11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * IPv6 output functions 31da177e4SLinus Torvalds * Linux INET6 implementation 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * Authors: 61da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 71da177e4SLinus Torvalds * 81da177e4SLinus Torvalds * Based on linux/net/ipv4/ip_output.c 91da177e4SLinus Torvalds * 101da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or 111da177e4SLinus Torvalds * modify it under the terms of the GNU General Public License 121da177e4SLinus Torvalds * as published by the Free Software Foundation; either version 131da177e4SLinus Torvalds * 2 of the License, or (at your option) any later version. 141da177e4SLinus Torvalds * 151da177e4SLinus Torvalds * Changes: 161da177e4SLinus Torvalds * A.N.Kuznetsov : airthmetics in fragmentation. 171da177e4SLinus Torvalds * extension headers are implemented. 181da177e4SLinus Torvalds * route changes now work. 191da177e4SLinus Torvalds * ip6_forward does not confuse sniffers. 201da177e4SLinus Torvalds * etc. 211da177e4SLinus Torvalds * 221da177e4SLinus Torvalds * H. von Brand : Added missing #include <linux/string.h> 231da177e4SLinus Torvalds * Imran Patel : frag id should be in NBO 241da177e4SLinus Torvalds * Kazunori MIYAZAWA @USAGI 251da177e4SLinus Torvalds * : add ip6_append_data and related functions 261da177e4SLinus Torvalds * for datagram xmit 271da177e4SLinus Torvalds */ 281da177e4SLinus Torvalds 291da177e4SLinus Torvalds #include <linux/errno.h> 30ef76bc23SHerbert Xu #include <linux/kernel.h> 311da177e4SLinus Torvalds #include <linux/string.h> 321da177e4SLinus Torvalds #include <linux/socket.h> 331da177e4SLinus Torvalds #include <linux/net.h> 341da177e4SLinus Torvalds #include <linux/netdevice.h> 351da177e4SLinus Torvalds #include <linux/if_arp.h> 361da177e4SLinus Torvalds #include <linux/in6.h> 371da177e4SLinus Torvalds #include <linux/tcp.h> 381da177e4SLinus Torvalds #include <linux/route.h> 39b59f45d0SHerbert Xu #include <linux/module.h> 405a0e3ad6STejun Heo #include <linux/slab.h> 411da177e4SLinus Torvalds 4233b48679SDaniel Mack #include <linux/bpf-cgroup.h> 431da177e4SLinus Torvalds #include <linux/netfilter.h> 441da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h> 451da177e4SLinus Torvalds 461da177e4SLinus Torvalds #include <net/sock.h> 471da177e4SLinus Torvalds #include <net/snmp.h> 481da177e4SLinus Torvalds 491da177e4SLinus Torvalds #include <net/ipv6.h> 501da177e4SLinus Torvalds #include <net/ndisc.h> 511da177e4SLinus Torvalds #include <net/protocol.h> 521da177e4SLinus Torvalds #include <net/ip6_route.h> 531da177e4SLinus Torvalds #include <net/addrconf.h> 541da177e4SLinus Torvalds #include <net/rawv6.h> 551da177e4SLinus Torvalds #include <net/icmp.h> 561da177e4SLinus Torvalds #include <net/xfrm.h> 571da177e4SLinus Torvalds #include <net/checksum.h> 587bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h> 59ca254490SDavid Ahern #include <net/l3mdev.h> 6014972cbdSRoopa Prabhu #include <net/lwtunnel.h> 611da177e4SLinus Torvalds 627d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb) 631da177e4SLinus Torvalds { 64adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 651da177e4SLinus Torvalds struct net_device *dev = dst->dev; 66f6b72b62SDavid S. Miller struct neighbour *neigh; 676fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 struct in6_addr *nexthop; 686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 int ret; 691da177e4SLinus Torvalds 700660e03fSArnaldo Carvalho de Melo if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) { 71adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 721da177e4SLinus Torvalds 737026b1ddSDavid Miller if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) && 748571ab47SYuval Mintz ((mroute6_is_socket(net, skb) && 75bd91b8bfSBenjamin Thery !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) || 760660e03fSArnaldo Carvalho de Melo ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr, 777bc570c8SYOSHIFUJI Hideaki &ipv6_hdr(skb)->saddr))) { 781da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 791da177e4SLinus Torvalds 801da177e4SLinus Torvalds /* Do not check for IFF_ALLMULTI; multicast routing 811da177e4SLinus Torvalds is not supported in any case. 821da177e4SLinus Torvalds */ 831da177e4SLinus Torvalds if (newskb) 84b2e0b385SJan Engelhardt NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING, 8529a26a56SEric W. Biederman net, sk, newskb, NULL, newskb->dev, 8695603e22SMichel Machado dev_loopback_xmit); 871da177e4SLinus Torvalds 880660e03fSArnaldo Carvalho de Melo if (ipv6_hdr(skb)->hop_limit == 0) { 8978126c41SEric W. Biederman IP6_INC_STATS(net, idev, 903bd653c8SDenis V. Lunev IPSTATS_MIB_OUTDISCARDS); 911da177e4SLinus Torvalds kfree_skb(skb); 921da177e4SLinus Torvalds return 0; 931da177e4SLinus Torvalds } 941da177e4SLinus Torvalds } 951da177e4SLinus Torvalds 9678126c41SEric W. Biederman IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len); 97dd408515SHannes Frederic Sowa 98dd408515SHannes Frederic Sowa if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <= 99dd408515SHannes Frederic Sowa IPV6_ADDR_SCOPE_NODELOCAL && 100dd408515SHannes Frederic Sowa !(dev->flags & IFF_LOOPBACK)) { 101dd408515SHannes Frederic Sowa kfree_skb(skb); 102dd408515SHannes Frederic Sowa return 0; 103dd408515SHannes Frederic Sowa } 1041da177e4SLinus Torvalds } 1051da177e4SLinus Torvalds 10614972cbdSRoopa Prabhu if (lwtunnel_xmit_redirect(dst->lwtstate)) { 10714972cbdSRoopa Prabhu int res = lwtunnel_xmit(skb); 10814972cbdSRoopa Prabhu 10914972cbdSRoopa Prabhu if (res < 0 || res == LWTUNNEL_XMIT_DONE) 11014972cbdSRoopa Prabhu return res; 11114972cbdSRoopa Prabhu } 11214972cbdSRoopa Prabhu 1136fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 1142647a9b0SMartin KaFai Lau nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr); 1156fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop); 1166fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(!neigh)) 1176fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false); 1186fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (!IS_ERR(neigh)) { 1194ff06203SJulian Anastasov sock_confirm_neigh(skb, neigh); 1200353f282SDavid Ahern ret = neigh_output(neigh, skb, false); 1216fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1226fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 return ret; 1236fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 } 1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 12505e3aa09SDavid S. Miller 12678126c41SEric W. Biederman IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES); 1279e508490SJan Engelhardt kfree_skb(skb); 1289e508490SJan Engelhardt return -EINVAL; 1291da177e4SLinus Torvalds } 1301da177e4SLinus Torvalds 131*956fe219Sbrakmo static int __ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1329e508490SJan Engelhardt { 13309ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM) 13409ee9dbaSTobias Brunner /* Policy lookup after SNAT yielded a new policy */ 13509ee9dbaSTobias Brunner if (skb_dst(skb)->xfrm) { 13609ee9dbaSTobias Brunner IPCB(skb)->flags |= IPSKB_REROUTED; 13709ee9dbaSTobias Brunner return dst_output(net, sk, skb); 13809ee9dbaSTobias Brunner } 13909ee9dbaSTobias Brunner #endif 14009ee9dbaSTobias Brunner 1419e508490SJan Engelhardt if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) || 1429037c357SJiri Pirko dst_allfrag(skb_dst(skb)) || 1439037c357SJiri Pirko (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size)) 1447d8c6e39SEric W. Biederman return ip6_fragment(net, sk, skb, ip6_finish_output2); 1459e508490SJan Engelhardt else 1467d8c6e39SEric W. Biederman return ip6_finish_output2(net, sk, skb); 1479e508490SJan Engelhardt } 1489e508490SJan Engelhardt 149*956fe219Sbrakmo static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 150*956fe219Sbrakmo { 151*956fe219Sbrakmo int ret; 152*956fe219Sbrakmo 153*956fe219Sbrakmo ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb); 154*956fe219Sbrakmo switch (ret) { 155*956fe219Sbrakmo case NET_XMIT_SUCCESS: 156*956fe219Sbrakmo return __ip6_finish_output(net, sk, skb); 157*956fe219Sbrakmo case NET_XMIT_CN: 158*956fe219Sbrakmo return __ip6_finish_output(net, sk, skb) ? : ret; 159*956fe219Sbrakmo default: 160*956fe219Sbrakmo kfree_skb(skb); 161*956fe219Sbrakmo return ret; 162*956fe219Sbrakmo } 163*956fe219Sbrakmo } 164*956fe219Sbrakmo 165ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1661da177e4SLinus Torvalds { 1679e508490SJan Engelhardt struct net_device *dev = skb_dst(skb)->dev; 168adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 169be10de0aSEric W. Biederman 17097a7a37aSChenbo Feng skb->protocol = htons(ETH_P_IPV6); 17197a7a37aSChenbo Feng skb->dev = dev; 17297a7a37aSChenbo Feng 173778d80beSYOSHIFUJI Hideaki if (unlikely(idev->cnf.disable_ipv6)) { 17419a0644cSEric W. Biederman IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 175778d80beSYOSHIFUJI Hideaki kfree_skb(skb); 176778d80beSYOSHIFUJI Hideaki return 0; 177778d80beSYOSHIFUJI Hideaki } 178778d80beSYOSHIFUJI Hideaki 17929a26a56SEric W. Biederman return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING, 18029a26a56SEric W. Biederman net, sk, skb, NULL, dev, 1819c6eb28aSJan Engelhardt ip6_finish_output, 1829c6eb28aSJan Engelhardt !(IP6CB(skb)->flags & IP6SKB_REROUTED)); 1831da177e4SLinus Torvalds } 1841da177e4SLinus Torvalds 185e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np) 186513674b5SShaohua Li { 187513674b5SShaohua Li if (!np->autoflowlabel_set) 188513674b5SShaohua Li return ip6_default_np_autolabel(net); 189513674b5SShaohua Li else 190513674b5SShaohua Li return np->autoflowlabel; 191513674b5SShaohua Li } 192513674b5SShaohua Li 1931da177e4SLinus Torvalds /* 194b5d43998SShan Wei * xmit an sk_buff (used by TCP, SCTP and DCCP) 1951c1e9d2bSEric Dumazet * Note : socket lock is not held for SYNACK packets, but might be modified 1961c1e9d2bSEric Dumazet * by calls to skb_set_owner_w() and ipv6_local_error(), 1971c1e9d2bSEric Dumazet * which are using proper atomic operations or spinlocks. 