11da177e4SLinus Torvalds /* 21da177e4SLinus Torvalds * INET An implementation of the TCP/IP protocol suite for the LINUX 31da177e4SLinus Torvalds * operating system. INET is implemented using the BSD Socket 41da177e4SLinus Torvalds * interface as the means of communication with the user level. 51da177e4SLinus Torvalds * 61da177e4SLinus Torvalds * ROUTE - implementation of the IP router. 71da177e4SLinus Torvalds * 81da177e4SLinus Torvalds * Version: $Id: route.c,v 1.103 2002/01/12 07:44:09 davem Exp $ 91da177e4SLinus Torvalds * 1002c30a84SJesper Juhl * Authors: Ross Biro 111da177e4SLinus Torvalds * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG> 121da177e4SLinus Torvalds * Alan Cox, <gw4pts@gw4pts.ampr.org> 131da177e4SLinus Torvalds * Linus Torvalds, <Linus.Torvalds@helsinki.fi> 141da177e4SLinus Torvalds * Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru> 151da177e4SLinus Torvalds * 161da177e4SLinus Torvalds * Fixes: 171da177e4SLinus Torvalds * Alan Cox : Verify area fixes. 181da177e4SLinus Torvalds * Alan Cox : cli() protects routing changes 191da177e4SLinus Torvalds * Rui Oliveira : ICMP routing table updates 201da177e4SLinus Torvalds * (rco@di.uminho.pt) Routing table insertion and update 211da177e4SLinus Torvalds * Linus Torvalds : Rewrote bits to be sensible 221da177e4SLinus Torvalds * Alan Cox : Added BSD route gw semantics 231da177e4SLinus Torvalds * Alan Cox : Super /proc >4K 241da177e4SLinus Torvalds * Alan Cox : MTU in route table 251da177e4SLinus Torvalds * Alan Cox : MSS actually. Also added the window 261da177e4SLinus Torvalds * clamper. 271da177e4SLinus Torvalds * Sam Lantinga : Fixed route matching in rt_del() 281da177e4SLinus Torvalds * Alan Cox : Routing cache support. 291da177e4SLinus Torvalds * Alan Cox : Removed compatibility cruft. 301da177e4SLinus Torvalds * Alan Cox : RTF_REJECT support. 311da177e4SLinus Torvalds * Alan Cox : TCP irtt support. 321da177e4SLinus Torvalds * Jonathan Naylor : Added Metric support. 331da177e4SLinus Torvalds * Miquel van Smoorenburg : BSD API fixes. 341da177e4SLinus Torvalds * Miquel van Smoorenburg : Metrics. 351da177e4SLinus Torvalds * Alan Cox : Use __u32 properly 361da177e4SLinus Torvalds * Alan Cox : Aligned routing errors more closely with BSD 371da177e4SLinus Torvalds * our system is still very different. 381da177e4SLinus Torvalds * Alan Cox : Faster /proc handling 391da177e4SLinus Torvalds * Alexey Kuznetsov : Massive rework to support tree based routing, 401da177e4SLinus Torvalds * routing caches and better behaviour. 411da177e4SLinus Torvalds * 421da177e4SLinus Torvalds * Olaf Erb : irtt wasn't being copied right. 431da177e4SLinus Torvalds * Bjorn Ekwall : Kerneld route support. 441da177e4SLinus Torvalds * Alan Cox : Multicast fixed (I hope) 451da177e4SLinus Torvalds * Pavel Krauz : Limited broadcast fixed 461da177e4SLinus Torvalds * Mike McLagan : Routing by source 471da177e4SLinus Torvalds * Alexey Kuznetsov : End of old history. Split to fib.c and 481da177e4SLinus Torvalds * route.c and rewritten from scratch. 491da177e4SLinus Torvalds * Andi Kleen : Load-limit warning messages. 501da177e4SLinus Torvalds * Vitaly E. Lavrov : Transparent proxy revived after year coma. 511da177e4SLinus Torvalds * Vitaly E. Lavrov : Race condition in ip_route_input_slow. 521da177e4SLinus Torvalds * Tobias Ringstrom : Uninitialized res.type in ip_route_output_slow. 531da177e4SLinus Torvalds * Vladimir V. Ivanov : IP rule info (flowid) is really useful. 541da177e4SLinus Torvalds * Marc Boucher : routing by fwmark 551da177e4SLinus Torvalds * Robert Olsson : Added rt_cache statistics 561da177e4SLinus Torvalds * Arnaldo C. Melo : Convert proc stuff to seq_file 57bb1d23b0SEric Dumazet * Eric Dumazet : hashed spinlocks and rt_check_expire() fixes. 58cef2685eSIlia Sotnikov * Ilia Sotnikov : Ignore TOS on PMTUD and Redirect 59cef2685eSIlia Sotnikov * Ilia Sotnikov : Removed TOS from hash calculations 601da177e4SLinus Torvalds * 611da177e4SLinus Torvalds * This program is free software; you can redistribute it and/or 621da177e4SLinus Torvalds * modify it under the terms of the GNU General Public License 631da177e4SLinus Torvalds * as published by the Free Software Foundation; either version 641da177e4SLinus Torvalds * 2 of the License, or (at your option) any later version. 651da177e4SLinus Torvalds */ 661da177e4SLinus Torvalds 671da177e4SLinus Torvalds #include <linux/module.h> 681da177e4SLinus Torvalds #include <asm/uaccess.h> 691da177e4SLinus Torvalds #include <asm/system.h> 701da177e4SLinus Torvalds #include <linux/bitops.h> 711da177e4SLinus Torvalds #include <linux/types.h> 721da177e4SLinus Torvalds #include <linux/kernel.h> 731da177e4SLinus Torvalds #include <linux/mm.h> 74424c4b70SEric Dumazet #include <linux/bootmem.h> 751da177e4SLinus Torvalds #include <linux/string.h> 761da177e4SLinus Torvalds #include <linux/socket.h> 771da177e4SLinus Torvalds #include <linux/sockios.h> 781da177e4SLinus Torvalds #include <linux/errno.h> 791da177e4SLinus Torvalds #include <linux/in.h> 801da177e4SLinus Torvalds #include <linux/inet.h> 811da177e4SLinus Torvalds #include <linux/netdevice.h> 821da177e4SLinus Torvalds #include <linux/proc_fs.h> 831da177e4SLinus Torvalds #include <linux/init.h> 8439c90eceSEric Dumazet #include <linux/workqueue.h> 851da177e4SLinus Torvalds #include <linux/skbuff.h> 861da177e4SLinus Torvalds #include <linux/inetdevice.h> 871da177e4SLinus Torvalds #include <linux/igmp.h> 881da177e4SLinus Torvalds #include <linux/pkt_sched.h> 891da177e4SLinus Torvalds #include <linux/mroute.h> 901da177e4SLinus Torvalds #include <linux/netfilter_ipv4.h> 911da177e4SLinus Torvalds #include <linux/random.h> 921da177e4SLinus Torvalds #include <linux/jhash.h> 931da177e4SLinus Torvalds #include <linux/rcupdate.h> 941da177e4SLinus Torvalds #include <linux/times.h> 95352e512cSHerbert Xu #include <net/dst.h> 96457c4cbcSEric W. Biederman #include <net/net_namespace.h> 971da177e4SLinus Torvalds #include <net/protocol.h> 981da177e4SLinus Torvalds #include <net/ip.h> 991da177e4SLinus Torvalds #include <net/route.h> 1001da177e4SLinus Torvalds #include <net/inetpeer.h> 1011da177e4SLinus Torvalds #include <net/sock.h> 1021da177e4SLinus Torvalds #include <net/ip_fib.h> 1031da177e4SLinus Torvalds #include <net/arp.h> 1041da177e4SLinus Torvalds #include <net/tcp.h> 1051da177e4SLinus Torvalds #include <net/icmp.h> 1061da177e4SLinus Torvalds #include <net/xfrm.h> 1078d71740cSTom Tucker #include <net/netevent.h> 10863f3444fSThomas Graf #include <net/rtnetlink.h> 1091da177e4SLinus Torvalds #ifdef CONFIG_SYSCTL 1101da177e4SLinus Torvalds #include <linux/sysctl.h> 1111da177e4SLinus Torvalds #endif 1121da177e4SLinus Torvalds 1131da177e4SLinus Torvalds #define RT_FL_TOS(oldflp) \ 1141da177e4SLinus Torvalds ((u32)(oldflp->fl4_tos & (IPTOS_RT_MASK | RTO_ONLINK))) 1151da177e4SLinus Torvalds 1161da177e4SLinus Torvalds #define IP_MAX_MTU 0xFFF0 1171da177e4SLinus Torvalds 1181da177e4SLinus Torvalds #define RT_GC_TIMEOUT (300*HZ) 1191da177e4SLinus Torvalds 1201da177e4SLinus Torvalds static int ip_rt_min_delay = 2 * HZ; 1211da177e4SLinus Torvalds static int ip_rt_max_delay = 10 * HZ; 1221da177e4SLinus Torvalds static int ip_rt_max_size; 1231da177e4SLinus Torvalds static int ip_rt_gc_timeout = RT_GC_TIMEOUT; 1241da177e4SLinus Torvalds static int ip_rt_gc_interval = 60 * HZ; 1251da177e4SLinus Torvalds static int ip_rt_gc_min_interval = HZ / 2; 1261da177e4SLinus Torvalds static int ip_rt_redirect_number = 9; 1271da177e4SLinus Torvalds static int ip_rt_redirect_load = HZ / 50; 1281da177e4SLinus Torvalds static int ip_rt_redirect_silence = ((HZ / 50) << (9 + 1)); 1291da177e4SLinus Torvalds static int ip_rt_error_cost = HZ; 1301da177e4SLinus Torvalds static int ip_rt_error_burst = 5 * HZ; 1311da177e4SLinus Torvalds static int ip_rt_gc_elasticity = 8; 1321da177e4SLinus Torvalds static int ip_rt_mtu_expires = 10 * 60 * HZ; 1331da177e4SLinus Torvalds static int ip_rt_min_pmtu = 512 + 20 + 20; 1341da177e4SLinus Torvalds static int ip_rt_min_advmss = 256; 1351da177e4SLinus Torvalds static int ip_rt_secret_interval = 10 * 60 * HZ; 136beb659bdSEric Dumazet static int ip_rt_flush_expected; 1371da177e4SLinus Torvalds static unsigned long rt_deadline; 1381da177e4SLinus Torvalds 1391da177e4SLinus Torvalds #define RTprint(a...) printk(KERN_DEBUG a) 1401da177e4SLinus Torvalds 1411da177e4SLinus Torvalds static struct timer_list rt_flush_timer; 142beb659bdSEric Dumazet static void rt_worker_func(struct work_struct *work); 143beb659bdSEric Dumazet static DECLARE_DELAYED_WORK(expires_work, rt_worker_func); 1441da177e4SLinus Torvalds static struct timer_list rt_secret_timer; 1451da177e4SLinus Torvalds 1461da177e4SLinus Torvalds /* 1471da177e4SLinus Torvalds * Interface to generic destination cache. 1481da177e4SLinus Torvalds */ 1491da177e4SLinus Torvalds 1501da177e4SLinus Torvalds static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie); 1511da177e4SLinus Torvalds static void ipv4_dst_destroy(struct dst_entry *dst); 1521da177e4SLinus Torvalds static void ipv4_dst_ifdown(struct dst_entry *dst, 1531da177e4SLinus Torvalds struct net_device *dev, int how); 1541da177e4SLinus Torvalds static struct dst_entry *ipv4_negative_advice(struct dst_entry *dst); 1551da177e4SLinus Torvalds static void ipv4_link_failure(struct sk_buff *skb); 1561da177e4SLinus Torvalds static void ip_rt_update_pmtu(struct dst_entry *dst, u32 mtu); 1571da177e4SLinus Torvalds static int rt_garbage_collect(void); 1581da177e4SLinus Torvalds 1591da177e4SLinus Torvalds 1601da177e4SLinus Torvalds static struct dst_ops ipv4_dst_ops = { 1611da177e4SLinus Torvalds .family = AF_INET, 1621da177e4SLinus Torvalds .protocol = __constant_htons(ETH_P_IP), 1631da177e4SLinus Torvalds .gc = rt_garbage_collect, 1641da177e4SLinus Torvalds .check = ipv4_dst_check, 1651da177e4SLinus Torvalds .destroy = ipv4_dst_destroy, 1661da177e4SLinus Torvalds .ifdown = ipv4_dst_ifdown, 1671da177e4SLinus Torvalds .negative_advice = ipv4_negative_advice, 1681da177e4SLinus Torvalds .link_failure = ipv4_link_failure, 1691da177e4SLinus Torvalds .update_pmtu = ip_rt_update_pmtu, 170862b82c6SHerbert Xu .local_out = ip_local_out, 1711da177e4SLinus Torvalds .entry_size = sizeof(struct rtable), 1721da177e4SLinus Torvalds }; 1731da177e4SLinus Torvalds 1741da177e4SLinus Torvalds #define ECN_OR_COST(class) TC_PRIO_##class 1751da177e4SLinus Torvalds 1764839c52bSPhilippe De Muyter const __u8 ip_tos2prio[16] = { 1771da177e4SLinus Torvalds TC_PRIO_BESTEFFORT, 1781da177e4SLinus Torvalds ECN_OR_COST(FILLER), 1791da177e4SLinus Torvalds TC_PRIO_BESTEFFORT, 1801da177e4SLinus Torvalds ECN_OR_COST(BESTEFFORT), 1811da177e4SLinus Torvalds TC_PRIO_BULK, 1821da177e4SLinus Torvalds ECN_OR_COST(BULK), 1831da177e4SLinus Torvalds TC_PRIO_BULK, 1841da177e4SLinus Torvalds ECN_OR_COST(BULK), 1851da177e4SLinus Torvalds TC_PRIO_INTERACTIVE, 1861da177e4SLinus Torvalds ECN_OR_COST(INTERACTIVE), 1871da177e4SLinus Torvalds TC_PRIO_INTERACTIVE, 1881da177e4SLinus Torvalds ECN_OR_COST(INTERACTIVE), 1891da177e4SLinus Torvalds TC_PRIO_INTERACTIVE_BULK, 1901da177e4SLinus Torvalds ECN_OR_COST(INTERACTIVE_BULK), 1911da177e4SLinus Torvalds TC_PRIO_INTERACTIVE_BULK, 1921da177e4SLinus Torvalds ECN_OR_COST(INTERACTIVE_BULK) 1931da177e4SLinus Torvalds }; 1941da177e4SLinus Torvalds 1951da177e4SLinus Torvalds 1961da177e4SLinus Torvalds /* 1971da177e4SLinus Torvalds * Route cache. 1981da177e4SLinus Torvalds */ 1991da177e4SLinus Torvalds 2001da177e4SLinus Torvalds /* The locking scheme is rather straight forward: 2011da177e4SLinus Torvalds * 2021da177e4SLinus Torvalds * 1) Read-Copy Update protects the buckets of the central route hash. 2031da177e4SLinus Torvalds * 2) Only writers remove entries, and they hold the lock 2041da177e4SLinus Torvalds * as they look at rtable reference counts. 2051da177e4SLinus Torvalds * 3) Only readers acquire references to rtable entries, 2061da177e4SLinus Torvalds * they do so with atomic increments and with the 2071da177e4SLinus Torvalds * lock held. 2081da177e4SLinus Torvalds */ 2091da177e4SLinus Torvalds 2101da177e4SLinus Torvalds struct rt_hash_bucket { 2111da177e4SLinus Torvalds struct rtable *chain; 21222c047ccSEric Dumazet }; 2138a25d5deSIngo Molnar #if defined(CONFIG_SMP) || defined(CONFIG_DEBUG_SPINLOCK) || \ 2148a25d5deSIngo Molnar defined(CONFIG_PROVE_LOCKING) 21522c047ccSEric Dumazet /* 21622c047ccSEric Dumazet * Instead of using one spinlock for each rt_hash_bucket, we use a table of spinlocks 21722c047ccSEric Dumazet * The size of this table is a power of two and depends on the number of CPUS. 21862051200SIngo Molnar * (on lockdep we have a quite big spinlock_t, so keep the size down there) 21922c047ccSEric Dumazet */ 22062051200SIngo Molnar #ifdef CONFIG_LOCKDEP 22162051200SIngo Molnar # define RT_HASH_LOCK_SZ 256 22262051200SIngo Molnar #else 22322c047ccSEric Dumazet # if NR_CPUS >= 32 22422c047ccSEric Dumazet # define RT_HASH_LOCK_SZ 4096 22522c047ccSEric Dumazet # elif NR_CPUS >= 16 22622c047ccSEric Dumazet # define RT_HASH_LOCK_SZ 2048 22722c047ccSEric Dumazet # elif NR_CPUS >= 8 22822c047ccSEric Dumazet # define RT_HASH_LOCK_SZ 1024 22922c047ccSEric Dumazet # elif NR_CPUS >= 4 23022c047ccSEric Dumazet # define RT_HASH_LOCK_SZ 512 23122c047ccSEric Dumazet # else 23222c047ccSEric Dumazet # define RT_HASH_LOCK_SZ 256 23322c047ccSEric Dumazet # endif 23462051200SIngo Molnar #endif 23522c047ccSEric Dumazet 23622c047ccSEric Dumazet static spinlock_t *rt_hash_locks; 23722c047ccSEric Dumazet # define rt_hash_lock_addr(slot) &rt_hash_locks[(slot) & (RT_HASH_LOCK_SZ - 1)] 2381ff1cc20SPavel Emelyanov 2391ff1cc20SPavel Emelyanov static __init void rt_hash_lock_init(void) 2401ff1cc20SPavel Emelyanov { 2411ff1cc20SPavel Emelyanov int i; 2421ff1cc20SPavel Emelyanov 2431ff1cc20SPavel Emelyanov rt_hash_locks = kmalloc(sizeof(spinlock_t) * RT_HASH_LOCK_SZ, 2441ff1cc20SPavel Emelyanov GFP_KERNEL); 2451ff1cc20SPavel Emelyanov if (!rt_hash_locks) 2461ff1cc20SPavel Emelyanov panic("IP: failed to allocate rt_hash_locks\n"); 2471ff1cc20SPavel Emelyanov 2481ff1cc20SPavel Emelyanov for (i = 0; i < RT_HASH_LOCK_SZ; i++) 2491ff1cc20SPavel Emelyanov spin_lock_init(&rt_hash_locks[i]); 25022c047ccSEric Dumazet } 25122c047ccSEric Dumazet #else 25222c047ccSEric Dumazet # define rt_hash_lock_addr(slot) NULL 2531ff1cc20SPavel Emelyanov 2541ff1cc20SPavel Emelyanov static inline void rt_hash_lock_init(void) 2551ff1cc20SPavel Emelyanov { 2561ff1cc20SPavel Emelyanov } 25722c047ccSEric Dumazet #endif 2581da177e4SLinus Torvalds 2591da177e4SLinus Torvalds static struct rt_hash_bucket *rt_hash_table; 2601da177e4SLinus Torvalds static unsigned rt_hash_mask; 261cfcabdccSStephen Hemminger static unsigned int rt_hash_log; 2621da177e4SLinus Torvalds static unsigned int rt_hash_rnd; 2631da177e4SLinus Torvalds 2642f970d83SEric Dumazet static DEFINE_PER_CPU(struct rt_cache_stat, rt_cache_stat); 265dbd2915cSAndrew Morton #define RT_CACHE_STAT_INC(field) \ 266bfe5d834SPaul Mackerras (__raw_get_cpu_var(rt_cache_stat).field++) 2671da177e4SLinus Torvalds 2681da177e4SLinus Torvalds static int rt_intern_hash(unsigned hash, struct rtable *rth, 2691da177e4SLinus Torvalds struct rtable **res); 2701da177e4SLinus Torvalds 271cef2685eSIlia Sotnikov static unsigned int rt_hash_code(u32 daddr, u32 saddr) 2721da177e4SLinus Torvalds { 273cef2685eSIlia Sotnikov return (jhash_2words(daddr, saddr, rt_hash_rnd) 2741da177e4SLinus Torvalds & rt_hash_mask); 2751da177e4SLinus Torvalds } 2761da177e4SLinus Torvalds 2778c7bc840SAl Viro #define rt_hash(daddr, saddr, idx) \ 2788c7bc840SAl Viro rt_hash_code((__force u32)(__be32)(daddr),\ 2798c7bc840SAl Viro (__force u32)(__be32)(saddr) ^ ((idx) << 5)) 2808c7bc840SAl Viro 2811da177e4SLinus Torvalds #ifdef CONFIG_PROC_FS 2821da177e4SLinus Torvalds struct rt_cache_iter_state { 2831da177e4SLinus Torvalds int bucket; 2841da177e4SLinus Torvalds }; 2851da177e4SLinus Torvalds 2861da177e4SLinus Torvalds static struct rtable *rt_cache_get_first(struct seq_file *seq) 2871da177e4SLinus Torvalds { 2881da177e4SLinus Torvalds struct rtable *r = NULL; 2891da177e4SLinus Torvalds struct rt_cache_iter_state *st = seq->private; 2901da177e4SLinus Torvalds 2911da177e4SLinus Torvalds for (st->bucket = rt_hash_mask; st->bucket >= 0; --st->bucket) { 2921da177e4SLinus Torvalds rcu_read_lock_bh(); 2931da177e4SLinus Torvalds r = rt_hash_table[st->bucket].chain; 2941da177e4SLinus Torvalds if (r) 2951da177e4SLinus Torvalds break; 2961da177e4SLinus Torvalds rcu_read_unlock_bh(); 2971da177e4SLinus Torvalds } 2980bcceadcSEric Dumazet return rcu_dereference(r); 2991da177e4SLinus Torvalds } 3001da177e4SLinus Torvalds 3011da177e4SLinus Torvalds static struct rtable *rt_cache_get_next(struct seq_file *seq, struct rtable *r) 3021da177e4SLinus Torvalds { 3030bcceadcSEric Dumazet struct rt_cache_iter_state *st = seq->private; 3041da177e4SLinus Torvalds 305093c2ca4SEric Dumazet r = r->u.dst.rt_next; 3061da177e4SLinus Torvalds while (!r) { 3071da177e4SLinus Torvalds rcu_read_unlock_bh(); 3081da177e4SLinus Torvalds if (--st->bucket < 0) 3091da177e4SLinus Torvalds break; 3101da177e4SLinus Torvalds rcu_read_lock_bh(); 3111da177e4SLinus Torvalds r = rt_hash_table[st->bucket].chain; 3121da177e4SLinus Torvalds } 3130bcceadcSEric Dumazet return rcu_dereference(r); 3141da177e4SLinus Torvalds } 3151da177e4SLinus Torvalds 3161da177e4SLinus Torvalds static struct rtable *rt_cache_get_idx(struct seq_file *seq, loff_t pos) 3171da177e4SLinus Torvalds { 3181da177e4SLinus Torvalds struct rtable *r = rt_cache_get_first(seq); 3191da177e4SLinus Torvalds 3201da177e4SLinus Torvalds if (r) 3211da177e4SLinus Torvalds while (pos && (r = rt_cache_get_next(seq, r))) 3221da177e4SLinus Torvalds --pos; 3231da177e4SLinus Torvalds return pos ? NULL : r; 3241da177e4SLinus Torvalds } 3251da177e4SLinus Torvalds 3261da177e4SLinus Torvalds static void *rt_cache_seq_start(struct seq_file *seq, loff_t *pos) 3271da177e4SLinus Torvalds { 3281da177e4SLinus Torvalds return *pos ? rt_cache_get_idx(seq, *pos - 1) : SEQ_START_TOKEN; 3291da177e4SLinus Torvalds } 3301da177e4SLinus Torvalds 3311da177e4SLinus Torvalds static void *rt_cache_seq_next(struct seq_file *seq, void *v, loff_t *pos) 3321da177e4SLinus Torvalds { 3331da177e4SLinus Torvalds struct rtable *r = NULL; 3341da177e4SLinus Torvalds 3351da177e4SLinus Torvalds if (v == SEQ_START_TOKEN) 3361da177e4SLinus Torvalds r = rt_cache_get_first(seq); 3371da177e4SLinus Torvalds else 3381da177e4SLinus Torvalds r = rt_cache_get_next(seq, v); 3391da177e4SLinus Torvalds ++*pos; 3401da177e4SLinus Torvalds return r; 3411da177e4SLinus Torvalds } 3421da177e4SLinus Torvalds 3431da177e4SLinus Torvalds static void rt_cache_seq_stop(struct seq_file *seq, void *v) 3441da177e4SLinus Torvalds { 3451da177e4SLinus Torvalds if (v && v != SEQ_START_TOKEN) 3461da177e4SLinus Torvalds rcu_read_unlock_bh(); 3471da177e4SLinus Torvalds } 3481da177e4SLinus Torvalds 3491da177e4SLinus Torvalds static int rt_cache_seq_show(struct seq_file *seq, void *v) 3501da177e4SLinus Torvalds { 3511da177e4SLinus Torvalds if (v == SEQ_START_TOKEN) 3521da177e4SLinus Torvalds seq_printf(seq, "%-127s\n", 3531da177e4SLinus Torvalds "Iface\tDestination\tGateway \tFlags\t\tRefCnt\tUse\t" 3541da177e4SLinus Torvalds "Metric\tSource\t\tMTU\tWindow\tIRTT\tTOS\tHHRef\t" 3551da177e4SLinus Torvalds "HHUptod\tSpecDst"); 3561da177e4SLinus Torvalds else { 3571da177e4SLinus Torvalds struct rtable *r = v; 3581da177e4SLinus Torvalds char temp[256]; 3591da177e4SLinus Torvalds 3601da177e4SLinus Torvalds sprintf(temp, "%s\t%08lX\t%08lX\t%8X\t%d\t%u\t%d\t" 3611da177e4SLinus Torvalds "%08lX\t%d\t%u\t%u\t%02X\t%d\t%1d\t%08X", 3621da177e4SLinus Torvalds r->u.dst.dev ? r->u.dst.dev->name : "*", 3631da177e4SLinus Torvalds (unsigned long)r->rt_dst, (unsigned long)r->rt_gateway, 3641da177e4SLinus Torvalds r->rt_flags, atomic_read(&r->u.dst.