blob: be25b34dc5c2f44fdc4ee987c3abc1da4b991bac [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * IPv6 output functions
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09003 * Linux INET6 implementation
Linus Torvalds1da177e2005-04-16 15:20:36 -07004 *
5 * Authors:
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09006 * Pedro Roque <roque@di.fc.ul.pt>
Linus Torvalds1da177e2005-04-16 15:20:36 -07007 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07008 * Based on linux/net/ipv4/ip_output.c
9 *
10 * This program is free software; you can redistribute it and/or
11 * modify it under the terms of the GNU General Public License
12 * as published by the Free Software Foundation; either version
13 * 2 of the License, or (at your option) any later version.
14 *
15 * Changes:
16 * A.N.Kuznetsov : airthmetics in fragmentation.
17 * extension headers are implemented.
18 * route changes now work.
19 * ip6_forward does not confuse sniffers.
20 * etc.
21 *
22 * H. von Brand : Added missing #include <linux/string.h>
Ian Morris67ba4152014-08-24 21:53:10 +010023 * Imran Patel : frag id should be in NBO
Linus Torvalds1da177e2005-04-16 15:20:36 -070024 * Kazunori MIYAZAWA @USAGI
25 * : add ip6_append_data and related functions
26 * for datagram xmit
27 */
28
Linus Torvalds1da177e2005-04-16 15:20:36 -070029#include <linux/errno.h>
Herbert Xuef76bc22008-01-11 19:15:08 -080030#include <linux/kernel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070031#include <linux/string.h>
32#include <linux/socket.h>
33#include <linux/net.h>
34#include <linux/netdevice.h>
35#include <linux/if_arp.h>
36#include <linux/in6.h>
37#include <linux/tcp.h>
38#include <linux/route.h>
Herbert Xub59f45d2006-05-27 23:05:54 -070039#include <linux/module.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090040#include <linux/slab.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070041
Daniel Mack33b48672016-11-23 16:52:29 +010042#include <linux/bpf-cgroup.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070043#include <linux/netfilter.h>
44#include <linux/netfilter_ipv6.h>
45
46#include <net/sock.h>
47#include <net/snmp.h>
48
49#include <net/ipv6.h>
50#include <net/ndisc.h>
51#include <net/protocol.h>
52#include <net/ip6_route.h>
53#include <net/addrconf.h>
54#include <net/rawv6.h>
55#include <net/icmp.h>
56#include <net/xfrm.h>
57#include <net/checksum.h>
YOSHIFUJI Hideaki7bc570c2008-04-03 09:22:53 +090058#include <linux/mroute6.h>
David Ahernca254492015-10-12 11:47:10 -070059#include <net/l3mdev.h>
Roopa Prabhu14972cb2016-08-24 20:10:43 -070060#include <net/lwtunnel.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070061
Eric W. Biederman7d8c6e32015-06-12 22:12:04 -050062static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -070063{
Eric Dumazetadf30902009-06-02 05:19:30 +000064 struct dst_entry *dst = skb_dst(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -070065 struct net_device *dev = dst->dev;
David S. Millerf6b72b622011-07-14 07:53:20 -070066 struct neighbour *neigh;
YOSHIFUJI Hideaki / 吉藤英明6fd6ce22013-01-17 12:54:00 +000067 struct in6_addr *nexthop;
68 int ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -070069
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -070070 if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) {
Eric Dumazetadf30902009-06-02 05:19:30 +000071 struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -070072
David Miller7026b1d2015-04-05 22:19:04 -040073 if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) &&
Yuval Mintz8571ab42018-02-28 23:29:30 +020074 ((mroute6_is_socket(net, skb) &&
Benjamin Therybd91b8b2008-12-10 16:07:08 -080075 !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) ||
YOSHIFUJI Hideaki7bc570c2008-04-03 09:22:53 +090076 ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr,
77 &ipv6_hdr(skb)->saddr))) {
Linus Torvalds1da177e2005-04-16 15:20:36 -070078 struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC);
79
80 /* Do not check for IFF_ALLMULTI; multicast routing
81 is not supported in any case.
82 */
83 if (newskb)
Jan Engelhardtb2e0b382010-03-23 04:09:07 +010084 NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING,
Eric W. Biederman29a26a52015-09-15 20:04:16 -050085 net, sk, newskb, NULL, newskb->dev,
Michel Machado95603e22012-06-12 10:16:35 +000086 dev_loopback_xmit);
Linus Torvalds1da177e2005-04-16 15:20:36 -070087
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -070088 if (ipv6_hdr(skb)->hop_limit == 0) {
Eric W. Biederman78126c42015-09-15 20:04:09 -050089 IP6_INC_STATS(net, idev,
Denis V. Lunev3bd653c2008-10-08 10:54:51 -070090 IPSTATS_MIB_OUTDISCARDS);
Linus Torvalds1da177e2005-04-16 15:20:36 -070091 kfree_skb(skb);
92 return 0;
93 }
94 }
95
Eric W. Biederman78126c42015-09-15 20:04:09 -050096 IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len);
Hannes Frederic Sowadd408512013-02-10 02:33:35 +000097
98 if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <=
99 IPV6_ADDR_SCOPE_NODELOCAL &&
100 !(dev->flags & IFF_LOOPBACK)) {
101 kfree_skb(skb);
102 return 0;
103 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104 }
105
Roopa Prabhu14972cb2016-08-24 20:10:43 -0700106 if (lwtunnel_xmit_redirect(dst->lwtstate)) {
107 int res = lwtunnel_xmit(skb);
108
109 if (res < 0 || res == LWTUNNEL_XMIT_DONE)
110 return res;
111 }
112
YOSHIFUJI Hideaki / 吉藤英明6fd6ce22013-01-17 12:54:00 +0000113 rcu_read_lock_bh();
Martin KaFai Lau2647a9b2015-05-22 20:55:58 -0700114 nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr);
YOSHIFUJI Hideaki / 吉藤英明6fd6ce22013-01-17 12:54:00 +0000115 neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop);
116 if (unlikely(!neigh))
117 neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false);
118 if (!IS_ERR(neigh)) {
Julian Anastasov4ff06202017-02-06 23:14:12 +0200119 sock_confirm_neigh(skb, neigh);
Julian Anastasovc16ec1852017-02-11 13:49:20 +0200120 ret = neigh_output(neigh, skb);
YOSHIFUJI Hideaki / 吉藤英明6fd6ce22013-01-17 12:54:00 +0000121 rcu_read_unlock_bh();
122 return ret;
123 }
124 rcu_read_unlock_bh();
David S. Miller05e3aa02011-07-16 17:26:00 -0700125
Eric W. Biederman78126c42015-09-15 20:04:09 -0500126 IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES);
Jan Engelhardt9e508492010-04-13 15:28:11 +0200127 kfree_skb(skb);
128 return -EINVAL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700129}
130
Eric W. Biederman0c4b51f2015-09-15 20:04:18 -0500131static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
Jan Engelhardt9e508492010-04-13 15:28:11 +0200132{
Daniel Mack33b48672016-11-23 16:52:29 +0100133 int ret;
134
135 ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb);
136 if (ret) {
137 kfree_skb(skb);
138 return ret;
139 }
140
Tobias Brunner09ee9dba2017-12-21 17:32:24 +0100141#if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM)
142 /* Policy lookup after SNAT yielded a new policy */
143 if (skb_dst(skb)->xfrm) {
144 IPCB(skb)->flags |= IPSKB_REROUTED;
145 return dst_output(net, sk, skb);
146 }
147#endif
148
Jan Engelhardt9e508492010-04-13 15:28:11 +0200149 if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) ||
Jiri Pirko9037c352013-11-06 17:52:19 +0100150 dst_allfrag(skb_dst(skb)) ||
151 (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size))
Eric W. Biederman7d8c6e32015-06-12 22:12:04 -0500152 return ip6_fragment(net, sk, skb, ip6_finish_output2);
Jan Engelhardt9e508492010-04-13 15:28:11 +0200153 else
Eric W. Biederman7d8c6e32015-06-12 22:12:04 -0500154 return ip6_finish_output2(net, sk, skb);
Jan Engelhardt9e508492010-04-13 15:28:11 +0200155}
156
Eric W. Biedermanede20592015-10-07 16:48:47 -0500157int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700158{
Jan Engelhardt9e508492010-04-13 15:28:11 +0200159 struct net_device *dev = skb_dst(skb)->dev;
Eric Dumazetadf30902009-06-02 05:19:30 +0000160 struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
Eric W. Biedermanbe10de02015-09-17 17:21:31 -0500161
Chenbo Feng97a7a372017-06-09 12:06:07 -0700162 skb->protocol = htons(ETH_P_IPV6);
163 skb->dev = dev;
164
YOSHIFUJI Hideaki778d80b2008-06-28 14:17:11 +0900165 if (unlikely(idev->cnf.disable_ipv6)) {
Eric W. Biederman19a06442015-09-15 20:04:10 -0500166 IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
YOSHIFUJI Hideaki778d80b2008-06-28 14:17:11 +0900167 kfree_skb(skb);
168 return 0;
169 }
170
Eric W. Biederman29a26a52015-09-15 20:04:16 -0500171 return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
172 net, sk, skb, NULL, dev,
Jan Engelhardt9c6eb282010-04-13 15:32:16 +0200173 ip6_finish_output,
174 !(IP6CB(skb)->flags & IP6SKB_REROUTED));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700175}
176
Ben Hutchingse9191ff2018-01-22 20:06:42 +0000177bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np)
Shaohua Li513674b2017-12-20 12:10:21 -0800178{
179 if (!np->autoflowlabel_set)
180 return ip6_default_np_autolabel(net);
181 else
182 return np->autoflowlabel;
183}
184
Linus Torvalds1da177e2005-04-16 15:20:36 -0700185/*
Eric Dumazet1c1e9d22015-09-25 07:39:20 -0700186 * xmit an sk_buff (used by TCP, SCTP and DCCP)
187 * Note : socket lock is not held for SYNACK packets, but might be modified
188 * by calls to skb_set_owner_w() and ipv6_local_error(),
189 * which are using proper atomic operations or spinlocks.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700190 */
Eric Dumazet1c1e9d22015-09-25 07:39:20 -0700191int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6,
Pablo Neira92e55f42017-01-26 22:56:21 +0100192 __u32 mark, struct ipv6_txoptions *opt, int tclass)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700193{
Denis V. Lunev3bd653c2008-10-08 10:54:51 -0700194 struct net *net = sock_net(sk);
Eric Dumazet1c1e9d22015-09-25 07:39:20 -0700195 const struct ipv6_pinfo *np = inet6_sk(sk);
David S. Miller4c9483b2011-03-12 16:22:43 -0500196 struct in6_addr *first_hop = &fl6->daddr;
Eric Dumazetadf30902009-06-02 05:19:30 +0000197 struct dst_entry *dst = skb_dst(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700198 struct ipv6hdr *hdr;
David S. Miller4c9483b2011-03-12 16:22:43 -0500199 u8 proto = fl6->flowi6_proto;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700200 int seg_len = skb->len;
Gerrit Renkere651f032009-08-09 08:12:48 +0000201 int hlimit = -1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700202 u32 mtu;
203
204 if (opt) {
Chuck Leverc2636b42007-10-23 21:07:32 -0700205 unsigned int head_room;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700206
207 /* First: exthdrs may take lots of space (~8K for now)