1981da177e4SLinus Torvalds */ 1991c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6, 20092e55f41SPablo Neira __u32 mark, struct ipv6_txoptions *opt, int tclass) 2011da177e4SLinus Torvalds { 2023bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 2031c1e9d2bSEric Dumazet const struct ipv6_pinfo *np = inet6_sk(sk); 2044c9483b2SDavid S. Miller struct in6_addr *first_hop = &fl6->daddr; 205adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 20666033f47SStefano Brivio unsigned int head_room; 2071da177e4SLinus Torvalds struct ipv6hdr *hdr; 2084c9483b2SDavid S. Miller u8 proto = fl6->flowi6_proto; 2091da177e4SLinus Torvalds int seg_len = skb->len; 210e651f03aSGerrit Renker int hlimit = -1; 2111da177e4SLinus Torvalds u32 mtu; 2121da177e4SLinus Torvalds 21366033f47SStefano Brivio head_room = sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev); 21466033f47SStefano Brivio if (opt) 21566033f47SStefano Brivio head_room += opt->opt_nflen + opt->opt_flen; 2161da177e4SLinus Torvalds 21766033f47SStefano Brivio if (unlikely(skb_headroom(skb) < head_room)) { 2181da177e4SLinus Torvalds struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room); 21963159f29SIan Morris if (!skb2) { 220adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 221a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 2221da177e4SLinus Torvalds kfree_skb(skb); 2231da177e4SLinus Torvalds return -ENOBUFS; 2241da177e4SLinus Torvalds } 225bbd6528dSEric Dumazet if (skb->sk) 226bbd6528dSEric Dumazet skb_set_owner_w(skb2, skb->sk); 227808db80aSEric Dumazet consume_skb(skb); 228a11d206dSYOSHIFUJI Hideaki skb = skb2; 2291da177e4SLinus Torvalds } 23066033f47SStefano Brivio 23166033f47SStefano Brivio if (opt) { 23266033f47SStefano Brivio seg_len += opt->opt_nflen + opt->opt_flen; 23366033f47SStefano Brivio 2341da177e4SLinus Torvalds if (opt->opt_flen) 2351da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 23666033f47SStefano Brivio 2371da177e4SLinus Torvalds if (opt->opt_nflen) 238613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop, 239613fa3caSDavid Lebrun &fl6->saddr); 2401da177e4SLinus Torvalds } 2411da177e4SLinus Torvalds 242e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 243e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 2440660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 2451da177e4SLinus Torvalds 2461da177e4SLinus Torvalds /* 2471da177e4SLinus Torvalds * Fill in the IPv6 header 2481da177e4SLinus Torvalds */ 249b903d324SEric Dumazet if (np) 2501da177e4SLinus Torvalds hlimit = np->hop_limit; 2511da177e4SLinus Torvalds if (hlimit < 0) 2526b75d090SYOSHIFUJI Hideaki hlimit = ip6_dst_hoplimit(dst); 2531da177e4SLinus Torvalds 254cb1ce2efSTom Herbert ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel, 255513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 25641a1f8eaSYOSHIFUJI Hideaki 2571da177e4SLinus Torvalds hdr->payload_len = htons(seg_len); 2581da177e4SLinus Torvalds hdr->nexthdr = proto; 2591da177e4SLinus Torvalds hdr->hop_limit = hlimit; 2601da177e4SLinus Torvalds 2614e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 2624e3fd7a0SAlexey Dobriyan hdr->daddr = *first_hop; 2631da177e4SLinus Torvalds 2649c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 265a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 26692e55f41SPablo Neira skb->mark = mark; 267a2c2064fSPatrick McHardy 2681da177e4SLinus Torvalds mtu = dst_mtu(dst); 26960ff7467SWANG Cong if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) { 270adf30907SEric Dumazet IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)), 271edf391ffSNeil Horman IPSTATS_MIB_OUT, skb->len); 272a8e3e1a9SDavid Ahern 273a8e3e1a9SDavid Ahern /* if egress device is enslaved to an L3 master device pass the 274a8e3e1a9SDavid Ahern * skb to its handler for processing 275a8e3e1a9SDavid Ahern */ 276a8e3e1a9SDavid Ahern skb = l3mdev_ip6_out((struct sock *)sk, skb); 277a8e3e1a9SDavid Ahern if (unlikely(!skb)) 278a8e3e1a9SDavid Ahern return 0; 279a8e3e1a9SDavid Ahern 2801c1e9d2bSEric Dumazet /* hooks should never assume socket lock is held. 2811c1e9d2bSEric Dumazet * we promote our socket to non const 2821c1e9d2bSEric Dumazet */ 28329a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, 2841c1e9d2bSEric Dumazet net, (struct sock *)sk, skb, NULL, dst->dev, 28513206b6bSEric W. Biederman dst_output); 2861da177e4SLinus Torvalds } 2871da177e4SLinus Torvalds 2881da177e4SLinus Torvalds skb->dev = dst->dev; 2891c1e9d2bSEric Dumazet /* ipv6_local_error() does not require socket lock, 2901c1e9d2bSEric Dumazet * we promote our socket to non const 2911c1e9d2bSEric Dumazet */ 2921c1e9d2bSEric Dumazet ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu); 2931c1e9d2bSEric Dumazet 294adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS); 2951da177e4SLinus Torvalds kfree_skb(skb); 2961da177e4SLinus Torvalds return -EMSGSIZE; 2971da177e4SLinus Torvalds } 2987159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit); 2997159039aSYOSHIFUJI Hideaki 3001da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel) 3011da177e4SLinus Torvalds { 3021da177e4SLinus Torvalds struct ip6_ra_chain *ra; 3031da177e4SLinus Torvalds struct sock *last = NULL; 3041da177e4SLinus Torvalds 3051da177e4SLinus Torvalds read_lock(&ip6_ra_lock); 3061da177e4SLinus Torvalds for (ra = ip6_ra_chain; ra; ra = ra->next) { 3071da177e4SLinus Torvalds struct sock *sk = ra->sk; 3080bd1b59bSAndrew McDonald if (sk && ra->sel == sel && 3090bd1b59bSAndrew McDonald (!sk->sk_bound_dev_if || 3100bd1b59bSAndrew McDonald sk->sk_bound_dev_if == skb->dev->ifindex)) { 3119036b2feSFrancesco Ruggeri struct ipv6_pinfo *np = inet6_sk(sk); 3129036b2feSFrancesco Ruggeri 3139036b2feSFrancesco Ruggeri if (np && np->rtalert_isolate && 3149036b2feSFrancesco Ruggeri !net_eq(sock_net(sk), dev_net(skb->dev))) { 3159036b2feSFrancesco Ruggeri continue; 3169036b2feSFrancesco Ruggeri } 3171da177e4SLinus Torvalds if (last) { 3181da177e4SLinus Torvalds struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC); 3191da177e4SLinus Torvalds if (skb2) 3201da177e4SLinus Torvalds rawv6_rcv(last, skb2); 3211da177e4SLinus Torvalds } 3221da177e4SLinus Torvalds last = sk; 3231da177e4SLinus Torvalds } 3241da177e4SLinus Torvalds } 3251da177e4SLinus Torvalds 3261da177e4SLinus Torvalds if (last) { 3271da177e4SLinus Torvalds rawv6_rcv(last, skb); 3281da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3291da177e4SLinus Torvalds return 1; 3301da177e4SLinus Torvalds } 3311da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3321da177e4SLinus Torvalds return 0; 3331da177e4SLinus Torvalds } 3341da177e4SLinus Torvalds 335e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb) 336e21e0b5fSVille Nuorvala { 3370660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 338e21e0b5fSVille Nuorvala u8 nexthdr = hdr->nexthdr; 33975f2811cSJesse Gross __be16 frag_off; 340e21e0b5fSVille Nuorvala int offset; 341e21e0b5fSVille Nuorvala 342e21e0b5fSVille Nuorvala if (ipv6_ext_hdr(nexthdr)) { 34375f2811cSJesse Gross offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off); 344e21e0b5fSVille Nuorvala if (offset < 0) 345e21e0b5fSVille Nuorvala return 0; 346e21e0b5fSVille Nuorvala } else 347e21e0b5fSVille Nuorvala offset = sizeof(struct ipv6hdr); 348e21e0b5fSVille Nuorvala 349e21e0b5fSVille Nuorvala if (nexthdr == IPPROTO_ICMPV6) { 350e21e0b5fSVille Nuorvala struct icmp6hdr *icmp6; 351e21e0b5fSVille Nuorvala 352d56f90a7SArnaldo Carvalho de Melo if (!pskb_may_pull(skb, (skb_network_header(skb) + 353d56f90a7SArnaldo Carvalho de Melo offset + 1 - skb->data))) 354e21e0b5fSVille Nuorvala return 0; 355e21e0b5fSVille Nuorvala 356d56f90a7SArnaldo Carvalho de Melo icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset); 357e21e0b5fSVille Nuorvala 358e21e0b5fSVille Nuorvala switch (icmp6->icmp6_type) { 359e21e0b5fSVille Nuorvala case NDISC_ROUTER_SOLICITATION: 360e21e0b5fSVille Nuorvala case NDISC_ROUTER_ADVERTISEMENT: 361e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_SOLICITATION: 362e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_ADVERTISEMENT: 363e21e0b5fSVille Nuorvala case NDISC_REDIRECT: 364e21e0b5fSVille Nuorvala /* For reaction involving unicast neighbor discovery 365e21e0b5fSVille Nuorvala * message destined to the proxied address, pass it to 366e21e0b5fSVille Nuorvala * input function. 367e21e0b5fSVille Nuorvala */ 368e21e0b5fSVille Nuorvala return 1; 369e21e0b5fSVille Nuorvala default: 370e21e0b5fSVille Nuorvala break; 371e21e0b5fSVille Nuorvala } 372e21e0b5fSVille Nuorvala } 373e21e0b5fSVille Nuorvala 37474553b09SVille Nuorvala /* 37574553b09SVille Nuorvala * The proxying router can't forward traffic sent to a link-local 37674553b09SVille Nuorvala * address, so signal the sender and discard the packet. This 37774553b09SVille Nuorvala * behavior is clarified by the MIPv6 specification. 37874553b09SVille Nuorvala */ 37974553b09SVille Nuorvala if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) { 38074553b09SVille Nuorvala dst_link_failure(skb); 38174553b09SVille Nuorvala return -1; 38274553b09SVille Nuorvala } 38374553b09SVille Nuorvala 384e21e0b5fSVille Nuorvala return 0; 385e21e0b5fSVille Nuorvala } 386e21e0b5fSVille Nuorvala 3870c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk, 3880c4b51f0SEric W. Biederman struct sk_buff *skb) 3891da177e4SLinus Torvalds { 39071a1c915SJeff Barnhill struct dst_entry *dst = skb_dst(skb); 39171a1c915SJeff Barnhill 39271a1c915SJeff Barnhill __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS); 39371a1c915SJeff Barnhill __IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len); 39471a1c915SJeff Barnhill 395f839a6c9SIdo Schimmel #ifdef CONFIG_NET_SWITCHDEV 396f839a6c9SIdo Schimmel if (skb->offload_l3_fwd_mark) { 397f839a6c9SIdo Schimmel consume_skb(skb); 398f839a6c9SIdo Schimmel return 0; 399f839a6c9SIdo Schimmel } 400f839a6c9SIdo Schimmel #endif 401f839a6c9SIdo Schimmel 4028203e2d8SEric Dumazet skb->tstamp = 0; 40313206b6bSEric W. Biederman return dst_output(net, sk, skb); 4041da177e4SLinus Torvalds } 4051da177e4SLinus Torvalds 406fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu) 407fe6cc55fSFlorian Westphal { 408418a3156SFlorian Westphal if (skb->len <= mtu) 409fe6cc55fSFlorian Westphal return false; 410fe6cc55fSFlorian Westphal 41160ff7467SWANG Cong /* ipv6 conntrack defrag sets max_frag_size + ignore_df */ 412fe6cc55fSFlorian Westphal if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu) 413fe6cc55fSFlorian Westphal return true; 414fe6cc55fSFlorian Westphal 41560ff7467SWANG Cong if (skb->ignore_df) 416418a3156SFlorian Westphal return false; 417418a3156SFlorian Westphal 418779b7931SDaniel Axtens if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu)) 419fe6cc55fSFlorian Westphal return false; 420fe6cc55fSFlorian Westphal 421fe6cc55fSFlorian Westphal return true; 422fe6cc55fSFlorian Westphal } 423fe6cc55fSFlorian Westphal 4241da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb) 4251da177e4SLinus Torvalds { 426bdb7cc64SStephen Suryaputra struct inet6_dev *idev = __in6_dev_get_safely(skb->dev); 427adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 4280660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 4291da177e4SLinus Torvalds struct inet6_skb_parm *opt = IP6CB(skb); 430c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(dst->dev); 43114f3ad6fSUlrich Weber u32 mtu; 4321da177e4SLinus Torvalds 43353b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->forwarding == 0) 4341da177e4SLinus Torvalds goto error; 4351da177e4SLinus Torvalds 436090f1166SLi RongQing if (skb->pkt_type != PACKET_HOST) 437090f1166SLi RongQing goto drop; 438090f1166SLi RongQing 4399ef2e965SHannes Frederic Sowa if (unlikely(skb->sk)) 4409ef2e965SHannes Frederic Sowa goto drop; 4419ef2e965SHannes Frederic Sowa 4424497b076SBen Hutchings if (skb_warn_if_lro(skb)) 4434497b076SBen Hutchings goto drop; 4444497b076SBen Hutchings 4451da177e4SLinus Torvalds if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) { 446bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 4471da177e4SLinus Torvalds goto drop; 4481da177e4SLinus Torvalds } 4491da177e4SLinus Torvalds 45035fc92a9SHerbert Xu skb_forward_csum(skb); 4511da177e4SLinus Torvalds 4521da177e4SLinus Torvalds /* 4531da177e4SLinus Torvalds * We DO NOT make any processing on 4541da177e4SLinus Torvalds * RA packets, pushing them to user level AS IS 4551da177e4SLinus Torvalds * without ane WARRANTY that application will be able 4561da177e4SLinus Torvalds * to interpret them. The reason is that we 4571da177e4SLinus Torvalds * cannot make anything clever here. 4581da177e4SLinus Torvalds * 4591da177e4SLinus Torvalds * We are not end-node, so that if packet contains 4601da177e4SLinus Torvalds * AH/ESP, we cannot make anything. 