xref: /openbmc/linux/net/ipv6/ip6_output.c (revision 58f71be58b8713e41f8568938a0199190f723d1d)
12874c5fdSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later
21da177e4SLinus Torvalds /*
31da177e4SLinus Torvalds  *	IPv6 output functions
41da177e4SLinus Torvalds  *	Linux INET6 implementation
51da177e4SLinus Torvalds  *
61da177e4SLinus Torvalds  *	Authors:
71da177e4SLinus Torvalds  *	Pedro Roque		<roque@di.fc.ul.pt>
81da177e4SLinus Torvalds  *
91da177e4SLinus Torvalds  *	Based on linux/net/ipv4/ip_output.c
101da177e4SLinus Torvalds  *
111da177e4SLinus Torvalds  *	Changes:
121da177e4SLinus Torvalds  *	A.N.Kuznetsov	:	airthmetics in fragmentation.
131da177e4SLinus Torvalds  *				extension headers are implemented.
141da177e4SLinus Torvalds  *				route changes now work.
151da177e4SLinus Torvalds  *				ip6_forward does not confuse sniffers.
161da177e4SLinus Torvalds  *				etc.
171da177e4SLinus Torvalds  *
181da177e4SLinus Torvalds  *      H. von Brand    :       Added missing #include <linux/string.h>
191da177e4SLinus Torvalds  *	Imran Patel	:	frag id should be in NBO
201da177e4SLinus Torvalds  *      Kazunori MIYAZAWA @USAGI
211da177e4SLinus Torvalds  *			:       add ip6_append_data and related functions
221da177e4SLinus Torvalds  *				for datagram xmit
231da177e4SLinus Torvalds  */
241da177e4SLinus Torvalds 
251da177e4SLinus Torvalds #include <linux/errno.h>
26ef76bc23SHerbert Xu #include <linux/kernel.h>
271da177e4SLinus Torvalds #include <linux/string.h>
281da177e4SLinus Torvalds #include <linux/socket.h>
291da177e4SLinus Torvalds #include <linux/net.h>
301da177e4SLinus Torvalds #include <linux/netdevice.h>
311da177e4SLinus Torvalds #include <linux/if_arp.h>
321da177e4SLinus Torvalds #include <linux/in6.h>
331da177e4SLinus Torvalds #include <linux/tcp.h>
341da177e4SLinus Torvalds #include <linux/route.h>
35b59f45d0SHerbert Xu #include <linux/module.h>
365a0e3ad6STejun Heo #include <linux/slab.h>
371da177e4SLinus Torvalds 
3833b48679SDaniel Mack #include <linux/bpf-cgroup.h>
391da177e4SLinus Torvalds #include <linux/netfilter.h>
401da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h>
411da177e4SLinus Torvalds 
421da177e4SLinus Torvalds #include <net/sock.h>
431da177e4SLinus Torvalds #include <net/snmp.h>
441da177e4SLinus Torvalds 
451da177e4SLinus Torvalds #include <net/ipv6.h>
461da177e4SLinus Torvalds #include <net/ndisc.h>
471da177e4SLinus Torvalds #include <net/protocol.h>
481da177e4SLinus Torvalds #include <net/ip6_route.h>
491da177e4SLinus Torvalds #include <net/addrconf.h>
501da177e4SLinus Torvalds #include <net/rawv6.h>
511da177e4SLinus Torvalds #include <net/icmp.h>
521da177e4SLinus Torvalds #include <net/xfrm.h>
531da177e4SLinus Torvalds #include <net/checksum.h>
547bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h>
55ca254490SDavid Ahern #include <net/l3mdev.h>
5614972cbdSRoopa Prabhu #include <net/lwtunnel.h>
57571912c6SMartin Varghese #include <net/ip_tunnels.h>
581da177e4SLinus Torvalds 
597d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb)
601da177e4SLinus Torvalds {
61adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
621da177e4SLinus Torvalds 	struct net_device *dev = dst->dev;
63e415ed3aSVasily Averin 	struct inet6_dev *idev = ip6_dst_idev(dst);
645796015fSVasily Averin 	unsigned int hh_len = LL_RESERVED_SPACE(dev);
65e415ed3aSVasily Averin 	const struct in6_addr *daddr, *nexthop;
66e415ed3aSVasily Averin 	struct ipv6hdr *hdr;
67f6b72b62SDavid S. Miller 	struct neighbour *neigh;
686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	int ret;
691da177e4SLinus Torvalds 
705796015fSVasily Averin 	/* Be paranoid, rather than too clever. */
71e415ed3aSVasily Averin 	if (unlikely(hh_len > skb_headroom(skb)) && dev->header_ops) {
72e415ed3aSVasily Averin 		skb = skb_expand_head(skb, hh_len);
735796015fSVasily Averin 		if (!skb) {
74e415ed3aSVasily Averin 			IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
755796015fSVasily Averin 			return -ENOMEM;
765796015fSVasily Averin 		}
775796015fSVasily Averin 	}
785796015fSVasily Averin 
79e415ed3aSVasily Averin 	hdr = ipv6_hdr(skb);
80e415ed3aSVasily Averin 	daddr = &hdr->daddr;
81e415ed3aSVasily Averin 	if (ipv6_addr_is_multicast(daddr)) {
827026b1ddSDavid Miller 		if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) &&
838571ab47SYuval Mintz 		    ((mroute6_is_socket(net, skb) &&
84bd91b8bfSBenjamin Thery 		     !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) ||
85e415ed3aSVasily Averin 		     ipv6_chk_mcast_addr(dev, daddr, &hdr->saddr))) {
861da177e4SLinus Torvalds 			struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC);
871da177e4SLinus Torvalds 
881da177e4SLinus Torvalds 			/* Do not check for IFF_ALLMULTI; multicast routing
891da177e4SLinus Torvalds 			   is not supported in any case.
901da177e4SLinus Torvalds 			 */
911da177e4SLinus Torvalds 			if (newskb)
92b2e0b385SJan Engelhardt 				NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING,
9329a26a56SEric W. Biederman 					net, sk, newskb, NULL, newskb->dev,
9495603e22SMichel Machado 					dev_loopback_xmit);
951da177e4SLinus Torvalds 
96e415ed3aSVasily Averin 			if (hdr->hop_limit == 0) {
9778126c41SEric W. Biederman 				IP6_INC_STATS(net, idev,
983bd653c8SDenis V. Lunev 					      IPSTATS_MIB_OUTDISCARDS);
991da177e4SLinus Torvalds 				kfree_skb(skb);
1001da177e4SLinus Torvalds 				return 0;
1011da177e4SLinus Torvalds 			}
1021da177e4SLinus Torvalds 		}
1031da177e4SLinus Torvalds 
10478126c41SEric W. Biederman 		IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len);
105e415ed3aSVasily Averin 		if (IPV6_ADDR_MC_SCOPE(daddr) <= IPV6_ADDR_SCOPE_NODELOCAL &&
106dd408515SHannes Frederic Sowa 		    !(dev->flags & IFF_LOOPBACK)) {
107dd408515SHannes Frederic Sowa 			kfree_skb(skb);
108dd408515SHannes Frederic Sowa 			return 0;
109dd408515SHannes Frederic Sowa 		}
1101da177e4SLinus Torvalds 	}
1111da177e4SLinus Torvalds 
11214972cbdSRoopa Prabhu 	if (lwtunnel_xmit_redirect(dst->lwtstate)) {
11314972cbdSRoopa Prabhu 		int res = lwtunnel_xmit(skb);
11414972cbdSRoopa Prabhu 
11514972cbdSRoopa Prabhu 		if (res < 0 || res == LWTUNNEL_XMIT_DONE)
11614972cbdSRoopa Prabhu 			return res;
11714972cbdSRoopa Prabhu 	}
11814972cbdSRoopa Prabhu 
1196fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
120e415ed3aSVasily Averin 	nexthop = rt6_nexthop((struct rt6_info *)dst, daddr);
121e415ed3aSVasily Averin 	neigh = __ipv6_neigh_lookup_noref(dev, nexthop);
122*58f71be5SPavel Begunkov 
123*58f71be5SPavel Begunkov 	if (unlikely(IS_ERR_OR_NULL(neigh))) {
1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		if (unlikely(!neigh))
125e415ed3aSVasily Averin 			neigh = __neigh_create(&nd_tbl, nexthop, dev, false);
126*58f71be5SPavel Begunkov 		if (IS_ERR(neigh)) {
127*58f71be5SPavel Begunkov 			rcu_read_unlock_bh();
128*58f71be5SPavel Begunkov 			IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTNOROUTES);
129*58f71be5SPavel Begunkov 			kfree_skb_reason(skb, SKB_DROP_REASON_NEIGH_CREATEFAIL);
130*58f71be5SPavel Begunkov 			return -EINVAL;
131*58f71be5SPavel Begunkov 		}
132*58f71be5SPavel Begunkov 	}
1334ff06203SJulian Anastasov 	sock_confirm_neigh(skb, neigh);
1340353f282SDavid Ahern 	ret = neigh_output(neigh, skb, false);
1356fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
1366fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	return ret;
1376fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 }
1381da177e4SLinus Torvalds 
139b210de4fSAya Levin static int
140b210de4fSAya Levin ip6_finish_output_gso_slowpath_drop(struct net *net, struct sock *sk,
141b210de4fSAya Levin 				    struct sk_buff *skb, unsigned int mtu)
142b210de4fSAya Levin {
143b210de4fSAya Levin 	struct sk_buff *segs, *nskb;
144b210de4fSAya Levin 	netdev_features_t features;
145b210de4fSAya Levin 	int ret = 0;
146b210de4fSAya Levin 
147b210de4fSAya Levin 	/* Please see corresponding comment in ip_finish_output_gso
148b210de4fSAya Levin 	 * describing the cases where GSO segment length exceeds the
149b210de4fSAya Levin 	 * egress MTU.
150b210de4fSAya Levin 	 */
151b210de4fSAya Levin 	features = netif_skb_features(skb);
152b210de4fSAya Levin 	segs = skb_gso_segment(skb, features & ~NETIF_F_GSO_MASK);
153b210de4fSAya Levin 	if (IS_ERR_OR_NULL(segs)) {
154b210de4fSAya Levin 		kfree_skb(skb);
155b210de4fSAya Levin 		return -ENOMEM;
156b210de4fSAya Levin 	}
157b210de4fSAya Levin 
158b210de4fSAya Levin 	consume_skb(skb);
159b210de4fSAya Levin 
160b210de4fSAya Levin 	skb_list_walk_safe(segs, segs, nskb) {
161b210de4fSAya Levin 		int err;
162b210de4fSAya Levin 
163b210de4fSAya Levin 		skb_mark_not_on_list(segs);
164b210de4fSAya Levin 		err = ip6_fragment(net, sk, segs, ip6_finish_output2);
165b210de4fSAya Levin 		if (err && ret == 0)
166b210de4fSAya Levin 			ret = err;
167b210de4fSAya Levin 	}
168b210de4fSAya Levin 
169b210de4fSAya Levin 	return ret;
170b210de4fSAya Levin }
171b210de4fSAya Levin 
172956fe219Sbrakmo static int __ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1739e508490SJan Engelhardt {
174b210de4fSAya Levin 	unsigned int mtu;
175b210de4fSAya Levin 
17609ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM)
17709ee9dbaSTobias Brunner 	/* Policy lookup after SNAT yielded a new policy */
17809ee9dbaSTobias Brunner 	if (skb_dst(skb)->xfrm) {
17919d36c5fSEric Dumazet 		IP6CB(skb)->flags |= IP6SKB_REROUTED;
18009ee9dbaSTobias Brunner 		return dst_output(net, sk, skb);
18109ee9dbaSTobias Brunner 	}
18209ee9dbaSTobias Brunner #endif
18309ee9dbaSTobias Brunner 
184b210de4fSAya Levin 	mtu = ip6_skb_dst_mtu(skb);
185b210de4fSAya Levin 	if (skb_is_gso(skb) && !skb_gso_validate_network_len(skb, mtu))
186b210de4fSAya Levin 		return ip6_finish_output_gso_slowpath_drop(net, sk, skb, mtu);
187b210de4fSAya Levin 
188b210de4fSAya Levin 	if ((skb->len > mtu && !skb_is_gso(skb)) ||
1899037c357SJiri Pirko 	    dst_allfrag(skb_dst(skb)) ||
1909037c357SJiri Pirko 	    (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size))
1917d8c6e39SEric W. Biederman 		return ip6_fragment(net, sk, skb, ip6_finish_output2);
1929e508490SJan Engelhardt 	else
1937d8c6e39SEric W. Biederman 		return ip6_finish_output2(net, sk, skb);
1949e508490SJan Engelhardt }
1959e508490SJan Engelhardt 
196956fe219Sbrakmo static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
197956fe219Sbrakmo {
198956fe219Sbrakmo 	int ret;
199956fe219Sbrakmo 
200956fe219Sbrakmo 	ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb);
201956fe219Sbrakmo 	switch (ret) {
202956fe219Sbrakmo 	case NET_XMIT_SUCCESS:
203956fe219Sbrakmo 	case NET_XMIT_CN:
204956fe219Sbrakmo 		return __ip6_finish_output(net, sk, skb) ? : ret;
205956fe219Sbrakmo 	default:
2065e187189SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_BPF_CGROUP_EGRESS);
207956fe219Sbrakmo 		return ret;
208956fe219Sbrakmo 	}
209956fe219Sbrakmo }
210956fe219Sbrakmo 
211ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
2121da177e4SLinus Torvalds {
21328f8bfd1SPhil Sutter 	struct net_device *dev = skb_dst(skb)->dev, *indev = skb->dev;
214adf30907SEric Dumazet 	struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
215be10de0aSEric W. Biederman 
21697a7a37aSChenbo Feng 	skb->protocol = htons(ETH_P_IPV6);
21797a7a37aSChenbo Feng 	skb->dev = dev;
21897a7a37aSChenbo Feng 
219778d80beSYOSHIFUJI Hideaki 	if (unlikely(idev->cnf.disable_ipv6)) {
22019a0644cSEric W. Biederman 		IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
2215e187189SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_IPV6DISABLED);
222778d80beSYOSHIFUJI Hideaki 		return 0;
223778d80beSYOSHIFUJI Hideaki 	}
224778d80beSYOSHIFUJI Hideaki 
22529a26a56SEric W. Biederman 	return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
22628f8bfd1SPhil Sutter 			    net, sk, skb, indev, dev,
2279c6eb28aSJan Engelhardt 			    ip6_finish_output,
2289c6eb28aSJan Engelhardt 			    !(IP6CB(skb)->flags & IP6SKB_REROUTED));
2291da177e4SLinus Torvalds }
2306585d7dcSBrian Vazquez EXPORT_SYMBOL(ip6_output);
2311da177e4SLinus Torvalds 
232e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np)
233513674b5SShaohua Li {
234513674b5SShaohua Li 	if (!np->autoflowlabel_set)
235513674b5SShaohua Li 		return ip6_default_np_autolabel(net);
236513674b5SShaohua Li 	else
237513674b5SShaohua Li 		return np->autoflowlabel;
238513674b5SShaohua Li }
239513674b5SShaohua Li 
2401da177e4SLinus Torvalds /*
241b5d43998SShan Wei  * xmit an sk_buff (used by TCP, SCTP and DCCP)
2421c1e9d2bSEric Dumazet  * Note : socket lock is not held for SYNACK packets, but might be modified
2431c1e9d2bSEric Dumazet  * by calls to skb_set_owner_w() and ipv6_local_error(),
2441c1e9d2bSEric Dumazet  * which are using proper atomic operations or spinlocks.
