xref: /openbmc/linux/net/ipv6/ip6_output.c (revision 749439bfac6e1a2932c582e2699f91d329658196)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds  *	IPv6 output functions
31da177e4SLinus Torvalds  *	Linux INET6 implementation
41da177e4SLinus Torvalds  *
51da177e4SLinus Torvalds  *	Authors:
61da177e4SLinus Torvalds  *	Pedro Roque		<roque@di.fc.ul.pt>
71da177e4SLinus Torvalds  *
81da177e4SLinus Torvalds  *	Based on linux/net/ipv4/ip_output.c
91da177e4SLinus Torvalds  *
101da177e4SLinus Torvalds  *	This program is free software; you can redistribute it and/or
111da177e4SLinus Torvalds  *      modify it under the terms of the GNU General Public License
121da177e4SLinus Torvalds  *      as published by the Free Software Foundation; either version
131da177e4SLinus Torvalds  *      2 of the License, or (at your option) any later version.
141da177e4SLinus Torvalds  *
151da177e4SLinus Torvalds  *	Changes:
161da177e4SLinus Torvalds  *	A.N.Kuznetsov	:	airthmetics in fragmentation.
171da177e4SLinus Torvalds  *				extension headers are implemented.
181da177e4SLinus Torvalds  *				route changes now work.
191da177e4SLinus Torvalds  *				ip6_forward does not confuse sniffers.
201da177e4SLinus Torvalds  *				etc.
211da177e4SLinus Torvalds  *
221da177e4SLinus Torvalds  *      H. von Brand    :       Added missing #include <linux/string.h>
231da177e4SLinus Torvalds  *	Imran Patel	:	frag id should be in NBO
241da177e4SLinus Torvalds  *      Kazunori MIYAZAWA @USAGI
251da177e4SLinus Torvalds  *			:       add ip6_append_data and related functions
261da177e4SLinus Torvalds  *				for datagram xmit
271da177e4SLinus Torvalds  */
281da177e4SLinus Torvalds 
291da177e4SLinus Torvalds #include <linux/errno.h>
30ef76bc23SHerbert Xu #include <linux/kernel.h>
311da177e4SLinus Torvalds #include <linux/string.h>
321da177e4SLinus Torvalds #include <linux/socket.h>
331da177e4SLinus Torvalds #include <linux/net.h>
341da177e4SLinus Torvalds #include <linux/netdevice.h>
351da177e4SLinus Torvalds #include <linux/if_arp.h>
361da177e4SLinus Torvalds #include <linux/in6.h>
371da177e4SLinus Torvalds #include <linux/tcp.h>
381da177e4SLinus Torvalds #include <linux/route.h>
39b59f45d0SHerbert Xu #include <linux/module.h>
405a0e3ad6STejun Heo #include <linux/slab.h>
411da177e4SLinus Torvalds 
4233b48679SDaniel Mack #include <linux/bpf-cgroup.h>
431da177e4SLinus Torvalds #include <linux/netfilter.h>
441da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h>
451da177e4SLinus Torvalds 
461da177e4SLinus Torvalds #include <net/sock.h>
471da177e4SLinus Torvalds #include <net/snmp.h>
481da177e4SLinus Torvalds 
491da177e4SLinus Torvalds #include <net/ipv6.h>
501da177e4SLinus Torvalds #include <net/ndisc.h>
511da177e4SLinus Torvalds #include <net/protocol.h>
521da177e4SLinus Torvalds #include <net/ip6_route.h>
531da177e4SLinus Torvalds #include <net/addrconf.h>
541da177e4SLinus Torvalds #include <net/rawv6.h>
551da177e4SLinus Torvalds #include <net/icmp.h>
561da177e4SLinus Torvalds #include <net/xfrm.h>
571da177e4SLinus Torvalds #include <net/checksum.h>
587bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h>
59ca254490SDavid Ahern #include <net/l3mdev.h>
6014972cbdSRoopa Prabhu #include <net/lwtunnel.h>
611da177e4SLinus Torvalds 
627d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb)
631da177e4SLinus Torvalds {
64adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
651da177e4SLinus Torvalds 	struct net_device *dev = dst->dev;
66f6b72b62SDavid S. Miller 	struct neighbour *neigh;
676fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	struct in6_addr *nexthop;
686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	int ret;
691da177e4SLinus Torvalds 
700660e03fSArnaldo Carvalho de Melo 	if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) {
71adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
721da177e4SLinus Torvalds 
737026b1ddSDavid Miller 		if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) &&
7478126c41SEric W. Biederman 		    ((mroute6_socket(net, skb) &&
75bd91b8bfSBenjamin Thery 		     !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) ||
760660e03fSArnaldo Carvalho de Melo 		     ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr,
777bc570c8SYOSHIFUJI Hideaki 					 &ipv6_hdr(skb)->saddr))) {
781da177e4SLinus Torvalds 			struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC);
791da177e4SLinus Torvalds 
801da177e4SLinus Torvalds 			/* Do not check for IFF_ALLMULTI; multicast routing
811da177e4SLinus Torvalds 			   is not supported in any case.
821da177e4SLinus Torvalds 			 */
831da177e4SLinus Torvalds 			if (newskb)
84b2e0b385SJan Engelhardt 				NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING,
8529a26a56SEric W. Biederman 					net, sk, newskb, NULL, newskb->dev,
8695603e22SMichel Machado 					dev_loopback_xmit);
871da177e4SLinus Torvalds 
880660e03fSArnaldo Carvalho de Melo 			if (ipv6_hdr(skb)->hop_limit == 0) {
8978126c41SEric W. Biederman 				IP6_INC_STATS(net, idev,
903bd653c8SDenis V. Lunev 					      IPSTATS_MIB_OUTDISCARDS);
911da177e4SLinus Torvalds 				kfree_skb(skb);
921da177e4SLinus Torvalds 				return 0;
931da177e4SLinus Torvalds 			}
941da177e4SLinus Torvalds 		}
951da177e4SLinus Torvalds 
9678126c41SEric W. Biederman 		IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len);
97dd408515SHannes Frederic Sowa 
98dd408515SHannes Frederic Sowa 		if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <=
99dd408515SHannes Frederic Sowa 		    IPV6_ADDR_SCOPE_NODELOCAL &&
100dd408515SHannes Frederic Sowa 		    !(dev->flags & IFF_LOOPBACK)) {
101dd408515SHannes Frederic Sowa 			kfree_skb(skb);
102dd408515SHannes Frederic Sowa 			return 0;
103dd408515SHannes Frederic Sowa 		}
1041da177e4SLinus Torvalds 	}
1051da177e4SLinus Torvalds 
10614972cbdSRoopa Prabhu 	if (lwtunnel_xmit_redirect(dst->lwtstate)) {
10714972cbdSRoopa Prabhu 		int res = lwtunnel_xmit(skb);
10814972cbdSRoopa Prabhu 
10914972cbdSRoopa Prabhu 		if (res < 0 || res == LWTUNNEL_XMIT_DONE)
11014972cbdSRoopa Prabhu 			return res;
11114972cbdSRoopa Prabhu 	}
11214972cbdSRoopa Prabhu 
1136fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
1142647a9b0SMartin KaFai Lau 	nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr);
1156fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop);
1166fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(!neigh))
1176fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false);
1186fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	if (!IS_ERR(neigh)) {
1194ff06203SJulian Anastasov 		sock_confirm_neigh(skb, neigh);
120c16ec185SJulian Anastasov 		ret = neigh_output(neigh, skb);
1216fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		rcu_read_unlock_bh();
1226fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		return ret;
1236fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	}
1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
12505e3aa09SDavid S. Miller 
12678126c41SEric W. Biederman 	IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES);
1279e508490SJan Engelhardt 	kfree_skb(skb);
1289e508490SJan Engelhardt 	return -EINVAL;
1291da177e4SLinus Torvalds }
1301da177e4SLinus Torvalds 
1310c4b51f0SEric W. Biederman static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1329e508490SJan Engelhardt {
13333b48679SDaniel Mack 	int ret;
13433b48679SDaniel Mack 
13533b48679SDaniel Mack 	ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb);
13633b48679SDaniel Mack 	if (ret) {
13733b48679SDaniel Mack 		kfree_skb(skb);
13833b48679SDaniel Mack 		return ret;
13933b48679SDaniel Mack 	}
14033b48679SDaniel Mack 
1419e508490SJan Engelhardt 	if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) ||
1429037c357SJiri Pirko 	    dst_allfrag(skb_dst(skb)) ||
1439037c357SJiri Pirko 	    (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size))
1447d8c6e39SEric W. Biederman 		return ip6_fragment(net, sk, skb, ip6_finish_output2);
1459e508490SJan Engelhardt 	else
1467d8c6e39SEric W. Biederman 		return ip6_finish_output2(net, sk, skb);
1479e508490SJan Engelhardt }
1489e508490SJan Engelhardt 
149ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1501da177e4SLinus Torvalds {
1519e508490SJan Engelhardt 	struct net_device *dev = skb_dst(skb)->dev;
152adf30907SEric Dumazet 	struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
153be10de0aSEric W. Biederman 
15497a7a37aSChenbo Feng 	skb->protocol = htons(ETH_P_IPV6);
15597a7a37aSChenbo Feng 	skb->dev = dev;
15697a7a37aSChenbo Feng 
157778d80beSYOSHIFUJI Hideaki 	if (unlikely(idev->cnf.disable_ipv6)) {
15819a0644cSEric W. Biederman 		IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
159778d80beSYOSHIFUJI Hideaki 		kfree_skb(skb);
160778d80beSYOSHIFUJI Hideaki 		return 0;
161778d80beSYOSHIFUJI Hideaki 	}
162778d80beSYOSHIFUJI Hideaki 
16329a26a56SEric W. Biederman 	return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
16429a26a56SEric W. Biederman 			    net, sk, skb, NULL, dev,
1659c6eb28aSJan Engelhardt 			    ip6_finish_output,
1669c6eb28aSJan Engelhardt 			    !(IP6CB(skb)->flags & IP6SKB_REROUTED));
1671da177e4SLinus Torvalds }
1681da177e4SLinus Torvalds 
169513674b5SShaohua Li static bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np)
170513674b5SShaohua Li {
171513674b5SShaohua Li 	if (!np->autoflowlabel_set)
172513674b5SShaohua Li 		return ip6_default_np_autolabel(net);
173513674b5SShaohua Li 	else
174513674b5SShaohua Li 		return np->autoflowlabel;
175513674b5SShaohua Li }
176513674b5SShaohua Li 
1771da177e4SLinus Torvalds /*
178b5d43998SShan Wei  * xmit an sk_buff (used by TCP, SCTP and DCCP)
1791c1e9d2bSEric Dumazet  * Note : socket lock is not held for SYNACK packets, but might be modified
1801c1e9d2bSEric Dumazet  * by calls to skb_set_owner_w() and ipv6_local_error(),
1811c1e9d2bSEric Dumazet  * which are using proper atomic operations or spinlocks.
1821da177e4SLinus Torvalds  */
1831c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6,
18492e55f41SPablo Neira 	     __u32 mark, struct ipv6_txoptions *opt, int tclass)
1851da177e4SLinus Torvalds {
1863bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
1871c1e9d2bSEric Dumazet 	const struct ipv6_pinfo *np = inet6_sk(sk);
1884c9483b2SDavid S. Miller 	struct in6_addr *first_hop = &fl6->daddr;
189adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
1901da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
1914c9483b2SDavid S. Miller 	u8  proto = fl6->flowi6_proto;
1921da177e4SLinus Torvalds 	int seg_len = skb->len;
193e651f03aSGerrit Renker 	int hlimit = -1;
1941da177e4SLinus Torvalds 	u32 mtu;
1951da177e4SLinus Torvalds 
1961da177e4SLinus Torvalds 	if (opt) {
197c2636b4dSChuck Lever 		unsigned int head_room;
1981da177e4SLinus Torvalds 
1991da177e4SLinus Torvalds 		/* First: exthdrs may take lots of space (~8K for now)
2001da177e4SLinus Torvalds 		   MAX_HEADER is not enough.