4611da177e4SLinus Torvalds * Defragmentation also would be mistake, RA packets 4621da177e4SLinus Torvalds * cannot be fragmented, because there is no warranty 4631da177e4SLinus Torvalds * that different fragments will go along one path. --ANK 4641da177e4SLinus Torvalds */ 465ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) { 466ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (ip6_call_ra_chain(skb, ntohs(opt->ra))) 4671da177e4SLinus Torvalds return 0; 4681da177e4SLinus Torvalds } 4691da177e4SLinus Torvalds 4701da177e4SLinus Torvalds /* 4711da177e4SLinus Torvalds * check and decrement ttl 4721da177e4SLinus Torvalds */ 4731da177e4SLinus Torvalds if (hdr->hop_limit <= 1) { 4741da177e4SLinus Torvalds /* Force OUTPUT device used as source address */ 4751da177e4SLinus Torvalds skb->dev = dst->dev; 4763ffe533cSAlexey Dobriyan icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0); 477bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS); 4781da177e4SLinus Torvalds 4791da177e4SLinus Torvalds kfree_skb(skb); 4801da177e4SLinus Torvalds return -ETIMEDOUT; 4811da177e4SLinus Torvalds } 4821da177e4SLinus Torvalds 483fbea49e1SYOSHIFUJI Hideaki /* XXX: idev->cnf.proxy_ndp? */ 48453b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->proxy_ndp && 4858a3edd80SDaniel Lezcano pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) { 48674553b09SVille Nuorvala int proxied = ip6_forward_proxy_check(skb); 48774553b09SVille Nuorvala if (proxied > 0) 488e21e0b5fSVille Nuorvala return ip6_input(skb); 48974553b09SVille Nuorvala else if (proxied < 0) { 490bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 49174553b09SVille Nuorvala goto drop; 49274553b09SVille Nuorvala } 493e21e0b5fSVille Nuorvala } 494e21e0b5fSVille Nuorvala 4951da177e4SLinus Torvalds if (!xfrm6_route_forward(skb)) { 496bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 4971da177e4SLinus Torvalds goto drop; 4981da177e4SLinus Torvalds } 499adf30907SEric Dumazet dst = skb_dst(skb); 5001da177e4SLinus Torvalds 5011da177e4SLinus Torvalds /* IPv6 specs say nothing about it, but it is clear that we cannot 5021da177e4SLinus Torvalds send redirects to source routed frames. 5031e5dc146SMasahide NAKAMURA We don't send redirects to frames decapsulated from IPsec. 5041da177e4SLinus Torvalds */ 5052f17becfSStephen Suryaputra if (IP6CB(skb)->iif == dst->dev->ifindex && 5062f17becfSStephen Suryaputra opt->srcrt == 0 && !skb_sec_path(skb)) { 5071da177e4SLinus Torvalds struct in6_addr *target = NULL; 508fbfe95a4SDavid S. Miller struct inet_peer *peer; 5091da177e4SLinus Torvalds struct rt6_info *rt; 5101da177e4SLinus Torvalds 5111da177e4SLinus Torvalds /* 5121da177e4SLinus Torvalds * incoming and outgoing devices are the same 5131da177e4SLinus Torvalds * send a redirect. 5141da177e4SLinus Torvalds */ 5151da177e4SLinus Torvalds 5161da177e4SLinus Torvalds rt = (struct rt6_info *) dst; 517c45a3dfbSDavid S. Miller if (rt->rt6i_flags & RTF_GATEWAY) 518c45a3dfbSDavid S. Miller target = &rt->rt6i_gateway; 5191da177e4SLinus Torvalds else 5201da177e4SLinus Torvalds target = &hdr->daddr; 5211da177e4SLinus Torvalds 522fd0273d7SMartin KaFai Lau peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1); 52392d86829SDavid S. Miller 5241da177e4SLinus Torvalds /* Limit redirects both by destination (here) 5251da177e4SLinus Torvalds and by source (inside ndisc_send_redirect) 5261da177e4SLinus Torvalds */ 527fbfe95a4SDavid S. Miller if (inet_peer_xrlim_allow(peer, 1*HZ)) 5284991969aSDavid S. Miller ndisc_send_redirect(skb, target); 5291d861aa4SDavid S. Miller if (peer) 5301d861aa4SDavid S. Miller inet_putpeer(peer); 5315bb1ab09SDavid L Stevens } else { 5325bb1ab09SDavid L Stevens int addrtype = ipv6_addr_type(&hdr->saddr); 5335bb1ab09SDavid L Stevens 5341da177e4SLinus Torvalds /* This check is security critical. */ 535f81b2e7dSYOSHIFUJI Hideaki if (addrtype == IPV6_ADDR_ANY || 536f81b2e7dSYOSHIFUJI Hideaki addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK)) 5371da177e4SLinus Torvalds goto error; 5385bb1ab09SDavid L Stevens if (addrtype & IPV6_ADDR_LINKLOCAL) { 5395bb1ab09SDavid L Stevens icmpv6_send(skb, ICMPV6_DEST_UNREACH, 5403ffe533cSAlexey Dobriyan ICMPV6_NOT_NEIGHBOUR, 0); 5415bb1ab09SDavid L Stevens goto error; 5425bb1ab09SDavid L Stevens } 5431da177e4SLinus Torvalds } 5441da177e4SLinus Torvalds 5450954cf9cSHannes Frederic Sowa mtu = ip6_dst_mtu_forward(dst); 54614f3ad6fSUlrich Weber if (mtu < IPV6_MIN_MTU) 54714f3ad6fSUlrich Weber mtu = IPV6_MIN_MTU; 54814f3ad6fSUlrich Weber 549fe6cc55fSFlorian Westphal if (ip6_pkt_too_big(skb, mtu)) { 5501da177e4SLinus Torvalds /* Again, force OUTPUT device used as source address */ 5511da177e4SLinus Torvalds skb->dev = dst->dev; 55214f3ad6fSUlrich Weber icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 553bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS); 5541d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 55515c77d8bSEric Dumazet IPSTATS_MIB_FRAGFAILS); 5561da177e4SLinus Torvalds kfree_skb(skb); 5571da177e4SLinus Torvalds return -EMSGSIZE; 5581da177e4SLinus Torvalds } 5591da177e4SLinus Torvalds 5601da177e4SLinus Torvalds if (skb_cow(skb, dst->dev->hard_header_len)) { 5611d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 56215c77d8bSEric Dumazet IPSTATS_MIB_OUTDISCARDS); 5631da177e4SLinus Torvalds goto drop; 5641da177e4SLinus Torvalds } 5651da177e4SLinus Torvalds 5660660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 5671da177e4SLinus Torvalds 5681da177e4SLinus Torvalds /* Mangling hops number delayed to point after skb COW */ 5691da177e4SLinus Torvalds 5701da177e4SLinus Torvalds hdr->hop_limit--; 5711da177e4SLinus Torvalds 57229a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, 57329a26a56SEric W. Biederman net, NULL, skb, skb->dev, dst->dev, 5746e23ae2aSPatrick McHardy ip6_forward_finish); 5751da177e4SLinus Torvalds 5761da177e4SLinus Torvalds error: 577bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS); 5781da177e4SLinus Torvalds drop: 5791da177e4SLinus Torvalds kfree_skb(skb); 5801da177e4SLinus Torvalds return -EINVAL; 5811da177e4SLinus Torvalds } 5821da177e4SLinus Torvalds 5831da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from) 5841da177e4SLinus Torvalds { 5851da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 5861da177e4SLinus Torvalds to->priority = from->priority; 5871da177e4SLinus Torvalds to->protocol = from->protocol; 588adf30907SEric Dumazet skb_dst_drop(to); 589adf30907SEric Dumazet skb_dst_set(to, dst_clone(skb_dst(from))); 5901da177e4SLinus Torvalds to->dev = from->dev; 59182e91ffeSThomas Graf to->mark = from->mark; 5921da177e4SLinus Torvalds 5933dd1c9a1SPaolo Abeni skb_copy_hash(to, from); 5943dd1c9a1SPaolo Abeni 5951da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 5961da177e4SLinus Torvalds to->tc_index = from->tc_index; 5971da177e4SLinus Torvalds #endif 598e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 599df5042f4SFlorian Westphal skb_ext_copy(to, from); 600984bc16cSJames Morris skb_copy_secmark(to, from); 6011da177e4SLinus Torvalds } 6021da177e4SLinus Torvalds 6037d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, 6047d8c6e39SEric W. Biederman int (*output)(struct net *, struct sock *, struct sk_buff *)) 6051da177e4SLinus Torvalds { 6061da177e4SLinus Torvalds struct sk_buff *frag; 607adf30907SEric Dumazet struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 608f60e5990Shannes@stressinduktion.org struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? 609f60e5990Shannes@stressinduktion.org inet6_sk(skb->sk) : NULL; 6101da177e4SLinus Torvalds struct ipv6hdr *tmp_hdr; 6111da177e4SLinus Torvalds struct frag_hdr *fh; 612ef0efcd3SJunwei Hu unsigned int mtu, hlen, left, len, nexthdr_offset; 613a7ae1992SHerbert Xu int hroom, troom; 614286c2349SMartin KaFai Lau __be32 frag_id; 6151da177e4SLinus Torvalds int ptr, offset = 0, err = 0; 6161da177e4SLinus Torvalds u8 *prevhdr, nexthdr = 0; 6171da177e4SLinus Torvalds 6187dd7eb95SDavid S. Miller err = ip6_find_1stfragopt(skb, &prevhdr); 6197dd7eb95SDavid S. Miller if (err < 0) 6202423496aSCraig Gallek goto fail; 6217dd7eb95SDavid S. Miller hlen = err; 6221da177e4SLinus Torvalds nexthdr = *prevhdr; 623ef0efcd3SJunwei Hu nexthdr_offset = prevhdr - skb_network_header(skb); 6241da177e4SLinus Torvalds 625628a5c56SJohn Heffner mtu = ip6_skb_dst_mtu(skb); 626b881ef76SJohn Heffner 627b881ef76SJohn Heffner /* We must not fragment if the socket is set to force MTU discovery 62814f3ad6fSUlrich Weber * or if the skb it not generated by a local socket. 629b881ef76SJohn Heffner */ 630485fca66SFlorian Westphal if (unlikely(!skb->ignore_df && skb->len > mtu)) 631485fca66SFlorian Westphal goto fail_toobig; 632a34a101eSEric Dumazet 633485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size) { 634485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size > mtu) 635485fca66SFlorian Westphal goto fail_toobig; 636485fca66SFlorian Westphal 637485fca66SFlorian Westphal /* don't send fragments larger than what we received */ 638485fca66SFlorian Westphal mtu = IP6CB(skb)->frag_max_size; 639485fca66SFlorian Westphal if (mtu < IPV6_MIN_MTU) 640485fca66SFlorian Westphal mtu = IPV6_MIN_MTU; 641b881ef76SJohn Heffner } 642b881ef76SJohn Heffner 643d91675f9SYOSHIFUJI Hideaki if (np && np->frag_size < mtu) { 644d91675f9SYOSHIFUJI Hideaki if (np->frag_size) 645d91675f9SYOSHIFUJI Hideaki mtu = np->frag_size; 646d91675f9SYOSHIFUJI Hideaki } 64789bc7848SHannes Frederic Sowa if (mtu < hlen + sizeof(struct frag_hdr) + 8) 648b72a2b01SHannes Frederic Sowa goto fail_toobig; 6491e0d69a9SHannes Frederic Sowa mtu -= hlen + sizeof(struct frag_hdr); 6501da177e4SLinus Torvalds 651fd0273d7SMartin KaFai Lau frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr, 652fd0273d7SMartin KaFai Lau &ipv6_hdr(skb)->saddr); 653286c2349SMartin KaFai Lau 654405c92f7SHannes Frederic Sowa if (skb->ip_summed == CHECKSUM_PARTIAL && 655405c92f7SHannes Frederic Sowa (err = skb_checksum_help(skb))) 656405c92f7SHannes Frederic Sowa goto fail; 657405c92f7SHannes Frederic Sowa 658ef0efcd3SJunwei Hu prevhdr = skb_network_header(skb) + nexthdr_offset; 6591d325d21SFlorian Westphal hroom = LL_RESERVED_SPACE(rt->dst.dev); 66021dc3301SDavid S. Miller if (skb_has_frag_list(skb)) { 661c72d8cdaSAlexey Dobriyan unsigned int first_len = skb_pagelen(skb); 6623d13008eSEric Dumazet struct sk_buff *frag2; 6631da177e4SLinus Torvalds 6641da177e4SLinus Torvalds if (first_len - hlen > mtu || 6651da177e4SLinus Torvalds ((first_len - hlen) & 7) || 6661d325d21SFlorian Westphal skb_cloned(skb) || 6671d325d21SFlorian Westphal skb_headroom(skb) < (hroom + sizeof(struct frag_hdr))) 6681da177e4SLinus Torvalds goto slow_path; 6691da177e4SLinus Torvalds 6704d9092bbSDavid S. Miller skb_walk_frags(skb, frag) { 6711da177e4SLinus Torvalds /* Correct geometry. */ 6721da177e4SLinus Torvalds if (frag->len > mtu || 6731da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 6741d325d21SFlorian Westphal skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr))) 6753d13008eSEric Dumazet goto slow_path_clean; 6761da177e4SLinus Torvalds 6771da177e4SLinus Torvalds /* Partially cloned skb? */ 6781da177e4SLinus Torvalds if (skb_shared(frag)) 6793d13008eSEric Dumazet goto slow_path_clean; 6802fdba6b0SHerbert Xu 6812fdba6b0SHerbert Xu BUG_ON(frag->sk); 6822fdba6b0SHerbert Xu if (skb->sk) { 6832fdba6b0SHerbert Xu frag->sk = skb->sk; 6842fdba6b0SHerbert Xu frag->destructor = sock_wfree; 6852fdba6b0SHerbert Xu } 6863d13008eSEric Dumazet skb->truesize -= frag->truesize; 6871da177e4SLinus Torvalds } 6881da177e4SLinus Torvalds 6891da177e4SLinus Torvalds err = 0; 6901da177e4SLinus Torvalds offset = 0; 6911da177e4SLinus Torvalds /* BUILD HEADER */ 6921da177e4SLinus Torvalds 6939a217a1cSYOSHIFUJI