2451da177e4SLinus Torvalds  */
2461c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6,
2474f6570d7SEric Dumazet 	     __u32 mark, struct ipv6_txoptions *opt, int tclass, u32 priority)
2481da177e4SLinus Torvalds {
2493bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
2501c1e9d2bSEric Dumazet 	const struct ipv6_pinfo *np = inet6_sk(sk);
2514c9483b2SDavid S. Miller 	struct in6_addr *first_hop = &fl6->daddr;
252adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
2530c9f227bSVasily Averin 	struct net_device *dev = dst->dev;
2540c9f227bSVasily Averin 	struct inet6_dev *idev = ip6_dst_idev(dst);
25566033f47SStefano Brivio 	unsigned int head_room;
2561da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
2574c9483b2SDavid S. Miller 	u8  proto = fl6->flowi6_proto;
2581da177e4SLinus Torvalds 	int seg_len = skb->len;
259e651f03aSGerrit Renker 	int hlimit = -1;
2601da177e4SLinus Torvalds 	u32 mtu;
2611da177e4SLinus Torvalds 
2620c9f227bSVasily Averin 	head_room = sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dev);
26366033f47SStefano Brivio 	if (opt)
26466033f47SStefano Brivio 		head_room += opt->opt_nflen + opt->opt_flen;
2651da177e4SLinus Torvalds 
2660c9f227bSVasily Averin 	if (unlikely(head_room > skb_headroom(skb))) {
2670c9f227bSVasily Averin 		skb = skb_expand_head(skb, head_room);
2680c9f227bSVasily Averin 		if (!skb) {
2690c9f227bSVasily Averin 			IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
2701da177e4SLinus Torvalds 			return -ENOBUFS;
2711da177e4SLinus Torvalds 		}
2721da177e4SLinus Torvalds 	}
27366033f47SStefano Brivio 
27466033f47SStefano Brivio 	if (opt) {
27566033f47SStefano Brivio 		seg_len += opt->opt_nflen + opt->opt_flen;
27666033f47SStefano Brivio 
2771da177e4SLinus Torvalds 		if (opt->opt_flen)
2781da177e4SLinus Torvalds 			ipv6_push_frag_opts(skb, opt, &proto);
27966033f47SStefano Brivio 
2801da177e4SLinus Torvalds 		if (opt->opt_nflen)
281613fa3caSDavid Lebrun 			ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop,
282613fa3caSDavid Lebrun 					     &fl6->saddr);
2831da177e4SLinus Torvalds 	}
2841da177e4SLinus Torvalds 
285e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
286e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
2870660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
2881da177e4SLinus Torvalds 
2891da177e4SLinus Torvalds 	/*
2901da177e4SLinus Torvalds 	 *	Fill in the IPv6 header
2911da177e4SLinus Torvalds 	 */
292b903d324SEric Dumazet 	if (np)
2931da177e4SLinus Torvalds 		hlimit = np->hop_limit;
2941da177e4SLinus Torvalds 	if (hlimit < 0)
2956b75d090SYOSHIFUJI Hideaki 		hlimit = ip6_dst_hoplimit(dst);
2961da177e4SLinus Torvalds 
297cb1ce2efSTom Herbert 	ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel,
298513674b5SShaohua Li 				ip6_autoflowlabel(net, np), fl6));
29941a1f8eaSYOSHIFUJI Hideaki 
3001da177e4SLinus Torvalds 	hdr->payload_len = htons(seg_len);
3011da177e4SLinus Torvalds 	hdr->nexthdr = proto;
3021da177e4SLinus Torvalds 	hdr->hop_limit = hlimit;
3031da177e4SLinus Torvalds 
3044e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
3054e3fd7a0SAlexey Dobriyan 	hdr->daddr = *first_hop;
3061da177e4SLinus Torvalds 
3079c9c9ad5SHannes Frederic Sowa 	skb->protocol = htons(ETH_P_IPV6);
3084f6570d7SEric Dumazet 	skb->priority = priority;
30992e55f41SPablo Neira 	skb->mark = mark;
310a2c2064fSPatrick McHardy 
3111da177e4SLinus Torvalds 	mtu = dst_mtu(dst);
31260ff7467SWANG Cong 	if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) {
3130c9f227bSVasily Averin 		IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len);
314a8e3e1a9SDavid Ahern 
315a8e3e1a9SDavid Ahern 		/* if egress device is enslaved to an L3 master device pass the
316a8e3e1a9SDavid Ahern 		 * skb to its handler for processing
317a8e3e1a9SDavid Ahern 		 */
318a8e3e1a9SDavid Ahern 		skb = l3mdev_ip6_out((struct sock *)sk, skb);
319a8e3e1a9SDavid Ahern 		if (unlikely(!skb))
320a8e3e1a9SDavid Ahern 			return 0;
321a8e3e1a9SDavid Ahern 
3221c1e9d2bSEric Dumazet 		/* hooks should never assume socket lock is held.
3231c1e9d2bSEric Dumazet 		 * we promote our socket to non const
3241c1e9d2bSEric Dumazet 		 */
32529a26a56SEric W. Biederman 		return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
3260c9f227bSVasily Averin 			       net, (struct sock *)sk, skb, NULL, dev,
32713206b6bSEric W. Biederman 			       dst_output);
3281da177e4SLinus Torvalds 	}
3291da177e4SLinus Torvalds 
3300c9f227bSVasily Averin 	skb->dev = dev;
3311c1e9d2bSEric Dumazet 	/* ipv6_local_error() does not require socket lock,
3321c1e9d2bSEric Dumazet 	 * we promote our socket to non const
3331c1e9d2bSEric Dumazet 	 */
3341c1e9d2bSEric Dumazet 	ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu);
3351c1e9d2bSEric Dumazet 
3360c9f227bSVasily Averin 	IP6_INC_STATS(net, idev, IPSTATS_MIB_FRAGFAILS);
3371da177e4SLinus Torvalds 	kfree_skb(skb);
3381da177e4SLinus Torvalds 	return -EMSGSIZE;
3391da177e4SLinus Torvalds }
3407159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit);
3417159039aSYOSHIFUJI Hideaki 
3421da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel)
3431da177e4SLinus Torvalds {
3441da177e4SLinus Torvalds 	struct ip6_ra_chain *ra;
3451da177e4SLinus Torvalds 	struct sock *last = NULL;
3461da177e4SLinus Torvalds 
3471da177e4SLinus Torvalds 	read_lock(&ip6_ra_lock);
3481da177e4SLinus Torvalds 	for (ra = ip6_ra_chain; ra; ra = ra->next) {
3491da177e4SLinus Torvalds 		struct sock *sk = ra->sk;
3500bd1b59bSAndrew McDonald 		if (sk && ra->sel == sel &&
3510bd1b59bSAndrew McDonald 		    (!sk->sk_bound_dev_if ||
3520bd1b59bSAndrew McDonald 		     sk->sk_bound_dev_if == skb->dev->ifindex)) {
3539036b2feSFrancesco Ruggeri 			struct ipv6_pinfo *np = inet6_sk(sk);
3549036b2feSFrancesco Ruggeri 
3559036b2feSFrancesco Ruggeri 			if (np && np->rtalert_isolate &&
3569036b2feSFrancesco Ruggeri 			    !net_eq(sock_net(sk), dev_net(skb->dev))) {
3579036b2feSFrancesco Ruggeri 				continue;
3589036b2feSFrancesco Ruggeri 			}
3591da177e4SLinus Torvalds 			if (last) {
3601da177e4SLinus Torvalds 				struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
3611da177e4SLinus Torvalds 				if (skb2)
3621da177e4SLinus Torvalds 					rawv6_rcv(last, skb2);
3631da177e4SLinus Torvalds 			}
3641da177e4SLinus Torvalds 			last = sk;
3651da177e4SLinus Torvalds 		}
3661da177e4SLinus Torvalds 	}
3671da177e4SLinus Torvalds 
3681da177e4SLinus Torvalds 	if (last) {
3691da177e4SLinus Torvalds 		rawv6_rcv(last, skb);
3701da177e4SLinus Torvalds 		read_unlock(&ip6_ra_lock);
3711da177e4SLinus Torvalds 		return 1;
3721da177e4SLinus Torvalds 	}
3731da177e4SLinus Torvalds 	read_unlock(&ip6_ra_lock);
3741da177e4SLinus Torvalds 	return 0;
3751da177e4SLinus Torvalds }
3761da177e4SLinus Torvalds 
377e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb)
378e21e0b5fSVille Nuorvala {
3790660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
380e21e0b5fSVille Nuorvala 	u8 nexthdr = hdr->nexthdr;
38175f2811cSJesse Gross 	__be16 frag_off;
382e21e0b5fSVille Nuorvala 	int offset;
383e21e0b5fSVille Nuorvala 
384e21e0b5fSVille Nuorvala 	if (ipv6_ext_hdr(nexthdr)) {
38575f2811cSJesse Gross 		offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off);
386e21e0b5fSVille Nuorvala 		if (offset < 0)
387e21e0b5fSVille Nuorvala 			return 0;
388e21e0b5fSVille Nuorvala 	} else
389e21e0b5fSVille Nuorvala 		offset = sizeof(struct ipv6hdr);
390e21e0b5fSVille Nuorvala 
391e21e0b5fSVille Nuorvala 	if (nexthdr == IPPROTO_ICMPV6) {
392e21e0b5fSVille Nuorvala 		struct icmp6hdr *icmp6;
393e21e0b5fSVille Nuorvala 
394d56f90a7SArnaldo Carvalho de Melo 		if (!pskb_may_pull(skb, (skb_network_header(skb) +
395d56f90a7SArnaldo Carvalho de Melo 					 offset + 1 - skb->data)))
396e21e0b5fSVille Nuorvala 			return 0;
397e21e0b5fSVille Nuorvala 
398d56f90a7SArnaldo Carvalho de Melo 		icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset);
399e21e0b5fSVille Nuorvala 
400e21e0b5fSVille Nuorvala 		switch (icmp6->icmp6_type) {
401e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_SOLICITATION:
402e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_ADVERTISEMENT:
403e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_SOLICITATION:
404e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_ADVERTISEMENT:
405e21e0b5fSVille Nuorvala 		case NDISC_REDIRECT:
406e21e0b5fSVille Nuorvala 			/* For reaction involving unicast neighbor discovery
407e21e0b5fSVille Nuorvala 			 * message destined to the proxied address, pass it to
408e21e0b5fSVille Nuorvala 			 * input function.
409e21e0b5fSVille Nuorvala 			 */
410e21e0b5fSVille Nuorvala 			return 1;
411e21e0b5fSVille Nuorvala 		default:
412e21e0b5fSVille Nuorvala 			break;
413e21e0b5fSVille Nuorvala 		}
414e21e0b5fSVille Nuorvala 	}
415e21e0b5fSVille Nuorvala 
41674553b09SVille Nuorvala 	/*
41774553b09SVille Nuorvala 	 * The proxying router can't forward traffic sent to a link-local
41874553b09SVille Nuorvala 	 * address, so signal the sender and discard the packet. This
41974553b09SVille Nuorvala 	 * behavior is clarified by the MIPv6 specification.
42074553b09SVille Nuorvala 	 */
42174553b09SVille Nuorvala 	if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) {
42274553b09SVille Nuorvala 		dst_link_failure(skb);
42374553b09SVille Nuorvala 		return -1;
42474553b09SVille Nuorvala 	}
42574553b09SVille Nuorvala 
426e21e0b5fSVille Nuorvala 	return 0;
427e21e0b5fSVille Nuorvala }
428e21e0b5fSVille Nuorvala 
4290c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk,
4300c4b51f0SEric W. Biederman 				     struct sk_buff *skb)
4311da177e4SLinus Torvalds {
43271a1c915SJeff Barnhill 	struct dst_entry *dst = skb_dst(skb);
43371a1c915SJeff Barnhill 
43471a1c915SJeff Barnhill 	__IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS);
43571a1c915SJeff Barnhill 	__IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len);
43671a1c915SJeff Barnhill 
437f839a6c9SIdo Schimmel #ifdef CONFIG_NET_SWITCHDEV
438f839a6c9SIdo Schimmel 	if (skb->offload_l3_fwd_mark) {
439f839a6c9SIdo Schimmel 		consume_skb(skb);
440f839a6c9SIdo Schimmel 		return 0;
441f839a6c9SIdo Schimmel 	}
442f839a6c9SIdo Schimmel #endif
443f839a6c9SIdo Schimmel 
444de799101SMartin KaFai Lau 	skb_clear_tstamp(skb);
44513206b6bSEric W. Biederman 	return dst_output(net, sk, skb);
4461da177e4SLinus Torvalds }
4471da177e4SLinus Torvalds 
448fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu)
449fe6cc55fSFlorian Westphal {
450418a3156SFlorian Westphal 	if (skb->len <= mtu)
451fe6cc55fSFlorian Westphal 		return false;
452fe6cc55fSFlorian Westphal 
45360ff7467SWANG Cong 	/* ipv6 conntrack defrag sets max_frag_size + ignore_df */
454fe6cc55fSFlorian Westphal 	if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu)
455fe6cc55fSFlorian Westphal 		return true;
456fe6cc55fSFlorian Westphal 
45760ff7467SWANG Cong 	if (skb->ignore_df)
458418a3156SFlorian Westphal 		return false;
459418a3156SFlorian Westphal 
460779b7931SDaniel Axtens 	if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu))
461fe6cc55fSFlorian Westphal 		return false;
462fe6cc55fSFlorian Westphal 
463fe6cc55fSFlorian Westphal 	return true;
464fe6cc55fSFlorian Westphal }
465fe6cc55fSFlorian Westphal 
4661da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb)
4671da177e4SLinus Torvalds {
468adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
4690660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
4701da177e4SLinus Torvalds 	struct inet6_skb_parm *opt = IP6CB(skb);
471c346dca1SYOSHIFUJI Hideaki 	struct net *net = dev_net(dst->dev);
4720857d6f8SStephen Suryaputra 	struct inet6_dev *idev;
4732edc1a38SMenglong Dong 	SKB_DR(reason);
47414f3ad6fSUlrich Weber 	u32 mtu;
4751da177e4SLinus Torvalds 
4760857d6f8SStephen Suryaputra 	idev = __in6_dev_get_safely(dev_get_by_index_rcu(net, IP6CB(skb)->iif));
47753b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->forwarding == 0)
4781da177e4SLinus Torvalds 		goto error;
4791da177e4SLinus Torvalds 
480090f1166SLi RongQing 	if (skb->pkt_type != PACKET_HOST)
481090f1166SLi RongQing 		goto drop;
482090f1166SLi RongQing 
4839ef2e965SHannes Frederic Sowa 	if (unlikely(skb->sk))
4849ef2e965SHannes Frederic Sowa 		goto drop;
4859ef2e965SHannes Frederic Sowa 
4864497b076SBen Hutchings 	if (skb_warn_if_lro(skb))
4874497b076SBen Hutchings 		goto drop;
4884497b076SBen Hutchings 
489ccd27f05SNicolas Dichtel 	if (!net->ipv6.devconf_all->disable_policy &&
490e3fa461dSNicolas Dichtel 	    (!idev || !idev->cnf.disable_policy) &&
491ccd27f05SNicolas Dichtel 	    !xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) {
492bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
4931da177e4SLinus Torvalds 		goto drop;
4941da177e4SLinus Torvalds 	}
4951da177e4SLinus Torvalds 
49635fc92a9SHerbert Xu 	skb_forward_csum(skb);
4971da177e4SLinus Torvalds 
4981da177e4SLinus Torvalds 	/*
4991da177e4SLinus Torvalds 	 *	We DO NOT make any processing on
5001da177e4SLinus Torvalds 	 *	RA packets, pushing them to user level AS IS
5011da177e4SLinus Torvalds 	 *	without ane WARRANTY that application will be able
5021da177e4SLinus Torvalds 	 *	to interpret them. The reason is that we
5031da177e4SLinus Torvalds 	 *	cannot make anything clever here.
5041da177e4SLinus Torvalds 	 *
5051da177e4SLinus Torvalds 	 *	We are not end-node, so that if packet contains
5061da177e4SLinus Torvalds 	 *	AH/ESP, we cannot make anything.
5071da177e4SLinus Torvalds 	 *	Defragmentation also would be mistake, RA packets
5081da177e4SLinus Torvalds 	 *	cannot be fragmented, because there is no warranty
5091da177e4SLinus Torvalds 	 *	that different fragments will go along one path. --ANK
5101da177e4SLinus Torvalds 	 */
511ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) {
512ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 		if (ip6_call_ra_chain(skb, ntohs(opt->ra)))
5131da177e4SLinus Torvalds 			return 0;
5141da177e4SLinus Torvalds 	}
5151da177e4SLinus Torvalds 
5161da177e4SLinus Torvalds 	/*
5171da177e4SLinus Torvalds 	 *	check and decrement ttl
5181da177e4SLinus Torvalds 	 */
5191da177e4SLinus Torvalds 	if (hdr->hop_limit <= 1) {
5203ffe533cSAlexey Dobriyan 		icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0);
521bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS);
5221da177e4SLinus Torvalds 
5232edc1a38SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_IP_INHDR);
5241da177e4SLinus Torvalds 		return -ETIMEDOUT;
5251da177e4SLinus Torvalds 	}
5261da177e4SLinus Torvalds 
527fbea49e1SYOSHIFUJI Hideaki 	/* XXX: idev->cnf.proxy_ndp? */
52853b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->proxy_ndp &&
5298a3edd80SDaniel Lezcano 	    pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) {
53074553b09SVille Nuorvala 		int proxied = ip6_forward_proxy_check(skb);
53146c7655fSKangmin Park 		if (proxied > 0) {
53246c7655fSKangmin Park 			hdr->hop_limit--;
533e21e0b5fSVille Nuorvala 			return ip6_input(skb);
53446c7655fSKangmin Park 		} else if (proxied < 0) {
535bdb7cc64SStephen Suryaputra 			__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
53674553b09SVille Nuorvala 			goto drop;
53774553b09SVille Nuorvala 		}
538e21e0b5fSVille Nuorvala 	}
539e21e0b5fSVille Nuorvala 
5401da177e4SLinus Torvalds 	if (!xfrm6_route_forward(skb)) {
541bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
5422edc1a38SMenglong Dong 		SKB_DR_SET(reason, XFRM_POLICY);
5431da177e4SLinus Torvalds 		goto drop;
5441da177e4SLinus Torvalds 	}
545adf30907SEric Dumazet 	dst = skb_dst(skb);
5461da177e4SLinus Torvalds 
5471da177e4SLinus Torvalds 	/* IPv6 specs say nothing about it, but it is clear that we cannot
5481da177e4SLinus Torvalds 	   send redirects to source routed frames.