2011da177e4SLinus Torvalds 		 */
2021da177e4SLinus Torvalds 		head_room = opt->opt_nflen + opt->opt_flen;
2031da177e4SLinus Torvalds 		seg_len += head_room;
2041da177e4SLinus Torvalds 		head_room += sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev);
2051da177e4SLinus Torvalds 
2061da177e4SLinus Torvalds 		if (skb_headroom(skb) < head_room) {
2071da177e4SLinus Torvalds 			struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room);
20863159f29SIan Morris 			if (!skb2) {
209adf30907SEric Dumazet 				IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
210a11d206dSYOSHIFUJI Hideaki 					      IPSTATS_MIB_OUTDISCARDS);
2111da177e4SLinus Torvalds 				kfree_skb(skb);
2121da177e4SLinus Torvalds 				return -ENOBUFS;
2131da177e4SLinus Torvalds 			}
214808db80aSEric Dumazet 			consume_skb(skb);
215a11d206dSYOSHIFUJI Hideaki 			skb = skb2;
2161c1e9d2bSEric Dumazet 			/* skb_set_owner_w() changes sk->sk_wmem_alloc atomically,
2171c1e9d2bSEric Dumazet 			 * it is safe to call in our context (socket lock not held)
2181c1e9d2bSEric Dumazet 			 */
2191c1e9d2bSEric Dumazet 			skb_set_owner_w(skb, (struct sock *)sk);
2201da177e4SLinus Torvalds 		}
2211da177e4SLinus Torvalds 		if (opt->opt_flen)
2221da177e4SLinus Torvalds 			ipv6_push_frag_opts(skb, opt, &proto);
2231da177e4SLinus Torvalds 		if (opt->opt_nflen)
224613fa3caSDavid Lebrun 			ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop,
225613fa3caSDavid Lebrun 					     &fl6->saddr);
2261da177e4SLinus Torvalds 	}
2271da177e4SLinus Torvalds 
228e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
229e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
2300660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
2311da177e4SLinus Torvalds 
2321da177e4SLinus Torvalds 	/*
2331da177e4SLinus Torvalds 	 *	Fill in the IPv6 header
2341da177e4SLinus Torvalds 	 */
235b903d324SEric Dumazet 	if (np)
2361da177e4SLinus Torvalds 		hlimit = np->hop_limit;
2371da177e4SLinus Torvalds 	if (hlimit < 0)
2386b75d090SYOSHIFUJI Hideaki 		hlimit = ip6_dst_hoplimit(dst);
2391da177e4SLinus Torvalds 
240cb1ce2efSTom Herbert 	ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel,
241513674b5SShaohua Li 				ip6_autoflowlabel(net, np), fl6));
24241a1f8eaSYOSHIFUJI Hideaki 
2431da177e4SLinus Torvalds 	hdr->payload_len = htons(seg_len);
2441da177e4SLinus Torvalds 	hdr->nexthdr = proto;
2451da177e4SLinus Torvalds 	hdr->hop_limit = hlimit;
2461da177e4SLinus Torvalds 
2474e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
2484e3fd7a0SAlexey Dobriyan 	hdr->daddr = *first_hop;
2491da177e4SLinus Torvalds 
2509c9c9ad5SHannes Frederic Sowa 	skb->protocol = htons(ETH_P_IPV6);
251a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
25292e55f41SPablo Neira 	skb->mark = mark;
253a2c2064fSPatrick McHardy 
2541da177e4SLinus Torvalds 	mtu = dst_mtu(dst);
25560ff7467SWANG Cong 	if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) {
256adf30907SEric Dumazet 		IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)),
257edf391ffSNeil Horman 			      IPSTATS_MIB_OUT, skb->len);
258a8e3e1a9SDavid Ahern 
259a8e3e1a9SDavid Ahern 		/* if egress device is enslaved to an L3 master device pass the
260a8e3e1a9SDavid Ahern 		 * skb to its handler for processing
261a8e3e1a9SDavid Ahern 		 */
262a8e3e1a9SDavid Ahern 		skb = l3mdev_ip6_out((struct sock *)sk, skb);
263a8e3e1a9SDavid Ahern 		if (unlikely(!skb))
264a8e3e1a9SDavid Ahern 			return 0;
265a8e3e1a9SDavid Ahern 
2661c1e9d2bSEric Dumazet 		/* hooks should never assume socket lock is held.
2671c1e9d2bSEric Dumazet 		 * we promote our socket to non const
2681c1e9d2bSEric Dumazet 		 */
26929a26a56SEric W. Biederman 		return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
2701c1e9d2bSEric Dumazet 			       net, (struct sock *)sk, skb, NULL, dst->dev,
27113206b6bSEric W. Biederman 			       dst_output);
2721da177e4SLinus Torvalds 	}
2731da177e4SLinus Torvalds 
2741da177e4SLinus Torvalds 	skb->dev = dst->dev;
2751c1e9d2bSEric Dumazet 	/* ipv6_local_error() does not require socket lock,
2761c1e9d2bSEric Dumazet 	 * we promote our socket to non const
2771c1e9d2bSEric Dumazet 	 */
2781c1e9d2bSEric Dumazet 	ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu);
2791c1e9d2bSEric Dumazet 
280adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS);
2811da177e4SLinus Torvalds 	kfree_skb(skb);
2821da177e4SLinus Torvalds 	return -EMSGSIZE;
2831da177e4SLinus Torvalds }
2847159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit);
2857159039aSYOSHIFUJI Hideaki 
2861da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel)
2871da177e4SLinus Torvalds {
2881da177e4SLinus Torvalds 	struct ip6_ra_chain *ra;
2891da177e4SLinus Torvalds 	struct sock *last = NULL;
2901da177e4SLinus Torvalds 
2911da177e4SLinus Torvalds 	read_lock(&ip6_ra_lock);
2921da177e4SLinus Torvalds 	for (ra = ip6_ra_chain; ra; ra = ra->next) {
2931da177e4SLinus Torvalds 		struct sock *sk = ra->sk;
2940bd1b59bSAndrew McDonald 		if (sk && ra->sel == sel &&
2950bd1b59bSAndrew McDonald 		    (!sk->sk_bound_dev_if ||
2960bd1b59bSAndrew McDonald 		     sk->sk_bound_dev_if == skb->dev->ifindex)) {
2971da177e4SLinus Torvalds 			if (last) {
2981da177e4SLinus Torvalds 				struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
2991da177e4SLinus Torvalds 				if (skb2)
3001da177e4SLinus Torvalds 					rawv6_rcv(last, skb2);
3011da177e4SLinus Torvalds 			}
3021da177e4SLinus Torvalds 			last = sk;
3031da177e4SLinus Torvalds 		}
3041da177e4SLinus Torvalds 	}
3051da177e4SLinus Torvalds 
3061da177e4SLinus Torvalds 	if (last) {
3071da177e4SLinus Torvalds 		rawv6_rcv(last, skb);
3081da177e4SLinus Torvalds 		read_unlock(&ip6_ra_lock);
3091da177e4SLinus Torvalds 		return 1;
3101da177e4SLinus Torvalds 	}
3111da177e4SLinus Torvalds 	read_unlock(&ip6_ra_lock);
3121da177e4SLinus Torvalds 	return 0;
3131da177e4SLinus Torvalds }
3141da177e4SLinus Torvalds 
315e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb)
316e21e0b5fSVille Nuorvala {
3170660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
318e21e0b5fSVille Nuorvala 	u8 nexthdr = hdr->nexthdr;
31975f2811cSJesse Gross 	__be16 frag_off;
320e21e0b5fSVille Nuorvala 	int offset;
321e21e0b5fSVille Nuorvala 
322e21e0b5fSVille Nuorvala 	if (ipv6_ext_hdr(nexthdr)) {
32375f2811cSJesse Gross 		offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off);
324e21e0b5fSVille Nuorvala 		if (offset < 0)
325e21e0b5fSVille Nuorvala 			return 0;
326e21e0b5fSVille Nuorvala 	} else
327e21e0b5fSVille Nuorvala 		offset = sizeof(struct ipv6hdr);
328e21e0b5fSVille Nuorvala 
329e21e0b5fSVille Nuorvala 	if (nexthdr == IPPROTO_ICMPV6) {
330e21e0b5fSVille Nuorvala 		struct icmp6hdr *icmp6;
331e21e0b5fSVille Nuorvala 
332d56f90a7SArnaldo Carvalho de Melo 		if (!pskb_may_pull(skb, (skb_network_header(skb) +
333d56f90a7SArnaldo Carvalho de Melo 					 offset + 1 - skb->data)))
334e21e0b5fSVille Nuorvala 			return 0;
335e21e0b5fSVille Nuorvala 
336d56f90a7SArnaldo Carvalho de Melo 		icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset);
337e21e0b5fSVille Nuorvala 
338e21e0b5fSVille Nuorvala 		switch (icmp6->icmp6_type) {
339e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_SOLICITATION:
340e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_ADVERTISEMENT:
341e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_SOLICITATION:
342e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_ADVERTISEMENT:
343e21e0b5fSVille Nuorvala 		case NDISC_REDIRECT:
344e21e0b5fSVille Nuorvala 			/* For reaction involving unicast neighbor discovery
345e21e0b5fSVille Nuorvala 			 * message destined to the proxied address, pass it to
346e21e0b5fSVille Nuorvala 			 * input function.
347e21e0b5fSVille Nuorvala 			 */
348e21e0b5fSVille Nuorvala 			return 1;
349e21e0b5fSVille Nuorvala 		default:
350e21e0b5fSVille Nuorvala 			break;
351e21e0b5fSVille Nuorvala 		}
352e21e0b5fSVille Nuorvala 	}
353e21e0b5fSVille Nuorvala 
35474553b09SVille Nuorvala 	/*
35574553b09SVille Nuorvala 	 * The proxying router can't forward traffic sent to a link-local
35674553b09SVille Nuorvala 	 * address, so signal the sender and discard the packet. This
35774553b09SVille Nuorvala 	 * behavior is clarified by the MIPv6 specification.
35874553b09SVille Nuorvala 	 */
35974553b09SVille Nuorvala 	if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) {
36074553b09SVille Nuorvala 		dst_link_failure(skb);
36174553b09SVille Nuorvala 		return -1;
36274553b09SVille Nuorvala 	}
36374553b09SVille Nuorvala 
364e21e0b5fSVille Nuorvala 	return 0;
365e21e0b5fSVille Nuorvala }
366e21e0b5fSVille Nuorvala 
3670c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk,
3680c4b51f0SEric W. Biederman 				     struct sk_buff *skb)
3691da177e4SLinus Torvalds {
37013206b6bSEric W. Biederman 	return dst_output(net, sk, skb);
3711da177e4SLinus Torvalds }
3721da177e4SLinus Torvalds 
3730954cf9cSHannes Frederic Sowa static unsigned int ip6_dst_mtu_forward(const struct dst_entry *dst)
3740954cf9cSHannes Frederic Sowa {
3750954cf9cSHannes Frederic Sowa 	unsigned int mtu;
3760954cf9cSHannes Frederic Sowa 	struct inet6_dev *idev;
3770954cf9cSHannes Frederic Sowa 
3780954cf9cSHannes Frederic Sowa 	if (dst_metric_locked(dst, RTAX_MTU)) {
3790954cf9cSHannes Frederic Sowa 		mtu = dst_metric_raw(dst, RTAX_MTU);
3800954cf9cSHannes Frederic Sowa 		if (mtu)
3810954cf9cSHannes Frederic Sowa 			return mtu;
3820954cf9cSHannes Frederic Sowa 	}
3830954cf9cSHannes Frederic Sowa 
3840954cf9cSHannes Frederic Sowa 	mtu = IPV6_MIN_MTU;
3850954cf9cSHannes Frederic Sowa 	rcu_read_lock();
3860954cf9cSHannes Frederic Sowa 	idev = __in6_dev_get(dst->dev);
3870954cf9cSHannes Frederic Sowa 	if (idev)
3880954cf9cSHannes Frederic Sowa 		mtu = idev->cnf.mtu6;
3890954cf9cSHannes Frederic Sowa 	rcu_read_unlock();
3900954cf9cSHannes Frederic Sowa 
3910954cf9cSHannes Frederic Sowa 	return mtu;
3920954cf9cSHannes Frederic Sowa }
3930954cf9cSHannes Frederic Sowa 
394fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu)
395fe6cc55fSFlorian Westphal {
396418a3156SFlorian Westphal 	if (skb->len <= mtu)
397fe6cc55fSFlorian Westphal 		return false;
398fe6cc55fSFlorian Westphal 
39960ff7467SWANG Cong 	/* ipv6 conntrack defrag sets max_frag_size + ignore_df */
400fe6cc55fSFlorian Westphal 	if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu)
401fe6cc55fSFlorian Westphal 		return true;
402fe6cc55fSFlorian Westphal 
40360ff7467SWANG Cong 	if (skb->ignore_df)
404418a3156SFlorian Westphal 		return false;
405418a3156SFlorian Westphal 
406ae7ef81eSMarcelo Ricardo Leitner 	if (skb_is_gso(skb) && skb_gso_validate_mtu(skb, mtu))
407fe6cc55fSFlorian Westphal 		return false;
408fe6cc55fSFlorian Westphal 
409fe6cc55fSFlorian Westphal 	return true;
410fe6cc55fSFlorian Westphal }
411fe6cc55fSFlorian Westphal 
4121da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb)
4131da177e4SLinus Torvalds {
414adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
4150660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
4161da177e4SLinus Torvalds 	struct inet6_skb_parm *opt = IP6CB(skb);
417c346dca1SYOSHIFUJI Hideaki 	struct net *net = dev_net(dst->dev);
41814f3ad6fSUlrich Weber 	u32 mtu;
4191da177e4SLinus Torvalds 
42053b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->forwarding == 0)
4211da177e4SLinus Torvalds 		goto error;
4221da177e4SLinus Torvalds 
423090f1166SLi RongQing 	if (skb->pkt_type != PACKET_HOST)
424090f1166SLi RongQing 		goto drop;
425090f1166SLi RongQing 
4269ef2e965SHannes Frederic Sowa 	if (unlikely(skb->sk))
4279ef2e965SHannes Frederic Sowa 		goto drop;
4289ef2e965SHannes Frederic Sowa 
4294497b076SBen Hutchings 	if (skb_warn_if_lro(skb))
4304497b076SBen Hutchings 		goto drop;
4314497b076SBen Hutchings 
4321da177e4SLinus Torvalds 	if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) {
4331d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
43415c77d8bSEric Dumazet 				IPSTATS_MIB_INDISCARDS);
4351da177e4SLinus Torvalds 		goto drop;
4361da177e4SLinus Torvalds 	}
4371da177e4SLinus Torvalds 
43835fc92a9SHerbert Xu 	skb_forward_csum(skb);
4391da177e4SLinus Torvalds 
4401da177e4SLinus Torvalds 	/*
4411da177e4SLinus Torvalds 	 *	We DO NOT make any processing on
4421da177e4SLinus Torvalds 	 *	RA packets, pushing them to user level AS IS
4431da177e4SLinus Torvalds 	 *	without ane WARRANTY that application will be able
4441da177e4SLinus Torvalds 	 *	to interpret them. The reason is that we
4451da177e4SLinus Torvalds 	 *	cannot make anything clever here.
4461da177e4SLinus Torvalds 	 *
4471da177e4SLinus Torvalds 	 *	We are not end-node, so that if packet contains
4481da177e4SLinus Torvalds 	 *	AH/ESP, we cannot make anything.
