xref: /openbmc/linux/net/ipv6/ip6_output.c (revision ee1c730fdd34b82b906fac564fbface968e7931e)
12874c5fdSThomas Gleixner // SPDX-License-Identifier: GPL-2.0-or-later
21da177e4SLinus Torvalds /*
31da177e4SLinus Torvalds  *	IPv6 output functions
41da177e4SLinus Torvalds  *	Linux INET6 implementation
51da177e4SLinus Torvalds  *
61da177e4SLinus Torvalds  *	Authors:
71da177e4SLinus Torvalds  *	Pedro Roque		<roque@di.fc.ul.pt>
81da177e4SLinus Torvalds  *
91da177e4SLinus Torvalds  *	Based on linux/net/ipv4/ip_output.c
101da177e4SLinus Torvalds  *
111da177e4SLinus Torvalds  *	Changes:
121da177e4SLinus Torvalds  *	A.N.Kuznetsov	:	airthmetics in fragmentation.
131da177e4SLinus Torvalds  *				extension headers are implemented.
141da177e4SLinus Torvalds  *				route changes now work.
151da177e4SLinus Torvalds  *				ip6_forward does not confuse sniffers.
161da177e4SLinus Torvalds  *				etc.
171da177e4SLinus Torvalds  *
181da177e4SLinus Torvalds  *      H. von Brand    :       Added missing #include <linux/string.h>
191da177e4SLinus Torvalds  *	Imran Patel	:	frag id should be in NBO
201da177e4SLinus Torvalds  *      Kazunori MIYAZAWA @USAGI
211da177e4SLinus Torvalds  *			:       add ip6_append_data and related functions
221da177e4SLinus Torvalds  *				for datagram xmit
231da177e4SLinus Torvalds  */
241da177e4SLinus Torvalds 
251da177e4SLinus Torvalds #include <linux/errno.h>
26ef76bc23SHerbert Xu #include <linux/kernel.h>
271da177e4SLinus Torvalds #include <linux/string.h>
281da177e4SLinus Torvalds #include <linux/socket.h>
291da177e4SLinus Torvalds #include <linux/net.h>
301da177e4SLinus Torvalds #include <linux/netdevice.h>
311da177e4SLinus Torvalds #include <linux/if_arp.h>
321da177e4SLinus Torvalds #include <linux/in6.h>
331da177e4SLinus Torvalds #include <linux/tcp.h>
341da177e4SLinus Torvalds #include <linux/route.h>
35b59f45d0SHerbert Xu #include <linux/module.h>
365a0e3ad6STejun Heo #include <linux/slab.h>
371da177e4SLinus Torvalds 
3833b48679SDaniel Mack #include <linux/bpf-cgroup.h>
391da177e4SLinus Torvalds #include <linux/netfilter.h>
401da177e4SLinus Torvalds #include <linux/netfilter_ipv6.h>
411da177e4SLinus Torvalds 
421da177e4SLinus Torvalds #include <net/sock.h>
431da177e4SLinus Torvalds #include <net/snmp.h>
441da177e4SLinus Torvalds 
45d457a0e3SEric Dumazet #include <net/gso.h>
461da177e4SLinus Torvalds #include <net/ipv6.h>
471da177e4SLinus Torvalds #include <net/ndisc.h>
481da177e4SLinus Torvalds #include <net/protocol.h>
491da177e4SLinus Torvalds #include <net/ip6_route.h>
501da177e4SLinus Torvalds #include <net/addrconf.h>
511da177e4SLinus Torvalds #include <net/rawv6.h>
521da177e4SLinus Torvalds #include <net/icmp.h>
531da177e4SLinus Torvalds #include <net/xfrm.h>
541da177e4SLinus Torvalds #include <net/checksum.h>
557bc570c8SYOSHIFUJI Hideaki #include <linux/mroute6.h>
56ca254490SDavid Ahern #include <net/l3mdev.h>
5714972cbdSRoopa Prabhu #include <net/lwtunnel.h>
58571912c6SMartin Varghese #include <net/ip_tunnels.h>
591da177e4SLinus Torvalds 
607d8c6e39SEric W. Biederman static int ip6_finish_output2(struct net *net, struct sock *sk, struct sk_buff *skb)
611da177e4SLinus Torvalds {
62adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
631da177e4SLinus Torvalds 	struct net_device *dev = dst->dev;
64e415ed3aSVasily Averin 	struct inet6_dev *idev = ip6_dst_idev(dst);
655796015fSVasily Averin 	unsigned int hh_len = LL_RESERVED_SPACE(dev);
66e415ed3aSVasily Averin 	const struct in6_addr *daddr, *nexthop;
67e415ed3aSVasily Averin 	struct ipv6hdr *hdr;
68f6b72b62SDavid S. Miller 	struct neighbour *neigh;
696fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	int ret;
701da177e4SLinus Torvalds 
715796015fSVasily Averin 	/* Be paranoid, rather than too clever. */
72e415ed3aSVasily Averin 	if (unlikely(hh_len > skb_headroom(skb)) && dev->header_ops) {
73e415ed3aSVasily Averin 		skb = skb_expand_head(skb, hh_len);
745796015fSVasily Averin 		if (!skb) {
75e415ed3aSVasily Averin 			IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
765796015fSVasily Averin 			return -ENOMEM;
775796015fSVasily Averin 		}
785796015fSVasily Averin 	}
795796015fSVasily Averin 
80e415ed3aSVasily Averin 	hdr = ipv6_hdr(skb);
81e415ed3aSVasily Averin 	daddr = &hdr->daddr;
82e415ed3aSVasily Averin 	if (ipv6_addr_is_multicast(daddr)) {
837026b1ddSDavid Miller 		if (!(dev->flags & IFF_LOOPBACK) && sk_mc_loop(sk) &&
848571ab47SYuval Mintz 		    ((mroute6_is_socket(net, skb) &&
85bd91b8bfSBenjamin Thery 		     !(IP6CB(skb)->flags & IP6SKB_FORWARDED)) ||
86e415ed3aSVasily Averin 		     ipv6_chk_mcast_addr(dev, daddr, &hdr->saddr))) {
871da177e4SLinus Torvalds 			struct sk_buff *newskb = skb_clone(skb, GFP_ATOMIC);
881da177e4SLinus Torvalds 
891da177e4SLinus Torvalds 			/* Do not check for IFF_ALLMULTI; multicast routing
901da177e4SLinus Torvalds 			   is not supported in any case.
911da177e4SLinus Torvalds 			 */
921da177e4SLinus Torvalds 			if (newskb)
93b2e0b385SJan Engelhardt 				NF_HOOK(NFPROTO_IPV6, NF_INET_POST_ROUTING,
9429a26a56SEric W. Biederman 					net, sk, newskb, NULL, newskb->dev,
9595603e22SMichel Machado 					dev_loopback_xmit);
961da177e4SLinus Torvalds 
97e415ed3aSVasily Averin 			if (hdr->hop_limit == 0) {
9878126c41SEric W. Biederman 				IP6_INC_STATS(net, idev,
993bd653c8SDenis V. Lunev 					      IPSTATS_MIB_OUTDISCARDS);
1001da177e4SLinus Torvalds 				kfree_skb(skb);
1011da177e4SLinus Torvalds 				return 0;
1021da177e4SLinus Torvalds 			}
1031da177e4SLinus Torvalds 		}
1041da177e4SLinus Torvalds 
10578126c41SEric W. Biederman 		IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUTMCAST, skb->len);
106e415ed3aSVasily Averin 		if (IPV6_ADDR_MC_SCOPE(daddr) <= IPV6_ADDR_SCOPE_NODELOCAL &&
107dd408515SHannes Frederic Sowa 		    !(dev->flags & IFF_LOOPBACK)) {
108dd408515SHannes Frederic Sowa 			kfree_skb(skb);
109dd408515SHannes Frederic Sowa 			return 0;
110dd408515SHannes Frederic Sowa 		}
1111da177e4SLinus Torvalds 	}
1121da177e4SLinus Torvalds 
11314972cbdSRoopa Prabhu 	if (lwtunnel_xmit_redirect(dst->lwtstate)) {
11414972cbdSRoopa Prabhu 		int res = lwtunnel_xmit(skb);
11514972cbdSRoopa Prabhu 
116a171fbecSYan Zhai 		if (res != LWTUNNEL_XMIT_CONTINUE)
11714972cbdSRoopa Prabhu 			return res;
11814972cbdSRoopa Prabhu 	}
11914972cbdSRoopa Prabhu 
12009eed119SEric Dumazet 	rcu_read_lock();
121e415ed3aSVasily Averin 	nexthop = rt6_nexthop((struct rt6_info *)dst, daddr);
122e415ed3aSVasily Averin 	neigh = __ipv6_neigh_lookup_noref(dev, nexthop);
12358f71be5SPavel Begunkov 
12458f71be5SPavel Begunkov 	if (unlikely(IS_ERR_OR_NULL(neigh))) {
1256fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 		if (unlikely(!neigh))
126e415ed3aSVasily Averin 			neigh = __neigh_create(&nd_tbl, nexthop, dev, false);
12758f71be5SPavel Begunkov 		if (IS_ERR(neigh)) {
12809eed119SEric Dumazet 			rcu_read_unlock();
12958f71be5SPavel Begunkov 			IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTNOROUTES);
13058f71be5SPavel Begunkov 			kfree_skb_reason(skb, SKB_DROP_REASON_NEIGH_CREATEFAIL);
13158f71be5SPavel Begunkov 			return -EINVAL;
13258f71be5SPavel Begunkov 		}
13358f71be5SPavel Begunkov 	}
1344ff06203SJulian Anastasov 	sock_confirm_neigh(skb, neigh);
1350353f282SDavid Ahern 	ret = neigh_output(neigh, skb, false);
13609eed119SEric Dumazet 	rcu_read_unlock();
1376fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 	return ret;
1386fd6ce20SYOSHIFUJI Hideaki / 吉藤英明 }
1391da177e4SLinus Torvalds 
140b210de4fSAya Levin static int
141b210de4fSAya Levin ip6_finish_output_gso_slowpath_drop(struct net *net, struct sock *sk,
142b210de4fSAya Levin 				    struct sk_buff *skb, unsigned int mtu)
143b210de4fSAya Levin {
144b210de4fSAya Levin 	struct sk_buff *segs, *nskb;
145b210de4fSAya Levin 	netdev_features_t features;
146b210de4fSAya Levin 	int ret = 0;
147b210de4fSAya Levin 
148b210de4fSAya Levin 	/* Please see corresponding comment in ip_finish_output_gso
149b210de4fSAya Levin 	 * describing the cases where GSO segment length exceeds the
150b210de4fSAya Levin 	 * egress MTU.
151b210de4fSAya Levin 	 */
152b210de4fSAya Levin 	features = netif_skb_features(skb);
153b210de4fSAya Levin 	segs = skb_gso_segment(skb, features & ~NETIF_F_GSO_MASK);
154b210de4fSAya Levin 	if (IS_ERR_OR_NULL(segs)) {
155b210de4fSAya Levin 		kfree_skb(skb);
156b210de4fSAya Levin 		return -ENOMEM;
157b210de4fSAya Levin 	}
158b210de4fSAya Levin 
159b210de4fSAya Levin 	consume_skb(skb);
160b210de4fSAya Levin 
161b210de4fSAya Levin 	skb_list_walk_safe(segs, segs, nskb) {
162b210de4fSAya Levin 		int err;
163b210de4fSAya Levin 
164b210de4fSAya Levin 		skb_mark_not_on_list(segs);
165*ee1c730fSYan Zhai 		/* Last GSO segment can be smaller than gso_size (and MTU).
166*ee1c730fSYan Zhai 		 * Adding a fragment header would produce an "atomic fragment",
167*ee1c730fSYan Zhai 		 * which is considered harmful (RFC-8021). Avoid that.
168*ee1c730fSYan Zhai 		 */
169*ee1c730fSYan Zhai 		err = segs->len > mtu ?
170*ee1c730fSYan Zhai 			ip6_fragment(net, sk, segs, ip6_finish_output2) :
171*ee1c730fSYan Zhai 			ip6_finish_output2(net, sk, segs);
172b210de4fSAya Levin 		if (err && ret == 0)
173b210de4fSAya Levin 			ret = err;
174b210de4fSAya Levin 	}
175b210de4fSAya Levin 
176b210de4fSAya Levin 	return ret;
177b210de4fSAya Levin }
178b210de4fSAya Levin 
179956fe219Sbrakmo static int __ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
1809e508490SJan Engelhardt {
181b210de4fSAya Levin 	unsigned int mtu;
182b210de4fSAya Levin 
18309ee9dbaSTobias Brunner #if defined(CONFIG_NETFILTER) && defined(CONFIG_XFRM)
18409ee9dbaSTobias Brunner 	/* Policy lookup after SNAT yielded a new policy */
18509ee9dbaSTobias Brunner 	if (skb_dst(skb)->xfrm) {
18619d36c5fSEric Dumazet 		IP6CB(skb)->flags |= IP6SKB_REROUTED;
18709ee9dbaSTobias Brunner 		return dst_output(net, sk, skb);
18809ee9dbaSTobias Brunner 	}
18909ee9dbaSTobias Brunner #endif
19009ee9dbaSTobias Brunner 
191b210de4fSAya Levin 	mtu = ip6_skb_dst_mtu(skb);
19280e425b6SCoco Li 	if (skb_is_gso(skb) &&
19380e425b6SCoco Li 	    !(IP6CB(skb)->flags & IP6SKB_FAKEJUMBO) &&
19480e425b6SCoco Li 	    !skb_gso_validate_network_len(skb, mtu))
195b210de4fSAya Levin 		return ip6_finish_output_gso_slowpath_drop(net, sk, skb, mtu);
196b210de4fSAya Levin 
197b210de4fSAya Levin 	if ((skb->len > mtu && !skb_is_gso(skb)) ||
1989037c357SJiri Pirko 	    dst_allfrag(skb_dst(skb)) ||
1999037c357SJiri Pirko 	    (IP6CB(skb)->frag_max_size && skb->len > IP6CB(skb)->frag_max_size))
2007d8c6e39SEric W. Biederman 		return ip6_fragment(net, sk, skb, ip6_finish_output2);
2019e508490SJan Engelhardt 	else
2027d8c6e39SEric W. Biederman 		return ip6_finish_output2(net, sk, skb);
2039e508490SJan Engelhardt }
2049e508490SJan Engelhardt 
205956fe219Sbrakmo static int ip6_finish_output(struct net *net, struct sock *sk, struct sk_buff *skb)
206956fe219Sbrakmo {
207956fe219Sbrakmo 	int ret;
208956fe219Sbrakmo 
209956fe219Sbrakmo 	ret = BPF_CGROUP_RUN_PROG_INET_EGRESS(sk, skb);
210956fe219Sbrakmo 	switch (ret) {
211956fe219Sbrakmo 	case NET_XMIT_SUCCESS:
212956fe219Sbrakmo 	case NET_XMIT_CN:
213956fe219Sbrakmo 		return __ip6_finish_output(net, sk, skb) ? : ret;
214956fe219Sbrakmo 	default:
2155e187189SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_BPF_CGROUP_EGRESS);
216956fe219Sbrakmo 		return ret;
217956fe219Sbrakmo 	}
218956fe219Sbrakmo }
219956fe219Sbrakmo 
220ede2059dSEric W. Biederman int ip6_output(struct net *net, struct sock *sk, struct sk_buff *skb)
2211da177e4SLinus Torvalds {
22228f8bfd1SPhil Sutter 	struct net_device *dev = skb_dst(skb)->dev, *indev = skb->dev;
223adf30907SEric Dumazet 	struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
224be10de0aSEric W. Biederman 
22597a7a37aSChenbo Feng 	skb->protocol = htons(ETH_P_IPV6);
22697a7a37aSChenbo Feng 	skb->dev = dev;
22797a7a37aSChenbo Feng 
228778d80beSYOSHIFUJI Hideaki 	if (unlikely(idev->cnf.disable_ipv6)) {
22919a0644cSEric W. Biederman 		IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
2305e187189SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_IPV6DISABLED);
231778d80beSYOSHIFUJI Hideaki 		return 0;
232778d80beSYOSHIFUJI Hideaki 	}
233778d80beSYOSHIFUJI Hideaki 
23429a26a56SEric W. Biederman 	return NF_HOOK_COND(NFPROTO_IPV6, NF_INET_POST_ROUTING,
23528f8bfd1SPhil Sutter 			    net, sk, skb, indev, dev,
2369c6eb28aSJan Engelhardt 			    ip6_finish_output,
2379c6eb28aSJan Engelhardt 			    !(IP6CB(skb)->flags & IP6SKB_REROUTED));
2381da177e4SLinus Torvalds }
2396585d7dcSBrian Vazquez EXPORT_SYMBOL(ip6_output);
2401da177e4SLinus Torvalds 
241e9191ffbSBen Hutchings bool ip6_autoflowlabel(struct net *net, const struct ipv6_pinfo *np)
242513674b5SShaohua Li {
243513674b5SShaohua Li 	if (!np->autoflowlabel_set)
244513674b5SShaohua Li 		return ip6_default_np_autolabel(net);
245513674b5SShaohua Li 	else
246513674b5SShaohua Li 		return np->autoflowlabel;
247513674b5SShaohua Li }
248513674b5SShaohua Li 
2491da177e4SLinus Torvalds /*
250b5d43998SShan Wei  * xmit an sk_buff (used by TCP, SCTP and DCCP)
2511c1e9d2bSEric Dumazet  * Note : socket lock is not held for SYNACK packets, but might be modified
2521c1e9d2bSEric Dumazet  * by calls to skb_set_owner_w() and ipv6_local_error(),
2531c1e9d2bSEric Dumazet  * which are using proper atomic operations or spinlocks.
