xref: /openbmc/linux/net/ipv6/ip6_output.c (revision 0353f28231c79416191326810e7fe656b69c63b7)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds  *	IPv6 output functions
31da177e4SLinus Torvalds  *	Linux INET6 implementation
41da177e4SLinus Torvalds  *
51da177e4SLinus Torvalds  *	Authors:
61da177e4SLinus Torvalds  *	Pedro Roque		<roque@di.fc.ul.pt>
71da177e4SLinus Torvalds  *
81da177e4SLinus Torvalds  *	Based on linux/net/ipv4/ip_output.c
91da177e4SLinus Torvalds  *
101da177e4SLinus Torvalds  *	This program is free software; you can redistribute it and/or
111da177e4SLinus Torvalds  *      modify it under the terms of the GNU General Public License
121da177e4SLinus Torvalds  *      as published by the Free Software Foundation; either version
131da177e4SLinus Torvalds  *      2 of the License, or (at your option) any later version.
141da177e4SLinus Torvalds  *
151da177e4SLinus Torvalds  *	Changes:
161da177e4SLinus Torvalds  *	A.N.Kuznetsov	:	airthmetics in fragmentation.
171da177e4SLinus Torvalds  *				extension headers are implemented.
181da177e4SLinus Torvalds  *				route changes now work.
191da177e4SLinus Torvalds  *				ip6_forward does not confuse sniffers.
201da177e4SLinus Torvalds  *				etc.
211da177e4SLinus Torvalds  *
221da177e4SLinus Torvalds  *      H. von Brand    :       Added missing #include <linux/string.h>
231da177e4SLinus Torvalds  *	Imran Patel	:	frag id should be in NBO
241da177e4SLinus Torvalds  *      Kazunori MIYAZAWA @USAGI
251da177e4SLinus Torvalds  *			:       add ip6_append_data and related functions
261da177e4SLinus Torvalds  *				for datagram xmit
271da177e4SLinus Torvalds  */
281da177e4SLinus Torvalds 
291da177e4SLinus Torvalds #include <linux/errno.h>
30ef76bc23SHerbert Xu #include <linux/kernel.h>
311da177e4SLinus Torvalds #include <linux/string.h>
321da177e4SLinus Torvalds #include <linux/socket.h>
331da177e4SLinus Torvalds #include <linux/net.h>
341da177e4SLinus Torvalds #include <linux/netdevice.h>
351da177e4SLinus Torvalds #include <linux/if_arp.h>
361da177e4SLinus Torvalds #include <linux/in6.h>
371da177e4SLinus Torvalds #include <linux/tcp.h>
381da177e4SLinus Torvalds #include <linux/route.h>
39b59f45d0SHerbert Xu #include <linux/module.h>
405a0e3ad6STejun Heo #include <linux/slab.h>
411da177e4SLinus Torvalds 
4233b48679SDaniel Mack #include <linux/bpf-cgroup.h>
431da177e4SLinus Torvalds #include <linux/netfilter.h>
441da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h>
451da177e4SLinus Torvalds 
461da177e4SLinus Torvalds #include <net/sock.h>
471da177e4SLinus Torvalds #include <net/snmp.h>
481da177e4SLinus Torvalds 
491da177e4SLinus Torvalds #include <net/ipv6.h>
501da177e4SLinus Torvalds #include <net/ndisc.h>
511da177e4SLinus Torvalds #include <net/protocol.h>
521da177e4SLinus Torvalds #include <net/ip6_route.h>
531da177e4SLinus Torvalds #include <net/addrconf.h>
541da177e4SLinus Torvalds #include <net/rawv6.h>
551da177e4SLinus Torvalds #include <net/icmp.h>
561da177e4SLinus Torvalds #include <net/xfrm.h>
571da177e4SLinus Torvalds #include <net/checksum.h>
587bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h>
59ca254490SDavid Ahern #include <net/l3mdev.h>
6014972cbdSRoopa Prabhu #include <net/lwtunnel.h>
611da177e4SLinus Torvalds 
627d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb)
631da177e4SLinus Torvalds {
64adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
651da177e4SLinus Torvalds 	struct net_device *dev = dst->dev;
66f6b72b62SDavid S. Miller 	struct neighbour *neigh;
676fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	struct in6_addr *nexthop;
686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	int ret;
691da177e4SLinus Torvalds 
700660e03fSArnaldo Carvalho de Melo 	if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) {
71adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
721da177e4SLinus Torvalds 
737026b1ddSDavid Miller 		if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) &&
748571ab47SYuval Mintz 		    ((mroute6_is_socket(net, skb) &&
75bd91b8bfSBenjamin Thery 		     !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) ||
760660e03fSArnaldo Carvalho de Melo 		     ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr,
777bc570c8SYOSHIFUJI Hideaki 					 &ipv6_hdr(skb)->saddr))) {
781da177e4SLinus Torvalds 			struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC);
791da177e4SLinus Torvalds 
801da177e4SLinus Torvalds 			/* Do not check for IFF_ALLMULTI; multicast routing
811da177e4SLinus Torvalds 			   is not supported in any case.
821da177e4SLinus Torvalds 			 */
831da177e4SLinus Torvalds 			if (newskb)
84b2e0b385SJan Engelhardt 				NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING,
8529a26a56SEric W. Biederman 					net, sk, newskb, NULL, newskb->dev,
8695603e22SMichel Machado 					dev_loopback_xmit);
871da177e4SLinus Torvalds 
880660e03fSArnaldo Carvalho de Melo 			if (ipv6_hdr(skb)->hop_limit == 0) {
8978126c41SEric W. Biederman 				IP6_INC_STATS(net, idev,
903bd653c8SDenis V. Lunev 					      IPSTATS_MIB_OUTDISCARDS);
911da177e4SLinus Torvalds 				kfree_skb(skb);
921da177e4SLinus Torvalds 				return 0;
931da177e4SLinus Torvalds 			}
941da177e4SLinus Torvalds 		}
951da177e4SLinus Torvalds 
9678126c41SEric W. Biederman 		IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len);
97dd408515SHannes Frederic Sowa 
98dd408515SHannes Frederic Sowa 		if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <=
99dd408515SHannes Frederic Sowa 		    IPV6_ADDR_SCOPE_NODELOCAL &&
100dd408515SHannes Frederic Sowa 		    !(dev->flags & IFF_LOOPBACK)) {
101dd408515SHannes Frederic Sowa 			kfree_skb(skb);
102dd408515SHannes Frederic Sowa 			return 0;
103dd408515SHannes Frederic Sowa 		}
1041da177e4SLinus Torvalds 	}
1051da177e4SLinus Torvalds 
10614972cbdSRoopa Prabhu 	if (lwtunnel_xmit_redirect(dst->lwtstate)) {
10714972cbdSRoopa Prabhu 		int res = lwtunnel_xmit(skb);
10814972cbdSRoopa Prabhu 
10914972cbdSRoopa Prabhu 		if (res < 0 || res == LWTUNNEL_XMIT_DONE)
11014972cbdSRoopa Prabhu 			return res;
11114972cbdSRoopa Prabhu 	}
11214972cbdSRoopa Prabhu 
1136fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
1142647a9b0SMartin KaFai Lau 	nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr);
1156fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop);
1166fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(!neigh))
1176fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false);
1186fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	if (!IS_ERR(neigh)) {
1194ff06203SJulian Anastasov 		sock_confirm_neigh(skb, neigh);
120*0353f282SDavid Ahern 		ret = neigh_output(neigh, skb, false);
1216fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		rcu_read_unlock_bh();
1226fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		return ret;
1236fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	}
1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
12505e3aa09SDavid S. Miller 
12678126c41SEric W. Biederman 	IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES);
1279e508490SJan Engelhardt 	kfree_skb(skb);
1289e508490SJan Engelhardt 	return -EINVAL;
1291da177e4SLinus Torvalds }
1301da177e4SLinus Torvalds 
1310c4b51f0SEric W. Biederman static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1329e508490SJan Engelhardt {
13333b48679SDaniel Mack 	int ret;
13433b48679SDaniel Mack 
13533b48679SDaniel Mack 	ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb);
13633b48679SDaniel Mack 	if (ret) {
13733b48679SDaniel Mack 		kfree_skb(skb);
13833b48679SDaniel Mack 		return ret;
13933b48679SDaniel Mack 	}
14033b48679SDaniel Mack 
14109ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM)
14209ee9dbaSTobias Brunner 	/* Policy lookup after SNAT yielded a new policy */
14309ee9dbaSTobias Brunner 	if (skb_dst(skb)->xfrm) {
14409ee9dbaSTobias Brunner 		IPCB(skb)->flags |= IPSKB_REROUTED;
14509ee9dbaSTobias Brunner 		return dst_output(net, sk, skb);
14609ee9dbaSTobias Brunner 	}
14709ee9dbaSTobias Brunner #endif
14809ee9dbaSTobias Brunner 
1499e508490SJan Engelhardt 	if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) ||
1509037c357SJiri Pirko 	    dst_allfrag(skb_dst(skb)) ||
1519037c357SJiri Pirko 	    (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size))
1527d8c6e39SEric W. Biederman 		return ip6_fragment(net, sk, skb, ip6_finish_output2);
1539e508490SJan Engelhardt 	else
1547d8c6e39SEric W. Biederman 		return ip6_finish_output2(net, sk, skb);
1559e508490SJan Engelhardt }
1569e508490SJan Engelhardt 
157ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1581da177e4SLinus Torvalds {
1599e508490SJan Engelhardt 	struct net_device *dev = skb_dst(skb)->dev;
160adf30907SEric Dumazet 	struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
161be10de0aSEric W. Biederman 
16297a7a37aSChenbo Feng 	skb->protocol = htons(ETH_P_IPV6);
16397a7a37aSChenbo Feng 	skb->dev = dev;
16497a7a37aSChenbo Feng 
165778d80beSYOSHIFUJI Hideaki 	if (unlikely(idev->cnf.disable_ipv6)) {
16619a0644cSEric W. Biederman 		IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
167778d80beSYOSHIFUJI Hideaki 		kfree_skb(skb);
168778d80beSYOSHIFUJI Hideaki 		return 0;
169778d80beSYOSHIFUJI Hideaki 	}
170778d80beSYOSHIFUJI Hideaki 
17129a26a56SEric W. Biederman 	return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
17229a26a56SEric W. Biederman 			    net, sk, skb, NULL, dev,
1739c6eb28aSJan Engelhardt 			    ip6_finish_output,
1749c6eb28aSJan Engelhardt 			    !(IP6CB(skb)->flags & IP6SKB_REROUTED));
1751da177e4SLinus Torvalds }
1761da177e4SLinus Torvalds 
177e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np)
178513674b5SShaohua Li {
179513674b5SShaohua Li 	if (!np->autoflowlabel_set)
180513674b5SShaohua Li 		return ip6_default_np_autolabel(net);
181513674b5SShaohua Li 	else
182513674b5SShaohua Li 		return np->autoflowlabel;
183513674b5SShaohua Li }
184513674b5SShaohua Li 
1851da177e4SLinus Torvalds /*
186b5d43998SShan Wei  * xmit an sk_buff (used by TCP, SCTP and DCCP)
1871c1e9d2bSEric Dumazet  * Note : socket lock is not held for SYNACK packets, but might be modified
1881c1e9d2bSEric Dumazet  * by calls to skb_set_owner_w() and ipv6_local_error(),
1891c1e9d2bSEric Dumazet  * which are using proper atomic operations or spinlocks.
1901da177e4SLinus Torvalds  */
1911c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6,
19292e55f41SPablo Neira 	     __u32 mark, struct ipv6_txoptions *opt, int tclass)
1931da177e4SLinus Torvalds {
1943bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
1951c1e9d2bSEric Dumazet 	const struct ipv6_pinfo *np = inet6_sk(sk);
1964c9483b2SDavid S. Miller 	struct in6_addr *first_hop = &fl6->daddr;
197adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
19866033f47SStefano Brivio 	unsigned int head_room;
1991da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
2004c9483b2SDavid S. Miller 	u8  proto = fl6->flowi6_proto;
2011da177e4SLinus Torvalds 	int seg_len = skb->len;
202e651f03aSGerrit Renker 	int hlimit = -1;
2031da177e4SLinus Torvalds 	u32 mtu;
2041da177e4SLinus Torvalds 
20566033f47SStefano Brivio 	head_room = sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev);
20666033f47SStefano Brivio 	if (opt)
20766033f47SStefano Brivio 		head_room += opt->opt_nflen + opt->opt_flen;
2081da177e4SLinus Torvalds 
20966033f47SStefano Brivio 	if (unlikely(skb_headroom(skb) < head_room)) {
2101da177e4SLinus Torvalds 		struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room);
21163159f29SIan Morris 		if (!skb2) {
212adf30907SEric Dumazet 			IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
213a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_OUTDISCARDS);
2141da177e4SLinus Torvalds 			kfree_skb(skb);
2151da177e4SLinus Torvalds 			return -ENOBUFS;
2161da177e4SLinus Torvalds 		}
217bbd6528dSEric Dumazet 		if (skb->sk)
218bbd6528dSEric Dumazet 			skb_set_owner_w(skb2, skb->sk);
219808db80aSEric Dumazet 		consume_skb(skb);
220a11d206dSYOSHIFUJI Hideaki 		skb = skb2;
2211da177e4SLinus Torvalds 	}
22266033f47SStefano Brivio 
22366033f47SStefano Brivio 	if (opt) {
22466033f47SStefano Brivio 		seg_len += opt->opt_nflen + opt->opt_flen;
22566033f47SStefano Brivio 
2261da177e4SLinus Torvalds 		if (opt->opt_flen)
2271da177e4SLinus Torvalds 			ipv6_push_frag_opts(skb, opt, &proto);
22866033f47SStefano Brivio 
2291da177e4SLinus Torvalds 		if (opt->opt_nflen)
230613fa3caSDavid Lebrun 			ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop,
231613fa3caSDavid Lebrun 					     &fl6->saddr);
2321da177e4SLinus Torvalds 	}
2331da177e4SLinus Torvalds 
234e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
235e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
2360660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
2371da177e4SLinus Torvalds 
2381da177e4SLinus Torvalds 	/*
2391da177e4SLinus Torvalds 	 *	Fill in the IPv6 header
2401da177e4SLinus Torvalds 	 */
241b903d324SEric Dumazet 	if (np)
2421da177e4SLinus Torvalds 		hlimit = np->hop_limit;
2431da177e4SLinus Torvalds 	if (hlimit < 0)
2446b75d090SYOSHIFUJI Hideaki 		hlimit = ip6_dst_hoplimit(dst);
2451da177e4SLinus Torvalds 
246cb1ce2efSTom Herbert 	ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel,
247513674b5SShaohua Li 				ip6_autoflowlabel(net, np), fl6));
24841a1f8eaSYOSHIFUJI Hideaki 
2491da177e4SLinus Torvalds 	hdr->payload_len = htons(seg_len);
2501da177e4SLinus Torvalds 	hdr->nexthdr = proto;
2511da177e4SLinus Torvalds 	hdr->hop_limit = hlimit;
2521da177e4SLinus Torvalds 
2534e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
2544e3fd7a0SAlexey Dobriyan 	hdr->daddr = *first_hop;
2551da177e4SLinus Torvalds 
2569c9c9ad5SHannes Frederic Sowa 	skb->protocol = htons(ETH_P_IPV6);
257a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
25892e55f41SPablo Neira 	skb->mark = mark;
259a2c2064fSPatrick McHardy 
2601da177e4SLinus Torvalds 	mtu = dst_mtu(dst);
26160ff7467SWANG Cong 	if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) {
262adf30907SEric Dumazet 		IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)),
263edf391ffSNeil Horman 			      IPSTATS_MIB_OUT, skb->len);
264a8e3e1a9SDavid Ahern 
265a8e3e1a9SDavid Ahern 		/* if egress device is enslaved to an L3 master device pass the
266a8e3e1a9SDavid Ahern 		 * skb to its handler for processing
267a8e3e1a9SDavid Ahern 		 */
268a8e3e1a9SDavid Ahern 		skb = l3mdev_ip6_out((struct sock *)sk, skb);
269a8e3e1a9SDavid Ahern 		if (unlikely(!skb))
270a8e3e1a9SDavid Ahern 			return 0;
271a8e3e1a9SDavid Ahern 
2721c1e9d2bSEric Dumazet 		/* hooks should never assume socket lock is held.
