11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * IPv6 output functions 31da177e4SLinus Torvalds * Linux INET6 implementation 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * Authors: 61da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 71da177e4SLinus Torvalds * 81da177e4SLinus Torvalds * Based on linux/net/ipv4/ip_output.c 91da177e4SLinus Torvalds * 101da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or 111da177e4SLinus Torvalds * modify it under the terms of the GNU General Public License 121da177e4SLinus Torvalds * as published by the Free Software Foundation; either version 131da177e4SLinus Torvalds * 2 of the License, or (at your option) any later version. 141da177e4SLinus Torvalds * 151da177e4SLinus Torvalds * Changes: 161da177e4SLinus Torvalds * A.N.Kuznetsov : airthmetics in fragmentation. 171da177e4SLinus Torvalds * extension headers are implemented. 181da177e4SLinus Torvalds * route changes now work. 191da177e4SLinus Torvalds * ip6_forward does not confuse sniffers. 201da177e4SLinus Torvalds * etc. 211da177e4SLinus Torvalds * 221da177e4SLinus Torvalds * H. von Brand : Added missing #include <linux/string.h> 231da177e4SLinus Torvalds * Imran Patel : frag id should be in NBO 241da177e4SLinus Torvalds * Kazunori MIYAZAWA @USAGI 251da177e4SLinus Torvalds * : add ip6_append_data and related functions 261da177e4SLinus Torvalds * for datagram xmit 271da177e4SLinus Torvalds */ 281da177e4SLinus Torvalds 291da177e4SLinus Torvalds #include <linux/errno.h> 30ef76bc23SHerbert Xu #include <linux/kernel.h> 311da177e4SLinus Torvalds #include <linux/string.h> 321da177e4SLinus Torvalds #include <linux/socket.h> 331da177e4SLinus Torvalds #include <linux/net.h> 341da177e4SLinus Torvalds #include <linux/netdevice.h> 351da177e4SLinus Torvalds #include <linux/if_arp.h> 361da177e4SLinus Torvalds #include <linux/in6.h> 371da177e4SLinus Torvalds #include <linux/tcp.h> 381da177e4SLinus Torvalds #include <linux/route.h> 39b59f45d0SHerbert Xu #include <linux/module.h> 405a0e3ad6STejun Heo #include <linux/slab.h> 411da177e4SLinus Torvalds 4233b48679SDaniel Mack #include <linux/bpf-cgroup.h> 431da177e4SLinus Torvalds #include <linux/netfilter.h> 441da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h> 451da177e4SLinus Torvalds 461da177e4SLinus Torvalds #include <net/sock.h> 471da177e4SLinus Torvalds #include <net/snmp.h> 481da177e4SLinus Torvalds 491da177e4SLinus Torvalds #include <net/ipv6.h> 501da177e4SLinus Torvalds #include <net/ndisc.h> 511da177e4SLinus Torvalds #include <net/protocol.h> 521da177e4SLinus Torvalds #include <net/ip6_route.h> 531da177e4SLinus Torvalds #include <net/addrconf.h> 541da177e4SLinus Torvalds #include <net/rawv6.h> 551da177e4SLinus Torvalds #include <net/icmp.h> 561da177e4SLinus Torvalds #include <net/xfrm.h> 571da177e4SLinus Torvalds #include <net/checksum.h> 587bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h> 59ca254490SDavid Ahern #include <net/l3mdev.h> 6014972cbdSRoopa Prabhu #include <net/lwtunnel.h> 611da177e4SLinus Torvalds 627d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb) 631da177e4SLinus Torvalds { 64adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 651da177e4SLinus Torvalds struct net_device *dev = dst->dev; 66f6b72b62SDavid S. Miller struct neighbour *neigh; 676fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 struct in6_addr *nexthop; 686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 int ret; 691da177e4SLinus Torvalds 700660e03fSArnaldo Carvalho de Melo if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) { 71adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 721da177e4SLinus Torvalds 737026b1ddSDavid Miller if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) && 7478126c41SEric W. Biederman ((mroute6_socket(net, skb) && 75bd91b8bfSBenjamin Thery !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) || 760660e03fSArnaldo Carvalho de Melo ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr, 777bc570c8SYOSHIFUJI Hideaki &ipv6_hdr(skb)->saddr))) { 781da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 791da177e4SLinus Torvalds 801da177e4SLinus Torvalds /* Do not check for IFF_ALLMULTI; multicast routing 811da177e4SLinus Torvalds is not supported in any case. 821da177e4SLinus Torvalds */ 831da177e4SLinus Torvalds if (newskb) 84b2e0b385SJan Engelhardt NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING, 8529a26a56SEric W. Biederman net, sk, newskb, NULL, newskb->dev, 8695603e22SMichel Machado dev_loopback_xmit); 871da177e4SLinus Torvalds 880660e03fSArnaldo Carvalho de Melo if (ipv6_hdr(skb)->hop_limit == 0) { 8978126c41SEric W. Biederman IP6_INC_STATS(net, idev, 903bd653c8SDenis V. Lunev IPSTATS_MIB_OUTDISCARDS); 911da177e4SLinus Torvalds kfree_skb(skb); 921da177e4SLinus Torvalds return 0; 931da177e4SLinus Torvalds } 941da177e4SLinus Torvalds } 951da177e4SLinus Torvalds 9678126c41SEric W. Biederman IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len); 97dd408515SHannes Frederic Sowa 98dd408515SHannes Frederic Sowa if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <= 99dd408515SHannes Frederic Sowa IPV6_ADDR_SCOPE_NODELOCAL && 100dd408515SHannes Frederic Sowa !(dev->flags & IFF_LOOPBACK)) { 101dd408515SHannes Frederic Sowa kfree_skb(skb); 102dd408515SHannes Frederic Sowa return 0; 103dd408515SHannes Frederic Sowa } 1041da177e4SLinus Torvalds } 1051da177e4SLinus Torvalds 10614972cbdSRoopa Prabhu if (lwtunnel_xmit_redirect(dst->lwtstate)) { 10714972cbdSRoopa Prabhu int res = lwtunnel_xmit(skb); 10814972cbdSRoopa Prabhu 10914972cbdSRoopa Prabhu if (res < 0 || res == LWTUNNEL_XMIT_DONE) 11014972cbdSRoopa Prabhu return res; 11114972cbdSRoopa Prabhu } 11214972cbdSRoopa Prabhu 1136fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 1142647a9b0SMartin KaFai Lau nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr); 1156fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop); 1166fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(!neigh)) 1176fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false); 1186fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (!IS_ERR(neigh)) { 1194ff06203SJulian Anastasov sock_confirm_neigh(skb, neigh); 120c16ec185SJulian Anastasov ret = neigh_output(neigh, skb); 1216fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1226fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 return ret; 1236fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 } 1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 12505e3aa09SDavid S. Miller 12678126c41SEric W. Biederman IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES); 1279e508490SJan Engelhardt kfree_skb(skb); 1289e508490SJan Engelhardt return -EINVAL; 1291da177e4SLinus Torvalds } 1301da177e4SLinus Torvalds 1310c4b51f0SEric W. Biederman static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1329e508490SJan Engelhardt { 13333b48679SDaniel Mack int ret; 13433b48679SDaniel Mack 13533b48679SDaniel Mack ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb); 13633b48679SDaniel Mack if (ret) { 13733b48679SDaniel Mack kfree_skb(skb); 13833b48679SDaniel Mack return ret; 13933b48679SDaniel Mack } 14033b48679SDaniel Mack 1419e508490SJan Engelhardt if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) || 1429037c357SJiri Pirko dst_allfrag(skb_dst(skb)) || 1439037c357SJiri Pirko (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size)) 1447d8c6e39SEric W. Biederman return ip6_fragment(net, sk, skb, ip6_finish_output2); 1459e508490SJan Engelhardt else 1467d8c6e39SEric W. Biederman return ip6_finish_output2(net, sk, skb); 1479e508490SJan Engelhardt } 1489e508490SJan Engelhardt 149ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1501da177e4SLinus Torvalds { 1519e508490SJan Engelhardt struct net_device *dev = skb_dst(skb)->dev; 152adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 153be10de0aSEric W. Biederman 154*97a7a37aSChenbo Feng skb->protocol = htons(ETH_P_IPV6); 155*97a7a37aSChenbo Feng skb->dev = dev; 156*97a7a37aSChenbo Feng 157778d80beSYOSHIFUJI Hideaki if (unlikely(idev->cnf.disable_ipv6)) { 15819a0644cSEric W. Biederman IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 159778d80beSYOSHIFUJI Hideaki kfree_skb(skb); 160778d80beSYOSHIFUJI Hideaki return 0; 161778d80beSYOSHIFUJI Hideaki } 162778d80beSYOSHIFUJI Hideaki 16329a26a56SEric W. Biederman return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING, 16429a26a56SEric W. Biederman net, sk, skb, NULL, dev, 1659c6eb28aSJan Engelhardt ip6_finish_output, 1669c6eb28aSJan Engelhardt !(IP6CB(skb)->flags & IP6SKB_REROUTED)); 1671da177e4SLinus Torvalds } 1681da177e4SLinus Torvalds 1691da177e4SLinus Torvalds /* 170b5d43998SShan Wei * xmit an sk_buff (used by TCP, SCTP and DCCP) 1711c1e9d2bSEric Dumazet * Note : socket lock is not held for SYNACK packets, but might be modified 1721c1e9d2bSEric Dumazet * by calls to skb_set_owner_w() and ipv6_local_error(), 1731c1e9d2bSEric Dumazet * which are using proper atomic operations or spinlocks. 1741da177e4SLinus Torvalds */ 1751c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6, 17692e55f41SPablo Neira __u32 mark, struct ipv6_txoptions *opt, int tclass) 1771da177e4SLinus Torvalds { 1783bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 1791c1e9d2bSEric Dumazet const struct ipv6_pinfo *np = inet6_sk(sk); 1804c9483b2SDavid S. Miller struct in6_addr *first_hop = &fl6->daddr; 181adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 1821da177e4SLinus Torvalds struct ipv6hdr *hdr; 1834c9483b2SDavid S. Miller u8 proto = fl6->flowi6_proto; 1841da177e4SLinus Torvalds int seg_len = skb->len; 185e651f03aSGerrit Renker int hlimit = -1; 1861da177e4SLinus Torvalds u32 mtu; 1871da177e4SLinus Torvalds 1881da177e4SLinus Torvalds if (opt) { 189c2636b4dSChuck Lever unsigned int head_room; 1901da177e4SLinus Torvalds 1911da177e4SLinus Torvalds /* First: exthdrs may take lots of space (~8K for now) 1921da177e4SLinus Torvalds MAX_HEADER is not enough. 