__refcnt), 3651da177e4SLinus Torvalds r->u.dst.__use, 0, (unsigned long)r->rt_src, 3661da177e4SLinus Torvalds (dst_metric(&r->u.dst, RTAX_ADVMSS) ? 3671da177e4SLinus Torvalds (int)dst_metric(&r->u.dst, RTAX_ADVMSS) + 40 : 0), 3681da177e4SLinus Torvalds dst_metric(&r->u.dst, RTAX_WINDOW), 3691da177e4SLinus Torvalds (int)((dst_metric(&r->u.dst, RTAX_RTT) >> 3) + 3701da177e4SLinus Torvalds dst_metric(&r->u.dst, RTAX_RTTVAR)), 3711da177e4SLinus Torvalds r->fl.fl4_tos, 3721da177e4SLinus Torvalds r->u.dst.hh ? atomic_read(&r->u.dst.hh->hh_refcnt) : -1, 3731da177e4SLinus Torvalds r->u.dst.hh ? (r->u.dst.hh->hh_output == 3741da177e4SLinus Torvalds dev_queue_xmit) : 0, 3751da177e4SLinus Torvalds r->rt_spec_dst); 3761da177e4SLinus Torvalds seq_printf(seq, "%-127s\n", temp); 3771da177e4SLinus Torvalds } 3781da177e4SLinus Torvalds return 0; 3791da177e4SLinus Torvalds } 3801da177e4SLinus Torvalds 381f690808eSStephen Hemminger static const struct seq_operations rt_cache_seq_ops = { 3821da177e4SLinus Torvalds .start = rt_cache_seq_start, 3831da177e4SLinus Torvalds .next = rt_cache_seq_next, 3841da177e4SLinus Torvalds .stop = rt_cache_seq_stop, 3851da177e4SLinus Torvalds .show = rt_cache_seq_show, 3861da177e4SLinus Torvalds }; 3871da177e4SLinus Torvalds 3881da177e4SLinus Torvalds static int rt_cache_seq_open(struct inode *inode, struct file *file) 3891da177e4SLinus Torvalds { 390cf7732e4SPavel Emelyanov return seq_open_private(file, &rt_cache_seq_ops, 391cf7732e4SPavel Emelyanov sizeof(struct rt_cache_iter_state)); 3921da177e4SLinus Torvalds } 3931da177e4SLinus Torvalds 3949a32144eSArjan van de Ven static const struct file_operations rt_cache_seq_fops = { 3951da177e4SLinus Torvalds .owner = THIS_MODULE, 3961da177e4SLinus Torvalds .open = rt_cache_seq_open, 3971da177e4SLinus Torvalds .read = seq_read, 3981da177e4SLinus Torvalds .llseek = seq_lseek, 3991da177e4SLinus Torvalds .release = seq_release_private, 4001da177e4SLinus Torvalds }; 4011da177e4SLinus Torvalds 4021da177e4SLinus Torvalds 4031da177e4SLinus Torvalds static void *rt_cpu_seq_start(struct seq_file *seq, loff_t *pos) 4041da177e4SLinus Torvalds { 4051da177e4SLinus Torvalds int cpu; 4061da177e4SLinus Torvalds 4071da177e4SLinus Torvalds if (*pos == 0) 4081da177e4SLinus Torvalds return SEQ_START_TOKEN; 4091da177e4SLinus Torvalds 4101da177e4SLinus Torvalds for (cpu = *pos-1; cpu < NR_CPUS; ++cpu) { 4111da177e4SLinus Torvalds if (!cpu_possible(cpu)) 4121da177e4SLinus Torvalds continue; 4131da177e4SLinus Torvalds *pos = cpu+1; 4142f970d83SEric Dumazet return &per_cpu(rt_cache_stat, cpu); 4151da177e4SLinus Torvalds } 4161da177e4SLinus Torvalds return NULL; 4171da177e4SLinus Torvalds } 4181da177e4SLinus Torvalds 4191da177e4SLinus Torvalds static void *rt_cpu_seq_next(struct seq_file *seq, void *v, loff_t *pos) 4201da177e4SLinus Torvalds { 4211da177e4SLinus Torvalds int cpu; 4221da177e4SLinus Torvalds 4231da177e4SLinus Torvalds for (cpu = *pos; cpu < NR_CPUS; ++cpu) { 4241da177e4SLinus Torvalds if (!cpu_possible(cpu)) 4251da177e4SLinus Torvalds continue; 4261da177e4SLinus Torvalds *pos = cpu+1; 4272f970d83SEric Dumazet return &per_cpu(rt_cache_stat, cpu); 4281da177e4SLinus Torvalds } 4291da177e4SLinus Torvalds return NULL; 4301da177e4SLinus Torvalds 4311da177e4SLinus Torvalds } 4321da177e4SLinus Torvalds 4331da177e4SLinus Torvalds static void rt_cpu_seq_stop(struct seq_file *seq, void *v) 4341da177e4SLinus Torvalds { 4351da177e4SLinus Torvalds 4361da177e4SLinus Torvalds } 4371da177e4SLinus Torvalds 4381da177e4SLinus Torvalds static int rt_cpu_seq_show(struct seq_file *seq, void *v) 4391da177e4SLinus Torvalds { 4401da177e4SLinus Torvalds struct rt_cache_stat *st = v; 4411da177e4SLinus Torvalds 4421da177e4SLinus Torvalds if (v == SEQ_START_TOKEN) { 4435bec0039SOlaf Rempel seq_printf(seq, "entries in_hit in_slow_tot in_slow_mc in_no_route in_brd in_martian_dst in_martian_src out_hit out_slow_tot out_slow_mc gc_total gc_ignored gc_goal_miss gc_dst_overflow in_hlist_search out_hlist_search\n"); 4441da177e4SLinus Torvalds return 0; 4451da177e4SLinus Torvalds } 4461da177e4SLinus Torvalds 4471da177e4SLinus Torvalds seq_printf(seq,"%08x %08x %08x %08x %08x %08x %08x %08x " 4481da177e4SLinus Torvalds " %08x %08x %08x %08x %08x %08x %08x %08x %08x \n", 4491da177e4SLinus Torvalds atomic_read(&ipv4_dst_ops.entries), 4501da177e4SLinus Torvalds st->in_hit, 4511da177e4SLinus Torvalds st->in_slow_tot, 4521da177e4SLinus Torvalds st->in_slow_mc, 4531da177e4SLinus Torvalds st->in_no_route, 4541da177e4SLinus Torvalds st->in_brd, 4551da177e4SLinus Torvalds st->in_martian_dst, 4561da177e4SLinus Torvalds st->in_martian_src, 4571da177e4SLinus Torvalds 4581da177e4SLinus Torvalds st->out_hit, 4591da177e4SLinus Torvalds st->out_slow_tot, 4601da177e4SLinus Torvalds st->out_slow_mc, 4611da177e4SLinus Torvalds 4621da177e4SLinus Torvalds st->gc_total, 4631da177e4SLinus Torvalds st->gc_ignored, 4641da177e4SLinus Torvalds st->gc_goal_miss, 4651da177e4SLinus Torvalds st->gc_dst_overflow, 4661da177e4SLinus Torvalds st->in_hlist_search, 4671da177e4SLinus Torvalds st->out_hlist_search 4681da177e4SLinus Torvalds ); 4691da177e4SLinus Torvalds return 0; 4701da177e4SLinus Torvalds } 4711da177e4SLinus Torvalds 472f690808eSStephen Hemminger static const struct seq_operations rt_cpu_seq_ops = { 4731da177e4SLinus Torvalds .start = rt_cpu_seq_start, 4741da177e4SLinus Torvalds .next = rt_cpu_seq_next, 4751da177e4SLinus Torvalds .stop = rt_cpu_seq_stop, 4761da177e4SLinus Torvalds .show = rt_cpu_seq_show, 4771da177e4SLinus Torvalds }; 4781da177e4SLinus Torvalds 4791da177e4SLinus Torvalds 4801da177e4SLinus Torvalds static int rt_cpu_seq_open(struct inode *inode, struct file *file) 4811da177e4SLinus Torvalds { 4821da177e4SLinus Torvalds return seq_open(file, &rt_cpu_seq_ops); 4831da177e4SLinus Torvalds } 4841da177e4SLinus Torvalds 4859a32144eSArjan van de Ven static const struct file_operations rt_cpu_seq_fops = { 4861da177e4SLinus Torvalds .owner = THIS_MODULE, 4871da177e4SLinus Torvalds .open = rt_cpu_seq_open, 4881da177e4SLinus Torvalds .read = seq_read, 4891da177e4SLinus Torvalds .llseek = seq_lseek, 4901da177e4SLinus Torvalds .release = seq_release, 4911da177e4SLinus Torvalds }; 4921da177e4SLinus Torvalds 49378c686e9SPavel Emelyanov #ifdef CONFIG_NET_CLS_ROUTE 49478c686e9SPavel Emelyanov static int ip_rt_acct_read(char *buffer, char **start, off_t offset, 49578c686e9SPavel Emelyanov int length, int *eof, void *data) 49678c686e9SPavel Emelyanov { 49778c686e9SPavel Emelyanov unsigned int i; 49878c686e9SPavel Emelyanov 49978c686e9SPavel Emelyanov if ((offset & 3) || (length & 3)) 50078c686e9SPavel Emelyanov return -EIO; 50178c686e9SPavel Emelyanov 50278c686e9SPavel Emelyanov if (offset >= sizeof(struct ip_rt_acct) * 256) { 50378c686e9SPavel Emelyanov *eof = 1; 50478c686e9SPavel Emelyanov return 0; 50578c686e9SPavel Emelyanov } 50678c686e9SPavel Emelyanov 50778c686e9SPavel Emelyanov if (offset + length >= sizeof(struct ip_rt_acct) * 256) { 50878c686e9SPavel Emelyanov length = sizeof(struct ip_rt_acct) * 256 - offset; 50978c686e9SPavel Emelyanov *eof = 1; 51078c686e9SPavel Emelyanov } 51178c686e9SPavel Emelyanov 51278c686e9SPavel Emelyanov offset /= sizeof(u32); 51378c686e9SPavel Emelyanov 51478c686e9SPavel Emelyanov if (length > 0) { 51578c686e9SPavel Emelyanov u32 *dst = (u32 *) buffer; 51678c686e9SPavel Emelyanov 51778c686e9SPavel Emelyanov *start = buffer; 51878c686e9SPavel Emelyanov memset(dst, 0, length); 51978c686e9SPavel Emelyanov 52078c686e9SPavel Emelyanov for_each_possible_cpu(i) { 52178c686e9SPavel Emelyanov unsigned int j; 52278c686e9SPavel Emelyanov u32 *src; 52378c686e9SPavel Emelyanov 52478c686e9SPavel Emelyanov src = ((u32 *) per_cpu_ptr(ip_rt_acct, i)) + offset; 52578c686e9SPavel Emelyanov for (j = 0; j < length/4; j++) 52678c686e9SPavel Emelyanov dst[j] += src[j]; 52778c686e9SPavel Emelyanov } 52878c686e9SPavel Emelyanov } 52978c686e9SPavel Emelyanov return length; 53078c686e9SPavel Emelyanov } 53178c686e9SPavel Emelyanov #endif 532107f1634SPavel Emelyanov 533107f1634SPavel Emelyanov static __init int ip_rt_proc_init(struct net *net) 534107f1634SPavel Emelyanov { 535107f1634SPavel Emelyanov struct proc_dir_entry *pde; 536107f1634SPavel Emelyanov 537107f1634SPavel Emelyanov pde = proc_net_fops_create(net, "rt_cache", S_IRUGO, 538107f1634SPavel Emelyanov &rt_cache_seq_fops); 539107f1634SPavel Emelyanov if (!pde) 540107f1634SPavel Emelyanov goto err1; 541107f1634SPavel Emelyanov 542107f1634SPavel Emelyanov pde = create_proc_entry("rt_cache", S_IRUGO, net->proc_net_stat); 543107f1634SPavel Emelyanov if (!pde) 544107f1634SPavel Emelyanov goto err2; 545107f1634SPavel Emelyanov 546107f1634SPavel Emelyanov pde->proc_fops = &rt_cpu_seq_fops; 547107f1634SPavel Emelyanov 548107f1634SPavel Emelyanov #ifdef CONFIG_NET_CLS_ROUTE 549107f1634SPavel Emelyanov pde = create_proc_read_entry("rt_acct", 0, net->proc_net, 550107f1634SPavel Emelyanov ip_rt_acct_read, NULL); 551107f1634SPavel Emelyanov if (!pde) 552107f1634SPavel Emelyanov goto err3; 553107f1634SPavel Emelyanov #endif 554107f1634SPavel Emelyanov return 0; 555107f1634SPavel Emelyanov 556107f1634SPavel Emelyanov #ifdef CONFIG_NET_CLS_ROUTE 557107f1634SPavel Emelyanov err3: 558107f1634SPavel Emelyanov remove_proc_entry("rt_cache", net->proc_net_stat); 559107f1634SPavel Emelyanov #endif 560107f1634SPavel Emelyanov err2: 561107f1634SPavel Emelyanov remove_proc_entry("rt_cache", net->proc_net); 562107f1634SPavel Emelyanov err1: 563107f1634SPavel Emelyanov return -ENOMEM; 564107f1634SPavel Emelyanov } 565107f1634SPavel Emelyanov #else 566107f1634SPavel Emelyanov static inline int ip_rt_proc_init(struct net *net) 567107f1634SPavel Emelyanov { 568107f1634SPavel Emelyanov return 0; 569107f1634SPavel Emelyanov } 5701da177e4SLinus Torvalds #endif /* CONFIG_PROC_FS */ 5711da177e4SLinus Torvalds 5721da177e4SLinus Torvalds static __inline__ void rt_free(struct rtable *rt) 5731da177e4SLinus Torvalds { 5741da177e4SLinus Torvalds call_rcu_bh(&rt->u.dst.rcu_head, dst_rcu_free); 5751da177e4SLinus Torvalds } 5761da177e4SLinus Torvalds 5771da177e4SLinus Torvalds static __inline__ void rt_drop(struct rtable *rt) 5781da177e4SLinus Torvalds { 5791da177e4SLinus Torvalds ip_rt_put(rt); 5801da177e4SLinus Torvalds call_rcu_bh(&rt->u.dst.rcu_head, dst_rcu_free); 5811da177e4SLinus Torvalds } 5821da177e4SLinus Torvalds 5831da177e4SLinus Torvalds static __inline__ int rt_fast_clean(struct rtable *rth) 5841da177e4SLinus Torvalds { 5851da177e4SLinus Torvalds /* Kill broadcast/multicast entries very aggresively, if they 5861da177e4SLinus Torvalds collide in hash table with more useful entries */ 5871da177e4SLinus Torvalds return (rth->rt_flags & (RTCF_BROADCAST | RTCF_MULTICAST)) && 588093c2ca4SEric Dumazet rth->fl.iif && rth->u.dst.rt_next; 5891da177e4SLinus Torvalds } 5901da177e4SLinus Torvalds 5911da177e4SLinus Torvalds static __inline__ int rt_valuable(struct rtable *rth) 5921da177e4SLinus Torvalds { 5931da177e4SLinus Torvalds return (rth->rt_flags & (RTCF_REDIRECTED | RTCF_NOTIFY)) || 5941da177e4SLinus Torvalds rth->u.dst.expires; 5951da177e4SLinus Torvalds } 5961da177e4SLinus Torvalds 5971da177e4SLinus Torvalds static int rt_may_expire(struct rtable *rth, unsigned long tmo1, unsigned long tmo2) 5981da177e4SLinus Torvalds { 5991da177e4SLinus Torvalds unsigned long age; 6001da177e4SLinus Torvalds int ret = 0; 6011da177e4SLinus Torvalds 6021da177e4SLinus Torvalds if (atomic_read(&rth->u.dst.__refcnt)) 6031da177e4SLinus Torvalds goto out; 6041da177e4SLinus Torvalds 6051da177e4SLinus Torvalds ret = 1; 6061da177e4SLinus Torvalds if (rth->u.dst.expires && 6071da177e4SLinus Torvalds time_after_eq(jiffies, rth->u.dst.expires)) 6081da177e4SLinus Torvalds goto out; 6091da177e4SLinus Torvalds 6101da177e4SLinus Torvalds age = jiffies - rth->u.dst.lastuse; 6111da177e4SLinus Torvalds ret = 0; 6121da177e4SLinus Torvalds if ((age <= tmo1 && !rt_fast_clean(rth)) || 6131da177e4SLinus Torvalds (age <= tmo2 && rt_valuable(rth))) 6141da177e4SLinus Torvalds goto out; 6151da177e4SLinus Torvalds ret = 1; 6161da177e4SLinus Torvalds out: return ret; 6171da177e4SLinus Torvalds } 6181da177e4SLinus Torvalds 6191da177e4SLinus Torvalds /* Bits of score are: 6201da177e4SLinus Torvalds * 31: very valuable 6211da177e4SLinus Torvalds * 30: not quite useless 6221da177e4SLinus Torvalds * 29..0: usage counter 6231da177e4SLinus Torvalds */ 6241da177e4SLinus Torvalds static inline u32 rt_score(struct rtable *rt) 6251da177e4SLinus Torvalds { 6261da177e4SLinus Torvalds u32 score = jiffies - rt->u.dst.lastuse; 6271da177e4SLinus Torvalds 6281da177e4SLinus Torvalds score = ~score & ~(3<<30); 6291da177e4SLinus Torvalds 6301da177e4SLinus Torvalds if (rt_valuable(rt)) 6311da177e4SLinus Torvalds score |= (1<<31); 6321da177e4SLinus Torvalds 6331da177e4SLinus Torvalds if (!rt->fl.iif || 6341da177e4SLinus Torvalds !(rt->rt_flags & (RTCF_BROADCAST|RTCF_MULTICAST|RTCF_LOCAL))) 6351da177e4SLinus Torvalds score |= (1<<30); 6361da177e4SLinus Torvalds 6371da177e4SLinus Torvalds return score; 6381da177e4SLinus Torvalds } 6391da177e4SLinus Torvalds 6401da177e4SLinus Torvalds static inline int compare_keys(struct flowi *fl1, struct flowi *fl2) 6411da177e4SLinus Torvalds { 642714e85beSAl Viro return ((__force u32)((fl1->nl_u.ip4_u.daddr ^ fl2->nl_u.ip4_u.daddr) | 643714e85beSAl Viro (fl1->nl_u.ip4_u.saddr ^ fl2->nl_u.ip4_u.saddr)) | 64447dcf0cbSThomas Graf (fl1->mark ^ fl2->mark) | 6458238b218SDavid S. Miller (*(u16 *)&fl1->nl_u.ip4_u.tos ^ 6468238b218SDavid S. Miller *(u16 *)&fl2->nl_u.ip4_u.tos) | 6478238b218SDavid S. Miller (fl1->oif ^ fl2->oif) | 6488238b218SDavid S. Miller (fl1->iif ^ fl2->iif)) == 0; 6491da177e4SLinus Torvalds } 6501da177e4SLinus Torvalds 651beb659bdSEric Dumazet /* 652beb659bdSEric Dumazet * Perform a full scan of hash table and free all entries. 653beb659bdSEric Dumazet * Can be called by a softirq or a process. 654beb659bdSEric Dumazet * In the later case, we want to be reschedule if necessary 655beb659bdSEric Dumazet */ 656beb659bdSEric Dumazet static void rt_do_flush(int process_context) 657beb659bdSEric Dumazet { 658beb659bdSEric Dumazet unsigned int i; 659beb659bdSEric Dumazet struct rtable *rth, *next; 660beb659bdSEric Dumazet 661beb659bdSEric Dumazet for (i = 0; i <= rt_hash_mask; i++) { 662beb659bdSEric Dumazet if (process_context && need_resched()) 663beb659bdSEric Dumazet cond_resched(); 664beb659bdSEric Dumazet rth = rt_hash_table[i].chain; 665beb659bdSEric Dumazet if (!rth) 666beb659bdSEric Dumazet continue; 667beb659bdSEric Dumazet 668beb659bdSEric Dumazet spin_lock_bh(rt_hash_lock_addr(i)); 669beb659bdSEric Dumazet rth = rt_hash_table[i].chain; 670beb659bdSEric Dumazet rt_hash_table[i].chain = NULL; 671beb659bdSEric Dumazet spin_unlock_bh(rt_hash_lock_addr(i)); 672beb659bdSEric Dumazet 673beb659bdSEric Dumazet for (; rth; rth = next) { 674beb659bdSEric Dumazet next = rth->u.dst.rt_next; 675beb659bdSEric Dumazet rt_free(rth); 676beb659bdSEric Dumazet } 677beb659bdSEric Dumazet } 678beb659bdSEric Dumazet } 679beb659bdSEric Dumazet 680beb659bdSEric Dumazet static void rt_check_expire(void) 6811da177e4SLinus Torvalds { 682bb1d23b0SEric Dumazet static unsigned int rover; 683bb1d23b0SEric Dumazet unsigned int i = rover, goal; 6841da177e4SLinus Torvalds struct rtable *rth, **rthp; 685bb1d23b0SEric Dumazet u64 mult; 6861da177e4SLinus Torvalds 687bb1d23b0SEric Dumazet mult = ((u64)ip_rt_gc_interval) << rt_hash_log; 688bb1d23b0SEric Dumazet if (ip_rt_gc_timeout > 1) 689bb1d23b0SEric Dumazet do_div(mult, ip_rt_gc_timeout); 690bb1d23b0SEric Dumazet goal = (unsigned int)mult; 69139c90eceSEric Dumazet if (goal > rt_hash_mask) 69239c90eceSEric Dumazet goal = rt_hash_mask + 1; 693bb1d23b0SEric Dumazet for (; goal > 0; goal--) { 6941da177e4SLinus Torvalds unsigned long tmo = ip_rt_gc_timeout; 6951da177e4SLinus Torvalds 6961da177e4SLinus Torvalds i = (i + 1) & rt_hash_mask; 6971da177e4SLinus Torvalds rthp = &rt_hash_table[i].chain; 6981da177e4SLinus Torvalds 699d90bf5a9SEric Dumazet if (need_resched()) 700d90bf5a9SEric Dumazet cond_resched(); 701d90bf5a9SEric Dumazet 702cfcabdccSStephen Hemminger if (*rthp == NULL) 703bb1d23b0SEric Dumazet continue; 70439c90eceSEric Dumazet spin_lock_bh(rt_hash_lock_addr(i)); 7051da177e4SLinus Torvalds while ((rth = *rthp) != NULL) { 7061da177e4SLinus Torvalds if (rth->u.dst.expires) { 7071da177e4SLinus Torvalds /* Entry is expired even if it is in use */ 70839c90eceSEric Dumazet if (time_before_eq(jiffies, rth->u.dst.expires)) { 7091da177e4SLinus Torvalds tmo >>= 1; 710093c2ca4SEric Dumazet rthp = &rth->u.dst.rt_next; 7111da177e4SLinus Torvalds continue; 7121da177e4SLinus Torvalds } 7131da177e4SLinus Torvalds } else if (!rt_may_expire(rth, tmo, ip_rt_gc_timeout)) { 7141da177e4SLinus Torvalds tmo >>= 1; 715093c2ca4SEric Dumazet rthp = &rth->u.dst.rt_next; 7161da177e4SLinus Torvalds continue; 7171da177e4SLinus Torvalds } 7181da177e4SLinus Torvalds 7191da177e4SLinus Torvalds /* Cleanup aged off entries. */ 720093c2ca4SEric Dumazet *rthp = rth->u.dst.rt_next; 7211da177e4SLinus Torvalds rt_free(rth); 7221da177e4SLinus Torvalds } 72339c90eceSEric Dumazet spin_unlock_bh(rt_hash_lock_addr(i)); 7241da177e4SLinus Torvalds } 7251da177e4SLinus Torvalds rover = i; 726beb659bdSEric Dumazet } 727beb659bdSEric Dumazet 728beb659bdSEric Dumazet /* 729beb659bdSEric Dumazet * rt_worker_func() is run in process context. 730beb659bdSEric Dumazet * If a whole flush was scheduled, it is done. 731beb659bdSEric Dumazet * Else, we call rt_check_expire() to scan part of the hash table 732beb659bdSEric Dumazet */ 733beb659bdSEric Dumazet static void rt_worker_func(struct work_struct *work) 734beb659bdSEric Dumazet { 735beb659bdSEric Dumazet if (ip_rt_flush_expected) { 736beb659bdSEric Dumazet ip_rt_flush_expected = 0; 737beb659bdSEric Dumazet rt_do_flush(1); 738beb659bdSEric Dumazet } else 739beb659bdSEric Dumazet rt_check_expire(); 74039c90eceSEric Dumazet schedule_delayed_work(&expires_work, ip_rt_gc_interval); 7411da177e4SLinus Torvalds } 7421da177e4SLinus Torvalds 7431da177e4SLinus Torvalds /* This can run from both BH and non-BH contexts, the latter 7441da177e4SLinus Torvalds * in the case of a forced flush event. 