208 MAX_HEADER is not enough.
209 */
210 head_room = opt->opt_nflen + opt->opt_flen;
211 seg_len += head_room;
212 head_room += sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev);
213
214 if (skb_headroom(skb) < head_room) {
215 struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room);
Ian Morris63159f22015-03-29 14:00:04 +0100216 if (!skb2) {
Eric Dumazetadf30902009-06-02 05:19:30 +0000217 IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
YOSHIFUJI Hideakia11d2062006-11-04 20:11:37 +0900218 IPSTATS_MIB_OUTDISCARDS);
219 kfree_skb(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700220 return -ENOBUFS;
221 }
Eric Dumazetbbd65282018-09-14 12:02:31 -0700222 if (skb->sk)
223 skb_set_owner_w(skb2, skb->sk);
Eric Dumazet808db802012-04-24 10:17:59 +0000224 consume_skb(skb);
YOSHIFUJI Hideakia11d2062006-11-04 20:11:37 +0900225 skb = skb2;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700226 }
227 if (opt->opt_flen)
228 ipv6_push_frag_opts(skb, opt, &proto);
229 if (opt->opt_nflen)
David Lebrun613fa3c2016-11-08 14:59:20 +0100230 ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop,
231 &fl6->saddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700232 }
233
Arnaldo Carvalho de Meloe2d1bca2007-04-10 20:46:21 -0700234 skb_push(skb, sizeof(struct ipv6hdr));
235 skb_reset_network_header(skb);
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700236 hdr = ipv6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700237
238 /*
239 * Fill in the IPv6 header
240 */
Eric Dumazetb903d322011-10-27 00:44:35 -0400241 if (np)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700242 hlimit = np->hop_limit;
243 if (hlimit < 0)
YOSHIFUJI Hideaki6b75d092008-03-10 06:00:30 -0400244 hlimit = ip6_dst_hoplimit(dst);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700245
Tom Herbertcb1ce2e2014-07-01 21:33:10 -0700246 ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel,
Shaohua Li513674b2017-12-20 12:10:21 -0800247 ip6_autoflowlabel(net, np), fl6));
YOSHIFUJI Hideaki41a1f8e2005-09-08 10:19:03 +0900248
Linus Torvalds1da177e2005-04-16 15:20:36 -0700249 hdr->payload_len = htons(seg_len);
250 hdr->nexthdr = proto;
251 hdr->hop_limit = hlimit;
252
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000253 hdr->saddr = fl6->saddr;
254 hdr->daddr = *first_hop;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700255
Hannes Frederic Sowa9c9c9ad2013-08-26 12:31:23 +0200256 skb->protocol = htons(ETH_P_IPV6);
Patrick McHardya2c20642006-01-08 22:37:26 -0800257 skb->priority = sk->sk_priority;
Pablo Neira92e55f42017-01-26 22:56:21 +0100258 skb->mark = mark;
Patrick McHardya2c20642006-01-08 22:37:26 -0800259
Linus Torvalds1da177e2005-04-16 15:20:36 -0700260 mtu = dst_mtu(dst);
WANG Cong60ff7462014-05-04 16:39:18 -0700261 if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) {
Eric Dumazetadf30902009-06-02 05:19:30 +0000262 IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)),
Neil Hormanedf391f2009-04-27 02:45:02 -0700263 IPSTATS_MIB_OUT, skb->len);
David Aherna8e3e1a2016-09-10 12:09:53 -0700264
265 /* if egress device is enslaved to an L3 master device pass the
266 * skb to its handler for processing
267 */
268 skb = l3mdev_ip6_out((struct sock *)sk, skb);
269 if (unlikely(!skb))
270 return 0;
271
Eric Dumazet1c1e9d22015-09-25 07:39:20 -0700272 /* hooks should never assume socket lock is held.
273 * we promote our socket to non const
274 */
Eric W. Biederman29a26a52015-09-15 20:04:16 -0500275 return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
Eric Dumazet1c1e9d22015-09-25 07:39:20 -0700276 net, (struct sock *)sk, skb, NULL, dst->dev,
Eric W. Biederman13206b62015-10-07 16:48:35 -0500277 dst_output);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700278 }
279
Linus Torvalds1da177e2005-04-16 15:20:36 -0700280 skb->dev = dst->dev;
Eric Dumazet1c1e9d22015-09-25 07:39:20 -0700281 /* ipv6_local_error() does not require socket lock,
282 * we promote our socket to non const
283 */
284 ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu);
285
Eric Dumazetadf30902009-06-02 05:19:30 +0000286 IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700287 kfree_skb(skb);
288 return -EMSGSIZE;
289}
YOSHIFUJI Hideaki71590392007-02-22 22:05:40 +0900290EXPORT_SYMBOL(ip6_xmit);
291
Linus Torvalds1da177e2005-04-16 15:20:36 -0700292static int ip6_call_ra_chain(struct sk_buff *skb, int sel)
293{
294 struct ip6_ra_chain *ra;
295 struct sock *last = NULL;
296
297 read_lock(&ip6_ra_lock);
298 for (ra = ip6_ra_chain; ra; ra = ra->next) {
299 struct sock *sk = ra->sk;
Andrew McDonald0bd1b592005-08-09 19:44:42 -0700300 if (sk && ra->sel == sel &&
301 (!sk->sk_bound_dev_if ||
302 sk->sk_bound_dev_if == skb->dev->ifindex)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700303 if (last) {
304 struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
305 if (skb2)
306 rawv6_rcv(last, skb2);
307 }
308 last = sk;
309 }
310 }
311
312 if (last) {
313 rawv6_rcv(last, skb);
314 read_unlock(&ip6_ra_lock);
315 return 1;
316 }
317 read_unlock(&ip6_ra_lock);
318 return 0;
319}
320
Ville Nuorvalae21e0b52006-09-22 14:41:44 -0700321static int ip6_forward_proxy_check(struct sk_buff *skb)
322{
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700323 struct ipv6hdr *hdr = ipv6_hdr(skb);
Ville Nuorvalae21e0b52006-09-22 14:41:44 -0700324 u8 nexthdr = hdr->nexthdr;
Jesse Gross75f28112011-11-30 17:05:51 -0800325 __be16 frag_off;
Ville Nuorvalae21e0b52006-09-22 14:41:44 -0700326 int offset;
327
328 if (ipv6_ext_hdr(nexthdr)) {
Jesse Gross75f28112011-11-30 17:05:51 -0800329 offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off);
Ville Nuorvalae21e0b52006-09-22 14:41:44 -0700330 if (offset < 0)
331 return 0;
332 } else
333 offset = sizeof(struct ipv6hdr);
334
335 if (nexthdr == IPPROTO_ICMPV6) {
336 struct icmp6hdr *icmp6;
337
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700338 if (!pskb_may_pull(skb, (skb_network_header(skb) +
339 offset + 1 - skb->data)))
Ville Nuorvalae21e0b52006-09-22 14:41:44 -0700340 return 0;
341
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700342 icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset);
Ville Nuorvalae21e0b52006-09-22 14:41:44 -0700343
344 switch (icmp6->icmp6_type) {
345 case NDISC_ROUTER_SOLICITATION:
346 case NDISC_ROUTER_ADVERTISEMENT:
347 case NDISC_NEIGHBOUR_SOLICITATION:
348 case NDISC_NEIGHBOUR_ADVERTISEMENT:
349 case NDISC_REDIRECT:
350 /* For reaction involving unicast neighbor discovery
351 * message destined to the proxied address, pass it to
352 * input function.
353 */
354 return 1;
355 default:
356 break;
357 }
358 }
359
Ville Nuorvala74553b02006-09-22 14:42:18 -0700360 /*
361 * The proxying router can't forward traffic sent to a link-local
362 * address, so signal the sender and discard the packet. This
363 * behavior is clarified by the MIPv6 specification.
364 */
365 if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) {
366 dst_link_failure(skb);
367 return -1;
368 }
369
Ville Nuorvalae21e0b52006-09-22 14:41:44 -0700370 return 0;
371}
372
Eric W. Biederman0c4b51f2015-09-15 20:04:18 -0500373static inline int ip6_forward_finish(struct net *net, struct sock *sk,
374 struct sk_buff *skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700375{
Jeff Barnhill71a1c912018-04-05 21:29:47 +0000376 struct dst_entry *dst = skb_dst(skb);
377
378 __IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS);
379 __IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len);
380
Ido Schimmelf839a6c2018-12-04 08:15:11 +0000381#ifdef CONFIG_NET_SWITCHDEV
382 if (skb->offload_l3_fwd_mark) {
383 consume_skb(skb);
384 return 0;
385 }
386#endif
387
Eric W. Biederman13206b62015-10-07 16:48:35 -0500388 return dst_output(net, sk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700389}
390
Florian Westphalfe6cc552014-02-13 23:09:12 +0100391static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu)
392{
Florian Westphal418a3152014-05-05 00:03:34 +0200393 if (skb->len <= mtu)
Florian Westphalfe6cc552014-02-13 23:09:12 +0100394 return false;
395
WANG Cong60ff7462014-05-04 16:39:18 -0700396 /* ipv6 conntrack defrag sets max_frag_size + ignore_df */
Florian Westphalfe6cc552014-02-13 23:09:12 +0100397 if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu)
398 return true;
399
WANG Cong60ff7462014-05-04 16:39:18 -0700400 if (skb->ignore_df)
Florian Westphal418a3152014-05-05 00:03:34 +0200401 return false;
402
Daniel Axtens779b7932018-03-01 17:13:37 +1100403 if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu))
Florian Westphalfe6cc552014-02-13 23:09:12 +0100404 return false;
405
406 return true;
407}
408
Linus Torvalds1da177e2005-04-16 15:20:36 -0700409int ip6_forward(struct sk_buff *skb)
410{
Stephen Suryaputrabdb7cc62018-04-16 13:42:16 -0400411 struct inet6_dev *idev = __in6_dev_get_safely(skb->dev);
Eric Dumazetadf30902009-06-02 05:19:30 +0000412 struct dst_entry *dst = skb_dst(skb);
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700413 struct ipv6hdr *hdr = ipv6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700414 struct inet6_skb_parm *opt = IP6CB(skb);
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +0900415 struct net *net = dev_net(dst->dev);
Ulrich Weber14f3ad62010-02-26 04:34:49 -0800416 u32 mtu;
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900417
YOSHIFUJI Hideaki53b79972008-07-19 22:35:03 -0700418 if (net->ipv6.devconf_all->forwarding == 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700419 goto error;
420
Li RongQing090f1162014-03-11 10:40:08 +0800421 if (skb->pkt_type != PACKET_HOST)
422 goto drop;
423
Hannes Frederic Sowa9ef2e962015-10-08 18:19:53 +0200424 if (unlikely(skb->sk))
425 goto drop;
426
Ben Hutchings4497b072008-06-19 16:22:28 -0700427 if (skb_warn_if_lro(skb))
428 goto drop;
429
Linus Torvalds1da177e2005-04-16 15:20:36 -0700430 if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) {
Stephen Suryaputrabdb7cc62018-04-16 13:42:16 -0400431 __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700432 goto drop;
433 }
434
Herbert Xu35fc92a2007-03-26 23:22:20 -0700435 skb_forward_csum(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700436
437 /*
438 * We DO NOT make any processing on
439 * RA packets, pushing them to user level AS IS
440 * without ane WARRANTY that application will be able
441 * to interpret them. The reason is that we
442 * cannot make anything clever here.
443 *
444 * We are not end-node, so that if packet contains
445 * AH/ESP, we cannot make anything.
446 * Defragmentation also would be mistake, RA packets
447 * cannot be fragmented, because there is no warranty
448 * that different fragments will go along one path. --ANK
449 */
YOSHIFUJI Hideaki / 吉藤英明ab4eb352013-06-22 11:13:13 +0900450 if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) {
451 if (ip6_call_ra_chain(skb, ntohs(opt->ra)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700452 return 0;
453 }
454
455 /*
456 * check and decrement ttl
457 */
458 if (hdr->hop_limit <= 1) {
459 /* Force OUTPUT device used as source address */
460 skb->dev = dst->dev;
Alexey Dobriyan3ffe5332010-02-18 08:25:24 +0000461 icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0);
Stephen Suryaputrabdb7cc62018-04-16 13:42:16 -0400462 __IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700463
464 kfree_skb(skb);
465 return -ETIMEDOUT;
466 }
467
YOSHIFUJI Hideakifbea49e2006-09-22 14:43:49 -0700468 /* XXX: idev->cnf.proxy_ndp? */
YOSHIFUJI Hideaki53b79972008-07-19 22:35:03 -0700469 if (net->ipv6.devconf_all->proxy_ndp &&
Daniel Lezcano8a3edd82008-03-07 11:14:16 -0800470 pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) {
Ville Nuorvala74553b02006-09-22 14:42:18 -0700471 int proxied = ip6_forward_proxy_check(skb);
472 if (proxied > 0)
Ville Nuorvalae21e0b52006-09-22 14:41:44 -0700473 return ip6_input(skb);
Ville Nuorvala74553b02006-09-22 14:42:18 -0700474 else if (proxied < 0) {
Stephen Suryaputrabdb7cc62018-04-16 13:42:16 -0400475 __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
Ville Nuorvala74553b02006-09-22 14:42:18 -0700476 goto drop;
477 }
Ville Nuorvalae21e0b52006-09-22 14:41:44 -0700478 }
479
Linus Torvalds1da177e2005-04-16 15:20:36 -0700480 if (!xfrm6_route_forward(skb)) {
Stephen Suryaputrabdb7cc62018-04-16 13:42:16 -0400481 __IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700482 goto drop;
483 }
Eric Dumazetadf30902009-06-02 05:19:30 +0000484 dst = skb_dst(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700485
486 /* IPv6 specs say nothing about it, but it is clear that we cannot
487 send redirects to source routed frames.