1931da177e4SLinus Torvalds */ 1941da177e4SLinus Torvalds head_room = opt->opt_nflen + opt->opt_flen; 1951da177e4SLinus Torvalds seg_len += head_room; 1961da177e4SLinus Torvalds head_room += sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev); 1971da177e4SLinus Torvalds 1981da177e4SLinus Torvalds if (skb_headroom(skb) < head_room) { 1991da177e4SLinus Torvalds struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room); 20063159f29SIan Morris if (!skb2) { 201adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 202a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 2031da177e4SLinus Torvalds kfree_skb(skb); 2041da177e4SLinus Torvalds return -ENOBUFS; 2051da177e4SLinus Torvalds } 206808db80aSEric Dumazet consume_skb(skb); 207a11d206dSYOSHIFUJI Hideaki skb = skb2; 2081c1e9d2bSEric Dumazet /* skb_set_owner_w() changes sk->sk_wmem_alloc atomically, 2091c1e9d2bSEric Dumazet * it is safe to call in our context (socket lock not held) 2101c1e9d2bSEric Dumazet */ 2111c1e9d2bSEric Dumazet skb_set_owner_w(skb, (struct sock *)sk); 2121da177e4SLinus Torvalds } 2131da177e4SLinus Torvalds if (opt->opt_flen) 2141da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 2151da177e4SLinus Torvalds if (opt->opt_nflen) 216613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop, 217613fa3caSDavid Lebrun &fl6->saddr); 2181da177e4SLinus Torvalds } 2191da177e4SLinus Torvalds 220e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 221e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 2220660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 2231da177e4SLinus Torvalds 2241da177e4SLinus Torvalds /* 2251da177e4SLinus Torvalds * Fill in the IPv6 header 2261da177e4SLinus Torvalds */ 227b903d324SEric Dumazet if (np) 2281da177e4SLinus Torvalds hlimit = np->hop_limit; 2291da177e4SLinus Torvalds if (hlimit < 0) 2306b75d090SYOSHIFUJI Hideaki hlimit = ip6_dst_hoplimit(dst); 2311da177e4SLinus Torvalds 232cb1ce2efSTom Herbert ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel, 23367800f9bSTom Herbert np->autoflowlabel, fl6)); 23441a1f8eaSYOSHIFUJI Hideaki 2351da177e4SLinus Torvalds hdr->payload_len = htons(seg_len); 2361da177e4SLinus Torvalds hdr->nexthdr = proto; 2371da177e4SLinus Torvalds hdr->hop_limit = hlimit; 2381da177e4SLinus Torvalds 2394e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 2404e3fd7a0SAlexey Dobriyan hdr->daddr = *first_hop; 2411da177e4SLinus Torvalds 2429c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 243a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 24492e55f41SPablo Neira skb->mark = mark; 245a2c2064fSPatrick McHardy 2461da177e4SLinus Torvalds mtu = dst_mtu(dst); 24760ff7467SWANG Cong if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) { 248adf30907SEric Dumazet IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)), 249edf391ffSNeil Horman IPSTATS_MIB_OUT, skb->len); 250a8e3e1a9SDavid Ahern 251a8e3e1a9SDavid Ahern /* if egress device is enslaved to an L3 master device pass the 252a8e3e1a9SDavid Ahern * skb to its handler for processing 253a8e3e1a9SDavid Ahern */ 254a8e3e1a9SDavid Ahern skb = l3mdev_ip6_out((struct sock *)sk, skb); 255a8e3e1a9SDavid Ahern if (unlikely(!skb)) 256a8e3e1a9SDavid Ahern return 0; 257a8e3e1a9SDavid Ahern 2581c1e9d2bSEric Dumazet /* hooks should never assume socket lock is held. 2591c1e9d2bSEric Dumazet * we promote our socket to non const 2601c1e9d2bSEric Dumazet */ 26129a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, 2621c1e9d2bSEric Dumazet net, (struct sock *)sk, skb, NULL, dst->dev, 26313206b6bSEric W. Biederman dst_output); 2641da177e4SLinus Torvalds } 2651da177e4SLinus Torvalds 2661da177e4SLinus Torvalds skb->dev = dst->dev; 2671c1e9d2bSEric Dumazet /* ipv6_local_error() does not require socket lock, 2681c1e9d2bSEric Dumazet * we promote our socket to non const 2691c1e9d2bSEric Dumazet */ 2701c1e9d2bSEric Dumazet ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu); 2711c1e9d2bSEric Dumazet 272adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS); 2731da177e4SLinus Torvalds kfree_skb(skb); 2741da177e4SLinus Torvalds return -EMSGSIZE; 2751da177e4SLinus Torvalds } 2767159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit); 2777159039aSYOSHIFUJI Hideaki 2781da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel) 2791da177e4SLinus Torvalds { 2801da177e4SLinus Torvalds struct ip6_ra_chain *ra; 2811da177e4SLinus Torvalds struct sock *last = NULL; 2821da177e4SLinus Torvalds 2831da177e4SLinus Torvalds read_lock(&ip6_ra_lock); 2841da177e4SLinus Torvalds for (ra = ip6_ra_chain; ra; ra = ra->next) { 2851da177e4SLinus Torvalds struct sock *sk = ra->sk; 2860bd1b59bSAndrew McDonald if (sk && ra->sel == sel && 2870bd1b59bSAndrew McDonald (!sk->sk_bound_dev_if || 2880bd1b59bSAndrew McDonald sk->sk_bound_dev_if == skb->dev->ifindex)) { 2891da177e4SLinus Torvalds if (last) { 2901da177e4SLinus Torvalds struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC); 2911da177e4SLinus Torvalds if (skb2) 2921da177e4SLinus Torvalds rawv6_rcv(last, skb2); 2931da177e4SLinus Torvalds } 2941da177e4SLinus Torvalds last = sk; 2951da177e4SLinus Torvalds } 2961da177e4SLinus Torvalds } 2971da177e4SLinus Torvalds 2981da177e4SLinus Torvalds if (last) { 2991da177e4SLinus Torvalds rawv6_rcv(last, skb); 3001da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3011da177e4SLinus Torvalds return 1; 3021da177e4SLinus Torvalds } 3031da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3041da177e4SLinus Torvalds return 0; 3051da177e4SLinus Torvalds } 3061da177e4SLinus Torvalds 307e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb) 308e21e0b5fSVille Nuorvala { 3090660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 310e21e0b5fSVille Nuorvala u8 nexthdr = hdr->nexthdr; 31175f2811cSJesse Gross __be16 frag_off; 312e21e0b5fSVille Nuorvala int offset; 313e21e0b5fSVille Nuorvala 314e21e0b5fSVille Nuorvala if (ipv6_ext_hdr(nexthdr)) { 31575f2811cSJesse Gross offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off); 316e21e0b5fSVille Nuorvala if (offset < 0) 317e21e0b5fSVille Nuorvala return 0; 318e21e0b5fSVille Nuorvala } else 319e21e0b5fSVille Nuorvala offset = sizeof(struct ipv6hdr); 320e21e0b5fSVille Nuorvala 321e21e0b5fSVille Nuorvala if (nexthdr == IPPROTO_ICMPV6) { 322e21e0b5fSVille Nuorvala struct icmp6hdr *icmp6; 323e21e0b5fSVille Nuorvala 324d56f90a7SArnaldo Carvalho de Melo if (!pskb_may_pull(skb, (skb_network_header(skb) + 325d56f90a7SArnaldo Carvalho de Melo offset + 1 - skb->data))) 326e21e0b5fSVille Nuorvala return 0; 327e21e0b5fSVille Nuorvala 328d56f90a7SArnaldo Carvalho de Melo icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset); 329e21e0b5fSVille Nuorvala 330e21e0b5fSVille Nuorvala switch (icmp6->icmp6_type) { 331e21e0b5fSVille Nuorvala case NDISC_ROUTER_SOLICITATION: 332e21e0b5fSVille Nuorvala case NDISC_ROUTER_ADVERTISEMENT: 333e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_SOLICITATION: 334e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_ADVERTISEMENT: 335e21e0b5fSVille Nuorvala case NDISC_REDIRECT: 336e21e0b5fSVille Nuorvala /* For reaction involving unicast neighbor discovery 337e21e0b5fSVille Nuorvala * message destined to the proxied address, pass it to 338e21e0b5fSVille Nuorvala * input function. 339e21e0b5fSVille Nuorvala */ 340e21e0b5fSVille Nuorvala return 1; 341e21e0b5fSVille Nuorvala default: 342e21e0b5fSVille Nuorvala break; 343e21e0b5fSVille Nuorvala } 344e21e0b5fSVille Nuorvala } 345e21e0b5fSVille Nuorvala 34674553b09SVille Nuorvala /* 34774553b09SVille Nuorvala * The proxying router can't forward traffic sent to a link-local 34874553b09SVille Nuorvala * address, so signal the sender and discard the packet. This 34974553b09SVille Nuorvala * behavior is clarified by the MIPv6 specification. 35074553b09SVille Nuorvala */ 35174553b09SVille Nuorvala if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) { 35274553b09SVille Nuorvala dst_link_failure(skb); 35374553b09SVille Nuorvala return -1; 35474553b09SVille Nuorvala } 35574553b09SVille Nuorvala 356e21e0b5fSVille Nuorvala return 0; 357e21e0b5fSVille Nuorvala } 358e21e0b5fSVille Nuorvala 3590c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk, 3600c4b51f0SEric W. Biederman struct sk_buff *skb) 3611da177e4SLinus Torvalds { 36213206b6bSEric W. Biederman return dst_output(net, sk, skb); 3631da177e4SLinus Torvalds } 3641da177e4SLinus Torvalds 3650954cf9cSHannes Frederic Sowa static unsigned int ip6_dst_mtu_forward(const struct dst_entry *dst) 3660954cf9cSHannes Frederic Sowa { 3670954cf9cSHannes Frederic Sowa unsigned int mtu; 3680954cf9cSHannes Frederic Sowa struct inet6_dev *idev; 3690954cf9cSHannes Frederic Sowa 3700954cf9cSHannes Frederic Sowa if (dst_metric_locked(dst, RTAX_MTU)) { 3710954cf9cSHannes Frederic Sowa mtu = dst_metric_raw(dst, RTAX_MTU); 3720954cf9cSHannes Frederic Sowa if (mtu) 3730954cf9cSHannes Frederic Sowa return mtu; 3740954cf9cSHannes Frederic Sowa } 3750954cf9cSHannes Frederic Sowa 3760954cf9cSHannes Frederic Sowa mtu = IPV6_MIN_MTU; 3770954cf9cSHannes Frederic Sowa rcu_read_lock(); 3780954cf9cSHannes Frederic Sowa idev = __in6_dev_get(dst->dev); 3790954cf9cSHannes Frederic Sowa if (idev) 3800954cf9cSHannes Frederic Sowa mtu = idev->cnf.mtu6; 3810954cf9cSHannes Frederic Sowa rcu_read_unlock(); 3820954cf9cSHannes Frederic Sowa 3830954cf9cSHannes Frederic Sowa return mtu; 3840954cf9cSHannes Frederic Sowa } 3850954cf9cSHannes Frederic Sowa 386fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu) 387fe6cc55fSFlorian Westphal { 388418a3156SFlorian Westphal if (skb->len <= mtu) 389fe6cc55fSFlorian Westphal return false; 390fe6cc55fSFlorian Westphal 39160ff7467SWANG Cong /* ipv6 conntrack defrag sets max_frag_size + ignore_df */ 392fe6cc55fSFlorian Westphal if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu) 393fe6cc55fSFlorian Westphal return true; 394fe6cc55fSFlorian Westphal 39560ff7467SWANG Cong if (skb->ignore_df) 396418a3156SFlorian Westphal return false; 397418a3156SFlorian Westphal 398ae7ef81eSMarcelo Ricardo Leitner if (skb_is_gso(skb) && skb_gso_validate_mtu(skb, mtu)) 399fe6cc55fSFlorian Westphal return false; 400fe6cc55fSFlorian Westphal 401fe6cc55fSFlorian Westphal return true; 402fe6cc55fSFlorian Westphal } 403fe6cc55fSFlorian Westphal 4041da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb) 4051da177e4SLinus Torvalds { 406adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 4070660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 4081da177e4SLinus Torvalds struct inet6_skb_parm *opt = IP6CB(skb); 409c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(dst->dev); 41014f3ad6fSUlrich Weber u32 mtu; 4111da177e4SLinus Torvalds 41253b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->forwarding == 0) 4131da177e4SLinus Torvalds goto error; 4141da177e4SLinus Torvalds 415090f1166SLi RongQing if (skb->pkt_type != PACKET_HOST) 416090f1166SLi RongQing goto drop; 417090f1166SLi RongQing 4189ef2e965SHannes Frederic Sowa if (unlikely(skb->sk)) 4199ef2e965SHannes Frederic Sowa goto drop; 4209ef2e965SHannes Frederic Sowa 4214497b076SBen Hutchings if (skb_warn_if_lro(skb)) 4224497b076SBen Hutchings goto drop; 4234497b076SBen Hutchings 4241da177e4SLinus Torvalds if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) { 4251d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 42615c77d8bSEric Dumazet IPSTATS_MIB_INDISCARDS); 4271da177e4SLinus Torvalds goto drop; 4281da177e4SLinus Torvalds } 4291da177e4SLinus Torvalds 43035fc92a9SHerbert Xu skb_forward_csum(skb); 4311da177e4SLinus Torvalds 4321da177e4SLinus Torvalds /* 4331da177e4SLinus Torvalds * We DO NOT make any processing on 4341da177e4SLinus Torvalds * RA packets, pushing them to user level AS IS 4351da177e4SLinus Torvalds * without ane WARRANTY that application will be able 4361da177e4SLinus Torvalds * to interpret them. The reason is that we 4371da177e4SLinus Torvalds * cannot make anything clever here. 4381da177e4SLinus Torvalds * 4391da177e4SLinus Torvalds * We are not end-node, so that if packet contains 4401da177e4SLinus Torvalds * AH/ESP, we cannot make anything. 