2541da177e4SLinus Torvalds  */
2551c1e9d2bSEric Dumazet int ip6_xmit(const struct sock *sk, struct sk_buff *skb, struct flowi6 *fl6,
2564f6570d7SEric Dumazet 	     __u32 mark, struct ipv6_txoptions *opt, int tclass, u32 priority)
2571da177e4SLinus Torvalds {
2583bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
2591c1e9d2bSEric Dumazet 	const struct ipv6_pinfo *np = inet6_sk(sk);
2604c9483b2SDavid S. Miller 	struct in6_addr *first_hop = &fl6->daddr;
261adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
2620c9f227bSVasily Averin 	struct net_device *dev = dst->dev;
2630c9f227bSVasily Averin 	struct inet6_dev *idev = ip6_dst_idev(dst);
26480e425b6SCoco Li 	struct hop_jumbo_hdr *hop_jumbo;
26580e425b6SCoco Li 	int hoplen = sizeof(*hop_jumbo);
26666033f47SStefano Brivio 	unsigned int head_room;
2671da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
2684c9483b2SDavid S. Miller 	u8  proto = fl6->flowi6_proto;
2691da177e4SLinus Torvalds 	int seg_len = skb->len;
270e651f03aSGerrit Renker 	int hlimit = -1;
2711da177e4SLinus Torvalds 	u32 mtu;
2721da177e4SLinus Torvalds 
27380e425b6SCoco Li 	head_room = sizeof(struct ipv6hdr) + hoplen + LL_RESERVED_SPACE(dev);
27466033f47SStefano Brivio 	if (opt)
27566033f47SStefano Brivio 		head_room += opt->opt_nflen + opt->opt_flen;
2761da177e4SLinus Torvalds 
2770c9f227bSVasily Averin 	if (unlikely(head_room > skb_headroom(skb))) {
2780c9f227bSVasily Averin 		skb = skb_expand_head(skb, head_room);
2790c9f227bSVasily Averin 		if (!skb) {
2800c9f227bSVasily Averin 			IP6_INC_STATS(net, idev, IPSTATS_MIB_OUTDISCARDS);
2811da177e4SLinus Torvalds 			return -ENOBUFS;
2821da177e4SLinus Torvalds 		}
2831da177e4SLinus Torvalds 	}
28466033f47SStefano Brivio 
28566033f47SStefano Brivio 	if (opt) {
28666033f47SStefano Brivio 		seg_len += opt->opt_nflen + opt->opt_flen;
28766033f47SStefano Brivio 
2881da177e4SLinus Torvalds 		if (opt->opt_flen)
2891da177e4SLinus Torvalds 			ipv6_push_frag_opts(skb, opt, &proto);
29066033f47SStefano Brivio 
2911da177e4SLinus Torvalds 		if (opt->opt_nflen)
292613fa3caSDavid Lebrun 			ipv6_push_nfrag_opts(skb, opt, &proto, &first_hop,
293613fa3caSDavid Lebrun 					     &fl6->saddr);
2941da177e4SLinus Torvalds 	}
2951da177e4SLinus Torvalds 
29680e425b6SCoco Li 	if (unlikely(seg_len > IPV6_MAXPLEN)) {
29780e425b6SCoco Li 		hop_jumbo = skb_push(skb, hoplen);
29880e425b6SCoco Li 
29980e425b6SCoco Li 		hop_jumbo->nexthdr = proto;
30080e425b6SCoco Li 		hop_jumbo->hdrlen = 0;
30180e425b6SCoco Li 		hop_jumbo->tlv_type = IPV6_TLV_JUMBO;
30280e425b6SCoco Li 		hop_jumbo->tlv_len = 4;
30380e425b6SCoco Li 		hop_jumbo->jumbo_payload_len = htonl(seg_len + hoplen);
30480e425b6SCoco Li 
30580e425b6SCoco Li 		proto = IPPROTO_HOPOPTS;
30680e425b6SCoco Li 		seg_len = 0;
30780e425b6SCoco Li 		IP6CB(skb)->flags |= IP6SKB_FAKEJUMBO;
30880e425b6SCoco Li 	}
30980e425b6SCoco Li 
310e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
311e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
3120660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
3131da177e4SLinus Torvalds 
3141da177e4SLinus Torvalds 	/*
3151da177e4SLinus Torvalds 	 *	Fill in the IPv6 header
3161da177e4SLinus Torvalds 	 */
317b903d324SEric Dumazet 	if (np)
3181da177e4SLinus Torvalds 		hlimit = np->hop_limit;
3191da177e4SLinus Torvalds 	if (hlimit < 0)
3206b75d090SYOSHIFUJI Hideaki 		hlimit = ip6_dst_hoplimit(dst);
3211da177e4SLinus Torvalds 
322cb1ce2efSTom Herbert 	ip6_flow_hdr(hdr, tclass, ip6_make_flowlabel(net, skb, fl6->flowlabel,
323513674b5SShaohua Li 				ip6_autoflowlabel(net, np), fl6));
32441a1f8eaSYOSHIFUJI Hideaki 
3251da177e4SLinus Torvalds 	hdr->payload_len = htons(seg_len);
3261da177e4SLinus Torvalds 	hdr->nexthdr = proto;
3271da177e4SLinus Torvalds 	hdr->hop_limit = hlimit;
3281da177e4SLinus Torvalds 
3294e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
3304e3fd7a0SAlexey Dobriyan 	hdr->daddr = *first_hop;
3311da177e4SLinus Torvalds 
3329c9c9ad5SHannes Frederic Sowa 	skb->protocol = htons(ETH_P_IPV6);
3334f6570d7SEric Dumazet 	skb->priority = priority;
33492e55f41SPablo Neira 	skb->mark = mark;
335a2c2064fSPatrick McHardy 
3361da177e4SLinus Torvalds 	mtu = dst_mtu(dst);
33760ff7467SWANG Cong 	if ((skb->len <= mtu) || skb->ignore_df || skb_is_gso(skb)) {
3380c9f227bSVasily Averin 		IP6_UPD_PO_STATS(net, idev, IPSTATS_MIB_OUT, skb->len);
339a8e3e1a9SDavid Ahern 
340a8e3e1a9SDavid Ahern 		/* if egress device is enslaved to an L3 master device pass the
341a8e3e1a9SDavid Ahern 		 * skb to its handler for processing
342a8e3e1a9SDavid Ahern 		 */
343a8e3e1a9SDavid Ahern 		skb = l3mdev_ip6_out((struct sock *)sk, skb);
344a8e3e1a9SDavid Ahern 		if (unlikely(!skb))
345a8e3e1a9SDavid Ahern 			return 0;
346a8e3e1a9SDavid Ahern 
3471c1e9d2bSEric Dumazet 		/* hooks should never assume socket lock is held.
3481c1e9d2bSEric Dumazet 		 * we promote our socket to non const
3491c1e9d2bSEric Dumazet 		 */
35029a26a56SEric W. Biederman 		return NF_HOOK(NFPROTO_IPV6, NF_INET_LOCAL_OUT,
3510c9f227bSVasily Averin 			       net, (struct sock *)sk, skb, NULL, dev,
35213206b6bSEric W. Biederman 			       dst_output);
3531da177e4SLinus Torvalds 	}
3541da177e4SLinus Torvalds 
3550c9f227bSVasily Averin 	skb->dev = dev;
3561c1e9d2bSEric Dumazet 	/* ipv6_local_error() does not require socket lock,
3571c1e9d2bSEric Dumazet 	 * we promote our socket to non const
3581c1e9d2bSEric Dumazet 	 */
3591c1e9d2bSEric Dumazet 	ipv6_local_error((struct sock *)sk, EMSGSIZE, fl6, mtu);
3601c1e9d2bSEric Dumazet 
3610c9f227bSVasily Averin 	IP6_INC_STATS(net, idev, IPSTATS_MIB_FRAGFAILS);
3621da177e4SLinus Torvalds 	kfree_skb(skb);
3631da177e4SLinus Torvalds 	return -EMSGSIZE;
3641da177e4SLinus Torvalds }
3657159039aSYOSHIFUJI Hideaki EXPORT_SYMBOL(ip6_xmit);
3667159039aSYOSHIFUJI Hideaki 
3671da177e4SLinus Torvalds static int ip6_call_ra_chain(struct sk_buff *skb, int sel)
3681da177e4SLinus Torvalds {
3691da177e4SLinus Torvalds 	struct ip6_ra_chain *ra;
3701da177e4SLinus Torvalds 	struct sock *last = NULL;
3711da177e4SLinus Torvalds 
3721da177e4SLinus Torvalds 	read_lock(&ip6_ra_lock);
3731da177e4SLinus Torvalds 	for (ra = ip6_ra_chain; ra; ra = ra->next) {
3741da177e4SLinus Torvalds 		struct sock *sk = ra->sk;
3750bd1b59bSAndrew McDonald 		if (sk && ra->sel == sel &&
3760bd1b59bSAndrew McDonald 		    (!sk->sk_bound_dev_if ||
3770bd1b59bSAndrew McDonald 		     sk->sk_bound_dev_if == skb->dev->ifindex)) {
3789036b2feSFrancesco Ruggeri 			struct ipv6_pinfo *np = inet6_sk(sk);
3799036b2feSFrancesco Ruggeri 
3809036b2feSFrancesco Ruggeri 			if (np && np->rtalert_isolate &&
3819036b2feSFrancesco Ruggeri 			    !net_eq(sock_net(sk), dev_net(skb->dev))) {
3829036b2feSFrancesco Ruggeri 				continue;
3839036b2feSFrancesco Ruggeri 			}
3841da177e4SLinus Torvalds 			if (last) {
3851da177e4SLinus Torvalds 				struct sk_buff *skb2 = skb_clone(skb, GFP_ATOMIC);
3861da177e4SLinus Torvalds 				if (skb2)
3871da177e4SLinus Torvalds 					rawv6_rcv(last, skb2);
3881da177e4SLinus Torvalds 			}
3891da177e4SLinus Torvalds 			last = sk;
3901da177e4SLinus Torvalds 		}
3911da177e4SLinus Torvalds 	}
3921da177e4SLinus Torvalds 
3931da177e4SLinus Torvalds 	if (last) {
3941da177e4SLinus Torvalds 		rawv6_rcv(last, skb);
3951da177e4SLinus Torvalds 		read_unlock(&ip6_ra_lock);
3961da177e4SLinus Torvalds 		return 1;
3971da177e4SLinus Torvalds 	}
3981da177e4SLinus Torvalds 	read_unlock(&ip6_ra_lock);
3991da177e4SLinus Torvalds 	return 0;
4001da177e4SLinus Torvalds }
4011da177e4SLinus Torvalds 
402e21e0b5fSVille Nuorvala static int ip6_forward_proxy_check(struct sk_buff *skb)
403e21e0b5fSVille Nuorvala {
4040660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
405e21e0b5fSVille Nuorvala 	u8 nexthdr = hdr->nexthdr;
40675f2811cSJesse Gross 	__be16 frag_off;
407e21e0b5fSVille Nuorvala 	int offset;
408e21e0b5fSVille Nuorvala 
409e21e0b5fSVille Nuorvala 	if (ipv6_ext_hdr(nexthdr)) {
41075f2811cSJesse Gross 		offset = ipv6_skip_exthdr(skb, sizeof(*hdr), &nexthdr, &frag_off);
411e21e0b5fSVille Nuorvala 		if (offset < 0)
412e21e0b5fSVille Nuorvala 			return 0;
413e21e0b5fSVille Nuorvala 	} else
414e21e0b5fSVille Nuorvala 		offset = sizeof(struct ipv6hdr);
415e21e0b5fSVille Nuorvala 
416e21e0b5fSVille Nuorvala 	if (nexthdr == IPPROTO_ICMPV6) {
417e21e0b5fSVille Nuorvala 		struct icmp6hdr *icmp6;
418e21e0b5fSVille Nuorvala 
419d56f90a7SArnaldo Carvalho de Melo 		if (!pskb_may_pull(skb, (skb_network_header(skb) +
420d56f90a7SArnaldo Carvalho de Melo 					 offset + 1 - skb->data)))
421e21e0b5fSVille Nuorvala 			return 0;
422e21e0b5fSVille Nuorvala 
423d56f90a7SArnaldo Carvalho de Melo 		icmp6 = (struct icmp6hdr *)(skb_network_header(skb) + offset);
424e21e0b5fSVille Nuorvala 
425e21e0b5fSVille Nuorvala 		switch (icmp6->icmp6_type) {
426e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_SOLICITATION:
427e21e0b5fSVille Nuorvala 		case NDISC_ROUTER_ADVERTISEMENT:
428e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_SOLICITATION:
429e21e0b5fSVille Nuorvala 		case NDISC_NEIGHBOUR_ADVERTISEMENT:
430e21e0b5fSVille Nuorvala 		case NDISC_REDIRECT:
431e21e0b5fSVille Nuorvala 			/* For reaction involving unicast neighbor discovery
432e21e0b5fSVille Nuorvala 			 * message destined to the proxied address, pass it to
433e21e0b5fSVille Nuorvala 			 * input function.
434e21e0b5fSVille Nuorvala 			 */
435e21e0b5fSVille Nuorvala 			return 1;
436e21e0b5fSVille Nuorvala 		default:
437e21e0b5fSVille Nuorvala 			break;
438e21e0b5fSVille Nuorvala 		}
439e21e0b5fSVille Nuorvala 	}
440e21e0b5fSVille Nuorvala 
44174553b09SVille Nuorvala 	/*
44274553b09SVille Nuorvala 	 * The proxying router can't forward traffic sent to a link-local
44374553b09SVille Nuorvala 	 * address, so signal the sender and discard the packet. This
44474553b09SVille Nuorvala 	 * behavior is clarified by the MIPv6 specification.
44574553b09SVille Nuorvala 	 */
44674553b09SVille Nuorvala 	if (ipv6_addr_type(&hdr->daddr) & IPV6_ADDR_LINKLOCAL) {
44774553b09SVille Nuorvala 		dst_link_failure(skb);
44874553b09SVille Nuorvala 		return -1;
44974553b09SVille Nuorvala 	}
45074553b09SVille Nuorvala 
451e21e0b5fSVille Nuorvala 	return 0;
452e21e0b5fSVille Nuorvala }
453e21e0b5fSVille Nuorvala 
4540c4b51f0SEric W. Biederman static inline int ip6_forward_finish(struct net *net, struct sock *sk,
4550c4b51f0SEric W. Biederman 				     struct sk_buff *skb)
4561da177e4SLinus Torvalds {
45771a1c915SJeff Barnhill 	struct dst_entry *dst = skb_dst(skb);
45871a1c915SJeff Barnhill 
45971a1c915SJeff Barnhill 	__IP6_INC_STATS(net, ip6_dst_idev(dst), IPSTATS_MIB_OUTFORWDATAGRAMS);
46071a1c915SJeff Barnhill 
461f839a6c9SIdo Schimmel #ifdef CONFIG_NET_SWITCHDEV
462f839a6c9SIdo Schimmel 	if (skb->offload_l3_fwd_mark) {
463f839a6c9SIdo Schimmel 		consume_skb(skb);
464f839a6c9SIdo Schimmel 		return 0;
465f839a6c9SIdo Schimmel 	}
466f839a6c9SIdo Schimmel #endif
467f839a6c9SIdo Schimmel 
468de799101SMartin KaFai Lau 	skb_clear_tstamp(skb);
46913206b6bSEric W. Biederman 	return dst_output(net, sk, skb);
4701da177e4SLinus Torvalds }
4711da177e4SLinus Torvalds 
472fe6cc55fSFlorian Westphal static bool ip6_pkt_too_big(const struct sk_buff *skb, unsigned int mtu)
473fe6cc55fSFlorian Westphal {
474418a3156SFlorian Westphal 	if (skb->len <= mtu)
475fe6cc55fSFlorian Westphal 		return false;
476fe6cc55fSFlorian Westphal 
47760ff7467SWANG Cong 	/* ipv6 conntrack defrag sets max_frag_size + ignore_df */
478fe6cc55fSFlorian Westphal 	if (IP6CB(skb)->frag_max_size && IP6CB(skb)->frag_max_size > mtu)
479fe6cc55fSFlorian Westphal 		return true;
480fe6cc55fSFlorian Westphal 
48160ff7467SWANG Cong 	if (skb->ignore_df)
482418a3156SFlorian Westphal 		return false;
483418a3156SFlorian Westphal 
484779b7931SDaniel Axtens 	if (skb_is_gso(skb) && skb_gso_validate_network_len(skb, mtu))
485fe6cc55fSFlorian Westphal 		return false;
486fe6cc55fSFlorian Westphal 
487fe6cc55fSFlorian Westphal 	return true;
488fe6cc55fSFlorian Westphal }
489fe6cc55fSFlorian Westphal 
4901da177e4SLinus Torvalds int ip6_forward(struct sk_buff *skb)
4911da177e4SLinus Torvalds {
492adf30907SEric Dumazet 	struct dst_entry *dst = skb_dst(skb);
4930660e03fSArnaldo Carvalho de Melo 	struct ipv6hdr *hdr = ipv6_hdr(skb);
4941da177e4SLinus Torvalds 	struct inet6_skb_parm *opt = IP6CB(skb);
495c346dca1SYOSHIFUJI Hideaki 	struct net *net = dev_net(dst->dev);
4960857d6f8SStephen Suryaputra 	struct inet6_dev *idev;
4972edc1a38SMenglong Dong 	SKB_DR(reason);
49814f3ad6fSUlrich Weber 	u32 mtu;
4991da177e4SLinus Torvalds 
5000857d6f8SStephen Suryaputra 	idev = __in6_dev_get_safely(dev_get_by_index_rcu(net, IP6CB(skb)->iif));
50153b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->forwarding == 0)
5021da177e4SLinus Torvalds 		goto error;
5031da177e4SLinus Torvalds 
504090f1166SLi RongQing 	if (skb->pkt_type != PACKET_HOST)
505090f1166SLi RongQing 		goto drop;
506090f1166SLi RongQing 
5079ef2e965SHannes Frederic Sowa 	if (unlikely(skb->sk))
5089ef2e965SHannes Frederic Sowa 		goto drop;
5099ef2e965SHannes Frederic Sowa 
5104497b076SBen Hutchings 	if (skb_warn_if_lro(skb))
5114497b076SBen Hutchings 		goto drop;
5124497b076SBen Hutchings 
513ccd27f05SNicolas Dichtel 	if (!net->ipv6.devconf_all->disable_policy &&
514e3fa461dSNicolas Dichtel 	    (!idev || !idev->cnf.disable_policy) &&
515ccd27f05SNicolas Dichtel 	    !xfrm6_policy_check(NULL, XFRM_POLICY_FWD, skb)) {
516bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
5171da177e4SLinus Torvalds 		goto drop;
5181da177e4SLinus Torvalds 	}
5191da177e4SLinus Torvalds 
52035fc92a9SHerbert Xu 	skb_forward_csum(skb);
5211da177e4SLinus Torvalds 
5221da177e4SLinus Torvalds 	/*
5231da177e4SLinus Torvalds 	 *	We DO NOT make any processing on
5241da177e4SLinus Torvalds 	 *	RA packets, pushing them to user level AS IS
5251da177e4SLinus Torvalds 	 *	without ane WARRANTY that application will be able
5261da177e4SLinus Torvalds 	 *	to interpret them. The reason is that we
5271da177e4SLinus Torvalds 	 *	cannot make anything clever here.
5281da177e4SLinus Torvalds 	 *
5291da177e4SLinus Torvalds 	 *	We are not end-node, so that if packet contains
5301da177e4SLinus Torvalds 	 *	AH/ESP, we cannot make anything.
5311da177e4SLinus Torvalds 	 *	Defragmentation also would be mistake, RA packets
5321da177e4SLinus Torvalds 	 *	cannot be fragmented, because there is no warranty
5331da177e4SLinus Torvalds 	 *	that different fragments will go along one path. --ANK
5341da177e4SLinus Torvalds 	 */
535ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 	if (unlikely(opt->flags & IP6SKB_ROUTERALERT)) {
536ab4eb353SYOSHIFUJI Hideaki / 吉藤英明 		if (ip6_call_ra_chain(skb, ntohs(opt->ra)))
5371da177e4SLinus Torvalds 			return 0;
5381da177e4SLinus Torvalds 	}
5391da177e4SLinus Torvalds 
5401da177e4SLinus Torvalds 	/*
5411da177e4SLinus Torvalds 	 *	check and decrement ttl
5421da177e4SLinus Torvalds 	 */
5431da177e4SLinus Torvalds 	if (hdr->hop_limit <= 1) {
5443ffe533cSAlexey Dobriyan 		icmpv6_send(skb, ICMPV6_TIME_EXCEED, ICMPV6_EXC_HOPLIMIT, 0);
545bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INHDRERRORS);
5461da177e4SLinus Torvalds 
5472edc1a38SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_IP_INHDR);
5481da177e4SLinus Torvalds 		return -ETIMEDOUT;
5491da177e4SLinus Torvalds 	}
5501da177e4SLinus Torvalds 
551fbea49e1SYOSHIFUJI Hideaki 	/* XXX: idev->cnf.proxy_ndp? */
55253b7997fSYOSHIFUJI Hideaki 	if (net->ipv6.devconf_all->proxy_ndp &&
5538a3edd80SDaniel Lezcano 	    pneigh_lookup(&nd_tbl, net, &hdr->daddr, skb->dev, 0)) {
55474553b09SVille Nuorvala 		int proxied = ip6_forward_proxy_check(skb);
55546c7655fSKangmin Park 		if (proxied > 0) {
5569f535c87SGergely Risko 			/* It's tempting to decrease the hop limit
5579f535c87SGergely Risko 			 * here by 1, as we do at the end of the
5589f535c87SGergely Risko 			 * function too.
