xref: /openbmc/linux/net/ipv6/ip6_output.c (revision 79e49503efe53a8c51d8b695bedc8a346c5e4a87)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds  *	IPv6 output functions
31da177e4SLinus Torvalds  *	Linux INET6 implementation
41da177e4SLinus Torvalds  *
51da177e4SLinus Torvalds  *	Authors:
61da177e4SLinus Torvalds  *	Pedro Roque		<roque@di.fc.ul.pt>
71da177e4SLinus Torvalds  *
81da177e4SLinus Torvalds  *	Based on linux/net/ipv4/ip_output.c
91da177e4SLinus Torvalds  *
101da177e4SLinus Torvalds  *	This program is free software; you can redistribute it and/or
111da177e4SLinus Torvalds  *      modify it under the terms of the GNU General Public License
121da177e4SLinus Torvalds  *      as published by the Free Software Foundation; either version
131da177e4SLinus Torvalds  *      2 of the License, or (at your option) any later version.
141da177e4SLinus Torvalds  *
151da177e4SLinus Torvalds  *	Changes:
161da177e4SLinus Torvalds  *	A.N.Kuznetsov	:	airthmetics in fragmentation.
171da177e4SLinus Torvalds  *				extension headers are implemented.
181da177e4SLinus Torvalds  *				route changes now work.
191da177e4SLinus Torvalds  *				ip6_forward does not confuse sniffers.
201da177e4SLinus Torvalds  *				etc.
211da177e4SLinus Torvalds  *
221da177e4SLinus Torvalds  *      H. von Brand    :       Added missing #include <linux/string.h>
231da177e4SLinus Torvalds  *	Imran Patel	:	frag id should be in NBO
241da177e4SLinus Torvalds  *      Kazunori MIYAZAWA @USAGI
251da177e4SLinus Torvalds  *			:       add ip6_append_data and related functions
261da177e4SLinus Torvalds  *				for datagram xmit
271da177e4SLinus Torvalds  */
281da177e4SLinus Torvalds 
291da177e4SLinus Torvalds #include <linux/errno.h>
30ef76bc23SHerbert Xu #include <linux/kernel.h>
311da177e4SLinus Torvalds #include <linux/string.h>
321da177e4SLinus Torvalds #include <linux/socket.h>
331da177e4SLinus Torvalds #include <linux/net.h>
341da177e4SLinus Torvalds #include <linux/netdevice.h>
351da177e4SLinus Torvalds #include <linux/if_arp.h>
361da177e4SLinus Torvalds #include <linux/in6.h>
371da177e4SLinus Torvalds #include <linux/tcp.h>
381da177e4SLinus Torvalds #include <linux/route.h>
39b59f45d0SHerbert Xu #include <linux/module.h>
405a0e3ad6STejun Heo #include <linux/slab.h>
411da177e4SLinus Torvalds 
4233b48679SDaniel Mack #include <linux/bpf-cgroup.h>
431da177e4SLinus Torvalds #include <linux/netfilter.h>
441da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h>
451da177e4SLinus Torvalds 
461da177e4SLinus Torvalds #include <net/sock.h>
471da177e4SLinus Torvalds #include <net/snmp.h>
481da177e4SLinus Torvalds 
491da177e4SLinus Torvalds #include <net/ipv6.h>
501da177e4SLinus Torvalds #include <net/ndisc.h>
511da177e4SLinus Torvalds #include <net/protocol.h>
521da177e4SLinus Torvalds #include <net/ip6_route.h>
531da177e4SLinus Torvalds #include <net/addrconf.h>
541da177e4SLinus Torvalds #include <net/rawv6.h>
551da177e4SLinus Torvalds #include <net/icmp.h>
561da177e4SLinus Torvalds #include <net/xfrm.h>
571da177e4SLinus Torvalds #include <net/checksum.h>
587bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h>
59ca254490SDavid Ahern #include <net/l3mdev.h>
6014972cbdSRoopa Prabhu #include <net/lwtunnel.h>
611da177e4SLinus Torvalds 
627d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb)
631da177e4SLinus Torvalds {
64adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
651da177e4SLinus Torvalds 	struct net_device *dev = dst->dev;
66f6b72b62SDavid S. Miller 	struct neighbour *neigh;
676fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	struct in6_addr *nexthop;
686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	int ret;
691da177e4SLinus Torvalds 
701da177e4SLinus Torvalds 	skb->protocol = htons(ETH_P_IPV6);
711da177e4SLinus Torvalds 	skb->dev = dev;
721da177e4SLinus Torvalds 
730660e03fSArnaldo Carvalho de Melo 	if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) {
74adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
751da177e4SLinus Torvalds 
767026b1ddSDavid Miller 		if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) &&
7778126c41SEric W. Biederman 		    ((mroute6_socket(net, skb) &&
78bd91b8bfSBenjamin Thery 		     !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) ||
790660e03fSArnaldo Carvalho de Melo 		     ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr,
807bc570c8SYOSHIFUJI Hideaki 					 &ipv6_hdr(skb)->saddr))) {
811da177e4SLinus Torvalds 			struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC);
821da177e4SLinus Torvalds 
831da177e4SLinus Torvalds 			/* Do not check for IFF_ALLMULTI; multicast routing
841da177e4SLinus Torvalds 			   is not supported in any case.
851da177e4SLinus Torvalds 			 */
861da177e4SLinus Torvalds 			if (newskb)
87b2e0b385SJan Engelhardt 				NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING,
8829a26a56SEric W. Biederman 					net, sk, newskb, NULL, newskb->dev,
8995603e22SMichel Machado 					dev_loopback_xmit);
901da177e4SLinus Torvalds 
910660e03fSArnaldo Carvalho de Melo 			if (ipv6_hdr(skb)->hop_limit == 0) {
9278126c41SEric W. Biederman 				IP6_INC_STATS(net, idev,
933bd653c8SDenis V. Lunev 					      IPSTATS_MIB_OUTDISCARDS);
941da177e4SLinus Torvalds 				kfree_skb(skb);
951da177e4SLinus Torvalds 				return 0;
961da177e4SLinus Torvalds 			}
971da177e4SLinus Torvalds 		}
981da177e4SLinus Torvalds 
9978126c41SEric W. Biederman 		IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len);
100dd408515SHannes Frederic Sowa 
101dd408515SHannes Frederic Sowa 		if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <=
102dd408515SHannes Frederic Sowa 		    IPV6_ADDR_SCOPE_NODELOCAL &&
103dd408515SHannes Frederic Sowa 		    !(dev->flags & IFF_LOOPBACK)) {
104dd408515SHannes Frederic Sowa 			kfree_skb(skb);
105dd408515SHannes Frederic Sowa 			return 0;
106dd408515SHannes Frederic Sowa 		}
1071da177e4SLinus Torvalds 	}
1081da177e4SLinus Torvalds 
10914972cbdSRoopa Prabhu 	if (lwtunnel_xmit_redirect(dst->lwtstate)) {
11014972cbdSRoopa Prabhu 		int res = lwtunnel_xmit(skb);
11114972cbdSRoopa Prabhu 
11214972cbdSRoopa Prabhu 		if (res < 0 || res == LWTUNNEL_XMIT_DONE)
11314972cbdSRoopa Prabhu 			return res;
11414972cbdSRoopa Prabhu 	}
11514972cbdSRoopa Prabhu 
1166fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
1172647a9b0SMartin KaFai Lau 	nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr);
1186fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop);
1196fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(!neigh))
1206fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false);
1216fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	if (!IS_ERR(neigh)) {
1224ff06203SJulian Anastasov 		sock_confirm_neigh(skb, neigh);
123c16ec185SJulian Anastasov 		ret = neigh_output(neigh, skb);
1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		rcu_read_unlock_bh();
1256fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		return ret;
1266fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	}
1276fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
12805e3aa09SDavid S. Miller 
12978126c41SEric W. Biederman 	IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES);
1309e508490SJan Engelhardt 	kfree_skb(skb);
1319e508490SJan Engelhardt 	return -EINVAL;
1321da177e4SLinus Torvalds }
1331da177e4SLinus Torvalds 
1340c4b51f0SEric W. Biederman static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1359e508490SJan Engelhardt {
13633b48679SDaniel Mack 	int ret;
13733b48679SDaniel Mack 
13833b48679SDaniel Mack 	ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb);
13933b48679SDaniel Mack 	if (ret) {
14033b48679SDaniel Mack 		kfree_skb(skb);
14133b48679SDaniel Mack 		return ret;
14233b48679SDaniel Mack 	}
14333b48679SDaniel Mack 
1449e508490SJan Engelhardt 	if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) ||
1459037c357SJiri Pirko 	    dst_allfrag(skb_dst(skb)) ||
1469037c357SJiri Pirko 	    (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size))
1477d8c6e39SEric W. Biederman 		return ip6_fragment(net, sk, skb, ip6_finish_output2);
1489e508490SJan Engelhardt 	else
1497d8c6e39SEric W. Biederman 		return ip6_finish_output2(net, sk, skb);
1509e508490SJan Engelhardt }
1519e508490SJan Engelhardt 
152ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1531da177e4SLinus Torvalds {
1549e508490SJan Engelhardt 	struct net_device *dev = skb_dst(skb)->dev;
155adf30907SEric Dumazet 	struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
156be10de0aSEric W. Biederman 
157778d80beSYOSHIFUJI Hideaki 	if (unlikely(idev->cnf.disable_ipv6)) {
15819a0644cSEric W. Biederman 		IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
159778d80beSYOSHIFUJI Hideaki 		kfree_skb(skb);
160778d80beSYOSHIFUJI Hideaki 		return 0;
161778d80beSYOSHIFUJI Hideaki 	}
162778d80beSYOSHIFUJI Hideaki 
16329a26a56SEric W. Biederman 	return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
16429a26a56SEric W. Biederman 			    net, sk, skb, NULL, dev,
1659c6eb28aSJan Engelhardt 			    ip6_finish_output,
1669c6eb28aSJan Engelhardt 			    !(IP6CB(skb)->flags & IP6SKB_REROUTED));
1671da177e4SLinus Torvalds }
1681da177e4SLinus Torvalds 
1691da177e4SLinus Torvalds /*
170b5d43998SShan Wei  * xmit an sk_buff (used by TCP, SCTP and DCCP)
1711c1e9d2bSEric Dumazet  * Note : socket lock is not held for SYNACK packets, but might be modified
1721c1e9d2bSEric Dumazet  * by calls to skb_set_owner_w() and ipv6_local_error(),
1731c1e9d2bSEric Dumazet  * which are using proper atomic operations or spinlocks.
1741da177e4SLinus Torvalds  */
1751c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6,
17692e55f41SPablo Neira 	     __u32 mark, struct ipv6_txoptions *opt, int tclass)
1771da177e4SLinus Torvalds {
1783bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
1791c1e9d2bSEric Dumazet 	const struct ipv6_pinfo *np = inet6_sk(sk);
1804c9483b2SDavid S. Miller 	struct in6_addr *first_hop = &fl6->daddr;
181adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
1821da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
1834c9483b2SDavid S. Miller 	u8  proto = fl6->flowi6_proto;
1841da177e4SLinus Torvalds 	int seg_len = skb->len;
185e651f03aSGerrit Renker 	int hlimit = -1;
1861da177e4SLinus Torvalds 	u32 mtu;
1871da177e4SLinus Torvalds 
1881da177e4SLinus Torvalds 	if (opt) {
189c2636b4dSChuck Lever 		unsigned int head_room;
1901da177e4SLinus Torvalds 
1911da177e4SLinus Torvalds 		/* First: exthdrs may take lots of space (~8K for now)
1921da177e4SLinus Torvalds 		   MAX_HEADER is not enough.
1931da177e4SLinus Torvalds 		 */
1941da177e4SLinus Torvalds 		head_room = opt->opt_nflen + opt->opt_flen;
1951da177e4SLinus Torvalds 		seg_len += head_room;
1961da177e4SLinus Torvalds 		head_room += sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev);
1971da177e4SLinus Torvalds 
1981da177e4SLinus Torvalds 		if (skb_headroom(skb) < head_room) {
1991da177e4SLinus Torvalds 			struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room);
20063159f29SIan Morris 			if (!skb2) {
201adf30907SEric Dumazet 				IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
202a11d206dSYOSHIFUJI Hideaki 					      IPSTATS_MIB_OUTDISCARDS);
2031da177e4SLinus Torvalds 				kfree_skb(skb);
2041da177e4SLinus Torvalds 				return -ENOBUFS;
2051da177e4SLinus Torvalds 			}
206808db80aSEric Dumazet 			consume_skb(skb);
207a11d206dSYOSHIFUJI Hideaki 			skb = skb2;
2081c1e9d2bSEric Dumazet 			/* skb_set_owner_w() changes sk->sk_wmem_alloc atomically,
2091c1e9d2bSEric Dumazet 			 * it is safe to call in our context (socket lock not held)
2101c1e9d2bSEric Dumazet 			 */
2111c1e9d2bSEric Dumazet 			skb_set_owner_w(skb, (struct sock *)sk);
2121da177e4SLinus Torvalds 		}
2131da177e4SLinus Torvalds 		if (opt->opt_flen)
2141da177e4SLinus Torvalds 			ipv6_push_frag_opts(skb, opt, &proto);
2151da177e4SLinus Torvalds 		if (opt->opt_nflen)
216613fa3caSDavid Lebrun 			ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop,
217613fa3caSDavid Lebrun 					     &fl6->saddr);
2181da177e4SLinus Torvalds 	}
2191da177e4SLinus Torvalds 
220e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
221e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
2220660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
2231da177e4SLinus Torvalds 
2241da177e4SLinus Torvalds 	/*
2251da177e4SLinus Torvalds 	 *	Fill in the IPv6 header
2261da177e4SLinus Torvalds 	 */
227b903d324SEric Dumazet 	if (np)
2281da177e4SLinus Torvalds 		hlimit = np->hop_limit;
2291da177e4SLinus Torvalds 	if (hlimit < 0)
2306b75d090SYOSHIFUJI Hideaki 		hlimit = ip6_dst_hoplimit(dst);
2311da177e4SLinus Torvalds 
232cb1ce2efSTom Herbert 	ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel,
23367800f9bSTom Herbert 						     np->autoflowlabel, fl6));
23441a1f8eaSYOSHIFUJI Hideaki 
2351da177e4SLinus Torvalds 	hdr->payload_len = htons(seg_len);
2361da177e4SLinus Torvalds 	hdr->nexthdr = proto;
2371da177e4SLinus Torvalds 	hdr->hop_limit = hlimit;
2381da177e4SLinus Torvalds 
2394e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
2404e3fd7a0SAlexey Dobriyan 	hdr->daddr = *first_hop;
2411da177e4SLinus Torvalds 
2429c9c9ad5SHannes Frederic Sowa 	skb->protocol = htons(ETH_P_IPV6);
243a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
24492e55f41SPablo Neira 	skb->mark = mark;
245a2c2064fSPatrick McHardy 
2461da177e4SLinus Torvalds 	mtu = dst_mtu(dst);
24760ff7467SWANG Cong 	if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) {
248adf30907SEric Dumazet 		IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)),
249edf391ffSNeil Horman 			      IPSTATS_MIB_OUT, skb->len);
250a8e3e1a9SDavid Ahern 
251a8e3e1a9SDavid Ahern 		/* if egress device is enslaved to an L3 master device pass the
252a8e3e1a9SDavid Ahern 		 * skb to its handler for processing
253a8e3e1a9SDavid Ahern 		 */
254a8e3e1a9SDavid Ahern 		skb = l3mdev_ip6_out((struct sock *)sk, skb);
255a8e3e1a9SDavid Ahern 		if (unlikely(!skb))
256a8e3e1a9SDavid Ahern 			return 0;
257a8e3e1a9SDavid Ahern 
2581c1e9d2bSEric Dumazet 		/* hooks should never assume socket lock is held.
