xref: /openbmc/linux/net/ipv6/ip6_output.c (revision 2874c5fd284268364ece81a7bd936f3c8168e567)
1*2874c5fdSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later
21da177e4SLinus Torvalds /*
31da177e4SLinus Torvalds  *	IPv6 output functions
41da177e4SLinus Torvalds  *	Linux INET6 implementation
51da177e4SLinus Torvalds  *
61da177e4SLinus Torvalds  *	Authors:
71da177e4SLinus Torvalds  *	Pedro Roque		<roque@di.fc.ul.pt>
81da177e4SLinus Torvalds  *
91da177e4SLinus Torvalds  *	Based on linux/net/ipv4/ip_output.c
101da177e4SLinus Torvalds  *
111da177e4SLinus Torvalds  *	Changes:
121da177e4SLinus Torvalds  *	A.N.Kuznetsov	:	airthmetics in fragmentation.
131da177e4SLinus Torvalds  *				extension headers are implemented.
141da177e4SLinus Torvalds  *				route changes now work.
151da177e4SLinus Torvalds  *				ip6_forward does not confuse sniffers.
161da177e4SLinus Torvalds  *				etc.
171da177e4SLinus Torvalds  *
181da177e4SLinus Torvalds  *      H. von Brand    :       Added missing #include <linux/string.h>
191da177e4SLinus Torvalds  *	Imran Patel	:	frag id should be in NBO
201da177e4SLinus Torvalds  *      Kazunori MIYAZAWA @USAGI
211da177e4SLinus Torvalds  *			:       add ip6_append_data and related functions
221da177e4SLinus Torvalds  *				for datagram xmit
231da177e4SLinus Torvalds  */
241da177e4SLinus Torvalds 
251da177e4SLinus Torvalds #include <linux/errno.h>
26ef76bc23SHerbert Xu #include <linux/kernel.h>
271da177e4SLinus Torvalds #include <linux/string.h>
281da177e4SLinus Torvalds #include <linux/socket.h>
291da177e4SLinus Torvalds #include <linux/net.h>
301da177e4SLinus Torvalds #include <linux/netdevice.h>
311da177e4SLinus Torvalds #include <linux/if_arp.h>
321da177e4SLinus Torvalds #include <linux/in6.h>
331da177e4SLinus Torvalds #include <linux/tcp.h>
341da177e4SLinus Torvalds #include <linux/route.h>
35b59f45d0SHerbert Xu #include <linux/module.h>
365a0e3ad6STejun Heo #include <linux/slab.h>
371da177e4SLinus Torvalds 
3833b48679SDaniel Mack #include <linux/bpf-cgroup.h>
391da177e4SLinus Torvalds #include <linux/netfilter.h>
401da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h>
411da177e4SLinus Torvalds 
421da177e4SLinus Torvalds #include <net/sock.h>
431da177e4SLinus Torvalds #include <net/snmp.h>
441da177e4SLinus Torvalds 
451da177e4SLinus Torvalds #include <net/ipv6.h>
461da177e4SLinus Torvalds #include <net/ndisc.h>
471da177e4SLinus Torvalds #include <net/protocol.h>
481da177e4SLinus Torvalds #include <net/ip6_route.h>
491da177e4SLinus Torvalds #include <net/addrconf.h>
501da177e4SLinus Torvalds #include <net/rawv6.h>
511da177e4SLinus Torvalds #include <net/icmp.h>
521da177e4SLinus Torvalds #include <net/xfrm.h>
531da177e4SLinus Torvalds #include <net/checksum.h>
547bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h>
55ca254490SDavid Ahern #include <net/l3mdev.h>
5614972cbdSRoopa Prabhu #include <net/lwtunnel.h>
571da177e4SLinus Torvalds 
587d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb)
591da177e4SLinus Torvalds {
60adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
611da177e4SLinus Torvalds 	struct net_device *dev = dst->dev;
62f6b72b62SDavid S. Miller 	struct neighbour *neigh;
636fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	struct in6_addr *nexthop;
646fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	int ret;
651da177e4SLinus Torvalds 
660660e03fSArnaldo Carvalho de Melo 	if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) {
67adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
681da177e4SLinus Torvalds 
697026b1ddSDavid Miller 		if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) &&
708571ab47SYuval Mintz 		    ((mroute6_is_socket(net, skb) &&
71bd91b8bfSBenjamin Thery 		     !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) ||
720660e03fSArnaldo Carvalho de Melo 		     ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr,
737bc570c8SYOSHIFUJI Hideaki 					 &ipv6_hdr(skb)->saddr))) {
741da177e4SLinus Torvalds 			struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC);
751da177e4SLinus Torvalds 
761da177e4SLinus Torvalds 			/* Do not check for IFF_ALLMULTI; multicast routing
771da177e4SLinus Torvalds 			   is not supported in any case.
781da177e4SLinus Torvalds 			 */
791da177e4SLinus Torvalds 			if (newskb)
80b2e0b385SJan Engelhardt 				NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING,
8129a26a56SEric W. Biederman 					net, sk, newskb, NULL, newskb->dev,
8295603e22SMichel Machado 					dev_loopback_xmit);
831da177e4SLinus Torvalds 
840660e03fSArnaldo Carvalho de Melo 			if (ipv6_hdr(skb)->hop_limit == 0) {
8578126c41SEric W. Biederman 				IP6_INC_STATS(net, idev,
863bd653c8SDenis V. Lunev 					      IPSTATS_MIB_OUTDISCARDS);
871da177e4SLinus Torvalds 				kfree_skb(skb);
881da177e4SLinus Torvalds 				return 0;
891da177e4SLinus Torvalds 			}
901da177e4SLinus Torvalds 		}
911da177e4SLinus Torvalds 
9278126c41SEric W. Biederman 		IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len);
93dd408515SHannes Frederic Sowa 
94dd408515SHannes Frederic Sowa 		if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <=
95dd408515SHannes Frederic Sowa 		    IPV6_ADDR_SCOPE_NODELOCAL &&
96dd408515SHannes Frederic Sowa 		    !(dev->flags & IFF_LOOPBACK)) {
97dd408515SHannes Frederic Sowa 			kfree_skb(skb);
98dd408515SHannes Frederic Sowa 			return 0;
99dd408515SHannes Frederic Sowa 		}
1001da177e4SLinus Torvalds 	}
1011da177e4SLinus Torvalds 
10214972cbdSRoopa Prabhu 	if (lwtunnel_xmit_redirect(dst->lwtstate)) {
10314972cbdSRoopa Prabhu 		int res = lwtunnel_xmit(skb);
10414972cbdSRoopa Prabhu 
10514972cbdSRoopa Prabhu 		if (res < 0 || res == LWTUNNEL_XMIT_DONE)
10614972cbdSRoopa Prabhu 			return res;
10714972cbdSRoopa Prabhu 	}
10814972cbdSRoopa Prabhu 
1096fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
1102647a9b0SMartin KaFai Lau 	nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr);
1116fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop);
1126fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(!neigh))
1136fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false);
1146fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	if (!IS_ERR(neigh)) {
1154ff06203SJulian Anastasov 		sock_confirm_neigh(skb, neigh);
1160353f282SDavid Ahern 		ret = neigh_output(neigh, skb, false);
1176fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		rcu_read_unlock_bh();
1186fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		return ret;
1196fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	}
1206fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
12105e3aa09SDavid S. Miller 
12278126c41SEric W. Biederman 	IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES);
1239e508490SJan Engelhardt 	kfree_skb(skb);
1249e508490SJan Engelhardt 	return -EINVAL;
1251da177e4SLinus Torvalds }
1261da177e4SLinus Torvalds 
1270c4b51f0SEric W. Biederman static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1289e508490SJan Engelhardt {
12933b48679SDaniel Mack 	int ret;
13033b48679SDaniel Mack 
13133b48679SDaniel Mack 	ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb);
13233b48679SDaniel Mack 	if (ret) {
13333b48679SDaniel Mack 		kfree_skb(skb);
13433b48679SDaniel Mack 		return ret;
13533b48679SDaniel Mack 	}
13633b48679SDaniel Mack 
13709ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM)
13809ee9dbaSTobias Brunner 	/* Policy lookup after SNAT yielded a new policy */
13909ee9dbaSTobias Brunner 	if (skb_dst(skb)->xfrm) {
14009ee9dbaSTobias Brunner 		IPCB(skb)->flags |= IPSKB_REROUTED;
14109ee9dbaSTobias Brunner 		return dst_output(net, sk, skb);
14209ee9dbaSTobias Brunner 	}
14309ee9dbaSTobias Brunner #endif
14409ee9dbaSTobias Brunner 
1459e508490SJan Engelhardt 	if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) ||
1469037c357SJiri Pirko 	    dst_allfrag(skb_dst(skb)) ||
1479037c357SJiri Pirko 	    (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size))
1487d8c6e39SEric W. Biederman 		return ip6_fragment(net, sk, skb, ip6_finish_output2);
1499e508490SJan Engelhardt 	else
1507d8c6e39SEric W. Biederman 		return ip6_finish_output2(net, sk, skb);
1519e508490SJan Engelhardt }
1529e508490SJan Engelhardt 
153ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1541da177e4SLinus Torvalds {
1559e508490SJan Engelhardt 	struct net_device *dev = skb_dst(skb)->dev;
156adf30907SEric Dumazet 	struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
157be10de0aSEric W. Biederman 
15897a7a37aSChenbo Feng 	skb->protocol = htons(ETH_P_IPV6);
15997a7a37aSChenbo Feng 	skb->dev = dev;
16097a7a37aSChenbo Feng 
161778d80beSYOSHIFUJI Hideaki 	if (unlikely(idev->cnf.disable_ipv6)) {
16219a0644cSEric W. Biederman 		IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
163778d80beSYOSHIFUJI Hideaki 		kfree_skb(skb);
164778d80beSYOSHIFUJI Hideaki 		return 0;
165778d80beSYOSHIFUJI Hideaki 	}
166778d80beSYOSHIFUJI Hideaki 
16729a26a56SEric W. Biederman 	return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
16829a26a56SEric W. Biederman 			    net, sk, skb, NULL, dev,
1699c6eb28aSJan Engelhardt 			    ip6_finish_output,
1709c6eb28aSJan Engelhardt 			    !(IP6CB(skb)->flags & IP6SKB_REROUTED));
1711da177e4SLinus Torvalds }
1721da177e4SLinus Torvalds 
173e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np)
174513674b5SShaohua Li {
175513674b5SShaohua Li 	if (!np->autoflowlabel_set)
176513674b5SShaohua Li 		return ip6_default_np_autolabel(net);
177513674b5SShaohua Li 	else
178513674b5SShaohua Li 		return np->autoflowlabel;
179513674b5SShaohua Li }
180513674b5SShaohua Li 
1811da177e4SLinus Torvalds /*
182b5d43998SShan Wei  * xmit an sk_buff (used by TCP, SCTP and DCCP)
1831c1e9d2bSEric Dumazet  * Note : socket lock is not held for SYNACK packets, but might be modified
1841c1e9d2bSEric Dumazet  * by calls to skb_set_owner_w() and ipv6_local_error(),
1851c1e9d2bSEric Dumazet  * which are using proper atomic operations or spinlocks.
1861da177e4SLinus Torvalds  */
1871c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6,
18892e55f41SPablo Neira 	     __u32 mark, struct ipv6_txoptions *opt, int tclass)
1891da177e4SLinus Torvalds {
1903bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
1911c1e9d2bSEric Dumazet 	const struct ipv6_pinfo *np = inet6_sk(sk);
1924c9483b2SDavid S. Miller 	struct in6_addr *first_hop = &fl6->daddr;
193adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
19466033f47SStefano Brivio 	unsigned int head_room;
1951da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
1964c9483b2SDavid S. Miller 	u8  proto = fl6->flowi6_proto;
1971da177e4SLinus Torvalds 	int seg_len = skb->len;
198e651f03aSGerrit Renker 	int hlimit = -1;
1991da177e4SLinus Torvalds 	u32 mtu;
2001da177e4SLinus Torvalds 
20166033f47SStefano Brivio 	head_room = sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev);
20266033f47SStefano Brivio 	if (opt)
20366033f47SStefano Brivio 		head_room += opt->opt_nflen + opt->opt_flen;
2041da177e4SLinus Torvalds 
20566033f47SStefano Brivio 	if (unlikely(skb_headroom(skb) < head_room)) {
2061da177e4SLinus Torvalds 		struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room);
20763159f29SIan Morris 		if (!skb2) {
208adf30907SEric Dumazet 			IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
209a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_OUTDISCARDS);
2101da177e4SLinus Torvalds 			kfree_skb(skb);
2111da177e4SLinus Torvalds 			return -ENOBUFS;
2121da177e4SLinus Torvalds 		}
213bbd6528dSEric Dumazet 		if (skb->sk)
214bbd6528dSEric Dumazet 			skb_set_owner_w(skb2, skb->sk);
215808db80aSEric Dumazet 		consume_skb(skb);
216a11d206dSYOSHIFUJI Hideaki 		skb = skb2;
2171da177e4SLinus Torvalds 	}
21866033f47SStefano Brivio 
21966033f47SStefano Brivio 	if (opt) {
22066033f47SStefano Brivio 		seg_len += opt->opt_nflen + opt->opt_flen;
22166033f47SStefano Brivio 
2221da177e4SLinus Torvalds 		if (opt->opt_flen)
2231da177e4SLinus Torvalds 			ipv6_push_frag_opts(skb, opt, &proto);
22466033f47SStefano Brivio 
2251da177e4SLinus Torvalds 		if (opt->opt_nflen)
226613fa3caSDavid Lebrun 			ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop,
227613fa3caSDavid Lebrun 					     &fl6->saddr);
2281da177e4SLinus Torvalds 	}
2291da177e4SLinus Torvalds 
230e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
231e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
2320660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
2331da177e4SLinus Torvalds 
2341da177e4SLinus Torvalds 	/*
2351da177e4SLinus Torvalds 	 *	Fill in the IPv6 header
2361da177e4SLinus Torvalds 	 */
237b903d324SEric Dumazet 	if (np)
2381da177e4SLinus Torvalds 		hlimit = np->hop_limit;
2391da177e4SLinus Torvalds 	if (hlimit < 0)
2406b75d090SYOSHIFUJI Hideaki 		hlimit = ip6_dst_hoplimit(dst);
2411da177e4SLinus Torvalds 
242cb1ce2efSTom Herbert 	ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel,
243513674b5SShaohua Li 				ip6_autoflowlabel(net, np), fl6));
24441a1f8eaSYOSHIFUJI Hideaki 
2451da177e4SLinus Torvalds 	hdr->payload_len = htons(seg_len);
2461da177e4SLinus Torvalds 	hdr->nexthdr = proto;
2471da177e4SLinus Torvalds 	hdr->hop_limit = hlimit;
2481da177e4SLinus Torvalds 
2494e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
2504e3fd7a0SAlexey Dobriyan 	hdr->daddr = *first_hop;
2511da177e4SLinus Torvalds 
2529c9c9ad5SHannes Frederic Sowa 	skb->protocol = htons(ETH_P_IPV6);
253a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
25492e55f41SPablo Neira 	skb->mark = mark;
255a2c2064fSPatrick McHardy 
2561da177e4SLinus Torvalds 	mtu = dst_mtu(dst);
25760ff7467SWANG Cong 	if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) {
258adf30907SEric Dumazet 		IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)),
259edf391ffSNeil Horman 			      IPSTATS_MIB_OUT, skb->len);
260a8e3e1a9SDavid Ahern 
261a8e3e1a9SDavid Ahern 		/* if egress device is enslaved to an L3 master device pass the
262a8e3e1a9SDavid Ahern 		 * skb to its handler for processing
263a8e3e1a9SDavid Ahern 		 */
264a8e3e1a9SDavid Ahern 		skb = l3mdev_ip6_out((struct sock *)sk, skb);
265a8e3e1a9SDavid Ahern 		if (unlikely(!skb))
266a8e3e1a9SDavid Ahern 			return 0;
267a8e3e1a9SDavid Ahern 
2681c1e9d2bSEric Dumazet 		/* hooks should never assume socket lock is held.