5599f535c87SGergely Risko 			 *
5609f535c87SGergely Risko 			 * But that would be incorrect, as proxying is
5619f535c87SGergely Risko 			 * not forwarding.  The ip6_input function
5629f535c87SGergely Risko 			 * will handle this packet locally, and it
5639f535c87SGergely Risko 			 * depends on the hop limit being unchanged.
5649f535c87SGergely Risko 			 *
5659f535c87SGergely Risko 			 * One example is the NDP hop limit, that
5669f535c87SGergely Risko 			 * always has to stay 255, but other would be
5679f535c87SGergely Risko 			 * similar checks around RA packets, where the
5689f535c87SGergely Risko 			 * user can even change the desired limit.
5699f535c87SGergely Risko 			 */
570e21e0b5fSVille Nuorvala 			return ip6_input(skb);
57146c7655fSKangmin Park 		} else if (proxied < 0) {
572bdb7cc64SStephen Suryaputra 			__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
57374553b09SVille Nuorvala 			goto drop;
57474553b09SVille Nuorvala 		}
575e21e0b5fSVille Nuorvala 	}
576e21e0b5fSVille Nuorvala 
5771da177e4SLinus Torvalds 	if (!xfrm6_route_forward(skb)) {
578bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INDISCARDS);
5792edc1a38SMenglong Dong 		SKB_DR_SET(reason, XFRM_POLICY);
5801da177e4SLinus Torvalds 		goto drop;
5811da177e4SLinus Torvalds 	}
582adf30907SEric Dumazet 	dst = skb_dst(skb);
5831da177e4SLinus Torvalds 
5841da177e4SLinus Torvalds 	/* IPv6 specs say nothing about it, but it is clear that we cannot
5851da177e4SLinus Torvalds 	   send redirects to source routed frames.
5861e5dc146SMasahide NAKAMURA 	   We don't send redirects to frames decapsulated from IPsec.
5871da177e4SLinus Torvalds 	 */
5882f17becfSStephen Suryaputra 	if (IP6CB(skb)->iif == dst->dev->ifindex &&
5892f17becfSStephen Suryaputra 	    opt->srcrt == 0 && !skb_sec_path(skb)) {
5901da177e4SLinus Torvalds 		struct in6_addr *target = NULL;
591fbfe95a4SDavid S. Miller 		struct inet_peer *peer;
5921da177e4SLinus Torvalds 		struct rt6_info *rt;
5931da177e4SLinus Torvalds 
5941da177e4SLinus Torvalds 		/*
5951da177e4SLinus Torvalds 		 *	incoming and outgoing devices are the same
5961da177e4SLinus Torvalds 		 *	send a redirect.
5971da177e4SLinus Torvalds 		 */
5981da177e4SLinus Torvalds 
5991da177e4SLinus Torvalds 		rt = (struct rt6_info *) dst;
600c45a3dfbSDavid S. Miller 		if (rt->rt6i_flags & RTF_GATEWAY)
601c45a3dfbSDavid S. Miller 			target = &rt->rt6i_gateway;
6021da177e4SLinus Torvalds 		else
6031da177e4SLinus Torvalds 			target = &hdr->daddr;
6041da177e4SLinus Torvalds 
605fd0273d7SMartin KaFai Lau 		peer = inet_getpeer_v6(net->ipv6.peers, &hdr->daddr, 1);
60692d86829SDavid S. Miller 
6071da177e4SLinus Torvalds 		/* Limit redirects both by destination (here)
6081da177e4SLinus Torvalds 		   and by source (inside ndisc_send_redirect)
6091da177e4SLinus Torvalds 		 */
610fbfe95a4SDavid S. Miller 		if (inet_peer_xrlim_allow(peer, 1*HZ))
6114991969aSDavid S. Miller 			ndisc_send_redirect(skb, target);
6121d861aa4SDavid S. Miller 		if (peer)
6131d861aa4SDavid S. Miller 			inet_putpeer(peer);
6145bb1ab09SDavid L Stevens 	} else {
6155bb1ab09SDavid L Stevens 		int addrtype = ipv6_addr_type(&hdr->saddr);
6165bb1ab09SDavid L Stevens 
6171da177e4SLinus Torvalds 		/* This check is security critical. */
618f81b2e7dSYOSHIFUJI Hideaki 		if (addrtype == IPV6_ADDR_ANY ||
619f81b2e7dSYOSHIFUJI Hideaki 		    addrtype & (IPV6_ADDR_MULTICAST | IPV6_ADDR_LOOPBACK))
6201da177e4SLinus Torvalds 			goto error;
6215bb1ab09SDavid L Stevens 		if (addrtype & IPV6_ADDR_LINKLOCAL) {
6225bb1ab09SDavid L Stevens 			icmpv6_send(skb, ICMPV6_DEST_UNREACH,
6233ffe533cSAlexey Dobriyan 				    ICMPV6_NOT_NEIGHBOUR, 0);
6245bb1ab09SDavid L Stevens 			goto error;
6255bb1ab09SDavid L Stevens 		}
6261da177e4SLinus Torvalds 	}
6271da177e4SLinus Torvalds 
628427faee1SVadim Fedorenko 	mtu = ip6_dst_mtu_maybe_forward(dst, true);
62914f3ad6fSUlrich Weber 	if (mtu < IPV6_MIN_MTU)
63014f3ad6fSUlrich Weber 		mtu = IPV6_MIN_MTU;
63114f3ad6fSUlrich Weber 
632fe6cc55fSFlorian Westphal 	if (ip6_pkt_too_big(skb, mtu)) {
6331da177e4SLinus Torvalds 		/* Again, force OUTPUT device used as source address */
6341da177e4SLinus Torvalds 		skb->dev = dst->dev;
63514f3ad6fSUlrich Weber 		icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
636bdb7cc64SStephen Suryaputra 		__IP6_INC_STATS(net, idev, IPSTATS_MIB_INTOOBIGERRORS);
6371d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
63815c77d8bSEric Dumazet 				IPSTATS_MIB_FRAGFAILS);
6392edc1a38SMenglong Dong 		kfree_skb_reason(skb, SKB_DROP_REASON_PKT_TOO_BIG);
6401da177e4SLinus Torvalds 		return -EMSGSIZE;
6411da177e4SLinus Torvalds 	}
6421da177e4SLinus Torvalds 
6431da177e4SLinus Torvalds 	if (skb_cow(skb, dst->dev->hard_header_len)) {
6441d015503SEric Dumazet 		__IP6_INC_STATS(net, ip6_dst_idev(dst),
64515c77d8bSEric Dumazet 				IPSTATS_MIB_OUTDISCARDS);
6461da177e4SLinus Torvalds 		goto drop;
6471da177e4SLinus Torvalds 	}
6481da177e4SLinus Torvalds 
6490660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
6501da177e4SLinus Torvalds 
6511da177e4SLinus Torvalds 	/* Mangling hops number delayed to point after skb COW */
6521da177e4SLinus Torvalds 
6531da177e4SLinus Torvalds 	hdr->hop_limit--;
6541da177e4SLinus Torvalds 
65529a26a56SEric W. Biederman 	return NF_HOOK(NFPROTO_IPV6, NF_INET_FORWARD,
65629a26a56SEric W. Biederman 		       net, NULL, skb, skb->dev, dst->dev,
6576e23ae2aSPatrick McHardy 		       ip6_forward_finish);
6581da177e4SLinus Torvalds 
6591da177e4SLinus Torvalds error:
660bdb7cc64SStephen Suryaputra 	__IP6_INC_STATS(net, idev, IPSTATS_MIB_INADDRERRORS);
6612edc1a38SMenglong Dong 	SKB_DR_SET(reason, IP_INADDRERRORS);
6621da177e4SLinus Torvalds drop:
6632edc1a38SMenglong Dong 	kfree_skb_reason(skb, reason);
6641da177e4SLinus Torvalds 	return -EINVAL;
6651da177e4SLinus Torvalds }
6661da177e4SLinus Torvalds 
6671da177e4SLinus Torvalds static void ip6_copy_metadata(struct sk_buff *to, struct sk_buff *from)
6681da177e4SLinus Torvalds {
6691da177e4SLinus Torvalds 	to->pkt_type = from->pkt_type;
6701da177e4SLinus Torvalds 	to->priority = from->priority;
6711da177e4SLinus Torvalds 	to->protocol = from->protocol;
672adf30907SEric Dumazet 	skb_dst_drop(to);
673adf30907SEric Dumazet 	skb_dst_set(to, dst_clone(skb_dst(from)));
6741da177e4SLinus Torvalds 	to->dev = from->dev;
67582e91ffeSThomas Graf 	to->mark = from->mark;
6761da177e4SLinus Torvalds 
6773dd1c9a1SPaolo Abeni 	skb_copy_hash(to, from);
6783dd1c9a1SPaolo Abeni 
6791da177e4SLinus Torvalds #ifdef CONFIG_NET_SCHED
6801da177e4SLinus Torvalds 	to->tc_index = from->tc_index;
6811da177e4SLinus Torvalds #endif
682e7ac05f3SYasuyuki Kozakai 	nf_copy(to, from);
683df5042f4SFlorian Westphal 	skb_ext_copy(to, from);
684984bc16cSJames Morris 	skb_copy_secmark(to, from);
6851da177e4SLinus Torvalds }
6861da177e4SLinus Torvalds 
6870feca619SPablo Neira Ayuso int ip6_fraglist_init(struct sk_buff *skb, unsigned int hlen, u8 *prevhdr,
6880feca619SPablo Neira Ayuso 		      u8 nexthdr, __be32 frag_id,
6890feca619SPablo Neira Ayuso 		      struct ip6_fraglist_iter *iter)
6900feca619SPablo Neira Ayuso {
6910feca619SPablo Neira Ayuso 	unsigned int first_len;
6920feca619SPablo Neira Ayuso 	struct frag_hdr *fh;
6930feca619SPablo Neira Ayuso 
6940feca619SPablo Neira Ayuso 	/* BUILD HEADER */
6950feca619SPablo Neira Ayuso 	*prevhdr = NEXTHDR_FRAGMENT;
6960feca619SPablo Neira Ayuso 	iter->tmp_hdr = kmemdup(skb_network_header(skb), hlen, GFP_ATOMIC);
6970feca619SPablo Neira Ayuso 	if (!iter->tmp_hdr)
6980feca619SPablo Neira Ayuso 		return -ENOMEM;
6990feca619SPablo Neira Ayuso 
700b7034146SEric Dumazet 	iter->frag = skb_shinfo(skb)->frag_list;
7010feca619SPablo Neira Ayuso 	skb_frag_list_init(skb);
7020feca619SPablo Neira Ayuso 
7030feca619SPablo Neira Ayuso 	iter->offset = 0;
7040feca619SPablo Neira Ayuso 	iter->hlen = hlen;
7050feca619SPablo Neira Ayuso 	iter->frag_id = frag_id;
7060feca619SPablo Neira Ayuso 	iter->nexthdr = nexthdr;
7070feca619SPablo Neira Ayuso 
7080feca619SPablo Neira Ayuso 	__skb_pull(skb, hlen);
7090feca619SPablo Neira Ayuso 	fh = __skb_push(skb, sizeof(struct frag_hdr));
7100feca619SPablo Neira Ayuso 	__skb_push(skb, hlen);
7110feca619SPablo Neira Ayuso 	skb_reset_network_header(skb);
7120feca619SPablo Neira Ayuso 	memcpy(skb_network_header(skb), iter->tmp_hdr, hlen);
7130feca619SPablo Neira Ayuso 
7140feca619SPablo Neira Ayuso 	fh->nexthdr = nexthdr;
7150feca619SPablo Neira Ayuso 	fh->reserved = 0;
7160feca619SPablo Neira Ayuso 	fh->frag_off = htons(IP6_MF);
7170feca619SPablo Neira Ayuso 	fh->identification = frag_id;
7180feca619SPablo Neira Ayuso 
7190feca619SPablo Neira Ayuso 	first_len = skb_pagelen(skb);
7200feca619SPablo Neira Ayuso 	skb->data_len = first_len - skb_headlen(skb);
7210feca619SPablo Neira Ayuso 	skb->len = first_len;
7220feca619SPablo Neira Ayuso 	ipv6_hdr(skb)->payload_len = htons(first_len - sizeof(struct ipv6hdr));
7230feca619SPablo Neira Ayuso 
7240feca619SPablo Neira Ayuso 	return 0;
7250feca619SPablo Neira Ayuso }
7260feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_init);
7270feca619SPablo Neira Ayuso 
7280feca619SPablo Neira Ayuso void ip6_fraglist_prepare(struct sk_buff *skb,
7290feca619SPablo Neira Ayuso 			  struct ip6_fraglist_iter *iter)
7300feca619SPablo Neira Ayuso {
7310feca619SPablo Neira Ayuso 	struct sk_buff *frag = iter->frag;
7320feca619SPablo Neira Ayuso 	unsigned int hlen = iter->hlen;
7330feca619SPablo Neira Ayuso 	struct frag_hdr *fh;
7340feca619SPablo Neira Ayuso 
7350feca619SPablo Neira Ayuso 	frag->ip_summed = CHECKSUM_NONE;
7360feca619SPablo Neira Ayuso 	skb_reset_transport_header(frag);
7370feca619SPablo Neira Ayuso 	fh = __skb_push(frag, sizeof(struct frag_hdr));
7380feca619SPablo Neira Ayuso 	__skb_push(frag, hlen);
7390feca619SPablo Neira Ayuso 	skb_reset_network_header(frag);
7400feca619SPablo Neira Ayuso 	memcpy(skb_network_header(frag), iter->tmp_hdr, hlen);
7410feca619SPablo Neira Ayuso 	iter->offset += skb->len - hlen - sizeof(struct frag_hdr);
7420feca619SPablo Neira Ayuso 	fh->nexthdr = iter->nexthdr;
7430feca619SPablo Neira Ayuso 	fh->reserved = 0;
7440feca619SPablo Neira Ayuso 	fh->frag_off = htons(iter->offset);
7450feca619SPablo Neira Ayuso 	if (frag->next)
7460feca619SPablo Neira Ayuso 		fh->frag_off |= htons(IP6_MF);
7470feca619SPablo Neira Ayuso 	fh->identification = iter->frag_id;
7480feca619SPablo Neira Ayuso 	ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr));
7490feca619SPablo Neira Ayuso 	ip6_copy_metadata(frag, skb);
7500feca619SPablo Neira Ayuso }
7510feca619SPablo Neira Ayuso EXPORT_SYMBOL(ip6_fraglist_prepare);
7520feca619SPablo Neira Ayuso 
7538a6a1f17SPablo Neira Ayuso void ip6_frag_init(struct sk_buff *skb, unsigned int hlen, unsigned int mtu,
7548a6a1f17SPablo Neira Ayuso 		   unsigned short needed_tailroom, int hdr_room, u8 *prevhdr,
7558a6a1f17SPablo Neira Ayuso 		   u8 nexthdr, __be32 frag_id, struct ip6_frag_state *state)
7568a6a1f17SPablo Neira Ayuso {
7578a6a1f17SPablo Neira Ayuso 	state->prevhdr = prevhdr;
7588a6a1f17SPablo Neira Ayuso 	state->nexthdr = nexthdr;
7598a6a1f17SPablo Neira Ayuso 	state->frag_id = frag_id;
7608a6a1f17SPablo Neira Ayuso 
7618a6a1f17SPablo Neira Ayuso 	state->hlen = hlen;
7628a6a1f17SPablo Neira Ayuso 	state->mtu = mtu;
7638a6a1f17SPablo Neira Ayuso 
7648a6a1f17SPablo Neira Ayuso 	state->left = skb->len - hlen;	/* Space per frame */
7658a6a1f17SPablo Neira Ayuso 	state->ptr = hlen;		/* Where to start from */
7668a6a1f17SPablo Neira Ayuso 
7678a6a1f17SPablo Neira Ayuso 	state->hroom = hdr_room;
7688a6a1f17SPablo Neira Ayuso 	state->troom = needed_tailroom;
7698a6a1f17SPablo Neira Ayuso 
7708a6a1f17SPablo Neira Ayuso 	state->offset = 0;
7718a6a1f17SPablo Neira Ayuso }
7728a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_init);
7738a6a1f17SPablo Neira Ayuso 
7748a6a1f17SPablo Neira Ayuso struct sk_buff *ip6_frag_next(struct sk_buff *skb, struct ip6_frag_state *state)
7758a6a1f17SPablo Neira Ayuso {
7768a6a1f17SPablo Neira Ayuso 	u8 *prevhdr = state->prevhdr, *fragnexthdr_offset;
7778a6a1f17SPablo Neira Ayuso 	struct sk_buff *frag;
7788a6a1f17SPablo Neira Ayuso 	struct frag_hdr *fh;
7798a6a1f17SPablo Neira Ayuso 	unsigned int len;
7808a6a1f17SPablo Neira Ayuso 
7818a6a1f17SPablo Neira Ayuso 	len = state->left;
7828a6a1f17SPablo Neira Ayuso 	/* IF: it doesn't fit, use 'mtu' - the data space left */
7838a6a1f17SPablo Neira Ayuso 	if (len > state->mtu)
7848a6a1f17SPablo Neira Ayuso 		len = state->mtu;
7858a6a1f17SPablo Neira Ayuso 	/* IF: we are not sending up to and including the packet end
7868a6a1f17SPablo Neira Ayuso 	   then align the next start on an eight byte boundary */
7878a6a1f17SPablo Neira Ayuso 	if (len < state->left)
7888a6a1f17SPablo Neira Ayuso 		len &= ~7;
7898a6a1f17SPablo Neira Ayuso 
7908a6a1f17SPablo Neira Ayuso 	/* Allocate buffer */
7918a6a1f17SPablo Neira Ayuso 	frag = alloc_skb(len + state->hlen + sizeof(struct frag_hdr) +
7928a6a1f17SPablo Neira Ayuso 			 state->hroom + state->troom, GFP_ATOMIC);
7938a6a1f17SPablo Neira Ayuso 	if (!frag)
7948a6a1f17SPablo Neira Ayuso 		return ERR_PTR(-ENOMEM);
7958a6a1f17SPablo Neira Ayuso 
7968a6a1f17SPablo Neira Ayuso 	/*
7978a6a1f17SPablo Neira Ayuso 	 *	Set up data on packet
7988a6a1f17SPablo Neira Ayuso 	 */
7998a6a1f17SPablo Neira Ayuso 
8008a6a1f17SPablo Neira Ayuso 	ip6_copy_metadata(frag, skb);
8018a6a1f17SPablo Neira Ayuso 	skb_reserve(frag, state->hroom);
8028a6a1f17SPablo Neira Ayuso 	skb_put(frag, len + state->hlen + sizeof(struct frag_hdr));
8038a6a1f17SPablo Neira Ayuso 	skb_reset_network_header(frag);
8048a6a1f17SPablo Neira Ayuso 	fh = (struct frag_hdr *)(skb_network_header(frag) + state->hlen);
8058a6a1f17SPablo Neira Ayuso 	frag->transport_header = (frag->network_header + state->hlen +
8068a6a1f17SPablo Neira Ayuso 				  sizeof(struct frag_hdr));
8078a6a1f17SPablo Neira Ayuso 
8088a6a1f17SPablo Neira Ayuso 	/*
8098a6a1f17SPablo Neira Ayuso 	 *	Charge the memory for the fragment to any owner
8108a6a1f17SPablo Neira Ayuso 	 *	it might possess
8118a6a1f17SPablo Neira Ayuso 	 */
8128a6a1f17SPablo Neira Ayuso 	if (skb->sk)
8138a6a1f17SPablo Neira Ayuso 		skb_set_owner_w(frag, skb->sk);
8148a6a1f17SPablo Neira Ayuso 
8158a6a1f17SPablo Neira Ayuso 	/*
8168a6a1f17SPablo Neira Ayuso 	 *	Copy the packet header into the new buffer.