5491e5dc146SMasahide NAKAMURA 	   We don't send redirects to frames decapsulated from IPsec.
5501da177e4SLinus Torvalds 	 */
5512f17becfSStephen Suryaputra 	if (IP6CB(skb)->iif == dst->dev->ifindex &&
5522f17becfSStephen Suryaputra 	    opt->srcrt == 0 && !skb_sec_path(skb)) {
5531da177e4SLinus Torvalds 		struct in6_addr *target = NULL;
554fbfe95a4SDavid S. Miller 		struct inet_peer *peer;
5551da177e4SLinus Torvalds 		struct rt6_info *rt;
5561da177e4SLinus Torvalds 
5571da177e4SLinus Torvalds 		/*
5581da177e4SLinus Torvalds 		 *	incoming and outgoing devices are the same
5591da177e4SLinus Torvalds 		 *	send a redirect.
5601da177e4SLinus Torvalds 		 */
5611da177e4SLinus Torvalds 
5621da177e4SLinus Torvalds 		rt = (struct rt6_info *) dst;
563c45a3dfbSDavid S. Miller 		if (rt->rt6i_flags & RTF_GATEWAY)
564c45a3dfbSDavid S. Miller 			target = &rt->rt6i_gateway;
5651da177e4SLinus Torvalds 		else
5661da177e4SLinus Torvalds 			target = &hdr->daddr;
5671da177e4SLinus Torvalds 
568fd0273d7SMartin KaFai Lau 		peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1);
56992d86829SDavid S. Miller 
5701da177e4SLinus Torvalds 		/* Limit redirects both by destination (here)
5711da177e4SLinus Torvalds 		   and by source (inside ndisc_send_redirect)
5721da177e4SLinus Torvalds 		 */
573fbfe95a4SDavid S. Miller 		if (inet_peer_xrlim_allow(peer, 1*HZ))
5744991969aSDavid S. Miller 			ndisc_send_redirect(skb, target);
5751d861aa4SDavid S. Miller 		if (peer)
5761d861aa4SDavid S. Miller 			inet_putpeer(peer);
5775bb1ab09SDavid L Stevens 	} else {
5785bb1ab09SDavid L Stevens 		int addrtype = ipv6_addr_type(&hdr->saddr);
5795bb1ab09SDavid L Stevens 
5801da177e4SLinus Torvalds 		/* This check is security critical. */
581f81b2e7dSYOSHIFUJI Hideaki 		if (addrtype == IPV6_ADDR_ANY ||
582f81b2e7dSYOSHIFUJI Hideaki 		    addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK))
5831da177e4SLinus Torvalds 			goto error;
5845bb1ab09SDavid L Stevens 		if (addrtype & IPV6_ADDR_LINKLOCAL) {
5855bb1ab09SDavid L Stevens 			icmpv6_send(skb, ICMPV6_DEST_UNREACH,
5863ffe533cSAlexey Dobriyan 				    ICMPV6_NOT_NEIGHBOUR, 0);
5875bb1ab09SDavid L Stevens 			goto error;
5885bb1ab09SDavid L Stevens 		}
5891da177e4SLinus Torvalds 	}
5901da177e4SLinus Torvalds 
591427faee1SVadim Fedorenko 	mtu = ip6_dst_mtu_maybe_forward(dst, true);
59214f3ad6fSUlrich Weber 	if (mtu < IPV6_MIN_MTU)
59314f3ad6fSUlrich Weber 		mtu = IPV6_MIN_MTU;
59414f3ad6fSUlrich Weber 
595fe6cc55fSFlorian Westphal 	if (ip6_pkt_too_big(skb, mtu)) {
5961da177e4SLinus Torvalds 		/* Again, force OUTPUT device used as source address */
5971da177e4SLinus Torvalds 		skb->dev = dst->dev;
59814f3ad6fSUlrich Weber 		icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
599bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS);
6001d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
60115c77d8bSEric Dumazet 				IPSTATS_MIB_FRAGFAILS);
6022edc1a38SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_PKT_TOO_BIG);
6031da177e4SLinus Torvalds 		return -EMSGSIZE;
6041da177e4SLinus Torvalds 	}
6051da177e4SLinus Torvalds 
6061da177e4SLinus Torvalds 	if (skb_cow(skb, dst->dev->hard_header_len)) {
6071d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
60815c77d8bSEric Dumazet 				IPSTATS_MIB_OUTDISCARDS);
6091da177e4SLinus Torvalds 		goto drop;
6101da177e4SLinus Torvalds 	}
6111da177e4SLinus Torvalds 
6120660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
6131da177e4SLinus Torvalds 
6141da177e4SLinus Torvalds 	/* Mangling hops number delayed to point after skb COW */
6151da177e4SLinus Torvalds 
6161da177e4SLinus Torvalds 	hdr->hop_limit--;
6171da177e4SLinus Torvalds 
61829a26a56SEric W. Biederman 	return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD,
61929a26a56SEric W. Biederman 		       net, NULL, skb, skb->dev, dst->dev,
6206e23ae2aSPatrick McHardy 		       ip6_forward_finish);
6211da177e4SLinus Torvalds 
6221da177e4SLinus Torvalds error:
623bdb7cc64SStephen Suryaputra 	__IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS);
6242edc1a38SMenglong Dong 	SKB_DR_SET(reason, IP_INADDRERRORS);
6251da177e4SLinus Torvalds drop:
6262edc1a38SMenglong Dong 	kfree_skb_reason(skb, reason);
6271da177e4SLinus Torvalds 	return -EINVAL;
6281da177e4SLinus Torvalds }
6291da177e4SLinus Torvalds 
6301da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from)
6311da177e4SLinus Torvalds {
6321da177e4SLinus Torvalds 	to->pkt_type = from->pkt_type;
6331da177e4SLinus Torvalds 	to->priority = from->priority;
6341da177e4SLinus Torvalds 	to->protocol = from->protocol;
635adf30907SEric Dumazet 	skb_dst_drop(to);
636adf30907SEric Dumazet 	skb_dst_set(to, dst_clone(skb_dst(from)));
6371da177e4SLinus Torvalds 	to->dev = from->dev;
63882e91ffeSThomas Graf 	to->mark = from->mark;
6391da177e4SLinus Torvalds 
6403dd1c9a1SPaolo Abeni 	skb_copy_hash(to, from);
6413dd1c9a1SPaolo Abeni 
6421da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED
6431da177e4SLinus Torvalds 	to->tc_index = from->tc_index;
6441da177e4SLinus Torvalds #endif
645e7ac05f3SYasuyuki Kozakai 	nf_copy(to, from);
646df5042f4SFlorian Westphal 	skb_ext_copy(to, from);
647984bc16cSJames Morris 	skb_copy_secmark(to, from);
6481da177e4SLinus Torvalds }
6491da177e4SLinus Torvalds 
6500feca619SPablo Neira Ayuso int ip6_fraglist_init(struct sk_buff *skb, unsigned int hlen, u8 *prevhdr,
6510feca619SPablo Neira Ayuso 		      u8 nexthdr, __be32 frag_id,
6520feca619SPablo Neira Ayuso 		      struct ip6_fraglist_iter *iter)
6530feca619SPablo Neira Ayuso {
6540feca619SPablo Neira Ayuso 	unsigned int first_len;
6550feca619SPablo Neira Ayuso 	struct frag_hdr *fh;
6560feca619SPablo Neira Ayuso 
6570feca619SPablo Neira Ayuso 	/* BUILD HEADER */
6580feca619SPablo Neira Ayuso 	*prevhdr = NEXTHDR_FRAGMENT;
6590feca619SPablo Neira Ayuso 	iter->tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC);
6600feca619SPablo Neira Ayuso 	if (!iter->tmp_hdr)
6610feca619SPablo Neira Ayuso 		return -ENOMEM;
6620feca619SPablo Neira Ayuso 
663b7034146SEric Dumazet 	iter->frag = skb_shinfo(skb)->frag_list;
6640feca619SPablo Neira Ayuso 	skb_frag_list_init(skb);
6650feca619SPablo Neira Ayuso 
6660feca619SPablo Neira Ayuso 	iter->offset = 0;
6670feca619SPablo Neira Ayuso 	iter->hlen = hlen;
6680feca619SPablo Neira Ayuso 	iter->frag_id = frag_id;
6690feca619SPablo Neira Ayuso 	iter->nexthdr = nexthdr;
6700feca619SPablo Neira Ayuso 
6710feca619SPablo Neira Ayuso 	__skb_pull(skb, hlen);
6720feca619SPablo Neira Ayuso 	fh = __skb_push(skb, sizeof(struct frag_hdr));
6730feca619SPablo Neira Ayuso 	__skb_push(skb, hlen);
6740feca619SPablo Neira Ayuso 	skb_reset_network_header(skb);
6750feca619SPablo Neira Ayuso 	memcpy(skb_network_header(skb), iter->tmp_hdr, hlen);
6760feca619SPablo Neira Ayuso 
6770feca619SPablo Neira Ayuso 	fh->nexthdr = nexthdr;
6780feca619SPablo Neira Ayuso 	fh->reserved = 0;
6790feca619SPablo Neira Ayuso 	fh->frag_off = htons(IP6_MF);
6800feca619SPablo Neira Ayuso 	fh->identification = frag_id;
6810feca619SPablo Neira Ayuso 
6820feca619SPablo Neira Ayuso 	first_len = skb_pagelen(skb);
6830feca619SPablo Neira Ayuso 	skb->data_len = first_len - skb_headlen(skb);
6840feca619SPablo Neira Ayuso 	skb->len = first_len;
6850feca619SPablo Neira Ayuso 	ipv6_hdr(skb)->payload_len = htons(first_len - sizeof(struct ipv6hdr));
6860feca619SPablo Neira Ayuso 
6870feca619SPablo Neira Ayuso 	return 0;
6880feca619SPablo Neira Ayuso }
6890feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_init);
6900feca619SPablo Neira Ayuso 
6910feca619SPablo Neira Ayuso void ip6_fraglist_prepare(struct sk_buff *skb,
6920feca619SPablo Neira Ayuso 			  struct ip6_fraglist_iter *iter)
6930feca619SPablo Neira Ayuso {
6940feca619SPablo Neira Ayuso 	struct sk_buff *frag = iter->frag;
6950feca619SPablo Neira Ayuso 	unsigned int hlen = iter->hlen;
6960feca619SPablo Neira Ayuso 	struct frag_hdr *fh;
6970feca619SPablo Neira Ayuso 
6980feca619SPablo Neira Ayuso 	frag->ip_summed = CHECKSUM_NONE;
6990feca619SPablo Neira Ayuso 	skb_reset_transport_header(frag);
7000feca619SPablo Neira Ayuso 	fh = __skb_push(frag, sizeof(struct frag_hdr));
7010feca619SPablo Neira Ayuso 	__skb_push(frag, hlen);
7020feca619SPablo Neira Ayuso 	skb_reset_network_header(frag);
7030feca619SPablo Neira Ayuso 	memcpy(skb_network_header(frag), iter->tmp_hdr, hlen);
7040feca619SPablo Neira Ayuso 	iter->offset += skb->len - hlen - sizeof(struct frag_hdr);
7050feca619SPablo Neira Ayuso 	fh->nexthdr = iter->nexthdr;
7060feca619SPablo Neira Ayuso 	fh->reserved = 0;
7070feca619SPablo Neira Ayuso 	fh->frag_off = htons(iter->offset);
7080feca619SPablo Neira Ayuso 	if (frag->next)
7090feca619SPablo Neira Ayuso 		fh->frag_off |= htons(IP6_MF);
7100feca619SPablo Neira Ayuso 	fh->identification = iter->frag_id;
7110feca619SPablo Neira Ayuso 	ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr));
7120feca619SPablo Neira Ayuso 	ip6_copy_metadata(frag, skb);
7130feca619SPablo Neira Ayuso }
7140feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_prepare);
7150feca619SPablo Neira Ayuso 
7168a6a1f17SPablo Neira Ayuso void ip6_frag_init(struct sk_buff *skb, unsigned int hlen, unsigned int mtu,
7178a6a1f17SPablo Neira Ayuso 		   unsigned short needed_tailroom, int hdr_room, u8 *prevhdr,
7188a6a1f17SPablo Neira Ayuso 		   u8 nexthdr, __be32 frag_id, struct ip6_frag_state *state)
7198a6a1f17SPablo Neira Ayuso {
7208a6a1f17SPablo Neira Ayuso 	state->prevhdr = prevhdr;
7218a6a1f17SPablo Neira Ayuso 	state->nexthdr = nexthdr;
7228a6a1f17SPablo Neira Ayuso 	state->frag_id = frag_id;
7238a6a1f17SPablo Neira Ayuso 
7248a6a1f17SPablo Neira Ayuso 	state->hlen = hlen;
7258a6a1f17SPablo Neira Ayuso 	state->mtu = mtu;
7268a6a1f17SPablo Neira Ayuso 
7278a6a1f17SPablo Neira Ayuso 	state->left = skb->len - hlen;	/* Space per frame */
7288a6a1f17SPablo Neira Ayuso 	state->ptr = hlen;		/* Where to start from */
7298a6a1f17SPablo Neira Ayuso 
7308a6a1f17SPablo Neira Ayuso 	state->hroom = hdr_room;
7318a6a1f17SPablo Neira Ayuso 	state->troom = needed_tailroom;
7328a6a1f17SPablo Neira Ayuso 
7338a6a1f17SPablo Neira Ayuso 	state->offset = 0;
7348a6a1f17SPablo Neira Ayuso }
7358a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_init);
7368a6a1f17SPablo Neira Ayuso 
7378a6a1f17SPablo Neira Ayuso struct sk_buff *ip6_frag_next(struct sk_buff *skb, struct ip6_frag_state *state)
7388a6a1f17SPablo Neira Ayuso {
7398a6a1f17SPablo Neira Ayuso 	u8 *prevhdr = state->prevhdr, *fragnexthdr_offset;
7408a6a1f17SPablo Neira Ayuso 	struct sk_buff *frag;
7418a6a1f17SPablo Neira Ayuso 	struct frag_hdr *fh;
7428a6a1f17SPablo Neira Ayuso 	unsigned int len;
7438a6a1f17SPablo Neira Ayuso 
7448a6a1f17SPablo Neira Ayuso 	len = state->left;
7458a6a1f17SPablo Neira Ayuso 	/* IF: it doesn't fit, use 'mtu' - the data space left */
7468a6a1f17SPablo Neira Ayuso 	if (len > state->mtu)
7478a6a1f17SPablo Neira Ayuso 		len = state->mtu;
7488a6a1f17SPablo Neira Ayuso 	/* IF: we are not sending up to and including the packet end
7498a6a1f17SPablo Neira Ayuso 	   then align the next start on an eight byte boundary */
7508a6a1f17SPablo Neira Ayuso 	if (len < state->left)
7518a6a1f17SPablo Neira Ayuso 		len &= ~7;
7528a6a1f17SPablo Neira Ayuso 
7538a6a1f17SPablo Neira Ayuso 	/* Allocate buffer */
7548a6a1f17SPablo Neira Ayuso 	frag = alloc_skb(len + state->hlen + sizeof(struct frag_hdr) +
7558a6a1f17SPablo Neira Ayuso 			 state->hroom + state->troom, GFP_ATOMIC);
7568a6a1f17SPablo Neira Ayuso 	if (!frag)
7578a6a1f17SPablo Neira Ayuso 		return ERR_PTR(-ENOMEM);
7588a6a1f17SPablo Neira Ayuso 
7598a6a1f17SPablo Neira Ayuso 	/*
7608a6a1f17SPablo Neira Ayuso 	 *	Set up data on packet
7618a6a1f17SPablo Neira Ayuso 	 */
7628a6a1f17SPablo Neira Ayuso 
7638a6a1f17SPablo Neira Ayuso 	ip6_copy_metadata(frag, skb);
7648a6a1f17SPablo Neira Ayuso 	skb_reserve(frag, state->hroom);
7658a6a1f17SPablo Neira Ayuso 	skb_put(frag, len + state->hlen + sizeof(struct frag_hdr));
7668a6a1f17SPablo Neira Ayuso 	skb_reset_network_header(frag);
7678a6a1f17SPablo Neira Ayuso 	fh = (struct frag_hdr *)(skb_network_header(frag) + state->hlen);
7688a6a1f17SPablo Neira Ayuso 	frag->transport_header = (frag->network_header + state->hlen +
7698a6a1f17SPablo Neira Ayuso 				  sizeof(struct frag_hdr));
7708a6a1f17SPablo Neira Ayuso 
7718a6a1f17SPablo Neira Ayuso 	/*
7728a6a1f17SPablo Neira Ayuso 	 *	Charge the memory for the fragment to any owner
7738a6a1f17SPablo Neira Ayuso 	 *	it might possess
7748a6a1f17SPablo Neira Ayuso 	 */
7758a6a1f17SPablo Neira Ayuso 	if (skb->sk)
7768a6a1f17SPablo Neira Ayuso 		skb_set_owner_w(frag, skb->sk);
7778a6a1f17SPablo Neira Ayuso 
7788a6a1f17SPablo Neira Ayuso 	/*
7798a6a1f17SPablo Neira Ayuso 	 *	Copy the packet header into the new buffer.
