xref: /openbmc/linux/net/ipv6/ip6_output.c (revision 8203e2d844d34af247a151d8ebd68553a6e91785)
11da177e4SLinus Torvalds /*
21da177e4SLinus Torvalds  *	IPv6 output functions
31da177e4SLinus Torvalds  *	Linux INET6 implementation
41da177e4SLinus Torvalds  *
51da177e4SLinus Torvalds  *	Authors:
61da177e4SLinus Torvalds  *	Pedro Roque		<roque@di.fc.ul.pt>
71da177e4SLinus Torvalds  *
81da177e4SLinus Torvalds  *	Based on linux/net/ipv4/ip_output.c
91da177e4SLinus Torvalds  *
101da177e4SLinus Torvalds  *	This program is free software; you can redistribute it and/or
111da177e4SLinus Torvalds  *      modify it under the terms of the GNU General Public License
121da177e4SLinus Torvalds  *      as published by the Free Software Foundation; either version
131da177e4SLinus Torvalds  *      2 of the License, or (at your option) any later version.
141da177e4SLinus Torvalds  *
151da177e4SLinus Torvalds  *	Changes:
161da177e4SLinus Torvalds  *	A.N.Kuznetsov	:	airthmetics in fragmentation.
171da177e4SLinus Torvalds  *				extension headers are implemented.
181da177e4SLinus Torvalds  *				route changes now work.
191da177e4SLinus Torvalds  *				ip6_forward does not confuse sniffers.
201da177e4SLinus Torvalds  *				etc.
211da177e4SLinus Torvalds  *
221da177e4SLinus Torvalds  *      H. von Brand    :       Added missing #include <linux/string.h>
231da177e4SLinus Torvalds  *	Imran Patel	:	frag id should be in NBO
241da177e4SLinus Torvalds  *      Kazunori MIYAZAWA @USAGI
251da177e4SLinus Torvalds  *			:       add ip6_append_data and related functions
261da177e4SLinus Torvalds  *				for datagram xmit
271da177e4SLinus Torvalds  */
281da177e4SLinus Torvalds 
291da177e4SLinus Torvalds #include <linux/errno.h>
30ef76bc23SHerbert Xu #include <linux/kernel.h>
311da177e4SLinus Torvalds #include <linux/string.h>
321da177e4SLinus Torvalds #include <linux/socket.h>
331da177e4SLinus Torvalds #include <linux/net.h>
341da177e4SLinus Torvalds #include <linux/netdevice.h>
351da177e4SLinus Torvalds #include <linux/if_arp.h>
361da177e4SLinus Torvalds #include <linux/in6.h>
371da177e4SLinus Torvalds #include <linux/tcp.h>
381da177e4SLinus Torvalds #include <linux/route.h>
39b59f45d0SHerbert Xu #include <linux/module.h>
405a0e3ad6STejun Heo #include <linux/slab.h>
411da177e4SLinus Torvalds 
4233b48679SDaniel Mack #include <linux/bpf-cgroup.h>
431da177e4SLinus Torvalds #include <linux/netfilter.h>
441da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h>
451da177e4SLinus Torvalds 
461da177e4SLinus Torvalds #include <net/sock.h>
471da177e4SLinus Torvalds #include <net/snmp.h>
481da177e4SLinus Torvalds 
491da177e4SLinus Torvalds #include <net/ipv6.h>
501da177e4SLinus Torvalds #include <net/ndisc.h>
511da177e4SLinus Torvalds #include <net/protocol.h>
521da177e4SLinus Torvalds #include <net/ip6_route.h>
531da177e4SLinus Torvalds #include <net/addrconf.h>
541da177e4SLinus Torvalds #include <net/rawv6.h>
551da177e4SLinus Torvalds #include <net/icmp.h>
561da177e4SLinus Torvalds #include <net/xfrm.h>
571da177e4SLinus Torvalds #include <net/checksum.h>
587bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h>
59ca254490SDavid Ahern #include <net/l3mdev.h>
6014972cbdSRoopa Prabhu #include <net/lwtunnel.h>
611da177e4SLinus Torvalds 
627d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb)
631da177e4SLinus Torvalds {
64adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
651da177e4SLinus Torvalds 	struct net_device *dev = dst->dev;
66f6b72b62SDavid S. Miller 	struct neighbour *neigh;
676fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	struct in6_addr *nexthop;
686fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	int ret;
691da177e4SLinus Torvalds 
700660e03fSArnaldo Carvalho de Melo 	if (ipv6_addr_is_multicast(&ipv6_hdr(skb)->daddr)) {
71adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
721da177e4SLinus Torvalds 
737026b1ddSDavid Miller 		if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) &&
748571ab47SYuval Mintz 		    ((mroute6_is_socket(net, skb) &&
75bd91b8bfSBenjamin Thery 		     !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) ||
760660e03fSArnaldo Carvalho de Melo 		     ipv6_chk_mcast_addr(dev, &ipv6_hdr(skb)->daddr,
777bc570c8SYOSHIFUJI Hideaki 					 &ipv6_hdr(skb)->saddr))) {
781da177e4SLinus Torvalds 			struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC);
791da177e4SLinus Torvalds 
801da177e4SLinus Torvalds 			/* Do not check for IFF_ALLMULTI; multicast routing
811da177e4SLinus Torvalds 			   is not supported in any case.
821da177e4SLinus Torvalds 			 */
831da177e4SLinus Torvalds 			if (newskb)
84b2e0b385SJan Engelhardt 				NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING,
8529a26a56SEric W. Biederman 					net, sk, newskb, NULL, newskb->dev,
8695603e22SMichel Machado 					dev_loopback_xmit);
871da177e4SLinus Torvalds 
880660e03fSArnaldo Carvalho de Melo 			if (ipv6_hdr(skb)->hop_limit == 0) {
8978126c41SEric W. Biederman 				IP6_INC_STATS(net, idev,
903bd653c8SDenis V. Lunev 					      IPSTATS_MIB_OUTDISCARDS);
911da177e4SLinus Torvalds 				kfree_skb(skb);
921da177e4SLinus Torvalds 				return 0;
931da177e4SLinus Torvalds 			}
941da177e4SLinus Torvalds 		}
951da177e4SLinus Torvalds 
9678126c41SEric W. Biederman 		IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len);
97dd408515SHannes Frederic Sowa 
98dd408515SHannes Frederic Sowa 		if (IPV6_ADDR_MC_SCOPE(&ipv6_hdr(skb)->daddr) <=
99dd408515SHannes Frederic Sowa 		    IPV6_ADDR_SCOPE_NODELOCAL &&
100dd408515SHannes Frederic Sowa 		    !(dev->flags & IFF_LOOPBACK)) {
101dd408515SHannes Frederic Sowa 			kfree_skb(skb);
102dd408515SHannes Frederic Sowa 			return 0;
103dd408515SHannes Frederic Sowa 		}
1041da177e4SLinus Torvalds 	}
1051da177e4SLinus Torvalds 
10614972cbdSRoopa Prabhu 	if (lwtunnel_xmit_redirect(dst->lwtstate)) {
10714972cbdSRoopa Prabhu 		int res = lwtunnel_xmit(skb);
10814972cbdSRoopa Prabhu 
10914972cbdSRoopa Prabhu 		if (res < 0 || res == LWTUNNEL_XMIT_DONE)
11014972cbdSRoopa Prabhu 			return res;
11114972cbdSRoopa Prabhu 	}
11214972cbdSRoopa Prabhu 
1136fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
1142647a9b0SMartin KaFai Lau 	nexthop = rt6_nexthop((struct rt6_info *)dst, &ipv6_hdr(skb)->daddr);
1156fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	neigh = __ipv6_neigh_lookup_noref(dst->dev, nexthop);
1166fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(!neigh))
1176fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		neigh = __neigh_create(&nd_tbl, nexthop, dst->dev, false);
1186fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	if (!IS_ERR(neigh)) {
1194ff06203SJulian Anastasov 		sock_confirm_neigh(skb, neigh);
120c16ec185SJulian Anastasov 		ret = neigh_output(neigh, skb);
1216fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		rcu_read_unlock_bh();
1226fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		return ret;
1236fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	}
1246fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
12505e3aa09SDavid S. Miller 
12678126c41SEric W. Biederman 	IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTNOROUTES);
1279e508490SJan Engelhardt 	kfree_skb(skb);
1289e508490SJan Engelhardt 	return -EINVAL;
1291da177e4SLinus Torvalds }
1301da177e4SLinus Torvalds 
1310c4b51f0SEric W. Biederman static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1329e508490SJan Engelhardt {
13333b48679SDaniel Mack 	int ret;
13433b48679SDaniel Mack 
13533b48679SDaniel Mack 	ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb);
13633b48679SDaniel Mack 	if (ret) {
13733b48679SDaniel Mack 		kfree_skb(skb);
13833b48679SDaniel Mack 		return ret;
13933b48679SDaniel Mack 	}
14033b48679SDaniel Mack 
14109ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM)
14209ee9dbaSTobias Brunner 	/* Policy lookup after SNAT yielded a new policy */
14309ee9dbaSTobias Brunner 	if (skb_dst(skb)->xfrm) {
14409ee9dbaSTobias Brunner 		IPCB(skb)->flags |= IPSKB_REROUTED;
14509ee9dbaSTobias Brunner 		return dst_output(net, sk, skb);
14609ee9dbaSTobias Brunner 	}
14709ee9dbaSTobias Brunner #endif
14809ee9dbaSTobias Brunner 
1499e508490SJan Engelhardt 	if ((skb->len > ip6_skb_dst_mtu(skb) && !skb_is_gso(skb)) ||
1509037c357SJiri Pirko 	    dst_allfrag(skb_dst(skb)) ||
1519037c357SJiri Pirko 	    (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size))
1527d8c6e39SEric W. Biederman 		return ip6_fragment(net, sk, skb, ip6_finish_output2);
1539e508490SJan Engelhardt 	else
1547d8c6e39SEric W. Biederman 		return ip6_finish_output2(net, sk, skb);
1559e508490SJan Engelhardt }
1569e508490SJan Engelhardt 
157ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1581da177e4SLinus Torvalds {
1599e508490SJan Engelhardt 	struct net_device *dev = skb_dst(skb)->dev;
160adf30907SEric Dumazet 	struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
161be10de0aSEric W. Biederman 
16297a7a37aSChenbo Feng 	skb->protocol = htons(ETH_P_IPV6);
16397a7a37aSChenbo Feng 	skb->dev = dev;
16497a7a37aSChenbo Feng 
165778d80beSYOSHIFUJI Hideaki 	if (unlikely(idev->cnf.disable_ipv6)) {
16619a0644cSEric W. Biederman 		IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
167778d80beSYOSHIFUJI Hideaki 		kfree_skb(skb);
168778d80beSYOSHIFUJI Hideaki 		return 0;
169778d80beSYOSHIFUJI Hideaki 	}
170778d80beSYOSHIFUJI Hideaki 
17129a26a56SEric W. Biederman 	return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
17229a26a56SEric W. Biederman 			    net, sk, skb, NULL, dev,
1739c6eb28aSJan Engelhardt 			    ip6_finish_output,
1749c6eb28aSJan Engelhardt 			    !(IP6CB(skb)->flags & IP6SKB_REROUTED));
1751da177e4SLinus Torvalds }
1761da177e4SLinus Torvalds 
177e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np)
178513674b5SShaohua Li {
179513674b5SShaohua Li 	if (!np->autoflowlabel_set)
180513674b5SShaohua Li 		return ip6_default_np_autolabel(net);
181513674b5SShaohua Li 	else
182513674b5SShaohua Li 		return np->autoflowlabel;
183513674b5SShaohua Li }
184513674b5SShaohua Li 
1851da177e4SLinus Torvalds /*
186b5d43998SShan Wei  * xmit an sk_buff (used by TCP, SCTP and DCCP)
1871c1e9d2bSEric Dumazet  * Note : socket lock is not held for SYNACK packets, but might be modified
1881c1e9d2bSEric Dumazet  * by calls to skb_set_owner_w() and ipv6_local_error(),
1891c1e9d2bSEric Dumazet  * which are using proper atomic operations or spinlocks.
