12874c5fdSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later 21da177e4SLinus Torvalds /* 31da177e4SLinus Torvalds * IPv6 output functions 41da177e4SLinus Torvalds * Linux INET6 implementation 51da177e4SLinus Torvalds * 61da177e4SLinus Torvalds * Authors: 71da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 81da177e4SLinus Torvalds * 91da177e4SLinus Torvalds * Based on linux/net/ipv4/ip_output.c 101da177e4SLinus Torvalds * 111da177e4SLinus Torvalds * Changes: 121da177e4SLinus Torvalds * A.N.Kuznetsov : airthmetics in fragmentation. 131da177e4SLinus Torvalds * extension headers are implemented. 141da177e4SLinus Torvalds * route changes now work. 151da177e4SLinus Torvalds * ip6_forward does not confuse sniffers. 161da177e4SLinus Torvalds * etc. 171da177e4SLinus Torvalds * 181da177e4SLinus Torvalds * H. von Brand : Added missing #include <linux/string.h> 191da177e4SLinus Torvalds * Imran Patel : frag id should be in NBO 201da177e4SLinus Torvalds * Kazunori MIYAZAWA @USAGI 211da177e4SLinus Torvalds * : add ip6_append_data and related functions 221da177e4SLinus Torvalds * for datagram xmit 231da177e4SLinus Torvalds */ 241da177e4SLinus Torvalds 251da177e4SLinus Torvalds #include <linux/errno.h> 26ef76bc23SHerbert Xu #include <linux/kernel.h> 271da177e4SLinus Torvalds #include <linux/string.h> 281da177e4SLinus Torvalds #include <linux/socket.h> 291da177e4SLinus Torvalds #include <linux/net.h> 301da177e4SLinus Torvalds #include <linux/netdevice.h> 311da177e4SLinus Torvalds #include <linux/if_arp.h> 321da177e4SLinus Torvalds #include <linux/in6.h> 331da177e4SLinus Torvalds #include <linux/tcp.h> 341da177e4SLinus Torvalds #include <linux/route.h> 35b59f45d0SHerbert Xu #include <linux/module.h> 365a0e3ad6STejun Heo #include <linux/slab.h> 371da177e4SLinus Torvalds 3833b48679SDaniel Mack #include <linux/bpf-cgroup.h> 391da177e4SLinus Torvalds #include <linux/netfilter.h> 401da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h> 411da177e4SLinus Torvalds 421da177e4SLinus Torvalds #include <net/sock.h> 431da177e4SLinus Torvalds #include <net/snmp.h> 441da177e4SLinus Torvalds 45*d457a0e3SEric Dumazet #include <net/gso.h> 461da177e4SLinus Torvalds #include <net/ipv6.h> 471da177e4SLinus Torvalds #include <net/ndisc.h> 481da177e4SLinus Torvalds #include <net/protocol.h> 491da177e4SLinus Torvalds #include <net/ip6_route.h> 501da177e4SLinus Torvalds #include <net/addrconf.h> 511da177e4SLinus Torvalds #include <net/rawv6.h> 521da177e4SLinus Torvalds #include <net/icmp.h> 531da177e4SLinus Torvalds #include <net/xfrm.h> 541da177e4SLinus Torvalds #include <net/checksum.h> 557bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h> 56ca254490SDavid Ahern #include <net/l3mdev.h> 5714972cbdSRoopa Prabhu #include <net/lwtunnel.h> 58571912c6SMartin Varghese #include <net/ip_tunnels.h> 591da177e4SLinus Torvalds 607d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb) 611da177e4SLinus Torvalds { 62adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 631da177e4SLinus Torvalds struct net_device *dev = dst->dev; 64e415ed3aSVasily Averin struct inet6_dev *idev = ip6_dst_idev(dst); 655796015fSVasily Averin unsigned int hh_len = LL_RESERVED_SPACE(dev); 66e415ed3aSVasily Averin const struct in6_addr *daddr, *nexthop; 67e415ed3aSVasily Averin struct ipv6hdr *hdr; 68f6b72b62SDavid S. Miller struct neighbour *neigh; 696fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 int ret; 701da177e4SLinus Torvalds 715796015fSVasily Averin /* Be paranoid, rather than too clever. */ 72e415ed3aSVasily Averin if (unlikely(hh_len > skb_headroom(skb)) && dev->header_ops) { 73e415ed3aSVasily Averin skb = skb_expand_head(skb, hh_len); 745796015fSVasily Averin if (!skb) { 75e415ed3aSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 765796015fSVasily Averin return -ENOMEM; 775796015fSVasily Averin } 785796015fSVasily Averin } 795796015fSVasily Averin 80e415ed3aSVasily Averin hdr = ipv6_hdr(skb); 81e415ed3aSVasily Averin daddr = &hdr->daddr; 82e415ed3aSVasily Averin if (ipv6_addr_is_multicast(daddr)) { 837026b1ddSDavid Miller if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) && 848571ab47SYuval Mintz ((mroute6_is_socket(net, skb) && 85bd91b8bfSBenjamin Thery !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) || 86e415ed3aSVasily Averin ipv6_chk_mcast_addr(dev, daddr, &hdr->saddr))) { 871da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 881da177e4SLinus Torvalds 891da177e4SLinus Torvalds /* Do not check for IFF_ALLMULTI; multicast routing 901da177e4SLinus Torvalds is not supported in any case. 911da177e4SLinus Torvalds */ 921da177e4SLinus Torvalds if (newskb) 93b2e0b385SJan Engelhardt NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING, 9429a26a56SEric W. Biederman net, sk, newskb, NULL, newskb->dev, 9595603e22SMichel Machado dev_loopback_xmit); 961da177e4SLinus Torvalds 97e415ed3aSVasily Averin if (hdr->hop_limit == 0) { 9878126c41SEric W. Biederman IP6_INC_STATS(net, idev, 993bd653c8SDenis V. Lunev IPSTATS_MIB_OUTDISCARDS); 1001da177e4SLinus Torvalds kfree_skb(skb); 1011da177e4SLinus Torvalds return 0; 1021da177e4SLinus Torvalds } 1031da177e4SLinus Torvalds } 1041da177e4SLinus Torvalds 10578126c41SEric W. Biederman IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len); 106e415ed3aSVasily Averin if (IPV6_ADDR_MC_SCOPE(daddr) <= IPV6_ADDR_SCOPE_NODELOCAL && 107dd408515SHannes Frederic Sowa !(dev->flags & IFF_LOOPBACK)) { 108dd408515SHannes Frederic Sowa kfree_skb(skb); 109dd408515SHannes Frederic Sowa return 0; 110dd408515SHannes Frederic Sowa } 1111da177e4SLinus Torvalds } 1121da177e4SLinus Torvalds 11314972cbdSRoopa Prabhu if (lwtunnel_xmit_redirect(dst->lwtstate)) { 11414972cbdSRoopa Prabhu int res = lwtunnel_xmit(skb); 11514972cbdSRoopa Prabhu 11614972cbdSRoopa Prabhu if (res < 0 || res == LWTUNNEL_XMIT_DONE) 11714972cbdSRoopa Prabhu return res; 11814972cbdSRoopa Prabhu } 11914972cbdSRoopa Prabhu 12009eed119SEric Dumazet rcu_read_lock(); 121e415ed3aSVasily Averin nexthop = rt6_nexthop((struct rt6_info *)dst, daddr); 122e415ed3aSVasily Averin neigh = __ipv6_neigh_lookup_noref(dev, nexthop); 12358f71be5SPavel Begunkov 12458f71be5SPavel Begunkov if (unlikely(IS_ERR_OR_NULL(neigh))) { 1256fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(!neigh)) 126e415ed3aSVasily Averin neigh = __neigh_create(&nd_tbl, nexthop, dev, false); 12758f71be5SPavel Begunkov if (IS_ERR(neigh)) { 12809eed119SEric Dumazet rcu_read_unlock(); 12958f71be5SPavel Begunkov IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTNOROUTES); 13058f71be5SPavel Begunkov kfree_skb_reason(skb, SKB_DROP_REASON_NEIGH_CREATEFAIL); 13158f71be5SPavel Begunkov return -EINVAL; 13258f71be5SPavel Begunkov } 13358f71be5SPavel Begunkov } 1344ff06203SJulian Anastasov sock_confirm_neigh(skb, neigh); 1350353f282SDavid Ahern ret = neigh_output(neigh, skb, false); 13609eed119SEric Dumazet rcu_read_unlock(); 1376fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 return ret; 1386fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 } 1391da177e4SLinus Torvalds 140b210de4fSAya Levin static int 141b210de4fSAya Levin ip6_finish_output_gso_slowpath_drop(struct net *net, struct sock *sk, 142b210de4fSAya Levin struct sk_buff *skb, unsigned int mtu) 143b210de4fSAya Levin { 144b210de4fSAya Levin struct sk_buff *segs, *nskb; 145b210de4fSAya Levin netdev_features_t features; 146b210de4fSAya Levin int ret = 0; 147b210de4fSAya Levin 148b210de4fSAya Levin /* Please see corresponding comment in ip_finish_output_gso 149b210de4fSAya Levin * describing the cases where GSO segment length exceeds the 150b210de4fSAya Levin * egress MTU. 151b210de4fSAya Levin */ 152b210de4fSAya Levin features = netif_skb_features(skb); 153b210de4fSAya Levin segs = skb_gso_segment(skb, features & ~NETIF_F_GSO_MASK); 154b210de4fSAya Levin if (IS_ERR_OR_NULL(segs)) { 155b210de4fSAya Levin kfree_skb(skb); 156b210de4fSAya Levin return -ENOMEM; 157b210de4fSAya Levin } 158b210de4fSAya Levin 159b210de4fSAya Levin consume_skb(skb); 160b210de4fSAya Levin 161b210de4fSAya Levin skb_list_walk_safe(segs, segs, nskb) { 162b210de4fSAya Levin int err; 163b210de4fSAya Levin 164b210de4fSAya Levin skb_mark_not_on_list(segs); 165b210de4fSAya Levin err = ip6_fragment(net, sk, segs, ip6_finish_output2); 166b210de4fSAya Levin if (err && ret == 0) 167b210de4fSAya Levin ret = err; 168b210de4fSAya Levin } 169b210de4fSAya Levin 170b210de4fSAya Levin return ret; 171b210de4fSAya Levin } 172b210de4fSAya Levin 173956fe219Sbrakmo static int __ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1749e508490SJan Engelhardt { 175b210de4fSAya Levin unsigned int mtu; 176b210de4fSAya Levin 17709ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM) 17809ee9dbaSTobias Brunner /* Policy lookup after SNAT yielded a new policy */ 17909ee9dbaSTobias Brunner if (skb_dst(skb)->xfrm) { 18019d36c5fSEric Dumazet IP6CB(skb)->flags |= IP6SKB_REROUTED; 18109ee9dbaSTobias Brunner return dst_output(net, sk, skb); 18209ee9dbaSTobias Brunner } 18309ee9dbaSTobias Brunner #endif 18409ee9dbaSTobias Brunner 185b210de4fSAya Levin mtu = ip6_skb_dst_mtu(skb); 18680e425b6SCoco Li if (skb_is_gso(skb) && 18780e425b6SCoco Li !(IP6CB(skb)->flags & IP6SKB_FAKEJUMBO) && 18880e425b6SCoco Li !skb_gso_validate_network_len(skb, mtu)) 189b210de4fSAya Levin return ip6_finish_output_gso_slowpath_drop(net, sk, skb, mtu); 190b210de4fSAya Levin 191b210de4fSAya Levin if ((skb->len > mtu && !skb_is_gso(skb)) || 1929037c357SJiri Pirko dst_allfrag(skb_dst(skb)) || 1939037c357SJiri Pirko (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size)) 1947d8c6e39SEric W. Biederman return ip6_fragment(net, sk, skb, ip6_finish_output2); 1959e508490SJan Engelhardt else 1967d8c6e39SEric W. Biederman return ip6_finish_output2(net, sk, skb); 1979e508490SJan Engelhardt } 1989e508490SJan Engelhardt 199956fe219Sbrakmo static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 200956fe219Sbrakmo { 201956fe219Sbrakmo int ret; 202956fe219Sbrakmo 203956fe219Sbrakmo ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb); 204956fe219Sbrakmo switch (ret) { 205956fe219Sbrakmo case NET_XMIT_SUCCESS: 206956fe219Sbrakmo case NET_XMIT_CN: 207956fe219Sbrakmo return __ip6_finish_output(net, sk, skb) ? : ret; 208956fe219Sbrakmo default: 2095e187189SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_BPF_CGROUP_EGRESS); 210956fe219Sbrakmo return ret; 211956fe219Sbrakmo } 212956fe219Sbrakmo } 213956fe219Sbrakmo 214ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb) 2151da177e4SLinus Torvalds { 21628f8bfd1SPhil Sutter struct net_device *dev = skb_dst(skb)->dev, *indev = skb->dev; 217adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 218be10de0aSEric W. Biederman 21997a7a37aSChenbo Feng skb->protocol = htons(ETH_P_IPV6); 22097a7a37aSChenbo Feng skb->dev = dev; 22197a7a37aSChenbo Feng 222778d80beSYOSHIFUJI Hideaki if (unlikely(idev->cnf.disable_ipv6)) { 22319a0644cSEric W. Biederman IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 2245e187189SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_IPV6DISABLED); 225778d80beSYOSHIFUJI Hideaki return 0; 226778d80beSYOSHIFUJI Hideaki } 227778d80beSYOSHIFUJI Hideaki 22829a26a56SEric W. Biederman return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING, 22928f8bfd1SPhil Sutter net, sk, skb, indev, dev, 2309c6eb28aSJan Engelhardt ip6_finish_output, 2319c6eb28aSJan Engelhardt !(IP6CB(skb)->flags & IP6SKB_REROUTED)); 2321da177e4SLinus Torvalds } 2336585d7dcSBrian Vazquez EXPORT_SYMBOL(ip6_output); 2341da177e4SLinus Torvalds 235e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np) 236513674b5SShaohua Li { 237513674b5SShaohua Li if (!np->autoflowlabel_set) 238513674b5SShaohua Li return ip6_default_np_autolabel(net); 239513674b5SShaohua Li else 240513674b5SShaohua Li return np->autoflowlabel; 241513674b5SShaohua Li } 242513674b5SShaohua Li 2431da177e4SLinus Torvalds /* 244b5d43998SShan Wei * xmit an sk_buff (used by TCP, SCTP and DCCP) 2451c1e9d2bSEric Dumazet * Note : socket lock is not held for SYNACK packets, but might be modified 2461c1e9d2bSEric Dumazet * by calls to skb_set_owner_w() and ipv6_local_error(), 2471c1e9d2bSEric Dumazet * which are using proper atomic operations or spinlocks. 