2731c1e9d2bSEric Dumazet 		 * we promote our socket to non const
2741c1e9d2bSEric Dumazet 		 */
27529a26a56SEric W. Biederman 		return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
2761c1e9d2bSEric Dumazet 			       net, (struct sock *)sk, skb, NULL, dst->dev,
27713206b6bSEric W. Biederman 			       dst_output);
2781da177e4SLinus Torvalds 	}
2791da177e4SLinus Torvalds 
2801da177e4SLinus Torvalds 	skb->dev = dst->dev;
2811c1e9d2bSEric Dumazet 	/* ipv6_local_error() does not require socket lock,
2821c1e9d2bSEric Dumazet 	 * we promote our socket to non const
2831c1e9d2bSEric Dumazet 	 */
2841c1e9d2bSEric Dumazet 	ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu);
2851c1e9d2bSEric Dumazet 
286adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS);
2871da177e4SLinus Torvalds 	kfree_skb(skb);
2881da177e4SLinus Torvalds 	return -EMSGSIZE;
2891da177e4SLinus Torvalds }
2907159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit);
2917159039aSYOSHIFUJI Hideaki 
2921da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel)
2931da177e4SLinus Torvalds {
2941da177e4SLinus Torvalds 	struct ip6_ra_chain *ra;
2951da177e4SLinus Torvalds 	struct sock *last = NULL;
2961da177e4SLinus Torvalds 
2971da177e4SLinus Torvalds 	read_lock(&ip6_ra_lock);
2981da177e4SLinus Torvalds 	for (ra = ip6_ra_chain; ra; ra = ra->next) {
2991da177e4SLinus Torvalds 		struct sock *sk = ra->sk;
3000bd1b59bSAndrew McDonald 		if (sk && ra->sel == sel &&
3010bd1b59bSAndrew McDonald 		    (!sk->sk_bound_dev_if ||
3020bd1b59bSAndrew McDonald 		     sk->sk_bound_dev_if == skb->dev->ifindex)) {
3039036b2feSFrancesco Ruggeri 			struct ipv6_pinfo *np = inet6_sk(sk);
3049036b2feSFrancesco Ruggeri 
3059036b2feSFrancesco Ruggeri 			if (np && np->rtalert_isolate &&
3069036b2feSFrancesco Ruggeri 			    !net_eq(sock_net(sk), dev_net(skb->dev))) {
3079036b2feSFrancesco Ruggeri 				continue;
3089036b2feSFrancesco Ruggeri 			}
3091da177e4SLinus Torvalds 			if (last) {
3101da177e4SLinus Torvalds 				struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
3111da177e4SLinus Torvalds 				if (skb2)
3121da177e4SLinus Torvalds 					rawv6_rcv(last, skb2);
3131da177e4SLinus Torvalds 			}
3141da177e4SLinus Torvalds 			last = sk;
3151da177e4SLinus Torvalds 		}
3161da177e4SLinus Torvalds 	}
3171da177e4SLinus Torvalds 
3181da177e4SLinus Torvalds 	if (last) {
3191da177e4SLinus Torvalds 		rawv6_rcv(last, skb);
3201da177e4SLinus Torvalds 		read_unlock(&ip6_ra_lock);
3211da177e4SLinus Torvalds 		return 1;
3221da177e4SLinus Torvalds 	}
3231da177e4SLinus Torvalds 	read_unlock(&ip6_ra_lock);
3241da177e4SLinus Torvalds 	return 0;
3251da177e4SLinus Torvalds }
3261da177e4SLinus Torvalds 
327e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb)
328e21e0b5fSVille Nuorvala {
3290660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
330e21e0b5fSVille Nuorvala 	u8 nexthdr = hdr->nexthdr;
33175f2811cSJesse Gross 	__be16 frag_off;
332e21e0b5fSVille Nuorvala 	int offset;
333e21e0b5fSVille Nuorvala 
334e21e0b5fSVille Nuorvala 	if (ipv6_ext_hdr(nexthdr)) {
33575f2811cSJesse Gross 		offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off);
336e21e0b5fSVille Nuorvala 		if (offset < 0)
337e21e0b5fSVille Nuorvala 			return 0;
338e21e0b5fSVille Nuorvala 	} else
339e21e0b5fSVille Nuorvala 		offset = sizeof(struct ipv6hdr);
340e21e0b5fSVille Nuorvala 
341e21e0b5fSVille Nuorvala 	if (nexthdr == IPPROTO_ICMPV6) {
342e21e0b5fSVille Nuorvala 		struct icmp6hdr *icmp6;
343e21e0b5fSVille Nuorvala 
344d56f90a7SArnaldo Carvalho de Melo 		if (!pskb_may_pull(skb, (skb_network_header(skb) +
345d56f90a7SArnaldo Carvalho de Melo 					 offset + 1 - skb->data)))
346e21e0b5fSVille Nuorvala 			return 0;
347e21e0b5fSVille Nuorvala 
348d56f90a7SArnaldo Carvalho de Melo 		icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset);
349e21e0b5fSVille Nuorvala 
350e21e0b5fSVille Nuorvala 		switch (icmp6->icmp6_type) {
351e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_SOLICITATION:
352e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_ADVERTISEMENT:
353e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_SOLICITATION:
354e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_ADVERTISEMENT:
355e21e0b5fSVille Nuorvala 		case NDISC_REDIRECT:
356e21e0b5fSVille Nuorvala 			/* For reaction involving unicast neighbor discovery
357e21e0b5fSVille Nuorvala 			 * message destined to the proxied address, pass it to
358e21e0b5fSVille Nuorvala 			 * input function.
359e21e0b5fSVille Nuorvala 			 */
360e21e0b5fSVille Nuorvala 			return 1;
361e21e0b5fSVille Nuorvala 		default:
362e21e0b5fSVille Nuorvala 			break;
363e21e0b5fSVille Nuorvala 		}
364e21e0b5fSVille Nuorvala 	}
365e21e0b5fSVille Nuorvala 
36674553b09SVille Nuorvala 	/*
36774553b09SVille Nuorvala 	 * The proxying router can't forward traffic sent to a link-local
36874553b09SVille Nuorvala 	 * address, so signal the sender and discard the packet. This
36974553b09SVille Nuorvala 	 * behavior is clarified by the MIPv6 specification.
37074553b09SVille Nuorvala 	 */
37174553b09SVille Nuorvala 	if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) {
37274553b09SVille Nuorvala 		dst_link_failure(skb);
37374553b09SVille Nuorvala 		return -1;
37474553b09SVille Nuorvala 	}
37574553b09SVille Nuorvala 
376e21e0b5fSVille Nuorvala 	return 0;
377e21e0b5fSVille Nuorvala }
378e21e0b5fSVille Nuorvala 
3790c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk,
3800c4b51f0SEric W. Biederman 				     struct sk_buff *skb)
3811da177e4SLinus Torvalds {
38271a1c915SJeff Barnhill 	struct dst_entry *dst = skb_dst(skb);
38371a1c915SJeff Barnhill 
38471a1c915SJeff Barnhill 	__IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS);
38571a1c915SJeff Barnhill 	__IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len);
38671a1c915SJeff Barnhill 
387f839a6c9SIdo Schimmel #ifdef CONFIG_NET_SWITCHDEV
388f839a6c9SIdo Schimmel 	if (skb->offload_l3_fwd_mark) {
389f839a6c9SIdo Schimmel 		consume_skb(skb);
390f839a6c9SIdo Schimmel 		return 0;
391f839a6c9SIdo Schimmel 	}
392f839a6c9SIdo Schimmel #endif
393f839a6c9SIdo Schimmel 
3948203e2d8SEric Dumazet 	skb->tstamp = 0;
39513206b6bSEric W. Biederman 	return dst_output(net, sk, skb);
3961da177e4SLinus Torvalds }
3971da177e4SLinus Torvalds 
398fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu)
399fe6cc55fSFlorian Westphal {
400418a3156SFlorian Westphal 	if (skb->len <= mtu)
401fe6cc55fSFlorian Westphal 		return false;
402fe6cc55fSFlorian Westphal 
40360ff7467SWANG Cong 	/* ipv6 conntrack defrag sets max_frag_size + ignore_df */
404fe6cc55fSFlorian Westphal 	if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu)
405fe6cc55fSFlorian Westphal 		return true;
406fe6cc55fSFlorian Westphal 
40760ff7467SWANG Cong 	if (skb->ignore_df)
408418a3156SFlorian Westphal 		return false;
409418a3156SFlorian Westphal 
410779b7931SDaniel Axtens 	if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu))
411fe6cc55fSFlorian Westphal 		return false;
412fe6cc55fSFlorian Westphal 
413fe6cc55fSFlorian Westphal 	return true;
414fe6cc55fSFlorian Westphal }
415fe6cc55fSFlorian Westphal 
4161da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb)
4171da177e4SLinus Torvalds {
418bdb7cc64SStephen Suryaputra 	struct inet6_dev *idev = __in6_dev_get_safely(skb->dev);
419adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
4200660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
4211da177e4SLinus Torvalds 	struct inet6_skb_parm *opt = IP6CB(skb);
422c346dca1SYOSHIFUJI Hideaki 	struct net *net = dev_net(dst->dev);
42314f3ad6fSUlrich Weber 	u32 mtu;
4241da177e4SLinus Torvalds 
42553b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->forwarding == 0)
4261da177e4SLinus Torvalds 		goto error;
4271da177e4SLinus Torvalds 
428090f1166SLi RongQing 	if (skb->pkt_type != PACKET_HOST)
429090f1166SLi RongQing 		goto drop;
430090f1166SLi RongQing 
4319ef2e965SHannes Frederic Sowa 	if (unlikely(skb->sk))
4329ef2e965SHannes Frederic Sowa 		goto drop;
4339ef2e965SHannes Frederic Sowa 
4344497b076SBen Hutchings 	if (skb_warn_if_lro(skb))
4354497b076SBen Hutchings 		goto drop;
4364497b076SBen Hutchings 
4371da177e4SLinus Torvalds 	if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) {
438bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
4391da177e4SLinus Torvalds 		goto drop;
4401da177e4SLinus Torvalds 	}
4411da177e4SLinus Torvalds 
44235fc92a9SHerbert Xu 	skb_forward_csum(skb);
4431da177e4SLinus Torvalds 
4441da177e4SLinus Torvalds 	/*
4451da177e4SLinus Torvalds 	 *	We DO NOT make any processing on
4461da177e4SLinus Torvalds 	 *	RA packets, pushing them to user level AS IS
4471da177e4SLinus Torvalds 	 *	without ane WARRANTY that application will be able
4481da177e4SLinus Torvalds 	 *	to interpret them. The reason is that we
4491da177e4SLinus Torvalds 	 *	cannot make anything clever here.
4501da177e4SLinus Torvalds 	 *
4511da177e4SLinus Torvalds 	 *	We are not end-node, so that if packet contains
4521da177e4SLinus Torvalds 	 *	AH/ESP, we cannot make anything.
4531da177e4SLinus Torvalds 	 *	Defragmentation also would be mistake, RA packets
4541da177e4SLinus Torvalds 	 *	cannot be fragmented, because there is no warranty
4551da177e4SLinus Torvalds 	 *	that different fragments will go along one path. --ANK
4561da177e4SLinus Torvalds 	 */
457ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) {
458ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 		if (ip6_call_ra_chain(skb, ntohs(opt->ra)))
4591da177e4SLinus Torvalds 			return 0;
4601da177e4SLinus Torvalds 	}
4611da177e4SLinus Torvalds 
4621da177e4SLinus Torvalds 	/*
4631da177e4SLinus Torvalds 	 *	check and decrement ttl
4641da177e4SLinus Torvalds 	 */
4651da177e4SLinus Torvalds 	if (hdr->hop_limit <= 1) {
4661da177e4SLinus Torvalds 		/* Force OUTPUT device used as source address */
4671da177e4SLinus Torvalds 		skb->dev = dst->dev;
4683ffe533cSAlexey Dobriyan 		icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0);
469bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS);
4701da177e4SLinus Torvalds 
4711da177e4SLinus Torvalds 		kfree_skb(skb);
4721da177e4SLinus Torvalds 		return -ETIMEDOUT;
4731da177e4SLinus Torvalds 	}
4741da177e4SLinus Torvalds 
475fbea49e1SYOSHIFUJI Hideaki 	/* XXX: idev->cnf.proxy_ndp? */
47653b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->proxy_ndp &&
4778a3edd80SDaniel Lezcano 	    pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) {
47874553b09SVille Nuorvala 		int proxied = ip6_forward_proxy_check(skb);
47974553b09SVille Nuorvala 		if (proxied > 0)
480e21e0b5fSVille Nuorvala 			return ip6_input(skb);
48174553b09SVille Nuorvala 		else if (proxied < 0) {
482bdb7cc64SStephen Suryaputra 			__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
48374553b09SVille Nuorvala 			goto drop;
48474553b09SVille Nuorvala 		}
485e21e0b5fSVille Nuorvala 	}
486e21e0b5fSVille Nuorvala 
4871da177e4SLinus Torvalds 	if (!xfrm6_route_forward(skb)) {
488bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
4891da177e4SLinus Torvalds 		goto drop;
4901da177e4SLinus Torvalds 	}
491adf30907SEric Dumazet 	dst = skb_dst(skb);
4921da177e4SLinus Torvalds 
4931da177e4SLinus Torvalds 	/* IPv6 specs say nothing about it, but it is clear that we cannot
4941da177e4SLinus Torvalds 	   send redirects to source routed frames.