4491da177e4SLinus Torvalds 	 *	Defragmentation also would be mistake, RA packets
4501da177e4SLinus Torvalds 	 *	cannot be fragmented, because there is no warranty
4511da177e4SLinus Torvalds 	 *	that different fragments will go along one path. --ANK
4521da177e4SLinus Torvalds 	 */
453ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) {
454ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 		if (ip6_call_ra_chain(skb, ntohs(opt->ra)))
4551da177e4SLinus Torvalds 			return 0;
4561da177e4SLinus Torvalds 	}
4571da177e4SLinus Torvalds 
4581da177e4SLinus Torvalds 	/*
4591da177e4SLinus Torvalds 	 *	check and decrement ttl
4601da177e4SLinus Torvalds 	 */
4611da177e4SLinus Torvalds 	if (hdr->hop_limit <= 1) {
4621da177e4SLinus Torvalds 		/* Force OUTPUT device used as source address */
4631da177e4SLinus Torvalds 		skb->dev = dst->dev;
4643ffe533cSAlexey Dobriyan 		icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0);
4651d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
46615c77d8bSEric Dumazet 				IPSTATS_MIB_INHDRERRORS);
4671da177e4SLinus Torvalds 
4681da177e4SLinus Torvalds 		kfree_skb(skb);
4691da177e4SLinus Torvalds 		return -ETIMEDOUT;
4701da177e4SLinus Torvalds 	}
4711da177e4SLinus Torvalds 
472fbea49e1SYOSHIFUJI Hideaki 	/* XXX: idev->cnf.proxy_ndp? */
47353b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->proxy_ndp &&
4748a3edd80SDaniel Lezcano 	    pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) {
47574553b09SVille Nuorvala 		int proxied = ip6_forward_proxy_check(skb);
47674553b09SVille Nuorvala 		if (proxied > 0)
477e21e0b5fSVille Nuorvala 			return ip6_input(skb);
47874553b09SVille Nuorvala 		else if (proxied < 0) {
4791d015503SEric Dumazet 			__IP6_INC_STATS(net, ip6_dst_idev(dst),
4803bd653c8SDenis V. Lunev 					IPSTATS_MIB_INDISCARDS);
48174553b09SVille Nuorvala 			goto drop;
48274553b09SVille Nuorvala 		}
483e21e0b5fSVille Nuorvala 	}
484e21e0b5fSVille Nuorvala 
4851da177e4SLinus Torvalds 	if (!xfrm6_route_forward(skb)) {
4861d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
48715c77d8bSEric Dumazet 				IPSTATS_MIB_INDISCARDS);
4881da177e4SLinus Torvalds 		goto drop;
4891da177e4SLinus Torvalds 	}
490adf30907SEric Dumazet 	dst = skb_dst(skb);
4911da177e4SLinus Torvalds 
4921da177e4SLinus Torvalds 	/* IPv6 specs say nothing about it, but it is clear that we cannot
4931da177e4SLinus Torvalds 	   send redirects to source routed frames.
4941e5dc146SMasahide NAKAMURA 	   We don't send redirects to frames decapsulated from IPsec.
4951da177e4SLinus Torvalds 	 */
496c45a3dfbSDavid S. Miller 	if (skb->dev == dst->dev && opt->srcrt == 0 && !skb_sec_path(skb)) {
4971da177e4SLinus Torvalds 		struct in6_addr *target = NULL;
498fbfe95a4SDavid S. Miller 		struct inet_peer *peer;
4991da177e4SLinus Torvalds 		struct rt6_info *rt;
5001da177e4SLinus Torvalds 
5011da177e4SLinus Torvalds 		/*
5021da177e4SLinus Torvalds 		 *	incoming and outgoing devices are the same
5031da177e4SLinus Torvalds 		 *	send a redirect.
5041da177e4SLinus Torvalds 		 */
5051da177e4SLinus Torvalds 
5061da177e4SLinus Torvalds 		rt = (struct rt6_info *) dst;
507c45a3dfbSDavid S. Miller 		if (rt->rt6i_flags & RTF_GATEWAY)
508c45a3dfbSDavid S. Miller 			target = &rt->rt6i_gateway;
5091da177e4SLinus Torvalds 		else
5101da177e4SLinus Torvalds 			target = &hdr->daddr;
5111da177e4SLinus Torvalds 
512fd0273d7SMartin KaFai Lau 		peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1);
51392d86829SDavid S. Miller 
5141da177e4SLinus Torvalds 		/* Limit redirects both by destination (here)
5151da177e4SLinus Torvalds 		   and by source (inside ndisc_send_redirect)
5161da177e4SLinus Torvalds 		 */
517fbfe95a4SDavid S. Miller 		if (inet_peer_xrlim_allow(peer, 1*HZ))
5184991969aSDavid S. Miller 			ndisc_send_redirect(skb, target);
5191d861aa4SDavid S. Miller 		if (peer)
5201d861aa4SDavid S. Miller 			inet_putpeer(peer);
5215bb1ab09SDavid L Stevens 	} else {
5225bb1ab09SDavid L Stevens 		int addrtype = ipv6_addr_type(&hdr->saddr);
5235bb1ab09SDavid L Stevens 
5241da177e4SLinus Torvalds 		/* This check is security critical. */
525f81b2e7dSYOSHIFUJI Hideaki 		if (addrtype == IPV6_ADDR_ANY ||
526f81b2e7dSYOSHIFUJI Hideaki 		    addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK))
5271da177e4SLinus Torvalds 			goto error;
5285bb1ab09SDavid L Stevens 		if (addrtype & IPV6_ADDR_LINKLOCAL) {
5295bb1ab09SDavid L Stevens 			icmpv6_send(skb, ICMPV6_DEST_UNREACH,
5303ffe533cSAlexey Dobriyan 				    ICMPV6_NOT_NEIGHBOUR, 0);
5315bb1ab09SDavid L Stevens 			goto error;
5325bb1ab09SDavid L Stevens 		}
5331da177e4SLinus Torvalds 	}
5341da177e4SLinus Torvalds 
5350954cf9cSHannes Frederic Sowa 	mtu = ip6_dst_mtu_forward(dst);
53614f3ad6fSUlrich Weber 	if (mtu < IPV6_MIN_MTU)
53714f3ad6fSUlrich Weber 		mtu = IPV6_MIN_MTU;
53814f3ad6fSUlrich Weber 
539fe6cc55fSFlorian Westphal 	if (ip6_pkt_too_big(skb, mtu)) {
5401da177e4SLinus Torvalds 		/* Again, force OUTPUT device used as source address */
5411da177e4SLinus Torvalds 		skb->dev = dst->dev;
54214f3ad6fSUlrich Weber 		icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
5431d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
54415c77d8bSEric Dumazet 				IPSTATS_MIB_INTOOBIGERRORS);
5451d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
54615c77d8bSEric Dumazet 				IPSTATS_MIB_FRAGFAILS);
5471da177e4SLinus Torvalds 		kfree_skb(skb);
5481da177e4SLinus Torvalds 		return -EMSGSIZE;
5491da177e4SLinus Torvalds 	}
5501da177e4SLinus Torvalds 
5511da177e4SLinus Torvalds 	if (skb_cow(skb, dst->dev->hard_header_len)) {
5521d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
55315c77d8bSEric Dumazet 				IPSTATS_MIB_OUTDISCARDS);
5541da177e4SLinus Torvalds 		goto drop;
5551da177e4SLinus Torvalds 	}
5561da177e4SLinus Torvalds 
5570660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
5581da177e4SLinus Torvalds 
5591da177e4SLinus Torvalds 	/* Mangling hops number delayed to point after skb COW */
5601da177e4SLinus Torvalds 
5611da177e4SLinus Torvalds 	hdr->hop_limit--;
5621da177e4SLinus Torvalds 
5631d015503SEric Dumazet 	__IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS);
5641d015503SEric Dumazet 	__IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len);
56529a26a56SEric W. Biederman 	return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD,
56629a26a56SEric W. Biederman 		       net, NULL, skb, skb->dev, dst->dev,
5676e23ae2aSPatrick McHardy 		       ip6_forward_finish);
5681da177e4SLinus Torvalds 
5691da177e4SLinus Torvalds error:
5701d015503SEric Dumazet 	__IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_INADDRERRORS);
5711da177e4SLinus Torvalds drop:
5721da177e4SLinus Torvalds 	kfree_skb(skb);
5731da177e4SLinus Torvalds 	return -EINVAL;
5741da177e4SLinus Torvalds }
5751da177e4SLinus Torvalds 
5761da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from)
5771da177e4SLinus Torvalds {
5781da177e4SLinus Torvalds 	to->pkt_type = from->pkt_type;
5791da177e4SLinus Torvalds 	to->priority = from->priority;
5801da177e4SLinus Torvalds 	to->protocol = from->protocol;
581adf30907SEric Dumazet 	skb_dst_drop(to);
582adf30907SEric Dumazet 	skb_dst_set(to, dst_clone(skb_dst(from)));
5831da177e4SLinus Torvalds 	to->dev = from->dev;
58482e91ffeSThomas Graf 	to->mark = from->mark;
5851da177e4SLinus Torvalds 
5861da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED
5871da177e4SLinus Torvalds 	to->tc_index = from->tc_index;
5881da177e4SLinus Torvalds #endif
589e7ac05f3SYasuyuki Kozakai 	nf_copy(to, from);
590984bc16cSJames Morris 	skb_copy_secmark(to, from);
5911da177e4SLinus Torvalds }
5921da177e4SLinus Torvalds 
5937d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb,
5947d8c6e39SEric W. Biederman 		 int (*output)(struct net *, struct sock *, struct sk_buff *))
5951da177e4SLinus Torvalds {
5961da177e4SLinus Torvalds 	struct sk_buff *frag;
597adf30907SEric Dumazet 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
598f60e5990Shannes@stressinduktion.org 	struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ?
599f60e5990Shannes@stressinduktion.org 				inet6_sk(skb->sk) : NULL;
6001da177e4SLinus Torvalds 	struct ipv6hdr *tmp_hdr;
6011da177e4SLinus Torvalds 	struct frag_hdr *fh;
6021da177e4SLinus Torvalds 	unsigned int mtu, hlen, left, len;
603a7ae1992SHerbert Xu 	int hroom, troom;
604286c2349SMartin KaFai Lau 	__be32 frag_id;
6051da177e4SLinus Torvalds 	int ptr, offset = 0, err = 0;
6061da177e4SLinus Torvalds 	u8 *prevhdr, nexthdr = 0;
6071da177e4SLinus Torvalds 
6087dd7eb95SDavid S. Miller 	err = ip6_find_1stfragopt(skb, &prevhdr);
6097dd7eb95SDavid S. Miller 	if (err < 0)
6102423496aSCraig Gallek 		goto fail;
6117dd7eb95SDavid S. Miller 	hlen = err;
6121da177e4SLinus Torvalds 	nexthdr = *prevhdr;
6131da177e4SLinus Torvalds 
614628a5c56SJohn Heffner 	mtu = ip6_skb_dst_mtu(skb);
615b881ef76SJohn Heffner 
616b881ef76SJohn Heffner 	/* We must not fragment if the socket is set to force MTU discovery
61714f3ad6fSUlrich Weber 	 * or if the skb it not generated by a local socket.
