]> git.proxmox.com Git - mirror_ubuntu-hirsute-kernel.git/blame - net/ipv4/fib_frontend.c
net: don't return invalid table id error when we fall back to PF_UNSPEC
[mirror_ubuntu-hirsute-kernel.git] / net / ipv4 / fib_frontend.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
1da177e4
LT
2/*
3 * INET An implementation of the TCP/IP protocol suite for the LINUX
4 * operating system. INET is implemented using the BSD Socket
5 * interface as the means of communication with the user level.
6 *
7 * IPv4 Forwarding Information Base: FIB frontend.
8 *
1da177e4 9 * Authors: Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
1da177e4
LT
10 */
11
1da177e4 12#include <linux/module.h>
7c0f6ba6 13#include <linux/uaccess.h>
1da177e4 14#include <linux/bitops.h>
4fc268d2 15#include <linux/capability.h>
1da177e4
LT
16#include <linux/types.h>
17#include <linux/kernel.h>
1da177e4
LT
18#include <linux/mm.h>
19#include <linux/string.h>
20#include <linux/socket.h>
21#include <linux/sockios.h>
22#include <linux/errno.h>
23#include <linux/in.h>
24#include <linux/inet.h>
14c85021 25#include <linux/inetdevice.h>
1da177e4 26#include <linux/netdevice.h>
1823730f 27#include <linux/if_addr.h>
1da177e4
LT
28#include <linux/if_arp.h>
29#include <linux/skbuff.h>
7a9bc9b8 30#include <linux/cache.h>
1da177e4 31#include <linux/init.h>
1af5a8c4 32#include <linux/list.h>
5a0e3ad6 33#include <linux/slab.h>
1da177e4
LT
34
35#include <net/ip.h>
36#include <net/protocol.h>
37#include <net/route.h>
38#include <net/tcp.h>
39#include <net/sock.h>
1da177e4
LT
40#include <net/arp.h>
41#include <net/ip_fib.h>
5481d73f 42#include <net/nexthop.h>
63f3444f 43#include <net/rtnetlink.h>
990078af 44#include <net/xfrm.h>
385add90 45#include <net/l3mdev.h>
9ed59592 46#include <net/lwtunnel.h>
f6d3c192 47#include <trace/events/fib.h>
1da177e4 48
1da177e4
LT
49#ifndef CONFIG_IP_MULTIPLE_TABLES
50
7b1a74fd 51static int __net_init fib4_rules_init(struct net *net)
c3e9a353 52{
93456b6d
DL
53 struct fib_table *local_table, *main_table;
54
0ddcf43d 55 main_table = fib_trie_table(RT_TABLE_MAIN, NULL);
51456b29 56 if (!main_table)
61f0d861 57 return -ENOMEM;
dbb50165 58
0ddcf43d 59 local_table = fib_trie_table(RT_TABLE_LOCAL, main_table);
51456b29 60 if (!local_table)
61f0d861 61 goto fail;
0ddcf43d 62
93456b6d 63 hlist_add_head_rcu(&local_table->tb_hlist,
e4aef8ae 64 &net->ipv4.fib_table_hash[TABLE_LOCAL_INDEX]);
93456b6d 65 hlist_add_head_rcu(&main_table->tb_hlist,
e4aef8ae 66 &net->ipv4.fib_table_hash[TABLE_MAIN_INDEX]);
dbb50165
DL
67 return 0;
68
69fail:
61f0d861 70 fib_free_table(main_table);
dbb50165 71 return -ENOMEM;
c3e9a353 72}
1af5a8c4 73#else
1da177e4 74
8ad4942c 75struct fib_table *fib_new_table(struct net *net, u32 id)
1da177e4 76{
0ddcf43d 77 struct fib_table *tb, *alias = NULL;
1af5a8c4 78 unsigned int h;
1da177e4 79
1af5a8c4
PM
80 if (id == 0)
81 id = RT_TABLE_MAIN;
8ad4942c 82 tb = fib_get_table(net, id);
1af5a8c4
PM
83 if (tb)
84 return tb;
7f9b8052 85
5350d54f 86 if (id == RT_TABLE_LOCAL && !net->ipv4.fib_has_custom_rules)
0ddcf43d
AD
87 alias = fib_new_table(net, RT_TABLE_MAIN);
88
89 tb = fib_trie_table(id, alias);
1da177e4
LT
90 if (!tb)
91 return NULL;
f4530fa5
DM
92
93 switch (id) {
f4530fa5 94 case RT_TABLE_MAIN:
a7e53531 95 rcu_assign_pointer(net->ipv4.fib_main, tb);
f4530fa5 96 break;
f4530fa5 97 case RT_TABLE_DEFAULT:
a7e53531 98 rcu_assign_pointer(net->ipv4.fib_default, tb);
f4530fa5 99 break;
f4530fa5
DM
100 default:
101 break;
102 }
103
1af5a8c4 104 h = id & (FIB_TABLE_HASHSZ - 1);
e4aef8ae 105 hlist_add_head_rcu(&tb->tb_hlist, &net->ipv4.fib_table_hash[h]);
1da177e4
LT
106 return tb;
107}
b3b4663c 108EXPORT_SYMBOL_GPL(fib_new_table);
1da177e4 109
345e9b54 110/* caller must hold either rtnl or rcu read lock */
8ad4942c 111struct fib_table *fib_get_table(struct net *net, u32 id)
1af5a8c4
PM
112{
113 struct fib_table *tb;
e4aef8ae 114 struct hlist_head *head;
1af5a8c4 115 unsigned int h;
1da177e4 116
1af5a8c4
PM
117 if (id == 0)
118 id = RT_TABLE_MAIN;
119 h = id & (FIB_TABLE_HASHSZ - 1);
e4aef8ae 120
e4aef8ae 121 head = &net->ipv4.fib_table_hash[h];
7fd69b0b
JFG
122 hlist_for_each_entry_rcu(tb, head, tb_hlist,
123 lockdep_rtnl_is_held()) {
345e9b54 124 if (tb->tb_id == id)
1af5a8c4 125 return tb;
1af5a8c4 126 }
1af5a8c4
PM
127 return NULL;
128}
1da177e4
LT
129#endif /* CONFIG_IP_MULTIPLE_TABLES */
130
0ddcf43d
AD
131static void fib_replace_table(struct net *net, struct fib_table *old,
132 struct fib_table *new)
133{
134#ifdef CONFIG_IP_MULTIPLE_TABLES
135 switch (new->tb_id) {
0ddcf43d
AD
136 case RT_TABLE_MAIN:
137 rcu_assign_pointer(net->ipv4.fib_main, new);
138 break;
139 case RT_TABLE_DEFAULT:
140 rcu_assign_pointer(net->ipv4.fib_default, new);
141 break;
142 default:
143 break;
144 }
145
146#endif
147 /* replace the old table in the hlist */
148 hlist_replace_rcu(&old->tb_hlist, &new->tb_hlist);
149}
150
151int fib_unmerge(struct net *net)
152{
3b709334 153 struct fib_table *old, *new, *main_table;
0ddcf43d 154
3c9e9f73 155 /* attempt to fetch local table if it has been allocated */
0ddcf43d 156 old = fib_get_table(net, RT_TABLE_LOCAL);
3c9e9f73
AD
157 if (!old)
158 return 0;
0ddcf43d 159
3c9e9f73 160 new = fib_trie_unmerge(old);
0ddcf43d
AD
161 if (!new)
162 return -ENOMEM;
163
3b709334
AD
164 /* table is already unmerged */
165 if (new == old)
166 return 0;
167
0ddcf43d 168 /* replace merged table with clean table */
3b709334
AD
169 fib_replace_table(net, old, new);
170 fib_free_table(old);
171
172 /* attempt to fetch main table if it has been allocated */
173 main_table = fib_get_table(net, RT_TABLE_MAIN);
174 if (!main_table)
175 return 0;
176
177 /* flush local entries from main table */
178 fib_table_flush_external(main_table);
0ddcf43d
AD
179
180 return 0;
181}
182
9bd83667 183void fib_flush(struct net *net)
1da177e4
LT
184{
185 int flushed = 0;
1af5a8c4 186 unsigned int h;
1da177e4 187
1af5a8c4 188 for (h = 0; h < FIB_TABLE_HASHSZ; h++) {
a7e53531
AD
189 struct hlist_head *head = &net->ipv4.fib_table_hash[h];
190 struct hlist_node *tmp;
191 struct fib_table *tb;
192
193 hlist_for_each_entry_safe(tb, tmp, head, tb_hlist)
f97f4dd8 194 flushed += fib_table_flush(net, tb, false);
1da177e4 195 }
1da177e4
LT
196
197 if (flushed)
4ccfe6d4 198 rt_cache_flush(net);
1da177e4
LT
199}
200
05538116
LAT
201/*
202 * Find address type as if only "dev" was present in the system. If
203 * on_dev is NULL then all interfaces are taken into consideration.