4951e5dc146SMasahide NAKAMURA 	   We don't send redirects to frames decapsulated from IPsec.
4961da177e4SLinus Torvalds 	 */
4972f17becfSStephen Suryaputra 	if (IP6CB(skb)->iif == dst->dev->ifindex &&
4982f17becfSStephen Suryaputra 	    opt->srcrt == 0 && !skb_sec_path(skb)) {
4991da177e4SLinus Torvalds 		struct in6_addr *target = NULL;
500fbfe95a4SDavid S. Miller 		struct inet_peer *peer;
5011da177e4SLinus Torvalds 		struct rt6_info *rt;
5021da177e4SLinus Torvalds 
5031da177e4SLinus Torvalds 		/*
5041da177e4SLinus Torvalds 		 *	incoming and outgoing devices are the same
5051da177e4SLinus Torvalds 		 *	send a redirect.
5061da177e4SLinus Torvalds 		 */
5071da177e4SLinus Torvalds 
5081da177e4SLinus Torvalds 		rt = (struct rt6_info *) dst;
509c45a3dfbSDavid S. Miller 		if (rt->rt6i_flags & RTF_GATEWAY)
510c45a3dfbSDavid S. Miller 			target = &rt->rt6i_gateway;
5111da177e4SLinus Torvalds 		else
5121da177e4SLinus Torvalds 			target = &hdr->daddr;
5131da177e4SLinus Torvalds 
514fd0273d7SMartin KaFai Lau 		peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1);
51592d86829SDavid S. Miller 
5161da177e4SLinus Torvalds 		/* Limit redirects both by destination (here)
5171da177e4SLinus Torvalds 		   and by source (inside ndisc_send_redirect)
5181da177e4SLinus Torvalds 		 */
519fbfe95a4SDavid S. Miller 		if (inet_peer_xrlim_allow(peer, 1*HZ))
5204991969aSDavid S. Miller 			ndisc_send_redirect(skb, target);
5211d861aa4SDavid S. Miller 		if (peer)
5221d861aa4SDavid S. Miller 			inet_putpeer(peer);
5235bb1ab09SDavid L Stevens 	} else {
5245bb1ab09SDavid L Stevens 		int addrtype = ipv6_addr_type(&hdr->saddr);
5255bb1ab09SDavid L Stevens 
5261da177e4SLinus Torvalds 		/* This check is security critical. */
527f81b2e7dSYOSHIFUJI Hideaki 		if (addrtype == IPV6_ADDR_ANY ||
528f81b2e7dSYOSHIFUJI Hideaki 		    addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK))
5291da177e4SLinus Torvalds 			goto error;
5305bb1ab09SDavid L Stevens 		if (addrtype & IPV6_ADDR_LINKLOCAL) {
5315bb1ab09SDavid L Stevens 			icmpv6_send(skb, ICMPV6_DEST_UNREACH,
5323ffe533cSAlexey Dobriyan 				    ICMPV6_NOT_NEIGHBOUR, 0);
5335bb1ab09SDavid L Stevens 			goto error;
5345bb1ab09SDavid L Stevens 		}
5351da177e4SLinus Torvalds 	}
5361da177e4SLinus Torvalds 
5370954cf9cSHannes Frederic Sowa 	mtu = ip6_dst_mtu_forward(dst);
53814f3ad6fSUlrich Weber 	if (mtu < IPV6_MIN_MTU)
53914f3ad6fSUlrich Weber 		mtu = IPV6_MIN_MTU;
54014f3ad6fSUlrich Weber 
541fe6cc55fSFlorian Westphal 	if (ip6_pkt_too_big(skb, mtu)) {
5421da177e4SLinus Torvalds 		/* Again, force OUTPUT device used as source address */
5431da177e4SLinus Torvalds 		skb->dev = dst->dev;
54414f3ad6fSUlrich Weber 		icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
545bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS);
5461d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
54715c77d8bSEric Dumazet 				IPSTATS_MIB_FRAGFAILS);
5481da177e4SLinus Torvalds 		kfree_skb(skb);
5491da177e4SLinus Torvalds 		return -EMSGSIZE;
5501da177e4SLinus Torvalds 	}
5511da177e4SLinus Torvalds 
5521da177e4SLinus Torvalds 	if (skb_cow(skb, dst->dev->hard_header_len)) {
5531d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
55415c77d8bSEric Dumazet 				IPSTATS_MIB_OUTDISCARDS);
5551da177e4SLinus Torvalds 		goto drop;
5561da177e4SLinus Torvalds 	}
5571da177e4SLinus Torvalds 
5580660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
5591da177e4SLinus Torvalds 
5601da177e4SLinus Torvalds 	/* Mangling hops number delayed to point after skb COW */
5611da177e4SLinus Torvalds 
5621da177e4SLinus Torvalds 	hdr->hop_limit--;
5631da177e4SLinus Torvalds 
56429a26a56SEric W. Biederman 	return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD,
56529a26a56SEric W. Biederman 		       net, NULL, skb, skb->dev, dst->dev,
5666e23ae2aSPatrick McHardy 		       ip6_forward_finish);
5671da177e4SLinus Torvalds 
5681da177e4SLinus Torvalds error:
569bdb7cc64SStephen Suryaputra 	__IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS);
5701da177e4SLinus Torvalds drop:
5711da177e4SLinus Torvalds 	kfree_skb(skb);
5721da177e4SLinus Torvalds 	return -EINVAL;
5731da177e4SLinus Torvalds }
5741da177e4SLinus Torvalds 
5751da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from)
5761da177e4SLinus Torvalds {
5771da177e4SLinus Torvalds 	to->pkt_type = from->pkt_type;
5781da177e4SLinus Torvalds 	to->priority = from->priority;
5791da177e4SLinus Torvalds 	to->protocol = from->protocol;
580adf30907SEric Dumazet 	skb_dst_drop(to);
581adf30907SEric Dumazet 	skb_dst_set(to, dst_clone(skb_dst(from)));
5821da177e4SLinus Torvalds 	to->dev = from->dev;
58382e91ffeSThomas Graf 	to->mark = from->mark;
5841da177e4SLinus Torvalds 
5853dd1c9a1SPaolo Abeni 	skb_copy_hash(to, from);
5863dd1c9a1SPaolo Abeni 
5871da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED
5881da177e4SLinus Torvalds 	to->tc_index = from->tc_index;
5891da177e4SLinus Torvalds #endif
590e7ac05f3SYasuyuki Kozakai 	nf_copy(to, from);
591df5042f4SFlorian Westphal 	skb_ext_copy(to, from);
592984bc16cSJames Morris 	skb_copy_secmark(to, from);
5931da177e4SLinus Torvalds }
5941da177e4SLinus Torvalds 
5957d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb,
5967d8c6e39SEric W. Biederman 		 int (*output)(struct net *, struct sock *, struct sk_buff *))
5971da177e4SLinus Torvalds {
5981da177e4SLinus Torvalds 	struct sk_buff *frag;
599adf30907SEric Dumazet 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
600f60e5990Shannes@stressinduktion.org 	struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ?
601f60e5990Shannes@stressinduktion.org 				inet6_sk(skb->sk) : NULL;
6021da177e4SLinus Torvalds 	struct ipv6hdr *tmp_hdr;
6031da177e4SLinus Torvalds 	struct frag_hdr *fh;
604ef0efcd3SJunwei Hu 	unsigned int mtu, hlen, left, len, nexthdr_offset;
605a7ae1992SHerbert Xu 	int hroom, troom;
606286c2349SMartin KaFai Lau 	__be32 frag_id;
6071da177e4SLinus Torvalds 	int ptr, offset = 0, err = 0;
6081da177e4SLinus Torvalds 	u8 *prevhdr, nexthdr = 0;
6091da177e4SLinus Torvalds 
6107dd7eb95SDavid S. Miller 	err = ip6_find_1stfragopt(skb, &prevhdr);
6117dd7eb95SDavid S. Miller 	if (err < 0)
6122423496aSCraig Gallek 		goto fail;
6137dd7eb95SDavid S. Miller 	hlen = err;
6141da177e4SLinus Torvalds 	nexthdr = *prevhdr;
615ef0efcd3SJunwei Hu 	nexthdr_offset = prevhdr - skb_network_header(skb);
6161da177e4SLinus Torvalds 
617628a5c56SJohn Heffner 	mtu = ip6_skb_dst_mtu(skb);
618b881ef76SJohn Heffner 
619b881ef76SJohn Heffner 	/* We must not fragment if the socket is set to force MTU discovery
62014f3ad6fSUlrich Weber 	 * or if the skb it not generated by a local socket.
621b881ef76SJohn Heffner 	 */
622485fca66SFlorian Westphal 	if (unlikely(!skb->ignore_df && skb->len > mtu))
623485fca66SFlorian Westphal 		goto fail_toobig;
624a34a101eSEric Dumazet 
625485fca66SFlorian Westphal 	if (IP6CB(skb)->frag_max_size) {
626485fca66SFlorian Westphal 		if (IP6CB(skb)->frag_max_size > mtu)
627485fca66SFlorian Westphal 			goto fail_toobig;
628485fca66SFlorian Westphal 
629485fca66SFlorian Westphal 		/* don't send fragments larger than what we received */
630485fca66SFlorian Westphal 		mtu = IP6CB(skb)->frag_max_size;
631485fca66SFlorian Westphal 		if (mtu < IPV6_MIN_MTU)
632485fca66SFlorian Westphal 			mtu = IPV6_MIN_MTU;
633b881ef76SJohn Heffner 	}
634b881ef76SJohn Heffner 
635d91675f9SYOSHIFUJI Hideaki 	if (np && np->frag_size < mtu) {
636d91675f9SYOSHIFUJI Hideaki 		if (np->frag_size)
637d91675f9SYOSHIFUJI Hideaki 			mtu = np->frag_size;
638d91675f9SYOSHIFUJI Hideaki 	}
63989bc7848SHannes Frederic Sowa 	if (mtu < hlen + sizeof(struct frag_hdr) + 8)
640b72a2b01SHannes Frederic Sowa 		goto fail_toobig;
6411e0d69a9SHannes Frederic Sowa 	mtu -= hlen + sizeof(struct frag_hdr);
6421da177e4SLinus Torvalds 
643fd0273d7SMartin KaFai Lau 	frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr,
644fd0273d7SMartin KaFai Lau 				    &ipv6_hdr(skb)->saddr);
645286c2349SMartin KaFai Lau 
646405c92f7SHannes Frederic Sowa 	if (skb->ip_summed == CHECKSUM_PARTIAL &&
647405c92f7SHannes Frederic Sowa 	    (err = skb_checksum_help(skb)))
648405c92f7SHannes Frederic Sowa 		goto fail;
649405c92f7SHannes Frederic Sowa 
650ef0efcd3SJunwei Hu 	prevhdr = skb_network_header(skb) + nexthdr_offset;
6511d325d21SFlorian Westphal 	hroom = LL_RESERVED_SPACE(rt->dst.dev);
65221dc3301SDavid S. Miller 	if (skb_has_frag_list(skb)) {
653c72d8cdaSAlexey Dobriyan 		unsigned int first_len = skb_pagelen(skb);
6543d13008eSEric Dumazet 		struct sk_buff *frag2;
6551da177e4SLinus Torvalds 
6561da177e4SLinus Torvalds 		if (first_len - hlen > mtu ||
6571da177e4SLinus Torvalds 		    ((first_len - hlen) & 7) ||
6581d325d21SFlorian Westphal 		    skb_cloned(skb) ||
6591d325d21SFlorian Westphal 		    skb_headroom(skb) < (hroom + sizeof(struct frag_hdr)))
6601da177e4SLinus Torvalds 			goto slow_path;
6611da177e4SLinus Torvalds 
6624d9092bbSDavid S. Miller 		skb_walk_frags(skb, frag) {
6631da177e4SLinus Torvalds 			/* Correct geometry. */
6641da177e4SLinus Torvalds 			if (frag->len > mtu ||
6651da177e4SLinus Torvalds 			    ((frag->len & 7) && frag->next) ||
6661d325d21SFlorian Westphal 			    skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr)))
6673d13008eSEric Dumazet 				goto slow_path_clean;
6681da177e4SLinus Torvalds 
6691da177e4SLinus Torvalds 			/* Partially cloned skb? */
6701da177e4SLinus Torvalds 			if (skb_shared(frag))
6713d13008eSEric Dumazet 				goto slow_path_clean;
6722fdba6b0SHerbert Xu 
6732fdba6b0SHerbert Xu 			BUG_ON(frag->sk);
6742fdba6b0SHerbert Xu 			if (skb->sk) {
6752fdba6b0SHerbert Xu 				frag->sk = skb->sk;
6762fdba6b0SHerbert Xu 				frag->destructor = sock_wfree;
6772fdba6b0SHerbert Xu 			}
6783d13008eSEric Dumazet 			skb->truesize -= frag->truesize;
6791da177e4SLinus Torvalds 		}
6801da177e4SLinus Torvalds 
6811da177e4SLinus Torvalds 		err = 0;
6821da177e4SLinus Torvalds 		offset = 0;
6831da177e4SLinus Torvalds 		/* BUILD HEADER */
6841da177e4SLinus Torvalds 
6859a217a1cSYOSHIFUJI Hideaki 		*prevhdr = NEXTHDR_FRAGMENT;
686d56f90a7SArnaldo Carvalho de Melo 		tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC);
6871da177e4SLinus Torvalds 		if (!tmp_hdr) {
6881d325d21SFlorian Westphal 			err = -ENOMEM;
6891d325d21SFlorian Westphal 			goto fail;
6901da177e4SLinus Torvalds 		}
6911d325d21SFlorian Westphal 		frag = skb_shinfo(skb)->frag_list;
6921d325d21SFlorian Westphal 		skb_frag_list_init(skb);
6931da177e4SLinus Torvalds 
6941da177e4SLinus Torvalds 		__skb_pull(skb, hlen);
695d58ff351SJohannes Berg 		fh = __skb_push(skb, sizeof(struct frag_hdr));
696e2d1bca7SArnaldo Carvalho de Melo 		__skb_push(skb, hlen);
697e2d1bca7SArnaldo Carvalho de Melo 		skb_reset_network_header(skb);
698d56f90a7SArnaldo Carvalho de Melo 		memcpy(skb_network_header(skb), tmp_hdr, hlen);
6991da177e4SLinus Torvalds 
7001da177e4SLinus Torvalds 		fh->nexthdr = nexthdr;
7011da177e4SLinus Torvalds 		fh->reserved = 0;
7021da177e4SLinus Torvalds 		fh->frag_off = htons(IP6_MF);
703286c2349SMartin KaFai Lau 		fh->identification = frag_id;
7041da177e4SLinus Torvalds 
7051da177e4SLinus Torvalds 		first_len = skb_pagelen(skb);
7061da177e4SLinus Torvalds 		skb->data_len = first_len - skb_headlen(skb);
7071da177e4SLinus Torvalds 		skb->len = first_len;