618b881ef76SJohn Heffner 	 */
619485fca66SFlorian Westphal 	if (unlikely(!skb->ignore_df && skb->len > mtu))
620485fca66SFlorian Westphal 		goto fail_toobig;
621a34a101eSEric Dumazet 
622485fca66SFlorian Westphal 	if (IP6CB(skb)->frag_max_size) {
623485fca66SFlorian Westphal 		if (IP6CB(skb)->frag_max_size > mtu)
624485fca66SFlorian Westphal 			goto fail_toobig;
625485fca66SFlorian Westphal 
626485fca66SFlorian Westphal 		/* don't send fragments larger than what we received */
627485fca66SFlorian Westphal 		mtu = IP6CB(skb)->frag_max_size;
628485fca66SFlorian Westphal 		if (mtu < IPV6_MIN_MTU)
629485fca66SFlorian Westphal 			mtu = IPV6_MIN_MTU;
630b881ef76SJohn Heffner 	}
631b881ef76SJohn Heffner 
632d91675f9SYOSHIFUJI Hideaki 	if (np && np->frag_size < mtu) {
633d91675f9SYOSHIFUJI Hideaki 		if (np->frag_size)
634d91675f9SYOSHIFUJI Hideaki 			mtu = np->frag_size;
635d91675f9SYOSHIFUJI Hideaki 	}
63689bc7848SHannes Frederic Sowa 	if (mtu < hlen + sizeof(struct frag_hdr) + 8)
637b72a2b01SHannes Frederic Sowa 		goto fail_toobig;
6381e0d69a9SHannes Frederic Sowa 	mtu -= hlen + sizeof(struct frag_hdr);
6391da177e4SLinus Torvalds 
640fd0273d7SMartin KaFai Lau 	frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr,
641fd0273d7SMartin KaFai Lau 				    &ipv6_hdr(skb)->saddr);
642286c2349SMartin KaFai Lau 
643405c92f7SHannes Frederic Sowa 	if (skb->ip_summed == CHECKSUM_PARTIAL &&
644405c92f7SHannes Frederic Sowa 	    (err = skb_checksum_help(skb)))
645405c92f7SHannes Frederic Sowa 		goto fail;
646405c92f7SHannes Frederic Sowa 
6471d325d21SFlorian Westphal 	hroom = LL_RESERVED_SPACE(rt->dst.dev);
64821dc3301SDavid S. Miller 	if (skb_has_frag_list(skb)) {
649c72d8cdaSAlexey Dobriyan 		unsigned int first_len = skb_pagelen(skb);
6503d13008eSEric Dumazet 		struct sk_buff *frag2;
6511da177e4SLinus Torvalds 
6521da177e4SLinus Torvalds 		if (first_len - hlen > mtu ||
6531da177e4SLinus Torvalds 		    ((first_len - hlen) & 7) ||
6541d325d21SFlorian Westphal 		    skb_cloned(skb) ||
6551d325d21SFlorian Westphal 		    skb_headroom(skb) < (hroom + sizeof(struct frag_hdr)))
6561da177e4SLinus Torvalds 			goto slow_path;
6571da177e4SLinus Torvalds 
6584d9092bbSDavid S. Miller 		skb_walk_frags(skb, frag) {
6591da177e4SLinus Torvalds 			/* Correct geometry. */
6601da177e4SLinus Torvalds 			if (frag->len > mtu ||
6611da177e4SLinus Torvalds 			    ((frag->len & 7) && frag->next) ||
6621d325d21SFlorian Westphal 			    skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr)))
6633d13008eSEric Dumazet 				goto slow_path_clean;
6641da177e4SLinus Torvalds 
6651da177e4SLinus Torvalds 			/* Partially cloned skb? */
6661da177e4SLinus Torvalds 			if (skb_shared(frag))
6673d13008eSEric Dumazet 				goto slow_path_clean;
6682fdba6b0SHerbert Xu 
6692fdba6b0SHerbert Xu 			BUG_ON(frag->sk);
6702fdba6b0SHerbert Xu 			if (skb->sk) {
6712fdba6b0SHerbert Xu 				frag->sk = skb->sk;
6722fdba6b0SHerbert Xu 				frag->destructor = sock_wfree;
6732fdba6b0SHerbert Xu 			}
6743d13008eSEric Dumazet 			skb->truesize -= frag->truesize;
6751da177e4SLinus Torvalds 		}
6761da177e4SLinus Torvalds 
6771da177e4SLinus Torvalds 		err = 0;
6781da177e4SLinus Torvalds 		offset = 0;
6791da177e4SLinus Torvalds 		/* BUILD HEADER */
6801da177e4SLinus Torvalds 
6819a217a1cSYOSHIFUJI Hideaki 		*prevhdr = NEXTHDR_FRAGMENT;
682d56f90a7SArnaldo Carvalho de Melo 		tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC);
6831da177e4SLinus Torvalds 		if (!tmp_hdr) {
6841d325d21SFlorian Westphal 			err = -ENOMEM;
6851d325d21SFlorian Westphal 			goto fail;
6861da177e4SLinus Torvalds 		}
6871d325d21SFlorian Westphal 		frag = skb_shinfo(skb)->frag_list;
6881d325d21SFlorian Westphal 		skb_frag_list_init(skb);
6891da177e4SLinus Torvalds 
6901da177e4SLinus Torvalds 		__skb_pull(skb, hlen);
691d58ff351SJohannes Berg 		fh = __skb_push(skb, sizeof(struct frag_hdr));
692e2d1bca7SArnaldo Carvalho de Melo 		__skb_push(skb, hlen);
693e2d1bca7SArnaldo Carvalho de Melo 		skb_reset_network_header(skb);
694d56f90a7SArnaldo Carvalho de Melo 		memcpy(skb_network_header(skb), tmp_hdr, hlen);
6951da177e4SLinus Torvalds 
6961da177e4SLinus Torvalds 		fh->nexthdr = nexthdr;
6971da177e4SLinus Torvalds 		fh->reserved = 0;
6981da177e4SLinus Torvalds 		fh->frag_off = htons(IP6_MF);
699286c2349SMartin KaFai Lau 		fh->identification = frag_id;
7001da177e4SLinus Torvalds 
7011da177e4SLinus Torvalds 		first_len = skb_pagelen(skb);
7021da177e4SLinus Torvalds 		skb->data_len = first_len - skb_headlen(skb);
7031da177e4SLinus Torvalds 		skb->len = first_len;
7040660e03fSArnaldo Carvalho de Melo 		ipv6_hdr(skb)->payload_len = htons(first_len -
7050660e03fSArnaldo Carvalho de Melo 						   sizeof(struct ipv6hdr));
7061da177e4SLinus Torvalds 
7071da177e4SLinus Torvalds 		for (;;) {
7081da177e4SLinus Torvalds 			/* Prepare header of the next frame,
7091da177e4SLinus Torvalds 			 * before previous one went down. */
7101da177e4SLinus Torvalds 			if (frag) {
7111da177e4SLinus Torvalds 				frag->ip_summed = CHECKSUM_NONE;
712badff6d0SArnaldo Carvalho de Melo 				skb_reset_transport_header(frag);
713d58ff351SJohannes Berg 				fh = __skb_push(frag, sizeof(struct frag_hdr));
714e2d1bca7SArnaldo Carvalho de Melo 				__skb_push(frag, hlen);
715e2d1bca7SArnaldo Carvalho de Melo 				skb_reset_network_header(frag);
716d56f90a7SArnaldo Carvalho de Melo 				memcpy(skb_network_header(frag), tmp_hdr,
717d56f90a7SArnaldo Carvalho de Melo 				       hlen);
7181da177e4SLinus Torvalds 				offset += skb->len - hlen - sizeof(struct frag_hdr);
7191da177e4SLinus Torvalds 				fh->nexthdr = nexthdr;
7201da177e4SLinus Torvalds 				fh->reserved = 0;
7211da177e4SLinus Torvalds 				fh->frag_off = htons(offset);
72253b24b8fSIan Morris 				if (frag->next)
7231da177e4SLinus Torvalds 					fh->frag_off |= htons(IP6_MF);
7241da177e4SLinus Torvalds 				fh->identification = frag_id;
7250660e03fSArnaldo Carvalho de Melo 				ipv6_hdr(frag)->payload_len =
7260660e03fSArnaldo Carvalho de Melo 						htons(frag->len -
7270660e03fSArnaldo Carvalho de Melo 						      sizeof(struct ipv6hdr));
7281da177e4SLinus Torvalds 				ip6_copy_metadata(frag, skb);
7291da177e4SLinus Torvalds 			}
7301da177e4SLinus Torvalds 
7317d8c6e39SEric W. Biederman 			err = output(net, sk, skb);
732dafee490SWei Dong 			if (!err)
733d8d1f30bSChangli Gao 				IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7343bd653c8SDenis V. Lunev 					      IPSTATS_MIB_FRAGCREATES);
735dafee490SWei Dong 
7361da177e4SLinus Torvalds 			if (err || !frag)
7371da177e4SLinus Torvalds 				break;
7381da177e4SLinus Torvalds 
7391da177e4SLinus Torvalds 			skb = frag;
7401da177e4SLinus Torvalds 			frag = skb->next;
7411da177e4SLinus Torvalds 			skb->next = NULL;
7421da177e4SLinus Torvalds 		}
7431da177e4SLinus Torvalds 
7441da177e4SLinus Torvalds 		kfree(tmp_hdr);
7451da177e4SLinus Torvalds 
7461da177e4SLinus Torvalds 		if (err == 0) {
747d8d1f30bSChangli Gao 			IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7483bd653c8SDenis V. Lunev 				      IPSTATS_MIB_FRAGOKS);
7491da177e4SLinus Torvalds 			return 0;
7501da177e4SLinus Torvalds 		}
7511da177e4SLinus Torvalds 
75246cfd725SFlorian Westphal 		kfree_skb_list(frag);
7531da177e4SLinus Torvalds 
754d8d1f30bSChangli Gao 		IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7553bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGFAILS);
7561da177e4SLinus Torvalds 		return err;
7573d13008eSEric Dumazet 
7583d13008eSEric Dumazet slow_path_clean:
7593d13008eSEric Dumazet 		skb_walk_frags(skb, frag2) {
7603d13008eSEric Dumazet 			if (frag2 == frag)
7613d13008eSEric Dumazet 				break;
7623d13008eSEric Dumazet 			frag2->sk = NULL;
7633d13008eSEric Dumazet 			frag2->destructor = NULL;
7643d13008eSEric Dumazet 			skb->truesize += frag2->truesize;
7653d13008eSEric Dumazet 		}
7661da177e4SLinus Torvalds 	}
7671da177e4SLinus Torvalds 
7681da177e4SLinus Torvalds slow_path:
7691da177e4SLinus Torvalds 	left = skb->len - hlen;		/* Space per frame */
7701da177e4SLinus Torvalds 	ptr = hlen;			/* Where to start from */
7711da177e4SLinus Torvalds 
7721da177e4SLinus Torvalds 	/*
7731da177e4SLinus Torvalds 	 *	Fragment the datagram.
7741da177e4SLinus Torvalds 	 */
7751da177e4SLinus Torvalds 
776a7ae1992SHerbert Xu 	troom = rt->dst.dev->needed_tailroom;
7771da177e4SLinus Torvalds 
7781da177e4SLinus Torvalds 	/*
7791da177e4SLinus Torvalds 	 *	Keep copying data until we run out.
7801da177e4SLinus Torvalds 	 */
7811da177e4SLinus Torvalds 	while (left > 0)	{
78279e49503SFlorian Westphal 		u8 *fragnexthdr_offset;
78379e49503SFlorian Westphal 
7841da177e4SLinus Torvalds 		len = left;
7851da177e4SLinus Torvalds 		/* IF: it doesn't fit, use 'mtu' - the data space left */
7861da177e4SLinus Torvalds 		if (len > mtu)
7871da177e4SLinus Torvalds 			len = mtu;
7881da177e4SLinus Torvalds 		/* IF: we are not sending up to and including the packet end
7891da177e4SLinus Torvalds 		   then align the next start on an eight byte boundary */
7901da177e4SLinus Torvalds 		if (len < left)	{
7911da177e4SLinus Torvalds 			len &= ~7;
7921da177e4SLinus Torvalds 		}
7931da177e4SLinus Torvalds 
794cbffccc9SJoe Perches 		/* Allocate buffer */
795cbffccc9SJoe Perches 		frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) +
796cbffccc9SJoe Perches 				 hroom + troom, GFP_ATOMIC);
797cbffccc9SJoe Perches 		if (!frag) {
7981da177e4SLinus Torvalds 			err = -ENOMEM;
7991da177e4SLinus Torvalds 			goto fail;
8001da177e4SLinus Torvalds 		}
8011da177e4SLinus Torvalds 
8021da177e4SLinus Torvalds 		/*
8031da177e4SLinus Torvalds 		 *	Set up data on packet
8041da177e4SLinus Torvalds 		 */
8051da177e4SLinus Torvalds 
8061da177e4SLinus Torvalds 		ip6_copy_metadata(frag, skb);
807a7ae1992SHerbert Xu 		skb_reserve(frag, hroom);
8081da177e4SLinus Torvalds 		skb_put(frag, len + hlen + sizeof(struct frag_hdr));
809c1d2bbe1SArnaldo Carvalho de Melo 		skb_reset_network_header(frag);
810badff6d0SArnaldo Carvalho de Melo 		fh = (struct frag_hdr *)(skb_network_header(frag) + hlen);
811b0e380b1SArnaldo Carvalho de Melo 		frag->transport_header = (frag->network_header + hlen +
812b0e380b1SArnaldo Carvalho de Melo 					  sizeof(struct frag_hdr));
8131da177e4SLinus Torvalds 
8141da177e4SLinus Torvalds 		/*
8151da177e4SLinus Torvalds 		 *	Charge the memory for the fragment to any owner
8161da177e4SLinus Torvalds 		 *	it might possess
8171da177e4SLinus Torvalds 		 */
8181da177e4SLinus Torvalds 		if (skb->sk)
8191da177e4SLinus Torvalds 			skb_set_owner_w(frag, skb->sk);
8201da177e4SLinus Torvalds 
8211da177e4SLinus Torvalds 		/*
8221da177e4SLinus Torvalds 		 *	Copy the packet header into the new buffer.
8231da177e4SLinus Torvalds 		 */
824d626f62bSArnaldo Carvalho de Melo 		skb_copy_from_linear_data(skb, skb_network_header(frag), hlen);
8251da177e4SLinus Torvalds 
82679e49503SFlorian Westphal 		fragnexthdr_offset = skb_network_header(frag);
82779e49503SFlorian Westphal 		fragnexthdr_offset += prevhdr - skb_network_header(skb);
82879e49503SFlorian Westphal 		*fragnexthdr_offset = NEXTHDR_FRAGMENT;
82979e49503SFlorian Westphal 
8301da177e4SLinus Torvalds 		/*
8311da177e4SLinus Torvalds 		 *	Build fragment header.
8321da177e4SLinus Torvalds 		 */
8331da177e4SLinus Torvalds 		fh->nexthdr = nexthdr;
8341da177e4SLinus Torvalds 		fh->reserved = 0;
8351da177e4SLinus Torvalds 		fh->identification = frag_id;
8361da177e4SLinus Torvalds 
8371da177e4SLinus Torvalds 		/*
8381da177e4SLinus Torvalds 		 *	Copy a block of the IP datagram.
8391da177e4SLinus Torvalds 		 */
840e3f0b86bSHimangi Saraogi 		BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag),
841e3f0b86bSHimangi Saraogi 				     len));
8421da177e4SLinus Torvalds 		left -= len;
8431da177e4SLinus Torvalds 
8441da177e4SLinus Torvalds 		fh->frag_off = htons(offset);
8451da177e4SLinus Torvalds 		if (left > 0)
8461da177e4SLinus Torvalds 			fh->frag_off |= htons(IP6_MF);
8470660e03fSArnaldo Carvalho de Melo 		ipv6_hdr(frag)->payload_len = htons(frag->len -
8480660e03fSArnaldo Carvalho de Melo 						    sizeof(struct ipv6hdr));
8491da177e4SLinus Torvalds 
8501da177e4SLinus Torvalds 		ptr += len;
8511da177e4SLinus Torvalds 		offset += len;
8521da177e4SLinus Torvalds 
8531da177e4SLinus Torvalds 		/*
8541da177e4SLinus Torvalds 		 *	Put this fragment into the sending queue.
