55fSFlorian Westphal 3781da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb) 3791da177e4SLinus Torvalds { 380adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 3810660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 3821da177e4SLinus Torvalds struct inet6_skb_parm *opt = IP6CB(skb); 383c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(dst->dev); 38414f3ad6fSUlrich Weber u32 mtu; 3851da177e4SLinus Torvalds 38653b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->forwarding == 0) 3871da177e4SLinus Torvalds goto error; 3881da177e4SLinus Torvalds 389090f1166SLi RongQing if (skb->pkt_type != PACKET_HOST) 390090f1166SLi RongQing goto drop; 391090f1166SLi RongQing 3929ef2e965SHannes Frederic Sowa if (unlikely(skb->sk)) 3939ef2e965SHannes Frederic Sowa goto drop; 3949ef2e965SHannes Frederic Sowa 3954497b076SBen Hutchings if (skb_warn_if_lro(skb)) 3964497b076SBen Hutchings goto drop; 3974497b076SBen Hutchings 3981da177e4SLinus Torvalds if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) { 39915c77d8bSEric Dumazet IP6_INC_STATS_BH(net, ip6_dst_idev(dst), 40015c77d8bSEric Dumazet IPSTATS_MIB_INDISCARDS); 4011da177e4SLinus Torvalds goto drop; 4021da177e4SLinus Torvalds } 4031da177e4SLinus Torvalds 40435fc92a9SHerbert Xu skb_forward_csum(skb); 4051da177e4SLinus Torvalds 4061da177e4SLinus Torvalds /* 4071da177e4SLinus Torvalds * We DO NOT make any processing on 4081da177e4SLinus Torvalds * RA packets, pushing them to user level AS IS 4091da177e4SLinus Torvalds * without ane WARRANTY that application will be able 4101da177e4SLinus Torvalds * to interpret them. The reason is that we 4111da177e4SLinus Torvalds * cannot make anything clever here. 4121da177e4SLinus Torvalds * 4131da177e4SLinus Torvalds * We are not end-node, so that if packet contains 4141da177e4SLinus Torvalds * AH/ESP, we cannot make anything. 4151da177e4SLinus Torvalds * Defragmentation also would be mistake, RA packets 4161da177e4SLinus Torvalds * cannot be fragmented, because there is no warranty 4171da177e4SLinus Torvalds * that different fragments will go along one path. --ANK 4181da177e4SLinus Torvalds */ 419ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) { 420ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (ip6_call_ra_chain(skb, ntohs(opt->ra))) 4211da177e4SLinus Torvalds return 0; 4221da177e4SLinus Torvalds } 4231da177e4SLinus Torvalds 4241da177e4SLinus Torvalds /* 4251da177e4SLinus Torvalds * check and decrement ttl 4261da177e4SLinus Torvalds */ 4271da177e4SLinus Torvalds if (hdr->hop_limit <= 1) { 4281da177e4SLinus Torvalds /* Force OUTPUT device used as source address */ 4291da177e4SLinus Torvalds skb->dev = dst->dev; 4303ffe533cSAlexey Dobriyan icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0); 43115c77d8bSEric Dumazet IP6_INC_STATS_BH(net, ip6_dst_idev(dst), 43215c77d8bSEric Dumazet IPSTATS_MIB_INHDRERRORS); 4331da177e4SLinus Torvalds 4341da177e4SLinus Torvalds kfree_skb(skb); 4351da177e4SLinus Torvalds return -ETIMEDOUT; 4361da177e4SLinus Torvalds } 4371da177e4SLinus Torvalds 438fbea49e1SYOSHIFUJI Hideaki /* XXX: idev->cnf.proxy_ndp? */ 43953b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->proxy_ndp && 4408a3edd80SDaniel Lezcano pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) { 44174553b09SVille Nuorvala int proxied = ip6_forward_proxy_check(skb); 44274553b09SVille Nuorvala if (proxied > 0) 443e21e0b5fSVille Nuorvala return ip6_input(skb); 44474553b09SVille Nuorvala else if (proxied < 0) { 44515c77d8bSEric Dumazet IP6_INC_STATS_BH(net, ip6_dst_idev(dst), 4463bd653c8SDenis V. Lunev IPSTATS_MIB_INDISCARDS); 44774553b09SVille Nuorvala goto drop; 44874553b09SVille Nuorvala } 449e21e0b5fSVille Nuorvala } 450e21e0b5fSVille Nuorvala 4511da177e4SLinus Torvalds if (!xfrm6_route_forward(skb)) { 45215c77d8bSEric Dumazet IP6_INC_STATS_BH(net, ip6_dst_idev(dst), 45315c77d8bSEric Dumazet IPSTATS_MIB_INDISCARDS); 4541da177e4SLinus Torvalds goto drop; 4551da177e4SLinus Torvalds } 456adf30907SEric Dumazet dst = skb_dst(skb); 4571da177e4SLinus Torvalds 4581da177e4SLinus Torvalds /* IPv6 specs say nothing about it, but it is clear that we cannot 4591da177e4SLinus Torvalds send redirects to source routed frames. 4601e5dc146SMasahide NAKAMURA We don't send redirects to frames decapsulated from IPsec. 4611da177e4SLinus Torvalds */ 462c45a3dfbSDavid S. Miller if (skb->dev == dst->dev && opt->srcrt == 0 && !skb_sec_path(skb)) { 4631da177e4SLinus Torvalds struct in6_addr *target = NULL; 464fbfe95a4SDavid S. Miller struct inet_peer *peer; 4651da177e4SLinus Torvalds struct rt6_info *rt; 4661da177e4SLinus Torvalds 4671da177e4SLinus Torvalds /* 4681da177e4SLinus Torvalds * incoming and outgoing devices are the same 4691da177e4SLinus Torvalds * send a redirect. 4701da177e4SLinus Torvalds */ 4711da177e4SLinus Torvalds 4721da177e4SLinus Torvalds rt = (struct rt6_info *) dst; 473c45a3dfbSDavid S. Miller if (rt->rt6i_flags & RTF_GATEWAY) 474c45a3dfbSDavid S. Miller target = &rt->rt6i_gateway; 4751da177e4SLinus Torvalds else 4761da177e4SLinus Torvalds target = &hdr->daddr; 4771da177e4SLinus Torvalds 478fd0273d7SMartin KaFai Lau peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1); 47992d86829SDavid S. Miller 4801da177e4SLinus Torvalds /* Limit redirects both by destination (here) 4811da177e4SLinus Torvalds and by source (inside ndisc_send_redirect) 4821da177e4SLinus Torvalds */ 483fbfe95a4SDavid S. Miller if (inet_peer_xrlim_allow(peer, 1*HZ)) 4844991969aSDavid S. Miller ndisc_send_redirect(skb, target); 4851d861aa4SDavid S. Miller if (peer) 4861d861aa4SDavid S. Miller inet_putpeer(peer); 4875bb1ab09SDavid L Stevens } else { 4885bb1ab09SDavid L Stevens int addrtype = ipv6_addr_type(&hdr->saddr); 4895bb1ab09SDavid L Stevens 4901da177e4SLinus Torvalds /* This check is security critical. */ 491f81b2e7dSYOSHIFUJI Hideaki if (addrtype == IPV6_ADDR_ANY || 492f81b2e7dSYOSHIFUJI Hideaki addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK)) 4931da177e4SLinus Torvalds goto error; 4945bb1ab09SDavid L Stevens if (addrtype & IPV6_ADDR_LINKLOCAL) { 4955bb1ab09SDavid L Stevens icmpv6_send(skb, ICMPV6_DEST_UNREACH, 4963ffe533cSAlexey Dobriyan ICMPV6_NOT_NEIGHBOUR, 0); 4975bb1ab09SDavid L Stevens goto error; 4985bb1ab09SDavid L Stevens } 4991da177e4SLinus Torvalds } 5001da177e4SLinus Torvalds 5010954cf9cSHannes Frederic Sowa mtu = ip6_dst_mtu_forward(dst); 50214f3ad6fSUlrich Weber if (mtu < IPV6_MIN_MTU) 50314f3ad6fSUlrich Weber mtu = IPV6_MIN_MTU; 50414f3ad6fSUlrich Weber 505fe6cc55fSFlorian Westphal if (ip6_pkt_too_big(skb, mtu)) { 5061da177e4SLinus Torvalds /* Again, force OUTPUT device used as source address */ 5071da177e4SLinus Torvalds skb->dev = dst->dev; 50814f3ad6fSUlrich Weber icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 50915c77d8bSEric Dumazet IP6_INC_STATS_BH(net, ip6_dst_idev(dst), 51015c77d8bSEric Dumazet IPSTATS_MIB_INTOOBIGERRORS); 51115c77d8bSEric Dumazet IP6_INC_STATS_BH(net, ip6_dst_idev(dst), 51215c77d8bSEric Dumazet IPSTATS_MIB_FRAGFAILS); 5131da177e4SLinus Torvalds kfree_skb(skb); 5141da177e4SLinus Torvalds return -EMSGSIZE; 5151da177e4SLinus Torvalds } 5161da177e4SLinus Torvalds 5171da177e4SLinus Torvalds if (skb_cow(skb, dst->dev->hard_header_len)) { 51815c77d8bSEric Dumazet IP6_INC_STATS_BH(net, ip6_dst_idev(dst), 51915c77d8bSEric Dumazet IPSTATS_MIB_OUTDISCARDS); 5201da177e4SLinus Torvalds goto drop; 5211da177e4SLinus Torvalds } 5221da177e4SLinus Torvalds 5230660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 5241da177e4SLinus Torvalds 5251da177e4SLinus Torvalds /* Mangling hops number delayed to point after skb COW */ 5261da177e4SLinus Torvalds 5271da177e4SLinus Torvalds hdr->hop_limit--; 5281da177e4SLinus Torvalds 529483a47d2SDenis V. Lunev IP6_INC_STATS_BH(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS); 5302d8dbb04SVincent Bernat IP6_ADD_STATS_BH(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len); 53129a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, 53229a26a56SEric W. Biederman net, NULL, skb, skb->dev, dst->dev, 5336e23ae2aSPatrick McHardy ip6_forward_finish); 5341da177e4SLinus Torvalds 5351da177e4SLinus Torvalds error: 536483a47d2SDenis V. Lunev IP6_INC_STATS_BH(net, ip6_dst_idev(dst), IPSTATS_MIB_INADDRERRORS); 5371da177e4SLinus Torvalds drop: 5381da177e4SLinus Torvalds kfree_skb(skb); 5391da177e4SLinus Torvalds return -EINVAL; 5401da177e4SLinus Torvalds } 5411da177e4SLinus Torvalds 5421da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from) 5431da177e4SLinus Torvalds { 5441da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 5451da177e4SLinus Torvalds to->priority = from->priority; 5461da177e4SLinus Torvalds to->protocol = from->protocol; 547adf30907SEric Dumazet skb_dst_drop(to); 548adf30907SEric Dumazet skb_dst_set(to, dst_clone(skb_dst(from))); 5491da177e4SLinus Torvalds to->dev = from->dev; 55082e91ffeSThomas Graf to->mark = from->mark; 5511da177e4SLinus Torvalds 5521da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 5531da177e4SLinus Torvalds to->tc_index = from->tc_index; 5541da177e4SLinus Torvalds #endif 555e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 556984bc16cSJames Morris skb_copy_secmark(to, from); 5571da177e4SLinus Torvalds } 5581da177e4SLinus Torvalds 5597d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, 5607d8c6e39SEric W. Biederman int (*output)(struct net *, struct sock *, struct sk_buff *)) 5611da177e4SLinus Torvalds { 5621da177e4SLinus Torvalds struct sk_buff *frag; 563adf30907SEric Dumazet struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 564f60e5990Shannes@stressinduktion.org struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? 