Masahide NAKAMURA1e5dc142007-08-24 19:08:55 +0900488 We don't send redirects to frames decapsulated from IPsec.
Linus Torvalds1da177e2005-04-16 15:20:36 -0700489 */
Stephen Suryaputra2f17bec2018-06-01 00:05:21 -0400490 if (IP6CB(skb)->iif == dst->dev->ifindex &&
491 opt->srcrt == 0 && !skb_sec_path(skb)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700492 struct in6_addr *target = NULL;
David S. Millerfbfe95a2012-06-08 23:24:18 -0700493 struct inet_peer *peer;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700494 struct rt6_info *rt;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700495
496 /*
497 * incoming and outgoing devices are the same
498 * send a redirect.
499 */
500
501 rt = (struct rt6_info *) dst;
David S. Millerc45a3df2012-01-27 15:32:19 -0800502 if (rt->rt6i_flags & RTF_GATEWAY)
503 target = &rt->rt6i_gateway;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700504 else
505 target = &hdr->daddr;
506
Martin KaFai Laufd0273d2015-05-22 20:55:57 -0700507 peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1);
David S. Miller92d86822011-02-04 15:55:25 -0800508
Linus Torvalds1da177e2005-04-16 15:20:36 -0700509 /* Limit redirects both by destination (here)
510 and by source (inside ndisc_send_redirect)
511 */
David S. Millerfbfe95a2012-06-08 23:24:18 -0700512 if (inet_peer_xrlim_allow(peer, 1*HZ))
David S. Miller49919692012-01-27 15:30:48 -0800513 ndisc_send_redirect(skb, target);
David S. Miller1d861aa2012-07-10 03:58:16 -0700514 if (peer)
515 inet_putpeer(peer);
David L Stevens5bb1ab02007-05-09 13:53:44 -0700516 } else {
517 int addrtype = ipv6_addr_type(&hdr->saddr);
518
Linus Torvalds1da177e2005-04-16 15:20:36 -0700519 /* This check is security critical. */
YOSHIFUJI Hideakif81b2e72008-06-25 16:55:26 +0900520 if (addrtype == IPV6_ADDR_ANY ||
521 addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK))
David L Stevens5bb1ab02007-05-09 13:53:44 -0700522 goto error;
523 if (addrtype & IPV6_ADDR_LINKLOCAL) {
524 icmpv6_send(skb, ICMPV6_DEST_UNREACH,
Alexey Dobriyan3ffe5332010-02-18 08:25:24 +0000525 ICMPV6_NOT_NEIGHBOUR, 0);
David L Stevens5bb1ab02007-05-09 13:53:44 -0700526 goto error;
527 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700528 }
529
Hannes Frederic Sowa0954cf92014-01-09 10:01:16 +0100530 mtu = ip6_dst_mtu_forward(dst);
Ulrich Weber14f3ad62010-02-26 04:34:49 -0800531 if (mtu < IPV6_MIN_MTU)
532 mtu = IPV6_MIN_MTU;
533
Florian Westphalfe6cc552014-02-13 23:09:12 +0100534 if (ip6_pkt_too_big(skb, mtu)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700535 /* Again, force OUTPUT device used as source address */
536 skb->dev = dst->dev;
Ulrich Weber14f3ad62010-02-26 04:34:49 -0800537 icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
Stephen Suryaputrabdb7cc62018-04-16 13:42:16 -0400538 __IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS);
Eric Dumazet1d015502016-04-27 16:44:40 -0700539 __IP6_INC_STATS(net, ip6_dst_idev(dst),
540 IPSTATS_MIB_FRAGFAILS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700541 kfree_skb(skb);
542 return -EMSGSIZE;
543 }
544
545 if (skb_cow(skb, dst->dev->hard_header_len)) {
Eric Dumazet1d015502016-04-27 16:44:40 -0700546 __IP6_INC_STATS(net, ip6_dst_idev(dst),
547 IPSTATS_MIB_OUTDISCARDS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700548 goto drop;
549 }
550
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700551 hdr = ipv6_hdr(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700552
553 /* Mangling hops number delayed to point after skb COW */
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900554
Linus Torvalds1da177e2005-04-16 15:20:36 -0700555 hdr->hop_limit--;
556
Eric W. Biederman29a26a52015-09-15 20:04:16 -0500557 return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD,
558 net, NULL, skb, skb->dev, dst->dev,
Patrick McHardy6e23ae22007-11-19 18:53:30 -0800559 ip6_forward_finish);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700560
561error:
Stephen Suryaputrabdb7cc62018-04-16 13:42:16 -0400562 __IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700563drop:
564 kfree_skb(skb);
565 return -EINVAL;
566}
567
568static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from)
569{
570 to->pkt_type = from->pkt_type;
571 to->priority = from->priority;
572 to->protocol = from->protocol;
Eric Dumazetadf30902009-06-02 05:19:30 +0000573 skb_dst_drop(to);
574 skb_dst_set(to, dst_clone(skb_dst(from)));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700575 to->dev = from->dev;
Thomas Graf82e91ff2006-11-09 15:19:14 -0800576 to->mark = from->mark;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700577
Paolo Abeni3dd1c9a2018-07-23 16:50:48 +0200578 skb_copy_hash(to, from);
579
Linus Torvalds1da177e2005-04-16 15:20:36 -0700580#ifdef CONFIG_NET_SCHED
581 to->tc_index = from->tc_index;
582#endif
Yasuyuki Kozakaie7ac05f2007-03-14 16:44:01 -0700583 nf_copy(to, from);
James Morris984bc162006-06-09 00:29:17 -0700584 skb_copy_secmark(to, from);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700585}
586
Eric W. Biederman7d8c6e32015-06-12 22:12:04 -0500587int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb,
588 int (*output)(struct net *, struct sock *, struct sk_buff *))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700589{
Linus Torvalds1da177e2005-04-16 15:20:36 -0700590 struct sk_buff *frag;
Ian Morris67ba4152014-08-24 21:53:10 +0100591 struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
hannes@stressinduktion.orgf60e5992015-04-01 17:07:44 +0200592 struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ?
593 inet6_sk(skb->sk) : NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700594 struct ipv6hdr *tmp_hdr;
595 struct frag_hdr *fh;
596 unsigned int mtu, hlen, left, len;
Herbert Xua7ae1992011-11-18 02:20:04 +0000597 int hroom, troom;
Martin KaFai Lau286c2342015-05-22 20:55:56 -0700598 __be32 frag_id;
Ian Morris67ba4152014-08-24 21:53:10 +0100599 int ptr, offset = 0, err = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700600 u8 *prevhdr, nexthdr = 0;
601
David S. Miller7dd7eb92017-05-17 22:54:11 -0400602 err = ip6_find_1stfragopt(skb, &prevhdr);
603 if (err < 0)
Craig Gallek24234962017-05-16 14:36:23 -0400604 goto fail;
David S. Miller7dd7eb92017-05-17 22:54:11 -0400605 hlen = err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700606 nexthdr = *prevhdr;
607
John Heffner628a5c52007-04-20 15:53:27 -0700608 mtu = ip6_skb_dst_mtu(skb);
John Heffnerb881ef72007-04-20 15:52:39 -0700609
610 /* We must not fragment if the socket is set to force MTU discovery
Ulrich Weber14f3ad62010-02-26 04:34:49 -0800611 * or if the skb it not generated by a local socket.
John Heffnerb881ef72007-04-20 15:52:39 -0700612 */
Florian Westphal485fca62015-05-22 00:44:16 +0200613 if (unlikely(!skb->ignore_df && skb->len > mtu))
614 goto fail_toobig;
Eric Dumazeta34a1012012-05-18 21:51:44 +0000615
Florian Westphal485fca62015-05-22 00:44:16 +0200616 if (IP6CB(skb)->frag_max_size) {
617 if (IP6CB(skb)->frag_max_size > mtu)
618 goto fail_toobig;
619
620 /* don't send fragments larger than what we received */
621 mtu = IP6CB(skb)->frag_max_size;
622 if (mtu < IPV6_MIN_MTU)
623 mtu = IPV6_MIN_MTU;
John Heffnerb881ef72007-04-20 15:52:39 -0700624 }
625
YOSHIFUJI Hideakid91675f2006-02-24 13:18:33 -0800626 if (np && np->frag_size < mtu) {
627 if (np->frag_size)
628 mtu = np->frag_size;
629 }
Hannes Frederic Sowa89bc7842015-10-28 13:21:04 +0100630 if (mtu < hlen + sizeof(struct frag_hdr) + 8)
Hannes Frederic Sowab72a2b02015-10-16 11:32:43 +0200631 goto fail_toobig;
Hannes Frederic Sowa1e0d69a2015-10-28 13:21:03 +0100632 mtu -= hlen + sizeof(struct frag_hdr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700633
Martin KaFai Laufd0273d2015-05-22 20:55:57 -0700634 frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr,
635 &ipv6_hdr(skb)->saddr);
Martin KaFai Lau286c2342015-05-22 20:55:56 -0700636
Hannes Frederic Sowa405c92f2015-10-27 22:40:42 +0100637 if (skb->ip_summed == CHECKSUM_PARTIAL &&
638 (err = skb_checksum_help(skb)))
639 goto fail;
640
Florian Westphal1d325d22015-09-16 17:26:14 +0200641 hroom = LL_RESERVED_SPACE(rt->dst.dev);
David S. Miller21dc3302010-08-23 00:13:46 -0700642 if (skb_has_frag_list(skb)) {
Alexey Dobriyanc72d8cd2016-11-19 04:08:08 +0300643 unsigned int first_len = skb_pagelen(skb);
Eric Dumazet3d130082010-09-21 08:47:45 +0000644 struct sk_buff *frag2;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700645
646 if (first_len - hlen > mtu ||
647 ((first_len - hlen) & 7) ||
Florian Westphal1d325d22015-09-16 17:26:14 +0200648 skb_cloned(skb) ||
649 skb_headroom(skb) < (hroom + sizeof(struct frag_hdr)))
Linus Torvalds1da177e2005-04-16 15:20:36 -0700650 goto slow_path;
651
David S. Miller4d9092b2009-06-09 00:20:05 -0700652 skb_walk_frags(skb, frag) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700653 /* Correct geometry. */
654 if (frag->len > mtu ||
655 ((frag->len & 7) && frag->next) ||
Florian Westphal1d325d22015-09-16 17:26:14 +0200656 skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr)))
Eric Dumazet3d130082010-09-21 08:47:45 +0000657 goto slow_path_clean;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700658
Linus Torvalds1da177e2005-04-16 15:20:36 -0700659 /* Partially cloned skb? */
660 if (skb_shared(frag))
Eric Dumazet3d130082010-09-21 08:47:45 +0000661 goto slow_path_clean;
Herbert Xu2fdba6b2005-05-18 22:52:33 -0700662
663 BUG_ON(frag->sk);
664 if (skb->sk) {
Herbert Xu2fdba6b2005-05-18 22:52:33 -0700665 frag->sk = skb->sk;
666 frag->destructor = sock_wfree;
Herbert Xu2fdba6b2005-05-18 22:52:33 -0700667 }
Eric Dumazet3d130082010-09-21 08:47:45 +0000668 skb->truesize -= frag->truesize;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700669 }
670
671 err = 0;
672 offset = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700673 /* BUILD HEADER */
674
YOSHIFUJI Hideaki9a217a12006-12-05 13:47:21 -0800675 *prevhdr = NEXTHDR_FRAGMENT;
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700676 tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700677 if (!tmp_hdr) {
Florian Westphal1d325d22015-09-16 17:26:14 +0200678 err = -ENOMEM;
679 goto fail;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700680 }
Florian Westphal1d325d22015-09-16 17:26:14 +0200681 frag = skb_shinfo(skb)->frag_list;
682 skb_frag_list_init(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700683
Linus Torvalds1da177e2005-04-16 15:20:36 -0700684 __skb_pull(skb, hlen);
Johannes Bergd58ff352017-06-16 14:29:23 +0200685 fh = __skb_push(skb, sizeof(struct frag_hdr));
Arnaldo Carvalho de Meloe2d1bca2007-04-10 20:46:21 -0700686 __skb_push(skb, hlen);
687 skb_reset_network_header(skb);
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700688 memcpy(skb_network_header(skb), tmp_hdr, hlen);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700689
Linus Torvalds1da177e2005-04-16 15:20:36 -0700690 fh->nexthdr = nexthdr;
691 fh->reserved = 0;
692 fh->frag_off = htons(IP6_MF);
Martin KaFai Lau286c2342015-05-22 20:55:56 -0700693 fh->identification = frag_id;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700694
695 first_len = skb_pagelen(skb);
696 skb->data_len = first_len - skb_headlen(skb);
697 skb->len = first_len;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700698 ipv6_hdr(skb)->payload_len = htons(first_len -
699 sizeof(struct ipv6hdr));
YOSHIFUJI Hideakia11d2062006-11-04 20:11:37 +0900700
Linus Torvalds1da177e2005-04-16 15:20:36 -0700701 for (;;) {
702 /* Prepare header of the next frame,
703 * before previous one went down. */
704 if (frag) {
