Merge tag 'locks-v3.16-2' of git://git.samba.org/jlayton/linux
[linux/fpc-iii.git] / net / ipv4 / route.c
blob082239ffe34a1f42e62e9ac7901f9fe5219fdca6
1 /*
2 * INET An implementation of the TCP/IP protocol suite for the LINUX
3 * operating system. INET is implemented using the BSD Socket
4 * interface as the means of communication with the user level.
6 * ROUTE - implementation of the IP router.
8 * Authors: Ross Biro
9 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
10 * Alan Cox, <gw4pts@gw4pts.ampr.org>
11 * Linus Torvalds, <Linus.Torvalds@helsinki.fi>
12 * Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
14 * Fixes:
15 * Alan Cox : Verify area fixes.
16 * Alan Cox : cli() protects routing changes
17 * Rui Oliveira : ICMP routing table updates
18 * (rco@di.uminho.pt) Routing table insertion and update
19 * Linus Torvalds : Rewrote bits to be sensible
20 * Alan Cox : Added BSD route gw semantics
21 * Alan Cox : Super /proc >4K
22 * Alan Cox : MTU in route table
23 * Alan Cox : MSS actually. Also added the window
24 * clamper.
25 * Sam Lantinga : Fixed route matching in rt_del()
26 * Alan Cox : Routing cache support.
27 * Alan Cox : Removed compatibility cruft.
28 * Alan Cox : RTF_REJECT support.
29 * Alan Cox : TCP irtt support.
30 * Jonathan Naylor : Added Metric support.
31 * Miquel van Smoorenburg : BSD API fixes.
32 * Miquel van Smoorenburg : Metrics.
33 * Alan Cox : Use __u32 properly
34 * Alan Cox : Aligned routing errors more closely with BSD
35 * our system is still very different.
36 * Alan Cox : Faster /proc handling
37 * Alexey Kuznetsov : Massive rework to support tree based routing,
38 * routing caches and better behaviour.
40 * Olaf Erb : irtt wasn't being copied right.
41 * Bjorn Ekwall : Kerneld route support.
42 * Alan Cox : Multicast fixed (I hope)
43 * Pavel Krauz : Limited broadcast fixed
44 * Mike McLagan : Routing by source
45 * Alexey Kuznetsov : End of old history. Split to fib.c and
46 * route.c and rewritten from scratch.
47 * Andi Kleen : Load-limit warning messages.
48 * Vitaly E. Lavrov : Transparent proxy revived after year coma.
49 * Vitaly E. Lavrov : Race condition in ip_route_input_slow.
50 * Tobias Ringstrom : Uninitialized res.type in ip_route_output_slow.
51 * Vladimir V. Ivanov : IP rule info (flowid) is really useful.
52 * Marc Boucher : routing by fwmark
53 * Robert Olsson : Added rt_cache statistics
54 * Arnaldo C. Melo : Convert proc stuff to seq_file
55 * Eric Dumazet : hashed spinlocks and rt_check_expire() fixes.
56 * Ilia Sotnikov : Ignore TOS on PMTUD and Redirect
57 * Ilia Sotnikov : Removed TOS from hash calculations
59 * This program is free software; you can redistribute it and/or
60 * modify it under the terms of the GNU General Public License
61 * as published by the Free Software Foundation; either version
62 * 2 of the License, or (at your option) any later version.
65 #define pr_fmt(fmt) "IPv4: " fmt
67 #include <linux/module.h>
68 #include <asm/uaccess.h>
69 #include <linux/bitops.h>
70 #include <linux/types.h>
71 #include <linux/kernel.h>
72 #include <linux/mm.h>
73 #include <linux/string.h>
74 #include <linux/socket.h>
75 #include <linux/sockios.h>
76 #include <linux/errno.h>
77 #include <linux/in.h>
78 #include <linux/inet.h>
79 #include <linux/netdevice.h>
80 #include <linux/proc_fs.h>
81 #include <linux/init.h>
82 #include <linux/skbuff.h>
83 #include <linux/inetdevice.h>
84 #include <linux/igmp.h>
85 #include <linux/pkt_sched.h>
86 #include <linux/mroute.h>
87 #include <linux/netfilter_ipv4.h>
88 #include <linux/random.h>
89 #include <linux/rcupdate.h>
90 #include <linux/times.h>
91 #include <linux/slab.h>
92 #include <linux/jhash.h>
93 #include <net/dst.h>
94 #include <net/net_namespace.h>
95 #include <net/protocol.h>
96 #include <net/ip.h>
97 #include <net/route.h>
98 #include <net/inetpeer.h>
99 #include <net/sock.h>
100 #include <net/ip_fib.h>
101 #include <net/arp.h>
102 #include <net/tcp.h>
103 #include <net/icmp.h>
104 #include <net/xfrm.h>
105 #include <net/netevent.h>
106 #include <net/rtnetlink.h>
107 #ifdef CONFIG_SYSCTL
108 #include <linux/sysctl.h>
109 #include <linux/kmemleak.h>
110 #endif
111 #include <net/secure_seq.h>
113 #define RT_FL_TOS(oldflp4) \
114 ((oldflp4)->flowi4_tos & (IPTOS_RT_MASK | RTO_ONLINK))
116 #define RT_GC_TIMEOUT (300*HZ)
118 static int ip_rt_max_size;
119 static int ip_rt_redirect_number __read_mostly = 9;
120 static int ip_rt_redirect_load __read_mostly = HZ / 50;
121 static int ip_rt_redirect_silence __read_mostly = ((HZ / 50) << (9 + 1));
122 static int ip_rt_error_cost __read_mostly = HZ;
123 static int ip_rt_error_burst __read_mostly = 5 * HZ;
124 static int ip_rt_mtu_expires __read_mostly = 10 * 60 * HZ;
125 static int ip_rt_min_pmtu __read_mostly = 512 + 20 + 20;
126 static int ip_rt_min_advmss __read_mostly = 256;
129 * Interface to generic destination cache.
132 static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie);
133 static unsigned int ipv4_default_advmss(const struct dst_entry *dst);
134 static unsigned int ipv4_mtu(const struct dst_entry *dst);
135 static struct dst_entry *ipv4_negative_advice(struct dst_entry *dst);
136 static void ipv4_link_failure(struct sk_buff *skb);
137 static void ip_rt_update_pmtu(struct dst_entry *dst, struct sock *sk,
138 struct sk_buff *skb, u32 mtu);
139 static void ip_do_redirect(struct dst_entry *dst, struct sock *sk,
140 struct sk_buff *skb);
141 static void ipv4_dst_destroy(struct dst_entry *dst);
143 static u32 *ipv4_cow_metrics(struct dst_entry *dst, unsigned long old)
145 WARN_ON(1);
146 return NULL;
149 static struct neighbour *ipv4_neigh_lookup(const struct dst_entry *dst,
150 struct sk_buff *skb,
151 const void *daddr);
153 static struct dst_ops ipv4_dst_ops = {
154 .family = AF_INET,
155 .protocol = cpu_to_be16(ETH_P_IP),
156 .check = ipv4_dst_check,
157 .default_advmss = ipv4_default_advmss,
158 .mtu = ipv4_mtu,
159 .cow_metrics = ipv4_cow_metrics,
160 .destroy = ipv4_dst_destroy,
161 .negative_advice = ipv4_negative_advice,
162 .link_failure = ipv4_link_failure,
163 .update_pmtu = ip_rt_update_pmtu,
164 .redirect = ip_do_redirect,
165 .local_out = __ip_local_out,
166 .neigh_lookup = ipv4_neigh_lookup,
169 #define ECN_OR_COST(class) TC_PRIO_##class
171 const __u8 ip_tos2prio[16] = {
172 TC_PRIO_BESTEFFORT,
173 ECN_OR_COST(BESTEFFORT),
174 TC_PRIO_BESTEFFORT,
175 ECN_OR_COST(BESTEFFORT),
176 TC_PRIO_BULK,
177 ECN_OR_COST(BULK),
178 TC_PRIO_BULK,
179 ECN_OR_COST(BULK),
180 TC_PRIO_INTERACTIVE,
181 ECN_OR_COST(INTERACTIVE),
182 TC_PRIO_INTERACTIVE,
183 ECN_OR_COST(INTERACTIVE),
184 TC_PRIO_INTERACTIVE_BULK,
185 ECN_OR_COST(INTERACTIVE_BULK),
186 TC_PRIO_INTERACTIVE_BULK,
187 ECN_OR_COST(INTERACTIVE_BULK)
189 EXPORT_SYMBOL(ip_tos2prio);
191 static DEFINE_PER_CPU(struct rt_cache_stat, rt_cache_stat);
192 #define RT_CACHE_STAT_INC(field) raw_cpu_inc(rt_cache_stat.field)
194 #ifdef CONFIG_PROC_FS
195 static void *rt_cache_seq_start(struct seq_file *seq, loff_t *pos)
197 if (*pos)
198 return NULL;
199 return SEQ_START_TOKEN;
202 static void *rt_cache_seq_next(struct seq_file *seq, void *v, loff_t *pos)
204 ++*pos;
205 return NULL;
208 static void rt_cache_seq_stop(struct seq_file *seq, void *v)
212 static int rt_cache_seq_show(struct seq_file *seq, void *v)
214 if (v == SEQ_START_TOKEN)
215 seq_printf(seq, "%-127s\n",
216 "Iface\tDestination\tGateway \tFlags\t\tRefCnt\tUse\t"
217 "Metric\tSource\t\tMTU\tWindow\tIRTT\tTOS\tHHRef\t"
218 "HHUptod\tSpecDst");
219 return 0;
222 static const struct seq_operations rt_cache_seq_ops = {
223 .start = rt_cache_seq_start,
224 .next = rt_cache_seq_next,
225 .stop = rt_cache_seq_stop,
226 .show = rt_cache_seq_show,
229 static int rt_cache_seq_open(struct inode *inode, struct file *file)
231 return seq_open(file, &rt_cache_seq_ops);
234 static const struct file_operations rt_cache_seq_fops = {
235 .owner = THIS_MODULE,
236 .open = rt_cache_seq_open,
237 .read = seq_read,
238 .llseek = seq_lseek,
239 .release = seq_release,
243 static void *rt_cpu_seq_start(struct seq_file *seq, loff_t *pos)
245 int cpu;
247 if (*pos == 0)
248 return SEQ_START_TOKEN;
250 for (cpu = *pos-1; cpu < nr_cpu_ids; ++cpu) {
251 if (!cpu_possible(cpu))
252 continue;
253 *pos = cpu+1;
254 return &per_cpu(rt_cache_stat, cpu);
256 return NULL;
259 static void *rt_cpu_seq_next(struct seq_file *seq, void *v, loff_t *pos)
261 int cpu;
263 for (cpu = *pos; cpu < nr_cpu_ids; ++cpu) {
264 if (!cpu_possible(cpu))
265 continue;
266 *pos = cpu+1;
267 return &per_cpu(rt_cache_stat, cpu);
269 return NULL;
273 static void rt_cpu_seq_stop(struct seq_file *seq, void *v)
278 static int rt_cpu_seq_show(struct seq_file *seq, void *v)
280 struct rt_cache_stat *st = v;
282 if (v == SEQ_START_TOKEN) {
283 seq_printf(seq, "entries in_hit in_slow_tot in_slow_mc in_no_route in_brd in_martian_dst in_martian_src out_hit out_slow_tot out_slow_mc gc_total gc_ignored gc_goal_miss gc_dst_overflow in_hlist_search out_hlist_search\n");
284 return 0;
287 seq_printf(seq,"%08x %08x %08x %08x %08x %08x %08x %08x "