4411da177e4SLinus Torvalds * Defragmentation also would be mistake, RA packets 4421da177e4SLinus Torvalds * cannot be fragmented, because there is no warranty 4431da177e4SLinus Torvalds * that different fragments will go along one path. --ANK 4441da177e4SLinus Torvalds */ 445ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) { 446ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (ip6_call_ra_chain(skb, ntohs(opt->ra))) 4471da177e4SLinus Torvalds return 0; 4481da177e4SLinus Torvalds } 4491da177e4SLinus Torvalds 4501da177e4SLinus Torvalds /* 4511da177e4SLinus Torvalds * check and decrement ttl 4521da177e4SLinus Torvalds */ 4531da177e4SLinus Torvalds if (hdr->hop_limit <= 1) { 4541da177e4SLinus Torvalds /* Force OUTPUT device used as source address */ 4551da177e4SLinus Torvalds skb->dev = dst->dev; 4563ffe533cSAlexey Dobriyan icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0); 4571d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 45815c77d8bSEric Dumazet IPSTATS_MIB_INHDRERRORS); 4591da177e4SLinus Torvalds 4601da177e4SLinus Torvalds kfree_skb(skb); 4611da177e4SLinus Torvalds return -ETIMEDOUT; 4621da177e4SLinus Torvalds } 4631da177e4SLinus Torvalds 464fbea49e1SYOSHIFUJI Hideaki /* XXX: idev->cnf.proxy_ndp? */ 46553b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->proxy_ndp && 4668a3edd80SDaniel Lezcano pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) { 46774553b09SVille Nuorvala int proxied = ip6_forward_proxy_check(skb); 46874553b09SVille Nuorvala if (proxied > 0) 469e21e0b5fSVille Nuorvala return ip6_input(skb); 47074553b09SVille Nuorvala else if (proxied < 0) { 4711d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 4723bd653c8SDenis V. Lunev IPSTATS_MIB_INDISCARDS); 47374553b09SVille Nuorvala goto drop; 47474553b09SVille Nuorvala } 475e21e0b5fSVille Nuorvala } 476e21e0b5fSVille Nuorvala 4771da177e4SLinus Torvalds if (!xfrm6_route_forward(skb)) { 4781d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 47915c77d8bSEric Dumazet IPSTATS_MIB_INDISCARDS); 4801da177e4SLinus Torvalds goto drop; 4811da177e4SLinus Torvalds } 482adf30907SEric Dumazet dst = skb_dst(skb); 4831da177e4SLinus Torvalds 4841da177e4SLinus Torvalds /* IPv6 specs say nothing about it, but it is clear that we cannot 4851da177e4SLinus Torvalds send redirects to source routed frames. 4861e5dc146SMasahide NAKAMURA We don't send redirects to frames decapsulated from IPsec. 4871da177e4SLinus Torvalds */ 488c45a3dfbSDavid S. Miller if (skb->dev == dst->dev && opt->srcrt == 0 && !skb_sec_path(skb)) { 4891da177e4SLinus Torvalds struct in6_addr *target = NULL; 490fbfe95a4SDavid S. Miller struct inet_peer *peer; 4911da177e4SLinus Torvalds struct rt6_info *rt; 4921da177e4SLinus Torvalds 4931da177e4SLinus Torvalds /* 4941da177e4SLinus Torvalds * incoming and outgoing devices are the same 4951da177e4SLinus Torvalds * send a redirect. 4961da177e4SLinus Torvalds */ 4971da177e4SLinus Torvalds 4981da177e4SLinus Torvalds rt = (struct rt6_info *) dst; 499c45a3dfbSDavid S. Miller if (rt->rt6i_flags & RTF_GATEWAY) 500c45a3dfbSDavid S. Miller target = &rt->rt6i_gateway; 5011da177e4SLinus Torvalds else 5021da177e4SLinus Torvalds target = &hdr->daddr; 5031da177e4SLinus Torvalds 504fd0273d7SMartin KaFai Lau peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1); 50592d86829SDavid S. Miller 5061da177e4SLinus Torvalds /* Limit redirects both by destination (here) 5071da177e4SLinus Torvalds and by source (inside ndisc_send_redirect) 5081da177e4SLinus Torvalds */ 509fbfe95a4SDavid S. Miller if (inet_peer_xrlim_allow(peer, 1*HZ)) 5104991969aSDavid S. Miller ndisc_send_redirect(skb, target); 5111d861aa4SDavid S. Miller if (peer) 5121d861aa4SDavid S. Miller inet_putpeer(peer); 5135bb1ab09SDavid L Stevens } else { 5145bb1ab09SDavid L Stevens int addrtype = ipv6_addr_type(&hdr->saddr); 5155bb1ab09SDavid L Stevens 5161da177e4SLinus Torvalds /* This check is security critical. */ 517f81b2e7dSYOSHIFUJI Hideaki if (addrtype == IPV6_ADDR_ANY || 518f81b2e7dSYOSHIFUJI Hideaki addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK)) 5191da177e4SLinus Torvalds goto error; 5205bb1ab09SDavid L Stevens if (addrtype & IPV6_ADDR_LINKLOCAL) { 5215bb1ab09SDavid L Stevens icmpv6_send(skb, ICMPV6_DEST_UNREACH, 5223ffe533cSAlexey Dobriyan ICMPV6_NOT_NEIGHBOUR, 0); 5235bb1ab09SDavid L Stevens goto error; 5245bb1ab09SDavid L Stevens } 5251da177e4SLinus Torvalds } 5261da177e4SLinus Torvalds 5270954cf9cSHannes Frederic Sowa mtu = ip6_dst_mtu_forward(dst); 52814f3ad6fSUlrich Weber if (mtu < IPV6_MIN_MTU) 52914f3ad6fSUlrich Weber mtu = IPV6_MIN_MTU; 53014f3ad6fSUlrich Weber 531fe6cc55fSFlorian Westphal if (ip6_pkt_too_big(skb, mtu)) { 5321da177e4SLinus Torvalds /* Again, force OUTPUT device used as source address */ 5331da177e4SLinus Torvalds skb->dev = dst->dev; 53414f3ad6fSUlrich Weber icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 5351d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 53615c77d8bSEric Dumazet IPSTATS_MIB_INTOOBIGERRORS); 5371d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 53815c77d8bSEric Dumazet IPSTATS_MIB_FRAGFAILS); 5391da177e4SLinus Torvalds kfree_skb(skb); 5401da177e4SLinus Torvalds return -EMSGSIZE; 5411da177e4SLinus Torvalds } 5421da177e4SLinus Torvalds 5431da177e4SLinus Torvalds if (skb_cow(skb, dst->dev->hard_header_len)) { 5441d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 54515c77d8bSEric Dumazet IPSTATS_MIB_OUTDISCARDS); 5461da177e4SLinus Torvalds goto drop; 5471da177e4SLinus Torvalds } 5481da177e4SLinus Torvalds 5490660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 5501da177e4SLinus Torvalds 5511da177e4SLinus Torvalds /* Mangling hops number delayed to point after skb COW */ 5521da177e4SLinus Torvalds 5531da177e4SLinus Torvalds hdr->hop_limit--; 5541da177e4SLinus Torvalds 5551d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS); 5561d015503SEric Dumazet __IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len); 55729a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, 55829a26a56SEric W. Biederman net, NULL, skb, skb->dev, dst->dev, 5596e23ae2aSPatrick McHardy ip6_forward_finish); 5601da177e4SLinus Torvalds 5611da177e4SLinus Torvalds error: 5621d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_INADDRERRORS); 5631da177e4SLinus Torvalds drop: 5641da177e4SLinus Torvalds kfree_skb(skb); 5651da177e4SLinus Torvalds return -EINVAL; 5661da177e4SLinus Torvalds } 5671da177e4SLinus Torvalds 5681da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from) 5691da177e4SLinus Torvalds { 5701da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 5711da177e4SLinus Torvalds to->priority = from->priority; 5721da177e4SLinus Torvalds to->protocol = from->protocol; 573adf30907SEric Dumazet skb_dst_drop(to); 574adf30907SEric Dumazet skb_dst_set(to, dst_clone(skb_dst(from))); 5751da177e4SLinus Torvalds to->dev = from->dev; 57682e91ffeSThomas Graf to->mark = from->mark; 5771da177e4SLinus Torvalds 5781da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 5791da177e4SLinus Torvalds to->tc_index = from->tc_index; 5801da177e4SLinus Torvalds #endif 581e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 582984bc16cSJames Morris skb_copy_secmark(to, from); 5831da177e4SLinus Torvalds } 5841da177e4SLinus Torvalds 5857d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, 5867d8c6e39SEric W. Biederman int (*output)(struct net *, struct sock *, struct sk_buff *)) 5871da177e4SLinus Torvalds { 5881da177e4SLinus Torvalds struct sk_buff *frag; 589adf30907SEric Dumazet struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 590f60e5990Shannes@stressinduktion.org struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? 591f60e5990Shannes@stressinduktion.org inet6_sk(skb->sk) : NULL; 5921da177e4SLinus Torvalds struct ipv6hdr *tmp_hdr; 5931da177e4SLinus Torvalds struct frag_hdr *fh; 5941da177e4SLinus Torvalds unsigned int mtu, hlen, left, len; 595a7ae1992SHerbert Xu int hroom, troom; 596286c2349SMartin KaFai Lau __be32 frag_id; 5971da177e4SLinus Torvalds int ptr, offset = 0, err = 0; 5981da177e4SLinus Torvalds u8 *prevhdr, nexthdr = 0; 5991da177e4SLinus Torvalds 6007dd7eb95SDavid S. Miller err = ip6_find_1stfragopt(skb, &prevhdr); 6017dd7eb95SDavid S. Miller if (err < 0) 6022423496aSCraig Gallek goto fail; 6037dd7eb95SDavid S. Miller hlen = err; 6041da177e4SLinus Torvalds nexthdr = *prevhdr; 6051da177e4SLinus Torvalds 606628a5c56SJohn Heffner mtu = ip6_skb_dst_mtu(skb); 607b881ef76SJohn Heffner 608b881ef76SJohn Heffner /* We must not fragment if the socket is set to force MTU discovery 60914f3ad6fSUlrich Weber * or if the skb it not generated by a local socket. 610b881ef76SJohn Heffner */ 611485fca66SFlorian Westphal if (unlikely(!skb->ignore_df && skb->len > mtu)) 612485fca66SFlorian Westphal goto fail_toobig; 613a34a101eSEric Dumazet 614485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size) { 615485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size > mtu) 616485fca66SFlorian Westphal goto fail_toobig; 617485fca66SFlorian Westphal 618485fca66SFlorian Westphal /* don't send fragments larger than what we received */ 619485fca66SFlorian Westphal mtu = IP6CB(skb)->frag_max_size; 620485fca66SFlorian Westphal if (mtu < IPV6_MIN_MTU) 621485fca66SFlorian Westphal mtu = IPV6_MIN_MTU; 622b881ef76SJohn Heffner } 623b881ef76SJohn Heffner 624d91675f9SYOSHIFUJI Hideaki if (np && np->frag_size < mtu) { 625d91675f9SYOSHIFUJI Hideaki if (np->frag_size) 626d91675f9SYOSHIFUJI Hideaki mtu = np->frag_size; 627d91675f9SYOSHIFUJI Hideaki } 62889bc7848SHannes Frederic Sowa if (mtu < hlen + sizeof(struct frag_hdr) + 8) 629b72a2b01SHannes Frederic Sowa goto fail_toobig; 6301e0d69a9SHannes Frederic Sowa mtu -= hlen + sizeof(struct frag_hdr); 6311da177e4SLinus Torvalds 632fd0273d7SMartin KaFai Lau frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr, 633fd0273d7SMartin KaFai Lau &ipv6_hdr(skb)->saddr); 634286c2349SMartin KaFai Lau 635405c92f7SHannes Frederic Sowa if (skb->ip_summed == CHECKSUM_PARTIAL && 636405c92f7SHannes Frederic Sowa (err = skb_checksum_help(skb))) 637405c92f7SHannes Frederic Sowa goto fail; 638405c92f7SHannes Frederic Sowa 6391d325d21SFlorian Westphal hroom = LL_RESERVED_SPACE(rt->dst.dev); 64021dc3301SDavid S. Miller if (skb_has_frag_list(skb)) { 641c72d8cdaSAlexey Dobriyan unsigned int first_len = skb_pagelen(skb); 6423d13008eSEric Dumazet struct sk_buff *frag2; 6431da177e4SLinus Torvalds 6441da177e4SLinus Torvalds if (first_len - hlen > mtu || 6451da177e4SLinus Torvalds ((first_len - hlen) & 7) || 6461d325d21SFlorian Westphal skb_cloned(skb) || 6471d325d21SFlorian Westphal skb_headroom(skb) < (hroom + sizeof(struct frag_hdr))) 6481da177e4SLinus Torvalds goto slow_path; 6491da177e4SLinus Torvalds 6504d9092bbSDavid S. Miller skb_walk_frags(skb, frag) { 6511da177e4SLinus Torvalds /* Correct geometry. */ 6521da177e4SLinus Torvalds if (frag->len > mtu || 6531da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 6541d325d21SFlorian Westphal skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr))) 6553d13008eSEric Dumazet goto slow_path_clean; 6561da177e4SLinus Torvalds 6571da177e4SLinus Torvalds /* Partially cloned skb? */ 6581da177e4SLinus Torvalds if (skb_shared(frag)) 6593d13008eSEric Dumazet goto slow_path_clean; 6602fdba6b0SHerbert Xu 6612fdba6b0SHerbert Xu BUG_ON(frag->sk); 6622fdba6b0SHerbert Xu if (skb->sk) { 6632fdba6b0SHerbert Xu frag->sk = skb->sk; 6642fdba6b0SHerbert Xu frag->destructor = sock_wfree; 6652fdba6b0SHerbert Xu } 6663d13008eSEric Dumazet skb->truesize -= frag->truesize; 6671da177e4SLinus Torvalds } 6681da177e4SLinus Torvalds 6691da177e4SLinus Torvalds err = 0; 6701da177e4SLinus Torvalds offset = 0; 6711da177e4SLinus Torvalds /* BUILD HEADER */ 6721da177e4SLinus Torvalds 6739a217a1cSYOSHIFUJI Hideaki *prevhdr = NEXTHDR_FRAGMENT; 674d56f90a7SArnaldo Carvalho de Melo tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC); 6751da177e4SLinus Torvalds if (!tmp_hdr) { 676adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 6773bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 6781d325d21SFlorian Westphal err = -ENOMEM; 6791d325d21SFlorian Westphal goto fail; 6801da177e4SLinus Torvalds } 6811d325d21SFlorian Westphal frag = skb_shinfo(skb)->frag_list; 6821d325d21SFlorian Westphal skb_frag_list_init(skb); 6831da177e4SLinus Torvalds 6841da177e4SLinus Torvalds __skb_pull(skb, hlen); 6851da177e4SLinus Torvalds fh = (struct frag_hdr *)__skb_push(skb, sizeof(struct frag_hdr)); 686e2d1bca7SArnaldo Carvalho de Melo __skb_push(skb, hlen); 