1901da177e4SLinus Torvalds  */
1911c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6,
19292e55f41SPablo Neira 	     __u32 mark, struct ipv6_txoptions *opt, int tclass)
1931da177e4SLinus Torvalds {
1943bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
1951c1e9d2bSEric Dumazet 	const struct ipv6_pinfo *np = inet6_sk(sk);
1964c9483b2SDavid S. Miller 	struct in6_addr *first_hop = &fl6->daddr;
197adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
19866033f47SStefano Brivio 	unsigned int head_room;
1991da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
2004c9483b2SDavid S. Miller 	u8  proto = fl6->flowi6_proto;
2011da177e4SLinus Torvalds 	int seg_len = skb->len;
202e651f03aSGerrit Renker 	int hlimit = -1;
2031da177e4SLinus Torvalds 	u32 mtu;
2041da177e4SLinus Torvalds 
20566033f47SStefano Brivio 	head_room = sizeof(struct ipv6hdr) + LL_RESERVED_SPACE(dst->dev);
20666033f47SStefano Brivio 	if (opt)
20766033f47SStefano Brivio 		head_room += opt->opt_nflen + opt->opt_flen;
2081da177e4SLinus Torvalds 
20966033f47SStefano Brivio 	if (unlikely(skb_headroom(skb) < head_room)) {
2101da177e4SLinus Torvalds 		struct sk_buff *skb2 = skb_realloc_headroom(skb, head_room);
21163159f29SIan Morris 		if (!skb2) {
212adf30907SEric Dumazet 			IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
213a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_OUTDISCARDS);
2141da177e4SLinus Torvalds 			kfree_skb(skb);
2151da177e4SLinus Torvalds 			return -ENOBUFS;
2161da177e4SLinus Torvalds 		}
217bbd6528dSEric Dumazet 		if (skb->sk)
218bbd6528dSEric Dumazet 			skb_set_owner_w(skb2, skb->sk);
219808db80aSEric Dumazet 		consume_skb(skb);
220a11d206dSYOSHIFUJI Hideaki 		skb = skb2;
2211da177e4SLinus Torvalds 	}
22266033f47SStefano Brivio 
22366033f47SStefano Brivio 	if (opt) {
22466033f47SStefano Brivio 		seg_len += opt->opt_nflen + opt->opt_flen;
22566033f47SStefano Brivio 
2261da177e4SLinus Torvalds 		if (opt->opt_flen)
2271da177e4SLinus Torvalds 			ipv6_push_frag_opts(skb, opt, &proto);
22866033f47SStefano Brivio 
2291da177e4SLinus Torvalds 		if (opt->opt_nflen)
230613fa3caSDavid Lebrun 			ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop,
231613fa3caSDavid Lebrun 					     &fl6->saddr);
2321da177e4SLinus Torvalds 	}
2331da177e4SLinus Torvalds 
234e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
235e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
2360660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
2371da177e4SLinus Torvalds 
2381da177e4SLinus Torvalds 	/*
2391da177e4SLinus Torvalds 	 *	Fill in the IPv6 header
2401da177e4SLinus Torvalds 	 */
241b903d324SEric Dumazet 	if (np)
2421da177e4SLinus Torvalds 		hlimit = np->hop_limit;
2431da177e4SLinus Torvalds 	if (hlimit < 0)
2446b75d090SYOSHIFUJI Hideaki 		hlimit = ip6_dst_hoplimit(dst);
2451da177e4SLinus Torvalds 
246cb1ce2efSTom Herbert 	ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel,
247513674b5SShaohua Li 				ip6_autoflowlabel(net, np), fl6));
24841a1f8eaSYOSHIFUJI Hideaki 
2491da177e4SLinus Torvalds 	hdr->payload_len = htons(seg_len);
2501da177e4SLinus Torvalds 	hdr->nexthdr = proto;
2511da177e4SLinus Torvalds 	hdr->hop_limit = hlimit;
2521da177e4SLinus Torvalds 
2534e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
2544e3fd7a0SAlexey Dobriyan 	hdr->daddr = *first_hop;
2551da177e4SLinus Torvalds 
2569c9c9ad5SHannes Frederic Sowa 	skb->protocol = htons(ETH_P_IPV6);
257a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
25892e55f41SPablo Neira 	skb->mark = mark;
259a2c2064fSPatrick McHardy 
2601da177e4SLinus Torvalds 	mtu = dst_mtu(dst);
26160ff7467SWANG Cong 	if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) {
262adf30907SEric Dumazet 		IP6_UPD_PO_STATS(net, ip6_dst_idev(skb_dst(skb)),
263edf391ffSNeil Horman 			      IPSTATS_MIB_OUT, skb->len);
264a8e3e1a9SDavid Ahern 
265a8e3e1a9SDavid Ahern 		/* if egress device is enslaved to an L3 master device pass the
266a8e3e1a9SDavid Ahern 		 * skb to its handler for processing
267a8e3e1a9SDavid Ahern 		 */
268a8e3e1a9SDavid Ahern 		skb = l3mdev_ip6_out((struct sock *)sk, skb);
269a8e3e1a9SDavid Ahern 		if (unlikely(!skb))
270a8e3e1a9SDavid Ahern 			return 0;
271a8e3e1a9SDavid Ahern 
2721c1e9d2bSEric Dumazet 		/* hooks should never assume socket lock is held.
2731c1e9d2bSEric Dumazet 		 * we promote our socket to non const
2741c1e9d2bSEric Dumazet 		 */
27529a26a56SEric W. Biederman 		return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
2761c1e9d2bSEric Dumazet 			       net, (struct sock *)sk, skb, NULL, dst->dev,
27713206b6bSEric W. Biederman 			       dst_output);
2781da177e4SLinus Torvalds 	}
2791da177e4SLinus Torvalds 
2801da177e4SLinus Torvalds 	skb->dev = dst->dev;
2811c1e9d2bSEric Dumazet 	/* ipv6_local_error() does not require socket lock,
2821c1e9d2bSEric Dumazet 	 * we promote our socket to non const
2831c1e9d2bSEric Dumazet 	 */
2841c1e9d2bSEric Dumazet 	ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu);
2851c1e9d2bSEric Dumazet 
286adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)), IPSTATS_MIB_FRAGFAILS);
2871da177e4SLinus Torvalds 	kfree_skb(skb);
2881da177e4SLinus Torvalds 	return -EMSGSIZE;
2891da177e4SLinus Torvalds }
2907159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit);
2917159039aSYOSHIFUJI Hideaki 
2921da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel)
2931da177e4SLinus Torvalds {
2941da177e4SLinus Torvalds 	struct ip6_ra_chain *ra;
2951da177e4SLinus Torvalds 	struct sock *last = NULL;
2961da177e4SLinus Torvalds 
2971da177e4SLinus Torvalds 	read_lock(&ip6_ra_lock);
2981da177e4SLinus Torvalds 	for (ra = ip6_ra_chain; ra; ra = ra->next) {
2991da177e4SLinus Torvalds 		struct sock *sk = ra->sk;
3000bd1b59bSAndrew McDonald 		if (sk && ra->sel == sel &&
3010bd1b59bSAndrew McDonald 		    (!sk->sk_bound_dev_if ||
3020bd1b59bSAndrew McDonald 		     sk->sk_bound_dev_if == skb->dev->ifindex)) {
3031da177e4SLinus Torvalds 			if (last) {
3041da177e4SLinus Torvalds 				struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
3051da177e4SLinus Torvalds 				if (skb2)
3061da177e4SLinus Torvalds 					rawv6_rcv(last, skb2);
3071da177e4SLinus Torvalds 			}
3081da177e4SLinus Torvalds 			last = sk;
3091da177e4SLinus Torvalds 		}
3101da177e4SLinus Torvalds 	}
3111da177e4SLinus Torvalds 
3121da177e4SLinus Torvalds 	if (last) {
3131da177e4SLinus Torvalds 		rawv6_rcv(last, skb);
3141da177e4SLinus Torvalds 		read_unlock(&ip6_ra_lock);
3151da177e4SLinus Torvalds 		return 1;
3161da177e4SLinus Torvalds 	}
3171da177e4SLinus Torvalds 	read_unlock(&ip6_ra_lock);
3181da177e4SLinus Torvalds 	return 0;
3191da177e4SLinus Torvalds }
3201da177e4SLinus Torvalds 
321e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb)
322e21e0b5fSVille Nuorvala {
3230660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
324e21e0b5fSVille Nuorvala 	u8 nexthdr = hdr->nexthdr;
32575f2811cSJesse Gross 	__be16 frag_off;
326e21e0b5fSVille Nuorvala 	int offset;
327e21e0b5fSVille Nuorvala 
328e21e0b5fSVille Nuorvala 	if (ipv6_ext_hdr(nexthdr)) {
32975f2811cSJesse Gross 		offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off);
330e21e0b5fSVille Nuorvala 		if (offset < 0)
331e21e0b5fSVille Nuorvala 			return 0;
332e21e0b5fSVille Nuorvala 	} else
333e21e0b5fSVille Nuorvala 		offset = sizeof(struct ipv6hdr);
334e21e0b5fSVille Nuorvala 
335e21e0b5fSVille Nuorvala 	if (nexthdr == IPPROTO_ICMPV6) {
336e21e0b5fSVille Nuorvala 		struct icmp6hdr *icmp6;
337e21e0b5fSVille Nuorvala 
338d56f90a7SArnaldo Carvalho de Melo 		if (!pskb_may_pull(skb, (skb_network_header(skb) +
339d56f90a7SArnaldo Carvalho de Melo 					 offset + 1 - skb->data)))
340e21e0b5fSVille Nuorvala 			return 0;
341e21e0b5fSVille Nuorvala 
342d56f90a7SArnaldo Carvalho de Melo 		icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset);
343e21e0b5fSVille Nuorvala 
344e21e0b5fSVille Nuorvala 		switch (icmp6->icmp6_type) {
345e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_SOLICITATION:
346e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_ADVERTISEMENT:
347e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_SOLICITATION:
348e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_ADVERTISEMENT:
349e21e0b5fSVille Nuorvala 		case NDISC_REDIRECT:
350e21e0b5fSVille Nuorvala 			/* For reaction involving unicast neighbor discovery
351e21e0b5fSVille Nuorvala 			 * message destined to the proxied address, pass it to
352e21e0b5fSVille Nuorvala 			 * input function.
353e21e0b5fSVille Nuorvala 			 */
354e21e0b5fSVille Nuorvala 			return 1;
355e21e0b5fSVille Nuorvala 		default:
356e21e0b5fSVille Nuorvala 			break;
357e21e0b5fSVille Nuorvala 		}
358e21e0b5fSVille Nuorvala 	}
359e21e0b5fSVille Nuorvala 
36074553b09SVille Nuorvala 	/*
36174553b09SVille Nuorvala 	 * The proxying router can't forward traffic sent to a link-local
36274553b09SVille Nuorvala 	 * address, so signal the sender and discard the packet. This
36374553b09SVille Nuorvala 	 * behavior is clarified by the MIPv6 specification.
36474553b09SVille Nuorvala 	 */
36574553b09SVille Nuorvala 	if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) {
36674553b09SVille Nuorvala 		dst_link_failure(skb);
36774553b09SVille Nuorvala 		return -1;
36874553b09SVille Nuorvala 	}
36974553b09SVille Nuorvala 
370e21e0b5fSVille Nuorvala 	return 0;
371e21e0b5fSVille Nuorvala }
372e21e0b5fSVille Nuorvala 
3730c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk,
3740c4b51f0SEric W. Biederman 				     struct sk_buff *skb)
3751da177e4SLinus Torvalds {
37671a1c915SJeff Barnhill 	struct dst_entry *dst = skb_dst(skb);
37771a1c915SJeff Barnhill 
37871a1c915SJeff Barnhill 	__IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS);
37971a1c915SJeff Barnhill 	__IP6_ADD_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTOCTETS, skb->len);
38071a1c915SJeff Barnhill 
381*8203e2d8SEric Dumazet 	skb->tstamp = 0;
38213206b6bSEric W. Biederman 	return dst_output(net, sk, skb);
3831da177e4SLinus Torvalds }
3841da177e4SLinus Torvalds 
385fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu)
386fe6cc55fSFlorian Westphal {
387418a3156SFlorian Westphal 	if (skb->len <= mtu)
388fe6cc55fSFlorian Westphal 		return false;
389fe6cc55fSFlorian Westphal 
39060ff7467SWANG Cong 	/* ipv6 conntrack defrag sets max_frag_size + ignore_df */
391fe6cc55fSFlorian Westphal 	if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu)
392fe6cc55fSFlorian Westphal 		return true;
393fe6cc55fSFlorian Westphal 
39460ff7467SWANG Cong 	if (skb->ignore_df)
395418a3156SFlorian Westphal 		return false;
396418a3156SFlorian Westphal 
397779b7931SDaniel Axtens 	if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu))
398fe6cc55fSFlorian Westphal 		return false;
399fe6cc55fSFlorian Westphal 
400fe6cc55fSFlorian Westphal 	return true;
401fe6cc55fSFlorian Westphal }
402fe6cc55fSFlorian Westphal 
4031da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb)
4041da177e4SLinus Torvalds {
405bdb7cc64SStephen Suryaputra 	struct inet6_dev *idev = __in6_dev_get_safely(skb->dev);
406adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
4070660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
4081da177e4SLinus Torvalds 	struct inet6_skb_parm *opt = IP6CB(skb);
409c346dca1SYOSHIFUJI Hideaki 	struct net *net = dev_net(dst->dev);
41014f3ad6fSUlrich Weber 	u32 mtu;
4111da177e4SLinus Torvalds 
41253b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->forwarding == 0)
4131da177e4SLinus Torvalds 		goto error;
4141da177e4SLinus Torvalds 
415090f1166SLi RongQing 	if (skb->pkt_type != PACKET_HOST)
416090f1166SLi RongQing 		goto drop;
417090f1166SLi RongQing 
4189ef2e965SHannes Frederic Sowa 	if (unlikely(skb->sk))
4199ef2e965SHannes Frederic Sowa 		goto drop;
4209ef2e965SHannes Frederic Sowa 
4214497b076SBen Hutchings 	if (skb_warn_if_lro(skb))
4224497b076SBen Hutchings 		goto drop;
4234497b076SBen Hutchings 
4241da177e4SLinus Torvalds 	if (!xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) {
425bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
4261da177e4SLinus Torvalds 		goto drop;
4271da177e4SLinus Torvalds 	}
4281da177e4SLinus Torvalds 
42935fc92a9SHerbert Xu 	skb_forward_csum(skb);
4301da177e4SLinus Torvalds 
4311da177e4SLinus Torvalds 	/*
4321da177e4SLinus Torvalds 	 *	We DO NOT make any processing on
4331da177e4SLinus Torvalds 	 *	RA packets, pushing them to user level AS IS
4341da177e4SLinus Torvalds 	 *	without ane WARRANTY that application will be able
4351da177e4SLinus Torvalds 	 *	to interpret them. The reason is that we
4361da177e4SLinus Torvalds 	 *	cannot make anything clever here.
4371da177e4SLinus Torvalds 	 *
4381da177e4SLinus Torvalds 	 *	We are not end-node, so that if packet contains
4391da177e4SLinus Torvalds 	 *	AH/ESP, we cannot make anything.
4401da177e4SLinus Torvalds 	 *	Defragmentation also would be mistake, RA packets
4411da177e4SLinus Torvalds 	 *	cannot be fragmented, because there is no warranty
4421da177e4SLinus Torvalds 	 *	that different fragments will go along one path. --ANK
4431da177e4SLinus Torvalds 	 */
444ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) {
445ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 		if (ip6_call_ra_chain(skb, ntohs(opt->ra)))
4461da177e4SLinus Torvalds 			return 0;
4471da177e4SLinus Torvalds 	}
4481da177e4SLinus Torvalds 
4491da177e4SLinus Torvalds 	/*
4501da177e4SLinus Torvalds 	 *	check and decrement ttl
4511da177e4SLinus Torvalds 	 */
4521da177e4SLinus Torvalds 	if (hdr->hop_limit <= 1) {
4531da177e4SLinus Torvalds 		/* Force OUTPUT device used as source address */
4541da177e4SLinus Torvalds 		skb->dev = dst->dev;
4553ffe533cSAlexey Dobriyan 		icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0);
456bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS);
4571da177e4SLinus Torvalds 
4581da177e4SLinus Torvalds 		kfree_skb(skb);
4591da177e4SLinus Torvalds 		return -ETIMEDOUT;
4601da177e4SLinus Torvalds 	}
4611da177e4SLinus Torvalds 
462fbea49e1SYOSHIFUJI Hideaki 	/* XXX: idev->cnf.proxy_ndp? */
46353b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->proxy_ndp &&
4648a3edd80SDaniel Lezcano 	    pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) {
46574553b09SVille Nuorvala 		int proxied = ip6_forward_proxy_check(skb);
46674553b09SVille Nuorvala 		if (proxied > 0)
467e21e0b5fSVille Nuorvala 			return ip6_input(skb);
46874553b09SVille Nuorvala 		else if (proxied < 0) {
469bdb7cc64SStephen Suryaputra 			__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
47074553b09SVille Nuorvala 			goto drop;
47174553b09SVille Nuorvala 		}
472e21e0b5fSVille Nuorvala 	}
473e21e0b5fSVille Nuorvala 
4741da177e4SLinus Torvalds 	if (!xfrm6_route_forward(skb)) {
475bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
4761da177e4SLinus Torvalds 		goto drop;
4771da177e4SLinus Torvalds 	}
478adf30907SEric Dumazet 	dst = skb_dst(skb);
4791da177e4SLinus Torvalds 
4801da177e4SLinus Torvalds 	/* IPv6 specs say nothing about it, but it is clear that we cannot
4811da177e4SLinus Torvalds 	   send redirects to source routed frames.