Hideaki *prevhdr = NEXTHDR_FRAGMENT; 694d56f90a7SArnaldo Carvalho de Melo tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC); 6951da177e4SLinus Torvalds if (!tmp_hdr) { 6961d325d21SFlorian Westphal err = -ENOMEM; 6971d325d21SFlorian Westphal goto fail; 6981da177e4SLinus Torvalds } 6991d325d21SFlorian Westphal frag = skb_shinfo(skb)->frag_list; 7001d325d21SFlorian Westphal skb_frag_list_init(skb); 7011da177e4SLinus Torvalds 7021da177e4SLinus Torvalds __skb_pull(skb, hlen); 703d58ff351SJohannes Berg fh = __skb_push(skb, sizeof(struct frag_hdr)); 704e2d1bca7SArnaldo Carvalho de Melo __skb_push(skb, hlen); 705e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 706d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(skb), tmp_hdr, hlen); 7071da177e4SLinus Torvalds 7081da177e4SLinus Torvalds fh->nexthdr = nexthdr; 7091da177e4SLinus Torvalds fh->reserved = 0; 7101da177e4SLinus Torvalds fh->frag_off = htons(IP6_MF); 711286c2349SMartin KaFai Lau fh->identification = frag_id; 7121da177e4SLinus Torvalds 7131da177e4SLinus Torvalds first_len = skb_pagelen(skb); 7141da177e4SLinus Torvalds skb->data_len = first_len - skb_headlen(skb); 7151da177e4SLinus Torvalds skb->len = first_len; 7160660e03fSArnaldo Carvalho de Melo ipv6_hdr(skb)->payload_len = htons(first_len - 7170660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 7181da177e4SLinus Torvalds 7191da177e4SLinus Torvalds for (;;) { 7201da177e4SLinus Torvalds /* Prepare header of the next frame, 7211da177e4SLinus Torvalds * before previous one went down. */ 7221da177e4SLinus Torvalds if (frag) { 7231da177e4SLinus Torvalds frag->ip_summed = CHECKSUM_NONE; 724badff6d0SArnaldo Carvalho de Melo skb_reset_transport_header(frag); 725d58ff351SJohannes Berg fh = __skb_push(frag, sizeof(struct frag_hdr)); 726e2d1bca7SArnaldo Carvalho de Melo __skb_push(frag, hlen); 727e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(frag); 728d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(frag), tmp_hdr, 729d56f90a7SArnaldo Carvalho de Melo hlen); 7301da177e4SLinus Torvalds offset += skb->len - hlen - sizeof(struct frag_hdr); 7311da177e4SLinus Torvalds fh->nexthdr = nexthdr; 7321da177e4SLinus Torvalds fh->reserved = 0; 7331da177e4SLinus Torvalds fh->frag_off = htons(offset); 73453b24b8fSIan Morris if (frag->next) 7351da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 7361da177e4SLinus Torvalds fh->identification = frag_id; 7370660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = 7380660e03fSArnaldo Carvalho de Melo htons(frag->len - 7390660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 7401da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 7411da177e4SLinus Torvalds } 7421da177e4SLinus Torvalds 7437d8c6e39SEric W. Biederman err = output(net, sk, skb); 744dafee490SWei Dong if (!err) 745d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7463bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 747dafee490SWei Dong 7481da177e4SLinus Torvalds if (err || !frag) 7491da177e4SLinus Torvalds break; 7501da177e4SLinus Torvalds 7511da177e4SLinus Torvalds skb = frag; 7521da177e4SLinus Torvalds frag = skb->next; 753a8305bffSDavid S. Miller skb_mark_not_on_list(skb); 7541da177e4SLinus Torvalds } 7551da177e4SLinus Torvalds 7561da177e4SLinus Torvalds kfree(tmp_hdr); 7571da177e4SLinus Torvalds 7581da177e4SLinus Torvalds if (err == 0) { 759d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7603bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGOKS); 7611da177e4SLinus Torvalds return 0; 7621da177e4SLinus Torvalds } 7631da177e4SLinus Torvalds 76446cfd725SFlorian Westphal kfree_skb_list(frag); 7651da177e4SLinus Torvalds 766d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7673bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 7681da177e4SLinus Torvalds return err; 7693d13008eSEric Dumazet 7703d13008eSEric Dumazet slow_path_clean: 7713d13008eSEric Dumazet skb_walk_frags(skb, frag2) { 7723d13008eSEric Dumazet if (frag2 == frag) 7733d13008eSEric Dumazet break; 7743d13008eSEric Dumazet frag2->sk = NULL; 7753d13008eSEric Dumazet frag2->destructor = NULL; 7763d13008eSEric Dumazet skb->truesize += frag2->truesize; 7773d13008eSEric Dumazet } 7781da177e4SLinus Torvalds } 7791da177e4SLinus Torvalds 7801da177e4SLinus Torvalds slow_path: 7811da177e4SLinus Torvalds left = skb->len - hlen; /* Space per frame */ 7821da177e4SLinus Torvalds ptr = hlen; /* Where to start from */ 7831da177e4SLinus Torvalds 7841da177e4SLinus Torvalds /* 7851da177e4SLinus Torvalds * Fragment the datagram. 7861da177e4SLinus Torvalds */ 7871da177e4SLinus Torvalds 788a7ae1992SHerbert Xu troom = rt->dst.dev->needed_tailroom; 7891da177e4SLinus Torvalds 7901da177e4SLinus Torvalds /* 7911da177e4SLinus Torvalds * Keep copying data until we run out. 7921da177e4SLinus Torvalds */ 7931da177e4SLinus Torvalds while (left > 0) { 79479e49503SFlorian Westphal u8 *fragnexthdr_offset; 79579e49503SFlorian Westphal 7961da177e4SLinus Torvalds len = left; 7971da177e4SLinus Torvalds /* IF: it doesn't fit, use 'mtu' - the data space left */ 7981da177e4SLinus Torvalds if (len > mtu) 7991da177e4SLinus Torvalds len = mtu; 8001da177e4SLinus Torvalds /* IF: we are not sending up to and including the packet end 8011da177e4SLinus Torvalds then align the next start on an eight byte boundary */ 8021da177e4SLinus Torvalds if (len < left) { 8031da177e4SLinus Torvalds len &= ~7; 8041da177e4SLinus Torvalds } 8051da177e4SLinus Torvalds 806cbffccc9SJoe Perches /* Allocate buffer */ 807cbffccc9SJoe Perches frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) + 808cbffccc9SJoe Perches hroom + troom, GFP_ATOMIC); 809cbffccc9SJoe Perches if (!frag) { 8101da177e4SLinus Torvalds err = -ENOMEM; 8111da177e4SLinus Torvalds goto fail; 8121da177e4SLinus Torvalds } 8131da177e4SLinus Torvalds 8141da177e4SLinus Torvalds /* 8151da177e4SLinus Torvalds * Set up data on packet 8161da177e4SLinus Torvalds */ 8171da177e4SLinus Torvalds 8181da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 819a7ae1992SHerbert Xu skb_reserve(frag, hroom); 8201da177e4SLinus Torvalds skb_put(frag, len + hlen + sizeof(struct frag_hdr)); 821c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(frag); 822badff6d0SArnaldo Carvalho de Melo fh = (struct frag_hdr *)(skb_network_header(frag) + hlen); 823b0e380b1SArnaldo Carvalho de Melo frag->transport_header = (frag->network_header + hlen + 824b0e380b1SArnaldo Carvalho de Melo sizeof(struct frag_hdr)); 8251da177e4SLinus Torvalds 8261da177e4SLinus Torvalds /* 8271da177e4SLinus Torvalds * Charge the memory for the fragment to any owner 8281da177e4SLinus Torvalds * it might possess 8291da177e4SLinus Torvalds */ 8301da177e4SLinus Torvalds if (skb->sk) 8311da177e4SLinus Torvalds skb_set_owner_w(frag, skb->sk); 8321da177e4SLinus Torvalds 8331da177e4SLinus Torvalds /* 8341da177e4SLinus Torvalds * Copy the packet header into the new buffer. 8351da177e4SLinus Torvalds */ 836d626f62bSArnaldo Carvalho de Melo skb_copy_from_linear_data(skb, skb_network_header(frag), hlen); 8371da177e4SLinus Torvalds 83879e49503SFlorian Westphal fragnexthdr_offset = skb_network_header(frag); 83979e49503SFlorian Westphal fragnexthdr_offset += prevhdr - skb_network_header(skb); 84079e49503SFlorian Westphal *fragnexthdr_offset = NEXTHDR_FRAGMENT; 84179e49503SFlorian Westphal 8421da177e4SLinus Torvalds /* 8431da177e4SLinus Torvalds * Build fragment header. 8441da177e4SLinus Torvalds */ 8451da177e4SLinus Torvalds fh->nexthdr = nexthdr; 8461da177e4SLinus Torvalds fh->reserved = 0; 8471da177e4SLinus Torvalds fh->identification = frag_id; 8481da177e4SLinus Torvalds 8491da177e4SLinus Torvalds /* 8501da177e4SLinus Torvalds * Copy a block of the IP datagram. 8511da177e4SLinus Torvalds */ 852e3f0b86bSHimangi Saraogi BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag), 853e3f0b86bSHimangi Saraogi len)); 8541da177e4SLinus Torvalds left -= len; 8551da177e4SLinus Torvalds 8561da177e4SLinus Torvalds fh->frag_off = htons(offset); 8571da177e4SLinus Torvalds if (left > 0) 8581da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 8590660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = htons(frag->len - 8600660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 8611da177e4SLinus Torvalds 8621da177e4SLinus Torvalds ptr += len; 8631da177e4SLinus Torvalds offset += len; 8641da177e4SLinus Torvalds 8651da177e4SLinus Torvalds /* 8661da177e4SLinus Torvalds * Put this fragment into the sending queue. 8671da177e4SLinus Torvalds */ 8687d8c6e39SEric W. Biederman err = output(net, sk, frag); 8691da177e4SLinus Torvalds if (err) 8701da177e4SLinus Torvalds goto fail; 871dafee490SWei Dong 872adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 8733bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 8741da177e4SLinus Torvalds } 875adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 876a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGOKS); 877808db80aSEric Dumazet consume_skb(skb); 8781da177e4SLinus Torvalds return err; 8791da177e4SLinus Torvalds 880485fca66SFlorian Westphal fail_toobig: 881485fca66SFlorian Westphal if (skb->sk && dst_allfrag(skb_dst(skb))) 882485fca66SFlorian Westphal sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK); 883485fca66SFlorian Westphal 884485fca66SFlorian Westphal icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 885485fca66SFlorian Westphal err = -EMSGSIZE; 886485fca66SFlorian Westphal 8871da177e4SLinus Torvalds fail: 888adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 889a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 8901da177e4SLinus Torvalds kfree_skb(skb); 8911da177e4SLinus Torvalds return err; 8921da177e4SLinus Torvalds } 8931da177e4SLinus Torvalds 894b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key, 895b71d1d42SEric Dumazet const struct in6_addr *fl_addr, 896b71d1d42SEric Dumazet const struct in6_addr *addr_cache) 897cf6b1982SYOSHIFUJI Hideaki { 898a02cec21SEric Dumazet return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) && 89963159f29SIan Morris (!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache)); 900cf6b1982SYOSHIFUJI Hideaki } 901cf6b1982SYOSHIFUJI Hideaki 902497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk, 903497c615aSHerbert Xu struct dst_entry *dst, 904b71d1d42SEric Dumazet const struct flowi6 *fl6) 9051da177e4SLinus Torvalds { 9061da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 907a963a37dSEric Dumazet struct rt6_info *rt; 9081da177e4SLinus Torvalds 909497c615aSHerbert Xu if (!dst) 910497c615aSHerbert Xu goto out; 9111da177e4SLinus Torvalds 912a963a37dSEric Dumazet if (dst->ops->family != AF_INET6) { 913a963a37dSEric Dumazet dst_release(dst); 914a963a37dSEric Dumazet return NULL; 915a963a37dSEric Dumazet } 916a963a37dSEric Dumazet 917a963a37dSEric Dumazet rt = (struct rt6_info *)dst; 9181da177e4SLinus Torvalds /* Yes, checking route validity in not connected 919d76e60a5SDavid S. Miller * case is not very simple. Take into account, 920d76e60a5SDavid S. Miller * that we do not support routing by source, TOS, 921d76e60a5SDavid S. Miller * and MSG_DONTROUTE --ANK (980726) 922d76e60a5SDavid S. Miller * 923cf6b1982SYOSHIFUJI Hideaki * 1. ip6_rt_check(): If route was host route, 924cf6b1982SYOSHIFUJI Hideaki * check that cached destination is current. 925d76e60a5SDavid S. Miller * If it is network route, we still may 926d76e60a5SDavid S. Miller * check its validity using saved pointer 927d76e60a5SDavid S. Miller * to the last used address: daddr_cache. 