11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * IPv6 output functions 31da177e4SLinus Torvalds * Linux INET6 implementation 41da177e4SLinus Torvalds * 51da177e4SLinus Torvalds * Authors: 61da177e4SLinus Torvalds * Pedro Roque <roque@di.fc.ul.pt> 71da177e4SLinus Torvalds * 81da177e4SLinus Torvalds * Based on linux/net/ipv4/ip_output.c 91da177e4SLinus Torvalds * 101da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or 111da177e4SLinus Torvalds * modify it under the terms of the GNU General Public License 121da177e4SLinus Torvalds * as published by the Free Software Foundation; either version 131da177e4SLinus Torvalds * 2 of the License, or (at your option) any later version. 141da177e4SLinus Torvalds * 151da177e4SLinus Torvalds * Changes: 161da177e4SLinus Torvalds * A.N.Kuznetsov : airthmetics in fragmentation. 171da177e4SLinus Torvalds * extension headers are implemented. 181da177e4SLinus Torvalds * route changes now work. 191da177e4SLinus Torvalds * ip6_forward does not confuse sniffers. 201da177e4SLinus Torvalds * etc. 211da177e4SLinus Torvalds * 221da177e4SLinus Torvalds * H. von Brand : Added missing #include <linux/string.h> 231da177e4SLinus Torvalds * Imran Patel : frag id should be in NBO 241da177e4SLinus Torvalds * Kazunori MIYAZAWA @USAGI 251da177e4SLinus Torvalds * : add ip6_append_data and related functions 261da177e4SLinus Torvalds * for datagram xmit 271da177e4SLinus Torvalds */ 281da177e4SLinus Torvalds 291da177e4SLinus Torvalds #include <linux/errno.h> 30ef76bc23SHerbert Xu #include <linux/kernel.h> 311da177e4SLinus Torvalds #include <linux/string.h> 321da177e4SLinus Torvalds #include <linux/socket.h> 331da177e4SLinus Torvalds #include <linux/net.h> 341da177e4SLinus Torvalds #include <linux/netdevice.h> 351da177e4SLinus Torvalds #include <linux/if_arp.h> 361da177e4SLinus Torvalds #include <linux/in6.h> 371da177e4SLinus Torvalds #include <linux/tcp.h> 381da177e4SLinus Torvalds #include <linux/route.h> 39b59f45d0SHerbert Xu #include <linux/module.h> 405a0e3ad6STejun Heo #include <linux/slab.h> 411da177e4SLinus Torvalds 4233b48679SDaniel Mack #include <linux/bpf-cgroup.h> 431da177e4SLinus Torvalds #include <linux/netfilter.h> 441da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h> 451da177e4SLinus Torvalds 461da177e4SLinus Torvalds #include <net/sock.h> 471da177e4SLinus Torvalds #include <net/snmp.h> 481da177e4SLinus Torvalds 491da177e4SLinus Torvalds #include <net/ipv6.h> 501da177e4SLinus Torvalds #include <net/ndisc.h> 511da177e4SLinus Torvalds #include <net/protocol.h> 521da177e4SLinus Torvalds #include <net/ip6_route.h> 531da177e4SLinus Torvalds #include <net/addrconf.h> 541da177e4SLinus Torvalds #include <net/rawv6.h> 551da177e4SLinus Torvalds #include <net/icmp.h> 561da177e4SLinus Torvalds #include <net/xfrm.h> 571da177e4SLinus Torvalds #include <net/checksum.h> 587bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h> 59ca254490SDavid Ahern #include <net/l3mdev.h> 6014972cbdSRoopa Prabhu #include <net/lwtunnel.h> 611da177e4SLinus Torvalds 627d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb) 631da177e4SLinus Torvalds { 64adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 651da177e4SLinus Torvalds struct net_device *dev = dst->dev; 66f6b72b62SDavid S. Miller struct neighbour *neigh; 676fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 struct in6_addr *nexthop; 686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 int ret; 691da177e4SLinus Torvalds 700660e03fSArnaldo Carvalho de Melo if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) { 71adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 721da177e4SLinus Torvalds 737026b1ddSDavid Miller if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) && 748571ab47SYuval Mintz ((mroute6_is_socket(net, skb) && 75bd91b8bfSBenjamin Thery !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) || 760660e03fSArnaldo Carvalho de Melo ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr, 777bc570c8SYOSHIFUJI Hideaki &ipv6_hdr(skb)->saddr))) { 781da177e4SLinus Torvalds struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC); 791da177e4SLinus Torvalds 801da177e4SLinus Torvalds /* Do not check for IFF_ALLMULTI; multicast routing 811da177e4SLinus Torvalds is not supported in any case. 821da177e4SLinus Torvalds */ 831da177e4SLinus Torvalds if (newskb) 84b2e0b385SJan Engelhardt NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING, 8529a26a56SEric W. Biederman net, sk, newskb, NULL, newskb->dev, 8695603e22SMichel Machado dev_loopback_xmit); 871da177e4SLinus Torvalds 880660e03fSArnaldo Carvalho de Melo if (ipv6_hdr(skb)->hop_limit == 0) { 8978126c41SEric W. Biederman IP6_INC_STATS(net, idev, 903bd653c8SDenis V. Lunev IPSTATS_MIB_OUTDISCARDS); 911da177e4SLinus Torvalds kfree_skb(skb); 921da177e4SLinus Torvalds return 0; 931da177e4SLinus Torvalds } 941da177e4SLinus Torvalds } 951da177e4SLinus Torvalds 9678126c41SEric W. Biederman IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len); 97dd408515SHannes Frederic Sowa 98dd408515SHannes Frederic Sowa if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <= 99dd408515SHannes Frederic Sowa IPV6_ADDR_SCOPE_NODELOCAL && 100dd408515SHannes Frederic Sowa !(dev->flags & IFF_LOOPBACK)) { 101dd408515SHannes Frederic Sowa kfree_skb(skb); 102dd408515SHannes Frederic Sowa return 0; 103dd408515SHannes Frederic Sowa } 1041da177e4SLinus Torvalds } 1051da177e4SLinus Torvalds 10614972cbdSRoopa Prabhu if (lwtunnel_xmit_redirect(dst->lwtstate)) { 10714972cbdSRoopa Prabhu int res = lwtunnel_xmit(skb); 10814972cbdSRoopa Prabhu 10914972cbdSRoopa Prabhu if (res < 0 || res == LWTUNNEL_XMIT_DONE) 11014972cbdSRoopa Prabhu return res; 11114972cbdSRoopa Prabhu } 11214972cbdSRoopa Prabhu 1136fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 1142647a9b0SMartin KaFai Lau nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr); 1156fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop); 1166fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(!neigh)) 1176fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false); 1186fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 if (!IS_ERR(neigh)) { 1194ff06203SJulian Anastasov sock_confirm_neigh(skb, neigh); 120c16ec185SJulian Anastasov ret = neigh_output(neigh, skb); 1216fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1226fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 return ret; 1236fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 } 1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 12505e3aa09SDavid S. Miller 12678126c41SEric W. Biederman IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES); 1279e508490SJan Engelhardt kfree_skb(skb); 1289e508490SJan Engelhardt return -EINVAL; 1291da177e4SLinus Torvalds } 1301da177e4SLinus Torvalds 1310c4b51f0SEric W. Biederman static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1329e508490SJan Engelhardt { 13333b48679SDaniel Mack int ret; 13433b48679SDaniel Mack 13533b48679SDaniel Mack ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb); 13633b48679SDaniel Mack if (ret) { 13733b48679SDaniel Mack kfree_skb(skb); 13833b48679SDaniel Mack return ret; 13933b48679SDaniel Mack } 14033b48679SDaniel Mack 14109ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM) 14209ee9dbaSTobias Brunner /* Policy lookup after SNAT yielded a new policy */ 14309ee9dbaSTobias Brunner if (skb_dst(skb)->xfrm) { 14409ee9dbaSTobias Brunner IPCB(skb)->flags |= IPSKB_REROUTED; 14509ee9dbaSTobias Brunner return dst_output(net, sk, skb); 14609ee9dbaSTobias Brunner } 14709ee9dbaSTobias Brunner #endif 14809ee9dbaSTobias Brunner 1499e508490SJan Engelhardt if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) || 1509037c357SJiri Pirko dst_allfrag(skb_dst(skb)) || 1519037c357SJiri Pirko (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size)) 1527d8c6e39SEric W. Biederman return ip6_fragment(net, sk, skb, ip6_finish_output2); 1539e508490SJan Engelhardt else 1547d8c6e39SEric W. Biederman return ip6_finish_output2(net, sk, skb); 1559e508490SJan Engelhardt } 1569e508490SJan Engelhardt 157ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb) 1581da177e4SLinus Torvalds { 1599e508490SJan Engelhardt struct net_device *dev = skb_dst(skb)->dev; 160adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 161be10de0aSEric W. Biederman 16297a7a37aSChenbo Feng skb->protocol = htons(ETH_P_IPV6); 16397a7a37aSChenbo Feng skb->dev = dev; 16497a7a37aSChenbo Feng 165778d80beSYOSHIFUJI Hideaki if (unlikely(idev->cnf.disable_ipv6)) { 16619a0644cSEric W. Biederman IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS); 167778d80beSYOSHIFUJI Hideaki kfree_skb(skb); 168778d80beSYOSHIFUJI Hideaki return 0; 169778d80beSYOSHIFUJI Hideaki } 170778d80beSYOSHIFUJI Hideaki 17129a26a56SEric W. Biederman return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING, 17229a26a56SEric W. Biederman net, sk, skb, NULL, dev, 1739c6eb28aSJan Engelhardt ip6_finish_output, 1749c6eb28aSJan Engelhardt !(IP6CB(skb)->flags & IP6SKB_REROUTED)); 1751da177e4SLinus Torvalds } 1761da177e4SLinus Torvalds 177e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np) 178513674b5SShaohua Li { 179513674b5SShaohua Li if (!np->autoflowlabel_set) 180513674b5SShaohua Li return ip6_default_np_autolabel(net); 181513674b5SShaohua Li else 182513674b5SShaohua Li return np->autoflowlabel; 183513674b5SShaohua Li } 184513674b5SShaohua Li 1851da177e4SLinus Torvalds /* 186b5d43998SShan Wei * xmit an sk_buff (used by TCP, SCTP and DCCP) 1871c1e9d2bSEric Dumazet * Note : socket lock is not held for SYNACK packets, but might be modified 1881c1e9d2bSEric Dumazet * by calls to skb_set_owner_w() and ipv6_local_error(), 1891c1e9d2bSEric Dumazet * which are using proper atomic operations or spinlocks. 1901da177e4SLinus Torvalds */ 1911c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6, 19292e55f41SPablo Neira __u32 mark, struct ipv6_txoptions *opt, int tclass) 1931da177e4SLinus Torvalds { 1943bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 1951c1e9d2bSEric Dumazet const struct ipv6_pinfo *np = inet6_sk(sk); 1964c9483b2SDavid S. Miller struct in6_addr *first_hop = &fl6->daddr; 197adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 1981da177e4SLinus Torvalds struct ipv6hdr *hdr; 1994c9483b2SDavid S. Miller u8 proto = fl6->flowi6_proto; 2001da177e4SLinus Torvalds int seg_len = skb->len; 201e651f03aSGerrit Renker int hlimit = -1; 2021da177e4SLinus Torvalds u32 mtu; 2031da177e4SLinus Torvalds 2041da177e4SLinus Torvalds if (opt) { 205c2636b4dSChuck Lever unsigned int head_room; 2061da177e4SLinus Torvalds 2071da177e4SLinus Torvalds /* First: exthdrs may take lots of space (~8K for now) 2081da177e4SLinus Torvalds MAX_HEADER is not enough. 