2691c1e9d2bSEric Dumazet 		 * we promote our socket to non const
2701c1e9d2bSEric Dumazet 		 */
27129a26a56SEric W. Biederman 		return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
2721c1e9d2bSEric Dumazet 			       net, (struct sock *)sk, skb, NULL, dst->dev,
27313206b6bSEric W. Biederman 			       dst_output);
2741da177e4SLinus Torvalds 	}
2751da177e4SLinus Torvalds 
2761da177e4SLinus Torvalds 	skb->dev = dst->dev;
2771c1e9d2bSEric Dumazet 	/* ipv6_local_error() does not require socket lock,
2781c1e9d2bSEric Dumazet 	 * we promote our socket to non const
2791c1e9d2bSEric Dumazet 	 */
2801c1e9d2bSEric Dumazet 	ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu);
2811c1e9d2bSEric Dumazet 
282adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS);
2831da177e4SLinus Torvalds 	kfree_skb(skb);
2841da177e4SLinus Torvalds 	return -EMSGSIZE;
2851da177e4SLinus Torvalds }
2867159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit);
2877159039aSYOSHIFUJI Hideaki 
2881da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel)
2891da177e4SLinus Torvalds {
2901da177e4SLinus Torvalds 	struct ip6_ra_chain *ra;
2911da177e4SLinus Torvalds 	struct sock *last = NULL;
2921da177e4SLinus Torvalds 
2931da177e4SLinus Torvalds 	read_lock(&ip6_ra_lock);
2941da177e4SLinus Torvalds 	for (ra = ip6_ra_chain; ra; ra = ra->next) {
2951da177e4SLinus Torvalds 		struct sock *sk = ra->sk;
2960bd1b59bSAndrew McDonald 		if (sk && ra->sel == sel &&
2970bd1b59bSAndrew McDonald 		    (!sk->sk_bound_dev_if ||
2980bd1b59bSAndrew McDonald 		     sk->sk_bound_dev_if == skb->dev->ifindex)) {
2999036b2feSFrancesco Ruggeri 			struct ipv6_pinfo *np = inet6_sk(sk);
3009036b2feSFrancesco Ruggeri 
3019036b2feSFrancesco Ruggeri 			if (np && np->rtalert_isolate &&
3029036b2feSFrancesco Ruggeri 			    !net_eq(sock_net(sk), dev_net(skb->dev))) {
3039036b2feSFrancesco Ruggeri 				continue;
3049036b2feSFrancesco Ruggeri 			}
3051da177e4SLinus Torvalds 			if (last) {
3061da177e4SLinus Torvalds 				struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
3071da177e4SLinus Torvalds 				if (skb2)
3081da177e4SLinus Torvalds 					rawv6_rcv(last, skb2);
3091da177e4SLinus Torvalds 			}
3101da177e4SLinus Torvalds 			last = sk;
3111da177e4SLinus Torvalds 		}
3121da177e4SLinus Torvalds 	}
3131da177e4SLinus Torvalds 
3141da177e4SLinus Torvalds 	if (last) {
3151da177e4SLinus Torvalds 		rawv6_rcv(last, skb);
3161da177e4SLinus Torvalds 		read_unlock(&ip6_ra_lock);
3171da177e4SLinus Torvalds 		return 1;
3181da177e4SLinus Torvalds 	}
3191da177e4SLinus Torvalds 	read_unlock(&ip6_ra_lock);
3201da177e4SLinus Torvalds 	return 0;
3211da177e4SLinus Torvalds }
3221da177e4SLinus Torvalds 
323e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb)
324e21e0b5fSVille Nuorvala {
3250660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
326e21e0b5fSVille Nuorvala 	u8 nexthdr = hdr->nexthdr;
32775f2811cSJesse Gross 	__be16 frag_off;
328e21e0b5fSVille Nuorvala 	int offset;
329e21e0b5fSVille Nuorvala 
330e21e0b5fSVille Nuorvala 	if (ipv6_ext_hdr(nexthdr)) {
33175f2811cSJesse Gross 		offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off);
332e21e0b5fSVille Nuorvala 		if (offset < 0)
333e21e0b5fSVille Nuorvala 			return 0;
334e21e0b5fSVille Nuorvala 	} else
335e21e0b5fSVille Nuorvala 		offset = sizeof(struct ipv6hdr);
336e21e0b5fSVille Nuorvala 
337e21e0b5fSVille Nuorvala 	if (nexthdr == IPPROTO_ICMPV6) {
338e21e0b5fSVille Nuorvala 		struct icmp6hdr *icmp6;
339e21e0b5fSVille Nuorvala 
340d56f90a7SArnaldo Carvalho de Melo 		if (!pskb_may_pull(skb, (skb_network_header(skb) +
341d56f90a7SArnaldo Carvalho de Melo 					 offset + 1 - skb->data)))
342e21e0b5fSVille Nuorvala 			return 0;
343e21e0b5fSVille Nuorvala 
344d56f90a7SArnaldo Carvalho de Melo 		icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset);
345e21e0b5fSVille Nuorvala 
346e21e0b5fSVille Nuorvala 		switch (icmp6->icmp6_type) {
347e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_SOLICITATION:
348e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_ADVERTISEMENT:
349e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_SOLICITATION:
350e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_ADVERTISEMENT:
351e21e0b5fSVille Nuorvala 		case NDISC_REDIRECT:
352e21e0b5fSVille Nuorvala 			/* For reaction involving unicast neighbor discovery
353e21e0b5fSVille Nuorvala 			 * message destined to the proxied address, pass it to
354e21e0b5fSVille Nuorvala 			 * input function.
355e21e0b5fSVille Nuorvala 			 */
356e21e0b5fSVille Nuorvala 			return 1;
357e21e0b5fSVille Nuorvala 		default:
358e21e0b5fSVille Nuorvala 			break;
359e21e0b5fSVille Nuorvala 		}
360e21e0b5fSVille Nuorvala 	}
361e21e0b5fSVille Nuorvala 
36274553b09SVille Nuorvala 	/*
36374553b09SVille Nuorvala 	 * The proxying router can't forward traffic sent to a link-local
36474553b09SVille Nuorvala 	 * address, so signal the sender and discard the packet. This
36574553b09SVille Nuorvala 	 * behavior is clarified by the MIPv6 specification.
36674553b09SVille Nuorvala 	 */
36774553b09SVille Nuorvala 	if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) {
36874553b09SVille Nuorvala 		dst_link_failure(skb);
36974553b09SVille Nuorvala 		return -1;
37074553b09SVille Nuorvala 	}
37174553b09SVille Nuorvala 
372e21e0b5fSVille Nuorvala 	return 0;
373e21e0b5fSVille Nuorvala }
374e21e0b5fSVille Nuorvala 
3750c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk,
3760c4b51f0SEric W. Biederman 				     struct sk_buff *skb)
3771da177e4SLinus Torvalds {
37871a1c915SJeff Barnhill 	struct dst_entry *dst = skb_dst(skb);
37971a1c915SJeff Barnhill 
38071a1c915SJeff Barnhill 	__IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS);
38171a1c915SJeff Barnhill 	__IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len);
38271a1c915SJeff Barnhill 
383f839a6c9SIdo Schimmel #ifdef CONFIG_NET_SWITCHDEV
384f839a6c9SIdo Schimmel 	if (skb->offload_l3_fwd_mark) {
385f839a6c9SIdo Schimmel 		consume_skb(skb);
386f839a6c9SIdo Schimmel 		return 0;
387f839a6c9SIdo Schimmel 	}
388f839a6c9SIdo Schimmel #endif
389f839a6c9SIdo Schimmel 
3908203e2d8SEric Dumazet 	skb->tstamp = 0;
39113206b6bSEric W. Biederman 	return dst_output(net, sk, skb);
3921da177e4SLinus Torvalds }
3931da177e4SLinus Torvalds 
394fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu)
395fe6cc55fSFlorian Westphal {
396418a3156SFlorian Westphal 	if (skb->len <= mtu)
397fe6cc55fSFlorian Westphal 		return false;
398fe6cc55fSFlorian Westphal 
39960ff7467SWANG Cong 	/* ipv6 conntrack defrag sets max_frag_size + ignore_df */
400fe6cc55fSFlorian Westphal 	if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu)
401fe6cc55fSFlorian Westphal 		return true;
402fe6cc55fSFlorian Westphal 
40360ff7467SWANG Cong 	if (skb->ignore_df)
404418a3156SFlorian Westphal 		return false;
405418a3156SFlorian Westphal 
406779b7931SDaniel Axtens 	if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu))
407fe6cc55fSFlorian Westphal 		return false;
408fe6cc55fSFlorian Westphal 
409fe6cc55fSFlorian Westphal 	return true;
410fe6cc55fSFlorian Westphal }
411fe6cc55fSFlorian Westphal 
4121da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb)
4131da177e4SLinus Torvalds {
414bdb7cc64SStephen Suryaputra 	struct inet6_dev *idev = __in6_dev_get_safely(skb->dev);
415adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
4160660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
4171da177e4SLinus Torvalds 	struct inet6_skb_parm *opt = IP6CB(skb);
418c346dca1SYOSHIFUJI Hideaki 	struct net *net = dev_net(dst->dev);
41914f3ad6fSUlrich Weber 	u32 mtu;
4201da177e4SLinus Torvalds 
42153b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->forwarding == 0)
4221da177e4SLinus Torvalds 		goto error;
4231da177e4SLinus Torvalds 
424090f1166SLi RongQing 	if (skb->pkt_type != PACKET_HOST)
425090f1166SLi RongQing 		goto drop;
426090f1166SLi RongQing 
4279ef2e965SHannes Frederic Sowa 	if (unlikely(skb->sk))
4289ef2e965SHannes Frederic Sowa 		goto drop;
4299ef2e965SHannes Frederic Sowa 
4304497b076SBen Hutchings 	if (skb_warn_if_lro(skb))
4314497b076SBen Hutchings 		goto drop;
4324497b076SBen Hutchings 
4331da177e4SLinus Torvalds 	if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) {
434bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
4351da177e4SLinus Torvalds 		goto drop;
4361da177e4SLinus Torvalds 	}
4371da177e4SLinus Torvalds 
43835fc92a9SHerbert Xu 	skb_forward_csum(skb);
4391da177e4SLinus Torvalds 
4401da177e4SLinus Torvalds 	/*
4411da177e4SLinus Torvalds 	 *	We DO NOT make any processing on
4421da177e4SLinus Torvalds 	 *	RA packets, pushing them to user level AS IS
4431da177e4SLinus Torvalds 	 *	without ane WARRANTY that application will be able
4441da177e4SLinus Torvalds 	 *	to interpret them. The reason is that we
4451da177e4SLinus Torvalds 	 *	cannot make anything clever here.
4461da177e4SLinus Torvalds 	 *
4471da177e4SLinus Torvalds 	 *	We are not end-node, so that if packet contains
4481da177e4SLinus Torvalds 	 *	AH/ESP, we cannot make anything.
4491da177e4SLinus Torvalds 	 *	Defragmentation also would be mistake, RA packets
4501da177e4SLinus Torvalds 	 *	cannot be fragmented, because there is no warranty
4511da177e4SLinus Torvalds 	 *	that different fragments will go along one path. --ANK
4521da177e4SLinus Torvalds 	 */
453ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) {
454ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 		if (ip6_call_ra_chain(skb, ntohs(opt->ra)))
4551da177e4SLinus Torvalds 			return 0;
4561da177e4SLinus Torvalds 	}
4571da177e4SLinus Torvalds 
4581da177e4SLinus Torvalds 	/*
4591da177e4SLinus Torvalds 	 *	check and decrement ttl
4601da177e4SLinus Torvalds 	 */
4611da177e4SLinus Torvalds 	if (hdr->hop_limit <= 1) {
4621da177e4SLinus Torvalds 		/* Force OUTPUT device used as source address */
4631da177e4SLinus Torvalds 		skb->dev = dst->dev;
4643ffe533cSAlexey Dobriyan 		icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0);
465bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS);
4661da177e4SLinus Torvalds 
4671da177e4SLinus Torvalds 		kfree_skb(skb);
4681da177e4SLinus Torvalds 		return -ETIMEDOUT;
4691da177e4SLinus Torvalds 	}
4701da177e4SLinus Torvalds 
471fbea49e1SYOSHIFUJI Hideaki 	/* XXX: idev->cnf.proxy_ndp? */
47253b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->proxy_ndp &&
4738a3edd80SDaniel Lezcano 	    pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) {
47474553b09SVille Nuorvala 		int proxied = ip6_forward_proxy_check(skb);
47574553b09SVille Nuorvala 		if (proxied > 0)
476e21e0b5fSVille Nuorvala 			return ip6_input(skb);
47774553b09SVille Nuorvala 		else if (proxied < 0) {
478bdb7cc64SStephen Suryaputra 			__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
47974553b09SVille Nuorvala 			goto drop;
48074553b09SVille Nuorvala 		}
481e21e0b5fSVille Nuorvala 	}
482e21e0b5fSVille Nuorvala 
4831da177e4SLinus Torvalds 	if (!xfrm6_route_forward(skb)) {
484bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
4851da177e4SLinus Torvalds 		goto drop;
4861da177e4SLinus Torvalds 	}
487adf30907SEric Dumazet 	dst = skb_dst(skb);
4881da177e4SLinus Torvalds 
4891da177e4SLinus Torvalds 	/* IPv6 specs say nothing about it, but it is clear that we cannot
4901da177e4SLinus Torvalds 	   send redirects to source routed frames.
