xref: /openbmc/linux/net/ipv6/ip6_output.c (revision e3390b30a5dfb112e8e802a59c0f68f947b638b2)
12874c5fdSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later
21da177e4SLinus Torvalds /*
31da177e4SLinus Torvalds  *	IPv6 output functions
41da177e4SLinus Torvalds  *	Linux INET6 implementation
51da177e4SLinus Torvalds  *
61da177e4SLinus Torvalds  *	Authors:
71da177e4SLinus Torvalds  *	Pedro Roque		<roque@di.fc.ul.pt>
81da177e4SLinus Torvalds  *
91da177e4SLinus Torvalds  *	Based on linux/net/ipv4/ip_output.c
101da177e4SLinus Torvalds  *
111da177e4SLinus Torvalds  *	Changes:
121da177e4SLinus Torvalds  *	A.N.Kuznetsov	:	airthmetics in fragmentation.
131da177e4SLinus Torvalds  *				extension headers are implemented.
141da177e4SLinus Torvalds  *				route changes now work.
151da177e4SLinus Torvalds  *				ip6_forward does not confuse sniffers.
161da177e4SLinus Torvalds  *				etc.
171da177e4SLinus Torvalds  *
181da177e4SLinus Torvalds  *      H. von Brand    :       Added missing #include <linux/string.h>
191da177e4SLinus Torvalds  *	Imran Patel	:	frag id should be in NBO
201da177e4SLinus Torvalds  *      Kazunori MIYAZAWA @USAGI
211da177e4SLinus Torvalds  *			:       add ip6_append_data and related functions
221da177e4SLinus Torvalds  *				for datagram xmit
231da177e4SLinus Torvalds  */
241da177e4SLinus Torvalds 
251da177e4SLinus Torvalds #include <linux/errno.h>
26ef76bc23SHerbert Xu #include <linux/kernel.h>
271da177e4SLinus Torvalds #include <linux/string.h>
281da177e4SLinus Torvalds #include <linux/socket.h>
291da177e4SLinus Torvalds #include <linux/net.h>
301da177e4SLinus Torvalds #include <linux/netdevice.h>
311da177e4SLinus Torvalds #include <linux/if_arp.h>
321da177e4SLinus Torvalds #include <linux/in6.h>
331da177e4SLinus Torvalds #include <linux/tcp.h>
341da177e4SLinus Torvalds #include <linux/route.h>
35b59f45d0SHerbert Xu #include <linux/module.h>
365a0e3ad6STejun Heo #include <linux/slab.h>
371da177e4SLinus Torvalds 
3833b48679SDaniel Mack #include <linux/bpf-cgroup.h>
391da177e4SLinus Torvalds #include <linux/netfilter.h>
401da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h>
411da177e4SLinus Torvalds 
421da177e4SLinus Torvalds #include <net/sock.h>
431da177e4SLinus Torvalds #include <net/snmp.h>
441da177e4SLinus Torvalds 
45d457a0e3SEric Dumazet #include <net/gso.h>
461da177e4SLinus Torvalds #include <net/ipv6.h>
471da177e4SLinus Torvalds #include <net/ndisc.h>
481da177e4SLinus Torvalds #include <net/protocol.h>
491da177e4SLinus Torvalds #include <net/ip6_route.h>
501da177e4SLinus Torvalds #include <net/addrconf.h>
511da177e4SLinus Torvalds #include <net/rawv6.h>
521da177e4SLinus Torvalds #include <net/icmp.h>
531da177e4SLinus Torvalds #include <net/xfrm.h>
541da177e4SLinus Torvalds #include <net/checksum.h>
557bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h>
56ca254490SDavid Ahern #include <net/l3mdev.h>
5714972cbdSRoopa Prabhu #include <net/lwtunnel.h>
58571912c6SMartin Varghese #include <net/ip_tunnels.h>
591da177e4SLinus Torvalds 
607d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb)
611da177e4SLinus Torvalds {
62adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
631da177e4SLinus Torvalds 	struct net_device *dev = dst->dev;
64e415ed3aSVasily Averin 	struct inet6_dev *idev = ip6_dst_idev(dst);
655796015fSVasily Averin 	unsigned int hh_len = LL_RESERVED_SPACE(dev);
66e415ed3aSVasily Averin 	const struct in6_addr *daddr, *nexthop;
67e415ed3aSVasily Averin 	struct ipv6hdr *hdr;
68f6b72b62SDavid S. Miller 	struct neighbour *neigh;
696fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	int ret;
701da177e4SLinus Torvalds 
715796015fSVasily Averin 	/* Be paranoid, rather than too clever. */
72e415ed3aSVasily Averin 	if (unlikely(hh_len > skb_headroom(skb)) && dev->header_ops) {
73e415ed3aSVasily Averin 		skb = skb_expand_head(skb, hh_len);
745796015fSVasily Averin 		if (!skb) {
75e415ed3aSVasily Averin 			IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
765796015fSVasily Averin 			return -ENOMEM;
775796015fSVasily Averin 		}
785796015fSVasily Averin 	}
795796015fSVasily Averin 
80e415ed3aSVasily Averin 	hdr = ipv6_hdr(skb);
81e415ed3aSVasily Averin 	daddr = &hdr->daddr;
82e415ed3aSVasily Averin 	if (ipv6_addr_is_multicast(daddr)) {
837026b1ddSDavid Miller 		if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) &&
848571ab47SYuval Mintz 		    ((mroute6_is_socket(net, skb) &&
85bd91b8bfSBenjamin Thery 		     !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) ||
86e415ed3aSVasily Averin 		     ipv6_chk_mcast_addr(dev, daddr, &hdr->saddr))) {
871da177e4SLinus Torvalds 			struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC);
881da177e4SLinus Torvalds 
891da177e4SLinus Torvalds 			/* Do not check for IFF_ALLMULTI; multicast routing
901da177e4SLinus Torvalds 			   is not supported in any case.
911da177e4SLinus Torvalds 			 */
921da177e4SLinus Torvalds 			if (newskb)
93b2e0b385SJan Engelhardt 				NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING,
9429a26a56SEric W. Biederman 					net, sk, newskb, NULL, newskb->dev,
9595603e22SMichel Machado 					dev_loopback_xmit);
961da177e4SLinus Torvalds 
97e415ed3aSVasily Averin 			if (hdr->hop_limit == 0) {
9878126c41SEric W. Biederman 				IP6_INC_STATS(net, idev,
993bd653c8SDenis V. Lunev 					      IPSTATS_MIB_OUTDISCARDS);
1001da177e4SLinus Torvalds 				kfree_skb(skb);
1011da177e4SLinus Torvalds 				return 0;
1021da177e4SLinus Torvalds 			}
1031da177e4SLinus Torvalds 		}
1041da177e4SLinus Torvalds 
10578126c41SEric W. Biederman 		IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len);
106e415ed3aSVasily Averin 		if (IPV6_ADDR_MC_SCOPE(daddr) <= IPV6_ADDR_SCOPE_NODELOCAL &&
107dd408515SHannes Frederic Sowa 		    !(dev->flags & IFF_LOOPBACK)) {
108dd408515SHannes Frederic Sowa 			kfree_skb(skb);
109dd408515SHannes Frederic Sowa 			return 0;
110dd408515SHannes Frederic Sowa 		}
1111da177e4SLinus Torvalds 	}
1121da177e4SLinus Torvalds 
11314972cbdSRoopa Prabhu 	if (lwtunnel_xmit_redirect(dst->lwtstate)) {
11414972cbdSRoopa Prabhu 		int res = lwtunnel_xmit(skb);
11514972cbdSRoopa Prabhu 
116a171fbecSYan Zhai 		if (res != LWTUNNEL_XMIT_CONTINUE)
11714972cbdSRoopa Prabhu 			return res;
11814972cbdSRoopa Prabhu 	}
11914972cbdSRoopa Prabhu 
12009eed119SEric Dumazet 	rcu_read_lock();
121e415ed3aSVasily Averin 	nexthop = rt6_nexthop((struct rt6_info *)dst, daddr);
122e415ed3aSVasily Averin 	neigh = __ipv6_neigh_lookup_noref(dev, nexthop);
12358f71be5SPavel Begunkov 
12458f71be5SPavel Begunkov 	if (unlikely(IS_ERR_OR_NULL(neigh))) {
1256fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		if (unlikely(!neigh))
126e415ed3aSVasily Averin 			neigh = __neigh_create(&nd_tbl, nexthop, dev, false);
12758f71be5SPavel Begunkov 		if (IS_ERR(neigh)) {
12809eed119SEric Dumazet 			rcu_read_unlock();
12958f71be5SPavel Begunkov 			IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTNOROUTES);
13058f71be5SPavel Begunkov 			kfree_skb_reason(skb, SKB_DROP_REASON_NEIGH_CREATEFAIL);
13158f71be5SPavel Begunkov 			return -EINVAL;
13258f71be5SPavel Begunkov 		}
13358f71be5SPavel Begunkov 	}
1344ff06203SJulian Anastasov 	sock_confirm_neigh(skb, neigh);
1350353f282SDavid Ahern 	ret = neigh_output(neigh, skb, false);
13609eed119SEric Dumazet 	rcu_read_unlock();
1376fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	return ret;
1386fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 }
1391da177e4SLinus Torvalds 
140b210de4fSAya Levin static int
141b210de4fSAya Levin ip6_finish_output_gso_slowpath_drop(struct net *net, struct sock *sk,
142b210de4fSAya Levin 				    struct sk_buff *skb, unsigned int mtu)
143b210de4fSAya Levin {
144b210de4fSAya Levin 	struct sk_buff *segs, *nskb;
145b210de4fSAya Levin 	netdev_features_t features;
146b210de4fSAya Levin 	int ret = 0;
147b210de4fSAya Levin 
148b210de4fSAya Levin 	/* Please see corresponding comment in ip_finish_output_gso
149b210de4fSAya Levin 	 * describing the cases where GSO segment length exceeds the
150b210de4fSAya Levin 	 * egress MTU.
151b210de4fSAya Levin 	 */
152b210de4fSAya Levin 	features = netif_skb_features(skb);
153b210de4fSAya Levin 	segs = skb_gso_segment(skb, features & ~NETIF_F_GSO_MASK);
154b210de4fSAya Levin 	if (IS_ERR_OR_NULL(segs)) {
155b210de4fSAya Levin 		kfree_skb(skb);
156b210de4fSAya Levin 		return -ENOMEM;
157b210de4fSAya Levin 	}
158b210de4fSAya Levin 
159b210de4fSAya Levin 	consume_skb(skb);
160b210de4fSAya Levin 
161b210de4fSAya Levin 	skb_list_walk_safe(segs, segs, nskb) {
162b210de4fSAya Levin 		int err;
163b210de4fSAya Levin 
164b210de4fSAya Levin 		skb_mark_not_on_list(segs);
165b210de4fSAya Levin 		err = ip6_fragment(net, sk, segs, ip6_finish_output2);
166b210de4fSAya Levin 		if (err && ret == 0)
167b210de4fSAya Levin 			ret = err;
168b210de4fSAya Levin 	}
169b210de4fSAya Levin 
170b210de4fSAya Levin 	return ret;
171b210de4fSAya Levin }
172b210de4fSAya Levin 
173956fe219Sbrakmo static int __ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1749e508490SJan Engelhardt {
175b210de4fSAya Levin 	unsigned int mtu;
176b210de4fSAya Levin 
17709ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM)
17809ee9dbaSTobias Brunner 	/* Policy lookup after SNAT yielded a new policy */
17909ee9dbaSTobias Brunner 	if (skb_dst(skb)->xfrm) {
18019d36c5fSEric Dumazet 		IP6CB(skb)->flags |= IP6SKB_REROUTED;
18109ee9dbaSTobias Brunner 		return dst_output(net, sk, skb);
18209ee9dbaSTobias Brunner 	}
18309ee9dbaSTobias Brunner #endif
18409ee9dbaSTobias Brunner 
185b210de4fSAya Levin 	mtu = ip6_skb_dst_mtu(skb);
18680e425b6SCoco Li 	if (skb_is_gso(skb) &&
18780e425b6SCoco Li 	    !(IP6CB(skb)->flags & IP6SKB_FAKEJUMBO) &&
18880e425b6SCoco Li 	    !skb_gso_validate_network_len(skb, mtu))
189b210de4fSAya Levin 		return ip6_finish_output_gso_slowpath_drop(net, sk, skb, mtu);
190b210de4fSAya Levin 
191b210de4fSAya Levin 	if ((skb->len > mtu && !skb_is_gso(skb)) ||
1929037c357SJiri Pirko 	    dst_allfrag(skb_dst(skb)) ||
1939037c357SJiri Pirko 	    (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size))
1947d8c6e39SEric W. Biederman 		return ip6_fragment(net, sk, skb, ip6_finish_output2);
1959e508490SJan Engelhardt 	else
1967d8c6e39SEric W. Biederman 		return ip6_finish_output2(net, sk, skb);
1979e508490SJan Engelhardt }
1989e508490SJan Engelhardt 
199956fe219Sbrakmo static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
200956fe219Sbrakmo {
201956fe219Sbrakmo 	int ret;
202956fe219Sbrakmo 
203956fe219Sbrakmo 	ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb);
204956fe219Sbrakmo 	switch (ret) {
205956fe219Sbrakmo 	case NET_XMIT_SUCCESS:
206956fe219Sbrakmo 	case NET_XMIT_CN:
207956fe219Sbrakmo 		return __ip6_finish_output(net, sk, skb) ? : ret;
208956fe219Sbrakmo 	default:
2095e187189SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_BPF_CGROUP_EGRESS);
210956fe219Sbrakmo 		return ret;
211956fe219Sbrakmo 	}
212956fe219Sbrakmo }
213956fe219Sbrakmo 
214ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
2151da177e4SLinus Torvalds {
21628f8bfd1SPhil Sutter 	struct net_device *dev = skb_dst(skb)->dev, *indev = skb->dev;
217adf30907SEric Dumazet 	struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
218be10de0aSEric W. Biederman 
21997a7a37aSChenbo Feng 	skb->protocol = htons(ETH_P_IPV6);
22097a7a37aSChenbo Feng 	skb->dev = dev;
22197a7a37aSChenbo Feng 
222778d80beSYOSHIFUJI Hideaki 	if (unlikely(idev->cnf.disable_ipv6)) {
22319a0644cSEric W. Biederman 		IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
2245e187189SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_IPV6DISABLED);
225778d80beSYOSHIFUJI Hideaki 		return 0;
226778d80beSYOSHIFUJI Hideaki 	}
227778d80beSYOSHIFUJI Hideaki 
22829a26a56SEric W. Biederman 	return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
22928f8bfd1SPhil Sutter 			    net, sk, skb, indev, dev,
2309c6eb28aSJan Engelhardt 			    ip6_finish_output,
2319c6eb28aSJan Engelhardt 			    !(IP6CB(skb)->flags & IP6SKB_REROUTED));
2321da177e4SLinus Torvalds }
2336585d7dcSBrian Vazquez EXPORT_SYMBOL(ip6_output);
2341da177e4SLinus Torvalds 
235e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np)
236513674b5SShaohua Li {
237513674b5SShaohua Li 	if (!np->autoflowlabel_set)
238513674b5SShaohua Li 		return ip6_default_np_autolabel(net);
239513674b5SShaohua Li 	else
240513674b5SShaohua Li 		return np->autoflowlabel;
241513674b5SShaohua Li }
242513674b5SShaohua Li 
2431da177e4SLinus Torvalds /*
244b5d43998SShan Wei  * xmit an sk_buff (used by TCP, SCTP and DCCP)
2451c1e9d2bSEric Dumazet  * Note : socket lock is not held for SYNACK packets, but might be modified
2461c1e9d2bSEric Dumazet  * by calls to skb_set_owner_w() and ipv6_local_error(),
2471c1e9d2bSEric Dumazet  * which are using proper atomic operations or spinlocks.