2091da177e4SLinus Torvalds */ 2101da177e4SLinus Torvalds head_room = opt->opt_nflen + opt->opt_flen; 2111da177e4SLinus Torvalds seg_len += head_room; 2121da177e4SLinus Torvalds head_room += sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev); 2131da177e4SLinus Torvalds 2141da177e4SLinus Torvalds if (skb_headroom(skb) < head_room) { 2151da177e4SLinus Torvalds struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room); 21663159f29SIan Morris if (!skb2) { 217adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 218a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 2191da177e4SLinus Torvalds kfree_skb(skb); 2201da177e4SLinus Torvalds return -ENOBUFS; 2211da177e4SLinus Torvalds } 222bbd6528dSEric Dumazet if (skb->sk) 223bbd6528dSEric Dumazet skb_set_owner_w(skb2, skb->sk); 224808db80aSEric Dumazet consume_skb(skb); 225a11d206dSYOSHIFUJI Hideaki skb = skb2; 2261da177e4SLinus Torvalds } 2271da177e4SLinus Torvalds if (opt->opt_flen) 2281da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 2291da177e4SLinus Torvalds if (opt->opt_nflen) 230613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop, 231613fa3caSDavid Lebrun &fl6->saddr); 2321da177e4SLinus Torvalds } 2331da177e4SLinus Torvalds 234e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 235e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 2360660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 2371da177e4SLinus Torvalds 2381da177e4SLinus Torvalds /* 2391da177e4SLinus Torvalds * Fill in the IPv6 header 2401da177e4SLinus Torvalds */ 241b903d324SEric Dumazet if (np) 2421da177e4SLinus Torvalds hlimit = np->hop_limit; 2431da177e4SLinus Torvalds if (hlimit < 0) 2446b75d090SYOSHIFUJI Hideaki hlimit = ip6_dst_hoplimit(dst); 2451da177e4SLinus Torvalds 246cb1ce2efSTom Herbert ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel, 247513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 24841a1f8eaSYOSHIFUJI Hideaki 2491da177e4SLinus Torvalds hdr->payload_len = htons(seg_len); 2501da177e4SLinus Torvalds hdr->nexthdr = proto; 2511da177e4SLinus Torvalds hdr->hop_limit = hlimit; 2521da177e4SLinus Torvalds 2534e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 2544e3fd7a0SAlexey Dobriyan hdr->daddr = *first_hop; 2551da177e4SLinus Torvalds 2569c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 257a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 25892e55f41SPablo Neira skb->mark = mark; 259a2c2064fSPatrick McHardy 2601da177e4SLinus Torvalds mtu = dst_mtu(dst); 26160ff7467SWANG Cong if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) { 262adf30907SEric Dumazet IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)), 263edf391ffSNeil Horman IPSTATS_MIB_OUT, skb->len); 264a8e3e1a9SDavid Ahern 265a8e3e1a9SDavid Ahern /* if egress device is enslaved to an L3 master device pass the 266a8e3e1a9SDavid Ahern * skb to its handler for processing 267a8e3e1a9SDavid Ahern */ 268a8e3e1a9SDavid Ahern skb = l3mdev_ip6_out((struct sock *)sk, skb); 269a8e3e1a9SDavid Ahern if (unlikely(!skb)) 270a8e3e1a9SDavid Ahern return 0; 271a8e3e1a9SDavid Ahern 2721c1e9d2bSEric Dumazet /* hooks should never assume socket lock is held. 2731c1e9d2bSEric Dumazet * we promote our socket to non const 2741c1e9d2bSEric Dumazet */ 27529a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT, 2761c1e9d2bSEric Dumazet net, (struct sock *)sk, skb, NULL, dst->dev, 27713206b6bSEric W. Biederman dst_output); 2781da177e4SLinus Torvalds } 2791da177e4SLinus Torvalds 2801da177e4SLinus Torvalds skb->dev = dst->dev; 2811c1e9d2bSEric Dumazet /* ipv6_local_error() does not require socket lock, 2821c1e9d2bSEric Dumazet * we promote our socket to non const 2831c1e9d2bSEric Dumazet */ 2841c1e9d2bSEric Dumazet ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu); 2851c1e9d2bSEric Dumazet 286adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS); 2871da177e4SLinus Torvalds kfree_skb(skb); 2881da177e4SLinus Torvalds return -EMSGSIZE; 2891da177e4SLinus Torvalds } 2907159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit); 2917159039aSYOSHIFUJI Hideaki 2921da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel) 2931da177e4SLinus Torvalds { 2941da177e4SLinus Torvalds struct ip6_ra_chain *ra; 2951da177e4SLinus Torvalds struct sock *last = NULL; 2961da177e4SLinus Torvalds 2971da177e4SLinus Torvalds read_lock(&ip6_ra_lock); 2981da177e4SLinus Torvalds for (ra = ip6_ra_chain; ra; ra = ra->next) { 2991da177e4SLinus Torvalds struct sock *sk = ra->sk; 3000bd1b59bSAndrew McDonald if (sk && ra->sel == sel && 3010bd1b59bSAndrew McDonald (!sk->sk_bound_dev_if || 3020bd1b59bSAndrew McDonald sk->sk_bound_dev_if == skb->dev->ifindex)) { 3031da177e4SLinus Torvalds if (last) { 3041da177e4SLinus Torvalds struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC); 3051da177e4SLinus Torvalds if (skb2) 3061da177e4SLinus Torvalds rawv6_rcv(last, skb2); 3071da177e4SLinus Torvalds } 3081da177e4SLinus Torvalds last = sk; 3091da177e4SLinus Torvalds } 3101da177e4SLinus Torvalds } 3111da177e4SLinus Torvalds 3121da177e4SLinus Torvalds if (last) { 3131da177e4SLinus Torvalds rawv6_rcv(last, skb); 3141da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3151da177e4SLinus Torvalds return 1; 3161da177e4SLinus Torvalds } 3171da177e4SLinus Torvalds read_unlock(&ip6_ra_lock); 3181da177e4SLinus Torvalds return 0; 3191da177e4SLinus Torvalds } 3201da177e4SLinus Torvalds 321e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb) 322e21e0b5fSVille Nuorvala { 3230660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 324e21e0b5fSVille Nuorvala u8 nexthdr = hdr->nexthdr; 32575f2811cSJesse Gross __be16 frag_off; 326e21e0b5fSVille Nuorvala int offset; 327e21e0b5fSVille Nuorvala 328e21e0b5fSVille Nuorvala if (ipv6_ext_hdr(nexthdr)) { 32975f2811cSJesse Gross offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off); 330e21e0b5fSVille Nuorvala if (offset < 0) 331e21e0b5fSVille Nuorvala return 0; 332e21e0b5fSVille Nuorvala } else 333e21e0b5fSVille Nuorvala offset = sizeof(struct ipv6hdr); 334e21e0b5fSVille Nuorvala 335e21e0b5fSVille Nuorvala if (nexthdr == IPPROTO_ICMPV6) { 336e21e0b5fSVille Nuorvala struct icmp6hdr *icmp6; 337e21e0b5fSVille Nuorvala 338d56f90a7SArnaldo Carvalho de Melo if (!pskb_may_pull(skb, (skb_network_header(skb) + 339d56f90a7SArnaldo Carvalho de Melo offset + 1 - skb->data))) 340e21e0b5fSVille Nuorvala return 0; 341e21e0b5fSVille Nuorvala 342d56f90a7SArnaldo Carvalho de Melo icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset); 343e21e0b5fSVille Nuorvala 344e21e0b5fSVille Nuorvala switch (icmp6->icmp6_type) { 345e21e0b5fSVille Nuorvala case NDISC_ROUTER_SOLICITATION: 346e21e0b5fSVille Nuorvala case NDISC_ROUTER_ADVERTISEMENT: 347e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_SOLICITATION: 348e21e0b5fSVille Nuorvala case NDISC_NEIGHBOUR_ADVERTISEMENT: 349e21e0b5fSVille Nuorvala case NDISC_REDIRECT: 350e21e0b5fSVille Nuorvala /* For reaction involving unicast neighbor discovery 351e21e0b5fSVille Nuorvala * message destined to the proxied address, pass it to 352e21e0b5fSVille Nuorvala * input function. 353e21e0b5fSVille Nuorvala */ 354e21e0b5fSVille Nuorvala return 1; 355e21e0b5fSVille Nuorvala default: 356e21e0b5fSVille Nuorvala break; 357e21e0b5fSVille Nuorvala } 358e21e0b5fSVille Nuorvala } 359e21e0b5fSVille Nuorvala 36074553b09SVille Nuorvala /* 36174553b09SVille Nuorvala * The proxying router can't forward traffic sent to a link-local 36274553b09SVille Nuorvala * address, so signal the sender and discard the packet. This 36374553b09SVille Nuorvala * behavior is clarified by the MIPv6 specification. 36474553b09SVille Nuorvala */ 36574553b09SVille Nuorvala if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) { 36674553b09SVille Nuorvala dst_link_failure(skb); 36774553b09SVille Nuorvala return -1; 36874553b09SVille Nuorvala } 36974553b09SVille Nuorvala 370e21e0b5fSVille Nuorvala return 0; 371e21e0b5fSVille Nuorvala } 372e21e0b5fSVille Nuorvala 3730c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk, 3740c4b51f0SEric W. Biederman struct sk_buff *skb) 3751da177e4SLinus Torvalds { 37671a1c915SJeff Barnhill struct dst_entry *dst = skb_dst(skb); 37771a1c915SJeff Barnhill 37871a1c915SJeff Barnhill __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS); 37971a1c915SJeff Barnhill __IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len); 38071a1c915SJeff Barnhill 381*f839a6c9SIdo Schimmel #ifdef CONFIG_NET_SWITCHDEV 382*f839a6c9SIdo Schimmel if (skb->offload_l3_fwd_mark) { 383*f839a6c9SIdo Schimmel consume_skb(skb); 384*f839a6c9SIdo Schimmel return 0; 385*f839a6c9SIdo Schimmel } 386*f839a6c9SIdo Schimmel #endif 387*f839a6c9SIdo Schimmel 38813206b6bSEric W. Biederman return dst_output(net, sk, skb); 3891da177e4SLinus Torvalds } 3901da177e4SLinus Torvalds 391fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu) 392fe6cc55fSFlorian Westphal { 393418a3156SFlorian Westphal if (skb->len <= mtu) 394fe6cc55fSFlorian Westphal return false; 395fe6cc55fSFlorian Westphal 39660ff7467SWANG Cong /* ipv6 conntrack defrag sets max_frag_size + ignore_df */ 397fe6cc55fSFlorian Westphal if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu) 398fe6cc55fSFlorian Westphal return true; 399fe6cc55fSFlorian Westphal 40060ff7467SWANG Cong if (skb->ignore_df) 401418a3156SFlorian Westphal return false; 402418a3156SFlorian Westphal 403779b7931SDaniel Axtens if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu)) 404fe6cc55fSFlorian Westphal return false; 405fe6cc55fSFlorian Westphal 406fe6cc55fSFlorian Westphal return true; 407fe6cc55fSFlorian Westphal } 408fe6cc55fSFlorian Westphal 4091da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb) 4101da177e4SLinus Torvalds { 411bdb7cc64SStephen Suryaputra struct inet6_dev *idev = __in6_dev_get_safely(skb->dev); 412adf30907SEric Dumazet struct dst_entry *dst = skb_dst(skb); 4130660e03fSArnaldo Carvalho de Melo struct ipv6hdr *hdr = ipv6_hdr(skb); 4141da177e4SLinus Torvalds struct inet6_skb_parm *opt = IP6CB(skb); 415c346dca1SYOSHIFUJI Hideaki struct net *net = dev_net(dst->dev); 41614f3ad6fSUlrich Weber u32 mtu; 4171da177e4SLinus Torvalds 41853b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->forwarding == 0) 4191da177e4SLinus Torvalds goto error; 4201da177e4SLinus Torvalds 421090f1166SLi RongQing if (skb->pkt_type != PACKET_HOST) 422090f1166SLi RongQing goto drop; 423090f1166SLi RongQing 4249ef2e965SHannes Frederic Sowa if (unlikely(skb->sk)) 4259ef2e965SHannes Frederic Sowa goto drop; 4269ef2e965SHannes Frederic Sowa 4274497b076SBen Hutchings if (skb_warn_if_lro(skb)) 4284497b076SBen Hutchings goto drop; 4294497b076SBen Hutchings 4301da177e4SLinus Torvalds if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) { 431bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 4321da177e4SLinus Torvalds goto drop; 4331da177e4SLinus Torvalds } 4341da177e4SLinus Torvalds 43535fc92a9SHerbert Xu skb_forward_csum(skb); 4361da177e4SLinus Torvalds 4371da177e4SLinus Torvalds /* 4381da177e4SLinus Torvalds * We DO NOT make any processing on 4391da177e4SLinus Torvalds * RA packets, pushing them to user level AS IS 4401da177e4SLinus Torvalds * without ane WARRANTY that application will be able 4411da177e4SLinus Torvalds * to interpret them. The reason is that we 4421da177e4SLinus Torvalds * cannot make anything clever here. 4431da177e4SLinus Torvalds * 4441da177e4SLinus Torvalds * We are not end-node, so that if packet contains 4451da177e4SLinus Torvalds * AH/ESP, we cannot make anything. 