4911e5dc146SMasahide NAKAMURA 	   We don't send redirects to frames decapsulated from IPsec.
4921da177e4SLinus Torvalds 	 */
4932f17becfSStephen Suryaputra 	if (IP6CB(skb)->iif == dst->dev->ifindex &&
4942f17becfSStephen Suryaputra 	    opt->srcrt == 0 && !skb_sec_path(skb)) {
4951da177e4SLinus Torvalds 		struct in6_addr *target = NULL;
496fbfe95a4SDavid S. Miller 		struct inet_peer *peer;
4971da177e4SLinus Torvalds 		struct rt6_info *rt;
4981da177e4SLinus Torvalds 
4991da177e4SLinus Torvalds 		/*
5001da177e4SLinus Torvalds 		 *	incoming and outgoing devices are the same
5011da177e4SLinus Torvalds 		 *	send a redirect.
5021da177e4SLinus Torvalds 		 */
5031da177e4SLinus Torvalds 
5041da177e4SLinus Torvalds 		rt = (struct rt6_info *) dst;
505c45a3dfbSDavid S. Miller 		if (rt->rt6i_flags & RTF_GATEWAY)
506c45a3dfbSDavid S. Miller 			target = &rt->rt6i_gateway;
5071da177e4SLinus Torvalds 		else
5081da177e4SLinus Torvalds 			target = &hdr->daddr;
5091da177e4SLinus Torvalds 
510fd0273d7SMartin KaFai Lau 		peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1);
51192d86829SDavid S. Miller 
5121da177e4SLinus Torvalds 		/* Limit redirects both by destination (here)
5131da177e4SLinus Torvalds 		   and by source (inside ndisc_send_redirect)
5141da177e4SLinus Torvalds 		 */
515fbfe95a4SDavid S. Miller 		if (inet_peer_xrlim_allow(peer, 1*HZ))
5164991969aSDavid S. Miller 			ndisc_send_redirect(skb, target);
5171d861aa4SDavid S. Miller 		if (peer)
5181d861aa4SDavid S. Miller 			inet_putpeer(peer);
5195bb1ab09SDavid L Stevens 	} else {
5205bb1ab09SDavid L Stevens 		int addrtype = ipv6_addr_type(&hdr->saddr);
5215bb1ab09SDavid L Stevens 
5221da177e4SLinus Torvalds 		/* This check is security critical. */
523f81b2e7dSYOSHIFUJI Hideaki 		if (addrtype == IPV6_ADDR_ANY ||
524f81b2e7dSYOSHIFUJI Hideaki 		    addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK))
5251da177e4SLinus Torvalds 			goto error;
5265bb1ab09SDavid L Stevens 		if (addrtype & IPV6_ADDR_LINKLOCAL) {
5275bb1ab09SDavid L Stevens 			icmpv6_send(skb, ICMPV6_DEST_UNREACH,
5283ffe533cSAlexey Dobriyan 				    ICMPV6_NOT_NEIGHBOUR, 0);
5295bb1ab09SDavid L Stevens 			goto error;
5305bb1ab09SDavid L Stevens 		}
5311da177e4SLinus Torvalds 	}
5321da177e4SLinus Torvalds 
5330954cf9cSHannes Frederic Sowa 	mtu = ip6_dst_mtu_forward(dst);
53414f3ad6fSUlrich Weber 	if (mtu < IPV6_MIN_MTU)
53514f3ad6fSUlrich Weber 		mtu = IPV6_MIN_MTU;
53614f3ad6fSUlrich Weber 
537fe6cc55fSFlorian Westphal 	if (ip6_pkt_too_big(skb, mtu)) {
5381da177e4SLinus Torvalds 		/* Again, force OUTPUT device used as source address */
5391da177e4SLinus Torvalds 		skb->dev = dst->dev;
54014f3ad6fSUlrich Weber 		icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
541bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS);
5421d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
54315c77d8bSEric Dumazet 				IPSTATS_MIB_FRAGFAILS);
5441da177e4SLinus Torvalds 		kfree_skb(skb);
5451da177e4SLinus Torvalds 		return -EMSGSIZE;
5461da177e4SLinus Torvalds 	}
5471da177e4SLinus Torvalds 
5481da177e4SLinus Torvalds 	if (skb_cow(skb, dst->dev->hard_header_len)) {
5491d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
55015c77d8bSEric Dumazet 				IPSTATS_MIB_OUTDISCARDS);
5511da177e4SLinus Torvalds 		goto drop;
5521da177e4SLinus Torvalds 	}
5531da177e4SLinus Torvalds 
5540660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
5551da177e4SLinus Torvalds 
5561da177e4SLinus Torvalds 	/* Mangling hops number delayed to point after skb COW */
5571da177e4SLinus Torvalds 
5581da177e4SLinus Torvalds 	hdr->hop_limit--;
5591da177e4SLinus Torvalds 
56029a26a56SEric W. Biederman 	return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD,
56129a26a56SEric W. Biederman 		       net, NULL, skb, skb->dev, dst->dev,
5626e23ae2aSPatrick McHardy 		       ip6_forward_finish);
5631da177e4SLinus Torvalds 
5641da177e4SLinus Torvalds error:
565bdb7cc64SStephen Suryaputra 	__IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS);
5661da177e4SLinus Torvalds drop:
5671da177e4SLinus Torvalds 	kfree_skb(skb);
5681da177e4SLinus Torvalds 	return -EINVAL;
5691da177e4SLinus Torvalds }
5701da177e4SLinus Torvalds 
5711da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from)
5721da177e4SLinus Torvalds {
5731da177e4SLinus Torvalds 	to->pkt_type = from->pkt_type;
5741da177e4SLinus Torvalds 	to->priority = from->priority;
5751da177e4SLinus Torvalds 	to->protocol = from->protocol;
576adf30907SEric Dumazet 	skb_dst_drop(to);
577adf30907SEric Dumazet 	skb_dst_set(to, dst_clone(skb_dst(from)));
5781da177e4SLinus Torvalds 	to->dev = from->dev;
57982e91ffeSThomas Graf 	to->mark = from->mark;
5801da177e4SLinus Torvalds 
5813dd1c9a1SPaolo Abeni 	skb_copy_hash(to, from);
5823dd1c9a1SPaolo Abeni 
5831da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED
5841da177e4SLinus Torvalds 	to->tc_index = from->tc_index;
5851da177e4SLinus Torvalds #endif
586e7ac05f3SYasuyuki Kozakai 	nf_copy(to, from);
587df5042f4SFlorian Westphal 	skb_ext_copy(to, from);
588984bc16cSJames Morris 	skb_copy_secmark(to, from);
5891da177e4SLinus Torvalds }
5901da177e4SLinus Torvalds 
5917d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb,
5927d8c6e39SEric W. Biederman 		 int (*output)(struct net *, struct sock *, struct sk_buff *))
5931da177e4SLinus Torvalds {
5941da177e4SLinus Torvalds 	struct sk_buff *frag;
595adf30907SEric Dumazet 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
596f60e5990Shannes@stressinduktion.org 	struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ?
597f60e5990Shannes@stressinduktion.org 				inet6_sk(skb->sk) : NULL;
5981da177e4SLinus Torvalds 	struct ipv6hdr *tmp_hdr;
5991da177e4SLinus Torvalds 	struct frag_hdr *fh;
600ef0efcd3SJunwei Hu 	unsigned int mtu, hlen, left, len, nexthdr_offset;
601a7ae1992SHerbert Xu 	int hroom, troom;
602286c2349SMartin KaFai Lau 	__be32 frag_id;
6031da177e4SLinus Torvalds 	int ptr, offset = 0, err = 0;
6041da177e4SLinus Torvalds 	u8 *prevhdr, nexthdr = 0;
6051da177e4SLinus Torvalds 
6067dd7eb95SDavid S. Miller 	err = ip6_find_1stfragopt(skb, &prevhdr);
6077dd7eb95SDavid S. Miller 	if (err < 0)
6082423496aSCraig Gallek 		goto fail;
6097dd7eb95SDavid S. Miller 	hlen = err;
6101da177e4SLinus Torvalds 	nexthdr = *prevhdr;
611ef0efcd3SJunwei Hu 	nexthdr_offset = prevhdr - skb_network_header(skb);
6121da177e4SLinus Torvalds 
613628a5c56SJohn Heffner 	mtu = ip6_skb_dst_mtu(skb);
614b881ef76SJohn Heffner 
615b881ef76SJohn Heffner 	/* We must not fragment if the socket is set to force MTU discovery
61614f3ad6fSUlrich Weber 	 * or if the skb it not generated by a local socket.
617b881ef76SJohn Heffner 	 */
618485fca66SFlorian Westphal 	if (unlikely(!skb->ignore_df && skb->len > mtu))
619485fca66SFlorian Westphal 		goto fail_toobig;
620a34a101eSEric Dumazet 
621485fca66SFlorian Westphal 	if (IP6CB(skb)->frag_max_size) {
622485fca66SFlorian Westphal 		if (IP6CB(skb)->frag_max_size > mtu)
623485fca66SFlorian Westphal 			goto fail_toobig;
624485fca66SFlorian Westphal 
625485fca66SFlorian Westphal 		/* don't send fragments larger than what we received */
626485fca66SFlorian Westphal 		mtu = IP6CB(skb)->frag_max_size;
627485fca66SFlorian Westphal 		if (mtu < IPV6_MIN_MTU)
628485fca66SFlorian Westphal 			mtu = IPV6_MIN_MTU;
629b881ef76SJohn Heffner 	}
630b881ef76SJohn Heffner 
631d91675f9SYOSHIFUJI Hideaki 	if (np && np->frag_size < mtu) {
632d91675f9SYOSHIFUJI Hideaki 		if (np->frag_size)
633d91675f9SYOSHIFUJI Hideaki 			mtu = np->frag_size;
634d91675f9SYOSHIFUJI Hideaki 	}
63589bc7848SHannes Frederic Sowa 	if (mtu < hlen + sizeof(struct frag_hdr) + 8)
636b72a2b01SHannes Frederic Sowa 		goto fail_toobig;
6371e0d69a9SHannes Frederic Sowa 	mtu -= hlen + sizeof(struct frag_hdr);
6381da177e4SLinus Torvalds 
639fd0273d7SMartin KaFai Lau 	frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr,
640fd0273d7SMartin KaFai Lau 				    &ipv6_hdr(skb)->saddr);
641286c2349SMartin KaFai Lau 
642405c92f7SHannes Frederic Sowa 	if (skb->ip_summed == CHECKSUM_PARTIAL &&
643405c92f7SHannes Frederic Sowa 	    (err = skb_checksum_help(skb)))
644405c92f7SHannes Frederic Sowa 		goto fail;
645405c92f7SHannes Frederic Sowa 
646ef0efcd3SJunwei Hu 	prevhdr = skb_network_header(skb) + nexthdr_offset;
6471d325d21SFlorian Westphal 	hroom = LL_RESERVED_SPACE(rt->dst.dev);
64821dc3301SDavid S. Miller 	if (skb_has_frag_list(skb)) {
649c72d8cdaSAlexey Dobriyan 		unsigned int first_len = skb_pagelen(skb);
6503d13008eSEric Dumazet 		struct sk_buff *frag2;
6511da177e4SLinus Torvalds 
6521da177e4SLinus Torvalds 		if (first_len - hlen > mtu ||
6531da177e4SLinus Torvalds 		    ((first_len - hlen) & 7) ||
6541d325d21SFlorian Westphal 		    skb_cloned(skb) ||
6551d325d21SFlorian Westphal 		    skb_headroom(skb) < (hroom + sizeof(struct frag_hdr)))
6561da177e4SLinus Torvalds 			goto slow_path;
6571da177e4SLinus Torvalds 
6584d9092bbSDavid S. Miller 		skb_walk_frags(skb, frag) {
6591da177e4SLinus Torvalds 			/* Correct geometry. */
6601da177e4SLinus Torvalds 			if (frag->len > mtu ||
6611da177e4SLinus Torvalds 			    ((frag->len & 7) && frag->next) ||
6621d325d21SFlorian Westphal 			    skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr)))
6633d13008eSEric Dumazet 				goto slow_path_clean;
6641da177e4SLinus Torvalds 
6651da177e4SLinus Torvalds 			/* Partially cloned skb? */
6661da177e4SLinus Torvalds 			if (skb_shared(frag))
6673d13008eSEric Dumazet 				goto slow_path_clean;
6682fdba6b0SHerbert Xu 
6692fdba6b0SHerbert Xu 			BUG_ON(frag->sk);
6702fdba6b0SHerbert Xu 			if (skb->sk) {
6712fdba6b0SHerbert Xu 				frag->sk = skb->sk;
6722fdba6b0SHerbert Xu 				frag->destructor = sock_wfree;
6732fdba6b0SHerbert Xu 			}
6743d13008eSEric Dumazet 			skb->truesize -= frag->truesize;
6751da177e4SLinus Torvalds 		}
6761da177e4SLinus Torvalds 
6771da177e4SLinus Torvalds 		err = 0;
6781da177e4SLinus Torvalds 		offset = 0;
6791da177e4SLinus Torvalds 		/* BUILD HEADER */
6801da177e4SLinus Torvalds 
6819a217a1cSYOSHIFUJI Hideaki 		*prevhdr = NEXTHDR_FRAGMENT;
682d56f90a7SArnaldo Carvalho de Melo 		tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC);
6831da177e4SLinus Torvalds 		if (!tmp_hdr) {
6841d325d21SFlorian Westphal 			err = -ENOMEM;
6851d325d21SFlorian Westphal 			goto fail;
6861da177e4SLinus Torvalds 		}
6871d325d21SFlorian Westphal 		frag = skb_shinfo(skb)->frag_list;
6881d325d21SFlorian Westphal 		skb_frag_list_init(skb);
6891da177e4SLinus Torvalds 
6901da177e4SLinus Torvalds 		__skb_pull(skb, hlen);
691d58ff351SJohannes Berg 		fh = __skb_push(skb, sizeof(struct frag_hdr));
692e2d1bca7SArnaldo Carvalho de Melo 		__skb_push(skb, hlen);
693e2d1bca7SArnaldo Carvalho de Melo 		skb_reset_network_header(skb);
694d56f90a7SArnaldo Carvalho de Melo 		memcpy(skb_network_header(skb), tmp_hdr, hlen);
6951da177e4SLinus Torvalds 
6961da177e4SLinus Torvalds 		fh->nexthdr = nexthdr;
6971da177e4SLinus Torvalds 		fh->reserved = 0;
6981da177e4SLinus Torvalds 		fh->frag_off = htons(IP6_MF);
699286c2349SMartin KaFai Lau 		fh->identification = frag_id;
7001da177e4SLinus Torvalds 
7011da177e4SLinus Torvalds 		first_len = skb_pagelen(skb);
7021da177e4SLinus Torvalds 		skb->data_len = first_len - skb_headlen(skb);
7031da177e4SLinus Torvalds 		skb->len = first_len;