2481da177e4SLinus Torvalds  */
2491c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6,
2504f6570d7SEric Dumazet 	     __u32 mark, struct ipv6_txoptions *opt, int tclass, u32 priority)
2511da177e4SLinus Torvalds {
2523bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
2531c1e9d2bSEric Dumazet 	const struct ipv6_pinfo *np = inet6_sk(sk);
2544c9483b2SDavid S. Miller 	struct in6_addr *first_hop = &fl6->daddr;
255adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
2560c9f227bSVasily Averin 	struct net_device *dev = dst->dev;
2570c9f227bSVasily Averin 	struct inet6_dev *idev = ip6_dst_idev(dst);
25880e425b6SCoco Li 	struct hop_jumbo_hdr *hop_jumbo;
25980e425b6SCoco Li 	int hoplen = sizeof(*hop_jumbo);
26066033f47SStefano Brivio 	unsigned int head_room;
2611da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
2624c9483b2SDavid S. Miller 	u8  proto = fl6->flowi6_proto;
2631da177e4SLinus Torvalds 	int seg_len = skb->len;
264e651f03aSGerrit Renker 	int hlimit = -1;
2651da177e4SLinus Torvalds 	u32 mtu;
2661da177e4SLinus Torvalds 
26780e425b6SCoco Li 	head_room = sizeof(struct ipv6hdr) + hoplen + LL_RESERVED_SPACE(dev);
26866033f47SStefano Brivio 	if (opt)
26966033f47SStefano Brivio 		head_room += opt->opt_nflen + opt->opt_flen;
2701da177e4SLinus Torvalds 
2710c9f227bSVasily Averin 	if (unlikely(head_room > skb_headroom(skb))) {
2720c9f227bSVasily Averin 		skb = skb_expand_head(skb, head_room);
2730c9f227bSVasily Averin 		if (!skb) {
2740c9f227bSVasily Averin 			IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
2751da177e4SLinus Torvalds 			return -ENOBUFS;
2761da177e4SLinus Torvalds 		}
2771da177e4SLinus Torvalds 	}
27866033f47SStefano Brivio 
27966033f47SStefano Brivio 	if (opt) {
28066033f47SStefano Brivio 		seg_len += opt->opt_nflen + opt->opt_flen;
28166033f47SStefano Brivio 
2821da177e4SLinus Torvalds 		if (opt->opt_flen)
2831da177e4SLinus Torvalds 			ipv6_push_frag_opts(skb, opt, &proto);
28466033f47SStefano Brivio 
2851da177e4SLinus Torvalds 		if (opt->opt_nflen)
286613fa3caSDavid Lebrun 			ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop,
287613fa3caSDavid Lebrun 					     &fl6->saddr);
2881da177e4SLinus Torvalds 	}
2891da177e4SLinus Torvalds 
29080e425b6SCoco Li 	if (unlikely(seg_len > IPV6_MAXPLEN)) {
29180e425b6SCoco Li 		hop_jumbo = skb_push(skb, hoplen);
29280e425b6SCoco Li 
29380e425b6SCoco Li 		hop_jumbo->nexthdr = proto;
29480e425b6SCoco Li 		hop_jumbo->hdrlen = 0;
29580e425b6SCoco Li 		hop_jumbo->tlv_type = IPV6_TLV_JUMBO;
29680e425b6SCoco Li 		hop_jumbo->tlv_len = 4;
29780e425b6SCoco Li 		hop_jumbo->jumbo_payload_len = htonl(seg_len + hoplen);
29880e425b6SCoco Li 
29980e425b6SCoco Li 		proto = IPPROTO_HOPOPTS;
30080e425b6SCoco Li 		seg_len = 0;
30180e425b6SCoco Li 		IP6CB(skb)->flags |= IP6SKB_FAKEJUMBO;
30280e425b6SCoco Li 	}
30380e425b6SCoco Li 
304e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
305e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
3060660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
3071da177e4SLinus Torvalds 
3081da177e4SLinus Torvalds 	/*
3091da177e4SLinus Torvalds 	 *	Fill in the IPv6 header
3101da177e4SLinus Torvalds 	 */
311b903d324SEric Dumazet 	if (np)
3121da177e4SLinus Torvalds 		hlimit = np->hop_limit;
3131da177e4SLinus Torvalds 	if (hlimit < 0)
3146b75d090SYOSHIFUJI Hideaki 		hlimit = ip6_dst_hoplimit(dst);
3151da177e4SLinus Torvalds 
316cb1ce2efSTom Herbert 	ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel,
317513674b5SShaohua Li 				ip6_autoflowlabel(net, np), fl6));
31841a1f8eaSYOSHIFUJI Hideaki 
3191da177e4SLinus Torvalds 	hdr->payload_len = htons(seg_len);
3201da177e4SLinus Torvalds 	hdr->nexthdr = proto;
3211da177e4SLinus Torvalds 	hdr->hop_limit = hlimit;
3221da177e4SLinus Torvalds 
3234e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
3244e3fd7a0SAlexey Dobriyan 	hdr->daddr = *first_hop;
3251da177e4SLinus Torvalds 
3269c9c9ad5SHannes Frederic Sowa 	skb->protocol = htons(ETH_P_IPV6);
3274f6570d7SEric Dumazet 	skb->priority = priority;
32892e55f41SPablo Neira 	skb->mark = mark;
329a2c2064fSPatrick McHardy 
3301da177e4SLinus Torvalds 	mtu = dst_mtu(dst);
33160ff7467SWANG Cong 	if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) {
3320c9f227bSVasily Averin 		IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len);
333a8e3e1a9SDavid Ahern 
334a8e3e1a9SDavid Ahern 		/* if egress device is enslaved to an L3 master device pass the
335a8e3e1a9SDavid Ahern 		 * skb to its handler for processing
336a8e3e1a9SDavid Ahern 		 */
337a8e3e1a9SDavid Ahern 		skb = l3mdev_ip6_out((struct sock *)sk, skb);
338a8e3e1a9SDavid Ahern 		if (unlikely(!skb))
339a8e3e1a9SDavid Ahern 			return 0;
340a8e3e1a9SDavid Ahern 
3411c1e9d2bSEric Dumazet 		/* hooks should never assume socket lock is held.
3421c1e9d2bSEric Dumazet 		 * we promote our socket to non const
3431c1e9d2bSEric Dumazet 		 */
34429a26a56SEric W. Biederman 		return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
3450c9f227bSVasily Averin 			       net, (struct sock *)sk, skb, NULL, dev,
34613206b6bSEric W. Biederman 			       dst_output);
3471da177e4SLinus Torvalds 	}
3481da177e4SLinus Torvalds 
3490c9f227bSVasily Averin 	skb->dev = dev;
3501c1e9d2bSEric Dumazet 	/* ipv6_local_error() does not require socket lock,
3511c1e9d2bSEric Dumazet 	 * we promote our socket to non const
3521c1e9d2bSEric Dumazet 	 */
3531c1e9d2bSEric Dumazet 	ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu);
3541c1e9d2bSEric Dumazet 
3550c9f227bSVasily Averin 	IP6_INC_STATS(net, idev, IPSTATS_MIB_FRAGFAILS);
3561da177e4SLinus Torvalds 	kfree_skb(skb);
3571da177e4SLinus Torvalds 	return -EMSGSIZE;
3581da177e4SLinus Torvalds }
3597159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit);
3607159039aSYOSHIFUJI Hideaki 
3611da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel)
3621da177e4SLinus Torvalds {
3631da177e4SLinus Torvalds 	struct ip6_ra_chain *ra;
3641da177e4SLinus Torvalds 	struct sock *last = NULL;
3651da177e4SLinus Torvalds 
3661da177e4SLinus Torvalds 	read_lock(&ip6_ra_lock);
3671da177e4SLinus Torvalds 	for (ra = ip6_ra_chain; ra; ra = ra->next) {
3681da177e4SLinus Torvalds 		struct sock *sk = ra->sk;
3690bd1b59bSAndrew McDonald 		if (sk && ra->sel == sel &&
3700bd1b59bSAndrew McDonald 		    (!sk->sk_bound_dev_if ||
3710bd1b59bSAndrew McDonald 		     sk->sk_bound_dev_if == skb->dev->ifindex)) {
3729036b2feSFrancesco Ruggeri 			struct ipv6_pinfo *np = inet6_sk(sk);
3739036b2feSFrancesco Ruggeri 
3749036b2feSFrancesco Ruggeri 			if (np && np->rtalert_isolate &&
3759036b2feSFrancesco Ruggeri 			    !net_eq(sock_net(sk), dev_net(skb->dev))) {
3769036b2feSFrancesco Ruggeri 				continue;
3779036b2feSFrancesco Ruggeri 			}
3781da177e4SLinus Torvalds 			if (last) {
3791da177e4SLinus Torvalds 				struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
3801da177e4SLinus Torvalds 				if (skb2)
3811da177e4SLinus Torvalds 					rawv6_rcv(last, skb2);
3821da177e4SLinus Torvalds 			}
3831da177e4SLinus Torvalds 			last = sk;
3841da177e4SLinus Torvalds 		}
3851da177e4SLinus Torvalds 	}
3861da177e4SLinus Torvalds 
3871da177e4SLinus Torvalds 	if (last) {
3881da177e4SLinus Torvalds 		rawv6_rcv(last, skb);
3891da177e4SLinus Torvalds 		read_unlock(&ip6_ra_lock);
3901da177e4SLinus Torvalds 		return 1;
3911da177e4SLinus Torvalds 	}
3921da177e4SLinus Torvalds 	read_unlock(&ip6_ra_lock);
3931da177e4SLinus Torvalds 	return 0;
3941da177e4SLinus Torvalds }
3951da177e4SLinus Torvalds 
396e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb)
397e21e0b5fSVille Nuorvala {
3980660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
399e21e0b5fSVille Nuorvala 	u8 nexthdr = hdr->nexthdr;
40075f2811cSJesse Gross 	__be16 frag_off;
401e21e0b5fSVille Nuorvala 	int offset;
402e21e0b5fSVille Nuorvala 
403e21e0b5fSVille Nuorvala 	if (ipv6_ext_hdr(nexthdr)) {
40475f2811cSJesse Gross 		offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off);
405e21e0b5fSVille Nuorvala 		if (offset < 0)
406e21e0b5fSVille Nuorvala 			return 0;
407e21e0b5fSVille Nuorvala 	} else
408e21e0b5fSVille Nuorvala 		offset = sizeof(struct ipv6hdr);
409e21e0b5fSVille Nuorvala 
410e21e0b5fSVille Nuorvala 	if (nexthdr == IPPROTO_ICMPV6) {
411e21e0b5fSVille Nuorvala 		struct icmp6hdr *icmp6;
412e21e0b5fSVille Nuorvala 
413d56f90a7SArnaldo Carvalho de Melo 		if (!pskb_may_pull(skb, (skb_network_header(skb) +
414d56f90a7SArnaldo Carvalho de Melo 					 offset + 1 - skb->data)))
415e21e0b5fSVille Nuorvala 			return 0;
416e21e0b5fSVille Nuorvala 
417d56f90a7SArnaldo Carvalho de Melo 		icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset);
418e21e0b5fSVille Nuorvala 
419e21e0b5fSVille Nuorvala 		switch (icmp6->icmp6_type) {
420e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_SOLICITATION:
421e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_ADVERTISEMENT:
422e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_SOLICITATION:
423e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_ADVERTISEMENT:
424e21e0b5fSVille Nuorvala 		case NDISC_REDIRECT:
425e21e0b5fSVille Nuorvala 			/* For reaction involving unicast neighbor discovery
426e21e0b5fSVille Nuorvala 			 * message destined to the proxied address, pass it to
427e21e0b5fSVille Nuorvala 			 * input function.
428e21e0b5fSVille Nuorvala 			 */
429e21e0b5fSVille Nuorvala 			return 1;
430e21e0b5fSVille Nuorvala 		default:
431e21e0b5fSVille Nuorvala 			break;
432e21e0b5fSVille Nuorvala 		}
433e21e0b5fSVille Nuorvala 	}
434e21e0b5fSVille Nuorvala 
43574553b09SVille Nuorvala 	/*
43674553b09SVille Nuorvala 	 * The proxying router can't forward traffic sent to a link-local
43774553b09SVille Nuorvala 	 * address, so signal the sender and discard the packet. This
43874553b09SVille Nuorvala 	 * behavior is clarified by the MIPv6 specification.
43974553b09SVille Nuorvala 	 */
44074553b09SVille Nuorvala 	if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) {
44174553b09SVille Nuorvala 		dst_link_failure(skb);
44274553b09SVille Nuorvala 		return -1;
44374553b09SVille Nuorvala 	}
44474553b09SVille Nuorvala 
445e21e0b5fSVille Nuorvala 	return 0;
446e21e0b5fSVille Nuorvala }
447e21e0b5fSVille Nuorvala 
4480c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk,
4490c4b51f0SEric W. Biederman 				     struct sk_buff *skb)
4501da177e4SLinus Torvalds {
45171a1c915SJeff Barnhill 	struct dst_entry *dst = skb_dst(skb);
45271a1c915SJeff Barnhill 
45371a1c915SJeff Barnhill 	__IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS);
45471a1c915SJeff Barnhill 
455f839a6c9SIdo Schimmel #ifdef CONFIG_NET_SWITCHDEV
456f839a6c9SIdo Schimmel 	if (skb->offload_l3_fwd_mark) {
457f839a6c9SIdo Schimmel 		consume_skb(skb);
458f839a6c9SIdo Schimmel 		return 0;
459f839a6c9SIdo Schimmel 	}
460f839a6c9SIdo Schimmel #endif
461f839a6c9SIdo Schimmel 
462de799101SMartin KaFai Lau 	skb_clear_tstamp(skb);
46313206b6bSEric W. Biederman 	return dst_output(net, sk, skb);
4641da177e4SLinus Torvalds }
4651da177e4SLinus Torvalds 
466fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu)
467fe6cc55fSFlorian Westphal {
468418a3156SFlorian Westphal 	if (skb->len <= mtu)
469fe6cc55fSFlorian Westphal 		return false;
470fe6cc55fSFlorian Westphal 
47160ff7467SWANG Cong 	/* ipv6 conntrack defrag sets max_frag_size + ignore_df */
472fe6cc55fSFlorian Westphal 	if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu)
473fe6cc55fSFlorian Westphal 		return true;
474fe6cc55fSFlorian Westphal 
47560ff7467SWANG Cong 	if (skb->ignore_df)
476418a3156SFlorian Westphal 		return false;
477418a3156SFlorian Westphal 
478779b7931SDaniel Axtens 	if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu))
479fe6cc55fSFlorian Westphal 		return false;
480fe6cc55fSFlorian Westphal 
481fe6cc55fSFlorian Westphal 	return true;
482fe6cc55fSFlorian Westphal }
483fe6cc55fSFlorian Westphal 
4841da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb)
4851da177e4SLinus Torvalds {
486adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
4870660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
4881da177e4SLinus Torvalds 	struct inet6_skb_parm *opt = IP6CB(skb);
489c346dca1SYOSHIFUJI Hideaki 	struct net *net = dev_net(dst->dev);
4900857d6f8SStephen Suryaputra 	struct inet6_dev *idev;
4912edc1a38SMenglong Dong 	SKB_DR(reason);
49214f3ad6fSUlrich Weber 	u32 mtu;
4931da177e4SLinus Torvalds 
4940857d6f8SStephen Suryaputra 	idev = __in6_dev_get_safely(dev_get_by_index_rcu(net, IP6CB(skb)->iif));
49553b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->forwarding == 0)
4961da177e4SLinus Torvalds 		goto error;
4971da177e4SLinus Torvalds 
498090f1166SLi RongQing 	if (skb->pkt_type != PACKET_HOST)
499090f1166SLi RongQing 		goto drop;
500090f1166SLi RongQing 
5019ef2e965SHannes Frederic Sowa 	if (unlikely(skb->sk))
5029ef2e965SHannes Frederic Sowa 		goto drop;
5039ef2e965SHannes Frederic Sowa 
5044497b076SBen Hutchings 	if (skb_warn_if_lro(skb))
5054497b076SBen Hutchings 		goto drop;
5064497b076SBen Hutchings 
507ccd27f05SNicolas Dichtel 	if (!net->ipv6.devconf_all->disable_policy &&
508e3fa461dSNicolas Dichtel 	    (!idev || !idev->cnf.disable_policy) &&
509ccd27f05SNicolas Dichtel 	    !xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) {
510bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
5111da177e4SLinus Torvalds 		goto drop;
5121da177e4SLinus Torvalds 	}
5131da177e4SLinus Torvalds 
51435fc92a9SHerbert Xu 	skb_forward_csum(skb);
5151da177e4SLinus Torvalds 
5161da177e4SLinus Torvalds 	/*
5171da177e4SLinus Torvalds 	 *	We DO NOT make any processing on
5181da177e4SLinus Torvalds 	 *	RA packets, pushing them to user level AS IS
5191da177e4SLinus Torvalds 	 *	without ane WARRANTY that application will be able
5201da177e4SLinus Torvalds 	 *	to interpret them. The reason is that we
5211da177e4SLinus Torvalds 	 *	cannot make anything clever here.
5221da177e4SLinus Torvalds 	 *
5231da177e4SLinus Torvalds 	 *	We are not end-node, so that if packet contains
5241da177e4SLinus Torvalds 	 *	AH/ESP, we cannot make anything.
5251da177e4SLinus Torvalds 	 *	Defragmentation also would be mistake, RA packets
5261da177e4SLinus Torvalds 	 *	cannot be fragmented, because there is no warranty
5271da177e4SLinus Torvalds 	 *	that different fragments will go along one path. --ANK
5281da177e4SLinus Torvalds 	 */
529ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) {
530ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 		if (ip6_call_ra_chain(skb, ntohs(opt->ra)))
5311da177e4SLinus Torvalds 			return 0;
5321da177e4SLinus Torvalds 	}
5331da177e4SLinus Torvalds 
5341da177e4SLinus Torvalds 	/*
5351da177e4SLinus Torvalds 	 *	check and decrement ttl
5361da177e4SLinus Torvalds 	 */
5371da177e4SLinus Torvalds 	if (hdr->hop_limit <= 1) {
5383ffe533cSAlexey Dobriyan 		icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0);
539bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS);
5401da177e4SLinus Torvalds 
5412edc1a38SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_IP_INHDR);
5421da177e4SLinus Torvalds 		return -ETIMEDOUT;
5431da177e4SLinus Torvalds 	}
5441da177e4SLinus Torvalds 
545fbea49e1SYOSHIFUJI Hideaki 	/* XXX: idev->cnf.proxy_ndp? */
54653b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->proxy_ndp &&
5478a3edd80SDaniel Lezcano 	    pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) {
54874553b09SVille Nuorvala 		int proxied = ip6_forward_proxy_check(skb);
54946c7655fSKangmin Park 		if (proxied > 0) {
5509f535c87SGergely Risko 			/* It's tempting to decrease the hop limit
5519f535c87SGergely Risko 			 * here by 1, as we do at the end of the
5529f535c87SGergely Risko 			 * function too.
5539f535c87SGergely Risko 			 *
5549f535c87SGergely Risko 			 * But that would be incorrect, as proxying is
5559f535c87SGergely Risko 			 * not forwarding.  The ip6_input function
5569f535c87SGergely Risko 			 * will handle this packet locally, and it
5579f535c87SGergely Risko 			 * depends on the hop limit being unchanged.