4461da177e4SLinus Torvalds * Defragmentation also would be mistake, RA packets 4471da177e4SLinus Torvalds * cannot be fragmented, because there is no warranty 4481da177e4SLinus Torvalds * that different fragments will go along one path. --ANK 4491da177e4SLinus Torvalds */ 450ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) { 451ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 if (ip6_call_ra_chain(skb, ntohs(opt->ra))) 4521da177e4SLinus Torvalds return 0; 4531da177e4SLinus Torvalds } 4541da177e4SLinus Torvalds 4551da177e4SLinus Torvalds /* 4561da177e4SLinus Torvalds * check and decrement ttl 4571da177e4SLinus Torvalds */ 4581da177e4SLinus Torvalds if (hdr->hop_limit <= 1) { 4591da177e4SLinus Torvalds /* Force OUTPUT device used as source address */ 4601da177e4SLinus Torvalds skb->dev = dst->dev; 4613ffe533cSAlexey Dobriyan icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0); 462bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS); 4631da177e4SLinus Torvalds 4641da177e4SLinus Torvalds kfree_skb(skb); 4651da177e4SLinus Torvalds return -ETIMEDOUT; 4661da177e4SLinus Torvalds } 4671da177e4SLinus Torvalds 468fbea49e1SYOSHIFUJI Hideaki /* XXX: idev->cnf.proxy_ndp? */ 46953b7997fSYOSHIFUJI Hideaki if (net->ipv6.devconf_all->proxy_ndp && 4708a3edd80SDaniel Lezcano pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) { 47174553b09SVille Nuorvala int proxied = ip6_forward_proxy_check(skb); 47274553b09SVille Nuorvala if (proxied > 0) 473e21e0b5fSVille Nuorvala return ip6_input(skb); 47474553b09SVille Nuorvala else if (proxied < 0) { 475bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 47674553b09SVille Nuorvala goto drop; 47774553b09SVille Nuorvala } 478e21e0b5fSVille Nuorvala } 479e21e0b5fSVille Nuorvala 4801da177e4SLinus Torvalds if (!xfrm6_route_forward(skb)) { 481bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS); 4821da177e4SLinus Torvalds goto drop; 4831da177e4SLinus Torvalds } 484adf30907SEric Dumazet dst = skb_dst(skb); 4851da177e4SLinus Torvalds 4861da177e4SLinus Torvalds /* IPv6 specs say nothing about it, but it is clear that we cannot 4871da177e4SLinus Torvalds send redirects to source routed frames. 4881e5dc146SMasahide NAKAMURA We don't send redirects to frames decapsulated from IPsec. 4891da177e4SLinus Torvalds */ 4902f17becfSStephen Suryaputra if (IP6CB(skb)->iif == dst->dev->ifindex && 4912f17becfSStephen Suryaputra opt->srcrt == 0 && !skb_sec_path(skb)) { 4921da177e4SLinus Torvalds struct in6_addr *target = NULL; 493fbfe95a4SDavid S. Miller struct inet_peer *peer; 4941da177e4SLinus Torvalds struct rt6_info *rt; 4951da177e4SLinus Torvalds 4961da177e4SLinus Torvalds /* 4971da177e4SLinus Torvalds * incoming and outgoing devices are the same 4981da177e4SLinus Torvalds * send a redirect. 4991da177e4SLinus Torvalds */ 5001da177e4SLinus Torvalds 5011da177e4SLinus Torvalds rt = (struct rt6_info *) dst; 502c45a3dfbSDavid S. Miller if (rt->rt6i_flags & RTF_GATEWAY) 503c45a3dfbSDavid S. Miller target = &rt->rt6i_gateway; 5041da177e4SLinus Torvalds else 5051da177e4SLinus Torvalds target = &hdr->daddr; 5061da177e4SLinus Torvalds 507fd0273d7SMartin KaFai Lau peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1); 50892d86829SDavid S. Miller 5091da177e4SLinus Torvalds /* Limit redirects both by destination (here) 5101da177e4SLinus Torvalds and by source (inside ndisc_send_redirect) 5111da177e4SLinus Torvalds */ 512fbfe95a4SDavid S. Miller if (inet_peer_xrlim_allow(peer, 1*HZ)) 5134991969aSDavid S. Miller ndisc_send_redirect(skb, target); 5141d861aa4SDavid S. Miller if (peer) 5151d861aa4SDavid S. Miller inet_putpeer(peer); 5165bb1ab09SDavid L Stevens } else { 5175bb1ab09SDavid L Stevens int addrtype = ipv6_addr_type(&hdr->saddr); 5185bb1ab09SDavid L Stevens 5191da177e4SLinus Torvalds /* This check is security critical. */ 520f81b2e7dSYOSHIFUJI Hideaki if (addrtype == IPV6_ADDR_ANY || 521f81b2e7dSYOSHIFUJI Hideaki addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK)) 5221da177e4SLinus Torvalds goto error; 5235bb1ab09SDavid L Stevens if (addrtype & IPV6_ADDR_LINKLOCAL) { 5245bb1ab09SDavid L Stevens icmpv6_send(skb, ICMPV6_DEST_UNREACH, 5253ffe533cSAlexey Dobriyan ICMPV6_NOT_NEIGHBOUR, 0); 5265bb1ab09SDavid L Stevens goto error; 5275bb1ab09SDavid L Stevens } 5281da177e4SLinus Torvalds } 5291da177e4SLinus Torvalds 5300954cf9cSHannes Frederic Sowa mtu = ip6_dst_mtu_forward(dst); 53114f3ad6fSUlrich Weber if (mtu < IPV6_MIN_MTU) 53214f3ad6fSUlrich Weber mtu = IPV6_MIN_MTU; 53314f3ad6fSUlrich Weber 534fe6cc55fSFlorian Westphal if (ip6_pkt_too_big(skb, mtu)) { 5351da177e4SLinus Torvalds /* Again, force OUTPUT device used as source address */ 5361da177e4SLinus Torvalds skb->dev = dst->dev; 53714f3ad6fSUlrich Weber icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 538bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS); 5391d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 54015c77d8bSEric Dumazet IPSTATS_MIB_FRAGFAILS); 5411da177e4SLinus Torvalds kfree_skb(skb); 5421da177e4SLinus Torvalds return -EMSGSIZE; 5431da177e4SLinus Torvalds } 5441da177e4SLinus Torvalds 5451da177e4SLinus Torvalds if (skb_cow(skb, dst->dev->hard_header_len)) { 5461d015503SEric Dumazet __IP6_INC_STATS(net, ip6_dst_idev(dst), 54715c77d8bSEric Dumazet IPSTATS_MIB_OUTDISCARDS); 5481da177e4SLinus Torvalds goto drop; 5491da177e4SLinus Torvalds } 5501da177e4SLinus Torvalds 5510660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 5521da177e4SLinus Torvalds 5531da177e4SLinus Torvalds /* Mangling hops number delayed to point after skb COW */ 5541da177e4SLinus Torvalds 5551da177e4SLinus Torvalds hdr->hop_limit--; 5561da177e4SLinus Torvalds 55729a26a56SEric W. Biederman return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD, 55829a26a56SEric W. Biederman net, NULL, skb, skb->dev, dst->dev, 5596e23ae2aSPatrick McHardy ip6_forward_finish); 5601da177e4SLinus Torvalds 5611da177e4SLinus Torvalds error: 562bdb7cc64SStephen Suryaputra __IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS); 5631da177e4SLinus Torvalds drop: 5641da177e4SLinus Torvalds kfree_skb(skb); 5651da177e4SLinus Torvalds return -EINVAL; 5661da177e4SLinus Torvalds } 5671da177e4SLinus Torvalds 5681da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from) 5691da177e4SLinus Torvalds { 5701da177e4SLinus Torvalds to->pkt_type = from->pkt_type; 5711da177e4SLinus Torvalds to->priority = from->priority; 5721da177e4SLinus Torvalds to->protocol = from->protocol; 573adf30907SEric Dumazet skb_dst_drop(to); 574adf30907SEric Dumazet skb_dst_set(to, dst_clone(skb_dst(from))); 5751da177e4SLinus Torvalds to->dev = from->dev; 57682e91ffeSThomas Graf to->mark = from->mark; 5771da177e4SLinus Torvalds 5783dd1c9a1SPaolo Abeni skb_copy_hash(to, from); 5793dd1c9a1SPaolo Abeni 5801da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED 5811da177e4SLinus Torvalds to->tc_index = from->tc_index; 5821da177e4SLinus Torvalds #endif 583e7ac05f3SYasuyuki Kozakai nf_copy(to, from); 584984bc16cSJames Morris skb_copy_secmark(to, from); 5851da177e4SLinus Torvalds } 5861da177e4SLinus Torvalds 5877d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb, 5887d8c6e39SEric W. Biederman int (*output)(struct net *, struct sock *, struct sk_buff *)) 5891da177e4SLinus Torvalds { 5901da177e4SLinus Torvalds struct sk_buff *frag; 591adf30907SEric Dumazet struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 592f60e5990Shannes@stressinduktion.org struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ? 593f60e5990Shannes@stressinduktion.org inet6_sk(skb->sk) : NULL; 5941da177e4SLinus Torvalds struct ipv6hdr *tmp_hdr; 5951da177e4SLinus Torvalds struct frag_hdr *fh; 5961da177e4SLinus Torvalds unsigned int mtu, hlen, left, len; 597a7ae1992SHerbert Xu int hroom, troom; 598286c2349SMartin KaFai Lau __be32 frag_id; 5991da177e4SLinus Torvalds int ptr, offset = 0, err = 0; 6001da177e4SLinus Torvalds u8 *prevhdr, nexthdr = 0; 6011da177e4SLinus Torvalds 6027dd7eb95SDavid S. Miller err = ip6_find_1stfragopt(skb, &prevhdr); 6037dd7eb95SDavid S. Miller if (err < 0) 6042423496aSCraig Gallek goto fail; 6057dd7eb95SDavid S. Miller hlen = err; 6061da177e4SLinus Torvalds nexthdr = *prevhdr; 6071da177e4SLinus Torvalds 608628a5c56SJohn Heffner mtu = ip6_skb_dst_mtu(skb); 609b881ef76SJohn Heffner 610b881ef76SJohn Heffner /* We must not fragment if the socket is set to force MTU discovery 61114f3ad6fSUlrich Weber * or if the skb it not generated by a local socket. 612b881ef76SJohn Heffner */ 613485fca66SFlorian Westphal if (unlikely(!skb->ignore_df && skb->len > mtu)) 614485fca66SFlorian Westphal goto fail_toobig; 615a34a101eSEric Dumazet 616485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size) { 617485fca66SFlorian Westphal if (IP6CB(skb)->frag_max_size > mtu) 618485fca66SFlorian Westphal goto fail_toobig; 619485fca66SFlorian Westphal 620485fca66SFlorian Westphal /* don't send fragments larger than what we received */ 621485fca66SFlorian Westphal mtu = IP6CB(skb)->frag_max_size; 622485fca66SFlorian Westphal if (mtu < IPV6_MIN_MTU) 623485fca66SFlorian Westphal mtu = IPV6_MIN_MTU; 624b881ef76SJohn Heffner } 625b881ef76SJohn Heffner 626d91675f9SYOSHIFUJI Hideaki if (np && np->frag_size < mtu) { 627d91675f9SYOSHIFUJI Hideaki if (np->frag_size) 628d91675f9SYOSHIFUJI Hideaki mtu = np->frag_size; 629d91675f9SYOSHIFUJI Hideaki } 63089bc7848SHannes Frederic Sowa if (mtu < hlen + sizeof(struct frag_hdr) + 8) 631b72a2b01SHannes Frederic Sowa goto fail_toobig; 6321e0d69a9SHannes Frederic Sowa mtu -= hlen + sizeof(struct frag_hdr); 6331da177e4SLinus Torvalds 634fd0273d7SMartin KaFai Lau frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr, 635fd0273d7SMartin KaFai Lau &ipv6_hdr(skb)->saddr); 636286c2349SMartin KaFai Lau 637405c92f7SHannes Frederic Sowa if (skb->ip_summed == CHECKSUM_PARTIAL && 638405c92f7SHannes Frederic Sowa (err = skb_checksum_help(skb))) 639405c92f7SHannes Frederic Sowa goto fail; 640405c92f7SHannes Frederic Sowa 6411d325d21SFlorian Westphal hroom = LL_RESERVED_SPACE(rt->dst.dev); 64221dc3301SDavid S. Miller if (skb_has_frag_list(skb)) { 643c72d8cdaSAlexey Dobriyan unsigned int first_len = skb_pagelen(skb); 6443d13008eSEric Dumazet struct sk_buff *frag2; 6451da177e4SLinus Torvalds 6461da177e4SLinus Torvalds if (first_len - hlen > mtu || 6471da177e4SLinus Torvalds ((first_len - hlen) & 7) || 6481d325d21SFlorian Westphal skb_cloned(skb) || 6491d325d21SFlorian Westphal skb_headroom(skb) < (hroom + sizeof(struct frag_hdr))) 6501da177e4SLinus Torvalds goto slow_path; 6511da177e4SLinus Torvalds 6524d9092bbSDavid S. Miller skb_walk_frags(skb, frag) { 6531da177e4SLinus Torvalds /* Correct geometry. */ 6541da177e4SLinus Torvalds if (frag->len > mtu || 6551da177e4SLinus Torvalds ((frag->len & 7) && frag->next) || 6561d325d21SFlorian Westphal skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr))) 6573d13008eSEric Dumazet goto slow_path_clean; 6581da177e4SLinus Torvalds 6591da177e4SLinus Torvalds /* Partially cloned skb? */ 6601da177e4SLinus Torvalds if (skb_shared(frag)) 6613d13008eSEric Dumazet goto slow_path_clean; 6622fdba6b0SHerbert Xu 6632fdba6b0SHerbert Xu BUG_ON(frag->sk); 6642fdba6b0SHerbert Xu if (skb->sk) { 6652fdba6b0SHerbert Xu frag->sk = skb->sk; 6662fdba6b0SHerbert Xu frag->destructor = sock_wfree; 6672fdba6b0SHerbert Xu } 6683d13008eSEric Dumazet skb->truesize -= frag->truesize; 6691da177e4SLinus Torvalds } 6701da177e4SLinus Torvalds 6711da177e4SLinus Torvalds err = 0; 6721da177e4SLinus Torvalds offset = 0; 6731da177e4SLinus Torvalds /* BUILD HEADER */ 6741da177e4SLinus Torvalds 6759a217a1cSYOSHIFUJI Hideaki *prevhdr = NEXTHDR_FRAGMENT; 676d56f90a7SArnaldo Carvalho de Melo tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC); 6771da177e4SLinus Torvalds if (!tmp_hdr) { 6781d325d21SFlorian Westphal err = -ENOMEM; 6791d325d21SFlorian Westphal goto fail; 6801da177e4SLinus Torvalds } 6811d325d21SFlorian Westphal frag = skb_shinfo(skb)->frag_list; 6821d325d21SFlorian Westphal skb_frag_list_init(skb); 6831da177e4SLinus Torvalds 6841da177e4SLinus Torvalds __skb_pull(skb, hlen); 685d58ff351SJohannes Berg fh = __skb_push(skb, sizeof(struct frag_hdr)); 686e2d1bca7SArnaldo Carvalho de Melo __skb_push(skb, hlen); 