2481da177e4SLinus Torvalds */ 2491c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6, 2504f6570d7SEric Dumazet __u32 mark, struct ipv6_txoptions *opt, int tclass, u32 priority) 2511da177e4SLinus Torvalds { 2523bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 2531c1e9d2bSEric Dumazet const struct ipv6_pinfo *np = inet6_sk(sk); 2544c9483b2SDavid S. Miller struct in6_addr *first_hop = &fl6->daddr; 255adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 2560c9f227bSVasily Averin struct net_device *dev = dst->dev; 2570c9f227bSVasily Averin struct inet6_dev *idev = ip6_dst_idev(dst); 25880e425b6SCoco Li struct hop_jumbo_hdr *hop_jumbo; 25980e425b6SCoco Li int hoplen = sizeof(*hop_jumbo); 26066033f47SStefano Brivio unsigned int head_room; 2611da177e4SLinus Torvalds struct ipv6hdr *hdr; 2624c9483b2SDavid S. Miller u8 proto = fl6->flowi6_proto; 2631da177e4SLinus Torvalds int seg_len = skb->len; 264e651f03aSGerrit Renker int hlimit = -1; 2651da177e4SLinus Torvalds u32 mtu; 2661da177e4SLinus Torvalds 26780e425b6SCoco Li head_room = sizeof(struct ipv6hdr) + hoplen + LL_RESERVED_SPACE(dev); 26866033f47SStefano Brivio if (opt) 26966033f47SStefano Brivio head_room += opt->opt_nflen + opt->opt_flen; 2701da177e4SLinus Torvalds 2710c9f227bSVasily Averin if (unlikely(head_room > skb_headroom(skb))) { 2720c9f227bSVasily Averin skb = skb_expand_head(skb, head_room); 2730c9f227bSVasily Averin if (!skb) { 2740c9f227bSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 2751da177e4SLinus Torvalds return -ENOBUFS; 2761da177e4SLinus Torvalds } 2771da177e4SLinus Torvalds } 27866033f47SStefano Brivio 27966033f47SStefano Brivio if (opt) { 28066033f47SStefano Brivio seg_len += opt->opt_nflen + opt->opt_flen; 28166033f47SStefano Brivio 2821da177e4SLinus Torvalds if (opt->opt_flen) 2831da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 28466033f47SStefano Brivio 2851da177e4SLinus Torvalds if (opt->opt_nflen) 286613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop, 287613fa3caSDavid Lebrun &fl6->saddr); 2881da177e4SLinus Torvalds } 2891da177e4SLinus Torvalds 29080e425b6SCoco Li if (unlikely(seg_len > IPV6_MAXPLEN)) { 29180e425b6SCoco Li hop_jumbo = skb_push(skb, hoplen); 29280e425b6SCoco Li 29380e425b6SCoco Li hop_jumbo->nexthdr = proto; 29480e425b6SCoco Li hop_jumbo->hdrlen = 0; 29580e425b6SCoco Li hop_jumbo->tlv_type = IPV6_TLV_JUMBO; 29680e425b6SCoco Li hop_jumbo->tlv_len = 4; 29780e425b6SCoco Li hop_jumbo->jumbo_payload_len = htonl(seg_len + hoplen); 29880e425b6SCoco Li 29980e425b6SCoco Li proto = IPPROTO_HOPOPTS; 30080e425b6SCoco Li seg_len = 0; 30180e425b6SCoco Li IP6CB(skb)->flags |= IP6SKB_FAKEJUMBO; 30280e425b6SCoco Li } 30380e425b6SCoco Li 304e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 305e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 3060660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 3071da177e4SLinus Torvalds 3081da177e4SLinus Torvalds /* 3091da177e4SLinus Torvalds * Fill in the IPv6 header 3101da177e4SLinus Torvalds */ 311b903d324SEric Dumazet if (np) 3121da177e4SLinus Torvalds hlimit = np->hop_limit; 3131da177e4SLinus Torvalds if (hlimit < 0) 3146b75d090SYOSHIFUJI Hideaki hlimit = ip6_dst_hoplimit(dst); 3151da177e4SLinus Torvalds 316cb1ce2efSTom Herbert ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel, 317513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 31841a1f8eaSYOSHIFUJI Hideaki 3191da177e4SLinus Torvalds hdr->payload_len = htons(seg_len); 3201da177e4SLinus Torvalds hdr->nexthdr = proto; 3211da177e4SLinus Torvalds hdr->hop_limit = hlimit; 3221da177e4SLinus Torvalds 3234e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 3244e3fd7a0SAlexey Dobriyan hdr->daddr = *first_hop; 3251da177e4SLinus Torvalds 3269c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 3274f6570d7SEric Dumazet skb->priority = priority; 32892e55f41SPablo Neira skb->mark = mark; 329a2c2064fSPatrick McHardy 3301da177e4SLinus Torvalds mtu = dst_mtu(dst); 33160ff7467SWANG Cong if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) { 3320c9f227bSVasily Averin IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len); 333a8e3e1a9SDavid Ahern 334a8e3e1a9SDavid Ahern /* if egress device is enslaved to an L3 master device pass the 335a8e3e1a9SDavid Ahern * skb to its handler for processing 336a8e3e1a9SDavid Ahern */ 337a8e3e1a9SDavid Ahern skb = l3mdev_ip6_out((struct sock *)sk, skb); 338a8e3e1a9SDavid Ahern if (unlikely(!skb)) 339a8e3e1a9SDavid Ahern return 0; 340a8e3e1a9SDavid Ahern 3411c1e9d2bSEric Dumazet /* hooks should never assume socket lock is held. 3421c1e9d2bSEric Dumazet * we promote our socket to non const 3431c1e9d2bSEric Dumazet */ 34429a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, 3450c9f227bSVasily Averin net, (struct sock *)sk, skb, NULL, dev, 34613206b6bSEric W. Biederman dst_output); 3471da177e4SLinus Torvalds } 3481da177e4SLinus Torvalds 3490c9f227bSVasily Averin skb->dev = dev; 3501c1e9d2bSEric Dumazet /* ipv6_local_error() does not require socket lock, 3511c1e9d2bSEric Dumazet * we promote our socket to non const 3521c1e9d2bSEric Dumazet */ 3531c1e9d2bSEric Dumazet ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu); 3541c1e9d2bSEric Dumazet 3550c9f227bSVasily Averin IP6_INC_STATS(net, idev, IPSTATS_MIB_FRAGFAILS); 3561da177e4SLinus Torvalds kfree_skb(skb); 3571da177e4SLinus Torvalds return -EMSGSIZE; 3581da177e4SLinus Torvalds } 3597159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit); 3607159039aSYOSHIFUJI Hideaki 3611da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel) 3621da177e4SLinus Torvalds { 3631da177e4SLinus Torvalds struct ip6_ra_chain *ra; 3641da177e4SLinus Torvalds struct sock *last = NULL; 3651da177e4SLinus Torvalds 3661da177e4SLinus Torvalds read_lock(&ip6_ra_lock); 3671da177e4SLinus Torvalds for (ra = ip6_ra_chain; ra; ra = ra->next) { 3681da177e4SLinus Torvalds struct sock *sk = ra->sk; 3690bd1b59bSAndrew McDonald if (sk && ra->sel == sel && 3700bd1b59bSAndrew McDonald (!sk->sk_bound_dev_if || 3710bd1b59bSAndrew McDonald sk->sk_bound_dev_if == skb->dev->ifindex)) { 3729036b2feSFrancesco Ruggeri struct ipv6_pinfo *np = inet6_sk(sk); 3739036b2feSFrancesco Ruggeri 3749036b2feSFrancesco Ruggeri if (np && np->rtalert_isolate && 3759036b2feSFrancesco Ruggeri !net_eq(sock_net(sk), dev_net(skb->dev))) { 3769036b2feSFrancesco Ruggeri continue; 3779036b2feSFrancesco Ruggeri } 3781da177e4SLinus Torvalds if (last) { 3791da177e4SLinus Torvalds struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC); 3801da177e4SLinus Torvalds if (skb2) 3811da177e4SLinus Torvalds rawv6_rcv(last, skb2); 3821da177e4SLinus Torvalds } 3831da177e4SLinus Torvalds last = sk; 3841da177e4SLinus Torvalds } 3851da177e4SLinus Torvalds } 3861da177e4SLinus Torvalds 3871da177e4SLinus Torvalds if (last) { 3881da177e4SLinus Torvalds rawv6_rcv(last, skb); 3891da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3901da177e4SLinus Torvalds return 1; 3911da177e4SLinus Torvalds } 3921da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3931da177e4SLinus Torvalds return 0; 3941da177e4SLinus Torvalds } 3951da177e4SLinus Torvalds 396e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb) 397e21e0b5fSVille Nuorvala { 3980660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 399e21e0b5fSVille Nuorvala u8 nexthdr = hdr->nexthdr; 40075f2811cSJesse Gross __be16 frag_off; 401e21e0b5fSVille Nuorvala int offset; 402e21e0b5fSVille Nuorvala 403e21e0b5fSVille Nuorvala if (ipv6_ext_hdr(nexthdr)) { 40475f2811cSJesse Gross offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off); 405e21e0b5fSVille Nuorvala if (offset < 0) 406e21e0b5fSVille Nuorvala return 0; 407e21e0b5fSVille Nuorvala } else 408e21e0b5fSVille Nuorvala offset = sizeof(struct ipv6hdr); 409e21e0b5fSVille Nuorvala 410e21e0b5fSVille Nuorvala if (nexthdr == IPPROTO_ICMPV6) { 411e21e0b5fSVille Nuorvala struct icmp6hdr *icmp6; 412e21e0b5fSVille Nuorvala 413d56f90a7SArnaldo Carvalho de Melo if (!pskb_may_pull(skb, (skb_network_header(skb) + 414d56f90a7SArnaldo Carvalho de Melo offset + 1 - skb->data))) 415e21e0b5fSVille Nuorvala return 0; 416e21e0b5fSVille Nuorvala 417d56f90a7SArnaldo Carvalho de Melo icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset); 418e21e0b5fSVille Nuorvala 419e21e0b5fSVille Nuorvala switch (icmp6->icmp6_type) { 420e21e0b5fSVille Nuorvala case NDISC_ROUTER_SOLICITATION: 421e21e0b5fSVille Nuorvala case NDISC_ROUTER_ADVERTISEMENT: 422e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_SOLICITATION: 423e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_ADVERTISEMENT: 424e21e0b5fSVille Nuorvala case NDISC_REDIRECT: 425e21e0b5fSVille Nuorvala /* For reaction involving unicast neighbor discovery 426e21e0b5fSVille Nuorvala * message destined to the proxied address, pass it to 427e21e0b5fSVille Nuorvala * input function. 428e21e0b5fSVille Nuorvala */ 429e21e0b5fSVille Nuorvala return 1; 430e21e0b5fSVille Nuorvala default: 431e21e0b5fSVille Nuorvala break; 432e21e0b5fSVille Nuorvala } 433e21e0b5fSVille Nuorvala } 434e21e0b5fSVille Nuorvala 43574553b09SVille Nuorvala /* 43674553b09SVille Nuorvala * The proxying router can't forward traffic sent to a link-local 43774553b09SVille Nuorvala * address, so signal the sender and discard the packet. This 43874553b09SVille Nuorvala * behavior is clarified by the MIPv6 specification. 43974553b09SVille Nuorvala */ 44074553b09SVille Nuorvala if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) { 44174553b09SVille Nuorvala dst_link_failure(skb); 44274553b09SVille Nuorvala return -1; 44374553b09SVille Nuorvala } 44474553b09SVille Nuorvala 445e21e0b5fSVille Nuorvala return 0; 446e21e0b5fSVille Nuorvala } 447e21e0b5fSVille Nuorvala 4480c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk, 4490c4b51f0SEric W. Biederman struct sk_buff *skb) 4501da177e4SLinus Torvalds { 45171a1c915SJeff Barnhill struct dst_entry *dst = skb_dst(skb); 45271a1c915SJeff Barnhill 45371a1c915SJeff Barnhill __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS); 45471a1c915SJeff Barnhill __IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len); 45571a1c915SJeff Barnhill 456f839a6c9SIdo Schimmel #ifdef CONFIG_NET_SWITCHDEV 457f839a6c9SIdo Schimmel if (skb->offload_l3_fwd_mark) { 458f839a6c9SIdo Schimmel consume_skb(skb); 459f839a6c9SIdo Schimmel return 0; 460f839a6c9SIdo Schimmel } 461f839a6c9SIdo Schimmel #endif 462f839a6c9SIdo Schimmel 463de799101SMartin KaFai Lau skb_clear_tstamp(skb); 46413206b6bSEric W. Biederman return dst_output(net, sk, skb); 4651da177e4SLinus Torvalds } 4661da177e4SLinus Torvalds 467fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu) 468fe6cc55fSFlorian Westphal { 469418a3156SFlorian Westphal if (skb->len <= mtu) 470fe6cc55fSFlorian Westphal return false; 471fe6cc55fSFlorian Westphal 47260ff7467SWANG Cong /* ipv6 conntrack defrag sets max_frag_size + ignore_df */ 473fe6cc55fSFlorian Westphal if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu) 474fe6cc55fSFlorian Westphal return true; 475fe6cc55fSFlorian Westphal 47660ff7467SWANG Cong if (skb->ignore_df) 477418a3156SFlorian Westphal return false; 478418a3156SFlorian Westphal 479779b7931SDaniel Axtens if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu)) 480fe6cc55fSFlorian Westphal return false; 481fe6cc55fSFlorian Westphal 482fe6cc55fSFlorian Westphal return true; 483fe6cc55fSFlorian Westphal } 484fe6cc55fSFlorian Westphal 4851da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb) 4861da177e4SLinus Torvalds { 487adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 4880660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 4891da177e4SLinus Torvalds struct inet6_skb_parm *opt = IP6CB(skb); 490c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(dst->dev); 4910857d6f8SStephen Suryaputra struct inet6_dev *idev; 4922edc1a38SMenglong Dong SKB_DR(reason); 49314f3ad6fSUlrich Weber u32 mtu; 4941da177e4SLinus Torvalds 4950857d6f8SStephen Suryaputra idev = __in6_dev_get_safely(dev_get_by_index_rcu(net, IP6CB(skb)->iif)); 49653b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->forwarding == 0) 4971da177e4SLinus Torvalds goto error; 4981da177e4SLinus Torvalds 499090f1166SLi RongQing if (skb->pkt_type != PACKET_HOST) 500090f1166SLi RongQing goto drop; 501090f1166SLi RongQing 5029ef2e965SHannes Frederic Sowa if (unlikely(skb->sk)) 5039ef2e965SHannes Frederic Sowa goto drop; 5049ef2e965SHannes Frederic Sowa 5054497b076SBen Hutchings if (skb_warn_if_lro(skb)) 5064497b076SBen Hutchings goto drop; 5074497b076SBen Hutchings 508ccd27f05SNicolas Dichtel if (!net->ipv6.devconf_all->disable_policy && 509e3fa461dSNicolas Dichtel (!idev || !idev->cnf.disable_policy) && 510ccd27f05SNicolas Dichtel !xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) { 511bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 5121da177e4SLinus Torvalds goto drop; 5131da177e4SLinus Torvalds } 5141da177e4SLinus Torvalds 51535fc92a9SHerbert Xu skb_forward_csum(skb); 5161da177e4SLinus Torvalds 5171da177e4SLinus Torvalds /* 5181da177e4SLinus Torvalds * We DO NOT make any processing on 5191da177e4SLinus Torvalds * RA packets, pushing them to user level AS IS 5201da177e4SLinus Torvalds * without ane WARRANTY that application will be able 5211da177e4SLinus Torvalds * to interpret them. The reason is that we 5221da177e4SLinus Torvalds * cannot make anything clever here. 5231da177e4SLinus Torvalds * 5241da177e4SLinus Torvalds * We are not end-node, so that if packet contains 5251da177e4SLinus Torvalds * AH/ESP, we cannot make anything. 5261da177e4SLinus Torvalds * Defragmentation also would be mistake, RA packets 5271da177e4SLinus Torvalds * cannot be fragmented, because there is no warranty 5281da177e4SLinus Torvalds * that different fragments will go along one path. --ANK 5291da177e4SLinus Torvalds */ 530ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) { 531ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (ip6_call_ra_chain(skb, ntohs(opt->ra))) 5321da177e4SLinus Torvalds return 0; 5331da177e4SLinus Torvalds } 5341da177e4SLinus Torvalds 5351da177e4SLinus Torvalds /* 5361da177e4SLinus Torvalds * check and decrement ttl 5371da177e4SLinus Torvalds */ 5381da177e4SLinus Torvalds if (hdr->hop_limit <= 1) { 5393ffe533cSAlexey Dobriyan icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0); 540bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS); 5411da177e4SLinus Torvalds 5422edc1a38SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_IP_INHDR); 5431da177e4SLinus Torvalds return -ETIMEDOUT; 5441da177e4SLinus Torvalds } 5451da177e4SLinus Torvalds 546fbea49e1SYOSHIFUJI Hideaki /* XXX: idev->cnf.proxy_ndp? */ 54753b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->proxy_ndp && 5488a3edd80SDaniel Lezcano pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) { 54974553b09SVille Nuorvala int proxied = ip6_forward_proxy_check(skb); 55046c7655fSKangmin Park if (proxied > 0) { 5519f535c87SGergely Risko /* It's tempting to decrease the hop limit 5529f535c87SGergely Risko * here by 1, as we do at the end of the 5539f535c87SGergely Risko * function too. 5549f535c87SGergely Risko * 5559f535c87SGergely Risko * But that would be incorrect, as proxying is 5569f535c87SGergely Risko * not forwarding. The ip6_input function 5579f535c87SGergely Risko * will handle this packet locally, and it 5589f535c87SGergely Risko * depends on the hop limit being unchanged. 