5589f535c87SGergely Risko 			 *
5599f535c87SGergely Risko 			 * One example is the NDP hop limit, that
5609f535c87SGergely Risko 			 * always has to stay 255, but other would be
5619f535c87SGergely Risko 			 * similar checks around RA packets, where the
5629f535c87SGergely Risko 			 * user can even change the desired limit.
5639f535c87SGergely Risko 			 */
564e21e0b5fSVille Nuorvala 			return ip6_input(skb);
56546c7655fSKangmin Park 		} else if (proxied < 0) {
566bdb7cc64SStephen Suryaputra 			__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
56774553b09SVille Nuorvala 			goto drop;
56874553b09SVille Nuorvala 		}
569e21e0b5fSVille Nuorvala 	}
570e21e0b5fSVille Nuorvala 
5711da177e4SLinus Torvalds 	if (!xfrm6_route_forward(skb)) {
572bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
5732edc1a38SMenglong Dong 		SKB_DR_SET(reason, XFRM_POLICY);
5741da177e4SLinus Torvalds 		goto drop;
5751da177e4SLinus Torvalds 	}
576adf30907SEric Dumazet 	dst = skb_dst(skb);
5771da177e4SLinus Torvalds 
5781da177e4SLinus Torvalds 	/* IPv6 specs say nothing about it, but it is clear that we cannot
5791da177e4SLinus Torvalds 	   send redirects to source routed frames.
5801e5dc146SMasahide NAKAMURA 	   We don't send redirects to frames decapsulated from IPsec.
5811da177e4SLinus Torvalds 	 */
5822f17becfSStephen Suryaputra 	if (IP6CB(skb)->iif == dst->dev->ifindex &&
5832f17becfSStephen Suryaputra 	    opt->srcrt == 0 && !skb_sec_path(skb)) {
5841da177e4SLinus Torvalds 		struct in6_addr *target = NULL;
585fbfe95a4SDavid S. Miller 		struct inet_peer *peer;
5861da177e4SLinus Torvalds 		struct rt6_info *rt;
5871da177e4SLinus Torvalds 
5881da177e4SLinus Torvalds 		/*
5891da177e4SLinus Torvalds 		 *	incoming and outgoing devices are the same
5901da177e4SLinus Torvalds 		 *	send a redirect.
5911da177e4SLinus Torvalds 		 */
5921da177e4SLinus Torvalds 
5931da177e4SLinus Torvalds 		rt = (struct rt6_info *) dst;
594c45a3dfbSDavid S. Miller 		if (rt->rt6i_flags & RTF_GATEWAY)
595c45a3dfbSDavid S. Miller 			target = &rt->rt6i_gateway;
5961da177e4SLinus Torvalds 		else
5971da177e4SLinus Torvalds 			target = &hdr->daddr;
5981da177e4SLinus Torvalds 
599fd0273d7SMartin KaFai Lau 		peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1);
60092d86829SDavid S. Miller 
6011da177e4SLinus Torvalds 		/* Limit redirects both by destination (here)
6021da177e4SLinus Torvalds 		   and by source (inside ndisc_send_redirect)
6031da177e4SLinus Torvalds 		 */
604fbfe95a4SDavid S. Miller 		if (inet_peer_xrlim_allow(peer, 1*HZ))
6054991969aSDavid S. Miller 			ndisc_send_redirect(skb, target);
6061d861aa4SDavid S. Miller 		if (peer)
6071d861aa4SDavid S. Miller 			inet_putpeer(peer);
6085bb1ab09SDavid L Stevens 	} else {
6095bb1ab09SDavid L Stevens 		int addrtype = ipv6_addr_type(&hdr->saddr);
6105bb1ab09SDavid L Stevens 
6111da177e4SLinus Torvalds 		/* This check is security critical. */
612f81b2e7dSYOSHIFUJI Hideaki 		if (addrtype == IPV6_ADDR_ANY ||
613f81b2e7dSYOSHIFUJI Hideaki 		    addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK))
6141da177e4SLinus Torvalds 			goto error;
6155bb1ab09SDavid L Stevens 		if (addrtype & IPV6_ADDR_LINKLOCAL) {
6165bb1ab09SDavid L Stevens 			icmpv6_send(skb, ICMPV6_DEST_UNREACH,
6173ffe533cSAlexey Dobriyan 				    ICMPV6_NOT_NEIGHBOUR, 0);
6185bb1ab09SDavid L Stevens 			goto error;
6195bb1ab09SDavid L Stevens 		}
6201da177e4SLinus Torvalds 	}
6211da177e4SLinus Torvalds 
622427faee1SVadim Fedorenko 	mtu = ip6_dst_mtu_maybe_forward(dst, true);
62314f3ad6fSUlrich Weber 	if (mtu < IPV6_MIN_MTU)
62414f3ad6fSUlrich Weber 		mtu = IPV6_MIN_MTU;
62514f3ad6fSUlrich Weber 
626fe6cc55fSFlorian Westphal 	if (ip6_pkt_too_big(skb, mtu)) {
6271da177e4SLinus Torvalds 		/* Again, force OUTPUT device used as source address */
6281da177e4SLinus Torvalds 		skb->dev = dst->dev;
62914f3ad6fSUlrich Weber 		icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
630bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS);
6311d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
63215c77d8bSEric Dumazet 				IPSTATS_MIB_FRAGFAILS);
6332edc1a38SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_PKT_TOO_BIG);
6341da177e4SLinus Torvalds 		return -EMSGSIZE;
6351da177e4SLinus Torvalds 	}
6361da177e4SLinus Torvalds 
6371da177e4SLinus Torvalds 	if (skb_cow(skb, dst->dev->hard_header_len)) {
6381d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
63915c77d8bSEric Dumazet 				IPSTATS_MIB_OUTDISCARDS);
6401da177e4SLinus Torvalds 		goto drop;
6411da177e4SLinus Torvalds 	}
6421da177e4SLinus Torvalds 
6430660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
6441da177e4SLinus Torvalds 
6451da177e4SLinus Torvalds 	/* Mangling hops number delayed to point after skb COW */
6461da177e4SLinus Torvalds 
6471da177e4SLinus Torvalds 	hdr->hop_limit--;
6481da177e4SLinus Torvalds 
64929a26a56SEric W. Biederman 	return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD,
65029a26a56SEric W. Biederman 		       net, NULL, skb, skb->dev, dst->dev,
6516e23ae2aSPatrick McHardy 		       ip6_forward_finish);
6521da177e4SLinus Torvalds 
6531da177e4SLinus Torvalds error:
654bdb7cc64SStephen Suryaputra 	__IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS);
6552edc1a38SMenglong Dong 	SKB_DR_SET(reason, IP_INADDRERRORS);
6561da177e4SLinus Torvalds drop:
6572edc1a38SMenglong Dong 	kfree_skb_reason(skb, reason);
6581da177e4SLinus Torvalds 	return -EINVAL;
6591da177e4SLinus Torvalds }
6601da177e4SLinus Torvalds 
6611da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from)
6621da177e4SLinus Torvalds {
6631da177e4SLinus Torvalds 	to->pkt_type = from->pkt_type;
6641da177e4SLinus Torvalds 	to->priority = from->priority;
6651da177e4SLinus Torvalds 	to->protocol = from->protocol;
666adf30907SEric Dumazet 	skb_dst_drop(to);
667adf30907SEric Dumazet 	skb_dst_set(to, dst_clone(skb_dst(from)));
6681da177e4SLinus Torvalds 	to->dev = from->dev;
66982e91ffeSThomas Graf 	to->mark = from->mark;
6701da177e4SLinus Torvalds 
6713dd1c9a1SPaolo Abeni 	skb_copy_hash(to, from);
6723dd1c9a1SPaolo Abeni 
6731da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED
6741da177e4SLinus Torvalds 	to->tc_index = from->tc_index;
6751da177e4SLinus Torvalds #endif
676e7ac05f3SYasuyuki Kozakai 	nf_copy(to, from);
677df5042f4SFlorian Westphal 	skb_ext_copy(to, from);
678984bc16cSJames Morris 	skb_copy_secmark(to, from);
6791da177e4SLinus Torvalds }
6801da177e4SLinus Torvalds 
6810feca619SPablo Neira Ayuso int ip6_fraglist_init(struct sk_buff *skb, unsigned int hlen, u8 *prevhdr,
6820feca619SPablo Neira Ayuso 		      u8 nexthdr, __be32 frag_id,
6830feca619SPablo Neira Ayuso 		      struct ip6_fraglist_iter *iter)
6840feca619SPablo Neira Ayuso {
6850feca619SPablo Neira Ayuso 	unsigned int first_len;
6860feca619SPablo Neira Ayuso 	struct frag_hdr *fh;
6870feca619SPablo Neira Ayuso 
6880feca619SPablo Neira Ayuso 	/* BUILD HEADER */
6890feca619SPablo Neira Ayuso 	*prevhdr = NEXTHDR_FRAGMENT;
6900feca619SPablo Neira Ayuso 	iter->tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC);
6910feca619SPablo Neira Ayuso 	if (!iter->tmp_hdr)
6920feca619SPablo Neira Ayuso 		return -ENOMEM;
6930feca619SPablo Neira Ayuso 
694b7034146SEric Dumazet 	iter->frag = skb_shinfo(skb)->frag_list;
6950feca619SPablo Neira Ayuso 	skb_frag_list_init(skb);
6960feca619SPablo Neira Ayuso 
6970feca619SPablo Neira Ayuso 	iter->offset = 0;
6980feca619SPablo Neira Ayuso 	iter->hlen = hlen;
6990feca619SPablo Neira Ayuso 	iter->frag_id = frag_id;
7000feca619SPablo Neira Ayuso 	iter->nexthdr = nexthdr;
7010feca619SPablo Neira Ayuso 
7020feca619SPablo Neira Ayuso 	__skb_pull(skb, hlen);
7030feca619SPablo Neira Ayuso 	fh = __skb_push(skb, sizeof(struct frag_hdr));
7040feca619SPablo Neira Ayuso 	__skb_push(skb, hlen);
7050feca619SPablo Neira Ayuso 	skb_reset_network_header(skb);
7060feca619SPablo Neira Ayuso 	memcpy(skb_network_header(skb), iter->tmp_hdr, hlen);
7070feca619SPablo Neira Ayuso 
7080feca619SPablo Neira Ayuso 	fh->nexthdr = nexthdr;
7090feca619SPablo Neira Ayuso 	fh->reserved = 0;
7100feca619SPablo Neira Ayuso 	fh->frag_off = htons(IP6_MF);
7110feca619SPablo Neira Ayuso 	fh->identification = frag_id;
7120feca619SPablo Neira Ayuso 
7130feca619SPablo Neira Ayuso 	first_len = skb_pagelen(skb);
7140feca619SPablo Neira Ayuso 	skb->data_len = first_len - skb_headlen(skb);
7150feca619SPablo Neira Ayuso 	skb->len = first_len;
7160feca619SPablo Neira Ayuso 	ipv6_hdr(skb)->payload_len = htons(first_len - sizeof(struct ipv6hdr));
7170feca619SPablo Neira Ayuso 
7180feca619SPablo Neira Ayuso 	return 0;
7190feca619SPablo Neira Ayuso }
7200feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_init);
7210feca619SPablo Neira Ayuso 
7220feca619SPablo Neira Ayuso void ip6_fraglist_prepare(struct sk_buff *skb,
7230feca619SPablo Neira Ayuso 			  struct ip6_fraglist_iter *iter)
7240feca619SPablo Neira Ayuso {
7250feca619SPablo Neira Ayuso 	struct sk_buff *frag = iter->frag;
7260feca619SPablo Neira Ayuso 	unsigned int hlen = iter->hlen;
7270feca619SPablo Neira Ayuso 	struct frag_hdr *fh;
7280feca619SPablo Neira Ayuso 
7290feca619SPablo Neira Ayuso 	frag->ip_summed = CHECKSUM_NONE;
7300feca619SPablo Neira Ayuso 	skb_reset_transport_header(frag);
7310feca619SPablo Neira Ayuso 	fh = __skb_push(frag, sizeof(struct frag_hdr));
7320feca619SPablo Neira Ayuso 	__skb_push(frag, hlen);
7330feca619SPablo Neira Ayuso 	skb_reset_network_header(frag);
7340feca619SPablo Neira Ayuso 	memcpy(skb_network_header(frag), iter->tmp_hdr, hlen);
7350feca619SPablo Neira Ayuso 	iter->offset += skb->len - hlen - sizeof(struct frag_hdr);
7360feca619SPablo Neira Ayuso 	fh->nexthdr = iter->nexthdr;
7370feca619SPablo Neira Ayuso 	fh->reserved = 0;
7380feca619SPablo Neira Ayuso 	fh->frag_off = htons(iter->offset);
7390feca619SPablo Neira Ayuso 	if (frag->next)
7400feca619SPablo Neira Ayuso 		fh->frag_off |= htons(IP6_MF);
7410feca619SPablo Neira Ayuso 	fh->identification = iter->frag_id;
7420feca619SPablo Neira Ayuso 	ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr));
7430feca619SPablo Neira Ayuso 	ip6_copy_metadata(frag, skb);
7440feca619SPablo Neira Ayuso }
7450feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_prepare);
7460feca619SPablo Neira Ayuso 
7478a6a1f17SPablo Neira Ayuso void ip6_frag_init(struct sk_buff *skb, unsigned int hlen, unsigned int mtu,
7488a6a1f17SPablo Neira Ayuso 		   unsigned short needed_tailroom, int hdr_room, u8 *prevhdr,
7498a6a1f17SPablo Neira Ayuso 		   u8 nexthdr, __be32 frag_id, struct ip6_frag_state *state)
7508a6a1f17SPablo Neira Ayuso {
7518a6a1f17SPablo Neira Ayuso 	state->prevhdr = prevhdr;
7528a6a1f17SPablo Neira Ayuso 	state->nexthdr = nexthdr;
7538a6a1f17SPablo Neira Ayuso 	state->frag_id = frag_id;
7548a6a1f17SPablo Neira Ayuso 
7558a6a1f17SPablo Neira Ayuso 	state->hlen = hlen;
7568a6a1f17SPablo Neira Ayuso 	state->mtu = mtu;
7578a6a1f17SPablo Neira Ayuso 
7588a6a1f17SPablo Neira Ayuso 	state->left = skb->len - hlen;	/* Space per frame */
7598a6a1f17SPablo Neira Ayuso 	state->ptr = hlen;		/* Where to start from */
7608a6a1f17SPablo Neira Ayuso 
7618a6a1f17SPablo Neira Ayuso 	state->hroom = hdr_room;
7628a6a1f17SPablo Neira Ayuso 	state->troom = needed_tailroom;
7638a6a1f17SPablo Neira Ayuso 
7648a6a1f17SPablo Neira Ayuso 	state->offset = 0;
7658a6a1f17SPablo Neira Ayuso }
7668a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_init);
7678a6a1f17SPablo Neira Ayuso 
7688a6a1f17SPablo Neira Ayuso struct sk_buff *ip6_frag_next(struct sk_buff *skb, struct ip6_frag_state *state)
7698a6a1f17SPablo Neira Ayuso {
7708a6a1f17SPablo Neira Ayuso 	u8 *prevhdr = state->prevhdr, *fragnexthdr_offset;
7718a6a1f17SPablo Neira Ayuso 	struct sk_buff *frag;
7728a6a1f17SPablo Neira Ayuso 	struct frag_hdr *fh;
7738a6a1f17SPablo Neira Ayuso 	unsigned int len;
7748a6a1f17SPablo Neira Ayuso 
7758a6a1f17SPablo Neira Ayuso 	len = state->left;
7768a6a1f17SPablo Neira Ayuso 	/* IF: it doesn't fit, use 'mtu' - the data space left */
7778a6a1f17SPablo Neira Ayuso 	if (len > state->mtu)
7788a6a1f17SPablo Neira Ayuso 		len = state->mtu;
7798a6a1f17SPablo Neira Ayuso 	/* IF: we are not sending up to and including the packet end
7808a6a1f17SPablo Neira Ayuso 	   then align the next start on an eight byte boundary */
7818a6a1f17SPablo Neira Ayuso 	if (len < state->left)
7828a6a1f17SPablo Neira Ayuso 		len &= ~7;
7838a6a1f17SPablo Neira Ayuso 
7848a6a1f17SPablo Neira Ayuso 	/* Allocate buffer */
7858a6a1f17SPablo Neira Ayuso 	frag = alloc_skb(len + state->hlen + sizeof(struct frag_hdr) +
7868a6a1f17SPablo Neira Ayuso 			 state->hroom + state->troom, GFP_ATOMIC);
7878a6a1f17SPablo Neira Ayuso 	if (!frag)
7888a6a1f17SPablo Neira Ayuso 		return ERR_PTR(-ENOMEM);
7898a6a1f17SPablo Neira Ayuso 
7908a6a1f17SPablo Neira Ayuso 	/*
7918a6a1f17SPablo Neira Ayuso 	 *	Set up data on packet
7928a6a1f17SPablo Neira Ayuso 	 */
7938a6a1f17SPablo Neira Ayuso 
7948a6a1f17SPablo Neira Ayuso 	ip6_copy_metadata(frag, skb);
7958a6a1f17SPablo Neira Ayuso 	skb_reserve(frag, state->hroom);
7968a6a1f17SPablo Neira Ayuso 	skb_put(frag, len + state->hlen + sizeof(struct frag_hdr));
7978a6a1f17SPablo Neira Ayuso 	skb_reset_network_header(frag);
7988a6a1f17SPablo Neira Ayuso 	fh = (struct frag_hdr *)(skb_network_header(frag) + state->hlen);
7998a6a1f17SPablo Neira Ayuso 	frag->transport_header = (frag->network_header + state->hlen +
8008a6a1f17SPablo Neira Ayuso 				  sizeof(struct frag_hdr));
8018a6a1f17SPablo Neira Ayuso 
8028a6a1f17SPablo Neira Ayuso 	/*
8038a6a1f17SPablo Neira Ayuso 	 *	Charge the memory for the fragment to any owner
8048a6a1f17SPablo Neira Ayuso 	 *	it might possess
8058a6a1f17SPablo Neira Ayuso 	 */
8068a6a1f17SPablo Neira Ayuso 	if (skb->sk)
8078a6a1f17SPablo Neira Ayuso 		skb_set_owner_w(frag, skb->sk);
8088a6a1f17SPablo Neira Ayuso 
8098a6a1f17SPablo Neira Ayuso 	/*
8108a6a1f17SPablo Neira Ayuso 	 *	Copy the packet header into the new buffer.