7040660e03fSArnaldo Carvalho de Melo 		ipv6_hdr(skb)->payload_len = htons(first_len -
7050660e03fSArnaldo Carvalho de Melo 						   sizeof(struct ipv6hdr));
7061da177e4SLinus Torvalds 
7071da177e4SLinus Torvalds 		for (;;) {
7081da177e4SLinus Torvalds 			/* Prepare header of the next frame,
7091da177e4SLinus Torvalds 			 * before previous one went down. */
7101da177e4SLinus Torvalds 			if (frag) {
7111da177e4SLinus Torvalds 				frag->ip_summed = CHECKSUM_NONE;
712badff6d0SArnaldo Carvalho de Melo 				skb_reset_transport_header(frag);
713d58ff351SJohannes Berg 				fh = __skb_push(frag, sizeof(struct frag_hdr));
714e2d1bca7SArnaldo Carvalho de Melo 				__skb_push(frag, hlen);
715e2d1bca7SArnaldo Carvalho de Melo 				skb_reset_network_header(frag);
716d56f90a7SArnaldo Carvalho de Melo 				memcpy(skb_network_header(frag), tmp_hdr,
717d56f90a7SArnaldo Carvalho de Melo 				       hlen);
7181da177e4SLinus Torvalds 				offset += skb->len - hlen - sizeof(struct frag_hdr);
7191da177e4SLinus Torvalds 				fh->nexthdr = nexthdr;
7201da177e4SLinus Torvalds 				fh->reserved = 0;
7211da177e4SLinus Torvalds 				fh->frag_off = htons(offset);
72253b24b8fSIan Morris 				if (frag->next)
7231da177e4SLinus Torvalds 					fh->frag_off |= htons(IP6_MF);
7241da177e4SLinus Torvalds 				fh->identification = frag_id;
7250660e03fSArnaldo Carvalho de Melo 				ipv6_hdr(frag)->payload_len =
7260660e03fSArnaldo Carvalho de Melo 						htons(frag->len -
7270660e03fSArnaldo Carvalho de Melo 						      sizeof(struct ipv6hdr));
7281da177e4SLinus Torvalds 				ip6_copy_metadata(frag, skb);
7291da177e4SLinus Torvalds 			}
7301da177e4SLinus Torvalds 
7317d8c6e39SEric W. Biederman 			err = output(net, sk, skb);
732dafee490SWei Dong 			if (!err)
733d8d1f30bSChangli Gao 				IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7343bd653c8SDenis V. Lunev 					      IPSTATS_MIB_FRAGCREATES);
735dafee490SWei Dong 
7361da177e4SLinus Torvalds 			if (err || !frag)
7371da177e4SLinus Torvalds 				break;
7381da177e4SLinus Torvalds 
7391da177e4SLinus Torvalds 			skb = frag;
7401da177e4SLinus Torvalds 			frag = skb->next;
741a8305bffSDavid S. Miller 			skb_mark_not_on_list(skb);
7421da177e4SLinus Torvalds 		}
7431da177e4SLinus Torvalds 
7441da177e4SLinus Torvalds 		kfree(tmp_hdr);
7451da177e4SLinus Torvalds 
7461da177e4SLinus Torvalds 		if (err == 0) {
747d8d1f30bSChangli Gao 			IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7483bd653c8SDenis V. Lunev 				      IPSTATS_MIB_FRAGOKS);
7491da177e4SLinus Torvalds 			return 0;
7501da177e4SLinus Torvalds 		}
7511da177e4SLinus Torvalds 
75246cfd725SFlorian Westphal 		kfree_skb_list(frag);
7531da177e4SLinus Torvalds 
754d8d1f30bSChangli Gao 		IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7553bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGFAILS);
7561da177e4SLinus Torvalds 		return err;
7573d13008eSEric Dumazet 
7583d13008eSEric Dumazet slow_path_clean:
7593d13008eSEric Dumazet 		skb_walk_frags(skb, frag2) {
7603d13008eSEric Dumazet 			if (frag2 == frag)
7613d13008eSEric Dumazet 				break;
7623d13008eSEric Dumazet 			frag2->sk = NULL;
7633d13008eSEric Dumazet 			frag2->destructor = NULL;
7643d13008eSEric Dumazet 			skb->truesize += frag2->truesize;
7653d13008eSEric Dumazet 		}
7661da177e4SLinus Torvalds 	}
7671da177e4SLinus Torvalds 
7681da177e4SLinus Torvalds slow_path:
7691da177e4SLinus Torvalds 	left = skb->len - hlen;		/* Space per frame */
7701da177e4SLinus Torvalds 	ptr = hlen;			/* Where to start from */
7711da177e4SLinus Torvalds 
7721da177e4SLinus Torvalds 	/*
7731da177e4SLinus Torvalds 	 *	Fragment the datagram.
7741da177e4SLinus Torvalds 	 */
7751da177e4SLinus Torvalds 
776a7ae1992SHerbert Xu 	troom = rt->dst.dev->needed_tailroom;
7771da177e4SLinus Torvalds 
7781da177e4SLinus Torvalds 	/*
7791da177e4SLinus Torvalds 	 *	Keep copying data until we run out.
7801da177e4SLinus Torvalds 	 */
7811da177e4SLinus Torvalds 	while (left > 0)	{
78279e49503SFlorian Westphal 		u8 *fragnexthdr_offset;
78379e49503SFlorian Westphal 
7841da177e4SLinus Torvalds 		len = left;
7851da177e4SLinus Torvalds 		/* IF: it doesn't fit, use 'mtu' - the data space left */
7861da177e4SLinus Torvalds 		if (len > mtu)
7871da177e4SLinus Torvalds 			len = mtu;
7881da177e4SLinus Torvalds 		/* IF: we are not sending up to and including the packet end
7891da177e4SLinus Torvalds 		   then align the next start on an eight byte boundary */
7901da177e4SLinus Torvalds 		if (len < left)	{
7911da177e4SLinus Torvalds 			len &= ~7;
7921da177e4SLinus Torvalds 		}
7931da177e4SLinus Torvalds 
794cbffccc9SJoe Perches 		/* Allocate buffer */
795cbffccc9SJoe Perches 		frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) +
796cbffccc9SJoe Perches 				 hroom + troom, GFP_ATOMIC);
797cbffccc9SJoe Perches 		if (!frag) {
7981da177e4SLinus Torvalds 			err = -ENOMEM;
7991da177e4SLinus Torvalds 			goto fail;
8001da177e4SLinus Torvalds 		}
8011da177e4SLinus Torvalds 
8021da177e4SLinus Torvalds 		/*
8031da177e4SLinus Torvalds 		 *	Set up data on packet
8041da177e4SLinus Torvalds 		 */
8051da177e4SLinus Torvalds 
8061da177e4SLinus Torvalds 		ip6_copy_metadata(frag, skb);
807a7ae1992SHerbert Xu 		skb_reserve(frag, hroom);
8081da177e4SLinus Torvalds 		skb_put(frag, len + hlen + sizeof(struct frag_hdr));
809c1d2bbe1SArnaldo Carvalho de Melo 		skb_reset_network_header(frag);
810badff6d0SArnaldo Carvalho de Melo 		fh = (struct frag_hdr *)(skb_network_header(frag) + hlen);
811b0e380b1SArnaldo Carvalho de Melo 		frag->transport_header = (frag->network_header + hlen +
812b0e380b1SArnaldo Carvalho de Melo 					  sizeof(struct frag_hdr));
8131da177e4SLinus Torvalds 
8141da177e4SLinus Torvalds 		/*
8151da177e4SLinus Torvalds 		 *	Charge the memory for the fragment to any owner
8161da177e4SLinus Torvalds 		 *	it might possess
8171da177e4SLinus Torvalds 		 */
8181da177e4SLinus Torvalds 		if (skb->sk)
8191da177e4SLinus Torvalds 			skb_set_owner_w(frag, skb->sk);
8201da177e4SLinus Torvalds 
8211da177e4SLinus Torvalds 		/*
8221da177e4SLinus Torvalds 		 *	Copy the packet header into the new buffer.
8231da177e4SLinus Torvalds 		 */
824d626f62bSArnaldo Carvalho de Melo 		skb_copy_from_linear_data(skb, skb_network_header(frag), hlen);
8251da177e4SLinus Torvalds 
82679e49503SFlorian Westphal 		fragnexthdr_offset = skb_network_header(frag);
82779e49503SFlorian Westphal 		fragnexthdr_offset += prevhdr - skb_network_header(skb);
82879e49503SFlorian Westphal 		*fragnexthdr_offset = NEXTHDR_FRAGMENT;
82979e49503SFlorian Westphal 
8301da177e4SLinus Torvalds 		/*
8311da177e4SLinus Torvalds 		 *	Build fragment header.
8321da177e4SLinus Torvalds 		 */
8331da177e4SLinus Torvalds 		fh->nexthdr = nexthdr;
8341da177e4SLinus Torvalds 		fh->reserved = 0;
8351da177e4SLinus Torvalds 		fh->identification = frag_id;
8361da177e4SLinus Torvalds 
8371da177e4SLinus Torvalds 		/*
8381da177e4SLinus Torvalds 		 *	Copy a block of the IP datagram.
8391da177e4SLinus Torvalds 		 */
840e3f0b86bSHimangi Saraogi 		BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag),
841e3f0b86bSHimangi Saraogi 				     len));
8421da177e4SLinus Torvalds 		left -= len;
8431da177e4SLinus Torvalds 
8441da177e4SLinus Torvalds 		fh->frag_off = htons(offset);
8451da177e4SLinus Torvalds 		if (left > 0)
8461da177e4SLinus Torvalds 			fh->frag_off |= htons(IP6_MF);
8470660e03fSArnaldo Carvalho de Melo 		ipv6_hdr(frag)->payload_len = htons(frag->len -
8480660e03fSArnaldo Carvalho de Melo 						    sizeof(struct ipv6hdr));
8491da177e4SLinus Torvalds 
8501da177e4SLinus Torvalds 		ptr += len;
8511da177e4SLinus Torvalds 		offset += len;
8521da177e4SLinus Torvalds 
8531da177e4SLinus Torvalds 		/*
8541da177e4SLinus Torvalds 		 *	Put this fragment into the sending queue.
8551da177e4SLinus Torvalds 		 */
8567d8c6e39SEric W. Biederman 		err = output(net, sk, frag);
8571da177e4SLinus Torvalds 		if (err)
8581da177e4SLinus Torvalds 			goto fail;
859dafee490SWei Dong 
860adf30907SEric Dumazet 		IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
8613bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGCREATES);
8621da177e4SLinus Torvalds 	}
863adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
864a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGOKS);
865808db80aSEric Dumazet 	consume_skb(skb);
8661da177e4SLinus Torvalds 	return err;
8671da177e4SLinus Torvalds 
868485fca66SFlorian Westphal fail_toobig:
869485fca66SFlorian Westphal 	if (skb->sk && dst_allfrag(skb_dst(skb)))
870485fca66SFlorian Westphal 		sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK);
871485fca66SFlorian Westphal 
872485fca66SFlorian Westphal 	icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
873485fca66SFlorian Westphal 	err = -EMSGSIZE;
874485fca66SFlorian Westphal 
8751da177e4SLinus Torvalds fail:
876adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
877a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGFAILS);
8781da177e4SLinus Torvalds 	kfree_skb(skb);
8791da177e4SLinus Torvalds 	return err;
8801da177e4SLinus Torvalds }
8811da177e4SLinus Torvalds 
882b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key,
883b71d1d42SEric Dumazet 			       const struct in6_addr *fl_addr,
884b71d1d42SEric Dumazet 			       const struct in6_addr *addr_cache)
885cf6b1982SYOSHIFUJI Hideaki {
886a02cec21SEric Dumazet 	return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) &&
88763159f29SIan Morris 		(!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache));
888cf6b1982SYOSHIFUJI Hideaki }
889cf6b1982SYOSHIFUJI Hideaki 
890497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk,
891497c615aSHerbert Xu 					  struct dst_entry *dst,
892b71d1d42SEric Dumazet 					  const struct flowi6 *fl6)
8931da177e4SLinus Torvalds {
8941da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
895a963a37dSEric Dumazet 	struct rt6_info *rt;
8961da177e4SLinus Torvalds 
897497c615aSHerbert Xu 	if (!dst)
898497c615aSHerbert Xu 		goto out;
8991da177e4SLinus Torvalds 
900a963a37dSEric Dumazet 	if (dst->ops->family != AF_INET6) {
901a963a37dSEric Dumazet 		dst_release(dst);
902a963a37dSEric Dumazet 		return NULL;
903a963a37dSEric Dumazet 	}
904a963a37dSEric Dumazet 
905a963a37dSEric Dumazet 	rt = (struct rt6_info *)dst;
9061da177e4SLinus Torvalds 	/* Yes, checking route validity in not connected
907d76e60a5SDavid S. Miller 	 * case is not very simple. Take into account,
908d76e60a5SDavid S. Miller 	 * that we do not support routing by source, TOS,
909d76e60a5SDavid S. Miller 	 * and MSG_DONTROUTE		--ANK (980726)
910d76e60a5SDavid S. Miller 	 *
911cf6b1982SYOSHIFUJI Hideaki 	 * 1. ip6_rt_check(): If route was host route,
912cf6b1982SYOSHIFUJI Hideaki 	 *    check that cached destination is current.
913d76e60a5SDavid S. Miller 	 *    If it is network route, we still may
914d76e60a5SDavid S. Miller 	 *    check its validity using saved pointer
915d76e60a5SDavid S. Miller 	 *    to the last used address: daddr_cache.
916d76e60a5SDavid S. Miller 	 *    We do not want to save whole address now,
917d76e60a5SDavid S. Miller 	 *    (because main consumer of this service
918d76e60a5SDavid S. Miller 	 *    is tcp, which has not this problem),
919d76e60a5SDavid S. Miller 	 *    so that the last trick works only on connected
920d76e60a5SDavid S. Miller 	 *    sockets.
921d76e60a5SDavid S. Miller 	 * 2. oif also should be the same.