7080660e03fSArnaldo Carvalho de Melo 		ipv6_hdr(skb)->payload_len = htons(first_len -
7090660e03fSArnaldo Carvalho de Melo 						   sizeof(struct ipv6hdr));
7101da177e4SLinus Torvalds 
7111da177e4SLinus Torvalds 		for (;;) {
7121da177e4SLinus Torvalds 			/* Prepare header of the next frame,
7131da177e4SLinus Torvalds 			 * before previous one went down. */
7141da177e4SLinus Torvalds 			if (frag) {
7151da177e4SLinus Torvalds 				frag->ip_summed = CHECKSUM_NONE;
716badff6d0SArnaldo Carvalho de Melo 				skb_reset_transport_header(frag);
717d58ff351SJohannes Berg 				fh = __skb_push(frag, sizeof(struct frag_hdr));
718e2d1bca7SArnaldo Carvalho de Melo 				__skb_push(frag, hlen);
719e2d1bca7SArnaldo Carvalho de Melo 				skb_reset_network_header(frag);
720d56f90a7SArnaldo Carvalho de Melo 				memcpy(skb_network_header(frag), tmp_hdr,
721d56f90a7SArnaldo Carvalho de Melo 				       hlen);
7221da177e4SLinus Torvalds 				offset += skb->len - hlen - sizeof(struct frag_hdr);
7231da177e4SLinus Torvalds 				fh->nexthdr = nexthdr;
7241da177e4SLinus Torvalds 				fh->reserved = 0;
7251da177e4SLinus Torvalds 				fh->frag_off = htons(offset);
72653b24b8fSIan Morris 				if (frag->next)
7271da177e4SLinus Torvalds 					fh->frag_off |= htons(IP6_MF);
7281da177e4SLinus Torvalds 				fh->identification = frag_id;
7290660e03fSArnaldo Carvalho de Melo 				ipv6_hdr(frag)->payload_len =
7300660e03fSArnaldo Carvalho de Melo 						htons(frag->len -
7310660e03fSArnaldo Carvalho de Melo 						      sizeof(struct ipv6hdr));
7321da177e4SLinus Torvalds 				ip6_copy_metadata(frag, skb);
7331da177e4SLinus Torvalds 			}
7341da177e4SLinus Torvalds 
7357d8c6e39SEric W. Biederman 			err = output(net, sk, skb);
736dafee490SWei Dong 			if (!err)
737d8d1f30bSChangli Gao 				IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7383bd653c8SDenis V. Lunev 					      IPSTATS_MIB_FRAGCREATES);
739dafee490SWei Dong 
7401da177e4SLinus Torvalds 			if (err || !frag)
7411da177e4SLinus Torvalds 				break;
7421da177e4SLinus Torvalds 
7431da177e4SLinus Torvalds 			skb = frag;
7441da177e4SLinus Torvalds 			frag = skb->next;
745a8305bffSDavid S. Miller 			skb_mark_not_on_list(skb);
7461da177e4SLinus Torvalds 		}
7471da177e4SLinus Torvalds 
7481da177e4SLinus Torvalds 		kfree(tmp_hdr);
7491da177e4SLinus Torvalds 
7501da177e4SLinus Torvalds 		if (err == 0) {
751d8d1f30bSChangli Gao 			IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7523bd653c8SDenis V. Lunev 				      IPSTATS_MIB_FRAGOKS);
7531da177e4SLinus Torvalds 			return 0;
7541da177e4SLinus Torvalds 		}
7551da177e4SLinus Torvalds 
75646cfd725SFlorian Westphal 		kfree_skb_list(frag);
7571da177e4SLinus Torvalds 
758d8d1f30bSChangli Gao 		IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7593bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGFAILS);
7601da177e4SLinus Torvalds 		return err;
7613d13008eSEric Dumazet 
7623d13008eSEric Dumazet slow_path_clean:
7633d13008eSEric Dumazet 		skb_walk_frags(skb, frag2) {
7643d13008eSEric Dumazet 			if (frag2 == frag)
7653d13008eSEric Dumazet 				break;
7663d13008eSEric Dumazet 			frag2->sk = NULL;
7673d13008eSEric Dumazet 			frag2->destructor = NULL;
7683d13008eSEric Dumazet 			skb->truesize += frag2->truesize;
7693d13008eSEric Dumazet 		}
7701da177e4SLinus Torvalds 	}
7711da177e4SLinus Torvalds 
7721da177e4SLinus Torvalds slow_path:
7731da177e4SLinus Torvalds 	left = skb->len - hlen;		/* Space per frame */
7741da177e4SLinus Torvalds 	ptr = hlen;			/* Where to start from */
7751da177e4SLinus Torvalds 
7761da177e4SLinus Torvalds 	/*
7771da177e4SLinus Torvalds 	 *	Fragment the datagram.
7781da177e4SLinus Torvalds 	 */
7791da177e4SLinus Torvalds 
780a7ae1992SHerbert Xu 	troom = rt->dst.dev->needed_tailroom;
7811da177e4SLinus Torvalds 
7821da177e4SLinus Torvalds 	/*
7831da177e4SLinus Torvalds 	 *	Keep copying data until we run out.
7841da177e4SLinus Torvalds 	 */
7851da177e4SLinus Torvalds 	while (left > 0)	{
78679e49503SFlorian Westphal 		u8 *fragnexthdr_offset;
78779e49503SFlorian Westphal 
7881da177e4SLinus Torvalds 		len = left;
7891da177e4SLinus Torvalds 		/* IF: it doesn't fit, use 'mtu' - the data space left */
7901da177e4SLinus Torvalds 		if (len > mtu)
7911da177e4SLinus Torvalds 			len = mtu;
7921da177e4SLinus Torvalds 		/* IF: we are not sending up to and including the packet end
7931da177e4SLinus Torvalds 		   then align the next start on an eight byte boundary */
7941da177e4SLinus Torvalds 		if (len < left)	{
7951da177e4SLinus Torvalds 			len &= ~7;
7961da177e4SLinus Torvalds 		}
7971da177e4SLinus Torvalds 
798cbffccc9SJoe Perches 		/* Allocate buffer */
799cbffccc9SJoe Perches 		frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) +
800cbffccc9SJoe Perches 				 hroom + troom, GFP_ATOMIC);
801cbffccc9SJoe Perches 		if (!frag) {
8021da177e4SLinus Torvalds 			err = -ENOMEM;
8031da177e4SLinus Torvalds 			goto fail;
8041da177e4SLinus Torvalds 		}
8051da177e4SLinus Torvalds 
8061da177e4SLinus Torvalds 		/*
8071da177e4SLinus Torvalds 		 *	Set up data on packet
8081da177e4SLinus Torvalds 		 */
8091da177e4SLinus Torvalds 
8101da177e4SLinus Torvalds 		ip6_copy_metadata(frag, skb);
811a7ae1992SHerbert Xu 		skb_reserve(frag, hroom);
8121da177e4SLinus Torvalds 		skb_put(frag, len + hlen + sizeof(struct frag_hdr));
813c1d2bbe1SArnaldo Carvalho de Melo 		skb_reset_network_header(frag);
814badff6d0SArnaldo Carvalho de Melo 		fh = (struct frag_hdr *)(skb_network_header(frag) + hlen);
815b0e380b1SArnaldo Carvalho de Melo 		frag->transport_header = (frag->network_header + hlen +
816b0e380b1SArnaldo Carvalho de Melo 					  sizeof(struct frag_hdr));
8171da177e4SLinus Torvalds 
8181da177e4SLinus Torvalds 		/*
8191da177e4SLinus Torvalds 		 *	Charge the memory for the fragment to any owner
8201da177e4SLinus Torvalds 		 *	it might possess
8211da177e4SLinus Torvalds 		 */
8221da177e4SLinus Torvalds 		if (skb->sk)
8231da177e4SLinus Torvalds 			skb_set_owner_w(frag, skb->sk);
8241da177e4SLinus Torvalds 
8251da177e4SLinus Torvalds 		/*
8261da177e4SLinus Torvalds 		 *	Copy the packet header into the new buffer.
8271da177e4SLinus Torvalds 		 */
828d626f62bSArnaldo Carvalho de Melo 		skb_copy_from_linear_data(skb, skb_network_header(frag), hlen);
8291da177e4SLinus Torvalds 
83079e49503SFlorian Westphal 		fragnexthdr_offset = skb_network_header(frag);
83179e49503SFlorian Westphal 		fragnexthdr_offset += prevhdr - skb_network_header(skb);
83279e49503SFlorian Westphal 		*fragnexthdr_offset = NEXTHDR_FRAGMENT;
83379e49503SFlorian Westphal 
8341da177e4SLinus Torvalds 		/*
8351da177e4SLinus Torvalds 		 *	Build fragment header.
8361da177e4SLinus Torvalds 		 */
8371da177e4SLinus Torvalds 		fh->nexthdr = nexthdr;
8381da177e4SLinus Torvalds 		fh->reserved = 0;
8391da177e4SLinus Torvalds 		fh->identification = frag_id;
8401da177e4SLinus Torvalds 
8411da177e4SLinus Torvalds 		/*
8421da177e4SLinus Torvalds 		 *	Copy a block of the IP datagram.
8431da177e4SLinus Torvalds 		 */
844e3f0b86bSHimangi Saraogi 		BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag),
845e3f0b86bSHimangi Saraogi 				     len));
8461da177e4SLinus Torvalds 		left -= len;
8471da177e4SLinus Torvalds 
8481da177e4SLinus Torvalds 		fh->frag_off = htons(offset);
8491da177e4SLinus Torvalds 		if (left > 0)
8501da177e4SLinus Torvalds 			fh->frag_off |= htons(IP6_MF);
8510660e03fSArnaldo Carvalho de Melo 		ipv6_hdr(frag)->payload_len = htons(frag->len -
8520660e03fSArnaldo Carvalho de Melo 						    sizeof(struct ipv6hdr));
8531da177e4SLinus Torvalds 
8541da177e4SLinus Torvalds 		ptr += len;
8551da177e4SLinus Torvalds 		offset += len;
8561da177e4SLinus Torvalds 
8571da177e4SLinus Torvalds 		/*
8581da177e4SLinus Torvalds 		 *	Put this fragment into the sending queue.
8591da177e4SLinus Torvalds 		 */
8607d8c6e39SEric W. Biederman 		err = output(net, sk, frag);
8611da177e4SLinus Torvalds 		if (err)
8621da177e4SLinus Torvalds 			goto fail;
863dafee490SWei Dong 
864adf30907SEric Dumazet 		IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
8653bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGCREATES);
8661da177e4SLinus Torvalds 	}
867adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
868a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGOKS);
869808db80aSEric Dumazet 	consume_skb(skb);
8701da177e4SLinus Torvalds 	return err;
8711da177e4SLinus Torvalds 
872485fca66SFlorian Westphal fail_toobig:
873485fca66SFlorian Westphal 	if (skb->sk && dst_allfrag(skb_dst(skb)))
874485fca66SFlorian Westphal 		sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK);
875485fca66SFlorian Westphal 
876485fca66SFlorian Westphal 	icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
877485fca66SFlorian Westphal 	err = -EMSGSIZE;
878485fca66SFlorian Westphal 
8791da177e4SLinus Torvalds fail:
880adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
881a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGFAILS);
8821da177e4SLinus Torvalds 	kfree_skb(skb);
8831da177e4SLinus Torvalds 	return err;
8841da177e4SLinus Torvalds }
8851da177e4SLinus Torvalds 
886b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key,
887b71d1d42SEric Dumazet 			       const struct in6_addr *fl_addr,
888b71d1d42SEric Dumazet 			       const struct in6_addr *addr_cache)
889cf6b1982SYOSHIFUJI Hideaki {
890a02cec21SEric Dumazet 	return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) &&
89163159f29SIan Morris 		(!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache));
892cf6b1982SYOSHIFUJI Hideaki }
893cf6b1982SYOSHIFUJI Hideaki 
894497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk,
895497c615aSHerbert Xu 					  struct dst_entry *dst,
896b71d1d42SEric Dumazet 					  const struct flowi6 *fl6)
8971da177e4SLinus Torvalds {
8981da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
899a963a37dSEric Dumazet 	struct rt6_info *rt;
9001da177e4SLinus Torvalds 
901497c615aSHerbert Xu 	if (!dst)
902497c615aSHerbert Xu 		goto out;
9031da177e4SLinus Torvalds 
904a963a37dSEric Dumazet 	if (dst->ops->family != AF_INET6) {
905a963a37dSEric Dumazet 		dst_release(dst);
906a963a37dSEric Dumazet 		return NULL;
907a963a37dSEric Dumazet 	}
908a963a37dSEric Dumazet 
909a963a37dSEric Dumazet 	rt = (struct rt6_info *)dst;
9101da177e4SLinus Torvalds 	/* Yes, checking route validity in not connected
911d76e60a5SDavid S. Miller 	 * case is not very simple. Take into account,
912d76e60a5SDavid S. Miller 	 * that we do not support routing by source, TOS,
913d76e60a5SDavid S. Miller 	 * and MSG_DONTROUTE		--ANK (980726)
914d76e60a5SDavid S. Miller 	 *
915cf6b1982SYOSHIFUJI Hideaki 	 * 1. ip6_rt_check(): If route was host route,
916cf6b1982SYOSHIFUJI Hideaki 	 *    check that cached destination is current.
917d76e60a5SDavid S. Miller 	 *    If it is network route, we still may
918d76e60a5SDavid S. Miller 	 *    check its validity using saved pointer
919d76e60a5SDavid S. Miller 	 *    to the last used address: daddr_cache.
920d76e60a5SDavid S. Miller 	 *    We do not want to save whole address now,
921d76e60a5SDavid S. Miller 	 *    (because main consumer of this service
922d76e60a5SDavid S. Miller 	 *    is tcp, which has not this problem),
923d76e60a5SDavid S. Miller 	 *    so that the last trick works only on connected
924d76e60a5SDavid S. Miller 	 *    sockets.