8118a6a1f17SPablo Neira Ayuso 	 */
8128a6a1f17SPablo Neira Ayuso 	skb_copy_from_linear_data(skb, skb_network_header(frag), state->hlen);
8138a6a1f17SPablo Neira Ayuso 
8148a6a1f17SPablo Neira Ayuso 	fragnexthdr_offset = skb_network_header(frag);
8158a6a1f17SPablo Neira Ayuso 	fragnexthdr_offset += prevhdr - skb_network_header(skb);
8168a6a1f17SPablo Neira Ayuso 	*fragnexthdr_offset = NEXTHDR_FRAGMENT;
8178a6a1f17SPablo Neira Ayuso 
8188a6a1f17SPablo Neira Ayuso 	/*
8198a6a1f17SPablo Neira Ayuso 	 *	Build fragment header.
8208a6a1f17SPablo Neira Ayuso 	 */
8218a6a1f17SPablo Neira Ayuso 	fh->nexthdr = state->nexthdr;
8228a6a1f17SPablo Neira Ayuso 	fh->reserved = 0;
8238a6a1f17SPablo Neira Ayuso 	fh->identification = state->frag_id;
8248a6a1f17SPablo Neira Ayuso 
8258a6a1f17SPablo Neira Ayuso 	/*
8268a6a1f17SPablo Neira Ayuso 	 *	Copy a block of the IP datagram.
8278a6a1f17SPablo Neira Ayuso 	 */
8288a6a1f17SPablo Neira Ayuso 	BUG_ON(skb_copy_bits(skb, state->ptr, skb_transport_header(frag),
8298a6a1f17SPablo Neira Ayuso 			     len));
8308a6a1f17SPablo Neira Ayuso 	state->left -= len;
8318a6a1f17SPablo Neira Ayuso 
8328a6a1f17SPablo Neira Ayuso 	fh->frag_off = htons(state->offset);
8338a6a1f17SPablo Neira Ayuso 	if (state->left > 0)
8348a6a1f17SPablo Neira Ayuso 		fh->frag_off |= htons(IP6_MF);
8358a6a1f17SPablo Neira Ayuso 	ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr));
8368a6a1f17SPablo Neira Ayuso 
8378a6a1f17SPablo Neira Ayuso 	state->ptr += len;
8388a6a1f17SPablo Neira Ayuso 	state->offset += len;
8398a6a1f17SPablo Neira Ayuso 
8408a6a1f17SPablo Neira Ayuso 	return frag;
8418a6a1f17SPablo Neira Ayuso }
8428a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_next);
8438a6a1f17SPablo Neira Ayuso 
8447d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb,
8457d8c6e39SEric W. Biederman 		 int (*output)(struct net *, struct sock *, struct sk_buff *))
8461da177e4SLinus Torvalds {
8471da177e4SLinus Torvalds 	struct sk_buff *frag;
848adf30907SEric Dumazet 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
849f60e5990Shannes@stressinduktion.org 	struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ?
850f60e5990Shannes@stressinduktion.org 				inet6_sk(skb->sk) : NULL;
851a1ac9c8aSMartin KaFai Lau 	bool mono_delivery_time = skb->mono_delivery_time;
8528a6a1f17SPablo Neira Ayuso 	struct ip6_frag_state state;
8538a6a1f17SPablo Neira Ayuso 	unsigned int mtu, hlen, nexthdr_offset;
8549669fffcSEric Dumazet 	ktime_t tstamp = skb->tstamp;
8558a6a1f17SPablo Neira Ayuso 	int hroom, err = 0;
856286c2349SMartin KaFai Lau 	__be32 frag_id;
8571da177e4SLinus Torvalds 	u8 *prevhdr, nexthdr = 0;
8581da177e4SLinus Torvalds 
8597dd7eb95SDavid S. Miller 	err = ip6_find_1stfragopt(skb, &prevhdr);
8607dd7eb95SDavid S. Miller 	if (err < 0)
8612423496aSCraig Gallek 		goto fail;
8627dd7eb95SDavid S. Miller 	hlen = err;
8631da177e4SLinus Torvalds 	nexthdr = *prevhdr;
864ef0efcd3SJunwei Hu 	nexthdr_offset = prevhdr - skb_network_header(skb);
8651da177e4SLinus Torvalds 
866628a5c56SJohn Heffner 	mtu = ip6_skb_dst_mtu(skb);
867b881ef76SJohn Heffner 
868b881ef76SJohn Heffner 	/* We must not fragment if the socket is set to force MTU discovery
86914f3ad6fSUlrich Weber 	 * or if the skb it not generated by a local socket.
870b881ef76SJohn Heffner 	 */
871485fca66SFlorian Westphal 	if (unlikely(!skb->ignore_df && skb->len > mtu))
872485fca66SFlorian Westphal 		goto fail_toobig;
873a34a101eSEric Dumazet 
874485fca66SFlorian Westphal 	if (IP6CB(skb)->frag_max_size) {
875485fca66SFlorian Westphal 		if (IP6CB(skb)->frag_max_size > mtu)
876485fca66SFlorian Westphal 			goto fail_toobig;
877485fca66SFlorian Westphal 
878485fca66SFlorian Westphal 		/* don't send fragments larger than what we received */
879485fca66SFlorian Westphal 		mtu = IP6CB(skb)->frag_max_size;
880485fca66SFlorian Westphal 		if (mtu < IPV6_MIN_MTU)
881485fca66SFlorian Westphal 			mtu = IPV6_MIN_MTU;
882b881ef76SJohn Heffner 	}
883b881ef76SJohn Heffner 
884d91675f9SYOSHIFUJI Hideaki 	if (np && np->frag_size < mtu) {
885d91675f9SYOSHIFUJI Hideaki 		if (np->frag_size)
886d91675f9SYOSHIFUJI Hideaki 			mtu = np->frag_size;
887d91675f9SYOSHIFUJI Hideaki 	}
88889bc7848SHannes Frederic Sowa 	if (mtu < hlen + sizeof(struct frag_hdr) + 8)
889b72a2b01SHannes Frederic Sowa 		goto fail_toobig;
8901e0d69a9SHannes Frederic Sowa 	mtu -= hlen + sizeof(struct frag_hdr);
8911da177e4SLinus Torvalds 
892fd0273d7SMartin KaFai Lau 	frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr,
893fd0273d7SMartin KaFai Lau 				    &ipv6_hdr(skb)->saddr);
894286c2349SMartin KaFai Lau 
895405c92f7SHannes Frederic Sowa 	if (skb->ip_summed == CHECKSUM_PARTIAL &&
896405c92f7SHannes Frederic Sowa 	    (err = skb_checksum_help(skb)))
897405c92f7SHannes Frederic Sowa 		goto fail;
898405c92f7SHannes Frederic Sowa 
899ef0efcd3SJunwei Hu 	prevhdr = skb_network_header(skb) + nexthdr_offset;
9001d325d21SFlorian Westphal 	hroom = LL_RESERVED_SPACE(rt->dst.dev);
90121dc3301SDavid S. Miller 	if (skb_has_frag_list(skb)) {
902c72d8cdaSAlexey Dobriyan 		unsigned int first_len = skb_pagelen(skb);
9030feca619SPablo Neira Ayuso 		struct ip6_fraglist_iter iter;
9043d13008eSEric Dumazet 		struct sk_buff *frag2;
9051da177e4SLinus Torvalds 
9061da177e4SLinus Torvalds 		if (first_len - hlen > mtu ||
9071da177e4SLinus Torvalds 		    ((first_len - hlen) & 7) ||
9081d325d21SFlorian Westphal 		    skb_cloned(skb) ||
9091d325d21SFlorian Westphal 		    skb_headroom(skb) < (hroom + sizeof(struct frag_hdr)))
9101da177e4SLinus Torvalds 			goto slow_path;
9111da177e4SLinus Torvalds 
9124d9092bbSDavid S. Miller 		skb_walk_frags(skb, frag) {
9131da177e4SLinus Torvalds 			/* Correct geometry. */
9141da177e4SLinus Torvalds 			if (frag->len > mtu ||
9151da177e4SLinus Torvalds 			    ((frag->len & 7) && frag->next) ||
9161d325d21SFlorian Westphal 			    skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr)))
9173d13008eSEric Dumazet 				goto slow_path_clean;
9181da177e4SLinus Torvalds 
9191da177e4SLinus Torvalds 			/* Partially cloned skb? */
9201da177e4SLinus Torvalds 			if (skb_shared(frag))
9213d13008eSEric Dumazet 				goto slow_path_clean;
9222fdba6b0SHerbert Xu 
9232fdba6b0SHerbert Xu 			BUG_ON(frag->sk);
9242fdba6b0SHerbert Xu 			if (skb->sk) {
9252fdba6b0SHerbert Xu 				frag->sk = skb->sk;
9262fdba6b0SHerbert Xu 				frag->destructor = sock_wfree;
9272fdba6b0SHerbert Xu 			}
9283d13008eSEric Dumazet 			skb->truesize -= frag->truesize;
9291da177e4SLinus Torvalds 		}
9301da177e4SLinus Torvalds 
9310feca619SPablo Neira Ayuso 		err = ip6_fraglist_init(skb, hlen, prevhdr, nexthdr, frag_id,
9320feca619SPablo Neira Ayuso 					&iter);
9330feca619SPablo Neira Ayuso 		if (err < 0)
9341d325d21SFlorian Westphal 			goto fail;
9351da177e4SLinus Torvalds 
936803e8486SEric Dumazet 		/* We prevent @rt from being freed. */
937803e8486SEric Dumazet 		rcu_read_lock();
938803e8486SEric Dumazet 
9391da177e4SLinus Torvalds 		for (;;) {
9401da177e4SLinus Torvalds 			/* Prepare header of the next frame,
9411da177e4SLinus Torvalds 			 * before previous one went down. */
9420feca619SPablo Neira Ayuso 			if (iter.frag)
9430feca619SPablo Neira Ayuso 				ip6_fraglist_prepare(skb, &iter);
9441da177e4SLinus Torvalds 
945a1ac9c8aSMartin KaFai Lau 			skb_set_delivery_time(skb, tstamp, mono_delivery_time);
9467d8c6e39SEric W. Biederman 			err = output(net, sk, skb);
947dafee490SWei Dong 			if (!err)
948d8d1f30bSChangli Gao 				IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
9493bd653c8SDenis V. Lunev 					      IPSTATS_MIB_FRAGCREATES);
950dafee490SWei Dong 
9510feca619SPablo Neira Ayuso 			if (err || !iter.frag)
9521da177e4SLinus Torvalds 				break;
9531da177e4SLinus Torvalds 
9540feca619SPablo Neira Ayuso 			skb = ip6_fraglist_next(&iter);
9551da177e4SLinus Torvalds 		}
9561da177e4SLinus Torvalds 
9570feca619SPablo Neira Ayuso 		kfree(iter.tmp_hdr);
9581da177e4SLinus Torvalds 
9591da177e4SLinus Torvalds 		if (err == 0) {
960d8d1f30bSChangli Gao 			IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
9613bd653c8SDenis V. Lunev 				      IPSTATS_MIB_FRAGOKS);
962803e8486SEric Dumazet 			rcu_read_unlock();
9631da177e4SLinus Torvalds 			return 0;
9641da177e4SLinus Torvalds 		}
9651da177e4SLinus Torvalds 
966b7034146SEric Dumazet 		kfree_skb_list(iter.frag);
9671da177e4SLinus Torvalds 
968d8d1f30bSChangli Gao 		IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
9693bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGFAILS);
970803e8486SEric Dumazet 		rcu_read_unlock();
9711da177e4SLinus Torvalds 		return err;
9723d13008eSEric Dumazet 
9733d13008eSEric Dumazet slow_path_clean:
9743d13008eSEric Dumazet 		skb_walk_frags(skb, frag2) {
9753d13008eSEric Dumazet 			if (frag2 == frag)
9763d13008eSEric Dumazet 				break;
9773d13008eSEric Dumazet 			frag2->sk = NULL;
9783d13008eSEric Dumazet 			frag2->destructor = NULL;
9793d13008eSEric Dumazet 			skb->truesize += frag2->truesize;
9803d13008eSEric Dumazet 		}
9811da177e4SLinus Torvalds 	}
9821da177e4SLinus Torvalds 
9831da177e4SLinus Torvalds slow_path:
9841da177e4SLinus Torvalds 	/*
9851da177e4SLinus Torvalds 	 *	Fragment the datagram.
9861da177e4SLinus Torvalds 	 */
9871da177e4SLinus Torvalds 
9888a6a1f17SPablo Neira Ayuso 	ip6_frag_init(skb, hlen, mtu, rt->dst.dev->needed_tailroom,
9898a6a1f17SPablo Neira Ayuso 		      LL_RESERVED_SPACE(rt->dst.dev), prevhdr, nexthdr, frag_id,
9908a6a1f17SPablo Neira Ayuso 		      &state);
9911da177e4SLinus Torvalds 
9921da177e4SLinus Torvalds 	/*
9931da177e4SLinus Torvalds 	 *	Keep copying data until we run out.
9941da177e4SLinus Torvalds 	 */
99579e49503SFlorian Westphal 
9968a6a1f17SPablo Neira Ayuso 	while (state.left > 0) {
9978a6a1f17SPablo Neira Ayuso 		frag = ip6_frag_next(skb, &state);
9988a6a1f17SPablo Neira Ayuso 		if (IS_ERR(frag)) {
9998a6a1f17SPablo Neira Ayuso 			err = PTR_ERR(frag);
10001da177e4SLinus Torvalds 			goto fail;
10011da177e4SLinus Torvalds 		}
10021da177e4SLinus Torvalds 
10031da177e4SLinus Torvalds 		/*
10041da177e4SLinus Torvalds 		 *	Put this fragment into the sending queue.
10051da177e4SLinus Torvalds 		 */
1006a1ac9c8aSMartin KaFai Lau 		skb_set_delivery_time(frag, tstamp, mono_delivery_time);
10077d8c6e39SEric W. Biederman 		err = output(net, sk, frag);
10081da177e4SLinus Torvalds 		if (err)
10091da177e4SLinus Torvalds 			goto fail;
1010dafee490SWei Dong 
1011adf30907SEric Dumazet 		IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
10123bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGCREATES);
10131da177e4SLinus Torvalds 	}
1014adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
1015a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGOKS);
1016808db80aSEric Dumazet 	consume_skb(skb);
10171da177e4SLinus Torvalds 	return err;
10181da177e4SLinus Torvalds 
1019485fca66SFlorian Westphal fail_toobig:
1020485fca66SFlorian Westphal 	if (skb->sk && dst_allfrag(skb_dst(skb)))
1021aba54656SEric Dumazet 		sk_gso_disable(skb->sk);
1022485fca66SFlorian Westphal 
1023485fca66SFlorian Westphal 	icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
1024485fca66SFlorian Westphal 	err = -EMSGSIZE;
1025485fca66SFlorian Westphal 
10261da177e4SLinus Torvalds fail:
1027adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
1028a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGFAILS);
10291da177e4SLinus Torvalds 	kfree_skb(skb);
10301da177e4SLinus Torvalds 	return err;
10311da177e4SLinus Torvalds }
10321da177e4SLinus Torvalds 
1033b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key,
1034b71d1d42SEric Dumazet 			       const struct in6_addr *fl_addr,
1035b71d1d42SEric Dumazet 			       const struct in6_addr *addr_cache)
1036cf6b1982SYOSHIFUJI Hideaki {
1037a02cec21SEric Dumazet 	return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) &&
103863159f29SIan Morris 		(!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache));
1039cf6b1982SYOSHIFUJI Hideaki }
1040cf6b1982SYOSHIFUJI Hideaki 
1041497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk,
1042497c615aSHerbert Xu 					  struct dst_entry *dst,
1043b71d1d42SEric Dumazet 					  const struct flowi6 *fl6)
10441da177e4SLinus Torvalds {
10451da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
1046a963a37dSEric Dumazet 	struct rt6_info *rt;
10471da177e4SLinus Torvalds 
1048497c615aSHerbert Xu 	if (!dst)
1049497c615aSHerbert Xu 		goto out;
10501da177e4SLinus Torvalds 
1051a963a37dSEric Dumazet 	if (dst->ops->family != AF_INET6) {
1052a963a37dSEric Dumazet 		dst_release(dst);
1053a963a37dSEric Dumazet 		return NULL;
1054a963a37dSEric Dumazet 	}
1055a963a37dSEric Dumazet 
1056a963a37dSEric Dumazet 	rt = (struct rt6_info *)dst;
10571da177e4SLinus Torvalds 	/* Yes, checking route validity in not connected
1058d76e60a5SDavid S. Miller 	 * case is not very simple. Take into account,
1059d76e60a5SDavid S. Miller 	 * that we do not support routing by source, TOS,
1060d76e60a5SDavid S. Miller 	 * and MSG_DONTROUTE		--ANK (980726)
1061d76e60a5SDavid S. Miller 	 *
1062cf6b1982SYOSHIFUJI Hideaki 	 * 1. ip6_rt_check(): If route was host route,
1063cf6b1982SYOSHIFUJI Hideaki 	 *    check that cached destination is current.