8551da177e4SLinus Torvalds 		 */
8567d8c6e39SEric W. Biederman 		err = output(net, sk, frag);
8571da177e4SLinus Torvalds 		if (err)
8581da177e4SLinus Torvalds 			goto fail;
859dafee490SWei Dong 
860adf30907SEric Dumazet 		IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
8613bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGCREATES);
8621da177e4SLinus Torvalds 	}
863adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
864a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGOKS);
865808db80aSEric Dumazet 	consume_skb(skb);
8661da177e4SLinus Torvalds 	return err;
8671da177e4SLinus Torvalds 
868485fca66SFlorian Westphal fail_toobig:
869485fca66SFlorian Westphal 	if (skb->sk && dst_allfrag(skb_dst(skb)))
870485fca66SFlorian Westphal 		sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK);
871485fca66SFlorian Westphal 
872485fca66SFlorian Westphal 	icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
873485fca66SFlorian Westphal 	err = -EMSGSIZE;
874485fca66SFlorian Westphal 
8751da177e4SLinus Torvalds fail:
876adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
877a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGFAILS);
8781da177e4SLinus Torvalds 	kfree_skb(skb);
8791da177e4SLinus Torvalds 	return err;
8801da177e4SLinus Torvalds }
8811da177e4SLinus Torvalds 
882b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key,
883b71d1d42SEric Dumazet 			       const struct in6_addr *fl_addr,
884b71d1d42SEric Dumazet 			       const struct in6_addr *addr_cache)
885cf6b1982SYOSHIFUJI Hideaki {
886a02cec21SEric Dumazet 	return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) &&
88763159f29SIan Morris 		(!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache));
888cf6b1982SYOSHIFUJI Hideaki }
889cf6b1982SYOSHIFUJI Hideaki 
890497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk,
891497c615aSHerbert Xu 					  struct dst_entry *dst,
892b71d1d42SEric Dumazet 					  const struct flowi6 *fl6)
8931da177e4SLinus Torvalds {
8941da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
895a963a37dSEric Dumazet 	struct rt6_info *rt;
8961da177e4SLinus Torvalds 
897497c615aSHerbert Xu 	if (!dst)
898497c615aSHerbert Xu 		goto out;
8991da177e4SLinus Torvalds 
900a963a37dSEric Dumazet 	if (dst->ops->family != AF_INET6) {
901a963a37dSEric Dumazet 		dst_release(dst);
902a963a37dSEric Dumazet 		return NULL;
903a963a37dSEric Dumazet 	}
904a963a37dSEric Dumazet 
905a963a37dSEric Dumazet 	rt = (struct rt6_info *)dst;
9061da177e4SLinus Torvalds 	/* Yes, checking route validity in not connected
907d76e60a5SDavid S. Miller 	 * case is not very simple. Take into account,
908d76e60a5SDavid S. Miller 	 * that we do not support routing by source, TOS,
909d76e60a5SDavid S. Miller 	 * and MSG_DONTROUTE		--ANK (980726)
910d76e60a5SDavid S. Miller 	 *
911cf6b1982SYOSHIFUJI Hideaki 	 * 1. ip6_rt_check(): If route was host route,
912cf6b1982SYOSHIFUJI Hideaki 	 *    check that cached destination is current.
913d76e60a5SDavid S. Miller 	 *    If it is network route, we still may
914d76e60a5SDavid S. Miller 	 *    check its validity using saved pointer
915d76e60a5SDavid S. Miller 	 *    to the last used address: daddr_cache.
916d76e60a5SDavid S. Miller 	 *    We do not want to save whole address now,
917d76e60a5SDavid S. Miller 	 *    (because main consumer of this service
918d76e60a5SDavid S. Miller 	 *    is tcp, which has not this problem),
919d76e60a5SDavid S. Miller 	 *    so that the last trick works only on connected
920d76e60a5SDavid S. Miller 	 *    sockets.
921d76e60a5SDavid S. Miller 	 * 2. oif also should be the same.
9221da177e4SLinus Torvalds 	 */
9234c9483b2SDavid S. Miller 	if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) ||
9248e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES
9254c9483b2SDavid S. Miller 	    ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) ||
9268e1ef0a9SYOSHIFUJI Hideaki #endif
927ca254490SDavid Ahern 	   (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) &&
928ca254490SDavid Ahern 	      (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) {
929497c615aSHerbert Xu 		dst_release(dst);
930497c615aSHerbert Xu 		dst = NULL;
9311da177e4SLinus Torvalds 	}
932497c615aSHerbert Xu 
933497c615aSHerbert Xu out:
934497c615aSHerbert Xu 	return dst;
9351da177e4SLinus Torvalds }
936497c615aSHerbert Xu 
9373aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
9384c9483b2SDavid S. Miller 			       struct dst_entry **dst, struct flowi6 *fl6)
939497c615aSHerbert Xu {
94069cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
94169cce1d1SDavid S. Miller 	struct neighbour *n;
94297cac082SDavid S. Miller 	struct rt6_info *rt;
94369cce1d1SDavid S. Miller #endif
94469cce1d1SDavid S. Miller 	int err;
9456f21c96aSPaolo Abeni 	int flags = 0;
9461da177e4SLinus Torvalds 
947e16e888bSMarkus Stenberg 	/* The correct way to handle this would be to do
948e16e888bSMarkus Stenberg 	 * ip6_route_get_saddr, and then ip6_route_output; however,
949e16e888bSMarkus Stenberg 	 * the route-specific preferred source forces the
950e16e888bSMarkus Stenberg 	 * ip6_route_output call _before_ ip6_route_get_saddr.
951e16e888bSMarkus Stenberg 	 *
952e16e888bSMarkus Stenberg 	 * In source specific routing (no src=any default route),
953e16e888bSMarkus Stenberg 	 * ip6_route_output will fail given src=any saddr, though, so
954e16e888bSMarkus Stenberg 	 * that's why we try it again later.
955e16e888bSMarkus Stenberg 	 */
956e16e888bSMarkus Stenberg 	if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) {
957e16e888bSMarkus Stenberg 		struct rt6_info *rt;
958e16e888bSMarkus Stenberg 		bool had_dst = *dst != NULL;
959e16e888bSMarkus Stenberg 
960e16e888bSMarkus Stenberg 		if (!had_dst)
961e16e888bSMarkus Stenberg 			*dst = ip6_route_output(net, sk, fl6);
962e16e888bSMarkus Stenberg 		rt = (*dst)->error ? NULL : (struct rt6_info *)*dst;
963e16e888bSMarkus Stenberg 		err = ip6_route_get_saddr(net, rt, &fl6->daddr,
964e16e888bSMarkus Stenberg 					  sk ? inet6_sk(sk)->srcprefs : 0,
965e16e888bSMarkus Stenberg 					  &fl6->saddr);
966e16e888bSMarkus Stenberg 		if (err)
967e16e888bSMarkus Stenberg 			goto out_err_release;
968e16e888bSMarkus Stenberg 
969e16e888bSMarkus Stenberg 		/* If we had an erroneous initial result, pretend it
970e16e888bSMarkus Stenberg 		 * never existed and let the SA-enabled version take
971e16e888bSMarkus Stenberg 		 * over.
972e16e888bSMarkus Stenberg 		 */
973e16e888bSMarkus Stenberg 		if (!had_dst && (*dst)->error) {
974e16e888bSMarkus Stenberg 			dst_release(*dst);
975e16e888bSMarkus Stenberg 			*dst = NULL;
976e16e888bSMarkus Stenberg 		}
9776f21c96aSPaolo Abeni 
9786f21c96aSPaolo Abeni 		if (fl6->flowi6_oif)
9796f21c96aSPaolo Abeni 			flags |= RT6_LOOKUP_F_IFACE;
980e16e888bSMarkus Stenberg 	}
981e16e888bSMarkus Stenberg 
98263159f29SIan Morris 	if (!*dst)
9836f21c96aSPaolo Abeni 		*dst = ip6_route_output_flags(net, sk, fl6, flags);
9841da177e4SLinus Torvalds 
985e5d08d71SIan Morris 	err = (*dst)->error;
986e5d08d71SIan Morris 	if (err)
9871da177e4SLinus Torvalds 		goto out_err_release;
9881da177e4SLinus Torvalds 
98995c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
99095c385b4SNeil Horman 	/*
99195c385b4SNeil Horman 	 * Here if the dst entry we've looked up
99295c385b4SNeil Horman 	 * has a neighbour entry that is in the INCOMPLETE
99395c385b4SNeil Horman 	 * state and the src address from the flow is
99495c385b4SNeil Horman 	 * marked as OPTIMISTIC, we release the found
99595c385b4SNeil Horman 	 * dst entry and replace it instead with the
99695c385b4SNeil Horman 	 * dst entry of the nexthop router
99795c385b4SNeil Horman 	 */
998c56bf6feSEric Dumazet 	rt = (struct rt6_info *) *dst;
999707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
10002647a9b0SMartin KaFai Lau 	n = __ipv6_neigh_lookup_noref(rt->dst.dev,
10012647a9b0SMartin KaFai Lau 				      rt6_nexthop(rt, &fl6->daddr));
1002707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0;
1003707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
1004707be1ffSYOSHIFUJI Hideaki / 吉藤英明 
1005707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	if (err) {
100695c385b4SNeil Horman 		struct inet6_ifaddr *ifp;
10074c9483b2SDavid S. Miller 		struct flowi6 fl_gw6;
100895c385b4SNeil Horman 		int redirect;
100995c385b4SNeil Horman 
10104c9483b2SDavid S. Miller 		ifp = ipv6_get_ifaddr(net, &fl6->saddr,
10111cab3da6SDaniel Lezcano 				      (*dst)->dev, 1);
101295c385b4SNeil Horman 
101395c385b4SNeil Horman 		redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC);
101495c385b4SNeil Horman 		if (ifp)
101595c385b4SNeil Horman 			in6_ifa_put(ifp);
101695c385b4SNeil Horman 
101795c385b4SNeil Horman 		if (redirect) {
101895c385b4SNeil Horman 			/*
101995c385b4SNeil Horman 			 * We need to get the dst entry for the
102095c385b4SNeil Horman 			 * default router instead
102195c385b4SNeil Horman 			 */
102295c385b4SNeil Horman 			dst_release(*dst);
10234c9483b2SDavid S. Miller 			memcpy(&fl_gw6, fl6, sizeof(struct flowi6));
10244c9483b2SDavid S. Miller 			memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr));
10254c9483b2SDavid S. Miller 			*dst = ip6_route_output(net, sk, &fl_gw6);
1026e5d08d71SIan Morris 			err = (*dst)->error;
1027e5d08d71SIan Morris 			if (err)
102895c385b4SNeil Horman 				goto out_err_release;
102995c385b4SNeil Horman 		}
103095c385b4SNeil Horman 	}
103195c385b4SNeil Horman #endif
1032ec5e3b0aSJonathan T. Leighton 	if (ipv6_addr_v4mapped(&fl6->saddr) &&
103300ea1ceeSWillem de Bruijn 	    !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) {
103400ea1ceeSWillem de Bruijn 		err = -EAFNOSUPPORT;
103500ea1ceeSWillem de Bruijn 		goto out_err_release;
103600ea1ceeSWillem de Bruijn 	}
103795c385b4SNeil Horman 
10381da177e4SLinus Torvalds 	return 0;
10391da177e4SLinus Torvalds 
10401da177e4SLinus Torvalds out_err_release:
10411da177e4SLinus Torvalds 	dst_release(*dst);
10421da177e4SLinus Torvalds 	*dst = NULL;
10438a966fc0SDavid Ahern 
10440d240e78SDavid Ahern 	if (err == -ENETUNREACH)
10450d240e78SDavid Ahern 		IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES);
10461da177e4SLinus Torvalds 	return err;
10471da177e4SLinus Torvalds }
104834a0b3cdSAdrian Bunk 
1049497c615aSHerbert Xu /**
1050497c615aSHerbert Xu  *	ip6_dst_lookup - perform route lookup on flow
1051497c615aSHerbert Xu  *	@sk: socket which provides route info
1052497c615aSHerbert Xu  *	@dst: pointer to dst_entry * for result
10534c9483b2SDavid S. Miller  *	@fl6: flow to lookup
1054497c615aSHerbert Xu  *
1055497c615aSHerbert Xu  *	This function performs a route lookup on the given flow.
1056497c615aSHerbert Xu  *
1057497c615aSHerbert Xu  *	It returns zero on success, or a standard errno code on error.
1058497c615aSHerbert Xu  */
1059343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst,
1060343d60aaSRoopa Prabhu 		   struct flowi6 *fl6)
1061497c615aSHerbert Xu {
1062497c615aSHerbert Xu 	*dst = NULL;
1063343d60aaSRoopa Prabhu 	return ip6_dst_lookup_tail(net, sk, dst, fl6);
1064497c615aSHerbert Xu }
10653cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup);
10663cf3dc6cSArnaldo Carvalho de Melo 
1067497c615aSHerbert Xu /**
106868d0c6d3SDavid S. Miller  *	ip6_dst_lookup_flow - perform route lookup on flow with ipsec
106968d0c6d3SDavid S. Miller  *	@sk: socket which provides route info
10704c9483b2SDavid S. Miller  *	@fl6: flow to lookup
107168d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
107268d0c6d3SDavid S. Miller  *
107368d0c6d3SDavid S. Miller  *	This function performs a route lookup on the given flow.
107468d0c6d3SDavid S. Miller  *
107568d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
107668d0c6d3SDavid S. Miller  *	error code.
107768d0c6d3SDavid S. Miller  */
10783aef934fSEric Dumazet struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6,
10790e0d44abSSteffen Klassert 				      const struct in6_addr *final_dst)
108068d0c6d3SDavid S. Miller {
108168d0c6d3SDavid S. Miller 	struct dst_entry *dst = NULL;
108268d0c6d3SDavid S. Miller 	int err;
108368d0c6d3SDavid S. Miller 
1084343d60aaSRoopa Prabhu 	err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6);
108568d0c6d3SDavid S. Miller 	if (err)
108668d0c6d3SDavid S. Miller 		return ERR_PTR(err);
108768d0c6d3SDavid S. Miller 	if (final_dst)
10884e3fd7a0SAlexey Dobriyan 		fl6->daddr = *final_dst;
10892774c131SDavid S. Miller 
1090f92ee619SSteffen Klassert 	return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0);
109168d0c6d3SDavid S. Miller }
109268d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow);
109368d0c6d3SDavid S. Miller 
109468d0c6d3SDavid S. Miller /**
109568d0c6d3SDavid S. Miller  *	ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow
109668d0c6d3SDavid S. Miller  *	@sk: socket which provides the dst cache and route info
10974c9483b2SDavid S. Miller  *	@fl6: flow to lookup
109868d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
1099497c615aSHerbert Xu  *
1100497c615aSHerbert Xu  *	This function performs a route lookup on the given flow with the
1101497c615aSHerbert Xu  *	possibility of using the cached route in the socket if it is valid.
1102497c615aSHerbert Xu  *	It will take the socket dst lock when operating on the dst cache.
1103497c615aSHerbert Xu  *	As a result, this function can only be used in process context.
1104497c615aSHerbert Xu  *
110568d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
110668d0c6d3SDavid S. Miller  *	error code.