565f60e5990Shannes@stressinduktion.org inet6_sk(skb->sk) : NULL; 5661da177e4SLinus Torvalds struct ipv6hdr *tmp_hdr; 5671da177e4SLinus Torvalds struct frag_hdr *fh; 5681da177e4SLinus Torvalds unsigned int mtu, hlen, left, len; 569a7ae1992SHerbert Xu int hroom, troom; 570286c2349SMartin KaFai Lau __be32 frag_id; 5711da177e4SLinus Torvalds int ptr, offset = 0, err = 0; 5721da177e4SLinus Torvalds u8 *prevhdr, nexthdr = 0; 5731da177e4SLinus Torvalds 5741da177e4SLinus Torvalds hlen = ip6_find_1stfragopt(skb, &prevhdr); 5751da177e4SLinus Torvalds nexthdr = *prevhdr; 5761da177e4SLinus Torvalds 577628a5c56SJohn Heffner mtu = ip6_skb_dst_mtu(skb); 578b881ef76SJohn Heffner 579b881ef76SJohn Heffner /* We must not fragment if the socket is set to force MTU discovery 58014f3ad6fSUlrich Weber * or if the skb it not generated by a local socket. 581b881ef76SJohn Heffner */ 582485fca66SFlorian Westphal if (unlikely(!skb->ignore_df && skb->len > mtu)) 583485fca66SFlorian Westphal goto fail_toobig; 584a34a101eSEric Dumazet 585485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size) { 586485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size > mtu) 587485fca66SFlorian Westphal goto fail_toobig; 588485fca66SFlorian Westphal 589485fca66SFlorian Westphal /* don't send fragments larger than what we received */ 590485fca66SFlorian Westphal mtu = IP6CB(skb)->frag_max_size; 591485fca66SFlorian Westphal if (mtu < IPV6_MIN_MTU) 592485fca66SFlorian Westphal mtu = IPV6_MIN_MTU; 593b881ef76SJohn Heffner } 594b881ef76SJohn Heffner 595d91675f9SYOSHIFUJI Hideaki if (np && np->frag_size < mtu) { 596d91675f9SYOSHIFUJI Hideaki if (np->frag_size) 597d91675f9SYOSHIFUJI Hideaki mtu = np->frag_size; 598d91675f9SYOSHIFUJI Hideaki } 59989bc7848SHannes Frederic Sowa if (mtu < hlen + sizeof(struct frag_hdr) + 8) 600b72a2b01SHannes Frederic Sowa goto fail_toobig; 6011e0d69a9SHannes Frederic Sowa mtu -= hlen + sizeof(struct frag_hdr); 6021da177e4SLinus Torvalds 603fd0273d7SMartin KaFai Lau frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr, 604fd0273d7SMartin KaFai Lau &ipv6_hdr(skb)->saddr); 605286c2349SMartin KaFai Lau 6061d325d21SFlorian Westphal hroom = LL_RESERVED_SPACE(rt->dst.dev); 60721dc3301SDavid S. Miller if (skb_has_frag_list(skb)) { 6081da177e4SLinus Torvalds int first_len = skb_pagelen(skb); 6093d13008eSEric Dumazet struct sk_buff *frag2; 6101da177e4SLinus Torvalds 6111da177e4SLinus Torvalds if (first_len - hlen > mtu || 6121da177e4SLinus Torvalds ((first_len - hlen) & 7) || 6131d325d21SFlorian Westphal skb_cloned(skb) || 6141d325d21SFlorian Westphal skb_headroom(skb) < (hroom + sizeof(struct frag_hdr))) 6151da177e4SLinus Torvalds goto slow_path; 6161da177e4SLinus Torvalds 6174d9092bbSDavid S. Miller skb_walk_frags(skb, frag) { 6181da177e4SLinus Torvalds /* Correct geometry. */ 6191da177e4SLinus Torvalds if (frag->len > mtu || 6201da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 6211d325d21SFlorian Westphal skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr))) 6223d13008eSEric Dumazet goto slow_path_clean; 6231da177e4SLinus Torvalds 6241da177e4SLinus Torvalds /* Partially cloned skb? */ 6251da177e4SLinus Torvalds if (skb_shared(frag)) 6263d13008eSEric Dumazet goto slow_path_clean; 6272fdba6b0SHerbert Xu 6282fdba6b0SHerbert Xu BUG_ON(frag->sk); 6292fdba6b0SHerbert Xu if (skb->sk) { 6302fdba6b0SHerbert Xu frag->sk = skb->sk; 6312fdba6b0SHerbert Xu frag->destructor = sock_wfree; 6322fdba6b0SHerbert Xu } 6333d13008eSEric Dumazet skb->truesize -= frag->truesize; 6341da177e4SLinus Torvalds } 6351da177e4SLinus Torvalds 6361da177e4SLinus Torvalds err = 0; 6371da177e4SLinus Torvalds offset = 0; 6381da177e4SLinus Torvalds /* BUILD HEADER */ 6391da177e4SLinus Torvalds 6409a217a1cSYOSHIFUJI Hideaki *prevhdr = NEXTHDR_FRAGMENT; 641d56f90a7SArnaldo Carvalho de Melo tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC); 6421da177e4SLinus Torvalds if (!tmp_hdr) { 643adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 6443bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 6451d325d21SFlorian Westphal err = -ENOMEM; 6461d325d21SFlorian Westphal goto fail; 6471da177e4SLinus Torvalds } 6481d325d21SFlorian Westphal frag = skb_shinfo(skb)->frag_list; 6491d325d21SFlorian Westphal skb_frag_list_init(skb); 6501da177e4SLinus Torvalds 6511da177e4SLinus Torvalds __skb_pull(skb, hlen); 6521da177e4SLinus Torvalds fh = (struct frag_hdr *)__skb_push(skb, sizeof(struct frag_hdr)); 653e2d1bca7SArnaldo Carvalho de Melo __skb_push(skb, hlen); 654e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 655d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(skb), tmp_hdr, hlen); 6561da177e4SLinus Torvalds 6571da177e4SLinus Torvalds fh->nexthdr = nexthdr; 6581da177e4SLinus Torvalds fh->reserved = 0; 6591da177e4SLinus Torvalds fh->frag_off = htons(IP6_MF); 660286c2349SMartin KaFai Lau fh->identification = frag_id; 6611da177e4SLinus Torvalds 6621da177e4SLinus Torvalds first_len = skb_pagelen(skb); 6631da177e4SLinus Torvalds skb->data_len = first_len - skb_headlen(skb); 6641da177e4SLinus Torvalds skb->len = first_len; 6650660e03fSArnaldo Carvalho de Melo ipv6_hdr(skb)->payload_len = htons(first_len - 6660660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 6671da177e4SLinus Torvalds 668d8d1f30bSChangli Gao dst_hold(&rt->dst); 6691da177e4SLinus Torvalds 6701da177e4SLinus Torvalds for (;;) { 6711da177e4SLinus Torvalds /* Prepare header of the next frame, 6721da177e4SLinus Torvalds * before previous one went down. */ 6731da177e4SLinus Torvalds if (frag) { 6741da177e4SLinus Torvalds frag->ip_summed = CHECKSUM_NONE; 675badff6d0SArnaldo Carvalho de Melo skb_reset_transport_header(frag); 6761da177e4SLinus Torvalds fh = (struct frag_hdr *)__skb_push(frag, sizeof(struct frag_hdr)); 677e2d1bca7SArnaldo Carvalho de Melo __skb_push(frag, hlen); 678e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(frag); 679d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(frag), tmp_hdr, 680d56f90a7SArnaldo Carvalho de Melo hlen); 6811da177e4SLinus Torvalds offset += skb->len - hlen - sizeof(struct frag_hdr); 6821da177e4SLinus Torvalds fh->nexthdr = nexthdr; 6831da177e4SLinus Torvalds fh->reserved = 0; 6841da177e4SLinus Torvalds fh->frag_off = htons(offset); 68553b24b8fSIan Morris if (frag->next) 6861da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 6871da177e4SLinus Torvalds fh->identification = frag_id; 6880660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = 6890660e03fSArnaldo Carvalho de Melo htons(frag->len - 6900660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 6911da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 6921da177e4SLinus Torvalds } 6931da177e4SLinus Torvalds 6947d8c6e39SEric W. Biederman err = output(net, sk, skb); 695dafee490SWei Dong if (!err) 696d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 6973bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 698dafee490SWei Dong 6991da177e4SLinus Torvalds if (err || !frag) 7001da177e4SLinus Torvalds break; 7011da177e4SLinus Torvalds 7021da177e4SLinus Torvalds skb = frag; 7031da177e4SLinus Torvalds frag = skb->next; 7041da177e4SLinus Torvalds skb->next = NULL; 7051da177e4SLinus Torvalds } 7061da177e4SLinus Torvalds 7071da177e4SLinus Torvalds kfree(tmp_hdr); 7081da177e4SLinus Torvalds 7091da177e4SLinus Torvalds if (err == 0) { 710d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7113bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGOKS); 71294e187c0SAmerigo Wang ip6_rt_put(rt); 7131da177e4SLinus Torvalds return 0; 7141da177e4SLinus Torvalds } 7151da177e4SLinus Torvalds 71646cfd725SFlorian Westphal kfree_skb_list(frag); 7171da177e4SLinus Torvalds 718d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7193bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 72094e187c0SAmerigo Wang ip6_rt_put(rt); 7211da177e4SLinus Torvalds return err; 7223d13008eSEric Dumazet 7233d13008eSEric Dumazet slow_path_clean: 7243d13008eSEric Dumazet skb_walk_frags(skb, frag2) { 7253d13008eSEric Dumazet if (frag2 == frag) 7263d13008eSEric Dumazet break; 7273d13008eSEric Dumazet frag2->sk = NULL; 7283d13008eSEric Dumazet frag2->destructor = NULL; 7293d13008eSEric Dumazet skb->truesize += frag2->truesize; 7303d13008eSEric Dumazet } 7311da177e4SLinus Torvalds } 7321da177e4SLinus Torvalds 7331da177e4SLinus Torvalds slow_path: 73472e843bbSEric Dumazet if ((skb->ip_summed == CHECKSUM_PARTIAL) && 73572e843bbSEric Dumazet skb_checksum_help(skb)) 73672e843bbSEric Dumazet goto fail; 73772e843bbSEric Dumazet 7381da177e4SLinus Torvalds left = skb->len - hlen; /* Space per frame */ 7391da177e4SLinus Torvalds ptr = hlen; /* Where to start from */ 7401da177e4SLinus Torvalds 7411da177e4SLinus Torvalds /* 7421da177e4SLinus Torvalds * Fragment the datagram. 