204 */
95c96174
ED
205static inline unsigned int __inet_dev_addr_type(struct net *net,
206 const struct net_device *dev,
9b8ff518 207 __be32 addr, u32 tb_id)
1da177e4 208{
9ade2286 209 struct flowi4 fl4 = { .daddr = addr };
1da177e4 210 struct fib_result res;
95c96174 211 unsigned int ret = RTN_BROADCAST;
15be405e 212 struct fib_table *table;
1da177e4 213
1e637c74 214 if (ipv4_is_zeronet(addr) || ipv4_is_lbcast(addr))
1da177e4 215 return RTN_BROADCAST;
f97c1e0c 216 if (ipv4_is_multicast(addr))
1da177e4
LT
217 return RTN_MULTICAST;
218
345e9b54
AD
219 rcu_read_lock();
220
15be405e
DA
221 table = fib_get_table(net, tb_id);
222 if (table) {
1da177e4 223 ret = RTN_UNICAST;
15be405e 224 if (!fib_table_lookup(table, &fl4, &res, FIB_LOOKUP_NOREF)) {
dcb1ecb5 225 struct fib_nh_common *nhc = fib_info_nhc(res.fi, 0);
5481d73f 226
dcb1ecb5 227 if (!dev || dev == nhc->nhc_dev)
05538116 228 ret = res.type;
1da177e4
LT
229 }
230 }
345e9b54
AD
231
232 rcu_read_unlock();
1da177e4
LT
233 return ret;
234}
235
9b8ff518 236unsigned int inet_addr_type_table(struct net *net, __be32 addr, u32 tb_id)
15be405e
DA
237{
238 return __inet_dev_addr_type(net, NULL, addr, tb_id);
239}
240EXPORT_SYMBOL(inet_addr_type_table);
241
6b175b26 242unsigned int inet_addr_type(struct net *net, __be32 addr)
05538116 243{
15be405e 244 return __inet_dev_addr_type(net, NULL, addr, RT_TABLE_LOCAL);
05538116 245}
4bc2f18b 246EXPORT_SYMBOL(inet_addr_type);
05538116 247
6b175b26
EB
248unsigned int inet_dev_addr_type(struct net *net, const struct net_device *dev,
249 __be32 addr)
05538116 250{
3236b004 251 u32 rt_table = l3mdev_fib_table(dev) ? : RT_TABLE_LOCAL;
15be405e
DA
252
253 return __inet_dev_addr_type(net, dev, addr, rt_table);
05538116 254}
4bc2f18b 255EXPORT_SYMBOL(inet_dev_addr_type);
05538116 256
30bbaa19
DA
257/* inet_addr_type with dev == NULL but using the table from a dev
258 * if one is associated
259 */
260unsigned int inet_addr_type_dev_table(struct net *net,
261 const struct net_device *dev,
262 __be32 addr)
263{
3236b004 264 u32 rt_table = l3mdev_fib_table(dev) ? : RT_TABLE_LOCAL;
30bbaa19
DA
265
266 return __inet_dev_addr_type(net, NULL, addr, rt_table);
267}
268EXPORT_SYMBOL(inet_addr_type_dev_table);
269
35ebf65e
DM
270__be32 fib_compute_spec_dst(struct sk_buff *skb)
271{
272 struct net_device *dev = skb->dev;
273 struct in_device *in_dev;
274 struct fib_result res;
a207a4b2 275 struct rtable *rt;
35ebf65e 276 struct net *net;
a207a4b2 277 int scope;
35ebf65e 278
a207a4b2 279 rt = skb_rtable(skb);
0cc535a2
JA
280 if ((rt->rt_flags & (RTCF_BROADCAST | RTCF_MULTICAST | RTCF_LOCAL)) ==
281 RTCF_LOCAL)
35ebf65e
DM
282 return ip_hdr(skb)->daddr;
283
284 in_dev = __in_dev_get_rcu(dev);
35ebf65e
DM
285
286 net = dev_net(dev);
a207a4b2
DM
287
288 scope = RT_SCOPE_UNIVERSE;
289 if (!ipv4_is_zeronet(ip_hdr(skb)->saddr)) {
9fc12023 290 bool vmark = in_dev && IN_DEV_SRC_VMARK(in_dev);
4cfc86f3
LR
291 struct flowi4 fl4 = {
292 .flowi4_iif = LOOPBACK_IFINDEX,
e7372197 293 .flowi4_oif = l3mdev_master_ifindex_rcu(dev),
4cfc86f3
LR
294 .daddr = ip_hdr(skb)->saddr,
295 .flowi4_tos = RT_TOS(ip_hdr(skb)->tos),
296 .flowi4_scope = scope,
9fc12023 297 .flowi4_mark = vmark ? skb->mark : 0,
4cfc86f3 298 };
0eeb075f 299 if (!fib_lookup(net, &fl4, &res, 0))
eba618ab 300 return fib_result_prefsrc(net, &res);
a207a4b2
DM
301 } else {
302 scope = RT_SCOPE_LINK;
303 }
304
305 return inet_select_addr(dev, ip_hdr(skb)->saddr, scope);
35ebf65e
DM
306}
307
78f2756c
DA
308bool fib_info_nh_uses_dev(struct fib_info *fi, const struct net_device *dev)
309{
310 bool dev_match = false;
075e264f 311#ifdef CONFIG_IP_ROUTE_MULTIPATH
78f2756c
DA
312 int ret;
313
5481d73f 314 for (ret = 0; ret < fib_info_num_path(fi); ret++) {
dcb1ecb5 315 const struct fib_nh_common *nhc = fib_info_nhc(fi, ret);
78f2756c 316
dcb1ecb5 317 if (nhc->nhc_dev == dev) {
78f2756c
DA
318 dev_match = true;
319 break;
dcb1ecb5 320 } else if (l3mdev_master_ifindex_rcu(nhc->nhc_dev) == dev->ifindex) {
78f2756c
DA
321 dev_match = true;
322 break;
323 }
324 }
325#else
dcb1ecb5 326 if (fib_info_nhc(fi, 0)->nhc_dev == dev)
78f2756c
DA
327 dev_match = true;
328#endif
329
330 return dev_match;
331}
332EXPORT_SYMBOL_GPL(fib_info_nh_uses_dev);
333
1da177e4 334/* Given (packet source, input interface) and optional (dst, oif, tos):
6a31d2a9
ED
335 * - (main) check, that source is valid i.e. not broadcast or our local
336 * address.
337 * - figure out what "logical" interface this packet arrived
338 * and calculate "specific destination" address.
339 * - check, that packet arrived from expected physical interface.
ebc0ffae 340 * called with rcu_read_lock()
1da177e4 341 */
7a9bc9b8
DM
342static int __fib_validate_source(struct sk_buff *skb, __be32 src, __be32 dst,
343 u8 tos, int oif, struct net_device *dev,
344 int rpf, struct in_device *idev, u32 *itag)
1da177e4 345{
5a847a6e
DA
346 struct net *net = dev_net(dev);
347 struct flow_keys flkeys;
1dced6a8 348 int ret, no_addr;
1da177e4 349 struct fib_result res;
9e56e380 350 struct flowi4 fl4;
9e56e380 351 bool dev_match;
1da177e4 352
9ade2286 353 fl4.flowi4_oif = 0;
385add90 354 fl4.flowi4_iif = l3mdev_master_ifindex_rcu(dev);
cd2fbe1b
DA
355 if (!fl4.flowi4_iif)
356 fl4.flowi4_iif = oif ? : LOOPBACK_IFINDEX;
9ade2286
DM
357 fl4.daddr = src;
358 fl4.saddr = dst;
359 fl4.flowi4_tos = tos;
360 fl4.flowi4_scope = RT_SCOPE_UNIVERSE;
1b7179d3 361 fl4.flowi4_tun_key.tun_id = 0;
b84f7878 362 fl4.flowi4_flags = 0;
8bcfd092 363 fl4.flowi4_uid = sock_net_uid(net, NULL);
cc7e17ea 364
9e56e380 365 no_addr = idev->ifa_list == NULL;
990078af 366
9e56e380 367 fl4.flowi4_mark = IN_DEV_SRC_VMARK(idev) ? skb->mark : 0;
5a847a6e
DA
368 if (!fib4_rules_early_flow_dissect(net, skb, &fl4, &flkeys)) {
369 fl4.flowi4_proto = 0;
370 fl4.fl4_sport = 0;
371 fl4.fl4_dport = 0;
372 }
1da177e4 373
0eeb075f 374 if (fib_lookup(net, &fl4, &res, 0))
1da177e4 375 goto last_resort;
1dced6a8
SB
376 if (res.type != RTN_UNICAST &&
377 (res.type != RTN_LOCAL || !IN_DEV_ACCEPT_LOCAL(idev)))
378 goto e_inval;
1da177e4 379 fib_combine_itag(itag, &res);
6f86b325 380
78f2756c 381 dev_match = fib_info_nh_uses_dev(res.fi, dev);
66f82095
CW
382 /* This is not common, loopback packets retain skb_dst so normally they
383 * would not even hit this slow path.