1107497c615aSHerbert Xu  */
11084c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6,
11090e0d44abSSteffen Klassert 					 const struct in6_addr *final_dst)
1110497c615aSHerbert Xu {
111168d0c6d3SDavid S. Miller 	struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie);
1112497c615aSHerbert Xu 
11134c9483b2SDavid S. Miller 	dst = ip6_sk_dst_check(sk, dst, fl6);
111400bc0ef5SJakub Sitnicki 	if (!dst)
111500bc0ef5SJakub Sitnicki 		dst = ip6_dst_lookup_flow(sk, fl6, final_dst);
111668d0c6d3SDavid S. Miller 
111700bc0ef5SJakub Sitnicki 	return dst;
111868d0c6d3SDavid S. Miller }
111968d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow);
1120497c615aSHerbert Xu 
11210178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src,
11220178b695SHerbert Xu 					       gfp_t gfp)
11230178b695SHerbert Xu {
11240178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
11250178b695SHerbert Xu }
11260178b695SHerbert Xu 
11270178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src,
11280178b695SHerbert Xu 						gfp_t gfp)
11290178b695SHerbert Xu {
11300178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
11310178b695SHerbert Xu }
11320178b695SHerbert Xu 
113375a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu,
11340c183379SGao feng 				int *maxfraglen,
11350c183379SGao feng 				unsigned int fragheaderlen,
11360c183379SGao feng 				struct sk_buff *skb,
113775a493e6SHannes Frederic Sowa 				struct rt6_info *rt,
1138e367c2d0Slucien 				unsigned int orig_mtu)
11390c183379SGao feng {
11400c183379SGao feng 	if (!(rt->dst.flags & DST_XFRM_TUNNEL)) {
114163159f29SIan Morris 		if (!skb) {
11420c183379SGao feng 			/* first fragment, reserve header_len */
1143e367c2d0Slucien 			*mtu = orig_mtu - rt->dst.header_len;
11440c183379SGao feng 
11450c183379SGao feng 		} else {
11460c183379SGao feng 			/*
11470c183379SGao feng 			 * this fragment is not first, the headers
11480c183379SGao feng 			 * space is regarded as data space.
11490c183379SGao feng 			 */
1150e367c2d0Slucien 			*mtu = orig_mtu;
11510c183379SGao feng 		}
11520c183379SGao feng 		*maxfraglen = ((*mtu - fragheaderlen) & ~7)
11530c183379SGao feng 			      + fragheaderlen - sizeof(struct frag_hdr);
11540c183379SGao feng 	}
11550c183379SGao feng }
11560c183379SGao feng 
1157366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork,
115826879da5SWei Wang 			  struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6,
1159366e41d9SVlad Yasevich 			  struct rt6_info *rt, struct flowi6 *fl6)
1160366e41d9SVlad Yasevich {
1161366e41d9SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
1162366e41d9SVlad Yasevich 	unsigned int mtu;
116326879da5SWei Wang 	struct ipv6_txoptions *opt = ipc6->opt;
1164366e41d9SVlad Yasevich 
1165366e41d9SVlad Yasevich 	/*
1166366e41d9SVlad Yasevich 	 * setup for corking
1167366e41d9SVlad Yasevich 	 */
1168366e41d9SVlad Yasevich 	if (opt) {
1169366e41d9SVlad Yasevich 		if (WARN_ON(v6_cork->opt))
1170366e41d9SVlad Yasevich 			return -EINVAL;
1171366e41d9SVlad Yasevich 
1172864e2a1fSEric Dumazet 		v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation);
117363159f29SIan Morris 		if (unlikely(!v6_cork->opt))
1174366e41d9SVlad Yasevich 			return -ENOBUFS;
1175366e41d9SVlad Yasevich 
1176864e2a1fSEric Dumazet 		v6_cork->opt->tot_len = sizeof(*opt);
1177366e41d9SVlad Yasevich 		v6_cork->opt->opt_flen = opt->opt_flen;
1178366e41d9SVlad Yasevich 		v6_cork->opt->opt_nflen = opt->opt_nflen;
1179366e41d9SVlad Yasevich 
1180366e41d9SVlad Yasevich 		v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt,
1181366e41d9SVlad Yasevich 						    sk->sk_allocation);
1182366e41d9SVlad Yasevich 		if (opt->dst0opt && !v6_cork->opt->dst0opt)
1183366e41d9SVlad Yasevich 			return -ENOBUFS;
1184366e41d9SVlad Yasevich 
1185366e41d9SVlad Yasevich 		v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt,
1186366e41d9SVlad Yasevich 						    sk->sk_allocation);
1187366e41d9SVlad Yasevich 		if (opt->dst1opt && !v6_cork->opt->dst1opt)
1188366e41d9SVlad Yasevich 			return -ENOBUFS;
1189366e41d9SVlad Yasevich 
1190366e41d9SVlad Yasevich 		v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt,
1191366e41d9SVlad Yasevich 						   sk->sk_allocation);
1192366e41d9SVlad Yasevich 		if (opt->hopopt && !v6_cork->opt->hopopt)
1193366e41d9SVlad Yasevich 			return -ENOBUFS;
1194366e41d9SVlad Yasevich 
1195366e41d9SVlad Yasevich 		v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt,
1196366e41d9SVlad Yasevich 						    sk->sk_allocation);
1197366e41d9SVlad Yasevich 		if (opt->srcrt && !v6_cork->opt->srcrt)
1198366e41d9SVlad Yasevich 			return -ENOBUFS;
1199366e41d9SVlad Yasevich 
1200366e41d9SVlad Yasevich 		/* need source address above miyazawa*/
1201366e41d9SVlad Yasevich 	}
1202366e41d9SVlad Yasevich 	dst_hold(&rt->dst);
1203366e41d9SVlad Yasevich 	cork->base.dst = &rt->dst;
1204366e41d9SVlad Yasevich 	cork->fl.u.ip6 = *fl6;
120526879da5SWei Wang 	v6_cork->hop_limit = ipc6->hlimit;
120626879da5SWei Wang 	v6_cork->tclass = ipc6->tclass;
1207366e41d9SVlad Yasevich 	if (rt->dst.flags & DST_XFRM_TUNNEL)
1208366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1209*749439bfSMike Maloney 		      READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst);
1210366e41d9SVlad Yasevich 	else
1211366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1212*749439bfSMike Maloney 		      READ_ONCE(rt->dst.dev->mtu) : dst_mtu(rt->dst.path);
1213366e41d9SVlad Yasevich 	if (np->frag_size < mtu) {
1214366e41d9SVlad Yasevich 		if (np->frag_size)
1215366e41d9SVlad Yasevich 			mtu = np->frag_size;
1216366e41d9SVlad Yasevich 	}
1217*749439bfSMike Maloney 	if (mtu < IPV6_MIN_MTU)
1218*749439bfSMike Maloney 		return -EINVAL;
1219366e41d9SVlad Yasevich 	cork->base.fragsize = mtu;
1220366e41d9SVlad Yasevich 	if (dst_allfrag(rt->dst.path))
1221366e41d9SVlad Yasevich 		cork->base.flags |= IPCORK_ALLFRAG;
1222366e41d9SVlad Yasevich 	cork->base.length = 0;
1223366e41d9SVlad Yasevich 
1224366e41d9SVlad Yasevich 	return 0;
1225366e41d9SVlad Yasevich }
1226366e41d9SVlad Yasevich 
12270bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk,
12280bbe84a6SVlad Yasevich 			     struct flowi6 *fl6,
12290bbe84a6SVlad Yasevich 			     struct sk_buff_head *queue,
12300bbe84a6SVlad Yasevich 			     struct inet_cork *cork,
12310bbe84a6SVlad Yasevich 			     struct inet6_cork *v6_cork,
12320bbe84a6SVlad Yasevich 			     struct page_frag *pfrag,
12330bbe84a6SVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
12340bbe84a6SVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
12351da177e4SLinus Torvalds 			     void *from, int length, int transhdrlen,
123626879da5SWei Wang 			     unsigned int flags, struct ipcm6_cookie *ipc6,
1237c14ac945SSoheil Hassas Yeganeh 			     const struct sockcm_cookie *sockc)
12381da177e4SLinus Torvalds {
12390c183379SGao feng 	struct sk_buff *skb, *skb_prev = NULL;
1240e367c2d0Slucien 	unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu;
12410bbe84a6SVlad Yasevich 	int exthdrlen = 0;
12420bbe84a6SVlad Yasevich 	int dst_exthdrlen = 0;
12431da177e4SLinus Torvalds 	int hh_len;
12441da177e4SLinus Torvalds 	int copy;
12451da177e4SLinus Torvalds 	int err;
12461da177e4SLinus Torvalds 	int offset = 0;
1247a693e698SAnders Berggren 	__u8 tx_flags = 0;
124809c2d251SWillem de Bruijn 	u32 tskey = 0;
12490bbe84a6SVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->dst;
12500bbe84a6SVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
125132dce968SVlad Yasevich 	int csummode = CHECKSUM_NONE;
1252682b1a9dSHannes Frederic Sowa 	unsigned int maxnonfragsize, headersize;
12531da177e4SLinus Torvalds 
12540bbe84a6SVlad Yasevich 	skb = skb_peek_tail(queue);
12550bbe84a6SVlad Yasevich 	if (!skb) {
12560bbe84a6SVlad Yasevich 		exthdrlen = opt ? opt->opt_flen : 0;
12577efdba5bSRomain KUNTZ 		dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len;
12581da177e4SLinus Torvalds 	}
12590bbe84a6SVlad Yasevich 
1260366e41d9SVlad Yasevich 	mtu = cork->fragsize;
1261e367c2d0Slucien 	orig_mtu = mtu;
12621da177e4SLinus Torvalds 
1263d8d1f30bSChangli Gao 	hh_len = LL_RESERVED_SPACE(rt->dst.dev);
12641da177e4SLinus Torvalds 
1265a1b05140SMasahide NAKAMURA 	fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len +
1266b4ce9277SHerbert Xu 			(opt ? opt->opt_nflen : 0);
12674df98e76SHannes Frederic Sowa 	maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen -
12684df98e76SHannes Frederic Sowa 		     sizeof(struct frag_hdr);
12691da177e4SLinus Torvalds 
12704df98e76SHannes Frederic Sowa 	headersize = sizeof(struct ipv6hdr) +
12713a1cebe7SHannes Frederic Sowa 		     (opt ? opt->opt_flen + opt->opt_nflen : 0) +
12724df98e76SHannes Frederic Sowa 		     (dst_allfrag(&rt->dst) ?
12734df98e76SHannes Frederic Sowa 		      sizeof(struct frag_hdr) : 0) +
12744df98e76SHannes Frederic Sowa 		     rt->rt6i_nfheader_len;
12754df98e76SHannes Frederic Sowa 
127626879da5SWei Wang 	if (cork->length + length > mtu - headersize && ipc6->dontfrag &&
12774df98e76SHannes Frederic Sowa 	    (sk->sk_protocol == IPPROTO_UDP ||
12784df98e76SHannes Frederic Sowa 	     sk->sk_protocol == IPPROTO_RAW)) {
12794df98e76SHannes Frederic Sowa 		ipv6_local_rxpmtu(sk, fl6, mtu - headersize +
12804df98e76SHannes Frederic Sowa 				sizeof(struct ipv6hdr));
12814df98e76SHannes Frederic Sowa 		goto emsgsize;
12824df98e76SHannes Frederic Sowa 	}
12834df98e76SHannes Frederic Sowa 
1284682b1a9dSHannes Frederic Sowa 	if (ip6_sk_ignore_df(sk))
1285682b1a9dSHannes Frederic Sowa 		maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN;
1286682b1a9dSHannes Frederic Sowa 	else
1287682b1a9dSHannes Frederic Sowa 		maxnonfragsize = mtu;
1288682b1a9dSHannes Frederic Sowa 
12894df98e76SHannes Frederic Sowa 	if (cork->length + length > maxnonfragsize - headersize) {
12904df98e76SHannes Frederic Sowa emsgsize:
12914df98e76SHannes Frederic Sowa 		ipv6_local_error(sk, EMSGSIZE, fl6,
12924df98e76SHannes Frederic Sowa 				 mtu - headersize +
12934df98e76SHannes Frederic Sowa 				 sizeof(struct ipv6hdr));
12941da177e4SLinus Torvalds 		return -EMSGSIZE;
12951da177e4SLinus Torvalds 	}
1296682b1a9dSHannes Frederic Sowa 
1297682b1a9dSHannes Frederic Sowa 	/* CHECKSUM_PARTIAL only with no extension headers and when
1298682b1a9dSHannes Frederic Sowa 	 * we are not going to fragment
1299682b1a9dSHannes Frederic Sowa 	 */
1300682b1a9dSHannes Frederic Sowa 	if (transhdrlen && sk->sk_protocol == IPPROTO_UDP &&
1301682b1a9dSHannes Frederic Sowa 	    headersize == sizeof(struct ipv6hdr) &&
13022b89ed65SVlad Yasevich 	    length <= mtu - headersize &&
1303682b1a9dSHannes Frederic Sowa 	    !(flags & MSG_MORE) &&
1304c8cd0989STom Herbert 	    rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM))
1305682b1a9dSHannes Frederic Sowa 		csummode = CHECKSUM_PARTIAL;
13061da177e4SLinus Torvalds 
130709c2d251SWillem de Bruijn 	if (sk->sk_type == SOCK_DGRAM || sk->sk_type == SOCK_RAW) {
1308c14ac945SSoheil Hassas Yeganeh 		sock_tx_timestamp(sk, sockc->tsflags, &tx_flags);
130909c2d251SWillem de Bruijn 		if (tx_flags & SKBTX_ANY_SW_TSTAMP &&
131009c2d251SWillem de Bruijn 		    sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID)
131109c2d251SWillem de Bruijn 			tskey = sk->sk_tskey++;
131209c2d251SWillem de Bruijn 	}
1313a693e698SAnders Berggren 
13141da177e4SLinus Torvalds 	/*
13151da177e4SLinus Torvalds 	 * Let's try using as much space as possible.
13161da177e4SLinus Torvalds 	 * Use MTU if total length of the message fits into the MTU.
13171da177e4SLinus Torvalds 	 * Otherwise, we need to reserve fragment header and
13181da177e4SLinus Torvalds 	 * fragment alignment (= 8-15 octects, in total).