2591c1e9d2bSEric Dumazet 		 * we promote our socket to non const
2601c1e9d2bSEric Dumazet 		 */
26129a26a56SEric W. Biederman 		return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
2621c1e9d2bSEric Dumazet 			       net, (struct sock *)sk, skb, NULL, dst->dev,
26313206b6bSEric W. Biederman 			       dst_output);
2641da177e4SLinus Torvalds 	}
2651da177e4SLinus Torvalds 
2661da177e4SLinus Torvalds 	skb->dev = dst->dev;
2671c1e9d2bSEric Dumazet 	/* ipv6_local_error() does not require socket lock,
2681c1e9d2bSEric Dumazet 	 * we promote our socket to non const
2691c1e9d2bSEric Dumazet 	 */
2701c1e9d2bSEric Dumazet 	ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu);
2711c1e9d2bSEric Dumazet 
272adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS);
2731da177e4SLinus Torvalds 	kfree_skb(skb);
2741da177e4SLinus Torvalds 	return -EMSGSIZE;
2751da177e4SLinus Torvalds }
2767159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit);
2777159039aSYOSHIFUJI Hideaki 
2781da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel)
2791da177e4SLinus Torvalds {
2801da177e4SLinus Torvalds 	struct ip6_ra_chain *ra;
2811da177e4SLinus Torvalds 	struct sock *last = NULL;
2821da177e4SLinus Torvalds 
2831da177e4SLinus Torvalds 	read_lock(&ip6_ra_lock);
2841da177e4SLinus Torvalds 	for (ra = ip6_ra_chain; ra; ra = ra->next) {
2851da177e4SLinus Torvalds 		struct sock *sk = ra->sk;
2860bd1b59bSAndrew McDonald 		if (sk && ra->sel == sel &&
2870bd1b59bSAndrew McDonald 		    (!sk->sk_bound_dev_if ||
2880bd1b59bSAndrew McDonald 		     sk->sk_bound_dev_if == skb->dev->ifindex)) {
2891da177e4SLinus Torvalds 			if (last) {
2901da177e4SLinus Torvalds 				struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
2911da177e4SLinus Torvalds 				if (skb2)
2921da177e4SLinus Torvalds 					rawv6_rcv(last, skb2);
2931da177e4SLinus Torvalds 			}
2941da177e4SLinus Torvalds 			last = sk;
2951da177e4SLinus Torvalds 		}
2961da177e4SLinus Torvalds 	}
2971da177e4SLinus Torvalds 
2981da177e4SLinus Torvalds 	if (last) {
2991da177e4SLinus Torvalds 		rawv6_rcv(last, skb);
3001da177e4SLinus Torvalds 		read_unlock(&ip6_ra_lock);
3011da177e4SLinus Torvalds 		return 1;
3021da177e4SLinus Torvalds 	}
3031da177e4SLinus Torvalds 	read_unlock(&ip6_ra_lock);
3041da177e4SLinus Torvalds 	return 0;
3051da177e4SLinus Torvalds }
3061da177e4SLinus Torvalds 
307e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb)
308e21e0b5fSVille Nuorvala {
3090660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
310e21e0b5fSVille Nuorvala 	u8 nexthdr = hdr->nexthdr;
31175f2811cSJesse Gross 	__be16 frag_off;
312e21e0b5fSVille Nuorvala 	int offset;
313e21e0b5fSVille Nuorvala 
314e21e0b5fSVille Nuorvala 	if (ipv6_ext_hdr(nexthdr)) {
31575f2811cSJesse Gross 		offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off);
316e21e0b5fSVille Nuorvala 		if (offset < 0)
317e21e0b5fSVille Nuorvala 			return 0;
318e21e0b5fSVille Nuorvala 	} else
319e21e0b5fSVille Nuorvala 		offset = sizeof(struct ipv6hdr);
320e21e0b5fSVille Nuorvala 
321e21e0b5fSVille Nuorvala 	if (nexthdr == IPPROTO_ICMPV6) {
322e21e0b5fSVille Nuorvala 		struct icmp6hdr *icmp6;
323e21e0b5fSVille Nuorvala 
324d56f90a7SArnaldo Carvalho de Melo 		if (!pskb_may_pull(skb, (skb_network_header(skb) +
325d56f90a7SArnaldo Carvalho de Melo 					 offset + 1 - skb->data)))
326e21e0b5fSVille Nuorvala 			return 0;
327e21e0b5fSVille Nuorvala 
328d56f90a7SArnaldo Carvalho de Melo 		icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset);
329e21e0b5fSVille Nuorvala 
330e21e0b5fSVille Nuorvala 		switch (icmp6->icmp6_type) {
331e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_SOLICITATION:
332e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_ADVERTISEMENT:
333e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_SOLICITATION:
334e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_ADVERTISEMENT:
335e21e0b5fSVille Nuorvala 		case NDISC_REDIRECT:
336e21e0b5fSVille Nuorvala 			/* For reaction involving unicast neighbor discovery
337e21e0b5fSVille Nuorvala 			 * message destined to the proxied address, pass it to
338e21e0b5fSVille Nuorvala 			 * input function.
339e21e0b5fSVille Nuorvala 			 */
340e21e0b5fSVille Nuorvala 			return 1;
341e21e0b5fSVille Nuorvala 		default:
342e21e0b5fSVille Nuorvala 			break;
343e21e0b5fSVille Nuorvala 		}
344e21e0b5fSVille Nuorvala 	}
345e21e0b5fSVille Nuorvala 
34674553b09SVille Nuorvala 	/*
34774553b09SVille Nuorvala 	 * The proxying router can't forward traffic sent to a link-local
34874553b09SVille Nuorvala 	 * address, so signal the sender and discard the packet. This
34974553b09SVille Nuorvala 	 * behavior is clarified by the MIPv6 specification.
35074553b09SVille Nuorvala 	 */
35174553b09SVille Nuorvala 	if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) {
35274553b09SVille Nuorvala 		dst_link_failure(skb);
35374553b09SVille Nuorvala 		return -1;
35474553b09SVille Nuorvala 	}
35574553b09SVille Nuorvala 
356e21e0b5fSVille Nuorvala 	return 0;
357e21e0b5fSVille Nuorvala }
358e21e0b5fSVille Nuorvala 
3590c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk,
3600c4b51f0SEric W. Biederman 				     struct sk_buff *skb)
3611da177e4SLinus Torvalds {
36213206b6bSEric W. Biederman 	return dst_output(net, sk, skb);
3631da177e4SLinus Torvalds }
3641da177e4SLinus Torvalds 
3650954cf9cSHannes Frederic Sowa static unsigned int ip6_dst_mtu_forward(const struct dst_entry *dst)
3660954cf9cSHannes Frederic Sowa {
3670954cf9cSHannes Frederic Sowa 	unsigned int mtu;
3680954cf9cSHannes Frederic Sowa 	struct inet6_dev *idev;
3690954cf9cSHannes Frederic Sowa 
3700954cf9cSHannes Frederic Sowa 	if (dst_metric_locked(dst, RTAX_MTU)) {
3710954cf9cSHannes Frederic Sowa 		mtu = dst_metric_raw(dst, RTAX_MTU);
3720954cf9cSHannes Frederic Sowa 		if (mtu)
3730954cf9cSHannes Frederic Sowa 			return mtu;
3740954cf9cSHannes Frederic Sowa 	}
3750954cf9cSHannes Frederic Sowa 
3760954cf9cSHannes Frederic Sowa 	mtu = IPV6_MIN_MTU;
3770954cf9cSHannes Frederic Sowa 	rcu_read_lock();
3780954cf9cSHannes Frederic Sowa 	idev = __in6_dev_get(dst->dev);
3790954cf9cSHannes Frederic Sowa 	if (idev)
3800954cf9cSHannes Frederic Sowa 		mtu = idev->cnf.mtu6;
3810954cf9cSHannes Frederic Sowa 	rcu_read_unlock();
3820954cf9cSHannes Frederic Sowa 
3830954cf9cSHannes Frederic Sowa 	return mtu;
3840954cf9cSHannes Frederic Sowa }
3850954cf9cSHannes Frederic Sowa 
386fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu)
387fe6cc55fSFlorian Westphal {
388418a3156SFlorian Westphal 	if (skb->len <= mtu)
389fe6cc55fSFlorian Westphal 		return false;
390fe6cc55fSFlorian Westphal 
39160ff7467SWANG Cong 	/* ipv6 conntrack defrag sets max_frag_size + ignore_df */
392fe6cc55fSFlorian Westphal 	if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu)
393fe6cc55fSFlorian Westphal 		return true;
394fe6cc55fSFlorian Westphal 
39560ff7467SWANG Cong 	if (skb->ignore_df)
396418a3156SFlorian Westphal 		return false;
397418a3156SFlorian Westphal 
398ae7ef81eSMarcelo Ricardo Leitner 	if (skb_is_gso(skb) && skb_gso_validate_mtu(skb, mtu))
399fe6cc55fSFlorian Westphal 		return false;
400fe6cc55fSFlorian Westphal 
401fe6cc55fSFlorian Westphal 	return true;
402fe6cc55fSFlorian Westphal }
403fe6cc55fSFlorian Westphal 
4041da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb)
4051da177e4SLinus Torvalds {
406adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
4070660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
4081da177e4SLinus Torvalds 	struct inet6_skb_parm *opt = IP6CB(skb);
409c346dca1SYOSHIFUJI Hideaki 	struct net *net = dev_net(dst->dev);
41014f3ad6fSUlrich Weber 	u32 mtu;
4111da177e4SLinus Torvalds 
41253b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->forwarding == 0)
4131da177e4SLinus Torvalds 		goto error;
4141da177e4SLinus Torvalds 
415090f1166SLi RongQing 	if (skb->pkt_type != PACKET_HOST)
416090f1166SLi RongQing 		goto drop;
417090f1166SLi RongQing 
4189ef2e965SHannes Frederic Sowa 	if (unlikely(skb->sk))
4199ef2e965SHannes Frederic Sowa 		goto drop;
4209ef2e965SHannes Frederic Sowa 
4214497b076SBen Hutchings 	if (skb_warn_if_lro(skb))
4224497b076SBen Hutchings 		goto drop;
4234497b076SBen Hutchings 
4241da177e4SLinus Torvalds 	if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) {
4251d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
42615c77d8bSEric Dumazet 				IPSTATS_MIB_INDISCARDS);
4271da177e4SLinus Torvalds 		goto drop;
4281da177e4SLinus Torvalds 	}
4291da177e4SLinus Torvalds 
43035fc92a9SHerbert Xu 	skb_forward_csum(skb);
4311da177e4SLinus Torvalds 
4321da177e4SLinus Torvalds 	/*
4331da177e4SLinus Torvalds 	 *	We DO NOT make any processing on
4341da177e4SLinus Torvalds 	 *	RA packets, pushing them to user level AS IS
4351da177e4SLinus Torvalds 	 *	without ane WARRANTY that application will be able
4361da177e4SLinus Torvalds 	 *	to interpret them. The reason is that we
4371da177e4SLinus Torvalds 	 *	cannot make anything clever here.
4381da177e4SLinus Torvalds 	 *
4391da177e4SLinus Torvalds 	 *	We are not end-node, so that if packet contains
4401da177e4SLinus Torvalds 	 *	AH/ESP, we cannot make anything.
4411da177e4SLinus Torvalds 	 *	Defragmentation also would be mistake, RA packets
4421da177e4SLinus Torvalds 	 *	cannot be fragmented, because there is no warranty
4431da177e4SLinus Torvalds 	 *	that different fragments will go along one path. --ANK
4441da177e4SLinus Torvalds 	 */
445ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) {
446ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 		if (ip6_call_ra_chain(skb, ntohs(opt->ra)))
4471da177e4SLinus Torvalds 			return 0;
4481da177e4SLinus Torvalds 	}
4491da177e4SLinus Torvalds 
4501da177e4SLinus Torvalds 	/*
4511da177e4SLinus Torvalds 	 *	check and decrement ttl
4521da177e4SLinus Torvalds 	 */
4531da177e4SLinus Torvalds 	if (hdr->hop_limit <= 1) {
4541da177e4SLinus Torvalds 		/* Force OUTPUT device used as source address */
4551da177e4SLinus Torvalds 		skb->dev = dst->dev;
4563ffe533cSAlexey Dobriyan 		icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0);
4571d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
45815c77d8bSEric Dumazet 				IPSTATS_MIB_INHDRERRORS);
4591da177e4SLinus Torvalds 
4601da177e4SLinus Torvalds 		kfree_skb(skb);
4611da177e4SLinus Torvalds 		return -ETIMEDOUT;
4621da177e4SLinus Torvalds 	}
4631da177e4SLinus Torvalds 
464fbea49e1SYOSHIFUJI Hideaki 	/* XXX: idev->cnf.proxy_ndp? */
46553b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->proxy_ndp &&
4668a3edd80SDaniel Lezcano 	    pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) {
46774553b09SVille Nuorvala 		int proxied = ip6_forward_proxy_check(skb);
46874553b09SVille Nuorvala 		if (proxied > 0)
469e21e0b5fSVille Nuorvala 			return ip6_input(skb);
47074553b09SVille Nuorvala 		else if (proxied < 0) {
4711d015503SEric Dumazet 			__IP6_INC_STATS(net, ip6_dst_idev(dst),
4723bd653c8SDenis V. Lunev 					IPSTATS_MIB_INDISCARDS);
47374553b09SVille Nuorvala 			goto drop;
47474553b09SVille Nuorvala 		}
475e21e0b5fSVille Nuorvala 	}
476e21e0b5fSVille Nuorvala 
4771da177e4SLinus Torvalds 	if (!xfrm6_route_forward(skb)) {
4781d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
47915c77d8bSEric Dumazet 				IPSTATS_MIB_INDISCARDS);
4801da177e4SLinus Torvalds 		goto drop;
4811da177e4SLinus Torvalds 	}
482adf30907SEric Dumazet 	dst = skb_dst(skb);
4831da177e4SLinus Torvalds 
4841da177e4SLinus Torvalds 	/* IPv6 specs say nothing about it, but it is clear that we cannot
4851da177e4SLinus Torvalds 	   send redirects to source routed frames.