7431da177e4SLinus Torvalds */ 7441da177e4SLinus Torvalds 7451da177e4SLinus Torvalds *prevhdr = NEXTHDR_FRAGMENT; 746a7ae1992SHerbert Xu troom = rt->dst.dev->needed_tailroom; 7471da177e4SLinus Torvalds 7481da177e4SLinus Torvalds /* 7491da177e4SLinus Torvalds * Keep copying data until we run out. 7501da177e4SLinus Torvalds */ 7511da177e4SLinus Torvalds while (left > 0) { 7521da177e4SLinus Torvalds len = left; 7531da177e4SLinus Torvalds /* IF: it doesn't fit, use 'mtu' - the data space left */ 7541da177e4SLinus Torvalds if (len > mtu) 7551da177e4SLinus Torvalds len = mtu; 7561da177e4SLinus Torvalds /* IF: we are not sending up to and including the packet end 7571da177e4SLinus Torvalds then align the next start on an eight byte boundary */ 7581da177e4SLinus Torvalds if (len < left) { 7591da177e4SLinus Torvalds len &= ~7; 7601da177e4SLinus Torvalds } 7611da177e4SLinus Torvalds 762cbffccc9SJoe Perches /* Allocate buffer */ 763cbffccc9SJoe Perches frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) + 764cbffccc9SJoe Perches hroom + troom, GFP_ATOMIC); 765cbffccc9SJoe Perches if (!frag) { 766adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 767a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 7681da177e4SLinus Torvalds err = -ENOMEM; 7691da177e4SLinus Torvalds goto fail; 7701da177e4SLinus Torvalds } 7711da177e4SLinus Torvalds 7721da177e4SLinus Torvalds /* 7731da177e4SLinus Torvalds * Set up data on packet 7741da177e4SLinus Torvalds */ 7751da177e4SLinus Torvalds 7761da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 777a7ae1992SHerbert Xu skb_reserve(frag, hroom); 7781da177e4SLinus Torvalds skb_put(frag, len + hlen + sizeof(struct frag_hdr)); 779c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(frag); 780badff6d0SArnaldo Carvalho de Melo fh = (struct frag_hdr *)(skb_network_header(frag) + hlen); 781b0e380b1SArnaldo Carvalho de Melo frag->transport_header = (frag->network_header + hlen + 782b0e380b1SArnaldo Carvalho de Melo sizeof(struct frag_hdr)); 7831da177e4SLinus Torvalds 7841da177e4SLinus Torvalds /* 7851da177e4SLinus Torvalds * Charge the memory for the fragment to any owner 7861da177e4SLinus Torvalds * it might possess 7871da177e4SLinus Torvalds */ 7881da177e4SLinus Torvalds if (skb->sk) 7891da177e4SLinus Torvalds skb_set_owner_w(frag, skb->sk); 7901da177e4SLinus Torvalds 7911da177e4SLinus Torvalds /* 7921da177e4SLinus Torvalds * Copy the packet header into the new buffer. 7931da177e4SLinus Torvalds */ 794d626f62bSArnaldo Carvalho de Melo skb_copy_from_linear_data(skb, skb_network_header(frag), hlen); 7951da177e4SLinus Torvalds 7961da177e4SLinus Torvalds /* 7971da177e4SLinus Torvalds * Build fragment header. 7981da177e4SLinus Torvalds */ 7991da177e4SLinus Torvalds fh->nexthdr = nexthdr; 8001da177e4SLinus Torvalds fh->reserved = 0; 8011da177e4SLinus Torvalds fh->identification = frag_id; 8021da177e4SLinus Torvalds 8031da177e4SLinus Torvalds /* 8041da177e4SLinus Torvalds * Copy a block of the IP datagram. 8051da177e4SLinus Torvalds */ 806e3f0b86bSHimangi Saraogi BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag), 807e3f0b86bSHimangi Saraogi len)); 8081da177e4SLinus Torvalds left -= len; 8091da177e4SLinus Torvalds 8101da177e4SLinus Torvalds fh->frag_off = htons(offset); 8111da177e4SLinus Torvalds if (left > 0) 8121da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 8130660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = htons(frag->len - 8140660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 8151da177e4SLinus Torvalds 8161da177e4SLinus Torvalds ptr += len; 8171da177e4SLinus Torvalds offset += len; 8181da177e4SLinus Torvalds 8191da177e4SLinus Torvalds /* 8201da177e4SLinus Torvalds * Put this fragment into the sending queue. 8211da177e4SLinus Torvalds */ 8227d8c6e39SEric W. Biederman err = output(net, sk, frag); 8231da177e4SLinus Torvalds if (err) 8241da177e4SLinus Torvalds goto fail; 825dafee490SWei Dong 826adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 8273bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 8281da177e4SLinus Torvalds } 829adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 830a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGOKS); 831808db80aSEric Dumazet consume_skb(skb); 8321da177e4SLinus Torvalds return err; 8331da177e4SLinus Torvalds 834485fca66SFlorian Westphal fail_toobig: 835485fca66SFlorian Westphal if (skb->sk && dst_allfrag(skb_dst(skb))) 836485fca66SFlorian Westphal sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK); 837485fca66SFlorian Westphal 838485fca66SFlorian Westphal skb->dev = skb_dst(skb)->dev; 839485fca66SFlorian Westphal icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 840485fca66SFlorian Westphal err = -EMSGSIZE; 841485fca66SFlorian Westphal 8421da177e4SLinus Torvalds fail: 843adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 844a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 8451da177e4SLinus Torvalds kfree_skb(skb); 8461da177e4SLinus Torvalds return err; 8471da177e4SLinus Torvalds } 8481da177e4SLinus Torvalds 849b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key, 850b71d1d42SEric Dumazet const struct in6_addr *fl_addr, 851b71d1d42SEric Dumazet const struct in6_addr *addr_cache) 852cf6b1982SYOSHIFUJI Hideaki { 853a02cec21SEric Dumazet return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) && 85463159f29SIan Morris (!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache)); 855cf6b1982SYOSHIFUJI Hideaki } 856cf6b1982SYOSHIFUJI Hideaki 857497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk, 858497c615aSHerbert Xu struct dst_entry *dst, 859b71d1d42SEric Dumazet const struct flowi6 *fl6) 8601da177e4SLinus Torvalds { 8611da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 862a963a37dSEric Dumazet struct rt6_info *rt; 8631da177e4SLinus Torvalds 864497c615aSHerbert Xu if (!dst) 865497c615aSHerbert Xu goto out; 8661da177e4SLinus Torvalds 867a963a37dSEric Dumazet if (dst->ops->family != AF_INET6) { 868a963a37dSEric Dumazet dst_release(dst); 869a963a37dSEric Dumazet return NULL; 870a963a37dSEric Dumazet } 871a963a37dSEric Dumazet 872a963a37dSEric Dumazet rt = (struct rt6_info *)dst; 8731da177e4SLinus Torvalds /* Yes, checking route validity in not connected 874d76e60a5SDavid S. Miller * case is not very simple. Take into account, 875d76e60a5SDavid S. Miller * that we do not support routing by source, TOS, 876d76e60a5SDavid S. Miller * and MSG_DONTROUTE --ANK (980726) 877d76e60a5SDavid S. Miller * 878cf6b1982SYOSHIFUJI Hideaki * 1. ip6_rt_check(): If route was host route, 879cf6b1982SYOSHIFUJI Hideaki * check that cached destination is current. 880d76e60a5SDavid S. Miller * If it is network route, we still may 881d76e60a5SDavid S. Miller * check its validity using saved pointer 882d76e60a5SDavid S. Miller * to the last used address: daddr_cache. 883d76e60a5SDavid S. Miller * We do not want to save whole address now, 884d76e60a5SDavid S. Miller * (because main consumer of this service 885d76e60a5SDavid S. Miller * is tcp, which has not this problem), 886d76e60a5SDavid S. Miller * so that the last trick works only on connected 887d76e60a5SDavid S. Miller * sockets. 888d76e60a5SDavid S. Miller * 2. oif also should be the same. 8891da177e4SLinus Torvalds */ 8904c9483b2SDavid S. Miller if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) || 8918e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES 8924c9483b2SDavid S. Miller ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) || 8938e1ef0a9SYOSHIFUJI Hideaki #endif 894ca254490SDavid Ahern (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) && 895ca254490SDavid Ahern (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) { 896497c615aSHerbert Xu dst_release(dst); 897497c615aSHerbert Xu dst = NULL; 8981da177e4SLinus Torvalds } 899497c615aSHerbert Xu 900497c615aSHerbert Xu out: 901497c615aSHerbert Xu return dst; 9021da177e4SLinus Torvalds } 903497c615aSHerbert Xu 9043aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, 9054c9483b2SDavid S. Miller struct dst_entry **dst, struct flowi6 *fl6) 906497c615aSHerbert Xu { 90769cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 90869cce1d1SDavid S. Miller struct neighbour *n; 90997cac082SDavid S. Miller struct rt6_info *rt; 91069cce1d1SDavid S. Miller #endif 91169cce1d1SDavid S. Miller int err; 9121da177e4SLinus Torvalds 913e16e888bSMarkus Stenberg /* The correct way to handle this would be to do 914e16e888bSMarkus Stenberg * ip6_route_get_saddr, and then ip6_route_output; however, 915e16e888bSMarkus Stenberg * the route-specific preferred source forces the 916e16e888bSMarkus Stenberg * ip6_route_output call _before_ ip6_route_get_saddr. 