4821e5dc146SMasahide NAKAMURA 	   We don't send redirects to frames decapsulated from IPsec.
4831da177e4SLinus Torvalds 	 */
4842f17becfSStephen Suryaputra 	if (IP6CB(skb)->iif == dst->dev->ifindex &&
4852f17becfSStephen Suryaputra 	    opt->srcrt == 0 && !skb_sec_path(skb)) {
4861da177e4SLinus Torvalds 		struct in6_addr *target = NULL;
487fbfe95a4SDavid S. Miller 		struct inet_peer *peer;
4881da177e4SLinus Torvalds 		struct rt6_info *rt;
4891da177e4SLinus Torvalds 
4901da177e4SLinus Torvalds 		/*
4911da177e4SLinus Torvalds 		 *	incoming and outgoing devices are the same
4921da177e4SLinus Torvalds 		 *	send a redirect.
4931da177e4SLinus Torvalds 		 */
4941da177e4SLinus Torvalds 
4951da177e4SLinus Torvalds 		rt = (struct rt6_info *) dst;
496c45a3dfbSDavid S. Miller 		if (rt->rt6i_flags & RTF_GATEWAY)
497c45a3dfbSDavid S. Miller 			target = &rt->rt6i_gateway;
4981da177e4SLinus Torvalds 		else
4991da177e4SLinus Torvalds 			target = &hdr->daddr;
5001da177e4SLinus Torvalds 
501fd0273d7SMartin KaFai Lau 		peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1);
50292d86829SDavid S. Miller 
5031da177e4SLinus Torvalds 		/* Limit redirects both by destination (here)
5041da177e4SLinus Torvalds 		   and by source (inside ndisc_send_redirect)
5051da177e4SLinus Torvalds 		 */
506fbfe95a4SDavid S. Miller 		if (inet_peer_xrlim_allow(peer, 1*HZ))
5074991969aSDavid S. Miller 			ndisc_send_redirect(skb, target);
5081d861aa4SDavid S. Miller 		if (peer)
5091d861aa4SDavid S. Miller 			inet_putpeer(peer);
5105bb1ab09SDavid L Stevens 	} else {
5115bb1ab09SDavid L Stevens 		int addrtype = ipv6_addr_type(&hdr->saddr);
5125bb1ab09SDavid L Stevens 
5131da177e4SLinus Torvalds 		/* This check is security critical. */
514f81b2e7dSYOSHIFUJI Hideaki 		if (addrtype == IPV6_ADDR_ANY ||
515f81b2e7dSYOSHIFUJI Hideaki 		    addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK))
5161da177e4SLinus Torvalds 			goto error;
5175bb1ab09SDavid L Stevens 		if (addrtype & IPV6_ADDR_LINKLOCAL) {
5185bb1ab09SDavid L Stevens 			icmpv6_send(skb, ICMPV6_DEST_UNREACH,
5193ffe533cSAlexey Dobriyan 				    ICMPV6_NOT_NEIGHBOUR, 0);
5205bb1ab09SDavid L Stevens 			goto error;
5215bb1ab09SDavid L Stevens 		}
5221da177e4SLinus Torvalds 	}
5231da177e4SLinus Torvalds 
5240954cf9cSHannes Frederic Sowa 	mtu = ip6_dst_mtu_forward(dst);
52514f3ad6fSUlrich Weber 	if (mtu < IPV6_MIN_MTU)
52614f3ad6fSUlrich Weber 		mtu = IPV6_MIN_MTU;
52714f3ad6fSUlrich Weber 
528fe6cc55fSFlorian Westphal 	if (ip6_pkt_too_big(skb, mtu)) {
5291da177e4SLinus Torvalds 		/* Again, force OUTPUT device used as source address */
5301da177e4SLinus Torvalds 		skb->dev = dst->dev;
53114f3ad6fSUlrich Weber 		icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
532bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS);
5331d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
53415c77d8bSEric Dumazet 				IPSTATS_MIB_FRAGFAILS);
5351da177e4SLinus Torvalds 		kfree_skb(skb);
5361da177e4SLinus Torvalds 		return -EMSGSIZE;
5371da177e4SLinus Torvalds 	}
5381da177e4SLinus Torvalds 
5391da177e4SLinus Torvalds 	if (skb_cow(skb, dst->dev->hard_header_len)) {
5401d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
54115c77d8bSEric Dumazet 				IPSTATS_MIB_OUTDISCARDS);
5421da177e4SLinus Torvalds 		goto drop;
5431da177e4SLinus Torvalds 	}
5441da177e4SLinus Torvalds 
5450660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
5461da177e4SLinus Torvalds 
5471da177e4SLinus Torvalds 	/* Mangling hops number delayed to point after skb COW */
5481da177e4SLinus Torvalds 
5491da177e4SLinus Torvalds 	hdr->hop_limit--;
5501da177e4SLinus Torvalds 
55129a26a56SEric W. Biederman 	return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD,
55229a26a56SEric W. Biederman 		       net, NULL, skb, skb->dev, dst->dev,
5536e23ae2aSPatrick McHardy 		       ip6_forward_finish);
5541da177e4SLinus Torvalds 
5551da177e4SLinus Torvalds error:
556bdb7cc64SStephen Suryaputra 	__IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS);
5571da177e4SLinus Torvalds drop:
5581da177e4SLinus Torvalds 	kfree_skb(skb);
5591da177e4SLinus Torvalds 	return -EINVAL;
5601da177e4SLinus Torvalds }
5611da177e4SLinus Torvalds 
5621da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from)
5631da177e4SLinus Torvalds {
5641da177e4SLinus Torvalds 	to->pkt_type = from->pkt_type;
5651da177e4SLinus Torvalds 	to->priority = from->priority;
5661da177e4SLinus Torvalds 	to->protocol = from->protocol;
567adf30907SEric Dumazet 	skb_dst_drop(to);
568adf30907SEric Dumazet 	skb_dst_set(to, dst_clone(skb_dst(from)));
5691da177e4SLinus Torvalds 	to->dev = from->dev;
57082e91ffeSThomas Graf 	to->mark = from->mark;
5711da177e4SLinus Torvalds 
5723dd1c9a1SPaolo Abeni 	skb_copy_hash(to, from);
5733dd1c9a1SPaolo Abeni 
5741da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED
5751da177e4SLinus Torvalds 	to->tc_index = from->tc_index;
5761da177e4SLinus Torvalds #endif
577e7ac05f3SYasuyuki Kozakai 	nf_copy(to, from);
578984bc16cSJames Morris 	skb_copy_secmark(to, from);
5791da177e4SLinus Torvalds }
5801da177e4SLinus Torvalds 
5817d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb,
5827d8c6e39SEric W. Biederman 		 int (*output)(struct net *, struct sock *, struct sk_buff *))
5831da177e4SLinus Torvalds {
5841da177e4SLinus Torvalds 	struct sk_buff *frag;
585adf30907SEric Dumazet 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
586f60e5990Shannes@stressinduktion.org 	struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ?
587f60e5990Shannes@stressinduktion.org 				inet6_sk(skb->sk) : NULL;
5881da177e4SLinus Torvalds 	struct ipv6hdr *tmp_hdr;
5891da177e4SLinus Torvalds 	struct frag_hdr *fh;
5901da177e4SLinus Torvalds 	unsigned int mtu, hlen, left, len;
591a7ae1992SHerbert Xu 	int hroom, troom;
592286c2349SMartin KaFai Lau 	__be32 frag_id;
5931da177e4SLinus Torvalds 	int ptr, offset = 0, err = 0;
5941da177e4SLinus Torvalds 	u8 *prevhdr, nexthdr = 0;
5951da177e4SLinus Torvalds 
5967dd7eb95SDavid S. Miller 	err = ip6_find_1stfragopt(skb, &prevhdr);
5977dd7eb95SDavid S. Miller 	if (err < 0)
5982423496aSCraig Gallek 		goto fail;
5997dd7eb95SDavid S. Miller 	hlen = err;
6001da177e4SLinus Torvalds 	nexthdr = *prevhdr;
6011da177e4SLinus Torvalds 
602628a5c56SJohn Heffner 	mtu = ip6_skb_dst_mtu(skb);
603b881ef76SJohn Heffner 
604b881ef76SJohn Heffner 	/* We must not fragment if the socket is set to force MTU discovery
60514f3ad6fSUlrich Weber 	 * or if the skb it not generated by a local socket.
606b881ef76SJohn Heffner 	 */
607485fca66SFlorian Westphal 	if (unlikely(!skb->ignore_df && skb->len > mtu))
608485fca66SFlorian Westphal 		goto fail_toobig;
609a34a101eSEric Dumazet 
610485fca66SFlorian Westphal 	if (IP6CB(skb)->frag_max_size) {
611485fca66SFlorian Westphal 		if (IP6CB(skb)->frag_max_size > mtu)
612485fca66SFlorian Westphal 			goto fail_toobig;
613485fca66SFlorian Westphal 
614485fca66SFlorian Westphal 		/* don't send fragments larger than what we received */
615485fca66SFlorian Westphal 		mtu = IP6CB(skb)->frag_max_size;
616485fca66SFlorian Westphal 		if (mtu < IPV6_MIN_MTU)
617485fca66SFlorian Westphal 			mtu = IPV6_MIN_MTU;
618b881ef76SJohn Heffner 	}
619b881ef76SJohn Heffner 
620d91675f9SYOSHIFUJI Hideaki 	if (np && np->frag_size < mtu) {
621d91675f9SYOSHIFUJI Hideaki 		if (np->frag_size)
622d91675f9SYOSHIFUJI Hideaki 			mtu = np->frag_size;
623d91675f9SYOSHIFUJI Hideaki 	}
62489bc7848SHannes Frederic Sowa 	if (mtu < hlen + sizeof(struct frag_hdr) + 8)
625b72a2b01SHannes Frederic Sowa 		goto fail_toobig;
6261e0d69a9SHannes Frederic Sowa 	mtu -= hlen + sizeof(struct frag_hdr);
6271da177e4SLinus Torvalds 
628fd0273d7SMartin KaFai Lau 	frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr,
629fd0273d7SMartin KaFai Lau 				    &ipv6_hdr(skb)->saddr);
630286c2349SMartin KaFai Lau 
631405c92f7SHannes Frederic Sowa 	if (skb->ip_summed == CHECKSUM_PARTIAL &&
632405c92f7SHannes Frederic Sowa 	    (err = skb_checksum_help(skb)))
633405c92f7SHannes Frederic Sowa 		goto fail;
634405c92f7SHannes Frederic Sowa 
6351d325d21SFlorian Westphal 	hroom = LL_RESERVED_SPACE(rt->dst.dev);
63621dc3301SDavid S. Miller 	if (skb_has_frag_list(skb)) {
637c72d8cdaSAlexey Dobriyan 		unsigned int first_len = skb_pagelen(skb);
6383d13008eSEric Dumazet 		struct sk_buff *frag2;
6391da177e4SLinus Torvalds 
6401da177e4SLinus Torvalds 		if (first_len - hlen > mtu ||
6411da177e4SLinus Torvalds 		    ((first_len - hlen) & 7) ||
6421d325d21SFlorian Westphal 		    skb_cloned(skb) ||
6431d325d21SFlorian Westphal 		    skb_headroom(skb) < (hroom + sizeof(struct frag_hdr)))
6441da177e4SLinus Torvalds 			goto slow_path;
6451da177e4SLinus Torvalds 
6464d9092bbSDavid S. Miller 		skb_walk_frags(skb, frag) {
6471da177e4SLinus Torvalds 			/* Correct geometry. */
6481da177e4SLinus Torvalds 			if (frag->len > mtu ||
6491da177e4SLinus Torvalds 			    ((frag->len & 7) && frag->next) ||
6501d325d21SFlorian Westphal 			    skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr)))
6513d13008eSEric Dumazet 				goto slow_path_clean;
6521da177e4SLinus Torvalds 
6531da177e4SLinus Torvalds 			/* Partially cloned skb? */
6541da177e4SLinus Torvalds 			if (skb_shared(frag))
6553d13008eSEric Dumazet 				goto slow_path_clean;
6562fdba6b0SHerbert Xu 
6572fdba6b0SHerbert Xu 			BUG_ON(frag->sk);
6582fdba6b0SHerbert Xu 			if (skb->sk) {
6592fdba6b0SHerbert Xu 				frag->sk = skb->sk;
6602fdba6b0SHerbert Xu 				frag->destructor = sock_wfree;
6612fdba6b0SHerbert Xu 			}
6623d13008eSEric Dumazet 			skb->truesize -= frag->truesize;
6631da177e4SLinus Torvalds 		}
6641da177e4SLinus Torvalds 
6651da177e4SLinus Torvalds 		err = 0;
6661da177e4SLinus Torvalds 		offset = 0;
6671da177e4SLinus Torvalds 		/* BUILD HEADER */
6681da177e4SLinus Torvalds 
6699a217a1cSYOSHIFUJI Hideaki 		*prevhdr = NEXTHDR_FRAGMENT;
670d56f90a7SArnaldo Carvalho de Melo 		tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC);
6711da177e4SLinus Torvalds 		if (!tmp_hdr) {
6721d325d21SFlorian Westphal 			err = -ENOMEM;
6731d325d21SFlorian Westphal 			goto fail;
6741da177e4SLinus Torvalds 		}
6751d325d21SFlorian Westphal 		frag = skb_shinfo(skb)->frag_list;
6761d325d21SFlorian Westphal 		skb_frag_list_init(skb);
6771da177e4SLinus Torvalds 
6781da177e4SLinus Torvalds 		__skb_pull(skb, hlen);
679d58ff351SJohannes Berg 		fh = __skb_push(skb, sizeof(struct frag_hdr));
680e2d1bca7SArnaldo Carvalho de Melo 		__skb_push(skb, hlen);
681e2d1bca7SArnaldo Carvalho de Melo 		skb_reset_network_header(skb);
682d56f90a7SArnaldo Carvalho de Melo 		memcpy(skb_network_header(skb), tmp_hdr, hlen);
6831da177e4SLinus Torvalds 
6841da177e4SLinus Torvalds 		fh->nexthdr = nexthdr;
6851da177e4SLinus Torvalds 		fh->reserved = 0;
6861da177e4SLinus Torvalds 		fh->frag_off = htons(IP6_MF);
687286c2349SMartin KaFai Lau 		fh->identification = frag_id;
6881da177e4SLinus Torvalds 
6891da177e4SLinus Torvalds 		first_len = skb_pagelen(skb);
6901da177e4SLinus Torvalds 		skb->data_len = first_len - skb_headlen(skb);