7451da177e4SLinus Torvalds */ 746beb659bdSEric Dumazet static void rt_run_flush(unsigned long process_context) 7471da177e4SLinus Torvalds { 7481da177e4SLinus Torvalds rt_deadline = 0; 7491da177e4SLinus Torvalds 7501da177e4SLinus Torvalds get_random_bytes(&rt_hash_rnd, 4); 7511da177e4SLinus Torvalds 752beb659bdSEric Dumazet rt_do_flush(process_context); 7531da177e4SLinus Torvalds } 7541da177e4SLinus Torvalds 7551da177e4SLinus Torvalds static DEFINE_SPINLOCK(rt_flush_lock); 7561da177e4SLinus Torvalds 7571da177e4SLinus Torvalds void rt_cache_flush(int delay) 7581da177e4SLinus Torvalds { 7591da177e4SLinus Torvalds unsigned long now = jiffies; 7601da177e4SLinus Torvalds int user_mode = !in_softirq(); 7611da177e4SLinus Torvalds 7621da177e4SLinus Torvalds if (delay < 0) 7631da177e4SLinus Torvalds delay = ip_rt_min_delay; 7641da177e4SLinus Torvalds 7651da177e4SLinus Torvalds spin_lock_bh(&rt_flush_lock); 7661da177e4SLinus Torvalds 7671da177e4SLinus Torvalds if (del_timer(&rt_flush_timer) && delay > 0 && rt_deadline) { 7681da177e4SLinus Torvalds long tmo = (long)(rt_deadline - now); 7691da177e4SLinus Torvalds 7701da177e4SLinus Torvalds /* If flush timer is already running 7711da177e4SLinus Torvalds and flush request is not immediate (delay > 0): 7721da177e4SLinus Torvalds 7731da177e4SLinus Torvalds if deadline is not achieved, prolongate timer to "delay", 7741da177e4SLinus Torvalds otherwise fire it at deadline time. 7751da177e4SLinus Torvalds */ 7761da177e4SLinus Torvalds 7771da177e4SLinus Torvalds if (user_mode && tmo < ip_rt_max_delay-ip_rt_min_delay) 7781da177e4SLinus Torvalds tmo = 0; 7791da177e4SLinus Torvalds 7801da177e4SLinus Torvalds if (delay > tmo) 7811da177e4SLinus Torvalds delay = tmo; 7821da177e4SLinus Torvalds } 7831da177e4SLinus Torvalds 7841da177e4SLinus Torvalds if (delay <= 0) { 7851da177e4SLinus Torvalds spin_unlock_bh(&rt_flush_lock); 786beb659bdSEric Dumazet rt_run_flush(user_mode); 7871da177e4SLinus Torvalds return; 7881da177e4SLinus Torvalds } 7891da177e4SLinus Torvalds 7901da177e4SLinus Torvalds if (rt_deadline == 0) 7911da177e4SLinus Torvalds rt_deadline = now + ip_rt_max_delay; 7921da177e4SLinus Torvalds 7931da177e4SLinus Torvalds mod_timer(&rt_flush_timer, now+delay); 7941da177e4SLinus Torvalds spin_unlock_bh(&rt_flush_lock); 7951da177e4SLinus Torvalds } 7961da177e4SLinus Torvalds 797beb659bdSEric Dumazet /* 798beb659bdSEric Dumazet * We change rt_hash_rnd and ask next rt_worker_func() invocation 799beb659bdSEric Dumazet * to perform a flush in process context 800beb659bdSEric Dumazet */ 8011da177e4SLinus Torvalds static void rt_secret_rebuild(unsigned long dummy) 8021da177e4SLinus Torvalds { 803beb659bdSEric Dumazet get_random_bytes(&rt_hash_rnd, 4); 804beb659bdSEric Dumazet ip_rt_flush_expected = 1; 805beb659bdSEric Dumazet cancel_delayed_work(&expires_work); 806beb659bdSEric Dumazet schedule_delayed_work(&expires_work, HZ/10); 807beb659bdSEric Dumazet mod_timer(&rt_secret_timer, jiffies + ip_rt_secret_interval); 8081da177e4SLinus Torvalds } 8091da177e4SLinus Torvalds 8101da177e4SLinus Torvalds /* 8111da177e4SLinus Torvalds Short description of GC goals. 8121da177e4SLinus Torvalds 8131da177e4SLinus Torvalds We want to build algorithm, which will keep routing cache 8141da177e4SLinus Torvalds at some equilibrium point, when number of aged off entries 8151da177e4SLinus Torvalds is kept approximately equal to newly generated ones. 8161da177e4SLinus Torvalds 8171da177e4SLinus Torvalds Current expiration strength is variable "expire". 8181da177e4SLinus Torvalds We try to adjust it dynamically, so that if networking 8191da177e4SLinus Torvalds is idle expires is large enough to keep enough of warm entries, 8201da177e4SLinus Torvalds and when load increases it reduces to limit cache size. 8211da177e4SLinus Torvalds */ 8221da177e4SLinus Torvalds 8231da177e4SLinus Torvalds static int rt_garbage_collect(void) 8241da177e4SLinus Torvalds { 8251da177e4SLinus Torvalds static unsigned long expire = RT_GC_TIMEOUT; 8261da177e4SLinus Torvalds static unsigned long last_gc; 8271da177e4SLinus Torvalds static int rover; 8281da177e4SLinus Torvalds static int equilibrium; 8291da177e4SLinus Torvalds struct rtable *rth, **rthp; 8301da177e4SLinus Torvalds unsigned long now = jiffies; 8311da177e4SLinus Torvalds int goal; 8321da177e4SLinus Torvalds 8331da177e4SLinus Torvalds /* 8341da177e4SLinus Torvalds * Garbage collection is pretty expensive, 8351da177e4SLinus Torvalds * do not make it too frequently. 8361da177e4SLinus Torvalds */ 8371da177e4SLinus Torvalds 8381da177e4SLinus Torvalds RT_CACHE_STAT_INC(gc_total); 8391da177e4SLinus Torvalds 8401da177e4SLinus Torvalds if (now - last_gc < ip_rt_gc_min_interval && 8411da177e4SLinus Torvalds atomic_read(&ipv4_dst_ops.entries) < ip_rt_max_size) { 8421da177e4SLinus Torvalds RT_CACHE_STAT_INC(gc_ignored); 8431da177e4SLinus Torvalds goto out; 8441da177e4SLinus Torvalds } 8451da177e4SLinus Torvalds 8461da177e4SLinus Torvalds /* Calculate number of entries, which we want to expire now. */ 8471da177e4SLinus Torvalds goal = atomic_read(&ipv4_dst_ops.entries) - 8481da177e4SLinus Torvalds (ip_rt_gc_elasticity << rt_hash_log); 8491da177e4SLinus Torvalds if (goal <= 0) { 8501da177e4SLinus Torvalds if (equilibrium < ipv4_dst_ops.gc_thresh) 8511da177e4SLinus Torvalds equilibrium = ipv4_dst_ops.gc_thresh; 8521da177e4SLinus Torvalds goal = atomic_read(&ipv4_dst_ops.entries) - equilibrium; 8531da177e4SLinus Torvalds if (goal > 0) { 8541da177e4SLinus Torvalds equilibrium += min_t(unsigned int, goal / 2, rt_hash_mask + 1); 8551da177e4SLinus Torvalds goal = atomic_read(&ipv4_dst_ops.entries) - equilibrium; 8561da177e4SLinus Torvalds } 8571da177e4SLinus Torvalds } else { 8581da177e4SLinus Torvalds /* We are in dangerous area. Try to reduce cache really 8591da177e4SLinus Torvalds * aggressively. 8601da177e4SLinus Torvalds */ 8611da177e4SLinus Torvalds goal = max_t(unsigned int, goal / 2, rt_hash_mask + 1); 8621da177e4SLinus Torvalds equilibrium = atomic_read(&ipv4_dst_ops.entries) - goal; 8631da177e4SLinus Torvalds } 8641da177e4SLinus Torvalds 8651da177e4SLinus Torvalds if (now - last_gc >= ip_rt_gc_min_interval) 8661da177e4SLinus Torvalds last_gc = now; 8671da177e4SLinus Torvalds 8681da177e4SLinus Torvalds if (goal <= 0) { 8691da177e4SLinus Torvalds equilibrium += goal; 8701da177e4SLinus Torvalds goto work_done; 8711da177e4SLinus Torvalds } 8721da177e4SLinus Torvalds 8731da177e4SLinus Torvalds do { 8741da177e4SLinus Torvalds int i, k; 8751da177e4SLinus Torvalds 8761da177e4SLinus Torvalds for (i = rt_hash_mask, k = rover; i >= 0; i--) { 8771da177e4SLinus Torvalds unsigned long tmo = expire; 8781da177e4SLinus Torvalds 8791da177e4SLinus Torvalds k = (k + 1) & rt_hash_mask; 8801da177e4SLinus Torvalds rthp = &rt_hash_table[k].chain; 88122c047ccSEric Dumazet spin_lock_bh(rt_hash_lock_addr(k)); 8821da177e4SLinus Torvalds while ((rth = *rthp) != NULL) { 8831da177e4SLinus Torvalds if (!rt_may_expire(rth, tmo, expire)) { 8841da177e4SLinus Torvalds tmo >>= 1; 885093c2ca4SEric Dumazet rthp = &rth->u.dst.rt_next; 8861da177e4SLinus Torvalds continue; 8871da177e4SLinus Torvalds } 888093c2ca4SEric Dumazet *rthp = rth->u.dst.rt_next; 8891da177e4SLinus Torvalds rt_free(rth); 8901da177e4SLinus Torvalds goal--; 8911da177e4SLinus Torvalds } 89222c047ccSEric Dumazet spin_unlock_bh(rt_hash_lock_addr(k)); 8931da177e4SLinus Torvalds if (goal <= 0) 8941da177e4SLinus Torvalds break; 8951da177e4SLinus Torvalds } 8961da177e4SLinus Torvalds rover = k; 8971da177e4SLinus Torvalds 8981da177e4SLinus Torvalds if (goal <= 0) 8991da177e4SLinus Torvalds goto work_done; 9001da177e4SLinus Torvalds 9011da177e4SLinus Torvalds /* Goal is not achieved. We stop process if: 9021da177e4SLinus Torvalds 9031da177e4SLinus Torvalds - if expire reduced to zero. Otherwise, expire is halfed. 9041da177e4SLinus Torvalds - if table is not full. 9051da177e4SLinus Torvalds - if we are called from interrupt. 9061da177e4SLinus Torvalds - jiffies check is just fallback/debug loop breaker. 9071da177e4SLinus Torvalds We will not spin here for long time in any case. 9081da177e4SLinus Torvalds */ 9091da177e4SLinus Torvalds 9101da177e4SLinus Torvalds RT_CACHE_STAT_INC(gc_goal_miss); 9111da177e4SLinus Torvalds 9121da177e4SLinus Torvalds if (expire == 0) 9131da177e4SLinus Torvalds break; 9141da177e4SLinus Torvalds 9151da177e4SLinus Torvalds expire >>= 1; 9161da177e4SLinus Torvalds #if RT_CACHE_DEBUG >= 2 9171da177e4SLinus Torvalds printk(KERN_DEBUG "expire>> %u %d %d %d\n", expire, 9181da177e4SLinus Torvalds atomic_read(&ipv4_dst_ops.entries), goal, i); 9191da177e4SLinus Torvalds #endif 9201da177e4SLinus Torvalds 9211da177e4SLinus Torvalds if (atomic_read(&ipv4_dst_ops.entries) < ip_rt_max_size) 9221da177e4SLinus Torvalds goto out; 9231da177e4SLinus Torvalds } while (!in_softirq() && time_before_eq(jiffies, now)); 9241da177e4SLinus Torvalds 9251da177e4SLinus Torvalds if (atomic_read(&ipv4_dst_ops.entries) < ip_rt_max_size) 9261da177e4SLinus Torvalds goto out; 9271da177e4SLinus Torvalds if (net_ratelimit()) 9281da177e4SLinus Torvalds printk(KERN_WARNING "dst cache overflow\n"); 9291da177e4SLinus Torvalds RT_CACHE_STAT_INC(gc_dst_overflow); 9301da177e4SLinus Torvalds return 1; 9311da177e4SLinus Torvalds 9321da177e4SLinus Torvalds work_done: 9331da177e4SLinus Torvalds expire += ip_rt_gc_min_interval; 9341da177e4SLinus Torvalds if (expire > ip_rt_gc_timeout || 9351da177e4SLinus Torvalds atomic_read(&ipv4_dst_ops.entries) < ipv4_dst_ops.gc_thresh) 9361da177e4SLinus Torvalds expire = ip_rt_gc_timeout; 9371da177e4SLinus Torvalds #if RT_CACHE_DEBUG >= 2 9381da177e4SLinus Torvalds printk(KERN_DEBUG "expire++ %u %d %d %d\n", expire, 9391da177e4SLinus Torvalds atomic_read(&ipv4_dst_ops.entries), goal, rover); 9401da177e4SLinus Torvalds #endif 9411da177e4SLinus Torvalds out: return 0; 9421da177e4SLinus Torvalds } 9431da177e4SLinus Torvalds 9441da177e4SLinus Torvalds static int rt_intern_hash(unsigned hash, struct rtable *rt, struct rtable **rp) 9451da177e4SLinus Torvalds { 9461da177e4SLinus Torvalds struct rtable *rth, **rthp; 9471da177e4SLinus Torvalds unsigned long now; 9481da177e4SLinus Torvalds struct rtable *cand, **candp; 9491da177e4SLinus Torvalds u32 min_score; 9501da177e4SLinus Torvalds int chain_length; 9511da177e4SLinus Torvalds int attempts = !in_softirq(); 9521da177e4SLinus Torvalds 9531da177e4SLinus Torvalds restart: 9541da177e4SLinus Torvalds chain_length = 0; 9551da177e4SLinus Torvalds min_score = ~(u32)0; 9561da177e4SLinus Torvalds cand = NULL; 9571da177e4SLinus Torvalds candp = NULL; 9581da177e4SLinus Torvalds now = jiffies; 9591da177e4SLinus Torvalds 9601da177e4SLinus Torvalds rthp = &rt_hash_table[hash].chain; 9611da177e4SLinus Torvalds 96222c047ccSEric Dumazet spin_lock_bh(rt_hash_lock_addr(hash)); 9631da177e4SLinus Torvalds while ((rth = *rthp) != NULL) { 9641da177e4SLinus Torvalds if (compare_keys(&rth->fl, &rt->fl)) { 9651da177e4SLinus Torvalds /* Put it first */ 966093c2ca4SEric Dumazet *rthp = rth->u.dst.rt_next; 9671da177e4SLinus Torvalds /* 9681da177e4SLinus Torvalds * Since lookup is lockfree, the deletion 9691da177e4SLinus Torvalds * must be visible to another weakly ordered CPU before 9701da177e4SLinus Torvalds * the insertion at the start of the hash chain. 9711da177e4SLinus Torvalds */ 972093c2ca4SEric Dumazet rcu_assign_pointer(rth->u.dst.rt_next, 9731da177e4SLinus Torvalds rt_hash_table[hash].chain); 9741da177e4SLinus Torvalds /* 9751da177e4SLinus Torvalds * Since lookup is lockfree, the update writes 9761da177e4SLinus Torvalds * must be ordered for consistency on SMP. 9771da177e4SLinus Torvalds */ 9781da177e4SLinus Torvalds rcu_assign_pointer(rt_hash_table[hash].chain, rth); 9791da177e4SLinus Torvalds 98003f49f34SPavel Emelyanov dst_use(&rth->u.dst, now); 98122c047ccSEric Dumazet spin_unlock_bh(rt_hash_lock_addr(hash)); 9821da177e4SLinus Torvalds 9831da177e4SLinus Torvalds rt_drop(rt); 9841da177e4SLinus Torvalds *rp = rth; 9851da177e4SLinus Torvalds return 0; 9861da177e4SLinus Torvalds } 9871da177e4SLinus Torvalds 9881da177e4SLinus Torvalds if (!atomic_read(&rth->u.dst.__refcnt)) { 9891da177e4SLinus Torvalds u32 score = rt_score(rth); 9901da177e4SLinus Torvalds 9911da177e4SLinus Torvalds if (score <= min_score) { 9921da177e4SLinus Torvalds cand = rth; 9931da177e4SLinus Torvalds candp = rthp; 9941da177e4SLinus Torvalds min_score = score; 9951da177e4SLinus Torvalds } 9961da177e4SLinus Torvalds } 9971da177e4SLinus Torvalds 9981da177e4SLinus Torvalds chain_length++; 9991da177e4SLinus Torvalds 1000093c2ca4SEric Dumazet rthp = &rth->u.dst.rt_next; 10011da177e4SLinus Torvalds } 10021da177e4SLinus Torvalds 10031da177e4SLinus Torvalds if (cand) { 10041da177e4SLinus Torvalds /* ip_rt_gc_elasticity used to be average length of chain 10051da177e4SLinus Torvalds * length, when exceeded gc becomes really aggressive. 10061da177e4SLinus Torvalds * 10071da177e4SLinus Torvalds * The second limit is less certain. At the moment it allows 10081da177e4SLinus Torvalds * only 2 entries per bucket. We will see. 10091da177e4SLinus Torvalds */ 10101da177e4SLinus Torvalds if (chain_length > ip_rt_gc_elasticity) { 1011093c2ca4SEric Dumazet *candp = cand->u.dst.rt_next; 10121da177e4SLinus Torvalds rt_free(cand); 10131da177e4SLinus Torvalds } 10141da177e4SLinus Torvalds } 10151da177e4SLinus Torvalds 10161da177e4SLinus Torvalds /* Try to bind route to arp only if it is output 10171da177e4SLinus Torvalds route or unicast forwarding path. 10181da177e4SLinus Torvalds */ 10191da177e4SLinus Torvalds if (rt->rt_type == RTN_UNICAST || rt->fl.iif == 0) { 10201da177e4SLinus Torvalds int err = arp_bind_neighbour(&rt->u.dst); 10211da177e4SLinus Torvalds if (err) { 102222c047ccSEric Dumazet spin_unlock_bh(rt_hash_lock_addr(hash)); 10231da177e4SLinus Torvalds 10241da177e4SLinus Torvalds if (err != -ENOBUFS) { 10251da177e4SLinus Torvalds rt_drop(rt); 10261da177e4SLinus Torvalds return err; 10271da177e4SLinus Torvalds } 10281da177e4SLinus Torvalds 10291da177e4SLinus Torvalds /* Neighbour tables are full and nothing 10301da177e4SLinus Torvalds can be released. Try to shrink route cache, 10311da177e4SLinus Torvalds it is most likely it holds some neighbour records. 10321da177e4SLinus Torvalds */ 10331da177e4SLinus Torvalds if (attempts-- > 0) { 10341da177e4SLinus Torvalds int saved_elasticity = ip_rt_gc_elasticity; 10351da177e4SLinus Torvalds int saved_int = ip_rt_gc_min_interval; 10361da177e4SLinus Torvalds ip_rt_gc_elasticity = 1; 10371da177e4SLinus Torvalds ip_rt_gc_min_interval = 0; 10381da177e4SLinus Torvalds rt_garbage_collect(); 10391da177e4SLinus Torvalds ip_rt_gc_min_interval = saved_int; 10401da177e4SLinus Torvalds ip_rt_gc_elasticity = saved_elasticity; 10411da177e4SLinus Torvalds goto restart; 10421da177e4SLinus Torvalds } 10431da177e4SLinus Torvalds 10441da177e4SLinus Torvalds if (net_ratelimit()) 10451da177e4SLinus Torvalds printk(KERN_WARNING "Neighbour table overflow.\n"); 10461da177e4SLinus Torvalds rt_drop(rt); 10471da177e4SLinus Torvalds return -ENOBUFS; 10481da177e4SLinus Torvalds } 10491da177e4SLinus Torvalds } 10501da177e4SLinus Torvalds 1051093c2ca4SEric Dumazet rt->u.dst.rt_next = rt_hash_table[hash].chain; 10521da177e4SLinus Torvalds #if RT_CACHE_DEBUG >= 2 1053093c2ca4SEric Dumazet if (rt->u.dst.rt_next) { 10541da177e4SLinus Torvalds struct rtable *trt; 10551da177e4SLinus Torvalds printk(KERN_DEBUG "rt_cache @%02x: %u.%u.%u.%u", hash, 10561da177e4SLinus Torvalds NIPQUAD(rt->rt_dst)); 1057093c2ca4SEric Dumazet for (trt = rt->u.dst.rt_next; trt; trt = trt->u.dst.rt_next) 10581da177e4SLinus Torvalds printk(" . %u.%u.%u.%u", NIPQUAD(trt->rt_dst)); 10591da177e4SLinus Torvalds printk("\n"); 10601da177e4SLinus Torvalds } 10611da177e4SLinus Torvalds #endif 10621da177e4SLinus Torvalds rt_hash_table[hash].chain = rt; 106322c047ccSEric Dumazet spin_unlock_bh(rt_hash_lock_addr(hash)); 10641da177e4SLinus Torvalds *rp = rt; 10651da177e4SLinus Torvalds return 0; 10661da177e4SLinus Torvalds } 10671da177e4SLinus Torvalds 10681da177e4SLinus Torvalds void rt_bind_peer(struct rtable *rt, int create) 10691da177e4SLinus Torvalds { 10701da177e4SLinus Torvalds static DEFINE_SPINLOCK(rt_peer_lock); 10711da177e4SLinus Torvalds struct inet_peer *peer; 10721da177e4SLinus Torvalds 10731da177e4SLinus Torvalds peer = inet_getpeer(rt->rt_dst, create); 10741da177e4SLinus Torvalds 10751da177e4SLinus Torvalds spin_lock_bh(&rt_peer_lock); 10761da177e4SLinus Torvalds if (rt->peer == NULL) { 10771da177e4SLinus Torvalds rt->peer = peer; 10781da177e4SLinus Torvalds peer = NULL; 10791da177e4SLinus Torvalds } 10801da177e4SLinus Torvalds spin_unlock_bh(&rt_peer_lock); 10811da177e4SLinus Torvalds if (peer) 10821da177e4SLinus Torvalds inet_putpeer(peer); 10831da177e4SLinus Torvalds } 10841da177e4SLinus Torvalds 10851da177e4SLinus Torvalds /* 10861da177e4SLinus Torvalds * Peer allocation may fail only in serious out-of-memory conditions. However 10871da177e4SLinus Torvalds * we still can generate some output. 10881da177e4SLinus Torvalds * Random ID selection looks a bit dangerous because we have no chances to 10891da177e4SLinus Torvalds * select ID being unique in a reasonable period of time. 10901da177e4SLinus Torvalds * But broken packet identifier may be better than no packet at all. 10911da177e4SLinus Torvalds */ 10921da177e4SLinus Torvalds static void ip_select_fb_ident(struct iphdr *iph) 10931da177e4SLinus Torvalds { 10941da177e4SLinus Torvalds static DEFINE_SPINLOCK(ip_fb_id_lock); 10951da177e4SLinus Torvalds static u32 ip_fallback_id; 10961da177e4SLinus Torvalds u32 salt; 10971da177e4SLinus Torvalds 10981da177e4SLinus Torvalds spin_lock_bh(&ip_fb_id_lock); 1099e448515cSAl Viro salt = secure_ip_id((__force __be32)ip_fallback_id ^ iph->daddr); 11001da177e4SLinus Torvalds iph->id = htons(salt & 0xFFFF); 11011da177e4SLinus Torvalds ip_fallback_id = salt; 11021da177e4SLinus Torvalds spin_unlock_bh(&ip_fb_id_lock); 11031da177e4SLinus Torvalds } 11041da177e4SLinus Torvalds 11051da177e4SLinus Torvalds void __ip_select_ident(struct iphdr *iph, struct dst_entry *dst, int more) 11061da177e4SLinus Torvalds { 11071da177e4SLinus Torvalds struct rtable *rt = (struct rtable *) dst; 11081da177e4SLinus Torvalds 11091da177e4SLinus Torvalds if (rt) { 11101da177e4SLinus Torvalds if (rt->peer == NULL) 11111da177e4SLinus Torvalds rt_bind_peer(rt, 1); 11121da177e4SLinus Torvalds 11131da177e4SLinus Torvalds /* If peer is attached to destination, it is never detached, 11141da177e4SLinus Torvalds so that we need not to grab a lock to dereference it. 11151da177e4SLinus Torvalds */ 11161da177e4SLinus Torvalds if (rt->peer) { 11171da177e4SLinus Torvalds iph->id = htons(inet_getid(rt->peer, more)); 11181da177e4SLinus Torvalds return; 11191da177e4SLinus Torvalds } 11201da177e4SLinus Torvalds } else 11219c2b3328SStephen Hemminger printk(KERN_DEBUG "rt_bind_peer(0) @%p\n", 11229c2b3328SStephen Hemminger __builtin_return_address(0)); 11231da177e4SLinus Torvalds 11241da177e4SLinus Torvalds ip_select_fb_ident(iph); 11251da177e4SLinus Torvalds } 11261da177e4SLinus Torvalds 11271da177e4SLinus Torvalds static void rt_del(unsigned hash, struct rtable *rt) 11281da177e4SLinus Torvalds { 11291da177e4SLinus Torvalds struct rtable **rthp; 11301da177e4SLinus Torvalds 113122c047ccSEric Dumazet spin_lock_bh(rt_hash_lock_addr(hash)); 11321da177e4SLinus Torvalds ip_rt_put(rt); 11331da177e4SLinus Torvalds for (rthp = &rt_hash_table[hash].chain; *rthp; 1134093c2ca4SEric Dumazet rthp = &(*rthp)->u.dst.rt_next) 11351da177e4SLinus Torvalds if (*rthp == rt) { 1136093c2ca4SEric Dumazet *rthp = rt->u.dst.rt_next; 11371da177e4SLinus Torvalds rt_free(rt); 11381da177e4SLinus Torvalds break; 11391da177e4SLinus Torvalds } 114022c047ccSEric Dumazet spin_unlock_bh(rt_hash_lock_addr(hash)); 11411da177e4SLinus Torvalds } 11421da177e4SLinus Torvalds 1143f7655229SAl Viro void ip_rt_redirect(__be32 old_gw, __be32 daddr, __be32 new_gw, 1144f7655229SAl Viro __be32 saddr, struct net_device *dev) 11451da177e4SLinus Torvalds { 11461da177e4SLinus Torvalds int i, k; 11471da177e4SLinus Torvalds struct in_device *in_dev = in_dev_get(dev); 11481da177e4SLinus Torvalds struct rtable *rth, **rthp; 1149f7655229SAl Viro __be32 skeys[2] = { saddr, 0 }; 11501da177e4SLinus Torvalds int ikeys[2] = { dev->ifindex, 0 }; 11518d71740cSTom Tucker struct netevent_redirect netevent; 11521da177e4SLinus Torvalds 11531da177e4SLinus Torvalds if (!in_dev) 11541da177e4SLinus Torvalds return; 11551da177e4SLinus Torvalds 11561da177e4SLinus Torvalds if (new_gw == old_gw || !IN_DEV_RX_REDIRECTS(in_dev) 11571da177e4SLinus Torvalds || MULTICAST(new_gw) || BADCLASS(new_gw) || ZERONET(new_gw)) 11581da177e4SLinus Torvalds goto reject_redirect; 11591da177e4SLinus Torvalds 11601da177e4SLinus Torvalds if (!IN_DEV_SHARED_MEDIA(in_dev)) { 11611da177e4SLinus Torvalds if (!inet_addr_onlink(in_dev, new_gw, old_gw)) 11621da177e4SLinus Torvalds goto reject_redirect; 11631da177e4SLinus Torvalds if (IN_DEV_SEC_REDIRECTS(in_dev) && ip_fib_check_default(new_gw, dev)) 11641da177e4SLinus Torvalds goto reject_redirect; 11651da177e4SLinus Torvalds } else { 11661da177e4SLinus Torvalds if (inet_addr_type(new_gw) != RTN_UNICAST) 11671da177e4SLinus Torvalds goto reject_redirect; 11681da177e4SLinus Torvalds } 11691da177e4SLinus Torvalds 11701da177e4SLinus Torvalds for (i = 0; i < 2; i++) { 11711da177e4SLinus Torvalds for (k = 0; k < 2; k++) { 11728c7bc840SAl Viro unsigned hash = rt_hash(daddr, skeys[i], ikeys[k]); 11731da177e4SLinus Torvalds 11741da177e4SLinus Torvalds rthp=&rt_hash_table[hash].chain; 11751da177e4SLinus Torvalds 11761da177e4SLinus Torvalds rcu_read_lock(); 11771da177e4SLinus Torvalds while ((rth = rcu_dereference(*rthp)) != NULL) { 11781da177e4SLinus Torvalds struct rtable *rt; 11791da177e4SLinus Torvalds 11801da177e4SLinus Torvalds if (rth->fl.fl4_dst != daddr || 11811da177e4SLinus Torvalds rth->fl.fl4_src != skeys[i] || 11821da177e4SLinus Torvalds rth->fl.oif != ikeys[k] || 11831da177e4SLinus Torvalds rth->fl.iif != 0) { 1184093c2ca4SEric Dumazet rthp = &rth->u.dst.rt_next; 11851da177e4SLinus Torvalds continue; 11861da177e4SLinus Torvalds } 11871da177e4SLinus Torvalds 11881da177e4SLinus Torvalds if (rth->rt_dst != daddr || 11891da177e4SLinus Torvalds rth->rt_src != saddr || 11901da177e4SLinus Torvalds rth->u.dst.error || 11911da177e4SLinus Torvalds rth->rt_gateway != old_gw || 11921da177e4SLinus Torvalds rth->u.dst.dev != dev) 11931da177e4SLinus Torvalds break; 11941da177e4SLinus Torvalds 11951da177e4SLinus Torvalds dst_hold(&rth->u.dst); 11961da177e4SLinus Torvalds rcu_read_unlock(); 11971da177e4SLinus Torvalds 11981da177e4SLinus Torvalds rt = dst_alloc(&ipv4_dst_ops); 11991da177e4SLinus Torvalds if (rt == NULL) { 12001da177e4SLinus Torvalds ip_rt_put(rth); 12011da177e4SLinus Torvalds in_dev_put(in_dev); 12021da177e4SLinus Torvalds return; 12031da177e4SLinus Torvalds } 12041da177e4SLinus Torvalds 12051da177e4SLinus Torvalds /* Copy all the information. */ 12061da177e4SLinus Torvalds *rt = *rth; 12071da177e4SLinus Torvalds INIT_RCU_HEAD(&rt->u.dst.rcu_head); 12081da177e4SLinus Torvalds rt->u.dst.__use = 1; 12091da177e4SLinus Torvalds atomic_set(&rt->u.dst.__refcnt, 1); 12101da177e4SLinus Torvalds rt->u.dst.child = NULL; 12111da177e4SLinus Torvalds if (rt->u.dst.dev) 12121da177e4SLinus Torvalds dev_hold(rt->u.dst.dev); 12131da177e4SLinus Torvalds if (rt->idev) 12141da177e4SLinus Torvalds in_dev_hold(rt->idev); 12151da177e4SLinus Torvalds rt->u.dst.obsolete = 0; 12161da177e4SLinus Torvalds rt->u.dst.lastuse = jiffies; 12171da177e4SLinus Torvalds rt->u.dst.path = &rt->u.dst; 12181da177e4SLinus Torvalds rt->u.dst.neighbour = NULL; 12191da177e4SLinus Torvalds rt->u.dst.hh = NULL; 12201da177e4SLinus Torvalds rt->u.dst.xfrm = NULL; 12211da177e4SLinus Torvalds 12221da177e4SLinus Torvalds rt->rt_flags |= RTCF_REDIRECTED; 12231da177e4SLinus Torvalds 12241da177e4SLinus Torvalds /* Gateway is different ... */ 12251da177e4SLinus Torvalds rt->rt_gateway = new_gw; 12261da177e4SLinus Torvalds 12271da177e4SLinus Torvalds /* Redirect received -> path was valid */ 12281da177e4SLinus Torvalds dst_confirm(&rth->u.dst); 12291da177e4SLinus Torvalds 12301da177e4SLinus Torvalds if (rt->peer) 12311da177e4SLinus Torvalds atomic_inc(&rt->peer->refcnt); 12321da177e4SLinus Torvalds 12331da177e4SLinus Torvalds if (arp_bind_neighbour(&rt->u.dst) || 12341da177e4SLinus Torvalds !(rt->u.dst.neighbour->nud_state & 12351da177e4SLinus Torvalds NUD_VALID)) { 12361da177e4SLinus Torvalds if (rt->u.dst.neighbour) 12371da177e4SLinus Torvalds neigh_event_send(rt->u.dst.neighbour, NULL); 12381da177e4SLinus Torvalds ip_rt_put(rth); 12391da177e4SLinus Torvalds rt_drop(rt); 12401da177e4SLinus Torvalds goto do_next; 12411da177e4SLinus Torvalds } 12421da177e4SLinus Torvalds 12438d71740cSTom Tucker netevent.old = &rth->u.dst; 12448d71740cSTom Tucker netevent.new = &rt->u.dst; 12458d71740cSTom Tucker call_netevent_notifiers(NETEVENT_REDIRECT, 12468d71740cSTom Tucker &netevent); 12478d71740cSTom Tucker 12481da177e4SLinus Torvalds rt_del(hash, rth); 12491da177e4SLinus Torvalds if (!rt_intern_hash(hash, rt, &rt)) 12501da177e4SLinus Torvalds ip_rt_put(rt); 12511da177e4SLinus Torvalds goto do_next; 12521da177e4SLinus Torvalds } 12531da177e4SLinus Torvalds rcu_read_unlock(); 12541da177e4SLinus Torvalds do_next: 12551da177e4SLinus Torvalds ; 12561da177e4SLinus Torvalds } 12571da177e4SLinus Torvalds } 12581da177e4SLinus Torvalds in_dev_put(in_dev); 12591da177e4SLinus Torvalds return; 12601da177e4SLinus Torvalds 12611da177e4SLinus Torvalds reject_redirect: 12621da177e4SLinus Torvalds #ifdef CONFIG_IP_ROUTE_VERBOSE 12631da177e4SLinus Torvalds if (IN_DEV_LOG_MARTIANS(in_dev) && net_ratelimit()) 12641da177e4SLinus Torvalds printk(KERN_INFO "Redirect from %u.%u.%u.%u on %s about " 12651da177e4SLinus Torvalds "%u.%u.%u.%u ignored.\n" 1266cef2685eSIlia Sotnikov " Advised path = %u.%u.%u.%u -> %u.%u.%u.%u\n", 12671da177e4SLinus Torvalds NIPQUAD(old_gw), dev->name, NIPQUAD(new_gw), 1268cef2685eSIlia Sotnikov NIPQUAD(saddr), NIPQUAD(daddr)); 12691da177e4SLinus Torvalds #endif 12701da177e4SLinus Torvalds in_dev_put(in_dev); 12711da177e4SLinus Torvalds } 12721da177e4SLinus Torvalds 12731da177e4SLinus Torvalds static struct dst_entry *ipv4_negative_advice(struct dst_entry *dst) 12741da177e4SLinus Torvalds { 12751da177e4SLinus Torvalds struct rtable *rt = (struct rtable*)dst; 12761da177e4SLinus Torvalds struct dst_entry *ret = dst; 12771da177e4SLinus Torvalds 12781da177e4SLinus Torvalds if (rt) { 12791da177e4SLinus Torvalds if (dst->obsolete) { 12801da177e4SLinus Torvalds ip_rt_put(rt); 12811da177e4SLinus Torvalds ret = NULL; 12821da177e4SLinus Torvalds } else if ((rt->rt_flags & RTCF_REDIRECTED) || 12831da177e4SLinus Torvalds rt->u.dst.expires) { 12848c7bc840SAl Viro unsigned hash = rt_hash(rt->fl.fl4_dst, rt->fl.fl4_src, 12858c7bc840SAl Viro rt->fl.oif); 12861da177e4SLinus Torvalds #if RT_CACHE_DEBUG >= 1 128756c99d04SDenis V. Lunev printk(KERN_DEBUG "ipv4_negative_advice: redirect to " 12881da177e4SLinus Torvalds "%u.%u.%u.%u/%02x dropped\n", 12891da177e4SLinus Torvalds NIPQUAD(rt->rt_dst), rt->fl.fl4_tos); 12901da177e4SLinus Torvalds #endif 12911da177e4SLinus Torvalds rt_del(hash, rt); 12921da177e4SLinus Torvalds ret = NULL; 12931da177e4SLinus Torvalds } 12941da177e4SLinus Torvalds } 12951da177e4SLinus Torvalds return ret; 12961da177e4SLinus Torvalds } 12971da177e4SLinus Torvalds 12981da177e4SLinus Torvalds /* 12991da177e4SLinus Torvalds * Algorithm: 13001da177e4SLinus Torvalds * 1. The first ip_rt_redirect_number redirects are sent 13011da177e4SLinus Torvalds * with exponential backoff, then we stop sending them at all, 13021da177e4SLinus Torvalds * assuming that the host ignores our redirects. 13031da177e4SLinus Torvalds * 2. If we did not see packets requiring redirects 13041da177e4SLinus Torvalds * during ip_rt_redirect_silence, we assume that the host 13051da177e4SLinus Torvalds * forgot redirected route and start to send redirects again. 13061da177e4SLinus Torvalds * 13071da177e4SLinus Torvalds * This algorithm is much cheaper and more intelligent than dumb load limiting 13081da177e4SLinus Torvalds * in icmp.c. 13091da177e4SLinus Torvalds * 13101da177e4SLinus Torvalds * NOTE. Do not forget to inhibit load limiting for redirects (redundant) 13111da177e4SLinus Torvalds * and "frag. need" (breaks PMTU discovery) in icmp.c. 13121da177e4SLinus Torvalds */ 13131da177e4SLinus Torvalds 13141da177e4SLinus Torvalds void ip_rt_send_redirect(struct sk_buff *skb) 13151da177e4SLinus Torvalds { 13161da177e4SLinus Torvalds struct rtable *rt = (struct rtable*)skb->dst; 13171da177e4SLinus Torvalds struct in_device *in_dev = in_dev_get(rt->u.dst.dev); 13181da177e4SLinus Torvalds 13191da177e4SLinus Torvalds if (!in_dev) 13201da177e4SLinus Torvalds return; 13211da177e4SLinus Torvalds 13221da177e4SLinus Torvalds if (!IN_DEV_TX_REDIRECTS(in_dev)) 13231da177e4SLinus Torvalds goto out; 13241da177e4SLinus Torvalds 13251da177e4SLinus Torvalds /* No redirected packets during ip_rt_redirect_silence; 13261da177e4SLinus Torvalds * reset the algorithm. 13271da177e4SLinus Torvalds */ 13281da177e4SLinus Torvalds if (time_after(jiffies, rt->u.dst.rate_last + ip_rt_redirect_silence)) 13291da177e4SLinus Torvalds rt->u.dst.rate_tokens = 0; 13301da177e4SLinus Torvalds 13311da177e4SLinus Torvalds /* Too many ignored redirects; do not send anything 13321da177e4SLinus Torvalds * set u.dst.rate_last to the last seen redirected packet. 13331da177e4SLinus Torvalds */ 13341da177e4SLinus Torvalds if (rt->u.dst.rate_tokens >= ip_rt_redirect_number) { 13351da177e4SLinus Torvalds rt->u.dst.rate_last = jiffies; 13361da177e4SLinus Torvalds goto out; 13371da177e4SLinus Torvalds } 13381da177e4SLinus Torvalds 13391da177e4SLinus Torvalds /* Check for load limit; set rate_last to the latest sent 13401da177e4SLinus Torvalds * redirect. 13411da177e4SLinus Torvalds */ 134214fb8a76SLi Yewang if (rt->u.dst.rate_tokens == 0 || 134314fb8a76SLi Yewang time_after(jiffies, 13441da177e4SLinus Torvalds (rt->u.dst.rate_last + 13451da177e4SLinus Torvalds (ip_rt_redirect_load << rt->u.dst.rate_tokens)))) { 13461da177e4SLinus Torvalds icmp_send(skb, ICMP_REDIRECT, ICMP_REDIR_HOST, rt->rt_gateway); 13471da177e4SLinus Torvalds rt->u.dst.rate_last = jiffies; 13481da177e4SLinus Torvalds ++rt->u.dst.rate_tokens; 13491da177e4SLinus Torvalds #ifdef CONFIG_IP_ROUTE_VERBOSE 13501da177e4SLinus Torvalds if (IN_DEV_LOG_MARTIANS(in_dev) && 13511da177e4SLinus Torvalds rt->u.dst.rate_tokens == ip_rt_redirect_number && 13521da177e4SLinus Torvalds net_ratelimit()) 13531da177e4SLinus Torvalds printk(KERN_WARNING "host %u.%u.%u.%u/if%d ignores " 13541da177e4SLinus Torvalds "redirects for %u.%u.%u.%u to %u.%u.%u.%u.\n", 13551da177e4SLinus Torvalds NIPQUAD(rt->rt_src), rt->rt_iif, 13561da177e4SLinus Torvalds NIPQUAD(rt->rt_dst), NIPQUAD(rt->rt_gateway)); 13571da177e4SLinus Torvalds #endif 13581da177e4SLinus Torvalds } 13591da177e4SLinus Torvalds out: 13601da177e4SLinus Torvalds in_dev_put(in_dev); 13611da177e4SLinus Torvalds } 13621da177e4SLinus Torvalds 13631da177e4SLinus Torvalds static int ip_error(struct sk_buff *skb) 13641da177e4SLinus Torvalds { 13651da177e4SLinus Torvalds struct rtable *rt = (struct rtable*)skb->dst; 13661da177e4SLinus Torvalds unsigned long now; 13671da177e4SLinus Torvalds int code; 13681da177e4SLinus Torvalds 13691da177e4SLinus Torvalds switch (rt->u.dst.error) { 13701da177e4SLinus Torvalds case EINVAL: 13711da177e4SLinus Torvalds default: 13721da177e4SLinus Torvalds goto out; 13731da177e4SLinus Torvalds case EHOSTUNREACH: 13741da177e4SLinus Torvalds code = ICMP_HOST_UNREACH; 13751da177e4SLinus Torvalds break; 13761da177e4SLinus Torvalds case ENETUNREACH: 13771da177e4SLinus Torvalds code = ICMP_NET_UNREACH; 13787f53878dSMitsuru Chinen IP_INC_STATS_BH(IPSTATS_MIB_INNOROUTES); 13791da177e4SLinus Torvalds break; 13801da177e4SLinus Torvalds case EACCES: 13811da177e4SLinus Torvalds code = ICMP_PKT_FILTERED; 13821da177e4SLinus Torvalds break; 13831da177e4SLinus Torvalds } 13841da177e4SLinus Torvalds 13851da177e4SLinus Torvalds now = jiffies; 13861da177e4SLinus Torvalds rt->u.dst.rate_tokens += now - rt->u.dst.rate_last; 13871da177e4SLinus Torvalds if (rt->u.dst.rate_tokens > ip_rt_error_burst) 13881da177e4SLinus Torvalds rt->u.dst.rate_tokens = ip_rt_error_burst; 13891da177e4SLinus Torvalds rt->u.dst.rate_last = now; 13901da177e4SLinus Torvalds if (rt->u.dst.rate_tokens >= ip_rt_error_cost) { 13911da177e4SLinus Torvalds rt->u.dst.rate_tokens -= ip_rt_error_cost; 13921da177e4SLinus Torvalds icmp_send(skb, ICMP_DEST_UNREACH, code, 0); 13931da177e4SLinus Torvalds } 13941da177e4SLinus Torvalds 13951da177e4SLinus Torvalds out: kfree_skb(skb); 13961da177e4SLinus Torvalds return 0; 13971da177e4SLinus Torvalds } 13981da177e4SLinus Torvalds 13991da177e4SLinus Torvalds /* 14001da177e4SLinus Torvalds * The last two values are not from the RFC but 14011da177e4SLinus Torvalds * are needed for AMPRnet AX.25 paths. 14021da177e4SLinus Torvalds */ 14031da177e4SLinus Torvalds 14049b5b5cffSArjan van de Ven static const unsigned short mtu_plateau[] = 14051da177e4SLinus Torvalds {32000, 17914, 8166, 4352, 2002, 1492, 576, 296, 216, 128 }; 14061da177e4SLinus Torvalds 14071da177e4SLinus Torvalds static __inline__ unsigned short guess_mtu(unsigned short old_mtu) 14081da177e4SLinus Torvalds { 14091da177e4SLinus Torvalds int i; 14101da177e4SLinus Torvalds 14111da177e4SLinus Torvalds for (i = 0; i < ARRAY_SIZE(mtu_plateau); i++) 14121da177e4SLinus Torvalds if (old_mtu > mtu_plateau[i]) 14131da177e4SLinus Torvalds return mtu_plateau[i]; 14141da177e4SLinus Torvalds return 68; 14151da177e4SLinus Torvalds } 14161da177e4SLinus Torvalds 14171da177e4SLinus Torvalds unsigned short ip_rt_frag_needed(struct iphdr *iph, unsigned short new_mtu) 14181da177e4SLinus Torvalds { 14191da177e4SLinus Torvalds int i; 14201da177e4SLinus Torvalds unsigned short old_mtu = ntohs(iph->tot_len); 14211da177e4SLinus Torvalds struct rtable *rth; 1422e448515cSAl Viro __be32 skeys[2] = { iph->saddr, 0, }; 1423e448515cSAl Viro __be32 daddr = iph->daddr; 14241da177e4SLinus Torvalds unsigned short est_mtu = 0; 14251da177e4SLinus Torvalds 14261da177e4SLinus Torvalds if (ipv4_config.no_pmtu_disc) 14271da177e4SLinus Torvalds return 0; 14281da177e4SLinus Torvalds 14291da177e4SLinus Torvalds for (i = 0; i < 2; i++) { 14308c7bc840SAl Viro unsigned hash = rt_hash(daddr, skeys[i], 0); 14311da177e4SLinus Torvalds 14321da177e4SLinus Torvalds rcu_read_lock(); 14331da177e4SLinus Torvalds for (rth = rcu_dereference(rt_hash_table[hash].chain); rth; 1434093c2ca4SEric Dumazet rth = rcu_dereference(rth->u.dst.rt_next)) { 14351da177e4SLinus Torvalds if (rth->fl.fl4_dst == daddr && 14361da177e4SLinus Torvalds rth->fl.fl4_src == skeys[i] && 14371da177e4SLinus Torvalds rth->rt_dst == daddr && 14381da177e4SLinus Torvalds rth->rt_src == iph->saddr && 14391da177e4SLinus Torvalds rth->fl.iif == 0 && 14401da177e4SLinus Torvalds !(dst_metric_locked(&rth->u.dst, RTAX_MTU))) { 14411da177e4SLinus Torvalds unsigned short mtu = new_mtu; 14421da177e4SLinus Torvalds 14431da177e4SLinus Torvalds if (new_mtu < 68 || new_mtu >= old_mtu) { 14441da177e4SLinus Torvalds 14451da177e4SLinus Torvalds /* BSD 4.2 compatibility hack :-( */ 14461da177e4SLinus Torvalds if (mtu == 0 && 14471da177e4SLinus Torvalds old_mtu >= rth->u.dst.metrics[RTAX_MTU-1] && 14481da177e4SLinus Torvalds old_mtu >= 68 + (iph->ihl << 2)) 14491da177e4SLinus Torvalds old_mtu -= iph->ihl << 2; 14501da177e4SLinus Torvalds 14511da177e4SLinus Torvalds mtu = guess_mtu(old_mtu); 14521da177e4SLinus Torvalds } 14531da177e4SLinus Torvalds if (mtu <= rth->u.dst.metrics[RTAX_MTU-1]) { 14541da177e4SLinus Torvalds if (mtu < rth->u.dst.metrics[RTAX_MTU-1]) { 14551da177e4SLinus Torvalds dst_confirm(&rth->u.dst); 14561da177e4SLinus Torvalds if (mtu < ip_rt_min_pmtu) { 14571da177e4SLinus Torvalds mtu = ip_rt_min_pmtu; 14581da177e4SLinus Torvalds rth->u.dst.metrics[RTAX_LOCK-1] |= 14591da177e4SLinus Torvalds (1 << RTAX_MTU); 14601da177e4SLinus Torvalds } 14611da177e4SLinus Torvalds rth->u.dst.metrics[RTAX_MTU-1] = mtu; 14621da177e4SLinus Torvalds dst_set_expires(&rth->u.dst, 14631da177e4SLinus Torvalds ip_rt_mtu_expires); 14641da177e4SLinus Torvalds } 14651da177e4SLinus Torvalds est_mtu = mtu; 14661da177e4SLinus Torvalds } 14671da177e4SLinus Torvalds } 14681da177e4SLinus Torvalds } 14691da177e4SLinus Torvalds rcu_read_unlock(); 14701da177e4SLinus Torvalds } 14711da177e4SLinus Torvalds return est_mtu ? : new_mtu; 14721da177e4SLinus Torvalds } 14731da177e4SLinus Torvalds 14741da177e4SLinus Torvalds static void ip_rt_update_pmtu(struct dst_entry *dst, u32 mtu) 14751da177e4SLinus Torvalds { 14761da177e4SLinus Torvalds if (dst->metrics[RTAX_MTU-1] > mtu && mtu >= 68 && 14771da177e4SLinus Torvalds !(dst_metric_locked(dst, RTAX_MTU))) { 14781da177e4SLinus Torvalds if (mtu < ip_rt_min_pmtu) { 14791da177e4SLinus Torvalds mtu = ip_rt_min_pmtu; 14801da177e4SLinus Torvalds dst->metrics[RTAX_LOCK-1] |= (1 << RTAX_MTU); 14811da177e4SLinus Torvalds } 14821da177e4SLinus Torvalds dst->metrics[RTAX_MTU-1] = mtu; 14831da177e4SLinus Torvalds dst_set_expires(dst, ip_rt_mtu_expires); 14848d71740cSTom Tucker call_netevent_notifiers(NETEVENT_PMTU_UPDATE, dst); 14851da177e4SLinus Torvalds } 14861da177e4SLinus Torvalds } 14871da177e4SLinus Torvalds 14881da177e4SLinus Torvalds static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie) 14891da177e4SLinus Torvalds { 14901da177e4SLinus Torvalds return NULL; 14911da177e4SLinus Torvalds } 14921da177e4SLinus Torvalds 14931da177e4SLinus Torvalds static void ipv4_dst_destroy(struct dst_entry *dst) 14941da177e4SLinus Torvalds { 14951da177e4SLinus Torvalds struct rtable *rt = (struct rtable *) dst; 14961da177e4SLinus Torvalds struct inet_peer *peer = rt->peer; 14971da177e4SLinus Torvalds struct in_device *idev = rt->idev; 14981da177e4SLinus Torvalds 14991da177e4SLinus Torvalds if (peer) { 15001da177e4SLinus Torvalds rt->peer = NULL; 15011da177e4SLinus Torvalds inet_putpeer(peer); 15021da177e4SLinus Torvalds } 15031da177e4SLinus Torvalds 15041da177e4SLinus Torvalds if (idev) { 15051da177e4SLinus Torvalds rt->idev = NULL; 15061da177e4SLinus Torvalds in_dev_put(idev); 15071da177e4SLinus Torvalds } 15081da177e4SLinus Torvalds } 15091da177e4SLinus Torvalds 15101da177e4SLinus Torvalds static void ipv4_dst_ifdown(struct dst_entry *dst, struct net_device *dev, 15111da177e4SLinus Torvalds int how) 15121da177e4SLinus Torvalds { 15131da177e4SLinus Torvalds struct rtable *rt = (struct rtable *) dst; 15141da177e4SLinus Torvalds struct in_device *idev = rt->idev; 15155a3e55d6SDenis V. Lunev if (dev != dev->nd_net->loopback_dev && idev && idev->dev == dev) { 15165a3e55d6SDenis V. Lunev struct in_device *loopback_idev = 15175a3e55d6SDenis V. Lunev in_dev_get(dev->nd_net->loopback_dev); 15181da177e4SLinus Torvalds if (loopback_idev) { 15191da177e4SLinus Torvalds rt->idev = loopback_idev; 15201da177e4SLinus Torvalds in_dev_put(idev); 15211da177e4SLinus Torvalds } 15221da177e4SLinus Torvalds } 15231da177e4SLinus Torvalds } 15241da177e4SLinus Torvalds 15251da177e4SLinus Torvalds static void ipv4_link_failure(struct sk_buff *skb) 15261da177e4SLinus Torvalds { 15271da177e4SLinus Torvalds struct rtable *rt; 15281da177e4SLinus Torvalds 15291da177e4SLinus Torvalds icmp_send(skb, ICMP_DEST_UNREACH, ICMP_HOST_UNREACH, 0); 15301da177e4SLinus Torvalds 15311da177e4SLinus Torvalds rt = (struct rtable *) skb->dst; 15321da177e4SLinus Torvalds if (rt) 15331da177e4SLinus Torvalds dst_set_expires(&rt->u.dst, 0); 15341da177e4SLinus Torvalds } 15351da177e4SLinus Torvalds 15361da177e4SLinus Torvalds static int ip_rt_bug(struct sk_buff *skb) 15371da177e4SLinus Torvalds { 15381da177e4SLinus Torvalds printk(KERN_DEBUG "ip_rt_bug: %u.