705 frag->ip_summed = CHECKSUM_NONE;
Arnaldo Carvalho de Melobadff6d2007-03-13 13:06:52 -0300706 skb_reset_transport_header(frag);
Johannes Bergd58ff352017-06-16 14:29:23 +0200707 fh = __skb_push(frag, sizeof(struct frag_hdr));
Arnaldo Carvalho de Meloe2d1bca2007-04-10 20:46:21 -0700708 __skb_push(frag, hlen);
709 skb_reset_network_header(frag);
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700710 memcpy(skb_network_header(frag), tmp_hdr,
711 hlen);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700712 offset += skb->len - hlen - sizeof(struct frag_hdr);
713 fh->nexthdr = nexthdr;
714 fh->reserved = 0;
715 fh->frag_off = htons(offset);
Ian Morris53b24b82015-03-29 14:00:05 +0100716 if (frag->next)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700717 fh->frag_off |= htons(IP6_MF);
718 fh->identification = frag_id;
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700719 ipv6_hdr(frag)->payload_len =
720 htons(frag->len -
721 sizeof(struct ipv6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700722 ip6_copy_metadata(frag, skb);
723 }
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900724
Eric W. Biederman7d8c6e32015-06-12 22:12:04 -0500725 err = output(net, sk, skb);
Ian Morris67ba4152014-08-24 21:53:10 +0100726 if (!err)
Changli Gaod8d1f302010-06-10 23:31:35 -0700727 IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
Denis V. Lunev3bd653c2008-10-08 10:54:51 -0700728 IPSTATS_MIB_FRAGCREATES);
Wei Dongdafee492006-08-02 13:41:21 -0700729
Linus Torvalds1da177e2005-04-16 15:20:36 -0700730 if (err || !frag)
731 break;
732
733 skb = frag;
734 frag = skb->next;
David S. Millera8305bf2018-07-29 20:42:53 -0700735 skb_mark_not_on_list(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700736 }
737
Jesper Juhla51482b2005-11-08 09:41:34 -0800738 kfree(tmp_hdr);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700739
740 if (err == 0) {
Changli Gaod8d1f302010-06-10 23:31:35 -0700741 IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
Denis V. Lunev3bd653c2008-10-08 10:54:51 -0700742 IPSTATS_MIB_FRAGOKS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700743 return 0;
744 }
745
Florian Westphal46cfd722014-09-10 01:08:46 +0200746 kfree_skb_list(frag);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700747
Changli Gaod8d1f302010-06-10 23:31:35 -0700748 IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
Denis V. Lunev3bd653c2008-10-08 10:54:51 -0700749 IPSTATS_MIB_FRAGFAILS);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700750 return err;
Eric Dumazet3d130082010-09-21 08:47:45 +0000751
752slow_path_clean:
753 skb_walk_frags(skb, frag2) {
754 if (frag2 == frag)
755 break;
756 frag2->sk = NULL;
757 frag2->destructor = NULL;
758 skb->truesize += frag2->truesize;
759 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700760 }
761
762slow_path:
763 left = skb->len - hlen; /* Space per frame */
764 ptr = hlen; /* Where to start from */
765
766 /*
767 * Fragment the datagram.
768 */
769
Herbert Xua7ae1992011-11-18 02:20:04 +0000770 troom = rt->dst.dev->needed_tailroom;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700771
772 /*
773 * Keep copying data until we run out.
774 */
Ian Morris67ba4152014-08-24 21:53:10 +0100775 while (left > 0) {
Florian Westphal79e49502017-03-13 16:24:28 +0100776 u8 *fragnexthdr_offset;
777
Linus Torvalds1da177e2005-04-16 15:20:36 -0700778 len = left;
779 /* IF: it doesn't fit, use 'mtu' - the data space left */
780 if (len > mtu)
781 len = mtu;
Lucas De Marchi25985ed2011-03-30 22:57:33 -0300782 /* IF: we are not sending up to and including the packet end
Linus Torvalds1da177e2005-04-16 15:20:36 -0700783 then align the next start on an eight byte boundary */
784 if (len < left) {
785 len &= ~7;
786 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700787
Joe Perchescbffccc2014-11-05 14:39:21 -0800788 /* Allocate buffer */
789 frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) +
790 hroom + troom, GFP_ATOMIC);
791 if (!frag) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700792 err = -ENOMEM;
793 goto fail;
794 }
795
796 /*
797 * Set up data on packet
798 */
799
800 ip6_copy_metadata(frag, skb);
Herbert Xua7ae1992011-11-18 02:20:04 +0000801 skb_reserve(frag, hroom);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700802 skb_put(frag, len + hlen + sizeof(struct frag_hdr));
Arnaldo Carvalho de Meloc1d2bbe2007-04-10 20:45:18 -0700803 skb_reset_network_header(frag);
Arnaldo Carvalho de Melobadff6d2007-03-13 13:06:52 -0300804 fh = (struct frag_hdr *)(skb_network_header(frag) + hlen);
Arnaldo Carvalho de Melob0e380b2007-04-10 21:21:55 -0700805 frag->transport_header = (frag->network_header + hlen +
806 sizeof(struct frag_hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700807
808 /*
809 * Charge the memory for the fragment to any owner
810 * it might possess
811 */
812 if (skb->sk)
813 skb_set_owner_w(frag, skb->sk);
814
815 /*
816 * Copy the packet header into the new buffer.
817 */
Arnaldo Carvalho de Melod626f622007-03-27 18:55:52 -0300818 skb_copy_from_linear_data(skb, skb_network_header(frag), hlen);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700819
Florian Westphal79e49502017-03-13 16:24:28 +0100820 fragnexthdr_offset = skb_network_header(frag);
821 fragnexthdr_offset += prevhdr - skb_network_header(skb);
822 *fragnexthdr_offset = NEXTHDR_FRAGMENT;
823
Linus Torvalds1da177e2005-04-16 15:20:36 -0700824 /*
825 * Build fragment header.
826 */
827 fh->nexthdr = nexthdr;
828 fh->reserved = 0;
Martin KaFai Lau286c2342015-05-22 20:55:56 -0700829 fh->identification = frag_id;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700830
831 /*
832 * Copy a block of the IP datagram.
833 */
Himangi Saraogie3f0b862014-07-12 01:57:17 +0530834 BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag),
835 len));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700836 left -= len;
837
838 fh->frag_off = htons(offset);
839 if (left > 0)
840 fh->frag_off |= htons(IP6_MF);
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -0700841 ipv6_hdr(frag)->payload_len = htons(frag->len -
842 sizeof(struct ipv6hdr));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700843
844 ptr += len;
845 offset += len;
846
847 /*
848 * Put this fragment into the sending queue.
849 */
Eric W. Biederman7d8c6e32015-06-12 22:12:04 -0500850 err = output(net, sk, frag);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700851 if (err)
852 goto fail;
Wei Dongdafee492006-08-02 13:41:21 -0700853
Eric Dumazetadf30902009-06-02 05:19:30 +0000854 IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
Denis V. Lunev3bd653c2008-10-08 10:54:51 -0700855 IPSTATS_MIB_FRAGCREATES);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700856 }
Eric Dumazetadf30902009-06-02 05:19:30 +0000857 IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
YOSHIFUJI Hideakia11d2062006-11-04 20:11:37 +0900858 IPSTATS_MIB_FRAGOKS);
Eric Dumazet808db802012-04-24 10:17:59 +0000859 consume_skb(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700860 return err;
861
Florian Westphal485fca62015-05-22 00:44:16 +0200862fail_toobig:
863 if (skb->sk && dst_allfrag(skb_dst(skb)))
864 sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK);
865
Florian Westphal485fca62015-05-22 00:44:16 +0200866 icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
867 err = -EMSGSIZE;
868
Linus Torvalds1da177e2005-04-16 15:20:36 -0700869fail:
Eric Dumazetadf30902009-06-02 05:19:30 +0000870 IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
YOSHIFUJI Hideakia11d2062006-11-04 20:11:37 +0900871 IPSTATS_MIB_FRAGFAILS);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +0900872 kfree_skb(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700873 return err;
874}
875
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000876static inline int ip6_rt_check(const struct rt6key *rt_key,
877 const struct in6_addr *fl_addr,
878 const struct in6_addr *addr_cache)
YOSHIFUJI Hideakicf6b1982006-08-23 17:19:18 -0700879{
Eric Dumazeta02cec22010-09-22 20:43:57 +0000880 return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) &&
Ian Morris63159f22015-03-29 14:00:04 +0100881 (!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache));
YOSHIFUJI Hideakicf6b1982006-08-23 17:19:18 -0700882}
883
Herbert Xu497c6152006-07-30 20:19:33 -0700884static struct dst_entry *ip6_sk_dst_check(struct sock *sk,
885 struct dst_entry *dst,
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000886 const struct flowi6 *fl6)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700887{
Herbert Xu497c6152006-07-30 20:19:33 -0700888 struct ipv6_pinfo *np = inet6_sk(sk);
Eric Dumazeta963a372013-06-26 04:15:07 -0700889 struct rt6_info *rt;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700890
Herbert Xu497c6152006-07-30 20:19:33 -0700891 if (!dst)
892 goto out;
893
Eric Dumazeta963a372013-06-26 04:15:07 -0700894 if (dst->ops->family != AF_INET6) {
895 dst_release(dst);
896 return NULL;
897 }
898
899 rt = (struct rt6_info *)dst;
Herbert Xu497c6152006-07-30 20:19:33 -0700900 /* Yes, checking route validity in not connected
901 * case is not very simple. Take into account,
902 * that we do not support routing by source, TOS,
Ian Morris67ba4152014-08-24 21:53:10 +0100903 * and MSG_DONTROUTE --ANK (980726)
Herbert Xu497c6152006-07-30 20:19:33 -0700904 *
YOSHIFUJI Hideakicf6b1982006-08-23 17:19:18 -0700905 * 1. ip6_rt_check(): If route was host route,
906 * check that cached destination is current.
Herbert Xu497c6152006-07-30 20:19:33 -0700907 * If it is network route, we still may
908 * check its validity using saved pointer
909 * to the last used address: daddr_cache.
910 * We do not want to save whole address now,
911 * (because main consumer of this service
912 * is tcp, which has not this problem),
913 * so that the last trick works only on connected
914 * sockets.
915 * 2. oif also should be the same.
916 */
David S. Miller4c9483b2011-03-12 16:22:43 -0500917 if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) ||
YOSHIFUJI Hideaki8e1ef0a2006-08-29 17:15:09 -0700918#ifdef CONFIG_IPV6_SUBTREES
David S. Miller4c9483b2011-03-12 16:22:43 -0500919 ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) ||
YOSHIFUJI Hideaki8e1ef0a2006-08-29 17:15:09 -0700920#endif
David Ahernca254492015-10-12 11:47:10 -0700921 (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) &&
922 (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) {
Herbert Xu497c6152006-07-30 20:19:33 -0700923 dst_release(dst);
924 dst = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700925 }
926
Herbert Xu497c6152006-07-30 20:19:33 -0700927out:
928 return dst;
929}
930
Eric Dumazet3aef9342015-09-25 07:39:12 -0700931static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
David S. Miller4c9483b2011-03-12 16:22:43 -0500932 struct dst_entry **dst, struct flowi6 *fl6)
Herbert Xu497c6152006-07-30 20:19:33 -0700933{
David S. Miller69cce1d2011-07-17 23:09:49 -0700934#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
935 struct neighbour *n;
David S. Miller97cac082012-07-02 22:43:47 -0700936 struct rt6_info *rt;
David S. Miller69cce1d2011-07-17 23:09:49 -0700937#endif
938 int err;
Paolo Abeni6f21c962016-01-29 12:30:19 +0100939 int flags = 0;
Herbert Xu497c6152006-07-30 20:19:33 -0700940
Markus Stenberge16e8882015-05-05 13:36:59 +0300941 /* The correct way to handle this would be to do
942 * ip6_route_get_saddr, and then ip6_route_output; however,
943 * the route-specific preferred source forces the
944 * ip6_route_output call _before_ ip6_route_get_saddr.