288 " %08x %08x %08x %08x %08x %08x %08x %08x %08x \n",
289 dst_entries_get_slow(&ipv4_dst_ops),
290 0, /* st->in_hit */
291 st->in_slow_tot,
292 st->in_slow_mc,
293 st->in_no_route,
294 st->in_brd,
295 st->in_martian_dst,
296 st->in_martian_src,
298 0, /* st->out_hit */
299 st->out_slow_tot,
300 st->out_slow_mc,
302 0, /* st->gc_total */
303 0, /* st->gc_ignored */
304 0, /* st->gc_goal_miss */
305 0, /* st->gc_dst_overflow */
306 0, /* st->in_hlist_search */
307 0 /* st->out_hlist_search */
309 return 0;
312 static const struct seq_operations rt_cpu_seq_ops = {
313 .start = rt_cpu_seq_start,
314 .next = rt_cpu_seq_next,
315 .stop = rt_cpu_seq_stop,
316 .show = rt_cpu_seq_show,
320 static int rt_cpu_seq_open(struct inode *inode, struct file *file)
322 return seq_open(file, &rt_cpu_seq_ops);
325 static const struct file_operations rt_cpu_seq_fops = {
326 .owner = THIS_MODULE,
327 .open = rt_cpu_seq_open,
328 .read = seq_read,
329 .llseek = seq_lseek,
330 .release = seq_release,
333 #ifdef CONFIG_IP_ROUTE_CLASSID
334 static int rt_acct_proc_show(struct seq_file *m, void *v)
336 struct ip_rt_acct *dst, *src;
337 unsigned int i, j;
339 dst = kcalloc(256, sizeof(struct ip_rt_acct), GFP_KERNEL);
340 if (!dst)
341 return -ENOMEM;
343 for_each_possible_cpu(i) {
344 src = (struct ip_rt_acct *)per_cpu_ptr(ip_rt_acct, i);
345 for (j = 0; j < 256; j++) {
346 dst[j].o_bytes += src[j].o_bytes;
347 dst[j].o_packets += src[j].o_packets;
348 dst[j].i_bytes += src[j].i_bytes;
349 dst[j].i_packets += src[j].i_packets;
353 seq_write(m, dst, 256 * sizeof(struct ip_rt_acct));
354 kfree(dst);
355 return 0;
358 static int rt_acct_proc_open(struct inode *inode, struct file *file)
360 return single_open(file, rt_acct_proc_show, NULL);
363 static const struct file_operations rt_acct_proc_fops = {
364 .owner = THIS_MODULE,
365 .open = rt_acct_proc_open,
366 .read = seq_read,
367 .llseek = seq_lseek,
368 .release = single_release,
370 #endif
372 static int __net_init ip_rt_do_proc_init(struct net *net)
374 struct proc_dir_entry *pde;
376 pde = proc_create("rt_cache", S_IRUGO, net->proc_net,
377 &rt_cache_seq_fops);
378 if (!pde)
379 goto err1;
381 pde = proc_create("rt_cache", S_IRUGO,
382 net->proc_net_stat, &rt_cpu_seq_fops);
383 if (!pde)
384 goto err2;
386 #ifdef CONFIG_IP_ROUTE_CLASSID
387 pde = proc_create("rt_acct", 0, net->proc_net, &rt_acct_proc_fops);
388 if (!pde)
389 goto err3;
390 #endif
391 return 0;
393 #ifdef CONFIG_IP_ROUTE_CLASSID
394 err3:
395 remove_proc_entry("rt_cache", net->proc_net_stat);
396 #endif
397 err2:
398 remove_proc_entry("rt_cache", net->proc_net);
399 err1:
400 return -ENOMEM;
403 static void __net_exit ip_rt_do_proc_exit(struct net *net)
405 remove_proc_entry("rt_cache", net->proc_net_stat);
406 remove_proc_entry("rt_cache", net->proc_net);
407 #ifdef CONFIG_IP_ROUTE_CLASSID
408 remove_proc_entry("rt_acct", net->proc_net);
409 #endif
412 static struct pernet_operations ip_rt_proc_ops __net_initdata = {
413 .init = ip_rt_do_proc_init,
414 .exit = ip_rt_do_proc_exit,
417 static int __init ip_rt_proc_init(void)
419 return register_pernet_subsys(&ip_rt_proc_ops);
422 #else
423 static inline int ip_rt_proc_init(void)
425 return 0;
427 #endif /* CONFIG_PROC_FS */
429 static inline bool rt_is_expired(const struct rtable *rth)
431 return rth->rt_genid != rt_genid_ipv4(dev_net(rth->dst.dev));
434 void rt_cache_flush(struct net *net)
436 rt_genid_bump_ipv4(net);
439 static struct neighbour *ipv4_neigh_lookup(const struct dst_entry *dst,
440 struct sk_buff *skb,
441 const void *daddr)
443 struct net_device *dev = dst->dev;
444 const __be32 *pkey = daddr;
445 const struct rtable *rt;
446 struct neighbour *n;
448 rt = (const struct rtable *) dst;
449 if (rt->rt_gateway)
450 pkey = (const __be32 *) &rt->rt_gateway;
451 else if (skb)
452 pkey = &ip_hdr(skb)->daddr;
454 n = __ipv4_neigh_lookup(dev, *(__force u32 *)pkey);
455 if (n)
456 return n;
457 return neigh_create(&arp_tbl, pkey, dev);
460 atomic_t *ip_idents __read_mostly;
461 EXPORT_SYMBOL(ip_idents);
463 void __ip_select_ident(struct iphdr *iph, int segs)
465 static u32 ip_idents_hashrnd __read_mostly;
466 u32 hash, id;
468 net_get_random_once(&ip_idents_hashrnd, sizeof(ip_idents_hashrnd));
470 hash = jhash_1word((__force u32)iph->daddr, ip_idents_hashrnd);
471 id = ip_idents_reserve(hash, segs);
472 iph->id = htons(id);
474 EXPORT_SYMBOL(__ip_select_ident);
476 static void __build_flow_key(struct flowi4 *fl4, const struct sock *sk,
477 const struct iphdr *iph,
478 int oif, u8 tos,
479 u8 prot, u32 mark, int flow_flags)
481 if (sk) {
482 const struct inet_sock *inet = inet_sk(sk);
484 oif = sk->sk_bound_dev_if;
485 mark = sk->sk_mark;
486 tos = RT_CONN_FLAGS(sk);
487 prot = inet->hdrincl ? IPPROTO_RAW : sk->sk_protocol;
489 flowi4_init_output(fl4, oif, mark, tos,
490 RT_SCOPE_UNIVERSE, prot,
491 flow_flags,
492 iph->daddr, iph->saddr, 0, 0);
495 static void build_skb_flow_key(struct flowi4 *fl4, const struct sk_buff *skb,
496 const struct sock *sk)
498 const struct iphdr *iph = ip_hdr(skb);
499 int oif = skb->dev->ifindex;
500 u8 tos = RT_TOS(iph->tos);
501 u8 prot = iph->protocol;
502 u32 mark = skb->mark;
504 __build_flow_key(fl4, sk, iph, oif, tos, prot, mark, 0);
507 static void build_sk_flow_key(struct flowi4 *fl4, const struct sock *sk)
509 const struct inet_sock *inet = inet_sk(sk);
510 const struct ip_options_rcu *inet_opt;
511 __be32 daddr = inet->inet_daddr;
513 rcu_read_lock();
514 inet_opt = rcu_dereference(inet->inet_opt);
515 if (inet_opt && inet_opt->opt.srr)
516 daddr = inet_opt->opt.faddr;
517 flowi4_init_output(fl4, sk->sk_bound_dev_if, sk->sk_mark,
518 RT_CONN_FLAGS(sk), RT_SCOPE_UNIVERSE,
519 inet->hdrincl ? IPPROTO_RAW : sk->sk_protocol,
520 inet_sk_flowi_flags(sk),
521 daddr, inet->inet_saddr, 0, 0);
522 rcu_read_unlock();
525 static void ip_rt_build_flow_key(struct flowi4 *fl4, const struct sock *sk,
526 const struct sk_buff *skb)
528 if (skb)
529 build_skb_flow_key(fl4, skb, sk);
530 else
531 build_sk_flow_key(fl4, sk);
534 static inline void rt_free(struct rtable *rt)
536 call_rcu(&rt->dst.rcu_head, dst_rcu_free);
539 static DEFINE_SPINLOCK(fnhe_lock);
541 static void fnhe_flush_routes(struct fib_nh_exception *fnhe)
543 struct rtable *rt;
545 rt = rcu_dereference(fnhe->fnhe_rth_input);
546 if (rt) {
547 RCU_INIT_POINTER(fnhe->fnhe_rth_input, NULL);
548 rt_free(rt);
550 rt = rcu_dereference(fnhe->fnhe_rth_output);
551 if (rt) {
552 RCU_INIT_POINTER(fnhe->fnhe_rth_output, NULL);
553 rt_free(rt);
557 static struct fib_nh_exception *fnhe_oldest(struct fnhe_hash_bucket *hash)
559 struct fib_nh_exception *fnhe, *oldest;
561 oldest = rcu_dereference(hash->chain);
562 for (fnhe = rcu_dereference(oldest->fnhe_next); fnhe;
563 fnhe = rcu_dereference(fnhe->fnhe_next)) {
564 if (time_before(fnhe->fnhe_stamp, oldest->fnhe_stamp))
565 oldest = fnhe;
567 fnhe_flush_routes(oldest);
568 return oldest;
571 static inline u32 fnhe_hashfun(__be32 daddr)
573 u32 hval;
575 hval = (__force u32) daddr;
576 hval ^= (hval >> 11) ^ (hval >> 22);
578 return hval & (FNHE_HASH_SIZE - 1);
581 static void fill_route_from_fnhe(struct rtable *rt, struct fib_nh_exception *fnhe)
583 rt->rt_pmtu = fnhe->fnhe_pmtu;
584 rt->dst.expires = fnhe->fnhe_expires;
586 if (fnhe->fnhe_gw) {
587 rt->rt_flags |= RTCF_REDIRECTED;
588 rt->rt_gateway = fnhe->fnhe_gw;
589 rt->rt_uses_gateway = 1;
593 static void update_or_create_fnhe(struct fib_nh *nh, __be32 daddr, __be32 gw,
594 u32 pmtu, unsigned long expires)
596 struct fnhe_hash_bucket *hash;
597 struct fib_nh_exception *fnhe;
598 struct rtable *rt;
599 unsigned int i;
600 int depth;
601 u32 hval = fnhe_hashfun(daddr);
603 spin_lock_bh(&fnhe_lock);
605 hash = nh->nh_exceptions;
606 if (!hash) {
607 hash = kzalloc(FNHE_HASH_SIZE * sizeof(*hash), GFP_ATOMIC);
608 if (!hash)
609 goto out_unlock;
610 nh->nh_exceptions = hash;
613 hash += hval;
615 depth = 0;
616 for (fnhe = rcu_dereference(hash->chain); fnhe;
617 fnhe = rcu_dereference(fnhe->fnhe_next)) {
618 if (fnhe->fnhe_daddr == daddr)
619 break;
620 depth++;
623 if (fnhe) {
624 if (gw)
625 fnhe->fnhe_gw = gw;
626 if (pmtu) {
627 fnhe->fnhe_pmtu = pmtu;
628 fnhe->fnhe_expires = max(1UL, expires);
630 /* Update all cached dsts too */
631 rt = rcu_dereference(fnhe->fnhe_rth_input);
632 if (rt)
633 fill_route_from_fnhe(rt, fnhe);
634 rt = rcu_dereference(fnhe->fnhe_rth_output);
635 if (rt)
636 fill_route_from_fnhe(rt, fnhe);
637 } else {
638 if (depth > FNHE_RECLAIM_DEPTH)
639 fnhe = fnhe_oldest(hash);
640 else {
641 fnhe = kzalloc(sizeof(*fnhe), GFP_ATOMIC);
642 if (!fnhe)
643 goto out_unlock;
645 fnhe->fnhe_next = hash->chain;
646 rcu_assign_pointer(hash->chain, fnhe);
648 fnhe->fnhe_genid = fnhe_genid(dev_net(nh->nh_dev));
649 fnhe->fnhe_daddr = daddr;
650 fnhe->fnhe_gw = gw;
651 fnhe->fnhe_pmtu = pmtu;
652 fnhe->fnhe_expires = expires;
654 /* Exception created; mark the cached routes for the nexthop
655 * stale, so anyone caching it rechecks if this exception
656 * applies to them.