6911da177e4SLinus Torvalds 		skb->len = first_len;
6920660e03fSArnaldo Carvalho de Melo 		ipv6_hdr(skb)->payload_len = htons(first_len -
6930660e03fSArnaldo Carvalho de Melo 						   sizeof(struct ipv6hdr));
6941da177e4SLinus Torvalds 
6951da177e4SLinus Torvalds 		for (;;) {
6961da177e4SLinus Torvalds 			/* Prepare header of the next frame,
6971da177e4SLinus Torvalds 			 * before previous one went down. */
6981da177e4SLinus Torvalds 			if (frag) {
6991da177e4SLinus Torvalds 				frag->ip_summed = CHECKSUM_NONE;
700badff6d0SArnaldo Carvalho de Melo 				skb_reset_transport_header(frag);
701d58ff351SJohannes Berg 				fh = __skb_push(frag, sizeof(struct frag_hdr));
702e2d1bca7SArnaldo Carvalho de Melo 				__skb_push(frag, hlen);
703e2d1bca7SArnaldo Carvalho de Melo 				skb_reset_network_header(frag);
704d56f90a7SArnaldo Carvalho de Melo 				memcpy(skb_network_header(frag), tmp_hdr,
705d56f90a7SArnaldo Carvalho de Melo 				       hlen);
7061da177e4SLinus Torvalds 				offset += skb->len - hlen - sizeof(struct frag_hdr);
7071da177e4SLinus Torvalds 				fh->nexthdr = nexthdr;
7081da177e4SLinus Torvalds 				fh->reserved = 0;
7091da177e4SLinus Torvalds 				fh->frag_off = htons(offset);
71053b24b8fSIan Morris 				if (frag->next)
7111da177e4SLinus Torvalds 					fh->frag_off |= htons(IP6_MF);
7121da177e4SLinus Torvalds 				fh->identification = frag_id;
7130660e03fSArnaldo Carvalho de Melo 				ipv6_hdr(frag)->payload_len =
7140660e03fSArnaldo Carvalho de Melo 						htons(frag->len -
7150660e03fSArnaldo Carvalho de Melo 						      sizeof(struct ipv6hdr));
7161da177e4SLinus Torvalds 				ip6_copy_metadata(frag, skb);
7171da177e4SLinus Torvalds 			}
7181da177e4SLinus Torvalds 
7197d8c6e39SEric W. Biederman 			err = output(net, sk, skb);
720dafee490SWei Dong 			if (!err)
721d8d1f30bSChangli Gao 				IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7223bd653c8SDenis V. Lunev 					      IPSTATS_MIB_FRAGCREATES);
723dafee490SWei Dong 
7241da177e4SLinus Torvalds 			if (err || !frag)
7251da177e4SLinus Torvalds 				break;
7261da177e4SLinus Torvalds 
7271da177e4SLinus Torvalds 			skb = frag;
7281da177e4SLinus Torvalds 			frag = skb->next;
729a8305bffSDavid S. Miller 			skb_mark_not_on_list(skb);
7301da177e4SLinus Torvalds 		}
7311da177e4SLinus Torvalds 
7321da177e4SLinus Torvalds 		kfree(tmp_hdr);
7331da177e4SLinus Torvalds 
7341da177e4SLinus Torvalds 		if (err == 0) {
735d8d1f30bSChangli Gao 			IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7363bd653c8SDenis V. Lunev 				      IPSTATS_MIB_FRAGOKS);
7371da177e4SLinus Torvalds 			return 0;
7381da177e4SLinus Torvalds 		}
7391da177e4SLinus Torvalds 
74046cfd725SFlorian Westphal 		kfree_skb_list(frag);
7411da177e4SLinus Torvalds 
742d8d1f30bSChangli Gao 		IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
7433bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGFAILS);
7441da177e4SLinus Torvalds 		return err;
7453d13008eSEric Dumazet 
7463d13008eSEric Dumazet slow_path_clean:
7473d13008eSEric Dumazet 		skb_walk_frags(skb, frag2) {
7483d13008eSEric Dumazet 			if (frag2 == frag)
7493d13008eSEric Dumazet 				break;
7503d13008eSEric Dumazet 			frag2->sk = NULL;
7513d13008eSEric Dumazet 			frag2->destructor = NULL;
7523d13008eSEric Dumazet 			skb->truesize += frag2->truesize;
7533d13008eSEric Dumazet 		}
7541da177e4SLinus Torvalds 	}
7551da177e4SLinus Torvalds 
7561da177e4SLinus Torvalds slow_path:
7571da177e4SLinus Torvalds 	left = skb->len - hlen;		/* Space per frame */
7581da177e4SLinus Torvalds 	ptr = hlen;			/* Where to start from */
7591da177e4SLinus Torvalds 
7601da177e4SLinus Torvalds 	/*
7611da177e4SLinus Torvalds 	 *	Fragment the datagram.
7621da177e4SLinus Torvalds 	 */
7631da177e4SLinus Torvalds 
764a7ae1992SHerbert Xu 	troom = rt->dst.dev->needed_tailroom;
7651da177e4SLinus Torvalds 
7661da177e4SLinus Torvalds 	/*
7671da177e4SLinus Torvalds 	 *	Keep copying data until we run out.
7681da177e4SLinus Torvalds 	 */
7691da177e4SLinus Torvalds 	while (left > 0)	{
77079e49503SFlorian Westphal 		u8 *fragnexthdr_offset;
77179e49503SFlorian Westphal 
7721da177e4SLinus Torvalds 		len = left;
7731da177e4SLinus Torvalds 		/* IF: it doesn't fit, use 'mtu' - the data space left */
7741da177e4SLinus Torvalds 		if (len > mtu)
7751da177e4SLinus Torvalds 			len = mtu;
7761da177e4SLinus Torvalds 		/* IF: we are not sending up to and including the packet end
7771da177e4SLinus Torvalds 		   then align the next start on an eight byte boundary */
7781da177e4SLinus Torvalds 		if (len < left)	{
7791da177e4SLinus Torvalds 			len &= ~7;
7801da177e4SLinus Torvalds 		}
7811da177e4SLinus Torvalds 
782cbffccc9SJoe Perches 		/* Allocate buffer */
783cbffccc9SJoe Perches 		frag = alloc_skb(len + hlen + sizeof(struct frag_hdr) +
784cbffccc9SJoe Perches 				 hroom + troom, GFP_ATOMIC);
785cbffccc9SJoe Perches 		if (!frag) {
7861da177e4SLinus Torvalds 			err = -ENOMEM;
7871da177e4SLinus Torvalds 			goto fail;
7881da177e4SLinus Torvalds 		}
7891da177e4SLinus Torvalds 
7901da177e4SLinus Torvalds 		/*
7911da177e4SLinus Torvalds 		 *	Set up data on packet
7921da177e4SLinus Torvalds 		 */
7931da177e4SLinus Torvalds 
7941da177e4SLinus Torvalds 		ip6_copy_metadata(frag, skb);
795a7ae1992SHerbert Xu 		skb_reserve(frag, hroom);
7961da177e4SLinus Torvalds 		skb_put(frag, len + hlen + sizeof(struct frag_hdr));
797c1d2bbe1SArnaldo Carvalho de Melo 		skb_reset_network_header(frag);
798badff6d0SArnaldo Carvalho de Melo 		fh = (struct frag_hdr *)(skb_network_header(frag) + hlen);
799b0e380b1SArnaldo Carvalho de Melo 		frag->transport_header = (frag->network_header + hlen +
800b0e380b1SArnaldo Carvalho de Melo 					  sizeof(struct frag_hdr));
8011da177e4SLinus Torvalds 
8021da177e4SLinus Torvalds 		/*
8031da177e4SLinus Torvalds 		 *	Charge the memory for the fragment to any owner
8041da177e4SLinus Torvalds 		 *	it might possess
8051da177e4SLinus Torvalds 		 */
8061da177e4SLinus Torvalds 		if (skb->sk)
8071da177e4SLinus Torvalds 			skb_set_owner_w(frag, skb->sk);
8081da177e4SLinus Torvalds 
8091da177e4SLinus Torvalds 		/*
8101da177e4SLinus Torvalds 		 *	Copy the packet header into the new buffer.
8111da177e4SLinus Torvalds 		 */
812d626f62bSArnaldo Carvalho de Melo 		skb_copy_from_linear_data(skb, skb_network_header(frag), hlen);
8131da177e4SLinus Torvalds 
81479e49503SFlorian Westphal 		fragnexthdr_offset = skb_network_header(frag);
81579e49503SFlorian Westphal 		fragnexthdr_offset += prevhdr - skb_network_header(skb);
81679e49503SFlorian Westphal 		*fragnexthdr_offset = NEXTHDR_FRAGMENT;
81779e49503SFlorian Westphal 
8181da177e4SLinus Torvalds 		/*
8191da177e4SLinus Torvalds 		 *	Build fragment header.
8201da177e4SLinus Torvalds 		 */
8211da177e4SLinus Torvalds 		fh->nexthdr = nexthdr;
8221da177e4SLinus Torvalds 		fh->reserved = 0;
8231da177e4SLinus Torvalds 		fh->identification = frag_id;
8241da177e4SLinus Torvalds 
8251da177e4SLinus Torvalds 		/*
8261da177e4SLinus Torvalds 		 *	Copy a block of the IP datagram.
8271da177e4SLinus Torvalds 		 */
828e3f0b86bSHimangi Saraogi 		BUG_ON(skb_copy_bits(skb, ptr, skb_transport_header(frag),
829e3f0b86bSHimangi Saraogi 				     len));
8301da177e4SLinus Torvalds 		left -= len;
8311da177e4SLinus Torvalds 
8321da177e4SLinus Torvalds 		fh->frag_off = htons(offset);
8331da177e4SLinus Torvalds 		if (left > 0)
8341da177e4SLinus Torvalds 			fh->frag_off |= htons(IP6_MF);
8350660e03fSArnaldo Carvalho de Melo 		ipv6_hdr(frag)->payload_len = htons(frag->len -
8360660e03fSArnaldo Carvalho de Melo 						    sizeof(struct ipv6hdr));
8371da177e4SLinus Torvalds 
8381da177e4SLinus Torvalds 		ptr += len;
8391da177e4SLinus Torvalds 		offset += len;
8401da177e4SLinus Torvalds 
8411da177e4SLinus Torvalds 		/*
8421da177e4SLinus Torvalds 		 *	Put this fragment into the sending queue.
8431da177e4SLinus Torvalds 		 */
8447d8c6e39SEric W. Biederman 		err = output(net, sk, frag);
8451da177e4SLinus Torvalds 		if (err)
8461da177e4SLinus Torvalds 			goto fail;
847dafee490SWei Dong 
848adf30907SEric Dumazet 		IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
8493bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGCREATES);
8501da177e4SLinus Torvalds 	}
851adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
852a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGOKS);
853808db80aSEric Dumazet 	consume_skb(skb);
8541da177e4SLinus Torvalds 	return err;
8551da177e4SLinus Torvalds 
856485fca66SFlorian Westphal fail_toobig:
857485fca66SFlorian Westphal 	if (skb->sk && dst_allfrag(skb_dst(skb)))
858485fca66SFlorian Westphal 		sk_nocaps_add(skb->sk, NETIF_F_GSO_MASK);
859485fca66SFlorian Westphal 
860485fca66SFlorian Westphal 	icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
861485fca66SFlorian Westphal 	err = -EMSGSIZE;
862485fca66SFlorian Westphal 
8631da177e4SLinus Torvalds fail:
864adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
865a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGFAILS);
8661da177e4SLinus Torvalds 	kfree_skb(skb);
8671da177e4SLinus Torvalds 	return err;
8681da177e4SLinus Torvalds }
8691da177e4SLinus Torvalds 
870b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key,
871b71d1d42SEric Dumazet 			       const struct in6_addr *fl_addr,
872b71d1d42SEric Dumazet 			       const struct in6_addr *addr_cache)
873cf6b1982SYOSHIFUJI Hideaki {
874a02cec21SEric Dumazet 	return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) &&
87563159f29SIan Morris 		(!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache));
876cf6b1982SYOSHIFUJI Hideaki }
877cf6b1982SYOSHIFUJI Hideaki 
878497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk,
879497c615aSHerbert Xu 					  struct dst_entry *dst,
880b71d1d42SEric Dumazet 					  const struct flowi6 *fl6)
8811da177e4SLinus Torvalds {
8821da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
883a963a37dSEric Dumazet 	struct rt6_info *rt;
8841da177e4SLinus Torvalds 
885497c615aSHerbert Xu 	if (!dst)
886497c615aSHerbert Xu 		goto out;
8871da177e4SLinus Torvalds 
888a963a37dSEric Dumazet 	if (dst->ops->family != AF_INET6) {
889a963a37dSEric Dumazet 		dst_release(dst);
890a963a37dSEric Dumazet 		return NULL;
891a963a37dSEric Dumazet 	}
892a963a37dSEric Dumazet 
893a963a37dSEric Dumazet 	rt = (struct rt6_info *)dst;
8941da177e4SLinus Torvalds 	/* Yes, checking route validity in not connected
895d76e60a5SDavid S. Miller 	 * case is not very simple. Take into account,
896d76e60a5SDavid S. Miller 	 * that we do not support routing by source, TOS,
897d76e60a5SDavid S. Miller 	 * and MSG_DONTROUTE		--ANK (980726)
898d76e60a5SDavid S. Miller 	 *
899cf6b1982SYOSHIFUJI Hideaki 	 * 1. ip6_rt_check(): If route was host route,
900cf6b1982SYOSHIFUJI Hideaki 	 *    check that cached destination is current.
901d76e60a5SDavid S. Miller 	 *    If it is network route, we still may
902d76e60a5SDavid S. Miller 	 *    check its validity using saved pointer
903d76e60a5SDavid S. Miller 	 *    to the last used address: daddr_cache.