917e16e888bSMarkus Stenberg * 918e16e888bSMarkus Stenberg * In source specific routing (no src=any default route), 919e16e888bSMarkus Stenberg * ip6_route_output will fail given src=any saddr, though, so 920e16e888bSMarkus Stenberg * that's why we try it again later. 921e16e888bSMarkus Stenberg */ 922e16e888bSMarkus Stenberg if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) { 923e16e888bSMarkus Stenberg struct rt6_info *rt; 924e16e888bSMarkus Stenberg bool had_dst = *dst != NULL; 925e16e888bSMarkus Stenberg 926e16e888bSMarkus Stenberg if (!had_dst) 927e16e888bSMarkus Stenberg *dst = ip6_route_output(net, sk, fl6); 928e16e888bSMarkus Stenberg rt = (*dst)->error ? NULL : (struct rt6_info *)*dst; 929e16e888bSMarkus Stenberg err = ip6_route_get_saddr(net, rt, &fl6->daddr, 930e16e888bSMarkus Stenberg sk ? inet6_sk(sk)->srcprefs : 0, 931e16e888bSMarkus Stenberg &fl6->saddr); 932e16e888bSMarkus Stenberg if (err) 933e16e888bSMarkus Stenberg goto out_err_release; 934e16e888bSMarkus Stenberg 935e16e888bSMarkus Stenberg /* If we had an erroneous initial result, pretend it 936e16e888bSMarkus Stenberg * never existed and let the SA-enabled version take 937e16e888bSMarkus Stenberg * over. 938e16e888bSMarkus Stenberg */ 939e16e888bSMarkus Stenberg if (!had_dst && (*dst)->error) { 940e16e888bSMarkus Stenberg dst_release(*dst); 941e16e888bSMarkus Stenberg *dst = NULL; 942e16e888bSMarkus Stenberg } 943e16e888bSMarkus Stenberg } 944e16e888bSMarkus Stenberg 94563159f29SIan Morris if (!*dst) 9464c9483b2SDavid S. Miller *dst = ip6_route_output(net, sk, fl6); 9471da177e4SLinus Torvalds 948e5d08d71SIan Morris err = (*dst)->error; 949e5d08d71SIan Morris if (err) 9501da177e4SLinus Torvalds goto out_err_release; 9511da177e4SLinus Torvalds 95295c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 95395c385b4SNeil Horman /* 95495c385b4SNeil Horman * Here if the dst entry we've looked up 95595c385b4SNeil Horman * has a neighbour entry that is in the INCOMPLETE 95695c385b4SNeil Horman * state and the src address from the flow is 95795c385b4SNeil Horman * marked as OPTIMISTIC, we release the found 95895c385b4SNeil Horman * dst entry and replace it instead with the 95995c385b4SNeil Horman * dst entry of the nexthop router 96095c385b4SNeil Horman */ 961c56bf6feSEric Dumazet rt = (struct rt6_info *) *dst; 962707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 9632647a9b0SMartin KaFai Lau n = __ipv6_neigh_lookup_noref(rt->dst.dev, 9642647a9b0SMartin KaFai Lau rt6_nexthop(rt, &fl6->daddr)); 965707be1ffSYOSHIFUJI Hideaki / 吉藤英明 err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0; 966707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 967707be1ffSYOSHIFUJI Hideaki / 吉藤英明 968707be1ffSYOSHIFUJI Hideaki / 吉藤英明 if (err) { 96995c385b4SNeil Horman struct inet6_ifaddr *ifp; 9704c9483b2SDavid S. Miller struct flowi6 fl_gw6; 97195c385b4SNeil Horman int redirect; 97295c385b4SNeil Horman 9734c9483b2SDavid S. Miller ifp = ipv6_get_ifaddr(net, &fl6->saddr, 9741cab3da6SDaniel Lezcano (*dst)->dev, 1); 97595c385b4SNeil Horman 97695c385b4SNeil Horman redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC); 97795c385b4SNeil Horman if (ifp) 97895c385b4SNeil Horman in6_ifa_put(ifp); 97995c385b4SNeil Horman 98095c385b4SNeil Horman if (redirect) { 98195c385b4SNeil Horman /* 98295c385b4SNeil Horman * We need to get the dst entry for the 98395c385b4SNeil Horman * default router instead 98495c385b4SNeil Horman */ 98595c385b4SNeil Horman dst_release(*dst); 9864c9483b2SDavid S. Miller memcpy(&fl_gw6, fl6, sizeof(struct flowi6)); 9874c9483b2SDavid S. Miller memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr)); 9884c9483b2SDavid S. Miller *dst = ip6_route_output(net, sk, &fl_gw6); 989e5d08d71SIan Morris err = (*dst)->error; 990e5d08d71SIan Morris if (err) 99195c385b4SNeil Horman goto out_err_release; 99295c385b4SNeil Horman } 99395c385b4SNeil Horman } 99495c385b4SNeil Horman #endif 99595c385b4SNeil Horman 9961da177e4SLinus Torvalds return 0; 9971da177e4SLinus Torvalds 9981da177e4SLinus Torvalds out_err_release: 999ca46f9c8SMitsuru Chinen if (err == -ENETUNREACH) 10005ac68e7cSJohn Stultz IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES); 10011da177e4SLinus Torvalds dst_release(*dst); 10021da177e4SLinus Torvalds *dst = NULL; 10031da177e4SLinus Torvalds return err; 10041da177e4SLinus Torvalds } 100534a0b3cdSAdrian Bunk 1006497c615aSHerbert Xu /** 1007497c615aSHerbert Xu * ip6_dst_lookup - perform route lookup on flow 1008497c615aSHerbert Xu * @sk: socket which provides route info 1009497c615aSHerbert Xu * @dst: pointer to dst_entry * for result 10104c9483b2SDavid S. Miller * @fl6: flow to lookup 1011497c615aSHerbert Xu * 1012497c615aSHerbert Xu * This function performs a route lookup on the given flow. 1013497c615aSHerbert Xu * 1014497c615aSHerbert Xu * It returns zero on success, or a standard errno code on error. 1015497c615aSHerbert Xu */ 1016343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst, 1017343d60aaSRoopa Prabhu struct flowi6 *fl6) 1018497c615aSHerbert Xu { 1019497c615aSHerbert Xu *dst = NULL; 1020343d60aaSRoopa Prabhu return ip6_dst_lookup_tail(net, sk, dst, fl6); 1021497c615aSHerbert Xu } 10223cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup); 10233cf3dc6cSArnaldo Carvalho de Melo 1024497c615aSHerbert Xu /** 102568d0c6d3SDavid S. Miller * ip6_dst_lookup_flow - perform route lookup on flow with ipsec 102668d0c6d3SDavid S. Miller * @sk: socket which provides route info 10274c9483b2SDavid S. Miller * @fl6: flow to lookup 102868d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 102968d0c6d3SDavid S. Miller * 103068d0c6d3SDavid S. Miller * This function performs a route lookup on the given flow. 103168d0c6d3SDavid S. Miller * 103268d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 103368d0c6d3SDavid S. Miller * error code. 103468d0c6d3SDavid S. Miller */ 10353aef934fSEric Dumazet struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6, 10360e0d44abSSteffen Klassert const struct in6_addr *final_dst) 103768d0c6d3SDavid S. Miller { 103868d0c6d3SDavid S. Miller struct dst_entry *dst = NULL; 103968d0c6d3SDavid S. Miller int err; 104068d0c6d3SDavid S. Miller 1041343d60aaSRoopa Prabhu err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6); 104268d0c6d3SDavid S. Miller if (err) 104368d0c6d3SDavid S. Miller return ERR_PTR(err); 104468d0c6d3SDavid S. Miller if (final_dst) 10454e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 1046a0a9f33bSPhil Sutter if (!fl6->flowi6_oif) 1047ca254490SDavid Ahern fl6->flowi6_oif = l3mdev_fib_oif(dst->dev); 10482774c131SDavid S. Miller 1049f92ee619SSteffen Klassert return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0); 105068d0c6d3SDavid S. Miller } 105168d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow); 105268d0c6d3SDavid S. Miller 105368d0c6d3SDavid S. Miller /** 105468d0c6d3SDavid S. Miller * ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow 105568d0c6d3SDavid S. Miller * @sk: socket which provides the dst cache and route info 10564c9483b2SDavid S. Miller * @fl6: flow to lookup 105768d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 1058497c615aSHerbert Xu * 1059497c615aSHerbert Xu * This function performs a route lookup on the given flow with the 1060497c615aSHerbert Xu * possibility of using the cached route in the socket if it is valid. 1061497c615aSHerbert Xu * It will take the socket dst lock when operating on the dst cache. 1062497c615aSHerbert Xu * As a result, this function can only be used in process context. 