5599f535c87SGergely Risko * 5609f535c87SGergely Risko * One example is the NDP hop limit, that 5619f535c87SGergely Risko * always has to stay 255, but other would be 5629f535c87SGergely Risko * similar checks around RA packets, where the 5639f535c87SGergely Risko * user can even change the desired limit. 5649f535c87SGergely Risko */ 565e21e0b5fSVille Nuorvala return ip6_input(skb); 56646c7655fSKangmin Park } else if (proxied < 0) { 567bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 56874553b09SVille Nuorvala goto drop; 56974553b09SVille Nuorvala } 570e21e0b5fSVille Nuorvala } 571e21e0b5fSVille Nuorvala 5721da177e4SLinus Torvalds if (!xfrm6_route_forward(skb)) { 573bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 5742edc1a38SMenglong Dong SKB_DR_SET(reason, XFRM_POLICY); 5751da177e4SLinus Torvalds goto drop; 5761da177e4SLinus Torvalds } 577adf30907SEric Dumazet dst = skb_dst(skb); 5781da177e4SLinus Torvalds 5791da177e4SLinus Torvalds /* IPv6 specs say nothing about it, but it is clear that we cannot 5801da177e4SLinus Torvalds send redirects to source routed frames. 5811e5dc146SMasahide NAKAMURA We don't send redirects to frames decapsulated from IPsec. 5821da177e4SLinus Torvalds */ 5832f17becfSStephen Suryaputra if (IP6CB(skb)->iif == dst->dev->ifindex && 5842f17becfSStephen Suryaputra opt->srcrt == 0 && !skb_sec_path(skb)) { 5851da177e4SLinus Torvalds struct in6_addr *target = NULL; 586fbfe95a4SDavid S. Miller struct inet_peer *peer; 5871da177e4SLinus Torvalds struct rt6_info *rt; 5881da177e4SLinus Torvalds 5891da177e4SLinus Torvalds /* 5901da177e4SLinus Torvalds * incoming and outgoing devices are the same 5911da177e4SLinus Torvalds * send a redirect. 5921da177e4SLinus Torvalds */ 5931da177e4SLinus Torvalds 5941da177e4SLinus Torvalds rt = (struct rt6_info *) dst; 595c45a3dfbSDavid S. Miller if (rt->rt6i_flags & RTF_GATEWAY) 596c45a3dfbSDavid S. Miller target = &rt->rt6i_gateway; 5971da177e4SLinus Torvalds else 5981da177e4SLinus Torvalds target = &hdr->daddr; 5991da177e4SLinus Torvalds 600fd0273d7SMartin KaFai Lau peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1); 60192d86829SDavid S. Miller 6021da177e4SLinus Torvalds /* Limit redirects both by destination (here) 6031da177e4SLinus Torvalds and by source (inside ndisc_send_redirect) 6041da177e4SLinus Torvalds */ 605fbfe95a4SDavid S. Miller if (inet_peer_xrlim_allow(peer, 1*HZ)) 6064991969aSDavid S. Miller ndisc_send_redirect(skb, target); 6071d861aa4SDavid S. Miller if (peer) 6081d861aa4SDavid S. Miller inet_putpeer(peer); 6095bb1ab09SDavid L Stevens } else { 6105bb1ab09SDavid L Stevens int addrtype = ipv6_addr_type(&hdr->saddr); 6115bb1ab09SDavid L Stevens 6121da177e4SLinus Torvalds /* This check is security critical. */ 613f81b2e7dSYOSHIFUJI Hideaki if (addrtype == IPV6_ADDR_ANY || 614f81b2e7dSYOSHIFUJI Hideaki addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK)) 6151da177e4SLinus Torvalds goto error; 6165bb1ab09SDavid L Stevens if (addrtype & IPV6_ADDR_LINKLOCAL) { 6175bb1ab09SDavid L Stevens icmpv6_send(skb, ICMPV6_DEST_UNREACH, 6183ffe533cSAlexey Dobriyan ICMPV6_NOT_NEIGHBOUR, 0); 6195bb1ab09SDavid L Stevens goto error; 6205bb1ab09SDavid L Stevens } 6211da177e4SLinus Torvalds } 6221da177e4SLinus Torvalds 623427faee1SVadim Fedorenko mtu = ip6_dst_mtu_maybe_forward(dst, true); 62414f3ad6fSUlrich Weber if (mtu < IPV6_MIN_MTU) 62514f3ad6fSUlrich Weber mtu = IPV6_MIN_MTU; 62614f3ad6fSUlrich Weber 627fe6cc55fSFlorian Westphal if (ip6_pkt_too_big(skb, mtu)) { 6281da177e4SLinus Torvalds /* Again, force OUTPUT device used as source address */ 6291da177e4SLinus Torvalds skb->dev = dst->dev; 63014f3ad6fSUlrich Weber icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 631bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS); 6321d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 63315c77d8bSEric Dumazet IPSTATS_MIB_FRAGFAILS); 6342edc1a38SMenglong Dong kfree_skb_reason(skb, SKB_DROP_REASON_PKT_TOO_BIG); 6351da177e4SLinus Torvalds return -EMSGSIZE; 6361da177e4SLinus Torvalds } 6371da177e4SLinus Torvalds 6381da177e4SLinus Torvalds if (skb_cow(skb, dst->dev->hard_header_len)) { 6391d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 64015c77d8bSEric Dumazet IPSTATS_MIB_OUTDISCARDS); 6411da177e4SLinus Torvalds goto drop; 6421da177e4SLinus Torvalds } 6431da177e4SLinus Torvalds 6440660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 6451da177e4SLinus Torvalds 6461da177e4SLinus Torvalds /* Mangling hops number delayed to point after skb COW */ 6471da177e4SLinus Torvalds 6481da177e4SLinus Torvalds hdr->hop_limit--; 6491da177e4SLinus Torvalds 65029a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, 65129a26a56SEric W. Biederman net, NULL, skb, skb->dev, dst->dev, 6526e23ae2aSPatrick McHardy ip6_forward_finish); 6531da177e4SLinus Torvalds 6541da177e4SLinus Torvalds error: 655bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS); 6562edc1a38SMenglong Dong SKB_DR_SET(reason, IP_INADDRERRORS); 6571da177e4SLinus Torvalds drop: 6582edc1a38SMenglong Dong kfree_skb_reason(skb, reason); 6591da177e4SLinus Torvalds return -EINVAL; 6601da177e4SLinus Torvalds } 6611da177e4SLinus Torvalds 6621da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from) 6631da177e4SLinus Torvalds { 6641da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 6651da177e4SLinus Torvalds to->priority = from->priority; 6661da177e4SLinus Torvalds to->protocol = from->protocol; 667adf30907SEric Dumazet skb_dst_drop(to); 668adf30907SEric Dumazet skb_dst_set(to, dst_clone(skb_dst(from))); 6691da177e4SLinus Torvalds to->dev = from->dev; 67082e91ffeSThomas Graf to->mark = from->mark; 6711da177e4SLinus Torvalds 6723dd1c9a1SPaolo Abeni skb_copy_hash(to, from); 6733dd1c9a1SPaolo Abeni 6741da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 6751da177e4SLinus Torvalds to->tc_index = from->tc_index; 6761da177e4SLinus Torvalds #endif 677e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 678df5042f4SFlorian Westphal skb_ext_copy(to, from); 679984bc16cSJames Morris skb_copy_secmark(to, from); 6801da177e4SLinus Torvalds } 6811da177e4SLinus Torvalds 6820feca619SPablo Neira Ayuso int ip6_fraglist_init(struct sk_buff *skb, unsigned int hlen, u8 *prevhdr, 6830feca619SPablo Neira Ayuso u8 nexthdr, __be32 frag_id, 6840feca619SPablo Neira Ayuso struct ip6_fraglist_iter *iter) 6850feca619SPablo Neira Ayuso { 6860feca619SPablo Neira Ayuso unsigned int first_len; 6870feca619SPablo Neira Ayuso struct frag_hdr *fh; 6880feca619SPablo Neira Ayuso 6890feca619SPablo Neira Ayuso /* BUILD HEADER */ 6900feca619SPablo Neira Ayuso *prevhdr = NEXTHDR_FRAGMENT; 6910feca619SPablo Neira Ayuso iter->tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC); 6920feca619SPablo Neira Ayuso if (!iter->tmp_hdr) 6930feca619SPablo Neira Ayuso return -ENOMEM; 6940feca619SPablo Neira Ayuso 695b7034146SEric Dumazet iter->frag = skb_shinfo(skb)->frag_list; 6960feca619SPablo Neira Ayuso skb_frag_list_init(skb); 6970feca619SPablo Neira Ayuso 6980feca619SPablo Neira Ayuso iter->offset = 0; 6990feca619SPablo Neira Ayuso iter->hlen = hlen; 7000feca619SPablo Neira Ayuso iter->frag_id = frag_id; 7010feca619SPablo Neira Ayuso iter->nexthdr = nexthdr; 7020feca619SPablo Neira Ayuso 7030feca619SPablo Neira Ayuso __skb_pull(skb, hlen); 7040feca619SPablo Neira Ayuso fh = __skb_push(skb, sizeof(struct frag_hdr)); 7050feca619SPablo Neira Ayuso __skb_push(skb, hlen); 7060feca619SPablo Neira Ayuso skb_reset_network_header(skb); 7070feca619SPablo Neira Ayuso memcpy(skb_network_header(skb), iter->tmp_hdr, hlen); 7080feca619SPablo Neira Ayuso 7090feca619SPablo Neira Ayuso fh->nexthdr = nexthdr; 7100feca619SPablo Neira Ayuso fh->reserved = 0; 7110feca619SPablo Neira Ayuso fh->frag_off = htons(IP6_MF); 7120feca619SPablo Neira Ayuso fh->identification = frag_id; 7130feca619SPablo Neira Ayuso 7140feca619SPablo Neira Ayuso first_len = skb_pagelen(skb); 7150feca619SPablo Neira Ayuso skb->data_len = first_len - skb_headlen(skb); 7160feca619SPablo Neira Ayuso skb->len = first_len; 7170feca619SPablo Neira Ayuso ipv6_hdr(skb)->payload_len = htons(first_len - sizeof(struct ipv6hdr)); 7180feca619SPablo Neira Ayuso 7190feca619SPablo Neira Ayuso return 0; 7200feca619SPablo Neira Ayuso } 7210feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_init); 7220feca619SPablo Neira Ayuso 7230feca619SPablo Neira Ayuso void ip6_fraglist_prepare(struct sk_buff *skb, 7240feca619SPablo Neira Ayuso struct ip6_fraglist_iter *iter) 7250feca619SPablo Neira Ayuso { 7260feca619SPablo Neira Ayuso struct sk_buff *frag = iter->frag; 7270feca619SPablo Neira Ayuso unsigned int hlen = iter->hlen; 7280feca619SPablo Neira Ayuso struct frag_hdr *fh; 7290feca619SPablo Neira Ayuso 7300feca619SPablo Neira Ayuso frag->ip_summed = CHECKSUM_NONE; 7310feca619SPablo Neira Ayuso skb_reset_transport_header(frag); 7320feca619SPablo Neira Ayuso fh = __skb_push(frag, sizeof(struct frag_hdr)); 7330feca619SPablo Neira Ayuso __skb_push(frag, hlen); 7340feca619SPablo Neira Ayuso skb_reset_network_header(frag); 7350feca619SPablo Neira Ayuso memcpy(skb_network_header(frag), iter->tmp_hdr, hlen); 7360feca619SPablo Neira Ayuso iter->offset += skb->len - hlen - sizeof(struct frag_hdr); 7370feca619SPablo Neira Ayuso fh->nexthdr = iter->nexthdr; 7380feca619SPablo Neira Ayuso fh->reserved = 0; 7390feca619SPablo Neira Ayuso fh->frag_off = htons(iter->offset); 7400feca619SPablo Neira Ayuso if (frag->next) 7410feca619SPablo Neira Ayuso fh->frag_off |= htons(IP6_MF); 7420feca619SPablo Neira Ayuso fh->identification = iter->frag_id; 7430feca619SPablo Neira Ayuso ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr)); 7440feca619SPablo Neira Ayuso ip6_copy_metadata(frag, skb); 7450feca619SPablo Neira Ayuso } 7460feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_prepare); 7470feca619SPablo Neira Ayuso 7488a6a1f17SPablo Neira Ayuso void ip6_frag_init(struct sk_buff *skb, unsigned int hlen, unsigned int mtu, 7498a6a1f17SPablo Neira Ayuso unsigned short needed_tailroom, int hdr_room, u8 *prevhdr, 7508a6a1f17SPablo Neira Ayuso u8 nexthdr, __be32 frag_id, struct ip6_frag_state *state) 7518a6a1f17SPablo Neira Ayuso { 7528a6a1f17SPablo Neira Ayuso state->prevhdr = prevhdr; 7538a6a1f17SPablo Neira Ayuso state->nexthdr = nexthdr; 7548a6a1f17SPablo Neira Ayuso state->frag_id = frag_id; 7558a6a1f17SPablo Neira Ayuso 7568a6a1f17SPablo Neira Ayuso state->hlen = hlen; 7578a6a1f17SPablo Neira Ayuso state->mtu = mtu; 7588a6a1f17SPablo Neira Ayuso 7598a6a1f17SPablo Neira Ayuso state->left = skb->len - hlen; /* Space per frame */ 7608a6a1f17SPablo Neira Ayuso state->ptr = hlen; /* Where to start from */ 7618a6a1f17SPablo Neira Ayuso 7628a6a1f17SPablo Neira Ayuso state->hroom = hdr_room; 7638a6a1f17SPablo Neira Ayuso state->troom = needed_tailroom; 7648a6a1f17SPablo Neira Ayuso 7658a6a1f17SPablo Neira Ayuso state->offset = 0; 7668a6a1f17SPablo Neira Ayuso } 7678a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_init); 7688a6a1f17SPablo Neira Ayuso 7698a6a1f17SPablo Neira Ayuso struct sk_buff *ip6_frag_next(struct sk_buff *skb, struct ip6_frag_state *state) 7708a6a1f17SPablo Neira Ayuso { 7718a6a1f17SPablo Neira Ayuso u8 *prevhdr = state->prevhdr, *fragnexthdr_offset; 7728a6a1f17SPablo Neira Ayuso struct sk_buff *frag; 7738a6a1f17SPablo Neira Ayuso struct frag_hdr *fh; 7748a6a1f17SPablo Neira Ayuso unsigned int len; 7758a6a1f17SPablo Neira Ayuso 7768a6a1f17SPablo Neira Ayuso len = state->left; 7778a6a1f17SPablo Neira Ayuso /* IF: it doesn't fit, use 'mtu' - the data space left */ 7788a6a1f17SPablo Neira Ayuso if (len > state->mtu) 7798a6a1f17SPablo Neira Ayuso len = state->mtu; 7808a6a1f17SPablo Neira Ayuso /* IF: we are not sending up to and including the packet end 7818a6a1f17SPablo Neira Ayuso then align the next start on an eight byte boundary */ 7828a6a1f17SPablo Neira Ayuso if (len < state->left) 7838a6a1f17SPablo Neira Ayuso len &= ~7; 7848a6a1f17SPablo Neira Ayuso 7858a6a1f17SPablo Neira Ayuso /* Allocate buffer */ 7868a6a1f17SPablo Neira Ayuso frag = alloc_skb(len + state->hlen + sizeof(struct frag_hdr) + 7878a6a1f17SPablo Neira Ayuso state->hroom + state->troom, GFP_ATOMIC); 7888a6a1f17SPablo Neira Ayuso if (!frag) 7898a6a1f17SPablo Neira Ayuso return ERR_PTR(-ENOMEM); 7908a6a1f17SPablo Neira Ayuso 7918a6a1f17SPablo Neira Ayuso /* 7928a6a1f17SPablo Neira Ayuso * Set up data on packet 7938a6a1f17SPablo Neira Ayuso */ 7948a6a1f17SPablo Neira Ayuso 7958a6a1f17SPablo Neira Ayuso ip6_copy_metadata(frag, skb); 7968a6a1f17SPablo Neira Ayuso skb_reserve(frag, state->hroom); 7978a6a1f17SPablo Neira Ayuso skb_put(frag, len + state->hlen + sizeof(struct frag_hdr)); 7988a6a1f17SPablo Neira Ayuso skb_reset_network_header(frag); 7998a6a1f17SPablo Neira Ayuso fh = (struct frag_hdr *)(skb_network_header(frag) + state->hlen); 8008a6a1f17SPablo Neira Ayuso frag->transport_header = (frag->network_header + state->hlen + 8018a6a1f17SPablo Neira Ayuso sizeof(struct frag_hdr)); 8028a6a1f17SPablo Neira Ayuso 8038a6a1f17SPablo Neira Ayuso /* 8048a6a1f17SPablo Neira Ayuso * Charge the memory for the fragment to any owner 8058a6a1f17SPablo Neira Ayuso * it might possess 8068a6a1f17SPablo Neira Ayuso */ 8078a6a1f17SPablo Neira Ayuso if (skb->sk) 8088a6a1f17SPablo Neira Ayuso skb_set_owner_w(frag, skb->sk); 8098a6a1f17SPablo Neira Ayuso 8108a6a1f17SPablo Neira Ayuso /* 8118a6a1f17SPablo Neira Ayuso * Copy the packet header into the new buffer. 