928d76e60a5SDavid S. Miller * We do not want to save whole address now, 929d76e60a5SDavid S. Miller * (because main consumer of this service 930d76e60a5SDavid S. Miller * is tcp, which has not this problem), 931d76e60a5SDavid S. Miller * so that the last trick works only on connected 932d76e60a5SDavid S. Miller * sockets. 933d76e60a5SDavid S. Miller * 2. oif also should be the same. 9341da177e4SLinus Torvalds */ 9354c9483b2SDavid S. Miller if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) || 9368e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES 9374c9483b2SDavid S. Miller ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) || 9388e1ef0a9SYOSHIFUJI Hideaki #endif 939ca254490SDavid Ahern (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) && 940ca254490SDavid Ahern (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) { 941497c615aSHerbert Xu dst_release(dst); 942497c615aSHerbert Xu dst = NULL; 9431da177e4SLinus Torvalds } 944497c615aSHerbert Xu 945497c615aSHerbert Xu out: 946497c615aSHerbert Xu return dst; 9471da177e4SLinus Torvalds } 948497c615aSHerbert Xu 9493aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, 9504c9483b2SDavid S. Miller struct dst_entry **dst, struct flowi6 *fl6) 951497c615aSHerbert Xu { 95269cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 95369cce1d1SDavid S. Miller struct neighbour *n; 95497cac082SDavid S. Miller struct rt6_info *rt; 95569cce1d1SDavid S. Miller #endif 95669cce1d1SDavid S. Miller int err; 9576f21c96aSPaolo Abeni int flags = 0; 9581da177e4SLinus Torvalds 959e16e888bSMarkus Stenberg /* The correct way to handle this would be to do 960e16e888bSMarkus Stenberg * ip6_route_get_saddr, and then ip6_route_output; however, 961e16e888bSMarkus Stenberg * the route-specific preferred source forces the 962e16e888bSMarkus Stenberg * ip6_route_output call _before_ ip6_route_get_saddr. 963e16e888bSMarkus Stenberg * 964e16e888bSMarkus Stenberg * In source specific routing (no src=any default route), 965e16e888bSMarkus Stenberg * ip6_route_output will fail given src=any saddr, though, so 966e16e888bSMarkus Stenberg * that's why we try it again later. 967e16e888bSMarkus Stenberg */ 968e16e888bSMarkus Stenberg if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) { 969a68886a6SDavid Ahern struct fib6_info *from; 970e16e888bSMarkus Stenberg struct rt6_info *rt; 971e16e888bSMarkus Stenberg bool had_dst = *dst != NULL; 972e16e888bSMarkus Stenberg 973e16e888bSMarkus Stenberg if (!had_dst) 974e16e888bSMarkus Stenberg *dst = ip6_route_output(net, sk, fl6); 975e16e888bSMarkus Stenberg rt = (*dst)->error ? NULL : (struct rt6_info *)*dst; 976a68886a6SDavid Ahern 977a68886a6SDavid Ahern rcu_read_lock(); 978a68886a6SDavid Ahern from = rt ? rcu_dereference(rt->from) : NULL; 979a68886a6SDavid Ahern err = ip6_route_get_saddr(net, from, &fl6->daddr, 980e16e888bSMarkus Stenberg sk ? inet6_sk(sk)->srcprefs : 0, 981e16e888bSMarkus Stenberg &fl6->saddr); 982a68886a6SDavid Ahern rcu_read_unlock(); 983a68886a6SDavid Ahern 984e16e888bSMarkus Stenberg if (err) 985e16e888bSMarkus Stenberg goto out_err_release; 986e16e888bSMarkus Stenberg 987e16e888bSMarkus Stenberg /* If we had an erroneous initial result, pretend it 988e16e888bSMarkus Stenberg * never existed and let the SA-enabled version take 989e16e888bSMarkus Stenberg * over. 990e16e888bSMarkus Stenberg */ 991e16e888bSMarkus Stenberg if (!had_dst && (*dst)->error) { 992e16e888bSMarkus Stenberg dst_release(*dst); 993e16e888bSMarkus Stenberg *dst = NULL; 994e16e888bSMarkus Stenberg } 9956f21c96aSPaolo Abeni 9966f21c96aSPaolo Abeni if (fl6->flowi6_oif) 9976f21c96aSPaolo Abeni flags |= RT6_LOOKUP_F_IFACE; 998e16e888bSMarkus Stenberg } 999e16e888bSMarkus Stenberg 100063159f29SIan Morris if (!*dst) 10016f21c96aSPaolo Abeni *dst = ip6_route_output_flags(net, sk, fl6, flags); 10021da177e4SLinus Torvalds 1003e5d08d71SIan Morris err = (*dst)->error; 1004e5d08d71SIan Morris if (err) 10051da177e4SLinus Torvalds goto out_err_release; 10061da177e4SLinus Torvalds 100795c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 100895c385b4SNeil Horman /* 100995c385b4SNeil Horman * Here if the dst entry we've looked up 101095c385b4SNeil Horman * has a neighbour entry that is in the INCOMPLETE 101195c385b4SNeil Horman * state and the src address from the flow is 101295c385b4SNeil Horman * marked as OPTIMISTIC, we release the found 101395c385b4SNeil Horman * dst entry and replace it instead with the 101495c385b4SNeil Horman * dst entry of the nexthop router 101595c385b4SNeil Horman */ 1016c56bf6feSEric Dumazet rt = (struct rt6_info *) *dst; 1017707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 10182647a9b0SMartin KaFai Lau n = __ipv6_neigh_lookup_noref(rt->dst.dev, 10192647a9b0SMartin KaFai Lau rt6_nexthop(rt, &fl6->daddr)); 1020707be1ffSYOSHIFUJI Hideaki / 吉藤英明 err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0; 1021707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1022707be1ffSYOSHIFUJI Hideaki / 吉藤英明 1023707be1ffSYOSHIFUJI Hideaki / 吉藤英明 if (err) { 102495c385b4SNeil Horman struct inet6_ifaddr *ifp; 10254c9483b2SDavid S. Miller struct flowi6 fl_gw6; 102695c385b4SNeil Horman int redirect; 102795c385b4SNeil Horman 10284c9483b2SDavid S. Miller ifp = ipv6_get_ifaddr(net, &fl6->saddr, 10291cab3da6SDaniel Lezcano (*dst)->dev, 1); 103095c385b4SNeil Horman 103195c385b4SNeil Horman redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC); 103295c385b4SNeil Horman if (ifp) 103395c385b4SNeil Horman in6_ifa_put(ifp); 103495c385b4SNeil Horman 103595c385b4SNeil Horman if (redirect) { 103695c385b4SNeil Horman /* 103795c385b4SNeil Horman * We need to get the dst entry for the 103895c385b4SNeil Horman * default router instead 103995c385b4SNeil Horman */ 104095c385b4SNeil Horman dst_release(*dst); 10414c9483b2SDavid S. Miller memcpy(&fl_gw6, fl6, sizeof(struct flowi6)); 10424c9483b2SDavid S. Miller memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr)); 10434c9483b2SDavid S. Miller *dst = ip6_route_output(net, sk, &fl_gw6); 1044e5d08d71SIan Morris err = (*dst)->error; 1045e5d08d71SIan Morris if (err) 104695c385b4SNeil Horman goto out_err_release; 104795c385b4SNeil Horman } 104895c385b4SNeil Horman } 104995c385b4SNeil Horman #endif 1050ec5e3b0aSJonathan T. Leighton if (ipv6_addr_v4mapped(&fl6->saddr) && 105100ea1ceeSWillem de Bruijn !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) { 105200ea1ceeSWillem de Bruijn err = -EAFNOSUPPORT; 105300ea1ceeSWillem de Bruijn goto out_err_release; 105400ea1ceeSWillem de Bruijn } 105595c385b4SNeil Horman 10561da177e4SLinus Torvalds return 0; 10571da177e4SLinus Torvalds 10581da177e4SLinus Torvalds out_err_release: 10591da177e4SLinus Torvalds dst_release(*dst); 10601da177e4SLinus Torvalds *dst = NULL; 10618a966fc0SDavid Ahern 10620d240e78SDavid Ahern if (err == -ENETUNREACH) 10630d240e78SDavid Ahern IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES); 10641da177e4SLinus Torvalds return err; 10651da177e4SLinus Torvalds } 106634a0b3cdSAdrian Bunk 1067497c615aSHerbert Xu /** 1068497c615aSHerbert Xu * ip6_dst_lookup - perform route lookup on flow 1069497c615aSHerbert Xu * @sk: socket which provides route info 1070497c615aSHerbert Xu * @dst: pointer to dst_entry * for result 10714c9483b2SDavid S. Miller * @fl6: flow to lookup 1072497c615aSHerbert Xu * 1073497c615aSHerbert Xu * This function performs a route lookup on the given flow. 1074497c615aSHerbert Xu * 1075497c615aSHerbert Xu * It returns zero on success, or a standard errno code on error. 1076497c615aSHerbert Xu */ 1077343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst, 1078343d60aaSRoopa Prabhu struct flowi6 *fl6) 1079497c615aSHerbert Xu { 1080497c615aSHerbert Xu *dst = NULL; 1081343d60aaSRoopa Prabhu return ip6_dst_lookup_tail(net, sk, dst, fl6); 1082497c615aSHerbert Xu } 10833cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup); 10843cf3dc6cSArnaldo Carvalho de Melo 1085497c615aSHerbert Xu /** 108668d0c6d3SDavid S. Miller * ip6_dst_lookup_flow - perform route lookup on flow with ipsec 108768d0c6d3SDavid S. Miller * @sk: socket which provides route info 10884c9483b2SDavid S. Miller * @fl6: flow to lookup 108968d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 109068d0c6d3SDavid S. Miller * 109168d0c6d3SDavid S. Miller * This function performs a route lookup on the given flow. 109268d0c6d3SDavid S. Miller * 109368d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 109468d0c6d3SDavid S. Miller * error code. 109568d0c6d3SDavid S. Miller */ 10963aef934fSEric Dumazet struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6, 10970e0d44abSSteffen Klassert const struct in6_addr *final_dst) 109868d0c6d3SDavid S. Miller { 109968d0c6d3SDavid S. Miller struct dst_entry *dst = NULL; 110068d0c6d3SDavid S. Miller int err; 110168d0c6d3SDavid S. Miller 1102343d60aaSRoopa Prabhu err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6); 110368d0c6d3SDavid S. Miller if (err) 110468d0c6d3SDavid S. Miller return ERR_PTR(err); 110568d0c6d3SDavid S. Miller if (final_dst) 11064e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 11072774c131SDavid S. Miller 1108f92ee619SSteffen Klassert return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0); 110968d0c6d3SDavid S. Miller } 111068d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow); 111168d0c6d3SDavid S. Miller 111268d0c6d3SDavid S. Miller /** 111368d0c6d3SDavid S. Miller * ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow 111468d0c6d3SDavid S. Miller * @sk: socket which provides the dst cache and route info 11154c9483b2SDavid S. Miller * @fl6: flow to lookup 111668d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 111796818159SAlexey Kodanev * @connected: whether @sk is connected or not 1118497c615aSHerbert Xu * 1119497c615aSHerbert Xu * This function performs a route lookup on the given flow with the 1120497c615aSHerbert Xu * possibility of using the cached route in the socket if it is valid. 1121497c615aSHerbert Xu * It will take the socket dst lock when operating on the dst cache. 1122497c615aSHerbert Xu * As a result, this function can only be used in process context. 1123497c615aSHerbert Xu * 112496818159SAlexey Kodanev * In addition, for a connected socket, cache the dst in the socket 112596818159SAlexey Kodanev * if the current cache is not valid. 112696818159SAlexey Kodanev * 112768d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 112868d0c6d3SDavid S. Miller * error code. 1129497c615aSHerbert Xu */ 11304c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6, 113196818159SAlexey Kodanev const struct in6_addr *final_dst, 113296818159SAlexey Kodanev bool connected) 1133497c615aSHerbert Xu { 113468d0c6d3SDavid S. Miller struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie); 1135497c615aSHerbert Xu 11364c9483b2SDavid S. Miller dst = ip6_sk_dst_check(sk, dst, fl6); 113796818159SAlexey Kodanev if (dst) 113896818159SAlexey Kodanev return dst; 113996818159SAlexey Kodanev 114000bc0ef5SJakub Sitnicki dst = ip6_dst_lookup_flow(sk, fl6, final_dst); 114196818159SAlexey Kodanev if (connected && !IS_ERR(dst)) 114296818159SAlexey Kodanev ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6); 114368d0c6d3SDavid S. Miller 114400bc0ef5SJakub Sitnicki return dst; 114568d0c6d3SDavid S. Miller } 114668d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow); 1147497c615aSHerbert Xu 11480178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src, 11490178b695SHerbert Xu gfp_t gfp) 11500178b695SHerbert Xu { 11510178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11520178b695SHerbert Xu } 11530178b695SHerbert Xu 11540178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src, 11550178b695SHerbert Xu gfp_t gfp) 11560178b695SHerbert Xu { 11570178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11580178b695SHerbert Xu } 11590178b695SHerbert Xu 116075a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu, 11610c183379SGao feng int *maxfraglen, 11620c183379SGao feng unsigned int fragheaderlen, 11630c183379SGao feng struct sk_buff *skb, 116475a493e6SHannes Frederic Sowa struct rt6_info *rt, 1165e367c2d0Slucien unsigned int orig_mtu) 11660c183379SGao feng { 11670c183379SGao feng if (!