687e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 688d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(skb), tmp_hdr, hlen); 6891da177e4SLinus Torvalds 6901da177e4SLinus Torvalds fh->nexthdr = nexthdr; 6911da177e4SLinus Torvalds fh->reserved = 0; 6921da177e4SLinus Torvalds fh->frag_off = htons(IP6_MF); 693286c2349SMartin KaFai Lau fh->identification = frag_id; 6941da177e4SLinus Torvalds 6951da177e4SLinus Torvalds first_len = skb_pagelen(skb); 6961da177e4SLinus Torvalds skb->data_len = first_len - skb_headlen(skb); 6971da177e4SLinus Torvalds skb->len = first_len; 6980660e03fSArnaldo Carvalho de Melo ipv6_hdr(skb)->payload_len = htons(first_len - 6990660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 7001da177e4SLinus Torvalds 7011da177e4SLinus Torvalds for (;;) { 7021da177e4SLinus Torvalds /* Prepare header of the next frame, 7031da177e4SLinus Torvalds * before previous one went down. */ 7041da177e4SLinus Torvalds if (frag) { 7051da177e4SLinus Torvalds frag->ip_summed = CHECKSUM_NONE; 706badff6d0SArnaldo Carvalho de Melo skb_reset_transport_header(frag); 707d58ff351SJohannes Berg fh = __skb_push(frag, sizeof(struct frag_hdr)); 708e2d1bca7SArnaldo Carvalho de Melo __skb_push(frag, hlen); 709e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(frag); 710d56f90a7SArnaldo Carvalho de Melo memcpy(skb_network_header(frag), tmp_hdr, 711d56f90a7SArnaldo Carvalho de Melo hlen); 7121da177e4SLinus Torvalds offset += skb->len - hlen - sizeof(struct frag_hdr); 7131da177e4SLinus Torvalds fh->nexthdr = nexthdr; 7141da177e4SLinus Torvalds fh->reserved = 0; 7151da177e4SLinus Torvalds fh->frag_off = htons(offset); 71653b24b8fSIan Morris if (frag->next) 7171da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 7181da177e4SLinus Torvalds fh->identification = frag_id; 7190660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = 7200660e03fSArnaldo Carvalho de Melo htons(frag->len - 7210660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 7221da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 7231da177e4SLinus Torvalds } 7241da177e4SLinus Torvalds 7257d8c6e39SEric W. Biederman err = output(net, sk, skb); 726dafee490SWei Dong if (!err) 727d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7283bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 729dafee490SWei Dong 7301da177e4SLinus Torvalds if (err || !frag) 7311da177e4SLinus Torvalds break; 7321da177e4SLinus Torvalds 7331da177e4SLinus Torvalds skb = frag; 7341da177e4SLinus Torvalds frag = skb->next; 735a8305bffSDavid S. Miller skb_mark_not_on_list(skb); 7361da177e4SLinus Torvalds } 7371da177e4SLinus Torvalds 7381da177e4SLinus Torvalds kfree(tmp_hdr); 7391da177e4SLinus Torvalds 7401da177e4SLinus Torvalds if (err == 0) { 741d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7423bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGOKS); 7431da177e4SLinus Torvalds return 0; 7441da177e4SLinus Torvalds } 7451da177e4SLinus Torvalds 74646cfd725SFlorian Westphal kfree_skb_list(frag); 7471da177e4SLinus Torvalds 748d8d1f30bSChangli Gao IP6_INC_STATS(net, ip6_dst_idev(&rt->dst), 7493bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGFAILS); 7501da177e4SLinus Torvalds return err; 7513d13008eSEric Dumazet 7523d13008eSEric Dumazet slow_path_clean: 7533d13008eSEric Dumazet skb_walk_frags(skb, frag2) { 7543d13008eSEric Dumazet if (frag2 == frag) 7553d13008eSEric Dumazet break; 7563d13008eSEric Dumazet frag2->sk = NULL; 7573d13008eSEric Dumazet frag2->destructor = NULL; 7583d13008eSEric Dumazet skb->truesize += frag2->truesize; 7593d13008eSEric Dumazet } 7601da177e4SLinus Torvalds } 7611da177e4SLinus Torvalds 7621da177e4SLinus Torvalds slow_path: 7631da177e4SLinus Torvalds left = skb->len - hlen; /* Space per frame */ 7641da177e4SLinus Torvalds ptr = hlen; /* Where to start from */ 7651da177e4SLinus Torvalds 7661da177e4SLinus Torvalds /* 7671da177e4SLinus Torvalds * Fragment the datagram. 7681da177e4SLinus Torvalds */ 7691da177e4SLinus Torvalds 770a7ae1992SHerbert Xu troom = rt->dst.dev->needed_tailroom; 7711da177e4SLinus Torvalds 7721da177e4SLinus Torvalds /* 7731da177e4SLinus Torvalds * Keep copying data until we run out. 7741da177e4SLinus Torvalds */ 7751da177e4SLinus Torvalds while (left > 0) { 77679e49503SFlorian Westphal u8 *fragnexthdr_offset; 77779e49503SFlorian Westphal 7781da177e4SLinus Torvalds len = left; 7791da177e4SLinus Torvalds /* IF: it doesn't fit, use 'mtu' - the data space left */ 7801da177e4SLinus Torvalds if (len > mtu) 7811da177e4SLinus Torvalds len = mtu; 7821da177e4SLinus Torvalds /* IF: we are not sending up to and including the packet end 7831da177e4SLinus Torvalds then align the next start on an eight byte boundary */ 7841da177e4SLinus Torvalds if (len < left) { 7851da177e4SLinus Torvalds len &= ~7; 7861da177e4SLinus Torvalds } 7871da177e4SLinus Torvalds 788cbffccc9SJoe Perches /* Allocate buffer */ 789cbffccc9SJoe Perches frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) + 790cbffccc9SJoe Perches hroom + troom, GFP_ATOMIC); 791cbffccc9SJoe Perches if (!frag) { 7921da177e4SLinus Torvalds err = -ENOMEM; 7931da177e4SLinus Torvalds goto fail; 7941da177e4SLinus Torvalds } 7951da177e4SLinus Torvalds 7961da177e4SLinus Torvalds /* 7971da177e4SLinus Torvalds * Set up data on packet 7981da177e4SLinus Torvalds */ 7991da177e4SLinus Torvalds 8001da177e4SLinus Torvalds ip6_copy_metadata(frag, skb); 801a7ae1992SHerbert Xu skb_reserve(frag, hroom); 8021da177e4SLinus Torvalds skb_put(frag, len + hlen + sizeof(struct frag_hdr)); 803c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(frag); 804badff6d0SArnaldo Carvalho de Melo fh = (struct frag_hdr *)(skb_network_header(frag) + hlen); 805b0e380b1SArnaldo Carvalho de Melo frag->transport_header = (frag->network_header + hlen + 806b0e380b1SArnaldo Carvalho de Melo sizeof(struct frag_hdr)); 8071da177e4SLinus Torvalds 8081da177e4SLinus Torvalds /* 8091da177e4SLinus Torvalds * Charge the memory for the fragment to any owner 8101da177e4SLinus Torvalds * it might possess 8111da177e4SLinus Torvalds */ 8121da177e4SLinus Torvalds if (skb->sk) 8131da177e4SLinus Torvalds skb_set_owner_w(frag, skb->sk); 8141da177e4SLinus Torvalds 8151da177e4SLinus Torvalds /* 8161da177e4SLinus Torvalds * Copy the packet header into the new buffer. 8171da177e4SLinus Torvalds */ 818d626f62bSArnaldo Carvalho de Melo skb_copy_from_linear_data(skb, skb_network_header(frag), hlen); 8191da177e4SLinus Torvalds 82079e49503SFlorian Westphal fragnexthdr_offset = skb_network_header(frag); 82179e49503SFlorian Westphal fragnexthdr_offset += prevhdr - skb_network_header(skb); 82279e49503SFlorian Westphal *fragnexthdr_offset = NEXTHDR_FRAGMENT; 82379e49503SFlorian Westphal 8241da177e4SLinus Torvalds /* 8251da177e4SLinus Torvalds * Build fragment header. 8261da177e4SLinus Torvalds */ 8271da177e4SLinus Torvalds fh->nexthdr = nexthdr; 8281da177e4SLinus Torvalds fh->reserved = 0; 8291da177e4SLinus Torvalds fh->identification = frag_id; 8301da177e4SLinus Torvalds 8311da177e4SLinus Torvalds /* 8321da177e4SLinus Torvalds * Copy a block of the IP datagram. 8331da177e4SLinus Torvalds */ 834e3f0b86bSHimangi Saraogi BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag), 835e3f0b86bSHimangi Saraogi len)); 8361da177e4SLinus Torvalds left -= len; 8371da177e4SLinus Torvalds 8381da177e4SLinus Torvalds fh->frag_off = htons(offset); 8391da177e4SLinus Torvalds if (left > 0) 8401da177e4SLinus Torvalds fh->frag_off |= htons(IP6_MF); 8410660e03fSArnaldo Carvalho de Melo ipv6_hdr(frag)->payload_len = htons(frag->len - 8420660e03fSArnaldo Carvalho de Melo sizeof(struct ipv6hdr)); 8431da177e4SLinus Torvalds 8441da177e4SLinus Torvalds ptr += len; 8451da177e4SLinus Torvalds offset += len; 8461da177e4SLinus Torvalds 8471da177e4SLinus Torvalds /* 8481da177e4SLinus Torvalds * Put this fragment into the sending queue. 8491da177e4SLinus Torvalds */ 8507d8c6e39SEric W. Biederman err = output(net, sk, frag); 8511da177e4SLinus Torvalds if (err) 8521da177e4SLinus Torvalds goto fail; 853dafee490SWei Dong 854adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 8553bd653c8SDenis V. Lunev IPSTATS_MIB_FRAGCREATES); 8561da177e4SLinus Torvalds } 857adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 858a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGOKS); 859808db80aSEric Dumazet consume_skb(skb); 8601da177e4SLinus Torvalds return err; 8611da177e4SLinus Torvalds 862485fca66SFlorian Westphal fail_toobig: 863485fca66SFlorian Westphal if (skb->sk && dst_allfrag(skb_dst(skb))) 864485fca66SFlorian Westphal sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK); 865485fca66SFlorian Westphal 866485fca66SFlorian Westphal icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu); 867485fca66SFlorian Westphal err = -EMSGSIZE; 868485fca66SFlorian Westphal 8691da177e4SLinus Torvalds fail: 870adf30907SEric Dumazet IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), 871a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_FRAGFAILS); 8721da177e4SLinus Torvalds kfree_skb(skb); 8731da177e4SLinus Torvalds return err; 8741da177e4SLinus Torvalds } 8751da177e4SLinus Torvalds 876b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key, 877b71d1d42SEric Dumazet const struct in6_addr *fl_addr, 878b71d1d42SEric Dumazet const struct in6_addr *addr_cache) 879cf6b1982SYOSHIFUJI Hideaki { 880a02cec21SEric Dumazet return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) && 88163159f29SIan Morris (!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache)); 882cf6b1982SYOSHIFUJI Hideaki } 883cf6b1982SYOSHIFUJI Hideaki 884497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk, 885497c615aSHerbert Xu struct dst_entry *dst, 886b71d1d42SEric Dumazet const struct flowi6 *fl6) 8871da177e4SLinus Torvalds { 8881da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 889a963a37dSEric Dumazet struct rt6_info *rt; 8901da177e4SLinus Torvalds 891497c615aSHerbert Xu if (!dst) 892497c615aSHerbert Xu goto out; 8931da177e4SLinus Torvalds 894a963a37dSEric Dumazet if (dst->ops->family != AF_INET6) { 895a963a37dSEric Dumazet dst_release(dst); 896a963a37dSEric Dumazet return NULL; 897a963a37dSEric Dumazet } 898a963a37dSEric Dumazet 899a963a37dSEric Dumazet rt = (struct rt6_info *)dst; 9001da177e4SLinus Torvalds /* Yes, checking route validity in not connected 901d76e60a5SDavid S. Miller * case is not very simple. Take into account, 902d76e60a5SDavid S. Miller * that we do not support routing by source, TOS, 903d76e60a5SDavid S. Miller * and MSG_DONTROUTE --ANK (980726) 904d76e60a5SDavid S. Miller * 905cf6b1982SYOSHIFUJI Hideaki * 1. ip6_rt_check(): If route was host route, 906cf6b1982SYOSHIFUJI Hideaki * check that cached destination is current. 907d76e60a5SDavid S. Miller * If it is network route, we still may 908d76e60a5SDavid S. Miller * check its validity using saved pointer 909d76e60a5SDavid S. Miller * to the last used address: daddr_cache. 910d76e60a5SDavid S. Miller * We do not want to save whole address now, 911d76e60a5SDavid S. Miller * (because main consumer of this service 912d76e60a5SDavid S. Miller * is tcp, which has not this problem), 913d76e60a5SDavid S. Miller * so that the last trick works only on connected 914d76e60a5SDavid S. Miller * sockets. 