687e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 688d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(skb), tmp_hdr, hlen); 6891da177e4SLinus Torvalds 6901da177e4SLinus Torvalds fh->nexthdr = nexthdr; 6911da177e4SLinus Torvalds fh->reserved = 0; 6921da177e4SLinus Torvalds fh->frag_off = htons(IP6_MF); 693286c2349SMartin KaFai Lau fh->identification = frag_id; 6941da177e4SLinus Torvalds 6951da177e4SLinus Torvalds first_len = skb_pagelen(skb); 6961da177e4SLinus Torvalds skb->data_len = first_len - skb_headlen(skb); 6971da177e4SLinus Torvalds skb->len = first_len; 6980660e03fSArnaldo Carvalho de Melo ipv6_hdr(skb)->payload_len = htons(first_len - 6990660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 7001da177e4SLinus Torvalds 701d8d1f30bSChangli Gao dst_hold(&rt->dst); 7021da177e4SLinus Torvalds 7031da177e4SLinus Torvalds for (;;) { 7041da177e4SLinus Torvalds /* Prepare header of the next frame, 7051da177e4SLinus Torvalds * before previous one went down. */ 7061da177e4SLinus Torvalds if (frag) { 7071da177e4SLinus Torvalds frag->ip_summed = CHECKSUM_NONE; 708badff6d0SArnaldo Carvalho de Melo skb_reset_transport_header(frag); 7091da177e4SLinus Torvalds fh = (struct frag_hdr *)__skb_push(frag, sizeof(struct frag_hdr)); 710e2d1bca7SArnaldo Carvalho de Melo __skb_push(frag, hlen); 711e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(frag); 712d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(frag), tmp_hdr, 713d56f90a7SArnaldo Carvalho de Melo hlen); 7141da177e4SLinus Torvalds offset += skb->len - hlen - sizeof(struct frag_hdr); 7151da177e4SLinus Torvalds fh->nexthdr = nexthdr; 7161da177e4SLinus Torvalds fh->reserved = 0; 7171da177e4SLinus Torvalds fh->frag_off = htons(offset); 71853b24b8fSIan Morris if (frag->next) 7191da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 7201da177e4SLinus Torvalds fh->identification = frag_id; 7210660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = 7220660e03fSArnaldo Carvalho de Melo htons(frag->len - 7230660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 7241da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 7251da177e4SLinus Torvalds } 7261da177e4SLinus Torvalds 7277d8c6e39SEric W. Biederman err = output(net, sk, skb); 728dafee490SWei Dong if (!err) 729d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7303bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 731dafee490SWei Dong 7321da177e4SLinus Torvalds if (err || !frag) 7331da177e4SLinus Torvalds break; 7341da177e4SLinus Torvalds 7351da177e4SLinus Torvalds skb = frag; 7361da177e4SLinus Torvalds frag = skb->next; 7371da177e4SLinus Torvalds skb->next = NULL; 7381da177e4SLinus Torvalds } 7391da177e4SLinus Torvalds 7401da177e4SLinus Torvalds kfree(tmp_hdr); 7411da177e4SLinus Torvalds 7421da177e4SLinus Torvalds if (err == 0) { 743d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7443bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGOKS); 74594e187c0SAmerigo Wang ip6_rt_put(rt); 7461da177e4SLinus Torvalds return 0; 7471da177e4SLinus Torvalds } 7481da177e4SLinus Torvalds 74946cfd725SFlorian Westphal kfree_skb_list(frag); 7501da177e4SLinus Torvalds 751d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7523bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 75394e187c0SAmerigo Wang ip6_rt_put(rt); 7541da177e4SLinus Torvalds return err; 7553d13008eSEric Dumazet 7563d13008eSEric Dumazet slow_path_clean: 7573d13008eSEric Dumazet skb_walk_frags(skb, frag2) { 7583d13008eSEric Dumazet if (frag2 == frag) 7593d13008eSEric Dumazet break; 7603d13008eSEric Dumazet frag2->sk = NULL; 7613d13008eSEric Dumazet frag2->destructor = NULL; 7623d13008eSEric Dumazet skb->truesize += frag2->truesize; 7633d13008eSEric Dumazet } 7641da177e4SLinus Torvalds } 7651da177e4SLinus Torvalds 7661da177e4SLinus Torvalds slow_path: 7671da177e4SLinus Torvalds left = skb->len - hlen; /* Space per frame */ 7681da177e4SLinus Torvalds ptr = hlen; /* Where to start from */ 7691da177e4SLinus Torvalds 7701da177e4SLinus Torvalds /* 7711da177e4SLinus Torvalds * Fragment the datagram. 7721da177e4SLinus Torvalds */ 7731da177e4SLinus Torvalds 774a7ae1992SHerbert Xu troom = rt->dst.dev->needed_tailroom; 7751da177e4SLinus Torvalds 7761da177e4SLinus Torvalds /* 7771da177e4SLinus Torvalds * Keep copying data until we run out. 7781da177e4SLinus Torvalds */ 7791da177e4SLinus Torvalds while (left > 0) { 78079e49503SFlorian Westphal u8 *fragnexthdr_offset; 78179e49503SFlorian Westphal 7821da177e4SLinus Torvalds len = left; 7831da177e4SLinus Torvalds /* IF: it doesn't fit, use 'mtu' - the data space left */ 7841da177e4SLinus Torvalds if (len > mtu) 7851da177e4SLinus Torvalds len = mtu; 7861da177e4SLinus Torvalds /* IF: we are not sending up to and including the packet end 7871da177e4SLinus Torvalds then align the next start on an eight byte boundary */ 7881da177e4SLinus Torvalds if (len < left) { 7891da177e4SLinus Torvalds len &= ~7; 7901da177e4SLinus Torvalds } 7911da177e4SLinus Torvalds 792cbffccc9SJoe Perches /* Allocate buffer */ 793cbffccc9SJoe Perches frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) + 794cbffccc9SJoe Perches hroom + troom, GFP_ATOMIC); 795cbffccc9SJoe Perches if (!frag) { 796adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 797a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 7981da177e4SLinus Torvalds err = -ENOMEM; 7991da177e4SLinus Torvalds goto fail; 8001da177e4SLinus Torvalds } 8011da177e4SLinus Torvalds 8021da177e4SLinus Torvalds /* 8031da177e4SLinus Torvalds * Set up data on packet 8041da177e4SLinus Torvalds */ 8051da177e4SLinus Torvalds 8061da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 807a7ae1992SHerbert Xu skb_reserve(frag, hroom); 8081da177e4SLinus Torvalds skb_put(frag, len + hlen + sizeof(struct frag_hdr)); 809c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(frag); 810badff6d0SArnaldo Carvalho de Melo fh = (struct frag_hdr *)(skb_network_header(frag) + hlen); 811b0e380b1SArnaldo Carvalho de Melo frag->transport_header = (frag->network_header + hlen + 812b0e380b1SArnaldo Carvalho de Melo sizeof(struct frag_hdr)); 8131da177e4SLinus Torvalds 8141da177e4SLinus Torvalds /* 8151da177e4SLinus Torvalds * Charge the memory for the fragment to any owner 8161da177e4SLinus Torvalds * it might possess 8171da177e4SLinus Torvalds */ 8181da177e4SLinus Torvalds if (skb->sk) 8191da177e4SLinus Torvalds skb_set_owner_w(frag, skb->sk); 8201da177e4SLinus Torvalds 8211da177e4SLinus Torvalds /* 8221da177e4SLinus Torvalds * Copy the packet header into the new buffer. 8231da177e4SLinus Torvalds */ 824d626f62bSArnaldo Carvalho de Melo skb_copy_from_linear_data(skb, skb_network_header(frag), hlen); 8251da177e4SLinus Torvalds 82679e49503SFlorian Westphal fragnexthdr_offset = skb_network_header(frag); 82779e49503SFlorian Westphal fragnexthdr_offset += prevhdr - skb_network_header(skb); 82879e49503SFlorian Westphal *fragnexthdr_offset = NEXTHDR_FRAGMENT; 82979e49503SFlorian Westphal 8301da177e4SLinus Torvalds /* 8311da177e4SLinus Torvalds * Build fragment header. 8321da177e4SLinus Torvalds */ 8331da177e4SLinus Torvalds fh->nexthdr = nexthdr; 8341da177e4SLinus Torvalds fh->reserved = 0; 8351da177e4SLinus Torvalds fh->identification = frag_id; 8361da177e4SLinus Torvalds 8371da177e4SLinus Torvalds /* 8381da177e4SLinus Torvalds * Copy a block of the IP datagram. 8391da177e4SLinus Torvalds */ 840e3f0b86bSHimangi Saraogi BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag), 841e3f0b86bSHimangi Saraogi len)); 8421da177e4SLinus Torvalds left -= len; 8431da177e4SLinus Torvalds 8441da177e4SLinus Torvalds fh->frag_off = htons(offset); 8451da177e4SLinus Torvalds if (left > 0) 8461da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 8470660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = htons(frag->len - 8480660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 8491da177e4SLinus Torvalds 8501da177e4SLinus Torvalds ptr += len; 8511da177e4SLinus Torvalds offset += len; 8521da177e4SLinus Torvalds 8531da177e4SLinus Torvalds /* 8541da177e4SLinus Torvalds * Put this fragment into the sending queue. 8551da177e4SLinus Torvalds */ 8567d8c6e39SEric W. Biederman err = output(net, sk, frag); 8571da177e4SLinus Torvalds if (err) 8581da177e4SLinus Torvalds goto fail; 859dafee490SWei Dong 860adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 8613bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 8621da177e4SLinus Torvalds } 863adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 864a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGOKS); 865808db80aSEric Dumazet consume_skb(skb); 8661da177e4SLinus Torvalds return err; 8671da177e4SLinus Torvalds 868485fca66SFlorian Westphal fail_toobig: 869485fca66SFlorian Westphal if (skb->sk && dst_allfrag(skb_dst(skb))) 870485fca66SFlorian Westphal sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK); 871485fca66SFlorian Westphal 872485fca66SFlorian Westphal skb->dev = skb_dst(skb)->dev; 873485fca66SFlorian Westphal icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 874485fca66SFlorian Westphal err = -EMSGSIZE; 875485fca66SFlorian Westphal 8761da177e4SLinus Torvalds fail: 877adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 878a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 8791da177e4SLinus Torvalds kfree_skb(skb); 8801da177e4SLinus Torvalds return err; 8811da177e4SLinus Torvalds } 8821da177e4SLinus Torvalds 883b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key, 884b71d1d42SEric Dumazet const struct in6_addr *fl_addr, 885b71d1d42SEric Dumazet const struct in6_addr *addr_cache) 886cf6b1982SYOSHIFUJI Hideaki { 887a02cec21SEric Dumazet return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) && 88863159f29SIan Morris (!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache)); 889cf6b1982SYOSHIFUJI Hideaki } 890cf6b1982SYOSHIFUJI Hideaki 891497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk, 892497c615aSHerbert Xu struct dst_entry *dst, 893b71d1d42SEric Dumazet const struct flowi6 *fl6) 8941da177e4SLinus Torvalds { 8951da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 896a963a37dSEric Dumazet struct rt6_info *rt; 8971da177e4SLinus Torvalds 898497c615aSHerbert Xu if (!dst) 899497c615aSHerbert Xu goto out; 9001da177e4SLinus Torvalds 901a963a37dSEric Dumazet if (dst->ops->family != AF_INET6) { 902a963a37dSEric Dumazet dst_release(dst); 903a963a37dSEric Dumazet return NULL; 904a963a37dSEric Dumazet } 905a963a37dSEric Dumazet 906a963a37dSEric Dumazet rt = (struct rt6_info *)dst; 9071da177e4SLinus Torvalds /* Yes, checking route validity in not connected 908d76e60a5SDavid S. Miller * case is not very simple. Take into account, 909d76e60a5SDavid S. Miller * that we do not support routing by source, TOS, 910d76e60a5SDavid S. Miller * and MSG_DONTROUTE --ANK (980726) 911d76e60a5SDavid S. Miller * 912cf6b1982SYOSHIFUJI Hideaki * 1. ip6_rt_check(): If route was host route, 913cf6b1982SYOSHIFUJI Hideaki * check that cached destination is current. 914d76e60a5SDavid S. Miller * If it is network route, we still may 915d76e60a5SDavid S. Miller * check its validity using saved pointer 916d76e60a5SDavid S. Miller * to the last used address: daddr_cache. 917d76e60a5SDavid S. Miller * We do not want to save whole address now, 918d76e60a5SDavid S. Miller * (because main consumer of this service 919d76e60a5SDavid S. Miller * is tcp, which has not this problem), 920d76e60a5SDavid S. Miller * so that the last trick works only on connected 921d76e60a5SDavid S. Miller * sockets. 