8178a6a1f17SPablo Neira Ayuso 	 */
8188a6a1f17SPablo Neira Ayuso 	skb_copy_from_linear_data(skb, skb_network_header(frag), state->hlen);
8198a6a1f17SPablo Neira Ayuso 
8208a6a1f17SPablo Neira Ayuso 	fragnexthdr_offset = skb_network_header(frag);
8218a6a1f17SPablo Neira Ayuso 	fragnexthdr_offset += prevhdr - skb_network_header(skb);
8228a6a1f17SPablo Neira Ayuso 	*fragnexthdr_offset = NEXTHDR_FRAGMENT;
8238a6a1f17SPablo Neira Ayuso 
8248a6a1f17SPablo Neira Ayuso 	/*
8258a6a1f17SPablo Neira Ayuso 	 *	Build fragment header.
8268a6a1f17SPablo Neira Ayuso 	 */
8278a6a1f17SPablo Neira Ayuso 	fh->nexthdr = state->nexthdr;
8288a6a1f17SPablo Neira Ayuso 	fh->reserved = 0;
8298a6a1f17SPablo Neira Ayuso 	fh->identification = state->frag_id;
8308a6a1f17SPablo Neira Ayuso 
8318a6a1f17SPablo Neira Ayuso 	/*
8328a6a1f17SPablo Neira Ayuso 	 *	Copy a block of the IP datagram.
8338a6a1f17SPablo Neira Ayuso 	 */
8348a6a1f17SPablo Neira Ayuso 	BUG_ON(skb_copy_bits(skb, state->ptr, skb_transport_header(frag),
8358a6a1f17SPablo Neira Ayuso 			     len));
8368a6a1f17SPablo Neira Ayuso 	state->left -= len;
8378a6a1f17SPablo Neira Ayuso 
8388a6a1f17SPablo Neira Ayuso 	fh->frag_off = htons(state->offset);
8398a6a1f17SPablo Neira Ayuso 	if (state->left > 0)
8408a6a1f17SPablo Neira Ayuso 		fh->frag_off |= htons(IP6_MF);
8418a6a1f17SPablo Neira Ayuso 	ipv6_hdr(frag)->payload_len = htons(frag->len - sizeof(struct ipv6hdr));
8428a6a1f17SPablo Neira Ayuso 
8438a6a1f17SPablo Neira Ayuso 	state->ptr += len;
8448a6a1f17SPablo Neira Ayuso 	state->offset += len;
8458a6a1f17SPablo Neira Ayuso 
8468a6a1f17SPablo Neira Ayuso 	return frag;
8478a6a1f17SPablo Neira Ayuso }
8488a6a1f17SPablo Neira Ayuso EXPORT_SYMBOL(ip6_frag_next);
8498a6a1f17SPablo Neira Ayuso 
8507d8c6e39SEric W. Biederman int ip6_fragment(struct net *net, struct sock *sk, struct sk_buff *skb,
8517d8c6e39SEric W. Biederman 		 int (*output)(struct net *, struct sock *, struct sk_buff *))
8521da177e4SLinus Torvalds {
8531da177e4SLinus Torvalds 	struct sk_buff *frag;
854adf30907SEric Dumazet 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
855f60e5990Shannes@stressinduktion.org 	struct ipv6_pinfo *np = skb->sk && !dev_recursion_level() ?
856f60e5990Shannes@stressinduktion.org 				inet6_sk(skb->sk) : NULL;
857a1ac9c8aSMartin KaFai Lau 	bool mono_delivery_time = skb->mono_delivery_time;
8588a6a1f17SPablo Neira Ayuso 	struct ip6_frag_state state;
8598a6a1f17SPablo Neira Ayuso 	unsigned int mtu, hlen, nexthdr_offset;
8609669fffcSEric Dumazet 	ktime_t tstamp = skb->tstamp;
8618a6a1f17SPablo Neira Ayuso 	int hroom, err = 0;
862286c2349SMartin KaFai Lau 	__be32 frag_id;
8631da177e4SLinus Torvalds 	u8 *prevhdr, nexthdr = 0;
8641da177e4SLinus Torvalds 
8657dd7eb95SDavid S. Miller 	err = ip6_find_1stfragopt(skb, &prevhdr);
8667dd7eb95SDavid S. Miller 	if (err < 0)
8672423496aSCraig Gallek 		goto fail;
8687dd7eb95SDavid S. Miller 	hlen = err;
8691da177e4SLinus Torvalds 	nexthdr = *prevhdr;
870ef0efcd3SJunwei Hu 	nexthdr_offset = prevhdr - skb_network_header(skb);
8711da177e4SLinus Torvalds 
872628a5c56SJohn Heffner 	mtu = ip6_skb_dst_mtu(skb);
873b881ef76SJohn Heffner 
874b881ef76SJohn Heffner 	/* We must not fragment if the socket is set to force MTU discovery
87514f3ad6fSUlrich Weber 	 * or if the skb it not generated by a local socket.
876b881ef76SJohn Heffner 	 */
877485fca66SFlorian Westphal 	if (unlikely(!skb->ignore_df && skb->len > mtu))
878485fca66SFlorian Westphal 		goto fail_toobig;
879a34a101eSEric Dumazet 
880485fca66SFlorian Westphal 	if (IP6CB(skb)->frag_max_size) {
881485fca66SFlorian Westphal 		if (IP6CB(skb)->frag_max_size > mtu)
882485fca66SFlorian Westphal 			goto fail_toobig;
883485fca66SFlorian Westphal 
884485fca66SFlorian Westphal 		/* don't send fragments larger than what we received */
885485fca66SFlorian Westphal 		mtu = IP6CB(skb)->frag_max_size;
886485fca66SFlorian Westphal 		if (mtu < IPV6_MIN_MTU)
887485fca66SFlorian Westphal 			mtu = IPV6_MIN_MTU;
888b881ef76SJohn Heffner 	}
889b881ef76SJohn Heffner 
890d91675f9SYOSHIFUJI Hideaki 	if (np && np->frag_size < mtu) {
891d91675f9SYOSHIFUJI Hideaki 		if (np->frag_size)
892d91675f9SYOSHIFUJI Hideaki 			mtu = np->frag_size;
893d91675f9SYOSHIFUJI Hideaki 	}
89489bc7848SHannes Frederic Sowa 	if (mtu < hlen + sizeof(struct frag_hdr) + 8)
895b72a2b01SHannes Frederic Sowa 		goto fail_toobig;
8961e0d69a9SHannes Frederic Sowa 	mtu -= hlen + sizeof(struct frag_hdr);
8971da177e4SLinus Torvalds 
898fd0273d7SMartin KaFai Lau 	frag_id = ipv6_select_ident(net, &ipv6_hdr(skb)->daddr,
899fd0273d7SMartin KaFai Lau 				    &ipv6_hdr(skb)->saddr);
900286c2349SMartin KaFai Lau 
901405c92f7SHannes Frederic Sowa 	if (skb->ip_summed == CHECKSUM_PARTIAL &&
902405c92f7SHannes Frederic Sowa 	    (err = skb_checksum_help(skb)))
903405c92f7SHannes Frederic Sowa 		goto fail;
904405c92f7SHannes Frederic Sowa 
905ef0efcd3SJunwei Hu 	prevhdr = skb_network_header(skb) + nexthdr_offset;
9061d325d21SFlorian Westphal 	hroom = LL_RESERVED_SPACE(rt->dst.dev);
90721dc3301SDavid S. Miller 	if (skb_has_frag_list(skb)) {
908c72d8cdaSAlexey Dobriyan 		unsigned int first_len = skb_pagelen(skb);
9090feca619SPablo Neira Ayuso 		struct ip6_fraglist_iter iter;
9103d13008eSEric Dumazet 		struct sk_buff *frag2;
9111da177e4SLinus Torvalds 
9121da177e4SLinus Torvalds 		if (first_len - hlen > mtu ||
9131da177e4SLinus Torvalds 		    ((first_len - hlen) & 7) ||
9141d325d21SFlorian Westphal 		    skb_cloned(skb) ||
9151d325d21SFlorian Westphal 		    skb_headroom(skb) < (hroom + sizeof(struct frag_hdr)))
9161da177e4SLinus Torvalds 			goto slow_path;
9171da177e4SLinus Torvalds 
9184d9092bbSDavid S. Miller 		skb_walk_frags(skb, frag) {
9191da177e4SLinus Torvalds 			/* Correct geometry. */
9201da177e4SLinus Torvalds 			if (frag->len > mtu ||
9211da177e4SLinus Torvalds 			    ((frag->len & 7) && frag->next) ||
9221d325d21SFlorian Westphal 			    skb_headroom(frag) < (hlen + hroom + sizeof(struct frag_hdr)))
9233d13008eSEric Dumazet 				goto slow_path_clean;
9241da177e4SLinus Torvalds 
9251da177e4SLinus Torvalds 			/* Partially cloned skb? */
9261da177e4SLinus Torvalds 			if (skb_shared(frag))
9273d13008eSEric Dumazet 				goto slow_path_clean;
9282fdba6b0SHerbert Xu 
9292fdba6b0SHerbert Xu 			BUG_ON(frag->sk);
9302fdba6b0SHerbert Xu 			if (skb->sk) {
9312fdba6b0SHerbert Xu 				frag->sk = skb->sk;
9322fdba6b0SHerbert Xu 				frag->destructor = sock_wfree;
9332fdba6b0SHerbert Xu 			}
9343d13008eSEric Dumazet 			skb->truesize -= frag->truesize;
9351da177e4SLinus Torvalds 		}
9361da177e4SLinus Torvalds 
9370feca619SPablo Neira Ayuso 		err = ip6_fraglist_init(skb, hlen, prevhdr, nexthdr, frag_id,
9380feca619SPablo Neira Ayuso 					&iter);
9390feca619SPablo Neira Ayuso 		if (err < 0)
9401d325d21SFlorian Westphal 			goto fail;
9411da177e4SLinus Torvalds 
942803e8486SEric Dumazet 		/* We prevent @rt from being freed. */
943803e8486SEric Dumazet 		rcu_read_lock();
944803e8486SEric Dumazet 
9451da177e4SLinus Torvalds 		for (;;) {
9461da177e4SLinus Torvalds 			/* Prepare header of the next frame,
9471da177e4SLinus Torvalds 			 * before previous one went down. */
9480feca619SPablo Neira Ayuso 			if (iter.frag)
9490feca619SPablo Neira Ayuso 				ip6_fraglist_prepare(skb, &iter);
9501da177e4SLinus Torvalds 
951a1ac9c8aSMartin KaFai Lau 			skb_set_delivery_time(skb, tstamp, mono_delivery_time);
9527d8c6e39SEric W. Biederman 			err = output(net, sk, skb);
953dafee490SWei Dong 			if (!err)
954d8d1f30bSChangli Gao 				IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
9553bd653c8SDenis V. Lunev 					      IPSTATS_MIB_FRAGCREATES);
956dafee490SWei Dong 
9570feca619SPablo Neira Ayuso 			if (err || !iter.frag)
9581da177e4SLinus Torvalds 				break;
9591da177e4SLinus Torvalds 
9600feca619SPablo Neira Ayuso 			skb = ip6_fraglist_next(&iter);
9611da177e4SLinus Torvalds 		}
9621da177e4SLinus Torvalds 
9630feca619SPablo Neira Ayuso 		kfree(iter.tmp_hdr);
9641da177e4SLinus Torvalds 
9651da177e4SLinus Torvalds 		if (err == 0) {
966d8d1f30bSChangli Gao 			IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
9673bd653c8SDenis V. Lunev 				      IPSTATS_MIB_FRAGOKS);
968803e8486SEric Dumazet 			rcu_read_unlock();
9691da177e4SLinus Torvalds 			return 0;
9701da177e4SLinus Torvalds 		}
9711da177e4SLinus Torvalds 
972b7034146SEric Dumazet 		kfree_skb_list(iter.frag);
9731da177e4SLinus Torvalds 
974d8d1f30bSChangli Gao 		IP6_INC_STATS(net, ip6_dst_idev(&rt->dst),
9753bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGFAILS);
976803e8486SEric Dumazet 		rcu_read_unlock();
9771da177e4SLinus Torvalds 		return err;
9783d13008eSEric Dumazet 
9793d13008eSEric Dumazet slow_path_clean:
9803d13008eSEric Dumazet 		skb_walk_frags(skb, frag2) {
9813d13008eSEric Dumazet 			if (frag2 == frag)
9823d13008eSEric Dumazet 				break;
9833d13008eSEric Dumazet 			frag2->sk = NULL;
9843d13008eSEric Dumazet 			frag2->destructor = NULL;
9853d13008eSEric Dumazet 			skb->truesize += frag2->truesize;
9863d13008eSEric Dumazet 		}
9871da177e4SLinus Torvalds 	}
9881da177e4SLinus Torvalds 
9891da177e4SLinus Torvalds slow_path:
9901da177e4SLinus Torvalds 	/*
9911da177e4SLinus Torvalds 	 *	Fragment the datagram.
9921da177e4SLinus Torvalds 	 */
9931da177e4SLinus Torvalds 
9948a6a1f17SPablo Neira Ayuso 	ip6_frag_init(skb, hlen, mtu, rt->dst.dev->needed_tailroom,
9958a6a1f17SPablo Neira Ayuso 		      LL_RESERVED_SPACE(rt->dst.dev), prevhdr, nexthdr, frag_id,
9968a6a1f17SPablo Neira Ayuso 		      &state);
9971da177e4SLinus Torvalds 
9981da177e4SLinus Torvalds 	/*
9991da177e4SLinus Torvalds 	 *	Keep copying data until we run out.
10001da177e4SLinus Torvalds 	 */
100179e49503SFlorian Westphal 
10028a6a1f17SPablo Neira Ayuso 	while (state.left > 0) {
10038a6a1f17SPablo Neira Ayuso 		frag = ip6_frag_next(skb, &state);
10048a6a1f17SPablo Neira Ayuso 		if (IS_ERR(frag)) {
10058a6a1f17SPablo Neira Ayuso 			err = PTR_ERR(frag);
10061da177e4SLinus Torvalds 			goto fail;
10071da177e4SLinus Torvalds 		}
10081da177e4SLinus Torvalds 
10091da177e4SLinus Torvalds 		/*
10101da177e4SLinus Torvalds 		 *	Put this fragment into the sending queue.
10111da177e4SLinus Torvalds 		 */
1012a1ac9c8aSMartin KaFai Lau 		skb_set_delivery_time(frag, tstamp, mono_delivery_time);
10137d8c6e39SEric W. Biederman 		err = output(net, sk, frag);
10141da177e4SLinus Torvalds 		if (err)
10151da177e4SLinus Torvalds 			goto fail;
1016dafee490SWei Dong 
1017adf30907SEric Dumazet 		IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
10183bd653c8SDenis V. Lunev 			      IPSTATS_MIB_FRAGCREATES);
10191da177e4SLinus Torvalds 	}
1020adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
1021a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGOKS);
1022808db80aSEric Dumazet 	consume_skb(skb);
10231da177e4SLinus Torvalds 	return err;
10241da177e4SLinus Torvalds 
1025485fca66SFlorian Westphal fail_toobig:
1026485fca66SFlorian Westphal 	if (skb->sk && dst_allfrag(skb_dst(skb)))
1027aba54656SEric Dumazet 		sk_gso_disable(skb->sk);
1028485fca66SFlorian Westphal 
1029485fca66SFlorian Westphal 	icmpv6_send(skb, ICMPV6_PKT_TOOBIG, 0, mtu);
1030485fca66SFlorian Westphal 	err = -EMSGSIZE;
1031485fca66SFlorian Westphal 
10321da177e4SLinus Torvalds fail:
1033adf30907SEric Dumazet 	IP6_INC_STATS(net, ip6_dst_idev(skb_dst(skb)),
1034a11d206dSYOSHIFUJI Hideaki 		      IPSTATS_MIB_FRAGFAILS);
10351da177e4SLinus Torvalds 	kfree_skb(skb);
10361da177e4SLinus Torvalds 	return err;
10371da177e4SLinus Torvalds }
10381da177e4SLinus Torvalds 
1039b71d1d42SEric Dumazet static inline int ip6_rt_check(const struct rt6key *rt_key,
1040b71d1d42SEric Dumazet 			       const struct in6_addr *fl_addr,
1041b71d1d42SEric Dumazet 			       const struct in6_addr *addr_cache)
1042cf6b1982SYOSHIFUJI Hideaki {
1043a02cec21SEric Dumazet 	return (rt_key->plen != 128 || !ipv6_addr_equal(fl_addr, &rt_key->addr)) &&
104463159f29SIan Morris 		(!addr_cache || !ipv6_addr_equal(fl_addr, addr_cache));
1045cf6b1982SYOSHIFUJI Hideaki }
1046cf6b1982SYOSHIFUJI Hideaki 
1047497c615aSHerbert Xu static struct dst_entry *ip6_sk_dst_check(struct sock *sk,
1048497c615aSHerbert Xu 					  struct dst_entry *dst,
1049b71d1d42SEric Dumazet 					  const struct flowi6 *fl6)
10501da177e4SLinus Torvalds {
10511da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
1052a963a37dSEric Dumazet 	struct rt6_info *rt;
10531da177e4SLinus Torvalds 
1054497c615aSHerbert Xu 	if (!dst)
1055497c615aSHerbert Xu 		goto out;
10561da177e4SLinus Torvalds 
1057a963a37dSEric Dumazet 	if (dst->ops->family != AF_INET6) {
1058a963a37dSEric Dumazet 		dst_release(dst);
1059a963a37dSEric Dumazet 		return NULL;
1060a963a37dSEric Dumazet 	}
1061a963a37dSEric Dumazet 
1062a963a37dSEric Dumazet 	rt = (struct rt6_info *)dst;
10631da177e4SLinus Torvalds 	/* Yes, checking route validity in not connected
1064d76e60a5SDavid S. Miller 	 * case is not very simple. Take into account,
1065d76e60a5SDavid S. Miller 	 * that we do not support routing by source, TOS,
1066d76e60a5SDavid S. Miller 	 * and MSG_DONTROUTE		--ANK (980726)
1067d76e60a5SDavid S. Miller 	 *
1068cf6b1982SYOSHIFUJI Hideaki 	 * 1. ip6_rt_check(): If route was host route,
1069cf6b1982SYOSHIFUJI Hideaki 	 *    check that cached destination is current.