%u.%u.%u -> %u.%u.%u.%u, %s\n", 1539eddc9ec5SArnaldo Carvalho de Melo NIPQUAD(ip_hdr(skb)->saddr), NIPQUAD(ip_hdr(skb)->daddr), 15401da177e4SLinus Torvalds skb->dev ? skb->dev->name : "?"); 15411da177e4SLinus Torvalds kfree_skb(skb); 15421da177e4SLinus Torvalds return 0; 15431da177e4SLinus Torvalds } 15441da177e4SLinus Torvalds 15451da177e4SLinus Torvalds /* 15461da177e4SLinus Torvalds We do not cache source address of outgoing interface, 15471da177e4SLinus Torvalds because it is used only by IP RR, TS and SRR options, 15481da177e4SLinus Torvalds so that it out of fast path. 15491da177e4SLinus Torvalds 15501da177e4SLinus Torvalds BTW remember: "addr" is allowed to be not aligned 15511da177e4SLinus Torvalds in IP options! 15521da177e4SLinus Torvalds */ 15531da177e4SLinus Torvalds 15541da177e4SLinus Torvalds void ip_rt_get_source(u8 *addr, struct rtable *rt) 15551da177e4SLinus Torvalds { 1556a61ced5dSAl Viro __be32 src; 15571da177e4SLinus Torvalds struct fib_result res; 15581da177e4SLinus Torvalds 15591da177e4SLinus Torvalds if (rt->fl.iif == 0) 15601da177e4SLinus Torvalds src = rt->rt_src; 15611da177e4SLinus Torvalds else if (fib_lookup(&rt->fl, &res) == 0) { 15621da177e4SLinus Torvalds src = FIB_RES_PREFSRC(res); 15631da177e4SLinus Torvalds fib_res_put(&res); 15641da177e4SLinus Torvalds } else 15651da177e4SLinus Torvalds src = inet_select_addr(rt->u.dst.dev, rt->rt_gateway, 15661da177e4SLinus Torvalds RT_SCOPE_UNIVERSE); 15671da177e4SLinus Torvalds memcpy(addr, &src, 4); 15681da177e4SLinus Torvalds } 15691da177e4SLinus Torvalds 15701da177e4SLinus Torvalds #ifdef CONFIG_NET_CLS_ROUTE 15711da177e4SLinus Torvalds static void set_class_tag(struct rtable *rt, u32 tag) 15721da177e4SLinus Torvalds { 15731da177e4SLinus Torvalds if (!(rt->u.dst.tclassid & 0xFFFF)) 15741da177e4SLinus Torvalds rt->u.dst.tclassid |= tag & 0xFFFF; 15751da177e4SLinus Torvalds if (!(rt->u.dst.tclassid & 0xFFFF0000)) 15761da177e4SLinus Torvalds rt->u.dst.tclassid |= tag & 0xFFFF0000; 15771da177e4SLinus Torvalds } 15781da177e4SLinus Torvalds #endif 15791da177e4SLinus Torvalds 15801da177e4SLinus Torvalds static void rt_set_nexthop(struct rtable *rt, struct fib_result *res, u32 itag) 15811da177e4SLinus Torvalds { 15821da177e4SLinus Torvalds struct fib_info *fi = res->fi; 15831da177e4SLinus Torvalds 15841da177e4SLinus Torvalds if (fi) { 15851da177e4SLinus Torvalds if (FIB_RES_GW(*res) && 15861da177e4SLinus Torvalds FIB_RES_NH(*res).nh_scope == RT_SCOPE_LINK) 15871da177e4SLinus Torvalds rt->rt_gateway = FIB_RES_GW(*res); 15881da177e4SLinus Torvalds memcpy(rt->u.dst.metrics, fi->fib_metrics, 15891da177e4SLinus Torvalds sizeof(rt->u.dst.metrics)); 15901da177e4SLinus Torvalds if (fi->fib_mtu == 0) { 15911da177e4SLinus Torvalds rt->u.dst.metrics[RTAX_MTU-1] = rt->u.dst.dev->mtu; 15921da177e4SLinus Torvalds if (rt->u.dst.metrics[RTAX_LOCK-1] & (1 << RTAX_MTU) && 15931da177e4SLinus Torvalds rt->rt_gateway != rt->rt_dst && 15941da177e4SLinus Torvalds rt->u.dst.dev->mtu > 576) 15951da177e4SLinus Torvalds rt->u.dst.metrics[RTAX_MTU-1] = 576; 15961da177e4SLinus Torvalds } 15971da177e4SLinus Torvalds #ifdef CONFIG_NET_CLS_ROUTE 15981da177e4SLinus Torvalds rt->u.dst.tclassid = FIB_RES_NH(*res).nh_tclassid; 15991da177e4SLinus Torvalds #endif 16001da177e4SLinus Torvalds } else 16011da177e4SLinus Torvalds rt->u.dst.metrics[RTAX_MTU-1]= rt->u.dst.dev->mtu; 16021da177e4SLinus Torvalds 16031da177e4SLinus Torvalds if (rt->u.dst.metrics[RTAX_HOPLIMIT-1] == 0) 16041da177e4SLinus Torvalds rt->u.dst.metrics[RTAX_HOPLIMIT-1] = sysctl_ip_default_ttl; 16051da177e4SLinus Torvalds if (rt->u.dst.metrics[RTAX_MTU-1] > IP_MAX_MTU) 16061da177e4SLinus Torvalds rt->u.dst.metrics[RTAX_MTU-1] = IP_MAX_MTU; 16071da177e4SLinus Torvalds if (rt->u.dst.metrics[RTAX_ADVMSS-1] == 0) 16081da177e4SLinus Torvalds rt->u.dst.metrics[RTAX_ADVMSS-1] = max_t(unsigned int, rt->u.dst.dev->mtu - 40, 16091da177e4SLinus Torvalds ip_rt_min_advmss); 16101da177e4SLinus Torvalds if (rt->u.dst.metrics[RTAX_ADVMSS-1] > 65535 - 40) 16111da177e4SLinus Torvalds rt->u.dst.metrics[RTAX_ADVMSS-1] = 65535 - 40; 16121da177e4SLinus Torvalds 16131da177e4SLinus Torvalds #ifdef CONFIG_NET_CLS_ROUTE 16141da177e4SLinus Torvalds #ifdef CONFIG_IP_MULTIPLE_TABLES 16151da177e4SLinus Torvalds set_class_tag(rt, fib_rules_tclass(res)); 16161da177e4SLinus Torvalds #endif 16171da177e4SLinus Torvalds set_class_tag(rt, itag); 16181da177e4SLinus Torvalds #endif 16191da177e4SLinus Torvalds rt->rt_type = res->type; 16201da177e4SLinus Torvalds } 16211da177e4SLinus Torvalds 16229e12bb22SAl Viro static int ip_route_input_mc(struct sk_buff *skb, __be32 daddr, __be32 saddr, 16231da177e4SLinus Torvalds u8 tos, struct net_device *dev, int our) 16241da177e4SLinus Torvalds { 16251da177e4SLinus Torvalds unsigned hash; 16261da177e4SLinus Torvalds struct rtable *rth; 1627a61ced5dSAl Viro __be32 spec_dst; 16281da177e4SLinus Torvalds struct in_device *in_dev = in_dev_get(dev); 16291da177e4SLinus Torvalds u32 itag = 0; 16301da177e4SLinus Torvalds 16311da177e4SLinus Torvalds /* Primary sanity checks. */ 16321da177e4SLinus Torvalds 16331da177e4SLinus Torvalds if (in_dev == NULL) 16341da177e4SLinus Torvalds return -EINVAL; 16351da177e4SLinus Torvalds 16361da177e4SLinus Torvalds if (MULTICAST(saddr) || BADCLASS(saddr) || LOOPBACK(saddr) || 16371da177e4SLinus Torvalds skb->protocol != htons(ETH_P_IP)) 16381da177e4SLinus Torvalds goto e_inval; 16391da177e4SLinus Torvalds 16401da177e4SLinus Torvalds if (ZERONET(saddr)) { 16411da177e4SLinus Torvalds if (!LOCAL_MCAST(daddr)) 16421da177e4SLinus Torvalds goto e_inval; 16431da177e4SLinus Torvalds spec_dst = inet_select_addr(dev, 0, RT_SCOPE_LINK); 16441da177e4SLinus Torvalds } else if (fib_validate_source(saddr, 0, tos, 0, 16451da177e4SLinus Torvalds dev, &spec_dst, &itag) < 0) 16461da177e4SLinus Torvalds goto e_inval; 16471da177e4SLinus Torvalds 16481da177e4SLinus Torvalds rth = dst_alloc(&ipv4_dst_ops); 16491da177e4SLinus Torvalds if (!rth) 16501da177e4SLinus Torvalds goto e_nobufs; 16511da177e4SLinus Torvalds 16521da177e4SLinus Torvalds rth->u.dst.output= ip_rt_bug; 16531da177e4SLinus Torvalds 16541da177e4SLinus Torvalds atomic_set(&rth->u.dst.__refcnt, 1); 16551da177e4SLinus Torvalds rth->u.dst.flags= DST_HOST; 165642f811b8SHerbert Xu if (IN_DEV_CONF_GET(in_dev, NOPOLICY)) 16571da177e4SLinus Torvalds rth->u.dst.flags |= DST_NOPOLICY; 16581da177e4SLinus Torvalds rth->fl.fl4_dst = daddr; 16591da177e4SLinus Torvalds rth->rt_dst = daddr; 16601da177e4SLinus Torvalds rth->fl.fl4_tos = tos; 166147dcf0cbSThomas Graf rth->fl.mark = skb->mark; 16621da177e4SLinus Torvalds rth->fl.fl4_src = saddr; 16631da177e4SLinus Torvalds rth->rt_src = saddr; 16641da177e4SLinus Torvalds #ifdef CONFIG_NET_CLS_ROUTE 16651da177e4SLinus Torvalds rth->u.dst.tclassid = itag; 16661da177e4SLinus Torvalds #endif 16671da177e4SLinus Torvalds rth->rt_iif = 16681da177e4SLinus Torvalds rth->fl.iif = dev->ifindex; 16692774c7abSEric W. Biederman rth->u.dst.dev = init_net.loopback_dev; 16701da177e4SLinus Torvalds dev_hold(rth->u.dst.dev); 16711da177e4SLinus Torvalds rth->idev = in_dev_get(rth->u.dst.dev); 16721da177e4SLinus Torvalds rth->fl.oif = 0; 16731da177e4SLinus Torvalds rth->rt_gateway = daddr; 16741da177e4SLinus Torvalds rth->rt_spec_dst= spec_dst; 16751da177e4SLinus Torvalds rth->rt_type = RTN_MULTICAST; 16761da177e4SLinus Torvalds rth->rt_flags = RTCF_MULTICAST; 16771da177e4SLinus Torvalds if (our) { 16781da177e4SLinus Torvalds rth->u.dst.input= ip_local_deliver; 16791da177e4SLinus Torvalds rth->rt_flags |= RTCF_LOCAL; 16801da177e4SLinus Torvalds } 16811da177e4SLinus Torvalds 16821da177e4SLinus Torvalds #ifdef CONFIG_IP_MROUTE 16831da177e4SLinus Torvalds if (!LOCAL_MCAST(daddr) && IN_DEV_MFORWARD(in_dev)) 16841da177e4SLinus Torvalds rth->u.dst.input = ip_mr_input; 16851da177e4SLinus Torvalds #endif 16861da177e4SLinus Torvalds RT_CACHE_STAT_INC(in_slow_mc); 16871da177e4SLinus Torvalds 16881da177e4SLinus Torvalds in_dev_put(in_dev); 16898c7bc840SAl Viro hash = rt_hash(daddr, saddr, dev->ifindex); 16901da177e4SLinus Torvalds return rt_intern_hash(hash, rth, (struct rtable**) &skb->dst); 16911da177e4SLinus Torvalds 16921da177e4SLinus Torvalds e_nobufs: 16931da177e4SLinus Torvalds in_dev_put(in_dev); 16941da177e4SLinus Torvalds return -ENOBUFS; 16951da177e4SLinus Torvalds 16961da177e4SLinus Torvalds e_inval: 16971da177e4SLinus Torvalds in_dev_put(in_dev); 16981da177e4SLinus Torvalds return -EINVAL; 16991da177e4SLinus Torvalds } 17001da177e4SLinus Torvalds 17011da177e4SLinus Torvalds 17021da177e4SLinus Torvalds static void ip_handle_martian_source(struct net_device *dev, 17031da177e4SLinus Torvalds struct in_device *in_dev, 17041da177e4SLinus Torvalds struct sk_buff *skb, 17059e12bb22SAl Viro __be32 daddr, 17069e12bb22SAl Viro __be32 saddr) 17071da177e4SLinus Torvalds { 17081da177e4SLinus Torvalds RT_CACHE_STAT_INC(in_martian_src); 17091da177e4SLinus Torvalds #ifdef CONFIG_IP_ROUTE_VERBOSE 17101da177e4SLinus Torvalds if (IN_DEV_LOG_MARTIANS(in_dev) && net_ratelimit()) { 17111da177e4SLinus Torvalds /* 17121da177e4SLinus Torvalds * RFC1812 recommendation, if source is martian, 17131da177e4SLinus Torvalds * the only hint is MAC header. 17141da177e4SLinus Torvalds */ 17151da177e4SLinus Torvalds printk(KERN_WARNING "martian source %u.%u.%u.%u from " 17161da177e4SLinus Torvalds "%u.%u.%u.%u, on dev %s\n", 17171da177e4SLinus Torvalds NIPQUAD(daddr), NIPQUAD(saddr), dev->name); 171898e399f8SArnaldo Carvalho de Melo if (dev->hard_header_len && skb_mac_header_was_set(skb)) { 17191da177e4SLinus Torvalds int i; 172098e399f8SArnaldo Carvalho de Melo const unsigned char *p = skb_mac_header(skb); 17211da177e4SLinus Torvalds printk(KERN_WARNING "ll header: "); 17221da177e4SLinus Torvalds for (i = 0; i < dev->hard_header_len; i++, p++) { 17231da177e4SLinus Torvalds printk("%02x", *p); 17241da177e4SLinus Torvalds if (i < (dev->hard_header_len - 1)) 17251da177e4SLinus Torvalds printk(":"); 17261da177e4SLinus Torvalds } 17271da177e4SLinus Torvalds printk("\n"); 17281da177e4SLinus Torvalds } 17291da177e4SLinus Torvalds } 17301da177e4SLinus Torvalds #endif 17311da177e4SLinus Torvalds } 17321da177e4SLinus Torvalds 17331da177e4SLinus Torvalds static inline int __mkroute_input(struct sk_buff *skb, 17341da177e4SLinus Torvalds struct fib_result* res, 17351da177e4SLinus Torvalds struct in_device *in_dev, 17369e12bb22SAl Viro __be32 daddr, __be32 saddr, u32 tos, 17371da177e4SLinus Torvalds struct rtable **result) 17381da177e4SLinus Torvalds { 17391da177e4SLinus Torvalds 17401da177e4SLinus Torvalds struct rtable *rth; 17411da177e4SLinus Torvalds int err; 17421da177e4SLinus Torvalds struct in_device *out_dev; 17431da177e4SLinus Torvalds unsigned flags = 0; 1744d9c9df8cSAl Viro __be32 spec_dst; 1745d9c9df8cSAl Viro u32 itag; 17461da177e4SLinus Torvalds 17471da177e4SLinus Torvalds /* get a working reference to the output device */ 17481da177e4SLinus Torvalds out_dev = in_dev_get(FIB_RES_DEV(*res)); 17491da177e4SLinus Torvalds if (out_dev == NULL) { 17501da177e4SLinus Torvalds if (net_ratelimit()) 17511da177e4SLinus Torvalds printk(KERN_CRIT "Bug in ip_route_input" \ 17521da177e4SLinus Torvalds "_slow(). Please, report\n"); 17531da177e4SLinus Torvalds return -EINVAL; 17541da177e4SLinus Torvalds } 17551da177e4SLinus Torvalds 17561da177e4SLinus Torvalds 17571da177e4SLinus Torvalds err = fib_validate_source(saddr, daddr, tos, FIB_RES_OIF(*res), 17581da177e4SLinus Torvalds in_dev->dev, &spec_dst, &itag); 17591da177e4SLinus Torvalds if (err < 0) { 17601da177e4SLinus Torvalds ip_handle_martian_source(in_dev->dev, in_dev, skb, daddr, 17611da177e4SLinus Torvalds saddr); 17621da177e4SLinus Torvalds 17631da177e4SLinus Torvalds err = -EINVAL; 17641da177e4SLinus Torvalds goto cleanup; 17651da177e4SLinus Torvalds } 17661da177e4SLinus Torvalds 17671da177e4SLinus Torvalds if (err) 17681da177e4SLinus Torvalds flags |= RTCF_DIRECTSRC; 17691da177e4SLinus Torvalds 17701da177e4SLinus Torvalds if (out_dev == in_dev && err && !(flags & (RTCF_NAT | RTCF_MASQ)) && 17711da177e4SLinus Torvalds (IN_DEV_SHARED_MEDIA(out_dev) || 17721da177e4SLinus Torvalds inet_addr_onlink(out_dev, saddr, FIB_RES_GW(*res)))) 17731da177e4SLinus Torvalds flags |= RTCF_DOREDIRECT; 17741da177e4SLinus Torvalds 17751da177e4SLinus Torvalds if (skb->protocol != htons(ETH_P_IP)) { 17761da177e4SLinus Torvalds /* Not IP (i.e. ARP). Do not create route, if it is 17771da177e4SLinus Torvalds * invalid for proxy arp. DNAT routes are always valid. 17781da177e4SLinus Torvalds */ 17791da177e4SLinus Torvalds if (out_dev == in_dev && !(flags & RTCF_DNAT)) { 17801da177e4SLinus Torvalds err = -EINVAL; 17811da177e4SLinus Torvalds goto cleanup; 17821da177e4SLinus Torvalds } 17831da177e4SLinus Torvalds } 17841da177e4SLinus Torvalds 17851da177e4SLinus Torvalds 17861da177e4SLinus Torvalds rth = dst_alloc(&ipv4_dst_ops); 17871da177e4SLinus Torvalds if (!rth) { 17881da177e4SLinus Torvalds err = -ENOBUFS; 17891da177e4SLinus Torvalds goto cleanup; 17901da177e4SLinus Torvalds } 17911da177e4SLinus Torvalds 1792ce723d8eSJulian Anastasov atomic_set(&rth->u.dst.__refcnt, 1); 17931da177e4SLinus Torvalds rth->u.dst.flags= DST_HOST; 179442f811b8SHerbert Xu if (IN_DEV_CONF_GET(in_dev, NOPOLICY)) 17951da177e4SLinus Torvalds rth->u.dst.flags |= DST_NOPOLICY; 179642f811b8SHerbert Xu if (IN_DEV_CONF_GET(out_dev, NOXFRM)) 17971da177e4SLinus Torvalds rth->u.dst.flags |= DST_NOXFRM; 17981da177e4SLinus Torvalds rth->fl.fl4_dst = daddr; 17991da177e4SLinus Torvalds rth->rt_dst = daddr; 18001da177e4SLinus Torvalds rth->fl.fl4_tos = tos; 180147dcf0cbSThomas Graf rth->fl.mark = skb->mark; 18021da177e4SLinus Torvalds rth->fl.fl4_src = saddr; 18031da177e4SLinus Torvalds rth->rt_src = saddr; 18041da177e4SLinus Torvalds rth->rt_gateway = daddr; 18051da177e4SLinus Torvalds rth->rt_iif = 18061da177e4SLinus Torvalds rth->fl.iif = in_dev->dev->ifindex; 18071da177e4SLinus Torvalds rth->u.dst.dev = (out_dev)->dev; 18081da177e4SLinus Torvalds dev_hold(rth->u.dst.dev); 18091da177e4SLinus Torvalds rth->idev = in_dev_get(rth->u.dst.dev); 18101da177e4SLinus Torvalds rth->fl.oif = 0; 18111da177e4SLinus Torvalds rth->rt_spec_dst= spec_dst; 18121da177e4SLinus Torvalds 18131da177e4SLinus Torvalds rth->u.dst.input = ip_forward; 18141da177e4SLinus Torvalds rth->u.dst.output = ip_output; 18151da177e4SLinus Torvalds 18161da177e4SLinus Torvalds rt_set_nexthop(rth, res, itag); 18171da177e4SLinus Torvalds 18181da177e4SLinus Torvalds rth->rt_flags = flags; 18191da177e4SLinus Torvalds 18201da177e4SLinus Torvalds *result = rth; 18211da177e4SLinus Torvalds err = 0; 18221da177e4SLinus Torvalds cleanup: 18231da177e4SLinus Torvalds /* release the working reference to the output device */ 18241da177e4SLinus Torvalds in_dev_put(out_dev); 18251da177e4SLinus Torvalds return err; 18261da177e4SLinus Torvalds } 18271da177e4SLinus Torvalds 1828e06e7c61SDavid S. Miller static inline int ip_mkroute_input(struct sk_buff *skb, 18291da177e4SLinus Torvalds struct fib_result* res, 18301da177e4SLinus Torvalds const struct flowi *fl, 18311da177e4SLinus Torvalds struct in_device *in_dev, 18329e12bb22SAl Viro __be32 daddr, __be32 saddr, u32 tos) 18331da177e4SLinus Torvalds { 18347abaa27cSChuck Short struct rtable* rth = NULL; 18351da177e4SLinus Torvalds int err; 18361da177e4SLinus Torvalds unsigned hash; 18371da177e4SLinus Torvalds 18381da177e4SLinus Torvalds #ifdef CONFIG_IP_ROUTE_MULTIPATH 18391da177e4SLinus Torvalds if (res->fi && res->fi->fib_nhs > 1 && fl->oif == 0) 18401da177e4SLinus Torvalds fib_select_multipath(fl, res); 18411da177e4SLinus Torvalds #endif 18421da177e4SLinus Torvalds 18431da177e4SLinus Torvalds /* create a routing cache entry */ 18441da177e4SLinus Torvalds err = __mkroute_input(skb, res, in_dev, daddr, saddr, tos, &rth); 18451da177e4SLinus Torvalds if (err) 18461da177e4SLinus Torvalds return err; 18471da177e4SLinus Torvalds 18481da177e4SLinus Torvalds /* put it into the cache */ 18498c7bc840SAl Viro hash = rt_hash(daddr, saddr, fl->iif); 18501da177e4SLinus Torvalds return rt_intern_hash(hash, rth, (struct rtable**)&skb->dst); 18511da177e4SLinus Torvalds } 18521da177e4SLinus Torvalds 18531da177e4SLinus Torvalds /* 18541da177e4SLinus Torvalds * NOTE. We drop all the packets that has local source 18551da177e4SLinus Torvalds * addresses, because every properly looped back packet 18561da177e4SLinus Torvalds * must have correct destination already attached by output routine. 18571da177e4SLinus Torvalds * 18581da177e4SLinus Torvalds * Such approach solves two big problems: 18591da177e4SLinus Torvalds * 1. Not simplex devices are handled properly. 18601da177e4SLinus Torvalds * 2. IP spoofing attempts are filtered with 100% of guarantee. 18611da177e4SLinus Torvalds */ 18621da177e4SLinus Torvalds 18639e12bb22SAl Viro static int ip_route_input_slow(struct sk_buff *skb, __be32 daddr, __be32 saddr, 18641da177e4SLinus Torvalds u8 tos, struct net_device *dev) 18651da177e4SLinus Torvalds { 18661da177e4SLinus Torvalds struct fib_result res; 18671da177e4SLinus Torvalds struct in_device *in_dev = in_dev_get(dev); 18681da177e4SLinus Torvalds struct flowi fl = { .nl_u = { .ip4_u = 18691da177e4SLinus Torvalds { .daddr = daddr, 18701da177e4SLinus Torvalds .saddr = saddr, 18711da177e4SLinus Torvalds .tos = tos, 18721da177e4SLinus Torvalds .scope = RT_SCOPE_UNIVERSE, 18731da177e4SLinus Torvalds } }, 187447dcf0cbSThomas Graf .mark = skb->mark, 18751da177e4SLinus Torvalds .iif = dev->ifindex }; 18761da177e4SLinus Torvalds unsigned flags = 0; 18771da177e4SLinus Torvalds u32 itag = 0; 18781da177e4SLinus Torvalds struct rtable * rth; 18791da177e4SLinus Torvalds unsigned hash; 18809e12bb22SAl Viro __be32 spec_dst; 18811da177e4SLinus Torvalds int err = -EINVAL; 18821da177e4SLinus Torvalds int free_res = 0; 18831da177e4SLinus Torvalds 18841da177e4SLinus Torvalds /* IP on this device is disabled. */ 18851da177e4SLinus Torvalds 18861da177e4SLinus Torvalds if (!in_dev) 18871da177e4SLinus Torvalds goto out; 18881da177e4SLinus Torvalds 18891da177e4SLinus Torvalds /* Check for the most weird martians, which can be not detected 18901da177e4SLinus Torvalds by fib_lookup. 18911da177e4SLinus Torvalds */ 18921da177e4SLinus Torvalds 18931da177e4SLinus Torvalds if (MULTICAST(saddr) || BADCLASS(saddr) || LOOPBACK(saddr)) 18941da177e4SLinus Torvalds goto martian_source; 18951da177e4SLinus Torvalds 1896e448515cSAl Viro if (daddr == htonl(0xFFFFFFFF) || (saddr == 0 && daddr == 0)) 18971da177e4SLinus Torvalds goto brd_input; 18981da177e4SLinus Torvalds 18991da177e4SLinus Torvalds /* Accept zero addresses only to limited broadcast; 19001da177e4SLinus Torvalds * I even do not know to fix it or not. Waiting for complains :-) 19011da177e4SLinus Torvalds */ 19021da177e4SLinus Torvalds if (ZERONET(saddr)) 19031da177e4SLinus Torvalds goto martian_source; 19041da177e4SLinus Torvalds 19051da177e4SLinus Torvalds if (BADCLASS(daddr) || ZERONET(daddr) || LOOPBACK(daddr)) 19061da177e4SLinus Torvalds goto martian_destination; 19071da177e4SLinus Torvalds 19081da177e4SLinus Torvalds /* 19091da177e4SLinus Torvalds * Now we are ready to route packet. 