922d76e60a5SDavid S. Miller * 2. oif also should be the same. 9231da177e4SLinus Torvalds */ 9244c9483b2SDavid S. Miller if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) || 9258e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES 9264c9483b2SDavid S. Miller ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) || 9278e1ef0a9SYOSHIFUJI Hideaki #endif 928ca254490SDavid Ahern (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) && 929ca254490SDavid Ahern (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) { 930497c615aSHerbert Xu dst_release(dst); 931497c615aSHerbert Xu dst = NULL; 9321da177e4SLinus Torvalds } 933497c615aSHerbert Xu 934497c615aSHerbert Xu out: 935497c615aSHerbert Xu return dst; 9361da177e4SLinus Torvalds } 937497c615aSHerbert Xu 9383aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, 9394c9483b2SDavid S. Miller struct dst_entry **dst, struct flowi6 *fl6) 940497c615aSHerbert Xu { 94169cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 94269cce1d1SDavid S. Miller struct neighbour *n; 94397cac082SDavid S. Miller struct rt6_info *rt; 94469cce1d1SDavid S. Miller #endif 94569cce1d1SDavid S. Miller int err; 9466f21c96aSPaolo Abeni int flags = 0; 9471da177e4SLinus Torvalds 948e16e888bSMarkus Stenberg /* The correct way to handle this would be to do 949e16e888bSMarkus Stenberg * ip6_route_get_saddr, and then ip6_route_output; however, 950e16e888bSMarkus Stenberg * the route-specific preferred source forces the 951e16e888bSMarkus Stenberg * ip6_route_output call _before_ ip6_route_get_saddr. 952e16e888bSMarkus Stenberg * 953e16e888bSMarkus Stenberg * In source specific routing (no src=any default route), 954e16e888bSMarkus Stenberg * ip6_route_output will fail given src=any saddr, though, so 955e16e888bSMarkus Stenberg * that's why we try it again later. 956e16e888bSMarkus Stenberg */ 957e16e888bSMarkus Stenberg if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) { 958e16e888bSMarkus Stenberg struct rt6_info *rt; 959e16e888bSMarkus Stenberg bool had_dst = *dst != NULL; 960e16e888bSMarkus Stenberg 961e16e888bSMarkus Stenberg if (!had_dst) 962e16e888bSMarkus Stenberg *dst = ip6_route_output(net, sk, fl6); 963e16e888bSMarkus Stenberg rt = (*dst)->error ? NULL : (struct rt6_info *)*dst; 964e16e888bSMarkus Stenberg err = ip6_route_get_saddr(net, rt, &fl6->daddr, 965e16e888bSMarkus Stenberg sk ? inet6_sk(sk)->srcprefs : 0, 966e16e888bSMarkus Stenberg &fl6->saddr); 967e16e888bSMarkus Stenberg if (err) 968e16e888bSMarkus Stenberg goto out_err_release; 969e16e888bSMarkus Stenberg 970e16e888bSMarkus Stenberg /* If we had an erroneous initial result, pretend it 971e16e888bSMarkus Stenberg * never existed and let the SA-enabled version take 972e16e888bSMarkus Stenberg * over. 973e16e888bSMarkus Stenberg */ 974e16e888bSMarkus Stenberg if (!had_dst && (*dst)->error) { 975e16e888bSMarkus Stenberg dst_release(*dst); 976e16e888bSMarkus Stenberg *dst = NULL; 977e16e888bSMarkus Stenberg } 9786f21c96aSPaolo Abeni 9796f21c96aSPaolo Abeni if (fl6->flowi6_oif) 9806f21c96aSPaolo Abeni flags |= RT6_LOOKUP_F_IFACE; 981e16e888bSMarkus Stenberg } 982e16e888bSMarkus Stenberg 98363159f29SIan Morris if (!*dst) 9846f21c96aSPaolo Abeni *dst = ip6_route_output_flags(net, sk, fl6, flags); 9851da177e4SLinus Torvalds 986e5d08d71SIan Morris err = (*dst)->error; 987e5d08d71SIan Morris if (err) 9881da177e4SLinus Torvalds goto out_err_release; 9891da177e4SLinus Torvalds 99095c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 99195c385b4SNeil Horman /* 99295c385b4SNeil Horman * Here if the dst entry we've looked up 99395c385b4SNeil Horman * has a neighbour entry that is in the INCOMPLETE 99495c385b4SNeil Horman * state and the src address from the flow is 99595c385b4SNeil Horman * marked as OPTIMISTIC, we release the found 99695c385b4SNeil Horman * dst entry and replace it instead with the 99795c385b4SNeil Horman * dst entry of the nexthop router 99895c385b4SNeil Horman */ 999c56bf6feSEric Dumazet rt = (struct rt6_info *) *dst; 1000707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 10012647a9b0SMartin KaFai Lau n = __ipv6_neigh_lookup_noref(rt->dst.dev, 10022647a9b0SMartin KaFai Lau rt6_nexthop(rt, &fl6->daddr)); 1003707be1ffSYOSHIFUJI Hideaki / 吉藤英明 err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0; 1004707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1005707be1ffSYOSHIFUJI Hideaki / 吉藤英明 1006707be1ffSYOSHIFUJI Hideaki / 吉藤英明 if (err) { 100795c385b4SNeil Horman struct inet6_ifaddr *ifp; 10084c9483b2SDavid S. Miller struct flowi6 fl_gw6; 100995c385b4SNeil Horman int redirect; 101095c385b4SNeil Horman 10114c9483b2SDavid S. Miller ifp = ipv6_get_ifaddr(net, &fl6->saddr, 10121cab3da6SDaniel Lezcano (*dst)->dev, 1); 101395c385b4SNeil Horman 101495c385b4SNeil Horman redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC); 101595c385b4SNeil Horman if (ifp) 101695c385b4SNeil Horman in6_ifa_put(ifp); 101795c385b4SNeil Horman 101895c385b4SNeil Horman if (redirect) { 101995c385b4SNeil Horman /* 102095c385b4SNeil Horman * We need to get the dst entry for the 102195c385b4SNeil Horman * default router instead 102295c385b4SNeil Horman */ 102395c385b4SNeil Horman dst_release(*dst); 10244c9483b2SDavid S. Miller memcpy(&fl_gw6, fl6, sizeof(struct flowi6)); 10254c9483b2SDavid S. Miller memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr)); 10264c9483b2SDavid S. Miller *dst = ip6_route_output(net, sk, &fl_gw6); 1027e5d08d71SIan Morris err = (*dst)->error; 1028e5d08d71SIan Morris if (err) 102995c385b4SNeil Horman goto out_err_release; 103095c385b4SNeil Horman } 103195c385b4SNeil Horman } 103295c385b4SNeil Horman #endif 1033ec5e3b0aSJonathan T. Leighton if (ipv6_addr_v4mapped(&fl6->saddr) && 103400ea1ceeSWillem de Bruijn !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) { 103500ea1ceeSWillem de Bruijn err = -EAFNOSUPPORT; 103600ea1ceeSWillem de Bruijn goto out_err_release; 103700ea1ceeSWillem de Bruijn } 103895c385b4SNeil Horman 10391da177e4SLinus Torvalds return 0; 10401da177e4SLinus Torvalds 10411da177e4SLinus Torvalds out_err_release: 10421da177e4SLinus Torvalds dst_release(*dst); 10431da177e4SLinus Torvalds *dst = NULL; 10448a966fc0SDavid Ahern 10450d240e78SDavid Ahern if (err == -ENETUNREACH) 10460d240e78SDavid Ahern IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES); 10471da177e4SLinus Torvalds return err; 10481da177e4SLinus Torvalds } 104934a0b3cdSAdrian Bunk 1050497c615aSHerbert Xu /** 1051497c615aSHerbert Xu * ip6_dst_lookup - perform route lookup on flow 1052497c615aSHerbert Xu * @sk: socket which provides route info 1053497c615aSHerbert Xu * @dst: pointer to dst_entry * for result 10544c9483b2SDavid S. Miller * @fl6: flow to lookup 1055497c615aSHerbert Xu * 1056497c615aSHerbert Xu * This function performs a route lookup on the given flow. 1057497c615aSHerbert Xu * 1058497c615aSHerbert Xu * It returns zero on success, or a standard errno code on error. 1059497c615aSHerbert Xu */ 1060343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst, 1061343d60aaSRoopa Prabhu struct flowi6 *fl6) 1062497c615aSHerbert Xu { 1063497c615aSHerbert Xu *dst = NULL; 1064343d60aaSRoopa Prabhu return ip6_dst_lookup_tail(net, sk, dst, fl6); 1065497c615aSHerbert Xu } 10663cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup); 10673cf3dc6cSArnaldo Carvalho de Melo 1068497c615aSHerbert Xu /** 106968d0c6d3SDavid S. Miller * ip6_dst_lookup_flow - perform route lookup on flow with ipsec 107068d0c6d3SDavid S. Miller * @sk: socket which provides route info 10714c9483b2SDavid S. Miller * @fl6: flow to lookup 107268d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 107368d0c6d3SDavid S. Miller * 107468d0c6d3SDavid S. Miller * This function performs a route lookup on the given flow. 107568d0c6d3SDavid S. Miller * 107668d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 107768d0c6d3SDavid S. Miller * error code. 107868d0c6d3SDavid S. Miller */ 10793aef934fSEric Dumazet struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6, 10800e0d44abSSteffen Klassert const struct in6_addr *final_dst) 108168d0c6d3SDavid S. Miller { 108268d0c6d3SDavid S. Miller struct dst_entry *dst = NULL; 108368d0c6d3SDavid S. Miller int err; 108468d0c6d3SDavid S. Miller 1085343d60aaSRoopa Prabhu err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6); 108668d0c6d3SDavid S. Miller if (err) 108768d0c6d3SDavid S. Miller return ERR_PTR(err); 108868d0c6d3SDavid S. Miller if (final_dst) 10894e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 10902774c131SDavid S. Miller 1091f92ee619SSteffen Klassert return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0); 109268d0c6d3SDavid S. Miller } 109368d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow); 109468d0c6d3SDavid S. Miller 109568d0c6d3SDavid S. Miller /** 109668d0c6d3SDavid S. Miller * ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow 109768d0c6d3SDavid S. Miller * @sk: socket which provides the dst cache and route info 10984c9483b2SDavid S. Miller * @fl6: flow to lookup 109968d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 1100497c615aSHerbert Xu * 1101497c615aSHerbert Xu * This function performs a route lookup on the given flow with the 1102497c615aSHerbert Xu * possibility of using the cached route in the socket if it is valid. 1103497c615aSHerbert Xu * It will take the socket dst lock when operating on the dst cache. 1104497c615aSHerbert Xu * As a result, this function can only be used in process context. 1105497c615aSHerbert Xu * 110668d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 110768d0c6d3SDavid S. Miller * error code. 1108497c615aSHerbert Xu */ 11094c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6, 11100e0d44abSSteffen Klassert const struct in6_addr *final_dst) 1111497c615aSHerbert Xu { 111268d0c6d3SDavid S. Miller struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie); 1113497c615aSHerbert Xu 11144c9483b2SDavid S. Miller dst = ip6_sk_dst_check(sk, dst, fl6); 111500bc0ef5SJakub Sitnicki if (!dst) 111600bc0ef5SJakub Sitnicki dst = ip6_dst_lookup_flow(sk, fl6, final_dst); 111768d0c6d3SDavid S. Miller 111800bc0ef5SJakub Sitnicki return dst; 111968d0c6d3SDavid S. Miller } 112068d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow); 1121497c615aSHerbert Xu 112234a0b3cdSAdrian Bunk static inline int ip6_ufo_append_data(struct sock *sk, 11230bbe84a6SVlad Yasevich struct sk_buff_head *queue, 1124e89e9cf5SAnanda Raju int getfrag(void *from, char *to, int offset, int len, 1125e89e9cf5SAnanda Raju int odd, struct sk_buff *skb), 1126e89e9cf5SAnanda Raju void *from, int length, int hh_len, int fragheaderlen, 11273ba3458fSJakub Sitnicki int exthdrlen, int transhdrlen, int mtu, 11283ba3458fSJakub Sitnicki unsigned int flags, const struct flowi6 *fl6) 1129e89e9cf5SAnanda Raju 1130e89e9cf5SAnanda Raju { 1131e89e9cf5SAnanda Raju struct sk_buff *skb; 1132e89e9cf5SAnanda Raju int err; 1133e89e9cf5SAnanda Raju 1134e89e9cf5SAnanda Raju /* There is support for UDP large send offload by network 1135e89e9cf5SAnanda Raju * device, so create one single skb packet containing complete 1136e89e9cf5SAnanda Raju * udp datagram 1137e89e9cf5SAnanda Raju */ 11380bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 113963159f29SIan Morris if (!skb) { 1140e89e9cf5SAnanda Raju skb = sock_alloc_send_skb(sk, 1141e89e9cf5SAnanda Raju hh_len + fragheaderlen + transhdrlen + 20, 1142e89e9cf5SAnanda Raju (flags & MSG_DONTWAIT), &err); 114363159f29SIan Morris if (!skb) 1144504744e4SZheng Yan return err; 1145e89e9cf5SAnanda Raju 1146e89e9cf5SAnanda Raju /* reserve space for Hardware header */ 1147e89e9cf5SAnanda Raju skb_reserve(skb, hh_len); 1148e89e9cf5SAnanda Raju 1149e89e9cf5SAnanda Raju /* create space for UDP/IP header */ 1150e89e9cf5SAnanda Raju skb_put(skb, fragheaderlen + transhdrlen); 1151e89e9cf5SAnanda Raju 1152e89e9cf5SAnanda Raju /* initialize network header pointer */ 11533ba3458fSJakub Sitnicki skb_set_network_header(skb, exthdrlen); 1154e89e9cf5SAnanda Raju 1155e89e9cf5SAnanda Raju /* initialize protocol header pointer */ 1156b0e380b1SArnaldo Carvalho de Melo skb->transport_header = skb->network_header + fragheaderlen; 1157e89e9cf5SAnanda Raju 11589c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 1159e89e9cf5SAnanda Raju skb->csum = 0; 1160e89e9cf5SAnanda Raju 11610dec879fSJulian Anastasov if (flags & MSG_CONFIRM) 11620dec879fSJulian Anastasov skb_set_dst_pending_confirm(skb, 1); 11630dec879fSJulian Anastasov 11640bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 1165c547dbf5SJiri Pirko } else if (skb_is_gso(skb)) { 1166c547dbf5SJiri Pirko goto append; 1167c547dbf5SJiri Pirko } 1168c547dbf5SJiri Pirko 1169c547dbf5SJiri Pirko skb->ip_summed = CHECKSUM_PARTIAL; 1170c31d5326SSridhar Samudrala /* Specify the length of each IPv6 datagram fragment. 