8128a6a1f17SPablo Neira Ayuso */ 8138a6a1f17SPablo Neira Ayuso skb_copy_from_linear_data(skb, skb_network_header(frag), state->hlen); 8148a6a1f17SPablo Neira Ayuso 8158a6a1f17SPablo Neira Ayuso fragnexthdr_offset = skb_network_header(frag); 8168a6a1f17SPablo Neira Ayuso fragnexthdr_offset += prevhdr - skb_network_header(skb); 8178a6a1f17SPablo Neira Ayuso *fragnexthdr_offset = NEXTHDR_FRAGMENT; 8188a6a1f17SPablo Neira Ayuso 8198a6a1f17SPablo Neira Ayuso /* 8208a6a1f17SPablo Neira Ayuso * Build fragment header. 8218a6a1f17SPablo Neira Ayuso */ 8228a6a1f17SPablo Neira Ayuso fh->nexthdr = state->nexthdr; 8238a6a1f17SPablo Neira Ayuso fh->reserved = 0; 8248a6a1f17SPablo Neira Ayuso fh->identification = state->frag_id; 8258a6a1f17SPablo Neira Ayuso 8268a6a1f17SPablo Neira Ayuso /* 8278a6a1f17SPablo Neira Ayuso * Copy a block of the IP datagram. 8288a6a1f17SPablo Neira Ayuso */ 8298a6a1f17SPablo Neira Ayuso BUG_ON(skb_copy_bits(skb, state->ptr, skb_transport_header(frag), 8308a6a1f17SPablo Neira Ayuso len)); 8318a6a1f17SPablo Neira Ayuso state->left -= len; 8328a6a1f17SPablo Neira Ayuso 8338a6a1f17SPablo Neira Ayuso fh->frag_off = htons(state->offset); 8348a6a1f17SPablo Neira Ayuso if (state->left > 0) 8358a6a1f17SPablo Neira Ayuso fh->frag_off |= htons(IP6_MF); 8368a6a1f17SPablo Neira Ayuso ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr)); 8378a6a1f17SPablo Neira Ayuso 8388a6a1f17SPablo Neira Ayuso state->ptr += len; 8398a6a1f17SPablo Neira Ayuso state->offset += len; 8408a6a1f17SPablo Neira Ayuso 8418a6a1f17SPablo Neira Ayuso return frag; 8428a6a1f17SPablo Neira Ayuso } 8438a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_next); 8448a6a1f17SPablo Neira Ayuso 8457d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, 8467d8c6e39SEric W. Biederman int (*output)(struct net *, struct sock *, struct sk_buff *)) 8471da177e4SLinus Torvalds { 8481da177e4SLinus Torvalds struct sk_buff *frag; 849adf30907SEric Dumazet struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 850f60e5990Shannes@stressinduktion.org struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? 851f60e5990Shannes@stressinduktion.org inet6_sk(skb->sk) : NULL; 852a1ac9c8aSMartin KaFai Lau bool mono_delivery_time = skb->mono_delivery_time; 8538a6a1f17SPablo Neira Ayuso struct ip6_frag_state state; 8548a6a1f17SPablo Neira Ayuso unsigned int mtu, hlen, nexthdr_offset; 8559669fffcSEric Dumazet ktime_t tstamp = skb->tstamp; 8568a6a1f17SPablo Neira Ayuso int hroom, err = 0; 857286c2349SMartin KaFai Lau __be32 frag_id; 8581da177e4SLinus Torvalds u8 *prevhdr, nexthdr = 0; 8591da177e4SLinus Torvalds 8607dd7eb95SDavid S. Miller err = ip6_find_1stfragopt(skb, &prevhdr); 8617dd7eb95SDavid S. Miller if (err < 0) 8622423496aSCraig Gallek goto fail; 8637dd7eb95SDavid S. Miller hlen = err; 8641da177e4SLinus Torvalds nexthdr = *prevhdr; 865ef0efcd3SJunwei Hu nexthdr_offset = prevhdr - skb_network_header(skb); 8661da177e4SLinus Torvalds 867628a5c56SJohn Heffner mtu = ip6_skb_dst_mtu(skb); 868b881ef76SJohn Heffner 869b881ef76SJohn Heffner /* We must not fragment if the socket is set to force MTU discovery 87014f3ad6fSUlrich Weber * or if the skb it not generated by a local socket. 871b881ef76SJohn Heffner */ 872485fca66SFlorian Westphal if (unlikely(!skb->ignore_df && skb->len > mtu)) 873485fca66SFlorian Westphal goto fail_toobig; 874a34a101eSEric Dumazet 875485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size) { 876485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size > mtu) 877485fca66SFlorian Westphal goto fail_toobig; 878485fca66SFlorian Westphal 879485fca66SFlorian Westphal /* don't send fragments larger than what we received */ 880485fca66SFlorian Westphal mtu = IP6CB(skb)->frag_max_size; 881485fca66SFlorian Westphal if (mtu < IPV6_MIN_MTU) 882485fca66SFlorian Westphal mtu = IPV6_MIN_MTU; 883b881ef76SJohn Heffner } 884b881ef76SJohn Heffner 885d91675f9SYOSHIFUJI Hideaki if (np && np->frag_size < mtu) { 886d91675f9SYOSHIFUJI Hideaki if (np->frag_size) 887d91675f9SYOSHIFUJI Hideaki mtu = np->frag_size; 888d91675f9SYOSHIFUJI Hideaki } 88989bc7848SHannes Frederic Sowa if (mtu < hlen + sizeof(struct frag_hdr) + 8) 890b72a2b01SHannes Frederic Sowa goto fail_toobig; 8911e0d69a9SHannes Frederic Sowa mtu -= hlen + sizeof(struct frag_hdr); 8921da177e4SLinus Torvalds 893fd0273d7SMartin KaFai Lau frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr, 894fd0273d7SMartin KaFai Lau &ipv6_hdr(skb)->saddr); 895286c2349SMartin KaFai Lau 896405c92f7SHannes Frederic Sowa if (skb->ip_summed == CHECKSUM_PARTIAL && 897405c92f7SHannes Frederic Sowa (err = skb_checksum_help(skb))) 898405c92f7SHannes Frederic Sowa goto fail; 899405c92f7SHannes Frederic Sowa 900ef0efcd3SJunwei Hu prevhdr = skb_network_header(skb) + nexthdr_offset; 9011d325d21SFlorian Westphal hroom = LL_RESERVED_SPACE(rt->dst.dev); 90221dc3301SDavid S. Miller if (skb_has_frag_list(skb)) { 903c72d8cdaSAlexey Dobriyan unsigned int first_len = skb_pagelen(skb); 9040feca619SPablo Neira Ayuso struct ip6_fraglist_iter iter; 9053d13008eSEric Dumazet struct sk_buff *frag2; 9061da177e4SLinus Torvalds 9071da177e4SLinus Torvalds if (first_len - hlen > mtu || 9081da177e4SLinus Torvalds ((first_len - hlen) & 7) || 9091d325d21SFlorian Westphal skb_cloned(skb) || 9101d325d21SFlorian Westphal skb_headroom(skb) < (hroom + sizeof(struct frag_hdr))) 9111da177e4SLinus Torvalds goto slow_path; 9121da177e4SLinus Torvalds 9134d9092bbSDavid S. Miller skb_walk_frags(skb, frag) { 9141da177e4SLinus Torvalds /* Correct geometry. */ 9151da177e4SLinus Torvalds if (frag->len > mtu || 9161da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 9171d325d21SFlorian Westphal skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr))) 9183d13008eSEric Dumazet goto slow_path_clean; 9191da177e4SLinus Torvalds 9201da177e4SLinus Torvalds /* Partially cloned skb? */ 9211da177e4SLinus Torvalds if (skb_shared(frag)) 9223d13008eSEric Dumazet goto slow_path_clean; 9232fdba6b0SHerbert Xu 9242fdba6b0SHerbert Xu BUG_ON(frag->sk); 9252fdba6b0SHerbert Xu if (skb->sk) { 9262fdba6b0SHerbert Xu frag->sk = skb->sk; 9272fdba6b0SHerbert Xu frag->destructor = sock_wfree; 9282fdba6b0SHerbert Xu } 9293d13008eSEric Dumazet skb->truesize -= frag->truesize; 9301da177e4SLinus Torvalds } 9311da177e4SLinus Torvalds 9320feca619SPablo Neira Ayuso err = ip6_fraglist_init(skb, hlen, prevhdr, nexthdr, frag_id, 9330feca619SPablo Neira Ayuso &iter); 9340feca619SPablo Neira Ayuso if (err < 0) 9351d325d21SFlorian Westphal goto fail; 9361da177e4SLinus Torvalds 937803e8486SEric Dumazet /* We prevent @rt from being freed. */ 938803e8486SEric Dumazet rcu_read_lock(); 939803e8486SEric Dumazet 9401da177e4SLinus Torvalds for (;;) { 9411da177e4SLinus Torvalds /* Prepare header of the next frame, 9421da177e4SLinus Torvalds * before previous one went down. */ 9430feca619SPablo Neira Ayuso if (iter.frag) 9440feca619SPablo Neira Ayuso ip6_fraglist_prepare(skb, &iter); 9451da177e4SLinus Torvalds 946a1ac9c8aSMartin KaFai Lau skb_set_delivery_time(skb, tstamp, mono_delivery_time); 9477d8c6e39SEric W. Biederman err = output(net, sk, skb); 948dafee490SWei Dong if (!err) 949d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9503bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 951dafee490SWei Dong 9520feca619SPablo Neira Ayuso if (err || !iter.frag) 9531da177e4SLinus Torvalds break; 9541da177e4SLinus Torvalds 9550feca619SPablo Neira Ayuso skb = ip6_fraglist_next(&iter); 9561da177e4SLinus Torvalds } 9571da177e4SLinus Torvalds 9580feca619SPablo Neira Ayuso kfree(iter.tmp_hdr); 9591da177e4SLinus Torvalds 9601da177e4SLinus Torvalds if (err == 0) { 961d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9623bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGOKS); 963803e8486SEric Dumazet rcu_read_unlock(); 9641da177e4SLinus Torvalds return 0; 9651da177e4SLinus Torvalds } 9661da177e4SLinus Torvalds 967b7034146SEric Dumazet kfree_skb_list(iter.frag); 9681da177e4SLinus Torvalds 969d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 9703bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 971803e8486SEric Dumazet rcu_read_unlock(); 9721da177e4SLinus Torvalds return err; 9733d13008eSEric Dumazet 9743d13008eSEric Dumazet slow_path_clean: 9753d13008eSEric Dumazet skb_walk_frags(skb, frag2) { 9763d13008eSEric Dumazet if (frag2 == frag) 9773d13008eSEric Dumazet break; 9783d13008eSEric Dumazet frag2->sk = NULL; 9793d13008eSEric Dumazet frag2->destructor = NULL; 9803d13008eSEric Dumazet skb->truesize += frag2->truesize; 9813d13008eSEric Dumazet } 9821da177e4SLinus Torvalds } 9831da177e4SLinus Torvalds 9841da177e4SLinus Torvalds slow_path: 9851da177e4SLinus Torvalds /* 9861da177e4SLinus Torvalds * Fragment the datagram. 9871da177e4SLinus Torvalds */ 9881da177e4SLinus Torvalds 9898a6a1f17SPablo Neira Ayuso ip6_frag_init(skb, hlen, mtu, rt->dst.dev->needed_tailroom, 9908a6a1f17SPablo Neira Ayuso LL_RESERVED_SPACE(rt->dst.dev), prevhdr, nexthdr, frag_id, 9918a6a1f17SPablo Neira Ayuso &state); 9921da177e4SLinus Torvalds 9931da177e4SLinus Torvalds /* 9941da177e4SLinus Torvalds * Keep copying data until we run out. 9951da177e4SLinus Torvalds */ 99679e49503SFlorian Westphal 9978a6a1f17SPablo Neira Ayuso while (state.left > 0) { 9988a6a1f17SPablo Neira Ayuso frag = ip6_frag_next(skb, &state); 9998a6a1f17SPablo Neira Ayuso if (IS_ERR(frag)) { 10008a6a1f17SPablo Neira Ayuso err = PTR_ERR(frag); 10011da177e4SLinus Torvalds goto fail; 10021da177e4SLinus Torvalds } 10031da177e4SLinus Torvalds 10041da177e4SLinus Torvalds /* 10051da177e4SLinus Torvalds * Put this fragment into the sending queue. 10061da177e4SLinus Torvalds */ 1007a1ac9c8aSMartin KaFai Lau skb_set_delivery_time(frag, tstamp, mono_delivery_time); 10087d8c6e39SEric W. Biederman err = output(net, sk, frag); 10091da177e4SLinus Torvalds if (err) 10101da177e4SLinus Torvalds goto fail; 1011dafee490SWei Dong 1012adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 10133bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 10141da177e4SLinus Torvalds } 1015adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 1016a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGOKS); 1017808db80aSEric Dumazet consume_skb(skb); 10181da177e4SLinus Torvalds return err; 10191da177e4SLinus Torvalds 1020485fca66SFlorian Westphal fail_toobig: 1021485fca66SFlorian Westphal if (skb->sk && dst_allfrag(skb_dst(skb))) 1022aba54656SEric Dumazet sk_gso_disable(skb->sk); 1023485fca66SFlorian Westphal 1024485fca66SFlorian Westphal icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 1025485fca66SFlorian Westphal err = -EMSGSIZE; 1026485fca66SFlorian Westphal 10271da177e4SLinus Torvalds fail: 1028adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 1029a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 10301da177e4SLinus Torvalds kfree_skb(skb); 10311da177e4SLinus Torvalds return err; 10321da177e4SLinus Torvalds } 10331da177e4SLinus Torvalds 1034b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key, 1035b71d1d42SEric Dumazet const struct in6_addr *fl_addr, 1036b71d1d42SEric Dumazet const struct in6_addr *addr_cache) 1037cf6b1982SYOSHIFUJI Hideaki { 1038a02cec21SEric Dumazet return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) && 103963159f29SIan Morris (!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache)); 1040cf6b1982SYOSHIFUJI Hideaki } 1041cf6b1982SYOSHIFUJI Hideaki 1042497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk, 1043497c615aSHerbert Xu struct dst_entry *dst, 1044b71d1d42SEric Dumazet const struct flowi6 *fl6) 10451da177e4SLinus Torvalds { 10461da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 1047a963a37dSEric Dumazet struct rt6_info *rt; 10481da177e4SLinus Torvalds 1049497c615aSHerbert Xu if (!dst) 1050497c615aSHerbert Xu goto out; 10511da177e4SLinus Torvalds 1052a963a37dSEric Dumazet if (dst->ops->family != AF_INET6) { 1053a963a37dSEric Dumazet dst_release(dst); 1054a963a37dSEric Dumazet return NULL; 1055a963a37dSEric Dumazet } 1056a963a37dSEric Dumazet 1057a963a37dSEric Dumazet rt = (struct rt6_info *)dst; 10581da177e4SLinus Torvalds /* Yes, checking route validity in not connected 1059d76e60a5SDavid S. Miller * case is not very simple. Take into account, 1060d76e60a5SDavid S. Miller * that we do not support routing by source, TOS, 1061d76e60a5SDavid S. Miller * and MSG_DONTROUTE --ANK (980726) 1062d76e60a5SDavid S. Miller * 1063cf6b1982SYOSHIFUJI Hideaki * 1. ip6_rt_check(): If route was host route, 1064cf6b1982SYOSHIFUJI Hideaki * check that cached destination is current. 