13191da177e4SLinus Torvalds 	 *
13201da177e4SLinus Torvalds 	 * Note that we may need to "move" the data from the tail of
13211da177e4SLinus Torvalds 	 * of the buffer to the new fragment when we split
13221da177e4SLinus Torvalds 	 * the message.
13231da177e4SLinus Torvalds 	 *
13241da177e4SLinus Torvalds 	 * FIXME: It may be fragmented into multiple chunks
13251da177e4SLinus Torvalds 	 *        at once if non-fragmentable extension headers
13261da177e4SLinus Torvalds 	 *        are too large.
13271da177e4SLinus Torvalds 	 * --yoshfuji
13281da177e4SLinus Torvalds 	 */
13291da177e4SLinus Torvalds 
13302811ebacSHannes Frederic Sowa 	cork->length += length;
13312811ebacSHannes Frederic Sowa 	if (!skb)
13321da177e4SLinus Torvalds 		goto alloc_new_skb;
13331da177e4SLinus Torvalds 
13341da177e4SLinus Torvalds 	while (length > 0) {
13351da177e4SLinus Torvalds 		/* Check if the remaining data fits into current packet. */
1336bdc712b4SDavid S. Miller 		copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len;
13371da177e4SLinus Torvalds 		if (copy < length)
13381da177e4SLinus Torvalds 			copy = maxfraglen - skb->len;
13391da177e4SLinus Torvalds 
13401da177e4SLinus Torvalds 		if (copy <= 0) {
13411da177e4SLinus Torvalds 			char *data;
13421da177e4SLinus Torvalds 			unsigned int datalen;
13431da177e4SLinus Torvalds 			unsigned int fraglen;
13441da177e4SLinus Torvalds 			unsigned int fraggap;
13451da177e4SLinus Torvalds 			unsigned int alloclen;
13461da177e4SLinus Torvalds alloc_new_skb:
13471da177e4SLinus Torvalds 			/* There's no room in the current skb */
13480c183379SGao feng 			if (skb)
13490c183379SGao feng 				fraggap = skb->len - maxfraglen;
13501da177e4SLinus Torvalds 			else
13511da177e4SLinus Torvalds 				fraggap = 0;
13520c183379SGao feng 			/* update mtu and maxfraglen if necessary */
135363159f29SIan Morris 			if (!skb || !skb_prev)
13540c183379SGao feng 				ip6_append_data_mtu(&mtu, &maxfraglen,
135575a493e6SHannes Frederic Sowa 						    fragheaderlen, skb, rt,
1356e367c2d0Slucien 						    orig_mtu);
13570c183379SGao feng 
13580c183379SGao feng 			skb_prev = skb;
13591da177e4SLinus Torvalds 
13601da177e4SLinus Torvalds 			/*
13611da177e4SLinus Torvalds 			 * If remaining data exceeds the mtu,
13621da177e4SLinus Torvalds 			 * we know we need more fragment(s).
13631da177e4SLinus Torvalds 			 */
13641da177e4SLinus Torvalds 			datalen = length + fraggap;
13651da177e4SLinus Torvalds 
13660c183379SGao feng 			if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen)
13670c183379SGao feng 				datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len;
13681da177e4SLinus Torvalds 			if ((flags & MSG_MORE) &&
1369d8d1f30bSChangli Gao 			    !(rt->dst.dev->features&NETIF_F_SG))
13701da177e4SLinus Torvalds 				alloclen = mtu;
13711da177e4SLinus Torvalds 			else
13721da177e4SLinus Torvalds 				alloclen = datalen + fragheaderlen;
13731da177e4SLinus Torvalds 
1374299b0767SSteffen Klassert 			alloclen += dst_exthdrlen;
1375299b0767SSteffen Klassert 
13760c183379SGao feng 			if (datalen != length + fraggap) {
13771da177e4SLinus Torvalds 				/*
13780c183379SGao feng 				 * this is not the last fragment, the trailer
13790c183379SGao feng 				 * space is regarded as data space.
13801da177e4SLinus Torvalds 				 */
13810c183379SGao feng 				datalen += rt->dst.trailer_len;
13820c183379SGao feng 			}
13830c183379SGao feng 
1384d8d1f30bSChangli Gao 			alloclen += rt->dst.trailer_len;
13850c183379SGao feng 			fraglen = datalen + fragheaderlen;
13861da177e4SLinus Torvalds 
13871da177e4SLinus Torvalds 			/*
13881da177e4SLinus Torvalds 			 * We just reserve space for fragment header.
13891da177e4SLinus Torvalds 			 * Note: this may be overallocation if the message
13901da177e4SLinus Torvalds 			 * (without MSG_MORE) fits into the MTU.
13911da177e4SLinus Torvalds 			 */
13921da177e4SLinus Torvalds 			alloclen += sizeof(struct frag_hdr);
13931da177e4SLinus Torvalds 
1394232cd35dSEric Dumazet 			copy = datalen - transhdrlen - fraggap;
1395232cd35dSEric Dumazet 			if (copy < 0) {
1396232cd35dSEric Dumazet 				err = -EINVAL;
1397232cd35dSEric Dumazet 				goto error;
1398232cd35dSEric Dumazet 			}
13991da177e4SLinus Torvalds 			if (transhdrlen) {
14001da177e4SLinus Torvalds 				skb = sock_alloc_send_skb(sk,
14011da177e4SLinus Torvalds 						alloclen + hh_len,
14021da177e4SLinus Torvalds 						(flags & MSG_DONTWAIT), &err);
14031da177e4SLinus Torvalds 			} else {
14041da177e4SLinus Torvalds 				skb = NULL;
140514afee4bSReshetova, Elena 				if (refcount_read(&sk->sk_wmem_alloc) <=
14061da177e4SLinus Torvalds 				    2 * sk->sk_sndbuf)
14071da177e4SLinus Torvalds 					skb = sock_wmalloc(sk,
14081da177e4SLinus Torvalds 							   alloclen + hh_len, 1,
14091da177e4SLinus Torvalds 							   sk->sk_allocation);
141063159f29SIan Morris 				if (unlikely(!skb))
14111da177e4SLinus Torvalds 					err = -ENOBUFS;
14121da177e4SLinus Torvalds 			}
141363159f29SIan Morris 			if (!skb)
14141da177e4SLinus Torvalds 				goto error;
14151da177e4SLinus Torvalds 			/*
14161da177e4SLinus Torvalds 			 *	Fill in the control structures
14171da177e4SLinus Torvalds 			 */
14189c9c9ad5SHannes Frederic Sowa 			skb->protocol = htons(ETH_P_IPV6);
141932dce968SVlad Yasevich 			skb->ip_summed = csummode;
14201da177e4SLinus Torvalds 			skb->csum = 0;
14211f85851eSGao feng 			/* reserve for fragmentation and ipsec header */
14221f85851eSGao feng 			skb_reserve(skb, hh_len + sizeof(struct frag_hdr) +
14231f85851eSGao feng 				    dst_exthdrlen);
14241da177e4SLinus Torvalds 
142511878b40SWillem de Bruijn 			/* Only the initial fragment is time stamped */
1426a693e698SAnders Berggren 			skb_shinfo(skb)->tx_flags = tx_flags;
142711878b40SWillem de Bruijn 			tx_flags = 0;
142809c2d251SWillem de Bruijn 			skb_shinfo(skb)->tskey = tskey;
142909c2d251SWillem de Bruijn 			tskey = 0;
1430a693e698SAnders Berggren 
14311da177e4SLinus Torvalds 			/*
14321da177e4SLinus Torvalds 			 *	Find where to start putting bytes
14331da177e4SLinus Torvalds 			 */
14341f85851eSGao feng 			data = skb_put(skb, fraglen);
14351f85851eSGao feng 			skb_set_network_header(skb, exthdrlen);
14361f85851eSGao feng 			data += fragheaderlen;
1437b0e380b1SArnaldo Carvalho de Melo 			skb->transport_header = (skb->network_header +
1438b0e380b1SArnaldo Carvalho de Melo 						 fragheaderlen);
14391da177e4SLinus Torvalds 			if (fraggap) {
14401da177e4SLinus Torvalds 				skb->csum = skb_copy_and_csum_bits(
14411da177e4SLinus Torvalds 					skb_prev, maxfraglen,
14421da177e4SLinus Torvalds 					data + transhdrlen, fraggap, 0);
14431da177e4SLinus Torvalds 				skb_prev->csum = csum_sub(skb_prev->csum,
14441da177e4SLinus Torvalds 							  skb->csum);
14451da177e4SLinus Torvalds 				data += fraggap;
1446e9fa4f7bSHerbert Xu 				pskb_trim_unique(skb_prev, maxfraglen);
14471da177e4SLinus Torvalds 			}
1448232cd35dSEric Dumazet 			if (copy > 0 &&
1449232cd35dSEric Dumazet 			    getfrag(from, data + transhdrlen, offset,
1450232cd35dSEric Dumazet 				    copy, fraggap, skb) < 0) {
14511da177e4SLinus Torvalds 				err = -EFAULT;
14521da177e4SLinus Torvalds 				kfree_skb(skb);
14531da177e4SLinus Torvalds 				goto error;
14541da177e4SLinus Torvalds 			}
14551da177e4SLinus Torvalds 
14561da177e4SLinus Torvalds 			offset += copy;
14571da177e4SLinus Torvalds 			length -= datalen - fraggap;
14581da177e4SLinus Torvalds 			transhdrlen = 0;
14591da177e4SLinus Torvalds 			exthdrlen = 0;
1460299b0767SSteffen Klassert 			dst_exthdrlen = 0;
14611da177e4SLinus Torvalds 
14620dec879fSJulian Anastasov 			if ((flags & MSG_CONFIRM) && !skb_prev)
14630dec879fSJulian Anastasov 				skb_set_dst_pending_confirm(skb, 1);
14640dec879fSJulian Anastasov 
14651da177e4SLinus Torvalds 			/*
14661da177e4SLinus Torvalds 			 * Put the packet on the pending queue
14671da177e4SLinus Torvalds 			 */
14680bbe84a6SVlad Yasevich 			__skb_queue_tail(queue, skb);
14691da177e4SLinus Torvalds 			continue;
14701da177e4SLinus Torvalds 		}
14711da177e4SLinus Torvalds 
14721da177e4SLinus Torvalds 		if (copy > length)
14731da177e4SLinus Torvalds 			copy = length;
14741da177e4SLinus Torvalds 
1475d8d1f30bSChangli Gao 		if (!(rt->dst.dev->features&NETIF_F_SG)) {
14761da177e4SLinus Torvalds 			unsigned int off;
14771da177e4SLinus Torvalds 
14781da177e4SLinus Torvalds 			off = skb->len;
14791da177e4SLinus Torvalds 			if (getfrag(from, skb_put(skb, copy),
14801da177e4SLinus Torvalds 						offset, copy, off, skb) < 0) {
14811da177e4SLinus Torvalds 				__skb_trim(skb, off);
14821da177e4SLinus Torvalds 				err = -EFAULT;
14831da177e4SLinus Torvalds 				goto error;
14841da177e4SLinus Torvalds 			}
14851da177e4SLinus Torvalds 		} else {
14861da177e4SLinus Torvalds 			int i = skb_shinfo(skb)->nr_frags;
14871da177e4SLinus Torvalds 
14881da177e4SLinus Torvalds 			err = -ENOMEM;
14895640f768SEric Dumazet 			if (!sk_page_frag_refill(sk, pfrag))
14901da177e4SLinus Torvalds 				goto error;
14911da177e4SLinus Torvalds 
14925640f768SEric Dumazet 			if (!skb_can_coalesce(skb, i, pfrag->page,
14935640f768SEric Dumazet 					      pfrag->offset)) {
14941da177e4SLinus Torvalds 				err = -EMSGSIZE;
14955640f768SEric Dumazet 				if (i == MAX_SKB_FRAGS)
14961da177e4SLinus Torvalds 					goto error;
14975640f768SEric Dumazet 
14985640f768SEric Dumazet 				__skb_fill_page_desc(skb, i, pfrag->page,
14995640f768SEric Dumazet 						     pfrag->offset, 0);
15005640f768SEric Dumazet 				skb_shinfo(skb)->nr_frags = ++i;
15015640f768SEric Dumazet 				get_page(pfrag->page);
15021da177e4SLinus Torvalds 			}
15035640f768SEric Dumazet 			copy = min_t(int, copy, pfrag->size - pfrag->offset);
15049e903e08SEric Dumazet 			if (getfrag(from,
15055640f768SEric Dumazet 				    page_address(pfrag->page) + pfrag->offset,
15065640f768SEric Dumazet 				    offset, copy, skb->len, skb) < 0)
15075640f768SEric Dumazet 				goto error_efault;
15085640f768SEric Dumazet 
15095640f768SEric Dumazet 			pfrag->offset += copy;
15105640f768SEric Dumazet 			skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy);
15111da177e4SLinus Torvalds 			skb->len += copy;
15121da177e4SLinus Torvalds 			skb->data_len += copy;
1513f945fa7aSHerbert Xu 			skb->truesize += copy;
151414afee4bSReshetova, Elena 			refcount_add(copy, &sk->sk_wmem_alloc);
15151da177e4SLinus Torvalds 		}
15161da177e4SLinus Torvalds 		offset += copy;
15171da177e4SLinus Torvalds 		length -= copy;
15181da177e4SLinus Torvalds 	}
15195640f768SEric Dumazet 
15201da177e4SLinus Torvalds 	return 0;
15215640f768SEric Dumazet 
15225640f768SEric Dumazet error_efault:
15235640f768SEric Dumazet 	err = -EFAULT;
15241da177e4SLinus Torvalds error:
1525bdc712b4SDavid S. Miller 	cork->length -= length;
15263bd653c8SDenis V. Lunev 	IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS);
15271da177e4SLinus Torvalds 	return err;
15281da177e4SLinus Torvalds }
15290bbe84a6SVlad Yasevich 
15300bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk,
15310bbe84a6SVlad Yasevich 		    int getfrag(void *from, char *to, int offset, int len,
15320bbe84a6SVlad Yasevich 				int odd, struct sk_buff *skb),
153326879da5SWei Wang 		    void *from, int length, int transhdrlen,
153426879da5SWei Wang 		    struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
153526879da5SWei Wang 		    struct rt6_info *rt, unsigned int flags,
1536c14ac945SSoheil Hassas Yeganeh 		    const struct sockcm_cookie *sockc)
15370bbe84a6SVlad Yasevich {
15380bbe84a6SVlad Yasevich 	struct inet_sock *inet = inet_sk(sk);
15390bbe84a6SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