658 rt = rcu_dereference(nh->nh_rth_input);
659 if (rt)
660 rt->dst.obsolete = DST_OBSOLETE_KILL;
662 for_each_possible_cpu(i) {
663 struct rtable __rcu **prt;
664 prt = per_cpu_ptr(nh->nh_pcpu_rth_output, i);
665 rt = rcu_dereference(*prt);
666 if (rt)
667 rt->dst.obsolete = DST_OBSOLETE_KILL;
671 fnhe->fnhe_stamp = jiffies;
673 out_unlock:
674 spin_unlock_bh(&fnhe_lock);
677 static void __ip_do_redirect(struct rtable *rt, struct sk_buff *skb, struct flowi4 *fl4,
678 bool kill_route)
680 __be32 new_gw = icmp_hdr(skb)->un.gateway;
681 __be32 old_gw = ip_hdr(skb)->saddr;
682 struct net_device *dev = skb->dev;
683 struct in_device *in_dev;
684 struct fib_result res;
685 struct neighbour *n;
686 struct net *net;
688 switch (icmp_hdr(skb)->code & 7) {
689 case ICMP_REDIR_NET:
690 case ICMP_REDIR_NETTOS:
691 case ICMP_REDIR_HOST:
692 case ICMP_REDIR_HOSTTOS:
693 break;
695 default:
696 return;
699 if (rt->rt_gateway != old_gw)
700 return;
702 in_dev = __in_dev_get_rcu(dev);
703 if (!in_dev)
704 return;
706 net = dev_net(dev);
707 if (new_gw == old_gw || !IN_DEV_RX_REDIRECTS(in_dev) ||
708 ipv4_is_multicast(new_gw) || ipv4_is_lbcast(new_gw) ||
709 ipv4_is_zeronet(new_gw))
710 goto reject_redirect;
712 if (!IN_DEV_SHARED_MEDIA(in_dev)) {
713 if (!inet_addr_onlink(in_dev, new_gw, old_gw))
714 goto reject_redirect;
715 if (IN_DEV_SEC_REDIRECTS(in_dev) && ip_fib_check_default(new_gw, dev))
716 goto reject_redirect;
717 } else {
718 if (inet_addr_type(net, new_gw) != RTN_UNICAST)
719 goto reject_redirect;
722 n = ipv4_neigh_lookup(&rt->dst, NULL, &new_gw);
723 if (n) {
724 if (!(n->nud_state & NUD_VALID)) {
725 neigh_event_send(n, NULL);
726 } else {
727 if (fib_lookup(net, fl4, &res) == 0) {
728 struct fib_nh *nh = &FIB_RES_NH(res);
730 update_or_create_fnhe(nh, fl4->daddr, new_gw,
731 0, 0);
733 if (kill_route)
734 rt->dst.obsolete = DST_OBSOLETE_KILL;
735 call_netevent_notifiers(NETEVENT_NEIGH_UPDATE, n);
737 neigh_release(n);
739 return;
741 reject_redirect:
742 #ifdef CONFIG_IP_ROUTE_VERBOSE
743 if (IN_DEV_LOG_MARTIANS(in_dev)) {
744 const struct iphdr *iph = (const struct iphdr *) skb->data;
745 __be32 daddr = iph->daddr;
746 __be32 saddr = iph->saddr;
748 net_info_ratelimited("Redirect from %pI4 on %s about %pI4 ignored\n"
749 " Advised path = %pI4 -> %pI4\n",
750 &old_gw, dev->name, &new_gw,
751 &saddr, &daddr);
753 #endif
757 static void ip_do_redirect(struct dst_entry *dst, struct sock *sk, struct sk_buff *skb)
759 struct rtable *rt;
760 struct flowi4 fl4;
761 const struct iphdr *iph = (const struct iphdr *) skb->data;
762 int oif = skb->dev->ifindex;
763 u8 tos = RT_TOS(iph->tos);
764 u8 prot = iph->protocol;
765 u32 mark = skb->mark;
767 rt = (struct rtable *) dst;
769 __build_flow_key(&fl4, sk, iph, oif, tos, prot, mark, 0);
770 __ip_do_redirect(rt, skb, &fl4, true);
773 static struct dst_entry *ipv4_negative_advice(struct dst_entry *dst)
775 struct rtable *rt = (struct rtable *)dst;
776 struct dst_entry *ret = dst;
778 if (rt) {
779 if (dst->obsolete > 0) {
780 ip_rt_put(rt);
781 ret = NULL;
782 } else if ((rt->rt_flags & RTCF_REDIRECTED) ||
783 rt->dst.expires) {
784 ip_rt_put(rt);
785 ret = NULL;
788 return ret;
792 * Algorithm:
793 * 1. The first ip_rt_redirect_number redirects are sent
794 * with exponential backoff, then we stop sending them at all,
795 * assuming that the host ignores our redirects.
796 * 2. If we did not see packets requiring redirects
797 * during ip_rt_redirect_silence, we assume that the host
798 * forgot redirected route and start to send redirects again.
800 * This algorithm is much cheaper and more intelligent than dumb load limiting
801 * in icmp.c.
803 * NOTE. Do not forget to inhibit load limiting for redirects (redundant)
804 * and "frag. need" (breaks PMTU discovery) in icmp.c.
807 void ip_rt_send_redirect(struct sk_buff *skb)
809 struct rtable *rt = skb_rtable(skb);
810 struct in_device *in_dev;
811 struct inet_peer *peer;
812 struct net *net;
813 int log_martians;
815 rcu_read_lock();
816 in_dev = __in_dev_get_rcu(rt->dst.dev);
817 if (!in_dev || !IN_DEV_TX_REDIRECTS(in_dev)) {
818 rcu_read_unlock();
819 return;
821 log_martians = IN_DEV_LOG_MARTIANS(in_dev);
822 rcu_read_unlock();
824 net = dev_net(rt->dst.dev);
825 peer = inet_getpeer_v4(net->ipv4.peers, ip_hdr(skb)->saddr, 1);
826 if (!peer) {
827 icmp_send(skb, ICMP_REDIRECT, ICMP_REDIR_HOST,
828 rt_nexthop(rt, ip_hdr(skb)->daddr));
829 return;
832 /* No redirected packets during ip_rt_redirect_silence;
833 * reset the algorithm.
835 if (time_after(jiffies, peer->rate_last + ip_rt_redirect_silence))
836 peer->rate_tokens = 0;
838 /* Too many ignored redirects; do not send anything
839 * set dst.rate_last to the last seen redirected packet.
841 if (peer->rate_tokens >= ip_rt_redirect_number) {
842 peer->rate_last = jiffies;
843 goto out_put_peer;
846 /* Check for load limit; set rate_last to the latest sent
847 * redirect.
849 if (peer->rate_tokens == 0 ||
850 time_after(jiffies,
851 (peer->rate_last +
852 (ip_rt_redirect_load << peer->rate_tokens)))) {
853 __be32 gw = rt_nexthop(rt, ip_hdr(skb)->daddr);
855 icmp_send(skb, ICMP_REDIRECT, ICMP_REDIR_HOST, gw);
856 peer->rate_last = jiffies;
857 ++peer->rate_tokens;
858 #ifdef CONFIG_IP_ROUTE_VERBOSE
859 if (log_martians &&
860 peer->rate_tokens == ip_rt_redirect_number)
861 net_warn_ratelimited("host %pI4/if%d ignores redirects for %pI4 to %pI4\n",
862 &ip_hdr(skb)->saddr, inet_iif(skb),
863 &ip_hdr(skb)->daddr, &gw);
864 #endif
866 out_put_peer:
867 inet_putpeer(peer);
870 static int ip_error(struct sk_buff *skb)
872 struct in_device *in_dev = __in_dev_get_rcu(skb->dev);
873 struct rtable *rt = skb_rtable(skb);
874 struct inet_peer *peer;
875 unsigned long now;
876 struct net *net;
877 bool send;
878 int code;
880 net = dev_net(rt->dst.dev);
881 if (!IN_DEV_FORWARD(in_dev)) {
882 switch (rt->dst.error) {
883 case EHOSTUNREACH:
884 IP_INC_STATS_BH(net, IPSTATS_MIB_INADDRERRORS);
885 break;
887 case ENETUNREACH:
888 IP_INC_STATS_BH(net, IPSTATS_MIB_INNOROUTES);
889 break;
891 goto out;
894 switch (rt->dst.error) {
895 case EINVAL:
896 default:
897 goto out;
898 case EHOSTUNREACH:
899 code = ICMP_HOST_UNREACH;
900 break;
901 case ENETUNREACH:
902 code = ICMP_NET_UNREACH;
903 IP_INC_STATS_BH(net, IPSTATS_MIB_INNOROUTES);
904 break;
905 case EACCES:
906 code = ICMP_PKT_FILTERED;
907 break;
910 peer = inet_getpeer_v4(net->ipv4.peers, ip_hdr(skb)->saddr, 1);
912 send = true;
913 if (peer) {
914 now = jiffies;
915 peer->rate_tokens += now - peer->rate_last;
916 if (peer->rate_tokens > ip_rt_error_burst)
917 peer->rate_tokens = ip_rt_error_burst;
918 peer->rate_last = now;
919 if (peer->rate_tokens >= ip_rt_error_cost)
920 peer->rate_tokens -= ip_rt_error_cost;
921 else
922 send = false;
923 inet_putpeer(peer);
925 if (send)
926 icmp_send(skb, ICMP_DEST_UNREACH, code, 0);
928 out: kfree_skb(skb);
929 return 0;
932 static void __ip_rt_update_pmtu(struct rtable *rt, struct flowi4 *fl4, u32 mtu)
934 struct dst_entry *dst = &rt->dst;
935 struct fib_result res;
937 if (dst_metric_locked(dst, RTAX_MTU))
938 return;
940 if (dst->dev->mtu < mtu)
941 return;
943 if (mtu < ip_rt_min_pmtu)
944 mtu = ip_rt_min_pmtu;
946 if (rt->rt_pmtu == mtu &&
947 time_before(jiffies, dst->expires - ip_rt_mtu_expires / 2))
948 return;
950 rcu_read_lock();
951 if (fib_lookup(dev_net(dst->dev), fl4, &res) == 0) {
952 struct fib_nh *nh = &FIB_RES_NH(res);
954 update_or_create_fnhe(nh, fl4->daddr, 0, mtu,
955 jiffies + ip_rt_mtu_expires);
957 rcu_read_unlock();
960 static void ip_rt_update_pmtu(struct dst_entry *dst, struct sock *sk,
961 struct sk_buff *skb, u32 mtu)
963 struct rtable *rt = (struct rtable *) dst;
964 struct flowi4 fl4;
966 ip_rt_build_flow_key(&fl4, sk, skb);
967 __ip_rt_update_pmtu(rt, &fl4, mtu);
970 void ipv4_update_pmtu(struct sk_buff *skb, struct net *net, u32 mtu,
971 int oif, u32 mark, u8 protocol, int flow_flags)
973 const struct iphdr *iph = (const struct iphdr *) skb->data;
974 struct flowi4 fl4;
975 struct rtable *rt;
977 if (!mark)
978 mark = IP4_REPLY_MARK(net, skb->mark);
980 __build_flow_key(&fl4, NULL, iph, oif,
981 RT_TOS(iph->tos), protocol, mark, flow_flags);
982 rt = __ip_route_output_key(net, &fl4);
983 if (!IS_ERR(rt)) {
984 __ip_rt_update_pmtu(rt, &fl4, mtu);
985 ip_rt_put(rt);
988 EXPORT_SYMBOL_GPL(ipv4_update_pmtu);
990 static void __ipv4_sk_update_pmtu(struct sk_buff *skb, struct sock *sk, u32 mtu)
992 const struct iphdr *iph = (const struct iphdr *) skb->data;
993 struct flowi4 fl4;
994 struct rtable *rt;
996 __build_flow_key(&fl4, sk, iph, 0, 0, 0, 0, 0);
998 if (!fl4.flowi4_mark)
999 fl4.flowi4_mark = IP4_REPLY_MARK(sock_net(sk), skb->mark);
1001 rt = __ip_route_output_key(sock_net(sk), &fl4);
1002 if (!IS_ERR(rt)) {
1003 __ip_rt_update_pmtu(rt, &fl4, mtu);
1004 ip_rt_put(rt);
1008 void ipv4_sk_update_pmtu(struct sk_buff *skb, struct sock *sk, u32 mtu)
1010 const struct iphdr *iph = (const struct iphdr *) skb->data;
1011 struct flowi4 fl4;
1012 struct rtable *rt;
1013 struct dst_entry *dst;
1014 bool new = false;
1016 bh_lock_sock(sk);
1018 if (!ip_sk_accept_pmtu(sk))
1019 goto out;
1021 rt = (struct rtable *) __sk_dst_get(sk);
1023 if (sock_owned_by_user(sk) || !rt) {
1024 __ipv4_sk_update_pmtu(skb, sk, mtu);
1025 goto out;
1028 __build_flow_key(&fl4, sk, iph, 0, 0, 0, 0, 0);
1030 if (!__sk_dst_check(sk, 0)) {
1031 rt = ip_route_output_flow(sock_net(sk), &fl4, sk);
1032 if (IS_ERR(rt))
1033 goto out;
1035 new = true;
1038 __ip_rt_update_pmtu((struct rtable *) rt->dst.path, &fl4, mtu);
1040 dst = dst_check(&rt->dst, 0);
1041 if (!dst) {
1042 if (new)
1043 dst_release(&rt->dst);
1045 rt = ip_route_output_flow(sock_net(sk), &fl4, sk);
1046 if (IS_ERR(rt))
1047 goto out;
1049 new = true;
1052 if (new)
1053 __sk_dst_set(sk, &rt->dst);
1055 out:
1056 bh_unlock_sock(sk);
1058 EXPORT_SYMBOL_GPL(ipv4_sk_update_pmtu);
1060 void ipv4_redirect(struct sk_buff *skb, struct net *net,
1061 int oif, u32 mark, u8 protocol, int flow_flags)
1063 const struct iphdr *iph = (const struct iphdr *) skb->data;
1064 struct flowi4 fl4;
1065 struct rtable *rt;
1067 __build_flow_key(&fl4, NULL, iph, oif,
1068 RT_TOS(iph->tos), protocol, mark, flow_flags);
1069 rt = __ip_route_output_key(net, &fl4);
1070 if (!IS_ERR(rt)) {
1071 __ip_do_redirect(rt, skb, &fl4, false);
1072 ip_rt_put(rt);
1075 EXPORT_SYMBOL_GPL(ipv4_redirect);
1077 void ipv4_sk_redirect(struct sk_buff *skb, struct sock *sk)
1079 const struct iphdr *iph = (const struct iphdr *) skb->data;
1080 struct flowi4 fl4;
1081 struct rtable *rt;
1083 __build_flow_key(&fl4, sk, iph, 0, 0, 0, 0, 0);
1084 rt = __ip_route_output_key(sock_net(sk), &fl4);
1085 if (!IS_ERR(rt)) {
1086 __ip_do_redirect(rt, skb, &fl4, false);
1087 ip_rt_put(rt);
1090 EXPORT_SYMBOL_GPL(ipv4_sk_redirect);
1092 static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie)
1094 struct rtable *rt = (struct rtable *) dst;
1096 /* All IPV4 dsts are created with ->obsolete set to the value
1097 * DST_OBSOLETE_FORCE_CHK which forces validation calls down
1098 * into this function always.