384 */
385 dev_match = dev_match || (res.type == RTN_LOCAL &&
386 dev == net->loopback_dev);
6f86b325 387 if (dev_match) {
eba618ab 388 ret = FIB_RES_NHC(res)->nhc_scope >= RT_SCOPE_HOST;
1da177e4
LT
389 return ret;
390 }
1da177e4
LT
391 if (no_addr)
392 goto last_resort;
c1cf8422 393 if (rpf == 1)
b5f7e755 394 goto e_rpf;
9ade2286 395 fl4.flowi4_oif = dev->ifindex;
1da177e4
LT
396
397 ret = 0;
0eeb075f 398 if (fib_lookup(net, &fl4, &res, FIB_LOOKUP_IGNORE_LINKSTATE) == 0) {
41347dcd 399 if (res.type == RTN_UNICAST)
eba618ab 400 ret = FIB_RES_NHC(res)->nhc_scope >= RT_SCOPE_HOST;
1da177e4
LT
401 }
402 return ret;
403
404last_resort:
405 if (rpf)
b5f7e755 406 goto e_rpf;
1da177e4
LT
407 *itag = 0;
408 return 0;
409
1da177e4
LT
410e_inval:
411 return -EINVAL;
b5f7e755
ED
412e_rpf:
413 return -EXDEV;
1da177e4
LT
414}
415
7a9bc9b8
DM
416/* Ignore rp_filter for packets protected by IPsec. */
417int fib_validate_source(struct sk_buff *skb, __be32 src, __be32 dst,
418 u8 tos, int oif, struct net_device *dev,
419 struct in_device *idev, u32 *itag)
420{
421 int r = secpath_exists(skb) ? 0 : IN_DEV_RPFILTER(idev);
6e617de8 422 struct net *net = dev_net(dev);
7a9bc9b8 423
6e617de8 424 if (!r && !fib_num_tclassid_users(net) &&
e81da0e1 425 (dev->ifindex != oif || !IN_DEV_TX_REDIRECTS(idev))) {
6e617de8
PA
426 if (IN_DEV_ACCEPT_LOCAL(idev))
427 goto ok;
032a4802
PA
428 /* with custom local routes in place, checking local addresses
429 * only will be too optimistic, with custom rules, checking
430 * local addresses only can be too strict, e.g. due to vrf
6e617de8 431 */
032a4802
PA
432 if (net->ipv4.fib_has_custom_local_routes ||
433 fib4_has_custom_rules(net))
6e617de8
PA
434 goto full_check;
435 if (inet_lookup_ifaddr_rcu(net, src))
436 return -EINVAL;
437
438ok:
7a9bc9b8
DM
439 *itag = 0;
440 return 0;
441 }
6e617de8
PA
442
443full_check:
7a9bc9b8
DM
444 return __fib_validate_source(skb, src, dst, tos, oif, dev, r, idev, itag);
445}
446
81f7bf6c 447static inline __be32 sk_extract_addr(struct sockaddr *addr)
4e902c57
TG
448{
449 return ((struct sockaddr_in *) addr)->sin_addr.s_addr;
450}
451
452static int put_rtax(struct nlattr *mx, int len, int type, u32 value)
453{
454 struct nlattr *nla;
455
456 nla = (struct nlattr *) ((char *) mx + len);
457 nla->nla_type = type;
458 nla->nla_len = nla_attr_size(4);
459 *(u32 *) nla_data(nla) = value;
460
461 return len + nla_total_size(4);
462}
463
4b5d47d4 464static int rtentry_to_fib_config(struct net *net, int cmd, struct rtentry *rt,
4e902c57
TG
465 struct fib_config *cfg)
466{
6d85c10a 467 __be32 addr;
4e902c57
TG
468 int plen;
469
470 memset(cfg, 0, sizeof(*cfg));
4b5d47d4 471 cfg->fc_nlinfo.nl_net = net;
4e902c57
TG
472
473 if (rt->rt_dst.sa_family != AF_INET)
474 return -EAFNOSUPPORT;
475
476 /*
477 * Check mask for validity:
478 * a) it must be contiguous.
479 * b) destination must have all host bits clear.
480 * c) if application forgot to set correct family (AF_INET),
481 * reject request unless it is absolutely clear i.e.
482 * both family and mask are zero.
483 */
484 plen = 32;
485 addr = sk_extract_addr(&rt->rt_dst);
486 if (!(rt->rt_flags & RTF_HOST)) {
81f7bf6c 487 __be32 mask = sk_extract_addr(&rt->rt_genmask);
4e902c57
TG
488
489 if (rt->rt_genmask.sa_family != AF_INET) {
490 if (mask || rt->rt_genmask.sa_family)
491 return -EAFNOSUPPORT;
492 }
493
494 if (bad_mask(mask, addr))
495 return -EINVAL;
496
497 plen = inet_mask_len(mask);
498 }
499
500 cfg->fc_dst_len = plen;
501 cfg->fc_dst = addr;
502
503 if (cmd != SIOCDELRT) {
504 cfg->fc_nlflags = NLM_F_CREATE;
505 cfg->fc_protocol = RTPROT_BOOT;
506 }
507
508 if (rt->rt_metric)
509 cfg->fc_priority = rt->rt_metric - 1;
510
511 if (rt->rt_flags & RTF_REJECT) {
512 cfg->fc_scope = RT_SCOPE_HOST;
513 cfg->fc_type = RTN_UNREACHABLE;
514 return 0;
515 }
516
517 cfg->fc_scope = RT_SCOPE_NOWHERE;
518 cfg->fc_type = RTN_UNICAST;
519
520 if (rt->rt_dev) {
521 char *colon;
522 struct net_device *dev;
523 char devname[IFNAMSIZ];
524
525 if (copy_from_user(devname, rt->rt_dev, IFNAMSIZ-1))
526 return -EFAULT;
527
528 devname[IFNAMSIZ-1] = 0;
529 colon = strchr(devname, ':');
530 if (colon)
531 *colon = 0;
4b5d47d4 532 dev = __dev_get_by_name(net, devname);
4e902c57
TG
533 if (!dev)
534 return -ENODEV;
535 cfg->fc_oif = dev->ifindex;
5a56a0b3 536 cfg->fc_table = l3mdev_fib_table(dev);
4e902c57 537 if (colon) {
cd5a411d
FW
538 const struct in_ifaddr *ifa;
539 struct in_device *in_dev;
540
541 in_dev = __in_dev_get_rtnl(dev);
4e902c57
TG
542 if (!in_dev)
543 return -ENODEV;
cd5a411d 544
4e902c57 545 *colon = ':';
cd5a411d
FW
546
547 rcu_read_lock();
548 in_dev_for_each_ifa_rcu(ifa, in_dev) {
4e902c57
TG
549 if (strcmp(ifa->ifa_label, devname) == 0)
550 break;
cd5a411d
FW
551 }
552 rcu_read_unlock();
553
51456b29 554 if (!ifa)
4e902c57
TG
555 return -ENODEV;
556 cfg->fc_prefsrc = ifa->ifa_local;
557 }
558 }
559
560 addr = sk_extract_addr(&rt->rt_gateway);
561 if (rt->rt_gateway.sa_family == AF_INET && addr) {
30bbaa19
DA
562 unsigned int addr_type;
563
f35b794b
DA
564 cfg->fc_gw4 = addr;
565 cfg->fc_gw_family = AF_INET;
30bbaa19 566 addr_type = inet_addr_type_table(net, addr, cfg->fc_table);
4e902c57 567 if (rt->rt_flags & RTF_GATEWAY &&
30bbaa19 568 addr_type == RTN_UNICAST)
4e902c57
TG
569 cfg->fc_scope = RT_SCOPE_UNIVERSE;
570 }
571
572 if (cmd == SIOCDELRT)
573 return 0;
574
f35b794b 575 if (rt->rt_flags & RTF_GATEWAY && !cfg->fc_gw_family)
4e902c57
TG
576 return -EINVAL;
577
578 if (cfg->fc_scope == RT_SCOPE_NOWHERE)
579 cfg->fc_scope = RT_SCOPE_LINK;
580
581 if (rt->rt_flags & (RTF_MTU | RTF_WINDOW | RTF_IRTT)) {
582 struct nlattr *mx;
583 int len = 0;
584
6396bb22 585 mx = kcalloc(3, nla_total_size(4), GFP_KERNEL);
51456b29 586 if (!mx)
4e902c57
TG
587 return -ENOMEM;
588
589 if (rt->rt_flags & RTF_MTU)
590 len = put_rtax(mx, len, RTAX_ADVMSS, rt->rt_mtu - 40);
591
592 if (rt->rt_flags & RTF_WINDOW)
593 len = put_rtax(mx, len, RTAX_WINDOW, rt->rt_window);
594
595 if (rt->rt_flags & RTF_IRTT)
596 len = put_rtax(mx, len, RTAX_RTT, rt->rt_irtt << 3);
597
598 cfg->fc_mx = mx;
599 cfg->fc_mx_len = len;
600 }
601
602 return 0;
603}
604
1da177e4 605/*
6a31d2a9
ED
606 * Handle IP routing ioctl calls.