1064d76e60a5SDavid S. Miller 	 *    If it is network route, we still may
1065d76e60a5SDavid S. Miller 	 *    check its validity using saved pointer
1066d76e60a5SDavid S. Miller 	 *    to the last used address: daddr_cache.
1067d76e60a5SDavid S. Miller 	 *    We do not want to save whole address now,
1068d76e60a5SDavid S. Miller 	 *    (because main consumer of this service
1069d76e60a5SDavid S. Miller 	 *    is tcp, which has not this problem),
1070d76e60a5SDavid S. Miller 	 *    so that the last trick works only on connected
1071d76e60a5SDavid S. Miller 	 *    sockets.
1072d76e60a5SDavid S. Miller 	 * 2. oif also should be the same.
10731da177e4SLinus Torvalds 	 */
10744c9483b2SDavid S. Miller 	if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) ||
10758e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES
10764c9483b2SDavid S. Miller 	    ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) ||
10778e1ef0a9SYOSHIFUJI Hideaki #endif
107840867d74SDavid Ahern 	   (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex)) {
1079497c615aSHerbert Xu 		dst_release(dst);
1080497c615aSHerbert Xu 		dst = NULL;
10811da177e4SLinus Torvalds 	}
1082497c615aSHerbert Xu 
1083497c615aSHerbert Xu out:
1084497c615aSHerbert Xu 	return dst;
10851da177e4SLinus Torvalds }
1086497c615aSHerbert Xu 
10873aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
10884c9483b2SDavid S. Miller 			       struct dst_entry **dst, struct flowi6 *fl6)
1089497c615aSHerbert Xu {
109069cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
109169cce1d1SDavid S. Miller 	struct neighbour *n;
109297cac082SDavid S. Miller 	struct rt6_info *rt;
109369cce1d1SDavid S. Miller #endif
109469cce1d1SDavid S. Miller 	int err;
10956f21c96aSPaolo Abeni 	int flags = 0;
10961da177e4SLinus Torvalds 
1097e16e888bSMarkus Stenberg 	/* The correct way to handle this would be to do
1098e16e888bSMarkus Stenberg 	 * ip6_route_get_saddr, and then ip6_route_output; however,
1099e16e888bSMarkus Stenberg 	 * the route-specific preferred source forces the
1100e16e888bSMarkus Stenberg 	 * ip6_route_output call _before_ ip6_route_get_saddr.
1101e16e888bSMarkus Stenberg 	 *
1102e16e888bSMarkus Stenberg 	 * In source specific routing (no src=any default route),
1103e16e888bSMarkus Stenberg 	 * ip6_route_output will fail given src=any saddr, though, so
1104e16e888bSMarkus Stenberg 	 * that's why we try it again later.
1105e16e888bSMarkus Stenberg 	 */
1106c305b9e6Szhang kai 	if (ipv6_addr_any(&fl6->saddr)) {
1107a68886a6SDavid Ahern 		struct fib6_info *from;
1108e16e888bSMarkus Stenberg 		struct rt6_info *rt;
1109e16e888bSMarkus Stenberg 
1110e16e888bSMarkus Stenberg 		*dst = ip6_route_output(net, sk, fl6);
1111e16e888bSMarkus Stenberg 		rt = (*dst)->error ? NULL : (struct rt6_info *)*dst;
1112a68886a6SDavid Ahern 
1113a68886a6SDavid Ahern 		rcu_read_lock();
1114a68886a6SDavid Ahern 		from = rt ? rcu_dereference(rt->from) : NULL;
1115a68886a6SDavid Ahern 		err = ip6_route_get_saddr(net, from, &fl6->daddr,
1116e16e888bSMarkus Stenberg 					  sk ? inet6_sk(sk)->srcprefs : 0,
1117e16e888bSMarkus Stenberg 					  &fl6->saddr);
1118a68886a6SDavid Ahern 		rcu_read_unlock();
1119a68886a6SDavid Ahern 
1120e16e888bSMarkus Stenberg 		if (err)
1121e16e888bSMarkus Stenberg 			goto out_err_release;
1122e16e888bSMarkus Stenberg 
1123e16e888bSMarkus Stenberg 		/* If we had an erroneous initial result, pretend it
1124e16e888bSMarkus Stenberg 		 * never existed and let the SA-enabled version take
1125e16e888bSMarkus Stenberg 		 * over.
1126e16e888bSMarkus Stenberg 		 */
1127c305b9e6Szhang kai 		if ((*dst)->error) {
1128e16e888bSMarkus Stenberg 			dst_release(*dst);
1129e16e888bSMarkus Stenberg 			*dst = NULL;
1130e16e888bSMarkus Stenberg 		}
11316f21c96aSPaolo Abeni 
11326f21c96aSPaolo Abeni 		if (fl6->flowi6_oif)
11336f21c96aSPaolo Abeni 			flags |= RT6_LOOKUP_F_IFACE;
1134e16e888bSMarkus Stenberg 	}
1135e16e888bSMarkus Stenberg 
113663159f29SIan Morris 	if (!*dst)
11376f21c96aSPaolo Abeni 		*dst = ip6_route_output_flags(net, sk, fl6, flags);
11381da177e4SLinus Torvalds 
1139e5d08d71SIan Morris 	err = (*dst)->error;
1140e5d08d71SIan Morris 	if (err)
11411da177e4SLinus Torvalds 		goto out_err_release;
11421da177e4SLinus Torvalds 
114395c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
114495c385b4SNeil Horman 	/*
114595c385b4SNeil Horman 	 * Here if the dst entry we've looked up
114695c385b4SNeil Horman 	 * has a neighbour entry that is in the INCOMPLETE
114795c385b4SNeil Horman 	 * state and the src address from the flow is
114895c385b4SNeil Horman 	 * marked as OPTIMISTIC, we release the found
114995c385b4SNeil Horman 	 * dst entry and replace it instead with the
115095c385b4SNeil Horman 	 * dst entry of the nexthop router
115195c385b4SNeil Horman 	 */
1152c56bf6feSEric Dumazet 	rt = (struct rt6_info *) *dst;
115309eed119SEric Dumazet 	rcu_read_lock();
11542647a9b0SMartin KaFai Lau 	n = __ipv6_neigh_lookup_noref(rt->dst.dev,
11552647a9b0SMartin KaFai Lau 				      rt6_nexthop(rt, &fl6->daddr));
1156b071af52SEric Dumazet 	err = n && !(READ_ONCE(n->nud_state) & NUD_VALID) ? -EINVAL : 0;
115709eed119SEric Dumazet 	rcu_read_unlock();
1158707be1ffSYOSHIFUJI Hideaki / 吉藤英明 
1159707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	if (err) {
116095c385b4SNeil Horman 		struct inet6_ifaddr *ifp;
11614c9483b2SDavid S. Miller 		struct flowi6 fl_gw6;
116295c385b4SNeil Horman 		int redirect;
116395c385b4SNeil Horman 
11644c9483b2SDavid S. Miller 		ifp = ipv6_get_ifaddr(net, &fl6->saddr,
11651cab3da6SDaniel Lezcano 				      (*dst)->dev, 1);
116695c385b4SNeil Horman 
116795c385b4SNeil Horman 		redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC);
116895c385b4SNeil Horman 		if (ifp)
116995c385b4SNeil Horman 			in6_ifa_put(ifp);
117095c385b4SNeil Horman 
117195c385b4SNeil Horman 		if (redirect) {
117295c385b4SNeil Horman 			/*
117395c385b4SNeil Horman 			 * We need to get the dst entry for the
117495c385b4SNeil Horman 			 * default router instead
117595c385b4SNeil Horman 			 */
117695c385b4SNeil Horman 			dst_release(*dst);
11774c9483b2SDavid S. Miller 			memcpy(&fl_gw6, fl6, sizeof(struct flowi6));
11784c9483b2SDavid S. Miller 			memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr));
11794c9483b2SDavid S. Miller 			*dst = ip6_route_output(net, sk, &fl_gw6);
1180e5d08d71SIan Morris 			err = (*dst)->error;
1181e5d08d71SIan Morris 			if (err)
118295c385b4SNeil Horman 				goto out_err_release;
118395c385b4SNeil Horman 		}
118495c385b4SNeil Horman 	}
118595c385b4SNeil Horman #endif
1186ec5e3b0aSJonathan T. Leighton 	if (ipv6_addr_v4mapped(&fl6->saddr) &&
118700ea1ceeSWillem de Bruijn 	    !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) {
118800ea1ceeSWillem de Bruijn 		err = -EAFNOSUPPORT;
118900ea1ceeSWillem de Bruijn 		goto out_err_release;
119000ea1ceeSWillem de Bruijn 	}
119195c385b4SNeil Horman 
11921da177e4SLinus Torvalds 	return 0;
11931da177e4SLinus Torvalds 
11941da177e4SLinus Torvalds out_err_release:
11951da177e4SLinus Torvalds 	dst_release(*dst);
11961da177e4SLinus Torvalds 	*dst = NULL;
11978a966fc0SDavid Ahern 
11980d240e78SDavid Ahern 	if (err == -ENETUNREACH)
11990d240e78SDavid Ahern 		IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES);
12001da177e4SLinus Torvalds 	return err;
12011da177e4SLinus Torvalds }
120234a0b3cdSAdrian Bunk 
1203497c615aSHerbert Xu /**
1204497c615aSHerbert Xu  *	ip6_dst_lookup - perform route lookup on flow
1205b51cd7c8SAndrew Lunn  *	@net: Network namespace to perform lookup in
1206497c615aSHerbert Xu  *	@sk: socket which provides route info
1207497c615aSHerbert Xu  *	@dst: pointer to dst_entry * for result
12084c9483b2SDavid S. Miller  *	@fl6: flow to lookup
1209497c615aSHerbert Xu  *
1210497c615aSHerbert Xu  *	This function performs a route lookup on the given flow.
1211497c615aSHerbert Xu  *
1212497c615aSHerbert Xu  *	It returns zero on success, or a standard errno code on error.
1213497c615aSHerbert Xu  */
1214343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst,
1215343d60aaSRoopa Prabhu 		   struct flowi6 *fl6)
1216497c615aSHerbert Xu {
1217497c615aSHerbert Xu 	*dst = NULL;
1218343d60aaSRoopa Prabhu 	return ip6_dst_lookup_tail(net, sk, dst, fl6);
1219497c615aSHerbert Xu }
12203cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup);
12213cf3dc6cSArnaldo Carvalho de Melo 
1222497c615aSHerbert Xu /**
122368d0c6d3SDavid S. Miller  *	ip6_dst_lookup_flow - perform route lookup on flow with ipsec
1224b51cd7c8SAndrew Lunn  *	@net: Network namespace to perform lookup in
122568d0c6d3SDavid S. Miller  *	@sk: socket which provides route info
12264c9483b2SDavid S. Miller  *	@fl6: flow to lookup
122768d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
122868d0c6d3SDavid S. Miller  *
122968d0c6d3SDavid S. Miller  *	This function performs a route lookup on the given flow.
123068d0c6d3SDavid S. Miller  *
123168d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
123268d0c6d3SDavid S. Miller  *	error code.
123368d0c6d3SDavid S. Miller  */
1234c4e85f73SSabrina Dubroca struct dst_entry *ip6_dst_lookup_flow(struct net *net, const struct sock *sk, struct flowi6 *fl6,
12350e0d44abSSteffen Klassert 				      const struct in6_addr *final_dst)
123668d0c6d3SDavid S. Miller {
123768d0c6d3SDavid S. Miller 	struct dst_entry *dst = NULL;
123868d0c6d3SDavid S. Miller 	int err;
123968d0c6d3SDavid S. Miller 
1240c4e85f73SSabrina Dubroca 	err = ip6_dst_lookup_tail(net, sk, &dst, fl6);
124168d0c6d3SDavid S. Miller 	if (err)
124268d0c6d3SDavid S. Miller 		return ERR_PTR(err);
124368d0c6d3SDavid S. Miller 	if (final_dst)
12444e3fd7a0SAlexey Dobriyan 		fl6->daddr = *final_dst;
12452774c131SDavid S. Miller 
1246c4e85f73SSabrina Dubroca 	return xfrm_lookup_route(net, dst, flowi6_to_flowi(fl6), sk, 0);
124768d0c6d3SDavid S. Miller }
124868d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow);
124968d0c6d3SDavid S. Miller 
125068d0c6d3SDavid S. Miller /**
125168d0c6d3SDavid S. Miller  *	ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow
125268d0c6d3SDavid S. Miller  *	@sk: socket which provides the dst cache and route info
12534c9483b2SDavid S. Miller  *	@fl6: flow to lookup
125468d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
125596818159SAlexey Kodanev  *	@connected: whether @sk is connected or not
1256497c615aSHerbert Xu  *
1257497c615aSHerbert Xu  *	This function performs a route lookup on the given flow with the
1258497c615aSHerbert Xu  *	possibility of using the cached route in the socket if it is valid.
1259497c615aSHerbert Xu  *	It will take the socket dst lock when operating on the dst cache.
1260497c615aSHerbert Xu  *	As a result, this function can only be used in process context.
1261497c615aSHerbert Xu  *
126296818159SAlexey Kodanev  *	In addition, for a connected socket, cache the dst in the socket
126396818159SAlexey Kodanev  *	if the current cache is not valid.
126496818159SAlexey Kodanev  *
126568d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
126668d0c6d3SDavid S. Miller  *	error code.
1267497c615aSHerbert Xu  */
12684c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6,
126996818159SAlexey Kodanev 					 const struct in6_addr *final_dst,
127096818159SAlexey Kodanev 					 bool connected)
1271497c615aSHerbert Xu {
127268d0c6d3SDavid S. Miller 	struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie);
1273497c615aSHerbert Xu 
12744c9483b2SDavid S. Miller 	dst = ip6_sk_dst_check(sk, dst, fl6);
127596818159SAlexey Kodanev 	if (dst)
127696818159SAlexey Kodanev 		return dst;
127796818159SAlexey Kodanev 
1278c4e85f73SSabrina Dubroca 	dst = ip6_dst_lookup_flow(sock_net(sk), sk, fl6, final_dst);
127996818159SAlexey Kodanev 	if (connected && !IS_ERR(dst))
128096818159SAlexey Kodanev 		ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6);
128168d0c6d3SDavid S. Miller 
128200bc0ef5SJakub Sitnicki 	return dst;
128368d0c6d3SDavid S. Miller }
128468d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow);
1285497c615aSHerbert Xu 
1286571912c6SMartin Varghese /**
1287571912c6SMartin Varghese  *      ip6_dst_lookup_tunnel - perform route lookup on tunnel
1288571912c6SMartin Varghese  *      @skb: Packet for which lookup is done
1289571912c6SMartin Varghese  *      @dev: Tunnel device
1290571912c6SMartin Varghese  *      @net: Network namespace of tunnel device
1291b51cd7c8SAndrew Lunn  *      @sock: Socket which provides route info
1292571912c6SMartin Varghese  *      @saddr: Memory to store the src ip address
1293571912c6SMartin Varghese  *      @info: Tunnel information
1294571912c6SMartin Varghese  *      @protocol: IP protocol
1295b51cd7c8SAndrew Lunn  *      @use_cache: Flag to enable cache usage
1296571912c6SMartin Varghese  *      This function performs a route lookup on a tunnel
1297571912c6SMartin Varghese  *
1298571912c6SMartin Varghese  *      It returns a valid dst pointer and stores src address to be used in
1299571912c6SMartin Varghese  *      tunnel in param saddr on success, else a pointer encoded error code.