925d76e60a5SDavid S. Miller 	 * 2. oif also should be the same.
9261da177e4SLinus Torvalds 	 */
9274c9483b2SDavid S. Miller 	if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) ||
9288e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES
9294c9483b2SDavid S. Miller 	    ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) ||
9308e1ef0a9SYOSHIFUJI Hideaki #endif
931ca254490SDavid Ahern 	   (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) &&
932ca254490SDavid Ahern 	      (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) {
933497c615aSHerbert Xu 		dst_release(dst);
934497c615aSHerbert Xu 		dst = NULL;
9351da177e4SLinus Torvalds 	}
936497c615aSHerbert Xu 
937497c615aSHerbert Xu out:
938497c615aSHerbert Xu 	return dst;
9391da177e4SLinus Torvalds }
940497c615aSHerbert Xu 
9413aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
9424c9483b2SDavid S. Miller 			       struct dst_entry **dst, struct flowi6 *fl6)
943497c615aSHerbert Xu {
94469cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
94569cce1d1SDavid S. Miller 	struct neighbour *n;
94697cac082SDavid S. Miller 	struct rt6_info *rt;
94769cce1d1SDavid S. Miller #endif
94869cce1d1SDavid S. Miller 	int err;
9496f21c96aSPaolo Abeni 	int flags = 0;
9501da177e4SLinus Torvalds 
951e16e888bSMarkus Stenberg 	/* The correct way to handle this would be to do
952e16e888bSMarkus Stenberg 	 * ip6_route_get_saddr, and then ip6_route_output; however,
953e16e888bSMarkus Stenberg 	 * the route-specific preferred source forces the
954e16e888bSMarkus Stenberg 	 * ip6_route_output call _before_ ip6_route_get_saddr.
955e16e888bSMarkus Stenberg 	 *
956e16e888bSMarkus Stenberg 	 * In source specific routing (no src=any default route),
957e16e888bSMarkus Stenberg 	 * ip6_route_output will fail given src=any saddr, though, so
958e16e888bSMarkus Stenberg 	 * that's why we try it again later.
959e16e888bSMarkus Stenberg 	 */
960e16e888bSMarkus Stenberg 	if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) {
961a68886a6SDavid Ahern 		struct fib6_info *from;
962e16e888bSMarkus Stenberg 		struct rt6_info *rt;
963e16e888bSMarkus Stenberg 		bool had_dst = *dst != NULL;
964e16e888bSMarkus Stenberg 
965e16e888bSMarkus Stenberg 		if (!had_dst)
966e16e888bSMarkus Stenberg 			*dst = ip6_route_output(net, sk, fl6);
967e16e888bSMarkus Stenberg 		rt = (*dst)->error ? NULL : (struct rt6_info *)*dst;
968a68886a6SDavid Ahern 
969a68886a6SDavid Ahern 		rcu_read_lock();
970a68886a6SDavid Ahern 		from = rt ? rcu_dereference(rt->from) : NULL;
971a68886a6SDavid Ahern 		err = ip6_route_get_saddr(net, from, &fl6->daddr,
972e16e888bSMarkus Stenberg 					  sk ? inet6_sk(sk)->srcprefs : 0,
973e16e888bSMarkus Stenberg 					  &fl6->saddr);
974a68886a6SDavid Ahern 		rcu_read_unlock();
975a68886a6SDavid Ahern 
976e16e888bSMarkus Stenberg 		if (err)
977e16e888bSMarkus Stenberg 			goto out_err_release;
978e16e888bSMarkus Stenberg 
979e16e888bSMarkus Stenberg 		/* If we had an erroneous initial result, pretend it
980e16e888bSMarkus Stenberg 		 * never existed and let the SA-enabled version take
981e16e888bSMarkus Stenberg 		 * over.
982e16e888bSMarkus Stenberg 		 */
983e16e888bSMarkus Stenberg 		if (!had_dst && (*dst)->error) {
984e16e888bSMarkus Stenberg 			dst_release(*dst);
985e16e888bSMarkus Stenberg 			*dst = NULL;
986e16e888bSMarkus Stenberg 		}
9876f21c96aSPaolo Abeni 
9886f21c96aSPaolo Abeni 		if (fl6->flowi6_oif)
9896f21c96aSPaolo Abeni 			flags |= RT6_LOOKUP_F_IFACE;
990e16e888bSMarkus Stenberg 	}
991e16e888bSMarkus Stenberg 
99263159f29SIan Morris 	if (!*dst)
9936f21c96aSPaolo Abeni 		*dst = ip6_route_output_flags(net, sk, fl6, flags);
9941da177e4SLinus Torvalds 
995e5d08d71SIan Morris 	err = (*dst)->error;
996e5d08d71SIan Morris 	if (err)
9971da177e4SLinus Torvalds 		goto out_err_release;
9981da177e4SLinus Torvalds 
99995c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
100095c385b4SNeil Horman 	/*
100195c385b4SNeil Horman 	 * Here if the dst entry we've looked up
100295c385b4SNeil Horman 	 * has a neighbour entry that is in the INCOMPLETE
100395c385b4SNeil Horman 	 * state and the src address from the flow is
100495c385b4SNeil Horman 	 * marked as OPTIMISTIC, we release the found
100595c385b4SNeil Horman 	 * dst entry and replace it instead with the
100695c385b4SNeil Horman 	 * dst entry of the nexthop router
100795c385b4SNeil Horman 	 */
1008c56bf6feSEric Dumazet 	rt = (struct rt6_info *) *dst;
1009707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
10102647a9b0SMartin KaFai Lau 	n = __ipv6_neigh_lookup_noref(rt->dst.dev,
10112647a9b0SMartin KaFai Lau 				      rt6_nexthop(rt, &fl6->daddr));
1012707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0;
1013707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
1014707be1ffSYOSHIFUJI Hideaki / 吉藤英明 
1015707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	if (err) {
101695c385b4SNeil Horman 		struct inet6_ifaddr *ifp;
10174c9483b2SDavid S. Miller 		struct flowi6 fl_gw6;
101895c385b4SNeil Horman 		int redirect;
101995c385b4SNeil Horman 
10204c9483b2SDavid S. Miller 		ifp = ipv6_get_ifaddr(net, &fl6->saddr,
10211cab3da6SDaniel Lezcano 				      (*dst)->dev, 1);
102295c385b4SNeil Horman 
102395c385b4SNeil Horman 		redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC);
102495c385b4SNeil Horman 		if (ifp)
102595c385b4SNeil Horman 			in6_ifa_put(ifp);
102695c385b4SNeil Horman 
102795c385b4SNeil Horman 		if (redirect) {
102895c385b4SNeil Horman 			/*
102995c385b4SNeil Horman 			 * We need to get the dst entry for the
103095c385b4SNeil Horman 			 * default router instead
103195c385b4SNeil Horman 			 */
103295c385b4SNeil Horman 			dst_release(*dst);
10334c9483b2SDavid S. Miller 			memcpy(&fl_gw6, fl6, sizeof(struct flowi6));
10344c9483b2SDavid S. Miller 			memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr));
10354c9483b2SDavid S. Miller 			*dst = ip6_route_output(net, sk, &fl_gw6);
1036e5d08d71SIan Morris 			err = (*dst)->error;
1037e5d08d71SIan Morris 			if (err)
103895c385b4SNeil Horman 				goto out_err_release;
103995c385b4SNeil Horman 		}
104095c385b4SNeil Horman 	}
104195c385b4SNeil Horman #endif
1042ec5e3b0aSJonathan T. Leighton 	if (ipv6_addr_v4mapped(&fl6->saddr) &&
104300ea1ceeSWillem de Bruijn 	    !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) {
104400ea1ceeSWillem de Bruijn 		err = -EAFNOSUPPORT;
104500ea1ceeSWillem de Bruijn 		goto out_err_release;
104600ea1ceeSWillem de Bruijn 	}
104795c385b4SNeil Horman 
10481da177e4SLinus Torvalds 	return 0;
10491da177e4SLinus Torvalds 
10501da177e4SLinus Torvalds out_err_release:
10511da177e4SLinus Torvalds 	dst_release(*dst);
10521da177e4SLinus Torvalds 	*dst = NULL;
10538a966fc0SDavid Ahern 
10540d240e78SDavid Ahern 	if (err == -ENETUNREACH)
10550d240e78SDavid Ahern 		IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES);
10561da177e4SLinus Torvalds 	return err;
10571da177e4SLinus Torvalds }
105834a0b3cdSAdrian Bunk 
1059497c615aSHerbert Xu /**
1060497c615aSHerbert Xu  *	ip6_dst_lookup - perform route lookup on flow
1061497c615aSHerbert Xu  *	@sk: socket which provides route info
1062497c615aSHerbert Xu  *	@dst: pointer to dst_entry * for result
10634c9483b2SDavid S. Miller  *	@fl6: flow to lookup
1064497c615aSHerbert Xu  *
1065497c615aSHerbert Xu  *	This function performs a route lookup on the given flow.
1066497c615aSHerbert Xu  *
1067497c615aSHerbert Xu  *	It returns zero on success, or a standard errno code on error.
1068497c615aSHerbert Xu  */
1069343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst,
1070343d60aaSRoopa Prabhu 		   struct flowi6 *fl6)
1071497c615aSHerbert Xu {
1072497c615aSHerbert Xu 	*dst = NULL;
1073343d60aaSRoopa Prabhu 	return ip6_dst_lookup_tail(net, sk, dst, fl6);
1074497c615aSHerbert Xu }
10753cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup);
10763cf3dc6cSArnaldo Carvalho de Melo 
1077497c615aSHerbert Xu /**
107868d0c6d3SDavid S. Miller  *	ip6_dst_lookup_flow - perform route lookup on flow with ipsec
107968d0c6d3SDavid S. Miller  *	@sk: socket which provides route info
10804c9483b2SDavid S. Miller  *	@fl6: flow to lookup
108168d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
108268d0c6d3SDavid S. Miller  *
108368d0c6d3SDavid S. Miller  *	This function performs a route lookup on the given flow.
108468d0c6d3SDavid S. Miller  *
108568d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
108668d0c6d3SDavid S. Miller  *	error code.
108768d0c6d3SDavid S. Miller  */
10883aef934fSEric Dumazet struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6,
10890e0d44abSSteffen Klassert 				      const struct in6_addr *final_dst)
109068d0c6d3SDavid S. Miller {
109168d0c6d3SDavid S. Miller 	struct dst_entry *dst = NULL;
109268d0c6d3SDavid S. Miller 	int err;
109368d0c6d3SDavid S. Miller 
1094343d60aaSRoopa Prabhu 	err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6);
109568d0c6d3SDavid S. Miller 	if (err)
109668d0c6d3SDavid S. Miller 		return ERR_PTR(err);
109768d0c6d3SDavid S. Miller 	if (final_dst)
10984e3fd7a0SAlexey Dobriyan 		fl6->daddr = *final_dst;
10992774c131SDavid S. Miller 
1100f92ee619SSteffen Klassert 	return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0);
110168d0c6d3SDavid S. Miller }
110268d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow);
110368d0c6d3SDavid S. Miller 
110468d0c6d3SDavid S. Miller /**
110568d0c6d3SDavid S. Miller  *	ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow
110668d0c6d3SDavid S. Miller  *	@sk: socket which provides the dst cache and route info
11074c9483b2SDavid S. Miller  *	@fl6: flow to lookup
110868d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
110996818159SAlexey Kodanev  *	@connected: whether @sk is connected or not
1110497c615aSHerbert Xu  *
1111497c615aSHerbert Xu  *	This function performs a route lookup on the given flow with the
1112497c615aSHerbert Xu  *	possibility of using the cached route in the socket if it is valid.
1113497c615aSHerbert Xu  *	It will take the socket dst lock when operating on the dst cache.
1114497c615aSHerbert Xu  *	As a result, this function can only be used in process context.
1115497c615aSHerbert Xu  *
111696818159SAlexey Kodanev  *	In addition, for a connected socket, cache the dst in the socket
111796818159SAlexey Kodanev  *	if the current cache is not valid.
111896818159SAlexey Kodanev  *
111968d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
112068d0c6d3SDavid S. Miller  *	error code.
1121497c615aSHerbert Xu  */
11224c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6,
112396818159SAlexey Kodanev 					 const struct in6_addr *final_dst,
112496818159SAlexey Kodanev 					 bool connected)
1125497c615aSHerbert Xu {
112668d0c6d3SDavid S. Miller 	struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie);
1127497c615aSHerbert Xu 
11284c9483b2SDavid S. Miller 	dst = ip6_sk_dst_check(sk, dst, fl6);
112996818159SAlexey Kodanev 	if (dst)
113096818159SAlexey Kodanev 		return dst;
113196818159SAlexey Kodanev 
113200bc0ef5SJakub Sitnicki 	dst = ip6_dst_lookup_flow(sk, fl6, final_dst);
113396818159SAlexey Kodanev 	if (connected && !IS_ERR(dst))
113496818159SAlexey Kodanev 		ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6);
113568d0c6d3SDavid S. Miller 
113600bc0ef5SJakub Sitnicki 	return dst;
113768d0c6d3SDavid S. Miller }
113868d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow);
1139497c615aSHerbert Xu 
11400178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src,
11410178b695SHerbert Xu 					       gfp_t gfp)
11420178b695SHerbert Xu {
11430178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
11440178b695SHerbert Xu }
11450178b695SHerbert Xu 
11460178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src,
11470178b695SHerbert Xu 						gfp_t gfp)
11480178b695SHerbert Xu {
11490178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
11500178b695SHerbert Xu }
11510178b695SHerbert Xu 
115275a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu,
11530c183379SGao feng 				int *maxfraglen,
11540c183379SGao feng 				unsigned int fragheaderlen,
11550c183379SGao feng 				struct sk_buff *skb,
115675a493e6SHannes Frederic Sowa 				struct rt6_info *rt,
1157e367c2d0Slucien 				unsigned int orig_mtu)
11580c183379SGao feng {
11590c183379SGao feng 	if (!(rt->dst.flags & DST_XFRM_TUNNEL)) {
116063159f29SIan Morris 		if (!skb) {
11610c183379SGao feng 			/* first fragment, reserve header_len */
1162e367c2d0Slucien 			*mtu = orig_mtu - rt->dst.header_len;
11630c183379SGao feng 
11640c183379SGao feng 		} else {
11650c183379SGao feng 			/*
11660c183379SGao feng 			 * this fragment is not first, the headers
11670c183379SGao feng 			 * space is regarded as data space.