(rt->dst.flags & DST_XFRM_TUNNEL)) { 116863159f29SIan Morris if (!skb) { 11690c183379SGao feng /* first fragment, reserve header_len */ 1170e367c2d0Slucien *mtu = orig_mtu - rt->dst.header_len; 11710c183379SGao feng 11720c183379SGao feng } else { 11730c183379SGao feng /* 11740c183379SGao feng * this fragment is not first, the headers 11750c183379SGao feng * space is regarded as data space. 11760c183379SGao feng */ 1177e367c2d0Slucien *mtu = orig_mtu; 11780c183379SGao feng } 11790c183379SGao feng *maxfraglen = ((*mtu - fragheaderlen) & ~7) 11800c183379SGao feng + fragheaderlen - sizeof(struct frag_hdr); 11810c183379SGao feng } 11820c183379SGao feng } 11830c183379SGao feng 1184366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork, 118526879da5SWei Wang struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6, 11865fdaa88dSWillem de Bruijn struct rt6_info *rt, struct flowi6 *fl6) 1187366e41d9SVlad Yasevich { 1188366e41d9SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 1189366e41d9SVlad Yasevich unsigned int mtu; 119026879da5SWei Wang struct ipv6_txoptions *opt = ipc6->opt; 1191366e41d9SVlad Yasevich 1192366e41d9SVlad Yasevich /* 1193366e41d9SVlad Yasevich * setup for corking 1194366e41d9SVlad Yasevich */ 1195366e41d9SVlad Yasevich if (opt) { 1196366e41d9SVlad Yasevich if (WARN_ON(v6_cork->opt)) 1197366e41d9SVlad Yasevich return -EINVAL; 1198366e41d9SVlad Yasevich 1199864e2a1fSEric Dumazet v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation); 120063159f29SIan Morris if (unlikely(!v6_cork->opt)) 1201366e41d9SVlad Yasevich return -ENOBUFS; 1202366e41d9SVlad Yasevich 1203864e2a1fSEric Dumazet v6_cork->opt->tot_len = sizeof(*opt); 1204366e41d9SVlad Yasevich v6_cork->opt->opt_flen = opt->opt_flen; 1205366e41d9SVlad Yasevich v6_cork->opt->opt_nflen = opt->opt_nflen; 1206366e41d9SVlad Yasevich 1207366e41d9SVlad Yasevich v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt, 1208366e41d9SVlad Yasevich sk->sk_allocation); 1209366e41d9SVlad Yasevich if (opt->dst0opt && !v6_cork->opt->dst0opt) 1210366e41d9SVlad Yasevich return -ENOBUFS; 1211366e41d9SVlad Yasevich 1212366e41d9SVlad Yasevich v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt, 1213366e41d9SVlad Yasevich sk->sk_allocation); 1214366e41d9SVlad Yasevich if (opt->dst1opt && !v6_cork->opt->dst1opt) 1215366e41d9SVlad Yasevich return -ENOBUFS; 1216366e41d9SVlad Yasevich 1217366e41d9SVlad Yasevich v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt, 1218366e41d9SVlad Yasevich sk->sk_allocation); 1219366e41d9SVlad Yasevich if (opt->hopopt && !v6_cork->opt->hopopt) 1220366e41d9SVlad Yasevich return -ENOBUFS; 1221366e41d9SVlad Yasevich 1222366e41d9SVlad Yasevich v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt, 1223366e41d9SVlad Yasevich sk->sk_allocation); 1224366e41d9SVlad Yasevich if (opt->srcrt && !v6_cork->opt->srcrt) 1225366e41d9SVlad Yasevich return -ENOBUFS; 1226366e41d9SVlad Yasevich 1227366e41d9SVlad Yasevich /* need source address above miyazawa*/ 1228366e41d9SVlad Yasevich } 1229366e41d9SVlad Yasevich dst_hold(&rt->dst); 1230366e41d9SVlad Yasevich cork->base.dst = &rt->dst; 1231366e41d9SVlad Yasevich cork->fl.u.ip6 = *fl6; 123226879da5SWei Wang v6_cork->hop_limit = ipc6->hlimit; 123326879da5SWei Wang v6_cork->tclass = ipc6->tclass; 1234366e41d9SVlad Yasevich if (rt->dst.flags & DST_XFRM_TUNNEL) 1235366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1236749439bfSMike Maloney READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst); 1237366e41d9SVlad Yasevich else 1238366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1239c02b3741SDavid S. Miller READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst)); 1240366e41d9SVlad Yasevich if (np->frag_size < mtu) { 1241366e41d9SVlad Yasevich if (np->frag_size) 1242366e41d9SVlad Yasevich mtu = np->frag_size; 1243366e41d9SVlad Yasevich } 1244749439bfSMike Maloney if (mtu < IPV6_MIN_MTU) 1245749439bfSMike Maloney return -EINVAL; 1246366e41d9SVlad Yasevich cork->base.fragsize = mtu; 1247fbf47813SWillem de Bruijn cork->base.gso_size = ipc6->gso_size; 1248678ca42dSWillem de Bruijn cork->base.tx_flags = 0; 1249678ca42dSWillem de Bruijn sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags); 1250bec1f6f6SWillem de Bruijn 12510f6c480fSDavid Miller if (dst_allfrag(xfrm_dst_path(&rt->dst))) 1252366e41d9SVlad Yasevich cork->base.flags |= IPCORK_ALLFRAG; 1253366e41d9SVlad Yasevich cork->base.length = 0; 1254366e41d9SVlad Yasevich 12555fdaa88dSWillem de Bruijn cork->base.transmit_time = ipc6->sockc.transmit_time; 1256a818f75eSJesus Sanchez-Palencia 1257366e41d9SVlad Yasevich return 0; 1258366e41d9SVlad Yasevich } 1259366e41d9SVlad Yasevich 12600bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk, 12610bbe84a6SVlad Yasevich struct flowi6 *fl6, 12620bbe84a6SVlad Yasevich struct sk_buff_head *queue, 12630bbe84a6SVlad Yasevich struct inet_cork *cork, 12640bbe84a6SVlad Yasevich struct inet6_cork *v6_cork, 12650bbe84a6SVlad Yasevich struct page_frag *pfrag, 12660bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, 12670bbe84a6SVlad Yasevich int len, int odd, struct sk_buff *skb), 12681da177e4SLinus Torvalds void *from, int length, int transhdrlen, 12695fdaa88dSWillem de Bruijn unsigned int flags, struct ipcm6_cookie *ipc6) 12701da177e4SLinus Torvalds { 12710c183379SGao feng struct sk_buff *skb, *skb_prev = NULL; 127210b8a3deSPaolo Abeni unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu; 1273b5947e5dSWillem de Bruijn struct ubuf_info *uarg = NULL; 12740bbe84a6SVlad Yasevich int exthdrlen = 0; 12750bbe84a6SVlad Yasevich int dst_exthdrlen = 0; 12761da177e4SLinus Torvalds int hh_len; 12771da177e4SLinus Torvalds int copy; 12781da177e4SLinus Torvalds int err; 12791da177e4SLinus Torvalds int offset = 0; 128009c2d251SWillem de Bruijn u32 tskey = 0; 12810bbe84a6SVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->dst; 12820bbe84a6SVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 128332dce968SVlad Yasevich int csummode = CHECKSUM_NONE; 1284682b1a9dSHannes Frederic Sowa unsigned int maxnonfragsize, headersize; 12851f4c6eb2SEric Dumazet unsigned int wmem_alloc_delta = 0; 128652900d22SWillem de Bruijn bool paged, extra_uref; 12871da177e4SLinus Torvalds 12880bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 12890bbe84a6SVlad Yasevich if (!skb) { 12900bbe84a6SVlad Yasevich exthdrlen = opt ? opt->opt_flen : 0; 12917efdba5bSRomain KUNTZ dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len; 12921da177e4SLinus Torvalds } 12930bbe84a6SVlad Yasevich 129415e36f5bSWillem de Bruijn paged = !!cork->gso_size; 1295bec1f6f6SWillem de Bruijn mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize; 1296e367c2d0Slucien orig_mtu = mtu; 12971da177e4SLinus Torvalds 1298678ca42dSWillem de Bruijn if (cork->tx_flags & SKBTX_ANY_SW_TSTAMP && 1299678ca42dSWillem de Bruijn sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID) 1300678ca42dSWillem de Bruijn tskey = sk->sk_tskey++; 1301678ca42dSWillem de Bruijn 1302d8d1f30bSChangli Gao hh_len = LL_RESERVED_SPACE(rt->dst.dev); 13031da177e4SLinus Torvalds 1304a1b05140SMasahide NAKAMURA fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len + 1305b4ce9277SHerbert Xu (opt ? opt->opt_nflen : 0); 13064df98e76SHannes Frederic Sowa maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen - 13074df98e76SHannes Frederic Sowa sizeof(struct frag_hdr); 13081da177e4SLinus Torvalds 13094df98e76SHannes Frederic Sowa headersize = sizeof(struct ipv6hdr) + 13103a1cebe7SHannes Frederic Sowa (opt ? opt->opt_flen + opt->opt_nflen : 0) + 13114df98e76SHannes Frederic Sowa (dst_allfrag(&rt->dst) ? 13124df98e76SHannes Frederic Sowa sizeof(struct frag_hdr) : 0) + 13134df98e76SHannes Frederic Sowa rt->rt6i_nfheader_len; 13144df98e76SHannes Frederic Sowa 131510b8a3deSPaolo Abeni /* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit 131610b8a3deSPaolo Abeni * the first fragment 131710b8a3deSPaolo Abeni */ 131810b8a3deSPaolo Abeni if (headersize + transhdrlen > mtu) 131910b8a3deSPaolo Abeni goto emsgsize; 132010b8a3deSPaolo Abeni 132126879da5SWei Wang if (cork->length + length > mtu - headersize && ipc6->dontfrag && 13224df98e76SHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP || 13234df98e76SHannes Frederic Sowa sk->sk_protocol == IPPROTO_RAW)) { 13244df98e76SHannes Frederic Sowa ipv6_local_rxpmtu(sk, fl6, mtu - headersize + 13254df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 13264df98e76SHannes Frederic Sowa goto emsgsize; 13274df98e76SHannes Frederic Sowa } 13284df98e76SHannes Frederic Sowa 1329682b1a9dSHannes Frederic Sowa if (ip6_sk_ignore_df(sk)) 1330682b1a9dSHannes Frederic Sowa maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN; 1331682b1a9dSHannes Frederic Sowa else 1332682b1a9dSHannes Frederic Sowa maxnonfragsize = mtu; 1333682b1a9dSHannes Frederic Sowa 13344df98e76SHannes Frederic Sowa if (cork->length + length > maxnonfragsize - headersize) { 13354df98e76SHannes Frederic Sowa emsgsize: 133610b8a3deSPaolo Abeni pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0); 133710b8a3deSPaolo Abeni ipv6_local_error(sk, EMSGSIZE, fl6, pmtu); 13381da177e4SLinus Torvalds return -EMSGSIZE; 13391da177e4SLinus Torvalds } 1340682b1a9dSHannes Frederic Sowa 1341682b1a9dSHannes Frederic Sowa /* CHECKSUM_PARTIAL only with no extension headers and when 1342682b1a9dSHannes Frederic Sowa * we are not going to fragment 1343682b1a9dSHannes Frederic Sowa */ 1344682b1a9dSHannes Frederic Sowa if (transhdrlen && sk->sk_protocol == IPPROTO_UDP && 1345682b1a9dSHannes Frederic Sowa headersize == sizeof(struct ipv6hdr) && 13462b89ed65SVlad Yasevich length <= mtu - headersize && 1347bec1f6f6SWillem de Bruijn (!(flags & MSG_MORE) || cork->gso_size) && 1348c8cd0989STom Herbert rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM)) 1349682b1a9dSHannes Frederic Sowa csummode = CHECKSUM_PARTIAL; 13501da177e4SLinus Torvalds 1351b5947e5dSWillem de Bruijn if (flags & MSG_ZEROCOPY && length && sock_flag(sk, SOCK_ZEROCOPY)) { 1352b5947e5dSWillem de Bruijn uarg = sock_zerocopy_realloc(sk, length, skb_zcopy(skb)); 1353b5947e5dSWillem de Bruijn if (!uarg) 1354b5947e5dSWillem de Bruijn return -ENOBUFS; 135552900d22SWillem de Bruijn extra_uref = true; 1356b5947e5dSWillem de Bruijn if (rt->dst.dev->features & NETIF_F_SG && 1357b5947e5dSWillem de Bruijn csummode == CHECKSUM_PARTIAL) { 1358b5947e5dSWillem de Bruijn paged = true; 1359b5947e5dSWillem de Bruijn } else { 1360b5947e5dSWillem de Bruijn uarg->zerocopy = 0; 136152900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 1362b5947e5dSWillem de Bruijn } 1363b5947e5dSWillem de Bruijn } 1364b5947e5dSWillem de Bruijn 13651da177e4SLinus Torvalds /* 13661da177e4SLinus Torvalds * Let's try using as much space as possible. 13671da177e4SLinus Torvalds * Use MTU if total length of the message fits into the MTU. 13681da177e4SLinus Torvalds * Otherwise, we need to reserve fragment header and 13691da177e4SLinus Torvalds * fragment alignment (= 8-15 octects, in total). 