607 * These are used to manipulate the routing tables
1da177e4 608 */
ca25c300 609int ip_rt_ioctl(struct net *net, unsigned int cmd, struct rtentry *rt)
1da177e4 610{
4e902c57 611 struct fib_config cfg;
1da177e4 612 int err;
1da177e4
LT
613
614 switch (cmd) {
615 case SIOCADDRT: /* Add a route */
616 case SIOCDELRT: /* Delete a route */
52e804c6 617 if (!ns_capable(net->user_ns, CAP_NET_ADMIN))
1da177e4 618 return -EPERM;
4e902c57 619
1da177e4 620 rtnl_lock();
ca25c300 621 err = rtentry_to_fib_config(net, cmd, rt, &cfg);
1da177e4 622 if (err == 0) {
4e902c57
TG
623 struct fib_table *tb;
624
1da177e4 625 if (cmd == SIOCDELRT) {
1bad118a 626 tb = fib_get_table(net, cfg.fc_table);
1da177e4 627 if (tb)
78055998
DA
628 err = fib_table_delete(net, tb, &cfg,
629 NULL);
4e902c57
TG
630 else
631 err = -ESRCH;
1da177e4 632 } else {
1bad118a 633 tb = fib_new_table(net, cfg.fc_table);
1da177e4 634 if (tb)
6d8422a1
DA
635 err = fib_table_insert(net, tb,
636 &cfg, NULL);
4e902c57
TG
637 else
638 err = -ENOBUFS;
1da177e4 639 }
4e902c57
TG
640
641 /* allocated by rtentry_to_fib_config() */
642 kfree(cfg.fc_mx);
1da177e4
LT
643 }
644 rtnl_unlock();
645 return err;
646 }
647 return -EINVAL;
648}
649
6a31d2a9 650const struct nla_policy rtm_ipv4_policy[RTA_MAX + 1] = {
75425657 651 [RTA_UNSPEC] = { .strict_start_type = RTA_DPORT + 1 },
4e902c57
TG
652 [RTA_DST] = { .type = NLA_U32 },
653 [RTA_SRC] = { .type = NLA_U32 },
654 [RTA_IIF] = { .type = NLA_U32 },
655 [RTA_OIF] = { .type = NLA_U32 },
656 [RTA_GATEWAY] = { .type = NLA_U32 },
657 [RTA_PRIORITY] = { .type = NLA_U32 },
658 [RTA_PREFSRC] = { .type = NLA_U32 },
659 [RTA_METRICS] = { .type = NLA_NESTED },
5176f91e 660 [RTA_MULTIPATH] = { .len = sizeof(struct rtnexthop) },
4e902c57 661 [RTA_FLOW] = { .type = NLA_U32 },
571e7226
RP
662 [RTA_ENCAP_TYPE] = { .type = NLA_U16 },
663 [RTA_ENCAP] = { .type = NLA_NESTED },
622ec2c9 664 [RTA_UID] = { .type = NLA_U32 },
3b45a410 665 [RTA_MARK] = { .type = NLA_U32 },
2eabd764 666 [RTA_TABLE] = { .type = NLA_U32 },
404eb77e
RP
667 [RTA_IP_PROTO] = { .type = NLA_U8 },
668 [RTA_SPORT] = { .type = NLA_U16 },
669 [RTA_DPORT] = { .type = NLA_U16 },
493ced1a 670 [RTA_NH_ID] = { .type = NLA_U32 },
4e902c57
TG
671};
672
d1566268
DA
673int fib_gw_from_via(struct fib_config *cfg, struct nlattr *nla,
674 struct netlink_ext_ack *extack)
675{
676 struct rtvia *via;
677 int alen;
678
679 if (nla_len(nla) < offsetof(struct rtvia, rtvia_addr)) {
680 NL_SET_ERR_MSG(extack, "Invalid attribute length for RTA_VIA");
681 return -EINVAL;
682 }
683
684 via = nla_data(nla);
685 alen = nla_len(nla) - offsetof(struct rtvia, rtvia_addr);
686
687 switch (via->rtvia_family) {
688 case AF_INET:
689 if (alen != sizeof(__be32)) {
690 NL_SET_ERR_MSG(extack, "Invalid IPv4 address in RTA_VIA");
691 return -EINVAL;
692 }
693 cfg->fc_gw_family = AF_INET;
694 cfg->fc_gw4 = *((__be32 *)via->rtvia_addr);
695 break;
696 case AF_INET6:
697#ifdef CONFIG_IPV6
698 if (alen != sizeof(struct in6_addr)) {
699 NL_SET_ERR_MSG(extack, "Invalid IPv6 address in RTA_VIA");
700 return -EINVAL;
701 }
702 cfg->fc_gw_family = AF_INET6;
703 cfg->fc_gw6 = *((struct in6_addr *)via->rtvia_addr);
704#else
705 NL_SET_ERR_MSG(extack, "IPv6 support not enabled in kernel");
706 return -EINVAL;
707#endif
708 break;
709 default:
710 NL_SET_ERR_MSG(extack, "Unsupported address family in RTA_VIA");
711 return -EINVAL;
712 }
713
714 return 0;
715}
716
4b5d47d4 717static int rtm_to_fib_config(struct net *net, struct sk_buff *skb,
6d8422a1
DA
718 struct nlmsghdr *nlh, struct fib_config *cfg,
719 struct netlink_ext_ack *extack)
1da177e4 720{
d1566268 721 bool has_gw = false, has_via = false;
4e902c57
TG
722 struct nlattr *attr;
723 int err, remaining;
724 struct rtmsg *rtm;
725
8cb08174
JB
726 err = nlmsg_validate_deprecated(nlh, sizeof(*rtm), RTA_MAX,
727 rtm_ipv4_policy, extack);
4e902c57
TG
728 if (err < 0)
729 goto errout;
730
731 memset(cfg, 0, sizeof(*cfg));
732
733 rtm = nlmsg_data(nlh);
4e902c57 734 cfg->fc_dst_len = rtm->rtm_dst_len;
4e902c57
TG
735 cfg->fc_tos = rtm->rtm_tos;
736 cfg->fc_table = rtm->rtm_table;
737 cfg->fc_protocol = rtm->rtm_protocol;
738 cfg->fc_scope = rtm->rtm_scope;
739 cfg->fc_type = rtm->rtm_type;
740 cfg->fc_flags = rtm->rtm_flags;
741 cfg->fc_nlflags = nlh->nlmsg_flags;
742
15e47304 743 cfg->fc_nlinfo.portid = NETLINK_CB(skb).portid;
4e902c57 744 cfg->fc_nlinfo.nlh = nlh;
4b5d47d4 745 cfg->fc_nlinfo.nl_net = net;
4e902c57 746
a0ee18b9 747 if (cfg->fc_type > RTN_MAX) {
c3ab2b4e 748 NL_SET_ERR_MSG(extack, "Invalid route type");
a0ee18b9
TG
749 err = -EINVAL;
750 goto errout;
751 }
752
4e902c57 753 nlmsg_for_each_attr(attr, nlh, sizeof(struct rtmsg), remaining) {
8f4c1f9b 754 switch (nla_type(attr)) {
4e902c57 755 case RTA_DST:
17fb2c64 756 cfg->fc_dst = nla_get_be32(attr);
4e902c57 757 break;
4e902c57
TG
758 case RTA_OIF:
759 cfg->fc_oif = nla_get_u32(attr);
760 break;
761 case RTA_GATEWAY:
d1566268 762 has_gw = true;
f35b794b 763 cfg->fc_gw4 = nla_get_be32(attr);
d73f80f9
DA
764 if (cfg->fc_gw4)
765 cfg->fc_gw_family = AF_INET;
4e902c57 766 break;
b6e9e5df 767 case RTA_VIA:
d1566268
DA
768 has_via = true;
769 err = fib_gw_from_via(cfg, attr, extack);
770 if (err)
771 goto errout;
772 break;
4e902c57
TG
773 case RTA_PRIORITY:
774 cfg->fc_priority = nla_get_u32(attr);
775 break;
776 case RTA_PREFSRC:
17fb2c64 777 cfg->fc_prefsrc = nla_get_be32(attr);
4e902c57
TG
778 break;
779 case RTA_METRICS:
780 cfg->fc_mx = nla_data(attr);
781 cfg->fc_mx_len = nla_len(attr);
782 break;
783 case RTA_MULTIPATH:
9ed59592 784 err = lwtunnel_valid_encap_type_attr(nla_data(attr),
c255bd68
DA
785 nla_len(attr),
786 extack);
9ed59592
DA
787 if (err < 0)
788 goto errout;
4e902c57
TG
789 cfg->fc_mp = nla_data(attr);
790 cfg->fc_mp_len = nla_len(attr);
791 break;
792 case RTA_FLOW:
793 cfg->fc_flow = nla_get_u32(attr);
794 break;
4e902c57
TG
795 case RTA_TABLE:
796 cfg->fc_table = nla_get_u32(attr);
797 break;
571e7226
RP
798 case RTA_ENCAP:
799 cfg->fc_encap = attr;
800 break;
801 case RTA_ENCAP_TYPE:
802 cfg->fc_encap_type = nla_get_u16(attr);
c255bd68
DA
803 err = lwtunnel_valid_encap_type(cfg->fc_encap_type,
804 extack);
9ed59592
DA
805 if (err < 0)
806 goto errout;
571e7226 807 break;
493ced1a
DA
808 case RTA_NH_ID:
809 cfg->fc_nh_id = nla_get_u32(attr);
810 break;
811 }
812 }
813
814 if (cfg->fc_nh_id) {
815 if (cfg->fc_oif || cfg->fc_gw_family ||
816 cfg->fc_encap || cfg->fc_mp) {
817 NL_SET_ERR_MSG(extack,
818 "Nexthop specification and nexthop id are mutually exclusive");