904d76e60a5SDavid S. Miller 	 *    We do not want to save whole address now,
905d76e60a5SDavid S. Miller 	 *    (because main consumer of this service
906d76e60a5SDavid S. Miller 	 *    is tcp, which has not this problem),
907d76e60a5SDavid S. Miller 	 *    so that the last trick works only on connected
908d76e60a5SDavid S. Miller 	 *    sockets.
909d76e60a5SDavid S. Miller 	 * 2. oif also should be the same.
9101da177e4SLinus Torvalds 	 */
9114c9483b2SDavid S. Miller 	if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) ||
9128e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES
9134c9483b2SDavid S. Miller 	    ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) ||
9148e1ef0a9SYOSHIFUJI Hideaki #endif
915ca254490SDavid Ahern 	   (!(fl6->flowi6_flags & FLOWI_FLAG_SKIP_NH_OIF) &&
916ca254490SDavid Ahern 	      (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex))) {
917497c615aSHerbert Xu 		dst_release(dst);
918497c615aSHerbert Xu 		dst = NULL;
9191da177e4SLinus Torvalds 	}
920497c615aSHerbert Xu 
921497c615aSHerbert Xu out:
922497c615aSHerbert Xu 	return dst;
9231da177e4SLinus Torvalds }
924497c615aSHerbert Xu 
9253aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
9264c9483b2SDavid S. Miller 			       struct dst_entry **dst, struct flowi6 *fl6)
927497c615aSHerbert Xu {
92869cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
92969cce1d1SDavid S. Miller 	struct neighbour *n;
93097cac082SDavid S. Miller 	struct rt6_info *rt;
93169cce1d1SDavid S. Miller #endif
93269cce1d1SDavid S. Miller 	int err;
9336f21c96aSPaolo Abeni 	int flags = 0;
9341da177e4SLinus Torvalds 
935e16e888bSMarkus Stenberg 	/* The correct way to handle this would be to do
936e16e888bSMarkus Stenberg 	 * ip6_route_get_saddr, and then ip6_route_output; however,
937e16e888bSMarkus Stenberg 	 * the route-specific preferred source forces the
938e16e888bSMarkus Stenberg 	 * ip6_route_output call _before_ ip6_route_get_saddr.
939e16e888bSMarkus Stenberg 	 *
940e16e888bSMarkus Stenberg 	 * In source specific routing (no src=any default route),
941e16e888bSMarkus Stenberg 	 * ip6_route_output will fail given src=any saddr, though, so
942e16e888bSMarkus Stenberg 	 * that's why we try it again later.
943e16e888bSMarkus Stenberg 	 */
944e16e888bSMarkus Stenberg 	if (ipv6_addr_any(&fl6->saddr) && (!*dst || !(*dst)->error)) {
945a68886a6SDavid Ahern 		struct fib6_info *from;
946e16e888bSMarkus Stenberg 		struct rt6_info *rt;
947e16e888bSMarkus Stenberg 		bool had_dst = *dst != NULL;
948e16e888bSMarkus Stenberg 
949e16e888bSMarkus Stenberg 		if (!had_dst)
950e16e888bSMarkus Stenberg 			*dst = ip6_route_output(net, sk, fl6);
951e16e888bSMarkus Stenberg 		rt = (*dst)->error ? NULL : (struct rt6_info *)*dst;
952a68886a6SDavid Ahern 
953a68886a6SDavid Ahern 		rcu_read_lock();
954a68886a6SDavid Ahern 		from = rt ? rcu_dereference(rt->from) : NULL;
955a68886a6SDavid Ahern 		err = ip6_route_get_saddr(net, from, &fl6->daddr,
956e16e888bSMarkus Stenberg 					  sk ? inet6_sk(sk)->srcprefs : 0,
957e16e888bSMarkus Stenberg 					  &fl6->saddr);
958a68886a6SDavid Ahern 		rcu_read_unlock();
959a68886a6SDavid Ahern 
960e16e888bSMarkus Stenberg 		if (err)
961e16e888bSMarkus Stenberg 			goto out_err_release;
962e16e888bSMarkus Stenberg 
963e16e888bSMarkus Stenberg 		/* If we had an erroneous initial result, pretend it
964e16e888bSMarkus Stenberg 		 * never existed and let the SA-enabled version take
965e16e888bSMarkus Stenberg 		 * over.
966e16e888bSMarkus Stenberg 		 */
967e16e888bSMarkus Stenberg 		if (!had_dst && (*dst)->error) {
968e16e888bSMarkus Stenberg 			dst_release(*dst);
969e16e888bSMarkus Stenberg 			*dst = NULL;
970e16e888bSMarkus Stenberg 		}
9716f21c96aSPaolo Abeni 
9726f21c96aSPaolo Abeni 		if (fl6->flowi6_oif)
9736f21c96aSPaolo Abeni 			flags |= RT6_LOOKUP_F_IFACE;
974e16e888bSMarkus Stenberg 	}
975e16e888bSMarkus Stenberg 
97663159f29SIan Morris 	if (!*dst)
9776f21c96aSPaolo Abeni 		*dst = ip6_route_output_flags(net, sk, fl6, flags);
9781da177e4SLinus Torvalds 
979e5d08d71SIan Morris 	err = (*dst)->error;
980e5d08d71SIan Morris 	if (err)
9811da177e4SLinus Torvalds 		goto out_err_release;
9821da177e4SLinus Torvalds 
98395c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
98495c385b4SNeil Horman 	/*
98595c385b4SNeil Horman 	 * Here if the dst entry we've looked up
98695c385b4SNeil Horman 	 * has a neighbour entry that is in the INCOMPLETE
98795c385b4SNeil Horman 	 * state and the src address from the flow is
98895c385b4SNeil Horman 	 * marked as OPTIMISTIC, we release the found
98995c385b4SNeil Horman 	 * dst entry and replace it instead with the
99095c385b4SNeil Horman 	 * dst entry of the nexthop router
99195c385b4SNeil Horman 	 */
992c56bf6feSEric Dumazet 	rt = (struct rt6_info *) *dst;
993707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_lock_bh();
9942647a9b0SMartin KaFai Lau 	n = __ipv6_neigh_lookup_noref(rt->dst.dev,
9952647a9b0SMartin KaFai Lau 				      rt6_nexthop(rt, &fl6->daddr));
996707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	err = n && !(n->nud_state & NUD_VALID) ? -EINVAL : 0;
997707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	rcu_read_unlock_bh();
998707be1ffSYOSHIFUJI Hideaki / 吉藤英明 
999707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	if (err) {
100095c385b4SNeil Horman 		struct inet6_ifaddr *ifp;
10014c9483b2SDavid S. Miller 		struct flowi6 fl_gw6;
100295c385b4SNeil Horman 		int redirect;
100395c385b4SNeil Horman 
10044c9483b2SDavid S. Miller 		ifp = ipv6_get_ifaddr(net, &fl6->saddr,
10051cab3da6SDaniel Lezcano 				      (*dst)->dev, 1);
100695c385b4SNeil Horman 
100795c385b4SNeil Horman 		redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC);
100895c385b4SNeil Horman 		if (ifp)
100995c385b4SNeil Horman 			in6_ifa_put(ifp);
101095c385b4SNeil Horman 
101195c385b4SNeil Horman 		if (redirect) {
101295c385b4SNeil Horman 			/*
101395c385b4SNeil Horman 			 * We need to get the dst entry for the
101495c385b4SNeil Horman 			 * default router instead
101595c385b4SNeil Horman 			 */
101695c385b4SNeil Horman 			dst_release(*dst);
10174c9483b2SDavid S. Miller 			memcpy(&fl_gw6, fl6, sizeof(struct flowi6));
10184c9483b2SDavid S. Miller 			memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr));
10194c9483b2SDavid S. Miller 			*dst = ip6_route_output(net, sk, &fl_gw6);
1020e5d08d71SIan Morris 			err = (*dst)->error;
1021e5d08d71SIan Morris 			if (err)
102295c385b4SNeil Horman 				goto out_err_release;
102395c385b4SNeil Horman 		}
102495c385b4SNeil Horman 	}
102595c385b4SNeil Horman #endif
1026ec5e3b0aSJonathan T. Leighton 	if (ipv6_addr_v4mapped(&fl6->saddr) &&
102700ea1ceeSWillem de Bruijn 	    !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) {
102800ea1ceeSWillem de Bruijn 		err = -EAFNOSUPPORT;
102900ea1ceeSWillem de Bruijn 		goto out_err_release;
103000ea1ceeSWillem de Bruijn 	}
103195c385b4SNeil Horman 
10321da177e4SLinus Torvalds 	return 0;
10331da177e4SLinus Torvalds 
10341da177e4SLinus Torvalds out_err_release:
10351da177e4SLinus Torvalds 	dst_release(*dst);
10361da177e4SLinus Torvalds 	*dst = NULL;
10378a966fc0SDavid Ahern 
10380d240e78SDavid Ahern 	if (err == -ENETUNREACH)
10390d240e78SDavid Ahern 		IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES);
10401da177e4SLinus Torvalds 	return err;
10411da177e4SLinus Torvalds }
104234a0b3cdSAdrian Bunk 
1043497c615aSHerbert Xu /**
1044497c615aSHerbert Xu  *	ip6_dst_lookup - perform route lookup on flow
1045497c615aSHerbert Xu  *	@sk: socket which provides route info
1046497c615aSHerbert Xu  *	@dst: pointer to dst_entry * for result
10474c9483b2SDavid S. Miller  *	@fl6: flow to lookup
1048497c615aSHerbert Xu  *
1049497c615aSHerbert Xu  *	This function performs a route lookup on the given flow.
1050497c615aSHerbert Xu  *
1051497c615aSHerbert Xu  *	It returns zero on success, or a standard errno code on error.
1052497c615aSHerbert Xu  */
1053343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst,
1054343d60aaSRoopa Prabhu 		   struct flowi6 *fl6)
1055497c615aSHerbert Xu {
1056497c615aSHerbert Xu 	*dst = NULL;
1057343d60aaSRoopa Prabhu 	return ip6_dst_lookup_tail(net, sk, dst, fl6);
1058497c615aSHerbert Xu }
10593cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup);
10603cf3dc6cSArnaldo Carvalho de Melo 
1061497c615aSHerbert Xu /**
106268d0c6d3SDavid S. Miller  *	ip6_dst_lookup_flow - perform route lookup on flow with ipsec
106368d0c6d3SDavid S. Miller  *	@sk: socket which provides route info
10644c9483b2SDavid S. Miller  *	@fl6: flow to lookup
106568d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
106668d0c6d3SDavid S. Miller  *
106768d0c6d3SDavid S. Miller  *	This function performs a route lookup on the given flow.
106868d0c6d3SDavid S. Miller  *
106968d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
107068d0c6d3SDavid S. Miller  *	error code.
107168d0c6d3SDavid S. Miller  */
10723aef934fSEric Dumazet struct dst_entry *ip6_dst_lookup_flow(const struct sock *sk, struct flowi6 *fl6,
10730e0d44abSSteffen Klassert 				      const struct in6_addr *final_dst)
107468d0c6d3SDavid S. Miller {
107568d0c6d3SDavid S. Miller 	struct dst_entry *dst = NULL;
107668d0c6d3SDavid S. Miller 	int err;
107768d0c6d3SDavid S. Miller 
1078343d60aaSRoopa Prabhu 	err = ip6_dst_lookup_tail(sock_net(sk), sk, &dst, fl6);
107968d0c6d3SDavid S. Miller 	if (err)
108068d0c6d3SDavid S. Miller 		return ERR_PTR(err);
108168d0c6d3SDavid S. Miller 	if (final_dst)
10824e3fd7a0SAlexey Dobriyan 		fl6->daddr = *final_dst;
10832774c131SDavid S. Miller 
1084f92ee619SSteffen Klassert 	return xfrm_lookup_route(sock_net(sk), dst, flowi6_to_flowi(fl6), sk, 0);
108568d0c6d3SDavid S. Miller }
108668d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow);
108768d0c6d3SDavid S. Miller 
108868d0c6d3SDavid S. Miller /**
108968d0c6d3SDavid S. Miller  *	ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow
109068d0c6d3SDavid S. Miller  *	@sk: socket which provides the dst cache and route info
10914c9483b2SDavid S. Miller  *	@fl6: flow to lookup
109268d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
109396818159SAlexey Kodanev  *	@connected: whether @sk is connected or not
1094497c615aSHerbert Xu  *
1095497c615aSHerbert Xu  *	This function performs a route lookup on the given flow with the
1096497c615aSHerbert Xu  *	possibility of using the cached route in the socket if it is valid.
1097497c615aSHerbert Xu  *	It will take the socket dst lock when operating on the dst cache.
1098497c615aSHerbert Xu  *	As a result, this function can only be used in process context.
1099497c615aSHerbert Xu  *
110096818159SAlexey Kodanev  *	In addition, for a connected socket, cache the dst in the socket
110196818159SAlexey Kodanev  *	if the current cache is not valid.
110296818159SAlexey Kodanev  *
110368d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
110468d0c6d3SDavid S. Miller  *	error code.
1105497c615aSHerbert Xu  */
11064c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6,
110796818159SAlexey Kodanev 					 const struct in6_addr *final_dst,
110896818159SAlexey Kodanev 					 bool connected)
1109497c615aSHerbert Xu {
111068d0c6d3SDavid S. Miller 	struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie);
1111497c615aSHerbert Xu 
11124c9483b2SDavid S. Miller 	dst = ip6_sk_dst_check(sk, dst, fl6);
111396818159SAlexey Kodanev 	if (dst)
111496818159SAlexey Kodanev 		return dst;
111596818159SAlexey Kodanev 
111600bc0ef5SJakub Sitnicki 	dst = ip6_dst_lookup_flow(sk, fl6, final_dst);
111796818159SAlexey Kodanev 	if (connected && !IS_ERR(dst))
111896818159SAlexey Kodanev 		ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6);
111968d0c6d3SDavid S. Miller 
112000bc0ef5SJakub Sitnicki 	return dst;
112168d0c6d3SDavid S. Miller }
112268d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow);
1123497c615aSHerbert Xu 
11240178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src,
11250178b695SHerbert Xu 					       gfp_t gfp)
11260178b695SHerbert Xu {
11270178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
11280178b695SHerbert Xu }
11290178b695SHerbert Xu 
11300178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src,
11310178b695SHerbert Xu 						gfp_t gfp)
11320178b695SHerbert Xu {
11330178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
11340178b695SHerbert Xu }
11350178b695SHerbert Xu 
113675a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu,
11370c183379SGao feng 				int *maxfraglen,
11380c183379SGao feng 				unsigned int fragheaderlen,
11390c183379SGao feng 				struct sk_buff *skb,
114075a493e6SHannes Frederic Sowa 				struct rt6_info *rt,
1141e367c2d0Slucien 				unsigned int orig_mtu)
11420c183379SGao feng {
11430c183379SGao feng 	if (!(rt->dst.flags & DST_XFRM_TUNNEL)) {
114463159f29SIan Morris 		if (!skb) {
11450c183379SGao feng 			/* first fragment, reserve header_len */
1146e367c2d0Slucien 			*mtu = orig_mtu - rt->dst.header_len;
11470c183379SGao feng 
11480c183379SGao feng 		} else {
11490c183379SGao feng 			/*
11500c183379SGao feng 			 * this fragment is not first, the headers
11510c183379SGao feng 			 * space is regarded as data space.