15400bbe84a6SVlad Yasevich 	int exthdrlen;
15410bbe84a6SVlad Yasevich 	int err;
15420bbe84a6SVlad Yasevich 
15430bbe84a6SVlad Yasevich 	if (flags&MSG_PROBE)
15440bbe84a6SVlad Yasevich 		return 0;
15450bbe84a6SVlad Yasevich 	if (skb_queue_empty(&sk->sk_write_queue)) {
15460bbe84a6SVlad Yasevich 		/*
15470bbe84a6SVlad Yasevich 		 * setup for corking
15480bbe84a6SVlad Yasevich 		 */
154926879da5SWei Wang 		err = ip6_setup_cork(sk, &inet->cork, &np->cork,
155026879da5SWei Wang 				     ipc6, rt, fl6);
15510bbe84a6SVlad Yasevich 		if (err)
15520bbe84a6SVlad Yasevich 			return err;
15530bbe84a6SVlad Yasevich 
155426879da5SWei Wang 		exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
15550bbe84a6SVlad Yasevich 		length += exthdrlen;
15560bbe84a6SVlad Yasevich 		transhdrlen += exthdrlen;
15570bbe84a6SVlad Yasevich 	} else {
15580bbe84a6SVlad Yasevich 		fl6 = &inet->cork.fl.u.ip6;
15590bbe84a6SVlad Yasevich 		transhdrlen = 0;
15600bbe84a6SVlad Yasevich 	}
15610bbe84a6SVlad Yasevich 
15620bbe84a6SVlad Yasevich 	return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base,
15630bbe84a6SVlad Yasevich 				 &np->cork, sk_page_frag(sk), getfrag,
156426879da5SWei Wang 				 from, length, transhdrlen, flags, ipc6, sockc);
15650bbe84a6SVlad Yasevich }
1566a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data);
15671da177e4SLinus Torvalds 
1568366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork,
1569366e41d9SVlad Yasevich 			     struct inet6_cork *v6_cork)
1570bf138862SPavel Emelyanov {
1571366e41d9SVlad Yasevich 	if (v6_cork->opt) {
1572366e41d9SVlad Yasevich 		kfree(v6_cork->opt->dst0opt);
1573366e41d9SVlad Yasevich 		kfree(v6_cork->opt->dst1opt);
1574366e41d9SVlad Yasevich 		kfree(v6_cork->opt->hopopt);
1575366e41d9SVlad Yasevich 		kfree(v6_cork->opt->srcrt);
1576366e41d9SVlad Yasevich 		kfree(v6_cork->opt);
1577366e41d9SVlad Yasevich 		v6_cork->opt = NULL;
15780178b695SHerbert Xu 	}
15790178b695SHerbert Xu 
1580366e41d9SVlad Yasevich 	if (cork->base.dst) {
1581366e41d9SVlad Yasevich 		dst_release(cork->base.dst);
1582366e41d9SVlad Yasevich 		cork->base.dst = NULL;
1583366e41d9SVlad Yasevich 		cork->base.flags &= ~IPCORK_ALLFRAG;
1584bf138862SPavel Emelyanov 	}
1585366e41d9SVlad Yasevich 	memset(&cork->fl, 0, sizeof(cork->fl));
1586bf138862SPavel Emelyanov }
1587bf138862SPavel Emelyanov 
15886422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk,
15896422398cSVlad Yasevich 			       struct sk_buff_head *queue,
15906422398cSVlad Yasevich 			       struct inet_cork_full *cork,
15916422398cSVlad Yasevich 			       struct inet6_cork *v6_cork)
15921da177e4SLinus Torvalds {
15931da177e4SLinus Torvalds 	struct sk_buff *skb, *tmp_skb;
15941da177e4SLinus Torvalds 	struct sk_buff **tail_skb;
15951da177e4SLinus Torvalds 	struct in6_addr final_dst_buf, *final_dst = &final_dst_buf;
15961da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
15973bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
15981da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
15996422398cSVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
16006422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->base.dst;
16016422398cSVlad Yasevich 	struct flowi6 *fl6 = &cork->fl.u.ip6;
16024c9483b2SDavid S. Miller 	unsigned char proto = fl6->flowi6_proto;
16031da177e4SLinus Torvalds 
16046422398cSVlad Yasevich 	skb = __skb_dequeue(queue);
160563159f29SIan Morris 	if (!skb)
16061da177e4SLinus Torvalds 		goto out;
16071da177e4SLinus Torvalds 	tail_skb = &(skb_shinfo(skb)->frag_list);
16081da177e4SLinus Torvalds 
16091da177e4SLinus Torvalds 	/* move skb->data to ip header from ext header */
1610d56f90a7SArnaldo Carvalho de Melo 	if (skb->data < skb_network_header(skb))
1611bbe735e4SArnaldo Carvalho de Melo 		__skb_pull(skb, skb_network_offset(skb));
16126422398cSVlad Yasevich 	while ((tmp_skb = __skb_dequeue(queue)) != NULL) {
1613cfe1fc77SArnaldo Carvalho de Melo 		__skb_pull(tmp_skb, skb_network_header_len(skb));
16141da177e4SLinus Torvalds 		*tail_skb = tmp_skb;
16151da177e4SLinus Torvalds 		tail_skb = &(tmp_skb->next);
16161da177e4SLinus Torvalds 		skb->len += tmp_skb->len;
16171da177e4SLinus Torvalds 		skb->data_len += tmp_skb->len;
16181da177e4SLinus Torvalds 		skb->truesize += tmp_skb->truesize;
16191da177e4SLinus Torvalds 		tmp_skb->destructor = NULL;
16201da177e4SLinus Torvalds 		tmp_skb->sk = NULL;
16211da177e4SLinus Torvalds 	}
16221da177e4SLinus Torvalds 
162328a89453SHerbert Xu 	/* Allow local fragmentation. */
162460ff7467SWANG Cong 	skb->ignore_df = ip6_sk_ignore_df(sk);
162528a89453SHerbert Xu 
16264e3fd7a0SAlexey Dobriyan 	*final_dst = fl6->daddr;
1627cfe1fc77SArnaldo Carvalho de Melo 	__skb_pull(skb, skb_network_header_len(skb));
16281da177e4SLinus Torvalds 	if (opt && opt->opt_flen)
16291da177e4SLinus Torvalds 		ipv6_push_frag_opts(skb, opt, &proto);
16301da177e4SLinus Torvalds 	if (opt && opt->opt_nflen)
1631613fa3caSDavid Lebrun 		ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr);
16321da177e4SLinus Torvalds 
1633e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
1634e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
16350660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
16361da177e4SLinus Torvalds 
16376422398cSVlad Yasevich 	ip6_flow_hdr(hdr, v6_cork->tclass,
1638cb1ce2efSTom Herbert 		     ip6_make_flowlabel(net, skb, fl6->flowlabel,
1639513674b5SShaohua Li 					ip6_autoflowlabel(net, np), fl6));
16406422398cSVlad Yasevich 	hdr->hop_limit = v6_cork->hop_limit;
16411da177e4SLinus Torvalds 	hdr->nexthdr = proto;
16424e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
16434e3fd7a0SAlexey Dobriyan 	hdr->daddr = *final_dst;
16441da177e4SLinus Torvalds 
1645a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
16464a19ec58SLaszlo Attila Toth 	skb->mark = sk->sk_mark;
1647a2c2064fSPatrick McHardy 
1648d8d1f30bSChangli Gao 	skb_dst_set(skb, dst_clone(&rt->dst));
1649edf391ffSNeil Horman 	IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len);
165014878f75SDavid L Stevens 	if (proto == IPPROTO_ICMPV6) {
1651adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
165214878f75SDavid L Stevens 
165343a43b60SHannes Frederic Sowa 		ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type);
165443a43b60SHannes Frederic Sowa 		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
165514878f75SDavid L Stevens 	}
165614878f75SDavid L Stevens 
16576422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
16586422398cSVlad Yasevich out:
16596422398cSVlad Yasevich 	return skb;
16606422398cSVlad Yasevich }
16616422398cSVlad Yasevich 
16626422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb)
16636422398cSVlad Yasevich {
16646422398cSVlad Yasevich 	struct net *net = sock_net(skb->sk);
16656422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
16666422398cSVlad Yasevich 	int err;
16676422398cSVlad Yasevich 
166833224b16SEric W. Biederman 	err = ip6_local_out(net, skb->sk, skb);
16691da177e4SLinus Torvalds 	if (err) {
16701da177e4SLinus Torvalds 		if (err > 0)
16716ce9e7b5SEric Dumazet 			err = net_xmit_errno(err);
16721da177e4SLinus Torvalds 		if (err)
16736422398cSVlad Yasevich 			IP6_INC_STATS(net, rt->rt6i_idev,
16746422398cSVlad Yasevich 				      IPSTATS_MIB_OUTDISCARDS);
16751da177e4SLinus Torvalds 	}
16761da177e4SLinus Torvalds 
16771da177e4SLinus Torvalds 	return err;
16786422398cSVlad Yasevich }
16796422398cSVlad Yasevich 
16806422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk)
16816422398cSVlad Yasevich {
16826422398cSVlad Yasevich 	struct sk_buff *skb;
16836422398cSVlad Yasevich 
16846422398cSVlad Yasevich 	skb = ip6_finish_skb(sk);
16856422398cSVlad Yasevich 	if (!skb)
16866422398cSVlad Yasevich 		return 0;
16876422398cSVlad Yasevich 
16886422398cSVlad Yasevich 	return ip6_send_skb(skb);
16891da177e4SLinus Torvalds }
1690a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames);
16911da177e4SLinus Torvalds 
16920bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk,
16936422398cSVlad Yasevich 				       struct sk_buff_head *queue,
16946422398cSVlad Yasevich 				       struct inet_cork_full *cork,
16956422398cSVlad Yasevich 				       struct inet6_cork *v6_cork)
16961da177e4SLinus Torvalds {
16971da177e4SLinus Torvalds 	struct sk_buff *skb;
16981da177e4SLinus Torvalds 
16990bbe84a6SVlad Yasevich 	while ((skb = __skb_dequeue_tail(queue)) != NULL) {
1700adf30907SEric Dumazet 		if (skb_dst(skb))
1701adf30907SEric Dumazet 			IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)),
1702a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_OUTDISCARDS);
17031da177e4SLinus Torvalds 		kfree_skb(skb);
17041da177e4SLinus Torvalds 	}
17051da177e4SLinus Torvalds 
17066422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
17071da177e4SLinus Torvalds }
17080bbe84a6SVlad Yasevich 
17090bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk)
17100bbe84a6SVlad Yasevich {
17116422398cSVlad Yasevich 	__ip6_flush_pending_frames(sk, &sk->sk_write_queue,
17126422398cSVlad Yasevich 				   &inet_sk(sk)->cork, &inet6_sk(sk)->cork);
17130bbe84a6SVlad Yasevich }
1714a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames);
17156422398cSVlad Yasevich 
17166422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk,
17176422398cSVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
17186422398cSVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
17196422398cSVlad Yasevich 			     void *from, int length, int transhdrlen,
172026879da5SWei Wang 			     struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
17216422398cSVlad Yasevich 			     struct rt6_info *rt, unsigned int flags,
172226879da5SWei Wang 			     const struct sockcm_cookie *sockc)
17236422398cSVlad Yasevich {
17246422398cSVlad Yasevich 	struct inet_cork_full cork;
17256422398cSVlad Yasevich 	struct inet6_cork v6_cork;
17266422398cSVlad Yasevich 	struct sk_buff_head queue;
172726879da5SWei Wang 	int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
17286422398cSVlad Yasevich 	int err;
17296422398cSVlad Yasevich 
17306422398cSVlad Yasevich 	if (flags & MSG_PROBE)
17316422398cSVlad Yasevich 		return NULL;
17326422398cSVlad Yasevich 
17336422398cSVlad Yasevich 	__skb_queue_head_init(&queue);
17346422398cSVlad Yasevich 
17356422398cSVlad Yasevich 	cork.base.flags = 0;
17366422398cSVlad Yasevich 	cork.base.addr = 0;
17376422398cSVlad Yasevich 	cork.base.opt = NULL;
17386422398cSVlad Yasevich 	v6_cork.opt = NULL;
173926879da5SWei Wang 	err = ip6_setup_cork(sk, &cork, &v6_cork, ipc6, rt, fl6);
1740862c03eeSEric Dumazet 	if (err) {
1741862c03eeSEric Dumazet 		ip6_cork_release(&cork, &v6_cork);
17426422398cSVlad Yasevich 		return ERR_PTR(err);
1743862c03eeSEric Dumazet 	}
174426879da5SWei Wang 	if (ipc6->dontfrag < 0)
174526879da5SWei Wang 		ipc6->dontfrag = inet6_sk(sk)->dontfrag;
17466422398cSVlad Yasevich 
17476422398cSVlad Yasevich 	err = __ip6_append_data(sk, fl6, &queue, &cork.base, &v6_cork,
17486422398cSVlad Yasevich 				&current->task_frag, getfrag, from,
17496422398cSVlad Yasevich 				length + exthdrlen, transhdrlen + exthdrlen,
175026879da5SWei Wang 				flags, ipc6, sockc);
17516422398cSVlad Yasevich 	if (err) {
17526422398cSVlad Yasevich 		__ip6_flush_pending_frames(sk, &queue, &cork, &v6_cork);
17536422398cSVlad Yasevich 		return ERR_PTR(err);
17546422398cSVlad Yasevich 	}
17556422398cSVlad Yasevich 
17566422398cSVlad Yasevich 	return __ip6_make_skb(sk, &queue, &cork, &v6_cork);
17576422398cSVlad Yasevich }
1758