19101da177e4SLinus Torvalds */ 19111da177e4SLinus Torvalds if ((err = fib_lookup(&fl, &res)) != 0) { 19121da177e4SLinus Torvalds if (!IN_DEV_FORWARD(in_dev)) 19132c2910a4SDietmar Eggemann goto e_hostunreach; 19141da177e4SLinus Torvalds goto no_route; 19151da177e4SLinus Torvalds } 19161da177e4SLinus Torvalds free_res = 1; 19171da177e4SLinus Torvalds 19181da177e4SLinus Torvalds RT_CACHE_STAT_INC(in_slow_tot); 19191da177e4SLinus Torvalds 19201da177e4SLinus Torvalds if (res.type == RTN_BROADCAST) 19211da177e4SLinus Torvalds goto brd_input; 19221da177e4SLinus Torvalds 19231da177e4SLinus Torvalds if (res.type == RTN_LOCAL) { 19241da177e4SLinus Torvalds int result; 19251da177e4SLinus Torvalds result = fib_validate_source(saddr, daddr, tos, 19262774c7abSEric W. Biederman init_net.loopback_dev->ifindex, 19271da177e4SLinus Torvalds dev, &spec_dst, &itag); 19281da177e4SLinus Torvalds if (result < 0) 19291da177e4SLinus Torvalds goto martian_source; 19301da177e4SLinus Torvalds if (result) 19311da177e4SLinus Torvalds flags |= RTCF_DIRECTSRC; 19321da177e4SLinus Torvalds spec_dst = daddr; 19331da177e4SLinus Torvalds goto local_input; 19341da177e4SLinus Torvalds } 19351da177e4SLinus Torvalds 19361da177e4SLinus Torvalds if (!IN_DEV_FORWARD(in_dev)) 19372c2910a4SDietmar Eggemann goto e_hostunreach; 19381da177e4SLinus Torvalds if (res.type != RTN_UNICAST) 19391da177e4SLinus Torvalds goto martian_destination; 19401da177e4SLinus Torvalds 19411da177e4SLinus Torvalds err = ip_mkroute_input(skb, &res, &fl, in_dev, daddr, saddr, tos); 19421da177e4SLinus Torvalds done: 19431da177e4SLinus Torvalds in_dev_put(in_dev); 19441da177e4SLinus Torvalds if (free_res) 19451da177e4SLinus Torvalds fib_res_put(&res); 19461da177e4SLinus Torvalds out: return err; 19471da177e4SLinus Torvalds 19481da177e4SLinus Torvalds brd_input: 19491da177e4SLinus Torvalds if (skb->protocol != htons(ETH_P_IP)) 19501da177e4SLinus Torvalds goto e_inval; 19511da177e4SLinus Torvalds 19521da177e4SLinus Torvalds if (ZERONET(saddr)) 19531da177e4SLinus Torvalds spec_dst = inet_select_addr(dev, 0, RT_SCOPE_LINK); 19541da177e4SLinus Torvalds else { 19551da177e4SLinus Torvalds err = fib_validate_source(saddr, 0, tos, 0, dev, &spec_dst, 19561da177e4SLinus Torvalds &itag); 19571da177e4SLinus Torvalds if (err < 0) 19581da177e4SLinus Torvalds goto martian_source; 19591da177e4SLinus Torvalds if (err) 19601da177e4SLinus Torvalds flags |= RTCF_DIRECTSRC; 19611da177e4SLinus Torvalds } 19621da177e4SLinus Torvalds flags |= RTCF_BROADCAST; 19631da177e4SLinus Torvalds res.type = RTN_BROADCAST; 19641da177e4SLinus Torvalds RT_CACHE_STAT_INC(in_brd); 19651da177e4SLinus Torvalds 19661da177e4SLinus Torvalds local_input: 19671da177e4SLinus Torvalds rth = dst_alloc(&ipv4_dst_ops); 19681da177e4SLinus Torvalds if (!rth) 19691da177e4SLinus Torvalds goto e_nobufs; 19701da177e4SLinus Torvalds 19711da177e4SLinus Torvalds rth->u.dst.output= ip_rt_bug; 19721da177e4SLinus Torvalds 19731da177e4SLinus Torvalds atomic_set(&rth->u.dst.__refcnt, 1); 19741da177e4SLinus Torvalds rth->u.dst.flags= DST_HOST; 197542f811b8SHerbert Xu if (IN_DEV_CONF_GET(in_dev, NOPOLICY)) 19761da177e4SLinus Torvalds rth->u.dst.flags |= DST_NOPOLICY; 19771da177e4SLinus Torvalds rth->fl.fl4_dst = daddr; 19781da177e4SLinus Torvalds rth->rt_dst = daddr; 19791da177e4SLinus Torvalds rth->fl.fl4_tos = tos; 198047dcf0cbSThomas Graf rth->fl.mark = skb->mark; 19811da177e4SLinus Torvalds rth->fl.fl4_src = saddr; 19821da177e4SLinus Torvalds rth->rt_src = saddr; 19831da177e4SLinus Torvalds #ifdef CONFIG_NET_CLS_ROUTE 19841da177e4SLinus Torvalds rth->u.dst.tclassid = itag; 19851da177e4SLinus Torvalds #endif 19861da177e4SLinus Torvalds rth->rt_iif = 19871da177e4SLinus Torvalds rth->fl.iif = dev->ifindex; 19882774c7abSEric W. Biederman rth->u.dst.dev = init_net.loopback_dev; 19891da177e4SLinus Torvalds dev_hold(rth->u.dst.dev); 19901da177e4SLinus Torvalds rth->idev = in_dev_get(rth->u.dst.dev); 19911da177e4SLinus Torvalds rth->rt_gateway = daddr; 19921da177e4SLinus Torvalds rth->rt_spec_dst= spec_dst; 19931da177e4SLinus Torvalds rth->u.dst.input= ip_local_deliver; 19941da177e4SLinus Torvalds rth->rt_flags = flags|RTCF_LOCAL; 19951da177e4SLinus Torvalds if (res.type == RTN_UNREACHABLE) { 19961da177e4SLinus Torvalds rth->u.dst.input= ip_error; 19971da177e4SLinus Torvalds rth->u.dst.error= -err; 19981da177e4SLinus Torvalds rth->rt_flags &= ~RTCF_LOCAL; 19991da177e4SLinus Torvalds } 20001da177e4SLinus Torvalds rth->rt_type = res.type; 20018c7bc840SAl Viro hash = rt_hash(daddr, saddr, fl.iif); 20021da177e4SLinus Torvalds err = rt_intern_hash(hash, rth, (struct rtable**)&skb->dst); 20031da177e4SLinus Torvalds goto done; 20041da177e4SLinus Torvalds 20051da177e4SLinus Torvalds no_route: 20061da177e4SLinus Torvalds RT_CACHE_STAT_INC(in_no_route); 20071da177e4SLinus Torvalds spec_dst = inet_select_addr(dev, 0, RT_SCOPE_UNIVERSE); 20081da177e4SLinus Torvalds res.type = RTN_UNREACHABLE; 20097f53878dSMitsuru Chinen if (err == -ESRCH) 20107f53878dSMitsuru Chinen err = -ENETUNREACH; 20111da177e4SLinus Torvalds goto local_input; 20121da177e4SLinus Torvalds 20131da177e4SLinus Torvalds /* 20141da177e4SLinus Torvalds * Do not cache martian addresses: they should be logged (RFC1812) 20151da177e4SLinus Torvalds */ 20161da177e4SLinus Torvalds martian_destination: 20171da177e4SLinus Torvalds RT_CACHE_STAT_INC(in_martian_dst); 20181da177e4SLinus Torvalds #ifdef CONFIG_IP_ROUTE_VERBOSE 20191da177e4SLinus Torvalds if (IN_DEV_LOG_MARTIANS(in_dev) && net_ratelimit()) 20201da177e4SLinus Torvalds printk(KERN_WARNING "martian destination %u.%u.%u.%u from " 20211da177e4SLinus Torvalds "%u.%u.%u.%u, dev %s\n", 20221da177e4SLinus Torvalds NIPQUAD(daddr), NIPQUAD(saddr), dev->name); 20231da177e4SLinus Torvalds #endif 20242c2910a4SDietmar Eggemann 20252c2910a4SDietmar Eggemann e_hostunreach: 20262c2910a4SDietmar Eggemann err = -EHOSTUNREACH; 20272c2910a4SDietmar Eggemann goto done; 20282c2910a4SDietmar Eggemann 20291da177e4SLinus Torvalds e_inval: 20301da177e4SLinus Torvalds err = -EINVAL; 20311da177e4SLinus Torvalds goto done; 20321da177e4SLinus Torvalds 20331da177e4SLinus Torvalds e_nobufs: 20341da177e4SLinus Torvalds err = -ENOBUFS; 20351da177e4SLinus Torvalds goto done; 20361da177e4SLinus Torvalds 20371da177e4SLinus Torvalds martian_source: 20381da177e4SLinus Torvalds ip_handle_martian_source(dev, in_dev, skb, daddr, saddr); 20391da177e4SLinus Torvalds goto e_inval; 20401da177e4SLinus Torvalds } 20411da177e4SLinus Torvalds 20429e12bb22SAl Viro int ip_route_input(struct sk_buff *skb, __be32 daddr, __be32 saddr, 20431da177e4SLinus Torvalds u8 tos, struct net_device *dev) 20441da177e4SLinus Torvalds { 20451da177e4SLinus Torvalds struct rtable * rth; 20461da177e4SLinus Torvalds unsigned hash; 20471da177e4SLinus Torvalds int iif = dev->ifindex; 20481da177e4SLinus Torvalds 20491da177e4SLinus Torvalds tos &= IPTOS_RT_MASK; 20508c7bc840SAl Viro hash = rt_hash(daddr, saddr, iif); 20511da177e4SLinus Torvalds 20521da177e4SLinus Torvalds rcu_read_lock(); 20531da177e4SLinus Torvalds for (rth = rcu_dereference(rt_hash_table[hash].chain); rth; 2054093c2ca4SEric Dumazet rth = rcu_dereference(rth->u.dst.rt_next)) { 20551da177e4SLinus Torvalds if (rth->fl.fl4_dst == daddr && 20561da177e4SLinus Torvalds rth->fl.fl4_src == saddr && 20571da177e4SLinus Torvalds rth->fl.iif == iif && 20581da177e4SLinus Torvalds rth->fl.oif == 0 && 205947dcf0cbSThomas Graf rth->fl.mark == skb->mark && 20601da177e4SLinus Torvalds rth->fl.fl4_tos == tos) { 206103f49f34SPavel Emelyanov dst_use(&rth->u.dst, jiffies); 20621da177e4SLinus Torvalds RT_CACHE_STAT_INC(in_hit); 20631da177e4SLinus Torvalds rcu_read_unlock(); 20641da177e4SLinus Torvalds skb->dst = (struct dst_entry*)rth; 20651da177e4SLinus Torvalds return 0; 20661da177e4SLinus Torvalds } 20671da177e4SLinus Torvalds RT_CACHE_STAT_INC(in_hlist_search); 20681da177e4SLinus Torvalds } 20691da177e4SLinus Torvalds rcu_read_unlock(); 20701da177e4SLinus Torvalds 20711da177e4SLinus Torvalds /* Multicast recognition logic is moved from route cache to here. 20721da177e4SLinus Torvalds The problem was that too many Ethernet cards have broken/missing 20731da177e4SLinus Torvalds hardware multicast filters :-( As result the host on multicasting 20741da177e4SLinus Torvalds network acquires a lot of useless route cache entries, sort of 20751da177e4SLinus Torvalds SDR messages from all the world. Now we try to get rid of them. 20761da177e4SLinus Torvalds Really, provided software IP multicast filter is organized 20771da177e4SLinus Torvalds reasonably (at least, hashed), it does not result in a slowdown 20781da177e4SLinus Torvalds comparing with route cache reject entries. 20791da177e4SLinus Torvalds Note, that multicast routers are not affected, because 20801da177e4SLinus Torvalds route cache entry is created eventually. 20811da177e4SLinus Torvalds */ 20821da177e4SLinus Torvalds if (MULTICAST(daddr)) { 20831da177e4SLinus Torvalds struct in_device *in_dev; 20841da177e4SLinus Torvalds 20851da177e4SLinus Torvalds rcu_read_lock(); 2086e5ed6399SHerbert Xu if ((in_dev = __in_dev_get_rcu(dev)) != NULL) { 20871da177e4SLinus Torvalds int our = ip_check_mc(in_dev, daddr, saddr, 2088eddc9ec5SArnaldo Carvalho de Melo ip_hdr(skb)->protocol); 20891da177e4SLinus Torvalds if (our 20901da177e4SLinus Torvalds #ifdef CONFIG_IP_MROUTE 20911da177e4SLinus Torvalds || (!LOCAL_MCAST(daddr) && IN_DEV_MFORWARD(in_dev)) 20921da177e4SLinus Torvalds #endif 20931da177e4SLinus Torvalds ) { 20941da177e4SLinus Torvalds rcu_read_unlock(); 20951da177e4SLinus Torvalds return ip_route_input_mc(skb, daddr, saddr, 20961da177e4SLinus Torvalds tos, dev, our); 20971da177e4SLinus Torvalds } 20981da177e4SLinus Torvalds } 20991da177e4SLinus Torvalds rcu_read_unlock(); 21001da177e4SLinus Torvalds return -EINVAL; 21011da177e4SLinus Torvalds } 21021da177e4SLinus Torvalds return ip_route_input_slow(skb, daddr, saddr, tos, dev); 21031da177e4SLinus Torvalds } 21041da177e4SLinus Torvalds 21051da177e4SLinus Torvalds static inline int __mkroute_output(struct rtable **result, 21061da177e4SLinus Torvalds struct fib_result* res, 21071da177e4SLinus Torvalds const struct flowi *fl, 21081da177e4SLinus Torvalds const struct flowi *oldflp, 21091da177e4SLinus Torvalds struct net_device *dev_out, 21101da177e4SLinus Torvalds unsigned flags) 21111da177e4SLinus Torvalds { 21121da177e4SLinus Torvalds struct rtable *rth; 21131da177e4SLinus Torvalds struct in_device *in_dev; 21141da177e4SLinus Torvalds u32 tos = RT_FL_TOS(oldflp); 21151da177e4SLinus Torvalds int err = 0; 21161da177e4SLinus Torvalds 21171da177e4SLinus Torvalds if (LOOPBACK(fl->fl4_src) && !(dev_out->flags&IFF_LOOPBACK)) 21181da177e4SLinus Torvalds return -EINVAL; 21191da177e4SLinus Torvalds 2120e448515cSAl Viro if (fl->fl4_dst == htonl(0xFFFFFFFF)) 21211da177e4SLinus Torvalds res->type = RTN_BROADCAST; 21221da177e4SLinus Torvalds else if (MULTICAST(fl->fl4_dst)) 21231da177e4SLinus Torvalds res->type = RTN_MULTICAST; 21241da177e4SLinus Torvalds else if (BADCLASS(fl->fl4_dst) || ZERONET(fl->fl4_dst)) 21251da177e4SLinus Torvalds return -EINVAL; 21261da177e4SLinus Torvalds 21271da177e4SLinus Torvalds if (dev_out->flags & IFF_LOOPBACK) 21281da177e4SLinus Torvalds flags |= RTCF_LOCAL; 21291da177e4SLinus Torvalds 21301da177e4SLinus Torvalds /* get work reference to inet device */ 21311da177e4SLinus Torvalds in_dev = in_dev_get(dev_out); 21321da177e4SLinus Torvalds if (!in_dev) 21331da177e4SLinus Torvalds return -EINVAL; 21341da177e4SLinus Torvalds 21351da177e4SLinus Torvalds if (res->type == RTN_BROADCAST) { 21361da177e4SLinus Torvalds flags |= RTCF_BROADCAST | RTCF_LOCAL; 21371da177e4SLinus Torvalds if (res->fi) { 21381da177e4SLinus Torvalds fib_info_put(res->fi); 21391da177e4SLinus Torvalds res->fi = NULL; 21401da177e4SLinus Torvalds } 21411da177e4SLinus Torvalds } else if (res->type == RTN_MULTICAST) { 21421da177e4SLinus Torvalds flags |= RTCF_MULTICAST|RTCF_LOCAL; 21431da177e4SLinus Torvalds if (!ip_check_mc(in_dev, oldflp->fl4_dst, oldflp->fl4_src, 21441da177e4SLinus Torvalds oldflp->proto)) 21451da177e4SLinus Torvalds flags &= ~RTCF_LOCAL; 21461da177e4SLinus Torvalds /* If multicast route do not exist use 21471da177e4SLinus Torvalds default one, but do not gateway in this case. 21481da177e4SLinus Torvalds Yes, it is hack. 21491da177e4SLinus Torvalds */ 21501da177e4SLinus Torvalds if (res->fi && res->prefixlen < 4) { 21511da177e4SLinus Torvalds fib_info_put(res->fi); 21521da177e4SLinus Torvalds res->fi = NULL; 21531da177e4SLinus Torvalds } 21541da177e4SLinus Torvalds } 21551da177e4SLinus Torvalds 21561da177e4SLinus Torvalds 21571da177e4SLinus Torvalds rth = dst_alloc(&ipv4_dst_ops); 21581da177e4SLinus Torvalds if (!rth) { 21591da177e4SLinus Torvalds err = -ENOBUFS; 21601da177e4SLinus Torvalds goto cleanup; 21611da177e4SLinus Torvalds } 21621da177e4SLinus Torvalds 2163ce723d8eSJulian Anastasov atomic_set(&rth->u.dst.__refcnt, 1); 21641da177e4SLinus Torvalds rth->u.dst.flags= DST_HOST; 216542f811b8SHerbert Xu if (IN_DEV_CONF_GET(in_dev, NOXFRM)) 21661da177e4SLinus Torvalds rth->u.dst.flags |= DST_NOXFRM; 216742f811b8SHerbert Xu if (IN_DEV_CONF_GET(in_dev, NOPOLICY)) 21681da177e4SLinus Torvalds rth->u.dst.flags |= DST_NOPOLICY; 21691da177e4SLinus Torvalds 21701da177e4SLinus Torvalds rth->fl.fl4_dst = oldflp->fl4_dst; 21711da177e4SLinus Torvalds rth->fl.fl4_tos = tos; 21721da177e4SLinus Torvalds rth->fl.fl4_src = oldflp->fl4_src; 21731da177e4SLinus Torvalds rth->fl.oif = oldflp->oif; 217447dcf0cbSThomas Graf rth->fl.mark = oldflp->mark; 21751da177e4SLinus Torvalds rth->rt_dst = fl->fl4_dst; 21761da177e4SLinus Torvalds rth->rt_src = fl->fl4_src; 21771da177e4SLinus Torvalds rth->rt_iif = oldflp->oif ? : dev_out->ifindex; 21781da177e4SLinus Torvalds /* get references to the devices that are to be hold by the routing 21791da177e4SLinus Torvalds cache entry */ 21801da177e4SLinus Torvalds rth->u.dst.dev = dev_out; 21811da177e4SLinus Torvalds dev_hold(dev_out); 21821da177e4SLinus Torvalds rth->idev = in_dev_get(dev_out); 21831da177e4SLinus Torvalds rth->rt_gateway = fl->fl4_dst; 21841da177e4SLinus Torvalds rth->rt_spec_dst= fl->fl4_src; 21851da177e4SLinus Torvalds 21861da177e4SLinus Torvalds rth->u.dst.output=ip_output; 21871da177e4SLinus Torvalds 21881da177e4SLinus Torvalds RT_CACHE_STAT_INC(out_slow_tot); 21891da177e4SLinus Torvalds 21901da177e4SLinus Torvalds if (flags & RTCF_LOCAL) { 21911da177e4SLinus Torvalds rth->u.dst.input = ip_local_deliver; 21921da177e4SLinus Torvalds rth->rt_spec_dst = fl->fl4_dst; 21931da177e4SLinus Torvalds } 21941da177e4SLinus Torvalds if (flags & (RTCF_BROADCAST | RTCF_MULTICAST)) { 21951da177e4SLinus Torvalds rth->rt_spec_dst = fl->fl4_src; 21961da177e4SLinus Torvalds if (flags & RTCF_LOCAL && 21971da177e4SLinus Torvalds !(dev_out->flags & IFF_LOOPBACK)) { 21981da177e4SLinus Torvalds rth->u.dst.output = ip_mc_output; 21991da177e4SLinus Torvalds RT_CACHE_STAT_INC(out_slow_mc); 22001da177e4SLinus Torvalds } 22011da177e4SLinus Torvalds #ifdef CONFIG_IP_MROUTE 22021da177e4SLinus Torvalds if (res->type == RTN_MULTICAST) { 22031da177e4SLinus Torvalds if (IN_DEV_MFORWARD(in_dev) && 22041da177e4SLinus Torvalds !LOCAL_MCAST(oldflp->fl4_dst)) { 22051da177e4SLinus Torvalds rth->u.dst.input = ip_mr_input; 22061da177e4SLinus Torvalds rth->u.dst.output = ip_mc_output; 22071da177e4SLinus Torvalds } 22081da177e4SLinus Torvalds } 22091da177e4SLinus Torvalds #endif 22101da177e4SLinus Torvalds } 22111da177e4SLinus Torvalds 22121da177e4SLinus Torvalds rt_set_nexthop(rth, res, 0); 22131da177e4SLinus Torvalds 22141da177e4SLinus Torvalds rth->rt_flags = flags; 22151da177e4SLinus Torvalds 22161da177e4SLinus Torvalds *result = rth; 22171da177e4SLinus Torvalds cleanup: 22181da177e4SLinus Torvalds /* release work reference to inet device */ 22191da177e4SLinus Torvalds in_dev_put(in_dev); 22201da177e4SLinus Torvalds 22211da177e4SLinus Torvalds return err; 22221da177e4SLinus Torvalds } 22231da177e4SLinus Torvalds 2224e06e7c61SDavid S. Miller static inline int ip_mkroute_output(struct rtable **rp, 22251da177e4SLinus Torvalds struct fib_result* res, 22261da177e4SLinus Torvalds const struct flowi *fl, 22271da177e4SLinus Torvalds const struct flowi *oldflp, 22281da177e4SLinus Torvalds struct net_device *dev_out, 22291da177e4SLinus Torvalds unsigned flags) 22301da177e4SLinus Torvalds { 22317abaa27cSChuck Short struct rtable *rth = NULL; 22321da177e4SLinus Torvalds int err = __mkroute_output(&rth, res, fl, oldflp, dev_out, flags); 22331da177e4SLinus Torvalds unsigned hash; 22341da177e4SLinus Torvalds if (err == 0) { 22358c7bc840SAl Viro hash = rt_hash(oldflp->fl4_dst, oldflp->fl4_src, oldflp->oif); 22361da177e4SLinus Torvalds err = rt_intern_hash(hash, rth, rp); 22371da177e4SLinus Torvalds } 22381da177e4SLinus Torvalds 22391da177e4SLinus Torvalds return err; 22401da177e4SLinus Torvalds } 22411da177e4SLinus Torvalds 22421da177e4SLinus Torvalds /* 22431da177e4SLinus Torvalds * Major route resolver routine. 22441da177e4SLinus Torvalds */ 22451da177e4SLinus Torvalds 22461da177e4SLinus Torvalds static int ip_route_output_slow(struct rtable **rp, const struct flowi *oldflp) 22471da177e4SLinus Torvalds { 22481da177e4SLinus Torvalds u32 tos = RT_FL_TOS(oldflp); 22491da177e4SLinus Torvalds struct flowi fl = { .nl_u = { .ip4_u = 22501da177e4SLinus Torvalds { .daddr = oldflp->fl4_dst, 22511da177e4SLinus Torvalds .saddr = oldflp->fl4_src, 22521da177e4SLinus Torvalds .tos = tos & IPTOS_RT_MASK, 22531da177e4SLinus Torvalds .scope = ((tos & RTO_ONLINK) ? 22541da177e4SLinus Torvalds RT_SCOPE_LINK : 22551da177e4SLinus Torvalds RT_SCOPE_UNIVERSE), 22561da177e4SLinus Torvalds } }, 225747dcf0cbSThomas Graf .mark = oldflp->mark, 22582774c7abSEric W. Biederman .iif = init_net.loopback_dev->ifindex, 22591da177e4SLinus Torvalds .oif = oldflp->oif }; 22601da177e4SLinus Torvalds struct fib_result res; 22611da177e4SLinus Torvalds unsigned flags = 0; 22621da177e4SLinus Torvalds struct net_device *dev_out = NULL; 22631da177e4SLinus Torvalds int free_res = 0; 22641da177e4SLinus Torvalds int err; 22651da177e4SLinus Torvalds 22661da177e4SLinus Torvalds 22671da177e4SLinus Torvalds res.fi = NULL; 22681da177e4SLinus Torvalds #ifdef CONFIG_IP_MULTIPLE_TABLES 22691da177e4SLinus Torvalds res.r = NULL; 22701da177e4SLinus Torvalds #endif 22711da177e4SLinus Torvalds 22721da177e4SLinus Torvalds if (oldflp->fl4_src) { 22731da177e4SLinus Torvalds err = -EINVAL; 22741da177e4SLinus Torvalds if (MULTICAST(oldflp->fl4_src) || 22751da177e4SLinus Torvalds BADCLASS(oldflp->fl4_src) || 22761da177e4SLinus Torvalds ZERONET(oldflp->fl4_src)) 22771da177e4SLinus Torvalds goto out; 22781da177e4SLinus Torvalds 22791da177e4SLinus Torvalds /* It is equivalent to inet_addr_type(saddr) == RTN_LOCAL */ 22801da177e4SLinus Torvalds dev_out = ip_dev_find(oldflp->fl4_src); 2281f6c5d736SDavid S. Miller if (dev_out == NULL) 22821da177e4SLinus Torvalds goto out; 22831da177e4SLinus Torvalds 22841da177e4SLinus Torvalds /* I removed check for oif == dev_out->oif here. 22851da177e4SLinus Torvalds It was wrong for two reasons: 22861da177e4SLinus Torvalds 1. ip_dev_find(saddr) can return wrong iface, if saddr is 22871da177e4SLinus Torvalds assigned to multiple interfaces. 