1070d76e60a5SDavid S. Miller 	 *    If it is network route, we still may
1071d76e60a5SDavid S. Miller 	 *    check its validity using saved pointer
1072d76e60a5SDavid S. Miller 	 *    to the last used address: daddr_cache.
1073d76e60a5SDavid S. Miller 	 *    We do not want to save whole address now,
1074d76e60a5SDavid S. Miller 	 *    (because main consumer of this service
1075d76e60a5SDavid S. Miller 	 *    is tcp, which has not this problem),
1076d76e60a5SDavid S. Miller 	 *    so that the last trick works only on connected
1077d76e60a5SDavid S. Miller 	 *    sockets.
1078d76e60a5SDavid S. Miller 	 * 2. oif also should be the same.
10791da177e4SLinus Torvalds 	 */
10804c9483b2SDavid S. Miller 	if (ip6_rt_check(&rt->rt6i_dst, &fl6->daddr, np->daddr_cache) ||
10818e1ef0a9SYOSHIFUJI Hideaki #ifdef CONFIG_IPV6_SUBTREES
10824c9483b2SDavid S. Miller 	    ip6_rt_check(&rt->rt6i_src, &fl6->saddr, np->saddr_cache) ||
10838e1ef0a9SYOSHIFUJI Hideaki #endif
108440867d74SDavid Ahern 	   (fl6->flowi6_oif && fl6->flowi6_oif != dst->dev->ifindex)) {
1085497c615aSHerbert Xu 		dst_release(dst);
1086497c615aSHerbert Xu 		dst = NULL;
10871da177e4SLinus Torvalds 	}
1088497c615aSHerbert Xu 
1089497c615aSHerbert Xu out:
1090497c615aSHerbert Xu 	return dst;
10911da177e4SLinus Torvalds }
1092497c615aSHerbert Xu 
10933aef934fSEric Dumazet static int ip6_dst_lookup_tail(struct net *net, const struct sock *sk,
10944c9483b2SDavid S. Miller 			       struct dst_entry **dst, struct flowi6 *fl6)
1095497c615aSHerbert Xu {
109669cce1d1SDavid S. Miller #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
109769cce1d1SDavid S. Miller 	struct neighbour *n;
109897cac082SDavid S. Miller 	struct rt6_info *rt;
109969cce1d1SDavid S. Miller #endif
110069cce1d1SDavid S. Miller 	int err;
11016f21c96aSPaolo Abeni 	int flags = 0;
11021da177e4SLinus Torvalds 
1103e16e888bSMarkus Stenberg 	/* The correct way to handle this would be to do
1104e16e888bSMarkus Stenberg 	 * ip6_route_get_saddr, and then ip6_route_output; however,
1105e16e888bSMarkus Stenberg 	 * the route-specific preferred source forces the
1106e16e888bSMarkus Stenberg 	 * ip6_route_output call _before_ ip6_route_get_saddr.
1107e16e888bSMarkus Stenberg 	 *
1108e16e888bSMarkus Stenberg 	 * In source specific routing (no src=any default route),
1109e16e888bSMarkus Stenberg 	 * ip6_route_output will fail given src=any saddr, though, so
1110e16e888bSMarkus Stenberg 	 * that's why we try it again later.
1111e16e888bSMarkus Stenberg 	 */
1112c305b9e6Szhang kai 	if (ipv6_addr_any(&fl6->saddr)) {
1113a68886a6SDavid Ahern 		struct fib6_info *from;
1114e16e888bSMarkus Stenberg 		struct rt6_info *rt;
1115e16e888bSMarkus Stenberg 
1116e16e888bSMarkus Stenberg 		*dst = ip6_route_output(net, sk, fl6);
1117e16e888bSMarkus Stenberg 		rt = (*dst)->error ? NULL : (struct rt6_info *)*dst;
1118a68886a6SDavid Ahern 
1119a68886a6SDavid Ahern 		rcu_read_lock();
1120a68886a6SDavid Ahern 		from = rt ? rcu_dereference(rt->from) : NULL;
1121a68886a6SDavid Ahern 		err = ip6_route_get_saddr(net, from, &fl6->daddr,
1122e16e888bSMarkus Stenberg 					  sk ? inet6_sk(sk)->srcprefs : 0,
1123e16e888bSMarkus Stenberg 					  &fl6->saddr);
1124a68886a6SDavid Ahern 		rcu_read_unlock();
1125a68886a6SDavid Ahern 
1126e16e888bSMarkus Stenberg 		if (err)
1127e16e888bSMarkus Stenberg 			goto out_err_release;
1128e16e888bSMarkus Stenberg 
1129e16e888bSMarkus Stenberg 		/* If we had an erroneous initial result, pretend it
1130e16e888bSMarkus Stenberg 		 * never existed and let the SA-enabled version take
1131e16e888bSMarkus Stenberg 		 * over.
1132e16e888bSMarkus Stenberg 		 */
1133c305b9e6Szhang kai 		if ((*dst)->error) {
1134e16e888bSMarkus Stenberg 			dst_release(*dst);
1135e16e888bSMarkus Stenberg 			*dst = NULL;
1136e16e888bSMarkus Stenberg 		}
11376f21c96aSPaolo Abeni 
11386f21c96aSPaolo Abeni 		if (fl6->flowi6_oif)
11396f21c96aSPaolo Abeni 			flags |= RT6_LOOKUP_F_IFACE;
1140e16e888bSMarkus Stenberg 	}
1141e16e888bSMarkus Stenberg 
114263159f29SIan Morris 	if (!*dst)
11436f21c96aSPaolo Abeni 		*dst = ip6_route_output_flags(net, sk, fl6, flags);
11441da177e4SLinus Torvalds 
1145e5d08d71SIan Morris 	err = (*dst)->error;
1146e5d08d71SIan Morris 	if (err)
11471da177e4SLinus Torvalds 		goto out_err_release;
11481da177e4SLinus Torvalds 
114995c385b4SNeil Horman #ifdef CONFIG_IPV6_OPTIMISTIC_DAD
115095c385b4SNeil Horman 	/*
115195c385b4SNeil Horman 	 * Here if the dst entry we've looked up
115295c385b4SNeil Horman 	 * has a neighbour entry that is in the INCOMPLETE
115395c385b4SNeil Horman 	 * state and the src address from the flow is
115495c385b4SNeil Horman 	 * marked as OPTIMISTIC, we release the found
115595c385b4SNeil Horman 	 * dst entry and replace it instead with the
115695c385b4SNeil Horman 	 * dst entry of the nexthop router
115795c385b4SNeil Horman 	 */
1158c56bf6feSEric Dumazet 	rt = (struct rt6_info *) *dst;
115909eed119SEric Dumazet 	rcu_read_lock();
11602647a9b0SMartin KaFai Lau 	n = __ipv6_neigh_lookup_noref(rt->dst.dev,
11612647a9b0SMartin KaFai Lau 				      rt6_nexthop(rt, &fl6->daddr));
1162b071af52SEric Dumazet 	err = n && !(READ_ONCE(n->nud_state) & NUD_VALID) ? -EINVAL : 0;
116309eed119SEric Dumazet 	rcu_read_unlock();
1164707be1ffSYOSHIFUJI Hideaki / 吉藤英明 
1165707be1ffSYOSHIFUJI Hideaki / 吉藤英明 	if (err) {
116695c385b4SNeil Horman 		struct inet6_ifaddr *ifp;
11674c9483b2SDavid S. Miller 		struct flowi6 fl_gw6;
116895c385b4SNeil Horman 		int redirect;
116995c385b4SNeil Horman 
11704c9483b2SDavid S. Miller 		ifp = ipv6_get_ifaddr(net, &fl6->saddr,
11711cab3da6SDaniel Lezcano 				      (*dst)->dev, 1);
117295c385b4SNeil Horman 
117395c385b4SNeil Horman 		redirect = (ifp && ifp->flags & IFA_F_OPTIMISTIC);
117495c385b4SNeil Horman 		if (ifp)
117595c385b4SNeil Horman 			in6_ifa_put(ifp);
117695c385b4SNeil Horman 
117795c385b4SNeil Horman 		if (redirect) {
117895c385b4SNeil Horman 			/*
117995c385b4SNeil Horman 			 * We need to get the dst entry for the
118095c385b4SNeil Horman 			 * default router instead
118195c385b4SNeil Horman 			 */
118295c385b4SNeil Horman 			dst_release(*dst);
11834c9483b2SDavid S. Miller 			memcpy(&fl_gw6, fl6, sizeof(struct flowi6));
11844c9483b2SDavid S. Miller 			memset(&fl_gw6.daddr, 0, sizeof(struct in6_addr));
11854c9483b2SDavid S. Miller 			*dst = ip6_route_output(net, sk, &fl_gw6);
1186e5d08d71SIan Morris 			err = (*dst)->error;
1187e5d08d71SIan Morris 			if (err)
118895c385b4SNeil Horman 				goto out_err_release;
118995c385b4SNeil Horman 		}
119095c385b4SNeil Horman 	}
119195c385b4SNeil Horman #endif
1192ec5e3b0aSJonathan T. Leighton 	if (ipv6_addr_v4mapped(&fl6->saddr) &&
119300ea1ceeSWillem de Bruijn 	    !(ipv6_addr_v4mapped(&fl6->daddr) || ipv6_addr_any(&fl6->daddr))) {
119400ea1ceeSWillem de Bruijn 		err = -EAFNOSUPPORT;
119500ea1ceeSWillem de Bruijn 		goto out_err_release;
119600ea1ceeSWillem de Bruijn 	}
119795c385b4SNeil Horman 
11981da177e4SLinus Torvalds 	return 0;
11991da177e4SLinus Torvalds 
12001da177e4SLinus Torvalds out_err_release:
12011da177e4SLinus Torvalds 	dst_release(*dst);
12021da177e4SLinus Torvalds 	*dst = NULL;
12038a966fc0SDavid Ahern 
12040d240e78SDavid Ahern 	if (err == -ENETUNREACH)
12050d240e78SDavid Ahern 		IP6_INC_STATS(net, NULL, IPSTATS_MIB_OUTNOROUTES);
12061da177e4SLinus Torvalds 	return err;
12071da177e4SLinus Torvalds }
120834a0b3cdSAdrian Bunk 
1209497c615aSHerbert Xu /**
1210497c615aSHerbert Xu  *	ip6_dst_lookup - perform route lookup on flow
1211b51cd7c8SAndrew Lunn  *	@net: Network namespace to perform lookup in
1212497c615aSHerbert Xu  *	@sk: socket which provides route info
1213497c615aSHerbert Xu  *	@dst: pointer to dst_entry * for result
12144c9483b2SDavid S. Miller  *	@fl6: flow to lookup
1215497c615aSHerbert Xu  *
1216497c615aSHerbert Xu  *	This function performs a route lookup on the given flow.
1217497c615aSHerbert Xu  *
1218497c615aSHerbert Xu  *	It returns zero on success, or a standard errno code on error.
1219497c615aSHerbert Xu  */
1220343d60aaSRoopa Prabhu int ip6_dst_lookup(struct net *net, struct sock *sk, struct dst_entry **dst,
1221343d60aaSRoopa Prabhu 		   struct flowi6 *fl6)
1222497c615aSHerbert Xu {
1223497c615aSHerbert Xu 	*dst = NULL;
1224343d60aaSRoopa Prabhu 	return ip6_dst_lookup_tail(net, sk, dst, fl6);
1225497c615aSHerbert Xu }
12263cf3dc6cSArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip6_dst_lookup);
12273cf3dc6cSArnaldo Carvalho de Melo 
1228497c615aSHerbert Xu /**
122968d0c6d3SDavid S. Miller  *	ip6_dst_lookup_flow - perform route lookup on flow with ipsec
1230b51cd7c8SAndrew Lunn  *	@net: Network namespace to perform lookup in
123168d0c6d3SDavid S. Miller  *	@sk: socket which provides route info
12324c9483b2SDavid S. Miller  *	@fl6: flow to lookup
123368d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
123468d0c6d3SDavid S. Miller  *
123568d0c6d3SDavid S. Miller  *	This function performs a route lookup on the given flow.
123668d0c6d3SDavid S. Miller  *
123768d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
123868d0c6d3SDavid S. Miller  *	error code.
123968d0c6d3SDavid S. Miller  */
1240c4e85f73SSabrina Dubroca struct dst_entry *ip6_dst_lookup_flow(struct net *net, const struct sock *sk, struct flowi6 *fl6,
12410e0d44abSSteffen Klassert 				      const struct in6_addr *final_dst)
124268d0c6d3SDavid S. Miller {
124368d0c6d3SDavid S. Miller 	struct dst_entry *dst = NULL;
124468d0c6d3SDavid S. Miller 	int err;
124568d0c6d3SDavid S. Miller 
1246c4e85f73SSabrina Dubroca 	err = ip6_dst_lookup_tail(net, sk, &dst, fl6);
124768d0c6d3SDavid S. Miller 	if (err)
124868d0c6d3SDavid S. Miller 		return ERR_PTR(err);
124968d0c6d3SDavid S. Miller 	if (final_dst)
12504e3fd7a0SAlexey Dobriyan 		fl6->daddr = *final_dst;
12512774c131SDavid S. Miller 
1252c4e85f73SSabrina Dubroca 	return xfrm_lookup_route(net, dst, flowi6_to_flowi(fl6), sk, 0);
125368d0c6d3SDavid S. Miller }
125468d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_dst_lookup_flow);
125568d0c6d3SDavid S. Miller 
125668d0c6d3SDavid S. Miller /**
125768d0c6d3SDavid S. Miller  *	ip6_sk_dst_lookup_flow - perform socket cached route lookup on flow
125868d0c6d3SDavid S. Miller  *	@sk: socket which provides the dst cache and route info
12594c9483b2SDavid S. Miller  *	@fl6: flow to lookup
126068d0c6d3SDavid S. Miller  *	@final_dst: final destination address for ipsec lookup
126196818159SAlexey Kodanev  *	@connected: whether @sk is connected or not
1262497c615aSHerbert Xu  *
1263497c615aSHerbert Xu  *	This function performs a route lookup on the given flow with the
1264497c615aSHerbert Xu  *	possibility of using the cached route in the socket if it is valid.
1265497c615aSHerbert Xu  *	It will take the socket dst lock when operating on the dst cache.
1266497c615aSHerbert Xu  *	As a result, this function can only be used in process context.
1267497c615aSHerbert Xu  *
126896818159SAlexey Kodanev  *	In addition, for a connected socket, cache the dst in the socket
126996818159SAlexey Kodanev  *	if the current cache is not valid.
127096818159SAlexey Kodanev  *
127168d0c6d3SDavid S. Miller  *	It returns a valid dst pointer on success, or a pointer encoded
127268d0c6d3SDavid S. Miller  *	error code.
1273497c615aSHerbert Xu  */
12744c9483b2SDavid S. Miller struct dst_entry *ip6_sk_dst_lookup_flow(struct sock *sk, struct flowi6 *fl6,
127596818159SAlexey Kodanev 					 const struct in6_addr *final_dst,
127696818159SAlexey Kodanev 					 bool connected)
1277497c615aSHerbert Xu {
127868d0c6d3SDavid S. Miller 	struct dst_entry *dst = sk_dst_check(sk, inet6_sk(sk)->dst_cookie);
1279497c615aSHerbert Xu 
12804c9483b2SDavid S. Miller 	dst = ip6_sk_dst_check(sk, dst, fl6);
128196818159SAlexey Kodanev 	if (dst)
128296818159SAlexey Kodanev 		return dst;
128396818159SAlexey Kodanev 
1284c4e85f73SSabrina Dubroca 	dst = ip6_dst_lookup_flow(sock_net(sk), sk, fl6, final_dst);
128596818159SAlexey Kodanev 	if (connected && !IS_ERR(dst))
128696818159SAlexey Kodanev 		ip6_sk_dst_store_flow(sk, dst_clone(dst), fl6);
128768d0c6d3SDavid S. Miller 
128800bc0ef5SJakub Sitnicki 	return dst;
128968d0c6d3SDavid S. Miller }
129068d0c6d3SDavid S. Miller EXPORT_SYMBOL_GPL(ip6_sk_dst_lookup_flow);
1291497c615aSHerbert Xu 
1292571912c6SMartin Varghese /**
1293571912c6SMartin Varghese  *      ip6_dst_lookup_tunnel - perform route lookup on tunnel
1294571912c6SMartin Varghese  *      @skb: Packet for which lookup is done
1295571912c6SMartin Varghese  *      @dev: Tunnel device
1296571912c6SMartin Varghese  *      @net: Network namespace of tunnel device
1297b51cd7c8SAndrew Lunn  *      @sock: Socket which provides route info
1298571912c6SMartin Varghese  *      @saddr: Memory to store the src ip address
1299571912c6SMartin Varghese  *      @info: Tunnel information
1300571912c6SMartin Varghese  *      @protocol: IP protocol
1301b51cd7c8SAndrew Lunn  *      @use_cache: Flag to enable cache usage
1302571912c6SMartin Varghese  *      This function performs a route lookup on a tunnel
1303571912c6SMartin Varghese  *
1304571912c6SMartin Varghese  *      It returns a valid dst pointer and stores src address to be used in
1305571912c6SMartin Varghese  *      tunnel in param saddr on success, else a pointer encoded error code.