945 *
946 * In source specific routing (no src=any default route),
947 * ip6_route_output will fail given src=any saddr, though, so
948 * that's why we try it again later.
949 */
950 if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) {
David Aherna68886a2018-04-20 15:38:02 -0700951 struct fib6_info *from;
Markus Stenberge16e8882015-05-05 13:36:59 +0300952 struct rt6_info *rt;
953 bool had_dst = *dst != NULL;
954
955 if (!had_dst)
956 *dst = ip6_route_output(net, sk, fl6);
957 rt = (*dst)->error ? NULL : (struct rt6_info *)*dst;
David Aherna68886a2018-04-20 15:38:02 -0700958
959 rcu_read_lock();
960 from = rt ? rcu_dereference(rt->from) : NULL;
961 err = ip6_route_get_saddr(net, from, &fl6->daddr,
Markus Stenberge16e8882015-05-05 13:36:59 +0300962 sk ? inet6_sk(sk)->srcprefs : 0,
963 &fl6->saddr);
David Aherna68886a2018-04-20 15:38:02 -0700964 rcu_read_unlock();
965
Markus Stenberge16e8882015-05-05 13:36:59 +0300966 if (err)
967 goto out_err_release;
968
969 /* If we had an erroneous initial result, pretend it
970 * never existed and let the SA-enabled version take
971 * over.
972 */
973 if (!had_dst && (*dst)->error) {
974 dst_release(*dst);
975 *dst = NULL;
976 }
Paolo Abeni6f21c962016-01-29 12:30:19 +0100977
978 if (fl6->flowi6_oif)
979 flags |= RT6_LOOKUP_F_IFACE;
Markus Stenberge16e8882015-05-05 13:36:59 +0300980 }
981
Ian Morris63159f22015-03-29 14:00:04 +0100982 if (!*dst)
Paolo Abeni6f21c962016-01-29 12:30:19 +0100983 *dst = ip6_route_output_flags(net, sk, fl6, flags);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700984
Ian Morrise5d08d72014-11-23 21:28:43 +0000985 err = (*dst)->error;
986 if (err)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700987 goto out_err_release;
988
Neil Horman95c385b2007-04-25 17:08:10 -0700989#ifdef CONFIG_IPV6_OPTIMISTIC_DAD
Neil Hormane550dfb2008-09-09 13:51:35 -0700990 /*
991 * Here if the dst entry we've looked up
992 * has a neighbour entry that is in the INCOMPLETE
993 * state and the src address from the flow is
994 * marked as OPTIMISTIC, we release the found
995 * dst entry and replace it instead with the
996 * dst entry of the nexthop router
997 */
Eric Dumazetc56bf6f2012-07-06 09:19:05 +0200998 rt = (struct rt6_info *) *dst;
YOSHIFUJI Hideaki / 吉藤英明707be1f2013-01-17 12:53:55 +0000999 rcu_read_lock_bh();
Martin KaFai Lau2647a9b2015-05-22 20:55:58 -07001000 n = __ipv6_neigh_lookup_noref(rt->dst.dev,
1001 rt6_nexthop(rt, &fl6->daddr));
YOSHIFUJI Hideaki / 吉藤英明707be1f2013-01-17 12:53:55 +00001002 err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0;
1003 rcu_read_unlock_bh();
1004
1005 if (err) {
Neil Hormane550dfb2008-09-09 13:51:35 -07001006 struct inet6_ifaddr *ifp;
David S. Miller4c9483b2011-03-12 16:22:43 -05001007 struct flowi6 fl_gw6;
Neil Hormane550dfb2008-09-09 13:51:35 -07001008 int redirect;
Neil Horman95c385b2007-04-25 17:08:10 -07001009
David S. Miller4c9483b2011-03-12 16:22:43 -05001010 ifp = ipv6_get_ifaddr(net, &fl6->saddr,
Neil Hormane550dfb2008-09-09 13:51:35 -07001011 (*dst)->dev, 1);
Neil Horman95c385b2007-04-25 17:08:10 -07001012
Neil Hormane550dfb2008-09-09 13:51:35 -07001013 redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC);
1014 if (ifp)
1015 in6_ifa_put(ifp);
Neil Horman95c385b2007-04-25 17:08:10 -07001016
Neil Hormane550dfb2008-09-09 13:51:35 -07001017 if (redirect) {
1018 /*
1019 * We need to get the dst entry for the
1020 * default router instead
1021 */
1022 dst_release(*dst);
David S. Miller4c9483b2011-03-12 16:22:43 -05001023 memcpy(&fl_gw6, fl6, sizeof(struct flowi6));
1024 memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr));
1025 *dst = ip6_route_output(net, sk, &fl_gw6);
Ian Morrise5d08d72014-11-23 21:28:43 +00001026 err = (*dst)->error;
1027 if (err)
Neil Hormane550dfb2008-09-09 13:51:35 -07001028 goto out_err_release;
Neil Horman95c385b2007-04-25 17:08:10 -07001029 }
Neil Hormane550dfb2008-09-09 13:51:35 -07001030 }
Neil Horman95c385b2007-04-25 17:08:10 -07001031#endif
Jonathan T. Leightonec5e3b02017-02-12 17:26:06 -05001032 if (ipv6_addr_v4mapped(&fl6->saddr) &&
Willem de Bruijn00ea1ce2017-02-18 19:00:45 -05001033 !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) {
1034 err = -EAFNOSUPPORT;
1035 goto out_err_release;
1036 }
Neil Horman95c385b2007-04-25 17:08:10 -07001037
Linus Torvalds1da177e2005-04-16 15:20:36 -07001038 return 0;
1039
1040out_err_release:
1041 dst_release(*dst);
1042 *dst = NULL;
David Ahern8a966fc2016-09-10 12:09:59 -07001043
David Ahern0d240e72016-06-16 16:24:25 -07001044 if (err == -ENETUNREACH)
1045 IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001046 return err;
1047}
Adrian Bunk34a0b3c2005-11-29 16:28:56 -08001048
Herbert Xu497c6152006-07-30 20:19:33 -07001049/**
1050 * ip6_dst_lookup - perform route lookup on flow
1051 * @sk: socket which provides route info
1052 * @dst: pointer to dst_entry * for result
David S. Miller4c9483b2011-03-12 16:22:43 -05001053 * @fl6: flow to lookup
Herbert Xu497c6152006-07-30 20:19:33 -07001054 *
1055 * This function performs a route lookup on the given flow.
1056 *
1057 * It returns zero on success, or a standard errno code on error.
1058 */
Roopa Prabhu343d60a2015-07-30 13:34:53 -07001059int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst,
1060 struct flowi6 *fl6)
Herbert Xu497c6152006-07-30 20:19:33 -07001061{
1062 *dst = NULL;
Roopa Prabhu343d60a2015-07-30 13:34:53 -07001063 return ip6_dst_lookup_tail(net, sk, dst, fl6);
Herbert Xu497c6152006-07-30 20:19:33 -07001064}
Arnaldo Carvalho de Melo3cf3dc62005-12-13 23:23:20 -08001065EXPORT_SYMBOL_GPL(ip6_dst_lookup);
1066
Herbert Xu497c6152006-07-30 20:19:33 -07001067/**
David S. Miller68d0c6d2011-03-01 13:19:07 -08001068 * ip6_dst_lookup_flow - perform route lookup on flow with ipsec
1069 * @sk: socket which provides route info
David S. Miller4c9483b2011-03-12 16:22:43 -05001070 * @fl6: flow to lookup
David S. Miller68d0c6d2011-03-01 13:19:07 -08001071 * @final_dst: final destination address for ipsec lookup
David S. Miller68d0c6d2011-03-01 13:19:07 -08001072 *
1073 * This function performs a route lookup on the given flow.
1074 *
1075 * It returns a valid dst pointer on success, or a pointer encoded
1076 * error code.
1077 */
Eric Dumazet3aef9342015-09-25 07:39:12 -07001078struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6,
Steffen Klassert0e0d44a2013-08-28 08:04:14 +02001079 const struct in6_addr *final_dst)
David S. Miller68d0c6d2011-03-01 13:19:07 -08001080{
1081 struct dst_entry *dst = NULL;
1082 int err;
1083
Roopa Prabhu343d60a2015-07-30 13:34:53 -07001084 err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6);
David S. Miller68d0c6d2011-03-01 13:19:07 -08001085 if (err)
1086 return ERR_PTR(err);
1087 if (final_dst)
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +00001088 fl6->daddr = *final_dst;
David S. Miller2774c132011-03-01 14:59:04 -08001089
Steffen Klassertf92ee612014-09-16 10:08:40 +02001090 return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0);
David S. Miller68d0c6d2011-03-01 13:19:07 -08001091}
1092EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow);
1093
1094/**
1095 * ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow
1096 * @sk: socket which provides the dst cache and route info
David S. Miller4c9483b2011-03-12 16:22:43 -05001097 * @fl6: flow to lookup
David S. Miller68d0c6d2011-03-01 13:19:07 -08001098 * @final_dst: final destination address for ipsec lookup
Alexey Kodanev96818152018-04-03 15:00:08 +03001099 * @connected: whether @sk is connected or not
Herbert Xu497c6152006-07-30 20:19:33 -07001100 *
1101 * This function performs a route lookup on the given flow with the
1102 * possibility of using the cached route in the socket if it is valid.
1103 * It will take the socket dst lock when operating on the dst cache.
1104 * As a result, this function can only be used in process context.
1105 *
Alexey Kodanev96818152018-04-03 15:00:08 +03001106 * In addition, for a connected socket, cache the dst in the socket
1107 * if the current cache is not valid.
1108 *
David S. Miller68d0c6d2011-03-01 13:19:07 -08001109 * It returns a valid dst pointer on success, or a pointer encoded
1110 * error code.
Herbert Xu497c6152006-07-30 20:19:33 -07001111 */
David S. Miller4c9483b2011-03-12 16:22:43 -05001112struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6,
Alexey Kodanev96818152018-04-03 15:00:08 +03001113 const struct in6_addr *final_dst,
1114 bool connected)
Herbert Xu497c6152006-07-30 20:19:33 -07001115{
David S. Miller68d0c6d2011-03-01 13:19:07 -08001116 struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie);
Herbert Xu497c6152006-07-30 20:19:33 -07001117
David S. Miller4c9483b2011-03-12 16:22:43 -05001118 dst = ip6_sk_dst_check(sk, dst, fl6);
Alexey Kodanev96818152018-04-03 15:00:08 +03001119 if (dst)
1120 return dst;
1121
1122 dst = ip6_dst_lookup_flow(sk, fl6, final_dst);
1123 if (connected && !IS_ERR(dst))
1124 ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6);
David S. Miller68d0c6d2011-03-01 13:19:07 -08001125
Jakub Sitnicki00bc0ef2016-06-08 15:13:34 +02001126 return dst;
Herbert Xu497c6152006-07-30 20:19:33 -07001127}
David S. Miller68d0c6d2011-03-01 13:19:07 -08001128EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow);
Herbert Xu497c6152006-07-30 20:19:33 -07001129
Herbert Xu0178b692009-02-05 15:15:50 -08001130static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src,
1131 gfp_t gfp)
1132{
1133 return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
1134}
1135
1136static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src,
1137 gfp_t gfp)
1138{
1139 return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
1140}
1141
Hannes Frederic Sowa75a493e2013-07-02 08:04:05 +02001142static void ip6_append_data_mtu(unsigned int *mtu,
Gao feng0c183372012-05-26 01:30:53 +00001143 int *maxfraglen,
1144 unsigned int fragheaderlen,
1145 struct sk_buff *skb,
Hannes Frederic Sowa75a493e2013-07-02 08:04:05 +02001146 struct rt6_info *rt,
luciene367c2d2014-03-17 12:51:01 +08001147 unsigned int orig_mtu)
Gao feng0c183372012-05-26 01:30:53 +00001148{
1149 if (!(rt->dst.flags & DST_XFRM_TUNNEL)) {
Ian Morris63159f22015-03-29 14:00:04 +01001150 if (!skb) {
Gao feng0c183372012-05-26 01:30:53 +00001151 /* first fragment, reserve header_len */
luciene367c2d2014-03-17 12:51:01 +08001152 *mtu = orig_mtu - rt->dst.header_len;
Gao feng0c183372012-05-26 01:30:53 +00001153
1154 } else {
1155 /*
1156 * this fragment is not first, the headers
1157 * space is regarded as data space.