1171c31d5326SSridhar Samudrala * It has to be a multiple of 8. 1172c31d5326SSridhar Samudrala */ 1173c31d5326SSridhar Samudrala skb_shinfo(skb)->gso_size = (mtu - fragheaderlen - 1174c31d5326SSridhar Samudrala sizeof(struct frag_hdr)) & ~7; 1175f83ef8c0SHerbert Xu skb_shinfo(skb)->gso_type = SKB_GSO_UDP; 1176fd0273d7SMartin KaFai Lau skb_shinfo(skb)->ip6_frag_id = ipv6_select_ident(sock_net(sk), 1177fd0273d7SMartin KaFai Lau &fl6->daddr, 1178fd0273d7SMartin KaFai Lau &fl6->saddr); 1179e89e9cf5SAnanda Raju 1180c547dbf5SJiri Pirko append: 11812811ebacSHannes Frederic Sowa return skb_append_datato_frags(sk, skb, getfrag, from, 11822811ebacSHannes Frederic Sowa (length - transhdrlen)); 1183e89e9cf5SAnanda Raju } 11841da177e4SLinus Torvalds 11850178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src, 11860178b695SHerbert Xu gfp_t gfp) 11870178b695SHerbert Xu { 11880178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11890178b695SHerbert Xu } 11900178b695SHerbert Xu 11910178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src, 11920178b695SHerbert Xu gfp_t gfp) 11930178b695SHerbert Xu { 11940178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11950178b695SHerbert Xu } 11960178b695SHerbert Xu 119775a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu, 11980c183379SGao feng int *maxfraglen, 11990c183379SGao feng unsigned int fragheaderlen, 12000c183379SGao feng struct sk_buff *skb, 120175a493e6SHannes Frederic Sowa struct rt6_info *rt, 1202e367c2d0Slucien unsigned int orig_mtu) 12030c183379SGao feng { 12040c183379SGao feng if (!(rt->dst.flags & DST_XFRM_TUNNEL)) { 120563159f29SIan Morris if (!skb) { 12060c183379SGao feng /* first fragment, reserve header_len */ 1207e367c2d0Slucien *mtu = orig_mtu - rt->dst.header_len; 12080c183379SGao feng 12090c183379SGao feng } else { 12100c183379SGao feng /* 12110c183379SGao feng * this fragment is not first, the headers 12120c183379SGao feng * space is regarded as data space. 12130c183379SGao feng */ 1214e367c2d0Slucien *mtu = orig_mtu; 12150c183379SGao feng } 12160c183379SGao feng *maxfraglen = ((*mtu - fragheaderlen) & ~7) 12170c183379SGao feng + fragheaderlen - sizeof(struct frag_hdr); 12180c183379SGao feng } 12190c183379SGao feng } 12200c183379SGao feng 1221366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork, 122226879da5SWei Wang struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6, 1223366e41d9SVlad Yasevich struct rt6_info *rt, struct flowi6 *fl6) 1224366e41d9SVlad Yasevich { 1225366e41d9SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 1226366e41d9SVlad Yasevich unsigned int mtu; 122726879da5SWei Wang struct ipv6_txoptions *opt = ipc6->opt; 1228366e41d9SVlad Yasevich 1229366e41d9SVlad Yasevich /* 1230366e41d9SVlad Yasevich * setup for corking 1231366e41d9SVlad Yasevich */ 1232366e41d9SVlad Yasevich if (opt) { 1233366e41d9SVlad Yasevich if (WARN_ON(v6_cork->opt)) 1234366e41d9SVlad Yasevich return -EINVAL; 1235366e41d9SVlad Yasevich 1236366e41d9SVlad Yasevich v6_cork->opt = kzalloc(opt->tot_len, sk->sk_allocation); 123763159f29SIan Morris if (unlikely(!v6_cork->opt)) 1238366e41d9SVlad Yasevich return -ENOBUFS; 1239366e41d9SVlad Yasevich 1240366e41d9SVlad Yasevich v6_cork->opt->tot_len = opt->tot_len; 1241366e41d9SVlad Yasevich v6_cork->opt->opt_flen = opt->opt_flen; 1242366e41d9SVlad Yasevich v6_cork->opt->opt_nflen = opt->opt_nflen; 1243366e41d9SVlad Yasevich 1244366e41d9SVlad Yasevich v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt, 1245366e41d9SVlad Yasevich sk->sk_allocation); 1246366e41d9SVlad Yasevich if (opt->dst0opt && !v6_cork->opt->dst0opt) 1247366e41d9SVlad Yasevich return -ENOBUFS; 1248366e41d9SVlad Yasevich 1249366e41d9SVlad Yasevich v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt, 1250366e41d9SVlad Yasevich sk->sk_allocation); 1251366e41d9SVlad Yasevich if (opt->dst1opt && !v6_cork->opt->dst1opt) 1252366e41d9SVlad Yasevich return -ENOBUFS; 1253366e41d9SVlad Yasevich 1254366e41d9SVlad Yasevich v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt, 1255366e41d9SVlad Yasevich sk->sk_allocation); 1256366e41d9SVlad Yasevich if (opt->hopopt && !v6_cork->opt->hopopt) 1257366e41d9SVlad Yasevich return -ENOBUFS; 1258366e41d9SVlad Yasevich 1259366e41d9SVlad Yasevich v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt, 1260366e41d9SVlad Yasevich sk->sk_allocation); 1261366e41d9SVlad Yasevich if (opt->srcrt && !v6_cork->opt->srcrt) 1262366e41d9SVlad Yasevich return -ENOBUFS; 1263366e41d9SVlad Yasevich 1264366e41d9SVlad Yasevich /* need source address above miyazawa*/ 1265366e41d9SVlad Yasevich } 1266366e41d9SVlad Yasevich dst_hold(&rt->dst); 1267366e41d9SVlad Yasevich cork->base.dst = &rt->dst; 1268366e41d9SVlad Yasevich cork->fl.u.ip6 = *fl6; 126926879da5SWei Wang v6_cork->hop_limit = ipc6->hlimit; 127026879da5SWei Wang v6_cork->tclass = ipc6->tclass; 1271366e41d9SVlad Yasevich if (rt->dst.flags & DST_XFRM_TUNNEL) 1272366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1273366e41d9SVlad Yasevich rt->dst.dev->mtu : dst_mtu(&rt->dst); 1274366e41d9SVlad Yasevich else 1275366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1276366e41d9SVlad Yasevich rt->dst.dev->mtu : dst_mtu(rt->dst.path); 1277366e41d9SVlad Yasevich if (np->frag_size < mtu) { 1278366e41d9SVlad Yasevich if (np->frag_size) 1279366e41d9SVlad Yasevich mtu = np->frag_size; 1280366e41d9SVlad Yasevich } 1281366e41d9SVlad Yasevich cork->base.fragsize = mtu; 1282366e41d9SVlad Yasevich if (dst_allfrag(rt->dst.path)) 1283366e41d9SVlad Yasevich cork->base.flags |= IPCORK_ALLFRAG; 1284366e41d9SVlad Yasevich cork->base.length = 0; 1285366e41d9SVlad Yasevich 1286366e41d9SVlad Yasevich return 0; 1287366e41d9SVlad Yasevich } 1288366e41d9SVlad Yasevich 12890bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk, 12900bbe84a6SVlad Yasevich struct flowi6 *fl6, 12910bbe84a6SVlad Yasevich struct sk_buff_head *queue, 12920bbe84a6SVlad Yasevich struct inet_cork *cork, 12930bbe84a6SVlad Yasevich struct inet6_cork *v6_cork, 12940bbe84a6SVlad Yasevich struct page_frag *pfrag, 12950bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, 12960bbe84a6SVlad Yasevich int len, int odd, struct sk_buff *skb), 12971da177e4SLinus Torvalds void *from, int length, int transhdrlen, 129826879da5SWei Wang unsigned int flags, struct ipcm6_cookie *ipc6, 1299c14ac945SSoheil Hassas Yeganeh const struct sockcm_cookie *sockc) 13001da177e4SLinus Torvalds { 13010c183379SGao feng struct sk_buff *skb, *skb_prev = NULL; 1302e367c2d0Slucien unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu; 13030bbe84a6SVlad Yasevich int exthdrlen = 0; 13040bbe84a6SVlad Yasevich int dst_exthdrlen = 0; 13051da177e4SLinus Torvalds int hh_len; 13061da177e4SLinus Torvalds int copy; 13071da177e4SLinus Torvalds int err; 13081da177e4SLinus Torvalds int offset = 0; 1309a693e698SAnders Berggren __u8 tx_flags = 0; 131009c2d251SWillem de Bruijn u32 tskey = 0; 13110bbe84a6SVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->dst; 13120bbe84a6SVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 131332dce968SVlad Yasevich int csummode = CHECKSUM_NONE; 1314682b1a9dSHannes Frederic Sowa unsigned int maxnonfragsize, headersize; 13151da177e4SLinus Torvalds 13160bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 13170bbe84a6SVlad Yasevich if (!skb) { 13180bbe84a6SVlad Yasevich exthdrlen = opt ? opt->opt_flen : 0; 13197efdba5bSRomain KUNTZ dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len; 13201da177e4SLinus Torvalds } 13210bbe84a6SVlad Yasevich 1322366e41d9SVlad Yasevich mtu = cork->fragsize; 1323e367c2d0Slucien orig_mtu = mtu; 13241da177e4SLinus Torvalds 1325d8d1f30bSChangli Gao hh_len = LL_RESERVED_SPACE(rt->dst.dev); 13261da177e4SLinus Torvalds 1327a1b05140SMasahide NAKAMURA fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len + 1328b4ce9277SHerbert Xu (opt ? opt->opt_nflen : 0); 13294df98e76SHannes Frederic Sowa maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen - 13304df98e76SHannes Frederic Sowa sizeof(struct frag_hdr); 13311da177e4SLinus Torvalds 13324df98e76SHannes Frederic Sowa headersize = sizeof(struct ipv6hdr) + 13333a1cebe7SHannes Frederic Sowa (opt ? opt->opt_flen + opt->opt_nflen : 0) + 13344df98e76SHannes Frederic Sowa (dst_allfrag(&rt->dst) ? 13354df98e76SHannes Frederic Sowa sizeof(struct frag_hdr) : 0) + 13364df98e76SHannes Frederic Sowa rt->rt6i_nfheader_len; 13374df98e76SHannes Frederic Sowa 133826879da5SWei Wang if (cork->length + length > mtu - headersize && ipc6->dontfrag && 13394df98e76SHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP || 13404df98e76SHannes Frederic Sowa sk->sk_protocol == IPPROTO_RAW)) { 13414df98e76SHannes Frederic Sowa ipv6_local_rxpmtu(sk, fl6, mtu - headersize + 13424df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 13434df98e76SHannes Frederic Sowa goto emsgsize; 13444df98e76SHannes Frederic Sowa } 13454df98e76SHannes Frederic Sowa 1346682b1a9dSHannes Frederic Sowa if (ip6_sk_ignore_df(sk)) 1347682b1a9dSHannes Frederic Sowa maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN; 1348682b1a9dSHannes Frederic Sowa else 1349682b1a9dSHannes Frederic Sowa maxnonfragsize = mtu; 1350682b1a9dSHannes Frederic Sowa 13514df98e76SHannes Frederic Sowa if (cork->length + length > maxnonfragsize - headersize) { 13524df98e76SHannes Frederic Sowa emsgsize: 13534df98e76SHannes Frederic Sowa ipv6_local_error(sk, EMSGSIZE, fl6, 13544df98e76SHannes Frederic Sowa mtu - headersize + 13554df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 13561da177e4SLinus Torvalds return -EMSGSIZE; 13571da177e4SLinus Torvalds } 1358682b1a9dSHannes Frederic Sowa 1359682b1a9dSHannes Frederic Sowa /* CHECKSUM_PARTIAL only with no extension headers and when 1360682b1a9dSHannes Frederic Sowa * we are not going to fragment 1361682b1a9dSHannes Frederic Sowa */ 1362682b1a9dSHannes Frederic Sowa if (transhdrlen && sk->sk_protocol == IPPROTO_UDP && 1363682b1a9dSHannes Frederic Sowa headersize == sizeof(struct ipv6hdr) && 13642b89ed65SVlad Yasevich length <= mtu - headersize && 1365682b1a9dSHannes Frederic Sowa !