13701da177e4SLinus Torvalds * 13711da177e4SLinus Torvalds * Note that we may need to "move" the data from the tail of 13721da177e4SLinus Torvalds * of the buffer to the new fragment when we split 13731da177e4SLinus Torvalds * the message. 13741da177e4SLinus Torvalds * 13751da177e4SLinus Torvalds * FIXME: It may be fragmented into multiple chunks 13761da177e4SLinus Torvalds * at once if non-fragmentable extension headers 13771da177e4SLinus Torvalds * are too large. 13781da177e4SLinus Torvalds * --yoshfuji 13791da177e4SLinus Torvalds */ 13801da177e4SLinus Torvalds 13812811ebacSHannes Frederic Sowa cork->length += length; 13822811ebacSHannes Frederic Sowa if (!skb) 13831da177e4SLinus Torvalds goto alloc_new_skb; 13841da177e4SLinus Torvalds 13851da177e4SLinus Torvalds while (length > 0) { 13861da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 1387bdc712b4SDavid S. Miller copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len; 13881da177e4SLinus Torvalds if (copy < length) 13891da177e4SLinus Torvalds copy = maxfraglen - skb->len; 13901da177e4SLinus Torvalds 13911da177e4SLinus Torvalds if (copy <= 0) { 13921da177e4SLinus Torvalds char *data; 13931da177e4SLinus Torvalds unsigned int datalen; 13941da177e4SLinus Torvalds unsigned int fraglen; 13951da177e4SLinus Torvalds unsigned int fraggap; 13961da177e4SLinus Torvalds unsigned int alloclen; 1397aba36930SWillem de Bruijn unsigned int pagedlen; 13981da177e4SLinus Torvalds alloc_new_skb: 13991da177e4SLinus Torvalds /* There's no room in the current skb */ 14000c183379SGao feng if (skb) 14010c183379SGao feng fraggap = skb->len - maxfraglen; 14021da177e4SLinus Torvalds else 14031da177e4SLinus Torvalds fraggap = 0; 14040c183379SGao feng /* update mtu and maxfraglen if necessary */ 140563159f29SIan Morris if (!skb || !skb_prev) 14060c183379SGao feng ip6_append_data_mtu(&mtu, &maxfraglen, 140775a493e6SHannes Frederic Sowa fragheaderlen, skb, rt, 1408e367c2d0Slucien orig_mtu); 14090c183379SGao feng 14100c183379SGao feng skb_prev = skb; 14111da177e4SLinus Torvalds 14121da177e4SLinus Torvalds /* 14131da177e4SLinus Torvalds * If remaining data exceeds the mtu, 14141da177e4SLinus Torvalds * we know we need more fragment(s). 14151da177e4SLinus Torvalds */ 14161da177e4SLinus Torvalds datalen = length + fraggap; 14171da177e4SLinus Torvalds 14180c183379SGao feng if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen) 14190c183379SGao feng datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len; 142015e36f5bSWillem de Bruijn fraglen = datalen + fragheaderlen; 1421aba36930SWillem de Bruijn pagedlen = 0; 142215e36f5bSWillem de Bruijn 14231da177e4SLinus Torvalds if ((flags & MSG_MORE) && 1424d8d1f30bSChangli Gao !(rt->dst.dev->features&NETIF_F_SG)) 14251da177e4SLinus Torvalds alloclen = mtu; 142615e36f5bSWillem de Bruijn else if (!paged) 142715e36f5bSWillem de Bruijn alloclen = fraglen; 142815e36f5bSWillem de Bruijn else { 142915e36f5bSWillem de Bruijn alloclen = min_t(int, fraglen, MAX_HEADER); 143015e36f5bSWillem de Bruijn pagedlen = fraglen - alloclen; 143115e36f5bSWillem de Bruijn } 14321da177e4SLinus Torvalds 1433299b0767SSteffen Klassert alloclen += dst_exthdrlen; 1434299b0767SSteffen Klassert 14350c183379SGao feng if (datalen != length + fraggap) { 14361da177e4SLinus Torvalds /* 14370c183379SGao feng * this is not the last fragment, the trailer 14380c183379SGao feng * space is regarded as data space. 14391da177e4SLinus Torvalds */ 14400c183379SGao feng datalen += rt->dst.trailer_len; 14410c183379SGao feng } 14420c183379SGao feng 1443d8d1f30bSChangli Gao alloclen += rt->dst.trailer_len; 14440c183379SGao feng fraglen = datalen + fragheaderlen; 14451da177e4SLinus Torvalds 14461da177e4SLinus Torvalds /* 14471da177e4SLinus Torvalds * We just reserve space for fragment header. 14481da177e4SLinus Torvalds * Note: this may be overallocation if the message 14491da177e4SLinus Torvalds * (without MSG_MORE) fits into the MTU. 14501da177e4SLinus Torvalds */ 14511da177e4SLinus Torvalds alloclen += sizeof(struct frag_hdr); 14521da177e4SLinus Torvalds 145315e36f5bSWillem de Bruijn copy = datalen - transhdrlen - fraggap - pagedlen; 1454232cd35dSEric Dumazet if (copy < 0) { 1455232cd35dSEric Dumazet err = -EINVAL; 1456232cd35dSEric Dumazet goto error; 1457232cd35dSEric Dumazet } 14581da177e4SLinus Torvalds if (transhdrlen) { 14591da177e4SLinus Torvalds skb = sock_alloc_send_skb(sk, 14601da177e4SLinus Torvalds alloclen + hh_len, 14611da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 14621da177e4SLinus Torvalds } else { 14631da177e4SLinus Torvalds skb = NULL; 14641f4c6eb2SEric Dumazet if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <= 14651da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 14661f4c6eb2SEric Dumazet skb = alloc_skb(alloclen + hh_len, 14671da177e4SLinus Torvalds sk->sk_allocation); 146863159f29SIan Morris if (unlikely(!skb)) 14691da177e4SLinus Torvalds err = -ENOBUFS; 14701da177e4SLinus Torvalds } 147163159f29SIan Morris if (!skb) 14721da177e4SLinus Torvalds goto error; 14731da177e4SLinus Torvalds /* 14741da177e4SLinus Torvalds * Fill in the control structures 14751da177e4SLinus Torvalds */ 14769c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 147732dce968SVlad Yasevich skb->ip_summed = csummode; 14781da177e4SLinus Torvalds skb->csum = 0; 14791f85851eSGao feng /* reserve for fragmentation and ipsec header */ 14801f85851eSGao feng skb_reserve(skb, hh_len + sizeof(struct frag_hdr) + 14811f85851eSGao feng dst_exthdrlen); 14821da177e4SLinus Torvalds 14831da177e4SLinus Torvalds /* 14841da177e4SLinus Torvalds * Find where to start putting bytes 14851da177e4SLinus Torvalds */ 148615e36f5bSWillem de Bruijn data = skb_put(skb, fraglen - pagedlen); 14871f85851eSGao feng skb_set_network_header(skb, exthdrlen); 14881f85851eSGao feng data += fragheaderlen; 1489b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1490b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 14911da177e4SLinus Torvalds if (fraggap) { 14921da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 14931da177e4SLinus Torvalds skb_prev, maxfraglen, 14941da177e4SLinus Torvalds data + transhdrlen, fraggap, 0); 14951da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 14961da177e4SLinus Torvalds skb->csum); 14971da177e4SLinus Torvalds data += fraggap; 1498e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 14991da177e4SLinus Torvalds } 1500232cd35dSEric Dumazet if (copy > 0 && 1501232cd35dSEric Dumazet getfrag(from, data + transhdrlen, offset, 1502232cd35dSEric Dumazet copy, fraggap, skb) < 0) { 15031da177e4SLinus Torvalds err = -EFAULT; 15041da177e4SLinus Torvalds kfree_skb(skb); 15051da177e4SLinus Torvalds goto error; 15061da177e4SLinus Torvalds } 15071da177e4SLinus Torvalds 15081da177e4SLinus Torvalds offset += copy; 150915e36f5bSWillem de Bruijn length -= copy + transhdrlen; 15101da177e4SLinus Torvalds transhdrlen = 0; 15111da177e4SLinus Torvalds exthdrlen = 0; 1512299b0767SSteffen Klassert dst_exthdrlen = 0; 15131da177e4SLinus Torvalds 151452900d22SWillem de Bruijn /* Only the initial fragment is time stamped */ 151552900d22SWillem de Bruijn skb_shinfo(skb)->tx_flags = cork->tx_flags; 151652900d22SWillem de Bruijn cork->tx_flags = 0; 151752900d22SWillem de Bruijn skb_shinfo(skb)->tskey = tskey; 151852900d22SWillem de Bruijn tskey = 0; 151952900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 152052900d22SWillem de Bruijn 15210dec879fSJulian Anastasov if ((flags & MSG_CONFIRM) && !skb_prev) 15220dec879fSJulian Anastasov skb_set_dst_pending_confirm(skb, 1); 15230dec879fSJulian Anastasov 15241da177e4SLinus Torvalds /* 15251da177e4SLinus Torvalds * Put the packet on the pending queue 15261da177e4SLinus Torvalds */ 15271f4c6eb2SEric Dumazet if (!skb->destructor) { 15281f4c6eb2SEric Dumazet skb->destructor = sock_wfree; 15291f4c6eb2SEric Dumazet skb->sk = sk; 15301f4c6eb2SEric Dumazet wmem_alloc_delta += skb->truesize; 15311f4c6eb2SEric Dumazet } 15320bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 15331da177e4SLinus Torvalds continue; 15341da177e4SLinus Torvalds } 15351da177e4SLinus Torvalds 15361da177e4SLinus Torvalds if (copy > length) 15371da177e4SLinus Torvalds copy = length; 15381da177e4SLinus Torvalds 1539113f99c3SWillem de Bruijn if (!(rt->dst.dev->features&NETIF_F_SG) && 1540113f99c3SWillem de Bruijn skb_tailroom(skb) >= copy) { 15411da177e4SLinus Torvalds unsigned int off; 15421da177e4SLinus Torvalds 15431da177e4SLinus Torvalds off = skb->len; 15441da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 15451da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 15461da177e4SLinus Torvalds __skb_trim(skb, off); 15471da177e4SLinus Torvalds err = -EFAULT; 15481da177e4SLinus Torvalds goto error; 15491da177e4SLinus Torvalds } 1550b5947e5dSWillem de Bruijn } else if (!uarg || !uarg->zerocopy) { 15511da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 15521da177e4SLinus Torvalds 15531da177e4SLinus Torvalds err = -ENOMEM; 15545640f768SEric Dumazet if (!sk_page_frag_refill(sk, pfrag)) 15551da177e4SLinus Torvalds goto error; 15561da177e4SLinus Torvalds 15575640f768SEric Dumazet if (!skb_can_coalesce(skb, i, pfrag->page, 15585640f768SEric Dumazet pfrag->offset)) { 15591da177e4SLinus Torvalds err = -EMSGSIZE; 15605640f768SEric Dumazet if (i == MAX_SKB_FRAGS) 15611da177e4SLinus Torvalds goto error; 15625640f768SEric Dumazet 15635640f768SEric Dumazet __skb_fill_page_desc(skb, i, pfrag->page, 15645640f768SEric Dumazet pfrag->offset, 0); 15655640f768SEric Dumazet skb_shinfo(skb)->nr_frags = ++i; 15665640f768SEric Dumazet get_page(pfrag->page); 15671da177e4SLinus Torvalds } 15685640f768SEric Dumazet copy = min_t(int, copy, pfrag->size - pfrag->offset); 15699e903e08SEric Dumazet if (getfrag(from, 15705640f768SEric Dumazet page_address(pfrag->page) + pfrag->offset, 15715640f768SEric Dumazet offset, copy, skb->len, skb) < 0) 15725640f768SEric Dumazet goto error_efault; 15735640f768SEric Dumazet 15745640f768SEric Dumazet pfrag->offset += copy; 15755640f768SEric Dumazet skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy); 15761da177e4SLinus Torvalds skb->len += copy; 15771da177e4SLinus Torvalds skb->data_len += copy; 1578f945fa7aSHerbert Xu skb->truesize += copy; 15791f4c6eb2SEric Dumazet wmem_alloc_delta += copy; 1580b5947e5dSWillem de Bruijn } else { 1581b5947e5dSWillem de Bruijn err = skb_zerocopy_iter_dgram(skb, from, copy); 1582b5947e5dSWillem de Bruijn if (err < 0) 1583b5947e5dSWillem de Bruijn goto error; 15841da177e4SLinus Torvalds } 15851da177e4SLinus Torvalds offset += copy; 15861da177e4SLinus Torvalds length -= copy; 15871da177e4SLinus Torvalds } 15885640f768SEric Dumazet 15899e8445a5SPaolo Abeni if (wmem_alloc_delta) 15901f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 15911da177e4SLinus Torvalds return 0; 15925640f768SEric Dumazet 15935640f768SEric Dumazet error_efault: 15945640f768SEric Dumazet err = -EFAULT; 15951da177e4SLinus Torvalds error: 159697ef7b4cSWillem de Bruijn if (uarg) 159752900d22SWillem de Bruijn sock_zerocopy_put_abort(uarg, extra_uref); 1598bdc712b4SDavid S. Miller cork->length -= length; 15993bd653c8SDenis V. Lunev IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS); 16001f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 16011da177e4SLinus Torvalds return err; 16021da177e4SLinus Torvalds } 16030bbe84a6SVlad Yasevich 16040bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk, 16050bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, int