1158 */
luciene367c2d2014-03-17 12:51:01 +08001159 *mtu = orig_mtu;
Gao feng0c183372012-05-26 01:30:53 +00001160 }
1161 *maxfraglen = ((*mtu - fragheaderlen) & ~7)
1162 + fragheaderlen - sizeof(struct frag_hdr);
1163 }
1164}
1165
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001166static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork,
Wei Wang26879da2016-05-02 21:40:07 -07001167 struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6,
Willem de Bruijn5fdaa882018-07-06 10:12:57 -04001168 struct rt6_info *rt, struct flowi6 *fl6)
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001169{
1170 struct ipv6_pinfo *np = inet6_sk(sk);
1171 unsigned int mtu;
Wei Wang26879da2016-05-02 21:40:07 -07001172 struct ipv6_txoptions *opt = ipc6->opt;
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001173
1174 /*
1175 * setup for corking
1176 */
1177 if (opt) {
1178 if (WARN_ON(v6_cork->opt))
1179 return -EINVAL;
1180
Eric Dumazet864e2a12017-10-21 12:26:23 -07001181 v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation);
Ian Morris63159f22015-03-29 14:00:04 +01001182 if (unlikely(!v6_cork->opt))
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001183 return -ENOBUFS;
1184
Eric Dumazet864e2a12017-10-21 12:26:23 -07001185 v6_cork->opt->tot_len = sizeof(*opt);
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001186 v6_cork->opt->opt_flen = opt->opt_flen;
1187 v6_cork->opt->opt_nflen = opt->opt_nflen;
1188
1189 v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt,
1190 sk->sk_allocation);
1191 if (opt->dst0opt && !v6_cork->opt->dst0opt)
1192 return -ENOBUFS;
1193
1194 v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt,
1195 sk->sk_allocation);
1196 if (opt->dst1opt && !v6_cork->opt->dst1opt)
1197 return -ENOBUFS;
1198
1199 v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt,
1200 sk->sk_allocation);
1201 if (opt->hopopt && !v6_cork->opt->hopopt)
1202 return -ENOBUFS;
1203
1204 v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt,
1205 sk->sk_allocation);
1206 if (opt->srcrt && !v6_cork->opt->srcrt)
1207 return -ENOBUFS;
1208
1209 /* need source address above miyazawa*/
1210 }
1211 dst_hold(&rt->dst);
1212 cork->base.dst = &rt->dst;
1213 cork->fl.u.ip6 = *fl6;
Wei Wang26879da2016-05-02 21:40:07 -07001214 v6_cork->hop_limit = ipc6->hlimit;
1215 v6_cork->tclass = ipc6->tclass;
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001216 if (rt->dst.flags & DST_XFRM_TUNNEL)
1217 mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
Mike Maloney749439b2018-01-10 12:45:10 -05001218 READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst);
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001219 else
1220 mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
David S. Millerc02b3742018-01-17 00:00:25 -05001221 READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst));
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001222 if (np->frag_size < mtu) {
1223 if (np->frag_size)
1224 mtu = np->frag_size;
1225 }
Mike Maloney749439b2018-01-10 12:45:10 -05001226 if (mtu < IPV6_MIN_MTU)
1227 return -EINVAL;
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001228 cork->base.fragsize = mtu;
Willem de Bruijnfbf47812018-07-06 10:12:59 -04001229 cork->base.gso_size = ipc6->gso_size;
Willem de Bruijn678ca422018-07-06 10:12:58 -04001230 cork->base.tx_flags = 0;
1231 sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags);
Willem de Bruijnbec1f6f2018-04-26 13:42:17 -04001232
David Miller0f6c4802017-11-28 15:40:46 -05001233 if (dst_allfrag(xfrm_dst_path(&rt->dst)))
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001234 cork->base.flags |= IPCORK_ALLFRAG;
1235 cork->base.length = 0;
1236
Willem de Bruijn5fdaa882018-07-06 10:12:57 -04001237 cork->base.transmit_time = ipc6->sockc.transmit_time;
Jesus Sanchez-Palenciaa818f752018-07-03 15:42:50 -07001238
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001239 return 0;
1240}
1241
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001242static int __ip6_append_data(struct sock *sk,
1243 struct flowi6 *fl6,
1244 struct sk_buff_head *queue,
1245 struct inet_cork *cork,
1246 struct inet6_cork *v6_cork,
1247 struct page_frag *pfrag,
1248 int getfrag(void *from, char *to, int offset,
1249 int len, int odd, struct sk_buff *skb),
1250 void *from, int length, int transhdrlen,
Willem de Bruijn5fdaa882018-07-06 10:12:57 -04001251 unsigned int flags, struct ipcm6_cookie *ipc6)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001252{
Gao feng0c183372012-05-26 01:30:53 +00001253 struct sk_buff *skb, *skb_prev = NULL;
Paolo Abeni10b8a3d2018-03-23 14:47:30 +01001254 unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu;
Willem de Bruijnb5947e52018-11-30 15:32:39 -05001255 struct ubuf_info *uarg = NULL;
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001256 int exthdrlen = 0;
1257 int dst_exthdrlen = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001258 int hh_len;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001259 int copy;
1260 int err;
1261 int offset = 0;
Willem de Bruijn09c2d252014-08-04 22:11:47 -04001262 u32 tskey = 0;
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001263 struct rt6_info *rt = (struct rt6_info *)cork->dst;
1264 struct ipv6_txoptions *opt = v6_cork->opt;
Vlad Yasevich32dce962015-01-31 10:40:18 -05001265 int csummode = CHECKSUM_NONE;
Hannes Frederic Sowa682b1a92015-10-27 22:40:41 +01001266 unsigned int maxnonfragsize, headersize;
Eric Dumazet1f4c6eb2018-03-31 13:16:26 -07001267 unsigned int wmem_alloc_delta = 0;
Willem de Bruijn52900d22018-11-30 15:32:40 -05001268 bool paged, extra_uref;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001269
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001270 skb = skb_peek_tail(queue);
1271 if (!skb) {
1272 exthdrlen = opt ? opt->opt_flen : 0;
Romain KUNTZ7efdba5b2013-01-16 12:47:40 +00001273 dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001274 }
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001275
Willem de Bruijn15e36f52018-04-26 13:42:19 -04001276 paged = !!cork->gso_size;
Willem de Bruijnbec1f6f2018-04-26 13:42:17 -04001277 mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize;
luciene367c2d2014-03-17 12:51:01 +08001278 orig_mtu = mtu;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001279
Willem de Bruijn678ca422018-07-06 10:12:58 -04001280 if (cork->tx_flags & SKBTX_ANY_SW_TSTAMP &&
1281 sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID)
1282 tskey = sk->sk_tskey++;
1283
Changli Gaod8d1f302010-06-10 23:31:35 -07001284 hh_len = LL_RESERVED_SPACE(rt->dst.dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001285
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -08001286 fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len +
Herbert Xub4ce9272007-11-13 21:33:32 -08001287 (opt ? opt->opt_nflen : 0);
Hannes Frederic Sowa4df98e72013-12-16 12:36:44 +01001288 maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen -
1289 sizeof(struct frag_hdr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001290
Hannes Frederic Sowa682b1a92015-10-27 22:40:41 +01001291 headersize = sizeof(struct ipv6hdr) +
1292 (opt ? opt->opt_flen + opt->opt_nflen : 0) +
1293 (dst_allfrag(&rt->dst) ?
1294 sizeof(struct frag_hdr) : 0) +
1295 rt->rt6i_nfheader_len;
Hannes Frederic Sowa4df98e72013-12-16 12:36:44 +01001296
Paolo Abeni10b8a3d2018-03-23 14:47:30 +01001297 /* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit
1298 * the first fragment
1299 */
1300 if (headersize + transhdrlen > mtu)
1301 goto emsgsize;
1302
Wei Wang26879da2016-05-02 21:40:07 -07001303 if (cork->length + length > mtu - headersize && ipc6->dontfrag &&
Hannes Frederic Sowa682b1a92015-10-27 22:40:41 +01001304 (sk->sk_protocol == IPPROTO_UDP ||
1305 sk->sk_protocol == IPPROTO_RAW)) {
1306 ipv6_local_rxpmtu(sk, fl6, mtu - headersize +
1307 sizeof(struct ipv6hdr));
1308 goto emsgsize;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001309 }
1310
Hannes Frederic Sowa682b1a92015-10-27 22:40:41 +01001311 if (ip6_sk_ignore_df(sk))
1312 maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN;
1313 else
1314 maxnonfragsize = mtu;
1315
1316 if (cork->length + length > maxnonfragsize - headersize) {
1317emsgsize:
Paolo Abeni10b8a3d2018-03-23 14:47:30 +01001318 pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0);
1319 ipv6_local_error(sk, EMSGSIZE, fl6, pmtu);
Hannes Frederic Sowa682b1a92015-10-27 22:40:41 +01001320 return -EMSGSIZE;
1321 }
1322
1323 /* CHECKSUM_PARTIAL only with no extension headers and when
1324 * we are not going to fragment
1325 */
1326 if (transhdrlen && sk->sk_protocol == IPPROTO_UDP &&
1327 headersize == sizeof(struct ipv6hdr) &&
Vlad Yasevich2b89ed62017-01-29 22:52:53 -05001328 length <= mtu - headersize &&
Willem de Bruijnbec1f6f2018-04-26 13:42:17 -04001329 (!(flags & MSG_MORE) || cork->gso_size) &&
Tom Herbertc8cd0982015-12-14 11:19:44 -08001330 rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM))
Hannes Frederic Sowa682b1a92015-10-27 22:40:41 +01001331 csummode = CHECKSUM_PARTIAL;
1332
Willem de Bruijnb5947e52018-11-30 15:32:39 -05001333 if (flags & MSG_ZEROCOPY && length && sock_flag(sk, SOCK_ZEROCOPY)) {
1334 uarg = sock_zerocopy_realloc(sk, length, skb_zcopy(skb));
1335 if (!uarg)
1336 return -ENOBUFS;
Willem de Bruijn52900d22018-11-30 15:32:40 -05001337 extra_uref = true;
Willem de Bruijnb5947e52018-11-30 15:32:39 -05001338 if (rt->dst.dev->features & NETIF_F_SG &&
1339 csummode == CHECKSUM_PARTIAL) {
1340 paged = true;
1341 } else {
1342 uarg->zerocopy = 0;
Willem de Bruijn52900d22018-11-30 15:32:40 -05001343 skb_zcopy_set(skb, uarg, &extra_uref);
Willem de Bruijnb5947e52018-11-30 15:32:39 -05001344 }
1345 }
1346
Linus Torvalds1da177e2005-04-16 15:20:36 -07001347 /*
1348 * Let's try using as much space as possible.
1349 * Use MTU if total length of the message fits into the MTU.
1350 * Otherwise, we need to reserve fragment header and
1351 * fragment alignment (= 8-15 octects, in total).
1352 *
1353 * Note that we may need to "move" the data from the tail of
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001354 * of the buffer to the new fragment when we split
Linus Torvalds1da177e2005-04-16 15:20:36 -07001355 * the message.
1356 *
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001357 * FIXME: It may be fragmented into multiple chunks
Linus Torvalds1da177e2005-04-16 15:20:36 -07001358 * at once if non-fragmentable extension headers
1359 * are too large.
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001360 * --yoshfuji
Linus Torvalds1da177e2005-04-16 15:20:36 -07001361 */
1362
Hannes Frederic Sowa2811eba2013-09-21 06:27:00 +02001363 cork->length += length;
Hannes Frederic Sowa2811eba2013-09-21 06:27:00 +02001364 if (!skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001365 goto alloc_new_skb;
1366
1367 while (length > 0) {
1368 /* Check if the remaining data fits into current packet. */
David S. Millerbdc712b2011-05-06 15:02:07 -07001369 copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001370 if (copy < length)
1371 copy = maxfraglen - skb->len;
1372
1373 if (copy <= 0) {
1374 char *data;
1375 unsigned int datalen;
1376 unsigned int fraglen;
1377 unsigned int fraggap;
1378 unsigned int alloclen;
Willem de Bruijnaba36932018-11-24 14:21:16 -05001379 unsigned int pagedlen;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001380alloc_new_skb:
Linus Torvalds1da177e2005-04-16 15:20:36 -07001381 /* There's no room in the current skb */
Gao feng0c183372012-05-26 01:30:53 +00001382 if (skb)
1383 fraggap = skb->len - maxfraglen;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001384 else
1385 fraggap = 0;
Gao feng0c183372012-05-26 01:30:53 +00001386 /* update mtu and maxfraglen if necessary */
Ian Morris63159f22015-03-29 14:00:04 +01001387 if (!skb || !skb_prev)
Gao feng0c183372012-05-26 01:30:53 +00001388 ip6_append_data_mtu(&mtu, &maxfraglen,
Hannes Frederic Sowa75a493e2013-07-02 08:04:05 +02001389 fragheaderlen, skb, rt,
luciene367c2d2014-03-17 12:51:01 +08001390 orig_mtu);
Gao feng0c183372012-05-26 01:30:53 +00001391
1392 skb_prev = skb;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001393
1394 /*
1395 * If remaining data exceeds the mtu,
1396 * we know we need more fragment(s).