11520c183379SGao feng 			 */
1153e367c2d0Slucien 			*mtu = orig_mtu;
11540c183379SGao feng 		}
11550c183379SGao feng 		*maxfraglen = ((*mtu - fragheaderlen) & ~7)
11560c183379SGao feng 			      + fragheaderlen - sizeof(struct frag_hdr);
11570c183379SGao feng 	}
11580c183379SGao feng }
11590c183379SGao feng 
1160366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork,
116126879da5SWei Wang 			  struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6,
11625fdaa88dSWillem de Bruijn 			  struct rt6_info *rt, struct flowi6 *fl6)
1163366e41d9SVlad Yasevich {
1164366e41d9SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
1165366e41d9SVlad Yasevich 	unsigned int mtu;
116626879da5SWei Wang 	struct ipv6_txoptions *opt = ipc6->opt;
1167366e41d9SVlad Yasevich 
1168366e41d9SVlad Yasevich 	/*
1169366e41d9SVlad Yasevich 	 * setup for corking
1170366e41d9SVlad Yasevich 	 */
1171366e41d9SVlad Yasevich 	if (opt) {
1172366e41d9SVlad Yasevich 		if (WARN_ON(v6_cork->opt))
1173366e41d9SVlad Yasevich 			return -EINVAL;
1174366e41d9SVlad Yasevich 
1175864e2a1fSEric Dumazet 		v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation);
117663159f29SIan Morris 		if (unlikely(!v6_cork->opt))
1177366e41d9SVlad Yasevich 			return -ENOBUFS;
1178366e41d9SVlad Yasevich 
1179864e2a1fSEric Dumazet 		v6_cork->opt->tot_len = sizeof(*opt);
1180366e41d9SVlad Yasevich 		v6_cork->opt->opt_flen = opt->opt_flen;
1181366e41d9SVlad Yasevich 		v6_cork->opt->opt_nflen = opt->opt_nflen;
1182366e41d9SVlad Yasevich 
1183366e41d9SVlad Yasevich 		v6_cork->opt->dst0opt = ip6_opt_dup(opt->dst0opt,
1184366e41d9SVlad Yasevich 						    sk->sk_allocation);
1185366e41d9SVlad Yasevich 		if (opt->dst0opt && !v6_cork->opt->dst0opt)
1186366e41d9SVlad Yasevich 			return -ENOBUFS;
1187366e41d9SVlad Yasevich 
1188366e41d9SVlad Yasevich 		v6_cork->opt->dst1opt = ip6_opt_dup(opt->dst1opt,
1189366e41d9SVlad Yasevich 						    sk->sk_allocation);
1190366e41d9SVlad Yasevich 		if (opt->dst1opt && !v6_cork->opt->dst1opt)
1191366e41d9SVlad Yasevich 			return -ENOBUFS;
1192366e41d9SVlad Yasevich 
1193366e41d9SVlad Yasevich 		v6_cork->opt->hopopt = ip6_opt_dup(opt->hopopt,
1194366e41d9SVlad Yasevich 						   sk->sk_allocation);
1195366e41d9SVlad Yasevich 		if (opt->hopopt && !v6_cork->opt->hopopt)
1196366e41d9SVlad Yasevich 			return -ENOBUFS;
1197366e41d9SVlad Yasevich 
1198366e41d9SVlad Yasevich 		v6_cork->opt->srcrt = ip6_rthdr_dup(opt->srcrt,
1199366e41d9SVlad Yasevich 						    sk->sk_allocation);
1200366e41d9SVlad Yasevich 		if (opt->srcrt && !v6_cork->opt->srcrt)
1201366e41d9SVlad Yasevich 			return -ENOBUFS;
1202366e41d9SVlad Yasevich 
1203366e41d9SVlad Yasevich 		/* need source address above miyazawa*/
1204366e41d9SVlad Yasevich 	}
1205366e41d9SVlad Yasevich 	dst_hold(&rt->dst);
1206366e41d9SVlad Yasevich 	cork->base.dst = &rt->dst;
1207366e41d9SVlad Yasevich 	cork->fl.u.ip6 = *fl6;
120826879da5SWei Wang 	v6_cork->hop_limit = ipc6->hlimit;
120926879da5SWei Wang 	v6_cork->tclass = ipc6->tclass;
1210366e41d9SVlad Yasevich 	if (rt->dst.flags & DST_XFRM_TUNNEL)
1211366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1212749439bfSMike Maloney 		      READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst);
1213366e41d9SVlad Yasevich 	else
1214366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1215c02b3741SDavid S. Miller 			READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst));
1216366e41d9SVlad Yasevich 	if (np->frag_size < mtu) {
1217366e41d9SVlad Yasevich 		if (np->frag_size)
1218366e41d9SVlad Yasevich 			mtu = np->frag_size;
1219366e41d9SVlad Yasevich 	}
1220749439bfSMike Maloney 	if (mtu < IPV6_MIN_MTU)
1221749439bfSMike Maloney 		return -EINVAL;
1222366e41d9SVlad Yasevich 	cork->base.fragsize = mtu;
1223fbf47813SWillem de Bruijn 	cork->base.gso_size = ipc6->gso_size;
1224678ca42dSWillem de Bruijn 	cork->base.tx_flags = 0;
1225678ca42dSWillem de Bruijn 	sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags);
1226bec1f6f6SWillem de Bruijn 
12270f6c480fSDavid Miller 	if (dst_allfrag(xfrm_dst_path(&rt->dst)))
1228366e41d9SVlad Yasevich 		cork->base.flags |= IPCORK_ALLFRAG;
1229366e41d9SVlad Yasevich 	cork->base.length = 0;
1230366e41d9SVlad Yasevich 
12315fdaa88dSWillem de Bruijn 	cork->base.transmit_time = ipc6->sockc.transmit_time;
1232a818f75eSJesus Sanchez-Palencia 
1233366e41d9SVlad Yasevich 	return 0;
1234366e41d9SVlad Yasevich }
1235366e41d9SVlad Yasevich 
12360bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk,
12370bbe84a6SVlad Yasevich 			     struct flowi6 *fl6,
12380bbe84a6SVlad Yasevich 			     struct sk_buff_head *queue,
12390bbe84a6SVlad Yasevich 			     struct inet_cork *cork,
12400bbe84a6SVlad Yasevich 			     struct inet6_cork *v6_cork,
12410bbe84a6SVlad Yasevich 			     struct page_frag *pfrag,
12420bbe84a6SVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
12430bbe84a6SVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
12441da177e4SLinus Torvalds 			     void *from, int length, int transhdrlen,
12455fdaa88dSWillem de Bruijn 			     unsigned int flags, struct ipcm6_cookie *ipc6)
12461da177e4SLinus Torvalds {
12470c183379SGao feng 	struct sk_buff *skb, *skb_prev = NULL;
124810b8a3deSPaolo Abeni 	unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu;
12490bbe84a6SVlad Yasevich 	int exthdrlen = 0;
12500bbe84a6SVlad Yasevich 	int dst_exthdrlen = 0;
12511da177e4SLinus Torvalds 	int hh_len;
12521da177e4SLinus Torvalds 	int copy;
12531da177e4SLinus Torvalds 	int err;
12541da177e4SLinus Torvalds 	int offset = 0;
125509c2d251SWillem de Bruijn 	u32 tskey = 0;
12560bbe84a6SVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->dst;
12570bbe84a6SVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
125832dce968SVlad Yasevich 	int csummode = CHECKSUM_NONE;
1259682b1a9dSHannes Frederic Sowa 	unsigned int maxnonfragsize, headersize;
12601f4c6eb2SEric Dumazet 	unsigned int wmem_alloc_delta = 0;
126115e36f5bSWillem de Bruijn 	bool paged;
12621da177e4SLinus Torvalds 
12630bbe84a6SVlad Yasevich 	skb = skb_peek_tail(queue);
12640bbe84a6SVlad Yasevich 	if (!skb) {
12650bbe84a6SVlad Yasevich 		exthdrlen = opt ? opt->opt_flen : 0;
12667efdba5bSRomain KUNTZ 		dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len;
12671da177e4SLinus Torvalds 	}
12680bbe84a6SVlad Yasevich 
126915e36f5bSWillem de Bruijn 	paged = !!cork->gso_size;
1270bec1f6f6SWillem de Bruijn 	mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize;
1271e367c2d0Slucien 	orig_mtu = mtu;
12721da177e4SLinus Torvalds 
1273678ca42dSWillem de Bruijn 	if (cork->tx_flags & SKBTX_ANY_SW_TSTAMP &&
1274678ca42dSWillem de Bruijn 	    sk->sk_tsflags & SOF_TIMESTAMPING_OPT_ID)
1275678ca42dSWillem de Bruijn 		tskey = sk->sk_tskey++;
1276678ca42dSWillem de Bruijn 
1277d8d1f30bSChangli Gao 	hh_len = LL_RESERVED_SPACE(rt->dst.dev);
12781da177e4SLinus Torvalds 
1279a1b05140SMasahide NAKAMURA 	fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len +
1280b4ce9277SHerbert Xu 			(opt ? opt->opt_nflen : 0);
12814df98e76SHannes Frederic Sowa 	maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen -
12824df98e76SHannes Frederic Sowa 		     sizeof(struct frag_hdr);
12831da177e4SLinus Torvalds 
12844df98e76SHannes Frederic Sowa 	headersize = sizeof(struct ipv6hdr) +
12853a1cebe7SHannes Frederic Sowa 		     (opt ? opt->opt_flen + opt->opt_nflen : 0) +
12864df98e76SHannes Frederic Sowa 		     (dst_allfrag(&rt->dst) ?
12874df98e76SHannes Frederic Sowa 		      sizeof(struct frag_hdr) : 0) +
12884df98e76SHannes Frederic Sowa 		     rt->rt6i_nfheader_len;
12894df98e76SHannes Frederic Sowa 
129010b8a3deSPaolo Abeni 	/* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit
129110b8a3deSPaolo Abeni 	 * the first fragment
129210b8a3deSPaolo Abeni 	 */
129310b8a3deSPaolo Abeni 	if (headersize + transhdrlen > mtu)
129410b8a3deSPaolo Abeni 		goto emsgsize;
129510b8a3deSPaolo Abeni 
129626879da5SWei Wang 	if (cork->length + length > mtu - headersize && ipc6->dontfrag &&
12974df98e76SHannes Frederic Sowa 	    (sk->sk_protocol == IPPROTO_UDP ||
12984df98e76SHannes Frederic Sowa 	     sk->sk_protocol == IPPROTO_RAW)) {
12994df98e76SHannes Frederic Sowa 		ipv6_local_rxpmtu(sk, fl6, mtu - headersize +
13004df98e76SHannes Frederic Sowa 				sizeof(struct ipv6hdr));
13014df98e76SHannes Frederic Sowa 		goto emsgsize;
13024df98e76SHannes Frederic Sowa 	}
13034df98e76SHannes Frederic Sowa 
1304682b1a9dSHannes Frederic Sowa 	if (ip6_sk_ignore_df(sk))
1305682b1a9dSHannes Frederic Sowa 		maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN;
1306682b1a9dSHannes Frederic Sowa 	else
1307682b1a9dSHannes Frederic Sowa 		maxnonfragsize = mtu;
1308682b1a9dSHannes Frederic Sowa 
13094df98e76SHannes Frederic Sowa 	if (cork->length + length > maxnonfragsize - headersize) {
13104df98e76SHannes Frederic Sowa emsgsize:
131110b8a3deSPaolo Abeni 		pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0);
131210b8a3deSPaolo Abeni 		ipv6_local_error(sk, EMSGSIZE, fl6, pmtu);
13131da177e4SLinus Torvalds 		return -EMSGSIZE;
13141da177e4SLinus Torvalds 	}
1315682b1a9dSHannes Frederic Sowa 
1316682b1a9dSHannes Frederic Sowa 	/* CHECKSUM_PARTIAL only with no extension headers and when
1317682b1a9dSHannes Frederic Sowa 	 * we are not going to fragment
1318682b1a9dSHannes Frederic Sowa 	 */
1319682b1a9dSHannes Frederic Sowa 	if (transhdrlen && sk->sk_protocol == IPPROTO_UDP &&
1320682b1a9dSHannes Frederic Sowa 	    headersize == sizeof(struct ipv6hdr) &&
13212b89ed65SVlad Yasevich 	    length <= mtu - headersize &&
1322bec1f6f6SWillem de Bruijn 	    (!(flags & MSG_MORE) || cork->gso_size) &&
1323c8cd0989STom Herbert 	    rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM))
1324682b1a9dSHannes Frederic Sowa 		csummode = CHECKSUM_PARTIAL;
13251da177e4SLinus Torvalds 
13261da177e4SLinus Torvalds 	/*
13271da177e4SLinus Torvalds 	 * Let's try using as much space as possible.
13281da177e4SLinus Torvalds 	 * Use MTU if total length of the message fits into the MTU.
13291da177e4SLinus Torvalds 	 * Otherwise, we need to reserve fragment header and
13301da177e4SLinus Torvalds 	 * fragment alignment (= 8-15 octects, in total).
13311da177e4SLinus Torvalds 	 *
13321da177e4SLinus Torvalds 	 * Note that we may need to "move" the data from the tail of
13331da177e4SLinus Torvalds 	 * of the buffer to the new fragment when we split
13341da177e4SLinus Torvalds 	 * the message.
13351da177e4SLinus Torvalds 	 *
13361da177e4SLinus Torvalds 	 * FIXME: It may be fragmented into multiple chunks
13371da177e4SLinus Torvalds 	 *        at once if non-fragmentable extension headers
13381da177e4SLinus Torvalds 	 *        are too large.