1100 * When a PMTU/redirect information update invalidates a route,
1101 * this is indicated by setting obsolete to DST_OBSOLETE_KILL or
1102 * DST_OBSOLETE_DEAD by dst_free().
1104 if (dst->obsolete != DST_OBSOLETE_FORCE_CHK || rt_is_expired(rt))
1105 return NULL;
1106 return dst;
1109 static void ipv4_link_failure(struct sk_buff *skb)
1111 struct rtable *rt;
1113 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_HOST_UNREACH, 0);
1115 rt = skb_rtable(skb);
1116 if (rt)
1117 dst_set_expires(&rt->dst, 0);
1120 static int ip_rt_bug(struct sock *sk, struct sk_buff *skb)
1122 pr_debug("%s: %pI4 -> %pI4, %s\n",
1123 __func__, &ip_hdr(skb)->saddr, &ip_hdr(skb)->daddr,
1124 skb->dev ? skb->dev->name : "?");
1125 kfree_skb(skb);
1126 WARN_ON(1);
1127 return 0;
1131 We do not cache source address of outgoing interface,
1132 because it is used only by IP RR, TS and SRR options,
1133 so that it out of fast path.
1135 BTW remember: "addr" is allowed to be not aligned
1136 in IP options!
1139 void ip_rt_get_source(u8 *addr, struct sk_buff *skb, struct rtable *rt)
1141 __be32 src;
1143 if (rt_is_output_route(rt))
1144 src = ip_hdr(skb)->saddr;
1145 else {
1146 struct fib_result res;
1147 struct flowi4 fl4;
1148 struct iphdr *iph;
1150 iph = ip_hdr(skb);
1152 memset(&fl4, 0, sizeof(fl4));
1153 fl4.daddr = iph->daddr;
1154 fl4.saddr = iph->saddr;
1155 fl4.flowi4_tos = RT_TOS(iph->tos);
1156 fl4.flowi4_oif = rt->dst.dev->ifindex;
1157 fl4.flowi4_iif = skb->dev->ifindex;
1158 fl4.flowi4_mark = skb->mark;
1160 rcu_read_lock();
1161 if (fib_lookup(dev_net(rt->dst.dev), &fl4, &res) == 0)
1162 src = FIB_RES_PREFSRC(dev_net(rt->dst.dev), res);
1163 else
1164 src = inet_select_addr(rt->dst.dev,
1165 rt_nexthop(rt, iph->daddr),
1166 RT_SCOPE_UNIVERSE);
1167 rcu_read_unlock();
1169 memcpy(addr, &src, 4);
1172 #ifdef CONFIG_IP_ROUTE_CLASSID
1173 static void set_class_tag(struct rtable *rt, u32 tag)
1175 if (!(rt->dst.tclassid & 0xFFFF))
1176 rt->dst.tclassid |= tag & 0xFFFF;
1177 if (!(rt->dst.tclassid & 0xFFFF0000))
1178 rt->dst.tclassid |= tag & 0xFFFF0000;
1180 #endif
1182 static unsigned int ipv4_default_advmss(const struct dst_entry *dst)
1184 unsigned int advmss = dst_metric_raw(dst, RTAX_ADVMSS);
1186 if (advmss == 0) {
1187 advmss = max_t(unsigned int, dst->dev->mtu - 40,
1188 ip_rt_min_advmss);
1189 if (advmss > 65535 - 40)
1190 advmss = 65535 - 40;
1192 return advmss;
1195 static unsigned int ipv4_mtu(const struct dst_entry *dst)
1197 const struct rtable *rt = (const struct rtable *) dst;
1198 unsigned int mtu = rt->rt_pmtu;
1200 if (!mtu || time_after_eq(jiffies, rt->dst.expires))
1201 mtu = dst_metric_raw(dst, RTAX_MTU);
1203 if (mtu)
1204 return mtu;
1206 mtu = dst->dev->mtu;
1208 if (unlikely(dst_metric_locked(dst, RTAX_MTU))) {
1209 if (rt->rt_uses_gateway && mtu > 576)
1210 mtu = 576;
1213 return min_t(unsigned int, mtu, IP_MAX_MTU);
1216 static struct fib_nh_exception *find_exception(struct fib_nh *nh, __be32 daddr)
1218 struct fnhe_hash_bucket *hash = nh->nh_exceptions;
1219 struct fib_nh_exception *fnhe;
1220 u32 hval;
1222 if (!hash)
1223 return NULL;
1225 hval = fnhe_hashfun(daddr);
1227 for (fnhe = rcu_dereference(hash[hval].chain); fnhe;
1228 fnhe = rcu_dereference(fnhe->fnhe_next)) {
1229 if (fnhe->fnhe_daddr == daddr)
1230 return fnhe;
1232 return NULL;
1235 static bool rt_bind_exception(struct rtable *rt, struct fib_nh_exception *fnhe,
1236 __be32 daddr)
1238 bool ret = false;
1240 spin_lock_bh(&fnhe_lock);
1242 if (daddr == fnhe->fnhe_daddr) {
1243 struct rtable __rcu **porig;
1244 struct rtable *orig;
1245 int genid = fnhe_genid(dev_net(rt->dst.dev));
1247 if (rt_is_input_route(rt))
1248 porig = &fnhe->fnhe_rth_input;
1249 else
1250 porig = &fnhe->fnhe_rth_output;
1251 orig = rcu_dereference(*porig);
1253 if (fnhe->fnhe_genid != genid) {
1254 fnhe->fnhe_genid = genid;
1255 fnhe->fnhe_gw = 0;
1256 fnhe->fnhe_pmtu = 0;
1257 fnhe->fnhe_expires = 0;
1258 fnhe_flush_routes(fnhe);
1259 orig = NULL;
1261 fill_route_from_fnhe(rt, fnhe);
1262 if (!rt->rt_gateway)
1263 rt->rt_gateway = daddr;
1265 if (!(rt->dst.flags & DST_NOCACHE)) {
1266 rcu_assign_pointer(*porig, rt);
1267 if (orig)
1268 rt_free(orig);
1269 ret = true;
1272 fnhe->fnhe_stamp = jiffies;
1274 spin_unlock_bh(&fnhe_lock);
1276 return ret;
1279 static bool rt_cache_route(struct fib_nh *nh, struct rtable *rt)
1281 struct rtable *orig, *prev, **p;
1282 bool ret = true;
1284 if (rt_is_input_route(rt)) {
1285 p = (struct rtable **)&nh->nh_rth_input;
1286 } else {
1287 p = (struct rtable **)__this_cpu_ptr(nh->nh_pcpu_rth_output);
1289 orig = *p;
1291 prev = cmpxchg(p, orig, rt);
1292 if (prev == orig) {
1293 if (orig)
1294 rt_free(orig);
1295 } else
1296 ret = false;
1298 return ret;
1301 static DEFINE_SPINLOCK(rt_uncached_lock);
1302 static LIST_HEAD(rt_uncached_list);
1304 static void rt_add_uncached_list(struct rtable *rt)
1306 spin_lock_bh(&rt_uncached_lock);
1307 list_add_tail(&rt->rt_uncached, &rt_uncached_list);
1308 spin_unlock_bh(&rt_uncached_lock);
1311 static void ipv4_dst_destroy(struct dst_entry *dst)
1313 struct rtable *rt = (struct rtable *) dst;
1315 if (!list_empty(&rt->rt_uncached)) {
1316 spin_lock_bh(&rt_uncached_lock);
1317 list_del(&rt->rt_uncached);
1318 spin_unlock_bh(&rt_uncached_lock);
1322 void rt_flush_dev(struct net_device *dev)
1324 if (!list_empty(&rt_uncached_list)) {
1325 struct net *net = dev_net(dev);
1326 struct rtable *rt;
1328 spin_lock_bh(&rt_uncached_lock);
1329 list_for_each_entry(rt, &rt_uncached_list, rt_uncached) {
1330 if (rt->dst.dev != dev)
1331 continue;
1332 rt->dst.dev = net->loopback_dev;
1333 dev_hold(rt->dst.dev);
1334 dev_put(dev);
1336 spin_unlock_bh(&rt_uncached_lock);
1340 static bool rt_cache_valid(const struct rtable *rt)
1342 return rt &&
1343 rt->dst.obsolete == DST_OBSOLETE_FORCE_CHK &&
1344 !rt_is_expired(rt);
1347 static void rt_set_nexthop(struct rtable *rt, __be32 daddr,
1348 const struct fib_result *res,
1349 struct fib_nh_exception *fnhe,
1350 struct fib_info *fi, u16 type, u32 itag)
1352 bool cached = false;
1354 if (fi) {
1355 struct fib_nh *nh = &FIB_RES_NH(*res);
1357 if (nh->nh_gw && nh->nh_scope == RT_SCOPE_LINK) {
1358 rt->rt_gateway = nh->nh_gw;
1359 rt->rt_uses_gateway = 1;
1361 dst_init_metrics(&rt->dst, fi->fib_metrics, true);
1362 #ifdef CONFIG_IP_ROUTE_CLASSID
1363 rt->dst.tclassid = nh->nh_tclassid;
1364 #endif
1365 if (unlikely(fnhe))
1366 cached = rt_bind_exception(rt, fnhe, daddr);
1367 else if (!(rt->dst.flags & DST_NOCACHE))
1368 cached = rt_cache_route(nh, rt);
1369 if (unlikely(!cached)) {
1370 /* Routes we intend to cache in nexthop exception or
1371 * FIB nexthop have the DST_NOCACHE bit clear.
1372 * However, if we are unsuccessful at storing this
1373 * route into the cache we really need to set it.