1300571912c6SMartin Varghese  */
1301571912c6SMartin Varghese 
1302571912c6SMartin Varghese struct dst_entry *ip6_dst_lookup_tunnel(struct sk_buff *skb,
1303571912c6SMartin Varghese 					struct net_device *dev,
1304571912c6SMartin Varghese 					struct net *net,
1305571912c6SMartin Varghese 					struct socket *sock,
1306571912c6SMartin Varghese 					struct in6_addr *saddr,
1307571912c6SMartin Varghese 					const struct ip_tunnel_info *info,
1308571912c6SMartin Varghese 					u8 protocol,
1309571912c6SMartin Varghese 					bool use_cache)
1310571912c6SMartin Varghese {
1311571912c6SMartin Varghese 	struct dst_entry *dst = NULL;
1312571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE
1313571912c6SMartin Varghese 	struct dst_cache *dst_cache;
1314571912c6SMartin Varghese #endif
1315571912c6SMartin Varghese 	struct flowi6 fl6;
1316571912c6SMartin Varghese 	__u8 prio;
1317571912c6SMartin Varghese 
1318571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE
1319571912c6SMartin Varghese 	dst_cache = (struct dst_cache *)&info->dst_cache;
1320571912c6SMartin Varghese 	if (use_cache) {
1321571912c6SMartin Varghese 		dst = dst_cache_get_ip6(dst_cache, saddr);
1322571912c6SMartin Varghese 		if (dst)
1323571912c6SMartin Varghese 			return dst;
1324571912c6SMartin Varghese 	}
1325571912c6SMartin Varghese #endif
1326571912c6SMartin Varghese 	memset(&fl6, 0, sizeof(fl6));
1327571912c6SMartin Varghese 	fl6.flowi6_mark = skb->mark;
1328571912c6SMartin Varghese 	fl6.flowi6_proto = protocol;
1329571912c6SMartin Varghese 	fl6.daddr = info->key.u.ipv6.dst;
1330571912c6SMartin Varghese 	fl6.saddr = info->key.u.ipv6.src;
1331571912c6SMartin Varghese 	prio = info->key.tos;
1332ab7e2e0dSMatthias May 	fl6.flowlabel = ip6_make_flowinfo(prio, info->key.label);
1333571912c6SMartin Varghese 
1334571912c6SMartin Varghese 	dst = ipv6_stub->ipv6_dst_lookup_flow(net, sock->sk, &fl6,
1335571912c6SMartin Varghese 					      NULL);
1336571912c6SMartin Varghese 	if (IS_ERR(dst)) {
1337571912c6SMartin Varghese 		netdev_dbg(dev, "no route to %pI6\n", &fl6.daddr);
1338571912c6SMartin Varghese 		return ERR_PTR(-ENETUNREACH);
1339571912c6SMartin Varghese 	}
1340571912c6SMartin Varghese 	if (dst->dev == dev) { /* is this necessary? */
1341571912c6SMartin Varghese 		netdev_dbg(dev, "circular route to %pI6\n", &fl6.daddr);
1342571912c6SMartin Varghese 		dst_release(dst);
1343571912c6SMartin Varghese 		return ERR_PTR(-ELOOP);
1344571912c6SMartin Varghese 	}
1345571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE
1346571912c6SMartin Varghese 	if (use_cache)
1347571912c6SMartin Varghese 		dst_cache_set_ip6(dst_cache, dst, &fl6.saddr);
1348571912c6SMartin Varghese #endif
1349571912c6SMartin Varghese 	*saddr = fl6.saddr;
1350571912c6SMartin Varghese 	return dst;
1351571912c6SMartin Varghese }
1352571912c6SMartin Varghese EXPORT_SYMBOL_GPL(ip6_dst_lookup_tunnel);
1353571912c6SMartin Varghese 
13540178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src,
13550178b695SHerbert Xu 					       gfp_t gfp)
13560178b695SHerbert Xu {
13570178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
13580178b695SHerbert Xu }
13590178b695SHerbert Xu 
13600178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src,
13610178b695SHerbert Xu 						gfp_t gfp)
13620178b695SHerbert Xu {
13630178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
13640178b695SHerbert Xu }
13650178b695SHerbert Xu 
136675a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu,
13670c183379SGao feng 				int *maxfraglen,
13680c183379SGao feng 				unsigned int fragheaderlen,
13690c183379SGao feng 				struct sk_buff *skb,
137075a493e6SHannes Frederic Sowa 				struct rt6_info *rt,
1371e367c2d0Slucien 				unsigned int orig_mtu)
13720c183379SGao feng {
13730c183379SGao feng 	if (!(rt->dst.flags & DST_XFRM_TUNNEL)) {
137463159f29SIan Morris 		if (!skb) {
13750c183379SGao feng 			/* first fragment, reserve header_len */
1376e367c2d0Slucien 			*mtu = orig_mtu - rt->dst.header_len;
13770c183379SGao feng 
13780c183379SGao feng 		} else {
13790c183379SGao feng 			/*
13800c183379SGao feng 			 * this fragment is not first, the headers
13810c183379SGao feng 			 * space is regarded as data space.
13820c183379SGao feng 			 */
1383e367c2d0Slucien 			*mtu = orig_mtu;
13840c183379SGao feng 		}
13850c183379SGao feng 		*maxfraglen = ((*mtu - fragheaderlen) & ~7)
13860c183379SGao feng 			      + fragheaderlen - sizeof(struct frag_hdr);
13870c183379SGao feng 	}
13880c183379SGao feng }
13890c183379SGao feng 
1390366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork,
139126879da5SWei Wang 			  struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6,
1392f37a4cc6SPavel Begunkov 			  struct rt6_info *rt)
1393366e41d9SVlad Yasevich {
1394366e41d9SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
1395366e41d9SVlad Yasevich 	unsigned int mtu;
1396d656b2eaSPavel Begunkov 	struct ipv6_txoptions *nopt, *opt = ipc6->opt;
1397366e41d9SVlad Yasevich 
139840ac240cSPavel Begunkov 	/* callers pass dst together with a reference, set it first so
139940ac240cSPavel Begunkov 	 * ip6_cork_release() can put it down even in case of an error.
140040ac240cSPavel Begunkov 	 */
140140ac240cSPavel Begunkov 	cork->base.dst = &rt->dst;
140240ac240cSPavel Begunkov 
1403366e41d9SVlad Yasevich 	/*
1404366e41d9SVlad Yasevich 	 * setup for corking
1405366e41d9SVlad Yasevich 	 */
1406366e41d9SVlad Yasevich 	if (opt) {
1407366e41d9SVlad Yasevich 		if (WARN_ON(v6_cork->opt))
1408366e41d9SVlad Yasevich 			return -EINVAL;
1409366e41d9SVlad Yasevich 
1410d656b2eaSPavel Begunkov 		nopt = v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation);
1411d656b2eaSPavel Begunkov 		if (unlikely(!nopt))
1412366e41d9SVlad Yasevich 			return -ENOBUFS;
1413366e41d9SVlad Yasevich 
1414d656b2eaSPavel Begunkov 		nopt->tot_len = sizeof(*opt);
1415d656b2eaSPavel Begunkov 		nopt->opt_flen = opt->opt_flen;
1416d656b2eaSPavel Begunkov 		nopt->opt_nflen = opt->opt_nflen;
1417366e41d9SVlad Yasevich 
1418d656b2eaSPavel Begunkov 		nopt->dst0opt = ip6_opt_dup(opt->dst0opt, sk->sk_allocation);
1419d656b2eaSPavel Begunkov 		if (opt->dst0opt && !nopt->dst0opt)
1420366e41d9SVlad Yasevich 			return -ENOBUFS;
1421366e41d9SVlad Yasevich 
1422d656b2eaSPavel Begunkov 		nopt->dst1opt = ip6_opt_dup(opt->dst1opt, sk->sk_allocation);
1423d656b2eaSPavel Begunkov 		if (opt->dst1opt && !nopt->dst1opt)
1424366e41d9SVlad Yasevich 			return -ENOBUFS;
1425366e41d9SVlad Yasevich 
1426d656b2eaSPavel Begunkov 		nopt->hopopt = ip6_opt_dup(opt->hopopt, sk->sk_allocation);
1427d656b2eaSPavel Begunkov 		if (opt->hopopt && !nopt->hopopt)
1428366e41d9SVlad Yasevich 			return -ENOBUFS;
1429366e41d9SVlad Yasevich 
1430d656b2eaSPavel Begunkov 		nopt->srcrt = ip6_rthdr_dup(opt->srcrt, sk->sk_allocation);
1431d656b2eaSPavel Begunkov 		if (opt->srcrt && !nopt->srcrt)
1432366e41d9SVlad Yasevich 			return -ENOBUFS;
1433366e41d9SVlad Yasevich 
1434366e41d9SVlad Yasevich 		/* need source address above miyazawa*/
1435366e41d9SVlad Yasevich 	}
143626879da5SWei Wang 	v6_cork->hop_limit = ipc6->hlimit;
143726879da5SWei Wang 	v6_cork->tclass = ipc6->tclass;
1438366e41d9SVlad Yasevich 	if (rt->dst.flags & DST_XFRM_TUNNEL)
1439366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1440749439bfSMike Maloney 		      READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst);
1441366e41d9SVlad Yasevich 	else
1442366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1443c02b3741SDavid S. Miller 			READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst));
1444366e41d9SVlad Yasevich 	if (np->frag_size < mtu) {
1445366e41d9SVlad Yasevich 		if (np->frag_size)
1446366e41d9SVlad Yasevich 			mtu = np->frag_size;
1447366e41d9SVlad Yasevich 	}
1448366e41d9SVlad Yasevich 	cork->base.fragsize = mtu;
1449fbf47813SWillem de Bruijn 	cork->base.gso_size = ipc6->gso_size;
1450678ca42dSWillem de Bruijn 	cork->base.tx_flags = 0;
1451c6af0c22SWillem de Bruijn 	cork->base.mark = ipc6->sockc.mark;
1452678ca42dSWillem de Bruijn 	sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags);
1453bec1f6f6SWillem de Bruijn 
14540f6c480fSDavid Miller 	if (dst_allfrag(xfrm_dst_path(&rt->dst)))
1455366e41d9SVlad Yasevich 		cork->base.flags |= IPCORK_ALLFRAG;
1456366e41d9SVlad Yasevich 	cork->base.length = 0;
1457366e41d9SVlad Yasevich 
14585fdaa88dSWillem de Bruijn 	cork->base.transmit_time = ipc6->sockc.transmit_time;
1459a818f75eSJesus Sanchez-Palencia 
1460366e41d9SVlad Yasevich 	return 0;
1461366e41d9SVlad Yasevich }
1462366e41d9SVlad Yasevich 
14630bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk,
14640bbe84a6SVlad Yasevich 			     struct sk_buff_head *queue,
1465f3b46a3eSPavel Begunkov 			     struct inet_cork_full *cork_full,
14660bbe84a6SVlad Yasevich 			     struct inet6_cork *v6_cork,
14670bbe84a6SVlad Yasevich 			     struct page_frag *pfrag,
14680bbe84a6SVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
14690bbe84a6SVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
1470f93431c8SWang Yufen 			     void *from, size_t length, int transhdrlen,
14715fdaa88dSWillem de Bruijn 			     unsigned int flags, struct ipcm6_cookie *ipc6)
14721da177e4SLinus Torvalds {
14730c183379SGao feng 	struct sk_buff *skb, *skb_prev = NULL;
1474f3b46a3eSPavel Begunkov 	struct inet_cork *cork = &cork_full->base;
1475f37a4cc6SPavel Begunkov 	struct flowi6 *fl6 = &cork_full->fl.u.ip6;
147610b8a3deSPaolo Abeni 	unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu;
1477b5947e5dSWillem de Bruijn 	struct ubuf_info *uarg = NULL;
14780bbe84a6SVlad Yasevich 	int exthdrlen = 0;
14790bbe84a6SVlad Yasevich 	int dst_exthdrlen = 0;
14801da177e4SLinus Torvalds 	int hh_len;
14811da177e4SLinus Torvalds 	int copy;
14821da177e4SLinus Torvalds 	int err;
14831da177e4SLinus Torvalds 	int offset = 0;
1484773ba4feSPavel Begunkov 	bool zc = false;
148509c2d251SWillem de Bruijn 	u32 tskey = 0;
14860bbe84a6SVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->dst;
14870bbe84a6SVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
148832dce968SVlad Yasevich 	int csummode = CHECKSUM_NONE;
1489682b1a9dSHannes Frederic Sowa 	unsigned int maxnonfragsize, headersize;
14901f4c6eb2SEric Dumazet 	unsigned int wmem_alloc_delta = 0;
1491100f6d8eSWillem de Bruijn 	bool paged, extra_uref = false;
14921da177e4SLinus Torvalds 
14930bbe84a6SVlad Yasevich 	skb = skb_peek_tail(queue);
14940bbe84a6SVlad Yasevich 	if (!skb) {
14950bbe84a6SVlad Yasevich 		exthdrlen = opt ? opt->opt_flen : 0;
14967efdba5bSRomain KUNTZ 		dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len;
14971da177e4SLinus Torvalds 	}
14980bbe84a6SVlad Yasevich 
149915e36f5bSWillem de Bruijn 	paged = !!cork->gso_size;
1500bec1f6f6SWillem de Bruijn 	mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize;
1501e367c2d0Slucien 	orig_mtu = mtu;
15021da177e4SLinus Torvalds 
15038ca5a579SVadim Fedorenko 	if (cork->tx_flags & SKBTX_ANY_TSTAMP &&
1504*e3390b30SEric Dumazet 	    READ_ONCE(sk->sk_tsflags) & SOF_TIMESTAMPING_OPT_ID)
1505a1cdec57SEric Dumazet 		tskey = atomic_inc_return(&sk->sk_tskey) - 1;
1506678ca42dSWillem de Bruijn 
1507d8d1f30bSChangli Gao 	hh_len = LL_RESERVED_SPACE(rt->dst.dev);
15081da177e4SLinus Torvalds 
1509a1b05140SMasahide NAKAMURA 	fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len +
1510b4ce9277SHerbert Xu 			(opt ? opt->opt_nflen : 0);
15111da177e4SLinus Torvalds 
15124df98e76SHannes Frederic Sowa 	headersize = sizeof(struct ipv6hdr) +
15133a1cebe7SHannes Frederic Sowa 		     (opt ? opt->opt_flen + opt->opt_nflen : 0) +
15144df98e76SHannes Frederic Sowa 		     (dst_allfrag(&rt->dst) ?
15154df98e76SHannes Frederic Sowa 		      sizeof(struct frag_hdr) : 0) +
15164df98e76SHannes Frederic Sowa 		     rt->rt6i_nfheader_len;
15174df98e76SHannes Frederic Sowa 
15185e34af41STadeusz Struk 	if (mtu <= fragheaderlen ||
15195e34af41STadeusz Struk 	    ((mtu - fragheaderlen) & ~7) + fragheaderlen <= sizeof(struct frag_hdr))
15206596a022SJiri Bohac 		goto emsgsize;
15216596a022SJiri Bohac 
15226596a022SJiri Bohac 	maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen -
15236596a022SJiri Bohac 		     sizeof(struct frag_hdr);
15246596a022SJiri Bohac 
152510b8a3deSPaolo Abeni 	/* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit
152610b8a3deSPaolo Abeni 	 * the first fragment
152710b8a3deSPaolo Abeni 	 */
152810b8a3deSPaolo Abeni 	if (headersize + transhdrlen > mtu)
152910b8a3deSPaolo Abeni 		goto emsgsize;
153010b8a3deSPaolo Abeni 
153126879da5SWei Wang 	if (cork->length + length > mtu - headersize && ipc6->dontfrag &&
15324df98e76SHannes Frederic Sowa 	    (sk->sk_protocol == IPPROTO_UDP ||
153313651224SJakub Kicinski 	     sk->sk_protocol == IPPROTO_ICMPV6 ||
15344df98e76SHannes Frederic Sowa 	     sk->sk_protocol == IPPROTO_RAW)) {
15354df98e76SHannes Frederic Sowa 		ipv6_local_rxpmtu(sk, fl6, mtu - headersize +
15364df98e76SHannes Frederic Sowa 				sizeof(struct ipv6hdr));
15374df98e76SHannes Frederic Sowa 		goto emsgsize;
15384df98e76SHannes Frederic Sowa 	}
15394df98e76SHannes Frederic Sowa 
1540682b1a9dSHannes Frederic Sowa 	if (ip6_sk_ignore_df(sk))
1541682b1a9dSHannes Frederic Sowa 		maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN;
1542682b1a9dSHannes Frederic Sowa 	else
1543682b1a9dSHannes Frederic Sowa 		maxnonfragsize = mtu;
1544682b1a9dSHannes Frederic Sowa 
15454df98e76SHannes Frederic Sowa 	if (cork->length + length > maxnonfragsize - headersize) {
15464df98e76SHannes Frederic Sowa emsgsize:
154710b8a3deSPaolo Abeni 		pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0);
154810b8a3deSPaolo Abeni 		ipv6_local_error(sk, EMSGSIZE, fl6, pmtu);
15491da177e4SLinus Torvalds 		return -EMSGSIZE;
15501da177e4SLinus Torvalds 	}
1551682b1a9dSHannes Frederic Sowa 
1552682b1a9dSHannes Frederic Sowa 	/* CHECKSUM_PARTIAL only with no extension headers and when
1553682b1a9dSHannes Frederic Sowa 	 * we are not going to fragment
1554682b1a9dSHannes Frederic Sowa 	 */
1555682b1a9dSHannes Frederic Sowa 	if (transhdrlen && sk->sk_protocol == IPPROTO_UDP &&
1556682b1a9dSHannes Frederic Sowa 	    headersize == sizeof(struct ipv6hdr) &&
15572b89ed65SVlad Yasevich 	    length <= mtu - headersize &&
1558bec1f6f6SWillem de Bruijn 	    (!(flags & MSG_MORE) || cork->gso_size) &&
1559c8cd0989STom Herbert 	    rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM))
1560682b1a9dSHannes Frederic Sowa 		csummode = CHECKSUM_PARTIAL;
15611da177e4SLinus Torvalds 
15621fd3ae8cSPavel Begunkov 	if ((flags & MSG_ZEROCOPY) && length) {
15631fd3ae8cSPavel Begunkov 		struct msghdr *msg = from;
15641fd3ae8cSPavel Begunkov 
15651fd3ae8cSPavel Begunkov 		if (getfrag == ip_generic_getfrag && msg->msg_ubuf) {
15661fd3ae8cSPavel Begunkov 			if (skb_zcopy(skb) && msg->msg_ubuf != skb_zcopy(skb))
15671fd3ae8cSPavel Begunkov 				return -EINVAL;
15681fd3ae8cSPavel Begunkov 
15691fd3ae8cSPavel Begunkov 			/* Leave uarg NULL if can't zerocopy, callers should
15701fd3ae8cSPavel Begunkov 			 * be able to handle it.