819 return -EINVAL;
1da177e4
LT
820 }
821 }
4e902c57 822
d1566268
DA
823 if (has_gw && has_via) {
824 NL_SET_ERR_MSG(extack,
825 "Nexthop configuration can not contain both GATEWAY and VIA");
826 goto errout;
827 }
828
1da177e4 829 return 0;
4e902c57
TG
830errout:
831 return err;
1da177e4
LT
832}
833
c21ef3e3
DA
834static int inet_rtm_delroute(struct sk_buff *skb, struct nlmsghdr *nlh,
835 struct netlink_ext_ack *extack)
1da177e4 836{
3b1e0a65 837 struct net *net = sock_net(skb->sk);
4e902c57
TG
838 struct fib_config cfg;
839 struct fib_table *tb;
840 int err;
1da177e4 841
6d8422a1 842 err = rtm_to_fib_config(net, skb, nlh, &cfg, extack);
4e902c57
TG
843 if (err < 0)
844 goto errout;
1da177e4 845
493ced1a
DA
846 if (cfg.fc_nh_id && !nexthop_find_by_id(net, cfg.fc_nh_id)) {
847 NL_SET_ERR_MSG(extack, "Nexthop id does not exist");
848 err = -EINVAL;
849 goto errout;
850 }
851
8ad4942c 852 tb = fib_get_table(net, cfg.fc_table);
51456b29 853 if (!tb) {
c3ab2b4e 854 NL_SET_ERR_MSG(extack, "FIB table does not exist");
4e902c57
TG
855 err = -ESRCH;
856 goto errout;
857 }
858
78055998 859 err = fib_table_delete(net, tb, &cfg, extack);
4e902c57
TG
860errout:
861 return err;
1da177e4
LT
862}
863
c21ef3e3
DA
864static int inet_rtm_newroute(struct sk_buff *skb, struct nlmsghdr *nlh,
865 struct netlink_ext_ack *extack)
1da177e4 866{
3b1e0a65 867 struct net *net = sock_net(skb->sk);
4e902c57
TG
868 struct fib_config cfg;
869 struct fib_table *tb;
870 int err;
1da177e4 871
6d8422a1 872 err = rtm_to_fib_config(net, skb, nlh, &cfg, extack);
4e902c57
TG
873 if (err < 0)
874 goto errout;
1da177e4 875
226b0b4a 876 tb = fib_new_table(net, cfg.fc_table);
51456b29 877 if (!tb) {
4e902c57
TG
878 err = -ENOBUFS;
879 goto errout;
880 }
881
6d8422a1 882 err = fib_table_insert(net, tb, &cfg, extack);
6e617de8
PA
883 if (!err && cfg.fc_type == RTN_LOCAL)
884 net->ipv4.fib_has_custom_local_routes = true;
4e902c57
TG
885errout:
886 return err;
1da177e4
LT
887}
888
4724676d
DA
889int ip_valid_fib_dump_req(struct net *net, const struct nlmsghdr *nlh,
890 struct fib_dump_filter *filter,
effe6792 891 struct netlink_callback *cb)
e8ba330a 892{
effe6792
DA
893 struct netlink_ext_ack *extack = cb->extack;
894 struct nlattr *tb[RTA_MAX + 1];
e8ba330a 895 struct rtmsg *rtm;
effe6792
DA
896 int err, i;
897
898 ASSERT_RTNL();
e8ba330a
DA
899
900 if (nlh->nlmsg_len < nlmsg_msg_size(sizeof(*rtm))) {
901 NL_SET_ERR_MSG(extack, "Invalid header for FIB dump request");
902 return -EINVAL;
903 }
904
905 rtm = nlmsg_data(nlh);
906 if (rtm->rtm_dst_len || rtm->rtm_src_len || rtm->rtm_tos ||
effe6792 907 rtm->rtm_scope) {
e8ba330a
DA
908 NL_SET_ERR_MSG(extack, "Invalid values in header for FIB dump request");
909 return -EINVAL;
910 }
564c91f7 911
e8ba330a
DA
912 if (rtm->rtm_flags & ~(RTM_F_CLONED | RTM_F_PREFIX)) {
913 NL_SET_ERR_MSG(extack, "Invalid flags for FIB dump request");
914 return -EINVAL;
915 }
564c91f7
SB
916 if (rtm->rtm_flags & RTM_F_CLONED)
917 filter->dump_routes = false;
918 else
919 filter->dump_exceptions = false;
e8ba330a 920
effe6792
DA
921 filter->flags = rtm->rtm_flags;
922 filter->protocol = rtm->rtm_protocol;
923 filter->rt_type = rtm->rtm_type;
924 filter->table_id = rtm->rtm_table;
925
8cb08174
JB
926 err = nlmsg_parse_deprecated_strict(nlh, sizeof(*rtm), tb, RTA_MAX,
927 rtm_ipv4_policy, extack);
effe6792
DA
928 if (err < 0)
929 return err;
930
931 for (i = 0; i <= RTA_MAX; ++i) {
932 int ifindex;
933
934 if (!tb[i])
935 continue;
936
937 switch (i) {
938 case RTA_TABLE:
939 filter->table_id = nla_get_u32(tb[i]);
940 break;
941 case RTA_OIF:
942 ifindex = nla_get_u32(tb[i]);
943 filter->dev = __dev_get_by_index(net, ifindex);
944 if (!filter->dev)
945 return -ENODEV;
946 break;
947 default:
948 NL_SET_ERR_MSG(extack, "Unsupported attribute in dump request");
949 return -EINVAL;
950 }
951 }
952
953 if (filter->flags || filter->protocol || filter->rt_type ||
954 filter->table_id || filter->dev) {
955 filter->filter_set = 1;
956 cb->answer_flags = NLM_F_DUMP_FILTERED;
e8ba330a
DA
957 }
958
959 return 0;
960}
961EXPORT_SYMBOL_GPL(ip_valid_fib_dump_req);
962
63f3444f 963static int inet_dump_fib(struct sk_buff *skb, struct netlink_callback *cb)
1da177e4 964{
564c91f7
SB
965 struct fib_dump_filter filter = { .dump_routes = true,
966 .dump_exceptions = true };
e8ba330a 967 const struct nlmsghdr *nlh = cb->nlh;
3b1e0a65 968 struct net *net = sock_net(skb->sk);
1af5a8c4
PM
969 unsigned int h, s_h;
970 unsigned int e = 0, s_e;
1da177e4 971 struct fib_table *tb;
e4aef8ae 972 struct hlist_head *head;
f6c5775f 973 int dumped = 0, err;
1da177e4 974
e8ba330a 975 if (cb->strict_check) {
effe6792 976 err = ip_valid_fib_dump_req(net, nlh, &filter, cb);
e8ba330a
DA
977 if (err < 0)
978 return err;
e4e92fb1
DA
979 } else if (nlmsg_len(nlh) >= sizeof(struct rtmsg)) {
980 struct rtmsg *rtm = nlmsg_data(nlh);
981
982 filter.flags = rtm->rtm_flags & (RTM_F_PREFIX | RTM_F_CLONED);
e8ba330a
DA
983 }
984
b597ca6e
SB
985 /* ipv4 does not use prefix flag */
986 if (filter.flags & RTM_F_PREFIX)
0b8c7f6f 987 return skb->len;
1da177e4 988
18a8021a
DA
989 if (filter.table_id) {
990 tb = fib_get_table(net, filter.table_id);
991 if (!tb) {
41b4bd98 992 if (rtnl_msg_family(cb->nlh) != PF_INET)
ae677bbb
DA
993 return skb->len;
994
18a8021a
DA
995 NL_SET_ERR_MSG(cb->extack, "ipv4: FIB table does not exist");
996 return -ENOENT;
997 }
998
dddeb30b 999 rcu_read_lock();
18a8021a 1000 err = fib_table_dump(tb, skb, cb, &filter);
dddeb30b 1001 rcu_read_unlock();
18a8021a
DA
1002 return skb->len ? : err;
1003 }
1004
1af5a8c4
PM
1005 s_h = cb->args[0];
1006 s_e = cb->args[1];
1007
a7e53531
AD
1008 rcu_read_lock();
1009
1af5a8c4
PM
1010 for (h = s_h; h < FIB_TABLE_HASHSZ; h++, s_e = 0) {
1011 e = 0;
e4aef8ae 1012 head = &net->ipv4.fib_table_hash[h];
a7e53531 1013 hlist_for_each_entry_rcu(tb, head, tb_hlist) {
1af5a8c4
PM
1014 if (e < s_e)
1015 goto next;
1016 if (dumped)
1017 memset(&cb->args[2], 0, sizeof(cb->args) -
e905a9ed 1018 2 * sizeof(cb->args[0]));
18a8021a 1019 err = fib_table_dump(tb, skb, cb, &filter);
f6c5775f
DA
1020 if (err < 0) {
1021 if (likely(skb->len))
1022 goto out;
1023
1024 goto out_err;
1025 }
1af5a8c4
PM
1026 dumped = 1;
1027next:
1028 e++;
1029 }
1da177e4 1030 }
1af5a8c4 1031out:
f6c5775f
DA
1032 err = skb->len;
1033out_err:
a7e53531
AD
1034 rcu_read_unlock();
1035
1af5a8c4
PM
1036 cb->args[1] = e;
1037 cb->args[0] = h;
1da177e4 1038
f6c5775f 1039 return err;
1da177e4
LT
1040}
1041
1042/* Prepare and feed intra-kernel routing request.