11680c183379SGao feng 			 */
1169e367c2d0Slucien 			*mtu = orig_mtu;
11700c183379SGao feng 		}
11710c183379SGao feng 		*maxfraglen = ((*mtu - fragheaderlen) & ~7)
11720c183379SGao feng 			      + fragheaderlen - sizeof(struct frag_hdr);
11730c183379SGao feng 	}
11740c183379SGao feng }
11750c183379SGao feng 
1176366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork,
117726879da5SWei Wang 			  struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6,
11785fdaa88dSWillem de Bruijn 			  struct rt6_info *rt, struct flowi6 *fl6)
1179366e41d9SVlad Yasevich {
1180366e41d9SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
1181366e41d9SVlad Yasevich 	unsigned int mtu;
118226879da5SWei Wang 	struct ipv6_txoptions *opt = ipc6->opt;
1183366e41d9SVlad Yasevich 
1184366e41d9SVlad Yasevich 	/*
1185366e41d9SVlad Yasevich 	 * setup for corking
1186366e41d9SVlad Yasevich 	 */
1187366e41d9SVlad Yasevich 	if (opt) {
1188366e41d9SVlad Yasevich 		if (WARN_ON(v6_cork->opt))
1189366e41d9SVlad Yasevich 			return -EINVAL;
1190366e41d9SVlad Yasevich 
1191864e2a1fSEric Dumazet 		v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation);
119263159f29SIan Morris 		if (unlikely(!v6_cork->opt))
1193366e41d9SVlad Yasevich 			return -ENOBUFS;
1194366e41d9SVlad Yasevich 
1195864e2a1fSEric Dumazet 		v6_cork->opt->tot_len = sizeof(*opt);
1196366e41d9SVlad Yasevich 		v6_cork->opt->opt_flen = opt->opt_flen;
1197366e41d9SVlad Yasevich 		v6_cork->opt->opt_nflen = opt->opt_nflen;
1198366e41d9SVlad Yasevich 
1199366e41d9SVlad Yasevich 		v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt,
1200366e41d9SVlad Yasevich 						    sk->sk_allocation);
1201366e41d9SVlad Yasevich 		if (opt->dst0opt && !v6_cork->opt->dst0opt)
1202366e41d9SVlad Yasevich 			return -ENOBUFS;
1203366e41d9SVlad Yasevich 
1204366e41d9SVlad Yasevich 		v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt,
1205366e41d9SVlad Yasevich 						    sk->sk_allocation);
1206366e41d9SVlad Yasevich 		if (opt->dst1opt && !v6_cork->opt->dst1opt)
1207366e41d9SVlad Yasevich 			return -ENOBUFS;
1208366e41d9SVlad Yasevich 
1209366e41d9SVlad Yasevich 		v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt,
1210366e41d9SVlad Yasevich 						   sk->sk_allocation);
1211366e41d9SVlad Yasevich 		if (opt->hopopt && !v6_cork->opt->hopopt)
1212366e41d9SVlad Yasevich 			return -ENOBUFS;
1213366e41d9SVlad Yasevich 
1214366e41d9SVlad Yasevich 		v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt,
1215366e41d9SVlad Yasevich 						    sk->sk_allocation);
1216366e41d9SVlad Yasevich 		if (opt->srcrt && !v6_cork->opt->srcrt)
1217366e41d9SVlad Yasevich 			return -ENOBUFS;
1218366e41d9SVlad Yasevich 
1219366e41d9SVlad Yasevich 		/* need source address above miyazawa*/
1220366e41d9SVlad Yasevich 	}
1221366e41d9SVlad Yasevich 	dst_hold(&rt->dst);
1222366e41d9SVlad Yasevich 	cork->base.dst = &rt->dst;
1223366e41d9SVlad Yasevich 	cork->fl.u.ip6 = *fl6;
122426879da5SWei Wang 	v6_cork->hop_limit = ipc6->hlimit;
122526879da5SWei Wang 	v6_cork->tclass = ipc6->tclass;
1226366e41d9SVlad Yasevich 	if (rt->dst.flags & DST_XFRM_TUNNEL)
1227366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1228749439bfSMike Maloney 		      READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst);
1229366e41d9SVlad Yasevich 	else
1230366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1231c02b3741SDavid S. Miller 			READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst));
1232366e41d9SVlad Yasevich 	if (np->frag_size < mtu) {
1233366e41d9SVlad Yasevich 		if (np->frag_size)
1234366e41d9SVlad Yasevich 			mtu = np->frag_size;
1235366e41d9SVlad Yasevich 	}
1236749439bfSMike Maloney 	if (mtu < IPV6_MIN_MTU)
1237749439bfSMike Maloney 		return -EINVAL;
1238366e41d9SVlad Yasevich 	cork->base.fragsize = mtu;
1239fbf47813SWillem de Bruijn 	cork->base.gso_size = ipc6->gso_size;
1240678ca42dSWillem de Bruijn 	cork->base.tx_flags = 0;
1241678ca42dSWillem de Bruijn 	sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags);
1242bec1f6f6SWillem de Bruijn 
12430f6c480fSDavid Miller 	if (dst_allfrag(xfrm_dst_path(&rt->dst)))
1244366e41d9SVlad Yasevich 		cork->base.flags |= IPCORK_ALLFRAG;
1245366e41d9SVlad Yasevich 	cork->base.length = 0;
1246366e41d9SVlad Yasevich 
12475fdaa88dSWillem de Bruijn 	cork->base.transmit_time = ipc6->sockc.transmit_time;
1248a818f75eSJesus Sanchez-Palencia 
1249366e41d9SVlad Yasevich 	return 0;
1250366e41d9SVlad Yasevich }
1251366e41d9SVlad Yasevich 
12520bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk,
12530bbe84a6SVlad Yasevich 			     struct flowi6 *fl6,
12540bbe84a6SVlad Yasevich 			     struct sk_buff_head *queue,
12550bbe84a6SVlad Yasevich 			     struct inet_cork *cork,
12560bbe84a6SVlad Yasevich 			     struct inet6_cork *v6_cork,
12570bbe84a6SVlad Yasevich 			     struct page_frag *pfrag,
12580bbe84a6SVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
12590bbe84a6SVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
12601da177e4SLinus Torvalds 			     void *from, int length, int transhdrlen,
12615fdaa88dSWillem de Bruijn 			     unsigned int flags, struct ipcm6_cookie *ipc6)
12621da177e4SLinus Torvalds {
12630c183379SGao feng 	struct sk_buff *skb, *skb_prev = NULL;
126410b8a3deSPaolo Abeni 	unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu;
1265b5947e5dSWillem de Bruijn 	struct ubuf_info *uarg = NULL;
12660bbe84a6SVlad Yasevich 	int exthdrlen = 0;
12670bbe84a6SVlad Yasevich 	int dst_exthdrlen = 0;
12681da177e4SLinus Torvalds 	int hh_len;
12691da177e4SLinus Torvalds 	int copy;
12701da177e4SLinus Torvalds 	int err;
12711da177e4SLinus Torvalds 	int offset = 0;
127209c2d251SWillem de Bruijn 	u32 tskey = 0;
12730bbe84a6SVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->dst;
12740bbe84a6SVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
127532dce968SVlad Yasevich 	int csummode = CHECKSUM_NONE;
1276682b1a9dSHannes Frederic Sowa 	unsigned int maxnonfragsize, headersize;
12771f4c6eb2SEric Dumazet 	unsigned int wmem_alloc_delta = 0;
127852900d22SWillem de Bruijn 	bool paged, extra_uref;
12791da177e4SLinus Torvalds 
12800bbe84a6SVlad Yasevich 	skb = skb_peek_tail(queue);
12810bbe84a6SVlad Yasevich 	if (!skb) {
12820bbe84a6SVlad Yasevich 		exthdrlen = opt ? opt->opt_flen : 0;
12837efdba5bSRomain KUNTZ 		dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len;
12841da177e4SLinus Torvalds 	}
12850bbe84a6SVlad Yasevich 
128615e36f5bSWillem de Bruijn 	paged = !!cork->gso_size;
1287bec1f6f6SWillem de Bruijn 	mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize;
1288e367c2d0Slucien 	orig_mtu = mtu;
12891da177e4SLinus Torvalds 
1290678ca42dSWillem de Bruijn 	if (cork->tx_flags & SKBTX_ANY_SW_TSTAMP &&
1291678ca42dSWillem de Bruijn 	    sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID)
1292678ca42dSWillem de Bruijn 		tskey = sk->sk_tskey++;
1293678ca42dSWillem de Bruijn 
1294d8d1f30bSChangli Gao 	hh_len = LL_RESERVED_SPACE(rt->dst.dev);
12951da177e4SLinus Torvalds 
1296a1b05140SMasahide NAKAMURA 	fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len +
1297b4ce9277SHerbert Xu 			(opt ? opt->opt_nflen : 0);
12984df98e76SHannes Frederic Sowa 	maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen -
12994df98e76SHannes Frederic Sowa 		     sizeof(struct frag_hdr);
13001da177e4SLinus Torvalds 
13014df98e76SHannes Frederic Sowa 	headersize = sizeof(struct ipv6hdr) +
13023a1cebe7SHannes Frederic Sowa 		     (opt ? opt->opt_flen + opt->opt_nflen : 0) +
13034df98e76SHannes Frederic Sowa 		     (dst_allfrag(&rt->dst) ?
13044df98e76SHannes Frederic Sowa 		      sizeof(struct frag_hdr) : 0) +
13054df98e76SHannes Frederic Sowa 		     rt->rt6i_nfheader_len;
13064df98e76SHannes Frederic Sowa 
130710b8a3deSPaolo Abeni 	/* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit
130810b8a3deSPaolo Abeni 	 * the first fragment
130910b8a3deSPaolo Abeni 	 */
131010b8a3deSPaolo Abeni 	if (headersize + transhdrlen > mtu)
131110b8a3deSPaolo Abeni 		goto emsgsize;
131210b8a3deSPaolo Abeni 
131326879da5SWei Wang 	if (cork->length + length > mtu - headersize && ipc6->dontfrag &&
13144df98e76SHannes Frederic Sowa 	    (sk->sk_protocol == IPPROTO_UDP ||
13154df98e76SHannes Frederic Sowa 	     sk->sk_protocol == IPPROTO_RAW)) {
13164df98e76SHannes Frederic Sowa 		ipv6_local_rxpmtu(sk, fl6, mtu - headersize +
13174df98e76SHannes Frederic Sowa 				sizeof(struct ipv6hdr));
13184df98e76SHannes Frederic Sowa 		goto emsgsize;
13194df98e76SHannes Frederic Sowa 	}
13204df98e76SHannes Frederic Sowa 
1321682b1a9dSHannes Frederic Sowa 	if (ip6_sk_ignore_df(sk))
1322682b1a9dSHannes Frederic Sowa 		maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN;
1323682b1a9dSHannes Frederic Sowa 	else
1324682b1a9dSHannes Frederic Sowa 		maxnonfragsize = mtu;
1325682b1a9dSHannes Frederic Sowa 
13264df98e76SHannes Frederic Sowa 	if (cork->length + length > maxnonfragsize - headersize) {
13274df98e76SHannes Frederic Sowa emsgsize:
132810b8a3deSPaolo Abeni 		pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0);
132910b8a3deSPaolo Abeni 		ipv6_local_error(sk, EMSGSIZE, fl6, pmtu);
13301da177e4SLinus Torvalds 		return -EMSGSIZE;
13311da177e4SLinus Torvalds 	}
1332682b1a9dSHannes Frederic Sowa 
1333682b1a9dSHannes Frederic Sowa 	/* CHECKSUM_PARTIAL only with no extension headers and when
1334682b1a9dSHannes Frederic Sowa 	 * we are not going to fragment
1335682b1a9dSHannes Frederic Sowa 	 */
1336682b1a9dSHannes Frederic Sowa 	if (transhdrlen && sk->sk_protocol == IPPROTO_UDP &&
1337682b1a9dSHannes Frederic Sowa 	    headersize == sizeof(struct ipv6hdr) &&
13382b89ed65SVlad Yasevich 	    length <= mtu - headersize &&
1339bec1f6f6SWillem de Bruijn 	    (!(flags & MSG_MORE) || cork->gso_size) &&
1340c8cd0989STom Herbert 	    rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM))
1341682b1a9dSHannes Frederic Sowa 		csummode = CHECKSUM_PARTIAL;
13421da177e4SLinus Torvalds 
1343b5947e5dSWillem de Bruijn 	if (flags & MSG_ZEROCOPY && length && sock_flag(sk, SOCK_ZEROCOPY)) {
1344b5947e5dSWillem de Bruijn 		uarg = sock_zerocopy_realloc(sk, length, skb_zcopy(skb));
1345b5947e5dSWillem de Bruijn 		if (!uarg)
1346b5947e5dSWillem de Bruijn 			return -ENOBUFS;
134752900d22SWillem de Bruijn 		extra_uref = true;
1348b5947e5dSWillem de Bruijn 		if (rt->dst.dev->features & NETIF_F_SG &&
1349b5947e5dSWillem de Bruijn 		    csummode == CHECKSUM_PARTIAL) {
1350b5947e5dSWillem de Bruijn 			paged = true;
1351b5947e5dSWillem de Bruijn 		} else {
1352b5947e5dSWillem de Bruijn 			uarg->zerocopy = 0;
135352900d22SWillem de Bruijn 			skb_zcopy_set(skb, uarg, &extra_uref);
1354b5947e5dSWillem de Bruijn 		}
1355b5947e5dSWillem de Bruijn 	}
1356b5947e5dSWillem de Bruijn 
13571da177e4SLinus Torvalds 	/*
13581da177e4SLinus Torvalds 	 * Let's try using as much space as possible.
13591da177e4SLinus Torvalds 	 * Use MTU if total length of the message fits into the MTU.
13601da177e4SLinus Torvalds 	 * Otherwise, we need to reserve fragment header and
13611da177e4SLinus Torvalds 	 * fragment alignment (= 8-15 octects, in total).
13621da177e4SLinus Torvalds 	 *
13631da177e4SLinus Torvalds 	 * Note that we may need to "move" the data from the tail of
13641da177e4SLinus Torvalds 	 * of the buffer to the new fragment when we split
13651da177e4SLinus Torvalds 	 * the message.
13661da177e4SLinus Torvalds 	 *
13671da177e4SLinus Torvalds 	 * FIXME: It may be fragmented into multiple chunks
13681da177e4SLinus Torvalds 	 *        at once if non-fragmentable extension headers
13691da177e4SLinus Torvalds 	 *        are too large.