(flags & MSG_MORE) && 1366c8cd0989STom Herbert rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM)) 1367682b1a9dSHannes Frederic Sowa csummode = CHECKSUM_PARTIAL; 13681da177e4SLinus Torvalds 136909c2d251SWillem de Bruijn if (sk->sk_type == SOCK_DGRAM || sk->sk_type == SOCK_RAW) { 1370c14ac945SSoheil Hassas Yeganeh sock_tx_timestamp(sk, sockc->tsflags, &tx_flags); 137109c2d251SWillem de Bruijn if (tx_flags & SKBTX_ANY_SW_TSTAMP && 137209c2d251SWillem de Bruijn sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID) 137309c2d251SWillem de Bruijn tskey = sk->sk_tskey++; 137409c2d251SWillem de Bruijn } 1375a693e698SAnders Berggren 13761da177e4SLinus Torvalds /* 13771da177e4SLinus Torvalds * Let's try using as much space as possible. 13781da177e4SLinus Torvalds * Use MTU if total length of the message fits into the MTU. 13791da177e4SLinus Torvalds * Otherwise, we need to reserve fragment header and 13801da177e4SLinus Torvalds * fragment alignment (= 8-15 octects, in total). 13811da177e4SLinus Torvalds * 13821da177e4SLinus Torvalds * Note that we may need to "move" the data from the tail of 13831da177e4SLinus Torvalds * of the buffer to the new fragment when we split 13841da177e4SLinus Torvalds * the message. 13851da177e4SLinus Torvalds * 13861da177e4SLinus Torvalds * FIXME: It may be fragmented into multiple chunks 13871da177e4SLinus Torvalds * at once if non-fragmentable extension headers 13881da177e4SLinus Torvalds * are too large. 13891da177e4SLinus Torvalds * --yoshfuji 13901da177e4SLinus Torvalds */ 13911da177e4SLinus Torvalds 13922811ebacSHannes Frederic Sowa cork->length += length; 1393e4c5e13aSZheng Li if ((((length + fragheaderlen) > mtu) || 13942811ebacSHannes Frederic Sowa (skb && skb_is_gso(skb))) && 13952811ebacSHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP) && 13964b3b45edSAlexey Kodanev (rt->dst.dev->features & NETIF_F_UFO) && !dst_xfrm(&rt->dst) && 139740ba3302SMichal Kubeček (sk->sk_type == SOCK_DGRAM) && !udp_get_no_check6_tx(sk)) { 13980bbe84a6SVlad Yasevich err = ip6_ufo_append_data(sk, queue, getfrag, from, length, 13993ba3458fSJakub Sitnicki hh_len, fragheaderlen, exthdrlen, 1400fd0273d7SMartin KaFai Lau transhdrlen, mtu, flags, fl6); 1401baa829d8SPatrick McHardy if (err) 1402e89e9cf5SAnanda Raju goto error; 1403e89e9cf5SAnanda Raju return 0; 1404e89e9cf5SAnanda Raju } 14051da177e4SLinus Torvalds 14062811ebacSHannes Frederic Sowa if (!skb) 14071da177e4SLinus Torvalds goto alloc_new_skb; 14081da177e4SLinus Torvalds 14091da177e4SLinus Torvalds while (length > 0) { 14101da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 1411bdc712b4SDavid S. Miller copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len; 14121da177e4SLinus Torvalds if (copy < length) 14131da177e4SLinus Torvalds copy = maxfraglen - skb->len; 14141da177e4SLinus Torvalds 14151da177e4SLinus Torvalds if (copy <= 0) { 14161da177e4SLinus Torvalds char *data; 14171da177e4SLinus Torvalds unsigned int datalen; 14181da177e4SLinus Torvalds unsigned int fraglen; 14191da177e4SLinus Torvalds unsigned int fraggap; 14201da177e4SLinus Torvalds unsigned int alloclen; 14211da177e4SLinus Torvalds alloc_new_skb: 14221da177e4SLinus Torvalds /* There's no room in the current skb */ 14230c183379SGao feng if (skb) 14240c183379SGao feng fraggap = skb->len - maxfraglen; 14251da177e4SLinus Torvalds else 14261da177e4SLinus Torvalds fraggap = 0; 14270c183379SGao feng /* update mtu and maxfraglen if necessary */ 142863159f29SIan Morris if (!skb || !skb_prev) 14290c183379SGao feng ip6_append_data_mtu(&mtu, &maxfraglen, 143075a493e6SHannes Frederic Sowa fragheaderlen, skb, rt, 1431e367c2d0Slucien orig_mtu); 14320c183379SGao feng 14330c183379SGao feng skb_prev = skb; 14341da177e4SLinus Torvalds 14351da177e4SLinus Torvalds /* 14361da177e4SLinus Torvalds * If remaining data exceeds the mtu, 14371da177e4SLinus Torvalds * we know we need more fragment(s). 14381da177e4SLinus Torvalds */ 14391da177e4SLinus Torvalds datalen = length + fraggap; 14401da177e4SLinus Torvalds 14410c183379SGao feng if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen) 14420c183379SGao feng datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len; 14431da177e4SLinus Torvalds if ((flags & MSG_MORE) && 1444d8d1f30bSChangli Gao !(rt->dst.dev->features&NETIF_F_SG)) 14451da177e4SLinus Torvalds alloclen = mtu; 14461da177e4SLinus Torvalds else 14471da177e4SLinus Torvalds alloclen = datalen + fragheaderlen; 14481da177e4SLinus Torvalds 1449299b0767SSteffen Klassert alloclen += dst_exthdrlen; 1450299b0767SSteffen Klassert 14510c183379SGao feng if (datalen != length + fraggap) { 14521da177e4SLinus Torvalds /* 14530c183379SGao feng * this is not the last fragment, the trailer 14540c183379SGao feng * space is regarded as data space. 14551da177e4SLinus Torvalds */ 14560c183379SGao feng datalen += rt->dst.trailer_len; 14570c183379SGao feng } 14580c183379SGao feng 1459d8d1f30bSChangli Gao alloclen += rt->dst.trailer_len; 14600c183379SGao feng fraglen = datalen + fragheaderlen; 14611da177e4SLinus Torvalds 14621da177e4SLinus Torvalds /* 14631da177e4SLinus Torvalds * We just reserve space for fragment header. 14641da177e4SLinus Torvalds * Note: this may be overallocation if the message 14651da177e4SLinus Torvalds * (without MSG_MORE) fits into the MTU. 14661da177e4SLinus Torvalds */ 14671da177e4SLinus Torvalds alloclen += sizeof(struct frag_hdr); 14681da177e4SLinus Torvalds 1469232cd35dSEric Dumazet copy = datalen - transhdrlen - fraggap; 1470232cd35dSEric Dumazet if (copy < 0) { 1471232cd35dSEric Dumazet err = -EINVAL; 1472232cd35dSEric Dumazet goto error; 1473232cd35dSEric Dumazet } 14741da177e4SLinus Torvalds if (transhdrlen) { 14751da177e4SLinus Torvalds skb = sock_alloc_send_skb(sk, 14761da177e4SLinus Torvalds alloclen + hh_len, 14771da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 14781da177e4SLinus Torvalds } else { 14791da177e4SLinus Torvalds skb = NULL; 14801da177e4SLinus Torvalds if (atomic_read(&sk->sk_wmem_alloc) <= 14811da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 14821da177e4SLinus Torvalds skb = sock_wmalloc(sk, 14831da177e4SLinus Torvalds alloclen + hh_len, 1, 14841da177e4SLinus Torvalds sk->sk_allocation); 148563159f29SIan Morris if (unlikely(!skb)) 14861da177e4SLinus Torvalds err = -ENOBUFS; 14871da177e4SLinus Torvalds } 148863159f29SIan Morris if (!skb) 14891da177e4SLinus Torvalds goto error; 14901da177e4SLinus Torvalds /* 14911da177e4SLinus Torvalds * Fill in the control structures 14921da177e4SLinus Torvalds */ 14939c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 149432dce968SVlad Yasevich skb->ip_summed = csummode; 14951da177e4SLinus Torvalds skb->csum = 0; 14961f85851eSGao feng /* reserve for fragmentation and ipsec header */ 14971f85851eSGao feng skb_reserve(skb, hh_len + sizeof(struct frag_hdr) + 14981f85851eSGao feng dst_exthdrlen); 14991da177e4SLinus Torvalds 150011878b40SWillem de Bruijn /* Only the initial fragment is time stamped */ 1501a693e698SAnders Berggren skb_shinfo(skb)->tx_flags = tx_flags; 150211878b40SWillem de Bruijn tx_flags = 0; 150309c2d251SWillem de Bruijn skb_shinfo(skb)->tskey = tskey; 150409c2d251SWillem de Bruijn tskey = 0; 1505a693e698SAnders Berggren 15061da177e4SLinus Torvalds /* 15071da177e4SLinus Torvalds * Find where to start putting bytes 15081da177e4SLinus Torvalds */ 15091f85851eSGao feng data = skb_put(skb, fraglen); 15101f85851eSGao feng skb_set_network_header(skb, exthdrlen); 15111f85851eSGao feng data += fragheaderlen; 1512b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1513b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 15141da177e4SLinus Torvalds if (fraggap) { 15151da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 15161da177e4SLinus Torvalds skb_prev, maxfraglen, 15171da177e4SLinus Torvalds data + transhdrlen, fraggap, 0); 15181da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 15191da177e4SLinus Torvalds skb->csum); 15201da177e4SLinus Torvalds data += fraggap; 1521e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 15221da177e4SLinus Torvalds } 1523232cd35dSEric Dumazet if (copy > 0 && 1524232cd35dSEric Dumazet getfrag(from, data + transhdrlen, offset, 1525232cd35dSEric Dumazet copy, fraggap, skb) < 0) { 15261da177e4SLinus Torvalds err = -EFAULT; 15271da177e4SLinus Torvalds kfree_skb(skb); 15281da177e4SLinus Torvalds goto error; 15291da177e4SLinus Torvalds } 15301da177e4SLinus Torvalds 15311da177e4SLinus Torvalds offset += copy; 15321da177e4SLinus Torvalds length -= datalen - fraggap; 15331da177e4SLinus Torvalds transhdrlen = 0; 15341da177e4SLinus Torvalds exthdrlen = 0; 1535299b0767SSteffen Klassert dst_exthdrlen = 0; 15361da177e4SLinus Torvalds 15370dec879fSJulian Anastasov if ((flags & MSG_CONFIRM) && !skb_prev) 15380dec879fSJulian Anastasov skb_set_dst_pending_confirm(skb, 1); 15390dec879fSJulian Anastasov 15401da177e4SLinus Torvalds /* 15411da177e4SLinus Torvalds * Put the packet on the pending queue 15421da177e4SLinus Torvalds */ 15430bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 15441da177e4SLinus Torvalds continue; 15451da177e4SLinus Torvalds } 15461da177e4SLinus Torvalds 15471da177e4SLinus Torvalds if (copy > length) 15481da177e4SLinus Torvalds copy = length; 15491da177e4SLinus Torvalds 1550d8d1f30bSChangli Gao if (!(rt->dst.dev->features&NETIF_F_SG)) { 15511da177e4SLinus Torvalds unsigned int off; 15521da177e4SLinus Torvalds 15531da177e4SLinus Torvalds off = skb->len; 15541da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 15551da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 15561da177e4SLinus Torvalds __skb_trim(skb, off); 15571da177e4SLinus Torvalds err = -EFAULT; 15581da177e4SLinus Torvalds goto error; 15591da177e4SLinus Torvalds } 15601da177e4SLinus Torvalds } else { 15611da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 15621da177e4SLinus Torvalds 15631da177e4SLinus Torvalds err = -ENOMEM; 15645640f768SEric Dumazet if (!sk_page_frag_refill(sk, pfrag)) 15651da177e4SLinus Torvalds goto error; 15661da177e4SLinus Torvalds 15675640f768SEric Dumazet if (!skb_can_coalesce(skb, i, pfrag->page, 15685640f768SEric Dumazet pfrag->offset)) { 15691da177e4SLinus Torvalds err = -EMSGSIZE; 15705640f768SEric Dumazet if (i == MAX_SKB_FRAGS) 15711da177e4SLinus Torvalds goto error; 15725640f768SEric Dumazet 15735640f768SEric Dumazet __skb_fill_page_desc(skb, i, pfrag->page, 15745640f768SEric Dumazet pfrag->offset, 0); 15755640f768SEric Dumazet skb_shinfo(skb)->nr_frags = ++i; 15765640f768SEric Dumazet get_page(pfrag->page); 15771da177e4SLinus Torvalds } 15785640f768SEric Dumazet copy = min_t(int, copy, pfrag->size - pfrag->offset); 15799e903e08SEric Dumazet if (getfrag(from, 15805640f768SEric Dumazet page_address(pfrag->page) + pfrag->offset, 15815640f768SEric Dumazet offset, copy, skb->len, skb) < 0) 15825640f768SEric Dumazet goto error_efault; 15835640f768SEric Dumazet 15845640f768SEric Dumazet pfrag->offset += copy; 15855640f768SEric Dumazet skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy); 15861da177e4SLinus Torvalds skb->len += copy; 15871da177e4SLinus Torvalds skb->data_len += copy; 1588f945fa7aSHerbert Xu skb->truesize += copy; 1589f945fa7aSHerbert Xu atomic_add(copy, &sk->sk_wmem_alloc); 15901da177e4SLinus Torvalds } 15911da177e4SLinus Torvalds offset += copy; 15921da177e4SLinus Torvalds length -= copy; 15931da177e4SLinus Torvalds } 15945640f768SEric Dumazet 15951da177e4SLinus Torvalds return 0; 15965640f768SEric Dumazet 15975640f768SEric Dumazet error_efault: 15985640f768SEric Dumazet err = -EFAULT; 15991da177e4SLinus Torvalds error: 1600bdc712b4SDavid S. Miller cork->length -= length; 16013bd653c8SDenis V. Lunev IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS); 16021da177e4SLinus Torvalds