7808a6a1f17SPablo Neira Ayuso 	 */
7818a6a1f17SPablo Neira Ayuso 	skb_copy_from_linear_data(skb, skb_network_header(frag), state->hlen);
7828a6a1f17SPablo Neira Ayuso 
7838a6a1f17SPablo Neira Ayuso 	fragnexthdr_offset = skb_network_header(frag);
7848a6a1f17SPablo Neira Ayuso 	fragnexthdr_offset += prevhdr - skb_network_header(skb);
7858a6a1f17SPablo Neira Ayuso 	*fragnexthdr_offset = NEXTHDR_FRAGMENT;
7868a6a1f17SPablo Neira Ayuso 
7878a6a1f17SPablo Neira Ayuso 	/*
7888a6a1f17SPablo Neira Ayuso 	 *	Build fragment header.
7898a6a1f17SPablo Neira Ayuso 	 */
7908a6a1f17SPablo Neira Ayuso 	fh->nexthdr = state->nexthdr;
7918a6a1f17SPablo Neira Ayuso 	fh->reserved = 0;
7928a6a1f17SPablo Neira Ayuso 	fh->identification = state->frag_id;
7938a6a1f17SPablo Neira Ayuso 
7948a6a1f17SPablo Neira Ayuso 	/*
7958a6a1f17SPablo Neira Ayuso 	 *	Copy a block of the IP datagram.
7968a6a1f17SPablo Neira Ayuso 	 */
7978a6a1f17SPablo Neira Ayuso 	BUG_ON(skb_copy_bits(skb, state->ptr, skb_transport_header(frag),
7988a6a1f17SPablo Neira Ayuso 			     len));
7998a6a1f17SPablo Neira Ayuso 	state->left -= len;
8008a6a1f17SPablo Neira Ayuso 
8018a6a1f17SPablo Neira Ayuso 	fh->frag_off = htons(state->offset);
8028a6a1f17SPablo Neira Ayuso 	if (state->left > 0)
8038a6a1f17SPablo Neira Ayuso 		fh->frag_off |= htons(IP6_MF);
8048a6a1f17SPablo Neira Ayuso 	ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr));
8058a6a1f17SPablo Neira Ayuso 
8068a6a1f17SPablo Neira Ayuso 	state->ptr += len;
8078a6a1f17SPablo Neira Ayuso 	state->offset += len;
8088a6a1f17SPablo Neira Ayuso 
8098a6a1f17SPablo Neira Ayuso 	return frag;
8108a6a1f17SPablo Neira Ayuso }
8118a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_next);
8128a6a1f17SPablo Neira Ayuso 
8137d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb,
8147d8c6e39SEric W. Biederman 		 int (*output)(struct net *, struct sock *, struct sk_buff *))
8151da177e4SLinus Torvalds {
8161da177e4SLinus Torvalds 	struct sk_buff *frag;
817adf30907SEric Dumazet 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
818f60e5990Shannes@stressinduktion.org 	struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ?
819f60e5990Shannes@stressinduktion.org 				inet6_sk(skb->sk) : NULL;
820a1ac9c8aSMartin KaFai Lau 	bool mono_delivery_time = skb->mono_delivery_time;
8218a6a1f17SPablo Neira Ayuso 	struct ip6_frag_state state;
8228a6a1f17SPablo Neira Ayuso 	unsigned int mtu, hlen, nexthdr_offset;
8239669fffcSEric Dumazet 	ktime_t tstamp = skb->tstamp;
8248a6a1f17SPablo Neira Ayuso 	int hroom, err = 0;
825286c2349SMartin KaFai Lau 	__be32 frag_id;
8261da177e4SLinus Torvalds 	u8 *prevhdr, nexthdr = 0;
8271da177e4SLinus Torvalds 
8287dd7eb95SDavid S. Miller 	err = ip6_find_1stfragopt(skb, &prevhdr);
8297dd7eb95SDavid S. Miller 	if (err < 0)
8302423496aSCraig Gallek 		goto fail;
8317dd7eb95SDavid S. Miller 	hlen = err;
8321da177e4SLinus Torvalds 	nexthdr = *prevhdr;
833ef0efcd3SJunwei Hu 	nexthdr_offset = prevhdr - skb_network_header(skb);
8341da177e4SLinus Torvalds 
835628a5c56SJohn Heffner 	mtu = ip6_skb_dst_mtu(skb);
836b881ef76SJohn Heffner 
837b881ef76SJohn Heffner 	/* We must not fragment if the socket is set to force MTU discovery
83814f3ad6fSUlrich Weber 	 * or if the skb it not generated by a local socket.
839b881ef76SJohn Heffner 	 */
840485fca66SFlorian Westphal 	if (unlikely(!skb->ignore_df && skb->len > mtu))
841485fca66SFlorian Westphal 		goto fail_toobig;
842a34a101eSEric Dumazet 
843485fca66SFlorian Westphal 	if (IP6CB(skb)->frag_max_size) {
844485fca66SFlorian Westphal 		if (IP6CB(skb)->frag_max_size > mtu)
845485fca66SFlorian Westphal 			goto fail_toobig;
846485fca66SFlorian Westphal 
847485fca66SFlorian Westphal 		/* don't send fragments larger than what we received */
848485fca66SFlorian Westphal 		mtu = IP6CB(skb)->frag_max_size;
849485fca66SFlorian Westphal 		if (mtu < IPV6_MIN_MTU)
850485fca66SFlorian Westphal 			mtu = IPV6_MIN_MTU;
851b881ef76SJohn Heffner 	}
852b881ef76SJohn Heffner 
853d91675f9SYOSHIFUJI Hideaki 	if (np && np->frag_size < mtu) {
854d91675f9SYOSHIFUJI Hideaki 		if (np->frag_size)
855d91675f9SYOSHIFUJI Hideaki 			mtu = np->frag_size;
856d91675f9SYOSHIFUJI Hideaki 	}
85789bc7848SHannes Frederic Sowa 	if (mtu < hlen + sizeof(struct frag_hdr) + 8)
858b72a2b01SHannes Frederic Sowa 		goto fail_toobig;
8591e0d69a9SHannes Frederic Sowa 	mtu -= hlen + sizeof(struct frag_hdr);
8601da177e4SLinus Torvalds 
861fd0273d7SMartin KaFai Lau 	frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr,
862fd0273d7SMartin KaFai Lau 				    &ipv6_hdr(skb)->saddr);
863286c2349SMartin KaFai Lau 
864405c92f7SHannes Frederic Sowa 	if (skb->ip_summed == CHECKSUM_PARTIAL &&
865405c92f7SHannes Frederic Sowa 	    (err = skb_checksum_help(skb)))
866405c92f7SHannes Frederic Sowa 		goto fail;
867405c92f7SHannes Frederic Sowa 
868ef0efcd3SJunwei Hu 	prevhdr = skb_network_header(skb) + nexthdr_offset;
8691d325d21SFlorian Westphal 	hroom = LL_RESERVED_SPACE(rt->dst.dev);
87021dc3301SDavid S. Miller 	if (skb_has_frag_list(skb)) {
871c72d8cdaSAlexey Dobriyan 		unsigned int first_len = skb_pagelen(skb);
8720feca619SPablo Neira Ayuso 		struct ip6_fraglist_iter iter;
8733d13008eSEric Dumazet 		struct sk_buff *frag2;
8741da177e4SLinus Torvalds 
8751da177e4SLinus Torvalds 		if (first_len - hlen > mtu ||
8761da177e4SLinus Torvalds 		    ((first_len - hlen) & 7) ||
8771d325d21SFlorian Westphal 		    skb_cloned(skb) ||
8781d325d21SFlorian Westphal 		    skb_headroom(skb) < (hroom + sizeof(struct frag_hdr)))
8791da177e4SLinus Torvalds 			goto slow_path;
8801da177e4SLinus Torvalds 
8814d9092bbSDavid S. Miller 		skb_walk_frags(skb, frag) {
8821da177e4SLinus Torvalds 			/* Correct geometry. */
8831da177e4SLinus Torvalds 			if (frag->len > mtu ||
8841da177e4SLinus Torvalds 			    ((frag->len & 7) && frag->next) ||
8851d325d21SFlorian Westphal 			    skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr)))
8863d13008eSEric Dumazet 				goto slow_path_clean;
8871da177e4SLinus Torvalds 
8881da177e4SLinus Torvalds 			/* Partially cloned skb? */
8891da177e4SLinus Torvalds 			if (skb_shared(frag))
8903d13008eSEric Dumazet 				goto slow_path_clean;
8912fdba6b0SHerbert Xu 
8922fdba6b0SHerbert Xu 			BUG_ON(frag->sk);
8932fdba6b0SHerbert Xu 			if (skb->sk) {
8942fdba6b0SHerbert Xu 				frag->sk = skb->sk;
8952fdba6b0SHerbert Xu 				frag->destructor = sock_wfree;
8962fdba6b0SHerbert Xu 			}
8973d13008eSEric Dumazet 			skb->truesize -= frag->truesize;
8981da177e4SLinus Torvalds 		}
8991da177e4SLinus Torvalds 
9000feca619SPablo Neira Ayuso 		err = ip6_fraglist_init(skb, hlen, prevhdr, nexthdr, frag_id,
9010feca619SPablo Neira Ayuso 					&iter);
9020feca619SPablo Neira Ayuso 		if (err < 0)
9031d325d21SFlorian Westphal 			goto fail;
9041da177e4SLinus Torvalds 
9051da177e4SLinus Torvalds 		for (;;) {
9061da177e4SLinus Torvalds 			/* Prepare header of the next frame,
9071da177e4SLinus Torvalds 			 * before previous one went down. */
9080feca619SPablo Neira Ayuso 			if (iter.frag)
9090feca619SPablo Neira Ayuso 				ip6_fraglist_prepare(skb, &iter);
9101da177e4SLinus Torvalds 
911a1ac9c8aSMartin KaFai Lau 			skb_set_delivery_time(skb, tstamp, mono_delivery_time);
9127d8c6e39SEric W. Biederman 			err = output(net, sk, skb);
913dafee490SWei Dong 			if (!err)
914d8d1f30bSChangli Gao 				IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
9153bd653c8SDenis V. Lunev 					      IPSTATS_MIB_FRAGCREATES);
916dafee490SWei Dong 
9170feca619SPablo Neira Ayuso 			if (err || !iter.frag)
9181da177e4SLinus Torvalds 				break;
9191da177e4SLinus Torvalds 
9200feca619SPablo Neira Ayuso 			skb = ip6_fraglist_next(&iter);
9211da177e4SLinus Torvalds 		}
9221da177e4SLinus Torvalds 
9230feca619SPablo Neira Ayuso 		kfree(iter.tmp_hdr);
9241da177e4SLinus Torvalds 
9251da177e4SLinus Torvalds 		if (err == 0) {
926d8d1f30bSChangli Gao 			IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
9273bd653c8SDenis V. Lunev 				      IPSTATS_MIB_FRAGOKS);
9281da177e4SLinus Torvalds 			return 0;
9291da177e4SLinus Torvalds 		}
9301da177e4SLinus Torvalds 
931b7034146SEric Dumazet 		kfree_skb_list(iter.frag);
9321da177e4SLinus Torvalds 
933d8d1f30bSChangli Gao 		IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
9343bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGFAILS);
9351da177e4SLinus Torvalds 		return err;
9363d13008eSEric Dumazet 
9373d13008eSEric Dumazet slow_path_clean:
9383d13008eSEric Dumazet 		skb_walk_frags(skb, frag2) {
9393d13008eSEric Dumazet 			if (frag2 == frag)
9403d13008eSEric Dumazet 				break;
9413d13008eSEric Dumazet 			frag2->sk = NULL;
9423d13008eSEric Dumazet 			frag2->destructor = NULL;
9433d13008eSEric Dumazet 			skb->truesize += frag2->truesize;
9443d13008eSEric Dumazet 		}
9451da177e4SLinus Torvalds 	}
9461da177e4SLinus Torvalds 
9471da177e4SLinus Torvalds slow_path:
9481da177e4SLinus Torvalds 	/*
9491da177e4SLinus Torvalds 	 *	Fragment the datagram.
9501da177e4SLinus Torvalds 	 */
9511da177e4SLinus Torvalds 
9528a6a1f17SPablo Neira Ayuso 	ip6_frag_init(skb, hlen, mtu, rt->dst.dev->needed_tailroom,
9538a6a1f17SPablo Neira Ayuso 		      LL_RESERVED_SPACE(rt->dst.dev), prevhdr, nexthdr, frag_id,
9548a6a1f17SPablo Neira Ayuso 		      &state);
9551da177e4SLinus Torvalds 
9561da177e4SLinus Torvalds 	/*
9571da177e4SLinus Torvalds 	 *	Keep copying data until we run out.
9581da177e4SLinus Torvalds 	 */
95979e49503SFlorian Westphal 
9608a6a1f17SPablo Neira Ayuso 	while (state.left > 0) {
9618a6a1f17SPablo Neira Ayuso 		frag = ip6_frag_next(skb, &state);
9628a6a1f17SPablo Neira Ayuso 		if (IS_ERR(frag)) {
9638a6a1f17SPablo Neira Ayuso 			err = PTR_ERR(frag);
9641da177e4SLinus Torvalds 			goto fail;
9651da177e4SLinus Torvalds 		}
9661da177e4SLinus Torvalds 
9671da177e4SLinus Torvalds 		/*
9681da177e4SLinus Torvalds 		 *	Put this fragment into the sending queue.
9691da177e4SLinus Torvalds 		 */
970a1ac9c8aSMartin KaFai Lau 		skb_set_delivery_time(frag, tstamp, mono_delivery_time);
9717d8c6e39SEric W. Biederman 		err = output(net, sk, frag);
9721da177e4SLinus Torvalds 		if (err)
9731da177e4SLinus Torvalds 			goto fail;
974dafee490SWei Dong 
975adf30907SEric Dumazet 		IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
9763bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGCREATES);
9771da177e4SLinus Torvalds 	}
978adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
979a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGOKS);
980808db80aSEric Dumazet 	consume_skb(skb);
9811da177e4SLinus Torvalds 	return err;
9821da177e4SLinus Torvalds 
983485fca66SFlorian Westphal fail_toobig:
984485fca66SFlorian Westphal 	if (skb->sk && dst_allfrag(skb_dst(skb)))
985aba54656SEric Dumazet 		sk_gso_disable(skb->sk);
986485fca66SFlorian Westphal 
987485fca66SFlorian Westphal 	icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
988485fca66SFlorian Westphal 	err = -EMSGSIZE;
989485fca66SFlorian Westphal 
9901da177e4SLinus Torvalds fail:
991adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
992a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGFAILS);
9931da177e4SLinus Torvalds 	kfree_skb(skb);
9941da177e4SLinus Torvalds 	return err;
9951da177e4SLinus Torvalds }
9961da177e4SLinus Torvalds 
997b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key,
998b71d1d42SEric Dumazet 			       const struct in6_addr *fl_addr,
999b71d1d42SEric Dumazet 			       const struct in6_addr *addr_cache)
1000cf6b1982SYOSHIFUJI Hideaki {
1001a02cec21SEric Dumazet 	return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) &&
100263159f29SIan Morris 		(!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache));
1003cf6b1982SYOSHIFUJI Hideaki }
1004cf6b1982SYOSHIFUJI Hideaki 
1005497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk,
1006497c615aSHerbert Xu 					  struct dst_entry *dst,
1007b71d1d42SEric Dumazet 					  const struct flowi6 *fl6)
10081da177e4SLinus Torvalds {
10091da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
1010a963a37dSEric Dumazet 	struct rt6_info *rt;
10111da177e4SLinus Torvalds 
1012497c615aSHerbert Xu 	if (!dst)
1013497c615aSHerbert Xu 		goto out;
10141da177e4SLinus Torvalds 
1015a963a37dSEric Dumazet 	if (dst->ops->family != AF_INET6) {
1016a963a37dSEric Dumazet 		dst_release(dst);
1017a963a37dSEric Dumazet 		return NULL;
1018a963a37dSEric Dumazet 	}
1019a963a37dSEric Dumazet 
1020a963a37dSEric Dumazet 	rt = (struct rt6_info *)dst;
10211da177e4SLinus Torvalds 	/* Yes, checking route validity in not connected
1022d76e60a5SDavid S. Miller 	 * case is not very simple. Take into account,
1023d76e60a5SDavid S. Miller 	 * that we do not support routing by source, TOS,
1024d76e60a5SDavid S. Miller 	 * and MSG_DONTROUTE		--ANK (980726)
1025d76e60a5SDavid S. Miller 	 *
1026cf6b1982SYOSHIFUJI Hideaki 	 * 1. ip6_rt_check(): If route was host route,
1027cf6b1982SYOSHIFUJI Hideaki 	 *    check that cached destination is current.