915d76e60a5SDavid S. Miller * 2. oif also should be the same. 9161da177e4SLinus Torvalds */ 9174c9483b2SDavid S. Miller if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) || 9188e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES 9194c9483b2SDavid S. Miller ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) || 9208e1ef0a9SYOSHIFUJI Hideaki #endif 921ca254490SDavid Ahern (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) && 922ca254490SDavid Ahern (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) { 923497c615aSHerbert Xu dst_release(dst); 924497c615aSHerbert Xu dst = NULL; 9251da177e4SLinus Torvalds } 926497c615aSHerbert Xu 927497c615aSHerbert Xu out: 928497c615aSHerbert Xu return dst; 9291da177e4SLinus Torvalds } 930497c615aSHerbert Xu 9313aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk, 9324c9483b2SDavid S. Miller struct dst_entry **dst, struct flowi6 *fl6) 933497c615aSHerbert Xu { 93469cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 93569cce1d1SDavid S. Miller struct neighbour *n; 93697cac082SDavid S. Miller struct rt6_info *rt; 93769cce1d1SDavid S. Miller #endif 93869cce1d1SDavid S. Miller int err; 9396f21c96aSPaolo Abeni int flags = 0; 9401da177e4SLinus Torvalds 941e16e888bSMarkus Stenberg /* The correct way to handle this would be to do 942e16e888bSMarkus Stenberg * ip6_route_get_saddr, and then ip6_route_output; however, 943e16e888bSMarkus Stenberg * the route-specific preferred source forces the 944e16e888bSMarkus Stenberg * ip6_route_output call _before_ ip6_route_get_saddr. 945e16e888bSMarkus Stenberg * 946e16e888bSMarkus Stenberg * In source specific routing (no src=any default route), 947e16e888bSMarkus Stenberg * ip6_route_output will fail given src=any saddr, though, so 948e16e888bSMarkus Stenberg * that's why we try it again later. 949e16e888bSMarkus Stenberg */ 950e16e888bSMarkus Stenberg if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) { 951a68886a6SDavid Ahern struct fib6_info *from; 952e16e888bSMarkus Stenberg struct rt6_info *rt; 953e16e888bSMarkus Stenberg bool had_dst = *dst != NULL; 954e16e888bSMarkus Stenberg 955e16e888bSMarkus Stenberg if (!had_dst) 956e16e888bSMarkus Stenberg *dst = ip6_route_output(net, sk, fl6); 957e16e888bSMarkus Stenberg rt = (*dst)->error ? NULL : (struct rt6_info *)*dst; 958a68886a6SDavid Ahern 959a68886a6SDavid Ahern rcu_read_lock(); 960a68886a6SDavid Ahern from = rt ? rcu_dereference(rt->from) : NULL; 961a68886a6SDavid Ahern err = ip6_route_get_saddr(net, from, &fl6->daddr, 962e16e888bSMarkus Stenberg sk ? inet6_sk(sk)->srcprefs : 0, 963e16e888bSMarkus Stenberg &fl6->saddr); 964a68886a6SDavid Ahern rcu_read_unlock(); 965a68886a6SDavid Ahern 966e16e888bSMarkus Stenberg if (err) 967e16e888bSMarkus Stenberg goto out_err_release; 968e16e888bSMarkus Stenberg 969e16e888bSMarkus Stenberg /* If we had an erroneous initial result, pretend it 970e16e888bSMarkus Stenberg * never existed and let the SA-enabled version take 971e16e888bSMarkus Stenberg * over. 972e16e888bSMarkus Stenberg */ 973e16e888bSMarkus Stenberg if (!had_dst && (*dst)->error) { 974e16e888bSMarkus Stenberg dst_release(*dst); 975e16e888bSMarkus Stenberg *dst = NULL; 976e16e888bSMarkus Stenberg } 9776f21c96aSPaolo Abeni 9786f21c96aSPaolo Abeni if (fl6->flowi6_oif) 9796f21c96aSPaolo Abeni flags |= RT6_LOOKUP_F_IFACE; 980e16e888bSMarkus Stenberg } 981e16e888bSMarkus Stenberg 98263159f29SIan Morris if (!*dst) 9836f21c96aSPaolo Abeni *dst = ip6_route_output_flags(net, sk, fl6, flags); 9841da177e4SLinus Torvalds 985e5d08d71SIan Morris err = (*dst)->error; 986e5d08d71SIan Morris if (err) 9871da177e4SLinus Torvalds goto out_err_release; 9881da177e4SLinus Torvalds 98995c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD 99095c385b4SNeil Horman /* 99195c385b4SNeil Horman * Here if the dst entry we've looked up 99295c385b4SNeil Horman * has a neighbour entry that is in the INCOMPLETE 99395c385b4SNeil Horman * state and the src address from the flow is 99495c385b4SNeil Horman * marked as OPTIMISTIC, we release the found 99595c385b4SNeil Horman * dst entry and replace it instead with the 99695c385b4SNeil Horman * dst entry of the nexthop router 99795c385b4SNeil Horman */ 998c56bf6feSEric Dumazet rt = (struct rt6_info *) *dst; 999707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_lock_bh(); 10002647a9b0SMartin KaFai Lau n = __ipv6_neigh_lookup_noref(rt->dst.dev, 10012647a9b0SMartin KaFai Lau rt6_nexthop(rt, &fl6->daddr)); 1002707be1ffSYOSHIFUJI Hideaki / 吉藤英明 err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0; 1003707be1ffSYOSHIFUJI Hideaki / 吉藤英明 rcu_read_unlock_bh(); 1004707be1ffSYOSHIFUJI Hideaki / 吉藤英明 1005707be1ffSYOSHIFUJI Hideaki / 吉藤英明 if (err) { 100695c385b4SNeil Horman struct inet6_ifaddr *ifp; 10074c9483b2SDavid S. Miller struct flowi6 fl_gw6; 100895c385b4SNeil Horman int redirect; 100995c385b4SNeil Horman 10104c9483b2SDavid S. Miller ifp = ipv6_get_ifaddr(net, &fl6->saddr, 10111cab3da6SDaniel Lezcano (*dst)->dev, 1); 101295c385b4SNeil Horman 101395c385b4SNeil Horman redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC); 101495c385b4SNeil Horman if (ifp) 101595c385b4SNeil Horman in6_ifa_put(ifp); 101695c385b4SNeil Horman 101795c385b4SNeil Horman if (redirect) { 101895c385b4SNeil Horman /* 101995c385b4SNeil Horman * We need to get the dst entry for the 102095c385b4SNeil Horman * default router instead 102195c385b4SNeil Horman */ 102295c385b4SNeil Horman dst_release(*dst); 10234c9483b2SDavid S. Miller memcpy(&fl_gw6, fl6, sizeof(struct flowi6)); 10244c9483b2SDavid S. Miller memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr)); 10254c9483b2SDavid S. Miller *dst = ip6_route_output(net, sk, &fl_gw6); 1026e5d08d71SIan Morris err = (*dst)->error; 1027e5d08d71SIan Morris if (err) 102895c385b4SNeil Horman goto out_err_release; 102995c385b4SNeil Horman } 103095c385b4SNeil Horman } 103195c385b4SNeil Horman #endif 1032ec5e3b0aSJonathan T. Leighton if (ipv6_addr_v4mapped(&fl6->saddr) && 103300ea1ceeSWillem de Bruijn !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) { 103400ea1ceeSWillem de Bruijn err = -EAFNOSUPPORT; 103500ea1ceeSWillem de Bruijn goto out_err_release; 103600ea1ceeSWillem de Bruijn } 103795c385b4SNeil Horman 10381da177e4SLinus Torvalds return 0; 10391da177e4SLinus Torvalds 10401da177e4SLinus Torvalds out_err_release: 10411da177e4SLinus Torvalds dst_release(*dst); 10421da177e4SLinus Torvalds *dst = NULL; 10438a966fc0SDavid Ahern 10440d240e78SDavid Ahern if (err == -ENETUNREACH) 10450d240e78SDavid Ahern IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES); 10461da177e4SLinus Torvalds return err; 10471da177e4SLinus Torvalds } 104834a0b3cdSAdrian Bunk 1049497c615aSHerbert Xu /** 1050497c615aSHerbert Xu * ip6_dst_lookup - perform route lookup on flow 1051497c615aSHerbert Xu * @sk: socket which provides route info 1052497c615aSHerbert Xu * @dst: pointer to dst_entry * for result 10534c9483b2SDavid S. Miller * @fl6: flow to lookup 1054497c615aSHerbert Xu * 1055497c615aSHerbert Xu * This function performs a route lookup on the given flow. 1056497c615aSHerbert Xu * 1057497c615aSHerbert Xu * It returns zero on success, or a standard errno code on error. 1058497c615aSHerbert Xu */ 1059343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst, 1060343d60aaSRoopa Prabhu struct flowi6 *fl6) 1061497c615aSHerbert Xu { 1062497c615aSHerbert Xu *dst = NULL; 1063343d60aaSRoopa Prabhu return ip6_dst_lookup_tail(net, sk, dst, fl6); 1064497c615aSHerbert Xu } 10653cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup); 10663cf3dc6cSArnaldo Carvalho de Melo 1067497c615aSHerbert Xu /** 106868d0c6d3SDavid S. Miller * ip6_dst_lookup_flow - perform route lookup on flow with ipsec 106968d0c6d3SDavid S. Miller * @sk: socket which provides route info 10704c9483b2SDavid S. Miller * @fl6: flow to lookup 107168d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 107268d0c6d3SDavid S. Miller * 107368d0c6d3SDavid S. Miller * This function performs a route lookup on the given flow. 107468d0c6d3SDavid S. Miller * 107568d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 107668d0c6d3SDavid S. Miller * error code. 107768d0c6d3SDavid S. Miller */ 10783aef934fSEric Dumazet struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6, 10790e0d44abSSteffen Klassert const struct in6_addr *final_dst) 108068d0c6d3SDavid S. Miller { 108168d0c6d3SDavid S. Miller struct dst_entry *dst = NULL; 108268d0c6d3SDavid S. Miller int err; 108368d0c6d3SDavid S. Miller 1084343d60aaSRoopa Prabhu err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6); 108568d0c6d3SDavid S. Miller if (err) 108668d0c6d3SDavid S. Miller return ERR_PTR(err); 108768d0c6d3SDavid S. Miller if (final_dst) 10884e3fd7a0SAlexey Dobriyan fl6->daddr = *final_dst; 10892774c131SDavid S. Miller 1090f92ee619SSteffen Klassert return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0); 109168d0c6d3SDavid S. Miller } 109268d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow); 109368d0c6d3SDavid S. Miller 109468d0c6d3SDavid S. Miller /** 109568d0c6d3SDavid S. Miller * ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow 109668d0c6d3SDavid S. Miller * @sk: socket which provides the dst cache and route info 10974c9483b2SDavid S. Miller * @fl6: flow to lookup 109868d0c6d3SDavid S. Miller * @final_dst: final destination address for ipsec lookup 109996818159SAlexey Kodanev * @connected: whether @sk is connected or not 1100497c615aSHerbert Xu * 1101497c615aSHerbert Xu * This function performs a route lookup on the given flow with the 1102497c615aSHerbert Xu * possibility of using the cached route in the socket if it is valid. 1103497c615aSHerbert Xu * It will take the socket dst lock when operating on the dst cache. 1104497c615aSHerbert Xu * As a result, this function can only be used in process context. 1105497c615aSHerbert Xu * 110696818159SAlexey Kodanev * In addition, for a connected socket, cache the dst in the socket 110796818159SAlexey Kodanev * if the current cache is not valid. 110896818159SAlexey Kodanev * 110968d0c6d3SDavid S. Miller * It returns a valid dst pointer on success, or a pointer encoded 111068d0c6d3SDavid S. Miller * error code. 1111497c615aSHerbert Xu */ 11124c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6, 111396818159SAlexey Kodanev const struct in6_addr *final_dst, 111496818159SAlexey Kodanev bool connected) 1115497c615aSHerbert Xu { 111668d0c6d3SDavid S. Miller struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie); 1117497c615aSHerbert Xu 11184c9483b2SDavid S. Miller dst = ip6_sk_dst_check(sk, dst, fl6); 111996818159SAlexey Kodanev if (dst) 112096818159SAlexey Kodanev return dst; 112196818159SAlexey Kodanev 112200bc0ef5SJakub Sitnicki dst = ip6_dst_lookup_flow(sk, fl6, final_dst); 112396818159SAlexey Kodanev if (connected && !IS_ERR(dst)) 112496818159SAlexey Kodanev ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6); 112568d0c6d3SDavid S. Miller 112600bc0ef5SJakub Sitnicki return dst; 112768d0c6d3SDavid S. Miller } 112868d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow); 1129497c615aSHerbert Xu 11300178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src, 11310178b695SHerbert Xu gfp_t gfp) 11320178b695SHerbert Xu { 11330178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11340178b695SHerbert Xu } 11350178b695SHerbert Xu 11360178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src, 11370178b695SHerbert Xu gfp_t gfp) 11380178b695SHerbert Xu { 11390178b695SHerbert Xu return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL; 11400178b695SHerbert Xu } 11410178b695SHerbert Xu 114275a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu, 11430c183379SGao feng int *maxfraglen, 11440c183379SGao feng unsigned int fragheaderlen, 11450c183379SGao feng struct sk_buff *skb, 114675a493e6SHannes Frederic Sowa struct rt6_info *rt, 1147e367c2d0Slucien unsigned int orig_mtu) 11480c183379SGao feng { 11490c183379SGao feng if (!