1375 rt->dst.flags |= DST_NOCACHE;
1376 if (!rt->rt_gateway)
1377 rt->rt_gateway = daddr;
1378 rt_add_uncached_list(rt);
1380 } else
1381 rt_add_uncached_list(rt);
1383 #ifdef CONFIG_IP_ROUTE_CLASSID
1384 #ifdef CONFIG_IP_MULTIPLE_TABLES
1385 set_class_tag(rt, res->tclassid);
1386 #endif
1387 set_class_tag(rt, itag);
1388 #endif
1391 static struct rtable *rt_dst_alloc(struct net_device *dev,
1392 bool nopolicy, bool noxfrm, bool will_cache)
1394 return dst_alloc(&ipv4_dst_ops, dev, 1, DST_OBSOLETE_FORCE_CHK,
1395 (will_cache ? 0 : (DST_HOST | DST_NOCACHE)) |
1396 (nopolicy ? DST_NOPOLICY : 0) |
1397 (noxfrm ? DST_NOXFRM : 0));
1400 /* called in rcu_read_lock() section */
1401 static int ip_route_input_mc(struct sk_buff *skb, __be32 daddr, __be32 saddr,
1402 u8 tos, struct net_device *dev, int our)
1404 struct rtable *rth;
1405 struct in_device *in_dev = __in_dev_get_rcu(dev);
1406 u32 itag = 0;
1407 int err;
1409 /* Primary sanity checks. */
1411 if (in_dev == NULL)
1412 return -EINVAL;
1414 if (ipv4_is_multicast(saddr) || ipv4_is_lbcast(saddr) ||
1415 skb->protocol != htons(ETH_P_IP))
1416 goto e_inval;
1418 if (likely(!IN_DEV_ROUTE_LOCALNET(in_dev)))
1419 if (ipv4_is_loopback(saddr))
1420 goto e_inval;
1422 if (ipv4_is_zeronet(saddr)) {
1423 if (!ipv4_is_local_multicast(daddr))
1424 goto e_inval;
1425 } else {
1426 err = fib_validate_source(skb, saddr, 0, tos, 0, dev,
1427 in_dev, &itag);
1428 if (err < 0)
1429 goto e_err;
1431 rth = rt_dst_alloc(dev_net(dev)->loopback_dev,
1432 IN_DEV_CONF_GET(in_dev, NOPOLICY), false, false);
1433 if (!rth)
1434 goto e_nobufs;
1436 #ifdef CONFIG_IP_ROUTE_CLASSID
1437 rth->dst.tclassid = itag;
1438 #endif
1439 rth->dst.output = ip_rt_bug;
1441 rth->rt_genid = rt_genid_ipv4(dev_net(dev));
1442 rth->rt_flags = RTCF_MULTICAST;
1443 rth->rt_type = RTN_MULTICAST;
1444 rth->rt_is_input= 1;
1445 rth->rt_iif = 0;
1446 rth->rt_pmtu = 0;
1447 rth->rt_gateway = 0;
1448 rth->rt_uses_gateway = 0;
1449 INIT_LIST_HEAD(&rth->rt_uncached);
1450 if (our) {
1451 rth->dst.input= ip_local_deliver;
1452 rth->rt_flags |= RTCF_LOCAL;
1455 #ifdef CONFIG_IP_MROUTE
1456 if (!ipv4_is_local_multicast(daddr) && IN_DEV_MFORWARD(in_dev))
1457 rth->dst.input = ip_mr_input;
1458 #endif
1459 RT_CACHE_STAT_INC(in_slow_mc);
1461 skb_dst_set(skb, &rth->dst);
1462 return 0;
1464 e_nobufs:
1465 return -ENOBUFS;
1466 e_inval:
1467 return -EINVAL;
1468 e_err:
1469 return err;
1473 static void ip_handle_martian_source(struct net_device *dev,
1474 struct in_device *in_dev,
1475 struct sk_buff *skb,
1476 __be32 daddr,
1477 __be32 saddr)
1479 RT_CACHE_STAT_INC(in_martian_src);
1480 #ifdef CONFIG_IP_ROUTE_VERBOSE
1481 if (IN_DEV_LOG_MARTIANS(in_dev) && net_ratelimit()) {
1483 * RFC1812 recommendation, if source is martian,
1484 * the only hint is MAC header.
1486 pr_warn("martian source %pI4 from %pI4, on dev %s\n",
1487 &daddr, &saddr, dev->name);
1488 if (dev->hard_header_len && skb_mac_header_was_set(skb)) {
1489 print_hex_dump(KERN_WARNING, "ll header: ",
1490 DUMP_PREFIX_OFFSET, 16, 1,
1491 skb_mac_header(skb),
1492 dev->hard_header_len, true);
1495 #endif
1498 /* called in rcu_read_lock() section */
1499 static int __mkroute_input(struct sk_buff *skb,
1500 const struct fib_result *res,
1501 struct in_device *in_dev,
1502 __be32 daddr, __be32 saddr, u32 tos)
1504 struct fib_nh_exception *fnhe;
1505 struct rtable *rth;
1506 int err;
1507 struct in_device *out_dev;
1508 unsigned int flags = 0;
1509 bool do_cache;
1510 u32 itag = 0;
1512 /* get a working reference to the output device */
1513 out_dev = __in_dev_get_rcu(FIB_RES_DEV(*res));
1514 if (out_dev == NULL) {
1515 net_crit_ratelimited("Bug in ip_route_input_slow(). Please report.\n");
1516 return -EINVAL;
1519 err = fib_validate_source(skb, saddr, daddr, tos, FIB_RES_OIF(*res),
1520 in_dev->dev, in_dev, &itag);
1521 if (err < 0) {
1522 ip_handle_martian_source(in_dev->dev, in_dev, skb, daddr,
1523 saddr);
1525 goto cleanup;
1528 do_cache = res->fi && !itag;
1529 if (out_dev == in_dev && err && IN_DEV_TX_REDIRECTS(out_dev) &&
1530 (IN_DEV_SHARED_MEDIA(out_dev) ||
1531 inet_addr_onlink(out_dev, saddr, FIB_RES_GW(*res)))) {
1532 flags |= RTCF_DOREDIRECT;
1533 do_cache = false;
1536 if (skb->protocol != htons(ETH_P_IP)) {
1537 /* Not IP (i.e. ARP). Do not create route, if it is
1538 * invalid for proxy arp. DNAT routes are always valid.
1540 * Proxy arp feature have been extended to allow, ARP
1541 * replies back to the same interface, to support
1542 * Private VLAN switch technologies. See arp.c.
1544 if (out_dev == in_dev &&
1545 IN_DEV_PROXY_ARP_PVLAN(in_dev) == 0) {
1546 err = -EINVAL;
1547 goto cleanup;
1551 fnhe = find_exception(&FIB_RES_NH(*res), daddr);
1552 if (do_cache) {
1553 if (fnhe != NULL)
1554 rth = rcu_dereference(fnhe->fnhe_rth_input);
1555 else
1556 rth = rcu_dereference(FIB_RES_NH(*res).nh_rth_input);
1558 if (rt_cache_valid(rth)) {
1559 skb_dst_set_noref(skb, &rth->dst);
1560 goto out;
1564 rth = rt_dst_alloc(out_dev->dev,
1565 IN_DEV_CONF_GET(in_dev, NOPOLICY),
1566 IN_DEV_CONF_GET(out_dev, NOXFRM), do_cache);
1567 if (!rth) {
1568 err = -ENOBUFS;
1569 goto cleanup;
1572 rth->rt_genid = rt_genid_ipv4(dev_net(rth->dst.dev));
1573 rth->rt_flags = flags;
1574 rth->rt_type = res->type;
1575 rth->rt_is_input = 1;
1576 rth->rt_iif = 0;
1577 rth->rt_pmtu = 0;
1578 rth->rt_gateway = 0;
1579 rth->rt_uses_gateway = 0;
1580 INIT_LIST_HEAD(&rth->rt_uncached);
1581 RT_CACHE_STAT_INC(in_slow_tot);
1583 rth->dst.input = ip_forward;
1584 rth->dst.output = ip_output;
1586 rt_set_nexthop(rth, daddr, res, fnhe, res->fi, res->type, itag);
1587 skb_dst_set(skb, &rth->dst);
1588 out:
1589 err = 0;
1590 cleanup:
1591 return err;
1594 static int ip_mkroute_input(struct sk_buff *skb,
1595 struct fib_result *res,
1596 const struct flowi4 *fl4,
1597 struct in_device *in_dev,
1598 __be32 daddr, __be32 saddr, u32 tos)
1600 #ifdef CONFIG_IP_ROUTE_MULTIPATH
1601 if (res->fi && res->fi->fib_nhs > 1)
1602 fib_select_multipath(res);
1603 #endif
1605 /* create a routing cache entry */
1606 return __mkroute_input(skb, res, in_dev, daddr, saddr, tos);
1610 * NOTE. We drop all the packets that has local source
1611 * addresses, because every properly looped back packet
1612 * must have correct destination already attached by output routine.
1614 * Such approach solves two big problems:
1615 * 1. Not simplex devices are handled properly.
1616 * 2. IP spoofing attempts are filtered with 100% of guarantee.
1617 * called with rcu_read_lock()
1620 static int ip_route_input_slow(struct sk_buff *skb, __be32 daddr, __be32 saddr,
1621 u8 tos, struct net_device *dev)
1623 struct fib_result res;
1624 struct in_device *in_dev = __in_dev_get_rcu(dev);
1625 struct flowi4 fl4;
1626 unsigned int flags = 0;
1627 u32 itag = 0;
1628 struct rtable *rth;
1629 int err = -EINVAL;
1630 struct net *net = dev_net(dev);
1631 bool do_cache;
1633 /* IP on this device is disabled. */
1635 if (!in_dev)
1636 goto out;
1638 /* Check for the most weird martians, which can be not detected
1639 by fib_lookup.
1642 if (ipv4_is_multicast(saddr) || ipv4_is_lbcast(saddr))
1643 goto martian_source;
1645 res.fi = NULL;
1646 if (ipv4_is_lbcast(daddr) || (saddr == 0 && daddr == 0))
1647 goto brd_input;
1649 /* Accept zero addresses only to limited broadcast;
1650 * I even do not know to fix it or not. Waiting for complains :-)
1652 if (ipv4_is_zeronet(saddr))
1653 goto martian_source;
1655 if (ipv4_is_zeronet(daddr))
1656 goto martian_destination;
1658 /* Following code try to avoid calling IN_DEV_NET_ROUTE_LOCALNET(),
1659 * and call it once if daddr or/and saddr are loopback addresses
1661 if (ipv4_is_loopback(daddr)) {
1662 if (!IN_DEV_NET_ROUTE_LOCALNET(in_dev, net))
1663 goto martian_destination;
1664 } else if (ipv4_is_loopback(saddr)) {
1665 if (!IN_DEV_NET_ROUTE_LOCALNET(in_dev, net))
1666 goto martian_source;
1670 * Now we are ready to route packet.