1028d76e60a5SDavid S. Miller 	 *    If it is network route, we still may
1029d76e60a5SDavid S. Miller 	 *    check its validity using saved pointer
1030d76e60a5SDavid S. Miller 	 *    to the last used address: daddr_cache.
1031d76e60a5SDavid S. Miller 	 *    We do not want to save whole address now,
1032d76e60a5SDavid S. Miller 	 *    (because main consumer of this service
1033d76e60a5SDavid S. Miller 	 *    is tcp, which has not this problem),
1034d76e60a5SDavid S. Miller 	 *    so that the last trick works only on connected
1035d76e60a5SDavid S. Miller 	 *    sockets.
1036d76e60a5SDavid S. Miller 	 * 2. oif also should be the same.
10371da177e4SLinus Torvalds 	 */
10384c9483b2SDavid S. Miller 	if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) ||
10398e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES
10404c9483b2SDavid S. Miller 	    ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) ||
10418e1ef0a9SYOSHIFUJI Hideaki #endif
104240867d74SDavid Ahern 	   (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex)) {
1043497c615aSHerbert Xu 		dst_release(dst);
1044497c615aSHerbert Xu 		dst = NULL;
10451da177e4SLinus Torvalds 	}
1046497c615aSHerbert Xu 
1047497c615aSHerbert Xu out:
1048497c615aSHerbert Xu 	return dst;
10491da177e4SLinus Torvalds }
1050497c615aSHerbert Xu 
10513aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
10524c9483b2SDavid S. Miller 			       struct dst_entry **dst, struct flowi6 *fl6)
1053497c615aSHerbert Xu {
105469cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
105569cce1d1SDavid S. Miller 	struct neighbour *n;
105697cac082SDavid S. Miller 	struct rt6_info *rt;
105769cce1d1SDavid S. Miller #endif
105869cce1d1SDavid S. Miller 	int err;
10596f21c96aSPaolo Abeni 	int flags = 0;
10601da177e4SLinus Torvalds 
1061e16e888bSMarkus Stenberg 	/* The correct way to handle this would be to do
1062e16e888bSMarkus Stenberg 	 * ip6_route_get_saddr, and then ip6_route_output; however,
1063e16e888bSMarkus Stenberg 	 * the route-specific preferred source forces the
1064e16e888bSMarkus Stenberg 	 * ip6_route_output call _before_ ip6_route_get_saddr.
1065e16e888bSMarkus Stenberg 	 *
1066e16e888bSMarkus Stenberg 	 * In source specific routing (no src=any default route),
1067e16e888bSMarkus Stenberg 	 * ip6_route_output will fail given src=any saddr, though, so
1068e16e888bSMarkus Stenberg 	 * that's why we try it again later.
1069e16e888bSMarkus Stenberg 	 */
1070c305b9e6Szhang kai 	if (ipv6_addr_any(&fl6->saddr)) {
1071a68886a6SDavid Ahern 		struct fib6_info *from;
1072e16e888bSMarkus Stenberg 		struct rt6_info *rt;
1073e16e888bSMarkus Stenberg 
1074e16e888bSMarkus Stenberg 		*dst = ip6_route_output(net, sk, fl6);
1075e16e888bSMarkus Stenberg 		rt = (*dst)->error ? NULL : (struct rt6_info *)*dst;
1076a68886a6SDavid Ahern 
1077a68886a6SDavid Ahern 		rcu_read_lock();
1078a68886a6SDavid Ahern 		from = rt ? rcu_dereference(rt->from) : NULL;
1079a68886a6SDavid Ahern 		err = ip6_route_get_saddr(net, from, &fl6->daddr,
1080e16e888bSMarkus Stenberg 					  sk ? inet6_sk(sk)->srcprefs : 0,
1081e16e888bSMarkus Stenberg 					  &fl6->saddr);
1082a68886a6SDavid Ahern 		rcu_read_unlock();
1083a68886a6SDavid Ahern 
1084e16e888bSMarkus Stenberg 		if (err)
1085e16e888bSMarkus Stenberg 			goto out_err_release;
1086e16e888bSMarkus Stenberg 
1087e16e888bSMarkus Stenberg 		/* If we had an erroneous initial result, pretend it
1088e16e888bSMarkus Stenberg 		 * never existed and let the SA-enabled version take
1089e16e888bSMarkus Stenberg 		 * over.
1090e16e888bSMarkus Stenberg 		 */
1091c305b9e6Szhang kai 		if ((*dst)->error) {
1092e16e888bSMarkus Stenberg 			dst_release(*dst);
1093e16e888bSMarkus Stenberg 			*dst = NULL;
1094e16e888bSMarkus Stenberg 		}
10956f21c96aSPaolo Abeni 
10966f21c96aSPaolo Abeni 		if (fl6->flowi6_oif)
10976f21c96aSPaolo Abeni 			flags |= RT6_LOOKUP_F_IFACE;
1098e16e888bSMarkus Stenberg 	}
1099e16e888bSMarkus Stenberg 
110063159f29SIan Morris 	if (!*dst)
11016f21c96aSPaolo Abeni 		*dst = ip6_route_output_flags(net, sk, fl6, flags);
11021da177e4SLinus Torvalds 
1103e5d08d71SIan Morris 	err = (*dst)->error;
1104e5d08d71SIan Morris 	if (err)
11051da177e4SLinus Torvalds 		goto out_err_release;
11061da177e4SLinus Torvalds 
110795c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
110895c385b4SNeil Horman 	/*
110995c385b4SNeil Horman 	 * Here if the dst entry we've looked up
111095c385b4SNeil Horman 	 * has a neighbour entry that is in the INCOMPLETE
111195c385b4SNeil Horman 	 * state and the src address from the flow is
111295c385b4SNeil Horman 	 * marked as OPTIMISTIC, we release the found
111395c385b4SNeil Horman 	 * dst entry and replace it instead with the
111495c385b4SNeil Horman 	 * dst entry of the nexthop router
111595c385b4SNeil Horman 	 */
1116c56bf6feSEric Dumazet 	rt = (struct rt6_info *) *dst;
1117707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
11182647a9b0SMartin KaFai Lau 	n = __ipv6_neigh_lookup_noref(rt->dst.dev,
11192647a9b0SMartin KaFai Lau 				      rt6_nexthop(rt, &fl6->daddr));
1120707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0;
1121707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
1122707be1ffSYOSHIFUJI Hideaki / 吉藤英明 
1123707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	if (err) {
112495c385b4SNeil Horman 		struct inet6_ifaddr *ifp;
11254c9483b2SDavid S. Miller 		struct flowi6 fl_gw6;
112695c385b4SNeil Horman 		int redirect;
112795c385b4SNeil Horman 
11284c9483b2SDavid S. Miller 		ifp = ipv6_get_ifaddr(net, &fl6->saddr,
11291cab3da6SDaniel Lezcano 				      (*dst)->dev, 1);
113095c385b4SNeil Horman 
113195c385b4SNeil Horman 		redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC);
113295c385b4SNeil Horman 		if (ifp)
113395c385b4SNeil Horman 			in6_ifa_put(ifp);
113495c385b4SNeil Horman 
113595c385b4SNeil Horman 		if (redirect) {
113695c385b4SNeil Horman 			/*
113795c385b4SNeil Horman 			 * We need to get the dst entry for the
113895c385b4SNeil Horman 			 * default router instead
113995c385b4SNeil Horman 			 */
114095c385b4SNeil Horman 			dst_release(*dst);
11414c9483b2SDavid S. Miller 			memcpy(&fl_gw6, fl6, sizeof(struct flowi6));
11424c9483b2SDavid S. Miller 			memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr));
11434c9483b2SDavid S. Miller 			*dst = ip6_route_output(net, sk, &fl_gw6);
1144e5d08d71SIan Morris 			err = (*dst)->error;
1145e5d08d71SIan Morris 			if (err)
114695c385b4SNeil Horman 				goto out_err_release;
114795c385b4SNeil Horman 		}
114895c385b4SNeil Horman 	}
114995c385b4SNeil Horman #endif
1150ec5e3b0aSJonathan T. Leighton 	if (ipv6_addr_v4mapped(&fl6->saddr) &&
115100ea1ceeSWillem de Bruijn 	    !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) {
115200ea1ceeSWillem de Bruijn 		err = -EAFNOSUPPORT;
115300ea1ceeSWillem de Bruijn 		goto out_err_release;
115400ea1ceeSWillem de Bruijn 	}
115595c385b4SNeil Horman 
11561da177e4SLinus Torvalds 	return 0;
11571da177e4SLinus Torvalds 
11581da177e4SLinus Torvalds out_err_release:
11591da177e4SLinus Torvalds 	dst_release(*dst);
11601da177e4SLinus Torvalds 	*dst = NULL;
11618a966fc0SDavid Ahern 
11620d240e78SDavid Ahern 	if (err == -ENETUNREACH)
11630d240e78SDavid Ahern 		IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES);
11641da177e4SLinus Torvalds 	return err;
11651da177e4SLinus Torvalds }
116634a0b3cdSAdrian Bunk 
1167497c615aSHerbert Xu /**
1168497c615aSHerbert Xu  *	ip6_dst_lookup - perform route lookup on flow
1169b51cd7c8SAndrew Lunn  *	@net: Network namespace to perform lookup in
1170497c615aSHerbert Xu  *	@sk: socket which provides route info
1171497c615aSHerbert Xu  *	@dst: pointer to dst_entry * for result
11724c9483b2SDavid S. Miller  *	@fl6: flow to lookup
1173497c615aSHerbert Xu  *
1174497c615aSHerbert Xu  *	This function performs a route lookup on the given flow.
1175497c615aSHerbert Xu  *
1176497c615aSHerbert Xu  *	It returns zero on success, or a standard errno code on error.
1177497c615aSHerbert Xu  */
1178343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst,
1179343d60aaSRoopa Prabhu 		   struct flowi6 *fl6)
1180497c615aSHerbert Xu {
1181497c615aSHerbert Xu 	*dst = NULL;
1182343d60aaSRoopa Prabhu 	return ip6_dst_lookup_tail(net, sk, dst, fl6);
1183497c615aSHerbert Xu }
11843cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup);
11853cf3dc6cSArnaldo Carvalho de Melo 
1186497c615aSHerbert Xu /**
118768d0c6d3SDavid S. Miller  *	ip6_dst_lookup_flow - perform route lookup on flow with ipsec
1188b51cd7c8SAndrew Lunn  *	@net: Network namespace to perform lookup in
118968d0c6d3SDavid S. Miller  *	@sk: socket which provides route info
11904c9483b2SDavid S. Miller  *	@fl6: flow to lookup
119168d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
119268d0c6d3SDavid S. Miller  *
119368d0c6d3SDavid S. Miller  *	This function performs a route lookup on the given flow.
119468d0c6d3SDavid S. Miller  *
119568d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
119668d0c6d3SDavid S. Miller  *	error code.
119768d0c6d3SDavid S. Miller  */
1198c4e85f73SSabrina Dubroca struct dst_entry *ip6_dst_lookup_flow(struct net *net, const struct sock *sk, struct flowi6 *fl6,
11990e0d44abSSteffen Klassert 				      const struct in6_addr *final_dst)
120068d0c6d3SDavid S. Miller {
120168d0c6d3SDavid S. Miller 	struct dst_entry *dst = NULL;
120268d0c6d3SDavid S. Miller 	int err;
120368d0c6d3SDavid S. Miller 
1204c4e85f73SSabrina Dubroca 	err = ip6_dst_lookup_tail(net, sk, &dst, fl6);
120568d0c6d3SDavid S. Miller 	if (err)
120668d0c6d3SDavid S. Miller 		return ERR_PTR(err);
120768d0c6d3SDavid S. Miller 	if (final_dst)
12084e3fd7a0SAlexey Dobriyan 		fl6->daddr = *final_dst;
12092774c131SDavid S. Miller 
1210c4e85f73SSabrina Dubroca 	return xfrm_lookup_route(net, dst, flowi6_to_flowi(fl6), sk, 0);
121168d0c6d3SDavid S. Miller }
121268d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow);
121368d0c6d3SDavid S. Miller 
121468d0c6d3SDavid S. Miller /**
121568d0c6d3SDavid S. Miller  *	ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow
121668d0c6d3SDavid S. Miller  *	@sk: socket which provides the dst cache and route info
12174c9483b2SDavid S. Miller  *	@fl6: flow to lookup
121868d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
121996818159SAlexey Kodanev  *	@connected: whether @sk is connected or not
1220497c615aSHerbert Xu  *
1221497c615aSHerbert Xu  *	This function performs a route lookup on the given flow with the
1222497c615aSHerbert Xu  *	possibility of using the cached route in the socket if it is valid.
1223497c615aSHerbert Xu  *	It will take the socket dst lock when operating on the dst cache.
1224497c615aSHerbert Xu  *	As a result, this function can only be used in process context.
1225497c615aSHerbert Xu  *
122696818159SAlexey Kodanev  *	In addition, for a connected socket, cache the dst in the socket
122796818159SAlexey Kodanev  *	if the current cache is not valid.
122896818159SAlexey Kodanev  *
122968d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
123068d0c6d3SDavid S. Miller  *	error code.
1231497c615aSHerbert Xu  */
12324c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6,
123396818159SAlexey Kodanev 					 const struct in6_addr *final_dst,
123496818159SAlexey Kodanev 					 bool connected)
1235497c615aSHerbert Xu {
123668d0c6d3SDavid S. Miller 	struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie);
1237497c615aSHerbert Xu 
12384c9483b2SDavid S. Miller 	dst = ip6_sk_dst_check(sk, dst, fl6);
123996818159SAlexey Kodanev 	if (dst)
124096818159SAlexey Kodanev 		return dst;
124196818159SAlexey Kodanev 
1242c4e85f73SSabrina Dubroca 	dst = ip6_dst_lookup_flow(sock_net(sk), sk, fl6, final_dst);
124396818159SAlexey Kodanev 	if (connected && !IS_ERR(dst))
124496818159SAlexey Kodanev 		ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6);
124568d0c6d3SDavid S. Miller 
124600bc0ef5SJakub Sitnicki 	return dst;
124768d0c6d3SDavid S. Miller }
124868d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow);
1249497c615aSHerbert Xu 
1250571912c6SMartin Varghese /**
1251571912c6SMartin Varghese  *      ip6_dst_lookup_tunnel - perform route lookup on tunnel
1252571912c6SMartin Varghese  *      @skb: Packet for which lookup is done
1253571912c6SMartin Varghese  *      @dev: Tunnel device
1254571912c6SMartin Varghese  *      @net: Network namespace of tunnel device
1255b51cd7c8SAndrew Lunn  *      @sock: Socket which provides route info
1256571912c6SMartin Varghese  *      @saddr: Memory to store the src ip address
1257571912c6SMartin Varghese  *      @info: Tunnel information
1258571912c6SMartin Varghese  *      @protocol: IP protocol
1259b51cd7c8SAndrew Lunn  *      @use_cache: Flag to enable cache usage
1260571912c6SMartin Varghese  *      This function performs a route lookup on a tunnel
1261571912c6SMartin Varghese  *
1262571912c6SMartin Varghese  *      It returns a valid dst pointer and stores src address to be used in
1263571912c6SMartin Varghese  *      tunnel in param saddr on success, else a pointer encoded error code.