len, 16060bbe84a6SVlad Yasevich int odd, struct sk_buff *skb), 160726879da5SWei Wang void *from, int length, int transhdrlen, 160826879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 16095fdaa88dSWillem de Bruijn struct rt6_info *rt, unsigned int flags) 16100bbe84a6SVlad Yasevich { 16110bbe84a6SVlad Yasevich struct inet_sock *inet = inet_sk(sk); 16120bbe84a6SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 16130bbe84a6SVlad Yasevich int exthdrlen; 16140bbe84a6SVlad Yasevich int err; 16150bbe84a6SVlad Yasevich 16160bbe84a6SVlad Yasevich if (flags&MSG_PROBE) 16170bbe84a6SVlad Yasevich return 0; 16180bbe84a6SVlad Yasevich if (skb_queue_empty(&sk->sk_write_queue)) { 16190bbe84a6SVlad Yasevich /* 16200bbe84a6SVlad Yasevich * setup for corking 16210bbe84a6SVlad Yasevich */ 162226879da5SWei Wang err = ip6_setup_cork(sk, &inet->cork, &np->cork, 16235fdaa88dSWillem de Bruijn ipc6, rt, fl6); 16240bbe84a6SVlad Yasevich if (err) 16250bbe84a6SVlad Yasevich return err; 16260bbe84a6SVlad Yasevich 162726879da5SWei Wang exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 16280bbe84a6SVlad Yasevich length += exthdrlen; 16290bbe84a6SVlad Yasevich transhdrlen += exthdrlen; 16300bbe84a6SVlad Yasevich } else { 16310bbe84a6SVlad Yasevich fl6 = &inet->cork.fl.u.ip6; 16320bbe84a6SVlad Yasevich transhdrlen = 0; 16330bbe84a6SVlad Yasevich } 16340bbe84a6SVlad Yasevich 16350bbe84a6SVlad Yasevich return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base, 16360bbe84a6SVlad Yasevich &np->cork, sk_page_frag(sk), getfrag, 16375fdaa88dSWillem de Bruijn from, length, transhdrlen, flags, ipc6); 16380bbe84a6SVlad Yasevich } 1639a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data); 16401da177e4SLinus Torvalds 1641366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork, 1642366e41d9SVlad Yasevich struct inet6_cork *v6_cork) 1643bf138862SPavel Emelyanov { 1644366e41d9SVlad Yasevich if (v6_cork->opt) { 1645366e41d9SVlad Yasevich kfree(v6_cork->opt->dst0opt); 1646366e41d9SVlad Yasevich kfree(v6_cork->opt->dst1opt); 1647366e41d9SVlad Yasevich kfree(v6_cork->opt->hopopt); 1648366e41d9SVlad Yasevich kfree(v6_cork->opt->srcrt); 1649366e41d9SVlad Yasevich kfree(v6_cork->opt); 1650366e41d9SVlad Yasevich v6_cork->opt = NULL; 16510178b695SHerbert Xu } 16520178b695SHerbert Xu 1653366e41d9SVlad Yasevich if (cork->base.dst) { 1654366e41d9SVlad Yasevich dst_release(cork->base.dst); 1655366e41d9SVlad Yasevich cork->base.dst = NULL; 1656366e41d9SVlad Yasevich cork->base.flags &= ~IPCORK_ALLFRAG; 1657bf138862SPavel Emelyanov } 1658366e41d9SVlad Yasevich memset(&cork->fl, 0, sizeof(cork->fl)); 1659bf138862SPavel Emelyanov } 1660bf138862SPavel Emelyanov 16616422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk, 16626422398cSVlad Yasevich struct sk_buff_head *queue, 16636422398cSVlad Yasevich struct inet_cork_full *cork, 16646422398cSVlad Yasevich struct inet6_cork *v6_cork) 16651da177e4SLinus Torvalds { 16661da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 16671da177e4SLinus Torvalds struct sk_buff **tail_skb; 16681da177e4SLinus Torvalds struct in6_addr final_dst_buf, *final_dst = &final_dst_buf; 16691da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 16703bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 16711da177e4SLinus Torvalds struct ipv6hdr *hdr; 16726422398cSVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 16736422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->base.dst; 16746422398cSVlad Yasevich struct flowi6 *fl6 = &cork->fl.u.ip6; 16754c9483b2SDavid S. Miller unsigned char proto = fl6->flowi6_proto; 16761da177e4SLinus Torvalds 16776422398cSVlad Yasevich skb = __skb_dequeue(queue); 167863159f29SIan Morris if (!skb) 16791da177e4SLinus Torvalds goto out; 16801da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 16811da177e4SLinus Torvalds 16821da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1683d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1684bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 16856422398cSVlad Yasevich while ((tmp_skb = __skb_dequeue(queue)) != NULL) { 1686cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 16871da177e4SLinus Torvalds *tail_skb = tmp_skb; 16881da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 16891da177e4SLinus Torvalds skb->len += tmp_skb->len; 16901da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 16911da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 16921da177e4SLinus Torvalds tmp_skb->destructor = NULL; 16931da177e4SLinus Torvalds tmp_skb->sk = NULL; 16941da177e4SLinus Torvalds } 16951da177e4SLinus Torvalds 169628a89453SHerbert Xu /* Allow local fragmentation. */ 169760ff7467SWANG Cong skb->ignore_df = ip6_sk_ignore_df(sk); 169828a89453SHerbert Xu 16994e3fd7a0SAlexey Dobriyan *final_dst = fl6->daddr; 1700cfe1fc77SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_header_len(skb)); 17011da177e4SLinus Torvalds if (opt && opt->opt_flen) 17021da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 17031da177e4SLinus Torvalds if (opt && opt->opt_nflen) 1704613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr); 17051da177e4SLinus Torvalds 1706e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 1707e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 17080660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 17091da177e4SLinus Torvalds 17106422398cSVlad Yasevich ip6_flow_hdr(hdr, v6_cork->tclass, 1711cb1ce2efSTom Herbert ip6_make_flowlabel(net, skb, fl6->flowlabel, 1712513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 17136422398cSVlad Yasevich hdr->hop_limit = v6_cork->hop_limit; 17141da177e4SLinus Torvalds hdr->nexthdr = proto; 17154e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 17164e3fd7a0SAlexey Dobriyan hdr->daddr = *final_dst; 17171da177e4SLinus Torvalds 1718a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 17194a19ec58SLaszlo Attila Toth skb->mark = sk->sk_mark; 1720a2c2064fSPatrick McHardy 1721a818f75eSJesus Sanchez-Palencia skb->tstamp = cork->base.transmit_time; 1722a818f75eSJesus Sanchez-Palencia 1723d8d1f30bSChangli Gao skb_dst_set(skb, dst_clone(&rt->dst)); 1724edf391ffSNeil Horman IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len); 172514878f75SDavid L Stevens if (proto == IPPROTO_ICMPV6) { 1726adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 172714878f75SDavid L Stevens 172843a43b60SHannes Frederic Sowa ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type); 172943a43b60SHannes Frederic Sowa ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS); 173014878f75SDavid L Stevens } 173114878f75SDavid L Stevens 17326422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 17336422398cSVlad Yasevich out: 17346422398cSVlad Yasevich return skb; 17356422398cSVlad Yasevich } 17366422398cSVlad Yasevich 17376422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb) 17386422398cSVlad Yasevich { 17396422398cSVlad Yasevich struct net *net = sock_net(skb->sk); 17406422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 17416422398cSVlad Yasevich int err; 17426422398cSVlad Yasevich 174333224b16SEric W. Biederman err = ip6_local_out(net, skb->sk, skb); 17441da177e4SLinus Torvalds if (err) { 17451da177e4SLinus Torvalds if (err > 0) 17466ce9e7b5SEric Dumazet err = net_xmit_errno(err); 17471da177e4SLinus Torvalds if (err) 17486422398cSVlad Yasevich IP6_INC_STATS(net, rt->rt6i_idev, 17496422398cSVlad Yasevich IPSTATS_MIB_OUTDISCARDS); 17501da177e4SLinus Torvalds } 17511da177e4SLinus Torvalds 17521da177e4SLinus Torvalds return err; 17536422398cSVlad Yasevich } 17546422398cSVlad Yasevich 17556422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk) 17566422398cSVlad Yasevich { 17576422398cSVlad Yasevich struct sk_buff *skb; 17586422398cSVlad Yasevich 17596422398cSVlad Yasevich skb = ip6_finish_skb(sk); 17606422398cSVlad Yasevich if (!skb) 17616422398cSVlad Yasevich return 0; 17626422398cSVlad Yasevich 17636422398cSVlad Yasevich return ip6_send_skb(skb); 17641da177e4SLinus Torvalds } 1765a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames); 17661da177e4SLinus Torvalds 17670bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk, 17686422398cSVlad Yasevich struct sk_buff_head *queue, 17696422398cSVlad Yasevich struct inet_cork_full *cork, 17706422398cSVlad Yasevich struct inet6_cork *v6_cork) 17711da177e4SLinus Torvalds { 17721da177e4SLinus Torvalds struct sk_buff *skb; 17731da177e4SLinus Torvalds 17740bbe84a6SVlad Yasevich while ((skb = __skb_dequeue_tail(queue)) != NULL) { 1775adf30907SEric Dumazet if (skb_dst(skb)) 1776adf30907SEric Dumazet IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)), 1777a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 17781da177e4SLinus Torvalds kfree_skb(skb); 17791da177e4SLinus Torvalds } 17801da177e4SLinus Torvalds 17816422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 17821da177e4SLinus Torvalds } 17830bbe84a6SVlad Yasevich 17840bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk) 17850bbe84a6SVlad Yasevich { 17866422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &sk->sk_write_queue, 17876422398cSVlad Yasevich &inet_sk(sk)->cork, &inet6_sk(sk)->cork); 17880bbe84a6SVlad Yasevich } 1789a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames); 17906422398cSVlad Yasevich 17916422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk, 17926422398cSVlad Yasevich int getfrag(void *from, char *to, int offset, 17936422398cSVlad Yasevich int len, int odd, struct sk_buff *skb), 17946422398cSVlad Yasevich void *from, int length, int transhdrlen, 179526879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 17966422398cSVlad Yasevich struct rt6_info *rt, unsigned int flags, 17975fdaa88dSWillem de Bruijn struct inet_cork_full *cork) 17986422398cSVlad Yasevich { 17996422398cSVlad Yasevich struct inet6_cork v6_cork; 18006422398cSVlad Yasevich struct sk_buff_head queue; 180126879da5SWei Wang int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 18026422398cSVlad Yasevich int err; 18036422398cSVlad Yasevich 18046422398cSVlad Yasevich if (flags & MSG_PROBE) 18056422398cSVlad Yasevich return NULL; 18066422398cSVlad Yasevich 18076422398cSVlad Yasevich __skb_queue_head_init(&queue); 18086422398cSVlad Yasevich 18091cd7884dSWillem de Bruijn cork->base.flags = 0; 18101cd7884dSWillem de Bruijn cork->base.addr = 0; 18111cd7884dSWillem de Bruijn cork->base.opt = NULL; 18121cd7884dSWillem de Bruijn cork->base.dst = NULL; 18136422398cSVlad Yasevich v6_cork.opt = NULL; 18145fdaa88dSWillem de Bruijn err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt, fl6); 1815862c03eeSEric Dumazet if (err) { 18161cd7884dSWillem de Bruijn ip6_cork_release(cork, &v6_cork); 18176422398cSVlad Yasevich return ERR_PTR(err); 1818862c03eeSEric Dumazet } 181926879da5SWei Wang if (ipc6->dontfrag < 0) 182026879da5SWei Wang ipc6->dontfrag = inet6_sk(sk)->dontfrag; 18216422398cSVlad Yasevich 18221cd7884dSWillem de Bruijn err = __ip6_append_data(sk, fl6, &queue, &cork->base, &v6_cork, 18236422398cSVlad Yasevich ¤t->task_frag, getfrag, from, 18246422398cSVlad Yasevich length + exthdrlen, transhdrlen + exthdrlen, 18255fdaa88dSWillem de Bruijn flags, ipc6); 18266422398cSVlad Yasevich if (err) { 18271cd7884dSWillem de Bruijn __ip6_flush_pending_frames(sk, &queue, cork, &v6_cork); 18286422398cSVlad Yasevich return ERR_PTR(err); 18296422398cSVlad Yasevich } 18306422398cSVlad Yasevich 18311cd7884dSWillem de Bruijn return __ip6_make_skb(sk, &queue, cork, &v6_cork); 18326422398cSVlad Yasevich } 1833