1065d76e60a5SDavid S. Miller * If it is network route, we still may 1066d76e60a5SDavid S. Miller * check its validity using saved pointer 1067d76e60a5SDavid S. Miller * to the last used address: daddr_cache. 1068d76e60a5SDavid S. Miller * We do not want to save whole address now, 1069d76e60a5SDavid S. Miller * (because main consumer of this service 1070d76e60a5SDavid S. Miller * is tcp, which has not this problem), 1071d76e60a5SDavid S. Miller * so that the last trick works only on connected 1072d76e60a5SDavid S. Miller * sockets. 1073d76e60a5SDavid S. Miller * 2. oif also should be the same. 10741da177e4SLinus Torvalds */ 10754c9483b2SDavid S. Miller if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) || 10768e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES 10774c9483b2SDavid S. Miller ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) || 10788e1ef0a9SYOSHIFUJI Hideaki #endif 107940867d74SDavid Ahern (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex)) { 1080497c615aSHerbert Xu dst_release(dst); 1081497c615aSHerbert Xu dst = NULL; 10821da177e4SLinus Torvalds } 1083497c615aSHerbert Xu 1084497c615aSHerbert Xu out: 1085497c615aSHerbert Xu return dst; 10861da177e4SLinus Torvalds } 1087497c615aSHerbert Xu 10883aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, 10894c9483b2SDavid S. Miller struct dst_entry **dst, struct flowi6 *fl6) 1090497c615aSHerbert Xu { 109169cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 109269cce1d1SDavid S. Miller struct neighbour *n; 109397cac082SDavid S. Miller struct rt6_info *rt; 109469cce1d1SDavid S. Miller #endif 109569cce1d1SDavid S. Miller int err; 10966f21c96aSPaolo Abeni int flags = 0; 10971da177e4SLinus Torvalds 1098e16e888bSMarkus Stenberg /* The correct way to handle this would be to do 1099e16e888bSMarkus Stenberg * ip6_route_get_saddr, and then ip6_route_output; however, 1100e16e888bSMarkus Stenberg * the route-specific preferred source forces the 1101e16e888bSMarkus Stenberg * ip6_route_output call _before_ ip6_route_get_saddr. 1102e16e888bSMarkus Stenberg * 1103e16e888bSMarkus Stenberg * In source specific routing (no src=any default route), 1104e16e888bSMarkus Stenberg * ip6_route_output will fail given src=any saddr, though, so 1105e16e888bSMarkus Stenberg * that's why we try it again later. 1106e16e888bSMarkus Stenberg */ 1107c305b9e6Szhang kai if (ipv6_addr_any(&fl6->saddr)) { 1108a68886a6SDavid Ahern struct fib6_info *from; 1109e16e888bSMarkus Stenberg struct rt6_info *rt; 1110e16e888bSMarkus Stenberg 1111e16e888bSMarkus Stenberg *dst = ip6_route_output(net, sk, fl6); 1112e16e888bSMarkus Stenberg rt = (*dst)->error ? NULL : (struct rt6_info *)*dst; 1113a68886a6SDavid Ahern 1114a68886a6SDavid Ahern rcu_read_lock(); 1115a68886a6SDavid Ahern from = rt ? rcu_dereference(rt->from) : NULL; 1116a68886a6SDavid Ahern err = ip6_route_get_saddr(net, from, &fl6->daddr, 1117e16e888bSMarkus Stenberg sk ? inet6_sk(sk)->srcprefs : 0, 1118e16e888bSMarkus Stenberg &fl6->saddr); 1119a68886a6SDavid Ahern rcu_read_unlock(); 1120a68886a6SDavid Ahern 1121e16e888bSMarkus Stenberg if (err) 1122e16e888bSMarkus Stenberg goto out_err_release; 1123e16e888bSMarkus Stenberg 1124e16e888bSMarkus Stenberg /* If we had an erroneous initial result, pretend it 1125e16e888bSMarkus Stenberg * never existed and let the SA-enabled version take 1126e16e888bSMarkus Stenberg * over. 1127e16e888bSMarkus Stenberg */ 1128c305b9e6Szhang kai if ((*dst)->error) { 1129e16e888bSMarkus Stenberg dst_release(*dst); 1130e16e888bSMarkus Stenberg *dst = NULL; 1131e16e888bSMarkus Stenberg } 11326f21c96aSPaolo Abeni 11336f21c96aSPaolo Abeni if (fl6->flowi6_oif) 11346f21c96aSPaolo Abeni flags |= RT6_LOOKUP_F_IFACE; 1135e16e888bSMarkus Stenberg } 1136e16e888bSMarkus Stenberg 113763159f29SIan Morris if (!*dst) 11386f21c96aSPaolo Abeni *dst = ip6_route_output_flags(net, sk, fl6, flags); 11391da177e4SLinus Torvalds 1140e5d08d71SIan Morris err = (*dst)->error; 1141e5d08d71SIan Morris if (err) 11421da177e4SLinus Torvalds goto out_err_release; 11431da177e4SLinus Torvalds 114495c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 114595c385b4SNeil Horman /* 114695c385b4SNeil Horman * Here if the dst entry we've looked up 114795c385b4SNeil Horman * has a neighbour entry that is in the INCOMPLETE 114895c385b4SNeil Horman * state and the src address from the flow is 114995c385b4SNeil Horman * marked as OPTIMISTIC, we release the found 115095c385b4SNeil Horman * dst entry and replace it instead with the 115195c385b4SNeil Horman * dst entry of the nexthop router 115295c385b4SNeil Horman */ 1153c56bf6feSEric Dumazet rt = (struct rt6_info *) *dst; 115409eed119SEric Dumazet rcu_read_lock(); 11552647a9b0SMartin KaFai Lau n = __ipv6_neigh_lookup_noref(rt->dst.dev, 11562647a9b0SMartin KaFai Lau rt6_nexthop(rt, &fl6->daddr)); 1157b071af52SEric Dumazet err = n && !(READ_ONCE(n->nud_state) & NUD_VALID) ? -EINVAL : 0; 115809eed119SEric Dumazet rcu_read_unlock(); 1159707be1ffSYOSHIFUJI Hideaki / 吉藤英明 1160707be1ffSYOSHIFUJI Hideaki / 吉藤英明 if (err) { 116195c385b4SNeil Horman struct inet6_ifaddr *ifp; 11624c9483b2SDavid S. Miller struct flowi6 fl_gw6; 116395c385b4SNeil Horman int redirect; 116495c385b4SNeil Horman 11654c9483b2SDavid S. Miller ifp = ipv6_get_ifaddr(net, &fl6->saddr, 11661cab3da6SDaniel Lezcano (*dst)->dev, 1); 116795c385b4SNeil Horman 116895c385b4SNeil Horman redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC); 116995c385b4SNeil Horman if (ifp) 117095c385b4SNeil Horman in6_ifa_put(ifp); 117195c385b4SNeil Horman 117295c385b4SNeil Horman if (redirect) { 117395c385b4SNeil Horman /* 117495c385b4SNeil Horman * We need to get the dst entry for the 117595c385b4SNeil Horman * default router instead 117695c385b4SNeil Horman */ 117795c385b4SNeil Horman dst_release(*dst); 11784c9483b2SDavid S. Miller memcpy(&fl_gw6, fl6, sizeof(struct flowi6)); 11794c9483b2SDavid S. Miller memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr)); 11804c9483b2SDavid S. Miller *dst = ip6_route_output(net, sk, &fl_gw6); 1181e5d08d71SIan Morris err = (*dst)->error; 1182e5d08d71SIan Morris if (err) 118395c385b4SNeil Horman goto out_err_release; 118495c385b4SNeil Horman } 118595c385b4SNeil Horman } 118695c385b4SNeil Horman #endif 1187ec5e3b0aSJonathan T. Leighton if (ipv6_addr_v4mapped(&fl6->saddr) && 118800ea1ceeSWillem de Bruijn !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) { 118900ea1ceeSWillem de Bruijn err = -EAFNOSUPPORT; 119000ea1ceeSWillem de Bruijn goto out_err_release; 119100ea1ceeSWillem de Bruijn } 119295c385b4SNeil Horman 11931da177e4SLinus Torvalds return 0; 11941da177e4SLinus Torvalds 11951da177e4SLinus Torvalds out_err_release: 11961da177e4SLinus Torvalds dst_release(*dst); 11971da177e4SLinus Torvalds *dst = NULL; 11988a966fc0SDavid Ahern 11990d240e78SDavid Ahern if (err == -ENETUNREACH) 12000d240e78SDavid Ahern IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES); 12011da177e4SLinus Torvalds return err; 12021da177e4SLinus Torvalds } 120334a0b3cdSAdrian Bunk 1204497c615aSHerbert Xu /** 1205497c615aSHerbert Xu * ip6_dst_lookup - perform route lookup on flow 1206b51cd7c8SAndrew Lunn * @net: Network namespace to perform lookup in 1207497c615aSHerbert Xu * @sk: socket which provides route info 1208497c615aSHerbert Xu * @dst: pointer to dst_entry * for result 12094c9483b2SDavid S. Miller * @fl6: flow to lookup 1210497c615aSHerbert Xu * 1211497c615aSHerbert Xu * This function performs a route lookup on the given flow. 1212497c615aSHerbert Xu * 1213497c615aSHerbert Xu * It returns zero on success, or a standard errno code on error. 1214497c615aSHerbert Xu */ 1215343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst, 1216343d60aaSRoopa Prabhu struct flowi6 *fl6) 1217497c615aSHerbert Xu { 1218497c615aSHerbert Xu *dst = NULL; 1219343d60aaSRoopa Prabhu return ip6_dst_lookup_tail(net, sk, dst, fl6); 1220497c615aSHerbert Xu } 12213cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup); 12223cf3dc6cSArnaldo Carvalho de Melo 1223497c615aSHerbert Xu /** 122468d0c6d3SDavid S. Miller * ip6_dst_lookup_flow - perform route lookup on flow with ipsec 1225b51cd7c8SAndrew Lunn * @net: Network namespace to perform lookup in 122668d0c6d3SDavid S. Miller * @sk: socket which provides route info 12274c9483b2SDavid S. Miller * @fl6: flow to lookup 122868d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 122968d0c6d3SDavid S. Miller * 123068d0c6d3SDavid S. Miller * This function performs a route lookup on the given flow. 123168d0c6d3SDavid S. Miller * 123268d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 123368d0c6d3SDavid S. Miller * error code. 123468d0c6d3SDavid S. Miller */ 1235c4e85f73SSabrina Dubroca struct dst_entry *ip6_dst_lookup_flow(struct net *net, const struct sock *sk, struct flowi6 *fl6, 12360e0d44abSSteffen Klassert const struct in6_addr *final_dst) 123768d0c6d3SDavid S. Miller { 123868d0c6d3SDavid S. Miller struct dst_entry *dst = NULL; 123968d0c6d3SDavid S. Miller int err; 124068d0c6d3SDavid S. Miller 1241c4e85f73SSabrina Dubroca err = ip6_dst_lookup_tail(net, sk, &dst, fl6); 124268d0c6d3SDavid S. Miller if (err) 124368d0c6d3SDavid S. Miller return ERR_PTR(err); 124468d0c6d3SDavid S. Miller if (final_dst) 12454e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 12462774c131SDavid S. Miller 1247c4e85f73SSabrina Dubroca return xfrm_lookup_route(net, dst, flowi6_to_flowi(fl6), sk, 0); 124868d0c6d3SDavid S. Miller } 124968d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow); 125068d0c6d3SDavid S. Miller 125168d0c6d3SDavid S. Miller /** 125268d0c6d3SDavid S. Miller * ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow 125368d0c6d3SDavid S. Miller * @sk: socket which provides the dst cache and route info 12544c9483b2SDavid S. Miller * @fl6: flow to lookup 125568d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 125696818159SAlexey Kodanev * @connected: whether @sk is connected or not 1257497c615aSHerbert Xu * 1258497c615aSHerbert Xu * This function performs a route lookup on the given flow with the 1259497c615aSHerbert Xu * possibility of using the cached route in the socket if it is valid. 1260497c615aSHerbert Xu * It will take the socket dst lock when operating on the dst cache. 1261497c615aSHerbert Xu * As a result, this function can only be used in process context. 1262497c615aSHerbert Xu * 126396818159SAlexey Kodanev * In addition, for a connected socket, cache the dst in the socket 126496818159SAlexey Kodanev * if the current cache is not valid. 126596818159SAlexey Kodanev * 126668d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 126768d0c6d3SDavid S. Miller * error code. 1268497c615aSHerbert Xu */ 12694c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6, 127096818159SAlexey Kodanev const struct in6_addr *final_dst, 127196818159SAlexey Kodanev bool connected) 1272497c615aSHerbert Xu { 127368d0c6d3SDavid S. Miller struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie); 1274497c615aSHerbert Xu 12754c9483b2SDavid S. Miller dst = ip6_sk_dst_check(sk, dst, fl6); 127696818159SAlexey Kodanev if (dst) 127796818159SAlexey Kodanev return dst; 127896818159SAlexey Kodanev 1279c4e85f73SSabrina Dubroca dst = ip6_dst_lookup_flow(sock_net(sk), sk, fl6, final_dst); 128096818159SAlexey Kodanev if (connected && !IS_ERR(dst)) 128196818159SAlexey Kodanev ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6); 128268d0c6d3SDavid S. Miller 128300bc0ef5SJakub Sitnicki return dst; 128468d0c6d3SDavid S. Miller } 128568d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow); 1286497c615aSHerbert Xu 1287571912c6SMartin Varghese /** 1288571912c6SMartin Varghese * ip6_dst_lookup_tunnel - perform route lookup on tunnel 1289571912c6SMartin Varghese * @skb: Packet for which lookup is done 1290571912c6SMartin Varghese * @dev: Tunnel device 1291571912c6SMartin Varghese * @net: Network namespace of tunnel device 1292b51cd7c8SAndrew Lunn * @sock: Socket which provides route info 1293571912c6SMartin Varghese * @saddr: Memory to store the src ip address 1294571912c6SMartin Varghese * @info: Tunnel information 1295571912c6SMartin Varghese * @protocol: IP protocol 1296b51cd7c8SAndrew Lunn * @use_cache: Flag to enable cache usage 1297571912c6SMartin Varghese * This function performs a route lookup on a tunnel 1298571912c6SMartin Varghese * 1299571912c6SMartin Varghese * It returns a valid dst pointer and stores src address to be used in 1300571912c6SMartin Varghese * tunnel in param saddr on success, else a pointer encoded error code. 1301571912c6SMartin Varghese */ 1302571912c6SMartin Varghese 1303571912c6SMartin Varghese struct dst_entry *ip6_dst_lookup_tunnel(struct sk_buff *skb, 1304571912c6SMartin Varghese struct net_device *dev, 1305571912c6SMartin Varghese struct net *net, 1306571912c6SMartin Varghese struct socket *sock, 1307571912c6SMartin Varghese struct in6_addr *saddr, 1308571912c6SMartin Varghese const struct ip_tunnel_info *info, 1309571912c6SMartin Varghese u8 protocol, 1310571912c6SMartin Varghese bool use_cache) 1311571912c6SMartin Varghese { 1312571912c6SMartin Varghese struct dst_entry *dst = NULL; 