9221da177e4SLinus Torvalds 	 */
9234c9483b2SDavid S. Miller 	if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) ||
9248e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES
9254c9483b2SDavid S. Miller 	    ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) ||
9268e1ef0a9SYOSHIFUJI Hideaki #endif
927ca254490SDavid Ahern 	   (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) &&
928ca254490SDavid Ahern 	      (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) {
929497c615aSHerbert Xu 		dst_release(dst);
930497c615aSHerbert Xu 		dst = NULL;
9311da177e4SLinus Torvalds 	}
932497c615aSHerbert Xu 
933497c615aSHerbert Xu out:
934497c615aSHerbert Xu 	return dst;
9351da177e4SLinus Torvalds }
936497c615aSHerbert Xu 
9373aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
9384c9483b2SDavid S. Miller 			       struct dst_entry **dst, struct flowi6 *fl6)
939497c615aSHerbert Xu {
94069cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
94169cce1d1SDavid S. Miller 	struct neighbour *n;
94297cac082SDavid S. Miller 	struct rt6_info *rt;
94369cce1d1SDavid S. Miller #endif
94469cce1d1SDavid S. Miller 	int err;
9456f21c96aSPaolo Abeni 	int flags = 0;
9461da177e4SLinus Torvalds 
947e16e888bSMarkus Stenberg 	/* The correct way to handle this would be to do
948e16e888bSMarkus Stenberg 	 * ip6_route_get_saddr, and then ip6_route_output; however,
949e16e888bSMarkus Stenberg 	 * the route-specific preferred source forces the
950e16e888bSMarkus Stenberg 	 * ip6_route_output call _before_ ip6_route_get_saddr.
951e16e888bSMarkus Stenberg 	 *
952e16e888bSMarkus Stenberg 	 * In source specific routing (no src=any default route),
953e16e888bSMarkus Stenberg 	 * ip6_route_output will fail given src=any saddr, though, so
954e16e888bSMarkus Stenberg 	 * that's why we try it again later.
955e16e888bSMarkus Stenberg 	 */
956e16e888bSMarkus Stenberg 	if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) {
957a68886a6SDavid Ahern 		struct fib6_info *from;
958e16e888bSMarkus Stenberg 		struct rt6_info *rt;
959e16e888bSMarkus Stenberg 		bool had_dst = *dst != NULL;
960e16e888bSMarkus Stenberg 
961e16e888bSMarkus Stenberg 		if (!had_dst)
962e16e888bSMarkus Stenberg 			*dst = ip6_route_output(net, sk, fl6);
963e16e888bSMarkus Stenberg 		rt = (*dst)->error ? NULL : (struct rt6_info *)*dst;
964a68886a6SDavid Ahern 
965a68886a6SDavid Ahern 		rcu_read_lock();
966a68886a6SDavid Ahern 		from = rt ? rcu_dereference(rt->from) : NULL;
967a68886a6SDavid Ahern 		err = ip6_route_get_saddr(net, from, &fl6->daddr,
968e16e888bSMarkus Stenberg 					  sk ? inet6_sk(sk)->srcprefs : 0,
969e16e888bSMarkus Stenberg 					  &fl6->saddr);
970a68886a6SDavid Ahern 		rcu_read_unlock();
971a68886a6SDavid Ahern 
972e16e888bSMarkus Stenberg 		if (err)
973e16e888bSMarkus Stenberg 			goto out_err_release;
974e16e888bSMarkus Stenberg 
975e16e888bSMarkus Stenberg 		/* If we had an erroneous initial result, pretend it
976e16e888bSMarkus Stenberg 		 * never existed and let the SA-enabled version take
977e16e888bSMarkus Stenberg 		 * over.
978e16e888bSMarkus Stenberg 		 */
979e16e888bSMarkus Stenberg 		if (!had_dst && (*dst)->error) {
980e16e888bSMarkus Stenberg 			dst_release(*dst);
981e16e888bSMarkus Stenberg 			*dst = NULL;
982e16e888bSMarkus Stenberg 		}
9836f21c96aSPaolo Abeni 
9846f21c96aSPaolo Abeni 		if (fl6->flowi6_oif)
9856f21c96aSPaolo Abeni 			flags |= RT6_LOOKUP_F_IFACE;
986e16e888bSMarkus Stenberg 	}
987e16e888bSMarkus Stenberg 
98863159f29SIan Morris 	if (!*dst)
9896f21c96aSPaolo Abeni 		*dst = ip6_route_output_flags(net, sk, fl6, flags);
9901da177e4SLinus Torvalds 
991e5d08d71SIan Morris 	err = (*dst)->error;
992e5d08d71SIan Morris 	if (err)
9931da177e4SLinus Torvalds 		goto out_err_release;
9941da177e4SLinus Torvalds 
99595c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
99695c385b4SNeil Horman 	/*
99795c385b4SNeil Horman 	 * Here if the dst entry we've looked up
99895c385b4SNeil Horman 	 * has a neighbour entry that is in the INCOMPLETE
99995c385b4SNeil Horman 	 * state and the src address from the flow is
100095c385b4SNeil Horman 	 * marked as OPTIMISTIC, we release the found
100195c385b4SNeil Horman 	 * dst entry and replace it instead with the
100295c385b4SNeil Horman 	 * dst entry of the nexthop router
100395c385b4SNeil Horman 	 */
1004c56bf6feSEric Dumazet 	rt = (struct rt6_info *) *dst;
1005707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
10062647a9b0SMartin KaFai Lau 	n = __ipv6_neigh_lookup_noref(rt->dst.dev,
10072647a9b0SMartin KaFai Lau 				      rt6_nexthop(rt, &fl6->daddr));
1008707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0;
1009707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
1010707be1ffSYOSHIFUJI Hideaki / 吉藤英明 
1011707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	if (err) {
101295c385b4SNeil Horman 		struct inet6_ifaddr *ifp;
10134c9483b2SDavid S. Miller 		struct flowi6 fl_gw6;
101495c385b4SNeil Horman 		int redirect;
101595c385b4SNeil Horman 
10164c9483b2SDavid S. Miller 		ifp = ipv6_get_ifaddr(net, &fl6->saddr,
10171cab3da6SDaniel Lezcano 				      (*dst)->dev, 1);
101895c385b4SNeil Horman 
101995c385b4SNeil Horman 		redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC);
102095c385b4SNeil Horman 		if (ifp)
102195c385b4SNeil Horman 			in6_ifa_put(ifp);
102295c385b4SNeil Horman 
102395c385b4SNeil Horman 		if (redirect) {
102495c385b4SNeil Horman 			/*
102595c385b4SNeil Horman 			 * We need to get the dst entry for the
102695c385b4SNeil Horman 			 * default router instead
102795c385b4SNeil Horman 			 */
102895c385b4SNeil Horman 			dst_release(*dst);
10294c9483b2SDavid S. Miller 			memcpy(&fl_gw6, fl6, sizeof(struct flowi6));
10304c9483b2SDavid S. Miller 			memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr));
10314c9483b2SDavid S. Miller 			*dst = ip6_route_output(net, sk, &fl_gw6);
1032e5d08d71SIan Morris 			err = (*dst)->error;
1033e5d08d71SIan Morris 			if (err)
103495c385b4SNeil Horman 				goto out_err_release;
103595c385b4SNeil Horman 		}
103695c385b4SNeil Horman 	}
103795c385b4SNeil Horman #endif
1038ec5e3b0aSJonathan T. Leighton 	if (ipv6_addr_v4mapped(&fl6->saddr) &&
103900ea1ceeSWillem de Bruijn 	    !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) {
104000ea1ceeSWillem de Bruijn 		err = -EAFNOSUPPORT;
104100ea1ceeSWillem de Bruijn 		goto out_err_release;
104200ea1ceeSWillem de Bruijn 	}
104395c385b4SNeil Horman 
10441da177e4SLinus Torvalds 	return 0;
10451da177e4SLinus Torvalds 
10461da177e4SLinus Torvalds out_err_release:
10471da177e4SLinus Torvalds 	dst_release(*dst);
10481da177e4SLinus Torvalds 	*dst = NULL;
10498a966fc0SDavid Ahern 
10500d240e78SDavid Ahern 	if (err == -ENETUNREACH)
10510d240e78SDavid Ahern 		IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES);
10521da177e4SLinus Torvalds 	return err;
10531da177e4SLinus Torvalds }
105434a0b3cdSAdrian Bunk 
1055497c615aSHerbert Xu /**
1056497c615aSHerbert Xu  *	ip6_dst_lookup - perform route lookup on flow
1057497c615aSHerbert Xu  *	@sk: socket which provides route info
1058497c615aSHerbert Xu  *	@dst: pointer to dst_entry * for result
10594c9483b2SDavid S. Miller  *	@fl6: flow to lookup
1060497c615aSHerbert Xu  *
1061497c615aSHerbert Xu  *	This function performs a route lookup on the given flow.
1062497c615aSHerbert Xu  *
1063497c615aSHerbert Xu  *	It returns zero on success, or a standard errno code on error.
1064497c615aSHerbert Xu  */
1065343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst,
1066343d60aaSRoopa Prabhu 		   struct flowi6 *fl6)
1067497c615aSHerbert Xu {
1068497c615aSHerbert Xu 	*dst = NULL;
1069343d60aaSRoopa Prabhu 	return ip6_dst_lookup_tail(net, sk, dst, fl6);
1070497c615aSHerbert Xu }
10713cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup);
10723cf3dc6cSArnaldo Carvalho de Melo 
1073497c615aSHerbert Xu /**
107468d0c6d3SDavid S. Miller  *	ip6_dst_lookup_flow - perform route lookup on flow with ipsec
107568d0c6d3SDavid S. Miller  *	@sk: socket which provides route info
10764c9483b2SDavid S. Miller  *	@fl6: flow to lookup
107768d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
107868d0c6d3SDavid S. Miller  *
107968d0c6d3SDavid S. Miller  *	This function performs a route lookup on the given flow.
108068d0c6d3SDavid S. Miller  *
108168d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
108268d0c6d3SDavid S. Miller  *	error code.
108368d0c6d3SDavid S. Miller  */
10843aef934fSEric Dumazet struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6,
10850e0d44abSSteffen Klassert 				      const struct in6_addr *final_dst)
108668d0c6d3SDavid S. Miller {
108768d0c6d3SDavid S. Miller 	struct dst_entry *dst = NULL;
108868d0c6d3SDavid S. Miller 	int err;
108968d0c6d3SDavid S. Miller 
1090343d60aaSRoopa Prabhu 	err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6);
109168d0c6d3SDavid S. Miller 	if (err)
109268d0c6d3SDavid S. Miller 		return ERR_PTR(err);
109368d0c6d3SDavid S. Miller 	if (final_dst)
10944e3fd7a0SAlexey Dobriyan 		fl6->daddr = *final_dst;
10952774c131SDavid S. Miller 
1096f92ee619SSteffen Klassert 	return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0);
109768d0c6d3SDavid S. Miller }
109868d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow);
109968d0c6d3SDavid S. Miller 
110068d0c6d3SDavid S. Miller /**
110168d0c6d3SDavid S. Miller  *	ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow
110268d0c6d3SDavid S. Miller  *	@sk: socket which provides the dst cache and route info
11034c9483b2SDavid S. Miller  *	@fl6: flow to lookup
110468d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
110596818159SAlexey Kodanev  *	@connected: whether @sk is connected or not
1106497c615aSHerbert Xu  *
1107497c615aSHerbert Xu  *	This function performs a route lookup on the given flow with the
1108497c615aSHerbert Xu  *	possibility of using the cached route in the socket if it is valid.
1109497c615aSHerbert Xu  *	It will take the socket dst lock when operating on the dst cache.
1110497c615aSHerbert Xu  *	As a result, this function can only be used in process context.
1111497c615aSHerbert Xu  *
111296818159SAlexey Kodanev  *	In addition, for a connected socket, cache the dst in the socket
111396818159SAlexey Kodanev  *	if the current cache is not valid.
111496818159SAlexey Kodanev  *
111568d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
111668d0c6d3SDavid S. Miller  *	error code.
1117497c615aSHerbert Xu  */
11184c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6,
111996818159SAlexey Kodanev 					 const struct in6_addr *final_dst,
112096818159SAlexey Kodanev 					 bool connected)
1121497c615aSHerbert Xu {
112268d0c6d3SDavid S. Miller 	struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie);
1123497c615aSHerbert Xu 
11244c9483b2SDavid S. Miller 	dst = ip6_sk_dst_check(sk, dst, fl6);
112596818159SAlexey Kodanev 	if (dst)
112696818159SAlexey Kodanev 		return dst;
112796818159SAlexey Kodanev 
112800bc0ef5SJakub Sitnicki 	dst = ip6_dst_lookup_flow(sk, fl6, final_dst);
112996818159SAlexey Kodanev 	if (connected && !IS_ERR(dst))
113096818159SAlexey Kodanev 		ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6);
113168d0c6d3SDavid S. Miller 
113200bc0ef5SJakub Sitnicki 	return dst;
113368d0c6d3SDavid S. Miller }
113468d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow);
1135497c615aSHerbert Xu 
11360178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src,
11370178b695SHerbert Xu 					       gfp_t gfp)
11380178b695SHerbert Xu {
11390178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
11400178b695SHerbert Xu }
11410178b695SHerbert Xu 
11420178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src,
11430178b695SHerbert Xu 						gfp_t gfp)
11440178b695SHerbert Xu {
11450178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
11460178b695SHerbert Xu }
11470178b695SHerbert Xu 
114875a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu,
11490c183379SGao feng 				int *maxfraglen,
11500c183379SGao feng 				unsigned int fragheaderlen,
11510c183379SGao feng 				struct sk_buff *skb,
115275a493e6SHannes Frederic Sowa 				struct rt6_info *rt,
1153e367c2d0Slucien 				unsigned int orig_mtu)
11540c183379SGao feng {
11550c183379SGao feng 	if (!(rt->dst.flags & DST_XFRM_TUNNEL)) {
115663159f29SIan Morris 		if (!skb) {
11570c183379SGao feng 			/* first fragment, reserve header_len */
1158e367c2d0Slucien 			*mtu = orig_mtu - rt->dst.header_len;
11590c183379SGao feng 
11600c183379SGao feng 		} else {
11610c183379SGao feng 			/*
11620c183379SGao feng 			 * this fragment is not first, the headers
11630c183379SGao feng 			 * space is regarded as data space.