1306571912c6SMartin Varghese  */
1307571912c6SMartin Varghese 
1308571912c6SMartin Varghese struct dst_entry *ip6_dst_lookup_tunnel(struct sk_buff *skb,
1309571912c6SMartin Varghese 					struct net_device *dev,
1310571912c6SMartin Varghese 					struct net *net,
1311571912c6SMartin Varghese 					struct socket *sock,
1312571912c6SMartin Varghese 					struct in6_addr *saddr,
1313571912c6SMartin Varghese 					const struct ip_tunnel_info *info,
1314571912c6SMartin Varghese 					u8 protocol,
1315571912c6SMartin Varghese 					bool use_cache)
1316571912c6SMartin Varghese {
1317571912c6SMartin Varghese 	struct dst_entry *dst = NULL;
1318571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE
1319571912c6SMartin Varghese 	struct dst_cache *dst_cache;
1320571912c6SMartin Varghese #endif
1321571912c6SMartin Varghese 	struct flowi6 fl6;
1322571912c6SMartin Varghese 	__u8 prio;
1323571912c6SMartin Varghese 
1324571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE
1325571912c6SMartin Varghese 	dst_cache = (struct dst_cache *)&info->dst_cache;
1326571912c6SMartin Varghese 	if (use_cache) {
1327571912c6SMartin Varghese 		dst = dst_cache_get_ip6(dst_cache, saddr);
1328571912c6SMartin Varghese 		if (dst)
1329571912c6SMartin Varghese 			return dst;
1330571912c6SMartin Varghese 	}
1331571912c6SMartin Varghese #endif
1332571912c6SMartin Varghese 	memset(&fl6, 0, sizeof(fl6));
1333571912c6SMartin Varghese 	fl6.flowi6_mark = skb->mark;
1334571912c6SMartin Varghese 	fl6.flowi6_proto = protocol;
1335571912c6SMartin Varghese 	fl6.daddr = info->key.u.ipv6.dst;
1336571912c6SMartin Varghese 	fl6.saddr = info->key.u.ipv6.src;
1337571912c6SMartin Varghese 	prio = info->key.tos;
1338ab7e2e0dSMatthias May 	fl6.flowlabel = ip6_make_flowinfo(prio, info->key.label);
1339571912c6SMartin Varghese 
1340571912c6SMartin Varghese 	dst = ipv6_stub->ipv6_dst_lookup_flow(net, sock->sk, &fl6,
1341571912c6SMartin Varghese 					      NULL);
1342571912c6SMartin Varghese 	if (IS_ERR(dst)) {
1343571912c6SMartin Varghese 		netdev_dbg(dev, "no route to %pI6\n", &fl6.daddr);
1344571912c6SMartin Varghese 		return ERR_PTR(-ENETUNREACH);
1345571912c6SMartin Varghese 	}
1346571912c6SMartin Varghese 	if (dst->dev == dev) { /* is this necessary? */
1347571912c6SMartin Varghese 		netdev_dbg(dev, "circular route to %pI6\n", &fl6.daddr);
1348571912c6SMartin Varghese 		dst_release(dst);
1349571912c6SMartin Varghese 		return ERR_PTR(-ELOOP);
1350571912c6SMartin Varghese 	}
1351571912c6SMartin Varghese #ifdef CONFIG_DST_CACHE
1352571912c6SMartin Varghese 	if (use_cache)
1353571912c6SMartin Varghese 		dst_cache_set_ip6(dst_cache, dst, &fl6.saddr);
1354571912c6SMartin Varghese #endif
1355571912c6SMartin Varghese 	*saddr = fl6.saddr;
1356571912c6SMartin Varghese 	return dst;
1357571912c6SMartin Varghese }
1358571912c6SMartin Varghese EXPORT_SYMBOL_GPL(ip6_dst_lookup_tunnel);
1359571912c6SMartin Varghese 
13600178b695SHerbert Xu static inline struct ipv6_opt_hdr *ip6_opt_dup(struct ipv6_opt_hdr *src,
13610178b695SHerbert Xu 					       gfp_t gfp)
13620178b695SHerbert Xu {
13630178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
13640178b695SHerbert Xu }
13650178b695SHerbert Xu 
13660178b695SHerbert Xu static inline struct ipv6_rt_hdr *ip6_rthdr_dup(struct ipv6_rt_hdr *src,
13670178b695SHerbert Xu 						gfp_t gfp)
13680178b695SHerbert Xu {
13690178b695SHerbert Xu 	return src ? kmemdup(src, (src->hdrlen + 1) * 8, gfp) : NULL;
13700178b695SHerbert Xu }
13710178b695SHerbert Xu 
137275a493e6SHannes Frederic Sowa static void ip6_append_data_mtu(unsigned int *mtu,
13730c183379SGao feng 				int *maxfraglen,
13740c183379SGao feng 				unsigned int fragheaderlen,
13750c183379SGao feng 				struct sk_buff *skb,
137675a493e6SHannes Frederic Sowa 				struct rt6_info *rt,
1377e367c2d0Slucien 				unsigned int orig_mtu)
13780c183379SGao feng {
13790c183379SGao feng 	if (!(rt->dst.flags & DST_XFRM_TUNNEL)) {
138063159f29SIan Morris 		if (!skb) {
13810c183379SGao feng 			/* first fragment, reserve header_len */
1382e367c2d0Slucien 			*mtu = orig_mtu - rt->dst.header_len;
13830c183379SGao feng 
13840c183379SGao feng 		} else {
13850c183379SGao feng 			/*
13860c183379SGao feng 			 * this fragment is not first, the headers
13870c183379SGao feng 			 * space is regarded as data space.
13880c183379SGao feng 			 */
1389e367c2d0Slucien 			*mtu = orig_mtu;
13900c183379SGao feng 		}
13910c183379SGao feng 		*maxfraglen = ((*mtu - fragheaderlen) & ~7)
13920c183379SGao feng 			      + fragheaderlen - sizeof(struct frag_hdr);
13930c183379SGao feng 	}
13940c183379SGao feng }
13950c183379SGao feng 
1396366e41d9SVlad Yasevich static int ip6_setup_cork(struct sock *sk, struct inet_cork_full *cork,
139726879da5SWei Wang 			  struct inet6_cork *v6_cork, struct ipcm6_cookie *ipc6,
1398f37a4cc6SPavel Begunkov 			  struct rt6_info *rt)
1399366e41d9SVlad Yasevich {
1400366e41d9SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
1401366e41d9SVlad Yasevich 	unsigned int mtu;
1402d656b2eaSPavel Begunkov 	struct ipv6_txoptions *nopt, *opt = ipc6->opt;
1403366e41d9SVlad Yasevich 
140440ac240cSPavel Begunkov 	/* callers pass dst together with a reference, set it first so
140540ac240cSPavel Begunkov 	 * ip6_cork_release() can put it down even in case of an error.
140640ac240cSPavel Begunkov 	 */
140740ac240cSPavel Begunkov 	cork->base.dst = &rt->dst;
140840ac240cSPavel Begunkov 
1409366e41d9SVlad Yasevich 	/*
1410366e41d9SVlad Yasevich 	 * setup for corking
1411366e41d9SVlad Yasevich 	 */
1412366e41d9SVlad Yasevich 	if (opt) {
1413366e41d9SVlad Yasevich 		if (WARN_ON(v6_cork->opt))
1414366e41d9SVlad Yasevich 			return -EINVAL;
1415366e41d9SVlad Yasevich 
1416d656b2eaSPavel Begunkov 		nopt = v6_cork->opt = kzalloc(sizeof(*opt), sk->sk_allocation);
1417d656b2eaSPavel Begunkov 		if (unlikely(!nopt))
1418366e41d9SVlad Yasevich 			return -ENOBUFS;
1419366e41d9SVlad Yasevich 
1420d656b2eaSPavel Begunkov 		nopt->tot_len = sizeof(*opt);
1421d656b2eaSPavel Begunkov 		nopt->opt_flen = opt->opt_flen;
1422d656b2eaSPavel Begunkov 		nopt->opt_nflen = opt->opt_nflen;
1423366e41d9SVlad Yasevich 
1424d656b2eaSPavel Begunkov 		nopt->dst0opt = ip6_opt_dup(opt->dst0opt, sk->sk_allocation);
1425d656b2eaSPavel Begunkov 		if (opt->dst0opt && !nopt->dst0opt)
1426366e41d9SVlad Yasevich 			return -ENOBUFS;
1427366e41d9SVlad Yasevich 
1428d656b2eaSPavel Begunkov 		nopt->dst1opt = ip6_opt_dup(opt->dst1opt, sk->sk_allocation);
1429d656b2eaSPavel Begunkov 		if (opt->dst1opt && !nopt->dst1opt)
1430366e41d9SVlad Yasevich 			return -ENOBUFS;
1431366e41d9SVlad Yasevich 
1432d656b2eaSPavel Begunkov 		nopt->hopopt = ip6_opt_dup(opt->hopopt, sk->sk_allocation);
1433d656b2eaSPavel Begunkov 		if (opt->hopopt && !nopt->hopopt)
1434366e41d9SVlad Yasevich 			return -ENOBUFS;
1435366e41d9SVlad Yasevich 
1436d656b2eaSPavel Begunkov 		nopt->srcrt = ip6_rthdr_dup(opt->srcrt, sk->sk_allocation);
1437d656b2eaSPavel Begunkov 		if (opt->srcrt && !nopt->srcrt)
1438366e41d9SVlad Yasevich 			return -ENOBUFS;
1439366e41d9SVlad Yasevich 
1440366e41d9SVlad Yasevich 		/* need source address above miyazawa*/
1441366e41d9SVlad Yasevich 	}
144226879da5SWei Wang 	v6_cork->hop_limit = ipc6->hlimit;
144326879da5SWei Wang 	v6_cork->tclass = ipc6->tclass;
1444366e41d9SVlad Yasevich 	if (rt->dst.flags & DST_XFRM_TUNNEL)
1445366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1446749439bfSMike Maloney 		      READ_ONCE(rt->dst.dev->mtu) : dst_mtu(&rt->dst);
1447366e41d9SVlad Yasevich 	else
1448366e41d9SVlad Yasevich 		mtu = np->pmtudisc >= IPV6_PMTUDISC_PROBE ?
1449c02b3741SDavid S. Miller 			READ_ONCE(rt->dst.dev->mtu) : dst_mtu(xfrm_dst_path(&rt->dst));
1450366e41d9SVlad Yasevich 	if (np->frag_size < mtu) {
1451366e41d9SVlad Yasevich 		if (np->frag_size)
1452366e41d9SVlad Yasevich 			mtu = np->frag_size;
1453366e41d9SVlad Yasevich 	}
1454366e41d9SVlad Yasevich 	cork->base.fragsize = mtu;
1455fbf47813SWillem de Bruijn 	cork->base.gso_size = ipc6->gso_size;
1456678ca42dSWillem de Bruijn 	cork->base.tx_flags = 0;
1457c6af0c22SWillem de Bruijn 	cork->base.mark = ipc6->sockc.mark;
1458678ca42dSWillem de Bruijn 	sock_tx_timestamp(sk, ipc6->sockc.tsflags, &cork->base.tx_flags);
1459bec1f6f6SWillem de Bruijn 
14600f6c480fSDavid Miller 	if (dst_allfrag(xfrm_dst_path(&rt->dst)))
1461366e41d9SVlad Yasevich 		cork->base.flags |= IPCORK_ALLFRAG;
1462366e41d9SVlad Yasevich 	cork->base.length = 0;
1463366e41d9SVlad Yasevich 
14645fdaa88dSWillem de Bruijn 	cork->base.transmit_time = ipc6->sockc.transmit_time;
1465a818f75eSJesus Sanchez-Palencia 
1466366e41d9SVlad Yasevich 	return 0;
1467366e41d9SVlad Yasevich }
1468366e41d9SVlad Yasevich 
14690bbe84a6SVlad Yasevich static int __ip6_append_data(struct sock *sk,
14700bbe84a6SVlad Yasevich 			     struct sk_buff_head *queue,
1471f3b46a3eSPavel Begunkov 			     struct inet_cork_full *cork_full,
14720bbe84a6SVlad Yasevich 			     struct inet6_cork *v6_cork,
14730bbe84a6SVlad Yasevich 			     struct page_frag *pfrag,
14740bbe84a6SVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
14750bbe84a6SVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
1476f93431c8SWang Yufen 			     void *from, size_t length, int transhdrlen,
14775fdaa88dSWillem de Bruijn 			     unsigned int flags, struct ipcm6_cookie *ipc6)
14781da177e4SLinus Torvalds {
14790c183379SGao feng 	struct sk_buff *skb, *skb_prev = NULL;
1480f3b46a3eSPavel Begunkov 	struct inet_cork *cork = &cork_full->base;
1481f37a4cc6SPavel Begunkov 	struct flowi6 *fl6 = &cork_full->fl.u.ip6;
148210b8a3deSPaolo Abeni 	unsigned int maxfraglen, fragheaderlen, mtu, orig_mtu, pmtu;
1483b5947e5dSWillem de Bruijn 	struct ubuf_info *uarg = NULL;
14840bbe84a6SVlad Yasevich 	int exthdrlen = 0;
14850bbe84a6SVlad Yasevich 	int dst_exthdrlen = 0;
14861da177e4SLinus Torvalds 	int hh_len;
14871da177e4SLinus Torvalds 	int copy;
14881da177e4SLinus Torvalds 	int err;
14891da177e4SLinus Torvalds 	int offset = 0;
1490773ba4feSPavel Begunkov 	bool zc = false;
149109c2d251SWillem de Bruijn 	u32 tskey = 0;
14920bbe84a6SVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->dst;
14930bbe84a6SVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
149432dce968SVlad Yasevich 	int csummode = CHECKSUM_NONE;
1495682b1a9dSHannes Frederic Sowa 	unsigned int maxnonfragsize, headersize;
14961f4c6eb2SEric Dumazet 	unsigned int wmem_alloc_delta = 0;
1497100f6d8eSWillem de Bruijn 	bool paged, extra_uref = false;
14981da177e4SLinus Torvalds 
14990bbe84a6SVlad Yasevich 	skb = skb_peek_tail(queue);
15000bbe84a6SVlad Yasevich 	if (!skb) {
15010bbe84a6SVlad Yasevich 		exthdrlen = opt ? opt->opt_flen : 0;
15027efdba5bSRomain KUNTZ 		dst_exthdrlen = rt->dst.header_len - rt->rt6i_nfheader_len;
15031da177e4SLinus Torvalds 	}
15040bbe84a6SVlad Yasevich 
150515e36f5bSWillem de Bruijn 	paged = !!cork->gso_size;
1506bec1f6f6SWillem de Bruijn 	mtu = cork->gso_size ? IP6_MAX_MTU : cork->fragsize;
1507e367c2d0Slucien 	orig_mtu = mtu;
15081da177e4SLinus Torvalds 
15098ca5a579SVadim Fedorenko 	if (cork->tx_flags & SKBTX_ANY_TSTAMP &&
1510e3390b30SEric Dumazet 	    READ_ONCE(sk->sk_tsflags) & SOF_TIMESTAMPING_OPT_ID)
1511a1cdec57SEric Dumazet 		tskey = atomic_inc_return(&sk->sk_tskey) - 1;
1512678ca42dSWillem de Bruijn 
1513d8d1f30bSChangli Gao 	hh_len = LL_RESERVED_SPACE(rt->dst.dev);
15141da177e4SLinus Torvalds 
1515a1b05140SMasahide NAKAMURA 	fragheaderlen = sizeof(struct ipv6hdr) + rt->rt6i_nfheader_len +
1516b4ce9277SHerbert Xu 			(opt ? opt->opt_nflen : 0);
15171da177e4SLinus Torvalds 
15184df98e76SHannes Frederic Sowa 	headersize = sizeof(struct ipv6hdr) +
15193a1cebe7SHannes Frederic Sowa 		     (opt ? opt->opt_flen + opt->opt_nflen : 0) +
15204df98e76SHannes Frederic Sowa 		     (dst_allfrag(&rt->dst) ?
15214df98e76SHannes Frederic Sowa 		      sizeof(struct frag_hdr) : 0) +
15224df98e76SHannes Frederic Sowa 		     rt->rt6i_nfheader_len;
15234df98e76SHannes Frederic Sowa 
15245e34af41STadeusz Struk 	if (mtu <= fragheaderlen ||
15255e34af41STadeusz Struk 	    ((mtu - fragheaderlen) & ~7) + fragheaderlen <= sizeof(struct frag_hdr))
15266596a022SJiri Bohac 		goto emsgsize;
15276596a022SJiri Bohac 
15286596a022SJiri Bohac 	maxfraglen = ((mtu - fragheaderlen) & ~7) + fragheaderlen -
15296596a022SJiri Bohac 		     sizeof(struct frag_hdr);
15306596a022SJiri Bohac 
153110b8a3deSPaolo Abeni 	/* as per RFC 7112 section 5, the entire IPv6 Header Chain must fit
153210b8a3deSPaolo Abeni 	 * the first fragment
153310b8a3deSPaolo Abeni 	 */
153410b8a3deSPaolo Abeni 	if (headersize + transhdrlen > mtu)
153510b8a3deSPaolo Abeni 		goto emsgsize;
153610b8a3deSPaolo Abeni 
153726879da5SWei Wang 	if (cork->length + length > mtu - headersize && ipc6->dontfrag &&
15384df98e76SHannes Frederic Sowa 	    (sk->sk_protocol == IPPROTO_UDP ||
153913651224SJakub Kicinski 	     sk->sk_protocol == IPPROTO_ICMPV6 ||
15404df98e76SHannes Frederic Sowa 	     sk->sk_protocol == IPPROTO_RAW)) {
15414df98e76SHannes Frederic Sowa 		ipv6_local_rxpmtu(sk, fl6, mtu - headersize +
15424df98e76SHannes Frederic Sowa 				sizeof(struct ipv6hdr));
15434df98e76SHannes Frederic Sowa 		goto emsgsize;
15444df98e76SHannes Frederic Sowa 	}
15454df98e76SHannes Frederic Sowa 
1546682b1a9dSHannes Frederic Sowa 	if (ip6_sk_ignore_df(sk))
1547682b1a9dSHannes Frederic Sowa 		maxnonfragsize = sizeof(struct ipv6hdr) + IPV6_MAXPLEN;
1548682b1a9dSHannes Frederic Sowa 	else
1549682b1a9dSHannes Frederic Sowa 		maxnonfragsize = mtu;
1550682b1a9dSHannes Frederic Sowa 
15514df98e76SHannes Frederic Sowa 	if (cork->length + length > maxnonfragsize - headersize) {
15524df98e76SHannes Frederic Sowa emsgsize:
155310b8a3deSPaolo Abeni 		pmtu = max_t(int, mtu - headersize + sizeof(struct ipv6hdr), 0);
155410b8a3deSPaolo Abeni 		ipv6_local_error(sk, EMSGSIZE, fl6, pmtu);
15551da177e4SLinus Torvalds 		return -EMSGSIZE;
15561da177e4SLinus Torvalds 	}
1557682b1a9dSHannes Frederic Sowa 
1558682b1a9dSHannes Frederic Sowa 	/* CHECKSUM_PARTIAL only with no extension headers and when
1559682b1a9dSHannes Frederic Sowa 	 * we are not going to fragment
1560682b1a9dSHannes Frederic Sowa 	 */
1561682b1a9dSHannes Frederic Sowa 	if (transhdrlen && sk->sk_protocol == IPPROTO_UDP &&
1562682b1a9dSHannes Frederic Sowa 	    headersize == sizeof(struct ipv6hdr) &&
15632b89ed65SVlad Yasevich 	    length <= mtu - headersize &&
1564bec1f6f6SWillem de Bruijn 	    (!(flags & MSG_MORE) || cork->gso_size) &&
1565c8cd0989STom Herbert 	    rt->dst.dev->features & (NETIF_F_IPV6_CSUM | NETIF_F_HW_CSUM))
1566682b1a9dSHannes Frederic Sowa 		csummode = CHECKSUM_PARTIAL;
15671da177e4SLinus Torvalds 
15681fd3ae8cSPavel Begunkov 	if ((flags & MSG_ZEROCOPY) && length) {
15691fd3ae8cSPavel Begunkov 		struct msghdr *msg = from;
15701fd3ae8cSPavel Begunkov 
15711fd3ae8cSPavel Begunkov 		if (getfrag == ip_generic_getfrag && msg->msg_ubuf) {
15721fd3ae8cSPavel Begunkov 			if (skb_zcopy(skb) && msg->msg_ubuf != skb_zcopy(skb))
15731fd3ae8cSPavel Begunkov 				return -EINVAL;
15741fd3ae8cSPavel Begunkov 
15751fd3ae8cSPavel Begunkov 			/* Leave uarg NULL if can't zerocopy, callers should
15761fd3ae8cSPavel Begunkov 			 * be able to handle it.