(rt->dst.flags & DST_XFRM_TUNNEL)) { 115063159f29SIan Morris if (!skb) { 11510c183379SGao feng /* first fragment, reserve header_len */ 1152e367c2d0Slucien *mtu = orig_mtu - rt->dst.header_len; 11530c183379SGao feng 11540c183379SGao feng } else { 11550c183379SGao feng /* 11560c183379SGao feng * this fragment is not first, the headers 11570c183379SGao feng * space is regarded as data space. 11580c183379SGao feng */ 1159e367c2d0Slucien *mtu = orig_mtu; 11600c183379SGao feng } 11610c183379SGao feng *maxfraglen = ((*mtu - fragheaderlen) & ~7) 11620c183379SGao feng + fragheaderlen - sizeof(struct frag_hdr); 11630c183379SGao feng } 11640c183379SGao feng } 11650c183379SGao feng 1166366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork, 116726879da5SWei Wang struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6, 11685fdaa88dSWillem de Bruijn struct rt6_info *rt, struct flowi6 *fl6) 1169366e41d9SVlad Yasevich { 1170366e41d9SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 1171366e41d9SVlad Yasevich unsigned int mtu; 117226879da5SWei Wang struct ipv6_txoptions *opt = ipc6->opt; 1173366e41d9SVlad Yasevich 1174366e41d9SVlad Yasevich /* 1175366e41d9SVlad Yasevich * setup for corking 1176366e41d9SVlad Yasevich */ 1177366e41d9SVlad Yasevich if (opt) { 1178366e41d9SVlad Yasevich if (WARN_ON(v6_cork->opt)) 1179366e41d9SVlad Yasevich return -EINVAL; 1180366e41d9SVlad Yasevich 1181864e2a1fSEric Dumazet v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation); 118263159f29SIan Morris if (unlikely(!v6_cork->opt)) 1183366e41d9SVlad Yasevich return -ENOBUFS; 1184366e41d9SVlad Yasevich 1185864e2a1fSEric Dumazet v6_cork->opt->tot_len = sizeof(*opt); 1186366e41d9SVlad Yasevich v6_cork->opt->opt_flen = opt->opt_flen; 1187366e41d9SVlad Yasevich v6_cork->opt->opt_nflen = opt->opt_nflen; 1188366e41d9SVlad Yasevich 1189366e41d9SVlad Yasevich v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt, 1190366e41d9SVlad Yasevich sk->sk_allocation); 1191366e41d9SVlad Yasevich if (opt->dst0opt && !v6_cork->opt->dst0opt) 1192366e41d9SVlad Yasevich return -ENOBUFS; 1193366e41d9SVlad Yasevich 1194366e41d9SVlad Yasevich v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt, 1195366e41d9SVlad Yasevich sk->sk_allocation); 1196366e41d9SVlad Yasevich if (opt->dst1opt && !v6_cork->opt->dst1opt) 1197366e41d9SVlad Yasevich return -ENOBUFS; 1198366e41d9SVlad Yasevich 1199366e41d9SVlad Yasevich v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt, 1200366e41d9SVlad Yasevich sk->sk_allocation); 1201366e41d9SVlad Yasevich if (opt->hopopt && !v6_cork->opt->hopopt) 1202366e41d9SVlad Yasevich return -ENOBUFS; 1203366e41d9SVlad Yasevich 1204366e41d9SVlad Yasevich v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt, 1205366e41d9SVlad Yasevich sk->sk_allocation); 1206366e41d9SVlad Yasevich if (opt->srcrt && !v6_cork->opt->srcrt) 1207366e41d9SVlad Yasevich return -ENOBUFS; 1208366e41d9SVlad Yasevich 1209366e41d9SVlad Yasevich /* need source address above miyazawa*/ 1210366e41d9SVlad Yasevich } 1211366e41d9SVlad Yasevich dst_hold(&rt->dst); 1212366e41d9SVlad Yasevich cork->base.dst = &rt->dst; 1213366e41d9SVlad Yasevich cork->fl.u.ip6 = *fl6; 121426879da5SWei Wang v6_cork->hop_limit = ipc6->hlimit; 121526879da5SWei Wang v6_cork->tclass = ipc6->tclass; 1216366e41d9SVlad Yasevich if (rt->dst.flags & DST_XFRM_TUNNEL) 1217366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1218749439bfSMike Maloney READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst); 1219366e41d9SVlad Yasevich else 1220366e41d9SVlad Yasevich mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ? 1221c02b3741SDavid S. Miller READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst)); 1222366e41d9SVlad Yasevich if (np->frag_size < mtu) { 1223366e41d9SVlad Yasevich if (np->frag_size) 1224366e41d9SVlad Yasevich mtu = np->frag_size; 1225366e41d9SVlad Yasevich } 1226749439bfSMike Maloney if (mtu < IPV6_MIN_MTU) 1227749439bfSMike Maloney return -EINVAL; 1228366e41d9SVlad Yasevich cork->base.fragsize = mtu; 1229fbf47813SWillem de Bruijn cork->base.gso_size = ipc6->gso_size; 1230678ca42dSWillem de Bruijn cork->base.tx_flags = 0; 1231678ca42dSWillem de Bruijn sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags); 1232bec1f6f6SWillem de Bruijn 12330f6c480fSDavid Miller if (dst_allfrag(xfrm_dst_path(&rt->dst))) 1234366e41d9SVlad Yasevich cork->base.flags |= IPCORK_ALLFRAG; 1235366e41d9SVlad Yasevich cork->base.length = 0; 1236366e41d9SVlad Yasevich 12375fdaa88dSWillem de Bruijn cork->base.transmit_time = ipc6->sockc.transmit_time; 1238a818f75eSJesus Sanchez-Palencia 1239366e41d9SVlad Yasevich return 0; 1240366e41d9SVlad Yasevich } 1241366e41d9SVlad Yasevich 12420bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk, 12430bbe84a6SVlad Yasevich struct flowi6 *fl6, 12440bbe84a6SVlad Yasevich struct sk_buff_head *queue, 12450bbe84a6SVlad Yasevich struct inet_cork *cork, 12460bbe84a6SVlad Yasevich struct inet6_cork *v6_cork, 12470bbe84a6SVlad Yasevich struct page_frag *pfrag, 12480bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, 12490bbe84a6SVlad Yasevich int len, int odd, struct sk_buff *skb), 12501da177e4SLinus Torvalds void *from, int length, int transhdrlen, 12515fdaa88dSWillem de Bruijn unsigned int flags, struct ipcm6_cookie *ipc6) 12521da177e4SLinus Torvalds { 12530c183379SGao feng struct sk_buff *skb, *skb_prev = NULL; 125410b8a3deSPaolo Abeni unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu; 1255b5947e5dSWillem de Bruijn struct ubuf_info *uarg = NULL; 12560bbe84a6SVlad Yasevich int exthdrlen = 0; 12570bbe84a6SVlad Yasevich int dst_exthdrlen = 0; 12581da177e4SLinus Torvalds int hh_len; 12591da177e4SLinus Torvalds int copy; 12601da177e4SLinus Torvalds int err; 12611da177e4SLinus Torvalds int offset = 0; 126209c2d251SWillem de Bruijn u32 tskey = 0; 12630bbe84a6SVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->dst; 12640bbe84a6SVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 126532dce968SVlad Yasevich int csummode = CHECKSUM_NONE; 1266682b1a9dSHannes Frederic Sowa unsigned int maxnonfragsize, headersize; 12671f4c6eb2SEric Dumazet unsigned int wmem_alloc_delta = 0; 126852900d22SWillem de Bruijn bool paged, extra_uref; 12691da177e4SLinus Torvalds 12700bbe84a6SVlad Yasevich skb = skb_peek_tail(queue); 12710bbe84a6SVlad Yasevich if (!skb) { 12720bbe84a6SVlad Yasevich exthdrlen = opt ? opt->opt_flen : 0; 12737efdba5bSRomain KUNTZ dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len; 12741da177e4SLinus Torvalds } 12750bbe84a6SVlad Yasevich 127615e36f5bSWillem de Bruijn paged = !!cork->gso_size; 1277bec1f6f6SWillem de Bruijn mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize; 1278e367c2d0Slucien orig_mtu = mtu; 12791da177e4SLinus Torvalds 1280678ca42dSWillem de Bruijn if (cork->tx_flags & SKBTX_ANY_SW_TSTAMP && 1281678ca42dSWillem de Bruijn sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID) 1282678ca42dSWillem de Bruijn tskey = sk->sk_tskey++; 1283678ca42dSWillem de Bruijn 1284d8d1f30bSChangli Gao hh_len = LL_RESERVED_SPACE(rt->dst.dev); 12851da177e4SLinus Torvalds 1286a1b05140SMasahide NAKAMURA fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len + 1287b4ce9277SHerbert Xu (opt ? opt->opt_nflen : 0); 12884df98e76SHannes Frederic Sowa maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen - 12894df98e76SHannes Frederic Sowa sizeof(struct frag_hdr); 12901da177e4SLinus Torvalds 12914df98e76SHannes Frederic Sowa headersize = sizeof(struct ipv6hdr) + 12923a1cebe7SHannes Frederic Sowa (opt ? opt->opt_flen + opt->opt_nflen : 0) + 12934df98e76SHannes Frederic Sowa (dst_allfrag(&rt->dst) ? 12944df98e76SHannes Frederic Sowa sizeof(struct frag_hdr) : 0) + 12954df98e76SHannes Frederic Sowa rt->rt6i_nfheader_len; 12964df98e76SHannes Frederic Sowa 129710b8a3deSPaolo Abeni /* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit 129810b8a3deSPaolo Abeni * the first fragment 129910b8a3deSPaolo Abeni */ 130010b8a3deSPaolo Abeni if (headersize + transhdrlen > mtu) 130110b8a3deSPaolo Abeni goto emsgsize; 130210b8a3deSPaolo Abeni 130326879da5SWei Wang if (cork->length + length > mtu - headersize && ipc6->dontfrag && 13044df98e76SHannes Frederic Sowa (sk->sk_protocol == IPPROTO_UDP || 13054df98e76SHannes Frederic Sowa sk->sk_protocol == IPPROTO_RAW)) { 13064df98e76SHannes Frederic Sowa ipv6_local_rxpmtu(sk, fl6, mtu - headersize + 13074df98e76SHannes Frederic Sowa sizeof(struct ipv6hdr)); 13084df98e76SHannes Frederic Sowa goto emsgsize; 13094df98e76SHannes Frederic Sowa } 13104df98e76SHannes Frederic Sowa 1311682b1a9dSHannes Frederic Sowa if (ip6_sk_ignore_df(sk)) 1312682b1a9dSHannes Frederic Sowa maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN; 1313682b1a9dSHannes Frederic Sowa else 1314682b1a9dSHannes Frederic Sowa maxnonfragsize = mtu; 1315682b1a9dSHannes Frederic Sowa 13164df98e76SHannes Frederic Sowa if (cork->length + length > maxnonfragsize - headersize) { 13174df98e76SHannes Frederic Sowa emsgsize: 131810b8a3deSPaolo Abeni pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0); 131910b8a3deSPaolo Abeni ipv6_local_error(sk, EMSGSIZE, fl6, pmtu); 13201da177e4SLinus Torvalds return -EMSGSIZE; 13211da177e4SLinus Torvalds } 1322682b1a9dSHannes Frederic Sowa 1323682b1a9dSHannes Frederic Sowa /* CHECKSUM_PARTIAL only with no extension headers and when 1324682b1a9dSHannes Frederic Sowa * we are not going to fragment 1325682b1a9dSHannes Frederic Sowa */ 1326682b1a9dSHannes Frederic Sowa if (transhdrlen && sk->sk_protocol == IPPROTO_UDP && 1327682b1a9dSHannes Frederic Sowa headersize == sizeof(struct ipv6hdr) && 13282b89ed65SVlad Yasevich length <= mtu - headersize && 1329bec1f6f6SWillem de Bruijn (!(flags & MSG_MORE) || cork->gso_size) && 1330c8cd0989STom Herbert rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM)) 1331682b1a9dSHannes Frederic Sowa csummode = CHECKSUM_PARTIAL; 13321da177e4SLinus Torvalds 1333b5947e5dSWillem de Bruijn if (flags & MSG_ZEROCOPY && length && sock_flag(sk, SOCK_ZEROCOPY)) { 1334b5947e5dSWillem de Bruijn uarg = sock_zerocopy_realloc(sk, length, skb_zcopy(skb)); 1335b5947e5dSWillem de Bruijn if (!uarg) 1336b5947e5dSWillem de Bruijn return -ENOBUFS; 133752900d22SWillem de Bruijn extra_uref = true; 1338b5947e5dSWillem de Bruijn if (rt->dst.dev->features & NETIF_F_SG && 1339b5947e5dSWillem de Bruijn csummode == CHECKSUM_PARTIAL) { 1340b5947e5dSWillem de Bruijn paged = true; 1341b5947e5dSWillem de Bruijn } else { 1342b5947e5dSWillem de Bruijn uarg->zerocopy = 0; 134352900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 1344b5947e5dSWillem de Bruijn } 1345b5947e5dSWillem de Bruijn } 1346b5947e5dSWillem de Bruijn 13471da177e4SLinus Torvalds /* 13481da177e4SLinus Torvalds * Let's try using as much space as possible. 13491da177e4SLinus Torvalds * Use MTU if total length of the message fits into the MTU. 13501da177e4SLinus Torvalds * Otherwise, we need to reserve fragment header and 13511da177e4SLinus Torvalds * fragment alignment (= 8-15 octects, in total). 13521da177e4SLinus Torvalds * 13531da177e4SLinus Torvalds * Note that we may need to "move" the data from the tail of 13541da177e4SLinus Torvalds * of the buffer to the new fragment when we split 13551da177e4SLinus Torvalds * the message. 