1313571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1314571912c6SMartin Varghese struct dst_cache *dst_cache; 1315571912c6SMartin Varghese #endif 1316571912c6SMartin Varghese struct flowi6 fl6; 1317571912c6SMartin Varghese __u8 prio; 1318571912c6SMartin Varghese 1319571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1320571912c6SMartin Varghese dst_cache = (struct dst_cache *)&info->dst_cache; 1321571912c6SMartin Varghese if (use_cache) { 1322571912c6SMartin Varghese dst = dst_cache_get_ip6(dst_cache, saddr); 1323571912c6SMartin Varghese if (dst) 1324571912c6SMartin Varghese return dst; 1325571912c6SMartin Varghese } 1326571912c6SMartin Varghese #endif 1327571912c6SMartin Varghese memset(&fl6, 0, sizeof(fl6)); 1328571912c6SMartin Varghese fl6.flowi6_mark = skb->mark; 1329571912c6SMartin Varghese fl6.flowi6_proto = protocol; 1330571912c6SMartin Varghese fl6.daddr = info->key.u.ipv6.dst; 1331571912c6SMartin Varghese fl6.saddr = info->key.u.ipv6.src; 1332571912c6SMartin Varghese prio = info->key.tos; 1333ab7e2e0dSMatthias May fl6.flowlabel = ip6_make_flowinfo(prio, info->key.label); 1334571912c6SMartin Varghese 1335571912c6SMartin Varghese dst = ipv6_stub->ipv6_dst_lookup_flow(net, sock->sk, &fl6, 1336571912c6SMartin Varghese NULL); 1337571912c6SMartin Varghese if (IS_ERR(dst)) { 1338571912c6SMartin Varghese netdev_dbg(dev, "no route to %pI6\n", &fl6.daddr); 1339571912c6SMartin Varghese return ERR_PTR(-ENETUNREACH); 1340571912c6SMartin Varghese } 1341571912c6SMartin Varghese if (dst->dev == dev) { /* is this necessary? */ 1342571912c6SMartin Varghese netdev_dbg(dev, "circular route to %pI6\n", &fl6.daddr); 1343571912c6SMartin Varghese dst_release(dst); 1344571912c6SMartin Varghese return ERR_PTR(-ELOOP); 1345571912c6SMartin Varghese } 1346571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE 1347571912c6SMartin Varghese if (use_cache) 1348571912c6SMartin Varghese dst_cache_set_ip6(dst_cache, dst, &fl6.saddr); 1349571912c6SMartin Varghese #endif 1350571912c6SMartin Varghese *saddr = fl6.saddr; 1351571912c6SMartin Varghese return dst; 1352571912c6SMartin Varghese } 1353571912c6SMartin Varghese EXPORT_SYMBOL_GPL(ip6_dst_lookup_tunnel); 1354571912c6SMartin Varghese 13550178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src, 13560178b695SHerbert Xu gfp_t gfp) 13570178b695SHerbert Xu { 13580178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 13590178b695SHerbert Xu } 13600178b695SHerbert Xu 13610178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src, 13620178b695SHerbert Xu gfp_t gfp) 13630178b695SHerbert Xu { 13640178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 13650178b695SHerbert Xu } 13660178b695SHerbert Xu 136775a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu, 13680c183379SGao feng int *maxfraglen, 13690c183379SGao feng unsigned int fragheaderlen, 13700c183379SGao feng struct sk_buff *skb, 137175a493e6SHannes Frederic Sowa struct rt6_info *rt, 1372e367c2d0Slucien unsigned int orig_mtu) 13730c183379SGao feng { 13740c183379SGao feng if (!(rt->dst.flags & DST_XFRM_TUNNEL)) { 137563159f29SIan Morris if (!skb) { 13760c183379SGao feng /* first fragment, reserve header_len */ 1377e367c2d0Slucien *mtu = orig_mtu - rt->dst.header_len; 13780c183379SGao feng 13790c183379SGao feng } else { 13800c183379SGao feng /* 13810c183379SGao feng * this fragment is not first, the headers 13820c183379SGao feng * space is regarded as data space. 13830c183379SGao feng */ 1384e367c2d0Slucien *mtu = orig_mtu; 13850c183379SGao feng } 13860c183379SGao feng *maxfraglen = ((*mtu - fragheaderlen) & ~7) 13870c183379SGao feng + fragheaderlen - sizeof(struct frag_hdr); 13880c183379SGao feng } 13890c183379SGao feng } 13900c183379SGao feng 1391366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork, 139226879da5SWei Wang struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6, 1393f37a4cc6SPavel Begunkov struct rt6_info *rt) 1394366e41d9SVlad Yasevich { 1395366e41d9SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 1396366e41d9SVlad Yasevich unsigned int mtu; 1397d656b2eaSPavel Begunkov struct ipv6_txoptions *nopt, *opt = ipc6->opt; 1398366e41d9SVlad Yasevich 139940ac240cSPavel Begunkov /* callers pass dst together with a reference, set it first so 140040ac240cSPavel Begunkov * ip6_cork_release() can put it down even in case of an error. 140140ac240cSPavel Begunkov */ 140240ac240cSPavel Begunkov cork->base.dst = &rt->dst; 140340ac240cSPavel Begunkov 1404366e41d9SVlad Yasevich /* 1405366e41d9SVlad Yasevich * setup for corking 1406366e41d9SVlad Yasevich */ 1407366e41d9SVlad Yasevich if (opt) { 1408366e41d9SVlad Yasevich if (WARN_ON(v6_cork->opt)) 1409366e41d9SVlad Yasevich return -EINVAL; 1410366e41d9SVlad Yasevich 1411d656b2eaSPavel Begunkov nopt = v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation); 1412d656b2eaSPavel Begunkov if (unlikely(!nopt)) 1413366e41d9SVlad Yasevich return -ENOBUFS; 1414366e41d9SVlad Yasevich 1415d656b2eaSPavel Begunkov nopt->tot_len = sizeof(*opt); 1416d656b2eaSPavel Begunkov nopt->opt_flen = opt->opt_flen; 1417d656b2eaSPavel Begunkov nopt->opt_nflen = opt->opt_nflen; 1418366e41d9SVlad Yasevich 1419d656b2eaSPavel Begunkov nopt->dst0opt = ip6_opt_dup(opt->dst0opt, sk->sk_allocation); 1420d656b2eaSPavel Begunkov if (opt->dst0opt && !nopt->dst0opt) 1421366e41d9SVlad Yasevich return -ENOBUFS; 1422366e41d9SVlad Yasevich 1423d656b2eaSPavel Begunkov nopt->dst1opt = ip6_opt_dup(opt->dst1opt, sk->sk_allocation); 1424d656b2eaSPavel Begunkov if (opt->dst1opt && !nopt->dst1opt) 1425366e41d9SVlad Yasevich return -ENOBUFS; 1426366e41d9SVlad Yasevich 1427d656b2eaSPavel Begunkov nopt->hopopt = ip6_opt_dup(opt->hopopt, sk->sk_allocation); 1428d656b2eaSPavel Begunkov if (opt->hopopt && !nopt->hopopt) 1429366e41d9SVlad Yasevich return -ENOBUFS; 1430366e41d9SVlad Yasevich 1431d656b2eaSPavel Begunkov nopt->srcrt = ip6_rthdr_dup(opt->srcrt, sk->sk_allocation); 1432d656b2eaSPavel Begunkov if (opt->srcrt && !nopt->srcrt) 1433366e41d9SVlad Yasevich return -ENOBUFS; 1434366e41d9SVlad Yasevich 1435366e41d9SVlad Yasevich /* need source address above miyazawa*/ 1436366e41d9SVlad Yasevich } 143726879da5SWei Wang v6_cork->hop_limit = ipc6->hlimit; 143826879da5SWei Wang v6_cork->tclass = ipc6->tclass; 1439366e41d9SVlad Yasevich if (rt->dst.flags & DST_XFRM_TUNNEL) 1440366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1441749439bfSMike Maloney READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst); 1442366e41d9SVlad Yasevich else 1443366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1444c02b3741SDavid S. Miller READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst)); 1445366e41d9SVlad Yasevich if (np->frag_size < mtu) { 1446366e41d9SVlad Yasevich if (np->frag_size) 1447366e41d9SVlad Yasevich mtu = np->frag_size; 1448366e41d9SVlad Yasevich } 1449366e41d9SVlad Yasevich cork->base.fragsize = mtu; 1450fbf47813SWillem de Bruijn cork->base.gso_size = ipc6->gso_size; 1451678ca42dSWillem de Bruijn cork->base.tx_flags = 0; 1452c6af0c22SWillem de Bruijn cork->base.mark = ipc6->sockc.mark; 1453678ca42dSWillem de Bruijn sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags); 1454bec1f6f6SWillem de Bruijn 14550f6c480fSDavid Miller if (dst_allfrag(xfrm_dst_path(&rt->dst))) 1456366e41d9SVlad Yasevich cork->base.flags |= IPCORK_ALLFRAG; 1457366e41d9SVlad Yasevich cork->base.length = 0; 1458366e41d9SVlad Yasevich 14595fdaa88dSWillem de Bruijn cork->base.transmit_time = ipc6->sockc.transmit_time; 1460a818f75eSJesus Sanchez-Palencia 1461366e41d9SVlad Yasevich return 0; 1462366e41d9SVlad Yasevich } 1463366e41d9SVlad Yasevich 14640bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk, 14650bbe84a6SVlad Yasevich struct sk_buff_head *queue, 1466f3b46a3eSPavel Begunkov struct inet_cork_full *cork_full, 14670bbe84a6SVlad Yasevich struct inet6_cork *v6_cork, 14680bbe84a6SVlad Yasevich struct page_frag *pfrag, 14690bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, 14700bbe84a6SVlad Yasevich int len, int odd, struct sk_buff *skb), 1471f93431c8SWang Yufen void *from, size_t length, int transhdrlen, 14725fdaa88dSWillem de Bruijn unsigned int flags, struct ipcm6_cookie *ipc6) 14731da177e4SLinus Torvalds { 14740c183379SGao feng struct sk_buff *skb, *skb_prev = NULL; 1475f3b46a3eSPavel Begunkov struct inet_cork *cork = &cork_full->base; 1476f37a4cc6SPavel Begunkov struct flowi6 *fl6 = &cork_full->fl.u.ip6; 147710b8a3deSPaolo Abeni unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu; 1478b5947e5dSWillem de Bruijn struct ubuf_info *uarg = NULL; 14790bbe84a6SVlad Yasevich int exthdrlen = 0; 14800bbe84a6SVlad Yasevich int dst_exthdrlen = 0; 14811da177e4SLinus Torvalds int hh_len; 14821da177e4SLinus Torvalds int copy; 14831da177e4SLinus Torvalds int err; 14841da177e4SLinus Torvalds int offset = 0; 1485773ba4feSPavel Begunkov bool zc = false; 148609c2d251SWillem de Bruijn u32 tskey = 0; 14870bbe84a6SVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->dst; 14880bbe84a6SVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 148932dce968SVlad Yasevich int csummode = CHECKSUM_NONE; 1490682b1a9dSHannes Frederic Sowa unsigned int maxnonfragsize, headersize; 14911f4c6eb2SEric Dumazet unsigned int wmem_alloc_delta = 0; 1492100f6d8eSWillem de Bruijn bool paged, extra_uref = false; 14931da177e4SLinus Torvalds 14940bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 14950bbe84a6SVlad Yasevich if (!skb) { 14960bbe84a6SVlad Yasevich exthdrlen = opt ? opt->opt_flen : 0; 14977efdba5bSRomain KUNTZ dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len; 14981da177e4SLinus Torvalds } 14990bbe84a6SVlad Yasevich 150015e36f5bSWillem de Bruijn paged = !!cork->gso_size; 1501bec1f6f6SWillem de Bruijn mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize; 1502e367c2d0Slucien orig_mtu = mtu; 15031da177e4SLinus Torvalds 15048ca5a579SVadim Fedorenko if (cork->tx_flags & SKBTX_ANY_TSTAMP && 1505678ca42dSWillem de Bruijn sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID) 1506a1cdec57SEric Dumazet tskey = atomic_inc_return(&sk->sk_tskey) - 1; 1507678ca42dSWillem de Bruijn 1508d8d1f30bSChangli Gao hh_len = LL_RESERVED_SPACE(rt->dst.dev); 15091da177e4SLinus Torvalds 1510a1b05140SMasahide NAKAMURA fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len + 1511b4ce9277SHerbert Xu (opt ? opt->opt_nflen : 0); 15121da177e4SLinus Torvalds 15134df98e76SHannes Frederic Sowa headersize = sizeof(struct ipv6hdr) + 15143a1cebe7SHannes Frederic Sowa (opt ? opt->opt_flen + opt->opt_nflen : 0) + 15154df98e76SHannes Frederic Sowa (dst_allfrag(&rt->dst) ? 15164df98e76SHannes Frederic Sowa sizeof(struct frag_hdr) : 0) + 15174df98e76SHannes Frederic Sowa rt->rt6i_nfheader_len; 15184df98e76SHannes Frederic Sowa 15195e34af41STadeusz Struk if (mtu <= fragheaderlen || 15205e34af41STadeusz Struk ((mtu - fragheaderlen) & ~7) + fragheaderlen <= sizeof(struct frag_hdr)) 15216596a022SJiri Bohac goto emsgsize; 15226596a022SJiri Bohac 15236596a022SJiri Bohac maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen - 15246596a022SJiri Bohac sizeof(struct frag_hdr); 15256596a022SJiri Bohac 152610b8a3deSPaolo Abeni /* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit 152710b8a3deSPaolo Abeni * the first fragment 152810b8a3deSPaolo Abeni */ 152910b8a3deSPaolo Abeni if (headersize + transhdrlen > mtu) 153010b8a3deSPaolo Abeni goto emsgsize; 153110b8a3deSPaolo Abeni 153226879da5SWei Wang if (cork->length + length > mtu - headersize && ipc6->dontfrag && 15334df98e76SHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP || 153413651224SJakub Kicinski sk->sk_protocol == IPPROTO_ICMPV6 || 15354df98e76SHannes Frederic Sowa sk->sk_protocol == IPPROTO_RAW)) { 15364df98e76SHannes Frederic Sowa ipv6_local_rxpmtu(sk, fl6, mtu - headersize + 15374df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 15384df98e76SHannes Frederic Sowa goto emsgsize; 15394df98e76SHannes Frederic Sowa } 15404df98e76SHannes Frederic Sowa 1541682b1a9dSHannes Frederic Sowa if (ip6_sk_ignore_df(sk)) 1542682b1a9dSHannes Frederic Sowa maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN; 1543682b1a9dSHannes Frederic Sowa else 1544682b1a9dSHannes Frederic Sowa maxnonfragsize = mtu; 1545682b1a9dSHannes Frederic Sowa 15464df98e76SHannes Frederic Sowa if (cork->length + length > maxnonfragsize - headersize) { 15474df98e76SHannes Frederic Sowa emsgsize: 154810b8a3deSPaolo Abeni pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0); 154910b8a3deSPaolo Abeni ipv6_local_error(sk, EMSGSIZE, fl6, pmtu); 15501da177e4SLinus Torvalds return -EMSGSIZE; 15511da177e4SLinus Torvalds } 1552682b1a9dSHannes Frederic Sowa 1553682b1a9dSHannes Frederic Sowa /* CHECKSUM_PARTIAL only with no extension headers and when 1554682b1a9dSHannes Frederic Sowa * we are not going to fragment 1555682b1a9dSHannes Frederic Sowa */ 1556682b1a9dSHannes Frederic Sowa if (transhdrlen && sk->sk_protocol == IPPROTO_UDP && 1557682b1a9dSHannes Frederic Sowa headersize == sizeof(struct ipv6hdr) && 15582b89ed65SVlad Yasevich length <= mtu - headersize && 1559bec1f6f6SWillem de Bruijn (!