1672 fl4.flowi4_oif = 0;
1673 fl4.flowi4_iif = dev->ifindex;
1674 fl4.flowi4_mark = skb->mark;
1675 fl4.flowi4_tos = tos;
1676 fl4.flowi4_scope = RT_SCOPE_UNIVERSE;
1677 fl4.daddr = daddr;
1678 fl4.saddr = saddr;
1679 err = fib_lookup(net, &fl4, &res);
1680 if (err != 0) {
1681 if (!IN_DEV_FORWARD(in_dev))
1682 err = -EHOSTUNREACH;
1683 goto no_route;
1686 if (res.type == RTN_BROADCAST)
1687 goto brd_input;
1689 if (res.type == RTN_LOCAL) {
1690 err = fib_validate_source(skb, saddr, daddr, tos,
1691 0, dev, in_dev, &itag);
1692 if (err < 0)
1693 goto martian_source_keep_err;
1694 goto local_input;
1697 if (!IN_DEV_FORWARD(in_dev)) {
1698 err = -EHOSTUNREACH;
1699 goto no_route;
1701 if (res.type != RTN_UNICAST)
1702 goto martian_destination;
1704 err = ip_mkroute_input(skb, &res, &fl4, in_dev, daddr, saddr, tos);
1705 out: return err;
1707 brd_input:
1708 if (skb->protocol != htons(ETH_P_IP))
1709 goto e_inval;
1711 if (!ipv4_is_zeronet(saddr)) {
1712 err = fib_validate_source(skb, saddr, 0, tos, 0, dev,
1713 in_dev, &itag);
1714 if (err < 0)
1715 goto martian_source_keep_err;
1717 flags |= RTCF_BROADCAST;
1718 res.type = RTN_BROADCAST;
1719 RT_CACHE_STAT_INC(in_brd);
1721 local_input:
1722 do_cache = false;
1723 if (res.fi) {
1724 if (!itag) {
1725 rth = rcu_dereference(FIB_RES_NH(res).nh_rth_input);
1726 if (rt_cache_valid(rth)) {
1727 skb_dst_set_noref(skb, &rth->dst);
1728 err = 0;
1729 goto out;
1731 do_cache = true;
1735 rth = rt_dst_alloc(net->loopback_dev,
1736 IN_DEV_CONF_GET(in_dev, NOPOLICY), false, do_cache);
1737 if (!rth)
1738 goto e_nobufs;
1740 rth->dst.input= ip_local_deliver;
1741 rth->dst.output= ip_rt_bug;
1742 #ifdef CONFIG_IP_ROUTE_CLASSID
1743 rth->dst.tclassid = itag;
1744 #endif
1746 rth->rt_genid = rt_genid_ipv4(net);
1747 rth->rt_flags = flags|RTCF_LOCAL;
1748 rth->rt_type = res.type;
1749 rth->rt_is_input = 1;
1750 rth->rt_iif = 0;
1751 rth->rt_pmtu = 0;
1752 rth->rt_gateway = 0;
1753 rth->rt_uses_gateway = 0;
1754 INIT_LIST_HEAD(&rth->rt_uncached);
1755 RT_CACHE_STAT_INC(in_slow_tot);
1756 if (res.type == RTN_UNREACHABLE) {
1757 rth->dst.input= ip_error;
1758 rth->dst.error= -err;
1759 rth->rt_flags &= ~RTCF_LOCAL;
1761 if (do_cache) {
1762 if (unlikely(!rt_cache_route(&FIB_RES_NH(res), rth))) {
1763 rth->dst.flags |= DST_NOCACHE;
1764 rt_add_uncached_list(rth);
1767 skb_dst_set(skb, &rth->dst);
1768 err = 0;
1769 goto out;
1771 no_route:
1772 RT_CACHE_STAT_INC(in_no_route);
1773 res.type = RTN_UNREACHABLE;
1774 if (err == -ESRCH)
1775 err = -ENETUNREACH;
1776 goto local_input;
1779 * Do not cache martian addresses: they should be logged (RFC1812)
1781 martian_destination:
1782 RT_CACHE_STAT_INC(in_martian_dst);
1783 #ifdef CONFIG_IP_ROUTE_VERBOSE
1784 if (IN_DEV_LOG_MARTIANS(in_dev))
1785 net_warn_ratelimited("martian destination %pI4 from %pI4, dev %s\n",
1786 &daddr, &saddr, dev->name);
1787 #endif
1789 e_inval:
1790 err = -EINVAL;
1791 goto out;
1793 e_nobufs:
1794 err = -ENOBUFS;
1795 goto out;
1797 martian_source:
1798 err = -EINVAL;
1799 martian_source_keep_err:
1800 ip_handle_martian_source(dev, in_dev, skb, daddr, saddr);
1801 goto out;
1804 int ip_route_input_noref(struct sk_buff *skb, __be32 daddr, __be32 saddr,
1805 u8 tos, struct net_device *dev)
1807 int res;
1809 rcu_read_lock();
1811 /* Multicast recognition logic is moved from route cache to here.
1812 The problem was that too many Ethernet cards have broken/missing
1813 hardware multicast filters :-( As result the host on multicasting
1814 network acquires a lot of useless route cache entries, sort of
1815 SDR messages from all the world. Now we try to get rid of them.
1816 Really, provided software IP multicast filter is organized
1817 reasonably (at least, hashed), it does not result in a slowdown
1818 comparing with route cache reject entries.
1819 Note, that multicast routers are not affected, because
1820 route cache entry is created eventually.
1822 if (ipv4_is_multicast(daddr)) {
1823 struct in_device *in_dev = __in_dev_get_rcu(dev);
1825 if (in_dev) {
1826 int our = ip_check_mc_rcu(in_dev, daddr, saddr,
1827 ip_hdr(skb)->protocol);
1828 if (our
1829 #ifdef CONFIG_IP_MROUTE
1831 (!ipv4_is_local_multicast(daddr) &&
1832 IN_DEV_MFORWARD(in_dev))
1833 #endif
1835 int res = ip_route_input_mc(skb, daddr, saddr,
1836 tos, dev, our);
1837 rcu_read_unlock();
1838 return res;
1841 rcu_read_unlock();
1842 return -EINVAL;
1844 res = ip_route_input_slow(skb, daddr, saddr, tos, dev);
1845 rcu_read_unlock();
1846 return res;
1848 EXPORT_SYMBOL(ip_route_input_noref);
1850 /* called with rcu_read_lock() */
1851 static struct rtable *__mkroute_output(const struct fib_result *res,
1852 const struct flowi4 *fl4, int orig_oif,
1853 struct net_device *dev_out,
1854 unsigned int flags)
1856 struct fib_info *fi = res->fi;
1857 struct fib_nh_exception *fnhe;
1858 struct in_device *in_dev;
1859 u16 type = res->type;
1860 struct rtable *rth;
1861 bool do_cache;
1863 in_dev = __in_dev_get_rcu(dev_out);
1864 if (!in_dev)
1865 return ERR_PTR(-EINVAL);
1867 if (likely(!IN_DEV_ROUTE_LOCALNET(in_dev)))
1868 if (ipv4_is_loopback(fl4->saddr) && !(dev_out->flags & IFF_LOOPBACK))
1869 return ERR_PTR(-EINVAL);
1871 if (ipv4_is_lbcast(fl4->daddr))
1872 type = RTN_BROADCAST;
1873 else if (ipv4_is_multicast(fl4->daddr))
1874 type = RTN_MULTICAST;
1875 else if (ipv4_is_zeronet(fl4->daddr))
1876 return ERR_PTR(-EINVAL);
1878 if (dev_out->flags & IFF_LOOPBACK)
1879 flags |= RTCF_LOCAL;
1881 do_cache = true;
1882 if (type == RTN_BROADCAST) {
1883 flags |= RTCF_BROADCAST | RTCF_LOCAL;
1884 fi = NULL;
1885 } else if (type == RTN_MULTICAST) {
1886 flags |= RTCF_MULTICAST | RTCF_LOCAL;
1887 if (!ip_check_mc_rcu(in_dev, fl4->daddr, fl4->saddr,
1888 fl4->flowi4_proto))
1889 flags &= ~RTCF_LOCAL;
1890 else
1891 do_cache = false;
1892 /* If multicast route do not exist use
1893 * default one, but do not gateway in this case.
1894 * Yes, it is hack.
1896 if (fi && res->prefixlen < 4)
1897 fi = NULL;
1900 fnhe = NULL;
1901 do_cache &= fi != NULL;
1902 if (do_cache) {
1903 struct rtable __rcu **prth;
1904 struct fib_nh *nh = &FIB_RES_NH(*res);
1906 fnhe = find_exception(nh, fl4->daddr);
1907 if (fnhe)
1908 prth = &fnhe->fnhe_rth_output;
1909 else {
1910 if (unlikely(fl4->flowi4_flags &
1911 FLOWI_FLAG_KNOWN_NH &&
1912 !(nh->nh_gw &&
1913 nh->nh_scope == RT_SCOPE_LINK))) {
1914 do_cache = false;
1915 goto add;
1917 prth = __this_cpu_ptr(nh->nh_pcpu_rth_output);
1919 rth = rcu_dereference(*prth);
1920 if (rt_cache_valid(rth)) {
1921 dst_hold(&rth->dst);
1922 return rth;
1926 add:
1927 rth = rt_dst_alloc(dev_out,
1928 IN_DEV_CONF_GET(in_dev, NOPOLICY),
1929 IN_DEV_CONF_GET(in_dev, NOXFRM),
1930 do_cache);
1931 if (!rth)
1932 return ERR_PTR(-ENOBUFS);
1934 rth->dst.output = ip_output;
1936 rth->rt_genid = rt_genid_ipv4(dev_net(dev_out));
1937 rth->rt_flags = flags;
1938 rth->rt_type = type;
1939 rth->rt_is_input = 0;
1940 rth->rt_iif = orig_oif ? : 0;
1941 rth->rt_pmtu = 0;
1942 rth->rt_gateway = 0;
1943 rth->rt_uses_gateway = 0;
1944 INIT_LIST_HEAD(&rth->rt_uncached);
1946 RT_CACHE_STAT_INC(out_slow_tot);
1948 if (flags & RTCF_LOCAL)
1949 rth->dst.input = ip_local_deliver;
1950 if (flags & (RTCF_BROADCAST | RTCF_MULTICAST)) {
1951 if (flags & RTCF_LOCAL &&
1952 !(dev_out->flags & IFF_LOOPBACK)) {
1953 rth->dst.output = ip_mc_output;
1954 RT_CACHE_STAT_INC(out_slow_mc);
1956 #ifdef CONFIG_IP_MROUTE
1957 if (type == RTN_MULTICAST) {
1958 if (IN_DEV_MFORWARD(in_dev) &&
1959 !ipv4_is_local_multicast(fl4->daddr)) {
1960 rth->dst.input = ip_mr_input;
1961 rth->dst.output = ip_mc_output;
1964 #endif
1967 rt_set_nexthop(rth, fl4->daddr, res, fnhe, fi, type, 0);
1969 return rth;
1973 * Major route resolver routine.
1976 struct rtable *__ip_route_output_key(struct net *net, struct flowi4 *fl4)
1978 struct net_device *dev_out = NULL;
1979 __u8 tos = RT_FL_TOS(fl4);
1980 unsigned int flags = 0;
1981 struct fib_result res;
1982 struct rtable *rth;
1983 int orig_oif;
1985 res.tclassid = 0;
1986 res.fi = NULL;
1987 res.table = NULL;
1989 orig_oif = fl4->flowi4_oif;
1991 fl4->flowi4_iif = LOOPBACK_IFINDEX;
1992 fl4->flowi4_tos = tos & IPTOS_RT_MASK;
1993 fl4->flowi4_scope = ((tos & RTO_ONLINK) ?
1994 RT_SCOPE_LINK : RT_SCOPE_UNIVERSE);
1996 rcu_read_lock();
1997 if (fl4->saddr) {
1998 rth = ERR_PTR(-EINVAL);
1999 if (ipv4_is_multicast(fl4->saddr) ||
2000 ipv4_is_lbcast(fl4->saddr) ||
2001 ipv4_is_zeronet(fl4->saddr))
2002 goto out;
2004 /* I removed check for oif == dev_out->oif here.
2005 It was wrong for two reasons:
2006 1. ip_dev_find(net, saddr) can return wrong iface, if saddr
2007 is assigned to multiple interfaces.
2008 2. Moreover, we are allowed to send packets with saddr
2009 of another iface. --ANK
2012 if (fl4->flowi4_oif == 0 &&
2013 (ipv4_is_multicast(fl4->daddr) ||
2014 ipv4_is_lbcast(fl4->daddr))) {
2015 /* It is equivalent to inet_addr_type(saddr) == RTN_LOCAL */
2016 dev_out = __ip_dev_find(net, fl4->saddr, false);
2017 if (dev_out == NULL)
2018 goto out;
2020 /* Special hack: user can direct multicasts
2021 and limited broadcast via necessary interface
2022 without fiddling with IP_MULTICAST_IF or IP_PKTINFO.
2023 This hack is not just for fun, it allows
2024 vic,vat and friends to work.
2025 They bind socket to loopback, set ttl to zero
2026 and expect that it will work.
2027 From the viewpoint of routing cache they are broken,
2028 because we are not allowed to build multicast path
2029 with loopback source addr (look, routing cache
2030 cannot know, that ttl is zero, so that packet
2031 will not leave this host and route is valid).