1264571912c6SMartin Varghese  */
1265571912c6SMartin Varghese 
1266571912c6SMartin Varghese struct dst_entry *ip6_dst_lookup_tunnel(struct sk_buff *skb,
1267571912c6SMartin Varghese 					struct net_device *dev,
1268571912c6SMartin Varghese 					struct net *net,
1269571912c6SMartin Varghese 					struct socket *sock,
1270571912c6SMartin Varghese 					struct in6_addr *saddr,
1271571912c6SMartin Varghese 					const struct ip_tunnel_info *info,
1272571912c6SMartin Varghese 					u8 protocol,
1273571912c6SMartin Varghese 					bool use_cache)
1274571912c6SMartin Varghese {
1275571912c6SMartin Varghese 	struct dst_entry *dst = NULL;
1276571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE
1277571912c6SMartin Varghese 	struct dst_cache *dst_cache;
1278571912c6SMartin Varghese #endif
1279571912c6SMartin Varghese 	struct flowi6 fl6;
1280571912c6SMartin Varghese 	__u8 prio;
1281571912c6SMartin Varghese 
1282571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE
1283571912c6SMartin Varghese 	dst_cache = (struct dst_cache *)&info->dst_cache;
1284571912c6SMartin Varghese 	if (use_cache) {
1285571912c6SMartin Varghese 		dst = dst_cache_get_ip6(dst_cache, saddr);
1286571912c6SMartin Varghese 		if (dst)
1287571912c6SMartin Varghese 			return dst;
1288571912c6SMartin Varghese 	}
1289571912c6SMartin Varghese #endif
1290571912c6SMartin Varghese 	memset(&fl6, 0, sizeof(fl6));
1291571912c6SMartin Varghese 	fl6.flowi6_mark = skb->mark;
1292571912c6SMartin Varghese 	fl6.flowi6_proto = protocol;
1293571912c6SMartin Varghese 	fl6.daddr = info->key.u.ipv6.dst;
1294571912c6SMartin Varghese 	fl6.saddr = info->key.u.ipv6.src;
1295571912c6SMartin Varghese 	prio = info->key.tos;
1296571912c6SMartin Varghese 	fl6.flowlabel = ip6_make_flowinfo(RT_TOS(prio),
1297571912c6SMartin Varghese 					  info->key.label);
1298571912c6SMartin Varghese 
1299571912c6SMartin Varghese 	dst = ipv6_stub->ipv6_dst_lookup_flow(net, sock->sk, &fl6,
1300571912c6SMartin Varghese 					      NULL);
1301571912c6SMartin Varghese 	if (IS_ERR(dst)) {
1302571912c6SMartin Varghese 		netdev_dbg(dev, "no route to %pI6\n", &fl6.daddr);
1303571912c6SMartin Varghese 		return ERR_PTR(-ENETUNREACH);
1304571912c6SMartin Varghese 	}
1305571912c6SMartin Varghese 	if (dst->dev == dev) { /* is this necessary? */
1306571912c6SMartin Varghese 		netdev_dbg(dev, "circular route to %pI6\n", &fl6.daddr);
1307571912c6SMartin Varghese 		dst_release(dst);
1308571912c6SMartin Varghese 		return ERR_PTR(-ELOOP);
1309571912c6SMartin Varghese 	}
1310571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE
1311571912c6SMartin Varghese 	if (use_cache)
1312571912c6SMartin Varghese 		dst_cache_set_ip6(dst_cache, dst, &fl6.saddr);
1313571912c6SMartin Varghese #endif
1314571912c6SMartin Varghese 	*saddr = fl6.saddr;
1315571912c6SMartin Varghese 	return dst;
1316571912c6SMartin Varghese }
1317571912c6SMartin Varghese EXPORT_SYMBOL_GPL(ip6_dst_lookup_tunnel);
1318571912c6SMartin Varghese 
13190178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src,
13200178b695SHerbert Xu 					       gfp_t gfp)
13210178b695SHerbert Xu {
13220178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
13230178b695SHerbert Xu }
13240178b695SHerbert Xu 
13250178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src,
13260178b695SHerbert Xu 						gfp_t gfp)
13270178b695SHerbert Xu {
13280178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
13290178b695SHerbert Xu }
13300178b695SHerbert Xu 
133175a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu,
13320c183379SGao feng 				int *maxfraglen,
13330c183379SGao feng 				unsigned int fragheaderlen,
13340c183379SGao feng 				struct sk_buff *skb,
133575a493e6SHannes Frederic Sowa 				struct rt6_info *rt,
1336e367c2d0Slucien 				unsigned int orig_mtu)
13370c183379SGao feng {
13380c183379SGao feng 	if (!(rt->dst.flags & DST_XFRM_TUNNEL)) {
133963159f29SIan Morris 		if (!skb) {
13400c183379SGao feng 			/* first fragment, reserve header_len */
1341e367c2d0Slucien 			*mtu = orig_mtu - rt->dst.header_len;
13420c183379SGao feng 
13430c183379SGao feng 		} else {
13440c183379SGao feng 			/*
13450c183379SGao feng 			 * this fragment is not first, the headers
13460c183379SGao feng 			 * space is regarded as data space.
13470c183379SGao feng 			 */
1348e367c2d0Slucien 			*mtu = orig_mtu;
13490c183379SGao feng 		}
13500c183379SGao feng 		*maxfraglen = ((*mtu - fragheaderlen) & ~7)
13510c183379SGao feng 			      + fragheaderlen - sizeof(struct frag_hdr);
13520c183379SGao feng 	}
13530c183379SGao feng }
13540c183379SGao feng 
1355366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork,
135626879da5SWei Wang 			  struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6,
1357f37a4cc6SPavel Begunkov 			  struct rt6_info *rt)
1358366e41d9SVlad Yasevich {
1359366e41d9SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
1360366e41d9SVlad Yasevich 	unsigned int mtu;
1361d656b2eaSPavel Begunkov 	struct ipv6_txoptions *nopt, *opt = ipc6->opt;
1362366e41d9SVlad Yasevich 
136340ac240cSPavel Begunkov 	/* callers pass dst together with a reference, set it first so
136440ac240cSPavel Begunkov 	 * ip6_cork_release() can put it down even in case of an error.
136540ac240cSPavel Begunkov 	 */
136640ac240cSPavel Begunkov 	cork->base.dst = &rt->dst;
136740ac240cSPavel Begunkov 
1368366e41d9SVlad Yasevich 	/*
1369366e41d9SVlad Yasevich 	 * setup for corking
1370366e41d9SVlad Yasevich 	 */
1371366e41d9SVlad Yasevich 	if (opt) {
1372366e41d9SVlad Yasevich 		if (WARN_ON(v6_cork->opt))
1373366e41d9SVlad Yasevich 			return -EINVAL;
1374366e41d9SVlad Yasevich 
1375d656b2eaSPavel Begunkov 		nopt = v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation);
1376d656b2eaSPavel Begunkov 		if (unlikely(!nopt))
1377366e41d9SVlad Yasevich 			return -ENOBUFS;
1378366e41d9SVlad Yasevich 
1379d656b2eaSPavel Begunkov 		nopt->tot_len = sizeof(*opt);
1380d656b2eaSPavel Begunkov 		nopt->opt_flen = opt->opt_flen;
1381d656b2eaSPavel Begunkov 		nopt->opt_nflen = opt->opt_nflen;
1382366e41d9SVlad Yasevich 
1383d656b2eaSPavel Begunkov 		nopt->dst0opt = ip6_opt_dup(opt->dst0opt, sk->sk_allocation);
1384d656b2eaSPavel Begunkov 		if (opt->dst0opt && !nopt->dst0opt)
1385366e41d9SVlad Yasevich 			return -ENOBUFS;
1386366e41d9SVlad Yasevich 
1387d656b2eaSPavel Begunkov 		nopt->dst1opt = ip6_opt_dup(opt->dst1opt, sk->sk_allocation);
1388d656b2eaSPavel Begunkov 		if (opt->dst1opt && !nopt->dst1opt)
1389366e41d9SVlad Yasevich 			return -ENOBUFS;
1390366e41d9SVlad Yasevich 
1391d656b2eaSPavel Begunkov 		nopt->hopopt = ip6_opt_dup(opt->hopopt, sk->sk_allocation);
1392d656b2eaSPavel Begunkov 		if (opt->hopopt && !nopt->hopopt)
1393366e41d9SVlad Yasevich 			return -ENOBUFS;
1394366e41d9SVlad Yasevich 
1395d656b2eaSPavel Begunkov 		nopt->srcrt = ip6_rthdr_dup(opt->srcrt, sk->sk_allocation);
1396d656b2eaSPavel Begunkov 		if (opt->srcrt && !nopt->srcrt)
1397366e41d9SVlad Yasevich 			return -ENOBUFS;
1398366e41d9SVlad Yasevich 
1399366e41d9SVlad Yasevich 		/* need source address above miyazawa*/
1400366e41d9SVlad Yasevich 	}
140126879da5SWei Wang 	v6_cork->hop_limit = ipc6->hlimit;
140226879da5SWei Wang 	v6_cork->tclass = ipc6->tclass;
1403366e41d9SVlad Yasevich 	if (rt->dst.flags & DST_XFRM_TUNNEL)
1404366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1405749439bfSMike Maloney 		      READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst);
1406366e41d9SVlad Yasevich 	else
1407366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1408c02b3741SDavid S. Miller 			READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst));
1409366e41d9SVlad Yasevich 	if (np->frag_size < mtu) {
1410366e41d9SVlad Yasevich 		if (np->frag_size)
1411366e41d9SVlad Yasevich 			mtu = np->frag_size;
1412366e41d9SVlad Yasevich 	}
1413366e41d9SVlad Yasevich 	cork->base.fragsize = mtu;
1414fbf47813SWillem de Bruijn 	cork->base.gso_size = ipc6->gso_size;
1415678ca42dSWillem de Bruijn 	cork->base.tx_flags = 0;
1416c6af0c22SWillem de Bruijn 	cork->base.mark = ipc6->sockc.mark;
1417678ca42dSWillem de Bruijn 	sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags);
1418bec1f6f6SWillem de Bruijn 
14190f6c480fSDavid Miller 	if (dst_allfrag(xfrm_dst_path(&rt->dst)))
1420366e41d9SVlad Yasevich 		cork->base.flags |= IPCORK_ALLFRAG;
1421366e41d9SVlad Yasevich 	cork->base.length = 0;
1422366e41d9SVlad Yasevich 
14235fdaa88dSWillem de Bruijn 	cork->base.transmit_time = ipc6->sockc.transmit_time;
1424a818f75eSJesus Sanchez-Palencia 
1425366e41d9SVlad Yasevich 	return 0;
1426366e41d9SVlad Yasevich }
1427366e41d9SVlad Yasevich 
14280bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk,
14290bbe84a6SVlad Yasevich 			     struct sk_buff_head *queue,
1430f3b46a3eSPavel Begunkov 			     struct inet_cork_full *cork_full,
14310bbe84a6SVlad Yasevich 			     struct inet6_cork *v6_cork,
14320bbe84a6SVlad Yasevich 			     struct page_frag *pfrag,
14330bbe84a6SVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
14340bbe84a6SVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
14351da177e4SLinus Torvalds 			     void *from, int length, int transhdrlen,
14365fdaa88dSWillem de Bruijn 			     unsigned int flags, struct ipcm6_cookie *ipc6)
14371da177e4SLinus Torvalds {
14380c183379SGao feng 	struct sk_buff *skb, *skb_prev = NULL;
1439f3b46a3eSPavel Begunkov 	struct inet_cork *cork = &cork_full->base;
1440f37a4cc6SPavel Begunkov 	struct flowi6 *fl6 = &cork_full->fl.u.ip6;
144110b8a3deSPaolo Abeni 	unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu;
1442b5947e5dSWillem de Bruijn 	struct ubuf_info *uarg = NULL;
14430bbe84a6SVlad Yasevich 	int exthdrlen = 0;
14440bbe84a6SVlad Yasevich 	int dst_exthdrlen = 0;
14451da177e4SLinus Torvalds 	int hh_len;
14461da177e4SLinus Torvalds 	int copy;
14471da177e4SLinus Torvalds 	int err;
14481da177e4SLinus Torvalds 	int offset = 0;
144909c2d251SWillem de Bruijn 	u32 tskey = 0;
14500bbe84a6SVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->dst;
14510bbe84a6SVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
145232dce968SVlad Yasevich 	int csummode = CHECKSUM_NONE;
1453682b1a9dSHannes Frederic Sowa 	unsigned int maxnonfragsize, headersize;
14541f4c6eb2SEric Dumazet 	unsigned int wmem_alloc_delta = 0;
1455100f6d8eSWillem de Bruijn 	bool paged, extra_uref = false;
14561da177e4SLinus Torvalds 
14570bbe84a6SVlad Yasevich 	skb = skb_peek_tail(queue);
14580bbe84a6SVlad Yasevich 	if (!skb) {
14590bbe84a6SVlad Yasevich 		exthdrlen = opt ? opt->opt_flen : 0;
14607efdba5bSRomain KUNTZ 		dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len;
14611da177e4SLinus Torvalds 	}
14620bbe84a6SVlad Yasevich 
146315e36f5bSWillem de Bruijn 	paged = !!cork->gso_size;
1464bec1f6f6SWillem de Bruijn 	mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize;
1465e367c2d0Slucien 	orig_mtu = mtu;
14661da177e4SLinus Torvalds 
1467678ca42dSWillem de Bruijn 	if (cork->tx_flags & SKBTX_ANY_SW_TSTAMP &&
1468678ca42dSWillem de Bruijn 	    sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID)
1469a1cdec57SEric Dumazet 		tskey = atomic_inc_return(&sk->sk_tskey) - 1;
1470678ca42dSWillem de Bruijn 
1471d8d1f30bSChangli Gao 	hh_len = LL_RESERVED_SPACE(rt->dst.dev);
14721da177e4SLinus Torvalds 
1473a1b05140SMasahide NAKAMURA 	fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len +
1474b4ce9277SHerbert Xu 			(opt ? opt->opt_nflen : 0);
14751da177e4SLinus Torvalds 
14764df98e76SHannes Frederic Sowa 	headersize = sizeof(struct ipv6hdr) +
14773a1cebe7SHannes Frederic Sowa 		     (opt ? opt->opt_flen + opt->opt_nflen : 0) +
14784df98e76SHannes Frederic Sowa 		     (dst_allfrag(&rt->dst) ?
14794df98e76SHannes Frederic Sowa 		      sizeof(struct frag_hdr) : 0) +
14804df98e76SHannes Frederic Sowa 		     rt->rt6i_nfheader_len;
14814df98e76SHannes Frederic Sowa 
14825e34af41STadeusz Struk 	if (mtu <= fragheaderlen ||
14835e34af41STadeusz Struk 	    ((mtu - fragheaderlen) & ~7) + fragheaderlen <= sizeof(struct frag_hdr))
14846596a022SJiri Bohac 		goto emsgsize;
14856596a022SJiri Bohac 
14866596a022SJiri Bohac 	maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen -
14876596a022SJiri Bohac 		     sizeof(struct frag_hdr);
14886596a022SJiri Bohac 
148910b8a3deSPaolo Abeni 	/* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit
149010b8a3deSPaolo Abeni 	 * the first fragment
149110b8a3deSPaolo Abeni 	 */
149210b8a3deSPaolo Abeni 	if (headersize + transhdrlen > mtu)
149310b8a3deSPaolo Abeni 		goto emsgsize;
149410b8a3deSPaolo Abeni 
149526879da5SWei Wang 	if (cork->length + length > mtu - headersize && ipc6->dontfrag &&
14964df98e76SHannes Frederic Sowa 	    (sk->sk_protocol == IPPROTO_UDP ||
149713651224SJakub Kicinski 	     sk->sk_protocol == IPPROTO_ICMPV6 ||
14984df98e76SHannes Frederic Sowa 	     sk->sk_protocol == IPPROTO_RAW)) {
14994df98e76SHannes Frederic Sowa 		ipv6_local_rxpmtu(sk, fl6, mtu - headersize +
15004df98e76SHannes Frederic Sowa 				sizeof(struct ipv6hdr));
15014df98e76SHannes Frederic Sowa 		goto emsgsize;
15024df98e76SHannes Frederic Sowa 	}
15034df98e76SHannes Frederic Sowa 
1504682b1a9dSHannes Frederic Sowa 	if (ip6_sk_ignore_df(sk))
1505682b1a9dSHannes Frederic Sowa 		maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN;
1506682b1a9dSHannes Frederic Sowa 	else
1507682b1a9dSHannes Frederic Sowa 		maxnonfragsize = mtu;
1508682b1a9dSHannes Frederic Sowa 
15094df98e76SHannes Frederic Sowa 	if (cork->length + length > maxnonfragsize - headersize) {
15104df98e76SHannes Frederic Sowa emsgsize:
151110b8a3deSPaolo Abeni 		pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0);
151210b8a3deSPaolo Abeni 		ipv6_local_error(sk, EMSGSIZE, fl6, pmtu);
15131da177e4SLinus Torvalds 		return -EMSGSIZE;
15141da177e4SLinus Torvalds 	}
1515682b1a9dSHannes Frederic Sowa 
1516682b1a9dSHannes Frederic Sowa 	/* CHECKSUM_PARTIAL only with no extension headers and when
1517682b1a9dSHannes Frederic Sowa 	 * we are not going to fragment
1518682b1a9dSHannes Frederic Sowa 	 */
1519682b1a9dSHannes Frederic Sowa 	if (transhdrlen && sk->sk_protocol == IPPROTO_UDP &&
1520682b1a9dSHannes Frederic Sowa 	    headersize == sizeof(struct ipv6hdr) &&
15212b89ed65SVlad Yasevich 	    length <= mtu - headersize &&
1522bec1f6f6SWillem de Bruijn 	    (!(flags & MSG_MORE) || cork->gso_size) &&
1523c8cd0989STom Herbert 	    rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM))
1524682b1a9dSHannes Frederic Sowa 		csummode = CHECKSUM_PARTIAL;
15251da177e4SLinus Torvalds 
1526b5947e5dSWillem de Bruijn 	if (flags & MSG_ZEROCOPY && length && sock_flag(sk, SOCK_ZEROCOPY)) {
15278c793822SJonathan Lemon 		uarg = msg_zerocopy_realloc(sk, length, skb_zcopy(skb));
1528b5947e5dSWillem de Bruijn 		if (!uarg)
1529b5947e5dSWillem de Bruijn 			return -ENOBUFS;
1530522924b5SWillem de Bruijn 		extra_uref = !skb_zcopy(skb);	/* only ref on new uarg */
1531b5947e5dSWillem de Bruijn 		if (rt->dst.dev->features & NETIF_F_SG &&
1532b5947e5dSWillem de Bruijn 		    csummode == CHECKSUM_PARTIAL) {
1533b5947e5dSWillem de Bruijn 			paged = true;
1534b5947e5dSWillem de Bruijn 		} else {
1535b5947e5dSWillem de Bruijn 			uarg->zerocopy = 0;
153652900d22SWillem de Bruijn 			skb_zcopy_set(skb, uarg, &extra_uref);
1537b5947e5dSWillem de Bruijn 		}
1538b5947e5dSWillem de Bruijn 	}
1539b5947e5dSWillem de Bruijn 
15401da177e4SLinus Torvalds 	/*
15411da177e4SLinus Torvalds 	 * Let's try using as much space as possible.