1063497c615aSHerbert Xu * 106468d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 106568d0c6d3SDavid S. Miller * error code. 1066497c615aSHerbert Xu */ 10674c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6, 10680e0d44abSSteffen Klassert const struct in6_addr *final_dst) 1069497c615aSHerbert Xu { 107068d0c6d3SDavid S. Miller struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie); 107168d0c6d3SDavid S. Miller int err; 1072497c615aSHerbert Xu 10734c9483b2SDavid S. Miller dst = ip6_sk_dst_check(sk, dst, fl6); 107468d0c6d3SDavid S. Miller 1075343d60aaSRoopa Prabhu err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6); 107668d0c6d3SDavid S. Miller if (err) 107768d0c6d3SDavid S. Miller return ERR_PTR(err); 107868d0c6d3SDavid S. Miller if (final_dst) 10794e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 10802774c131SDavid S. Miller 1081f92ee619SSteffen Klassert return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0); 108268d0c6d3SDavid S. Miller } 108368d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow); 1084497c615aSHerbert Xu 108534a0b3cdSAdrian Bunk static inline int ip6_ufo_append_data(struct sock *sk, 10860bbe84a6SVlad Yasevich struct sk_buff_head *queue, 1087e89e9cf5SAnanda Raju int getfrag(void *from, char *to, int offset, int len, 1088e89e9cf5SAnanda Raju int odd, struct sk_buff *skb), 1089e89e9cf5SAnanda Raju void *from, int length, int hh_len, int fragheaderlen, 109087c48fa3SEric Dumazet int transhdrlen, int mtu, unsigned int flags, 1091fd0273d7SMartin KaFai Lau const struct flowi6 *fl6) 1092e89e9cf5SAnanda Raju 1093e89e9cf5SAnanda Raju { 1094e89e9cf5SAnanda Raju struct sk_buff *skb; 1095e89e9cf5SAnanda Raju int err; 1096e89e9cf5SAnanda Raju 1097e89e9cf5SAnanda Raju /* There is support for UDP large send offload by network 1098e89e9cf5SAnanda Raju * device, so create one single skb packet containing complete 1099e89e9cf5SAnanda Raju * udp datagram 1100e89e9cf5SAnanda Raju */ 11010bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 110263159f29SIan Morris if (!skb) { 1103e89e9cf5SAnanda Raju skb = sock_alloc_send_skb(sk, 1104e89e9cf5SAnanda Raju hh_len + fragheaderlen + transhdrlen + 20, 1105e89e9cf5SAnanda Raju (flags & MSG_DONTWAIT), &err); 110663159f29SIan Morris if (!skb) 1107504744e4SZheng Yan return err; 1108e89e9cf5SAnanda Raju 1109e89e9cf5SAnanda Raju /* reserve space for Hardware header */ 1110e89e9cf5SAnanda Raju skb_reserve(skb, hh_len); 1111e89e9cf5SAnanda Raju 1112e89e9cf5SAnanda Raju /* create space for UDP/IP header */ 1113e89e9cf5SAnanda Raju skb_put(skb, fragheaderlen + transhdrlen); 1114e89e9cf5SAnanda Raju 1115e89e9cf5SAnanda Raju /* initialize network header pointer */ 1116c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(skb); 1117e89e9cf5SAnanda Raju 1118e89e9cf5SAnanda Raju /* initialize protocol header pointer */ 1119b0e380b1SArnaldo Carvalho de Melo skb->transport_header = skb->network_header + fragheaderlen; 1120e89e9cf5SAnanda Raju 11219c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 1122e89e9cf5SAnanda Raju skb->csum = 0; 1123e89e9cf5SAnanda Raju 11240bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 1125c547dbf5SJiri Pirko } else if (skb_is_gso(skb)) { 1126c547dbf5SJiri Pirko goto append; 1127c547dbf5SJiri Pirko } 1128c547dbf5SJiri Pirko 1129c547dbf5SJiri Pirko skb->ip_summed = CHECKSUM_PARTIAL; 1130c31d5326SSridhar Samudrala /* Specify the length of each IPv6 datagram fragment. 1131c31d5326SSridhar Samudrala * It has to be a multiple of 8. 1132c31d5326SSridhar Samudrala */ 1133c31d5326SSridhar Samudrala skb_shinfo(skb)->gso_size = (mtu - fragheaderlen - 1134c31d5326SSridhar Samudrala sizeof(struct frag_hdr)) & ~7; 1135f83ef8c0SHerbert Xu skb_shinfo(skb)->gso_type = SKB_GSO_UDP; 1136fd0273d7SMartin KaFai Lau skb_shinfo(skb)->ip6_frag_id = ipv6_select_ident(sock_net(sk), 1137fd0273d7SMartin KaFai Lau &fl6->daddr, 1138fd0273d7SMartin KaFai Lau &fl6->saddr); 1139e89e9cf5SAnanda Raju 1140c547dbf5SJiri Pirko append: 11412811ebacSHannes Frederic Sowa return skb_append_datato_frags(sk, skb, getfrag, from, 11422811ebacSHannes Frederic Sowa (length - transhdrlen)); 1143e89e9cf5SAnanda Raju } 11441da177e4SLinus Torvalds 11450178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src, 11460178b695SHerbert Xu gfp_t gfp) 11470178b695SHerbert Xu { 11480178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11490178b695SHerbert Xu } 11500178b695SHerbert Xu 11510178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src, 11520178b695SHerbert Xu gfp_t gfp) 11530178b695SHerbert Xu { 11540178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11550178b695SHerbert Xu } 11560178b695SHerbert Xu 115775a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu, 11580c183379SGao feng int *maxfraglen, 11590c183379SGao feng unsigned int fragheaderlen, 11600c183379SGao feng struct sk_buff *skb, 116175a493e6SHannes Frederic Sowa struct rt6_info *rt, 1162e367c2d0Slucien unsigned int orig_mtu) 11630c183379SGao feng { 11640c183379SGao feng if (!(rt->dst.flags & DST_XFRM_TUNNEL)) { 116563159f29SIan Morris if (!skb) { 11660c183379SGao feng /* first fragment, reserve header_len */ 1167e367c2d0Slucien *mtu = orig_mtu - rt->dst.header_len; 11680c183379SGao feng 11690c183379SGao feng } else { 11700c183379SGao feng /* 11710c183379SGao feng * this fragment is not first, the headers 11720c183379SGao feng * space is regarded as data space. 11730c183379SGao feng */ 1174e367c2d0Slucien *mtu = orig_mtu; 11750c183379SGao feng } 11760c183379SGao feng *maxfraglen = ((*mtu - fragheaderlen) & ~7) 11770c183379SGao feng + fragheaderlen - sizeof(struct frag_hdr); 11780c183379SGao feng } 11790c183379SGao feng } 11800c183379SGao feng 1181366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork, 1182366e41d9SVlad Yasevich struct inet6_cork *v6_cork, 1183366e41d9SVlad Yasevich int hlimit, int tclass, struct ipv6_txoptions *opt, 1184366e41d9SVlad Yasevich struct rt6_info *rt, struct flowi6 *fl6) 1185366e41d9SVlad Yasevich { 1186366e41d9SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 1187366e41d9SVlad Yasevich unsigned int mtu; 1188366e41d9SVlad Yasevich 1189366e41d9SVlad Yasevich /* 1190366e41d9SVlad Yasevich * setup for corking 1191366e41d9SVlad Yasevich */ 1192366e41d9SVlad Yasevich if (opt) { 1193366e41d9SVlad Yasevich if (WARN_ON(v6_cork->opt)) 1194366e41d9SVlad Yasevich return -EINVAL; 1195366e41d9SVlad Yasevich 1196366e41d9SVlad Yasevich v6_cork->opt = kzalloc(opt->tot_len, sk->sk_allocation); 119763159f29SIan Morris if (unlikely(!v6_cork->opt)) 1198366e41d9SVlad Yasevich return -ENOBUFS; 1199366e41d9SVlad Yasevich 1200366e41d9SVlad Yasevich v6_cork->opt->tot_len = opt->tot_len; 1201366e41d9SVlad Yasevich v6_cork->opt->opt_flen = opt->opt_flen; 1202366e41d9SVlad Yasevich v6_cork->opt->opt_nflen = opt->opt_nflen; 1203366e41d9SVlad Yasevich 1204366e41d9SVlad Yasevich v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt, 1205366e41d9SVlad Yasevich sk->sk_allocation); 1206366e41d9SVlad Yasevich if (opt->dst0opt && !v6_cork->opt->dst0opt) 1207366e41d9SVlad Yasevich return -ENOBUFS; 1208366e41d9SVlad Yasevich 1209366e41d9SVlad Yasevich v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt, 1210366e41d9SVlad Yasevich sk->sk_allocation); 1211366e41d9SVlad Yasevich if (opt->dst1opt && !v6_cork->opt->dst1opt) 1212366e41d9SVlad Yasevich return -ENOBUFS; 1213366e41d9SVlad Yasevich 1214366e41d9SVlad Yasevich v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt, 1215366e41d9SVlad Yasevich sk->sk_allocation); 1216366e41d9SVlad Yasevich if (opt->hopopt && !v6_cork->opt->hopopt) 1217366e41d9SVlad Yasevich return -ENOBUFS; 1218366e41d9SVlad Yasevich 1219366e41d9SVlad Yasevich v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt, 1220366e41d9SVlad Yasevich sk->sk_allocation); 1221366e41d9SVlad Yasevich if (opt->srcrt && !v6_cork->opt->srcrt) 1222366e41d9SVlad Yasevich return -ENOBUFS; 1223366e41d9SVlad Yasevich 1224366e41d9SVlad Yasevich /* need source address above miyazawa*/ 1225366e41d9SVlad Yasevich } 1226366e41d9SVlad Yasevich dst_hold(&rt->dst); 1227366e41d9SVlad Yasevich cork->base.dst = &rt->dst; 1228366e41d9SVlad Yasevich cork->fl.u.ip6 = *fl6; 1229366e41d9SVlad Yasevich v6_cork->hop_limit = hlimit; 1230366e41d9SVlad Yasevich v6_cork->tclass = tclass; 1231366e41d9SVlad Yasevich if (rt->dst.flags & DST_XFRM_TUNNEL) 1232366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1233366e41d9SVlad Yasevich rt->dst.dev->mtu : dst_mtu(&rt->dst); 1234366e41d9SVlad Yasevich else 1235366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1236366e41d9SVlad Yasevich rt->dst.dev->mtu : dst_mtu(rt->dst.path); 1237366e41d9SVlad Yasevich if (np->frag_size < mtu) { 1238366e41d9SVlad Yasevich if (np->frag_size) 1239366e41d9SVlad Yasevich mtu = np->frag_size; 1240366e41d9SVlad Yasevich } 1241366e41d9SVlad Yasevich cork->base.fragsize = mtu; 1242366e41d9SVlad Yasevich if (dst_allfrag(rt->dst.path)) 1243366e41d9SVlad Yasevich cork->base.flags |= IPCORK_ALLFRAG; 1244366e41d9SVlad Yasevich cork->base.length = 0; 1245366e41d9SVlad Yasevich 1246366e41d9SVlad Yasevich return 0; 1247366e41d9SVlad Yasevich } 1248366e41d9SVlad Yasevich 12490bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk, 12500bbe84a6SVlad Yasevich struct flowi6 *fl6, 12510bbe84a6SVlad Yasevich struct sk_buff_head *queue, 12520bbe84a6SVlad Yasevich struct inet_cork *cork, 12530bbe84a6SVlad Yasevich struct inet6_cork *v6_cork, 12540bbe84a6SVlad Yasevich struct page_frag *pfrag, 12550bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, 12560bbe84a6SVlad Yasevich int len, int odd, struct sk_buff *skb), 12571da177e4SLinus Torvalds void *from, int length, int transhdrlen, 12580bbe84a6SVlad Yasevich unsigned int flags, int dontfrag) 12591da177e4SLinus Torvalds { 12600c183379SGao feng struct sk_buff *skb, *skb_prev = NULL; 1261e367c2d0Slucien unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu; 12620bbe84a6SVlad Yasevich int exthdrlen = 0; 12630bbe84a6SVlad Yasevich int dst_exthdrlen = 0; 12641da177e4SLinus Torvalds int hh_len; 12651da177e4SLinus Torvalds int copy; 12661da177e4SLinus Torvalds int err; 12671da177e4SLinus Torvalds int offset = 0; 1268a693e698SAnders Berggren __u8 tx_flags = 0; 126909c2d251SWillem de Bruijn u32 tskey = 0; 12700bbe84a6SVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->dst; 12710bbe84a6SVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 127232dce968SVlad Yasevich int csummode = CHECKSUM_NONE; 1273*682b1a9dSHannes Frederic Sowa unsigned int maxnonfragsize, headersize; 12741da177e4SLinus Torvalds 12750bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 12760bbe84a6SVlad Yasevich if (!skb) { 12770bbe84a6SVlad Yasevich exthdrlen = opt ? opt->opt_flen : 0; 12787efdba5bSRomain KUNTZ dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len; 12791da177e4SLinus Torvalds } 12800bbe84a6SVlad Yasevich 1281366e41d9SVlad Yasevich mtu = cork->fragsize; 1282e367c2d0Slucien orig_mtu = mtu; 12831da177e4SLinus Torvalds 1284d8d1f30bSChangli Gao hh_len = LL_RESERVED_SPACE(rt->dst.dev); 12851da177e4SLinus Torvalds 1286a1b05140SMasahide NAKAMURA fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len + 1287b4ce9277SHerbert Xu (opt ? opt->opt_nflen : 0); 12884df98e76SHannes Frederic Sowa maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen - 12894df98e76SHannes Frederic Sowa sizeof(struct frag_hdr); 12901da177e4SLinus Torvalds 12914df98e76SHannes Frederic Sowa headersize = sizeof(struct ipv6hdr) + 12923a1cebe7SHannes Frederic Sowa (opt ? opt->opt_flen + opt->opt_nflen : 0) + 12934df98e76SHannes Frederic Sowa (dst_allfrag(&rt->dst) ? 12944df98e76SHannes Frederic Sowa sizeof(struct frag_hdr) : 0) + 12954df98e76SHannes Frederic Sowa rt->rt6i_nfheader_len; 12964df98e76SHannes Frederic Sowa 1297*682b1a9dSHannes Frederic Sowa if (cork->length + length > mtu - headersize && dontfrag && 12984df98e76SHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP || 12994df98e76SHannes Frederic Sowa sk->sk_protocol == IPPROTO_RAW)) { 13004df98e76SHannes Frederic Sowa ipv6_local_rxpmtu(sk, fl6, mtu - headersize + 13014df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 13024df98e76SHannes Frederic Sowa goto emsgsize; 13034df98e76SHannes Frederic Sowa } 13044df98e76SHannes Frederic Sowa 1305*682b1a9dSHannes Frederic Sowa if (ip6_sk_ignore_df(sk)) 1306*682b1a9dSHannes Frederic Sowa maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN; 1307*682b1a9dSHannes Frederic Sowa else 1308*682b1a9dSHannes Frederic Sowa maxnonfragsize = mtu; 1309*682b1a9dSHannes Frederic Sowa 13104df98e76SHannes Frederic Sowa if (cork->length + length > maxnonfragsize - headersize) { 13114df98e76SHannes Frederic Sowa emsgsize: 13124df98e76SHannes Frederic Sowa ipv6_local_error(sk, EMSGSIZE, fl6, 13134df98e76SHannes Frederic Sowa mtu - headersize + 13144df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 13151da177e4SLinus Torvalds return -EMSGSIZE; 13161da177e4SLinus Torvalds } 1317*682b1a9dSHannes Frederic Sowa 1318*682b1a9dSHannes Frederic Sowa /* CHECKSUM_PARTIAL only with no extension headers and when 1319*682b1a9dSHannes Frederic Sowa * we are not going to fragment 1320*682b1a9dSHannes Frederic Sowa */ 1321*682b1a9dSHannes Frederic Sowa if (transhdrlen && sk->sk_protocol == IPPROTO_UDP && 1322*682b1a9dSHannes Frederic Sowa headersize == sizeof(struct ipv6hdr) && 1323*682b1a9dSHannes Frederic Sowa length < mtu - headersize && 1324*682b1a9dSHannes Frederic Sowa !(flags & MSG_MORE) && 1325*682b1a9dSHannes Frederic Sowa rt->dst.dev->features & NETIF_F_V6_CSUM) 1326*682b1a9dSHannes Frederic Sowa csummode = CHECKSUM_PARTIAL; 13271da177e4SLinus Torvalds 132809c2d251SWillem de Bruijn if (sk->sk_type == SOCK_DGRAM || sk->sk_type == SOCK_RAW) { 1329bf84a010SDaniel Borkmann sock_tx_timestamp(sk, &tx_flags); 133009c2d251SWillem de Bruijn if (tx_flags & SKBTX_ANY_SW_TSTAMP && 133109c2d251SWillem de Bruijn sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID) 133209c2d251SWillem de Bruijn tskey = sk->sk_tskey++; 133309c2d251SWillem de Bruijn } 1334a693e698SAnders Berggren 13351da177e4SLinus Torvalds /* 13361da177e4SLinus Torvalds * Let's try using as much space as possible. 13371da177e4SLinus Torvalds * Use MTU if total length of the message fits into the MTU. 13381da177e4SLinus Torvalds * Otherwise, we need to reserve fragment header and 13391da177e4SLinus Torvalds * fragment alignment (= 8-15 octects, in total). 13401da177e4SLinus Torvalds * 13411da177e4SLinus Torvalds * Note that we may need to "move" the data from the tail of 13421da177e4SLinus Torvalds * of the buffer to the new fragment when we split 13431da177e4SLinus Torvalds * the message. 13441da177e4SLinus Torvalds * 13451da177e4SLinus Torvalds * FIXME: It may be fragmented into multiple chunks 13461da177e4SLinus Torvalds * at once if non-fragmentable extension headers 13471da177e4SLinus Torvalds * are too large. 13481da177e4SLinus Torvalds * --yoshfuji 13491da177e4SLinus Torvalds */ 13501da177e4SLinus Torvalds 13512811ebacSHannes Frederic Sowa cork->length += length; 13522811ebacSHannes Frederic Sowa if (((length > mtu) || 13532811ebacSHannes Frederic Sowa (skb && skb_is_gso(skb))) && 13542811ebacSHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP) && 1355acf8dd0aSMichal Kubeček (rt->dst.dev->features & NETIF_F_UFO) && 1356acf8dd0aSMichal Kubeček (sk->sk_type == SOCK_DGRAM)) { 13570bbe84a6SVlad Yasevich err = ip6_ufo_append_data(sk, queue, getfrag, from, length, 13584b340ae2SBrian Haley hh_len, fragheaderlen, 1359fd0273d7SMartin KaFai Lau transhdrlen, mtu, flags, fl6); 1360baa829d8SPatrick McHardy if (err) 1361e89e9cf5SAnanda Raju goto error; 1362e89e9cf5SAnanda Raju return 0; 1363e89e9cf5SAnanda Raju } 13641da177e4SLinus Torvalds 13652811ebacSHannes Frederic Sowa if (!skb) 13661da177e4SLinus Torvalds goto alloc_new_skb; 13671da177e4SLinus Torvalds 13681da177e4SLinus Torvalds while (length > 0) { 13691da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 1370bdc712b4SDavid S. Miller copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len; 13711da177e4SLinus Torvalds if (copy < length) 13721da177e4SLinus Torvalds copy = maxfraglen - skb->len; 13731da177e4SLinus Torvalds 13741da177e4SLinus Torvalds if (copy <= 0) { 13751da177e4SLinus Torvalds char *data; 13761da177e4SLinus Torvalds unsigned int datalen; 13771da177e4SLinus Torvalds unsigned int fraglen; 13781da177e4SLinus Torvalds unsigned int fraggap; 13791da177e4SLinus Torvalds unsigned int alloclen; 13801da177e4SLinus Torvalds alloc_new_skb: 13811da177e4SLinus Torvalds /* There's no room in the current skb */ 13820c183379SGao feng if (skb) 13830c183379SGao feng fraggap = skb->len - maxfraglen; 13841da177e4SLinus Torvalds else 13851da177e4SLinus Torvalds fraggap = 0; 13860c183379SGao feng /* update mtu and maxfraglen if necessary */ 138763159f29SIan Morris if (!skb || !skb_prev) 13880c183379SGao feng ip6_append_data_mtu(&mtu, &maxfraglen, 138975a493e6SHannes Frederic Sowa fragheaderlen, skb, rt, 1390e367c2d0Slucien orig_mtu); 13910c183379SGao feng 13920c183379SGao feng skb_prev = skb; 13931da177e4SLinus Torvalds 13941da177e4SLinus Torvalds /* 13951da177e4SLinus Torvalds * If remaining data exceeds the mtu, 13961da177e4SLinus Torvalds * we know we need more fragment(s). 13971da177e4SLinus Torvalds */ 13981da177e4SLinus Torvalds datalen = length + fraggap; 13991da177e4SLinus Torvalds 14000c183379SGao feng if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen) 14010c183379SGao feng datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len; 14021da177e4SLinus Torvalds if ((flags & MSG_MORE) && 1403d8d1f30bSChangli Gao !(rt->dst.dev->features&NETIF_F_SG)) 14041da177e4SLinus Torvalds alloclen = mtu; 14051da177e4SLinus Torvalds else 14061da177e4SLinus Torvalds alloclen = datalen + fragheaderlen; 14071da177e4SLinus Torvalds 1408299b0767SSteffen Klassert alloclen += dst_exthdrlen; 1409299b0767SSteffen Klassert 14100c183379SGao feng if (datalen != length + fraggap) { 14111da177e4SLinus Torvalds /* 14120c183379SGao feng * this is not the last fragment, the trailer 14130c183379SGao feng * space is regarded as data space. 14141da177e4SLinus Torvalds */ 14150c183379SGao feng datalen += rt->dst.trailer_len; 14160c183379SGao feng } 14170c183379SGao feng 1418d8d1f30bSChangli Gao alloclen += rt->dst.trailer_len; 14190c183379SGao feng fraglen = datalen + fragheaderlen; 14201da177e4SLinus Torvalds 14211da177e4SLinus Torvalds /* 14221da177e4SLinus Torvalds * We just reserve space for fragment header. 