22881da177e4SLinus Torvalds 2. Moreover, we are allowed to send packets with saddr 22891da177e4SLinus Torvalds of another iface. --ANK 22901da177e4SLinus Torvalds */ 22911da177e4SLinus Torvalds 2292f6c5d736SDavid S. Miller if (oldflp->oif == 0 2293e448515cSAl Viro && (MULTICAST(oldflp->fl4_dst) || oldflp->fl4_dst == htonl(0xFFFFFFFF))) { 22941da177e4SLinus Torvalds /* Special hack: user can direct multicasts 22951da177e4SLinus Torvalds and limited broadcast via necessary interface 22961da177e4SLinus Torvalds without fiddling with IP_MULTICAST_IF or IP_PKTINFO. 22971da177e4SLinus Torvalds This hack is not just for fun, it allows 22981da177e4SLinus Torvalds vic,vat and friends to work. 22991da177e4SLinus Torvalds They bind socket to loopback, set ttl to zero 23001da177e4SLinus Torvalds and expect that it will work. 23011da177e4SLinus Torvalds From the viewpoint of routing cache they are broken, 23021da177e4SLinus Torvalds because we are not allowed to build multicast path 23031da177e4SLinus Torvalds with loopback source addr (look, routing cache 23041da177e4SLinus Torvalds cannot know, that ttl is zero, so that packet 23051da177e4SLinus Torvalds will not leave this host and route is valid). 23061da177e4SLinus Torvalds Luckily, this hack is good workaround. 23071da177e4SLinus Torvalds */ 23081da177e4SLinus Torvalds 23091da177e4SLinus Torvalds fl.oif = dev_out->ifindex; 23101da177e4SLinus Torvalds goto make_route; 23111da177e4SLinus Torvalds } 23121da177e4SLinus Torvalds if (dev_out) 23131da177e4SLinus Torvalds dev_put(dev_out); 23141da177e4SLinus Torvalds dev_out = NULL; 23151da177e4SLinus Torvalds } 23161da177e4SLinus Torvalds 23171da177e4SLinus Torvalds 23181da177e4SLinus Torvalds if (oldflp->oif) { 2319881d966bSEric W. Biederman dev_out = dev_get_by_index(&init_net, oldflp->oif); 23201da177e4SLinus Torvalds err = -ENODEV; 23211da177e4SLinus Torvalds if (dev_out == NULL) 23221da177e4SLinus Torvalds goto out; 2323e5ed6399SHerbert Xu 2324e5ed6399SHerbert Xu /* RACE: Check return value of inet_select_addr instead. */ 2325e5ed6399SHerbert Xu if (__in_dev_get_rtnl(dev_out) == NULL) { 23261da177e4SLinus Torvalds dev_put(dev_out); 23271da177e4SLinus Torvalds goto out; /* Wrong error code */ 23281da177e4SLinus Torvalds } 23291da177e4SLinus Torvalds 2330e448515cSAl Viro if (LOCAL_MCAST(oldflp->fl4_dst) || oldflp->fl4_dst == htonl(0xFFFFFFFF)) { 23311da177e4SLinus Torvalds if (!fl.fl4_src) 23321da177e4SLinus Torvalds fl.fl4_src = inet_select_addr(dev_out, 0, 23331da177e4SLinus Torvalds RT_SCOPE_LINK); 23341da177e4SLinus Torvalds goto make_route; 23351da177e4SLinus Torvalds } 23361da177e4SLinus Torvalds if (!fl.fl4_src) { 23371da177e4SLinus Torvalds if (MULTICAST(oldflp->fl4_dst)) 23381da177e4SLinus Torvalds fl.fl4_src = inet_select_addr(dev_out, 0, 23391da177e4SLinus Torvalds fl.fl4_scope); 23401da177e4SLinus Torvalds else if (!oldflp->fl4_dst) 23411da177e4SLinus Torvalds fl.fl4_src = inet_select_addr(dev_out, 0, 23421da177e4SLinus Torvalds RT_SCOPE_HOST); 23431da177e4SLinus Torvalds } 23441da177e4SLinus Torvalds } 23451da177e4SLinus Torvalds 23461da177e4SLinus Torvalds if (!fl.fl4_dst) { 23471da177e4SLinus Torvalds fl.fl4_dst = fl.fl4_src; 23481da177e4SLinus Torvalds if (!fl.fl4_dst) 23491da177e4SLinus Torvalds fl.fl4_dst = fl.fl4_src = htonl(INADDR_LOOPBACK); 23501da177e4SLinus Torvalds if (dev_out) 23511da177e4SLinus Torvalds dev_put(dev_out); 23522774c7abSEric W. Biederman dev_out = init_net.loopback_dev; 23531da177e4SLinus Torvalds dev_hold(dev_out); 23542774c7abSEric W. Biederman fl.oif = init_net.loopback_dev->ifindex; 23551da177e4SLinus Torvalds res.type = RTN_LOCAL; 23561da177e4SLinus Torvalds flags |= RTCF_LOCAL; 23571da177e4SLinus Torvalds goto make_route; 23581da177e4SLinus Torvalds } 23591da177e4SLinus Torvalds 23601da177e4SLinus Torvalds if (fib_lookup(&fl, &res)) { 23611da177e4SLinus Torvalds res.fi = NULL; 23621da177e4SLinus Torvalds if (oldflp->oif) { 23631da177e4SLinus Torvalds /* Apparently, routing tables are wrong. Assume, 23641da177e4SLinus Torvalds that the destination is on link. 23651da177e4SLinus Torvalds 23661da177e4SLinus Torvalds WHY? DW. 23671da177e4SLinus Torvalds Because we are allowed to send to iface 23681da177e4SLinus Torvalds even if it has NO routes and NO assigned 23691da177e4SLinus Torvalds addresses. When oif is specified, routing 23701da177e4SLinus Torvalds tables are looked up with only one purpose: 23711da177e4SLinus Torvalds to catch if destination is gatewayed, rather than 23721da177e4SLinus Torvalds direct. Moreover, if MSG_DONTROUTE is set, 23731da177e4SLinus Torvalds we send packet, ignoring both routing tables 23741da177e4SLinus Torvalds and ifaddr state. --ANK 23751da177e4SLinus Torvalds 23761da177e4SLinus Torvalds 23771da177e4SLinus Torvalds We could make it even if oif is unknown, 23781da177e4SLinus Torvalds likely IPv6, but we do not. 23791da177e4SLinus Torvalds */ 23801da177e4SLinus Torvalds 23811da177e4SLinus Torvalds if (fl.fl4_src == 0) 23821da177e4SLinus Torvalds fl.fl4_src = inet_select_addr(dev_out, 0, 23831da177e4SLinus Torvalds RT_SCOPE_LINK); 23841da177e4SLinus Torvalds res.type = RTN_UNICAST; 23851da177e4SLinus Torvalds goto make_route; 23861da177e4SLinus Torvalds } 23871da177e4SLinus Torvalds if (dev_out) 23881da177e4SLinus Torvalds dev_put(dev_out); 23891da177e4SLinus Torvalds err = -ENETUNREACH; 23901da177e4SLinus Torvalds goto out; 23911da177e4SLinus Torvalds } 23921da177e4SLinus Torvalds free_res = 1; 23931da177e4SLinus Torvalds 23941da177e4SLinus Torvalds if (res.type == RTN_LOCAL) { 23951da177e4SLinus Torvalds if (!fl.fl4_src) 23961da177e4SLinus Torvalds fl.fl4_src = fl.fl4_dst; 23971da177e4SLinus Torvalds if (dev_out) 23981da177e4SLinus Torvalds dev_put(dev_out); 23992774c7abSEric W. Biederman dev_out = init_net.loopback_dev; 24001da177e4SLinus Torvalds dev_hold(dev_out); 24011da177e4SLinus Torvalds fl.oif = dev_out->ifindex; 24021da177e4SLinus Torvalds if (res.fi) 24031da177e4SLinus Torvalds fib_info_put(res.fi); 24041da177e4SLinus Torvalds res.fi = NULL; 24051da177e4SLinus Torvalds flags |= RTCF_LOCAL; 24061da177e4SLinus Torvalds goto make_route; 24071da177e4SLinus Torvalds } 24081da177e4SLinus Torvalds 24091da177e4SLinus Torvalds #ifdef CONFIG_IP_ROUTE_MULTIPATH 24101da177e4SLinus Torvalds if (res.fi->fib_nhs > 1 && fl.oif == 0) 24111da177e4SLinus Torvalds fib_select_multipath(&fl, &res); 24121da177e4SLinus Torvalds else 24131da177e4SLinus Torvalds #endif 24141da177e4SLinus Torvalds if (!res.prefixlen && res.type == RTN_UNICAST && !fl.oif) 24151da177e4SLinus Torvalds fib_select_default(&fl, &res); 24161da177e4SLinus Torvalds 24171da177e4SLinus Torvalds if (!fl.fl4_src) 24181da177e4SLinus Torvalds fl.fl4_src = FIB_RES_PREFSRC(res); 24191da177e4SLinus Torvalds 24201da177e4SLinus Torvalds if (dev_out) 24211da177e4SLinus Torvalds dev_put(dev_out); 24221da177e4SLinus Torvalds dev_out = FIB_RES_DEV(res); 24231da177e4SLinus Torvalds dev_hold(dev_out); 24241da177e4SLinus Torvalds fl.oif = dev_out->ifindex; 24251da177e4SLinus Torvalds 24261da177e4SLinus Torvalds 24271da177e4SLinus Torvalds make_route: 24281da177e4SLinus Torvalds err = ip_mkroute_output(rp, &res, &fl, oldflp, dev_out, flags); 24291da177e4SLinus Torvalds 24301da177e4SLinus Torvalds 24311da177e4SLinus Torvalds if (free_res) 24321da177e4SLinus Torvalds fib_res_put(&res); 24331da177e4SLinus Torvalds if (dev_out) 24341da177e4SLinus Torvalds dev_put(dev_out); 24351da177e4SLinus Torvalds out: return err; 24361da177e4SLinus Torvalds } 24371da177e4SLinus Torvalds 24381da177e4SLinus Torvalds int __ip_route_output_key(struct rtable **rp, const struct flowi *flp) 24391da177e4SLinus Torvalds { 24401da177e4SLinus Torvalds unsigned hash; 24411da177e4SLinus Torvalds struct rtable *rth; 24421da177e4SLinus Torvalds 24438c7bc840SAl Viro hash = rt_hash(flp->fl4_dst, flp->fl4_src, flp->oif); 24441da177e4SLinus Torvalds 24451da177e4SLinus Torvalds rcu_read_lock_bh(); 24461da177e4SLinus Torvalds for (rth = rcu_dereference(rt_hash_table[hash].chain); rth; 2447093c2ca4SEric Dumazet rth = rcu_dereference(rth->u.dst.rt_next)) { 24481da177e4SLinus Torvalds if (rth->fl.fl4_dst == flp->fl4_dst && 24491da177e4SLinus Torvalds rth->fl.fl4_src == flp->fl4_src && 24501da177e4SLinus Torvalds rth->fl.iif == 0 && 24511da177e4SLinus Torvalds rth->fl.oif == flp->oif && 245247dcf0cbSThomas Graf rth->fl.mark == flp->mark && 24531da177e4SLinus Torvalds !((rth->fl.fl4_tos ^ flp->fl4_tos) & 24541da177e4SLinus Torvalds (IPTOS_RT_MASK | RTO_ONLINK))) { 245503f49f34SPavel Emelyanov dst_use(&rth->u.dst, jiffies); 24561da177e4SLinus Torvalds RT_CACHE_STAT_INC(out_hit); 24571da177e4SLinus Torvalds rcu_read_unlock_bh(); 24581da177e4SLinus Torvalds *rp = rth; 24591da177e4SLinus Torvalds return 0; 24601da177e4SLinus Torvalds } 24611da177e4SLinus Torvalds RT_CACHE_STAT_INC(out_hlist_search); 24621da177e4SLinus Torvalds } 24631da177e4SLinus Torvalds rcu_read_unlock_bh(); 24641da177e4SLinus Torvalds 24651da177e4SLinus Torvalds return ip_route_output_slow(rp, flp); 24661da177e4SLinus Torvalds } 24671da177e4SLinus Torvalds 2468d8c97a94SArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(__ip_route_output_key); 2469d8c97a94SArnaldo Carvalho de Melo 247014e50e57SDavid S. Miller static void ipv4_rt_blackhole_update_pmtu(struct dst_entry *dst, u32 mtu) 247114e50e57SDavid S. Miller { 247214e50e57SDavid S. Miller } 247314e50e57SDavid S. Miller 247414e50e57SDavid S. Miller static struct dst_ops ipv4_dst_blackhole_ops = { 247514e50e57SDavid S. Miller .family = AF_INET, 247614e50e57SDavid S. Miller .protocol = __constant_htons(ETH_P_IP), 247714e50e57SDavid S. Miller .destroy = ipv4_dst_destroy, 247814e50e57SDavid S. Miller .check = ipv4_dst_check, 247914e50e57SDavid S. Miller .update_pmtu = ipv4_rt_blackhole_update_pmtu, 248014e50e57SDavid S. Miller .entry_size = sizeof(struct rtable), 248114e50e57SDavid S. Miller }; 248214e50e57SDavid S. Miller 248314e50e57SDavid S. Miller 248414e50e57SDavid S. Miller static int ipv4_dst_blackhole(struct rtable **rp, struct flowi *flp, struct sock *sk) 248514e50e57SDavid S. Miller { 248614e50e57SDavid S. Miller struct rtable *ort = *rp; 248714e50e57SDavid S. Miller struct rtable *rt = (struct rtable *) 248814e50e57SDavid S. Miller dst_alloc(&ipv4_dst_blackhole_ops); 248914e50e57SDavid S. Miller 249014e50e57SDavid S. Miller if (rt) { 249114e50e57SDavid S. Miller struct dst_entry *new = &rt->u.dst; 249214e50e57SDavid S. Miller 249314e50e57SDavid S. Miller atomic_set(&new->__refcnt, 1); 249414e50e57SDavid S. Miller new->__use = 1; 2495352e512cSHerbert Xu new->input = dst_discard; 2496352e512cSHerbert Xu new->output = dst_discard; 249714e50e57SDavid S. Miller memcpy(new->metrics, ort->u.dst.metrics, RTAX_MAX*sizeof(u32)); 249814e50e57SDavid S. Miller 249914e50e57SDavid S. Miller new->dev = ort->u.dst.dev; 250014e50e57SDavid S. Miller if (new->dev) 250114e50e57SDavid S. Miller dev_hold(new->dev); 250214e50e57SDavid S. Miller 250314e50e57SDavid S. Miller rt->fl = ort->fl; 250414e50e57SDavid S. Miller 250514e50e57SDavid S. Miller rt->idev = ort->idev; 250614e50e57SDavid S. Miller if (rt->idev) 250714e50e57SDavid S. Miller in_dev_hold(rt->idev); 250814e50e57SDavid S. Miller rt->rt_flags = ort->rt_flags; 250914e50e57SDavid S. Miller rt->rt_type = ort->rt_type; 251014e50e57SDavid S. Miller rt->rt_dst = ort->rt_dst; 251114e50e57SDavid S. Miller rt->rt_src = ort->rt_src; 251214e50e57SDavid S. Miller rt->rt_iif = ort->rt_iif; 251314e50e57SDavid S. Miller rt->rt_gateway = ort->rt_gateway; 251414e50e57SDavid S. Miller rt->rt_spec_dst = ort->rt_spec_dst; 251514e50e57SDavid S. Miller rt->peer = ort->peer; 251614e50e57SDavid S. Miller if (rt->peer) 251714e50e57SDavid S. Miller atomic_inc(&rt->peer->refcnt); 251814e50e57SDavid S. Miller 251914e50e57SDavid S. Miller dst_free(new); 252014e50e57SDavid S. Miller } 252114e50e57SDavid S. Miller 252214e50e57SDavid S. Miller dst_release(&(*rp)->u.dst); 252314e50e57SDavid S. Miller *rp = rt; 252414e50e57SDavid S. Miller return (rt ? 0 : -ENOMEM); 252514e50e57SDavid S. Miller } 252614e50e57SDavid S. Miller 25271da177e4SLinus Torvalds int ip_route_output_flow(struct rtable **rp, struct flowi *flp, struct sock *sk, int flags) 25281da177e4SLinus Torvalds { 25291da177e4SLinus Torvalds int err; 25301da177e4SLinus Torvalds 25311da177e4SLinus Torvalds if ((err = __ip_route_output_key(rp, flp)) != 0) 25321da177e4SLinus Torvalds return err; 25331da177e4SLinus Torvalds 25341da177e4SLinus Torvalds if (flp->proto) { 25351da177e4SLinus Torvalds if (!flp->fl4_src) 25361da177e4SLinus Torvalds flp->fl4_src = (*rp)->rt_src; 25371da177e4SLinus Torvalds if (!flp->fl4_dst) 25381da177e4SLinus Torvalds flp->fl4_dst = (*rp)->rt_dst; 2539bb72845eSHerbert Xu err = __xfrm_lookup((struct dst_entry **)rp, flp, sk, 2540bb72845eSHerbert Xu flags ? XFRM_LOOKUP_WAIT : 0); 254114e50e57SDavid S. Miller if (err == -EREMOTE) 254214e50e57SDavid S. Miller err = ipv4_dst_blackhole(rp, flp, sk); 254314e50e57SDavid S. Miller 254414e50e57SDavid S. Miller return err; 25451da177e4SLinus Torvalds } 25461da177e4SLinus Torvalds 25471da177e4SLinus Torvalds return 0; 25481da177e4SLinus Torvalds } 25491da177e4SLinus Torvalds 2550d8c97a94SArnaldo Carvalho de Melo EXPORT_SYMBOL_GPL(ip_route_output_flow); 2551d8c97a94SArnaldo Carvalho de Melo 25521da177e4SLinus Torvalds int ip_route_output_key(struct rtable **rp, struct flowi *flp) 25531da177e4SLinus Torvalds { 25541da177e4SLinus Torvalds return ip_route_output_flow(rp, flp, NULL, 0); 25551da177e4SLinus Torvalds } 25561da177e4SLinus Torvalds 25571da177e4SLinus Torvalds static int rt_fill_info(struct sk_buff *skb, u32 pid, u32 seq, int event, 2558b6544c0bSJamal Hadi Salim int nowait, unsigned int flags) 25591da177e4SLinus Torvalds { 25601da177e4SLinus Torvalds struct rtable *rt = (struct rtable*)skb->dst; 25611da177e4SLinus Torvalds struct rtmsg *r; 25621da177e4SLinus Torvalds struct nlmsghdr *nlh; 2563e3703b3dSThomas Graf long expires; 2564e3703b3dSThomas Graf u32 id = 0, ts = 0, tsage = 0, error; 2565be403ea1SThomas Graf 2566be403ea1SThomas Graf nlh = nlmsg_put(skb, pid, seq, event, sizeof(*r), flags); 2567be403ea1SThomas Graf if (nlh == NULL) 256826932566SPatrick McHardy return -EMSGSIZE; 2569be403ea1SThomas Graf 2570be403ea1SThomas Graf r = nlmsg_data(nlh); 25711da177e4SLinus Torvalds r->rtm_family = AF_INET; 25721da177e4SLinus Torvalds r->rtm_dst_len = 32; 25731da177e4SLinus Torvalds r->rtm_src_len = 0; 25741da177e4SLinus Torvalds r->rtm_tos = rt->fl.fl4_tos; 25751da177e4SLinus Torvalds r->rtm_table = RT_TABLE_MAIN; 2576be403ea1SThomas Graf NLA_PUT_U32(skb, RTA_TABLE, RT_TABLE_MAIN); 25771da177e4SLinus Torvalds r->rtm_type = rt->rt_type; 25781da177e4SLinus Torvalds r->rtm_scope = RT_SCOPE_UNIVERSE; 25791da177e4SLinus Torvalds r->rtm_protocol = RTPROT_UNSPEC; 25801da177e4SLinus Torvalds r->rtm_flags = (rt->rt_flags & ~0xFFFF) | RTM_F_CLONED; 25811da177e4SLinus Torvalds if (rt->rt_flags & RTCF_NOTIFY) 25821da177e4SLinus Torvalds r->rtm_flags |= RTM_F_NOTIFY; 2583be403ea1SThomas Graf 258417fb2c64SAl Viro NLA_PUT_BE32(skb, RTA_DST, rt->rt_dst); 2585be403ea1SThomas Graf 25861da177e4SLinus Torvalds if (rt->fl.fl4_src) { 25871da177e4SLinus Torvalds r->rtm_src_len = 32; 258817fb2c64SAl Viro NLA_PUT_BE32(skb, RTA_SRC, rt->fl.fl4_src); 25891da177e4SLinus Torvalds } 25901da177e4SLinus Torvalds if (rt->u.dst.dev) 2591be403ea1SThomas Graf NLA_PUT_U32(skb, RTA_OIF, rt->u.dst.dev->ifindex); 25921da177e4SLinus Torvalds #ifdef CONFIG_NET_CLS_ROUTE 25931da177e4SLinus Torvalds if (rt->u.dst.tclassid) 2594be403ea1SThomas Graf NLA_PUT_U32(skb, RTA_FLOW, rt->u.dst.tclassid); 25951da177e4SLinus Torvalds #endif 25961da177e4SLinus Torvalds if (rt->fl.iif) 259717fb2c64SAl Viro NLA_PUT_BE32(skb, RTA_PREFSRC, rt->rt_spec_dst); 25981da177e4SLinus Torvalds else if (rt->rt_src != rt->fl.fl4_src) 259917fb2c64SAl Viro NLA_PUT_BE32(skb, RTA_PREFSRC, rt->rt_src); 2600be403ea1SThomas Graf 26011da177e4SLinus Torvalds if (rt->rt_dst != rt->rt_gateway) 260217fb2c64SAl Viro NLA_PUT_BE32(skb, RTA_GATEWAY, rt->rt_gateway); 2603be403ea1SThomas Graf 26041da177e4SLinus Torvalds if (rtnetlink_put_metrics(skb, rt->u.dst.metrics) < 0) 2605be403ea1SThomas Graf goto nla_put_failure; 2606be403ea1SThomas Graf 2607e3703b3dSThomas Graf error = rt->u.dst.error; 2608e3703b3dSThomas Graf expires = rt->u.dst.expires ? rt->u.dst.expires - jiffies : 0; 26091da177e4SLinus Torvalds if (rt->peer) { 2610e3703b3dSThomas Graf id = rt->peer->ip_id_count; 26111da177e4SLinus Torvalds if (rt->peer->tcp_ts_stamp) { 2612e3703b3dSThomas Graf ts = rt->peer->tcp_ts; 26139d729f72SJames Morris tsage = get_seconds() - rt->peer->tcp_ts_stamp; 26141da177e4SLinus Torvalds } 26151da177e4SLinus Torvalds } 2616be403ea1SThomas Graf 26171da177e4SLinus Torvalds if (rt->fl.iif) { 26181da177e4SLinus Torvalds #ifdef CONFIG_IP_MROUTE 2619e448515cSAl Viro __be32 dst = rt->rt_dst; 26201da177e4SLinus Torvalds 26211da177e4SLinus Torvalds if (MULTICAST(dst) && !LOCAL_MCAST(dst) && 2622*586f1211SPavel Emelyanov IPV4_DEVCONF_ALL(&init_net, MC_FORWARDING)) { 26231da177e4SLinus Torvalds int err = ipmr_get_route(skb, r, nowait); 26241da177e4SLinus Torvalds if (err <= 0) { 26251da177e4SLinus Torvalds if (!nowait) { 26261da177e4SLinus Torvalds if (err == 0) 26271da177e4SLinus Torvalds return 0; 2628be403ea1SThomas Graf goto nla_put_failure; 26291da177e4SLinus Torvalds } else { 26301da177e4SLinus Torvalds if (err == -EMSGSIZE) 2631be403ea1SThomas Graf goto nla_put_failure; 2632e3703b3dSThomas Graf error = err; 26331da177e4SLinus Torvalds } 26341da177e4SLinus Torvalds } 26351da177e4SLinus Torvalds } else 26361da177e4SLinus Torvalds #endif 2637be403ea1SThomas Graf NLA_PUT_U32(skb, RTA_IIF, rt->fl.iif); 26381da177e4SLinus Torvalds } 26391da177e4SLinus Torvalds 2640e3703b3dSThomas Graf if (rtnl_put_cacheinfo(skb, &rt->u.dst, id, ts, tsage, 2641e3703b3dSThomas Graf expires, error) < 0) 2642e3703b3dSThomas Graf goto nla_put_failure; 26431da177e4SLinus Torvalds 2644be403ea1SThomas Graf return nlmsg_end(skb, nlh); 2645be403ea1SThomas Graf 2646be403ea1SThomas Graf nla_put_failure: 264726932566SPatrick McHardy nlmsg_cancel(skb, nlh); 264826932566SPatrick McHardy return -EMSGSIZE; 26491da177e4SLinus Torvalds } 26501da177e4SLinus Torvalds 265163f3444fSThomas Graf static int inet_rtm_getroute(struct sk_buff *in_skb, struct nlmsghdr* nlh, void *arg) 26521da177e4SLinus Torvalds { 2653b854272bSDenis V. Lunev struct net *net = in_skb->sk->sk_net; 2654d889ce3bSThomas Graf struct rtmsg *rtm; 2655d889ce3bSThomas Graf struct nlattr *tb[RTA_MAX+1]; 26561da177e4SLinus Torvalds struct rtable *rt = NULL; 26579e12bb22SAl Viro __be32 dst = 0; 26589e12bb22SAl Viro __be32 src = 0; 26599e12bb22SAl Viro u32 iif; 2660d889ce3bSThomas Graf int err; 26611da177e4SLinus Torvalds struct sk_buff *skb; 26621da177e4SLinus Torvalds 2663b854272bSDenis V. Lunev if (net != &init_net) 2664b854272bSDenis V. Lunev return -EINVAL; 2665b854272bSDenis V. Lunev 2666d889ce3bSThomas Graf err = nlmsg_parse(nlh, sizeof(*rtm), tb, RTA_MAX, rtm_ipv4_policy); 2667d889ce3bSThomas Graf if (err < 0) 2668d889ce3bSThomas Graf goto errout; 2669d889ce3bSThomas Graf 2670d889ce3bSThomas Graf rtm = nlmsg_data(nlh); 2671d889ce3bSThomas Graf 26721da177e4SLinus Torvalds skb = alloc_skb(NLMSG_GOODSIZE, GFP_KERNEL); 2673d889ce3bSThomas Graf if (skb == NULL) { 2674d889ce3bSThomas Graf err = -ENOBUFS; 2675d889ce3bSThomas Graf goto errout; 2676d889ce3bSThomas Graf } 26771da177e4SLinus Torvalds 26781da177e4SLinus Torvalds /* Reserve room for dummy headers, this skb can pass 26791da177e4SLinus Torvalds through good chunk of routing engine. 