4861e5dc146SMasahide NAKAMURA 	   We don't send redirects to frames decapsulated from IPsec.
4871da177e4SLinus Torvalds 	 */
488c45a3dfbSDavid S. Miller 	if (skb->dev == dst->dev && opt->srcrt == 0 && !skb_sec_path(skb)) {
4891da177e4SLinus Torvalds 		struct in6_addr *target = NULL;
490fbfe95a4SDavid S. Miller 		struct inet_peer *peer;
4911da177e4SLinus Torvalds 		struct rt6_info *rt;
4921da177e4SLinus Torvalds 
4931da177e4SLinus Torvalds 		/*
4941da177e4SLinus Torvalds 		 *	incoming and outgoing devices are the same
4951da177e4SLinus Torvalds 		 *	send a redirect.
4961da177e4SLinus Torvalds 		 */
4971da177e4SLinus Torvalds 
4981da177e4SLinus Torvalds 		rt = (struct rt6_info *) dst;
499c45a3dfbSDavid S. Miller 		if (rt->rt6i_flags & RTF_GATEWAY)
500c45a3dfbSDavid S. Miller 			target = &rt->rt6i_gateway;
5011da177e4SLinus Torvalds 		else
5021da177e4SLinus Torvalds 			target = &hdr->daddr;
5031da177e4SLinus Torvalds 
504fd0273d7SMartin KaFai Lau 		peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1);
50592d86829SDavid S. Miller 
5061da177e4SLinus Torvalds 		/* Limit redirects both by destination (here)
5071da177e4SLinus Torvalds 		   and by source (inside ndisc_send_redirect)
5081da177e4SLinus Torvalds 		 */
509fbfe95a4SDavid S. Miller 		if (inet_peer_xrlim_allow(peer, 1*HZ))
5104991969aSDavid S. Miller 			ndisc_send_redirect(skb, target);
5111d861aa4SDavid S. Miller 		if (peer)
5121d861aa4SDavid S. Miller 			inet_putpeer(peer);
5135bb1ab09SDavid L Stevens 	} else {
5145bb1ab09SDavid L Stevens 		int addrtype = ipv6_addr_type(&hdr->saddr);
5155bb1ab09SDavid L Stevens 
5161da177e4SLinus Torvalds 		/* This check is security critical. */
517f81b2e7dSYOSHIFUJI Hideaki 		if (addrtype == IPV6_ADDR_ANY ||
518f81b2e7dSYOSHIFUJI Hideaki 		    addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK))
5191da177e4SLinus Torvalds 			goto error;
5205bb1ab09SDavid L Stevens 		if (addrtype & IPV6_ADDR_LINKLOCAL) {
5215bb1ab09SDavid L Stevens 			icmpv6_send(skb, ICMPV6_DEST_UNREACH,
5223ffe533cSAlexey Dobriyan 				    ICMPV6_NOT_NEIGHBOUR, 0);
5235bb1ab09SDavid L Stevens 			goto error;
5245bb1ab09SDavid L Stevens 		}
5251da177e4SLinus Torvalds 	}
5261da177e4SLinus Torvalds 
5270954cf9cSHannes Frederic Sowa 	mtu = ip6_dst_mtu_forward(dst);
52814f3ad6fSUlrich Weber 	if (mtu < IPV6_MIN_MTU)
52914f3ad6fSUlrich Weber 		mtu = IPV6_MIN_MTU;
53014f3ad6fSUlrich Weber 
531fe6cc55fSFlorian Westphal 	if (ip6_pkt_too_big(skb, mtu)) {
5321da177e4SLinus Torvalds 		/* Again, force OUTPUT device used as source address */
5331da177e4SLinus Torvalds 		skb->dev = dst->dev;
53414f3ad6fSUlrich Weber 		icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
5351d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
53615c77d8bSEric Dumazet 				IPSTATS_MIB_INTOOBIGERRORS);
5371d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
53815c77d8bSEric Dumazet 				IPSTATS_MIB_FRAGFAILS);
5391da177e4SLinus Torvalds 		kfree_skb(skb);
5401da177e4SLinus Torvalds 		return -EMSGSIZE;
5411da177e4SLinus Torvalds 	}
5421da177e4SLinus Torvalds 
5431da177e4SLinus Torvalds 	if (skb_cow(skb, dst->dev->hard_header_len)) {
5441d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
54515c77d8bSEric Dumazet 				IPSTATS_MIB_OUTDISCARDS);
5461da177e4SLinus Torvalds 		goto drop;
5471da177e4SLinus Torvalds 	}
5481da177e4SLinus Torvalds 
5490660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
5501da177e4SLinus Torvalds 
5511da177e4SLinus Torvalds 	/* Mangling hops number delayed to point after skb COW */
5521da177e4SLinus Torvalds 
5531da177e4SLinus Torvalds 	hdr->hop_limit--;
5541da177e4SLinus Torvalds 
5551d015503SEric Dumazet 	__IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS);
5561d015503SEric Dumazet 	__IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len);
55729a26a56SEric W. Biederman 	return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD,
55829a26a56SEric W. Biederman 		       net, NULL, skb, skb->dev, dst->dev,
5596e23ae2aSPatrick McHardy 		       ip6_forward_finish);
5601da177e4SLinus Torvalds 
5611da177e4SLinus Torvalds error:
5621d015503SEric Dumazet 	__IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_INADDRERRORS);
5631da177e4SLinus Torvalds drop:
5641da177e4SLinus Torvalds 	kfree_skb(skb);
5651da177e4SLinus Torvalds 	return -EINVAL;
5661da177e4SLinus Torvalds }
5671da177e4SLinus Torvalds 
5681da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from)
5691da177e4SLinus Torvalds {
5701da177e4SLinus Torvalds 	to->pkt_type = from->pkt_type;
5711da177e4SLinus Torvalds 	to->priority = from->priority;
5721da177e4SLinus Torvalds 	to->protocol = from->protocol;
573adf30907SEric Dumazet 	skb_dst_drop(to);
574adf30907SEric Dumazet 	skb_dst_set(to, dst_clone(skb_dst(from)));
5751da177e4SLinus Torvalds 	to->dev = from->dev;
57682e91ffeSThomas Graf 	to->mark = from->mark;
5771da177e4SLinus Torvalds 
5781da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED
5791da177e4SLinus Torvalds 	to->tc_index = from->tc_index;
5801da177e4SLinus Torvalds #endif
581e7ac05f3SYasuyuki Kozakai 	nf_copy(to, from);
582984bc16cSJames Morris 	skb_copy_secmark(to, from);
5831da177e4SLinus Torvalds }
5841da177e4SLinus Torvalds 
5857d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb,
5867d8c6e39SEric W. Biederman 		 int (*output)(struct net *, struct sock *, struct sk_buff *))
5871da177e4SLinus Torvalds {
5881da177e4SLinus Torvalds 	struct sk_buff *frag;
589adf30907SEric Dumazet 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
590f60e5990Shannes@stressinduktion.org 	struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ?
591f60e5990Shannes@stressinduktion.org 				inet6_sk(skb->sk) : NULL;
5921da177e4SLinus Torvalds 	struct ipv6hdr *tmp_hdr;
5931da177e4SLinus Torvalds 	struct frag_hdr *fh;
5941da177e4SLinus Torvalds 	unsigned int mtu, hlen, left, len;
595a7ae1992SHerbert Xu 	int hroom, troom;
596286c2349SMartin KaFai Lau 	__be32 frag_id;
5971da177e4SLinus Torvalds 	int ptr, offset = 0, err = 0;
5981da177e4SLinus Torvalds 	u8 *prevhdr, nexthdr = 0;
5991da177e4SLinus Torvalds 
6001da177e4SLinus Torvalds 	hlen = ip6_find_1stfragopt(skb, &prevhdr);
6011da177e4SLinus Torvalds 	nexthdr = *prevhdr;
6021da177e4SLinus Torvalds 
603628a5c56SJohn Heffner 	mtu = ip6_skb_dst_mtu(skb);
604b881ef76SJohn Heffner 
605b881ef76SJohn Heffner 	/* We must not fragment if the socket is set to force MTU discovery
60614f3ad6fSUlrich Weber 	 * or if the skb it not generated by a local socket.
607b881ef76SJohn Heffner 	 */
608485fca66SFlorian Westphal 	if (unlikely(!skb->ignore_df && skb->len > mtu))
609485fca66SFlorian Westphal 		goto fail_toobig;
610a34a101eSEric Dumazet 
611485fca66SFlorian Westphal 	if (IP6CB(skb)->frag_max_size) {
612485fca66SFlorian Westphal 		if (IP6CB(skb)->frag_max_size > mtu)
613485fca66SFlorian Westphal 			goto fail_toobig;
614485fca66SFlorian Westphal 
615485fca66SFlorian Westphal 		/* don't send fragments larger than what we received */
616485fca66SFlorian Westphal 		mtu = IP6CB(skb)->frag_max_size;
617485fca66SFlorian Westphal 		if (mtu < IPV6_MIN_MTU)
618485fca66SFlorian Westphal 			mtu = IPV6_MIN_MTU;
619b881ef76SJohn Heffner 	}
620b881ef76SJohn Heffner 
621d91675f9SYOSHIFUJI Hideaki 	if (np && np->frag_size < mtu) {
622d91675f9SYOSHIFUJI Hideaki 		if (np->frag_size)
623d91675f9SYOSHIFUJI Hideaki 			mtu = np->frag_size;
624d91675f9SYOSHIFUJI Hideaki 	}
62589bc7848SHannes Frederic Sowa 	if (mtu < hlen + sizeof(struct frag_hdr) + 8)
626b72a2b01SHannes Frederic Sowa 		goto fail_toobig;
6271e0d69a9SHannes Frederic Sowa 	mtu -= hlen + sizeof(struct frag_hdr);
6281da177e4SLinus Torvalds 
629fd0273d7SMartin KaFai Lau 	frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr,
630fd0273d7SMartin KaFai Lau 				    &ipv6_hdr(skb)->saddr);
631286c2349SMartin KaFai Lau 
632405c92f7SHannes Frederic Sowa 	if (skb->ip_summed == CHECKSUM_PARTIAL &&
633405c92f7SHannes Frederic Sowa 	    (err = skb_checksum_help(skb)))
634405c92f7SHannes Frederic Sowa 		goto fail;
635405c92f7SHannes Frederic Sowa 
6361d325d21SFlorian Westphal 	hroom = LL_RESERVED_SPACE(rt->dst.dev);
63721dc3301SDavid S. Miller 	if (skb_has_frag_list(skb)) {
638c72d8cdaSAlexey Dobriyan 		unsigned int first_len = skb_pagelen(skb);
6393d13008eSEric Dumazet 		struct sk_buff *frag2;
6401da177e4SLinus Torvalds 
6411da177e4SLinus Torvalds 		if (first_len - hlen > mtu ||
6421da177e4SLinus Torvalds 		    ((first_len - hlen) & 7) ||
6431d325d21SFlorian Westphal 		    skb_cloned(skb) ||
6441d325d21SFlorian Westphal 		    skb_headroom(skb) < (hroom + sizeof(struct frag_hdr)))
6451da177e4SLinus Torvalds 			goto slow_path;
6461da177e4SLinus Torvalds 
6474d9092bbSDavid S. Miller 		skb_walk_frags(skb, frag) {
6481da177e4SLinus Torvalds 			/* Correct geometry. */
6491da177e4SLinus Torvalds 			if (frag->len > mtu ||
6501da177e4SLinus Torvalds 			    ((frag->len & 7) && frag->next) ||
6511d325d21SFlorian Westphal 			    skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr)))
6523d13008eSEric Dumazet 				goto slow_path_clean;
6531da177e4SLinus Torvalds 
6541da177e4SLinus Torvalds 			/* Partially cloned skb? */
6551da177e4SLinus Torvalds 			if (skb_shared(frag))
6563d13008eSEric Dumazet 				goto slow_path_clean;
6572fdba6b0SHerbert Xu 
6582fdba6b0SHerbert Xu 			BUG_ON(frag->sk);
6592fdba6b0SHerbert Xu 			if (skb->sk) {
6602fdba6b0SHerbert Xu 				frag->sk = skb->sk;
6612fdba6b0SHerbert Xu 				frag->destructor = sock_wfree;
6622fdba6b0SHerbert Xu 			}
6633d13008eSEric Dumazet 			skb->truesize -= frag->truesize;
6641da177e4SLinus Torvalds 		}
6651da177e4SLinus Torvalds 
6661da177e4SLinus Torvalds 		err = 0;
6671da177e4SLinus Torvalds 		offset = 0;
6681da177e4SLinus Torvalds 		/* BUILD HEADER */
6691da177e4SLinus Torvalds 
6709a217a1cSYOSHIFUJI Hideaki 		*prevhdr = NEXTHDR_FRAGMENT;
671d56f90a7SArnaldo Carvalho de Melo 		tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC);
6721da177e4SLinus Torvalds 		if (!tmp_hdr) {
673adf30907SEric Dumazet 			IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
6743bd653c8SDenis V. Lunev 				      IPSTATS_MIB_FRAGFAILS);
6751d325d21SFlorian Westphal 			err = -ENOMEM;
6761d325d21SFlorian Westphal 			goto fail;
6771da177e4SLinus Torvalds 		}
6781d325d21SFlorian Westphal 		frag = skb_shinfo(skb)->frag_list;
6791d325d21SFlorian Westphal 		skb_frag_list_init(skb);
6801da177e4SLinus Torvalds 
6811da177e4SLinus Torvalds 		__skb_pull(skb, hlen);
6821da177e4SLinus Torvalds 		fh = (struct frag_hdr *)__skb_push(skb, sizeof(struct frag_hdr));
683e2d1bca7SArnaldo Carvalho de Melo 		__skb_push(skb, hlen);
684e2d1bca7SArnaldo Carvalho de Melo 		skb_reset_network_header(skb);
685d56f90a7SArnaldo Carvalho de Melo 		memcpy(skb_network_header(skb), tmp_hdr, hlen);
6861da177e4SLinus Torvalds 
6871da177e4SLinus Torvalds 		fh->nexthdr = nexthdr;
6881da177e4SLinus Torvalds 		fh->reserved = 0;
6891da177e4SLinus Torvalds 		fh->frag_off = htons(IP6_MF);
690286c2349SMartin KaFai Lau 		fh->identification = frag_id;
6911da177e4SLinus Torvalds 
6921da177e4SLinus Torvalds 		first_len = skb_pagelen(skb);
6931da177e4SLinus Torvalds 		skb->data_len = first_len - skb_headlen(skb);
6941da177e4SLinus Torvalds 		skb->len = first_len;
6950660e03fSArnaldo Carvalho de Melo 		ipv6_hdr(skb)->payload_len = htons(first_len -
6960660e03fSArnaldo Carvalho de Melo 						   sizeof(struct ipv6hdr));
6971da177e4SLinus Torvalds 
698d8d1f30bSChangli Gao 		dst_hold(&rt->dst);
6991da177e4SLinus Torvalds 