14231da177e4SLinus Torvalds * Note: this may be overallocation if the message 14241da177e4SLinus Torvalds * (without MSG_MORE) fits into the MTU. 14251da177e4SLinus Torvalds */ 14261da177e4SLinus Torvalds alloclen += sizeof(struct frag_hdr); 14271da177e4SLinus Torvalds 14281da177e4SLinus Torvalds if (transhdrlen) { 14291da177e4SLinus Torvalds skb = sock_alloc_send_skb(sk, 14301da177e4SLinus Torvalds alloclen + hh_len, 14311da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 14321da177e4SLinus Torvalds } else { 14331da177e4SLinus Torvalds skb = NULL; 14341da177e4SLinus Torvalds if (atomic_read(&sk->sk_wmem_alloc) <= 14351da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 14361da177e4SLinus Torvalds skb = sock_wmalloc(sk, 14371da177e4SLinus Torvalds alloclen + hh_len, 1, 14381da177e4SLinus Torvalds sk->sk_allocation); 143963159f29SIan Morris if (unlikely(!skb)) 14401da177e4SLinus Torvalds err = -ENOBUFS; 14411da177e4SLinus Torvalds } 144263159f29SIan Morris if (!skb) 14431da177e4SLinus Torvalds goto error; 14441da177e4SLinus Torvalds /* 14451da177e4SLinus Torvalds * Fill in the control structures 14461da177e4SLinus Torvalds */ 14479c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 144832dce968SVlad Yasevich skb->ip_summed = csummode; 14491da177e4SLinus Torvalds skb->csum = 0; 14501f85851eSGao feng /* reserve for fragmentation and ipsec header */ 14511f85851eSGao feng skb_reserve(skb, hh_len + sizeof(struct frag_hdr) + 14521f85851eSGao feng dst_exthdrlen); 14531da177e4SLinus Torvalds 145411878b40SWillem de Bruijn /* Only the initial fragment is time stamped */ 1455a693e698SAnders Berggren skb_shinfo(skb)->tx_flags = tx_flags; 145611878b40SWillem de Bruijn tx_flags = 0; 145709c2d251SWillem de Bruijn skb_shinfo(skb)->tskey = tskey; 145809c2d251SWillem de Bruijn tskey = 0; 1459a693e698SAnders Berggren 14601da177e4SLinus Torvalds /* 14611da177e4SLinus Torvalds * Find where to start putting bytes 14621da177e4SLinus Torvalds */ 14631f85851eSGao feng data = skb_put(skb, fraglen); 14641f85851eSGao feng skb_set_network_header(skb, exthdrlen); 14651f85851eSGao feng data += fragheaderlen; 1466b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1467b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 14681da177e4SLinus Torvalds if (fraggap) { 14691da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 14701da177e4SLinus Torvalds skb_prev, maxfraglen, 14711da177e4SLinus Torvalds data + transhdrlen, fraggap, 0); 14721da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 14731da177e4SLinus Torvalds skb->csum); 14741da177e4SLinus Torvalds data += fraggap; 1475e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 14761da177e4SLinus Torvalds } 14771da177e4SLinus Torvalds copy = datalen - transhdrlen - fraggap; 1478299b0767SSteffen Klassert 14791da177e4SLinus Torvalds if (copy < 0) { 14801da177e4SLinus Torvalds err = -EINVAL; 14811da177e4SLinus Torvalds kfree_skb(skb); 14821da177e4SLinus Torvalds goto error; 14831da177e4SLinus Torvalds } else if (copy > 0 && getfrag(from, data + transhdrlen, offset, copy, fraggap, skb) < 0) { 14841da177e4SLinus Torvalds err = -EFAULT; 14851da177e4SLinus Torvalds kfree_skb(skb); 14861da177e4SLinus Torvalds goto error; 14871da177e4SLinus Torvalds } 14881da177e4SLinus Torvalds 14891da177e4SLinus Torvalds offset += copy; 14901da177e4SLinus Torvalds length -= datalen - fraggap; 14911da177e4SLinus Torvalds transhdrlen = 0; 14921da177e4SLinus Torvalds exthdrlen = 0; 1493299b0767SSteffen Klassert dst_exthdrlen = 0; 14941da177e4SLinus Torvalds 14951da177e4SLinus Torvalds /* 14961da177e4SLinus Torvalds * Put the packet on the pending queue 14971da177e4SLinus Torvalds */ 14980bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 14991da177e4SLinus Torvalds continue; 15001da177e4SLinus Torvalds } 15011da177e4SLinus Torvalds 15021da177e4SLinus Torvalds if (copy > length) 15031da177e4SLinus Torvalds copy = length; 15041da177e4SLinus Torvalds 1505d8d1f30bSChangli Gao if (!(rt->dst.dev->features&NETIF_F_SG)) { 15061da177e4SLinus Torvalds unsigned int off; 15071da177e4SLinus Torvalds 15081da177e4SLinus Torvalds off = skb->len; 15091da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 15101da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 15111da177e4SLinus Torvalds __skb_trim(skb, off); 15121da177e4SLinus Torvalds err = -EFAULT; 15131da177e4SLinus Torvalds goto error; 15141da177e4SLinus Torvalds } 15151da177e4SLinus Torvalds } else { 15161da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 15171da177e4SLinus Torvalds 15181da177e4SLinus Torvalds err = -ENOMEM; 15195640f768SEric Dumazet if (!sk_page_frag_refill(sk, pfrag)) 15201da177e4SLinus Torvalds goto error; 15211da177e4SLinus Torvalds 15225640f768SEric Dumazet if (!skb_can_coalesce(skb, i, pfrag->page, 15235640f768SEric Dumazet pfrag->offset)) { 15241da177e4SLinus Torvalds err = -EMSGSIZE; 15255640f768SEric Dumazet if (i == MAX_SKB_FRAGS) 15261da177e4SLinus Torvalds goto error; 15275640f768SEric Dumazet 15285640f768SEric Dumazet __skb_fill_page_desc(skb, i, pfrag->page, 15295640f768SEric Dumazet pfrag->offset, 0); 15305640f768SEric Dumazet skb_shinfo(skb)->nr_frags = ++i; 15315640f768SEric Dumazet get_page(pfrag->page); 15321da177e4SLinus Torvalds } 15335640f768SEric Dumazet copy = min_t(int, copy, pfrag->size - pfrag->offset); 15349e903e08SEric Dumazet if (getfrag(from, 15355640f768SEric Dumazet page_address(pfrag->page) + pfrag->offset, 15365640f768SEric Dumazet offset, copy, skb->len, skb) < 0) 15375640f768SEric Dumazet goto error_efault; 15385640f768SEric Dumazet 15395640f768SEric Dumazet pfrag->offset += copy; 15405640f768SEric Dumazet skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy); 15411da177e4SLinus Torvalds skb->len += copy; 15421da177e4SLinus Torvalds skb->data_len += copy; 1543f945fa7aSHerbert Xu skb->truesize += copy; 1544f945fa7aSHerbert Xu atomic_add(copy, &sk->sk_wmem_alloc); 15451da177e4SLinus Torvalds } 15461da177e4SLinus Torvalds offset += copy; 15471da177e4SLinus Torvalds length -= copy; 15481da177e4SLinus Torvalds } 15495640f768SEric Dumazet 15501da177e4SLinus Torvalds return 0; 15515640f768SEric Dumazet 15525640f768SEric Dumazet error_efault: 15535640f768SEric Dumazet err = -EFAULT; 15541da177e4SLinus Torvalds error: 1555bdc712b4SDavid S. Miller cork->length -= length; 15563bd653c8SDenis V. Lunev IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS); 15571da177e4SLinus Torvalds return err; 15581da177e4SLinus Torvalds } 15590bbe84a6SVlad Yasevich 15600bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk, 15610bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, int len, 15620bbe84a6SVlad Yasevich int odd, struct sk_buff *skb), 15630bbe84a6SVlad Yasevich void *from, int length, int transhdrlen, int hlimit, 15640bbe84a6SVlad Yasevich int tclass, struct ipv6_txoptions *opt, struct flowi6 *fl6, 15650bbe84a6SVlad Yasevich struct rt6_info *rt, unsigned int flags, int dontfrag) 15660bbe84a6SVlad Yasevich { 15670bbe84a6SVlad Yasevich struct inet_sock *inet = inet_sk(sk); 15680bbe84a6SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 15690bbe84a6SVlad Yasevich int exthdrlen; 15700bbe84a6SVlad Yasevich int err; 15710bbe84a6SVlad Yasevich 15720bbe84a6SVlad Yasevich if (flags&MSG_PROBE) 15730bbe84a6SVlad Yasevich return 0; 15740bbe84a6SVlad Yasevich if (skb_queue_empty(&sk->sk_write_queue)) { 15750bbe84a6SVlad Yasevich /* 15760bbe84a6SVlad Yasevich * setup for corking 15770bbe84a6SVlad Yasevich */ 15780bbe84a6SVlad Yasevich err = ip6_setup_cork(sk, &inet->cork, &np->cork, hlimit, 15790bbe84a6SVlad Yasevich tclass, opt, rt, fl6); 15800bbe84a6SVlad Yasevich if (err) 15810bbe84a6SVlad Yasevich return err; 15820bbe84a6SVlad Yasevich 15830bbe84a6SVlad Yasevich exthdrlen = (opt ? opt->opt_flen : 0); 15840bbe84a6SVlad Yasevich length += exthdrlen; 15850bbe84a6SVlad Yasevich transhdrlen += exthdrlen; 15860bbe84a6SVlad Yasevich } else { 15870bbe84a6SVlad Yasevich fl6 = &inet->cork.fl.u.ip6; 15880bbe84a6SVlad Yasevich transhdrlen = 0; 15890bbe84a6SVlad Yasevich } 15900bbe84a6SVlad Yasevich 15910bbe84a6SVlad Yasevich return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base, 15920bbe84a6SVlad Yasevich &np->cork, sk_page_frag(sk), getfrag, 15930bbe84a6SVlad Yasevich from, length, transhdrlen, flags, dontfrag); 15940bbe84a6SVlad Yasevich } 1595a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data); 15961da177e4SLinus Torvalds 1597366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork, 1598366e41d9SVlad Yasevich struct inet6_cork *v6_cork) 1599bf138862SPavel Emelyanov { 1600366e41d9SVlad Yasevich if (v6_cork->opt) { 1601366e41d9SVlad Yasevich kfree(v6_cork->opt->dst0opt); 1602366e41d9SVlad Yasevich kfree(v6_cork->opt->dst1opt); 1603366e41d9SVlad Yasevich kfree(v6_cork->opt->hopopt); 1604366e41d9SVlad Yasevich kfree(v6_cork->opt->srcrt); 1605366e41d9SVlad Yasevich kfree(v6_cork->opt); 1606366e41d9SVlad Yasevich v6_cork->opt = NULL; 16070178b695SHerbert Xu } 16080178b695SHerbert Xu 1609366e41d9SVlad Yasevich if (cork->base.dst) { 1610366e41d9SVlad Yasevich dst_release(cork->base.dst); 1611366e41d9SVlad Yasevich cork->base.dst = NULL; 