15421da177e4SLinus Torvalds 	 * Use MTU if total length of the message fits into the MTU.
15431da177e4SLinus Torvalds 	 * Otherwise, we need to reserve fragment header and
15441da177e4SLinus Torvalds 	 * fragment alignment (= 8-15 octects, in total).
15451da177e4SLinus Torvalds 	 *
1546634a63e7SRandy Dunlap 	 * Note that we may need to "move" the data from the tail
15471da177e4SLinus Torvalds 	 * of the buffer to the new fragment when we split
15481da177e4SLinus Torvalds 	 * the message.
15491da177e4SLinus Torvalds 	 *
15501da177e4SLinus Torvalds 	 * FIXME: It may be fragmented into multiple chunks
15511da177e4SLinus Torvalds 	 *        at once if non-fragmentable extension headers
15521da177e4SLinus Torvalds 	 *        are too large.
15531da177e4SLinus Torvalds 	 * --yoshfuji
15541da177e4SLinus Torvalds 	 */
15551da177e4SLinus Torvalds 
15562811ebacSHannes Frederic Sowa 	cork->length += length;
15572811ebacSHannes Frederic Sowa 	if (!skb)
15581da177e4SLinus Torvalds 		goto alloc_new_skb;
15591da177e4SLinus Torvalds 
15601da177e4SLinus Torvalds 	while (length > 0) {
15611da177e4SLinus Torvalds 		/* Check if the remaining data fits into current packet. */
1562bdc712b4SDavid S. Miller 		copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len;
15631da177e4SLinus Torvalds 		if (copy < length)
15641da177e4SLinus Torvalds 			copy = maxfraglen - skb->len;
15651da177e4SLinus Torvalds 
15661da177e4SLinus Torvalds 		if (copy <= 0) {
15671da177e4SLinus Torvalds 			char *data;
15681da177e4SLinus Torvalds 			unsigned int datalen;
15691da177e4SLinus Torvalds 			unsigned int fraglen;
15701da177e4SLinus Torvalds 			unsigned int fraggap;
15716d123b81SJakub Kicinski 			unsigned int alloclen, alloc_extra;
1572aba36930SWillem de Bruijn 			unsigned int pagedlen;
15731da177e4SLinus Torvalds alloc_new_skb:
15741da177e4SLinus Torvalds 			/* There's no room in the current skb */
15750c183379SGao feng 			if (skb)
15760c183379SGao feng 				fraggap = skb->len - maxfraglen;
15771da177e4SLinus Torvalds 			else
15781da177e4SLinus Torvalds 				fraggap = 0;
15790c183379SGao feng 			/* update mtu and maxfraglen if necessary */
158063159f29SIan Morris 			if (!skb || !skb_prev)
15810c183379SGao feng 				ip6_append_data_mtu(&mtu, &maxfraglen,
158275a493e6SHannes Frederic Sowa 						    fragheaderlen, skb, rt,
1583e367c2d0Slucien 						    orig_mtu);
15840c183379SGao feng 
15850c183379SGao feng 			skb_prev = skb;
15861da177e4SLinus Torvalds 
15871da177e4SLinus Torvalds 			/*
15881da177e4SLinus Torvalds 			 * If remaining data exceeds the mtu,
15891da177e4SLinus Torvalds 			 * we know we need more fragment(s).
15901da177e4SLinus Torvalds 			 */
15911da177e4SLinus Torvalds 			datalen = length + fraggap;
15921da177e4SLinus Torvalds 
15930c183379SGao feng 			if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen)
15940c183379SGao feng 				datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len;
159515e36f5bSWillem de Bruijn 			fraglen = datalen + fragheaderlen;
1596aba36930SWillem de Bruijn 			pagedlen = 0;
159715e36f5bSWillem de Bruijn 
15986d123b81SJakub Kicinski 			alloc_extra = hh_len;
15996d123b81SJakub Kicinski 			alloc_extra += dst_exthdrlen;
16006d123b81SJakub Kicinski 			alloc_extra += rt->dst.trailer_len;
16016d123b81SJakub Kicinski 
16026d123b81SJakub Kicinski 			/* We just reserve space for fragment header.
16036d123b81SJakub Kicinski 			 * Note: this may be overallocation if the message
16046d123b81SJakub Kicinski 			 * (without MSG_MORE) fits into the MTU.
16056d123b81SJakub Kicinski 			 */
16066d123b81SJakub Kicinski 			alloc_extra += sizeof(struct frag_hdr);
16076d123b81SJakub Kicinski 
16081da177e4SLinus Torvalds 			if ((flags & MSG_MORE) &&
1609d8d1f30bSChangli Gao 			    !(rt->dst.dev->features&NETIF_F_SG))
16101da177e4SLinus Torvalds 				alloclen = mtu;
16116d123b81SJakub Kicinski 			else if (!paged &&
16126d123b81SJakub Kicinski 				 (fraglen + alloc_extra < SKB_MAX_ALLOC ||
16136d123b81SJakub Kicinski 				  !(rt->dst.dev->features & NETIF_F_SG)))
161415e36f5bSWillem de Bruijn 				alloclen = fraglen;
161515e36f5bSWillem de Bruijn 			else {
161615e36f5bSWillem de Bruijn 				alloclen = min_t(int, fraglen, MAX_HEADER);
161715e36f5bSWillem de Bruijn 				pagedlen = fraglen - alloclen;
161815e36f5bSWillem de Bruijn 			}
16196d123b81SJakub Kicinski 			alloclen += alloc_extra;
1620299b0767SSteffen Klassert 
16210c183379SGao feng 			if (datalen != length + fraggap) {
16221da177e4SLinus Torvalds 				/*
16230c183379SGao feng 				 * this is not the last fragment, the trailer
16240c183379SGao feng 				 * space is regarded as data space.
16251da177e4SLinus Torvalds 				 */
16260c183379SGao feng 				datalen += rt->dst.trailer_len;
16270c183379SGao feng 			}
16280c183379SGao feng 
16290c183379SGao feng 			fraglen = datalen + fragheaderlen;
16301da177e4SLinus Torvalds 
163115e36f5bSWillem de Bruijn 			copy = datalen - transhdrlen - fraggap - pagedlen;
1632232cd35dSEric Dumazet 			if (copy < 0) {
1633232cd35dSEric Dumazet 				err = -EINVAL;
1634232cd35dSEric Dumazet 				goto error;
1635232cd35dSEric Dumazet 			}
16361da177e4SLinus Torvalds 			if (transhdrlen) {
16376d123b81SJakub Kicinski 				skb = sock_alloc_send_skb(sk, alloclen,
16381da177e4SLinus Torvalds 						(flags & MSG_DONTWAIT), &err);
16391da177e4SLinus Torvalds 			} else {
16401da177e4SLinus Torvalds 				skb = NULL;
16411f4c6eb2SEric Dumazet 				if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <=
16421da177e4SLinus Torvalds 				    2 * sk->sk_sndbuf)
16436d123b81SJakub Kicinski 					skb = alloc_skb(alloclen,
16441da177e4SLinus Torvalds 							sk->sk_allocation);
164563159f29SIan Morris 				if (unlikely(!skb))
16461da177e4SLinus Torvalds 					err = -ENOBUFS;
16471da177e4SLinus Torvalds 			}
164863159f29SIan Morris 			if (!skb)
16491da177e4SLinus Torvalds 				goto error;
16501da177e4SLinus Torvalds 			/*
16511da177e4SLinus Torvalds 			 *	Fill in the control structures
16521da177e4SLinus Torvalds 			 */
16539c9c9ad5SHannes Frederic Sowa 			skb->protocol = htons(ETH_P_IPV6);
165432dce968SVlad Yasevich 			skb->ip_summed = csummode;
16551da177e4SLinus Torvalds 			skb->csum = 0;
16561f85851eSGao feng 			/* reserve for fragmentation and ipsec header */
16571f85851eSGao feng 			skb_reserve(skb, hh_len + sizeof(struct frag_hdr) +
16581f85851eSGao feng 				    dst_exthdrlen);
16591da177e4SLinus Torvalds 
16601da177e4SLinus Torvalds 			/*
16611da177e4SLinus Torvalds 			 *	Find where to start putting bytes
16621da177e4SLinus Torvalds 			 */
166315e36f5bSWillem de Bruijn 			data = skb_put(skb, fraglen - pagedlen);
16641f85851eSGao feng 			skb_set_network_header(skb, exthdrlen);
16651f85851eSGao feng 			data += fragheaderlen;
1666b0e380b1SArnaldo Carvalho de Melo 			skb->transport_header = (skb->network_header +
1667b0e380b1SArnaldo Carvalho de Melo 						 fragheaderlen);
16681da177e4SLinus Torvalds 			if (fraggap) {
16691da177e4SLinus Torvalds 				skb->csum = skb_copy_and_csum_bits(
16701da177e4SLinus Torvalds 					skb_prev, maxfraglen,
16718d5930dfSAl Viro 					data + transhdrlen, fraggap);
16721da177e4SLinus Torvalds 				skb_prev->csum = csum_sub(skb_prev->csum,
16731da177e4SLinus Torvalds 							  skb->csum);
16741da177e4SLinus Torvalds 				data += fraggap;
1675e9fa4f7bSHerbert Xu 				pskb_trim_unique(skb_prev, maxfraglen);
16761da177e4SLinus Torvalds 			}
1677232cd35dSEric Dumazet 			if (copy > 0 &&
1678232cd35dSEric Dumazet 			    getfrag(from, data + transhdrlen, offset,
1679232cd35dSEric Dumazet 				    copy, fraggap, skb) < 0) {
16801da177e4SLinus Torvalds 				err = -EFAULT;
16811da177e4SLinus Torvalds 				kfree_skb(skb);
16821da177e4SLinus Torvalds 				goto error;
16831da177e4SLinus Torvalds 			}
16841da177e4SLinus Torvalds 
16851da177e4SLinus Torvalds 			offset += copy;
168615e36f5bSWillem de Bruijn 			length -= copy + transhdrlen;
16871da177e4SLinus Torvalds 			transhdrlen = 0;
16881da177e4SLinus Torvalds 			exthdrlen = 0;
1689299b0767SSteffen Klassert 			dst_exthdrlen = 0;
16901da177e4SLinus Torvalds 
169152900d22SWillem de Bruijn 			/* Only the initial fragment is time stamped */
169252900d22SWillem de Bruijn 			skb_shinfo(skb)->tx_flags = cork->tx_flags;
169352900d22SWillem de Bruijn 			cork->tx_flags = 0;
169452900d22SWillem de Bruijn 			skb_shinfo(skb)->tskey = tskey;
169552900d22SWillem de Bruijn 			tskey = 0;
169652900d22SWillem de Bruijn 			skb_zcopy_set(skb, uarg, &extra_uref);
169752900d22SWillem de Bruijn 
16980dec879fSJulian Anastasov 			if ((flags & MSG_CONFIRM) && !skb_prev)
16990dec879fSJulian Anastasov 				skb_set_dst_pending_confirm(skb, 1);
17000dec879fSJulian Anastasov 
17011da177e4SLinus Torvalds 			/*
17021da177e4SLinus Torvalds 			 * Put the packet on the pending queue
17031da177e4SLinus Torvalds 			 */
17041f4c6eb2SEric Dumazet 			if (!skb->destructor) {
17051f4c6eb2SEric Dumazet 				skb->destructor = sock_wfree;
17061f4c6eb2SEric Dumazet 				skb->sk = sk;
17071f4c6eb2SEric Dumazet 				wmem_alloc_delta += skb->truesize;
17081f4c6eb2SEric Dumazet 			}
17090bbe84a6SVlad Yasevich 			__skb_queue_tail(queue, skb);
17101da177e4SLinus Torvalds 			continue;
17111da177e4SLinus Torvalds 		}
17121da177e4SLinus Torvalds 
17131da177e4SLinus Torvalds 		if (copy > length)
17141da177e4SLinus Torvalds 			copy = length;
17151da177e4SLinus Torvalds 
1716113f99c3SWillem de Bruijn 		if (!(rt->dst.dev->features&NETIF_F_SG) &&
1717113f99c3SWillem de Bruijn 		    skb_tailroom(skb) >= copy) {
17181da177e4SLinus Torvalds 			unsigned int off;
17191da177e4SLinus Torvalds 
17201da177e4SLinus Torvalds 			off = skb->len;
17211da177e4SLinus Torvalds 			if (getfrag(from, skb_put(skb, copy),
17221da177e4SLinus Torvalds 						offset, copy, off, skb) < 0) {
17231da177e4SLinus Torvalds 				__skb_trim(skb, off);
17241da177e4SLinus Torvalds 				err = -EFAULT;
17251da177e4SLinus Torvalds 				goto error;
17261da177e4SLinus Torvalds 			}
1727b5947e5dSWillem de Bruijn 		} else if (!uarg || !uarg->zerocopy) {
17281da177e4SLinus Torvalds 			int i = skb_shinfo(skb)->nr_frags;
17291da177e4SLinus Torvalds 
17301da177e4SLinus Torvalds 			err = -ENOMEM;
17315640f768SEric Dumazet 			if (!sk_page_frag_refill(sk, pfrag))
17321da177e4SLinus Torvalds 				goto error;
17331da177e4SLinus Torvalds 
17345640f768SEric Dumazet 			if (!skb_can_coalesce(skb, i, pfrag->page,
17355640f768SEric Dumazet 					      pfrag->offset)) {
17361da177e4SLinus Torvalds 				err = -EMSGSIZE;
17375640f768SEric Dumazet 				if (i == MAX_SKB_FRAGS)
17381da177e4SLinus Torvalds 					goto error;
17395640f768SEric Dumazet 
17405640f768SEric Dumazet 				__skb_fill_page_desc(skb, i, pfrag->page,
17415640f768SEric Dumazet 						     pfrag->offset, 0);
17425640f768SEric Dumazet 				skb_shinfo(skb)->nr_frags = ++i;
17435640f768SEric Dumazet 				get_page(pfrag->page);
17441da177e4SLinus Torvalds 			}
17455640f768SEric Dumazet 			copy = min_t(int, copy, pfrag->size - pfrag->offset);
17469e903e08SEric Dumazet 			if (getfrag(from,
17475640f768SEric Dumazet 				    page_address(pfrag->page) + pfrag->offset,
17485640f768SEric Dumazet 				    offset, copy, skb->len, skb) < 0)
17495640f768SEric Dumazet 				goto error_efault;
17505640f768SEric Dumazet 
17515640f768SEric Dumazet 			pfrag->offset += copy;
17525640f768SEric Dumazet 			skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy);
17531da177e4SLinus Torvalds 			skb->len += copy;
17541da177e4SLinus Torvalds 			skb->data_len += copy;
1755f945fa7aSHerbert Xu 			skb->truesize += copy;
17561f4c6eb2SEric Dumazet 			wmem_alloc_delta += copy;
1757b5947e5dSWillem de Bruijn 		} else {
1758b5947e5dSWillem de Bruijn 			err = skb_zerocopy_iter_dgram(skb, from, copy);
1759b5947e5dSWillem de Bruijn 			if (err < 0)
1760b5947e5dSWillem de Bruijn 				goto error;
17611da177e4SLinus Torvalds 		}
17621da177e4SLinus Torvalds 		offset += copy;
17631da177e4SLinus Torvalds 		length -= copy;
17641da177e4SLinus Torvalds 	}
17655640f768SEric Dumazet 
17669e8445a5SPaolo Abeni 	if (wmem_alloc_delta)
17671f4c6eb2SEric Dumazet 		refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
17681da177e4SLinus Torvalds 	return 0;
17695640f768SEric Dumazet 
17705640f768SEric Dumazet error_efault:
17715640f768SEric Dumazet 	err = -EFAULT;
17721da177e4SLinus Torvalds error:
17738e044917SJonathan Lemon 	net_zcopy_put_abort(uarg, extra_uref);
1774bdc712b4SDavid S. Miller 	cork->length -= length;
17753bd653c8SDenis V. Lunev 	IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS);
17761f4c6eb2SEric Dumazet 	refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
17771da177e4SLinus Torvalds 	return err;
17781da177e4SLinus Torvalds }
17790bbe84a6SVlad Yasevich 