11640c183379SGao feng 			 */
1165e367c2d0Slucien 			*mtu = orig_mtu;
11660c183379SGao feng 		}
11670c183379SGao feng 		*maxfraglen = ((*mtu - fragheaderlen) & ~7)
11680c183379SGao feng 			      + fragheaderlen - sizeof(struct frag_hdr);
11690c183379SGao feng 	}
11700c183379SGao feng }
11710c183379SGao feng 
1172366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork,
117326879da5SWei Wang 			  struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6,
11745fdaa88dSWillem de Bruijn 			  struct rt6_info *rt, struct flowi6 *fl6)
1175366e41d9SVlad Yasevich {
1176366e41d9SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
1177366e41d9SVlad Yasevich 	unsigned int mtu;
117826879da5SWei Wang 	struct ipv6_txoptions *opt = ipc6->opt;
1179366e41d9SVlad Yasevich 
1180366e41d9SVlad Yasevich 	/*
1181366e41d9SVlad Yasevich 	 * setup for corking
1182366e41d9SVlad Yasevich 	 */
1183366e41d9SVlad Yasevich 	if (opt) {
1184366e41d9SVlad Yasevich 		if (WARN_ON(v6_cork->opt))
1185366e41d9SVlad Yasevich 			return -EINVAL;
1186366e41d9SVlad Yasevich 
1187864e2a1fSEric Dumazet 		v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation);
118863159f29SIan Morris 		if (unlikely(!v6_cork->opt))
1189366e41d9SVlad Yasevich 			return -ENOBUFS;
1190366e41d9SVlad Yasevich 
1191864e2a1fSEric Dumazet 		v6_cork->opt->tot_len = sizeof(*opt);
1192366e41d9SVlad Yasevich 		v6_cork->opt->opt_flen = opt->opt_flen;
1193366e41d9SVlad Yasevich 		v6_cork->opt->opt_nflen = opt->opt_nflen;
1194366e41d9SVlad Yasevich 
1195366e41d9SVlad Yasevich 		v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt,
1196366e41d9SVlad Yasevich 						    sk->sk_allocation);
1197366e41d9SVlad Yasevich 		if (opt->dst0opt && !v6_cork->opt->dst0opt)
1198366e41d9SVlad Yasevich 			return -ENOBUFS;
1199366e41d9SVlad Yasevich 
1200366e41d9SVlad Yasevich 		v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt,
1201366e41d9SVlad Yasevich 						    sk->sk_allocation);
1202366e41d9SVlad Yasevich 		if (opt->dst1opt && !v6_cork->opt->dst1opt)
1203366e41d9SVlad Yasevich 			return -ENOBUFS;
1204366e41d9SVlad Yasevich 
1205366e41d9SVlad Yasevich 		v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt,
1206366e41d9SVlad Yasevich 						   sk->sk_allocation);
1207366e41d9SVlad Yasevich 		if (opt->hopopt && !v6_cork->opt->hopopt)
1208366e41d9SVlad Yasevich 			return -ENOBUFS;
1209366e41d9SVlad Yasevich 
1210366e41d9SVlad Yasevich 		v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt,
1211366e41d9SVlad Yasevich 						    sk->sk_allocation);
1212366e41d9SVlad Yasevich 		if (opt->srcrt && !v6_cork->opt->srcrt)
1213366e41d9SVlad Yasevich 			return -ENOBUFS;
1214366e41d9SVlad Yasevich 
1215366e41d9SVlad Yasevich 		/* need source address above miyazawa*/
1216366e41d9SVlad Yasevich 	}
1217366e41d9SVlad Yasevich 	dst_hold(&rt->dst);
1218366e41d9SVlad Yasevich 	cork->base.dst = &rt->dst;
1219366e41d9SVlad Yasevich 	cork->fl.u.ip6 = *fl6;
122026879da5SWei Wang 	v6_cork->hop_limit = ipc6->hlimit;
122126879da5SWei Wang 	v6_cork->tclass = ipc6->tclass;
1222366e41d9SVlad Yasevich 	if (rt->dst.flags & DST_XFRM_TUNNEL)
1223366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1224749439bfSMike Maloney 		      READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst);
1225366e41d9SVlad Yasevich 	else
1226366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1227c02b3741SDavid S. Miller 			READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst));
1228366e41d9SVlad Yasevich 	if (np->frag_size < mtu) {
1229366e41d9SVlad Yasevich 		if (np->frag_size)
1230366e41d9SVlad Yasevich 			mtu = np->frag_size;
1231366e41d9SVlad Yasevich 	}
1232749439bfSMike Maloney 	if (mtu < IPV6_MIN_MTU)
1233749439bfSMike Maloney 		return -EINVAL;
1234366e41d9SVlad Yasevich 	cork->base.fragsize = mtu;
1235fbf47813SWillem de Bruijn 	cork->base.gso_size = ipc6->gso_size;
1236678ca42dSWillem de Bruijn 	cork->base.tx_flags = 0;
1237678ca42dSWillem de Bruijn 	sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags);
1238bec1f6f6SWillem de Bruijn 
12390f6c480fSDavid Miller 	if (dst_allfrag(xfrm_dst_path(&rt->dst)))
1240366e41d9SVlad Yasevich 		cork->base.flags |= IPCORK_ALLFRAG;
1241366e41d9SVlad Yasevich 	cork->base.length = 0;
1242366e41d9SVlad Yasevich 
12435fdaa88dSWillem de Bruijn 	cork->base.transmit_time = ipc6->sockc.transmit_time;
1244a818f75eSJesus Sanchez-Palencia 
1245366e41d9SVlad Yasevich 	return 0;
1246366e41d9SVlad Yasevich }
1247366e41d9SVlad Yasevich 
12480bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk,
12490bbe84a6SVlad Yasevich 			     struct flowi6 *fl6,
12500bbe84a6SVlad Yasevich 			     struct sk_buff_head *queue,
12510bbe84a6SVlad Yasevich 			     struct inet_cork *cork,
12520bbe84a6SVlad Yasevich 			     struct inet6_cork *v6_cork,
12530bbe84a6SVlad Yasevich 			     struct page_frag *pfrag,
12540bbe84a6SVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
12550bbe84a6SVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
12561da177e4SLinus Torvalds 			     void *from, int length, int transhdrlen,
12575fdaa88dSWillem de Bruijn 			     unsigned int flags, struct ipcm6_cookie *ipc6)
12581da177e4SLinus Torvalds {
12590c183379SGao feng 	struct sk_buff *skb, *skb_prev = NULL;
126010b8a3deSPaolo Abeni 	unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu;
1261b5947e5dSWillem de Bruijn 	struct ubuf_info *uarg = NULL;
12620bbe84a6SVlad Yasevich 	int exthdrlen = 0;
12630bbe84a6SVlad Yasevich 	int dst_exthdrlen = 0;
12641da177e4SLinus Torvalds 	int hh_len;
12651da177e4SLinus Torvalds 	int copy;
12661da177e4SLinus Torvalds 	int err;
12671da177e4SLinus Torvalds 	int offset = 0;
126809c2d251SWillem de Bruijn 	u32 tskey = 0;
12690bbe84a6SVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->dst;
12700bbe84a6SVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
127132dce968SVlad Yasevich 	int csummode = CHECKSUM_NONE;
1272682b1a9dSHannes Frederic Sowa 	unsigned int maxnonfragsize, headersize;
12731f4c6eb2SEric Dumazet 	unsigned int wmem_alloc_delta = 0;
127452900d22SWillem de Bruijn 	bool paged, extra_uref;
12751da177e4SLinus Torvalds 
12760bbe84a6SVlad Yasevich 	skb = skb_peek_tail(queue);
12770bbe84a6SVlad Yasevich 	if (!skb) {
12780bbe84a6SVlad Yasevich 		exthdrlen = opt ? opt->opt_flen : 0;
12797efdba5bSRomain KUNTZ 		dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len;
12801da177e4SLinus Torvalds 	}
12810bbe84a6SVlad Yasevich 
128215e36f5bSWillem de Bruijn 	paged = !!cork->gso_size;
1283bec1f6f6SWillem de Bruijn 	mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize;
1284e367c2d0Slucien 	orig_mtu = mtu;
12851da177e4SLinus Torvalds 
1286678ca42dSWillem de Bruijn 	if (cork->tx_flags & SKBTX_ANY_SW_TSTAMP &&
1287678ca42dSWillem de Bruijn 	    sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID)
1288678ca42dSWillem de Bruijn 		tskey = sk->sk_tskey++;
1289678ca42dSWillem de Bruijn 
1290d8d1f30bSChangli Gao 	hh_len = LL_RESERVED_SPACE(rt->dst.dev);
12911da177e4SLinus Torvalds 
1292a1b05140SMasahide NAKAMURA 	fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len +
1293b4ce9277SHerbert Xu 			(opt ? opt->opt_nflen : 0);
12944df98e76SHannes Frederic Sowa 	maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen -
12954df98e76SHannes Frederic Sowa 		     sizeof(struct frag_hdr);
12961da177e4SLinus Torvalds 
12974df98e76SHannes Frederic Sowa 	headersize = sizeof(struct ipv6hdr) +
12983a1cebe7SHannes Frederic Sowa 		     (opt ? opt->opt_flen + opt->opt_nflen : 0) +
12994df98e76SHannes Frederic Sowa 		     (dst_allfrag(&rt->dst) ?
13004df98e76SHannes Frederic Sowa 		      sizeof(struct frag_hdr) : 0) +
13014df98e76SHannes Frederic Sowa 		     rt->rt6i_nfheader_len;
13024df98e76SHannes Frederic Sowa 
130310b8a3deSPaolo Abeni 	/* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit
130410b8a3deSPaolo Abeni 	 * the first fragment
130510b8a3deSPaolo Abeni 	 */
130610b8a3deSPaolo Abeni 	if (headersize + transhdrlen > mtu)
130710b8a3deSPaolo Abeni 		goto emsgsize;
130810b8a3deSPaolo Abeni 
130926879da5SWei Wang 	if (cork->length + length > mtu - headersize && ipc6->dontfrag &&
13104df98e76SHannes Frederic Sowa 	    (sk->sk_protocol == IPPROTO_UDP ||
13114df98e76SHannes Frederic Sowa 	     sk->sk_protocol == IPPROTO_RAW)) {
13124df98e76SHannes Frederic Sowa 		ipv6_local_rxpmtu(sk, fl6, mtu - headersize +
13134df98e76SHannes Frederic Sowa 				sizeof(struct ipv6hdr));
13144df98e76SHannes Frederic Sowa 		goto emsgsize;
13154df98e76SHannes Frederic Sowa 	}
13164df98e76SHannes Frederic Sowa 
1317682b1a9dSHannes Frederic Sowa 	if (ip6_sk_ignore_df(sk))
1318682b1a9dSHannes Frederic Sowa 		maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN;
1319682b1a9dSHannes Frederic Sowa 	else
1320682b1a9dSHannes Frederic Sowa 		maxnonfragsize = mtu;
1321682b1a9dSHannes Frederic Sowa 
13224df98e76SHannes Frederic Sowa 	if (cork->length + length > maxnonfragsize - headersize) {
13234df98e76SHannes Frederic Sowa emsgsize:
132410b8a3deSPaolo Abeni 		pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0);
132510b8a3deSPaolo Abeni 		ipv6_local_error(sk, EMSGSIZE, fl6, pmtu);
13261da177e4SLinus Torvalds 		return -EMSGSIZE;
13271da177e4SLinus Torvalds 	}
1328682b1a9dSHannes Frederic Sowa 
1329682b1a9dSHannes Frederic Sowa 	/* CHECKSUM_PARTIAL only with no extension headers and when
1330682b1a9dSHannes Frederic Sowa 	 * we are not going to fragment
1331682b1a9dSHannes Frederic Sowa 	 */
1332682b1a9dSHannes Frederic Sowa 	if (transhdrlen && sk->sk_protocol == IPPROTO_UDP &&
1333682b1a9dSHannes Frederic Sowa 	    headersize == sizeof(struct ipv6hdr) &&
13342b89ed65SVlad Yasevich 	    length <= mtu - headersize &&
1335bec1f6f6SWillem de Bruijn 	    (!(flags & MSG_MORE) || cork->gso_size) &&
1336c8cd0989STom Herbert 	    rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM))
1337682b1a9dSHannes Frederic Sowa 		csummode = CHECKSUM_PARTIAL;
13381da177e4SLinus Torvalds 
1339b5947e5dSWillem de Bruijn 	if (flags & MSG_ZEROCOPY && length && sock_flag(sk, SOCK_ZEROCOPY)) {
1340b5947e5dSWillem de Bruijn 		uarg = sock_zerocopy_realloc(sk, length, skb_zcopy(skb));
1341b5947e5dSWillem de Bruijn 		if (!uarg)
1342b5947e5dSWillem de Bruijn 			return -ENOBUFS;
134352900d22SWillem de Bruijn 		extra_uref = true;
1344b5947e5dSWillem de Bruijn 		if (rt->dst.dev->features & NETIF_F_SG &&
1345b5947e5dSWillem de Bruijn 		    csummode == CHECKSUM_PARTIAL) {
1346b5947e5dSWillem de Bruijn 			paged = true;
1347b5947e5dSWillem de Bruijn 		} else {
1348b5947e5dSWillem de Bruijn 			uarg->zerocopy = 0;
134952900d22SWillem de Bruijn 			skb_zcopy_set(skb, uarg, &extra_uref);
1350b5947e5dSWillem de Bruijn 		}
1351b5947e5dSWillem de Bruijn 	}
1352b5947e5dSWillem de Bruijn 
13531da177e4SLinus Torvalds 	/*
13541da177e4SLinus Torvalds 	 * Let's try using as much space as possible.
13551da177e4SLinus Torvalds 	 * Use MTU if total length of the message fits into the MTU.
13561da177e4SLinus Torvalds 	 * Otherwise, we need to reserve fragment header and
13571da177e4SLinus Torvalds 	 * fragment alignment (= 8-15 octects, in total).
13581da177e4SLinus Torvalds 	 *
13591da177e4SLinus Torvalds 	 * Note that we may need to "move" the data from the tail of
13601da177e4SLinus Torvalds 	 * of the buffer to the new fragment when we split
13611da177e4SLinus Torvalds 	 * the message.
13621da177e4SLinus Torvalds 	 *
13631da177e4SLinus Torvalds 	 * FIXME: It may be fragmented into multiple chunks
13641da177e4SLinus Torvalds 	 *        at once if non-fragmentable extension headers
13651da177e4SLinus Torvalds 	 *        are too large.