13701da177e4SLinus Torvalds 	 * --yoshfuji
13711da177e4SLinus Torvalds 	 */
13721da177e4SLinus Torvalds 
13732811ebacSHannes Frederic Sowa 	cork->length += length;
13742811ebacSHannes Frederic Sowa 	if (!skb)
13751da177e4SLinus Torvalds 		goto alloc_new_skb;
13761da177e4SLinus Torvalds 
13771da177e4SLinus Torvalds 	while (length > 0) {
13781da177e4SLinus Torvalds 		/* Check if the remaining data fits into current packet. */
1379bdc712b4SDavid S. Miller 		copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len;
13801da177e4SLinus Torvalds 		if (copy < length)
13811da177e4SLinus Torvalds 			copy = maxfraglen - skb->len;
13821da177e4SLinus Torvalds 
13831da177e4SLinus Torvalds 		if (copy <= 0) {
13841da177e4SLinus Torvalds 			char *data;
13851da177e4SLinus Torvalds 			unsigned int datalen;
13861da177e4SLinus Torvalds 			unsigned int fraglen;
13871da177e4SLinus Torvalds 			unsigned int fraggap;
13881da177e4SLinus Torvalds 			unsigned int alloclen;
1389aba36930SWillem de Bruijn 			unsigned int pagedlen;
13901da177e4SLinus Torvalds alloc_new_skb:
13911da177e4SLinus Torvalds 			/* There's no room in the current skb */
13920c183379SGao feng 			if (skb)
13930c183379SGao feng 				fraggap = skb->len - maxfraglen;
13941da177e4SLinus Torvalds 			else
13951da177e4SLinus Torvalds 				fraggap = 0;
13960c183379SGao feng 			/* update mtu and maxfraglen if necessary */
139763159f29SIan Morris 			if (!skb || !skb_prev)
13980c183379SGao feng 				ip6_append_data_mtu(&mtu, &maxfraglen,
139975a493e6SHannes Frederic Sowa 						    fragheaderlen, skb, rt,
1400e367c2d0Slucien 						    orig_mtu);
14010c183379SGao feng 
14020c183379SGao feng 			skb_prev = skb;
14031da177e4SLinus Torvalds 
14041da177e4SLinus Torvalds 			/*
14051da177e4SLinus Torvalds 			 * If remaining data exceeds the mtu,
14061da177e4SLinus Torvalds 			 * we know we need more fragment(s).
14071da177e4SLinus Torvalds 			 */
14081da177e4SLinus Torvalds 			datalen = length + fraggap;
14091da177e4SLinus Torvalds 
14100c183379SGao feng 			if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen)
14110c183379SGao feng 				datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len;
141215e36f5bSWillem de Bruijn 			fraglen = datalen + fragheaderlen;
1413aba36930SWillem de Bruijn 			pagedlen = 0;
141415e36f5bSWillem de Bruijn 
14151da177e4SLinus Torvalds 			if ((flags & MSG_MORE) &&
1416d8d1f30bSChangli Gao 			    !(rt->dst.dev->features&NETIF_F_SG))
14171da177e4SLinus Torvalds 				alloclen = mtu;
141815e36f5bSWillem de Bruijn 			else if (!paged)
141915e36f5bSWillem de Bruijn 				alloclen = fraglen;
142015e36f5bSWillem de Bruijn 			else {
142115e36f5bSWillem de Bruijn 				alloclen = min_t(int, fraglen, MAX_HEADER);
142215e36f5bSWillem de Bruijn 				pagedlen = fraglen - alloclen;
142315e36f5bSWillem de Bruijn 			}
14241da177e4SLinus Torvalds 
1425299b0767SSteffen Klassert 			alloclen += dst_exthdrlen;
1426299b0767SSteffen Klassert 
14270c183379SGao feng 			if (datalen != length + fraggap) {
14281da177e4SLinus Torvalds 				/*
14290c183379SGao feng 				 * this is not the last fragment, the trailer
14300c183379SGao feng 				 * space is regarded as data space.
14311da177e4SLinus Torvalds 				 */
14320c183379SGao feng 				datalen += rt->dst.trailer_len;
14330c183379SGao feng 			}
14340c183379SGao feng 
1435d8d1f30bSChangli Gao 			alloclen += rt->dst.trailer_len;
14360c183379SGao feng 			fraglen = datalen + fragheaderlen;
14371da177e4SLinus Torvalds 
14381da177e4SLinus Torvalds 			/*
14391da177e4SLinus Torvalds 			 * We just reserve space for fragment header.
14401da177e4SLinus Torvalds 			 * Note: this may be overallocation if the message
14411da177e4SLinus Torvalds 			 * (without MSG_MORE) fits into the MTU.
14421da177e4SLinus Torvalds 			 */
14431da177e4SLinus Torvalds 			alloclen += sizeof(struct frag_hdr);
14441da177e4SLinus Torvalds 
144515e36f5bSWillem de Bruijn 			copy = datalen - transhdrlen - fraggap - pagedlen;
1446232cd35dSEric Dumazet 			if (copy < 0) {
1447232cd35dSEric Dumazet 				err = -EINVAL;
1448232cd35dSEric Dumazet 				goto error;
1449232cd35dSEric Dumazet 			}
14501da177e4SLinus Torvalds 			if (transhdrlen) {
14511da177e4SLinus Torvalds 				skb = sock_alloc_send_skb(sk,
14521da177e4SLinus Torvalds 						alloclen + hh_len,
14531da177e4SLinus Torvalds 						(flags & MSG_DONTWAIT), &err);
14541da177e4SLinus Torvalds 			} else {
14551da177e4SLinus Torvalds 				skb = NULL;
14561f4c6eb2SEric Dumazet 				if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <=
14571da177e4SLinus Torvalds 				    2 * sk->sk_sndbuf)
14581f4c6eb2SEric Dumazet 					skb = alloc_skb(alloclen + hh_len,
14591da177e4SLinus Torvalds 							sk->sk_allocation);
146063159f29SIan Morris 				if (unlikely(!skb))
14611da177e4SLinus Torvalds 					err = -ENOBUFS;
14621da177e4SLinus Torvalds 			}
146363159f29SIan Morris 			if (!skb)
14641da177e4SLinus Torvalds 				goto error;
14651da177e4SLinus Torvalds 			/*
14661da177e4SLinus Torvalds 			 *	Fill in the control structures
14671da177e4SLinus Torvalds 			 */
14689c9c9ad5SHannes Frederic Sowa 			skb->protocol = htons(ETH_P_IPV6);
146932dce968SVlad Yasevich 			skb->ip_summed = csummode;
14701da177e4SLinus Torvalds 			skb->csum = 0;
14711f85851eSGao feng 			/* reserve for fragmentation and ipsec header */
14721f85851eSGao feng 			skb_reserve(skb, hh_len + sizeof(struct frag_hdr) +
14731f85851eSGao feng 				    dst_exthdrlen);
14741da177e4SLinus Torvalds 
14751da177e4SLinus Torvalds 			/*
14761da177e4SLinus Torvalds 			 *	Find where to start putting bytes
14771da177e4SLinus Torvalds 			 */
147815e36f5bSWillem de Bruijn 			data = skb_put(skb, fraglen - pagedlen);
14791f85851eSGao feng 			skb_set_network_header(skb, exthdrlen);
14801f85851eSGao feng 			data += fragheaderlen;
1481b0e380b1SArnaldo Carvalho de Melo 			skb->transport_header = (skb->network_header +
1482b0e380b1SArnaldo Carvalho de Melo 						 fragheaderlen);
14831da177e4SLinus Torvalds 			if (fraggap) {
14841da177e4SLinus Torvalds 				skb->csum = skb_copy_and_csum_bits(
14851da177e4SLinus Torvalds 					skb_prev, maxfraglen,
14861da177e4SLinus Torvalds 					data + transhdrlen, fraggap, 0);
14871da177e4SLinus Torvalds 				skb_prev->csum = csum_sub(skb_prev->csum,
14881da177e4SLinus Torvalds 							  skb->csum);
14891da177e4SLinus Torvalds 				data += fraggap;
1490e9fa4f7bSHerbert Xu 				pskb_trim_unique(skb_prev, maxfraglen);
14911da177e4SLinus Torvalds 			}
1492232cd35dSEric Dumazet 			if (copy > 0 &&
1493232cd35dSEric Dumazet 			    getfrag(from, data + transhdrlen, offset,
1494232cd35dSEric Dumazet 				    copy, fraggap, skb) < 0) {
14951da177e4SLinus Torvalds 				err = -EFAULT;
14961da177e4SLinus Torvalds 				kfree_skb(skb);
14971da177e4SLinus Torvalds 				goto error;
14981da177e4SLinus Torvalds 			}
14991da177e4SLinus Torvalds 
15001da177e4SLinus Torvalds 			offset += copy;
150115e36f5bSWillem de Bruijn 			length -= copy + transhdrlen;
15021da177e4SLinus Torvalds 			transhdrlen = 0;
15031da177e4SLinus Torvalds 			exthdrlen = 0;
1504299b0767SSteffen Klassert 			dst_exthdrlen = 0;
15051da177e4SLinus Torvalds 
150652900d22SWillem de Bruijn 			/* Only the initial fragment is time stamped */
150752900d22SWillem de Bruijn 			skb_shinfo(skb)->tx_flags = cork->tx_flags;
150852900d22SWillem de Bruijn 			cork->tx_flags = 0;
150952900d22SWillem de Bruijn 			skb_shinfo(skb)->tskey = tskey;
151052900d22SWillem de Bruijn 			tskey = 0;
151152900d22SWillem de Bruijn 			skb_zcopy_set(skb, uarg, &extra_uref);
151252900d22SWillem de Bruijn 
15130dec879fSJulian Anastasov 			if ((flags & MSG_CONFIRM) && !skb_prev)
15140dec879fSJulian Anastasov 				skb_set_dst_pending_confirm(skb, 1);
15150dec879fSJulian Anastasov 
15161da177e4SLinus Torvalds 			/*
15171da177e4SLinus Torvalds 			 * Put the packet on the pending queue
15181da177e4SLinus Torvalds 			 */
15191f4c6eb2SEric Dumazet 			if (!skb->destructor) {
15201f4c6eb2SEric Dumazet 				skb->destructor = sock_wfree;
15211f4c6eb2SEric Dumazet 				skb->sk = sk;
15221f4c6eb2SEric Dumazet 				wmem_alloc_delta += skb->truesize;
15231f4c6eb2SEric Dumazet 			}
15240bbe84a6SVlad Yasevich 			__skb_queue_tail(queue, skb);
15251da177e4SLinus Torvalds 			continue;
15261da177e4SLinus Torvalds 		}
15271da177e4SLinus Torvalds 
15281da177e4SLinus Torvalds 		if (copy > length)
15291da177e4SLinus Torvalds 			copy = length;
15301da177e4SLinus Torvalds 
1531113f99c3SWillem de Bruijn 		if (!(rt->dst.dev->features&NETIF_F_SG) &&
1532113f99c3SWillem de Bruijn 		    skb_tailroom(skb) >= copy) {
15331da177e4SLinus Torvalds 			unsigned int off;
15341da177e4SLinus Torvalds 
15351da177e4SLinus Torvalds 			off = skb->len;
15361da177e4SLinus Torvalds 			if (getfrag(from, skb_put(skb, copy),
15371da177e4SLinus Torvalds 						offset, copy, off, skb) < 0) {
15381da177e4SLinus Torvalds 				__skb_trim(skb, off);
15391da177e4SLinus Torvalds 				err = -EFAULT;
15401da177e4SLinus Torvalds 				goto error;
15411da177e4SLinus Torvalds 			}
1542b5947e5dSWillem de Bruijn 		} else if (!uarg || !uarg->zerocopy) {
15431da177e4SLinus Torvalds 			int i = skb_shinfo(skb)->nr_frags;
15441da177e4SLinus Torvalds 
15451da177e4SLinus Torvalds 			err = -ENOMEM;
15465640f768SEric Dumazet 			if (!sk_page_frag_refill(sk, pfrag))
15471da177e4SLinus Torvalds 				goto error;
15481da177e4SLinus Torvalds 
15495640f768SEric Dumazet 			if (!skb_can_coalesce(skb, i, pfrag->page,
15505640f768SEric Dumazet 					      pfrag->offset)) {
15511da177e4SLinus Torvalds 				err = -EMSGSIZE;
15525640f768SEric Dumazet 				if (i == MAX_SKB_FRAGS)
15531da177e4SLinus Torvalds 					goto error;
15545640f768SEric Dumazet 
15555640f768SEric Dumazet 				__skb_fill_page_desc(skb, i, pfrag->page,
15565640f768SEric Dumazet 						     pfrag->offset, 0);
15575640f768SEric Dumazet 				skb_shinfo(skb)->nr_frags = ++i;
15585640f768SEric Dumazet 				get_page(pfrag->page);
15591da177e4SLinus Torvalds 			}
15605640f768SEric Dumazet 			copy = min_t(int, copy, pfrag->size - pfrag->offset);
15619e903e08SEric Dumazet 			if (getfrag(from,
15625640f768SEric Dumazet 				    page_address(pfrag->page) + pfrag->offset,
15635640f768SEric Dumazet 				    offset, copy, skb->len, skb) < 0)
15645640f768SEric Dumazet 				goto error_efault;
15655640f768SEric Dumazet 
15665640f768SEric Dumazet 			pfrag->offset += copy;
15675640f768SEric Dumazet 			skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy);
15681da177e4SLinus Torvalds 			skb->len += copy;
15691da177e4SLinus Torvalds 			skb->data_len += copy;
1570f945fa7aSHerbert Xu 			skb->truesize += copy;
15711f4c6eb2SEric Dumazet 			wmem_alloc_delta += copy;
1572b5947e5dSWillem de Bruijn 		} else {
1573b5947e5dSWillem de Bruijn 			err = skb_zerocopy_iter_dgram(skb, from, copy);
1574b5947e5dSWillem de Bruijn 			if (err < 0)
1575b5947e5dSWillem de Bruijn 				goto error;
15761da177e4SLinus Torvalds 		}
15771da177e4SLinus Torvalds 		offset += copy;
15781da177e4SLinus Torvalds 		length -= copy;
15791da177e4SLinus Torvalds 	}
15805640f768SEric Dumazet 
15819e8445a5SPaolo Abeni 	if (wmem_alloc_delta)
15821f4c6eb2SEric Dumazet 		refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
15831da177e4SLinus Torvalds 	return 0;
15845640f768SEric Dumazet 
15855640f768SEric Dumazet error_efault:
15865640f768SEric Dumazet 	err = -EFAULT;
15871da177e4SLinus Torvalds error:
158897ef7b4cSWillem de Bruijn 	if (uarg)
158952900d22SWillem de Bruijn 		sock_zerocopy_put_abort(uarg, extra_uref);
1590bdc712b4SDavid S. Miller 	cork->length -= length;
15913bd653c8SDenis V. Lunev 	IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS);
15921f4c6eb2SEric Dumazet 	refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
15931da177e4SLinus Torvalds 	return err;
15941da177e4SLinus Torvalds }
15950bbe84a6SVlad Yasevich 
15960bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk,
15970bbe84a6SVlad Yasevich 		    int getfrag(void *from, char *to, int offset, int len,
15980bbe84a6SVlad Yasevich 				int odd, struct sk_buff *skb),