6a31d2a9
ED
1043 * Really, it should be netlink message, but :-( netlink
1044 * can be not configured, so that we feed it directly
1045 * to fib engine. It is legal, because all events occur
1046 * only when netlink is already locked.
1da177e4 1047 */
af4d768a
DA
1048static void fib_magic(int cmd, int type, __be32 dst, int dst_len,
1049 struct in_ifaddr *ifa, u32 rt_priority)
1da177e4 1050{
c346dca1 1051 struct net *net = dev_net(ifa->ifa_dev->dev);
3236b004 1052 u32 tb_id = l3mdev_fib_table(ifa->ifa_dev->dev);
4e902c57
TG
1053 struct fib_table *tb;
1054 struct fib_config cfg = {
1055 .fc_protocol = RTPROT_KERNEL,
1056 .fc_type = type,
1057 .fc_dst = dst,
1058 .fc_dst_len = dst_len,
af4d768a 1059 .fc_priority = rt_priority,
4e902c57
TG
1060 .fc_prefsrc = ifa->ifa_local,
1061 .fc_oif = ifa->ifa_dev->dev->ifindex,
1062 .fc_nlflags = NLM_F_CREATE | NLM_F_APPEND,
4d1169c1 1063 .fc_nlinfo = {
4b5d47d4 1064 .nl_net = net,
4d1169c1 1065 },
4e902c57 1066 };
1da177e4 1067
021dd3b8
DA
1068 if (!tb_id)
1069 tb_id = (type == RTN_UNICAST) ? RT_TABLE_MAIN : RT_TABLE_LOCAL;
1da177e4 1070
021dd3b8 1071 tb = fib_new_table(net, tb_id);
51456b29 1072 if (!tb)
1da177e4
LT
1073 return;
1074
4e902c57 1075 cfg.fc_table = tb->tb_id;
1da177e4 1076
4e902c57
TG
1077 if (type != RTN_LOCAL)
1078 cfg.fc_scope = RT_SCOPE_LINK;
1079 else
1080 cfg.fc_scope = RT_SCOPE_HOST;
1da177e4
LT
1081
1082 if (cmd == RTM_NEWROUTE)
6d8422a1 1083 fib_table_insert(net, tb, &cfg, NULL);
1da177e4 1084 else
78055998 1085 fib_table_delete(net, tb, &cfg, NULL);
1da177e4
LT
1086}
1087
0ff60a45 1088void fib_add_ifaddr(struct in_ifaddr *ifa)
1da177e4
LT
1089{
1090 struct in_device *in_dev = ifa->ifa_dev;
1091 struct net_device *dev = in_dev->dev;
1092 struct in_ifaddr *prim = ifa;
a144ea4b
AV
1093 __be32 mask = ifa->ifa_mask;
1094 __be32 addr = ifa->ifa_local;
6a31d2a9 1095 __be32 prefix = ifa->ifa_address & mask;
1da177e4 1096
6a31d2a9 1097 if (ifa->ifa_flags & IFA_F_SECONDARY) {
1da177e4 1098 prim = inet_ifa_byprefix(in_dev, prefix, mask);
51456b29 1099 if (!prim) {
058bd4d2 1100 pr_warn("%s: bug: prim == NULL\n", __func__);
1da177e4
LT
1101 return;
1102 }
1103 }
1104
af4d768a 1105 fib_magic(RTM_NEWROUTE, RTN_LOCAL, addr, 32, prim, 0);
1da177e4 1106
6a31d2a9 1107 if (!(dev->flags & IFF_UP))
1da177e4
LT
1108 return;
1109
1110 /* Add broadcast address, if it is explicitly assigned. */
a144ea4b 1111 if (ifa->ifa_broadcast && ifa->ifa_broadcast != htonl(0xFFFFFFFF))
af4d768a
DA
1112 fib_magic(RTM_NEWROUTE, RTN_BROADCAST, ifa->ifa_broadcast, 32,
1113 prim, 0);
1da177e4 1114
6a31d2a9 1115 if (!ipv4_is_zeronet(prefix) && !(ifa->ifa_flags & IFA_F_SECONDARY) &&
1da177e4 1116 (prefix != addr || ifa->ifa_prefixlen < 32)) {
7b131180
PA
1117 if (!(ifa->ifa_flags & IFA_F_NOPREFIXROUTE))
1118 fib_magic(RTM_NEWROUTE,
1119 dev->flags & IFF_LOOPBACK ? RTN_LOCAL : RTN_UNICAST,
af4d768a
DA
1120 prefix, ifa->ifa_prefixlen, prim,
1121 ifa->ifa_rt_priority);
1da177e4
LT
1122
1123 /* Add network specific broadcasts, when it takes a sense */
1124 if (ifa->ifa_prefixlen < 31) {
af4d768a
DA
1125 fib_magic(RTM_NEWROUTE, RTN_BROADCAST, prefix, 32,
1126 prim, 0);
6a31d2a9 1127 fib_magic(RTM_NEWROUTE, RTN_BROADCAST, prefix | ~mask,
af4d768a 1128 32, prim, 0);
1da177e4
LT
1129 }
1130 }
1131}
1132
af4d768a
DA
1133void fib_modify_prefix_metric(struct in_ifaddr *ifa, u32 new_metric)
1134{
1135 __be32 prefix = ifa->ifa_address & ifa->ifa_mask;
1136 struct in_device *in_dev = ifa->ifa_dev;
1137 struct net_device *dev = in_dev->dev;
1138
1139 if (!(dev->flags & IFF_UP) ||
1140 ifa->ifa_flags & (IFA_F_SECONDARY | IFA_F_NOPREFIXROUTE) ||
1141 ipv4_is_zeronet(prefix) ||
0b834ba0 1142 (prefix == ifa->ifa_local && ifa->ifa_prefixlen == 32))
af4d768a
DA
1143 return;
1144
1145 /* add the new */
1146 fib_magic(RTM_NEWROUTE,
1147 dev->flags & IFF_LOOPBACK ? RTN_LOCAL : RTN_UNICAST,
1148 prefix, ifa->ifa_prefixlen, ifa, new_metric);
1149
1150 /* delete the old */
1151 fib_magic(RTM_DELROUTE,
1152 dev->flags & IFF_LOOPBACK ? RTN_LOCAL : RTN_UNICAST,
1153 prefix, ifa->ifa_prefixlen, ifa, ifa->ifa_rt_priority);
1154}
1155
e6abbaa2
JA
1156/* Delete primary or secondary address.
1157 * Optionally, on secondary address promotion consider the addresses
1158 * from subnet iprim as deleted, even if they are in device list.
1159 * In this case the secondary ifa can be in device list.