13661da177e4SLinus Torvalds 	 * --yoshfuji
13671da177e4SLinus Torvalds 	 */
13681da177e4SLinus Torvalds 
13692811ebacSHannes Frederic Sowa 	cork->length += length;
13702811ebacSHannes Frederic Sowa 	if (!skb)
13711da177e4SLinus Torvalds 		goto alloc_new_skb;
13721da177e4SLinus Torvalds 
13731da177e4SLinus Torvalds 	while (length > 0) {
13741da177e4SLinus Torvalds 		/* Check if the remaining data fits into current packet. */
1375bdc712b4SDavid S. Miller 		copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len;
13761da177e4SLinus Torvalds 		if (copy < length)
13771da177e4SLinus Torvalds 			copy = maxfraglen - skb->len;
13781da177e4SLinus Torvalds 
13791da177e4SLinus Torvalds 		if (copy <= 0) {
13801da177e4SLinus Torvalds 			char *data;
13811da177e4SLinus Torvalds 			unsigned int datalen;
13821da177e4SLinus Torvalds 			unsigned int fraglen;
13831da177e4SLinus Torvalds 			unsigned int fraggap;
13841da177e4SLinus Torvalds 			unsigned int alloclen;
1385aba36930SWillem de Bruijn 			unsigned int pagedlen;
13861da177e4SLinus Torvalds alloc_new_skb:
13871da177e4SLinus Torvalds 			/* There's no room in the current skb */
13880c183379SGao feng 			if (skb)
13890c183379SGao feng 				fraggap = skb->len - maxfraglen;
13901da177e4SLinus Torvalds 			else
13911da177e4SLinus Torvalds 				fraggap = 0;
13920c183379SGao feng 			/* update mtu and maxfraglen if necessary */
139363159f29SIan Morris 			if (!skb || !skb_prev)
13940c183379SGao feng 				ip6_append_data_mtu(&mtu, &maxfraglen,
139575a493e6SHannes Frederic Sowa 						    fragheaderlen, skb, rt,
1396e367c2d0Slucien 						    orig_mtu);
13970c183379SGao feng 
13980c183379SGao feng 			skb_prev = skb;
13991da177e4SLinus Torvalds 
14001da177e4SLinus Torvalds 			/*
14011da177e4SLinus Torvalds 			 * If remaining data exceeds the mtu,
14021da177e4SLinus Torvalds 			 * we know we need more fragment(s).
14031da177e4SLinus Torvalds 			 */
14041da177e4SLinus Torvalds 			datalen = length + fraggap;
14051da177e4SLinus Torvalds 
14060c183379SGao feng 			if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen)
14070c183379SGao feng 				datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len;
140815e36f5bSWillem de Bruijn 			fraglen = datalen + fragheaderlen;
1409aba36930SWillem de Bruijn 			pagedlen = 0;
141015e36f5bSWillem de Bruijn 
14111da177e4SLinus Torvalds 			if ((flags & MSG_MORE) &&
1412d8d1f30bSChangli Gao 			    !(rt->dst.dev->features&NETIF_F_SG))
14131da177e4SLinus Torvalds 				alloclen = mtu;
141415e36f5bSWillem de Bruijn 			else if (!paged)
141515e36f5bSWillem de Bruijn 				alloclen = fraglen;
141615e36f5bSWillem de Bruijn 			else {
141715e36f5bSWillem de Bruijn 				alloclen = min_t(int, fraglen, MAX_HEADER);
141815e36f5bSWillem de Bruijn 				pagedlen = fraglen - alloclen;
141915e36f5bSWillem de Bruijn 			}
14201da177e4SLinus Torvalds 
1421299b0767SSteffen Klassert 			alloclen += dst_exthdrlen;
1422299b0767SSteffen Klassert 
14230c183379SGao feng 			if (datalen != length + fraggap) {
14241da177e4SLinus Torvalds 				/*
14250c183379SGao feng 				 * this is not the last fragment, the trailer
14260c183379SGao feng 				 * space is regarded as data space.
14271da177e4SLinus Torvalds 				 */
14280c183379SGao feng 				datalen += rt->dst.trailer_len;
14290c183379SGao feng 			}
14300c183379SGao feng 
1431d8d1f30bSChangli Gao 			alloclen += rt->dst.trailer_len;
14320c183379SGao feng 			fraglen = datalen + fragheaderlen;
14331da177e4SLinus Torvalds 
14341da177e4SLinus Torvalds 			/*
14351da177e4SLinus Torvalds 			 * We just reserve space for fragment header.
14361da177e4SLinus Torvalds 			 * Note: this may be overallocation if the message
14371da177e4SLinus Torvalds 			 * (without MSG_MORE) fits into the MTU.
14381da177e4SLinus Torvalds 			 */
14391da177e4SLinus Torvalds 			alloclen += sizeof(struct frag_hdr);
14401da177e4SLinus Torvalds 
144115e36f5bSWillem de Bruijn 			copy = datalen - transhdrlen - fraggap - pagedlen;
1442232cd35dSEric Dumazet 			if (copy < 0) {
1443232cd35dSEric Dumazet 				err = -EINVAL;
1444232cd35dSEric Dumazet 				goto error;
1445232cd35dSEric Dumazet 			}
14461da177e4SLinus Torvalds 			if (transhdrlen) {
14471da177e4SLinus Torvalds 				skb = sock_alloc_send_skb(sk,
14481da177e4SLinus Torvalds 						alloclen + hh_len,
14491da177e4SLinus Torvalds 						(flags & MSG_DONTWAIT), &err);
14501da177e4SLinus Torvalds 			} else {
14511da177e4SLinus Torvalds 				skb = NULL;
14521f4c6eb2SEric Dumazet 				if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <=
14531da177e4SLinus Torvalds 				    2 * sk->sk_sndbuf)
14541f4c6eb2SEric Dumazet 					skb = alloc_skb(alloclen + hh_len,
14551da177e4SLinus Torvalds 							sk->sk_allocation);
145663159f29SIan Morris 				if (unlikely(!skb))
14571da177e4SLinus Torvalds 					err = -ENOBUFS;
14581da177e4SLinus Torvalds 			}
145963159f29SIan Morris 			if (!skb)
14601da177e4SLinus Torvalds 				goto error;
14611da177e4SLinus Torvalds 			/*
14621da177e4SLinus Torvalds 			 *	Fill in the control structures
14631da177e4SLinus Torvalds 			 */
14649c9c9ad5SHannes Frederic Sowa 			skb->protocol = htons(ETH_P_IPV6);
146532dce968SVlad Yasevich 			skb->ip_summed = csummode;
14661da177e4SLinus Torvalds 			skb->csum = 0;
14671f85851eSGao feng 			/* reserve for fragmentation and ipsec header */
14681f85851eSGao feng 			skb_reserve(skb, hh_len + sizeof(struct frag_hdr) +
14691f85851eSGao feng 				    dst_exthdrlen);
14701da177e4SLinus Torvalds 
14711da177e4SLinus Torvalds 			/*
14721da177e4SLinus Torvalds 			 *	Find where to start putting bytes
14731da177e4SLinus Torvalds 			 */
147415e36f5bSWillem de Bruijn 			data = skb_put(skb, fraglen - pagedlen);
14751f85851eSGao feng 			skb_set_network_header(skb, exthdrlen);
14761f85851eSGao feng 			data += fragheaderlen;
1477b0e380b1SArnaldo Carvalho de Melo 			skb->transport_header = (skb->network_header +
1478b0e380b1SArnaldo Carvalho de Melo 						 fragheaderlen);
14791da177e4SLinus Torvalds 			if (fraggap) {
14801da177e4SLinus Torvalds 				skb->csum = skb_copy_and_csum_bits(
14811da177e4SLinus Torvalds 					skb_prev, maxfraglen,
14821da177e4SLinus Torvalds 					data + transhdrlen, fraggap, 0);
14831da177e4SLinus Torvalds 				skb_prev->csum = csum_sub(skb_prev->csum,
14841da177e4SLinus Torvalds 							  skb->csum);
14851da177e4SLinus Torvalds 				data += fraggap;
1486e9fa4f7bSHerbert Xu 				pskb_trim_unique(skb_prev, maxfraglen);
14871da177e4SLinus Torvalds 			}
1488232cd35dSEric Dumazet 			if (copy > 0 &&
1489232cd35dSEric Dumazet 			    getfrag(from, data + transhdrlen, offset,
1490232cd35dSEric Dumazet 				    copy, fraggap, skb) < 0) {
14911da177e4SLinus Torvalds 				err = -EFAULT;
14921da177e4SLinus Torvalds 				kfree_skb(skb);
14931da177e4SLinus Torvalds 				goto error;
14941da177e4SLinus Torvalds 			}
14951da177e4SLinus Torvalds 
14961da177e4SLinus Torvalds 			offset += copy;
149715e36f5bSWillem de Bruijn 			length -= copy + transhdrlen;
14981da177e4SLinus Torvalds 			transhdrlen = 0;
14991da177e4SLinus Torvalds 			exthdrlen = 0;
1500299b0767SSteffen Klassert 			dst_exthdrlen = 0;
15011da177e4SLinus Torvalds 
150252900d22SWillem de Bruijn 			/* Only the initial fragment is time stamped */
150352900d22SWillem de Bruijn 			skb_shinfo(skb)->tx_flags = cork->tx_flags;
150452900d22SWillem de Bruijn 			cork->tx_flags = 0;
150552900d22SWillem de Bruijn 			skb_shinfo(skb)->tskey = tskey;
150652900d22SWillem de Bruijn 			tskey = 0;
150752900d22SWillem de Bruijn 			skb_zcopy_set(skb, uarg, &extra_uref);
150852900d22SWillem de Bruijn 
15090dec879fSJulian Anastasov 			if ((flags & MSG_CONFIRM) && !skb_prev)
15100dec879fSJulian Anastasov 				skb_set_dst_pending_confirm(skb, 1);
15110dec879fSJulian Anastasov 
15121da177e4SLinus Torvalds 			/*
15131da177e4SLinus Torvalds 			 * Put the packet on the pending queue
15141da177e4SLinus Torvalds 			 */
15151f4c6eb2SEric Dumazet 			if (!skb->destructor) {
15161f4c6eb2SEric Dumazet 				skb->destructor = sock_wfree;
15171f4c6eb2SEric Dumazet 				skb->sk = sk;
15181f4c6eb2SEric Dumazet 				wmem_alloc_delta += skb->truesize;
15191f4c6eb2SEric Dumazet 			}
15200bbe84a6SVlad Yasevich 			__skb_queue_tail(queue, skb);
15211da177e4SLinus Torvalds 			continue;
15221da177e4SLinus Torvalds 		}
15231da177e4SLinus Torvalds 
15241da177e4SLinus Torvalds 		if (copy > length)
15251da177e4SLinus Torvalds 			copy = length;
15261da177e4SLinus Torvalds 
1527113f99c3SWillem de Bruijn 		if (!(rt->dst.dev->features&NETIF_F_SG) &&
1528113f99c3SWillem de Bruijn 		    skb_tailroom(skb) >= copy) {
15291da177e4SLinus Torvalds 			unsigned int off;
15301da177e4SLinus Torvalds 
15311da177e4SLinus Torvalds 			off = skb->len;
15321da177e4SLinus Torvalds 			if (getfrag(from, skb_put(skb, copy),
15331da177e4SLinus Torvalds 						offset, copy, off, skb) < 0) {
15341da177e4SLinus Torvalds 				__skb_trim(skb, off);
15351da177e4SLinus Torvalds 				err = -EFAULT;
15361da177e4SLinus Torvalds 				goto error;
15371da177e4SLinus Torvalds 			}
1538b5947e5dSWillem de Bruijn 		} else if (!uarg || !uarg->zerocopy) {
15391da177e4SLinus Torvalds 			int i = skb_shinfo(skb)->nr_frags;
15401da177e4SLinus Torvalds 
15411da177e4SLinus Torvalds 			err = -ENOMEM;
15425640f768SEric Dumazet 			if (!sk_page_frag_refill(sk, pfrag))
15431da177e4SLinus Torvalds 				goto error;
15441da177e4SLinus Torvalds 
15455640f768SEric Dumazet 			if (!skb_can_coalesce(skb, i, pfrag->page,
15465640f768SEric Dumazet 					      pfrag->offset)) {
15471da177e4SLinus Torvalds 				err = -EMSGSIZE;
15485640f768SEric Dumazet 				if (i == MAX_SKB_FRAGS)
15491da177e4SLinus Torvalds 					goto error;
15505640f768SEric Dumazet 
15515640f768SEric Dumazet 				__skb_fill_page_desc(skb, i, pfrag->page,
15525640f768SEric Dumazet 						     pfrag->offset, 0);
15535640f768SEric Dumazet 				skb_shinfo(skb)->nr_frags = ++i;
15545640f768SEric Dumazet 				get_page(pfrag->page);
15551da177e4SLinus Torvalds 			}
15565640f768SEric Dumazet 			copy = min_t(int, copy, pfrag->size - pfrag->offset);
15579e903e08SEric Dumazet 			if (getfrag(from,
15585640f768SEric Dumazet 				    page_address(pfrag->page) + pfrag->offset,
15595640f768SEric Dumazet 				    offset, copy, skb->len, skb) < 0)
15605640f768SEric Dumazet 				goto error_efault;
15615640f768SEric Dumazet 
15625640f768SEric Dumazet 			pfrag->offset += copy;
15635640f768SEric Dumazet 			skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy);
15641da177e4SLinus Torvalds 			skb->len += copy;
15651da177e4SLinus Torvalds 			skb->data_len += copy;
1566f945fa7aSHerbert Xu 			skb->truesize += copy;
15671f4c6eb2SEric Dumazet 			wmem_alloc_delta += copy;
1568b5947e5dSWillem de Bruijn 		} else {
1569b5947e5dSWillem de Bruijn 			err = skb_zerocopy_iter_dgram(skb, from, copy);
1570b5947e5dSWillem de Bruijn 			if (err < 0)
1571b5947e5dSWillem de Bruijn 				goto error;
15721da177e4SLinus Torvalds 		}
15731da177e4SLinus Torvalds 		offset += copy;
15741da177e4SLinus Torvalds 		length -= copy;
15751da177e4SLinus Torvalds 	}
15765640f768SEric Dumazet 
15779e8445a5SPaolo Abeni 	if (wmem_alloc_delta)
15781f4c6eb2SEric Dumazet 		refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
15791da177e4SLinus Torvalds 	return 0;
15805640f768SEric Dumazet 
15815640f768SEric Dumazet error_efault:
15825640f768SEric Dumazet 	err = -EFAULT;
15831da177e4SLinus Torvalds error:
158497ef7b4cSWillem de Bruijn 	if (uarg)
158552900d22SWillem de Bruijn 		sock_zerocopy_put_abort(uarg, extra_uref);
1586bdc712b4SDavid S. Miller 	cork->length -= length;
15873bd653c8SDenis V. Lunev 	IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS);
15881f4c6eb2SEric Dumazet 	refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
15891da177e4SLinus Torvalds 	return err;
15901da177e4SLinus Torvalds }
15910bbe84a6SVlad Yasevich 
15920bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk,
15930bbe84a6SVlad Yasevich 		    int getfrag(void *from, char *to, int offset, int len,
15940bbe84a6SVlad Yasevich 				int odd, struct sk_buff *skb),