2032 Luckily, this hack is good workaround.
2035 fl4->flowi4_oif = dev_out->ifindex;
2036 goto make_route;
2039 if (!(fl4->flowi4_flags & FLOWI_FLAG_ANYSRC)) {
2040 /* It is equivalent to inet_addr_type(saddr) == RTN_LOCAL */
2041 if (!__ip_dev_find(net, fl4->saddr, false))
2042 goto out;
2047 if (fl4->flowi4_oif) {
2048 dev_out = dev_get_by_index_rcu(net, fl4->flowi4_oif);
2049 rth = ERR_PTR(-ENODEV);
2050 if (dev_out == NULL)
2051 goto out;
2053 /* RACE: Check return value of inet_select_addr instead. */
2054 if (!(dev_out->flags & IFF_UP) || !__in_dev_get_rcu(dev_out)) {
2055 rth = ERR_PTR(-ENETUNREACH);
2056 goto out;
2058 if (ipv4_is_local_multicast(fl4->daddr) ||
2059 ipv4_is_lbcast(fl4->daddr)) {
2060 if (!fl4->saddr)
2061 fl4->saddr = inet_select_addr(dev_out, 0,
2062 RT_SCOPE_LINK);
2063 goto make_route;
2065 if (!fl4->saddr) {
2066 if (ipv4_is_multicast(fl4->daddr))
2067 fl4->saddr = inet_select_addr(dev_out, 0,
2068 fl4->flowi4_scope);
2069 else if (!fl4->daddr)
2070 fl4->saddr = inet_select_addr(dev_out, 0,
2071 RT_SCOPE_HOST);
2075 if (!fl4->daddr) {
2076 fl4->daddr = fl4->saddr;
2077 if (!fl4->daddr)
2078 fl4->daddr = fl4->saddr = htonl(INADDR_LOOPBACK);
2079 dev_out = net->loopback_dev;
2080 fl4->flowi4_oif = LOOPBACK_IFINDEX;
2081 res.type = RTN_LOCAL;
2082 flags |= RTCF_LOCAL;
2083 goto make_route;
2086 if (fib_lookup(net, fl4, &res)) {
2087 res.fi = NULL;
2088 res.table = NULL;
2089 if (fl4->flowi4_oif) {
2090 /* Apparently, routing tables are wrong. Assume,
2091 that the destination is on link.
2093 WHY? DW.
2094 Because we are allowed to send to iface
2095 even if it has NO routes and NO assigned
2096 addresses. When oif is specified, routing
2097 tables are looked up with only one purpose:
2098 to catch if destination is gatewayed, rather than
2099 direct. Moreover, if MSG_DONTROUTE is set,
2100 we send packet, ignoring both routing tables
2101 and ifaddr state. --ANK
2104 We could make it even if oif is unknown,
2105 likely IPv6, but we do not.
2108 if (fl4->saddr == 0)
2109 fl4->saddr = inet_select_addr(dev_out, 0,
2110 RT_SCOPE_LINK);
2111 res.type = RTN_UNICAST;
2112 goto make_route;
2114 rth = ERR_PTR(-ENETUNREACH);
2115 goto out;
2118 if (res.type == RTN_LOCAL) {
2119 if (!fl4->saddr) {
2120 if (res.fi->fib_prefsrc)
2121 fl4->saddr = res.fi->fib_prefsrc;
2122 else
2123 fl4->saddr = fl4->daddr;
2125 dev_out = net->loopback_dev;
2126 fl4->flowi4_oif = dev_out->ifindex;
2127 flags |= RTCF_LOCAL;
2128 goto make_route;
2131 #ifdef CONFIG_IP_ROUTE_MULTIPATH
2132 if (res.fi->fib_nhs > 1 && fl4->flowi4_oif == 0)
2133 fib_select_multipath(&res);
2134 else
2135 #endif
2136 if (!res.prefixlen &&
2137 res.table->tb_num_default > 1 &&
2138 res.type == RTN_UNICAST && !fl4->flowi4_oif)
2139 fib_select_default(&res);
2141 if (!fl4->saddr)
2142 fl4->saddr = FIB_RES_PREFSRC(net, res);
2144 dev_out = FIB_RES_DEV(res);
2145 fl4->flowi4_oif = dev_out->ifindex;
2148 make_route:
2149 rth = __mkroute_output(&res, fl4, orig_oif, dev_out, flags);
2151 out:
2152 rcu_read_unlock();
2153 return rth;
2155 EXPORT_SYMBOL_GPL(__ip_route_output_key);
2157 static struct dst_entry *ipv4_blackhole_dst_check(struct dst_entry *dst, u32 cookie)
2159 return NULL;
2162 static unsigned int ipv4_blackhole_mtu(const struct dst_entry *dst)
2164 unsigned int mtu = dst_metric_raw(dst, RTAX_MTU);
2166 return mtu ? : dst->dev->mtu;
2169 static void ipv4_rt_blackhole_update_pmtu(struct dst_entry *dst, struct sock *sk,
2170 struct sk_buff *skb, u32 mtu)
2174 static void ipv4_rt_blackhole_redirect(struct dst_entry *dst, struct sock *sk,
2175 struct sk_buff *skb)
2179 static u32 *ipv4_rt_blackhole_cow_metrics(struct dst_entry *dst,
2180 unsigned long old)
2182 return NULL;
2185 static struct dst_ops ipv4_dst_blackhole_ops = {
2186 .family = AF_INET,
2187 .protocol = cpu_to_be16(ETH_P_IP),
2188 .check = ipv4_blackhole_dst_check,
2189 .mtu = ipv4_blackhole_mtu,
2190 .default_advmss = ipv4_default_advmss,
2191 .update_pmtu = ipv4_rt_blackhole_update_pmtu,
2192 .redirect = ipv4_rt_blackhole_redirect,
2193 .cow_metrics = ipv4_rt_blackhole_cow_metrics,
2194 .neigh_lookup = ipv4_neigh_lookup,
2197 struct dst_entry *ipv4_blackhole_route(struct net *net, struct dst_entry *dst_orig)
2199 struct rtable *ort = (struct rtable *) dst_orig;
2200 struct rtable *rt;
2202 rt = dst_alloc(&ipv4_dst_blackhole_ops, NULL, 1, DST_OBSOLETE_NONE, 0);
2203 if (rt) {
2204 struct dst_entry *new = &rt->dst;
2206 new->__use = 1;
2207 new->input = dst_discard;
2208 new->output = dst_discard_sk;
2210 new->dev = ort->dst.dev;
2211 if (new->dev)
2212 dev_hold(new->dev);
2214 rt->rt_is_input = ort->rt_is_input;
2215 rt->rt_iif = ort->rt_iif;
2216 rt->rt_pmtu = ort->rt_pmtu;
2218 rt->rt_genid = rt_genid_ipv4(net);
2219 rt->rt_flags = ort->rt_flags;
2220 rt->rt_type = ort->rt_type;
2221 rt->rt_gateway = ort->rt_gateway;
2222 rt->rt_uses_gateway = ort->rt_uses_gateway;
2224 INIT_LIST_HEAD(&rt->rt_uncached);
2226 dst_free(new);
2229 dst_release(dst_orig);
2231 return rt ? &rt->dst : ERR_PTR(-ENOMEM);
2234 struct rtable *ip_route_output_flow(struct net *net, struct flowi4 *flp4,
2235 struct sock *sk)
2237 struct rtable *rt = __ip_route_output_key(net, flp4);
2239 if (IS_ERR(rt))
2240 return rt;
2242 if (flp4->flowi4_proto)
2243 rt = (struct rtable *) xfrm_lookup(net, &rt->dst,
2244 flowi4_to_flowi(flp4),
2245 sk, 0);
2247 return rt;
2249 EXPORT_SYMBOL_GPL(ip_route_output_flow);
2251 static int rt_fill_info(struct net *net, __be32 dst, __be32 src,
2252 struct flowi4 *fl4, struct sk_buff *skb, u32 portid,
2253 u32 seq, int event, int nowait, unsigned int flags)
2255 struct rtable *rt = skb_rtable(skb);
2256 struct rtmsg *r;
2257 struct nlmsghdr *nlh;
2258 unsigned long expires = 0;
2259 u32 error;
2260 u32 metrics[RTAX_MAX];
2262 nlh = nlmsg_put(skb, portid, seq, event, sizeof(*r), flags);
2263 if (nlh == NULL)
2264 return -EMSGSIZE;
2266 r = nlmsg_data(nlh);
2267 r->rtm_family = AF_INET;
2268 r->rtm_dst_len = 32;
2269 r->rtm_src_len = 0;
2270 r->rtm_tos = fl4->flowi4_tos;
2271 r->rtm_table = RT_TABLE_MAIN;
2272 if (nla_put_u32(skb, RTA_TABLE, RT_TABLE_MAIN))
2273 goto nla_put_failure;
2274 r->rtm_type = rt->rt_type;
2275 r->rtm_scope = RT_SCOPE_UNIVERSE;
2276 r->rtm_protocol = RTPROT_UNSPEC;
2277 r->rtm_flags = (rt->rt_flags & ~0xFFFF) | RTM_F_CLONED;
2278 if (rt->rt_flags & RTCF_NOTIFY)
2279 r->rtm_flags |= RTM_F_NOTIFY;
2281 if (nla_put_be32(skb, RTA_DST, dst))
2282 goto nla_put_failure;
2283 if (src) {
2284 r->rtm_src_len = 32;
2285 if (nla_put_be32(skb, RTA_SRC, src))
2286 goto nla_put_failure;
2288 if (rt->dst.dev &&
2289 nla_put_u32(skb, RTA_OIF, rt->dst.dev->ifindex))
2290 goto nla_put_failure;
2291 #ifdef CONFIG_IP_ROUTE_CLASSID
2292 if (rt->dst.tclassid &&
2293 nla_put_u32(skb, RTA_FLOW, rt->dst.tclassid))
2294 goto nla_put_failure;
2295 #endif
2296 if (!rt_is_input_route(rt) &&
2297 fl4->saddr != src) {
2298 if (nla_put_be32(skb, RTA_PREFSRC, fl4->saddr))
2299 goto nla_put_failure;
2301 if (rt->rt_uses_gateway &&
2302 nla_put_be32(skb, RTA_GATEWAY, rt->rt_gateway))
2303 goto nla_put_failure;
2305 expires = rt->dst.expires;
2306 if (expires) {
2307 unsigned long now = jiffies;
2309 if (time_before(now, expires))
2310 expires -= now;
2311 else
2312 expires = 0;
2315 memcpy(metrics, dst_metrics_ptr(&rt->dst), sizeof(metrics));
2316 if (rt->rt_pmtu && expires)
2317 metrics[RTAX_MTU - 1] = rt->rt_pmtu;
2318 if (rtnetlink_put_metrics(skb, metrics) < 0)
2319 goto nla_put_failure;
2321 if (fl4->flowi4_mark &&
2322 nla_put_u32(skb, RTA_MARK, fl4->flowi4_mark))
2323 goto nla_put_failure;
2325 error = rt->dst.error;
2327 if (rt_is_input_route(rt)) {
2328 #ifdef CONFIG_IP_MROUTE
2329 if (ipv4_is_multicast(dst) && !ipv4_is_local_multicast(dst) &&
2330 IPV4_DEVCONF_ALL(net, MC_FORWARDING)) {
2331 int err = ipmr_get_route(net, skb,
2332 fl4->saddr, fl4->daddr,
2333 r, nowait);
2334 if (err <= 0) {
2335 if (!nowait) {
2336 if (err == 0)
2337 return 0;
2338 goto nla_put_failure;
2339 } else {
2340 if (err == -EMSGSIZE)
2341 goto nla_put_failure;
2342 error = err;
2345 } else
2346 #endif
2347 if (nla_put_u32(skb, RTA_IIF, skb->dev->ifindex))
2348 goto nla_put_failure;
2351 if (rtnl_put_cacheinfo(skb, &rt->dst, 0, expires, error) < 0)
2352 goto nla_put_failure;
2354 return nlmsg_end(skb, nlh);
2356 nla_put_failure:
2357 nlmsg_cancel(skb, nlh);
2358 return -EMSGSIZE;
2361 static int inet_rtm_getroute(struct sk_buff *in_skb, struct nlmsghdr *nlh)
2363 struct net *net = sock_net(in_skb->sk);
2364 struct rtmsg *rtm;
2365 struct nlattr *tb[RTA_MAX+1];
2366 struct rtable *rt = NULL;
2367 struct flowi4 fl4;
2368 __be32 dst = 0;
2369 __be32 src = 0;
2370 u32 iif;
2371 int err;
2372 int mark;
2373 struct sk_buff *skb;
2375 err = nlmsg_parse(nlh, sizeof(*rtm), tb, RTA_MAX, rtm_ipv4_policy);
2376 if (err < 0)
2377 goto errout;
2379 rtm = nlmsg_data(nlh);
2381 skb = alloc_skb(NLMSG_GOODSIZE, GFP_KERNEL);
2382 if (skb == NULL) {
2383 err = -ENOBUFS;
2384 goto errout;
2387 /* Reserve room for dummy headers, this skb can pass
2388 through good chunk of routing engine.