1160 */
1161void fib_del_ifaddr(struct in_ifaddr *ifa, struct in_ifaddr *iprim)
1da177e4
LT
1162{
1163 struct in_device *in_dev = ifa->ifa_dev;
1164 struct net_device *dev = in_dev->dev;
1165 struct in_ifaddr *ifa1;
e6abbaa2 1166 struct in_ifaddr *prim = ifa, *prim1 = NULL;
6a31d2a9
ED
1167 __be32 brd = ifa->ifa_address | ~ifa->ifa_mask;
1168 __be32 any = ifa->ifa_address & ifa->ifa_mask;
1da177e4
LT
1169#define LOCAL_OK 1
1170#define BRD_OK 2
1171#define BRD0_OK 4
1172#define BRD1_OK 8
95c96174 1173 unsigned int ok = 0;
e6abbaa2
JA
1174 int subnet = 0; /* Primary network */
1175 int gone = 1; /* Address is missing */
1176 int same_prefsrc = 0; /* Another primary with same IP */
1da177e4 1177
e6abbaa2 1178 if (ifa->ifa_flags & IFA_F_SECONDARY) {
1da177e4 1179 prim = inet_ifa_byprefix(in_dev, any, ifa->ifa_mask);
51456b29 1180 if (!prim) {
391a2033
PA
1181 /* if the device has been deleted, we don't perform
1182 * address promotion
1183 */
1184 if (!in_dev->dead)
1185 pr_warn("%s: bug: prim == NULL\n", __func__);
1da177e4
LT
1186 return;
1187 }
e6abbaa2 1188 if (iprim && iprim != prim) {
058bd4d2 1189 pr_warn("%s: bug: iprim != prim\n", __func__);
e6abbaa2
JA
1190 return;
1191 }
1192 } else if (!ipv4_is_zeronet(any) &&
1193 (any != ifa->ifa_local || ifa->ifa_prefixlen < 32)) {
7b131180
PA
1194 if (!(ifa->ifa_flags & IFA_F_NOPREFIXROUTE))
1195 fib_magic(RTM_DELROUTE,
1196 dev->flags & IFF_LOOPBACK ? RTN_LOCAL : RTN_UNICAST,
af4d768a 1197 any, ifa->ifa_prefixlen, prim, 0);
e6abbaa2 1198 subnet = 1;
1da177e4
LT
1199 }
1200
fbd40ea0
DM
1201 if (in_dev->dead)
1202 goto no_promotions;
1203
1da177e4 1204 /* Deletion is more complicated than add.
6a31d2a9
ED
1205 * We should take care of not to delete too much :-)
1206 *
1207 * Scan address list to be sure that addresses are really gone.
1da177e4 1208 */
cd5a411d
FW
1209 rcu_read_lock();
1210 in_dev_for_each_ifa_rcu(ifa1, in_dev) {
e6abbaa2
JA
1211 if (ifa1 == ifa) {
1212 /* promotion, keep the IP */
1213 gone = 0;
1214 continue;
1215 }
1216 /* Ignore IFAs from our subnet */
1217 if (iprim && ifa1->ifa_mask == iprim->ifa_mask &&
1218 inet_ifa_match(ifa1->ifa_address, iprim))
1219 continue;
1220
1221 /* Ignore ifa1 if it uses different primary IP (prefsrc) */
1222 if (ifa1->ifa_flags & IFA_F_SECONDARY) {
1223 /* Another address from our subnet? */
1224 if (ifa1->ifa_mask == prim->ifa_mask &&
1225 inet_ifa_match(ifa1->ifa_address, prim))
1226 prim1 = prim;
1227 else {
1228 /* We reached the secondaries, so
1229 * same_prefsrc should be determined.
1230 */
1231 if (!same_prefsrc)
1232 continue;
1233 /* Search new prim1 if ifa1 is not
1234 * using the current prim1
1235 */
1236 if (!prim1 ||
1237 ifa1->ifa_mask != prim1->ifa_mask ||
1238 !inet_ifa_match(ifa1->ifa_address, prim1))
1239 prim1 = inet_ifa_byprefix(in_dev,
1240 ifa1->ifa_address,
1241 ifa1->ifa_mask);
1242 if (!prim1)
1243 continue;
1244 if (prim1->ifa_local != prim->ifa_local)
1245 continue;
1246 }
1247 } else {
1248 if (prim->ifa_local != ifa1->ifa_local)
1249 continue;
1250 prim1 = ifa1;
1251 if (prim != prim1)
1252 same_prefsrc = 1;
1253 }
1da177e4
LT
1254 if (ifa->ifa_local == ifa1->ifa_local)
1255 ok |= LOCAL_OK;
1256 if (ifa->ifa_broadcast == ifa1->ifa_broadcast)
1257 ok |= BRD_OK;
1258 if (brd == ifa1->ifa_broadcast)
1259 ok |= BRD1_OK;
1260 if (any == ifa1->ifa_broadcast)
1261 ok |= BRD0_OK;
e6abbaa2
JA
1262 /* primary has network specific broadcasts */
1263 if (prim1 == ifa1 && ifa1->ifa_prefixlen < 31) {
1264 __be32 brd1 = ifa1->ifa_address | ~ifa1->ifa_mask;
1265 __be32 any1 = ifa1->ifa_address & ifa1->ifa_mask;
1266
1267 if (!ipv4_is_zeronet(any1)) {
1268 if (ifa->ifa_broadcast == brd1 ||
1269 ifa->ifa_broadcast == any1)
1270 ok |= BRD_OK;
1271 if (brd == brd1 || brd == any1)
1272 ok |= BRD1_OK;
1273 if (any == brd1 || any == any1)
1274 ok |= BRD0_OK;
1275 }
1276 }
1da177e4 1277 }
cd5a411d 1278 rcu_read_unlock();
1da177e4 1279
fbd40ea0 1280no_promotions:
6a31d2a9 1281 if (!(ok & BRD_OK))
af4d768a
DA
1282 fib_magic(RTM_DELROUTE, RTN_BROADCAST, ifa->ifa_broadcast, 32,
1283 prim, 0);
e6abbaa2
JA
1284 if (subnet && ifa->ifa_prefixlen < 31) {
1285 if (!(ok & BRD1_OK))
af4d768a
DA
1286 fib_magic(RTM_DELROUTE, RTN_BROADCAST, brd, 32,
1287 prim, 0);
e6abbaa2 1288 if (!(ok & BRD0_OK))
af4d768a
DA
1289 fib_magic(RTM_DELROUTE, RTN_BROADCAST, any, 32,
1290 prim, 0);
e6abbaa2 1291 }
6a31d2a9 1292 if (!(ok & LOCAL_OK)) {
30bbaa19
DA
1293 unsigned int addr_type;
1294
af4d768a 1295 fib_magic(RTM_DELROUTE, RTN_LOCAL, ifa->ifa_local, 32, prim, 0);
1da177e4
LT
1296
1297 /* Check, that this local address finally disappeared. */
30bbaa19
DA
1298 addr_type = inet_addr_type_dev_table(dev_net(dev), dev,
1299 ifa->ifa_local);
1300 if (gone && addr_type != RTN_LOCAL) {
1da177e4 1301 /* And the last, but not the least thing.
6a31d2a9
ED
1302 * We must flush stray FIB entries.
1303 *
1304 * First of all, we scan fib_info list searching
1305 * for stray nexthop entries, then ignite fib_flush.
1306 */
5a56a0b3 1307 if (fib_sync_down_addr(dev, ifa->ifa_local))
c346dca1 1308 fib_flush(dev_net(dev));
1da177e4
LT
1309 }
1310 }
1311#undef LOCAL_OK
1312#undef BRD_OK
1313#undef BRD0_OK
1314#undef BRD1_OK
1315}
1316
345e9b54 1317static void nl_fib_lookup(struct net *net, struct fib_result_nl *frn)
246955fe 1318{
e905a9ed 1319
246955fe 1320 struct fib_result res;
9ade2286
DM
1321 struct flowi4 fl4 = {
1322 .flowi4_mark = frn->fl_mark,
1323 .daddr = frn->fl_addr,
1324 .flowi4_tos = frn->fl_tos,
1325 .flowi4_scope = frn->fl_scope,
6a31d2a9 1326 };
345e9b54
AD
1327 struct fib_table *tb;
1328
1329 rcu_read_lock();
1330
1331 tb = fib_get_table(net, frn->tb_id_in);
1194ed0a
AK
1332
1333 frn->err = -ENOENT;
246955fe
RO
1334 if (tb) {
1335 local_bh_disable();
1336
1337 frn->tb_id = tb->tb_id;
9ade2286 1338 frn->err = fib_table_lookup(tb, &fl4, &res, FIB_LOOKUP_NOREF);
246955fe
RO
1339
1340 if (!frn->err) {
1341 frn->prefixlen = res.prefixlen;
1342 frn->nh_sel = res.nh_sel;
1343 frn->type = res.type;
1344 frn->scope = res.scope;
1345 }
1346 local_bh_enable();
1347 }
345e9b54
AD
1348
1349 rcu_read_unlock();
246955fe
RO
1350}
1351
28f7b036 1352static void nl_fib_input(struct sk_buff *skb)
246955fe 1353{
6bd48fcf 1354 struct net *net;
246955fe 1355 struct fib_result_nl *frn;
28f7b036 1356 struct nlmsghdr *nlh;
15e47304 1357 u32 portid;
1194ed0a 1358
3b1e0a65 1359 net = sock_net(skb->sk);
b529ccf2 1360 nlh = nlmsg_hdr(skb);
c64c0b3c
ED