15711fd3ae8cSPavel Begunkov 			 */
15721fd3ae8cSPavel Begunkov 			if ((rt->dst.dev->features & NETIF_F_SG) &&
15731fd3ae8cSPavel Begunkov 			    csummode == CHECKSUM_PARTIAL) {
15741fd3ae8cSPavel Begunkov 				paged = true;
15751fd3ae8cSPavel Begunkov 				zc = true;
15761fd3ae8cSPavel Begunkov 				uarg = msg->msg_ubuf;
15771fd3ae8cSPavel Begunkov 			}
15781fd3ae8cSPavel Begunkov 		} else if (sock_flag(sk, SOCK_ZEROCOPY)) {
15798c793822SJonathan Lemon 			uarg = msg_zerocopy_realloc(sk, length, skb_zcopy(skb));
1580b5947e5dSWillem de Bruijn 			if (!uarg)
1581b5947e5dSWillem de Bruijn 				return -ENOBUFS;
1582522924b5SWillem de Bruijn 			extra_uref = !skb_zcopy(skb);	/* only ref on new uarg */
1583b5947e5dSWillem de Bruijn 			if (rt->dst.dev->features & NETIF_F_SG &&
1584b5947e5dSWillem de Bruijn 			    csummode == CHECKSUM_PARTIAL) {
1585b5947e5dSWillem de Bruijn 				paged = true;
1586773ba4feSPavel Begunkov 				zc = true;
1587b5947e5dSWillem de Bruijn 			} else {
1588e7d2b510SPavel Begunkov 				uarg_to_msgzc(uarg)->zerocopy = 0;
158952900d22SWillem de Bruijn 				skb_zcopy_set(skb, uarg, &extra_uref);
1590b5947e5dSWillem de Bruijn 			}
1591b5947e5dSWillem de Bruijn 		}
15926d8192bdSDavid Howells 	} else if ((flags & MSG_SPLICE_PAGES) && length) {
1593cafbe182SEric Dumazet 		if (inet_test_bit(HDRINCL, sk))
15946d8192bdSDavid Howells 			return -EPERM;
15955a6f6873SDavid Howells 		if (rt->dst.dev->features & NETIF_F_SG &&
15965a6f6873SDavid Howells 		    getfrag == ip_generic_getfrag)
15976d8192bdSDavid Howells 			/* We need an empty buffer to attach stuff to */
15986d8192bdSDavid Howells 			paged = true;
15996d8192bdSDavid Howells 		else
16006d8192bdSDavid Howells 			flags &= ~MSG_SPLICE_PAGES;
16011fd3ae8cSPavel Begunkov 	}
1602b5947e5dSWillem de Bruijn 
16031da177e4SLinus Torvalds 	/*
16041da177e4SLinus Torvalds 	 * Let's try using as much space as possible.
16051da177e4SLinus Torvalds 	 * Use MTU if total length of the message fits into the MTU.
16061da177e4SLinus Torvalds 	 * Otherwise, we need to reserve fragment header and
16071da177e4SLinus Torvalds 	 * fragment alignment (= 8-15 octects, in total).
16081da177e4SLinus Torvalds 	 *
1609634a63e7SRandy Dunlap 	 * Note that we may need to "move" the data from the tail
16101da177e4SLinus Torvalds 	 * of the buffer to the new fragment when we split
16111da177e4SLinus Torvalds 	 * the message.
16121da177e4SLinus Torvalds 	 *
16131da177e4SLinus Torvalds 	 * FIXME: It may be fragmented into multiple chunks
16141da177e4SLinus Torvalds 	 *        at once if non-fragmentable extension headers
16151da177e4SLinus Torvalds 	 *        are too large.
16161da177e4SLinus Torvalds 	 * --yoshfuji
16171da177e4SLinus Torvalds 	 */
16181da177e4SLinus Torvalds 
16192811ebacSHannes Frederic Sowa 	cork->length += length;
16202811ebacSHannes Frederic Sowa 	if (!skb)
16211da177e4SLinus Torvalds 		goto alloc_new_skb;
16221da177e4SLinus Torvalds 
16231da177e4SLinus Torvalds 	while (length > 0) {
16241da177e4SLinus Torvalds 		/* Check if the remaining data fits into current packet. */
1625bdc712b4SDavid S. Miller 		copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len;
16261da177e4SLinus Torvalds 		if (copy < length)
16271da177e4SLinus Torvalds 			copy = maxfraglen - skb->len;
16281da177e4SLinus Torvalds 
16291da177e4SLinus Torvalds 		if (copy <= 0) {
16301da177e4SLinus Torvalds 			char *data;
16311da177e4SLinus Torvalds 			unsigned int datalen;
16321da177e4SLinus Torvalds 			unsigned int fraglen;
16331da177e4SLinus Torvalds 			unsigned int fraggap;
16346d123b81SJakub Kicinski 			unsigned int alloclen, alloc_extra;
1635aba36930SWillem de Bruijn 			unsigned int pagedlen;
16361da177e4SLinus Torvalds alloc_new_skb:
16371da177e4SLinus Torvalds 			/* There's no room in the current skb */
16380c183379SGao feng 			if (skb)
16390c183379SGao feng 				fraggap = skb->len - maxfraglen;
16401da177e4SLinus Torvalds 			else
16411da177e4SLinus Torvalds 				fraggap = 0;
16420c183379SGao feng 			/* update mtu and maxfraglen if necessary */
164363159f29SIan Morris 			if (!skb || !skb_prev)
16440c183379SGao feng 				ip6_append_data_mtu(&mtu, &maxfraglen,
164575a493e6SHannes Frederic Sowa 						    fragheaderlen, skb, rt,
1646e367c2d0Slucien 						    orig_mtu);
16470c183379SGao feng 
16480c183379SGao feng 			skb_prev = skb;
16491da177e4SLinus Torvalds 
16501da177e4SLinus Torvalds 			/*
16511da177e4SLinus Torvalds 			 * If remaining data exceeds the mtu,
16521da177e4SLinus Torvalds 			 * we know we need more fragment(s).
16531da177e4SLinus Torvalds 			 */
16541da177e4SLinus Torvalds 			datalen = length + fraggap;
16551da177e4SLinus Torvalds 
16560c183379SGao feng 			if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen)
16570c183379SGao feng 				datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len;
165815e36f5bSWillem de Bruijn 			fraglen = datalen + fragheaderlen;
1659aba36930SWillem de Bruijn 			pagedlen = 0;
166015e36f5bSWillem de Bruijn 
16616d123b81SJakub Kicinski 			alloc_extra = hh_len;
16626d123b81SJakub Kicinski 			alloc_extra += dst_exthdrlen;
16636d123b81SJakub Kicinski 			alloc_extra += rt->dst.trailer_len;
16646d123b81SJakub Kicinski 
16656d123b81SJakub Kicinski 			/* We just reserve space for fragment header.
16666d123b81SJakub Kicinski 			 * Note: this may be overallocation if the message
16676d123b81SJakub Kicinski 			 * (without MSG_MORE) fits into the MTU.
16686d123b81SJakub Kicinski 			 */
16696d123b81SJakub Kicinski 			alloc_extra += sizeof(struct frag_hdr);
16706d123b81SJakub Kicinski 
16711da177e4SLinus Torvalds 			if ((flags & MSG_MORE) &&
1672d8d1f30bSChangli Gao 			    !(rt->dst.dev->features&NETIF_F_SG))
16731da177e4SLinus Torvalds 				alloclen = mtu;
16746d123b81SJakub Kicinski 			else if (!paged &&
16756d123b81SJakub Kicinski 				 (fraglen + alloc_extra < SKB_MAX_ALLOC ||
16766d123b81SJakub Kicinski 				  !(rt->dst.dev->features & NETIF_F_SG)))
167715e36f5bSWillem de Bruijn 				alloclen = fraglen;
167847cf8899SPavel Begunkov 			else {
1679773ba4feSPavel Begunkov 				alloclen = fragheaderlen + transhdrlen;
1680773ba4feSPavel Begunkov 				pagedlen = datalen - transhdrlen;
168115e36f5bSWillem de Bruijn 			}
16826d123b81SJakub Kicinski 			alloclen += alloc_extra;
1683299b0767SSteffen Klassert 
16840c183379SGao feng 			if (datalen != length + fraggap) {
16851da177e4SLinus Torvalds 				/*
16860c183379SGao feng 				 * this is not the last fragment, the trailer
16870c183379SGao feng 				 * space is regarded as data space.
16881da177e4SLinus Torvalds 				 */
16890c183379SGao feng 				datalen += rt->dst.trailer_len;
16900c183379SGao feng 			}
16910c183379SGao feng 
16920c183379SGao feng 			fraglen = datalen + fragheaderlen;
16931da177e4SLinus Torvalds 
169415e36f5bSWillem de Bruijn 			copy = datalen - transhdrlen - fraggap - pagedlen;
1695ce650a16SDavid Howells 			/* [!] NOTE: copy may be negative if pagedlen>0
1696ce650a16SDavid Howells 			 * because then the equation may reduces to -fraggap.
1697ce650a16SDavid Howells 			 */
1698ce650a16SDavid Howells 			if (copy < 0 && !(flags & MSG_SPLICE_PAGES)) {
1699232cd35dSEric Dumazet 				err = -EINVAL;
1700232cd35dSEric Dumazet 				goto error;
1701232cd35dSEric Dumazet 			}
17021da177e4SLinus Torvalds 			if (transhdrlen) {
17036d123b81SJakub Kicinski 				skb = sock_alloc_send_skb(sk, alloclen,
17041da177e4SLinus Torvalds 						(flags & MSG_DONTWAIT), &err);
17051da177e4SLinus Torvalds 			} else {
17061da177e4SLinus Torvalds 				skb = NULL;
17071f4c6eb2SEric Dumazet 				if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <=
17081da177e4SLinus Torvalds 				    2 * sk->sk_sndbuf)
17096d123b81SJakub Kicinski 					skb = alloc_skb(alloclen,
17101da177e4SLinus Torvalds 							sk->sk_allocation);
171163159f29SIan Morris 				if (unlikely(!skb))
17121da177e4SLinus Torvalds 					err = -ENOBUFS;
17131da177e4SLinus Torvalds 			}
171463159f29SIan Morris 			if (!skb)
17151da177e4SLinus Torvalds 				goto error;
17161da177e4SLinus Torvalds 			/*
17171da177e4SLinus Torvalds 			 *	Fill in the control structures
17181da177e4SLinus Torvalds 			 */
17199c9c9ad5SHannes Frederic Sowa 			skb->protocol = htons(ETH_P_IPV6);
172032dce968SVlad Yasevich 			skb->ip_summed = csummode;
17211da177e4SLinus Torvalds 			skb->csum = 0;
17221f85851eSGao feng 			/* reserve for fragmentation and ipsec header */
17231f85851eSGao feng 			skb_reserve(skb, hh_len + sizeof(struct frag_hdr) +
17241f85851eSGao feng 				    dst_exthdrlen);
17251da177e4SLinus Torvalds 
17261da177e4SLinus Torvalds 			/*
17271da177e4SLinus Torvalds 			 *	Find where to start putting bytes
17281da177e4SLinus Torvalds 			 */
172915e36f5bSWillem de Bruijn 			data = skb_put(skb, fraglen - pagedlen);
17301f85851eSGao feng 			skb_set_network_header(skb, exthdrlen);
17311f85851eSGao feng 			data += fragheaderlen;
1732b0e380b1SArnaldo Carvalho de Melo 			skb->transport_header = (skb->network_header +
1733b0e380b1SArnaldo Carvalho de Melo 						 fragheaderlen);
17341da177e4SLinus Torvalds 			if (fraggap) {
17351da177e4SLinus Torvalds 				skb->csum = skb_copy_and_csum_bits(
17361da177e4SLinus Torvalds 					skb_prev, maxfraglen,
17378d5930dfSAl Viro 					data + transhdrlen, fraggap);
17381da177e4SLinus Torvalds 				skb_prev->csum = csum_sub(skb_prev->csum,
17391da177e4SLinus Torvalds 							  skb->csum);
17401da177e4SLinus Torvalds 				data += fraggap;
1741e9fa4f7bSHerbert Xu 				pskb_trim_unique(skb_prev, maxfraglen);
17421da177e4SLinus Torvalds 			}
1743232cd35dSEric Dumazet 			if (copy > 0 &&
1744232cd35dSEric Dumazet 			    getfrag(from, data + transhdrlen, offset,
1745232cd35dSEric Dumazet 				    copy, fraggap, skb) < 0) {
17461da177e4SLinus Torvalds 				err = -EFAULT;
17471da177e4SLinus Torvalds 				kfree_skb(skb);
17481da177e4SLinus Torvalds 				goto error;
1749ce650a16SDavid Howells 			} else if (flags & MSG_SPLICE_PAGES) {
1750ce650a16SDavid Howells 				copy = 0;
17511da177e4SLinus Torvalds 			}
17521da177e4SLinus Torvalds 
17531da177e4SLinus Torvalds 			offset += copy;
175415e36f5bSWillem de Bruijn 			length -= copy + transhdrlen;
17551da177e4SLinus Torvalds 			transhdrlen = 0;
17561da177e4SLinus Torvalds 			exthdrlen = 0;
1757299b0767SSteffen Klassert 			dst_exthdrlen = 0;
17581da177e4SLinus Torvalds 
175952900d22SWillem de Bruijn 			/* Only the initial fragment is time stamped */
176052900d22SWillem de Bruijn 			skb_shinfo(skb)->tx_flags = cork->tx_flags;
176152900d22SWillem de Bruijn 			cork->tx_flags = 0;
176252900d22SWillem de Bruijn 			skb_shinfo(skb)->tskey = tskey;
176352900d22SWillem de Bruijn 			tskey = 0;
176452900d22SWillem de Bruijn 			skb_zcopy_set(skb, uarg, &extra_uref);
176552900d22SWillem de Bruijn 
17660dec879fSJulian Anastasov 			if ((flags & MSG_CONFIRM) && !skb_prev)
17670dec879fSJulian Anastasov 				skb_set_dst_pending_confirm(skb, 1);
17680dec879fSJulian Anastasov 
17691da177e4SLinus Torvalds 			/*
17701da177e4SLinus Torvalds 			 * Put the packet on the pending queue
17711da177e4SLinus Torvalds 			 */
17721f4c6eb2SEric Dumazet 			if (!skb->destructor) {
17731f4c6eb2SEric Dumazet 				skb->destructor = sock_wfree;
17741f4c6eb2SEric Dumazet 				skb->sk = sk;
17751f4c6eb2SEric Dumazet 				wmem_alloc_delta += skb->truesize;
17761f4c6eb2SEric Dumazet 			}
17770bbe84a6SVlad Yasevich 			__skb_queue_tail(queue, skb);
17781da177e4SLinus Torvalds 			continue;
17791da177e4SLinus Torvalds 		}
17801da177e4SLinus Torvalds 
17811da177e4SLinus Torvalds 		if (copy > length)
17821da177e4SLinus Torvalds 			copy = length;
17831da177e4SLinus Torvalds 
1784113f99c3SWillem de Bruijn 		if (!(rt->dst.dev->features&NETIF_F_SG) &&
1785113f99c3SWillem de Bruijn 		    skb_tailroom(skb) >= copy) {
17861da177e4SLinus Torvalds 			unsigned int off;
17871da177e4SLinus Torvalds 
17881da177e4SLinus Torvalds 			off = skb->len;
17891da177e4SLinus Torvalds 			if (getfrag(from, skb_put(skb, copy),
17901da177e4SLinus Torvalds 						offset, copy, off, skb) < 0) {
17911da177e4SLinus Torvalds 				__skb_trim(skb, off);
17921da177e4SLinus Torvalds 				err = -EFAULT;
17931da177e4SLinus Torvalds 				goto error;
17941da177e4SLinus Torvalds 			}
17956d8192bdSDavid Howells 		} else if (flags & MSG_SPLICE_PAGES) {
17966d8192bdSDavid Howells 			struct msghdr *msg = from;
17976d8192bdSDavid Howells 
1798ce650a16SDavid Howells 			err = -EIO;
1799ce650a16SDavid Howells 			if (WARN_ON_ONCE(copy > msg->msg_iter.count))
1800ce650a16SDavid Howells 				goto error;
1801ce650a16SDavid Howells 
18026d8192bdSDavid Howells 			err = skb_splice_from_iter(skb, &msg->msg_iter, copy,
18036d8192bdSDavid Howells 						   sk->sk_allocation);
18046d8192bdSDavid Howells 			if (err < 0)
18056d8192bdSDavid Howells 				goto error;
18066d8192bdSDavid Howells 			copy = err;
18076d8192bdSDavid Howells 			wmem_alloc_delta += copy;
18081fd3ae8cSPavel Begunkov 		} else if (!zc) {
18091da177e4SLinus Torvalds 			int i = skb_shinfo(skb)->nr_frags;
18101da177e4SLinus Torvalds 
18111da177e4SLinus Torvalds 			err = -ENOMEM;
18125640f768SEric Dumazet 			if (!sk_page_frag_refill(sk, pfrag))
18131da177e4SLinus Torvalds 				goto error;
18141da177e4SLinus Torvalds 
18151fd3ae8cSPavel Begunkov 			skb_zcopy_downgrade_managed(skb);
18165640f768SEric Dumazet 			if (!skb_can_coalesce(skb, i, pfrag->page,
18175640f768SEric Dumazet 					      pfrag->offset)) {
18181da177e4SLinus Torvalds 				err = -EMSGSIZE;
18195640f768SEric Dumazet 				if (i == MAX_SKB_FRAGS)
18201da177e4SLinus Torvalds 					goto error;
18215640f768SEric Dumazet 
18225640f768SEric Dumazet 				__skb_fill_page_desc(skb, i, pfrag->page,
18235640f768SEric Dumazet 						     pfrag->offset, 0);
18245640f768SEric Dumazet 				skb_shinfo(skb)->nr_frags = ++i;
18255640f768SEric Dumazet 				get_page(pfrag->page);
18261da177e4SLinus Torvalds 			}
18275640f768SEric Dumazet 			copy = min_t(int, copy, pfrag->size - pfrag->offset);
18289e903e08SEric Dumazet 			if (getfrag(from,
18295640f768SEric Dumazet 				    page_address(pfrag->page) + pfrag->offset,
18305640f768SEric Dumazet 				    offset, copy, skb->len, skb) < 0)
18315640f768SEric Dumazet 				goto error_efault;
18325640f768SEric Dumazet 
18335640f768SEric Dumazet 			pfrag->offset += copy;
18345640f768SEric Dumazet 			skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy);