1397 */
1398 datalen = length + fraggap;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001399
Gao feng0c183372012-05-26 01:30:53 +00001400 if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen)
1401 datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len;
Willem de Bruijn15e36f52018-04-26 13:42:19 -04001402 fraglen = datalen + fragheaderlen;
Willem de Bruijnaba36932018-11-24 14:21:16 -05001403 pagedlen = 0;
Willem de Bruijn15e36f52018-04-26 13:42:19 -04001404
Linus Torvalds1da177e2005-04-16 15:20:36 -07001405 if ((flags & MSG_MORE) &&
Changli Gaod8d1f302010-06-10 23:31:35 -07001406 !(rt->dst.dev->features&NETIF_F_SG))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001407 alloclen = mtu;
Willem de Bruijn15e36f52018-04-26 13:42:19 -04001408 else if (!paged)
1409 alloclen = fraglen;
1410 else {
1411 alloclen = min_t(int, fraglen, MAX_HEADER);
1412 pagedlen = fraglen - alloclen;
1413 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001414
Steffen Klassert299b0762011-10-11 01:43:33 +00001415 alloclen += dst_exthdrlen;
1416
Gao feng0c183372012-05-26 01:30:53 +00001417 if (datalen != length + fraggap) {
1418 /*
1419 * this is not the last fragment, the trailer
1420 * space is regarded as data space.
1421 */
1422 datalen += rt->dst.trailer_len;
1423 }
1424
1425 alloclen += rt->dst.trailer_len;
1426 fraglen = datalen + fragheaderlen;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001427
1428 /*
1429 * We just reserve space for fragment header.
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001430 * Note: this may be overallocation if the message
Linus Torvalds1da177e2005-04-16 15:20:36 -07001431 * (without MSG_MORE) fits into the MTU.
1432 */
1433 alloclen += sizeof(struct frag_hdr);
1434
Willem de Bruijn15e36f52018-04-26 13:42:19 -04001435 copy = datalen - transhdrlen - fraggap - pagedlen;
Eric Dumazet232cd352017-05-19 14:17:48 -07001436 if (copy < 0) {
1437 err = -EINVAL;
1438 goto error;
1439 }
Linus Torvalds1da177e2005-04-16 15:20:36 -07001440 if (transhdrlen) {
1441 skb = sock_alloc_send_skb(sk,
1442 alloclen + hh_len,
1443 (flags & MSG_DONTWAIT), &err);
1444 } else {
1445 skb = NULL;
Eric Dumazet1f4c6eb2018-03-31 13:16:26 -07001446 if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <=
Linus Torvalds1da177e2005-04-16 15:20:36 -07001447 2 * sk->sk_sndbuf)
Eric Dumazet1f4c6eb2018-03-31 13:16:26 -07001448 skb = alloc_skb(alloclen + hh_len,
1449 sk->sk_allocation);
Ian Morris63159f22015-03-29 14:00:04 +01001450 if (unlikely(!skb))
Linus Torvalds1da177e2005-04-16 15:20:36 -07001451 err = -ENOBUFS;
1452 }
Ian Morris63159f22015-03-29 14:00:04 +01001453 if (!skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001454 goto error;
1455 /*
1456 * Fill in the control structures
1457 */
Hannes Frederic Sowa9c9c9ad2013-08-26 12:31:23 +02001458 skb->protocol = htons(ETH_P_IPV6);
Vlad Yasevich32dce962015-01-31 10:40:18 -05001459 skb->ip_summed = csummode;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001460 skb->csum = 0;
Gao feng1f858512012-03-19 22:36:10 +00001461 /* reserve for fragmentation and ipsec header */
1462 skb_reserve(skb, hh_len + sizeof(struct frag_hdr) +
1463 dst_exthdrlen);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001464
1465 /*
1466 * Find where to start putting bytes
1467 */
Willem de Bruijn15e36f52018-04-26 13:42:19 -04001468 data = skb_put(skb, fraglen - pagedlen);
Gao feng1f858512012-03-19 22:36:10 +00001469 skb_set_network_header(skb, exthdrlen);
1470 data += fragheaderlen;
Arnaldo Carvalho de Melob0e380b2007-04-10 21:21:55 -07001471 skb->transport_header = (skb->network_header +
1472 fragheaderlen);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001473 if (fraggap) {
1474 skb->csum = skb_copy_and_csum_bits(
1475 skb_prev, maxfraglen,
1476 data + transhdrlen, fraggap, 0);
1477 skb_prev->csum = csum_sub(skb_prev->csum,
1478 skb->csum);
1479 data += fraggap;
Herbert Xue9fa4f72006-08-13 20:12:58 -07001480 pskb_trim_unique(skb_prev, maxfraglen);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001481 }
Eric Dumazet232cd352017-05-19 14:17:48 -07001482 if (copy > 0 &&
1483 getfrag(from, data + transhdrlen, offset,
1484 copy, fraggap, skb) < 0) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001485 err = -EFAULT;
1486 kfree_skb(skb);
1487 goto error;
1488 }
1489
1490 offset += copy;
Willem de Bruijn15e36f52018-04-26 13:42:19 -04001491 length -= copy + transhdrlen;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001492 transhdrlen = 0;
1493 exthdrlen = 0;
Steffen Klassert299b0762011-10-11 01:43:33 +00001494 dst_exthdrlen = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001495
Willem de Bruijn52900d22018-11-30 15:32:40 -05001496 /* Only the initial fragment is time stamped */
1497 skb_shinfo(skb)->tx_flags = cork->tx_flags;
1498 cork->tx_flags = 0;
1499 skb_shinfo(skb)->tskey = tskey;
1500 tskey = 0;
1501 skb_zcopy_set(skb, uarg, &extra_uref);
1502
Julian Anastasov0dec8792017-02-06 23:14:16 +02001503 if ((flags & MSG_CONFIRM) && !skb_prev)
1504 skb_set_dst_pending_confirm(skb, 1);
1505
Linus Torvalds1da177e2005-04-16 15:20:36 -07001506 /*
1507 * Put the packet on the pending queue
1508 */
Eric Dumazet1f4c6eb2018-03-31 13:16:26 -07001509 if (!skb->destructor) {
1510 skb->destructor = sock_wfree;
1511 skb->sk = sk;
1512 wmem_alloc_delta += skb->truesize;
1513 }
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001514 __skb_queue_tail(queue, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001515 continue;
1516 }
1517
1518 if (copy > length)
1519 copy = length;
1520
Willem de Bruijn113f99c2018-05-17 13:13:29 -04001521 if (!(rt->dst.dev->features&NETIF_F_SG) &&
1522 skb_tailroom(skb) >= copy) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001523 unsigned int off;
1524
1525 off = skb->len;
1526 if (getfrag(from, skb_put(skb, copy),
1527 offset, copy, off, skb) < 0) {
1528 __skb_trim(skb, off);
1529 err = -EFAULT;
1530 goto error;
1531 }
Willem de Bruijnb5947e52018-11-30 15:32:39 -05001532 } else if (!uarg || !uarg->zerocopy) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001533 int i = skb_shinfo(skb)->nr_frags;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001534
Eric Dumazet5640f762012-09-23 23:04:42 +00001535 err = -ENOMEM;
1536 if (!sk_page_frag_refill(sk, pfrag))
1537 goto error;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001538
Eric Dumazet5640f762012-09-23 23:04:42 +00001539 if (!skb_can_coalesce(skb, i, pfrag->page,
1540 pfrag->offset)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -07001541 err = -EMSGSIZE;
Eric Dumazet5640f762012-09-23 23:04:42 +00001542 if (i == MAX_SKB_FRAGS)
1543 goto error;
1544
1545 __skb_fill_page_desc(skb, i, pfrag->page,
1546 pfrag->offset, 0);
1547 skb_shinfo(skb)->nr_frags = ++i;
1548 get_page(pfrag->page);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001549 }
Eric Dumazet5640f762012-09-23 23:04:42 +00001550 copy = min_t(int, copy, pfrag->size - pfrag->offset);
Eric Dumazet9e903e02011-10-18 21:00:24 +00001551 if (getfrag(from,
Eric Dumazet5640f762012-09-23 23:04:42 +00001552 page_address(pfrag->page) + pfrag->offset,
1553 offset, copy, skb->len, skb) < 0)
1554 goto error_efault;
1555
1556 pfrag->offset += copy;
1557 skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001558 skb->len += copy;
1559 skb->data_len += copy;
Herbert Xuf945fa72008-01-22 22:39:26 -08001560 skb->truesize += copy;
Eric Dumazet1f4c6eb2018-03-31 13:16:26 -07001561 wmem_alloc_delta += copy;
Willem de Bruijnb5947e52018-11-30 15:32:39 -05001562 } else {
1563 err = skb_zerocopy_iter_dgram(skb, from, copy);
1564 if (err < 0)
1565 goto error;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001566 }
1567 offset += copy;
1568 length -= copy;
1569 }
Eric Dumazet5640f762012-09-23 23:04:42 +00001570
Paolo Abeni9e8445a2018-04-04 14:30:01 +02001571 if (wmem_alloc_delta)
1572 refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001573 return 0;
Eric Dumazet5640f762012-09-23 23:04:42 +00001574
1575error_efault:
1576 err = -EFAULT;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001577error:
Willem de Bruijn97ef7b42018-12-08 06:22:46 -05001578 if (uarg)
1579 sock_zerocopy_put_abort(uarg, extra_uref);
David S. Millerbdc712b2011-05-06 15:02:07 -07001580 cork->length -= length;
Denis V. Lunev3bd653c2008-10-08 10:54:51 -07001581 IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS);
Eric Dumazet1f4c6eb2018-03-31 13:16:26 -07001582 refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001583 return err;
1584}
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001585
1586int ip6_append_data(struct sock *sk,
1587 int getfrag(void *from, char *to, int offset, int len,
1588 int odd, struct sk_buff *skb),
Wei Wang26879da2016-05-02 21:40:07 -07001589 void *from, int length, int transhdrlen,
1590 struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
Willem de Bruijn5fdaa882018-07-06 10:12:57 -04001591 struct rt6_info *rt, unsigned int flags)
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001592{
1593 struct inet_sock *inet = inet_sk(sk);
1594 struct ipv6_pinfo *np = inet6_sk(sk);
1595 int exthdrlen;
1596 int err;
1597
1598 if (flags&MSG_PROBE)
1599 return 0;
1600 if (skb_queue_empty(&sk->sk_write_queue)) {
1601 /*
1602 * setup for corking
1603 */
Wei Wang26879da2016-05-02 21:40:07 -07001604 err = ip6_setup_cork(sk, &inet->cork, &np->cork,
Willem de Bruijn5fdaa882018-07-06 10:12:57 -04001605 ipc6, rt, fl6);
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001606 if (err)
1607 return err;
1608
Wei Wang26879da2016-05-02 21:40:07 -07001609 exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001610 length += exthdrlen;
1611 transhdrlen += exthdrlen;
1612 } else {
1613 fl6 = &inet->cork.fl.u.ip6;
1614 transhdrlen = 0;
1615 }
1616
1617 return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base,
1618 &np->cork, sk_page_frag(sk), getfrag,
Willem de Bruijn5fdaa882018-07-06 10:12:57 -04001619 from, length, transhdrlen, flags, ipc6);
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001620}
Chris Elstona495f832012-04-29 21:48:53 +00001621EXPORT_SYMBOL_GPL(ip6_append_data);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001622
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001623static void ip6_cork_release(struct inet_cork_full *cork,
1624 struct inet6_cork *v6_cork)
Pavel Emelyanovbf138862007-11-05 21:04:31 -08001625{
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001626 if (v6_cork->opt) {