7001da177e4SLinus Torvalds 		for (;;) {
7011da177e4SLinus Torvalds 			/* Prepare header of the next frame,
7021da177e4SLinus Torvalds 			 * before previous one went down. */
7031da177e4SLinus Torvalds 			if (frag) {
7041da177e4SLinus Torvalds 				frag->ip_summed = CHECKSUM_NONE;
705badff6d0SArnaldo Carvalho de Melo 				skb_reset_transport_header(frag);
7061da177e4SLinus Torvalds 				fh = (struct frag_hdr *)__skb_push(frag, sizeof(struct frag_hdr));
707e2d1bca7SArnaldo Carvalho de Melo 				__skb_push(frag, hlen);
708e2d1bca7SArnaldo Carvalho de Melo 				skb_reset_network_header(frag);
709d56f90a7SArnaldo Carvalho de Melo 				memcpy(skb_network_header(frag), tmp_hdr,
710d56f90a7SArnaldo Carvalho de Melo 				       hlen);
7111da177e4SLinus Torvalds 				offset += skb->len - hlen - sizeof(struct frag_hdr);
7121da177e4SLinus Torvalds 				fh->nexthdr = nexthdr;
7131da177e4SLinus Torvalds 				fh->reserved = 0;
7141da177e4SLinus Torvalds 				fh->frag_off = htons(offset);
71553b24b8fSIan Morris 				if (frag->next)
7161da177e4SLinus Torvalds 					fh->frag_off |= htons(IP6_MF);
7171da177e4SLinus Torvalds 				fh->identification = frag_id;
7180660e03fSArnaldo Carvalho de Melo 				ipv6_hdr(frag)->payload_len =
7190660e03fSArnaldo Carvalho de Melo 						htons(frag->len -
7200660e03fSArnaldo Carvalho de Melo 						      sizeof(struct ipv6hdr));
7211da177e4SLinus Torvalds 				ip6_copy_metadata(frag, skb);
7221da177e4SLinus Torvalds 			}
7231da177e4SLinus Torvalds 
7247d8c6e39SEric W. Biederman 			err = output(net, sk, skb);
725dafee490SWei Dong 			if (!err)
726d8d1f30bSChangli Gao 				IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7273bd653c8SDenis V. Lunev 					      IPSTATS_MIB_FRAGCREATES);
728dafee490SWei Dong 
7291da177e4SLinus Torvalds 			if (err || !frag)
7301da177e4SLinus Torvalds 				break;
7311da177e4SLinus Torvalds 
7321da177e4SLinus Torvalds 			skb = frag;
7331da177e4SLinus Torvalds 			frag = skb->next;
7341da177e4SLinus Torvalds 			skb->next = NULL;
7351da177e4SLinus Torvalds 		}
7361da177e4SLinus Torvalds 
7371da177e4SLinus Torvalds 		kfree(tmp_hdr);
7381da177e4SLinus Torvalds 
7391da177e4SLinus Torvalds 		if (err == 0) {
740d8d1f30bSChangli Gao 			IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7413bd653c8SDenis V. Lunev 				      IPSTATS_MIB_FRAGOKS);
74294e187c0SAmerigo Wang 			ip6_rt_put(rt);
7431da177e4SLinus Torvalds 			return 0;
7441da177e4SLinus Torvalds 		}
7451da177e4SLinus Torvalds 
74646cfd725SFlorian Westphal 		kfree_skb_list(frag);
7471da177e4SLinus Torvalds 
748d8d1f30bSChangli Gao 		IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7493bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGFAILS);
75094e187c0SAmerigo Wang 		ip6_rt_put(rt);
7511da177e4SLinus Torvalds 		return err;
7523d13008eSEric Dumazet 
7533d13008eSEric Dumazet slow_path_clean:
7543d13008eSEric Dumazet 		skb_walk_frags(skb, frag2) {
7553d13008eSEric Dumazet 			if (frag2 == frag)
7563d13008eSEric Dumazet 				break;
7573d13008eSEric Dumazet 			frag2->sk = NULL;
7583d13008eSEric Dumazet 			frag2->destructor = NULL;
7593d13008eSEric Dumazet 			skb->truesize += frag2->truesize;
7603d13008eSEric Dumazet 		}
7611da177e4SLinus Torvalds 	}
7621da177e4SLinus Torvalds 
7631da177e4SLinus Torvalds slow_path:
7641da177e4SLinus Torvalds 	left = skb->len - hlen;		/* Space per frame */
7651da177e4SLinus Torvalds 	ptr = hlen;			/* Where to start from */
7661da177e4SLinus Torvalds 
7671da177e4SLinus Torvalds 	/*
7681da177e4SLinus Torvalds 	 *	Fragment the datagram.
7691da177e4SLinus Torvalds 	 */
7701da177e4SLinus Torvalds 
771a7ae1992SHerbert Xu 	troom = rt->dst.dev->needed_tailroom;
7721da177e4SLinus Torvalds 
7731da177e4SLinus Torvalds 	/*
7741da177e4SLinus Torvalds 	 *	Keep copying data until we run out.
7751da177e4SLinus Torvalds 	 */
7761da177e4SLinus Torvalds 	while (left > 0)	{
777*79e49503SFlorian Westphal 		u8 *fragnexthdr_offset;
778*79e49503SFlorian Westphal 
7791da177e4SLinus Torvalds 		len = left;
7801da177e4SLinus Torvalds 		/* IF: it doesn't fit, use 'mtu' - the data space left */
7811da177e4SLinus Torvalds 		if (len > mtu)
7821da177e4SLinus Torvalds 			len = mtu;
7831da177e4SLinus Torvalds 		/* IF: we are not sending up to and including the packet end
7841da177e4SLinus Torvalds 		   then align the next start on an eight byte boundary */
7851da177e4SLinus Torvalds 		if (len < left)	{
7861da177e4SLinus Torvalds 			len &= ~7;
7871da177e4SLinus Torvalds 		}
7881da177e4SLinus Torvalds 
789cbffccc9SJoe Perches 		/* Allocate buffer */
790cbffccc9SJoe Perches 		frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) +
791cbffccc9SJoe Perches 				 hroom + troom, GFP_ATOMIC);
792cbffccc9SJoe Perches 		if (!frag) {
793adf30907SEric Dumazet 			IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
794a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_FRAGFAILS);
7951da177e4SLinus Torvalds 			err = -ENOMEM;
7961da177e4SLinus Torvalds 			goto fail;
7971da177e4SLinus Torvalds 		}
7981da177e4SLinus Torvalds 
7991da177e4SLinus Torvalds 		/*
8001da177e4SLinus Torvalds 		 *	Set up data on packet
8011da177e4SLinus Torvalds 		 */
8021da177e4SLinus Torvalds 
8031da177e4SLinus Torvalds 		ip6_copy_metadata(frag, skb);
804a7ae1992SHerbert Xu 		skb_reserve(frag, hroom);
8051da177e4SLinus Torvalds 		skb_put(frag, len + hlen + sizeof(struct frag_hdr));
806c1d2bbe1SArnaldo Carvalho de Melo 		skb_reset_network_header(frag);
807badff6d0SArnaldo Carvalho de Melo 		fh = (struct frag_hdr *)(skb_network_header(frag) + hlen);
808b0e380b1SArnaldo Carvalho de Melo 		frag->transport_header = (frag->network_header + hlen +
809b0e380b1SArnaldo Carvalho de Melo 					  sizeof(struct frag_hdr));
8101da177e4SLinus Torvalds 
8111da177e4SLinus Torvalds 		/*
8121da177e4SLinus Torvalds 		 *	Charge the memory for the fragment to any owner
8131da177e4SLinus Torvalds 		 *	it might possess
8141da177e4SLinus Torvalds 		 */
8151da177e4SLinus Torvalds 		if (skb->sk)
8161da177e4SLinus Torvalds 			skb_set_owner_w(frag, skb->sk);
8171da177e4SLinus Torvalds 
8181da177e4SLinus Torvalds 		/*
8191da177e4SLinus Torvalds 		 *	Copy the packet header into the new buffer.
8201da177e4SLinus Torvalds 		 */
821d626f62bSArnaldo Carvalho de Melo 		skb_copy_from_linear_data(skb, skb_network_header(frag), hlen);
8221da177e4SLinus Torvalds 
823*79e49503SFlorian Westphal 		fragnexthdr_offset = skb_network_header(frag);
824*79e49503SFlorian Westphal 		fragnexthdr_offset += prevhdr - skb_network_header(skb);
825*79e49503SFlorian Westphal 		*fragnexthdr_offset = NEXTHDR_FRAGMENT;
826*79e49503SFlorian Westphal 
8271da177e4SLinus Torvalds 		/*
8281da177e4SLinus Torvalds 		 *	Build fragment header.
8291da177e4SLinus Torvalds 		 */
8301da177e4SLinus Torvalds 		fh->nexthdr = nexthdr;
8311da177e4SLinus Torvalds 		fh->reserved = 0;
8321da177e4SLinus Torvalds 		fh->identification = frag_id;
8331da177e4SLinus Torvalds 
8341da177e4SLinus Torvalds 		/*
8351da177e4SLinus Torvalds 		 *	Copy a block of the IP datagram.
8361da177e4SLinus Torvalds 		 */
837e3f0b86bSHimangi Saraogi 		BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag),
838e3f0b86bSHimangi Saraogi 				     len));
8391da177e4SLinus Torvalds 		left -= len;
8401da177e4SLinus Torvalds 
8411da177e4SLinus Torvalds 		fh->frag_off = htons(offset);
8421da177e4SLinus Torvalds 		if (left > 0)
8431da177e4SLinus Torvalds 			fh->frag_off |= htons(IP6_MF);
8440660e03fSArnaldo Carvalho de Melo 		ipv6_hdr(frag)->payload_len = htons(frag->len -
8450660e03fSArnaldo Carvalho de Melo 						    sizeof(struct ipv6hdr));
8461da177e4SLinus Torvalds 
8471da177e4SLinus Torvalds 		ptr += len;
8481da177e4SLinus Torvalds 		offset += len;
8491da177e4SLinus Torvalds 
8501da177e4SLinus Torvalds 		/*
8511da177e4SLinus Torvalds 		 *	Put this fragment into the sending queue.
8521da177e4SLinus Torvalds 		 */
8537d8c6e39SEric W. Biederman 		err = output(net, sk, frag);
8541da177e4SLinus Torvalds 		if (err)
8551da177e4SLinus Torvalds 			goto fail;
856dafee490SWei Dong 
857adf30907SEric Dumazet 		IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
8583bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGCREATES);
8591da177e4SLinus Torvalds 	}
860adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
861a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGOKS);
862808db80aSEric Dumazet 	consume_skb(skb);
8631da177e4SLinus Torvalds 	return err;
8641da177e4SLinus Torvalds 
865485fca66SFlorian Westphal fail_toobig:
866485fca66SFlorian Westphal 	if (skb->sk && dst_allfrag(skb_dst(skb)))
867485fca66SFlorian Westphal 		sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK);
868485fca66SFlorian Westphal 
869485fca66SFlorian Westphal 	skb->dev = skb_dst(skb)->dev;
870485fca66SFlorian Westphal 	icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
871485fca66SFlorian Westphal 	err = -EMSGSIZE;
872485fca66SFlorian Westphal 
8731da177e4SLinus Torvalds fail:
874adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
875a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGFAILS);
8761da177e4SLinus Torvalds 	kfree_skb(skb);
8771da177e4SLinus Torvalds 	return err;
8781da177e4SLinus Torvalds }
8791da177e4SLinus Torvalds 
880b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key,
881b71d1d42SEric Dumazet 			       const struct in6_addr *fl_addr,
882b71d1d42SEric Dumazet 			       const struct in6_addr *addr_cache)
883cf6b1982SYOSHIFUJI Hideaki {
884a02cec21SEric Dumazet 	return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) &&
88563159f29SIan Morris 		(!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache));
886cf6b1982SYOSHIFUJI Hideaki }
887cf6b1982SYOSHIFUJI Hideaki 
888497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk,
889497c615aSHerbert Xu 					  struct dst_entry *dst,
890b71d1d42SEric Dumazet 					  const struct flowi6 *fl6)
8911da177e4SLinus Torvalds {
8921da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
893a963a37dSEric Dumazet 	struct rt6_info *rt;
8941da177e4SLinus Torvalds 
895497c615aSHerbert Xu 	if (!dst)
896497c615aSHerbert Xu 		goto out;
8971da177e4SLinus Torvalds 
898a963a37dSEric Dumazet 	if (dst->ops->family != AF_INET6) {
899a963a37dSEric Dumazet 		dst_release(dst);
900a963a37dSEric Dumazet 		return NULL;
901a963a37dSEric Dumazet 	}
902a963a37dSEric Dumazet 
903a963a37dSEric Dumazet 	rt = (struct rt6_info *)dst;
9041da177e4SLinus Torvalds 	/* Yes, checking route validity in not connected
905d76e60a5SDavid S. Miller 	 * case is not very simple. Take into account,
906d76e60a5SDavid S. Miller 	 * that we do not support routing by source, TOS,
907d76e60a5SDavid S. Miller 	 * and MSG_DONTROUTE		--ANK (980726)
908d76e60a5SDavid S. Miller 	 *
909cf6b1982SYOSHIFUJI Hideaki 	 * 1. ip6_rt_check(): If route was host route,
910cf6b1982SYOSHIFUJI Hideaki 	 *    check that cached destination is current.
911d76e60a5SDavid S. Miller 	 *    If it is network route, we still may
912d76e60a5SDavid S. Miller 	 *    check its validity using saved pointer
913d76e60a5SDavid S. Miller 	 *    to the last used address: daddr_cache.
914d76e60a5SDavid S. Miller 	 *    We do not want to save whole address now,
915d76e60a5SDavid S. Miller 	 *    (because main consumer of this service
916d76e60a5SDavid S. Miller 	 *    is tcp, which has not this problem),
917d76e60a5SDavid S. Miller 	 *    so that the last trick works only on connected
918d76e60a5SDavid S. Miller 	 *    sockets.
919d76e60a5SDavid S. Miller 	 * 2. oif also should be the same.