1612366e41d9SVlad Yasevich cork->base.flags &= ~IPCORK_ALLFRAG; 1613bf138862SPavel Emelyanov } 1614366e41d9SVlad Yasevich memset(&cork->fl, 0, sizeof(cork->fl)); 1615bf138862SPavel Emelyanov } 1616bf138862SPavel Emelyanov 16176422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk, 16186422398cSVlad Yasevich struct sk_buff_head *queue, 16196422398cSVlad Yasevich struct inet_cork_full *cork, 16206422398cSVlad Yasevich struct inet6_cork *v6_cork) 16211da177e4SLinus Torvalds { 16221da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 16231da177e4SLinus Torvalds struct sk_buff **tail_skb; 16241da177e4SLinus Torvalds struct in6_addr final_dst_buf, *final_dst = &final_dst_buf; 16251da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 16263bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 16271da177e4SLinus Torvalds struct ipv6hdr *hdr; 16286422398cSVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 16296422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->base.dst; 16306422398cSVlad Yasevich struct flowi6 *fl6 = &cork->fl.u.ip6; 16314c9483b2SDavid S. Miller unsigned char proto = fl6->flowi6_proto; 16321da177e4SLinus Torvalds 16336422398cSVlad Yasevich skb = __skb_dequeue(queue); 163463159f29SIan Morris if (!skb) 16351da177e4SLinus Torvalds goto out; 16361da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 16371da177e4SLinus Torvalds 16381da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1639d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1640bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 16416422398cSVlad Yasevich while ((tmp_skb = __skb_dequeue(queue)) != NULL) { 1642cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 16431da177e4SLinus Torvalds *tail_skb = tmp_skb; 16441da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 16451da177e4SLinus Torvalds skb->len += tmp_skb->len; 16461da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 16471da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 16481da177e4SLinus Torvalds tmp_skb->destructor = NULL; 16491da177e4SLinus Torvalds tmp_skb->sk = NULL; 16501da177e4SLinus Torvalds } 16511da177e4SLinus Torvalds 165228a89453SHerbert Xu /* Allow local fragmentation. */ 165360ff7467SWANG Cong skb->ignore_df = ip6_sk_ignore_df(sk); 165428a89453SHerbert Xu 16554e3fd7a0SAlexey Dobriyan *final_dst = fl6->daddr; 1656cfe1fc77SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_header_len(skb)); 16571da177e4SLinus Torvalds if (opt && opt->opt_flen) 16581da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 16591da177e4SLinus Torvalds if (opt && opt->opt_nflen) 16601da177e4SLinus Torvalds ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst); 16611da177e4SLinus Torvalds 1662e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 1663e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 16640660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 16651da177e4SLinus Torvalds 16666422398cSVlad Yasevich ip6_flow_hdr(hdr, v6_cork->tclass, 1667cb1ce2efSTom Herbert ip6_make_flowlabel(net, skb, fl6->flowlabel, 166867800f9bSTom Herbert np->autoflowlabel, fl6)); 16696422398cSVlad Yasevich hdr->hop_limit = v6_cork->hop_limit; 16701da177e4SLinus Torvalds hdr->nexthdr = proto; 16714e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 16724e3fd7a0SAlexey Dobriyan hdr->daddr = *final_dst; 16731da177e4SLinus Torvalds 1674a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 16754a19ec58SLaszlo Attila Toth skb->mark = sk->sk_mark; 1676a2c2064fSPatrick McHardy 1677d8d1f30bSChangli Gao skb_dst_set(skb, dst_clone(&rt->dst)); 1678edf391ffSNeil Horman IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len); 167914878f75SDavid L Stevens if (proto == IPPROTO_ICMPV6) { 1680adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 168114878f75SDavid L Stevens 168243a43b60SHannes Frederic Sowa ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type); 168343a43b60SHannes Frederic Sowa ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS); 168414878f75SDavid L Stevens } 168514878f75SDavid L Stevens 16866422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 16876422398cSVlad Yasevich out: 16886422398cSVlad Yasevich return skb; 16896422398cSVlad Yasevich } 16906422398cSVlad Yasevich 16916422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb) 16926422398cSVlad Yasevich { 16936422398cSVlad Yasevich struct net *net = sock_net(skb->sk); 16946422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 16956422398cSVlad Yasevich int err; 16966422398cSVlad Yasevich 169733224b16SEric W. Biederman err = ip6_local_out(net, skb->sk, skb); 16981da177e4SLinus Torvalds if (err) { 16991da177e4SLinus Torvalds if (err > 0) 17006ce9e7b5SEric Dumazet err = net_xmit_errno(err); 17011da177e4SLinus Torvalds if (err) 17026422398cSVlad Yasevich IP6_INC_STATS(net, rt->rt6i_idev, 17036422398cSVlad Yasevich IPSTATS_MIB_OUTDISCARDS); 17041da177e4SLinus Torvalds } 17051da177e4SLinus Torvalds 17061da177e4SLinus Torvalds return err; 17076422398cSVlad Yasevich } 17086422398cSVlad Yasevich 17096422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk) 17106422398cSVlad Yasevich { 17116422398cSVlad Yasevich struct sk_buff *skb; 17126422398cSVlad Yasevich 17136422398cSVlad Yasevich skb = ip6_finish_skb(sk); 17146422398cSVlad Yasevich if (!skb) 17156422398cSVlad Yasevich return 0; 17166422398cSVlad Yasevich 17176422398cSVlad Yasevich return ip6_send_skb(skb); 17181da177e4SLinus Torvalds } 1719a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames); 17201da177e4SLinus Torvalds 17210bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk, 17226422398cSVlad Yasevich struct sk_buff_head *queue, 17236422398cSVlad Yasevich struct inet_cork_full *cork, 17246422398cSVlad Yasevich struct inet6_cork *v6_cork) 17251da177e4SLinus Torvalds { 17261da177e4SLinus Torvalds struct sk_buff *skb; 17271da177e4SLinus Torvalds 17280bbe84a6SVlad Yasevich while ((skb = __skb_dequeue_tail(queue)) != NULL) { 1729adf30907SEric Dumazet if (skb_dst(skb)) 1730adf30907SEric Dumazet IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)), 1731a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 17321da177e4SLinus Torvalds kfree_skb(skb); 17331da177e4SLinus Torvalds } 17341da177e4SLinus Torvalds 17356422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 17361da177e4SLinus Torvalds } 17370bbe84a6SVlad Yasevich 17380bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk) 17390bbe84a6SVlad Yasevich { 17406422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &sk->sk_write_queue, 17416422398cSVlad Yasevich &inet_sk(sk)->cork, &inet6_sk(sk)->cork); 17420bbe84a6SVlad Yasevich } 1743a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames); 17446422398cSVlad Yasevich 17456422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk, 17466422398cSVlad Yasevich int getfrag(void *from, char *to, int offset, 17476422398cSVlad Yasevich int len, int odd, struct sk_buff *skb), 17486422398cSVlad Yasevich void *from, int length, int transhdrlen, 17496422398cSVlad Yasevich int hlimit, int tclass, 17506422398cSVlad Yasevich struct ipv6_txoptions *opt, struct flowi6 *fl6, 17516422398cSVlad Yasevich struct rt6_info *rt, unsigned int flags, 17526422398cSVlad Yasevich int dontfrag) 17536422398cSVlad Yasevich { 17546422398cSVlad Yasevich struct inet_cork_full cork; 17556422398cSVlad Yasevich struct inet6_cork v6_cork; 17566422398cSVlad Yasevich struct sk_buff_head queue; 17576422398cSVlad Yasevich int exthdrlen = (opt ? opt->opt_flen : 0); 17586422398cSVlad Yasevich int err; 17596422398cSVlad Yasevich 17606422398cSVlad Yasevich if (flags & MSG_PROBE) 17616422398cSVlad Yasevich return NULL; 17626422398cSVlad Yasevich 17636422398cSVlad Yasevich __skb_queue_head_init(&queue); 17646422398cSVlad Yasevich 17656422398cSVlad Yasevich cork.base.flags = 0; 17666422398cSVlad Yasevich cork.base.addr = 0; 17676422398cSVlad Yasevich cork.base.opt = NULL; 17686422398cSVlad Yasevich v6_cork.opt = NULL; 17696422398cSVlad Yasevich err = ip6_setup_cork(sk, &cork, &v6_cork, hlimit, tclass, opt, rt, fl6); 17706422398cSVlad Yasevich if (err) 17716422398cSVlad Yasevich return ERR_PTR(err); 17726422398cSVlad Yasevich 17736422398cSVlad Yasevich if (dontfrag < 0) 17746422398cSVlad Yasevich dontfrag = inet6_sk(sk)->dontfrag; 17756422398cSVlad Yasevich 17766422398cSVlad Yasevich err = __ip6_append_data(sk, fl6, &queue, &cork.base, &v6_cork, 17776422398cSVlad Yasevich ¤t->task_frag, getfrag, from, 17786422398cSVlad Yasevich length + exthdrlen, transhdrlen + exthdrlen, 17796422398cSVlad Yasevich flags, dontfrag); 17806422398cSVlad Yasevich if (err) { 17816422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &queue, &cork, &v6_cork); 17826422398cSVlad Yasevich return ERR_PTR(err); 17836422398cSVlad Yasevich } 17846422398cSVlad Yasevich 17856422398cSVlad Yasevich return __ip6_make_skb(sk, &queue, &cork, &v6_cork); 17866422398cSVlad Yasevich } 1787