15771fd3ae8cSPavel Begunkov 			 */
15781fd3ae8cSPavel Begunkov 			if ((rt->dst.dev->features & NETIF_F_SG) &&
15791fd3ae8cSPavel Begunkov 			    csummode == CHECKSUM_PARTIAL) {
15801fd3ae8cSPavel Begunkov 				paged = true;
15811fd3ae8cSPavel Begunkov 				zc = true;
15821fd3ae8cSPavel Begunkov 				uarg = msg->msg_ubuf;
15831fd3ae8cSPavel Begunkov 			}
15841fd3ae8cSPavel Begunkov 		} else if (sock_flag(sk, SOCK_ZEROCOPY)) {
15858c793822SJonathan Lemon 			uarg = msg_zerocopy_realloc(sk, length, skb_zcopy(skb));
1586b5947e5dSWillem de Bruijn 			if (!uarg)
1587b5947e5dSWillem de Bruijn 				return -ENOBUFS;
1588522924b5SWillem de Bruijn 			extra_uref = !skb_zcopy(skb);	/* only ref on new uarg */
1589b5947e5dSWillem de Bruijn 			if (rt->dst.dev->features & NETIF_F_SG &&
1590b5947e5dSWillem de Bruijn 			    csummode == CHECKSUM_PARTIAL) {
1591b5947e5dSWillem de Bruijn 				paged = true;
1592773ba4feSPavel Begunkov 				zc = true;
1593b5947e5dSWillem de Bruijn 			} else {
1594e7d2b510SPavel Begunkov 				uarg_to_msgzc(uarg)->zerocopy = 0;
159552900d22SWillem de Bruijn 				skb_zcopy_set(skb, uarg, &extra_uref);
1596b5947e5dSWillem de Bruijn 			}
1597b5947e5dSWillem de Bruijn 		}
15986d8192bdSDavid Howells 	} else if ((flags & MSG_SPLICE_PAGES) && length) {
1599cafbe182SEric Dumazet 		if (inet_test_bit(HDRINCL, sk))
16006d8192bdSDavid Howells 			return -EPERM;
16015a6f6873SDavid Howells 		if (rt->dst.dev->features & NETIF_F_SG &&
16025a6f6873SDavid Howells 		    getfrag == ip_generic_getfrag)
16036d8192bdSDavid Howells 			/* We need an empty buffer to attach stuff to */
16046d8192bdSDavid Howells 			paged = true;
16056d8192bdSDavid Howells 		else
16066d8192bdSDavid Howells 			flags &= ~MSG_SPLICE_PAGES;
16071fd3ae8cSPavel Begunkov 	}
1608b5947e5dSWillem de Bruijn 
16091da177e4SLinus Torvalds 	/*
16101da177e4SLinus Torvalds 	 * Let's try using as much space as possible.
16111da177e4SLinus Torvalds 	 * Use MTU if total length of the message fits into the MTU.
16121da177e4SLinus Torvalds 	 * Otherwise, we need to reserve fragment header and
16131da177e4SLinus Torvalds 	 * fragment alignment (= 8-15 octects, in total).
16141da177e4SLinus Torvalds 	 *
1615634a63e7SRandy Dunlap 	 * Note that we may need to "move" the data from the tail
16161da177e4SLinus Torvalds 	 * of the buffer to the new fragment when we split
16171da177e4SLinus Torvalds 	 * the message.
16181da177e4SLinus Torvalds 	 *
16191da177e4SLinus Torvalds 	 * FIXME: It may be fragmented into multiple chunks
16201da177e4SLinus Torvalds 	 *        at once if non-fragmentable extension headers
16211da177e4SLinus Torvalds 	 *        are too large.
16221da177e4SLinus Torvalds 	 * --yoshfuji
16231da177e4SLinus Torvalds 	 */
16241da177e4SLinus Torvalds 
16252811ebacSHannes Frederic Sowa 	cork->length += length;
16262811ebacSHannes Frederic Sowa 	if (!skb)
16271da177e4SLinus Torvalds 		goto alloc_new_skb;
16281da177e4SLinus Torvalds 
16291da177e4SLinus Torvalds 	while (length > 0) {
16301da177e4SLinus Torvalds 		/* Check if the remaining data fits into current packet. */
1631bdc712b4SDavid S. Miller 		copy = (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - skb->len;
16321da177e4SLinus Torvalds 		if (copy < length)
16331da177e4SLinus Torvalds 			copy = maxfraglen - skb->len;
16341da177e4SLinus Torvalds 
16351da177e4SLinus Torvalds 		if (copy <= 0) {
16361da177e4SLinus Torvalds 			char *data;
16371da177e4SLinus Torvalds 			unsigned int datalen;
16381da177e4SLinus Torvalds 			unsigned int fraglen;
16391da177e4SLinus Torvalds 			unsigned int fraggap;
16406d123b81SJakub Kicinski 			unsigned int alloclen, alloc_extra;
1641aba36930SWillem de Bruijn 			unsigned int pagedlen;
16421da177e4SLinus Torvalds alloc_new_skb:
16431da177e4SLinus Torvalds 			/* There's no room in the current skb */
16440c183379SGao feng 			if (skb)
16450c183379SGao feng 				fraggap = skb->len - maxfraglen;
16461da177e4SLinus Torvalds 			else
16471da177e4SLinus Torvalds 				fraggap = 0;
16480c183379SGao feng 			/* update mtu and maxfraglen if necessary */
164963159f29SIan Morris 			if (!skb || !skb_prev)
16500c183379SGao feng 				ip6_append_data_mtu(&mtu, &maxfraglen,
165175a493e6SHannes Frederic Sowa 						    fragheaderlen, skb, rt,
1652e367c2d0Slucien 						    orig_mtu);
16530c183379SGao feng 
16540c183379SGao feng 			skb_prev = skb;
16551da177e4SLinus Torvalds 
16561da177e4SLinus Torvalds 			/*
16571da177e4SLinus Torvalds 			 * If remaining data exceeds the mtu,
16581da177e4SLinus Torvalds 			 * we know we need more fragment(s).
16591da177e4SLinus Torvalds 			 */
16601da177e4SLinus Torvalds 			datalen = length + fraggap;
16611da177e4SLinus Torvalds 
16620c183379SGao feng 			if (datalen > (cork->length <= mtu && !(cork->flags & IPCORK_ALLFRAG) ? mtu : maxfraglen) - fragheaderlen)
16630c183379SGao feng 				datalen = maxfraglen - fragheaderlen - rt->dst.trailer_len;
166415e36f5bSWillem de Bruijn 			fraglen = datalen + fragheaderlen;
1665aba36930SWillem de Bruijn 			pagedlen = 0;
166615e36f5bSWillem de Bruijn 
16676d123b81SJakub Kicinski 			alloc_extra = hh_len;
16686d123b81SJakub Kicinski 			alloc_extra += dst_exthdrlen;
16696d123b81SJakub Kicinski 			alloc_extra += rt->dst.trailer_len;
16706d123b81SJakub Kicinski 
16716d123b81SJakub Kicinski 			/* We just reserve space for fragment header.
16726d123b81SJakub Kicinski 			 * Note: this may be overallocation if the message
16736d123b81SJakub Kicinski 			 * (without MSG_MORE) fits into the MTU.
16746d123b81SJakub Kicinski 			 */
16756d123b81SJakub Kicinski 			alloc_extra += sizeof(struct frag_hdr);
16766d123b81SJakub Kicinski 
16771da177e4SLinus Torvalds 			if ((flags & MSG_MORE) &&
1678d8d1f30bSChangli Gao 			    !(rt->dst.dev->features&NETIF_F_SG))
16791da177e4SLinus Torvalds 				alloclen = mtu;
16806d123b81SJakub Kicinski 			else if (!paged &&
16816d123b81SJakub Kicinski 				 (fraglen + alloc_extra < SKB_MAX_ALLOC ||
16826d123b81SJakub Kicinski 				  !(rt->dst.dev->features & NETIF_F_SG)))
168315e36f5bSWillem de Bruijn 				alloclen = fraglen;
168447cf8899SPavel Begunkov 			else {
1685773ba4feSPavel Begunkov 				alloclen = fragheaderlen + transhdrlen;
1686773ba4feSPavel Begunkov 				pagedlen = datalen - transhdrlen;
168715e36f5bSWillem de Bruijn 			}
16886d123b81SJakub Kicinski 			alloclen += alloc_extra;
1689299b0767SSteffen Klassert 
16900c183379SGao feng 			if (datalen != length + fraggap) {
16911da177e4SLinus Torvalds 				/*
16920c183379SGao feng 				 * this is not the last fragment, the trailer
16930c183379SGao feng 				 * space is regarded as data space.
16941da177e4SLinus Torvalds 				 */
16950c183379SGao feng 				datalen += rt->dst.trailer_len;
16960c183379SGao feng 			}
16970c183379SGao feng 
16980c183379SGao feng 			fraglen = datalen + fragheaderlen;
16991da177e4SLinus Torvalds 
170015e36f5bSWillem de Bruijn 			copy = datalen - transhdrlen - fraggap - pagedlen;
1701ce650a16SDavid Howells 			/* [!] NOTE: copy may be negative if pagedlen>0
1702ce650a16SDavid Howells 			 * because then the equation may reduces to -fraggap.
1703ce650a16SDavid Howells 			 */
1704ce650a16SDavid Howells 			if (copy < 0 && !(flags & MSG_SPLICE_PAGES)) {
1705232cd35dSEric Dumazet 				err = -EINVAL;
1706232cd35dSEric Dumazet 				goto error;
1707232cd35dSEric Dumazet 			}
17081da177e4SLinus Torvalds 			if (transhdrlen) {
17096d123b81SJakub Kicinski 				skb = sock_alloc_send_skb(sk, alloclen,
17101da177e4SLinus Torvalds 						(flags & MSG_DONTWAIT), &err);
17111da177e4SLinus Torvalds 			} else {
17121da177e4SLinus Torvalds 				skb = NULL;
17131f4c6eb2SEric Dumazet 				if (refcount_read(&sk->sk_wmem_alloc) + wmem_alloc_delta <=
17141da177e4SLinus Torvalds 				    2 * sk->sk_sndbuf)
17156d123b81SJakub Kicinski 					skb = alloc_skb(alloclen,
17161da177e4SLinus Torvalds 							sk->sk_allocation);
171763159f29SIan Morris 				if (unlikely(!skb))
17181da177e4SLinus Torvalds 					err = -ENOBUFS;
17191da177e4SLinus Torvalds 			}
172063159f29SIan Morris 			if (!skb)
17211da177e4SLinus Torvalds 				goto error;
17221da177e4SLinus Torvalds 			/*
17231da177e4SLinus Torvalds 			 *	Fill in the control structures
17241da177e4SLinus Torvalds 			 */
17259c9c9ad5SHannes Frederic Sowa 			skb->protocol = htons(ETH_P_IPV6);
172632dce968SVlad Yasevich 			skb->ip_summed = csummode;
17271da177e4SLinus Torvalds 			skb->csum = 0;
17281f85851eSGao feng 			/* reserve for fragmentation and ipsec header */
17291f85851eSGao feng 			skb_reserve(skb, hh_len + sizeof(struct frag_hdr) +
17301f85851eSGao feng 				    dst_exthdrlen);
17311da177e4SLinus Torvalds 
17321da177e4SLinus Torvalds 			/*
17331da177e4SLinus Torvalds 			 *	Find where to start putting bytes
17341da177e4SLinus Torvalds 			 */
173515e36f5bSWillem de Bruijn 			data = skb_put(skb, fraglen - pagedlen);
17361f85851eSGao feng 			skb_set_network_header(skb, exthdrlen);
17371f85851eSGao feng 			data += fragheaderlen;
1738b0e380b1SArnaldo Carvalho de Melo 			skb->transport_header = (skb->network_header +
1739b0e380b1SArnaldo Carvalho de Melo 						 fragheaderlen);
17401da177e4SLinus Torvalds 			if (fraggap) {
17411da177e4SLinus Torvalds 				skb->csum = skb_copy_and_csum_bits(
17421da177e4SLinus Torvalds 					skb_prev, maxfraglen,
17438d5930dfSAl Viro 					data + transhdrlen, fraggap);
17441da177e4SLinus Torvalds 				skb_prev->csum = csum_sub(skb_prev->csum,
17451da177e4SLinus Torvalds 							  skb->csum);
17461da177e4SLinus Torvalds 				data += fraggap;
1747e9fa4f7bSHerbert Xu 				pskb_trim_unique(skb_prev, maxfraglen);
17481da177e4SLinus Torvalds 			}
1749232cd35dSEric Dumazet 			if (copy > 0 &&
1750232cd35dSEric Dumazet 			    getfrag(from, data + transhdrlen, offset,
1751232cd35dSEric Dumazet 				    copy, fraggap, skb) < 0) {
17521da177e4SLinus Torvalds 				err = -EFAULT;
17531da177e4SLinus Torvalds 				kfree_skb(skb);
17541da177e4SLinus Torvalds 				goto error;
1755ce650a16SDavid Howells 			} else if (flags & MSG_SPLICE_PAGES) {
1756ce650a16SDavid Howells 				copy = 0;
17571da177e4SLinus Torvalds 			}
17581da177e4SLinus Torvalds 
17591da177e4SLinus Torvalds 			offset += copy;
176015e36f5bSWillem de Bruijn 			length -= copy + transhdrlen;
17611da177e4SLinus Torvalds 			transhdrlen = 0;
17621da177e4SLinus Torvalds 			exthdrlen = 0;
1763299b0767SSteffen Klassert 			dst_exthdrlen = 0;
17641da177e4SLinus Torvalds 
176552900d22SWillem de Bruijn 			/* Only the initial fragment is time stamped */
176652900d22SWillem de Bruijn 			skb_shinfo(skb)->tx_flags = cork->tx_flags;
176752900d22SWillem de Bruijn 			cork->tx_flags = 0;
176852900d22SWillem de Bruijn 			skb_shinfo(skb)->tskey = tskey;
176952900d22SWillem de Bruijn 			tskey = 0;
177052900d22SWillem de Bruijn 			skb_zcopy_set(skb, uarg, &extra_uref);
177152900d22SWillem de Bruijn 
17720dec879fSJulian Anastasov 			if ((flags & MSG_CONFIRM) && !skb_prev)
17730dec879fSJulian Anastasov 				skb_set_dst_pending_confirm(skb, 1);
17740dec879fSJulian Anastasov 
17751da177e4SLinus Torvalds 			/*
17761da177e4SLinus Torvalds 			 * Put the packet on the pending queue
17771da177e4SLinus Torvalds 			 */
17781f4c6eb2SEric Dumazet 			if (!skb->destructor) {
17791f4c6eb2SEric Dumazet 				skb->destructor = sock_wfree;
17801f4c6eb2SEric Dumazet 				skb->sk = sk;
17811f4c6eb2SEric Dumazet 				wmem_alloc_delta += skb->truesize;
17821f4c6eb2SEric Dumazet 			}
17830bbe84a6SVlad Yasevich 			__skb_queue_tail(queue, skb);
17841da177e4SLinus Torvalds 			continue;
17851da177e4SLinus Torvalds 		}
17861da177e4SLinus Torvalds 
17871da177e4SLinus Torvalds 		if (copy > length)
17881da177e4SLinus Torvalds 			copy = length;
17891da177e4SLinus Torvalds 
1790113f99c3SWillem de Bruijn 		if (!(rt->dst.dev->features&NETIF_F_SG) &&
1791113f99c3SWillem de Bruijn 		    skb_tailroom(skb) >= copy) {
17921da177e4SLinus Torvalds 			unsigned int off;
17931da177e4SLinus Torvalds 
17941da177e4SLinus Torvalds 			off = skb->len;
17951da177e4SLinus Torvalds 			if (getfrag(from, skb_put(skb, copy),
17961da177e4SLinus Torvalds 						offset, copy, off, skb) < 0) {
17971da177e4SLinus Torvalds 				__skb_trim(skb, off);
17981da177e4SLinus Torvalds 				err = -EFAULT;
17991da177e4SLinus Torvalds 				goto error;
18001da177e4SLinus Torvalds 			}
18016d8192bdSDavid Howells 		} else if (flags & MSG_SPLICE_PAGES) {
18026d8192bdSDavid Howells 			struct msghdr *msg = from;
18036d8192bdSDavid Howells 
1804ce650a16SDavid Howells 			err = -EIO;
1805ce650a16SDavid Howells 			if (WARN_ON_ONCE(copy > msg->msg_iter.count))
1806ce650a16SDavid Howells 				goto error;
1807ce650a16SDavid Howells 
18086d8192bdSDavid Howells 			err = skb_splice_from_iter(skb, &msg->msg_iter, copy,
18096d8192bdSDavid Howells 						   sk->sk_allocation);
18106d8192bdSDavid Howells 			if (err < 0)
18116d8192bdSDavid Howells 				goto error;
18126d8192bdSDavid Howells 			copy = err;
18136d8192bdSDavid Howells 			wmem_alloc_delta += copy;
18141fd3ae8cSPavel Begunkov 		} else if (!zc) {
18151da177e4SLinus Torvalds 			int i = skb_shinfo(skb)->nr_frags;
18161da177e4SLinus Torvalds 
18171da177e4SLinus Torvalds 			err = -ENOMEM;
18185640f768SEric Dumazet 			if (!sk_page_frag_refill(sk, pfrag))
18191da177e4SLinus Torvalds 				goto error;
18201da177e4SLinus Torvalds 
18211fd3ae8cSPavel Begunkov 			skb_zcopy_downgrade_managed(skb);
18225640f768SEric Dumazet 			if (!skb_can_coalesce(skb, i, pfrag->page,
18235640f768SEric Dumazet 					      pfrag->offset)) {
18241da177e4SLinus Torvalds 				err = -EMSGSIZE;
18255640f768SEric Dumazet 				if (i == MAX_SKB_FRAGS)
18261da177e4SLinus Torvalds 					goto error;
18275640f768SEric Dumazet 
18285640f768SEric Dumazet 				__skb_fill_page_desc(skb, i, pfrag->page,
18295640f768SEric Dumazet 						     pfrag->offset, 0);
18305640f768SEric Dumazet 				skb_shinfo(skb)->nr_frags = ++i;
18315640f768SEric Dumazet 				get_page(pfrag->page);
18321da177e4SLinus Torvalds 			}
18335640f768SEric Dumazet 			copy = min_t(int, copy, pfrag->size - pfrag->offset);
18349e903e08SEric Dumazet 			if (getfrag(from,
18355640f768SEric Dumazet 				    page_address(pfrag->page) + pfrag->offset,
18365640f768SEric Dumazet 				    offset, copy, skb->len, skb) < 0)
18375640f768SEric Dumazet 				goto error_efault;
18385640f768SEric Dumazet 
18395640f768SEric Dumazet 			pfrag->offset += copy;
18405640f768SEric Dumazet 			skb_frag_size_add(&skb_shinfo(skb)->frags[i - 1], copy);
18411da177e4SLinus Torvalds 			skb->len += copy;