13561da177e4SLinus Torvalds * 13571da177e4SLinus Torvalds * FIXME: It may be fragmented into multiple chunks 13581da177e4SLinus Torvalds * at once if non-fragmentable extension headers 13591da177e4SLinus Torvalds * are too large. 13601da177e4SLinus Torvalds * --yoshfuji 13611da177e4SLinus Torvalds */ 13621da177e4SLinus Torvalds 13632811ebacSHannes Frederic Sowa cork->length += length; 13642811ebacSHannes Frederic Sowa if (!skb) 13651da177e4SLinus Torvalds goto alloc_new_skb; 13661da177e4SLinus Torvalds 13671da177e4SLinus Torvalds while (length > 0) { 13681da177e4SLinus Torvalds /* Check if the remaining data fits into current packet. */ 1369bdc712b4SDavid S. Miller copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len; 13701da177e4SLinus Torvalds if (copy < length) 13711da177e4SLinus Torvalds copy = maxfraglen - skb->len; 13721da177e4SLinus Torvalds 13731da177e4SLinus Torvalds if (copy <= 0) { 13741da177e4SLinus Torvalds char *data; 13751da177e4SLinus Torvalds unsigned int datalen; 13761da177e4SLinus Torvalds unsigned int fraglen; 13771da177e4SLinus Torvalds unsigned int fraggap; 13781da177e4SLinus Torvalds unsigned int alloclen; 1379aba36930SWillem de Bruijn unsigned int pagedlen; 13801da177e4SLinus Torvalds alloc_new_skb: 13811da177e4SLinus Torvalds /* There's no room in the current skb */ 13820c183379SGao feng if (skb) 13830c183379SGao feng fraggap = skb->len - maxfraglen; 13841da177e4SLinus Torvalds else 13851da177e4SLinus Torvalds fraggap = 0; 13860c183379SGao feng /* update mtu and maxfraglen if necessary */ 138763159f29SIan Morris if (!skb || !skb_prev) 13880c183379SGao feng ip6_append_data_mtu(&mtu, &maxfraglen, 138975a493e6SHannes Frederic Sowa fragheaderlen, skb, rt, 1390e367c2d0Slucien orig_mtu); 13910c183379SGao feng 13920c183379SGao feng skb_prev = skb; 13931da177e4SLinus Torvalds 13941da177e4SLinus Torvalds /* 13951da177e4SLinus Torvalds * If remaining data exceeds the mtu, 13961da177e4SLinus Torvalds * we know we need more fragment(s). 13971da177e4SLinus Torvalds */ 13981da177e4SLinus Torvalds datalen = length + fraggap; 13991da177e4SLinus Torvalds 14000c183379SGao feng if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen) 14010c183379SGao feng datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len; 140215e36f5bSWillem de Bruijn fraglen = datalen + fragheaderlen; 1403aba36930SWillem de Bruijn pagedlen = 0; 140415e36f5bSWillem de Bruijn 14051da177e4SLinus Torvalds if ((flags & MSG_MORE) && 1406d8d1f30bSChangli Gao !(rt->dst.dev->features&NETIF_F_SG)) 14071da177e4SLinus Torvalds alloclen = mtu; 140815e36f5bSWillem de Bruijn else if (!paged) 140915e36f5bSWillem de Bruijn alloclen = fraglen; 141015e36f5bSWillem de Bruijn else { 141115e36f5bSWillem de Bruijn alloclen = min_t(int, fraglen, MAX_HEADER); 141215e36f5bSWillem de Bruijn pagedlen = fraglen - alloclen; 141315e36f5bSWillem de Bruijn } 14141da177e4SLinus Torvalds 1415299b0767SSteffen Klassert alloclen += dst_exthdrlen; 1416299b0767SSteffen Klassert 14170c183379SGao feng if (datalen != length + fraggap) { 14181da177e4SLinus Torvalds /* 14190c183379SGao feng * this is not the last fragment, the trailer 14200c183379SGao feng * space is regarded as data space. 14211da177e4SLinus Torvalds */ 14220c183379SGao feng datalen += rt->dst.trailer_len; 14230c183379SGao feng } 14240c183379SGao feng 1425d8d1f30bSChangli Gao alloclen += rt->dst.trailer_len; 14260c183379SGao feng fraglen = datalen + fragheaderlen; 14271da177e4SLinus Torvalds 14281da177e4SLinus Torvalds /* 14291da177e4SLinus Torvalds * We just reserve space for fragment header. 14301da177e4SLinus Torvalds * Note: this may be overallocation if the message 14311da177e4SLinus Torvalds * (without MSG_MORE) fits into the MTU. 14321da177e4SLinus Torvalds */ 14331da177e4SLinus Torvalds alloclen += sizeof(struct frag_hdr); 14341da177e4SLinus Torvalds 143515e36f5bSWillem de Bruijn copy = datalen - transhdrlen - fraggap - pagedlen; 1436232cd35dSEric Dumazet if (copy < 0) { 1437232cd35dSEric Dumazet err = -EINVAL; 1438232cd35dSEric Dumazet goto error; 1439232cd35dSEric Dumazet } 14401da177e4SLinus Torvalds if (transhdrlen) { 14411da177e4SLinus Torvalds skb = sock_alloc_send_skb(sk, 14421da177e4SLinus Torvalds alloclen + hh_len, 14431da177e4SLinus Torvalds (flags & MSG_DONTWAIT), &err); 14441da177e4SLinus Torvalds } else { 14451da177e4SLinus Torvalds skb = NULL; 14461f4c6eb2SEric Dumazet if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <= 14471da177e4SLinus Torvalds 2 * sk->sk_sndbuf) 14481f4c6eb2SEric Dumazet skb = alloc_skb(alloclen + hh_len, 14491da177e4SLinus Torvalds sk->sk_allocation); 145063159f29SIan Morris if (unlikely(!skb)) 14511da177e4SLinus Torvalds err = -ENOBUFS; 14521da177e4SLinus Torvalds } 145363159f29SIan Morris if (!skb) 14541da177e4SLinus Torvalds goto error; 14551da177e4SLinus Torvalds /* 14561da177e4SLinus Torvalds * Fill in the control structures 14571da177e4SLinus Torvalds */ 14589c9c9ad5SHannes Frederic Sowa skb->protocol = htons(ETH_P_IPV6); 145932dce968SVlad Yasevich skb->ip_summed = csummode; 14601da177e4SLinus Torvalds skb->csum = 0; 14611f85851eSGao feng /* reserve for fragmentation and ipsec header */ 14621f85851eSGao feng skb_reserve(skb, hh_len + sizeof(struct frag_hdr) + 14631f85851eSGao feng dst_exthdrlen); 14641da177e4SLinus Torvalds 14651da177e4SLinus Torvalds /* 14661da177e4SLinus Torvalds * Find where to start putting bytes 14671da177e4SLinus Torvalds */ 146815e36f5bSWillem de Bruijn data = skb_put(skb, fraglen - pagedlen); 14691f85851eSGao feng skb_set_network_header(skb, exthdrlen); 14701f85851eSGao feng data += fragheaderlen; 1471b0e380b1SArnaldo Carvalho de Melo skb->transport_header = (skb->network_header + 1472b0e380b1SArnaldo Carvalho de Melo fragheaderlen); 14731da177e4SLinus Torvalds if (fraggap) { 14741da177e4SLinus Torvalds skb->csum = skb_copy_and_csum_bits( 14751da177e4SLinus Torvalds skb_prev, maxfraglen, 14761da177e4SLinus Torvalds data + transhdrlen, fraggap, 0); 14771da177e4SLinus Torvalds skb_prev->csum = csum_sub(skb_prev->csum, 14781da177e4SLinus Torvalds skb->csum); 14791da177e4SLinus Torvalds data += fraggap; 1480e9fa4f7bSHerbert Xu pskb_trim_unique(skb_prev, maxfraglen); 14811da177e4SLinus Torvalds } 1482232cd35dSEric Dumazet if (copy > 0 && 1483232cd35dSEric Dumazet getfrag(from, data + transhdrlen, offset, 1484232cd35dSEric Dumazet copy, fraggap, skb) < 0) { 14851da177e4SLinus Torvalds err = -EFAULT; 14861da177e4SLinus Torvalds kfree_skb(skb); 14871da177e4SLinus Torvalds goto error; 14881da177e4SLinus Torvalds } 14891da177e4SLinus Torvalds 14901da177e4SLinus Torvalds offset += copy; 149115e36f5bSWillem de Bruijn length -= copy + transhdrlen; 14921da177e4SLinus Torvalds transhdrlen = 0; 14931da177e4SLinus Torvalds exthdrlen = 0; 1494299b0767SSteffen Klassert dst_exthdrlen = 0; 14951da177e4SLinus Torvalds 149652900d22SWillem de Bruijn /* Only the initial fragment is time stamped */ 149752900d22SWillem de Bruijn skb_shinfo(skb)->tx_flags = cork->tx_flags; 149852900d22SWillem de Bruijn cork->tx_flags = 0; 149952900d22SWillem de Bruijn skb_shinfo(skb)->tskey = tskey; 150052900d22SWillem de Bruijn tskey = 0; 150152900d22SWillem de Bruijn skb_zcopy_set(skb, uarg, &extra_uref); 150252900d22SWillem de Bruijn 15030dec879fSJulian Anastasov if ((flags & MSG_CONFIRM) && !skb_prev) 15040dec879fSJulian Anastasov skb_set_dst_pending_confirm(skb, 1); 15050dec879fSJulian Anastasov 15061da177e4SLinus Torvalds /* 15071da177e4SLinus Torvalds * Put the packet on the pending queue 15081da177e4SLinus Torvalds */ 15091f4c6eb2SEric Dumazet if (!skb->destructor) { 15101f4c6eb2SEric Dumazet skb->destructor = sock_wfree; 15111f4c6eb2SEric Dumazet skb->sk = sk; 15121f4c6eb2SEric Dumazet wmem_alloc_delta += skb->truesize; 15131f4c6eb2SEric Dumazet } 15140bbe84a6SVlad Yasevich __skb_queue_tail(queue, skb); 15151da177e4SLinus Torvalds continue; 15161da177e4SLinus Torvalds } 15171da177e4SLinus Torvalds 15181da177e4SLinus Torvalds if (copy > length) 15191da177e4SLinus Torvalds copy = length; 15201da177e4SLinus Torvalds 1521113f99c3SWillem de Bruijn if (!(rt->dst.dev->features&NETIF_F_SG) && 1522113f99c3SWillem de Bruijn skb_tailroom(skb) >= copy) { 15231da177e4SLinus Torvalds unsigned int off; 15241da177e4SLinus Torvalds 15251da177e4SLinus Torvalds off = skb->len; 15261da177e4SLinus Torvalds if (getfrag(from, skb_put(skb, copy), 15271da177e4SLinus Torvalds offset, copy, off, skb) < 0) { 15281da177e4SLinus Torvalds __skb_trim(skb, off); 15291da177e4SLinus Torvalds err = -EFAULT; 15301da177e4SLinus Torvalds goto error; 15311da177e4SLinus Torvalds } 1532b5947e5dSWillem de Bruijn } else if (!uarg || !uarg->zerocopy) { 15331da177e4SLinus Torvalds int i = skb_shinfo(skb)->nr_frags; 15341da177e4SLinus Torvalds 15351da177e4SLinus Torvalds err = -ENOMEM; 15365640f768SEric Dumazet if (!sk_page_frag_refill(sk, pfrag)) 15371da177e4SLinus Torvalds goto error; 15381da177e4SLinus Torvalds 15395640f768SEric Dumazet if (!skb_can_coalesce(skb, i, pfrag->page, 15405640f768SEric Dumazet pfrag->offset)) { 15411da177e4SLinus Torvalds err = -EMSGSIZE; 15425640f768SEric Dumazet if (i == MAX_SKB_FRAGS) 15431da177e4SLinus Torvalds goto error; 15445640f768SEric Dumazet 15455640f768SEric Dumazet __skb_fill_page_desc(skb, i, pfrag->page, 15465640f768SEric Dumazet pfrag->offset, 0); 15475640f768SEric Dumazet skb_shinfo(skb)->nr_frags = ++i; 15485640f768SEric Dumazet get_page(pfrag->page); 15491da177e4SLinus Torvalds } 15505640f768SEric Dumazet copy = min_t(int, copy, pfrag->size - pfrag->offset); 15519e903e08SEric Dumazet if (getfrag(from, 15525640f768SEric Dumazet page_address(pfrag->page) + pfrag->offset, 15535640f768SEric Dumazet offset, copy, skb->len, skb) < 0) 15545640f768SEric Dumazet goto error_efault; 15555640f768SEric Dumazet 15565640f768SEric Dumazet pfrag->offset += copy; 15575640f768SEric Dumazet skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy); 15581da177e4SLinus Torvalds skb->len += copy; 15591da177e4SLinus Torvalds skb->data_len += copy; 1560f945fa7aSHerbert Xu skb->truesize += copy; 15611f4c6eb2SEric Dumazet wmem_alloc_delta += copy; 1562b5947e5dSWillem de Bruijn } else { 1563b5947e5dSWillem de Bruijn err = skb_zerocopy_iter_dgram(skb, from, copy); 1564b5947e5dSWillem de Bruijn if (err < 0) 1565b5947e5dSWillem de Bruijn goto error; 15661da177e4SLinus Torvalds } 15671da177e4SLinus Torvalds offset += copy; 15681da177e4SLinus Torvalds length -= copy; 15691da177e4SLinus Torvalds } 15705640f768SEric Dumazet 15719e8445a5SPaolo Abeni if (wmem_alloc_delta) 15721f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 15731da177e4SLinus Torvalds return 0; 15745640f768SEric Dumazet 15755640f768SEric Dumazet error_efault: 15765640f768SEric Dumazet err = -EFAULT; 15771da177e4SLinus Torvalds error: 157852900d22SWillem de Bruijn sock_zerocopy_put_abort(uarg, extra_uref); 1579bdc712b4SDavid S. Miller cork->length -= length; 15803bd653c8SDenis V. Lunev IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS); 15811f4c6eb2SEric Dumazet refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc); 15821da177e4SLinus Torvalds return err; 15831da177e4SLinus Torvalds } 15840bbe84a6SVlad Yasevich 15850bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk, 15860bbe84a6SVlad Yasevich int getfrag(void *from, char *to, int offset, int len, 15870bbe84a6SVlad Yasevich int odd, struct sk_buff *skb), 158826879da5SWei Wang void *from, int length, int transhdrlen, 158926879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 15905fdaa88dSWillem de