26801da177e4SLinus Torvalds */ 2681459a98edSArnaldo Carvalho de Melo skb_reset_mac_header(skb); 2682c1d2bbe1SArnaldo Carvalho de Melo skb_reset_network_header(skb); 2683d2c962b8SStephen Hemminger 2684d2c962b8SStephen Hemminger /* Bugfix: need to give ip_route_input enough of an IP header to not gag. */ 2685eddc9ec5SArnaldo Carvalho de Melo ip_hdr(skb)->protocol = IPPROTO_ICMP; 26861da177e4SLinus Torvalds skb_reserve(skb, MAX_HEADER + sizeof(struct iphdr)); 26871da177e4SLinus Torvalds 268817fb2c64SAl Viro src = tb[RTA_SRC] ? nla_get_be32(tb[RTA_SRC]) : 0; 268917fb2c64SAl Viro dst = tb[RTA_DST] ? nla_get_be32(tb[RTA_DST]) : 0; 2690d889ce3bSThomas Graf iif = tb[RTA_IIF] ? nla_get_u32(tb[RTA_IIF]) : 0; 26911da177e4SLinus Torvalds 26921da177e4SLinus Torvalds if (iif) { 2693d889ce3bSThomas Graf struct net_device *dev; 2694d889ce3bSThomas Graf 2695881d966bSEric W. Biederman dev = __dev_get_by_index(&init_net, iif); 2696d889ce3bSThomas Graf if (dev == NULL) { 26971da177e4SLinus Torvalds err = -ENODEV; 2698d889ce3bSThomas Graf goto errout_free; 2699d889ce3bSThomas Graf } 2700d889ce3bSThomas Graf 27011da177e4SLinus Torvalds skb->protocol = htons(ETH_P_IP); 27021da177e4SLinus Torvalds skb->dev = dev; 27031da177e4SLinus Torvalds local_bh_disable(); 27041da177e4SLinus Torvalds err = ip_route_input(skb, dst, src, rtm->rtm_tos, dev); 27051da177e4SLinus Torvalds local_bh_enable(); 2706d889ce3bSThomas Graf 27071da177e4SLinus Torvalds rt = (struct rtable*) skb->dst; 2708d889ce3bSThomas Graf if (err == 0 && rt->u.dst.error) 27091da177e4SLinus Torvalds err = -rt->u.dst.error; 27101da177e4SLinus Torvalds } else { 2711d889ce3bSThomas Graf struct flowi fl = { 2712d889ce3bSThomas Graf .nl_u = { 2713d889ce3bSThomas Graf .ip4_u = { 2714d889ce3bSThomas Graf .daddr = dst, 27151da177e4SLinus Torvalds .saddr = src, 2716d889ce3bSThomas Graf .tos = rtm->rtm_tos, 2717d889ce3bSThomas Graf }, 2718d889ce3bSThomas Graf }, 2719d889ce3bSThomas Graf .oif = tb[RTA_OIF] ? nla_get_u32(tb[RTA_OIF]) : 0, 2720d889ce3bSThomas Graf }; 27211da177e4SLinus Torvalds err = ip_route_output_key(&rt, &fl); 27221da177e4SLinus Torvalds } 2723d889ce3bSThomas Graf 27241da177e4SLinus Torvalds if (err) 2725d889ce3bSThomas Graf goto errout_free; 27261da177e4SLinus Torvalds 27271da177e4SLinus Torvalds skb->dst = &rt->u.dst; 27281da177e4SLinus Torvalds if (rtm->rtm_flags & RTM_F_NOTIFY) 27291da177e4SLinus Torvalds rt->rt_flags |= RTCF_NOTIFY; 27301da177e4SLinus Torvalds 27311da177e4SLinus Torvalds err = rt_fill_info(skb, NETLINK_CB(in_skb).pid, nlh->nlmsg_seq, 2732b6544c0bSJamal Hadi Salim RTM_NEWROUTE, 0, 0); 2733d889ce3bSThomas Graf if (err <= 0) 2734d889ce3bSThomas Graf goto errout_free; 27351da177e4SLinus Torvalds 273697c53cacSDenis V. Lunev err = rtnl_unicast(skb, &init_net, NETLINK_CB(in_skb).pid); 2737d889ce3bSThomas Graf errout: 27382942e900SThomas Graf return err; 27391da177e4SLinus Torvalds 2740d889ce3bSThomas Graf errout_free: 27411da177e4SLinus Torvalds kfree_skb(skb); 2742d889ce3bSThomas Graf goto errout; 27431da177e4SLinus Torvalds } 27441da177e4SLinus Torvalds 27451da177e4SLinus Torvalds int ip_rt_dump(struct sk_buff *skb, struct netlink_callback *cb) 27461da177e4SLinus Torvalds { 27471da177e4SLinus Torvalds struct rtable *rt; 27481da177e4SLinus Torvalds int h, s_h; 27491da177e4SLinus Torvalds int idx, s_idx; 27501da177e4SLinus Torvalds 27511da177e4SLinus Torvalds s_h = cb->args[0]; 2752d8c92830SEric Dumazet if (s_h < 0) 2753d8c92830SEric Dumazet s_h = 0; 27541da177e4SLinus Torvalds s_idx = idx = cb->args[1]; 2755d8c92830SEric Dumazet for (h = s_h; h <= rt_hash_mask; h++) { 27561da177e4SLinus Torvalds rcu_read_lock_bh(); 27571da177e4SLinus Torvalds for (rt = rcu_dereference(rt_hash_table[h].chain), idx = 0; rt; 2758093c2ca4SEric Dumazet rt = rcu_dereference(rt->u.dst.rt_next), idx++) { 27591da177e4SLinus Torvalds if (idx < s_idx) 27601da177e4SLinus Torvalds continue; 27611da177e4SLinus Torvalds skb->dst = dst_clone(&rt->u.dst); 27621da177e4SLinus Torvalds if (rt_fill_info(skb, NETLINK_CB(cb->skb).pid, 2763b6544c0bSJamal Hadi Salim cb->nlh->nlmsg_seq, RTM_NEWROUTE, 2764b6544c0bSJamal Hadi Salim 1, NLM_F_MULTI) <= 0) { 27651da177e4SLinus Torvalds dst_release(xchg(&skb->dst, NULL)); 27661da177e4SLinus Torvalds rcu_read_unlock_bh(); 27671da177e4SLinus Torvalds goto done; 27681da177e4SLinus Torvalds } 27691da177e4SLinus Torvalds dst_release(xchg(&skb->dst, NULL)); 27701da177e4SLinus Torvalds } 27711da177e4SLinus Torvalds rcu_read_unlock_bh(); 2772d8c92830SEric Dumazet s_idx = 0; 27731da177e4SLinus Torvalds } 27741da177e4SLinus Torvalds 27751da177e4SLinus Torvalds done: 27761da177e4SLinus Torvalds cb->args[0] = h; 27771da177e4SLinus Torvalds cb->args[1] = idx; 27781da177e4SLinus Torvalds return skb->len; 27791da177e4SLinus Torvalds } 27801da177e4SLinus Torvalds 27811da177e4SLinus Torvalds void ip_rt_multicast_event(struct in_device *in_dev) 27821da177e4SLinus Torvalds { 27831da177e4SLinus Torvalds rt_cache_flush(0); 27841da177e4SLinus Torvalds } 27851da177e4SLinus Torvalds 27861da177e4SLinus Torvalds #ifdef CONFIG_SYSCTL 27871da177e4SLinus Torvalds static int flush_delay; 27881da177e4SLinus Torvalds 27891da177e4SLinus Torvalds static int ipv4_sysctl_rtcache_flush(ctl_table *ctl, int write, 27901da177e4SLinus Torvalds struct file *filp, void __user *buffer, 27911da177e4SLinus Torvalds size_t *lenp, loff_t *ppos) 27921da177e4SLinus Torvalds { 27931da177e4SLinus Torvalds if (write) { 27941da177e4SLinus Torvalds proc_dointvec(ctl, write, filp, buffer, lenp, ppos); 27951da177e4SLinus Torvalds rt_cache_flush(flush_delay); 27961da177e4SLinus Torvalds return 0; 27971da177e4SLinus Torvalds } 27981da177e4SLinus Torvalds 27991da177e4SLinus Torvalds return -EINVAL; 28001da177e4SLinus Torvalds } 28011da177e4SLinus Torvalds 28021da177e4SLinus Torvalds static int ipv4_sysctl_rtcache_flush_strategy(ctl_table *table, 28031da177e4SLinus Torvalds int __user *name, 28041da177e4SLinus Torvalds int nlen, 28051da177e4SLinus Torvalds void __user *oldval, 28061da177e4SLinus Torvalds size_t __user *oldlenp, 28071da177e4SLinus Torvalds void __user *newval, 28081f29bcd7SAlexey Dobriyan size_t newlen) 28091da177e4SLinus Torvalds { 28101da177e4SLinus Torvalds int delay; 28111da177e4SLinus Torvalds if (newlen != sizeof(int)) 28121da177e4SLinus Torvalds return -EINVAL; 28131da177e4SLinus Torvalds if (get_user(delay, (int __user *)newval)) 28141da177e4SLinus Torvalds return -EFAULT; 28151da177e4SLinus Torvalds rt_cache_flush(delay); 28161da177e4SLinus Torvalds return 0; 28171da177e4SLinus Torvalds } 28181da177e4SLinus Torvalds 28191da177e4SLinus Torvalds ctl_table ipv4_route_table[] = { 28201da177e4SLinus Torvalds { 28211da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_FLUSH, 28221da177e4SLinus Torvalds .procname = "flush", 28231da177e4SLinus Torvalds .data = &flush_delay, 28241da177e4SLinus Torvalds .maxlen = sizeof(int), 28257e3e0360SDave Jones .mode = 0200, 28261da177e4SLinus Torvalds .proc_handler = &ipv4_sysctl_rtcache_flush, 28271da177e4SLinus Torvalds .strategy = &ipv4_sysctl_rtcache_flush_strategy, 28281da177e4SLinus Torvalds }, 28291da177e4SLinus Torvalds { 28301da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_MIN_DELAY, 28311da177e4SLinus Torvalds .procname = "min_delay", 28321da177e4SLinus Torvalds .data = &ip_rt_min_delay, 28331da177e4SLinus Torvalds .maxlen = sizeof(int), 28341da177e4SLinus Torvalds .mode = 0644, 28351da177e4SLinus Torvalds .proc_handler = &proc_dointvec_jiffies, 28361da177e4SLinus Torvalds .strategy = &sysctl_jiffies, 28371da177e4SLinus Torvalds }, 28381da177e4SLinus Torvalds { 28391da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_MAX_DELAY, 28401da177e4SLinus Torvalds .procname = "max_delay", 28411da177e4SLinus Torvalds .data = &ip_rt_max_delay, 28421da177e4SLinus Torvalds .maxlen = sizeof(int), 28431da177e4SLinus Torvalds .mode = 0644, 28441da177e4SLinus Torvalds .proc_handler = &proc_dointvec_jiffies, 28451da177e4SLinus Torvalds .strategy = &sysctl_jiffies, 28461da177e4SLinus Torvalds }, 28471da177e4SLinus Torvalds { 28481da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_GC_THRESH, 28491da177e4SLinus Torvalds .procname = "gc_thresh", 28501da177e4SLinus Torvalds .data = &ipv4_dst_ops.gc_thresh, 28511da177e4SLinus Torvalds .maxlen = sizeof(int), 28521da177e4SLinus Torvalds .mode = 0644, 28531da177e4SLinus Torvalds .proc_handler = &proc_dointvec, 28541da177e4SLinus Torvalds }, 28551da177e4SLinus Torvalds { 28561da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_MAX_SIZE, 28571da177e4SLinus Torvalds .procname = "max_size", 28581da177e4SLinus Torvalds .data = &ip_rt_max_size, 28591da177e4SLinus Torvalds .maxlen = sizeof(int), 28601da177e4SLinus Torvalds .mode = 0644, 28611da177e4SLinus Torvalds .proc_handler = &proc_dointvec, 28621da177e4SLinus Torvalds }, 28631da177e4SLinus Torvalds { 28641da177e4SLinus Torvalds /* Deprecated. Use gc_min_interval_ms */ 28651da177e4SLinus Torvalds 28661da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_GC_MIN_INTERVAL, 28671da177e4SLinus Torvalds .procname = "gc_min_interval", 28681da177e4SLinus Torvalds .data = &ip_rt_gc_min_interval, 28691da177e4SLinus Torvalds .maxlen = sizeof(int), 28701da177e4SLinus Torvalds .mode = 0644, 28711da177e4SLinus Torvalds .proc_handler = &proc_dointvec_jiffies, 28721da177e4SLinus Torvalds .strategy = &sysctl_jiffies, 28731da177e4SLinus Torvalds }, 28741da177e4SLinus Torvalds { 28751da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_GC_MIN_INTERVAL_MS, 28761da177e4SLinus Torvalds .procname = "gc_min_interval_ms", 28771da177e4SLinus Torvalds .data = &ip_rt_gc_min_interval, 28781da177e4SLinus Torvalds .maxlen = sizeof(int), 28791da177e4SLinus Torvalds .mode = 0644, 28801da177e4SLinus Torvalds .proc_handler = &proc_dointvec_ms_jiffies, 28811da177e4SLinus Torvalds .strategy = &sysctl_ms_jiffies, 28821da177e4SLinus Torvalds }, 28831da177e4SLinus Torvalds { 28841da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_GC_TIMEOUT, 28851da177e4SLinus Torvalds .procname = "gc_timeout", 28861da177e4SLinus Torvalds .data = &ip_rt_gc_timeout, 28871da177e4SLinus Torvalds .maxlen = sizeof(int), 28881da177e4SLinus Torvalds .mode = 0644, 28891da177e4SLinus Torvalds .proc_handler = &proc_dointvec_jiffies, 28901da177e4SLinus Torvalds .strategy = &sysctl_jiffies, 28911da177e4SLinus Torvalds }, 28921da177e4SLinus Torvalds { 28931da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_GC_INTERVAL, 28941da177e4SLinus Torvalds .procname = "gc_interval", 28951da177e4SLinus Torvalds .data = &ip_rt_gc_interval, 28961da177e4SLinus Torvalds .maxlen = sizeof(int), 28971da177e4SLinus Torvalds .mode = 0644, 28981da177e4SLinus Torvalds .proc_handler = &proc_dointvec_jiffies, 28991da177e4SLinus Torvalds .strategy = &sysctl_jiffies, 29001da177e4SLinus Torvalds }, 29011da177e4SLinus Torvalds { 29021da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_REDIRECT_LOAD, 29031da177e4SLinus Torvalds .procname = "redirect_load", 29041da177e4SLinus Torvalds .data = &ip_rt_redirect_load, 29051da177e4SLinus Torvalds .maxlen = sizeof(int), 29061da177e4SLinus Torvalds .mode = 0644, 29071da177e4SLinus Torvalds .proc_handler = &proc_dointvec, 29081da177e4SLinus Torvalds }, 29091da177e4SLinus Torvalds { 29101da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_REDIRECT_NUMBER, 29111da177e4SLinus Torvalds .procname = "redirect_number", 29121da177e4SLinus Torvalds .data = &ip_rt_redirect_number, 29131da177e4SLinus Torvalds .maxlen = sizeof(int), 29141da177e4SLinus Torvalds .mode = 0644, 29151da177e4SLinus Torvalds .proc_handler = &proc_dointvec, 29161da177e4SLinus Torvalds }, 29171da177e4SLinus Torvalds { 29181da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_REDIRECT_SILENCE, 29191da177e4SLinus Torvalds .procname = "redirect_silence", 29201da177e4SLinus Torvalds .data = &ip_rt_redirect_silence, 29211da177e4SLinus Torvalds .maxlen = sizeof(int), 29221da177e4SLinus Torvalds .mode = 0644, 29231da177e4SLinus Torvalds .proc_handler = &proc_dointvec, 29241da177e4SLinus Torvalds }, 29251da177e4SLinus Torvalds { 29261da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_ERROR_COST, 29271da177e4SLinus Torvalds .procname = "error_cost", 29281da177e4SLinus Torvalds .data = &ip_rt_error_cost, 29291da177e4SLinus Torvalds .maxlen = sizeof(int), 29301da177e4SLinus Torvalds .mode = 0644, 29311da177e4SLinus Torvalds .proc_handler = &proc_dointvec, 29321da177e4SLinus Torvalds }, 29331da177e4SLinus Torvalds { 29341da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_ERROR_BURST, 29351da177e4SLinus Torvalds .procname = "error_burst", 29361da177e4SLinus Torvalds .data = &ip_rt_error_burst, 29371da177e4SLinus Torvalds .maxlen = sizeof(int), 29381da177e4SLinus Torvalds .mode = 0644, 29391da177e4SLinus Torvalds .proc_handler = &proc_dointvec, 29401da177e4SLinus Torvalds }, 29411da177e4SLinus Torvalds { 29421da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_GC_ELASTICITY, 29431da177e4SLinus Torvalds .procname = "gc_elasticity", 29441da177e4SLinus Torvalds .data = &ip_rt_gc_elasticity, 29451da177e4SLinus Torvalds .maxlen = sizeof(int), 29461da177e4SLinus Torvalds .mode = 0644, 29471da177e4SLinus Torvalds .proc_handler = &proc_dointvec, 29481da177e4SLinus Torvalds }, 29491da177e4SLinus Torvalds { 29501da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_MTU_EXPIRES, 29511da177e4SLinus Torvalds .procname = "mtu_expires", 29521da177e4SLinus Torvalds .data = &ip_rt_mtu_expires, 29531da177e4SLinus Torvalds .maxlen = sizeof(int), 29541da177e4SLinus Torvalds .mode = 0644, 29551da177e4SLinus Torvalds .proc_handler = &proc_dointvec_jiffies, 29561da177e4SLinus Torvalds .strategy = &sysctl_jiffies, 29571da177e4SLinus Torvalds }, 29581da177e4SLinus Torvalds { 29591da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_MIN_PMTU, 29601da177e4SLinus Torvalds .procname = "min_pmtu", 29611da177e4SLinus Torvalds .data = &ip_rt_min_pmtu, 29621da177e4SLinus Torvalds .maxlen = sizeof(int), 29631da177e4SLinus Torvalds .mode = 0644, 29641da177e4SLinus Torvalds .proc_handler = &proc_dointvec, 29651da177e4SLinus Torvalds }, 29661da177e4SLinus Torvalds { 29671da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_MIN_ADVMSS, 29681da177e4SLinus Torvalds .procname = "min_adv_mss", 29691da177e4SLinus Torvalds .data = &ip_rt_min_advmss, 29701da177e4SLinus Torvalds .maxlen = sizeof(int), 29711da177e4SLinus Torvalds .mode = 0644, 29721da177e4SLinus Torvalds .proc_handler = &proc_dointvec, 29731da177e4SLinus Torvalds }, 29741da177e4SLinus Torvalds { 29751da177e4SLinus Torvalds .ctl_name = NET_IPV4_ROUTE_SECRET_INTERVAL, 29761da177e4SLinus Torvalds .procname = "secret_interval", 29771da177e4SLinus Torvalds .data = &ip_rt_secret_interval, 29781da177e4SLinus Torvalds .maxlen = sizeof(int), 29791da177e4SLinus Torvalds .mode = 0644, 29801da177e4SLinus Torvalds .proc_handler = &proc_dointvec_jiffies, 29811da177e4SLinus Torvalds .strategy = &sysctl_jiffies, 29821da177e4SLinus Torvalds }, 29831da177e4SLinus Torvalds { .ctl_name = 0 } 29841da177e4SLinus Torvalds }; 29851da177e4SLinus Torvalds #endif 29861da177e4SLinus Torvalds 29871da177e4SLinus Torvalds #ifdef CONFIG_NET_CLS_ROUTE 29888dbde28dSEric Dumazet struct ip_rt_acct *ip_rt_acct __read_mostly; 29891da177e4SLinus Torvalds #endif /* CONFIG_NET_CLS_ROUTE */ 29901da177e4SLinus Torvalds 29911da177e4SLinus Torvalds static __initdata unsigned long rhash_entries; 29921da177e4SLinus Torvalds static int __init set_rhash_entries(char *str) 29931da177e4SLinus Torvalds { 29941da177e4SLinus Torvalds if (!str) 29951da177e4SLinus Torvalds return 0; 29961da177e4SLinus Torvalds rhash_entries = simple_strtoul(str, &str, 0); 29971da177e4SLinus Torvalds return 1; 29981da177e4SLinus Torvalds } 29991da177e4SLinus Torvalds __setup("rhash_entries=", set_rhash_entries); 30001da177e4SLinus Torvalds 30011da177e4SLinus Torvalds int __init ip_rt_init(void) 30021da177e4SLinus Torvalds { 3003424c4b70SEric Dumazet int rc = 0; 30041da177e4SLinus Torvalds 30051da177e4SLinus Torvalds rt_hash_rnd = (int) ((num_physpages ^ (num_physpages>>8)) ^ 30061da177e4SLinus Torvalds (jiffies ^ (jiffies >> 7))); 30071da177e4SLinus Torvalds 30081da177e4SLinus Torvalds #ifdef CONFIG_NET_CLS_ROUTE 30098dbde28dSEric Dumazet ip_rt_acct = __alloc_percpu(256 * sizeof(struct ip_rt_acct)); 30101da177e4SLinus Torvalds if (!ip_rt_acct) 30111da177e4SLinus Torvalds panic("IP: failed to allocate ip_rt_acct\n"); 30121da177e4SLinus Torvalds #endif 30131da177e4SLinus Torvalds 3014e5d679f3SAlexey Dobriyan ipv4_dst_ops.kmem_cachep = 3015e5d679f3SAlexey Dobriyan kmem_cache_create("ip_dst_cache", sizeof(struct rtable), 0, 301620c2df83SPaul Mundt SLAB_HWCACHE_ALIGN|SLAB_PANIC, NULL); 30171da177e4SLinus Torvalds 301814e50e57SDavid S. Miller ipv4_dst_blackhole_ops.kmem_cachep = ipv4_dst_ops.kmem_cachep; 301914e50e57SDavid S. Miller 30201da177e4SLinus Torvalds rt_hash_table = (struct rt_hash_bucket *) 3021424c4b70SEric Dumazet alloc_large_system_hash("IP route cache", 3022424c4b70SEric Dumazet sizeof(struct rt_hash_bucket), 3023424c4b70SEric Dumazet rhash_entries, 3024424c4b70SEric Dumazet (num_physpages >= 128 * 1024) ? 302518955cfcSMike Stroyan 15 : 17, 30268d1502deSKirill Korotaev 0, 3027424c4b70SEric Dumazet &rt_hash_log, 3028424c4b70SEric Dumazet &rt_hash_mask, 3029424c4b70SEric Dumazet 0); 303022c047ccSEric Dumazet memset(rt_hash_table, 0, (rt_hash_mask + 1) * sizeof(struct rt_hash_bucket)); 303122c047ccSEric Dumazet rt_hash_lock_init(); 30321da177e4SLinus Torvalds 30331da177e4SLinus Torvalds ipv4_dst_ops.gc_thresh = (rt_hash_mask + 1); 30341da177e4SLinus Torvalds ip_rt_max_size = (rt_hash_mask + 1) * 16; 30351da177e4SLinus Torvalds 30361da177e4SLinus Torvalds devinet_init(); 30371da177e4SLinus Torvalds ip_fib_init(); 30381da177e4SLinus Torvalds 3039b24b8a24SPavel Emelyanov setup_timer(&rt_flush_timer, rt_run_flush, 0); 3040b24b8a24SPavel Emelyanov setup_timer(&rt_secret_timer, rt_secret_rebuild, 0); 30411da177e4SLinus Torvalds 30421da177e4SLinus Torvalds /* All the timers, started at system startup tend 30431da177e4SLinus Torvalds to synchronize. Perturb it a bit. 30441da177e4SLinus Torvalds */ 304539c90eceSEric Dumazet schedule_delayed_work(&expires_work, 304639c90eceSEric Dumazet net_random() % ip_rt_gc_interval + ip_rt_gc_interval); 30471da177e4SLinus Torvalds 30481da177e4SLinus Torvalds rt_secret_timer.expires = jiffies + net_random() % ip_rt_secret_interval + 30491da177e4SLinus Torvalds ip_rt_secret_interval; 30501da177e4SLinus Torvalds add_timer(&rt_secret_timer); 30511da177e4SLinus Torvalds 3052107f1634SPavel Emelyanov if (ip_rt_proc_init(&init_net)) 3053107f1634SPavel Emelyanov printk(KERN_ERR "Unable to create route proc files\n"); 30541da177e4SLinus Torvalds #ifdef CONFIG_XFRM 30551da177e4SLinus Torvalds xfrm_init(); 30561da177e4SLinus Torvalds xfrm4_init(); 30571da177e4SLinus Torvalds #endif 305863f3444fSThomas Graf rtnl_register(PF_INET, RTM_GETROUTE, inet_rtm_getroute, NULL); 305963f3444fSThomas Graf 30601da177e4SLinus Torvalds return rc; 30611da177e4SLinus Torvalds } 30621da177e4SLinus Torvalds 30631da177e4SLinus Torvalds EXPORT_SYMBOL(__ip_select_ident); 30641da177e4SLinus Torvalds EXPORT_SYMBOL(ip_route_input); 30651da177e4SLinus Torvalds EXPORT_SYMBOL(ip_route_output_key); 3066