9201da177e4SLinus Torvalds 	 */
9214c9483b2SDavid S. Miller 	if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) ||
9228e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES
9234c9483b2SDavid S. Miller 	    ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) ||
9248e1ef0a9SYOSHIFUJI Hideaki #endif
925ca254490SDavid Ahern 	   (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) &&
926ca254490SDavid Ahern 	      (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) {
927497c615aSHerbert Xu 		dst_release(dst);
928497c615aSHerbert Xu 		dst = NULL;
9291da177e4SLinus Torvalds 	}
930497c615aSHerbert Xu 
931497c615aSHerbert Xu out:
932497c615aSHerbert Xu 	return dst;
9331da177e4SLinus Torvalds }
934497c615aSHerbert Xu 
9353aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
9364c9483b2SDavid S. Miller 			       struct dst_entry **dst, struct flowi6 *fl6)
937497c615aSHerbert Xu {
93869cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
93969cce1d1SDavid S. Miller 	struct neighbour *n;
94097cac082SDavid S. Miller 	struct rt6_info *rt;
94169cce1d1SDavid S. Miller #endif
94269cce1d1SDavid S. Miller 	int err;
9436f21c96aSPaolo Abeni 	int flags = 0;
9441da177e4SLinus Torvalds 
945e16e888bSMarkus Stenberg 	/* The correct way to handle this would be to do
946e16e888bSMarkus Stenberg 	 * ip6_route_get_saddr, and then ip6_route_output; however,
947e16e888bSMarkus Stenberg 	 * the route-specific preferred source forces the
948e16e888bSMarkus Stenberg 	 * ip6_route_output call _before_ ip6_route_get_saddr.
949e16e888bSMarkus Stenberg 	 *
950e16e888bSMarkus Stenberg 	 * In source specific routing (no src=any default route),
951e16e888bSMarkus Stenberg 	 * ip6_route_output will fail given src=any saddr, though, so
952e16e888bSMarkus Stenberg 	 * that's why we try it again later.
953e16e888bSMarkus Stenberg 	 */
954e16e888bSMarkus Stenberg 	if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) {
955e16e888bSMarkus Stenberg 		struct rt6_info *rt;
956e16e888bSMarkus Stenberg 		bool had_dst = *dst != NULL;
957e16e888bSMarkus Stenberg 
958e16e888bSMarkus Stenberg 		if (!had_dst)
959e16e888bSMarkus Stenberg 			*dst = ip6_route_output(net, sk, fl6);
960e16e888bSMarkus Stenberg 		rt = (*dst)->error ? NULL : (struct rt6_info *)*dst;
961e16e888bSMarkus Stenberg 		err = ip6_route_get_saddr(net, rt, &fl6->daddr,
962e16e888bSMarkus Stenberg 					  sk ? inet6_sk(sk)->srcprefs : 0,
963e16e888bSMarkus Stenberg 					  &fl6->saddr);
964e16e888bSMarkus Stenberg 		if (err)
965e16e888bSMarkus Stenberg 			goto out_err_release;
966e16e888bSMarkus Stenberg 
967e16e888bSMarkus Stenberg 		/* If we had an erroneous initial result, pretend it
968e16e888bSMarkus Stenberg 		 * never existed and let the SA-enabled version take
969e16e888bSMarkus Stenberg 		 * over.
970e16e888bSMarkus Stenberg 		 */
971e16e888bSMarkus Stenberg 		if (!had_dst && (*dst)->error) {
972e16e888bSMarkus Stenberg 			dst_release(*dst);
973e16e888bSMarkus Stenberg 			*dst = NULL;
974e16e888bSMarkus Stenberg 		}
9756f21c96aSPaolo Abeni 
9766f21c96aSPaolo Abeni 		if (fl6->flowi6_oif)
9776f21c96aSPaolo Abeni 			flags |= RT6_LOOKUP_F_IFACE;
978e16e888bSMarkus Stenberg 	}
979e16e888bSMarkus Stenberg 
98063159f29SIan Morris 	if (!*dst)
9816f21c96aSPaolo Abeni 		*dst = ip6_route_output_flags(net, sk, fl6, flags);
9821da177e4SLinus Torvalds 
983e5d08d71SIan Morris 	err = (*dst)->error;
984e5d08d71SIan Morris 	if (err)
9851da177e4SLinus Torvalds 		goto out_err_release;
9861da177e4SLinus Torvalds 
98795c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
98895c385b4SNeil Horman 	/*
98995c385b4SNeil Horman 	 * Here if the dst entry we've looked up
99095c385b4SNeil Horman 	 * has a neighbour entry that is in the INCOMPLETE
99195c385b4SNeil Horman 	 * state and the src address from the flow is
99295c385b4SNeil Horman 	 * marked as OPTIMISTIC, we release the found
99395c385b4SNeil Horman 	 * dst entry and replace it instead with the
99495c385b4SNeil Horman 	 * dst entry of the nexthop router
99595c385b4SNeil Horman 	 */
996c56bf6feSEric Dumazet 	rt = (struct rt6_info *) *dst;
997707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
9982647a9b0SMartin KaFai Lau 	n = __ipv6_neigh_lookup_noref(rt->dst.dev,
9992647a9b0SMartin KaFai Lau 				      rt6_nexthop(rt, &fl6->daddr));
1000707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0;
1001707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
1002707be1ffSYOSHIFUJI Hideaki / 吉藤英明 
1003707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	if (err) {
100495c385b4SNeil Horman 		struct inet6_ifaddr *ifp;
10054c9483b2SDavid S. Miller 		struct flowi6 fl_gw6;
100695c385b4SNeil Horman 		int redirect;
100795c385b4SNeil Horman 
10084c9483b2SDavid S. Miller 		ifp = ipv6_get_ifaddr(net, &fl6->saddr,
10091cab3da6SDaniel Lezcano 				      (*dst)->dev, 1);
101095c385b4SNeil Horman 
101195c385b4SNeil Horman 		redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC);
101295c385b4SNeil Horman 		if (ifp)
101395c385b4SNeil Horman 			in6_ifa_put(ifp);
101495c385b4SNeil Horman 
101595c385b4SNeil Horman 		if (redirect) {
101695c385b4SNeil Horman 			/*
101795c385b4SNeil Horman 			 * We need to get the dst entry for the
101895c385b4SNeil Horman 			 * default router instead
101995c385b4SNeil Horman 			 */
102095c385b4SNeil Horman 			dst_release(*dst);
10214c9483b2SDavid S. Miller 			memcpy(&fl_gw6, fl6, sizeof(struct flowi6));
10224c9483b2SDavid S. Miller 			memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr));
10234c9483b2SDavid S. Miller 			*dst = ip6_route_output(net, sk, &fl_gw6);
1024e5d08d71SIan Morris 			err = (*dst)->error;
1025e5d08d71SIan Morris 			if (err)
102695c385b4SNeil Horman 				goto out_err_release;
102795c385b4SNeil Horman 		}
102895c385b4SNeil Horman 	}
102995c385b4SNeil Horman #endif
1030ec5e3b0aSJonathan T. Leighton 	if (ipv6_addr_v4mapped(&fl6->saddr) &&
103100ea1ceeSWillem de Bruijn 	    !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) {
103200ea1ceeSWillem de Bruijn 		err = -EAFNOSUPPORT;
103300ea1ceeSWillem de Bruijn 		goto out_err_release;
103400ea1ceeSWillem de Bruijn 	}
103595c385b4SNeil Horman 
10361da177e4SLinus Torvalds 	return 0;
10371da177e4SLinus Torvalds 
10381da177e4SLinus Torvalds out_err_release:
10391da177e4SLinus Torvalds 	dst_release(*dst);
10401da177e4SLinus Torvalds 	*dst = NULL;
10418a966fc0SDavid Ahern 
10420d240e78SDavid Ahern 	if (err == -ENETUNREACH)
10430d240e78SDavid Ahern 		IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES);
10441da177e4SLinus Torvalds 	return err;
10451da177e4SLinus Torvalds }
104634a0b3cdSAdrian Bunk 
1047497c615aSHerbert Xu /**
1048497c615aSHerbert Xu  *	ip6_dst_lookup - perform route lookup on flow
1049497c615aSHerbert Xu  *	@sk: socket which provides route info
1050497c615aSHerbert Xu  *	@dst: pointer to dst_entry * for result
10514c9483b2SDavid S. Miller  *	@fl6: flow to lookup
1052497c615aSHerbert Xu  *
1053497c615aSHerbert Xu  *	This function performs a route lookup on the given flow.
1054497c615aSHerbert Xu  *
1055497c615aSHerbert Xu  *	It returns zero on success, or a standard errno code on error.
1056497c615aSHerbert Xu  */
1057343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst,
1058343d60aaSRoopa Prabhu 		   struct flowi6 *fl6)
1059497c615aSHerbert Xu {
1060497c615aSHerbert Xu 	*dst = NULL;
1061343d60aaSRoopa Prabhu 	return ip6_dst_lookup_tail(net, sk, dst, fl6);
1062497c615aSHerbert Xu }
10633cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup);
10643cf3dc6cSArnaldo Carvalho de Melo 
1065497c615aSHerbert Xu /**
106668d0c6d3SDavid S. Miller  *	ip6_dst_lookup_flow - perform route lookup on flow with ipsec
106768d0c6d3SDavid S. Miller  *	@sk: socket which provides route info
10684c9483b2SDavid S. Miller  *	@fl6: flow to lookup
106968d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
107068d0c6d3SDavid S. Miller  *
107168d0c6d3SDavid S. Miller  *	This function performs a route lookup on the given flow.
107268d0c6d3SDavid S. Miller  *
107368d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
107468d0c6d3SDavid S. Miller  *	error code.
107568d0c6d3SDavid S. Miller  */
10763aef934fSEric Dumazet struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6,
10770e0d44abSSteffen Klassert 				      const struct in6_addr *final_dst)
107868d0c6d3SDavid S. Miller {
107968d0c6d3SDavid S. Miller 	struct dst_entry *dst = NULL;
108068d0c6d3SDavid S. Miller 	int err;
108168d0c6d3SDavid S. Miller 
1082343d60aaSRoopa Prabhu 	err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6);
108368d0c6d3SDavid S. Miller 	if (err)
108468d0c6d3SDavid S. Miller 		return ERR_PTR(err);
108568d0c6d3SDavid S. Miller 	if (final_dst)
10864e3fd7a0SAlexey Dobriyan 		fl6->daddr = *final_dst;
10872774c131SDavid S. Miller 
1088f92ee619SSteffen Klassert 	return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0);
108968d0c6d3SDavid S. Miller }
109068d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow);
109168d0c6d3SDavid S. Miller 
109268d0c6d3SDavid S. Miller /**
109368d0c6d3SDavid S. Miller  *	ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow
109468d0c6d3SDavid S. Miller  *	@sk: socket which provides the dst cache and route info
10954c9483b2SDavid S. Miller  *	@fl6: flow to lookup
109668d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
1097497c615aSHerbert Xu  *
1098497c615aSHerbert Xu  *	This function performs a route lookup on the given flow with the
1099497c615aSHerbert Xu  *	possibility of using the cached route in the socket if it is valid.
1100497c615aSHerbert Xu  *	It will take the socket dst lock when operating on the dst cache.
1101497c615aSHerbert Xu  *	As a result, this function can only be used in process context.
1102497c615aSHerbert Xu  *
110368d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
110468d0c6d3SDavid S. Miller  *	error code.
1105497c615aSHerbert Xu  */
11064c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6,
11070e0d44abSSteffen Klassert 					 const struct in6_addr *final_dst)
1108497c615aSHerbert Xu {
110968d0c6d3SDavid S. Miller 	struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie);
1110497c615aSHerbert Xu 
11114c9483b2SDavid S. Miller 	dst = ip6_sk_dst_check(sk, dst, fl6);
111200bc0ef5SJakub Sitnicki 	if (!dst)
111300bc0ef5SJakub Sitnicki 		dst = ip6_dst_lookup_flow(sk, fl6, final_dst);
111468d0c6d3SDavid S. Miller 
111500bc0ef5SJakub Sitnicki 	return dst;
111668d0c6d3SDavid S. Miller }
111768d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow);
1118497c615aSHerbert Xu 
111934a0b3cdSAdrian Bunk static inline int ip6_ufo_append_data(struct sock *sk,
11200bbe84a6SVlad Yasevich 			struct sk_buff_head *queue,
1121e89e9cf5SAnanda Raju 			int getfrag(void *from, char *to, int offset, int len,
1122e89e9cf5SAnanda Raju 			int odd, struct sk_buff *skb),
1123e89e9cf5SAnanda Raju 			void *from, int length, int hh_len, int fragheaderlen,
11243ba3458fSJakub Sitnicki 			int exthdrlen, int transhdrlen, int mtu,
11253ba3458fSJakub Sitnicki 			unsigned int flags, const struct flowi6 *fl6)
1126e89e9cf5SAnanda Raju 
1127e89e9cf5SAnanda Raju {
1128e89e9cf5SAnanda Raju 	struct sk_buff *skb;
1129e89e9cf5SAnanda Raju 	int err;
1130e89e9cf5SAnanda Raju 
1131e89e9cf5SAnanda Raju 	/* There is support for UDP large send offload by network
1132e89e9cf5SAnanda Raju 	 * device, so create one single skb packet containing complete
1133e89e9cf5SAnanda Raju 	 * udp datagram
1134e89e9cf5SAnanda Raju 	 */
11350bbe84a6SVlad Yasevich 	skb = skb_peek_tail(queue);
113663159f29SIan Morris 	if (!skb) {
1137e89e9cf5SAnanda Raju 		skb = sock_alloc_send_skb(sk,
1138e89e9cf5SAnanda Raju 			hh_len + fragheaderlen + transhdrlen + 20,
1139e89e9cf5SAnanda Raju 			(flags & MSG_DONTWAIT), &err);
114063159f29SIan Morris 		if (!skb)
1141504744e4SZheng Yan 			return err;
1142e89e9cf5SAnanda Raju 
1143e89e9cf5SAnanda Raju 		/* reserve space for Hardware header */
1144e89e9cf5SAnanda Raju 		skb_reserve(skb, hh_len);
1145e89e9cf5SAnanda Raju 
1146e89e9cf5SAnanda Raju 		/* create space for UDP/IP header */
1147e89e9cf5SAnanda Raju 		skb_put(skb, fragheaderlen + transhdrlen);
1148e89e9cf5SAnanda Raju 
1149e89e9cf5SAnanda Raju 		/* initialize network header pointer */
11503ba3458fSJakub Sitnicki 		skb_set_network_header(skb, exthdrlen);
1151e89e9cf5SAnanda Raju 
1152e89e9cf5SAnanda Raju 		/* initialize protocol header pointer */
1153b0e380b1SArnaldo Carvalho de Melo 		skb->transport_header = skb->network_header + fragheaderlen;
1154e89e9cf5SAnanda Raju 
11559c9c9ad5SHannes Frederic Sowa 		skb->protocol = htons(ETH_P_IPV6);
1156e89e9cf5SAnanda Raju 		skb->csum = 0;
1157e89e9cf5SAnanda Raju 
11580dec879fSJulian Anastasov 		if (flags & MSG_CONFIRM)
11590dec879fSJulian Anastasov 			skb_set_dst_pending_confirm(skb, 1);
11600dec879fSJulian Anastasov 
11610bbe84a6SVlad Yasevich 		__skb_queue_tail(queue, skb);
1162c547dbf5SJiri Pirko 	} else if (skb_is_gso(skb)) {
1163c547dbf5SJiri Pirko 		goto append;
1164c547dbf5SJiri Pirko 	}
1165c547dbf5SJiri Pirko 
1166c547dbf5SJiri Pirko 	skb->ip_summed = CHECKSUM_PARTIAL;
1167c31d5326SSridhar Samudrala 	/* Specify the length of each IPv6 datagram fragment.