Bruijn struct rt6_info *rt, unsigned int flags) 15910bbe84a6SVlad Yasevich { 15920bbe84a6SVlad Yasevich struct inet_sock *inet = inet_sk(sk); 15930bbe84a6SVlad Yasevich struct ipv6_pinfo *np = inet6_sk(sk); 15940bbe84a6SVlad Yasevich int exthdrlen; 15950bbe84a6SVlad Yasevich int err; 15960bbe84a6SVlad Yasevich 15970bbe84a6SVlad Yasevich if (flags&MSG_PROBE) 15980bbe84a6SVlad Yasevich return 0; 15990bbe84a6SVlad Yasevich if (skb_queue_empty(&sk->sk_write_queue)) { 16000bbe84a6SVlad Yasevich /* 16010bbe84a6SVlad Yasevich * setup for corking 16020bbe84a6SVlad Yasevich */ 160326879da5SWei Wang err = ip6_setup_cork(sk, &inet->cork, &np->cork, 16045fdaa88dSWillem de Bruijn ipc6, rt, fl6); 16050bbe84a6SVlad Yasevich if (err) 16060bbe84a6SVlad Yasevich return err; 16070bbe84a6SVlad Yasevich 160826879da5SWei Wang exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 16090bbe84a6SVlad Yasevich length += exthdrlen; 16100bbe84a6SVlad Yasevich transhdrlen += exthdrlen; 16110bbe84a6SVlad Yasevich } else { 16120bbe84a6SVlad Yasevich fl6 = &inet->cork.fl.u.ip6; 16130bbe84a6SVlad Yasevich transhdrlen = 0; 16140bbe84a6SVlad Yasevich } 16150bbe84a6SVlad Yasevich 16160bbe84a6SVlad Yasevich return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base, 16170bbe84a6SVlad Yasevich &np->cork, sk_page_frag(sk), getfrag, 16185fdaa88dSWillem de Bruijn from, length, transhdrlen, flags, ipc6); 16190bbe84a6SVlad Yasevich } 1620a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data); 16211da177e4SLinus Torvalds 1622366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork, 1623366e41d9SVlad Yasevich struct inet6_cork *v6_cork) 1624bf138862SPavel Emelyanov { 1625366e41d9SVlad Yasevich if (v6_cork->opt) { 1626366e41d9SVlad Yasevich kfree(v6_cork->opt->dst0opt); 1627366e41d9SVlad Yasevich kfree(v6_cork->opt->dst1opt); 1628366e41d9SVlad Yasevich kfree(v6_cork->opt->hopopt); 1629366e41d9SVlad Yasevich kfree(v6_cork->opt->srcrt); 1630366e41d9SVlad Yasevich kfree(v6_cork->opt); 1631366e41d9SVlad Yasevich v6_cork->opt = NULL; 16320178b695SHerbert Xu } 16330178b695SHerbert Xu 1634366e41d9SVlad Yasevich if (cork->base.dst) { 1635366e41d9SVlad Yasevich dst_release(cork->base.dst); 1636366e41d9SVlad Yasevich cork->base.dst = NULL; 1637366e41d9SVlad Yasevich cork->base.flags &= ~IPCORK_ALLFRAG; 1638bf138862SPavel Emelyanov } 1639366e41d9SVlad Yasevich memset(&cork->fl, 0, sizeof(cork->fl)); 1640bf138862SPavel Emelyanov } 1641bf138862SPavel Emelyanov 16426422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk, 16436422398cSVlad Yasevich struct sk_buff_head *queue, 16446422398cSVlad Yasevich struct inet_cork_full *cork, 16456422398cSVlad Yasevich struct inet6_cork *v6_cork) 16461da177e4SLinus Torvalds { 16471da177e4SLinus Torvalds struct sk_buff *skb, *tmp_skb; 16481da177e4SLinus Torvalds struct sk_buff **tail_skb; 16491da177e4SLinus Torvalds struct in6_addr final_dst_buf, *final_dst = &final_dst_buf; 16501da177e4SLinus Torvalds struct ipv6_pinfo *np = inet6_sk(sk); 16513bd653c8SDenis V. Lunev struct net *net = sock_net(sk); 16521da177e4SLinus Torvalds struct ipv6hdr *hdr; 16536422398cSVlad Yasevich struct ipv6_txoptions *opt = v6_cork->opt; 16546422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)cork->base.dst; 16556422398cSVlad Yasevich struct flowi6 *fl6 = &cork->fl.u.ip6; 16564c9483b2SDavid S. Miller unsigned char proto = fl6->flowi6_proto; 16571da177e4SLinus Torvalds 16586422398cSVlad Yasevich skb = __skb_dequeue(queue); 165963159f29SIan Morris if (!skb) 16601da177e4SLinus Torvalds goto out; 16611da177e4SLinus Torvalds tail_skb = &(skb_shinfo(skb)->frag_list); 16621da177e4SLinus Torvalds 16631da177e4SLinus Torvalds /* move skb->data to ip header from ext header */ 1664d56f90a7SArnaldo Carvalho de Melo if (skb->data < skb_network_header(skb)) 1665bbe735e4SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_offset(skb)); 16666422398cSVlad Yasevich while ((tmp_skb = __skb_dequeue(queue)) != NULL) { 1667cfe1fc77SArnaldo Carvalho de Melo __skb_pull(tmp_skb, skb_network_header_len(skb)); 16681da177e4SLinus Torvalds *tail_skb = tmp_skb; 16691da177e4SLinus Torvalds tail_skb = &(tmp_skb->next); 16701da177e4SLinus Torvalds skb->len += tmp_skb->len; 16711da177e4SLinus Torvalds skb->data_len += tmp_skb->len; 16721da177e4SLinus Torvalds skb->truesize += tmp_skb->truesize; 16731da177e4SLinus Torvalds tmp_skb->destructor = NULL; 16741da177e4SLinus Torvalds tmp_skb->sk = NULL; 16751da177e4SLinus Torvalds } 16761da177e4SLinus Torvalds 167728a89453SHerbert Xu /* Allow local fragmentation. */ 167860ff7467SWANG Cong skb->ignore_df = ip6_sk_ignore_df(sk); 167928a89453SHerbert Xu 16804e3fd7a0SAlexey Dobriyan *final_dst = fl6->daddr; 1681cfe1fc77SArnaldo Carvalho de Melo __skb_pull(skb, skb_network_header_len(skb)); 16821da177e4SLinus Torvalds if (opt && opt->opt_flen) 16831da177e4SLinus Torvalds ipv6_push_frag_opts(skb, opt, &proto); 16841da177e4SLinus Torvalds if (opt && opt->opt_nflen) 1685613fa3caSDavid Lebrun ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr); 16861da177e4SLinus Torvalds 1687e2d1bca7SArnaldo Carvalho de Melo skb_push(skb, sizeof(struct ipv6hdr)); 1688e2d1bca7SArnaldo Carvalho de Melo skb_reset_network_header(skb); 16890660e03fSArnaldo Carvalho de Melo hdr = ipv6_hdr(skb); 16901da177e4SLinus Torvalds 16916422398cSVlad Yasevich ip6_flow_hdr(hdr, v6_cork->tclass, 1692cb1ce2efSTom Herbert ip6_make_flowlabel(net, skb, fl6->flowlabel, 1693513674b5SShaohua Li ip6_autoflowlabel(net, np), fl6)); 16946422398cSVlad Yasevich hdr->hop_limit = v6_cork->hop_limit; 16951da177e4SLinus Torvalds hdr->nexthdr = proto; 16964e3fd7a0SAlexey Dobriyan hdr->saddr = fl6->saddr; 16974e3fd7a0SAlexey Dobriyan hdr->daddr = *final_dst; 16981da177e4SLinus Torvalds 1699a2c2064fSPatrick McHardy skb->priority = sk->sk_priority; 17004a19ec58SLaszlo Attila Toth skb->mark = sk->sk_mark; 1701a2c2064fSPatrick McHardy 1702a818f75eSJesus Sanchez-Palencia skb->tstamp = cork->base.transmit_time; 1703a818f75eSJesus Sanchez-Palencia 1704d8d1f30bSChangli Gao skb_dst_set(skb, dst_clone(&rt->dst)); 1705edf391ffSNeil Horman IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len); 170614878f75SDavid L Stevens if (proto == IPPROTO_ICMPV6) { 1707adf30907SEric Dumazet struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb)); 170814878f75SDavid L Stevens 170943a43b60SHannes Frederic Sowa ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type); 171043a43b60SHannes Frederic Sowa ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS); 171114878f75SDavid L Stevens } 171214878f75SDavid L Stevens 17136422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 17146422398cSVlad Yasevich out: 17156422398cSVlad Yasevich return skb; 17166422398cSVlad Yasevich } 17176422398cSVlad Yasevich 17186422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb) 17196422398cSVlad Yasevich { 17206422398cSVlad Yasevich struct net *net = sock_net(skb->sk); 17216422398cSVlad Yasevich struct rt6_info *rt = (struct rt6_info *)skb_dst(skb); 17226422398cSVlad Yasevich int err; 17236422398cSVlad Yasevich 172433224b16SEric W. Biederman err = ip6_local_out(net, skb->sk, skb); 17251da177e4SLinus Torvalds if (err) { 17261da177e4SLinus Torvalds if (err > 0) 17276ce9e7b5SEric Dumazet err = net_xmit_errno(err); 17281da177e4SLinus Torvalds if (err) 17296422398cSVlad Yasevich IP6_INC_STATS(net, rt->rt6i_idev, 17306422398cSVlad Yasevich IPSTATS_MIB_OUTDISCARDS); 17311da177e4SLinus Torvalds } 17321da177e4SLinus Torvalds 17331da177e4SLinus Torvalds return err; 17346422398cSVlad Yasevich } 17356422398cSVlad Yasevich 17366422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk) 17376422398cSVlad Yasevich { 17386422398cSVlad Yasevich struct sk_buff *skb; 17396422398cSVlad Yasevich 17406422398cSVlad Yasevich skb = ip6_finish_skb(sk); 17416422398cSVlad Yasevich if (!skb) 17426422398cSVlad Yasevich return 0; 17436422398cSVlad Yasevich 17446422398cSVlad Yasevich return ip6_send_skb(skb); 17451da177e4SLinus Torvalds } 1746a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames); 17471da177e4SLinus Torvalds 17480bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk, 17496422398cSVlad Yasevich struct sk_buff_head *queue, 17506422398cSVlad Yasevich struct inet_cork_full *cork, 17516422398cSVlad Yasevich struct inet6_cork *v6_cork) 17521da177e4SLinus Torvalds { 17531da177e4SLinus Torvalds struct sk_buff *skb; 17541da177e4SLinus Torvalds 17550bbe84a6SVlad Yasevich while ((skb = __skb_dequeue_tail(queue)) != NULL) { 1756adf30907SEric Dumazet if (skb_dst(skb)) 1757adf30907SEric Dumazet IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)), 1758a11d206dSYOSHIFUJI Hideaki IPSTATS_MIB_OUTDISCARDS); 17591da177e4SLinus Torvalds kfree_skb(skb); 17601da177e4SLinus Torvalds } 17611da177e4SLinus Torvalds 17626422398cSVlad Yasevich ip6_cork_release(cork, v6_cork); 17631da177e4SLinus Torvalds } 17640bbe84a6SVlad Yasevich 17650bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk) 17660bbe84a6SVlad Yasevich { 17676422398cSVlad Yasevich __ip6_flush_pending_frames(sk, &sk->sk_write_queue, 17686422398cSVlad Yasevich &inet_sk(sk)->cork, &inet6_sk(sk)->cork); 17690bbe84a6SVlad Yasevich } 1770a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames); 17716422398cSVlad Yasevich 17726422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk, 17736422398cSVlad Yasevich int getfrag(void *from, char *to, int offset, 17746422398cSVlad Yasevich int len, int odd, struct sk_buff *skb), 17756422398cSVlad Yasevich void *from, int length, int transhdrlen, 177626879da5SWei Wang struct ipcm6_cookie *ipc6, struct flowi6 *fl6, 17776422398cSVlad Yasevich struct rt6_info *rt, unsigned int flags, 17785fdaa88dSWillem de Bruijn struct inet_cork_full *cork) 17796422398cSVlad Yasevich { 17806422398cSVlad Yasevich struct inet6_cork v6_cork; 17816422398cSVlad Yasevich struct sk_buff_head queue; 178226879da5SWei Wang int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0); 17836422398cSVlad Yasevich int err; 17846422398cSVlad Yasevich 17856422398cSVlad Yasevich if (flags & MSG_PROBE) 17866422398cSVlad Yasevich return NULL; 17876422398cSVlad Yasevich 17886422398cSVlad Yasevich __skb_queue_head_init(&queue); 17896422398cSVlad Yasevich 17901cd7884dSWillem de Bruijn cork->base.flags = 0; 17911cd7884dSWillem de Bruijn cork->base.addr = 0; 17921cd7884dSWillem de Bruijn cork->base.opt = NULL; 17931cd7884dSWillem de Bruijn cork->base.dst = NULL; 17946422398cSVlad Yasevich v6_cork.opt = NULL; 17955fdaa88dSWillem de Bruijn err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt, fl6); 1796862c03eeSEric Dumazet if (err) { 17971cd7884dSWillem de Bruijn ip6_cork_release(cork, &v6_cork); 17986422398cSVlad Yasevich return ERR_PTR(err); 1799862c03eeSEric Dumazet } 180026879da5SWei Wang if (ipc6->dontfrag < 0) 180126879da5SWei Wang ipc6->dontfrag = inet6_sk(sk)->dontfrag; 18026422398cSVlad Yasevich 18031cd7884dSWillem de Bruijn err = __ip6_append_data(sk, fl6, &queue, &cork->base, &v6_cork, 18046422398cSVlad Yasevich ¤t->task_frag, getfrag, from, 18056422398cSVlad Yasevich length + exthdrlen, transhdrlen + exthdrlen, 18065fdaa88dSWillem de Bruijn flags, ipc6); 18076422398cSVlad Yasevich if (err) { 18081cd7884dSWillem de Bruijn __ip6_flush_pending_frames(sk, &queue, cork, &v6_cork); 18096422398cSVlad Yasevich return ERR_PTR(err); 18106422398cSVlad Yasevich } 18116422398cSVlad Yasevich 18121cd7884dSWillem de Bruijn return __ip6_make_skb(sk, &queue, cork, &v6_cork); 18136422398cSVlad Yasevich } 1814