159926879da5SWei Wang 		    void *from, int length, int transhdrlen,
160026879da5SWei Wang 		    struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
16015fdaa88dSWillem de Bruijn 		    struct rt6_info *rt, unsigned int flags)
16020bbe84a6SVlad Yasevich {
16030bbe84a6SVlad Yasevich 	struct inet_sock *inet = inet_sk(sk);
16040bbe84a6SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
16050bbe84a6SVlad Yasevich 	int exthdrlen;
16060bbe84a6SVlad Yasevich 	int err;
16070bbe84a6SVlad Yasevich 
16080bbe84a6SVlad Yasevich 	if (flags&MSG_PROBE)
16090bbe84a6SVlad Yasevich 		return 0;
16100bbe84a6SVlad Yasevich 	if (skb_queue_empty(&sk->sk_write_queue)) {
16110bbe84a6SVlad Yasevich 		/*
16120bbe84a6SVlad Yasevich 		 * setup for corking
16130bbe84a6SVlad Yasevich 		 */
161426879da5SWei Wang 		err = ip6_setup_cork(sk, &inet->cork, &np->cork,
16155fdaa88dSWillem de Bruijn 				     ipc6, rt, fl6);
16160bbe84a6SVlad Yasevich 		if (err)
16170bbe84a6SVlad Yasevich 			return err;
16180bbe84a6SVlad Yasevich 
161926879da5SWei Wang 		exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
16200bbe84a6SVlad Yasevich 		length += exthdrlen;
16210bbe84a6SVlad Yasevich 		transhdrlen += exthdrlen;
16220bbe84a6SVlad Yasevich 	} else {
16230bbe84a6SVlad Yasevich 		fl6 = &inet->cork.fl.u.ip6;
16240bbe84a6SVlad Yasevich 		transhdrlen = 0;
16250bbe84a6SVlad Yasevich 	}
16260bbe84a6SVlad Yasevich 
16270bbe84a6SVlad Yasevich 	return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base,
16280bbe84a6SVlad Yasevich 				 &np->cork, sk_page_frag(sk), getfrag,
16295fdaa88dSWillem de Bruijn 				 from, length, transhdrlen, flags, ipc6);
16300bbe84a6SVlad Yasevich }
1631a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data);
16321da177e4SLinus Torvalds 
1633366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork,
1634366e41d9SVlad Yasevich 			     struct inet6_cork *v6_cork)
1635bf138862SPavel Emelyanov {
1636366e41d9SVlad Yasevich 	if (v6_cork->opt) {
1637366e41d9SVlad Yasevich 		kfree(v6_cork->opt->dst0opt);
1638366e41d9SVlad Yasevich 		kfree(v6_cork->opt->dst1opt);
1639366e41d9SVlad Yasevich 		kfree(v6_cork->opt->hopopt);
1640366e41d9SVlad Yasevich 		kfree(v6_cork->opt->srcrt);
1641366e41d9SVlad Yasevich 		kfree(v6_cork->opt);
1642366e41d9SVlad Yasevich 		v6_cork->opt = NULL;
16430178b695SHerbert Xu 	}
16440178b695SHerbert Xu 
1645366e41d9SVlad Yasevich 	if (cork->base.dst) {
1646366e41d9SVlad Yasevich 		dst_release(cork->base.dst);
1647366e41d9SVlad Yasevich 		cork->base.dst = NULL;
1648366e41d9SVlad Yasevich 		cork->base.flags &= ~IPCORK_ALLFRAG;
1649bf138862SPavel Emelyanov 	}
1650366e41d9SVlad Yasevich 	memset(&cork->fl, 0, sizeof(cork->fl));
1651bf138862SPavel Emelyanov }
1652bf138862SPavel Emelyanov 
16536422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk,
16546422398cSVlad Yasevich 			       struct sk_buff_head *queue,
16556422398cSVlad Yasevich 			       struct inet_cork_full *cork,
16566422398cSVlad Yasevich 			       struct inet6_cork *v6_cork)
16571da177e4SLinus Torvalds {
16581da177e4SLinus Torvalds 	struct sk_buff *skb, *tmp_skb;
16591da177e4SLinus Torvalds 	struct sk_buff **tail_skb;
16601da177e4SLinus Torvalds 	struct in6_addr final_dst_buf, *final_dst = &final_dst_buf;
16611da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
16623bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
16631da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
16646422398cSVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
16656422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->base.dst;
16666422398cSVlad Yasevich 	struct flowi6 *fl6 = &cork->fl.u.ip6;
16674c9483b2SDavid S. Miller 	unsigned char proto = fl6->flowi6_proto;
16681da177e4SLinus Torvalds 
16696422398cSVlad Yasevich 	skb = __skb_dequeue(queue);
167063159f29SIan Morris 	if (!skb)
16711da177e4SLinus Torvalds 		goto out;
16721da177e4SLinus Torvalds 	tail_skb = &(skb_shinfo(skb)->frag_list);
16731da177e4SLinus Torvalds 
16741da177e4SLinus Torvalds 	/* move skb->data to ip header from ext header */
1675d56f90a7SArnaldo Carvalho de Melo 	if (skb->data < skb_network_header(skb))
1676bbe735e4SArnaldo Carvalho de Melo 		__skb_pull(skb, skb_network_offset(skb));
16776422398cSVlad Yasevich 	while ((tmp_skb = __skb_dequeue(queue)) != NULL) {
1678cfe1fc77SArnaldo Carvalho de Melo 		__skb_pull(tmp_skb, skb_network_header_len(skb));
16791da177e4SLinus Torvalds 		*tail_skb = tmp_skb;
16801da177e4SLinus Torvalds 		tail_skb = &(tmp_skb->next);
16811da177e4SLinus Torvalds 		skb->len += tmp_skb->len;
16821da177e4SLinus Torvalds 		skb->data_len += tmp_skb->len;
16831da177e4SLinus Torvalds 		skb->truesize += tmp_skb->truesize;
16841da177e4SLinus Torvalds 		tmp_skb->destructor = NULL;
16851da177e4SLinus Torvalds 		tmp_skb->sk = NULL;
16861da177e4SLinus Torvalds 	}
16871da177e4SLinus Torvalds 
168828a89453SHerbert Xu 	/* Allow local fragmentation. */
168960ff7467SWANG Cong 	skb->ignore_df = ip6_sk_ignore_df(sk);
169028a89453SHerbert Xu 
16914e3fd7a0SAlexey Dobriyan 	*final_dst = fl6->daddr;
1692cfe1fc77SArnaldo Carvalho de Melo 	__skb_pull(skb, skb_network_header_len(skb));
16931da177e4SLinus Torvalds 	if (opt && opt->opt_flen)
16941da177e4SLinus Torvalds 		ipv6_push_frag_opts(skb, opt, &proto);
16951da177e4SLinus Torvalds 	if (opt && opt->opt_nflen)
1696613fa3caSDavid Lebrun 		ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr);
16971da177e4SLinus Torvalds 
1698e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
1699e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
17000660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
17011da177e4SLinus Torvalds 
17026422398cSVlad Yasevich 	ip6_flow_hdr(hdr, v6_cork->tclass,
1703cb1ce2efSTom Herbert 		     ip6_make_flowlabel(net, skb, fl6->flowlabel,
1704513674b5SShaohua Li 					ip6_autoflowlabel(net, np), fl6));
17056422398cSVlad Yasevich 	hdr->hop_limit = v6_cork->hop_limit;
17061da177e4SLinus Torvalds 	hdr->nexthdr = proto;
17074e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
17084e3fd7a0SAlexey Dobriyan 	hdr->daddr = *final_dst;
17091da177e4SLinus Torvalds 
1710a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
17114a19ec58SLaszlo Attila Toth 	skb->mark = sk->sk_mark;
1712a2c2064fSPatrick McHardy 
1713a818f75eSJesus Sanchez-Palencia 	skb->tstamp = cork->base.transmit_time;
1714a818f75eSJesus Sanchez-Palencia 
1715d8d1f30bSChangli Gao 	skb_dst_set(skb, dst_clone(&rt->dst));
1716edf391ffSNeil Horman 	IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len);
171714878f75SDavid L Stevens 	if (proto == IPPROTO_ICMPV6) {
1718adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
171914878f75SDavid L Stevens 
172043a43b60SHannes Frederic Sowa 		ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type);
172143a43b60SHannes Frederic Sowa 		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
172214878f75SDavid L Stevens 	}
172314878f75SDavid L Stevens 
17246422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
17256422398cSVlad Yasevich out:
17266422398cSVlad Yasevich 	return skb;
17276422398cSVlad Yasevich }
17286422398cSVlad Yasevich 
17296422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb)
17306422398cSVlad Yasevich {
17316422398cSVlad Yasevich 	struct net *net = sock_net(skb->sk);
17326422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
17336422398cSVlad Yasevich 	int err;
17346422398cSVlad Yasevich 
173533224b16SEric W. Biederman 	err = ip6_local_out(net, skb->sk, skb);
17361da177e4SLinus Torvalds 	if (err) {
17371da177e4SLinus Torvalds 		if (err > 0)
17386ce9e7b5SEric Dumazet 			err = net_xmit_errno(err);
17391da177e4SLinus Torvalds 		if (err)
17406422398cSVlad Yasevich 			IP6_INC_STATS(net, rt->rt6i_idev,
17416422398cSVlad Yasevich 				      IPSTATS_MIB_OUTDISCARDS);
17421da177e4SLinus Torvalds 	}
17431da177e4SLinus Torvalds 
17441da177e4SLinus Torvalds 	return err;
17456422398cSVlad Yasevich }
17466422398cSVlad Yasevich 
17476422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk)
17486422398cSVlad Yasevich {
17496422398cSVlad Yasevich 	struct sk_buff *skb;
17506422398cSVlad Yasevich 
17516422398cSVlad Yasevich 	skb = ip6_finish_skb(sk);
17526422398cSVlad Yasevich 	if (!skb)
17536422398cSVlad Yasevich 		return 0;
17546422398cSVlad Yasevich 
17556422398cSVlad Yasevich 	return ip6_send_skb(skb);
17561da177e4SLinus Torvalds }
1757a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames);
17581da177e4SLinus Torvalds 
17590bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk,
17606422398cSVlad Yasevich 				       struct sk_buff_head *queue,
17616422398cSVlad Yasevich 				       struct inet_cork_full *cork,
17626422398cSVlad Yasevich 				       struct inet6_cork *v6_cork)
17631da177e4SLinus Torvalds {
17641da177e4SLinus Torvalds 	struct sk_buff *skb;
17651da177e4SLinus Torvalds 
17660bbe84a6SVlad Yasevich 	while ((skb = __skb_dequeue_tail(queue)) != NULL) {
1767adf30907SEric Dumazet 		if (skb_dst(skb))
1768adf30907SEric Dumazet 			IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)),
1769a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_OUTDISCARDS);
17701da177e4SLinus Torvalds 		kfree_skb(skb);
17711da177e4SLinus Torvalds 	}
17721da177e4SLinus Torvalds 
17736422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
17741da177e4SLinus Torvalds }
17750bbe84a6SVlad Yasevich 
17760bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk)
17770bbe84a6SVlad Yasevich {
17786422398cSVlad Yasevich 	__ip6_flush_pending_frames(sk, &sk->sk_write_queue,
17796422398cSVlad Yasevich 				   &inet_sk(sk)->cork, &inet6_sk(sk)->cork);
17800bbe84a6SVlad Yasevich }
1781a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames);
17826422398cSVlad Yasevich 
17836422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk,
17846422398cSVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
17856422398cSVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
17866422398cSVlad Yasevich 			     void *from, int length, int transhdrlen,
178726879da5SWei Wang 			     struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
17886422398cSVlad Yasevich 			     struct rt6_info *rt, unsigned int flags,
17895fdaa88dSWillem de Bruijn 			     struct inet_cork_full *cork)
17906422398cSVlad Yasevich {
17916422398cSVlad Yasevich 	struct inet6_cork v6_cork;
17926422398cSVlad Yasevich 	struct sk_buff_head queue;
179326879da5SWei Wang 	int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
17946422398cSVlad Yasevich 	int err;
17956422398cSVlad Yasevich 
17966422398cSVlad Yasevich 	if (flags & MSG_PROBE)
17976422398cSVlad Yasevich 		return NULL;
17986422398cSVlad Yasevich 
17996422398cSVlad Yasevich 	__skb_queue_head_init(&queue);
18006422398cSVlad Yasevich 
18011cd7884dSWillem de Bruijn 	cork->base.flags = 0;
18021cd7884dSWillem de Bruijn 	cork->base.addr = 0;
18031cd7884dSWillem de Bruijn 	cork->base.opt = NULL;
18041cd7884dSWillem de Bruijn 	cork->base.dst = NULL;
18056422398cSVlad Yasevich 	v6_cork.opt = NULL;
18065fdaa88dSWillem de Bruijn 	err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt, fl6);
1807862c03eeSEric Dumazet 	if (err) {
18081cd7884dSWillem de Bruijn 		ip6_cork_release(cork, &v6_cork);
18096422398cSVlad Yasevich 		return ERR_PTR(err);
1810862c03eeSEric Dumazet 	}
181126879da5SWei Wang 	if (ipc6->dontfrag < 0)
181226879da5SWei Wang 		ipc6->dontfrag = inet6_sk(sk)->dontfrag;
18136422398cSVlad Yasevich 
18141cd7884dSWillem de Bruijn 	err = __ip6_append_data(sk, fl6, &queue, &cork->base, &v6_cork,
18156422398cSVlad Yasevich 				&current->task_frag, getfrag, from,
18166422398cSVlad Yasevich 				length + exthdrlen, transhdrlen + exthdrlen,
18175fdaa88dSWillem de Bruijn 				flags, ipc6);
18186422398cSVlad Yasevich 	if (err) {
18191cd7884dSWillem de Bruijn 		__ip6_flush_pending_frames(sk, &queue, cork, &v6_cork);
18206422398cSVlad Yasevich 		return ERR_PTR(err);
18216422398cSVlad Yasevich 	}
18226422398cSVlad Yasevich 
18231cd7884dSWillem de Bruijn 	return __ip6_make_skb(sk, &queue, cork, &v6_cork);
18246422398cSVlad Yasevich }
1825