1168c31d5326SSridhar Samudrala 	 * It has to be a multiple of 8.
1169c31d5326SSridhar Samudrala 	 */
1170c31d5326SSridhar Samudrala 	skb_shinfo(skb)->gso_size = (mtu - fragheaderlen -
1171c31d5326SSridhar Samudrala 				     sizeof(struct frag_hdr)) & ~7;
1172f83ef8c0SHerbert Xu 	skb_shinfo(skb)->gso_type = SKB_GSO_UDP;
1173fd0273d7SMartin KaFai Lau 	skb_shinfo(skb)->ip6_frag_id = ipv6_select_ident(sock_net(sk),
1174fd0273d7SMartin KaFai Lau 							 &fl6->daddr,
1175fd0273d7SMartin KaFai Lau 							 &fl6->saddr);
1176e89e9cf5SAnanda Raju 
1177c547dbf5SJiri Pirko append:
11782811ebacSHannes Frederic Sowa 	return skb_append_datato_frags(sk, skb, getfrag, from,
11792811ebacSHannes Frederic Sowa 				       (length - transhdrlen));
1180e89e9cf5SAnanda Raju }
11811da177e4SLinus Torvalds 
11820178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src,
11830178b695SHerbert Xu 					       gfp_t gfp)
11840178b695SHerbert Xu {
11850178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
11860178b695SHerbert Xu }
11870178b695SHerbert Xu 
11880178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src,
11890178b695SHerbert Xu 						gfp_t gfp)
11900178b695SHerbert Xu {
11910178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
11920178b695SHerbert Xu }
11930178b695SHerbert Xu 
119475a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu,
11950c183379SGao feng 				int *maxfraglen,
11960c183379SGao feng 				unsigned int fragheaderlen,
11970c183379SGao feng 				struct sk_buff *skb,
119875a493e6SHannes Frederic Sowa 				struct rt6_info *rt,
1199e367c2d0Slucien 				unsigned int orig_mtu)
12000c183379SGao feng {
12010c183379SGao feng 	if (!(rt->dst.flags & DST_XFRM_TUNNEL)) {
120263159f29SIan Morris 		if (!skb) {
12030c183379SGao feng 			/* first fragment, reserve header_len */
1204e367c2d0Slucien 			*mtu = orig_mtu - rt->dst.header_len;
12050c183379SGao feng 
12060c183379SGao feng 		} else {
12070c183379SGao feng 			/*
12080c183379SGao feng 			 * this fragment is not first, the headers
12090c183379SGao feng 			 * space is regarded as data space.
12100c183379SGao feng 			 */
1211e367c2d0Slucien 			*mtu = orig_mtu;
12120c183379SGao feng 		}
12130c183379SGao feng 		*maxfraglen = ((*mtu - fragheaderlen) & ~7)
12140c183379SGao feng 			      + fragheaderlen - sizeof(struct frag_hdr);
12150c183379SGao feng 	}
12160c183379SGao feng }
12170c183379SGao feng 
1218366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork,
121926879da5SWei Wang 			  struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6,
1220366e41d9SVlad Yasevich 			  struct rt6_info *rt, struct flowi6 *fl6)
1221366e41d9SVlad Yasevich {
1222366e41d9SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
1223366e41d9SVlad Yasevich 	unsigned int mtu;
122426879da5SWei Wang 	struct ipv6_txoptions *opt = ipc6->opt;
1225366e41d9SVlad Yasevich 
1226366e41d9SVlad Yasevich 	/*
1227366e41d9SVlad Yasevich 	 * setup for corking
1228366e41d9SVlad Yasevich 	 */
1229366e41d9SVlad Yasevich 	if (opt) {
1230366e41d9SVlad Yasevich 		if (WARN_ON(v6_cork->opt))
1231366e41d9SVlad Yasevich 			return -EINVAL;
1232366e41d9SVlad Yasevich 
1233366e41d9SVlad Yasevich 		v6_cork->opt = kzalloc(opt->tot_len, sk->sk_allocation);
123463159f29SIan Morris 		if (unlikely(!v6_cork->opt))
1235366e41d9SVlad Yasevich 			return -ENOBUFS;
1236366e41d9SVlad Yasevich 
1237366e41d9SVlad Yasevich 		v6_cork->opt->tot_len = opt->tot_len;
1238366e41d9SVlad Yasevich 		v6_cork->opt->opt_flen = opt->opt_flen;
1239366e41d9SVlad Yasevich 		v6_cork->opt->opt_nflen = opt->opt_nflen;
1240366e41d9SVlad Yasevich 
1241366e41d9SVlad Yasevich 		v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt,
1242366e41d9SVlad Yasevich 						    sk->sk_allocation);
1243366e41d9SVlad Yasevich 		if (opt->dst0opt && !v6_cork->opt->dst0opt)
1244366e41d9SVlad Yasevich 			return -ENOBUFS;
1245366e41d9SVlad Yasevich 
1246366e41d9SVlad Yasevich 		v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt,
1247366e41d9SVlad Yasevich 						    sk->sk_allocation);
1248366e41d9SVlad Yasevich 		if (opt->dst1opt && !v6_cork->opt->dst1opt)
1249366e41d9SVlad Yasevich 			return -ENOBUFS;
1250366e41d9SVlad Yasevich 
1251366e41d9SVlad Yasevich 		v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt,
1252366e41d9SVlad Yasevich 						   sk->sk_allocation);
1253366e41d9SVlad Yasevich 		if (opt->hopopt && !v6_cork->opt->hopopt)
1254366e41d9SVlad Yasevich 			return -ENOBUFS;
1255366e41d9SVlad Yasevich 
1256366e41d9SVlad Yasevich 		v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt,
1257366e41d9SVlad Yasevich 						    sk->sk_allocation);
1258366e41d9SVlad Yasevich 		if (opt->srcrt && !v6_cork->opt->srcrt)
1259366e41d9SVlad Yasevich 			return -ENOBUFS;
1260366e41d9SVlad Yasevich 
1261366e41d9SVlad Yasevich 		/* need source address above miyazawa*/
1262366e41d9SVlad Yasevich 	}
1263366e41d9SVlad Yasevich 	dst_hold(&rt->dst);
1264366e41d9SVlad Yasevich 	cork->base.dst = &rt->dst;
1265366e41d9SVlad Yasevich 	cork->fl.u.ip6 = *fl6;
126626879da5SWei Wang 	v6_cork->hop_limit = ipc6->hlimit;
126726879da5SWei Wang 	v6_cork->tclass = ipc6->tclass;
1268366e41d9SVlad Yasevich 	if (rt->dst.flags & DST_XFRM_TUNNEL)
1269366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1270366e41d9SVlad Yasevich 		      rt->dst.dev->mtu : dst_mtu(&rt->dst);
1271366e41d9SVlad Yasevich 	else
1272366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1273366e41d9SVlad Yasevich 		      rt->dst.dev->mtu : dst_mtu(rt->dst.path);
1274366e41d9SVlad Yasevich 	if (np->frag_size < mtu) {
1275366e41d9SVlad Yasevich 		if (np->frag_size)
1276366e41d9SVlad Yasevich 			mtu = np->frag_size;
1277366e41d9SVlad Yasevich 	}
1278366e41d9SVlad Yasevich 	cork->base.fragsize = mtu;
1279366e41d9SVlad Yasevich 	if (dst_allfrag(rt->dst.path))
1280366e41d9SVlad Yasevich 		cork->base.flags |= IPCORK_ALLFRAG;
1281366e41d9SVlad Yasevich 	cork->base.length = 0;
1282366e41d9SVlad Yasevich 
1283366e41d9SVlad Yasevich 	return 0;
1284366e41d9SVlad Yasevich }
1285366e41d9SVlad Yasevich 
12860bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk,
12870bbe84a6SVlad Yasevich 			     struct flowi6 *fl6,
12880bbe84a6SVlad Yasevich 			     struct sk_buff_head *queue,
12890bbe84a6SVlad Yasevich 			     struct inet_cork *cork,
12900bbe84a6SVlad Yasevich 			     struct inet6_cork *v6_cork,
12910bbe84a6SVlad Yasevich 			     struct page_frag *pfrag,
12920bbe84a6SVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
12930bbe84a6SVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
12941da177e4SLinus Torvalds 			     void *from, int length, int transhdrlen,
129526879da5SWei Wang 			     unsigned int flags, struct ipcm6_cookie *ipc6,
1296c14ac945SSoheil Hassas Yeganeh 			     const struct sockcm_cookie *sockc)
12971da177e4SLinus Torvalds {
12980c183379SGao feng 	struct sk_buff *skb, *skb_prev = NULL;
1299e367c2d0Slucien 	unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu;
13000bbe84a6SVlad Yasevich 	int exthdrlen = 0;
13010bbe84a6SVlad Yasevich 	int dst_exthdrlen = 0;
13021da177e4SLinus Torvalds 	int hh_len;
13031da177e4SLinus Torvalds 	int copy;
13041da177e4SLinus Torvalds 	int err;
13051da177e4SLinus Torvalds 	int offset = 0;
1306a693e698SAnders Berggren 	__u8 tx_flags = 0;
130709c2d251SWillem de Bruijn 	u32 tskey = 0;
13080bbe84a6SVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->dst;
13090bbe84a6SVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
131032dce968SVlad Yasevich 	int csummode = CHECKSUM_NONE;
1311682b1a9dSHannes Frederic Sowa 	unsigned int maxnonfragsize, headersize;
13121da177e4SLinus Torvalds 
13130bbe84a6SVlad Yasevich 	skb = skb_peek_tail(queue);
13140bbe84a6SVlad Yasevich 	if (!skb) {
13150bbe84a6SVlad Yasevich 		exthdrlen = opt ? opt->opt_flen : 0;
13167efdba5bSRomain KUNTZ 		dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len;
13171da177e4SLinus Torvalds 	}
13180bbe84a6SVlad Yasevich 
1319366e41d9SVlad Yasevich 	mtu = cork->fragsize;
1320e367c2d0Slucien 	orig_mtu = mtu;
13211da177e4SLinus Torvalds 
1322d8d1f30bSChangli Gao 	hh_len = LL_RESERVED_SPACE(rt->dst.dev);
13231da177e4SLinus Torvalds 
1324a1b05140SMasahide NAKAMURA 	fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len +
1325b4ce9277SHerbert Xu 			(opt ? opt->opt_nflen : 0);
13264df98e76SHannes Frederic Sowa 	maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen -
13274df98e76SHannes Frederic Sowa 		     sizeof(struct frag_hdr);
13281da177e4SLinus Torvalds 
13294df98e76SHannes Frederic Sowa 	headersize = sizeof(struct ipv6hdr) +
13303a1cebe7SHannes Frederic Sowa 		     (opt ? opt->opt_flen + opt->opt_nflen : 0) +
13314df98e76SHannes Frederic Sowa 		     (dst_allfrag(&rt->dst) ?
13324df98e76SHannes Frederic Sowa 		      sizeof(struct frag_hdr) : 0) +
13334df98e76SHannes Frederic Sowa 		     rt->rt6i_nfheader_len;
13344df98e76SHannes Frederic Sowa 
133526879da5SWei Wang 	if (cork->length + length > mtu - headersize && ipc6->dontfrag &&
13364df98e76SHannes Frederic Sowa 	    (sk->sk_protocol == IPPROTO_UDP ||
13374df98e76SHannes Frederic Sowa 	     sk->sk_protocol == IPPROTO_RAW)) {
13384df98e76SHannes Frederic Sowa 		ipv6_local_rxpmtu(sk, fl6, mtu - headersize +
13394df98e76SHannes Frederic Sowa 				sizeof(struct ipv6hdr));
13404df98e76SHannes Frederic Sowa 		goto emsgsize;
13414df98e76SHannes Frederic Sowa 	}
13424df98e76SHannes Frederic Sowa 
1343682b1a9dSHannes Frederic Sowa 	if (ip6_sk_ignore_df(sk))
1344682b1a9dSHannes Frederic Sowa 		maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN;
1345682b1a9dSHannes Frederic Sowa 	else
1346682b1a9dSHannes Frederic Sowa 		maxnonfragsize = mtu;
1347682b1a9dSHannes Frederic Sowa 
13484df98e76SHannes Frederic Sowa 	if (cork->length + length > maxnonfragsize - headersize) {
13494df98e76SHannes Frederic Sowa emsgsize:
13504df98e76SHannes Frederic Sowa 		ipv6_local_error(sk, EMSGSIZE, fl6,
13514df98e76SHannes Frederic Sowa 				 mtu - headersize +
13524df98e76SHannes Frederic Sowa 				 sizeof(struct ipv6hdr));
13531da177e4SLinus Torvalds 		return -EMSGSIZE;
13541da177e4SLinus Torvalds 	}
1355682b1a9dSHannes Frederic Sowa 
1356682b1a9dSHannes Frederic Sowa 	/* CHECKSUM_PARTIAL only with no extension headers and when
1357682b1a9dSHannes Frederic Sowa 	 * we are not going to fragment
1358682b1a9dSHannes Frederic Sowa 	 */
1359682b1a9dSHannes Frederic Sowa 	if (transhdrlen && sk->sk_protocol == IPPROTO_UDP &&
1360682b1a9dSHannes Frederic Sowa 	    headersize == sizeof(struct ipv6hdr) &&
13612b89ed65SVlad Yasevich 	    length <= mtu - headersize &&
1362682b1a9dSHannes Frederic Sowa 	    !(flags & MSG_MORE) &&
1363c8cd0989STom Herbert 	    rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM))
1364682b1a9dSHannes Frederic Sowa 		csummode = CHECKSUM_PARTIAL;
13651da177e4SLinus Torvalds 
136609c2d251SWillem de Bruijn 	if (sk->sk_type == SOCK_DGRAM || sk->sk_type == SOCK_RAW) {
1367c14ac945SSoheil Hassas Yeganeh 		sock_tx_timestamp(sk, sockc->tsflags, &tx_flags);
136809c2d251SWillem de Bruijn 		if (tx_flags & SKBTX_ANY_SW_TSTAMP &&
136909c2d251SWillem de Bruijn 		    sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID)
137009c2d251SWillem de Bruijn 			tskey = sk->sk_tskey++;
137109c2d251SWillem de Bruijn 	}
1372a693e698SAnders Berggren 
13731da177e4SLinus Torvalds 	/*
13741da177e4SLinus Torvalds 	 * Let's try using as much space as possible.