2390 skb_reset_mac_header(skb);
2391 skb_reset_network_header(skb);
2393 /* Bugfix: need to give ip_route_input enough of an IP header to not gag. */
2394 ip_hdr(skb)->protocol = IPPROTO_ICMP;
2395 skb_reserve(skb, MAX_HEADER + sizeof(struct iphdr));
2397 src = tb[RTA_SRC] ? nla_get_be32(tb[RTA_SRC]) : 0;
2398 dst = tb[RTA_DST] ? nla_get_be32(tb[RTA_DST]) : 0;
2399 iif = tb[RTA_IIF] ? nla_get_u32(tb[RTA_IIF]) : 0;
2400 mark = tb[RTA_MARK] ? nla_get_u32(tb[RTA_MARK]) : 0;
2402 memset(&fl4, 0, sizeof(fl4));
2403 fl4.daddr = dst;
2404 fl4.saddr = src;
2405 fl4.flowi4_tos = rtm->rtm_tos;
2406 fl4.flowi4_oif = tb[RTA_OIF] ? nla_get_u32(tb[RTA_OIF]) : 0;
2407 fl4.flowi4_mark = mark;
2409 if (iif) {
2410 struct net_device *dev;
2412 dev = __dev_get_by_index(net, iif);
2413 if (dev == NULL) {
2414 err = -ENODEV;
2415 goto errout_free;
2418 skb->protocol = htons(ETH_P_IP);
2419 skb->dev = dev;
2420 skb->mark = mark;
2421 local_bh_disable();
2422 err = ip_route_input(skb, dst, src, rtm->rtm_tos, dev);
2423 local_bh_enable();
2425 rt = skb_rtable(skb);
2426 if (err == 0 && rt->dst.error)
2427 err = -rt->dst.error;
2428 } else {
2429 rt = ip_route_output_key(net, &fl4);
2431 err = 0;
2432 if (IS_ERR(rt))
2433 err = PTR_ERR(rt);
2436 if (err)
2437 goto errout_free;
2439 skb_dst_set(skb, &rt->dst);
2440 if (rtm->rtm_flags & RTM_F_NOTIFY)
2441 rt->rt_flags |= RTCF_NOTIFY;
2443 err = rt_fill_info(net, dst, src, &fl4, skb,
2444 NETLINK_CB(in_skb).portid, nlh->nlmsg_seq,
2445 RTM_NEWROUTE, 0, 0);
2446 if (err <= 0)
2447 goto errout_free;
2449 err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid);
2450 errout:
2451 return err;
2453 errout_free:
2454 kfree_skb(skb);
2455 goto errout;
2458 void ip_rt_multicast_event(struct in_device *in_dev)
2460 rt_cache_flush(dev_net(in_dev->dev));
2463 #ifdef CONFIG_SYSCTL
2464 static int ip_rt_gc_timeout __read_mostly = RT_GC_TIMEOUT;
2465 static int ip_rt_gc_interval __read_mostly = 60 * HZ;
2466 static int ip_rt_gc_min_interval __read_mostly = HZ / 2;
2467 static int ip_rt_gc_elasticity __read_mostly = 8;
2469 static int ipv4_sysctl_rtcache_flush(struct ctl_table *__ctl, int write,
2470 void __user *buffer,
2471 size_t *lenp, loff_t *ppos)
2473 struct net *net = (struct net *)__ctl->extra1;
2475 if (write) {
2476 rt_cache_flush(net);
2477 fnhe_genid_bump(net);
2478 return 0;
2481 return -EINVAL;
2484 static struct ctl_table ipv4_route_table[] = {
2486 .procname = "gc_thresh",
2487 .data = &ipv4_dst_ops.gc_thresh,
2488 .maxlen = sizeof(int),
2489 .mode = 0644,
2490 .proc_handler = proc_dointvec,
2493 .procname = "max_size",
2494 .data = &ip_rt_max_size,
2495 .maxlen = sizeof(int),
2496 .mode = 0644,
2497 .proc_handler = proc_dointvec,
2500 /* Deprecated. Use gc_min_interval_ms */
2502 .procname = "gc_min_interval",
2503 .data = &ip_rt_gc_min_interval,
2504 .maxlen = sizeof(int),
2505 .mode = 0644,
2506 .proc_handler = proc_dointvec_jiffies,
2509 .procname = "gc_min_interval_ms",
2510 .data = &ip_rt_gc_min_interval,
2511 .maxlen = sizeof(int),
2512 .mode = 0644,
2513 .proc_handler = proc_dointvec_ms_jiffies,
2516 .procname = "gc_timeout",
2517 .data = &ip_rt_gc_timeout,
2518 .maxlen = sizeof(int),
2519 .mode = 0644,
2520 .proc_handler = proc_dointvec_jiffies,
2523 .procname = "gc_interval",
2524 .data = &ip_rt_gc_interval,
2525 .maxlen = sizeof(int),
2526 .mode = 0644,
2527 .proc_handler = proc_dointvec_jiffies,
2530 .procname = "redirect_load",
2531 .data = &ip_rt_redirect_load,
2532 .maxlen = sizeof(int),
2533 .mode = 0644,
2534 .proc_handler = proc_dointvec,
2537 .procname = "redirect_number",
2538 .data = &ip_rt_redirect_number,
2539 .maxlen = sizeof(int),
2540 .mode = 0644,
2541 .proc_handler = proc_dointvec,
2544 .procname = "redirect_silence",
2545 .data = &ip_rt_redirect_silence,
2546 .maxlen = sizeof(int),
2547 .mode = 0644,
2548 .proc_handler = proc_dointvec,
2551 .procname = "error_cost",
2552 .data = &ip_rt_error_cost,
2553 .maxlen = sizeof(int),
2554 .mode = 0644,
2555 .proc_handler = proc_dointvec,
2558 .procname = "error_burst",
2559 .data = &ip_rt_error_burst,
2560 .maxlen = sizeof(int),
2561 .mode = 0644,
2562 .proc_handler = proc_dointvec,
2565 .procname = "gc_elasticity",
2566 .data = &ip_rt_gc_elasticity,
2567 .maxlen = sizeof(int),
2568 .mode = 0644,
2569 .proc_handler = proc_dointvec,
2572 .procname = "mtu_expires",
2573 .data = &ip_rt_mtu_expires,
2574 .maxlen = sizeof(int),
2575 .mode = 0644,
2576 .proc_handler = proc_dointvec_jiffies,
2579 .procname = "min_pmtu",
2580 .data = &ip_rt_min_pmtu,
2581 .maxlen = sizeof(int),
2582 .mode = 0644,
2583 .proc_handler = proc_dointvec,
2586 .procname = "min_adv_mss",
2587 .data = &ip_rt_min_advmss,
2588 .maxlen = sizeof(int),
2589 .mode = 0644,
2590 .proc_handler = proc_dointvec,
2595 static struct ctl_table ipv4_route_flush_table[] = {
2597 .procname = "flush",
2598 .maxlen = sizeof(int),
2599 .mode = 0200,
2600 .proc_handler = ipv4_sysctl_rtcache_flush,
2602 { },
2605 static __net_init int sysctl_route_net_init(struct net *net)
2607 struct ctl_table *tbl;
2609 tbl = ipv4_route_flush_table;
2610 if (!net_eq(net, &init_net)) {
2611 tbl = kmemdup(tbl, sizeof(ipv4_route_flush_table), GFP_KERNEL);
2612 if (tbl == NULL)
2613 goto err_dup;
2615 /* Don't export sysctls to unprivileged users */
2616 if (net->user_ns != &init_user_ns)
2617 tbl[0].procname = NULL;
2619 tbl[0].extra1 = net;
2621 net->ipv4.route_hdr = register_net_sysctl(net, "net/ipv4/route", tbl);
2622 if (net->ipv4.route_hdr == NULL)
2623 goto err_reg;
2624 return 0;
2626 err_reg:
2627 if (tbl != ipv4_route_flush_table)
2628 kfree(tbl);
2629 err_dup:
2630 return -ENOMEM;
2633 static __net_exit void sysctl_route_net_exit(struct net *net)
2635 struct ctl_table *tbl;
2637 tbl = net->ipv4.route_hdr->ctl_table_arg;
2638 unregister_net_sysctl_table(net->ipv4.route_hdr);
2639 BUG_ON(tbl == ipv4_route_flush_table);
2640 kfree(tbl);
2643 static __net_initdata struct pernet_operations sysctl_route_ops = {
2644 .init = sysctl_route_net_init,
2645 .exit = sysctl_route_net_exit,
2647 #endif
2649 static __net_init int rt_genid_init(struct net *net)
2651 atomic_set(&net->ipv4.rt_genid, 0);
2652 atomic_set(&net->fnhe_genid, 0);
2653 get_random_bytes(&net->ipv4.dev_addr_genid,
2654 sizeof(net->ipv4.dev_addr_genid));
2655 return 0;
2658 static __net_initdata struct pernet_operations rt_genid_ops = {
2659 .init = rt_genid_init,
2662 static int __net_init ipv4_inetpeer_init(struct net *net)
2664 struct inet_peer_base *bp = kmalloc(sizeof(*bp), GFP_KERNEL);
2666 if (!bp)
2667 return -ENOMEM;
2668 inet_peer_base_init(bp);
2669 net->ipv4.peers = bp;
2670 return 0;
2673 static void __net_exit ipv4_inetpeer_exit(struct net *net)
2675 struct inet_peer_base *bp = net->ipv4.peers;
2677 net->ipv4.peers = NULL;
2678 inetpeer_invalidate_tree(bp);
2679 kfree(bp);
2682 static __net_initdata struct pernet_operations ipv4_inetpeer_ops = {
2683 .init = ipv4_inetpeer_init,
2684 .exit = ipv4_inetpeer_exit,
2687 #ifdef CONFIG_IP_ROUTE_CLASSID
2688 struct ip_rt_acct __percpu *ip_rt_acct __read_mostly;
2689 #endif /* CONFIG_IP_ROUTE_CLASSID */
2691 int __init ip_rt_init(void)
2693 int rc = 0;
2695 ip_idents = kmalloc(IP_IDENTS_SZ * sizeof(*ip_idents), GFP_KERNEL);
2696 if (!ip_idents)
2697 panic("IP: failed to allocate ip_idents\n");
2699 prandom_bytes(ip_idents, IP_IDENTS_SZ * sizeof(*ip_idents));
2701 #ifdef CONFIG_IP_ROUTE_CLASSID
2702 ip_rt_acct = __alloc_percpu(256 * sizeof(struct ip_rt_acct), __alignof__(struct ip_rt_acct));
2703 if (!ip_rt_acct)
2704 panic("IP: failed to allocate ip_rt_acct\n");
2705 #endif
2707 ipv4_dst_ops.kmem_cachep =
2708 kmem_cache_create("ip_dst_cache", sizeof(struct rtable), 0,
2709 SLAB_HWCACHE_ALIGN|SLAB_PANIC, NULL);
2711 ipv4_dst_blackhole_ops.kmem_cachep = ipv4_dst_ops.kmem_cachep;
2713 if (dst_entries_init(&ipv4_dst_ops) < 0)
2714 panic("IP: failed to allocate ipv4_dst_ops counter\n");
2716 if (dst_entries_init(&ipv4_dst_blackhole_ops) < 0)
2717 panic("IP: failed to allocate ipv4_dst_blackhole_ops counter\n");
2719 ipv4_dst_ops.gc_thresh = ~0;
2720 ip_rt_max_size = INT_MAX;
2722 devinet_init();
2723 ip_fib_init();
2725 if (ip_rt_proc_init())
2726 pr_err("Unable to create route proc files\n");
2727 #ifdef CONFIG_XFRM
2728 xfrm_init();
2729 xfrm4_init();
2730 #endif
2731 rtnl_register(PF_INET, RTM_GETROUTE, inet_rtm_getroute, NULL, NULL);
2733 #ifdef CONFIG_SYSCTL
2734 register_pernet_subsys(&sysctl_route_ops);
2735 #endif
2736 register_pernet_subsys(&rt_genid_ops);
2737 register_pernet_subsys(&ipv4_inetpeer_ops);
2738 return rc;
2741 #ifdef CONFIG_SYSCTL
2743 * We really need to sanitize the damn ipv4 init order, then all
2744 * this nonsense will go away.
2746 void __init ip_static_sysctl_init(void)
2748 register_net_sysctl(&init_net, "net/ipv4/route", ipv4_route_table);
2750 #endif