17800bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk,
17810bbe84a6SVlad Yasevich 		    int getfrag(void *from, char *to, int offset, int len,
17820bbe84a6SVlad Yasevich 				int odd, struct sk_buff *skb),
178326879da5SWei Wang 		    void *from, int length, int transhdrlen,
178426879da5SWei Wang 		    struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
17855fdaa88dSWillem de Bruijn 		    struct rt6_info *rt, unsigned int flags)
17860bbe84a6SVlad Yasevich {
17870bbe84a6SVlad Yasevich 	struct inet_sock *inet = inet_sk(sk);
17880bbe84a6SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
17890bbe84a6SVlad Yasevich 	int exthdrlen;
17900bbe84a6SVlad Yasevich 	int err;
17910bbe84a6SVlad Yasevich 
17920bbe84a6SVlad Yasevich 	if (flags&MSG_PROBE)
17930bbe84a6SVlad Yasevich 		return 0;
17940bbe84a6SVlad Yasevich 	if (skb_queue_empty(&sk->sk_write_queue)) {
17950bbe84a6SVlad Yasevich 		/*
17960bbe84a6SVlad Yasevich 		 * setup for corking
17970bbe84a6SVlad Yasevich 		 */
179840ac240cSPavel Begunkov 		dst_hold(&rt->dst);
179926879da5SWei Wang 		err = ip6_setup_cork(sk, &inet->cork, &np->cork,
1800f37a4cc6SPavel Begunkov 				     ipc6, rt);
18010bbe84a6SVlad Yasevich 		if (err)
18020bbe84a6SVlad Yasevich 			return err;
18030bbe84a6SVlad Yasevich 
1804f37a4cc6SPavel Begunkov 		inet->cork.fl.u.ip6 = *fl6;
180526879da5SWei Wang 		exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
18060bbe84a6SVlad Yasevich 		length += exthdrlen;
18070bbe84a6SVlad Yasevich 		transhdrlen += exthdrlen;
18080bbe84a6SVlad Yasevich 	} else {
18090bbe84a6SVlad Yasevich 		transhdrlen = 0;
18100bbe84a6SVlad Yasevich 	}
18110bbe84a6SVlad Yasevich 
1812f37a4cc6SPavel Begunkov 	return __ip6_append_data(sk, &sk->sk_write_queue, &inet->cork,
18130bbe84a6SVlad Yasevich 				 &np->cork, sk_page_frag(sk), getfrag,
18145fdaa88dSWillem de Bruijn 				 from, length, transhdrlen, flags, ipc6);
18150bbe84a6SVlad Yasevich }
1816a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data);
18171da177e4SLinus Torvalds 
1818cd3c7480SPavel Begunkov static void ip6_cork_steal_dst(struct sk_buff *skb, struct inet_cork_full *cork)
1819cd3c7480SPavel Begunkov {
1820cd3c7480SPavel Begunkov 	struct dst_entry *dst = cork->base.dst;
1821cd3c7480SPavel Begunkov 
1822cd3c7480SPavel Begunkov 	cork->base.dst = NULL;
1823cd3c7480SPavel Begunkov 	cork->base.flags &= ~IPCORK_ALLFRAG;
1824cd3c7480SPavel Begunkov 	skb_dst_set(skb, dst);
1825cd3c7480SPavel Begunkov }
1826cd3c7480SPavel Begunkov 
1827366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork,
1828366e41d9SVlad Yasevich 			     struct inet6_cork *v6_cork)
1829bf138862SPavel Emelyanov {
1830366e41d9SVlad Yasevich 	if (v6_cork->opt) {
1831d656b2eaSPavel Begunkov 		struct ipv6_txoptions *opt = v6_cork->opt;
1832d656b2eaSPavel Begunkov 
1833d656b2eaSPavel Begunkov 		kfree(opt->dst0opt);
1834d656b2eaSPavel Begunkov 		kfree(opt->dst1opt);
1835d656b2eaSPavel Begunkov 		kfree(opt->hopopt);
1836d656b2eaSPavel Begunkov 		kfree(opt->srcrt);
1837d656b2eaSPavel Begunkov 		kfree(opt);
1838366e41d9SVlad Yasevich 		v6_cork->opt = NULL;
18390178b695SHerbert Xu 	}
18400178b695SHerbert Xu 
1841366e41d9SVlad Yasevich 	if (cork->base.dst) {
1842366e41d9SVlad Yasevich 		dst_release(cork->base.dst);
1843366e41d9SVlad Yasevich 		cork->base.dst = NULL;
1844366e41d9SVlad Yasevich 		cork->base.flags &= ~IPCORK_ALLFRAG;
1845bf138862SPavel Emelyanov 	}
1846bf138862SPavel Emelyanov }
1847bf138862SPavel Emelyanov 
18486422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk,
18496422398cSVlad Yasevich 			       struct sk_buff_head *queue,
18506422398cSVlad Yasevich 			       struct inet_cork_full *cork,
18516422398cSVlad Yasevich 			       struct inet6_cork *v6_cork)
18521da177e4SLinus Torvalds {
18531da177e4SLinus Torvalds 	struct sk_buff *skb, *tmp_skb;
18541da177e4SLinus Torvalds 	struct sk_buff **tail_skb;
1855b60d4e58SPavel Begunkov 	struct in6_addr *final_dst;
18561da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
18573bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
18581da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
18596422398cSVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
18606422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->base.dst;
18616422398cSVlad Yasevich 	struct flowi6 *fl6 = &cork->fl.u.ip6;
18624c9483b2SDavid S. Miller 	unsigned char proto = fl6->flowi6_proto;
18631da177e4SLinus Torvalds 
18646422398cSVlad Yasevich 	skb = __skb_dequeue(queue);
186563159f29SIan Morris 	if (!skb)
18661da177e4SLinus Torvalds 		goto out;
18671da177e4SLinus Torvalds 	tail_skb = &(skb_shinfo(skb)->frag_list);
18681da177e4SLinus Torvalds 
18691da177e4SLinus Torvalds 	/* move skb->data to ip header from ext header */
1870d56f90a7SArnaldo Carvalho de Melo 	if (skb->data < skb_network_header(skb))
1871bbe735e4SArnaldo Carvalho de Melo 		__skb_pull(skb, skb_network_offset(skb));
18726422398cSVlad Yasevich 	while ((tmp_skb = __skb_dequeue(queue)) != NULL) {
1873cfe1fc77SArnaldo Carvalho de Melo 		__skb_pull(tmp_skb, skb_network_header_len(skb));
18741da177e4SLinus Torvalds 		*tail_skb = tmp_skb;
18751da177e4SLinus Torvalds 		tail_skb = &(tmp_skb->next);
18761da177e4SLinus Torvalds 		skb->len += tmp_skb->len;
18771da177e4SLinus Torvalds 		skb->data_len += tmp_skb->len;
18781da177e4SLinus Torvalds 		skb->truesize += tmp_skb->truesize;
18791da177e4SLinus Torvalds 		tmp_skb->destructor = NULL;
18801da177e4SLinus Torvalds 		tmp_skb->sk = NULL;
18811da177e4SLinus Torvalds 	}
18821da177e4SLinus Torvalds 
188328a89453SHerbert Xu 	/* Allow local fragmentation. */
188460ff7467SWANG Cong 	skb->ignore_df = ip6_sk_ignore_df(sk);
1885cfe1fc77SArnaldo Carvalho de Melo 	__skb_pull(skb, skb_network_header_len(skb));
1886b60d4e58SPavel Begunkov 
1887b60d4e58SPavel Begunkov 	final_dst = &fl6->daddr;
18881da177e4SLinus Torvalds 	if (opt && opt->opt_flen)
18891da177e4SLinus Torvalds 		ipv6_push_frag_opts(skb, opt, &proto);
18901da177e4SLinus Torvalds 	if (opt && opt->opt_nflen)
1891613fa3caSDavid Lebrun 		ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr);
18921da177e4SLinus Torvalds 
1893e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
1894e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
18950660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
18961da177e4SLinus Torvalds 
18976422398cSVlad Yasevich 	ip6_flow_hdr(hdr, v6_cork->tclass,
1898cb1ce2efSTom Herbert 		     ip6_make_flowlabel(net, skb, fl6->flowlabel,
1899513674b5SShaohua Li 					ip6_autoflowlabel(net, np), fl6));
19006422398cSVlad Yasevich 	hdr->hop_limit = v6_cork->hop_limit;
19011da177e4SLinus Torvalds 	hdr->nexthdr = proto;
19024e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
19034e3fd7a0SAlexey Dobriyan 	hdr->daddr = *final_dst;
19041da177e4SLinus Torvalds 
1905a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
1906c6af0c22SWillem de Bruijn 	skb->mark = cork->base.mark;
1907a818f75eSJesus Sanchez-Palencia 	skb->tstamp = cork->base.transmit_time;
1908a818f75eSJesus Sanchez-Palencia 
1909cd3c7480SPavel Begunkov 	ip6_cork_steal_dst(skb, cork);
1910edf391ffSNeil Horman 	IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len);
191114878f75SDavid L Stevens 	if (proto == IPPROTO_ICMPV6) {
1912adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
191314878f75SDavid L Stevens 
191443a43b60SHannes Frederic Sowa 		ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type);
191543a43b60SHannes Frederic Sowa 		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
191614878f75SDavid L Stevens 	}
191714878f75SDavid L Stevens 
19186422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
19196422398cSVlad Yasevich out:
19206422398cSVlad Yasevich 	return skb;
19216422398cSVlad Yasevich }
19226422398cSVlad Yasevich 
19236422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb)
19246422398cSVlad Yasevich {
19256422398cSVlad Yasevich 	struct net *net = sock_net(skb->sk);
19266422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
19276422398cSVlad Yasevich 	int err;
19286422398cSVlad Yasevich 
192933224b16SEric W. Biederman 	err = ip6_local_out(net, skb->sk, skb);
19301da177e4SLinus Torvalds 	if (err) {
19311da177e4SLinus Torvalds 		if (err > 0)
19326ce9e7b5SEric Dumazet 			err = net_xmit_errno(err);
19331da177e4SLinus Torvalds 		if (err)
19346422398cSVlad Yasevich 			IP6_INC_STATS(net, rt->rt6i_idev,
19356422398cSVlad Yasevich 				      IPSTATS_MIB_OUTDISCARDS);
19361da177e4SLinus Torvalds 	}
19371da177e4SLinus Torvalds 
19381da177e4SLinus Torvalds 	return err;
19396422398cSVlad Yasevich }
19406422398cSVlad Yasevich 
19416422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk)
19426422398cSVlad Yasevich {
19436422398cSVlad Yasevich 	struct sk_buff *skb;
19446422398cSVlad Yasevich 
19456422398cSVlad Yasevich 	skb = ip6_finish_skb(sk);
19466422398cSVlad Yasevich 	if (!skb)
19476422398cSVlad Yasevich 		return 0;
19486422398cSVlad Yasevich 
19496422398cSVlad Yasevich 	return ip6_send_skb(skb);
19501da177e4SLinus Torvalds }
1951a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames);
19521da177e4SLinus Torvalds 
19530bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk,
19546422398cSVlad Yasevich 				       struct sk_buff_head *queue,
19556422398cSVlad Yasevich 				       struct inet_cork_full *cork,
19566422398cSVlad Yasevich 				       struct inet6_cork *v6_cork)
19571da177e4SLinus Torvalds {
19581da177e4SLinus Torvalds 	struct sk_buff *skb;
19591da177e4SLinus Torvalds 
19600bbe84a6SVlad Yasevich 	while ((skb = __skb_dequeue_tail(queue)) != NULL) {
1961adf30907SEric Dumazet 		if (skb_dst(skb))
1962adf30907SEric Dumazet 			IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)),
1963a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_OUTDISCARDS);
19641da177e4SLinus Torvalds 		kfree_skb(skb);
19651da177e4SLinus Torvalds 	}
19661da177e4SLinus Torvalds 
19676422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
19681da177e4SLinus Torvalds }
19690bbe84a6SVlad Yasevich 
19700bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk)
19710bbe84a6SVlad Yasevich {
19726422398cSVlad Yasevich 	__ip6_flush_pending_frames(sk, &sk->sk_write_queue,
19736422398cSVlad Yasevich 				   &inet_sk(sk)->cork, &inet6_sk(sk)->cork);
19740bbe84a6SVlad Yasevich }
1975a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames);
19766422398cSVlad Yasevich 
19776422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk,
19786422398cSVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
19796422398cSVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
19806422398cSVlad Yasevich 			     void *from, int length, int transhdrlen,
1981f37a4cc6SPavel Begunkov 			     struct ipcm6_cookie *ipc6, struct rt6_info *rt,
1982f37a4cc6SPavel Begunkov 			     unsigned int flags, struct inet_cork_full *cork)
19836422398cSVlad Yasevich {
19846422398cSVlad Yasevich 	struct inet6_cork v6_cork;
19856422398cSVlad Yasevich 	struct sk_buff_head queue;
198626879da5SWei Wang 	int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
19876422398cSVlad Yasevich 	int err;
19886422398cSVlad Yasevich 
198940ac240cSPavel Begunkov 	if (flags & MSG_PROBE) {
199040ac240cSPavel Begunkov 		dst_release(&rt->dst);
19916422398cSVlad Yasevich 		return NULL;
199240ac240cSPavel Begunkov 	}
19936422398cSVlad Yasevich 
19946422398cSVlad Yasevich 	__skb_queue_head_init(&queue);
19956422398cSVlad Yasevich 
19961cd7884dSWillem de Bruijn 	cork->base.flags = 0;
19971cd7884dSWillem de Bruijn 	cork->base.addr = 0;
19981cd7884dSWillem de Bruijn 	cork->base.opt = NULL;
19996422398cSVlad Yasevich 	v6_cork.opt = NULL;
2000f37a4cc6SPavel Begunkov 	err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt);
2001862c03eeSEric Dumazet 	if (err) {
20021cd7884dSWillem de Bruijn 		ip6_cork_release(cork, &v6_cork);
20036422398cSVlad Yasevich 		return ERR_PTR(err);
2004862c03eeSEric Dumazet 	}
200526879da5SWei Wang 	if (ipc6->dontfrag < 0)
200626879da5SWei Wang 		ipc6->dontfrag = inet6_sk(sk)->dontfrag;
20076422398cSVlad Yasevich 
2008f37a4cc6SPavel Begunkov 	err = __ip6_append_data(sk, &queue, cork, &v6_cork,
20096422398cSVlad Yasevich 				&current->task_frag, getfrag, from,
20106422398cSVlad Yasevich 				length + exthdrlen, transhdrlen + exthdrlen,
20115fdaa88dSWillem de Bruijn 				flags, ipc6);
20126422398cSVlad Yasevich 	if (err) {
20131cd7884dSWillem de Bruijn 		__ip6_flush_pending_frames(sk, &queue, cork, &v6_cork);
20146422398cSVlad Yasevich 		return ERR_PTR(err);
20156422398cSVlad Yasevich 	}
20166422398cSVlad Yasevich 
20171cd7884dSWillem de Bruijn 	return __ip6_make_skb(sk, &queue, cork, &v6_cork);
20186422398cSVlad Yasevich }
2019