18421da177e4SLinus Torvalds 			skb->data_len += copy;
1843f945fa7aSHerbert Xu 			skb->truesize += copy;
18441f4c6eb2SEric Dumazet 			wmem_alloc_delta += copy;
1845b5947e5dSWillem de Bruijn 		} else {
1846b5947e5dSWillem de Bruijn 			err = skb_zerocopy_iter_dgram(skb, from, copy);
1847b5947e5dSWillem de Bruijn 			if (err < 0)
1848b5947e5dSWillem de Bruijn 				goto error;
18491da177e4SLinus Torvalds 		}
18501da177e4SLinus Torvalds 		offset += copy;
18511da177e4SLinus Torvalds 		length -= copy;
18521da177e4SLinus Torvalds 	}
18535640f768SEric Dumazet 
18549e8445a5SPaolo Abeni 	if (wmem_alloc_delta)
18551f4c6eb2SEric Dumazet 		refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
18561da177e4SLinus Torvalds 	return 0;
18575640f768SEric Dumazet 
18585640f768SEric Dumazet error_efault:
18595640f768SEric Dumazet 	err = -EFAULT;
18601da177e4SLinus Torvalds error:
18618e044917SJonathan Lemon 	net_zcopy_put_abort(uarg, extra_uref);
1862bdc712b4SDavid S. Miller 	cork->length -= length;
18633bd653c8SDenis V. Lunev 	IP6_INC_STATS(sock_net(sk), rt->rt6i_idev, IPSTATS_MIB_OUTDISCARDS);
18641f4c6eb2SEric Dumazet 	refcount_add(wmem_alloc_delta, &sk->sk_wmem_alloc);
18651da177e4SLinus Torvalds 	return err;
18661da177e4SLinus Torvalds }
18670bbe84a6SVlad Yasevich 
18680bbe84a6SVlad Yasevich int ip6_append_data(struct sock *sk,
18690bbe84a6SVlad Yasevich 		    int getfrag(void *from, char *to, int offset, int len,
18700bbe84a6SVlad Yasevich 				int odd, struct sk_buff *skb),
1871f93431c8SWang Yufen 		    void *from, size_t length, int transhdrlen,
187226879da5SWei Wang 		    struct ipcm6_cookie *ipc6, struct flowi6 *fl6,
18735fdaa88dSWillem de Bruijn 		    struct rt6_info *rt, unsigned int flags)
18740bbe84a6SVlad Yasevich {
18750bbe84a6SVlad Yasevich 	struct inet_sock *inet = inet_sk(sk);
18760bbe84a6SVlad Yasevich 	struct ipv6_pinfo *np = inet6_sk(sk);
18770bbe84a6SVlad Yasevich 	int exthdrlen;
18780bbe84a6SVlad Yasevich 	int err;
18790bbe84a6SVlad Yasevich 
18800bbe84a6SVlad Yasevich 	if (flags&MSG_PROBE)
18810bbe84a6SVlad Yasevich 		return 0;
18820bbe84a6SVlad Yasevich 	if (skb_queue_empty(&sk->sk_write_queue)) {
18830bbe84a6SVlad Yasevich 		/*
18840bbe84a6SVlad Yasevich 		 * setup for corking
18850bbe84a6SVlad Yasevich 		 */
188640ac240cSPavel Begunkov 		dst_hold(&rt->dst);
188726879da5SWei Wang 		err = ip6_setup_cork(sk, &inet->cork, &np->cork,
1888f37a4cc6SPavel Begunkov 				     ipc6, rt);
18890bbe84a6SVlad Yasevich 		if (err)
18900bbe84a6SVlad Yasevich 			return err;
18910bbe84a6SVlad Yasevich 
1892f37a4cc6SPavel Begunkov 		inet->cork.fl.u.ip6 = *fl6;
189326879da5SWei Wang 		exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
18940bbe84a6SVlad Yasevich 		length += exthdrlen;
18950bbe84a6SVlad Yasevich 		transhdrlen += exthdrlen;
18960bbe84a6SVlad Yasevich 	} else {
18970bbe84a6SVlad Yasevich 		transhdrlen = 0;
18980bbe84a6SVlad Yasevich 	}
18990bbe84a6SVlad Yasevich 
1900f37a4cc6SPavel Begunkov 	return __ip6_append_data(sk, &sk->sk_write_queue, &inet->cork,
19010bbe84a6SVlad Yasevich 				 &np->cork, sk_page_frag(sk), getfrag,
19025fdaa88dSWillem de Bruijn 				 from, length, transhdrlen, flags, ipc6);
19030bbe84a6SVlad Yasevich }
1904a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_append_data);
19051da177e4SLinus Torvalds 
1906cd3c7480SPavel Begunkov static void ip6_cork_steal_dst(struct sk_buff *skb, struct inet_cork_full *cork)
1907cd3c7480SPavel Begunkov {
1908cd3c7480SPavel Begunkov 	struct dst_entry *dst = cork->base.dst;
1909cd3c7480SPavel Begunkov 
1910cd3c7480SPavel Begunkov 	cork->base.dst = NULL;
1911cd3c7480SPavel Begunkov 	cork->base.flags &= ~IPCORK_ALLFRAG;
1912cd3c7480SPavel Begunkov 	skb_dst_set(skb, dst);
1913cd3c7480SPavel Begunkov }
1914cd3c7480SPavel Begunkov 
1915366e41d9SVlad Yasevich static void ip6_cork_release(struct inet_cork_full *cork,
1916366e41d9SVlad Yasevich 			     struct inet6_cork *v6_cork)
1917bf138862SPavel Emelyanov {
1918366e41d9SVlad Yasevich 	if (v6_cork->opt) {
1919d656b2eaSPavel Begunkov 		struct ipv6_txoptions *opt = v6_cork->opt;
1920d656b2eaSPavel Begunkov 
1921d656b2eaSPavel Begunkov 		kfree(opt->dst0opt);
1922d656b2eaSPavel Begunkov 		kfree(opt->dst1opt);
1923d656b2eaSPavel Begunkov 		kfree(opt->hopopt);
1924d656b2eaSPavel Begunkov 		kfree(opt->srcrt);
1925d656b2eaSPavel Begunkov 		kfree(opt);
1926366e41d9SVlad Yasevich 		v6_cork->opt = NULL;
19270178b695SHerbert Xu 	}
19280178b695SHerbert Xu 
1929366e41d9SVlad Yasevich 	if (cork->base.dst) {
1930366e41d9SVlad Yasevich 		dst_release(cork->base.dst);
1931366e41d9SVlad Yasevich 		cork->base.dst = NULL;
1932366e41d9SVlad Yasevich 		cork->base.flags &= ~IPCORK_ALLFRAG;
1933bf138862SPavel Emelyanov 	}
1934bf138862SPavel Emelyanov }
1935bf138862SPavel Emelyanov 
19366422398cSVlad Yasevich struct sk_buff *__ip6_make_skb(struct sock *sk,
19376422398cSVlad Yasevich 			       struct sk_buff_head *queue,
19386422398cSVlad Yasevich 			       struct inet_cork_full *cork,
19396422398cSVlad Yasevich 			       struct inet6_cork *v6_cork)
19401da177e4SLinus Torvalds {
19411da177e4SLinus Torvalds 	struct sk_buff *skb, *tmp_skb;
19421da177e4SLinus Torvalds 	struct sk_buff **tail_skb;
1943b60d4e58SPavel Begunkov 	struct in6_addr *final_dst;
19441da177e4SLinus Torvalds 	struct ipv6_pinfo *np = inet6_sk(sk);
19453bd653c8SDenis V. Lunev 	struct net *net = sock_net(sk);
19461da177e4SLinus Torvalds 	struct ipv6hdr *hdr;
19476422398cSVlad Yasevich 	struct ipv6_txoptions *opt = v6_cork->opt;
19486422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)cork->base.dst;
19496422398cSVlad Yasevich 	struct flowi6 *fl6 = &cork->fl.u.ip6;
19504c9483b2SDavid S. Miller 	unsigned char proto = fl6->flowi6_proto;
19511da177e4SLinus Torvalds 
19526422398cSVlad Yasevich 	skb = __skb_dequeue(queue);
195363159f29SIan Morris 	if (!skb)
19541da177e4SLinus Torvalds 		goto out;
19551da177e4SLinus Torvalds 	tail_skb = &(skb_shinfo(skb)->frag_list);
19561da177e4SLinus Torvalds 
19571da177e4SLinus Torvalds 	/* move skb->data to ip header from ext header */
1958d56f90a7SArnaldo Carvalho de Melo 	if (skb->data < skb_network_header(skb))
1959bbe735e4SArnaldo Carvalho de Melo 		__skb_pull(skb, skb_network_offset(skb));
19606422398cSVlad Yasevich 	while ((tmp_skb = __skb_dequeue(queue)) != NULL) {
1961cfe1fc77SArnaldo Carvalho de Melo 		__skb_pull(tmp_skb, skb_network_header_len(skb));
19621da177e4SLinus Torvalds 		*tail_skb = tmp_skb;
19631da177e4SLinus Torvalds 		tail_skb = &(tmp_skb->next);
19641da177e4SLinus Torvalds 		skb->len += tmp_skb->len;
19651da177e4SLinus Torvalds 		skb->data_len += tmp_skb->len;
19661da177e4SLinus Torvalds 		skb->truesize += tmp_skb->truesize;
19671da177e4SLinus Torvalds 		tmp_skb->destructor = NULL;
19681da177e4SLinus Torvalds 		tmp_skb->sk = NULL;
19691da177e4SLinus Torvalds 	}
19701da177e4SLinus Torvalds 
197128a89453SHerbert Xu 	/* Allow local fragmentation. */
197260ff7467SWANG Cong 	skb->ignore_df = ip6_sk_ignore_df(sk);
1973cfe1fc77SArnaldo Carvalho de Melo 	__skb_pull(skb, skb_network_header_len(skb));
1974b60d4e58SPavel Begunkov 
1975b60d4e58SPavel Begunkov 	final_dst = &fl6->daddr;
19761da177e4SLinus Torvalds 	if (opt && opt->opt_flen)
19771da177e4SLinus Torvalds 		ipv6_push_frag_opts(skb, opt, &proto);
19781da177e4SLinus Torvalds 	if (opt && opt->opt_nflen)
1979613fa3caSDavid Lebrun 		ipv6_push_nfrag_opts(skb, opt, &proto, &final_dst, &fl6->saddr);
19801da177e4SLinus Torvalds 
1981e2d1bca7SArnaldo Carvalho de Melo 	skb_push(skb, sizeof(struct ipv6hdr));
1982e2d1bca7SArnaldo Carvalho de Melo 	skb_reset_network_header(skb);
19830660e03fSArnaldo Carvalho de Melo 	hdr = ipv6_hdr(skb);
19841da177e4SLinus Torvalds 
19856422398cSVlad Yasevich 	ip6_flow_hdr(hdr, v6_cork->tclass,
1986cb1ce2efSTom Herbert 		     ip6_make_flowlabel(net, skb, fl6->flowlabel,
1987513674b5SShaohua Li 					ip6_autoflowlabel(net, np), fl6));
19886422398cSVlad Yasevich 	hdr->hop_limit = v6_cork->hop_limit;
19891da177e4SLinus Torvalds 	hdr->nexthdr = proto;
19904e3fd7a0SAlexey Dobriyan 	hdr->saddr = fl6->saddr;
19914e3fd7a0SAlexey Dobriyan 	hdr->daddr = *final_dst;
19921da177e4SLinus Torvalds 
1993a2c2064fSPatrick McHardy 	skb->priority = sk->sk_priority;
1994c6af0c22SWillem de Bruijn 	skb->mark = cork->base.mark;
1995a818f75eSJesus Sanchez-Palencia 	skb->tstamp = cork->base.transmit_time;
1996a818f75eSJesus Sanchez-Palencia 
1997cd3c7480SPavel Begunkov 	ip6_cork_steal_dst(skb, cork);
1998edf391ffSNeil Horman 	IP6_UPD_PO_STATS(net, rt->rt6i_idev, IPSTATS_MIB_OUT, skb->len);
199914878f75SDavid L Stevens 	if (proto == IPPROTO_ICMPV6) {
2000adf30907SEric Dumazet 		struct inet6_dev *idev = ip6_dst_idev(skb_dst(skb));
2001ea30388bSZiyang Xuan 		u8 icmp6_type;
200214878f75SDavid L Stevens 
2003cafbe182SEric Dumazet 		if (sk->sk_socket->type == SOCK_RAW &&
2004cafbe182SEric Dumazet 		   !inet_test_bit(HDRINCL, sk))
2005ea30388bSZiyang Xuan 			icmp6_type = fl6->fl6_icmp_type;
2006ea30388bSZiyang Xuan 		else
2007ea30388bSZiyang Xuan 			icmp6_type = icmp6_hdr(skb)->icmp6_type;
2008ea30388bSZiyang Xuan 		ICMP6MSGOUT_INC_STATS(net, idev, icmp6_type);
200943a43b60SHannes Frederic Sowa 		ICMP6_INC_STATS(net, idev, ICMP6_MIB_OUTMSGS);
201014878f75SDavid L Stevens 	}
201114878f75SDavid L Stevens 
20126422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
20136422398cSVlad Yasevich out:
20146422398cSVlad Yasevich 	return skb;
20156422398cSVlad Yasevich }
20166422398cSVlad Yasevich 
20176422398cSVlad Yasevich int ip6_send_skb(struct sk_buff *skb)
20186422398cSVlad Yasevich {
20196422398cSVlad Yasevich 	struct net *net = sock_net(skb->sk);
20206422398cSVlad Yasevich 	struct rt6_info *rt = (struct rt6_info *)skb_dst(skb);
20216422398cSVlad Yasevich 	int err;
20226422398cSVlad Yasevich 
202333224b16SEric W. Biederman 	err = ip6_local_out(net, skb->sk, skb);
20241da177e4SLinus Torvalds 	if (err) {
20251da177e4SLinus Torvalds 		if (err > 0)
20266ce9e7b5SEric Dumazet 			err = net_xmit_errno(err);
20271da177e4SLinus Torvalds 		if (err)
20286422398cSVlad Yasevich 			IP6_INC_STATS(net, rt->rt6i_idev,
20296422398cSVlad Yasevich 				      IPSTATS_MIB_OUTDISCARDS);
20301da177e4SLinus Torvalds 	}
20311da177e4SLinus Torvalds 
20321da177e4SLinus Torvalds 	return err;
20336422398cSVlad Yasevich }
20346422398cSVlad Yasevich 
20356422398cSVlad Yasevich int ip6_push_pending_frames(struct sock *sk)
20366422398cSVlad Yasevich {
20376422398cSVlad Yasevich 	struct sk_buff *skb;
20386422398cSVlad Yasevich 
20396422398cSVlad Yasevich 	skb = ip6_finish_skb(sk);
20406422398cSVlad Yasevich 	if (!skb)
20416422398cSVlad Yasevich 		return 0;
20426422398cSVlad Yasevich 
20436422398cSVlad Yasevich 	return ip6_send_skb(skb);
20441da177e4SLinus Torvalds }
2045a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_push_pending_frames);
20461da177e4SLinus Torvalds 
20470bbe84a6SVlad Yasevich static void __ip6_flush_pending_frames(struct sock *sk,
20486422398cSVlad Yasevich 				       struct sk_buff_head *queue,
20496422398cSVlad Yasevich 				       struct inet_cork_full *cork,
20506422398cSVlad Yasevich 				       struct inet6_cork *v6_cork)
20511da177e4SLinus Torvalds {
20521da177e4SLinus Torvalds 	struct sk_buff *skb;
20531da177e4SLinus Torvalds 
20540bbe84a6SVlad Yasevich 	while ((skb = __skb_dequeue_tail(queue)) != NULL) {
2055adf30907SEric Dumazet 		if (skb_dst(skb))
2056adf30907SEric Dumazet 			IP6_INC_STATS(sock_net(sk), ip6_dst_idev(skb_dst(skb)),
2057a11d206dSYOSHIFUJI Hideaki 				      IPSTATS_MIB_OUTDISCARDS);
20581da177e4SLinus Torvalds 		kfree_skb(skb);
20591da177e4SLinus Torvalds 	}
20601da177e4SLinus Torvalds 
20616422398cSVlad Yasevich 	ip6_cork_release(cork, v6_cork);
20621da177e4SLinus Torvalds }
20630bbe84a6SVlad Yasevich 
20640bbe84a6SVlad Yasevich void ip6_flush_pending_frames(struct sock *sk)
20650bbe84a6SVlad Yasevich {
20666422398cSVlad Yasevich 	__ip6_flush_pending_frames(sk, &sk->sk_write_queue,
20676422398cSVlad Yasevich 				   &inet_sk(sk)->cork, &inet6_sk(sk)->cork);
20680bbe84a6SVlad Yasevich }
2069a495f836SChris Elston EXPORT_SYMBOL_GPL(ip6_flush_pending_frames);
20706422398cSVlad Yasevich 
20716422398cSVlad Yasevich struct sk_buff *ip6_make_skb(struct sock *sk,
20726422398cSVlad Yasevich 			     int getfrag(void *from, char *to, int offset,
20736422398cSVlad Yasevich 					 int len, int odd, struct sk_buff *skb),
2074f93431c8SWang Yufen 			     void *from, size_t length, int transhdrlen,
2075f37a4cc6SPavel Begunkov 			     struct ipcm6_cookie *ipc6, struct rt6_info *rt,
2076f37a4cc6SPavel Begunkov 			     unsigned int flags, struct inet_cork_full *cork)
20776422398cSVlad Yasevich {
20786422398cSVlad Yasevich 	struct inet6_cork v6_cork;
20796422398cSVlad Yasevich 	struct sk_buff_head queue;
208026879da5SWei Wang 	int exthdrlen = (ipc6->opt ? ipc6->opt->opt_flen : 0);
20816422398cSVlad Yasevich 	int err;
20826422398cSVlad Yasevich 
208340ac240cSPavel Begunkov 	if (flags & MSG_PROBE) {
208440ac240cSPavel Begunkov 		dst_release(&rt->dst);
20856422398cSVlad Yasevich 		return NULL;
208640ac240cSPavel Begunkov 	}
20876422398cSVlad Yasevich 
20886422398cSVlad Yasevich 	__skb_queue_head_init(&queue);
20896422398cSVlad Yasevich 
20901cd7884dSWillem de Bruijn 	cork->base.flags = 0;
20911cd7884dSWillem de Bruijn 	cork->base.addr = 0;
20921cd7884dSWillem de Bruijn 	cork->base.opt = NULL;
20936422398cSVlad Yasevich 	v6_cork.opt = NULL;
2094f37a4cc6SPavel Begunkov 	err = ip6_setup_cork(sk, cork, &v6_cork, ipc6, rt);
2095862c03eeSEric Dumazet 	if (err) {
20961cd7884dSWillem de Bruijn 		ip6_cork_release(cork, &v6_cork);
20976422398cSVlad Yasevich 		return ERR_PTR(err);
2098862c03eeSEric Dumazet 	}
209926879da5SWei Wang 	if (ipc6->dontfrag < 0)
210026879da5SWei Wang 		ipc6->dontfrag = inet6_sk(sk)->dontfrag;
21016422398cSVlad Yasevich 
2102f37a4cc6SPavel Begunkov 	err = __ip6_append_data(sk, &queue, cork, &v6_cork,
21036422398cSVlad Yasevich 				&current->task_frag, getfrag, from,
21046422398cSVlad Yasevich 				length + exthdrlen, transhdrlen + exthdrlen,
21055fdaa88dSWillem de Bruijn 				flags, ipc6);
21066422398cSVlad Yasevich 	if (err) {
21071cd7884dSWillem de Bruijn 		__ip6_flush_pending_frames(sk, &queue, cork, &v6_cork);
21086422398cSVlad Yasevich 		return ERR_PTR(err);
21096422398cSVlad Yasevich 	}
21106422398cSVlad Yasevich 
21111cd7884dSWillem de Bruijn 	return __ip6_make_skb(sk, &queue, cork, &v6_cork);
21126422398cSVlad Yasevich }
2113