13751da177e4SLinus Torvalds 	 * Use MTU if total length of the message fits into the MTU.
13761da177e4SLinus Torvalds 	 * Otherwise, we need to reserve fragment header and
13771da177e4SLinus Torvalds 	 * fragment alignment (= 8-15 octects, in total).
13781da177e4SLinus Torvalds 	 *
13791da177e4SLinus Torvalds 	 * Note that we may need to "move" the data from the tail of
13801da177e4SLinus Torvalds 	 * of the buffer to the new fragment when we split
13811da177e4SLinus Torvalds 	 * the message.
13821da177e4SLinus Torvalds 	 *
13831da177e4SLinus Torvalds 	 * FIXME: It may be fragmented into multiple chunks
13841da177e4SLinus Torvalds 	 *        at once if non-fragmentable extension headers
13851da177e4SLinus Torvalds 	 *        are too large.
13861da177e4SLinus Torvalds 	 * --yoshfuji
13871da177e4SLinus Torvalds 	 */
13881da177e4SLinus Torvalds 
13892811ebacSHannes Frederic Sowa 	cork->length += length;
1390e4c5e13aSZheng Li 	if ((((length + fragheaderlen) > mtu) ||
13912811ebacSHannes Frederic Sowa 	     (skb && skb_is_gso(skb))) &&
13922811ebacSHannes Frederic Sowa 	    (sk->sk_protocol == IPPROTO_UDP) &&
13934b3b45edSAlexey Kodanev 	    (rt->dst.dev->features & NETIF_F_UFO) && !dst_xfrm(&rt->dst) &&
139440ba3302SMichal Kubeček 	    (sk->sk_type == SOCK_DGRAM) && !udp_get_no_check6_tx(sk)) {
13950bbe84a6SVlad Yasevich 		err = ip6_ufo_append_data(sk, queue, getfrag, from, length,
13963ba3458fSJakub Sitnicki 					  hh_len, fragheaderlen, exthdrlen,
1397fd0273d7SMartin KaFai Lau 					  transhdrlen, mtu, flags, fl6);
1398baa829d8SPatrick McHardy 		if (err)
1399e89e9cf5SAnanda Raju 			goto error;
1400e89e9cf5SAnanda Raju 		return 0;
1401e89e9cf5SAnanda Raju 	}
14021da177e4SLinus Torvalds 
14032811ebacSHannes Frederic Sowa 	if (!skb)
14041da177e4SLinus Torvalds 		goto alloc_new_skb;
14051da177e4SLinus Torvalds 
14061da177e4SLinus Torvalds 	while (length > 0) {
14071da177e4SLinus Torvalds 		/* Check if the remaining data fits into current packet. */
1408bdc712b4SDavid S. Miller 		copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len;
14091da177e4SLinus Torvalds 		if (copy < length)
14101da177e4SLinus Torvalds 			copy = maxfraglen - skb->len;
14111da177e4SLinus Torvalds 
14121da177e4SLinus Torvalds 		if (copy <= 0) {
14131da177e4SLinus Torvalds 			char *data;
14141da177e4SLinus Torvalds 			unsigned int datalen;
14151da177e4SLinus Torvalds 			unsigned int fraglen;
14161da177e4SLinus Torvalds 			unsigned int fraggap;
14171da177e4SLinus Torvalds 			unsigned int alloclen;
14181da177e4SLinus Torvalds alloc_new_skb:
14191da177e4SLinus Torvalds 			/* There's no room in the current skb */
14200c183379SGao feng 			if (skb)
14210c183379SGao feng 				fraggap = skb->len - maxfraglen;
14221da177e4SLinus Torvalds 			else
14231da177e4SLinus Torvalds 				fraggap = 0;
14240c183379SGao feng 			/* update mtu and maxfraglen if necessary */
142563159f29SIan Morris 			if (!skb || !skb_prev)
14260c183379SGao feng 				ip6_append_data_mtu(&mtu, &maxfraglen,
142775a493e6SHannes Frederic Sowa 						    fragheaderlen, skb, rt,
1428e367c2d0Slucien 						    orig_mtu);
14290c183379SGao feng 
14300c183379SGao feng 			skb_prev = skb;
14311da177e4SLinus Torvalds 
14321da177e4SLinus Torvalds 			/*
14331da177e4SLinus Torvalds 			 * If remaining data exceeds the mtu,
14341da177e4SLinus Torvalds 			 * we know we need more fragment(s).
14351da177e4SLinus Torvalds 			 */
14361da177e4SLinus Torvalds 			datalen = length + fraggap;
14371da177e4SLinus Torvalds 
14380c183379SGao feng 			if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen)
14390c183379SGao feng 				datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len;
14401da177e4SLinus Torvalds 			if ((flags & MSG_MORE) &&
1441d8d1f30bSChangli Gao 			    !(rt->dst.dev->features&NETIF_F_SG))
14421da177e4SLinus Torvalds 				alloclen = mtu;
14431da177e4SLinus Torvalds 			else
14441da177e4SLinus Torvalds 				alloclen = datalen + fragheaderlen;
14451da177e4SLinus Torvalds 
1446299b0767SSteffen Klassert 			alloclen += dst_exthdrlen;
1447299b0767SSteffen Klassert 
14480c183379SGao feng 			if (datalen != length + fraggap) {
14491da177e4SLinus Torvalds 				/*
14500c183379SGao feng 				 * this is not the last fragment, the trailer
14510c183379SGao feng 				 * space is regarded as data space.
14521da177e4SLinus Torvalds 				 */
14530c183379SGao feng 				datalen += rt->dst.trailer_len;
14540c183379SGao feng 			}
14550c183379SGao feng 
1456d8d1f30bSChangli Gao 			alloclen += rt->dst.trailer_len;
14570c183379SGao feng 			fraglen = datalen + fragheaderlen;
14581da177e4SLinus Torvalds 
14591da177e4SLinus Torvalds 			/*
14601da177e4SLinus Torvalds 			 * We just reserve space for fragment header.
14611da177e4SLinus Torvalds 			 * Note: this may be overallocation if the message
14621da177e4SLinus Torvalds 			 * (without MSG_MORE) fits into the MTU.
14631da177e4SLinus Torvalds 			 */
14641da177e4SLinus Torvalds 			alloclen += sizeof(struct frag_hdr);
14651da177e4SLinus Torvalds 
14661da177e4SLinus Torvalds 			if (transhdrlen) {
14671da177e4SLinus Torvalds 				skb = sock_alloc_send_skb(sk,
14681da177e4SLinus Torvalds 						alloclen + hh_len,
14691da177e4SLinus Torvalds 						(flags & MSG_DONTWAIT), &err);
14701da177e4SLinus Torvalds 			} else {
14711da177e4SLinus Torvalds 				skb = NULL;
14721da177e4SLinus Torvalds 				if (atomic_read(&sk->sk_wmem_alloc) <=
14731da177e4SLinus Torvalds 				    2 * sk->sk_sndbuf)
14741da177e4SLinus Torvalds 					skb = sock_wmalloc(sk,
14751da177e4SLinus Torvalds 							   alloclen + hh_len, 1,
14761da177e4SLinus Torvalds 							   sk->sk_allocation);
147763159f29SIan Morris 				if (unlikely(!skb))
14781da177e4SLinus Torvalds 					err = -ENOBUFS;
14791da177e4SLinus Torvalds 			}
148063159f29SIan Morris 			if (!skb)
14811da177e4SLinus Torvalds 				goto error;
14821da177e4SLinus Torvalds 			/*
14831da177e4SLinus Torvalds 			 *	Fill in the control structures
14841da177e4SLinus Torvalds 			 */
14859c9c9ad5SHannes Frederic Sowa 			skb->protocol = htons(ETH_P_IPV6);
148632dce968SVlad Yasevich 			skb->ip_summed = csummode;
14871da177e4SLinus Torvalds 			skb->csum = 0;
14881f85851eSGao feng 			/* reserve for fragmentation and ipsec header */
14891f85851eSGao feng 			skb_reserve(skb, hh_len + sizeof(struct frag_hdr) +
14901f85851eSGao feng 				    dst_exthdrlen);
14911da177e4SLinus Torvalds 
149211878b40SWillem de Bruijn 			/* Only the initial fragment is time stamped */
1493a693e698SAnders Berggren 			skb_shinfo(skb)->tx_flags = tx_flags;
149411878b40SWillem de Bruijn 			tx_flags = 0;
149509c2d251SWillem de Bruijn 			skb_shinfo(skb)->tskey = tskey;
149609c2d251SWillem de Bruijn 			tskey = 0;
1497a693e698SAnders Berggren 
14981da177e4SLinus Torvalds 			/*
14991da177e4SLinus Torvalds 			 *	Find where to start putting bytes
15001da177e4SLinus Torvalds 			 */
15011f85851eSGao feng 			data = skb_put(skb, fraglen);
15021f85851eSGao feng 			skb_set_network_header(skb, exthdrlen);
15031f85851eSGao feng 			data += fragheaderlen;
1504b0e380b1SArnaldo Carvalho de Melo 			skb->transport_header = (skb->network_header +
1505b0e380b1SArnaldo Carvalho de Melo 						 fragheaderlen);
15061da177e4SLinus Torvalds 			if (fraggap) {
15071da177e4SLinus Torvalds 				skb->csum = skb_copy_and_csum_bits(
15081da177e4SLinus Torvalds 					skb_prev, maxfraglen,
15091da177e4SLinus Torvalds 					data + transhdrlen, fraggap, 0);
15101da177e4SLinus Torvalds 				skb_prev->csum = csum_sub(skb_prev->csum,
15111da177e4SLinus Torvalds 							  skb->csum);
15121da177e4SLinus Torvalds 				data += fraggap;
1513e9fa4f7bSHerbert Xu 				pskb_trim_unique(skb_prev, maxfraglen);
15141da177e4SLinus Torvalds 			}
15151da177e4SLinus Torvalds 			copy = datalen - transhdrlen - fraggap;
1516299b0767SSteffen Klassert 
15171da177e4SLinus Torvalds 			if (copy < 0) {
15181da177e4SLinus Torvalds 				err = -EINVAL;
15191da177e4SLinus Torvalds 				kfree_skb(skb);
15201da177e4SLinus Torvalds 				goto error;
15211da177e4SLinus Torvalds 			} else if (copy > 0 && getfrag(from, data + transhdrlen, offset, copy, fraggap, skb) < 0) {
15221da177e4SLinus Torvalds 				err = -EFAULT;
15231da177e4SLinus Torvalds 				kfree_skb(skb);
15241da177e4SLinus Torvalds 				goto error;
15251da177e4SLinus Torvalds 			}
15261da177e4SLinus Torvalds 
15271da177e4SLinus Torvalds 			offset += copy;
15281da177e4SLinus Torvalds 			length -= datalen - fraggap;
15291da177e4SLinus Torvalds 			transhdrlen = 0;
15301da177e4SLinus Torvalds 			exthdrlen = 0;
1531299b0767SSteffen Klassert 			dst_exthdrlen = 0;
15321da177e4SLinus Torvalds 
15330dec879fSJulian Anastasov 			if ((flags & MSG_CONFIRM) && !skb_prev)
15340dec879fSJulian Anastasov 				skb_set_dst_pending_confirm(skb, 1);
15350dec879fSJulian Anastasov 
15361da177e4SLinus Torvalds 			/*
15371da177e4SLinus Torvalds 			 * Put the packet on the pending queue
15381da177e4SLinus Torvalds 			 */
15390bbe84a6SVlad Yasevich 			__skb_queue_tail(queue, skb);
15401da177e4SLinus Torvalds 			continue;
15411da177e4SLinus Torvalds 		}
15421da177e4SLinus Torvalds 
15431da177e4SLinus Torvalds 		if (copy > length)
15441da177e4SLinus Torvalds 			copy = length;
15451da177e4SLinus Torvalds 
1546d8d1f30bSChangli Gao 		if (!(rt->dst.dev->features&NETIF_F_SG)) {
15471da177e4SLinus Torvalds 			unsigned int off;
15481da177e4SLinus Torvalds 
15491da177e4SLinus Torvalds 			off = skb->len;
15501da177e4SLinus Torvalds 			if (getfrag(from, skb_put(skb, copy),
15511da177e4SLinus Torvalds 						offset, copy, off, skb) < 0) {
15521da177e4SLinus Torvalds 				__skb_trim(skb, off);
15531da177e4SLinus Torvalds 				err = -EFAULT;
15541da177e4SLinus Torvalds 				goto error;
15551da177e4SLinus Torvalds 			}
15561da177e4SLinus Torvalds 		} else {
15571da177e4SLinus Torvalds 			int i = skb_shinfo(skb)->nr_frags;
15581da177e4SLinus Torvalds 
15591da177e4SLinus Torvalds 			err = -ENOMEM;
15605640f768SEric Dumazet 			if (!sk_page_frag_refill(sk, pfrag))
15611da177e4SLinus Torvalds 				goto error;
15621da177e4SLinus Torvalds 
15635640f768SEric Dumazet 			if (!skb_can_coalesce(skb, i, pfrag->page,
15645640f768SEric Dumazet 					      pfrag->offset)) {
15651da177e4SLinus Torvalds 				err = -EMSGSIZE;
15665640f768SEric Dumazet 				if (i == MAX_SKB_FRAGS)
15671da177e4SLinus Torvalds 					goto error;
15685640f768SEric Dumazet 
15695640f768SEric Dumazet 				__skb_fill_page_desc(skb, i, pfrag->page,
15705640f768SEric Dumazet 						     pfrag->offset, 0);
15715640f768SEric Dumazet 				skb_shinfo(skb)->nr_frags = ++i;
15725640f768SEric Dumazet 				get_page(pfrag->page);
15731da177e4SLinus Torvalds 			}
15745640f768SEric Dumazet 			copy = min_t(int, copy, pfrag->size - pfrag->offset);
15759e903e08SEric Dumazet 			if (getfrag(from,
15765640f768SEric Dumazet 				    page_address(pfrag->page) + pfrag->offset,
15775640f768SEric Dumazet 				    offset, copy, skb->len, skb) < 0)
15785640f768SEric Dumazet 				goto error_efault;
15795640f768SEric Dumazet 
15805640f768SEric Dumazet 			pfrag->offset += copy;
15815640f768SEric Dumazet 			skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy);
15821da177e4SLinus Torvalds 			skb->len += copy;
15831da177e4SLinus Torvalds 			skb->data_len += copy;
1584f945fa7aSHerbert Xu 			skb->truesize += copy;
1585f945fa7aSHerbert Xu 			atomic_add(copy, &sk->sk_wmem_alloc);
15861da177e4SLinus Torvalds 		}
15871da177e4SLinus Torvalds 		offset += copy;
15881da177e4SLinus Torvalds 		length -= copy;
15891da177e4SLinus Torvalds 	}
15905640f768SEric Dumazet 
15911da177e4SLinus Torvalds 	return 0;
15925640f768SEric Dumazet 
15935640f768SEric Dumazet error_efault:
15945640f768SEric Dumazet 	err = -EFAULT;
15951da177e4SLinus Torvalds error:
1596bdc712b4SDavid S. Miller 	cork->length -= length;
15973bd653c8SDenis V. Lunev 	IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS);
15981da177e4SLinus Torvalds 	return err;
15991da177e4SLinus Torvalds }
16000bbe84a6SVlad Yasevich 
16010bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk,