return err; 16031da177e4SLinus Torvalds } 16040bbe84a6SVlad Yasevich 16050bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk, 16060bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, int len, 16070bbe84a6SVlad Yasevich int odd, struct sk_buff *skb), 160826879da5SWei Wang void *from, int length, int transhdrlen, 160926879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 161026879da5SWei Wang struct rt6_info *rt, unsigned int flags, 1611c14ac945SSoheil Hassas Yeganeh const struct sockcm_cookie *sockc) 16120bbe84a6SVlad Yasevich { 16130bbe84a6SVlad Yasevich struct inet_sock *inet = inet_sk(sk); 16140bbe84a6SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 16150bbe84a6SVlad Yasevich int exthdrlen; 16160bbe84a6SVlad Yasevich int err; 16170bbe84a6SVlad Yasevich 16180bbe84a6SVlad Yasevich if (flags&MSG_PROBE) 16190bbe84a6SVlad Yasevich return 0; 16200bbe84a6SVlad Yasevich if (skb_queue_empty(&sk->sk_write_queue)) { 16210bbe84a6SVlad Yasevich /* 16220bbe84a6SVlad Yasevich * setup for corking 16230bbe84a6SVlad Yasevich */ 162426879da5SWei Wang err = ip6_setup_cork(sk, &inet->cork, &np->cork, 162526879da5SWei Wang ipc6, rt, fl6); 16260bbe84a6SVlad Yasevich if (err) 16270bbe84a6SVlad Yasevich return err; 16280bbe84a6SVlad Yasevich 162926879da5SWei Wang exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 16300bbe84a6SVlad Yasevich length += exthdrlen; 16310bbe84a6SVlad Yasevich transhdrlen += exthdrlen; 16320bbe84a6SVlad Yasevich } else { 16330bbe84a6SVlad Yasevich fl6 = &inet->cork.fl.u.ip6; 16340bbe84a6SVlad Yasevich transhdrlen = 0; 16350bbe84a6SVlad Yasevich } 16360bbe84a6SVlad Yasevich 16370bbe84a6SVlad Yasevich return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base, 16380bbe84a6SVlad Yasevich &np->cork, sk_page_frag(sk), getfrag, 163926879da5SWei Wang from, length, transhdrlen, flags, ipc6, sockc); 16400bbe84a6SVlad Yasevich } 1641a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data); 16421da177e4SLinus Torvalds 1643366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork, 1644366e41d9SVlad Yasevich struct inet6_cork *v6_cork) 1645bf138862SPavel Emelyanov { 1646366e41d9SVlad Yasevich if (v6_cork->opt) { 1647366e41d9SVlad Yasevich kfree(v6_cork->opt->dst0opt); 1648366e41d9SVlad Yasevich kfree(v6_cork->opt->dst1opt); 1649366e41d9SVlad Yasevich kfree(v6_cork->opt->hopopt); 1650366e41d9SVlad Yasevich kfree(v6_cork->opt->srcrt); 1651366e41d9SVlad Yasevich kfree(v6_cork->opt); 1652366e41d9SVlad Yasevich v6_cork->opt = NULL; 16530178b695SHerbert Xu } 16540178b695SHerbert Xu 1655366e41d9SVlad Yasevich if (cork->base.dst) { 1656366e41d9SVlad Yasevich dst_release(cork->base.dst); 1657366e41d9SVlad Yasevich cork->base.dst = NULL; 1658366e41d9SVlad Yasevich cork->base.flags &= ~IPCORK_ALLFRAG; 1659bf138862SPavel Emelyanov } 1660366e41d9SVlad Yasevich memset(&cork->fl, 0, sizeof(cork->fl)); 1661bf138862SPavel Emelyanov } 1662bf138862SPavel Emelyanov 16636422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk, 16646422398cSVlad Yasevich struct sk_buff_head *queue, 16656422398cSVlad Yasevich struct inet_cork_full *cork, 16666422398cSVlad Yasevich struct inet6_cork *v6_cork) 16671da177e4SLinus Torvalds { 16681da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 16691da177e4SLinus Torvalds struct sk_buff **tail_skb; 16701da177e4SLinus Torvalds struct in6_addr final_dst_buf, *final_dst = &final_dst_buf; 16711da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 16723bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 16731da177e4SLinus Torvalds struct ipv6hdr *hdr; 16746422398cSVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 16756422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->base.dst; 16766422398cSVlad Yasevich struct flowi6 *fl6 = &cork->fl.u.ip6; 16774c9483b2SDavid S. Miller unsigned char proto = fl6->flowi6_proto; 16781da177e4SLinus Torvalds 16796422398cSVlad Yasevich skb = __skb_dequeue(queue); 168063159f29SIan Morris if (!skb) 16811da177e4SLinus Torvalds goto out; 16821da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 16831da177e4SLinus Torvalds 16841da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1685d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1686bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 16876422398cSVlad Yasevich while ((tmp_skb = __skb_dequeue(queue)) != NULL) { 1688cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 16891da177e4SLinus Torvalds *tail_skb = tmp_skb; 16901da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 16911da177e4SLinus Torvalds skb->len += tmp_skb->len; 16921da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 16931da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 16941da177e4SLinus Torvalds tmp_skb->destructor = NULL; 16951da177e4SLinus Torvalds tmp_skb->sk = NULL; 16961da177e4SLinus Torvalds } 16971da177e4SLinus Torvalds 169828a89453SHerbert Xu /* Allow local fragmentation. */ 169960ff7467SWANG Cong skb->ignore_df = ip6_sk_ignore_df(sk); 170028a89453SHerbert Xu 17014e3fd7a0SAlexey Dobriyan *final_dst = fl6->daddr; 1702cfe1fc77SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_header_len(skb)); 17031da177e4SLinus Torvalds if (opt && opt->opt_flen) 17041da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 17051da177e4SLinus Torvalds if (opt && opt->opt_nflen) 1706613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr); 17071da177e4SLinus Torvalds 1708e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 1709e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 17100660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 17111da177e4SLinus Torvalds 17126422398cSVlad Yasevich ip6_flow_hdr(hdr, v6_cork->tclass, 1713cb1ce2efSTom Herbert ip6_make_flowlabel(net, skb, fl6->flowlabel, 171467800f9bSTom Herbert np->autoflowlabel, fl6)); 17156422398cSVlad Yasevich hdr->hop_limit = v6_cork->hop_limit; 17161da177e4SLinus Torvalds hdr->nexthdr = proto; 17174e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 17184e3fd7a0SAlexey Dobriyan hdr->daddr = *final_dst; 17191da177e4SLinus Torvalds 1720a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 17214a19ec58SLaszlo Attila Toth skb->mark = sk->sk_mark; 1722a2c2064fSPatrick McHardy 1723d8d1f30bSChangli Gao skb_dst_set(skb, dst_clone(&rt->dst)); 1724edf391ffSNeil Horman IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len); 172514878f75SDavid L Stevens if (proto == IPPROTO_ICMPV6) { 1726adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 172714878f75SDavid L Stevens 172843a43b60SHannes Frederic Sowa ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type); 172943a43b60SHannes Frederic Sowa ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS); 173014878f75SDavid L Stevens } 173114878f75SDavid L Stevens 17326422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 17336422398cSVlad Yasevich out: 17346422398cSVlad Yasevich return skb; 17356422398cSVlad Yasevich } 17366422398cSVlad Yasevich 17376422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb) 17386422398cSVlad Yasevich { 17396422398cSVlad Yasevich struct net *net = sock_net(skb->sk); 17406422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 17416422398cSVlad Yasevich int err; 17426422398cSVlad Yasevich 174333224b16SEric W. Biederman err = ip6_local_out(net, skb->sk, skb); 17441da177e4SLinus Torvalds if (err) { 17451da177e4SLinus Torvalds if (err > 0) 17466ce9e7b5SEric Dumazet err = net_xmit_errno(err); 17471da177e4SLinus Torvalds if (err) 17486422398cSVlad Yasevich IP6_INC_STATS(net, rt->rt6i_idev, 17496422398cSVlad Yasevich IPSTATS_MIB_OUTDISCARDS); 17501da177e4SLinus Torvalds } 17511da177e4SLinus Torvalds 17521da177e4SLinus Torvalds return err; 17536422398cSVlad Yasevich } 17546422398cSVlad Yasevich 17556422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk) 17566422398cSVlad Yasevich { 17576422398cSVlad Yasevich struct sk_buff *skb; 17586422398cSVlad Yasevich 17596422398cSVlad Yasevich skb = ip6_finish_skb(sk); 17606422398cSVlad Yasevich if (!skb) 17616422398cSVlad Yasevich return 0; 17626422398cSVlad Yasevich 17636422398cSVlad Yasevich return ip6_send_skb(skb); 17641da177e4SLinus Torvalds } 1765a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames); 17661da177e4SLinus Torvalds 17670bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk, 17686422398cSVlad Yasevich struct sk_buff_head *queue, 17696422398cSVlad Yasevich struct inet_cork_full *cork, 17706422398cSVlad Yasevich struct inet6_cork *v6_cork) 17711da177e4SLinus Torvalds { 17721da177e4SLinus Torvalds struct sk_buff *skb; 17731da177e4SLinus Torvalds 17740bbe84a6SVlad Yasevich while ((skb = __skb_dequeue_tail(queue)) != NULL) { 1775adf30907SEric Dumazet if (skb_dst(skb)) 1776adf30907SEric Dumazet IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)), 1777a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 17781da177e4SLinus Torvalds kfree_skb(skb); 17791da177e4SLinus Torvalds } 17801da177e4SLinus Torvalds 17816422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 17821da177e4SLinus Torvalds } 17830bbe84a6SVlad Yasevich 17840bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk) 17850bbe84a6SVlad Yasevich { 17866422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &sk->sk_write_queue, 17876422398cSVlad Yasevich &inet_sk(sk)->cork, &inet6_sk(sk)->cork); 17880bbe84a6SVlad Yasevich } 1789a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames); 17906422398cSVlad Yasevich 17916422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk, 17926422398cSVlad Yasevich int getfrag(void *from, char *to, int offset, 17936422398cSVlad Yasevich int len, int odd, struct sk_buff *skb), 17946422398cSVlad Yasevich void *from, int length, int transhdrlen, 179526879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 17966422398cSVlad Yasevich struct rt6_info *rt, unsigned int flags, 179726879da5SWei Wang const struct sockcm_cookie *sockc) 17986422398cSVlad Yasevich { 17996422398cSVlad Yasevich struct inet_cork_full cork; 18006422398cSVlad Yasevich struct inet6_cork v6_cork; 18016422398cSVlad Yasevich struct sk_buff_head queue; 180226879da5SWei Wang int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 18036422398cSVlad Yasevich int err; 18046422398cSVlad Yasevich 18056422398cSVlad Yasevich if (flags & MSG_PROBE) 18066422398cSVlad Yasevich return NULL; 18076422398cSVlad Yasevich 18086422398cSVlad Yasevich __skb_queue_head_init(&queue); 18096422398cSVlad Yasevich 18106422398cSVlad Yasevich cork.base.flags = 0; 18116422398cSVlad Yasevich cork.base.addr = 0; 18126422398cSVlad Yasevich cork.base.opt = NULL; 18136422398cSVlad Yasevich v6_cork.opt = NULL; 181426879da5SWei Wang err = ip6_setup_cork(sk, &cork, &v6_cork, ipc6, rt, fl6); 18156422398cSVlad Yasevich if (err) 18166422398cSVlad Yasevich return ERR_PTR(err); 18176422398cSVlad Yasevich 181826879da5SWei Wang if (ipc6->dontfrag < 0) 181926879da5SWei Wang ipc6->dontfrag = inet6_sk(sk)->dontfrag; 18206422398cSVlad Yasevich 18216422398cSVlad Yasevich err = __ip6_append_data(sk, fl6, &queue, &cork.base, &v6_cork, 18226422398cSVlad Yasevich ¤t->task_frag, getfrag, from, 18236422398cSVlad Yasevich length + exthdrlen, transhdrlen + exthdrlen, 182426879da5SWei Wang flags, ipc6, sockc); 18256422398cSVlad Yasevich if (err) { 18266422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &queue, &cork, &v6_cork); 18276422398cSVlad Yasevich return ERR_PTR(err); 18286422398cSVlad Yasevich } 18296422398cSVlad Yasevich 18306422398cSVlad Yasevich return __ip6_make_skb(sk, &queue, &cork, &v6_cork); 18316422398cSVlad Yasevich } 1832