13391da177e4SLinus Torvalds 	 * --yoshfuji
13401da177e4SLinus Torvalds 	 */
13411da177e4SLinus Torvalds 
13422811ebacSHannes Frederic Sowa 	cork->length += length;
13432811ebacSHannes Frederic Sowa 	if (!skb)
13441da177e4SLinus Torvalds 		goto alloc_new_skb;
13451da177e4SLinus Torvalds 
13461da177e4SLinus Torvalds 	while (length > 0) {
13471da177e4SLinus Torvalds 		/* Check if the remaining data fits into current packet. */
1348bdc712b4SDavid S. Miller 		copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len;
13491da177e4SLinus Torvalds 		if (copy < length)
13501da177e4SLinus Torvalds 			copy = maxfraglen - skb->len;
13511da177e4SLinus Torvalds 
13521da177e4SLinus Torvalds 		if (copy <= 0) {
13531da177e4SLinus Torvalds 			char *data;
13541da177e4SLinus Torvalds 			unsigned int datalen;
13551da177e4SLinus Torvalds 			unsigned int fraglen;
13561da177e4SLinus Torvalds 			unsigned int fraggap;
13571da177e4SLinus Torvalds 			unsigned int alloclen;
1358aba36930SWillem de Bruijn 			unsigned int pagedlen;
13591da177e4SLinus Torvalds alloc_new_skb:
13601da177e4SLinus Torvalds 			/* There's no room in the current skb */
13610c183379SGao feng 			if (skb)
13620c183379SGao feng 				fraggap = skb->len - maxfraglen;
13631da177e4SLinus Torvalds 			else
13641da177e4SLinus Torvalds 				fraggap = 0;
13650c183379SGao feng 			/* update mtu and maxfraglen if necessary */
136663159f29SIan Morris 			if (!skb || !skb_prev)
13670c183379SGao feng 				ip6_append_data_mtu(&mtu, &maxfraglen,
136875a493e6SHannes Frederic Sowa 						    fragheaderlen, skb, rt,
1369e367c2d0Slucien 						    orig_mtu);
13700c183379SGao feng 
13710c183379SGao feng 			skb_prev = skb;
13721da177e4SLinus Torvalds 
13731da177e4SLinus Torvalds 			/*
13741da177e4SLinus Torvalds 			 * If remaining data exceeds the mtu,
13751da177e4SLinus Torvalds 			 * we know we need more fragment(s).
13761da177e4SLinus Torvalds 			 */
13771da177e4SLinus Torvalds 			datalen = length + fraggap;
13781da177e4SLinus Torvalds 
13790c183379SGao feng 			if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen)
13800c183379SGao feng 				datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len;
138115e36f5bSWillem de Bruijn 			fraglen = datalen + fragheaderlen;
1382aba36930SWillem de Bruijn 			pagedlen = 0;
138315e36f5bSWillem de Bruijn 
13841da177e4SLinus Torvalds 			if ((flags & MSG_MORE) &&
1385d8d1f30bSChangli Gao 			    !(rt->dst.dev->features&NETIF_F_SG))
13861da177e4SLinus Torvalds 				alloclen = mtu;
138715e36f5bSWillem de Bruijn 			else if (!paged)
138815e36f5bSWillem de Bruijn 				alloclen = fraglen;
138915e36f5bSWillem de Bruijn 			else {
139015e36f5bSWillem de Bruijn 				alloclen = min_t(int, fraglen, MAX_HEADER);
139115e36f5bSWillem de Bruijn 				pagedlen = fraglen - alloclen;
139215e36f5bSWillem de Bruijn 			}
13931da177e4SLinus Torvalds 
1394299b0767SSteffen Klassert 			alloclen += dst_exthdrlen;
1395299b0767SSteffen Klassert 
13960c183379SGao feng 			if (datalen != length + fraggap) {
13971da177e4SLinus Torvalds 				/*
13980c183379SGao feng 				 * this is not the last fragment, the trailer
13990c183379SGao feng 				 * space is regarded as data space.
14001da177e4SLinus Torvalds 				 */
14010c183379SGao feng 				datalen += rt->dst.trailer_len;
14020c183379SGao feng 			}
14030c183379SGao feng 
1404d8d1f30bSChangli Gao 			alloclen += rt->dst.trailer_len;
14050c183379SGao feng 			fraglen = datalen + fragheaderlen;
14061da177e4SLinus Torvalds 
14071da177e4SLinus Torvalds 			/*
14081da177e4SLinus Torvalds 			 * We just reserve space for fragment header.
14091da177e4SLinus Torvalds 			 * Note: this may be overallocation if the message
14101da177e4SLinus Torvalds 			 * (without MSG_MORE) fits into the MTU.
14111da177e4SLinus Torvalds 			 */
14121da177e4SLinus Torvalds 			alloclen += sizeof(struct frag_hdr);
14131da177e4SLinus Torvalds 
141415e36f5bSWillem de Bruijn 			copy = datalen - transhdrlen - fraggap - pagedlen;
1415232cd35dSEric Dumazet 			if (copy < 0) {
1416232cd35dSEric Dumazet 				err = -EINVAL;
1417232cd35dSEric Dumazet 				goto error;
1418232cd35dSEric Dumazet 			}
14191da177e4SLinus Torvalds 			if (transhdrlen) {
14201da177e4SLinus Torvalds 				skb = sock_alloc_send_skb(sk,
14211da177e4SLinus Torvalds 						alloclen + hh_len,
14221da177e4SLinus Torvalds 						(flags & MSG_DONTWAIT), &err);
14231da177e4SLinus Torvalds 			} else {
14241da177e4SLinus Torvalds 				skb = NULL;
14251f4c6eb2SEric Dumazet 				if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <=
14261da177e4SLinus Torvalds 				    2 * sk->sk_sndbuf)
14271f4c6eb2SEric Dumazet 					skb = alloc_skb(alloclen + hh_len,
14281da177e4SLinus Torvalds 							sk->sk_allocation);
142963159f29SIan Morris 				if (unlikely(!skb))
14301da177e4SLinus Torvalds 					err = -ENOBUFS;
14311da177e4SLinus Torvalds 			}
143263159f29SIan Morris 			if (!skb)
14331da177e4SLinus Torvalds 				goto error;
14341da177e4SLinus Torvalds 			/*
14351da177e4SLinus Torvalds 			 *	Fill in the control structures
14361da177e4SLinus Torvalds 			 */
14379c9c9ad5SHannes Frederic Sowa 			skb->protocol = htons(ETH_P_IPV6);
143832dce968SVlad Yasevich 			skb->ip_summed = csummode;
14391da177e4SLinus Torvalds 			skb->csum = 0;
14401f85851eSGao feng 			/* reserve for fragmentation and ipsec header */
14411f85851eSGao feng 			skb_reserve(skb, hh_len + sizeof(struct frag_hdr) +
14421f85851eSGao feng 				    dst_exthdrlen);
14431da177e4SLinus Torvalds 
144411878b40SWillem de Bruijn 			/* Only the initial fragment is time stamped */
1445678ca42dSWillem de Bruijn 			skb_shinfo(skb)->tx_flags = cork->tx_flags;
1446678ca42dSWillem de Bruijn 			cork->tx_flags = 0;
144709c2d251SWillem de Bruijn 			skb_shinfo(skb)->tskey = tskey;
144809c2d251SWillem de Bruijn 			tskey = 0;
1449a693e698SAnders Berggren 
14501da177e4SLinus Torvalds 			/*
14511da177e4SLinus Torvalds 			 *	Find where to start putting bytes
14521da177e4SLinus Torvalds 			 */
145315e36f5bSWillem de Bruijn 			data = skb_put(skb, fraglen - pagedlen);
14541f85851eSGao feng 			skb_set_network_header(skb, exthdrlen);
14551f85851eSGao feng 			data += fragheaderlen;
1456b0e380b1SArnaldo Carvalho de Melo 			skb->transport_header = (skb->network_header +
1457b0e380b1SArnaldo Carvalho de Melo 						 fragheaderlen);
14581da177e4SLinus Torvalds 			if (fraggap) {
14591da177e4SLinus Torvalds 				skb->csum = skb_copy_and_csum_bits(
14601da177e4SLinus Torvalds 					skb_prev, maxfraglen,
14611da177e4SLinus Torvalds 					data + transhdrlen, fraggap, 0);
14621da177e4SLinus Torvalds 				skb_prev->csum = csum_sub(skb_prev->csum,
14631da177e4SLinus Torvalds 							  skb->csum);
14641da177e4SLinus Torvalds 				data += fraggap;
1465e9fa4f7bSHerbert Xu 				pskb_trim_unique(skb_prev, maxfraglen);
14661da177e4SLinus Torvalds 			}
1467232cd35dSEric Dumazet 			if (copy > 0 &&
1468232cd35dSEric Dumazet 			    getfrag(from, data + transhdrlen, offset,
1469232cd35dSEric Dumazet 				    copy, fraggap, skb) < 0) {
14701da177e4SLinus Torvalds 				err = -EFAULT;
14711da177e4SLinus Torvalds 				kfree_skb(skb);
14721da177e4SLinus Torvalds 				goto error;
14731da177e4SLinus Torvalds 			}
14741da177e4SLinus Torvalds 
14751da177e4SLinus Torvalds 			offset += copy;
147615e36f5bSWillem de Bruijn 			length -= copy + transhdrlen;
14771da177e4SLinus Torvalds 			transhdrlen = 0;
14781da177e4SLinus Torvalds 			exthdrlen = 0;
1479299b0767SSteffen Klassert 			dst_exthdrlen = 0;
14801da177e4SLinus Torvalds 
14810dec879fSJulian Anastasov 			if ((flags & MSG_CONFIRM) && !skb_prev)
14820dec879fSJulian Anastasov 				skb_set_dst_pending_confirm(skb, 1);
14830dec879fSJulian Anastasov 
14841da177e4SLinus Torvalds 			/*
14851da177e4SLinus Torvalds 			 * Put the packet on the pending queue
14861da177e4SLinus Torvalds 			 */
14871f4c6eb2SEric Dumazet 			if (!skb->destructor) {
14881f4c6eb2SEric Dumazet 				skb->destructor = sock_wfree;
14891f4c6eb2SEric Dumazet 				skb->sk = sk;
14901f4c6eb2SEric Dumazet 				wmem_alloc_delta += skb->truesize;
14911f4c6eb2SEric Dumazet 			}
14920bbe84a6SVlad Yasevich 			__skb_queue_tail(queue, skb);
14931da177e4SLinus Torvalds 			continue;
14941da177e4SLinus Torvalds 		}
14951da177e4SLinus Torvalds 
14961da177e4SLinus Torvalds 		if (copy > length)
14971da177e4SLinus Torvalds 			copy = length;
14981da177e4SLinus Torvalds 
1499113f99c3SWillem de Bruijn 		if (!(rt->dst.dev->features&NETIF_F_SG) &&
1500113f99c3SWillem de Bruijn 		    skb_tailroom(skb) >= copy) {
15011da177e4SLinus Torvalds 			unsigned int off;
15021da177e4SLinus Torvalds 
15031da177e4SLinus Torvalds 			off = skb->len;
15041da177e4SLinus Torvalds 			if (getfrag(from, skb_put(skb, copy),
15051da177e4SLinus Torvalds 						offset, copy, off, skb) < 0) {
15061da177e4SLinus Torvalds 				__skb_trim(skb, off);
15071da177e4SLinus Torvalds 				err = -EFAULT;
15081da177e4SLinus Torvalds 				goto error;
15091da177e4SLinus Torvalds 			}
15101da177e4SLinus Torvalds 		} else {
15111da177e4SLinus Torvalds 			int i = skb_shinfo(skb)->nr_frags;
15121da177e4SLinus Torvalds 
15131da177e4SLinus Torvalds 			err = -ENOMEM;
15145640f768SEric Dumazet 			if (!sk_page_frag_refill(sk, pfrag))
15151da177e4SLinus Torvalds 				goto error;
15161da177e4SLinus Torvalds 
15175640f768SEric Dumazet 			if (!skb_can_coalesce(skb, i, pfrag->page,
15185640f768SEric Dumazet 					      pfrag->offset)) {
15191da177e4SLinus Torvalds 				err = -EMSGSIZE;
15205640f768SEric Dumazet 				if (i == MAX_SKB_FRAGS)
15211da177e4SLinus Torvalds 					goto error;
15225640f768SEric Dumazet 
15235640f768SEric Dumazet 				__skb_fill_page_desc(skb, i, pfrag->page,
15245640f768SEric Dumazet 						     pfrag->offset, 0);
15255640f768SEric Dumazet 				skb_shinfo(skb)->nr_frags = ++i;
15265640f768SEric Dumazet 				get_page(pfrag->page);
15271da177e4SLinus Torvalds 			}
15285640f768SEric Dumazet 			copy = min_t(int, copy, pfrag->size - pfrag->offset);
15299e903e08SEric Dumazet 			if (getfrag(from,
15305640f768SEric Dumazet 				    page_address(pfrag->page) + pfrag->offset,
15315640f768SEric Dumazet 				    offset, copy, skb->len, skb) < 0)
15325640f768SEric Dumazet 				goto error_efault;
15335640f768SEric Dumazet 
15345640f768SEric Dumazet 			pfrag->offset += copy;
15355640f768SEric Dumazet 			skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy);
15361da177e4SLinus Torvalds 			skb->len += copy;
15371da177e4SLinus Torvalds 			skb->data_len += copy;
1538f945fa7aSHerbert Xu 			skb->truesize += copy;
15391f4c6eb2SEric Dumazet 			wmem_alloc_delta += copy;
15401da177e4SLinus Torvalds 		}
15411da177e4SLinus Torvalds 		offset += copy;
15421da177e4SLinus Torvalds 		length -= copy;
15431da177e4SLinus Torvalds 	}
15445640f768SEric Dumazet 
15459e8445a5SPaolo Abeni 	if (wmem_alloc_delta)
15461f4c6eb2SEric Dumazet 		refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
15471da177e4SLinus Torvalds 	return 0;
15485640f768SEric Dumazet 
15495640f768SEric Dumazet error_efault:
15505640f768SEric Dumazet 	err = -EFAULT;
15511da177e4SLinus Torvalds error:
1552bdc712b4SDavid S. Miller 	cork->length -= length;
15533bd653c8SDenis V. Lunev 	IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS);
15541f4c6eb2SEric Dumazet 	refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
15551da177e4SLinus Torvalds 	return err;
15561da177e4SLinus Torvalds }
15570bbe84a6SVlad Yasevich 
15580bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk,
15590bbe84a6SVlad Yasevich 		    int getfrag(void *from, char *to, int offset, int len,
15600bbe84a6SVlad Yasevich 				int odd, struct sk_buff *skb),
156126879da5SWei Wang 		    void *from, int length, int transhdrlen,
156226879da5SWei Wang 		    struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
15635fdaa88dSWillem de Bruijn 		    struct rt6_info *rt, unsigned int flags)
15640bbe84a6SVlad Yasevich {