1627 kfree(v6_cork->opt->dst0opt);
1628 kfree(v6_cork->opt->dst1opt);
1629 kfree(v6_cork->opt->hopopt);
1630 kfree(v6_cork->opt->srcrt);
1631 kfree(v6_cork->opt);
1632 v6_cork->opt = NULL;
Herbert Xu0178b692009-02-05 15:15:50 -08001633 }
1634
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001635 if (cork->base.dst) {
1636 dst_release(cork->base.dst);
1637 cork->base.dst = NULL;
1638 cork->base.flags &= ~IPCORK_ALLFRAG;
Pavel Emelyanovbf138862007-11-05 21:04:31 -08001639 }
Vlad Yasevich366e41d2015-01-31 10:40:13 -05001640 memset(&cork->fl, 0, sizeof(cork->fl));
Pavel Emelyanovbf138862007-11-05 21:04:31 -08001641}
1642
Vlad Yasevich64223982015-01-31 10:40:15 -05001643struct sk_buff *__ip6_make_skb(struct sock *sk,
1644 struct sk_buff_head *queue,
1645 struct inet_cork_full *cork,
1646 struct inet6_cork *v6_cork)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001647{
1648 struct sk_buff *skb, *tmp_skb;
1649 struct sk_buff **tail_skb;
1650 struct in6_addr final_dst_buf, *final_dst = &final_dst_buf;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001651 struct ipv6_pinfo *np = inet6_sk(sk);
Denis V. Lunev3bd653c2008-10-08 10:54:51 -07001652 struct net *net = sock_net(sk);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001653 struct ipv6hdr *hdr;
Vlad Yasevich64223982015-01-31 10:40:15 -05001654 struct ipv6_txoptions *opt = v6_cork->opt;
1655 struct rt6_info *rt = (struct rt6_info *)cork->base.dst;
1656 struct flowi6 *fl6 = &cork->fl.u.ip6;
David S. Miller4c9483b2011-03-12 16:22:43 -05001657 unsigned char proto = fl6->flowi6_proto;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001658
Vlad Yasevich64223982015-01-31 10:40:15 -05001659 skb = __skb_dequeue(queue);
Ian Morris63159f22015-03-29 14:00:04 +01001660 if (!skb)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001661 goto out;
1662 tail_skb = &(skb_shinfo(skb)->frag_list);
1663
1664 /* move skb->data to ip header from ext header */
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -07001665 if (skb->data < skb_network_header(skb))
Arnaldo Carvalho de Melobbe735e2007-03-10 22:16:10 -03001666 __skb_pull(skb, skb_network_offset(skb));
Vlad Yasevich64223982015-01-31 10:40:15 -05001667 while ((tmp_skb = __skb_dequeue(queue)) != NULL) {
Arnaldo Carvalho de Melocfe1fc72007-03-16 17:26:39 -03001668 __skb_pull(tmp_skb, skb_network_header_len(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001669 *tail_skb = tmp_skb;
1670 tail_skb = &(tmp_skb->next);
1671 skb->len += tmp_skb->len;
1672 skb->data_len += tmp_skb->len;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001673 skb->truesize += tmp_skb->truesize;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001674 tmp_skb->destructor = NULL;
1675 tmp_skb->sk = NULL;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001676 }
1677
Herbert Xu28a894532008-02-12 18:07:27 -08001678 /* Allow local fragmentation. */
WANG Cong60ff7462014-05-04 16:39:18 -07001679 skb->ignore_df = ip6_sk_ignore_df(sk);
Herbert Xu28a894532008-02-12 18:07:27 -08001680
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +00001681 *final_dst = fl6->daddr;
Arnaldo Carvalho de Melocfe1fc72007-03-16 17:26:39 -03001682 __skb_pull(skb, skb_network_header_len(skb));
Linus Torvalds1da177e2005-04-16 15:20:36 -07001683 if (opt && opt->opt_flen)
1684 ipv6_push_frag_opts(skb, opt, &proto);
1685 if (opt && opt->opt_nflen)
David Lebrun613fa3c2016-11-08 14:59:20 +01001686 ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001687
Arnaldo Carvalho de Meloe2d1bca2007-04-10 20:46:21 -07001688 skb_push(skb, sizeof(struct ipv6hdr));
1689 skb_reset_network_header(skb);
Arnaldo Carvalho de Melo0660e032007-04-25 17:54:47 -07001690 hdr = ipv6_hdr(skb);
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +09001691
Vlad Yasevich64223982015-01-31 10:40:15 -05001692 ip6_flow_hdr(hdr, v6_cork->tclass,
Tom Herbertcb1ce2e2014-07-01 21:33:10 -07001693 ip6_make_flowlabel(net, skb, fl6->flowlabel,
Shaohua Li513674b2017-12-20 12:10:21 -08001694 ip6_autoflowlabel(net, np), fl6));
Vlad Yasevich64223982015-01-31 10:40:15 -05001695 hdr->hop_limit = v6_cork->hop_limit;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001696 hdr->nexthdr = proto;
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +00001697 hdr->saddr = fl6->saddr;
1698 hdr->daddr = *final_dst;
Linus Torvalds1da177e2005-04-16 15:20:36 -07001699
Patrick McHardya2c20642006-01-08 22:37:26 -08001700 skb->priority = sk->sk_priority;
Laszlo Attila Toth4a19ec52008-01-30 19:08:16 -08001701 skb->mark = sk->sk_mark;
Patrick McHardya2c20642006-01-08 22:37:26 -08001702
Jesus Sanchez-Palenciaa818f752018-07-03 15:42:50 -07001703 skb->tstamp = cork->base.transmit_time;
1704
Changli Gaod8d1f302010-06-10 23:31:35 -07001705 skb_dst_set(skb, dst_clone(&rt->dst));
Neil Hormanedf391f2009-04-27 02:45:02 -07001706 IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len);
David L Stevens14878f72007-09-16 16:52:35 -07001707 if (proto == IPPROTO_ICMPV6) {
Eric Dumazetadf30902009-06-02 05:19:30 +00001708 struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
David L Stevens14878f72007-09-16 16:52:35 -07001709
Hannes Frederic Sowa43a43b62014-03-31 20:14:10 +02001710 ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type);
1711 ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
David L Stevens14878f72007-09-16 16:52:35 -07001712 }
1713
Vlad Yasevich64223982015-01-31 10:40:15 -05001714 ip6_cork_release(cork, v6_cork);
1715out:
1716 return skb;
1717}
1718
1719int ip6_send_skb(struct sk_buff *skb)
1720{
1721 struct net *net = sock_net(skb->sk);
1722 struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
1723 int err;
1724
Eric W. Biederman33224b12015-10-07 16:48:46 -05001725 err = ip6_local_out(net, skb->sk, skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001726 if (err) {
1727 if (err > 0)
Eric Dumazet6ce9e7b2009-09-02 18:05:33 -07001728 err = net_xmit_errno(err);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001729 if (err)
Vlad Yasevich64223982015-01-31 10:40:15 -05001730 IP6_INC_STATS(net, rt->rt6i_idev,
1731 IPSTATS_MIB_OUTDISCARDS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001732 }
1733
Linus Torvalds1da177e2005-04-16 15:20:36 -07001734 return err;
Vlad Yasevich64223982015-01-31 10:40:15 -05001735}
1736
1737int ip6_push_pending_frames(struct sock *sk)
1738{
1739 struct sk_buff *skb;
1740
1741 skb = ip6_finish_skb(sk);
1742 if (!skb)
1743 return 0;
1744
1745 return ip6_send_skb(skb);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001746}
Chris Elstona495f832012-04-29 21:48:53 +00001747EXPORT_SYMBOL_GPL(ip6_push_pending_frames);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001748
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001749static void __ip6_flush_pending_frames(struct sock *sk,
Vlad Yasevich64223982015-01-31 10:40:15 -05001750 struct sk_buff_head *queue,
1751 struct inet_cork_full *cork,
1752 struct inet6_cork *v6_cork)
Linus Torvalds1da177e2005-04-16 15:20:36 -07001753{
Linus Torvalds1da177e2005-04-16 15:20:36 -07001754 struct sk_buff *skb;
1755
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001756 while ((skb = __skb_dequeue_tail(queue)) != NULL) {
Eric Dumazetadf30902009-06-02 05:19:30 +00001757 if (skb_dst(skb))
1758 IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)),
YOSHIFUJI Hideakie1f522082007-09-11 11:31:43 +02001759 IPSTATS_MIB_OUTDISCARDS);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001760 kfree_skb(skb);
1761 }
1762
Vlad Yasevich64223982015-01-31 10:40:15 -05001763 ip6_cork_release(cork, v6_cork);
Linus Torvalds1da177e2005-04-16 15:20:36 -07001764}
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001765
1766void ip6_flush_pending_frames(struct sock *sk)
1767{
Vlad Yasevich64223982015-01-31 10:40:15 -05001768 __ip6_flush_pending_frames(sk, &sk->sk_write_queue,
1769 &inet_sk(sk)->cork, &inet6_sk(sk)->cork);
Vlad Yasevich0bbe84a2015-01-31 10:40:14 -05001770}
Chris Elstona495f832012-04-29 21:48:53 +00001771EXPORT_SYMBOL_GPL(ip6_flush_pending_frames);
Vlad Yasevich64223982015-01-31 10:40:15 -05001772
1773struct sk_buff *ip6_make_skb(struct sock *sk,
1774 int getfrag(void *from, char *to, int offset,
1775 int len, int odd, struct sk_buff *skb),
1776 void *from, int length, int transhdrlen,
Wei Wang26879da2016-05-02 21:40:07 -07001777 struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
Vlad Yasevich64223982015-01-31 10:40:15 -05001778 struct rt6_info *rt, unsigned int flags,
Willem de Bruijn5fdaa882018-07-06 10:12:57 -04001779 struct inet_cork_full *cork)
Vlad Yasevich64223982015-01-31 10:40:15 -05001780{
Vlad Yasevich64223982015-01-31 10:40:15 -05001781 struct inet6_cork v6_cork;
1782 struct sk_buff_head queue;
Wei Wang26879da2016-05-02 21:40:07 -07001783 int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
Vlad Yasevich64223982015-01-31 10:40:15 -05001784 int err;
1785
1786 if (flags & MSG_PROBE)
1787 return NULL;
1788
1789 __skb_queue_head_init(&queue);
1790
Willem de Bruijn1cd78842018-04-26 13:42:15 -04001791 cork->base.flags = 0;
1792 cork->base.addr = 0;
1793 cork->base.opt = NULL;
1794 cork->base.dst = NULL;
Vlad Yasevich64223982015-01-31 10:40:15 -05001795 v6_cork.opt = NULL;
Willem de Bruijn5fdaa882018-07-06 10:12:57 -04001796 err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt, fl6);
Eric Dumazet862c03e2018-01-10 03:45:49 -08001797 if (err) {
Willem de Bruijn1cd78842018-04-26 13:42:15 -04001798 ip6_cork_release(cork, &v6_cork);
Vlad Yasevich64223982015-01-31 10:40:15 -05001799 return ERR_PTR(err);
Eric Dumazet862c03e2018-01-10 03:45:49 -08001800 }
Wei Wang26879da2016-05-02 21:40:07 -07001801 if (ipc6->dontfrag < 0)
1802 ipc6->dontfrag = inet6_sk(sk)->dontfrag;
Vlad Yasevich64223982015-01-31 10:40:15 -05001803
Willem de Bruijn1cd78842018-04-26 13:42:15 -04001804 err = __ip6_append_data(sk, fl6, &queue, &cork->base, &v6_cork,
Vlad Yasevich64223982015-01-31 10:40:15 -05001805 &current->task_frag, getfrag, from,
1806 length + exthdrlen, transhdrlen + exthdrlen,
Willem de Bruijn5fdaa882018-07-06 10:12:57 -04001807 flags, ipc6);
Vlad Yasevich64223982015-01-31 10:40:15 -05001808 if (err) {
Willem de Bruijn1cd78842018-04-26 13:42:15 -04001809 __ip6_flush_pending_frames(sk, &queue, cork, &v6_cork);
Vlad Yasevich64223982015-01-31 10:40:15 -05001810 return ERR_PTR(err);
1811 }
1812
Willem de Bruijn1cd78842018-04-26 13:42:15 -04001813 return __ip6_make_skb(sk, &queue, cork, &v6_cork);
Vlad Yasevich64223982015-01-31 10:40:15 -05001814}