(flags & MSG_MORE) || cork->gso_size) && 1560c8cd0989STom Herbert rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM)) 1561682b1a9dSHannes Frederic Sowa csummode = CHECKSUM_PARTIAL; 15621da177e4SLinus Torvalds 15631fd3ae8cSPavel Begunkov if ((flags & MSG_ZEROCOPY) && length) { 15641fd3ae8cSPavel Begunkov struct msghdr *msg = from; 15651fd3ae8cSPavel Begunkov 15661fd3ae8cSPavel Begunkov if (getfrag == ip_generic_getfrag && msg->msg_ubuf) { 15671fd3ae8cSPavel Begunkov if (skb_zcopy(skb) && msg->msg_ubuf != skb_zcopy(skb)) 15681fd3ae8cSPavel Begunkov return -EINVAL; 15691fd3ae8cSPavel Begunkov 15701fd3ae8cSPavel Begunkov /* Leave uarg NULL if can't zerocopy, callers should 15711fd3ae8cSPavel Begunkov * be able to handle it. 15721fd3ae8cSPavel Begunkov */ 15731fd3ae8cSPavel Begunkov if ((rt->dst.dev->features & NETIF_F_SG) && 15741fd3ae8cSPavel Begunkov csummode == CHECKSUM_PARTIAL) { 15751fd3ae8cSPavel Begunkov paged = true; 15761fd3ae8cSPavel Begunkov zc = true; 15771fd3ae8cSPavel Begunkov uarg = msg->msg_ubuf; 15781fd3ae8cSPavel Begunkov } 15791fd3ae8cSPavel Begunkov } else if (sock_flag(sk, SOCK_ZEROCOPY)) { 15808c793822SJonathan Lemon uarg = msg_zerocopy_realloc(sk, length, skb_zcopy(skb)); 1581b5947e5dSWillem de Bruijn if (!uarg) 1582b5947e5dSWillem de Bruijn return -ENOBUFS; 1583522924b5SWillem de Bruijn extra_uref = !skb_zcopy(skb); /* only ref on new uarg */ 1584b5947e5dSWillem de Bruijn if (rt->dst.dev->features & NETIF_F_SG && 1585b5947e5dSWillem de Bruijn csummode == CHECKSUM_PARTIAL) { 1586b5947e5dSWillem de Bruijn paged = true; 1587773ba4feSPavel Begunkov zc = true; 1588b5947e5dSWillem de Bruijn } else { 1589e7d2b510SPavel Begunkov uarg_to_msgzc(uarg)->zerocopy = 0; 159052900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 1591b5947e5dSWillem de Bruijn } 1592b5947e5dSWillem de Bruijn } 15936d8192bdSDavid Howells } else if ((flags & MSG_SPLICE_PAGES) && length) { 15946d8192bdSDavid Howells if (inet_sk(sk)->hdrincl) 15956d8192bdSDavid Howells return -EPERM; 15966d8192bdSDavid Howells if (rt->dst.dev->features & NETIF_F_SG) 15976d8192bdSDavid Howells /* We need an empty buffer to attach stuff to */ 15986d8192bdSDavid Howells paged = true; 15996d8192bdSDavid Howells else 16006d8192bdSDavid Howells flags &= ~MSG_SPLICE_PAGES; 16011fd3ae8cSPavel Begunkov } 1602b5947e5dSWillem de Bruijn 16031da177e4SLinus Torvalds /* 16041da177e4SLinus Torvalds * Let's try using as much space as possible. 16051da177e4SLinus Torvalds * Use MTU if total length of the message fits into the MTU. 16061da177e4SLinus Torvalds * Otherwise, we need to reserve fragment header and 16071da177e4SLinus Torvalds * fragment alignment (= 8-15 octects, in total). 16081da177e4SLinus Torvalds * 1609634a63e7SRandy Dunlap * Note that we may need to "move" the data from the tail 16101da177e4SLinus Torvalds * of the buffer to the new fragment when we split 16111da177e4SLinus Torvalds * the message. 16121da177e4SLinus Torvalds * 16131da177e4SLinus Torvalds * FIXME: It may be fragmented into multiple chunks 16141da177e4SLinus Torvalds * at once if non-fragmentable extension headers 16151da177e4SLinus Torvalds * are too large. 16161da177e4SLinus Torvalds * --yoshfuji 16171da177e4SLinus Torvalds */ 16181da177e4SLinus Torvalds 16192811ebacSHannes Frederic Sowa cork->length += length; 16202811ebacSHannes Frederic Sowa if (!skb) 16211da177e4SLinus Torvalds goto alloc_new_skb; 16221da177e4SLinus Torvalds 16231da177e4SLinus Torvalds while (length > 0) { 16241da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 1625bdc712b4SDavid S. Miller copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len; 16261da177e4SLinus Torvalds if (copy < length) 16271da177e4SLinus Torvalds copy = maxfraglen - skb->len; 16281da177e4SLinus Torvalds 16291da177e4SLinus Torvalds if (copy <= 0) { 16301da177e4SLinus Torvalds char *data; 16311da177e4SLinus Torvalds unsigned int datalen; 16321da177e4SLinus Torvalds unsigned int fraglen; 16331da177e4SLinus Torvalds unsigned int fraggap; 16346d123b81SJakub Kicinski unsigned int alloclen, alloc_extra; 1635aba36930SWillem de Bruijn unsigned int pagedlen; 16361da177e4SLinus Torvalds alloc_new_skb: 16371da177e4SLinus Torvalds /* There's no room in the current skb */ 16380c183379SGao feng if (skb) 16390c183379SGao feng fraggap = skb->len - maxfraglen; 16401da177e4SLinus Torvalds else 16411da177e4SLinus Torvalds fraggap = 0; 16420c183379SGao feng /* update mtu and maxfraglen if necessary */ 164363159f29SIan Morris if (!skb || !skb_prev) 16440c183379SGao feng ip6_append_data_mtu(&mtu, &maxfraglen, 164575a493e6SHannes Frederic Sowa fragheaderlen, skb, rt, 1646e367c2d0Slucien orig_mtu); 16470c183379SGao feng 16480c183379SGao feng skb_prev = skb; 16491da177e4SLinus Torvalds 16501da177e4SLinus Torvalds /* 16511da177e4SLinus Torvalds * If remaining data exceeds the mtu, 16521da177e4SLinus Torvalds * we know we need more fragment(s). 16531da177e4SLinus Torvalds */ 16541da177e4SLinus Torvalds datalen = length + fraggap; 16551da177e4SLinus Torvalds 16560c183379SGao feng if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen) 16570c183379SGao feng datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len; 165815e36f5bSWillem de Bruijn fraglen = datalen + fragheaderlen; 1659aba36930SWillem de Bruijn pagedlen = 0; 166015e36f5bSWillem de Bruijn 16616d123b81SJakub Kicinski alloc_extra = hh_len; 16626d123b81SJakub Kicinski alloc_extra += dst_exthdrlen; 16636d123b81SJakub Kicinski alloc_extra += rt->dst.trailer_len; 16646d123b81SJakub Kicinski 16656d123b81SJakub Kicinski /* We just reserve space for fragment header. 16666d123b81SJakub Kicinski * Note: this may be overallocation if the message 16676d123b81SJakub Kicinski * (without MSG_MORE) fits into the MTU. 16686d123b81SJakub Kicinski */ 16696d123b81SJakub Kicinski alloc_extra += sizeof(struct frag_hdr); 16706d123b81SJakub Kicinski 16711da177e4SLinus Torvalds if ((flags & MSG_MORE) && 1672d8d1f30bSChangli Gao !(rt->dst.dev->features&NETIF_F_SG)) 16731da177e4SLinus Torvalds alloclen = mtu; 16746d123b81SJakub Kicinski else if (!paged && 16756d123b81SJakub Kicinski (fraglen + alloc_extra < SKB_MAX_ALLOC || 16766d123b81SJakub Kicinski !(rt->dst.dev->features & NETIF_F_SG))) 167715e36f5bSWillem de Bruijn alloclen = fraglen; 167847cf8899SPavel Begunkov else { 1679773ba4feSPavel Begunkov alloclen = fragheaderlen + transhdrlen; 1680773ba4feSPavel Begunkov pagedlen = datalen - transhdrlen; 168115e36f5bSWillem de Bruijn } 16826d123b81SJakub Kicinski alloclen += alloc_extra; 1683299b0767SSteffen Klassert 16840c183379SGao feng if (datalen != length + fraggap) { 16851da177e4SLinus Torvalds /* 16860c183379SGao feng * this is not the last fragment, the trailer 16870c183379SGao feng * space is regarded as data space. 16881da177e4SLinus Torvalds */ 16890c183379SGao feng datalen += rt->dst.trailer_len; 16900c183379SGao feng } 16910c183379SGao feng 16920c183379SGao feng fraglen = datalen + fragheaderlen; 16931da177e4SLinus Torvalds 169415e36f5bSWillem de Bruijn copy = datalen - transhdrlen - fraggap - pagedlen; 1695232cd35dSEric Dumazet if (copy < 0) { 1696232cd35dSEric Dumazet err = -EINVAL; 1697232cd35dSEric Dumazet goto error; 1698232cd35dSEric Dumazet } 16991da177e4SLinus Torvalds if (transhdrlen) { 17006d123b81SJakub Kicinski skb = sock_alloc_send_skb(sk, alloclen, 17011da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 17021da177e4SLinus Torvalds } else { 17031da177e4SLinus Torvalds skb = NULL; 17041f4c6eb2SEric Dumazet if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <= 17051da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 17066d123b81SJakub Kicinski skb = alloc_skb(alloclen, 17071da177e4SLinus Torvalds sk->sk_allocation); 170863159f29SIan Morris if (unlikely(!skb)) 17091da177e4SLinus Torvalds err = -ENOBUFS; 17101da177e4SLinus Torvalds } 171163159f29SIan Morris if (!skb) 17121da177e4SLinus Torvalds goto error; 17131da177e4SLinus Torvalds /* 17141da177e4SLinus Torvalds * Fill in the control structures 17151da177e4SLinus Torvalds */ 17169c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 171732dce968SVlad Yasevich skb->ip_summed = csummode; 17181da177e4SLinus Torvalds skb->csum = 0; 17191f85851eSGao feng /* reserve for fragmentation and ipsec header */ 17201f85851eSGao feng skb_reserve(skb, hh_len + sizeof(struct frag_hdr) + 17211f85851eSGao feng dst_exthdrlen); 17221da177e4SLinus Torvalds 17231da177e4SLinus Torvalds /* 17241da177e4SLinus Torvalds * Find where to start putting bytes 17251da177e4SLinus Torvalds */ 172615e36f5bSWillem de Bruijn data = skb_put(skb, fraglen - pagedlen); 17271f85851eSGao feng skb_set_network_header(skb, exthdrlen); 17281f85851eSGao feng data += fragheaderlen; 1729b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1730b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 17311da177e4SLinus Torvalds if (fraggap) { 17321da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 17331da177e4SLinus Torvalds skb_prev, maxfraglen, 17348d5930dfSAl Viro data + transhdrlen, fraggap); 17351da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 17361da177e4SLinus Torvalds skb->csum); 17371da177e4SLinus Torvalds data += fraggap; 1738e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 17391da177e4SLinus Torvalds } 1740232cd35dSEric Dumazet if (copy > 0 && 1741232cd35dSEric Dumazet getfrag(from, data + transhdrlen, offset, 1742232cd35dSEric Dumazet copy, fraggap, skb) < 0) { 17431da177e4SLinus Torvalds err = -EFAULT; 17441da177e4SLinus Torvalds kfree_skb(skb); 17451da177e4SLinus Torvalds goto error; 17461da177e4SLinus Torvalds } 17471da177e4SLinus Torvalds 17481da177e4SLinus Torvalds offset += copy; 174915e36f5bSWillem de Bruijn length -= copy + transhdrlen; 17501da177e4SLinus Torvalds transhdrlen = 0; 17511da177e4SLinus Torvalds exthdrlen = 0; 1752299b0767SSteffen Klassert dst_exthdrlen = 0; 17531da177e4SLinus Torvalds 175452900d22SWillem de Bruijn /* Only the initial fragment is time stamped */ 175552900d22SWillem de Bruijn skb_shinfo(skb)->tx_flags = cork->tx_flags; 175652900d22SWillem de Bruijn cork->tx_flags = 0; 175752900d22SWillem de Bruijn skb_shinfo(skb)->tskey = tskey; 175852900d22SWillem de Bruijn tskey = 0; 175952900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 176052900d22SWillem de Bruijn 17610dec879fSJulian Anastasov if ((flags & MSG_CONFIRM) && !skb_prev) 17620dec879fSJulian Anastasov skb_set_dst_pending_confirm(skb, 1); 17630dec879fSJulian Anastasov 17641da177e4SLinus Torvalds /* 17651da177e4SLinus Torvalds * Put the packet on the pending queue 17661da177e4SLinus Torvalds */ 17671f4c6eb2SEric Dumazet if (!skb->destructor) { 17681f4c6eb2SEric Dumazet skb->destructor = sock_wfree; 17691f4c6eb2SEric Dumazet skb->sk = sk; 17701f4c6eb2SEric Dumazet wmem_alloc_delta += skb->truesize; 17711f4c6eb2SEric Dumazet } 17720bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 17731da177e4SLinus Torvalds continue; 17741da177e4SLinus Torvalds } 17751da177e4SLinus Torvalds 17761da177e4SLinus Torvalds if (copy > length) 17771da177e4SLinus Torvalds copy = length; 17781da177e4SLinus Torvalds 1779113f99c3SWillem de Bruijn if (!(rt->dst.dev->features&NETIF_F_SG) && 1780113f99c3SWillem de Bruijn skb_tailroom(skb) >= copy) { 17811da177e4SLinus Torvalds unsigned int off; 17821da177e4SLinus Torvalds 17831da177e4SLinus Torvalds off = skb->len; 17841da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 17851da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 17861da177e4SLinus Torvalds __skb_trim(skb, off); 17871da177e4SLinus Torvalds err = -EFAULT; 17881da177e4SLinus Torvalds goto error; 17891da177e4SLinus Torvalds } 17906d8192bdSDavid Howells } else if (flags & MSG_SPLICE_PAGES) { 17916d8192bdSDavid Howells struct msghdr *msg = from; 17926d8192bdSDavid Howells 17936d8192bdSDavid Howells err = skb_splice_from_iter(skb, &msg->msg_iter, copy, 17946d8192bdSDavid Howells sk->sk_allocation); 17956d8192bdSDavid Howells if (err < 0) 17966d8192bdSDavid Howells goto error; 17976d8192bdSDavid Howells copy = err; 17986d8192bdSDavid Howells wmem_alloc_delta += copy; 17991fd3ae8cSPavel Begunkov } else if (!zc) { 18001da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 18011da177e4SLinus Torvalds 18021da177e4SLinus Torvalds err = -ENOMEM; 18035640f768SEric Dumazet if (!sk_page_frag_refill(sk, pfrag)) 18041da177e4SLinus Torvalds goto error; 18051da177e4SLinus Torvalds 18061fd3ae8cSPavel Begunkov skb_zcopy_downgrade_managed(skb); 18075640f768SEric Dumazet if (!skb_can_coalesce(skb, i, pfrag->page, 18085640f768SEric Dumazet pfrag->offset)) { 18091da177e4SLinus Torvalds err = -EMSGSIZE; 18105640f768SEric Dumazet if (i == MAX_SKB_FRAGS) 18111da177e4SLinus Torvalds goto error; 18125640f768SEric Dumazet 18135640f768SEric Dumazet __skb_fill_page_desc(skb, i, pfrag->page, 18145640f768SEric Dumazet pfrag->offset, 0); 18155640f768SEric Dumazet skb_shinfo(skb)->nr_frags = ++i; 18165640f768SEric Dumazet get_page(pfrag->page); 18171da177e4SLinus Torvalds } 18185640f768SEric Dumazet copy = min_t(int, copy, pfrag->size - pfrag->offset); 18199e903e08SEric Dumazet if (getfrag(from, 18205640f768SEric Dumazet page_address(pfrag->page) + pfrag->offset, 18215640f768SEric Dumazet offset, copy, skb->len, skb) < 0) 18225640f768SEric Dumazet goto error_efault; 18235640f768SEric Dumazet 18245640f768SEric Dumazet pfrag->offset += copy; 18255640f768SEric Dumazet skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy); 18261da177e4SLinus Torvalds skb->len += copy; 18271da177e4SLinus Torvalds skb->data_len += copy; 1828f945fa7aSHerbert Xu skb->truesize += copy; 18291f4c6eb2SEric Dumazet wmem_alloc_delta += copy; 1830b5947e5dSWillem de Bruijn } else { 1831b5947e5dSWillem de Bruijn err = skb_zerocopy_iter_dgram(skb, from, copy); 1832b5947e5dSWillem de Bruijn if (err < 0) 1833b5947e5dSWillem de Bruijn goto error; 18341da177e4SLinus Torvalds } 18351da177e4SLinus Torvalds offset += copy; 18361da177e4SLinus Torvalds length -= copy; 18371da177e4SLinus Torvalds } 18385640f768SEric Dumazet 18399e8445a5SPaolo Abeni if (wmem_alloc_delta) 18401f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 18411da177e4SLinus Torvalds return 0; 18425640f768SEric Dumazet 18435640f768SEric Dumazet error_efault: 18445640f768SEric Dumazet err = -EFAULT; 18451da177e4SLinus Torvalds error: 18468e044917SJonathan Lemon net_zcopy_put_abort(uarg, extra_uref); 1847bdc712b4SDavid S. Miller cork->length -= length; 18483bd653c8SDenis V. Lunev IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS); 18491f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 18501da177e4SLinus Torvalds return err; 18511da177e4SLinus Torvalds } 18520bbe84a6SVlad Yasevich 18530bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk, 18540bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, int len, 18550bbe84a6SVlad Yasevich int odd, struct sk_buff *skb), 1856f93431c8SWang Yufen void *from, size_t length, int transhdrlen, 185726879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 18585fdaa88dSWillem de Bruijn struct rt6_info *rt, unsigned int flags) 18590bbe84a6SVlad Yasevich { 18600bbe84a6SVlad Yasevich struct inet_sock *inet = inet_sk(sk); 18610bbe84a6SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 18620bbe84a6SVlad Yasevich int exthdrlen; 18630bbe84a6SVlad Yasevich int err; 18640bbe84a6SVlad Yasevich 18650bbe84a6SVlad Yasevich if (flags&MSG_PROBE) 18660bbe84a6SVlad Yasevich return 0; 18670bbe84a6SVlad Yasevich if (skb_queue_empty(&sk->sk_write_queue)) { 18680bbe84a6SVlad Yasevich /* 18690bbe84a6SVlad Yasevich * setup for corking 18700bbe84a6SVlad Yasevich */ 187140ac240cSPavel Begunkov dst_hold(&rt->dst); 187226879da5SWei Wang err = ip6_setup_cork(sk, &inet->cork, &np->cork, 1873f37a4cc6SPavel Begunkov ipc6, rt); 18740bbe84a6SVlad Yasevich if (err) 18750bbe84a6SVlad Yasevich return err; 18760bbe84a6SVlad Yasevich 1877f37a4cc6SPavel Begunkov inet->cork.fl.u.ip6 = *fl6; 187826879da5SWei Wang exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 18790bbe84a6SVlad Yasevich length += exthdrlen; 18800bbe84a6SVlad Yasevich transhdrlen += exthdrlen; 18810bbe84a6SVlad Yasevich } else { 18820bbe84a6SVlad Yasevich transhdrlen = 0; 18830bbe84a6SVlad Yasevich } 18840bbe84a6SVlad Yasevich 1885f37a4cc6SPavel Begunkov return __ip6_append_data(sk, &sk->sk_write_queue, &inet->cork, 18860bbe84a6SVlad Yasevich &np->cork, sk_page_frag(sk), getfrag, 18875fdaa88dSWillem de Bruijn from, length, transhdrlen, flags, ipc6); 18880bbe84a6SVlad Yasevich } 1889a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data); 18901da177e4SLinus Torvalds 1891cd3c7480SPavel Begunkov static void ip6_cork_steal_dst(struct sk_buff *skb, struct inet_cork_full *cork) 1892cd3c7480SPavel Begunkov { 1893cd3c7480SPavel Begunkov struct dst_entry *dst = cork->base.dst; 1894cd3c7480SPavel Begunkov 1895cd3c7480SPavel Begunkov cork->base.dst = NULL; 1896cd3c7480SPavel Begunkov cork->base.flags &= ~IPCORK_ALLFRAG; 1897cd3c7480SPavel Begunkov skb_dst_set(skb, dst); 1898cd3c7480SPavel Begunkov } 1899cd3c7480SPavel Begunkov 1900366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork, 1901366e41d9SVlad Yasevich struct inet6_cork *v6_cork) 1902bf138862SPavel Emelyanov { 1903366e41d9SVlad Yasevich if (v6_cork->opt) { 1904d656b2eaSPavel Begunkov struct ipv6_txoptions *opt = v6_cork->opt; 1905d656b2eaSPavel Begunkov 1906d656b2eaSPavel Begunkov kfree(opt->dst0opt); 1907d656b2eaSPavel Begunkov kfree(opt->dst1opt); 1908d656b2eaSPavel Begunkov kfree(opt->hopopt); 1909d656b2eaSPavel Begunkov kfree(opt->srcrt); 1910d656b2eaSPavel Begunkov kfree(opt); 1911366e41d9SVlad Yasevich v6_cork->opt = NULL; 19120178b695SHerbert Xu } 19130178b695SHerbert Xu 1914366e41d9SVlad Yasevich if (cork->base.dst) { 1915366e41d9SVlad Yasevich dst_release(cork->base.dst); 1916366e41d9SVlad Yasevich cork->base.dst = NULL; 1917366e41d9SVlad Yasevich cork->base.flags &= ~IPCORK_ALLFRAG; 1918bf138862SPavel Emelyanov } 1919bf138862SPavel Emelyanov } 1920bf138862SPavel Emelyanov 19216422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk, 19226422398cSVlad Yasevich struct sk_buff_head *queue, 19236422398cSVlad Yasevich struct inet_cork_full *cork, 19246422398cSVlad Yasevich struct inet6_cork *v6_cork) 19251da177e4SLinus Torvalds { 19261da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 19271da177e4SLinus Torvalds struct sk_buff **tail_skb; 1928b60d4e58SPavel Begunkov struct in6_addr *final_dst; 19291da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 19303bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 19311da177e4SLinus Torvalds struct ipv6hdr *hdr; 19326422398cSVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 19336422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->base.dst; 19346422398cSVlad Yasevich struct flowi6 *fl6 = &cork->fl.u.ip6; 19354c9483b2SDavid S. Miller unsigned char proto = fl6->flowi6_proto; 19361da177e4SLinus Torvalds 19376422398cSVlad Yasevich skb = __skb_dequeue(queue); 193863159f29SIan Morris if (!skb) 19391da177e4SLinus Torvalds goto out; 19401da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 19411da177e4SLinus Torvalds 19421da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1943d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1944bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 19456422398cSVlad Yasevich while ((tmp_skb = __skb_dequeue(queue)) != NULL) { 1946cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 19471da177e4SLinus Torvalds *tail_skb = tmp_skb; 19481da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 19491da177e4SLinus Torvalds skb->len += tmp_skb->len; 19501da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 19511da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 19521da177e4SLinus Torvalds tmp_skb->destructor = NULL; 19531da177e4SLinus Torvalds tmp_skb->sk = NULL; 19541da177e4SLinus Torvalds } 19551da177e4SLinus Torvalds 195628a89453SHerbert Xu /* Allow local fragmentation. */ 195760ff7467SWANG Cong skb->ignore_df = ip6_sk_ignore_df(sk); 1958cfe1fc77SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_header_len(skb)); 1959b60d4e58SPavel Begunkov 1960b60d4e58SPavel Begunkov final_dst = &fl6->daddr; 19611da177e4SLinus Torvalds if (opt && opt->opt_flen) 19621da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 19631da177e4SLinus Torvalds if (opt && opt->opt_nflen) 1964613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr); 19651da177e4SLinus Torvalds 1966e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 1967e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 19680660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 19691da177e4SLinus Torvalds 19706422398cSVlad Yasevich ip6_flow_hdr(hdr, v6_cork->tclass, 1971cb1ce2efSTom Herbert ip6_make_flowlabel(net, skb, fl6->flowlabel, 1972513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 19736422398cSVlad Yasevich hdr->hop_limit = v6_cork->hop_limit; 19741da177e4SLinus Torvalds hdr->nexthdr = proto; 19754e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 19764e3fd7a0SAlexey Dobriyan hdr->daddr = *final_dst; 19771da177e4SLinus Torvalds 1978a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 1979c6af0c22SWillem de Bruijn skb->mark = cork->base.mark; 1980a818f75eSJesus Sanchez-Palencia skb->tstamp = cork->base.transmit_time; 1981a818f75eSJesus Sanchez-Palencia 1982cd3c7480SPavel Begunkov ip6_cork_steal_dst(skb, cork); 1983edf391ffSNeil Horman IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len); 198414878f75SDavid L Stevens if (proto == IPPROTO_ICMPV6) { 1985adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 1986ea30388bSZiyang Xuan u8 icmp6_type; 198714878f75SDavid L Stevens 1988ea30388bSZiyang Xuan if (sk->sk_socket->type == SOCK_RAW && !inet_sk(sk)->hdrincl) 1989ea30388bSZiyang Xuan icmp6_type = fl6->fl6_icmp_type; 1990ea30388bSZiyang Xuan else 1991ea30388bSZiyang Xuan icmp6_type = icmp6_hdr(skb)->icmp6_type; 1992ea30388bSZiyang Xuan ICMP6MSGOUT_INC_STATS(net, idev, icmp6_type); 199343a43b60SHannes Frederic Sowa ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS); 199414878f75SDavid L Stevens } 199514878f75SDavid L Stevens 19966422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 19976422398cSVlad Yasevich out: 19986422398cSVlad Yasevich return skb; 19996422398cSVlad Yasevich } 20006422398cSVlad Yasevich 20016422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb) 20026422398cSVlad Yasevich { 20036422398cSVlad Yasevich struct net *net = sock_net(skb->sk); 20046422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 20056422398cSVlad Yasevich int err; 20066422398cSVlad Yasevich 200733224b16SEric W. Biederman err = ip6_local_out(net, skb->sk, skb); 20081da177e4SLinus Torvalds if (err) { 20091da177e4SLinus Torvalds if (err > 0) 20106ce9e7b5SEric Dumazet err = net_xmit_errno(err); 20111da177e4SLinus Torvalds if (err) 20126422398cSVlad Yasevich IP6_INC_STATS(net, rt->rt6i_idev, 20136422398cSVlad Yasevich IPSTATS_MIB_OUTDISCARDS); 20141da177e4SLinus Torvalds } 20151da177e4SLinus Torvalds 20161da177e4SLinus Torvalds return err; 20176422398cSVlad Yasevich } 20186422398cSVlad Yasevich 20196422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk) 20206422398cSVlad Yasevich { 20216422398cSVlad Yasevich struct sk_buff *skb; 20226422398cSVlad Yasevich 20236422398cSVlad Yasevich skb = ip6_finish_skb(sk); 20246422398cSVlad Yasevich if (!skb) 20256422398cSVlad Yasevich return 0; 20266422398cSVlad Yasevich 20276422398cSVlad Yasevich return ip6_send_skb(skb); 20281da177e4SLinus Torvalds } 2029a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames); 20301da177e4SLinus Torvalds 20310bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk, 20326422398cSVlad Yasevich struct sk_buff_head *queue, 20336422398cSVlad Yasevich struct inet_cork_full *cork, 20346422398cSVlad Yasevich struct inet6_cork *v6_cork) 20351da177e4SLinus Torvalds { 20361da177e4SLinus Torvalds struct sk_buff *skb; 20371da177e4SLinus Torvalds 20380bbe84a6SVlad Yasevich while ((skb = __skb_dequeue_tail(queue)) != NULL) { 2039adf30907SEric Dumazet if (skb_dst(skb)) 2040adf30907SEric Dumazet IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)), 2041a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 20421da177e4SLinus Torvalds kfree_skb(skb); 20431da177e4SLinus Torvalds } 20441da177e4SLinus Torvalds 20456422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 20461da177e4SLinus Torvalds } 20470bbe84a6SVlad Yasevich 20480bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk) 20490bbe84a6SVlad Yasevich { 20506422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &sk->sk_write_queue, 20516422398cSVlad Yasevich &inet_sk(sk)->cork, &inet6_sk(sk)->cork); 20520bbe84a6SVlad Yasevich } 2053a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames); 20546422398cSVlad Yasevich 20556422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk, 20566422398cSVlad Yasevich int getfrag(void *from, char *to, int offset, 20576422398cSVlad Yasevich int len, int odd, struct sk_buff *skb), 2058f93431c8SWang Yufen void *from, size_t length, int transhdrlen, 2059f37a4cc6SPavel Begunkov struct ipcm6_cookie *ipc6, struct rt6_info *rt, 2060f37a4cc6SPavel Begunkov unsigned int flags, struct inet_cork_full *cork) 20616422398cSVlad Yasevich { 20626422398cSVlad Yasevich struct inet6_cork v6_cork; 20636422398cSVlad Yasevich struct sk_buff_head queue; 206426879da5SWei Wang int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 20656422398cSVlad Yasevich int err; 20666422398cSVlad Yasevich 206740ac240cSPavel Begunkov if (flags & MSG_PROBE) { 206840ac240cSPavel Begunkov dst_release(&rt->dst); 20696422398cSVlad Yasevich return NULL; 207040ac240cSPavel Begunkov } 20716422398cSVlad Yasevich 20726422398cSVlad Yasevich __skb_queue_head_init(&queue); 20736422398cSVlad Yasevich 20741cd7884dSWillem de Bruijn cork->base.flags = 0; 20751cd7884dSWillem de Bruijn cork->base.addr = 0; 20761cd7884dSWillem de Bruijn cork->base.opt = NULL; 20776422398cSVlad Yasevich v6_cork.opt = NULL; 2078f37a4cc6SPavel Begunkov err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt); 2079862c03eeSEric Dumazet if (err) { 20801cd7884dSWillem de Bruijn ip6_cork_release(cork, &v6_cork); 20816422398cSVlad Yasevich return ERR_PTR(err); 2082862c03eeSEric Dumazet } 208326879da5SWei Wang if (ipc6->dontfrag < 0) 208426879da5SWei Wang ipc6->dontfrag = inet6_sk(sk)->dontfrag; 20856422398cSVlad Yasevich 2086f37a4cc6SPavel Begunkov err = __ip6_append_data(sk, &queue, cork, &v6_cork, 20876422398cSVlad Yasevich ¤t->task_frag, getfrag, from, 20886422398cSVlad Yasevich length + exthdrlen, transhdrlen + exthdrlen, 20895fdaa88dSWillem de Bruijn flags, ipc6); 20906422398cSVlad Yasevich if (err) { 20911cd7884dSWillem de Bruijn __ip6_flush_pending_frames(sk, &queue, cork, &v6_cork); 20926422398cSVlad Yasevich return ERR_PTR(err); 20936422398cSVlad Yasevich } 20946422398cSVlad Yasevich 20951cd7884dSWillem de Bruijn return __ip6_make_skb(sk, &queue, cork, &v6_cork); 20966422398cSVlad Yasevich } 2097