159526879da5SWei Wang 		    void *from, int length, int transhdrlen,
159626879da5SWei Wang 		    struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
15975fdaa88dSWillem de Bruijn 		    struct rt6_info *rt, unsigned int flags)
15980bbe84a6SVlad Yasevich {
15990bbe84a6SVlad Yasevich 	struct inet_sock *inet = inet_sk(sk);
16000bbe84a6SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
16010bbe84a6SVlad Yasevich 	int exthdrlen;
16020bbe84a6SVlad Yasevich 	int err;
16030bbe84a6SVlad Yasevich 
16040bbe84a6SVlad Yasevich 	if (flags&MSG_PROBE)
16050bbe84a6SVlad Yasevich 		return 0;
16060bbe84a6SVlad Yasevich 	if (skb_queue_empty(&sk->sk_write_queue)) {
16070bbe84a6SVlad Yasevich 		/*
16080bbe84a6SVlad Yasevich 		 * setup for corking
16090bbe84a6SVlad Yasevich 		 */
161026879da5SWei Wang 		err = ip6_setup_cork(sk, &inet->cork, &np->cork,
16115fdaa88dSWillem de Bruijn 				     ipc6, rt, fl6);
16120bbe84a6SVlad Yasevich 		if (err)
16130bbe84a6SVlad Yasevich 			return err;
16140bbe84a6SVlad Yasevich 
161526879da5SWei Wang 		exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
16160bbe84a6SVlad Yasevich 		length += exthdrlen;
16170bbe84a6SVlad Yasevich 		transhdrlen += exthdrlen;
16180bbe84a6SVlad Yasevich 	} else {
16190bbe84a6SVlad Yasevich 		fl6 = &inet->cork.fl.u.ip6;
16200bbe84a6SVlad Yasevich 		transhdrlen = 0;
16210bbe84a6SVlad Yasevich 	}
16220bbe84a6SVlad Yasevich 
16230bbe84a6SVlad Yasevich 	return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base,
16240bbe84a6SVlad Yasevich 				 &np->cork, sk_page_frag(sk), getfrag,
16255fdaa88dSWillem de Bruijn 				 from, length, transhdrlen, flags, ipc6);
16260bbe84a6SVlad Yasevich }
1627a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data);
16281da177e4SLinus Torvalds 
1629366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork,
1630366e41d9SVlad Yasevich 			     struct inet6_cork *v6_cork)
1631bf138862SPavel Emelyanov {
1632366e41d9SVlad Yasevich 	if (v6_cork->opt) {
1633366e41d9SVlad Yasevich 		kfree(v6_cork->opt->dst0opt);
1634366e41d9SVlad Yasevich 		kfree(v6_cork->opt->dst1opt);
1635366e41d9SVlad Yasevich 		kfree(v6_cork->opt->hopopt);
1636366e41d9SVlad Yasevich 		kfree(v6_cork->opt->srcrt);
1637366e41d9SVlad Yasevich 		kfree(v6_cork->opt);
1638366e41d9SVlad Yasevich 		v6_cork->opt = NULL;
16390178b695SHerbert Xu 	}
16400178b695SHerbert Xu 
1641366e41d9SVlad Yasevich 	if (cork->base.dst) {
1642366e41d9SVlad Yasevich 		dst_release(cork->base.dst);
1643366e41d9SVlad Yasevich 		cork->base.dst = NULL;
1644366e41d9SVlad Yasevich 		cork->base.flags &= ~IPCORK_ALLFRAG;
1645bf138862SPavel Emelyanov 	}
1646366e41d9SVlad Yasevich 	memset(&cork->fl, 0, sizeof(cork->fl));
1647bf138862SPavel Emelyanov }
1648bf138862SPavel Emelyanov 
16496422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk,
16506422398cSVlad Yasevich 			       struct sk_buff_head *queue,
16516422398cSVlad Yasevich 			       struct inet_cork_full *cork,
16526422398cSVlad Yasevich 			       struct inet6_cork *v6_cork)
16531da177e4SLinus Torvalds {
16541da177e4SLinus Torvalds 	struct sk_buff *skb, *tmp_skb;
16551da177e4SLinus Torvalds 	struct sk_buff **tail_skb;
16561da177e4SLinus Torvalds 	struct in6_addr final_dst_buf, *final_dst = &final_dst_buf;
16571da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
16583bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
16591da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
16606422398cSVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
16616422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->base.dst;
16626422398cSVlad Yasevich 	struct flowi6 *fl6 = &cork->fl.u.ip6;
16634c9483b2SDavid S. Miller 	unsigned char proto = fl6->flowi6_proto;
16641da177e4SLinus Torvalds 
16656422398cSVlad Yasevich 	skb = __skb_dequeue(queue);
166663159f29SIan Morris 	if (!skb)
16671da177e4SLinus Torvalds 		goto out;
16681da177e4SLinus Torvalds 	tail_skb = &(skb_shinfo(skb)->frag_list);
16691da177e4SLinus Torvalds 
16701da177e4SLinus Torvalds 	/* move skb->data to ip header from ext header */
1671d56f90a7SArnaldo Carvalho de Melo 	if (skb->data < skb_network_header(skb))
1672bbe735e4SArnaldo Carvalho de Melo 		__skb_pull(skb, skb_network_offset(skb));
16736422398cSVlad Yasevich 	while ((tmp_skb = __skb_dequeue(queue)) != NULL) {
1674cfe1fc77SArnaldo Carvalho de Melo 		__skb_pull(tmp_skb, skb_network_header_len(skb));
16751da177e4SLinus Torvalds 		*tail_skb = tmp_skb;
16761da177e4SLinus Torvalds 		tail_skb = &(tmp_skb->next);
16771da177e4SLinus Torvalds 		skb->len += tmp_skb->len;
16781da177e4SLinus Torvalds 		skb->data_len += tmp_skb->len;
16791da177e4SLinus Torvalds 		skb->truesize += tmp_skb->truesize;
16801da177e4SLinus Torvalds 		tmp_skb->destructor = NULL;
16811da177e4SLinus Torvalds 		tmp_skb->sk = NULL;
16821da177e4SLinus Torvalds 	}
16831da177e4SLinus Torvalds 
168428a89453SHerbert Xu 	/* Allow local fragmentation. */
168560ff7467SWANG Cong 	skb->ignore_df = ip6_sk_ignore_df(sk);
168628a89453SHerbert Xu 
16874e3fd7a0SAlexey Dobriyan 	*final_dst = fl6->daddr;
1688cfe1fc77SArnaldo Carvalho de Melo 	__skb_pull(skb, skb_network_header_len(skb));
16891da177e4SLinus Torvalds 	if (opt && opt->opt_flen)
16901da177e4SLinus Torvalds 		ipv6_push_frag_opts(skb, opt, &proto);
16911da177e4SLinus Torvalds 	if (opt && opt->opt_nflen)
1692613fa3caSDavid Lebrun 		ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr);
16931da177e4SLinus Torvalds 
1694e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
1695e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
16960660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
16971da177e4SLinus Torvalds 
16986422398cSVlad Yasevich 	ip6_flow_hdr(hdr, v6_cork->tclass,
1699cb1ce2efSTom Herbert 		     ip6_make_flowlabel(net, skb, fl6->flowlabel,
1700513674b5SShaohua Li 					ip6_autoflowlabel(net, np), fl6));
17016422398cSVlad Yasevich 	hdr->hop_limit = v6_cork->hop_limit;
17021da177e4SLinus Torvalds 	hdr->nexthdr = proto;
17034e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
17044e3fd7a0SAlexey Dobriyan 	hdr->daddr = *final_dst;
17051da177e4SLinus Torvalds 
1706a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
17074a19ec58SLaszlo Attila Toth 	skb->mark = sk->sk_mark;
1708a2c2064fSPatrick McHardy 
1709a818f75eSJesus Sanchez-Palencia 	skb->tstamp = cork->base.transmit_time;
1710a818f75eSJesus Sanchez-Palencia 
1711d8d1f30bSChangli Gao 	skb_dst_set(skb, dst_clone(&rt->dst));
1712edf391ffSNeil Horman 	IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len);
171314878f75SDavid L Stevens 	if (proto == IPPROTO_ICMPV6) {
1714adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
171514878f75SDavid L Stevens 
171643a43b60SHannes Frederic Sowa 		ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type);
171743a43b60SHannes Frederic Sowa 		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
171814878f75SDavid L Stevens 	}
171914878f75SDavid L Stevens 
17206422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
17216422398cSVlad Yasevich out:
17226422398cSVlad Yasevich 	return skb;
17236422398cSVlad Yasevich }
17246422398cSVlad Yasevich 
17256422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb)
17266422398cSVlad Yasevich {
17276422398cSVlad Yasevich 	struct net *net = sock_net(skb->sk);
17286422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
17296422398cSVlad Yasevich 	int err;
17306422398cSVlad Yasevich 
173133224b16SEric W. Biederman 	err = ip6_local_out(net, skb->sk, skb);
17321da177e4SLinus Torvalds 	if (err) {
17331da177e4SLinus Torvalds 		if (err > 0)
17346ce9e7b5SEric Dumazet 			err = net_xmit_errno(err);
17351da177e4SLinus Torvalds 		if (err)
17366422398cSVlad Yasevich 			IP6_INC_STATS(net, rt->rt6i_idev,
17376422398cSVlad Yasevich 				      IPSTATS_MIB_OUTDISCARDS);
17381da177e4SLinus Torvalds 	}
17391da177e4SLinus Torvalds 
17401da177e4SLinus Torvalds 	return err;
17416422398cSVlad Yasevich }
17426422398cSVlad Yasevich 
17436422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk)
17446422398cSVlad Yasevich {
17456422398cSVlad Yasevich 	struct sk_buff *skb;
17466422398cSVlad Yasevich 
17476422398cSVlad Yasevich 	skb = ip6_finish_skb(sk);
17486422398cSVlad Yasevich 	if (!skb)
17496422398cSVlad Yasevich 		return 0;
17506422398cSVlad Yasevich 
17516422398cSVlad Yasevich 	return ip6_send_skb(skb);
17521da177e4SLinus Torvalds }
1753a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames);
17541da177e4SLinus Torvalds 
17550bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk,
17566422398cSVlad Yasevich 				       struct sk_buff_head *queue,
17576422398cSVlad Yasevich 				       struct inet_cork_full *cork,
17586422398cSVlad Yasevich 				       struct inet6_cork *v6_cork)
17591da177e4SLinus Torvalds {
17601da177e4SLinus Torvalds 	struct sk_buff *skb;
17611da177e4SLinus Torvalds 
17620bbe84a6SVlad Yasevich 	while ((skb = __skb_dequeue_tail(queue)) != NULL) {
1763adf30907SEric Dumazet 		if (skb_dst(skb))
1764adf30907SEric Dumazet 			IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)),
1765a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_OUTDISCARDS);
17661da177e4SLinus Torvalds 		kfree_skb(skb);
17671da177e4SLinus Torvalds 	}
17681da177e4SLinus Torvalds 
17696422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
17701da177e4SLinus Torvalds }
17710bbe84a6SVlad Yasevich 
17720bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk)
17730bbe84a6SVlad Yasevich {
17746422398cSVlad Yasevich 	__ip6_flush_pending_frames(sk, &sk->sk_write_queue,
17756422398cSVlad Yasevich 				   &inet_sk(sk)->cork, &inet6_sk(sk)->cork);
17760bbe84a6SVlad Yasevich }
1777a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames);
17786422398cSVlad Yasevich 
17796422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk,
17806422398cSVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
17816422398cSVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
17826422398cSVlad Yasevich 			     void *from, int length, int transhdrlen,
178326879da5SWei Wang 			     struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
17846422398cSVlad Yasevich 			     struct rt6_info *rt, unsigned int flags,
17855fdaa88dSWillem de Bruijn 			     struct inet_cork_full *cork)
17866422398cSVlad Yasevich {
17876422398cSVlad Yasevich 	struct inet6_cork v6_cork;
17886422398cSVlad Yasevich 	struct sk_buff_head queue;
178926879da5SWei Wang 	int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
17906422398cSVlad Yasevich 	int err;
17916422398cSVlad Yasevich 
17926422398cSVlad Yasevich 	if (flags & MSG_PROBE)
17936422398cSVlad Yasevich 		return NULL;
17946422398cSVlad Yasevich 
17956422398cSVlad Yasevich 	__skb_queue_head_init(&queue);
17966422398cSVlad Yasevich 
17971cd7884dSWillem de Bruijn 	cork->base.flags = 0;
17981cd7884dSWillem de Bruijn 	cork->base.addr = 0;
17991cd7884dSWillem de Bruijn 	cork->base.opt = NULL;
18001cd7884dSWillem de Bruijn 	cork->base.dst = NULL;
18016422398cSVlad Yasevich 	v6_cork.opt = NULL;
18025fdaa88dSWillem de Bruijn 	err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt, fl6);
1803862c03eeSEric Dumazet 	if (err) {
18041cd7884dSWillem de Bruijn 		ip6_cork_release(cork, &v6_cork);
18056422398cSVlad Yasevich 		return ERR_PTR(err);
1806862c03eeSEric Dumazet 	}
180726879da5SWei Wang 	if (ipc6->dontfrag < 0)
180826879da5SWei Wang 		ipc6->dontfrag = inet6_sk(sk)->dontfrag;
18096422398cSVlad Yasevich 
18101cd7884dSWillem de Bruijn 	err = __ip6_append_data(sk, fl6, &queue, &cork->base, &v6_cork,
18116422398cSVlad Yasevich 				&current->task_frag, getfrag, from,
18126422398cSVlad Yasevich 				length + exthdrlen, transhdrlen + exthdrlen,
18135fdaa88dSWillem de Bruijn 				flags, ipc6);
18146422398cSVlad Yasevich 	if (err) {
18151cd7884dSWillem de Bruijn 		__ip6_flush_pending_frames(sk, &queue, cork, &v6_cork);
18166422398cSVlad Yasevich 		return ERR_PTR(err);
18176422398cSVlad Yasevich 	}
18186422398cSVlad Yasevich 
18191cd7884dSWillem de Bruijn 	return __ip6_make_skb(sk, &queue, cork, &v6_cork);
18206422398cSVlad Yasevich }
1821