16020bbe84a6SVlad Yasevich 		    int getfrag(void *from, char *to, int offset, int len,
16030bbe84a6SVlad Yasevich 				int odd, struct sk_buff *skb),
160426879da5SWei Wang 		    void *from, int length, int transhdrlen,
160526879da5SWei Wang 		    struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
160626879da5SWei Wang 		    struct rt6_info *rt, unsigned int flags,
1607c14ac945SSoheil Hassas Yeganeh 		    const struct sockcm_cookie *sockc)
16080bbe84a6SVlad Yasevich {
16090bbe84a6SVlad Yasevich 	struct inet_sock *inet = inet_sk(sk);
16100bbe84a6SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
16110bbe84a6SVlad Yasevich 	int exthdrlen;
16120bbe84a6SVlad Yasevich 	int err;
16130bbe84a6SVlad Yasevich 
16140bbe84a6SVlad Yasevich 	if (flags&MSG_PROBE)
16150bbe84a6SVlad Yasevich 		return 0;
16160bbe84a6SVlad Yasevich 	if (skb_queue_empty(&sk->sk_write_queue)) {
16170bbe84a6SVlad Yasevich 		/*
16180bbe84a6SVlad Yasevich 		 * setup for corking
16190bbe84a6SVlad Yasevich 		 */
162026879da5SWei Wang 		err = ip6_setup_cork(sk, &inet->cork, &np->cork,
162126879da5SWei Wang 				     ipc6, rt, fl6);
16220bbe84a6SVlad Yasevich 		if (err)
16230bbe84a6SVlad Yasevich 			return err;
16240bbe84a6SVlad Yasevich 
162526879da5SWei Wang 		exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
16260bbe84a6SVlad Yasevich 		length += exthdrlen;
16270bbe84a6SVlad Yasevich 		transhdrlen += exthdrlen;
16280bbe84a6SVlad Yasevich 	} else {
16290bbe84a6SVlad Yasevich 		fl6 = &inet->cork.fl.u.ip6;
16300bbe84a6SVlad Yasevich 		transhdrlen = 0;
16310bbe84a6SVlad Yasevich 	}
16320bbe84a6SVlad Yasevich 
16330bbe84a6SVlad Yasevich 	return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base,
16340bbe84a6SVlad Yasevich 				 &np->cork, sk_page_frag(sk), getfrag,
163526879da5SWei Wang 				 from, length, transhdrlen, flags, ipc6, sockc);
16360bbe84a6SVlad Yasevich }
1637a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data);
16381da177e4SLinus Torvalds 
1639366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork,
1640366e41d9SVlad Yasevich 			     struct inet6_cork *v6_cork)
1641bf138862SPavel Emelyanov {
1642366e41d9SVlad Yasevich 	if (v6_cork->opt) {
1643366e41d9SVlad Yasevich 		kfree(v6_cork->opt->dst0opt);
1644366e41d9SVlad Yasevich 		kfree(v6_cork->opt->dst1opt);
1645366e41d9SVlad Yasevich 		kfree(v6_cork->opt->hopopt);
1646366e41d9SVlad Yasevich 		kfree(v6_cork->opt->srcrt);
1647366e41d9SVlad Yasevich 		kfree(v6_cork->opt);
1648366e41d9SVlad Yasevich 		v6_cork->opt = NULL;
16490178b695SHerbert Xu 	}
16500178b695SHerbert Xu 
1651366e41d9SVlad Yasevich 	if (cork->base.dst) {
1652366e41d9SVlad Yasevich 		dst_release(cork->base.dst);
1653366e41d9SVlad Yasevich 		cork->base.dst = NULL;
1654366e41d9SVlad Yasevich 		cork->base.flags &= ~IPCORK_ALLFRAG;
1655bf138862SPavel Emelyanov 	}
1656366e41d9SVlad Yasevich 	memset(&cork->fl, 0, sizeof(cork->fl));
1657bf138862SPavel Emelyanov }
1658bf138862SPavel Emelyanov 
16596422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk,
16606422398cSVlad Yasevich 			       struct sk_buff_head *queue,
16616422398cSVlad Yasevich 			       struct inet_cork_full *cork,
16626422398cSVlad Yasevich 			       struct inet6_cork *v6_cork)
16631da177e4SLinus Torvalds {
16641da177e4SLinus Torvalds 	struct sk_buff *skb, *tmp_skb;
16651da177e4SLinus Torvalds 	struct sk_buff **tail_skb;
16661da177e4SLinus Torvalds 	struct in6_addr final_dst_buf, *final_dst = &final_dst_buf;
16671da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
16683bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
16691da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
16706422398cSVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
16716422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->base.dst;
16726422398cSVlad Yasevich 	struct flowi6 *fl6 = &cork->fl.u.ip6;
16734c9483b2SDavid S. Miller 	unsigned char proto = fl6->flowi6_proto;
16741da177e4SLinus Torvalds 
16756422398cSVlad Yasevich 	skb = __skb_dequeue(queue);
167663159f29SIan Morris 	if (!skb)
16771da177e4SLinus Torvalds 		goto out;
16781da177e4SLinus Torvalds 	tail_skb = &(skb_shinfo(skb)->frag_list);
16791da177e4SLinus Torvalds 
16801da177e4SLinus Torvalds 	/* move skb->data to ip header from ext header */
1681d56f90a7SArnaldo Carvalho de Melo 	if (skb->data < skb_network_header(skb))
1682bbe735e4SArnaldo Carvalho de Melo 		__skb_pull(skb, skb_network_offset(skb));
16836422398cSVlad Yasevich 	while ((tmp_skb = __skb_dequeue(queue)) != NULL) {
1684cfe1fc77SArnaldo Carvalho de Melo 		__skb_pull(tmp_skb, skb_network_header_len(skb));
16851da177e4SLinus Torvalds 		*tail_skb = tmp_skb;
16861da177e4SLinus Torvalds 		tail_skb = &(tmp_skb->next);
16871da177e4SLinus Torvalds 		skb->len += tmp_skb->len;
16881da177e4SLinus Torvalds 		skb->data_len += tmp_skb->len;
16891da177e4SLinus Torvalds 		skb->truesize += tmp_skb->truesize;
16901da177e4SLinus Torvalds 		tmp_skb->destructor = NULL;
16911da177e4SLinus Torvalds 		tmp_skb->sk = NULL;
16921da177e4SLinus Torvalds 	}
16931da177e4SLinus Torvalds 
169428a89453SHerbert Xu 	/* Allow local fragmentation. */
169560ff7467SWANG Cong 	skb->ignore_df = ip6_sk_ignore_df(sk);
169628a89453SHerbert Xu 
16974e3fd7a0SAlexey Dobriyan 	*final_dst = fl6->daddr;
1698cfe1fc77SArnaldo Carvalho de Melo 	__skb_pull(skb, skb_network_header_len(skb));
16991da177e4SLinus Torvalds 	if (opt && opt->opt_flen)
17001da177e4SLinus Torvalds 		ipv6_push_frag_opts(skb, opt, &proto);
17011da177e4SLinus Torvalds 	if (opt && opt->opt_nflen)
1702613fa3caSDavid Lebrun 		ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr);
17031da177e4SLinus Torvalds 
1704e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
1705e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
17060660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
17071da177e4SLinus Torvalds 
17086422398cSVlad Yasevich 	ip6_flow_hdr(hdr, v6_cork->tclass,
1709cb1ce2efSTom Herbert 		     ip6_make_flowlabel(net, skb, fl6->flowlabel,
171067800f9bSTom Herbert 					np->autoflowlabel, fl6));
17116422398cSVlad Yasevich 	hdr->hop_limit = v6_cork->hop_limit;
17121da177e4SLinus Torvalds 	hdr->nexthdr = proto;
17134e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
17144e3fd7a0SAlexey Dobriyan 	hdr->daddr = *final_dst;
17151da177e4SLinus Torvalds 
1716a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
17174a19ec58SLaszlo Attila Toth 	skb->mark = sk->sk_mark;
1718a2c2064fSPatrick McHardy 
1719d8d1f30bSChangli Gao 	skb_dst_set(skb, dst_clone(&rt->dst));
1720edf391ffSNeil Horman 	IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len);
172114878f75SDavid L Stevens 	if (proto == IPPROTO_ICMPV6) {
1722adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
172314878f75SDavid L Stevens 
172443a43b60SHannes Frederic Sowa 		ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type);
172543a43b60SHannes Frederic Sowa 		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
172614878f75SDavid L Stevens 	}
172714878f75SDavid L Stevens 
17286422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
17296422398cSVlad Yasevich out:
17306422398cSVlad Yasevich 	return skb;
17316422398cSVlad Yasevich }
17326422398cSVlad Yasevich 
17336422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb)
17346422398cSVlad Yasevich {
17356422398cSVlad Yasevich 	struct net *net = sock_net(skb->sk);
17366422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
17376422398cSVlad Yasevich 	int err;
17386422398cSVlad Yasevich 
173933224b16SEric W. Biederman 	err = ip6_local_out(net, skb->sk, skb);
17401da177e4SLinus Torvalds 	if (err) {
17411da177e4SLinus Torvalds 		if (err > 0)
17426ce9e7b5SEric Dumazet 			err = net_xmit_errno(err);
17431da177e4SLinus Torvalds 		if (err)
17446422398cSVlad Yasevich 			IP6_INC_STATS(net, rt->rt6i_idev,
17456422398cSVlad Yasevich 				      IPSTATS_MIB_OUTDISCARDS);
17461da177e4SLinus Torvalds 	}
17471da177e4SLinus Torvalds 
17481da177e4SLinus Torvalds 	return err;
17496422398cSVlad Yasevich }
17506422398cSVlad Yasevich 
17516422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk)
17526422398cSVlad Yasevich {
17536422398cSVlad Yasevich 	struct sk_buff *skb;
17546422398cSVlad Yasevich 
17556422398cSVlad Yasevich 	skb = ip6_finish_skb(sk);
17566422398cSVlad Yasevich 	if (!skb)
17576422398cSVlad Yasevich 		return 0;
17586422398cSVlad Yasevich 
17596422398cSVlad Yasevich 	return ip6_send_skb(skb);
17601da177e4SLinus Torvalds }
1761a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames);
17621da177e4SLinus Torvalds 
17630bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk,
17646422398cSVlad Yasevich 				       struct sk_buff_head *queue,
17656422398cSVlad Yasevich 				       struct inet_cork_full *cork,
17666422398cSVlad Yasevich 				       struct inet6_cork *v6_cork)
17671da177e4SLinus Torvalds {
17681da177e4SLinus Torvalds 	struct sk_buff *skb;
17691da177e4SLinus Torvalds 
17700bbe84a6SVlad Yasevich 	while ((skb = __skb_dequeue_tail(queue)) != NULL) {
1771adf30907SEric Dumazet 		if (skb_dst(skb))
1772adf30907SEric Dumazet 			IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)),
1773a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_OUTDISCARDS);
17741da177e4SLinus Torvalds 		kfree_skb(skb);
17751da177e4SLinus Torvalds 	}
17761da177e4SLinus Torvalds 
17776422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
17781da177e4SLinus Torvalds }
17790bbe84a6SVlad Yasevich 
17800bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk)
17810bbe84a6SVlad Yasevich {
17826422398cSVlad Yasevich 	__ip6_flush_pending_frames(sk, &sk->sk_write_queue,
17836422398cSVlad Yasevich 				   &inet_sk(sk)->cork, &inet6_sk(sk)->cork);
17840bbe84a6SVlad Yasevich }
1785a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames);
17866422398cSVlad Yasevich 
17876422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk,
17886422398cSVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
17896422398cSVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
17906422398cSVlad Yasevich 			     void *from, int length, int transhdrlen,
179126879da5SWei Wang 			     struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
17926422398cSVlad Yasevich 			     struct rt6_info *rt, unsigned int flags,
179326879da5SWei Wang 			     const struct sockcm_cookie *sockc)
17946422398cSVlad Yasevich {
17956422398cSVlad Yasevich 	struct inet_cork_full cork;
17966422398cSVlad Yasevich 	struct inet6_cork v6_cork;
17976422398cSVlad Yasevich 	struct sk_buff_head queue;
179826879da5SWei Wang 	int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
17996422398cSVlad Yasevich 	int err;
18006422398cSVlad Yasevich 
18016422398cSVlad Yasevich 	if (flags & MSG_PROBE)
18026422398cSVlad Yasevich 		return NULL;
18036422398cSVlad Yasevich 
18046422398cSVlad Yasevich 	__skb_queue_head_init(&queue);
18056422398cSVlad Yasevich 
18066422398cSVlad Yasevich 	cork.base.flags = 0;
18076422398cSVlad Yasevich 	cork.base.addr = 0;
18086422398cSVlad Yasevich 	cork.base.opt = NULL;
18096422398cSVlad Yasevich 	v6_cork.opt = NULL;
181026879da5SWei Wang 	err = ip6_setup_cork(sk, &cork, &v6_cork, ipc6, rt, fl6);
18116422398cSVlad Yasevich 	if (err)
18126422398cSVlad Yasevich 		return ERR_PTR(err);
18136422398cSVlad Yasevich 
181426879da5SWei Wang 	if (ipc6->dontfrag < 0)
181526879da5SWei Wang 		ipc6->dontfrag = inet6_sk(sk)->dontfrag;
18166422398cSVlad Yasevich 
18176422398cSVlad Yasevich 	err = __ip6_append_data(sk, fl6, &queue, &cork.base, &v6_cork,
18186422398cSVlad Yasevich 				&current->task_frag, getfrag, from,
18196422398cSVlad Yasevich 				length + exthdrlen, transhdrlen + exthdrlen,
182026879da5SWei Wang 				flags, ipc6, sockc);
18216422398cSVlad Yasevich 	if (err) {
18226422398cSVlad Yasevich 		__ip6_flush_pending_frames(sk, &queue, &cork, &v6_cork);
18236422398cSVlad Yasevich 		return ERR_PTR(err);
18246422398cSVlad Yasevich 	}
18256422398cSVlad Yasevich 
18266422398cSVlad Yasevich 	return __ip6_make_skb(sk, &queue, &cork, &v6_cork);
18276422398cSVlad Yasevich }
1828