15650bbe84a6SVlad Yasevich 	struct inet_sock *inet = inet_sk(sk);
15660bbe84a6SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
15670bbe84a6SVlad Yasevich 	int exthdrlen;
15680bbe84a6SVlad Yasevich 	int err;
15690bbe84a6SVlad Yasevich 
15700bbe84a6SVlad Yasevich 	if (flags&MSG_PROBE)
15710bbe84a6SVlad Yasevich 		return 0;
15720bbe84a6SVlad Yasevich 	if (skb_queue_empty(&sk->sk_write_queue)) {
15730bbe84a6SVlad Yasevich 		/*
15740bbe84a6SVlad Yasevich 		 * setup for corking
15750bbe84a6SVlad Yasevich 		 */
157626879da5SWei Wang 		err = ip6_setup_cork(sk, &inet->cork, &np->cork,
15775fdaa88dSWillem de Bruijn 				     ipc6, rt, fl6);
15780bbe84a6SVlad Yasevich 		if (err)
15790bbe84a6SVlad Yasevich 			return err;
15800bbe84a6SVlad Yasevich 
158126879da5SWei Wang 		exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
15820bbe84a6SVlad Yasevich 		length += exthdrlen;
15830bbe84a6SVlad Yasevich 		transhdrlen += exthdrlen;
15840bbe84a6SVlad Yasevich 	} else {
15850bbe84a6SVlad Yasevich 		fl6 = &inet->cork.fl.u.ip6;
15860bbe84a6SVlad Yasevich 		transhdrlen = 0;
15870bbe84a6SVlad Yasevich 	}
15880bbe84a6SVlad Yasevich 
15890bbe84a6SVlad Yasevich 	return __ip6_append_data(sk, fl6, &sk->sk_write_queue, &inet->cork.base,
15900bbe84a6SVlad Yasevich 				 &np->cork, sk_page_frag(sk), getfrag,
15915fdaa88dSWillem de Bruijn 				 from, length, transhdrlen, flags, ipc6);
15920bbe84a6SVlad Yasevich }
1593a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data);
15941da177e4SLinus Torvalds 
1595366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork,
1596366e41d9SVlad Yasevich 			     struct inet6_cork *v6_cork)
1597bf138862SPavel Emelyanov {
1598366e41d9SVlad Yasevich 	if (v6_cork->opt) {
1599366e41d9SVlad Yasevich 		kfree(v6_cork->opt->dst0opt);
1600366e41d9SVlad Yasevich 		kfree(v6_cork->opt->dst1opt);
1601366e41d9SVlad Yasevich 		kfree(v6_cork->opt->hopopt);
1602366e41d9SVlad Yasevich 		kfree(v6_cork->opt->srcrt);
1603366e41d9SVlad Yasevich 		kfree(v6_cork->opt);
1604366e41d9SVlad Yasevich 		v6_cork->opt = NULL;
16050178b695SHerbert Xu 	}
16060178b695SHerbert Xu 
1607366e41d9SVlad Yasevich 	if (cork->base.dst) {
1608366e41d9SVlad Yasevich 		dst_release(cork->base.dst);
1609366e41d9SVlad Yasevich 		cork->base.dst = NULL;
1610366e41d9SVlad Yasevich 		cork->base.flags &= ~IPCORK_ALLFRAG;
1611bf138862SPavel Emelyanov 	}
1612366e41d9SVlad Yasevich 	memset(&cork->fl, 0, sizeof(cork->fl));
1613bf138862SPavel Emelyanov }
1614bf138862SPavel Emelyanov 
16156422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk,
16166422398cSVlad Yasevich 			       struct sk_buff_head *queue,
16176422398cSVlad Yasevich 			       struct inet_cork_full *cork,
16186422398cSVlad Yasevich 			       struct inet6_cork *v6_cork)
16191da177e4SLinus Torvalds {
16201da177e4SLinus Torvalds 	struct sk_buff *skb, *tmp_skb;
16211da177e4SLinus Torvalds 	struct sk_buff **tail_skb;
16221da177e4SLinus Torvalds 	struct in6_addr final_dst_buf, *final_dst = &final_dst_buf;
16231da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
16243bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
16251da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
16266422398cSVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
16276422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->base.dst;
16286422398cSVlad Yasevich 	struct flowi6 *fl6 = &cork->fl.u.ip6;
16294c9483b2SDavid S. Miller 	unsigned char proto = fl6->flowi6_proto;
16301da177e4SLinus Torvalds 
16316422398cSVlad Yasevich 	skb = __skb_dequeue(queue);
163263159f29SIan Morris 	if (!skb)
16331da177e4SLinus Torvalds 		goto out;
16341da177e4SLinus Torvalds 	tail_skb = &(skb_shinfo(skb)->frag_list);
16351da177e4SLinus Torvalds 
16361da177e4SLinus Torvalds 	/* move skb->data to ip header from ext header */
1637d56f90a7SArnaldo Carvalho de Melo 	if (skb->data < skb_network_header(skb))
1638bbe735e4SArnaldo Carvalho de Melo 		__skb_pull(skb, skb_network_offset(skb));
16396422398cSVlad Yasevich 	while ((tmp_skb = __skb_dequeue(queue)) != NULL) {
1640cfe1fc77SArnaldo Carvalho de Melo 		__skb_pull(tmp_skb, skb_network_header_len(skb));
16411da177e4SLinus Torvalds 		*tail_skb = tmp_skb;
16421da177e4SLinus Torvalds 		tail_skb = &(tmp_skb->next);
16431da177e4SLinus Torvalds 		skb->len += tmp_skb->len;
16441da177e4SLinus Torvalds 		skb->data_len += tmp_skb->len;
16451da177e4SLinus Torvalds 		skb->truesize += tmp_skb->truesize;
16461da177e4SLinus Torvalds 		tmp_skb->destructor = NULL;
16471da177e4SLinus Torvalds 		tmp_skb->sk = NULL;
16481da177e4SLinus Torvalds 	}
16491da177e4SLinus Torvalds 
165028a89453SHerbert Xu 	/* Allow local fragmentation. */
165160ff7467SWANG Cong 	skb->ignore_df = ip6_sk_ignore_df(sk);
165228a89453SHerbert Xu 
16534e3fd7a0SAlexey Dobriyan 	*final_dst = fl6->daddr;
1654cfe1fc77SArnaldo Carvalho de Melo 	__skb_pull(skb, skb_network_header_len(skb));
16551da177e4SLinus Torvalds 	if (opt && opt->opt_flen)
16561da177e4SLinus Torvalds 		ipv6_push_frag_opts(skb, opt, &proto);
16571da177e4SLinus Torvalds 	if (opt && opt->opt_nflen)
1658613fa3caSDavid Lebrun 		ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr);
16591da177e4SLinus Torvalds 
1660e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
1661e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
16620660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
16631da177e4SLinus Torvalds 
16646422398cSVlad Yasevich 	ip6_flow_hdr(hdr, v6_cork->tclass,
1665cb1ce2efSTom Herbert 		     ip6_make_flowlabel(net, skb, fl6->flowlabel,
1666513674b5SShaohua Li 					ip6_autoflowlabel(net, np), fl6));
16676422398cSVlad Yasevich 	hdr->hop_limit = v6_cork->hop_limit;
16681da177e4SLinus Torvalds 	hdr->nexthdr = proto;
16694e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
16704e3fd7a0SAlexey Dobriyan 	hdr->daddr = *final_dst;
16711da177e4SLinus Torvalds 
1672a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
16734a19ec58SLaszlo Attila Toth 	skb->mark = sk->sk_mark;
1674a2c2064fSPatrick McHardy 
1675a818f75eSJesus Sanchez-Palencia 	skb->tstamp = cork->base.transmit_time;
1676a818f75eSJesus Sanchez-Palencia 
1677d8d1f30bSChangli Gao 	skb_dst_set(skb, dst_clone(&rt->dst));
1678edf391ffSNeil Horman 	IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len);
167914878f75SDavid L Stevens 	if (proto == IPPROTO_ICMPV6) {
1680adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
168114878f75SDavid L Stevens 
168243a43b60SHannes Frederic Sowa 		ICMP6MSGOUT_INC_STATS(net, idev, icmp6_hdr(skb)->icmp6_type);
168343a43b60SHannes Frederic Sowa 		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
168414878f75SDavid L Stevens 	}
168514878f75SDavid L Stevens 
16866422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
16876422398cSVlad Yasevich out:
16886422398cSVlad Yasevich 	return skb;
16896422398cSVlad Yasevich }
16906422398cSVlad Yasevich 
16916422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb)
16926422398cSVlad Yasevich {
16936422398cSVlad Yasevich 	struct net *net = sock_net(skb->sk);
16946422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
16956422398cSVlad Yasevich 	int err;
16966422398cSVlad Yasevich 
169733224b16SEric W. Biederman 	err = ip6_local_out(net, skb->sk, skb);
16981da177e4SLinus Torvalds 	if (err) {
16991da177e4SLinus Torvalds 		if (err > 0)
17006ce9e7b5SEric Dumazet 			err = net_xmit_errno(err);
17011da177e4SLinus Torvalds 		if (err)
17026422398cSVlad Yasevich 			IP6_INC_STATS(net, rt->rt6i_idev,
17036422398cSVlad Yasevich 				      IPSTATS_MIB_OUTDISCARDS);
17041da177e4SLinus Torvalds 	}
17051da177e4SLinus Torvalds 
17061da177e4SLinus Torvalds 	return err;
17076422398cSVlad Yasevich }
17086422398cSVlad Yasevich 
17096422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk)
17106422398cSVlad Yasevich {
17116422398cSVlad Yasevich 	struct sk_buff *skb;
17126422398cSVlad Yasevich 
17136422398cSVlad Yasevich 	skb = ip6_finish_skb(sk);
17146422398cSVlad Yasevich 	if (!skb)
17156422398cSVlad Yasevich 		return 0;
17166422398cSVlad Yasevich 
17176422398cSVlad Yasevich 	return ip6_send_skb(skb);
17181da177e4SLinus Torvalds }
1719a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames);
17201da177e4SLinus Torvalds 
17210bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk,
17226422398cSVlad Yasevich 				       struct sk_buff_head *queue,
17236422398cSVlad Yasevich 				       struct inet_cork_full *cork,
17246422398cSVlad Yasevich 				       struct inet6_cork *v6_cork)
17251da177e4SLinus Torvalds {
17261da177e4SLinus Torvalds 	struct sk_buff *skb;
17271da177e4SLinus Torvalds 
17280bbe84a6SVlad Yasevich 	while ((skb = __skb_dequeue_tail(queue)) != NULL) {
1729adf30907SEric Dumazet 		if (skb_dst(skb))
1730adf30907SEric Dumazet 			IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)),
1731a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_OUTDISCARDS);
17321da177e4SLinus Torvalds 		kfree_skb(skb);
17331da177e4SLinus Torvalds 	}
17341da177e4SLinus Torvalds 
17356422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
17361da177e4SLinus Torvalds }
17370bbe84a6SVlad Yasevich 
17380bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk)
17390bbe84a6SVlad Yasevich {
17406422398cSVlad Yasevich 	__ip6_flush_pending_frames(sk, &sk->sk_write_queue,
17416422398cSVlad Yasevich 				   &inet_sk(sk)->cork, &inet6_sk(sk)->cork);
17420bbe84a6SVlad Yasevich }
1743a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames);
17446422398cSVlad Yasevich 
17456422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk,
17466422398cSVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
17476422398cSVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
17486422398cSVlad Yasevich 			     void *from, int length, int transhdrlen,
174926879da5SWei Wang 			     struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
17506422398cSVlad Yasevich 			     struct rt6_info *rt, unsigned int flags,
17515fdaa88dSWillem de Bruijn 			     struct inet_cork_full *cork)
17526422398cSVlad Yasevich {
17536422398cSVlad Yasevich 	struct inet6_cork v6_cork;
17546422398cSVlad Yasevich 	struct sk_buff_head queue;
175526879da5SWei Wang 	int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
17566422398cSVlad Yasevich 	int err;
17576422398cSVlad Yasevich 
17586422398cSVlad Yasevich 	if (flags & MSG_PROBE)
17596422398cSVlad Yasevich 		return NULL;
17606422398cSVlad Yasevich 
17616422398cSVlad Yasevich 	__skb_queue_head_init(&queue);
17626422398cSVlad Yasevich 
17631cd7884dSWillem de Bruijn 	cork->base.flags = 0;
17641cd7884dSWillem de Bruijn 	cork->base.addr = 0;
17651cd7884dSWillem de Bruijn 	cork->base.opt = NULL;
17661cd7884dSWillem de Bruijn 	cork->base.dst = NULL;
17676422398cSVlad Yasevich 	v6_cork.opt = NULL;
17685fdaa88dSWillem de Bruijn 	err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt, fl6);
1769862c03eeSEric Dumazet 	if (err) {
17701cd7884dSWillem de Bruijn 		ip6_cork_release(cork, &v6_cork);
17716422398cSVlad Yasevich 		return ERR_PTR(err);
1772862c03eeSEric Dumazet 	}
177326879da5SWei Wang 	if (ipc6->dontfrag < 0)
177426879da5SWei Wang 		ipc6->dontfrag = inet6_sk(sk)->dontfrag;
17756422398cSVlad Yasevich 
17761cd7884dSWillem de Bruijn 	err = __ip6_append_data(sk, fl6, &queue, &cork->base, &v6_cork,
17776422398cSVlad Yasevich 				&current->task_frag, getfrag, from,
17786422398cSVlad Yasevich 				length + exthdrlen, transhdrlen + exthdrlen,
17795fdaa88dSWillem de Bruijn 				flags, ipc6);
17806422398cSVlad Yasevich 	if (err) {
17811cd7884dSWillem de Bruijn 		__ip6_flush_pending_frames(sk, &queue, cork, &v6_cork);
17826422398cSVlad Yasevich 		return ERR_PTR(err);
17836422398cSVlad Yasevich 	}
17846422398cSVlad Yasevich 
17851cd7884dSWillem de Bruijn 	return __ip6_make_skb(sk, &queue, cork, &v6_cork);
17866422398cSVlad Yasevich }
1787