18351da177e4SLinus Torvalds 			skb->len += copy;
18361da177e4SLinus Torvalds 			skb->data_len += copy;
1837f945fa7aSHerbert Xu 			skb->truesize += copy;
18381f4c6eb2SEric Dumazet 			wmem_alloc_delta += copy;
1839b5947e5dSWillem de Bruijn 		} else {
1840b5947e5dSWillem de Bruijn 			err = skb_zerocopy_iter_dgram(skb, from, copy);
1841b5947e5dSWillem de Bruijn 			if (err < 0)
1842b5947e5dSWillem de Bruijn 				goto error;
18431da177e4SLinus Torvalds 		}
18441da177e4SLinus Torvalds 		offset += copy;
18451da177e4SLinus Torvalds 		length -= copy;
18461da177e4SLinus Torvalds 	}
18475640f768SEric Dumazet 
18489e8445a5SPaolo Abeni 	if (wmem_alloc_delta)
18491f4c6eb2SEric Dumazet 		refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
18501da177e4SLinus Torvalds 	return 0;
18515640f768SEric Dumazet 
18525640f768SEric Dumazet error_efault:
18535640f768SEric Dumazet 	err = -EFAULT;
18541da177e4SLinus Torvalds error:
18558e044917SJonathan Lemon 	net_zcopy_put_abort(uarg, extra_uref);
1856bdc712b4SDavid S. Miller 	cork->length -= length;
18573bd653c8SDenis V. Lunev 	IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS);
18581f4c6eb2SEric Dumazet 	refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
18591da177e4SLinus Torvalds 	return err;
18601da177e4SLinus Torvalds }
18610bbe84a6SVlad Yasevich 
18620bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk,
18630bbe84a6SVlad Yasevich 		    int getfrag(void *from, char *to, int offset, int len,
18640bbe84a6SVlad Yasevich 				int odd, struct sk_buff *skb),
1865f93431c8SWang Yufen 		    void *from, size_t length, int transhdrlen,
186626879da5SWei Wang 		    struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
18675fdaa88dSWillem de Bruijn 		    struct rt6_info *rt, unsigned int flags)
18680bbe84a6SVlad Yasevich {
18690bbe84a6SVlad Yasevich 	struct inet_sock *inet = inet_sk(sk);
18700bbe84a6SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
18710bbe84a6SVlad Yasevich 	int exthdrlen;
18720bbe84a6SVlad Yasevich 	int err;
18730bbe84a6SVlad Yasevich 
18740bbe84a6SVlad Yasevich 	if (flags&MSG_PROBE)
18750bbe84a6SVlad Yasevich 		return 0;
18760bbe84a6SVlad Yasevich 	if (skb_queue_empty(&sk->sk_write_queue)) {
18770bbe84a6SVlad Yasevich 		/*
18780bbe84a6SVlad Yasevich 		 * setup for corking
18790bbe84a6SVlad Yasevich 		 */
188040ac240cSPavel Begunkov 		dst_hold(&rt->dst);
188126879da5SWei Wang 		err = ip6_setup_cork(sk, &inet->cork, &np->cork,
1882f37a4cc6SPavel Begunkov 				     ipc6, rt);
18830bbe84a6SVlad Yasevich 		if (err)
18840bbe84a6SVlad Yasevich 			return err;
18850bbe84a6SVlad Yasevich 
1886f37a4cc6SPavel Begunkov 		inet->cork.fl.u.ip6 = *fl6;
188726879da5SWei Wang 		exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
18880bbe84a6SVlad Yasevich 		length += exthdrlen;
18890bbe84a6SVlad Yasevich 		transhdrlen += exthdrlen;
18900bbe84a6SVlad Yasevich 	} else {
18910bbe84a6SVlad Yasevich 		transhdrlen = 0;
18920bbe84a6SVlad Yasevich 	}
18930bbe84a6SVlad Yasevich 
1894f37a4cc6SPavel Begunkov 	return __ip6_append_data(sk, &sk->sk_write_queue, &inet->cork,
18950bbe84a6SVlad Yasevich 				 &np->cork, sk_page_frag(sk), getfrag,
18965fdaa88dSWillem de Bruijn 				 from, length, transhdrlen, flags, ipc6);
18970bbe84a6SVlad Yasevich }
1898a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data);
18991da177e4SLinus Torvalds 
1900cd3c7480SPavel Begunkov static void ip6_cork_steal_dst(struct sk_buff *skb, struct inet_cork_full *cork)
1901cd3c7480SPavel Begunkov {
1902cd3c7480SPavel Begunkov 	struct dst_entry *dst = cork->base.dst;
1903cd3c7480SPavel Begunkov 
1904cd3c7480SPavel Begunkov 	cork->base.dst = NULL;
1905cd3c7480SPavel Begunkov 	cork->base.flags &= ~IPCORK_ALLFRAG;
1906cd3c7480SPavel Begunkov 	skb_dst_set(skb, dst);
1907cd3c7480SPavel Begunkov }
1908cd3c7480SPavel Begunkov 
1909366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork,
1910366e41d9SVlad Yasevich 			     struct inet6_cork *v6_cork)
1911bf138862SPavel Emelyanov {
1912366e41d9SVlad Yasevich 	if (v6_cork->opt) {
1913d656b2eaSPavel Begunkov 		struct ipv6_txoptions *opt = v6_cork->opt;
1914d656b2eaSPavel Begunkov 
1915d656b2eaSPavel Begunkov 		kfree(opt->dst0opt);
1916d656b2eaSPavel Begunkov 		kfree(opt->dst1opt);
1917d656b2eaSPavel Begunkov 		kfree(opt->hopopt);
1918d656b2eaSPavel Begunkov 		kfree(opt->srcrt);
1919d656b2eaSPavel Begunkov 		kfree(opt);
1920366e41d9SVlad Yasevich 		v6_cork->opt = NULL;
19210178b695SHerbert Xu 	}
19220178b695SHerbert Xu 
1923366e41d9SVlad Yasevich 	if (cork->base.dst) {
1924366e41d9SVlad Yasevich 		dst_release(cork->base.dst);
1925366e41d9SVlad Yasevich 		cork->base.dst = NULL;
1926366e41d9SVlad Yasevich 		cork->base.flags &= ~IPCORK_ALLFRAG;
1927bf138862SPavel Emelyanov 	}
1928bf138862SPavel Emelyanov }
1929bf138862SPavel Emelyanov 
19306422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk,
19316422398cSVlad Yasevich 			       struct sk_buff_head *queue,
19326422398cSVlad Yasevich 			       struct inet_cork_full *cork,
19336422398cSVlad Yasevich 			       struct inet6_cork *v6_cork)
19341da177e4SLinus Torvalds {
19351da177e4SLinus Torvalds 	struct sk_buff *skb, *tmp_skb;
19361da177e4SLinus Torvalds 	struct sk_buff **tail_skb;
1937b60d4e58SPavel Begunkov 	struct in6_addr *final_dst;
19381da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
19393bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
19401da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
19416422398cSVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
19426422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->base.dst;
19436422398cSVlad Yasevich 	struct flowi6 *fl6 = &cork->fl.u.ip6;
19444c9483b2SDavid S. Miller 	unsigned char proto = fl6->flowi6_proto;
19451da177e4SLinus Torvalds 
19466422398cSVlad Yasevich 	skb = __skb_dequeue(queue);
194763159f29SIan Morris 	if (!skb)
19481da177e4SLinus Torvalds 		goto out;
19491da177e4SLinus Torvalds 	tail_skb = &(skb_shinfo(skb)->frag_list);
19501da177e4SLinus Torvalds 
19511da177e4SLinus Torvalds 	/* move skb->data to ip header from ext header */
1952d56f90a7SArnaldo Carvalho de Melo 	if (skb->data < skb_network_header(skb))
1953bbe735e4SArnaldo Carvalho de Melo 		__skb_pull(skb, skb_network_offset(skb));
19546422398cSVlad Yasevich 	while ((tmp_skb = __skb_dequeue(queue)) != NULL) {
1955cfe1fc77SArnaldo Carvalho de Melo 		__skb_pull(tmp_skb, skb_network_header_len(skb));
19561da177e4SLinus Torvalds 		*tail_skb = tmp_skb;
19571da177e4SLinus Torvalds 		tail_skb = &(tmp_skb->next);
19581da177e4SLinus Torvalds 		skb->len += tmp_skb->len;
19591da177e4SLinus Torvalds 		skb->data_len += tmp_skb->len;
19601da177e4SLinus Torvalds 		skb->truesize += tmp_skb->truesize;
19611da177e4SLinus Torvalds 		tmp_skb->destructor = NULL;
19621da177e4SLinus Torvalds 		tmp_skb->sk = NULL;
19631da177e4SLinus Torvalds 	}
19641da177e4SLinus Torvalds 
196528a89453SHerbert Xu 	/* Allow local fragmentation. */
196660ff7467SWANG Cong 	skb->ignore_df = ip6_sk_ignore_df(sk);
1967cfe1fc77SArnaldo Carvalho de Melo 	__skb_pull(skb, skb_network_header_len(skb));
1968b60d4e58SPavel Begunkov 
1969b60d4e58SPavel Begunkov 	final_dst = &fl6->daddr;
19701da177e4SLinus Torvalds 	if (opt && opt->opt_flen)
19711da177e4SLinus Torvalds 		ipv6_push_frag_opts(skb, opt, &proto);
19721da177e4SLinus Torvalds 	if (opt && opt->opt_nflen)
1973613fa3caSDavid Lebrun 		ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr);
19741da177e4SLinus Torvalds 
1975e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
1976e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
19770660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
19781da177e4SLinus Torvalds 
19796422398cSVlad Yasevich 	ip6_flow_hdr(hdr, v6_cork->tclass,
1980cb1ce2efSTom Herbert 		     ip6_make_flowlabel(net, skb, fl6->flowlabel,
1981513674b5SShaohua Li 					ip6_autoflowlabel(net, np), fl6));
19826422398cSVlad Yasevich 	hdr->hop_limit = v6_cork->hop_limit;
19831da177e4SLinus Torvalds 	hdr->nexthdr = proto;
19844e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
19854e3fd7a0SAlexey Dobriyan 	hdr->daddr = *final_dst;
19861da177e4SLinus Torvalds 
1987a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
1988c6af0c22SWillem de Bruijn 	skb->mark = cork->base.mark;
1989a818f75eSJesus Sanchez-Palencia 	skb->tstamp = cork->base.transmit_time;
1990a818f75eSJesus Sanchez-Palencia 
1991cd3c7480SPavel Begunkov 	ip6_cork_steal_dst(skb, cork);
1992edf391ffSNeil Horman 	IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len);
199314878f75SDavid L Stevens 	if (proto == IPPROTO_ICMPV6) {
1994adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
1995ea30388bSZiyang Xuan 		u8 icmp6_type;
199614878f75SDavid L Stevens 
1997cafbe182SEric Dumazet 		if (sk->sk_socket->type == SOCK_RAW &&
1998cafbe182SEric Dumazet 		   !inet_test_bit(HDRINCL, sk))
1999ea30388bSZiyang Xuan 			icmp6_type = fl6->fl6_icmp_type;
2000ea30388bSZiyang Xuan 		else
2001ea30388bSZiyang Xuan 			icmp6_type = icmp6_hdr(skb)->icmp6_type;
2002ea30388bSZiyang Xuan 		ICMP6MSGOUT_INC_STATS(net, idev, icmp6_type);
200343a43b60SHannes Frederic Sowa 		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
200414878f75SDavid L Stevens 	}
200514878f75SDavid L Stevens 
20066422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
20076422398cSVlad Yasevich out:
20086422398cSVlad Yasevich 	return skb;
20096422398cSVlad Yasevich }
20106422398cSVlad Yasevich 
20116422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb)
20126422398cSVlad Yasevich {
20136422398cSVlad Yasevich 	struct net *net = sock_net(skb->sk);
20146422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
20156422398cSVlad Yasevich 	int err;
20166422398cSVlad Yasevich 
201733224b16SEric W. Biederman 	err = ip6_local_out(net, skb->sk, skb);
20181da177e4SLinus Torvalds 	if (err) {
20191da177e4SLinus Torvalds 		if (err > 0)
20206ce9e7b5SEric Dumazet 			err = net_xmit_errno(err);
20211da177e4SLinus Torvalds 		if (err)
20226422398cSVlad Yasevich 			IP6_INC_STATS(net, rt->rt6i_idev,
20236422398cSVlad Yasevich 				      IPSTATS_MIB_OUTDISCARDS);
20241da177e4SLinus Torvalds 	}
20251da177e4SLinus Torvalds 
20261da177e4SLinus Torvalds 	return err;
20276422398cSVlad Yasevich }
20286422398cSVlad Yasevich 
20296422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk)
20306422398cSVlad Yasevich {
20316422398cSVlad Yasevich 	struct sk_buff *skb;
20326422398cSVlad Yasevich 
20336422398cSVlad Yasevich 	skb = ip6_finish_skb(sk);
20346422398cSVlad Yasevich 	if (!skb)
20356422398cSVlad Yasevich 		return 0;
20366422398cSVlad Yasevich 
20376422398cSVlad Yasevich 	return ip6_send_skb(skb);
20381da177e4SLinus Torvalds }
2039a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames);
20401da177e4SLinus Torvalds 
20410bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk,
20426422398cSVlad Yasevich 				       struct sk_buff_head *queue,
20436422398cSVlad Yasevich 				       struct inet_cork_full *cork,
20446422398cSVlad Yasevich 				       struct inet6_cork *v6_cork)
20451da177e4SLinus Torvalds {
20461da177e4SLinus Torvalds 	struct sk_buff *skb;
20471da177e4SLinus Torvalds 
20480bbe84a6SVlad Yasevich 	while ((skb = __skb_dequeue_tail(queue)) != NULL) {
2049adf30907SEric Dumazet 		if (skb_dst(skb))
2050adf30907SEric Dumazet 			IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)),
2051a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_OUTDISCARDS);
20521da177e4SLinus Torvalds 		kfree_skb(skb);
20531da177e4SLinus Torvalds 	}
20541da177e4SLinus Torvalds 
20556422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
20561da177e4SLinus Torvalds }
20570bbe84a6SVlad Yasevich 
20580bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk)
20590bbe84a6SVlad Yasevich {
20606422398cSVlad Yasevich 	__ip6_flush_pending_frames(sk, &sk->sk_write_queue,
20616422398cSVlad Yasevich 				   &inet_sk(sk)->cork, &inet6_sk(sk)->cork);
20620bbe84a6SVlad Yasevich }
2063a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames);
20646422398cSVlad Yasevich 
20656422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk,
20666422398cSVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
20676422398cSVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
2068f93431c8SWang Yufen 			     void *from, size_t length, int transhdrlen,
2069f37a4cc6SPavel Begunkov 			     struct ipcm6_cookie *ipc6, struct rt6_info *rt,
2070f37a4cc6SPavel Begunkov 			     unsigned int flags, struct inet_cork_full *cork)
20716422398cSVlad Yasevich {
20726422398cSVlad Yasevich 	struct inet6_cork v6_cork;
20736422398cSVlad Yasevich 	struct sk_buff_head queue;
207426879da5SWei Wang 	int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
20756422398cSVlad Yasevich 	int err;
20766422398cSVlad Yasevich 
207740ac240cSPavel Begunkov 	if (flags & MSG_PROBE) {
207840ac240cSPavel Begunkov 		dst_release(&rt->dst);
20796422398cSVlad Yasevich 		return NULL;
208040ac240cSPavel Begunkov 	}
20816422398cSVlad Yasevich 
20826422398cSVlad Yasevich 	__skb_queue_head_init(&queue);
20836422398cSVlad Yasevich 
20841cd7884dSWillem de Bruijn 	cork->base.flags = 0;
20851cd7884dSWillem de Bruijn 	cork->base.addr = 0;
20861cd7884dSWillem de Bruijn 	cork->base.opt = NULL;
20876422398cSVlad Yasevich 	v6_cork.opt = NULL;
2088f37a4cc6SPavel Begunkov 	err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt);
2089862c03eeSEric Dumazet 	if (err) {
20901cd7884dSWillem de Bruijn 		ip6_cork_release(cork, &v6_cork);
20916422398cSVlad Yasevich 		return ERR_PTR(err);
2092862c03eeSEric Dumazet 	}
209326879da5SWei Wang 	if (ipc6->dontfrag < 0)
209426879da5SWei Wang 		ipc6->dontfrag = inet6_sk(sk)->dontfrag;
20956422398cSVlad Yasevich 
2096f37a4cc6SPavel Begunkov 	err = __ip6_append_data(sk, &queue, cork, &v6_cork,
20976422398cSVlad Yasevich 				&current->task_frag, getfrag, from,
20986422398cSVlad Yasevich 				length + exthdrlen, transhdrlen + exthdrlen,
20995fdaa88dSWillem de Bruijn 				flags, ipc6);
21006422398cSVlad Yasevich 	if (err) {
21011cd7884dSWillem de Bruijn 		__ip6_flush_pending_frames(sk, &queue, cork, &v6_cork);
21026422398cSVlad Yasevich 		return ERR_PTR(err);
21036422398cSVlad Yasevich 	}
21046422398cSVlad Yasevich 
21051cd7884dSWillem de Bruijn 	return __ip6_make_skb(sk, &queue, cork, &v6_cork);
21066422398cSVlad Yasevich }
2107