1361 if (skb->len < nlmsg_total_size(sizeof(*frn)) ||
1362 skb->len < nlh->nlmsg_len ||
573ce260 1363 nlmsg_len(nlh) < sizeof(*frn))
ea86575e 1364 return;
d883a036 1365
3a36515f 1366 skb = netlink_skb_clone(skb, GFP_KERNEL);
51456b29 1367 if (!skb)
d883a036
DL
1368 return;
1369 nlh = nlmsg_hdr(skb);
e905a9ed 1370
573ce260 1371 frn = (struct fib_result_nl *) nlmsg_data(nlh);
345e9b54 1372 nl_fib_lookup(net, frn);
e905a9ed 1373
28a28283 1374 portid = NETLINK_CB(skb).portid; /* netlink portid */
15e47304 1375 NETLINK_CB(skb).portid = 0; /* from kernel */
ac6d439d 1376 NETLINK_CB(skb).dst_group = 0; /* unicast */
15e47304 1377 netlink_unicast(net->ipv4.fibnl, skb, portid, MSG_DONTWAIT);
e905a9ed 1378}
246955fe 1379
2c8c1e72 1380static int __net_init nl_fib_lookup_init(struct net *net)
246955fe 1381{
6bd48fcf 1382 struct sock *sk;
a31f2d17
PNA
1383 struct netlink_kernel_cfg cfg = {
1384 .input = nl_fib_input,
1385 };
1386
9f00d977 1387 sk = netlink_kernel_create(net, NETLINK_FIB_LOOKUP, &cfg);
51456b29 1388 if (!sk)
7b1a74fd 1389 return -EAFNOSUPPORT;
6bd48fcf 1390 net->ipv4.fibnl = sk;
7b1a74fd
DL
1391 return 0;
1392}
1393
1394static void nl_fib_lookup_exit(struct net *net)
1395{
b7c6ba6e 1396 netlink_kernel_release(net->ipv4.fibnl);
775516bf 1397 net->ipv4.fibnl = NULL;
246955fe
RO
1398}
1399
4f823def
JA
1400static void fib_disable_ip(struct net_device *dev, unsigned long event,
1401 bool force)
1da177e4 1402{
4f823def 1403 if (fib_sync_down_dev(dev, event, force))
c346dca1 1404 fib_flush(dev_net(dev));
06b4fc52
GF
1405 else
1406 rt_cache_flush(dev_net(dev));
1da177e4
LT
1407 arp_ifdown(dev);
1408}
1409
1410static int fib_inetaddr_event(struct notifier_block *this, unsigned long event, void *ptr)
1411{
6ed2533e 1412 struct in_ifaddr *ifa = (struct in_ifaddr *)ptr;
76e6ebfb 1413 struct net_device *dev = ifa->ifa_dev->dev;
436c3b66 1414 struct net *net = dev_net(dev);
1da177e4
LT
1415
1416 switch (event) {
1417 case NETDEV_UP:
1418 fib_add_ifaddr(ifa);
1419#ifdef CONFIG_IP_ROUTE_MULTIPATH
8a3d0316 1420 fib_sync_up(dev, RTNH_F_DEAD);
1da177e4 1421#endif
436c3b66 1422 atomic_inc(&net->ipv4.dev_addr_genid);
4ccfe6d4 1423 rt_cache_flush(dev_net(dev));
1da177e4
LT
1424 break;
1425 case NETDEV_DOWN:
e6abbaa2 1426 fib_del_ifaddr(ifa, NULL);
436c3b66 1427 atomic_inc(&net->ipv4.dev_addr_genid);
51456b29 1428 if (!ifa->ifa_dev->ifa_list) {
1da177e4 1429 /* Last address was deleted from this interface.
6a31d2a9 1430 * Disable IP.
1da177e4 1431 */
4f823def 1432 fib_disable_ip(dev, event, true);
1da177e4 1433 } else {
4ccfe6d4 1434 rt_cache_flush(dev_net(dev));
1da177e4
LT
1435 }
1436 break;
1437 }
1438 return NOTIFY_DONE;
1439}
1440
1441static int fib_netdev_event(struct notifier_block *this, unsigned long event, void *ptr)
1442{
351638e7 1443 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
af7d6cce
SD
1444 struct netdev_notifier_changeupper_info *upper_info = ptr;
1445 struct netdev_notifier_info_ext *info_ext = ptr;
0115e8e3 1446 struct in_device *in_dev;
436c3b66 1447 struct net *net = dev_net(dev);
cd5a411d 1448 struct in_ifaddr *ifa;
8a3d0316 1449 unsigned int flags;
1da177e4
LT
1450
1451 if (event == NETDEV_UNREGISTER) {
4f823def 1452 fib_disable_ip(dev, event, true);
caacf05e 1453 rt_flush_dev(dev);
1da177e4
LT
1454 return NOTIFY_DONE;
1455 }
1456
0115e8e3 1457 in_dev = __in_dev_get_rtnl(dev);
a0065f26
OH
1458 if (!in_dev)
1459 return NOTIFY_DONE;
0115e8e3 1460
1da177e4
LT
1461 switch (event) {
1462 case NETDEV_UP:
cd5a411d 1463 in_dev_for_each_ifa_rtnl(ifa, in_dev) {
1da177e4 1464 fib_add_ifaddr(ifa);
cd5a411d 1465 }
1da177e4 1466#ifdef CONFIG_IP_ROUTE_MULTIPATH
8a3d0316 1467 fib_sync_up(dev, RTNH_F_DEAD);
1da177e4 1468#endif
436c3b66 1469 atomic_inc(&net->ipv4.dev_addr_genid);
4ccfe6d4 1470 rt_cache_flush(net);
1da177e4
LT
1471 break;
1472 case NETDEV_DOWN:
4f823def 1473 fib_disable_ip(dev, event, false);
1da177e4 1474 break;
1da177e4 1475 case NETDEV_CHANGE:
8a3d0316
AG
1476 flags = dev_get_flags(dev);
1477 if (flags & (IFF_RUNNING | IFF_LOWER_UP))
1478 fib_sync_up(dev, RTNH_F_LINKDOWN);
1479 else
4f823def 1480 fib_sync_down_dev(dev, event, false);
af7d6cce
SD
1481 rt_cache_flush(net);
1482 break;
8a3d0316 1483 case NETDEV_CHANGEMTU:
af7d6cce 1484 fib_sync_mtu(dev, info_ext->ext.mtu);
4ccfe6d4 1485 rt_cache_flush(net);
1da177e4 1486 break;
7f49e7a3 1487 case NETDEV_CHANGEUPPER:
af7d6cce 1488 upper_info = ptr;
7f49e7a3
DA
1489 /* flush all routes if dev is linked to or unlinked from
1490 * an L3 master device (e.g., VRF)
1491 */
af7d6cce
SD
1492 if (upper_info->upper_dev &&
1493 netif_is_l3_master(upper_info->upper_dev))
7f49e7a3
DA
1494 fib_disable_ip(dev, NETDEV_DOWN, true);
1495 break;
1da177e4
LT
1496 }
1497 return NOTIFY_DONE;
1498}
1499
1500static struct notifier_block fib_inetaddr_notifier = {
6ed2533e 1501 .notifier_call = fib_inetaddr_event,
1da177e4
LT
1502};
1503
1504static struct notifier_block fib_netdev_notifier = {
6ed2533e 1505 .notifier_call = fib_netdev_event,
1da177e4
LT
1506};
1507
7b1a74fd 1508static int __net_init ip_fib_net_init(struct net *net)
1da177e4 1509{
dce5cbee 1510 int err;
10da66f7
ED
1511 size_t size = sizeof(struct hlist_head) * FIB_TABLE_HASHSZ;
1512
04b1d4e5
IS
1513 err = fib4_notifier_init(net);
1514 if (err)
1515 return err;
cacaad11 1516
10da66f7
ED
1517 /* Avoid false sharing : Use at least a full cache line */
1518 size = max_t(size_t, size, L1_CACHE_BYTES);
1af5a8c4 1519
10da66f7 1520 net->ipv4.fib_table_hash = kzalloc(size, GFP_KERNEL);
04b1d4e5
IS
1521 if (!net->ipv4.fib_table_hash) {
1522 err = -ENOMEM;
1523 goto err_table_hash_alloc;
1524 }
e4aef8ae 1525
dce5cbee
DL
1526 err = fib4_rules_init(net);
1527 if (err < 0)
04b1d4e5 1528 goto err_rules_init;
dce5cbee
DL
1529 return 0;
1530
04b1d4e5 1531err_rules_init:
dce5cbee 1532 kfree(net->ipv4.fib_table_hash);
04b1d4e5
IS
1533err_table_hash_alloc:
1534 fib4_notifier_exit(net);
dce5cbee 1535 return err;
7b1a74fd 1536}
1da177e4 1537
2c8c1e72 1538static void ip_fib_net_exit(struct net *net)
7b1a74fd 1539{
b4681c28 1540 int i;
7b1a74fd 1541
6dede75b 1542 rtnl_lock();
6e47d6ca 1543#ifdef CONFIG_IP_MULTIPLE_TABLES
6e47d6ca
AD
1544 RCU_INIT_POINTER(net->ipv4.fib_main, NULL);
1545 RCU_INIT_POINTER(net->ipv4.fib_default, NULL);
1546#endif
b4681c28
IS
1547 /* Destroy the tables in reverse order to guarantee that the
1548 * local table, ID 255, is destroyed before the main table, ID
1549 * 254. This is necessary as the local table may contain
1550 * references to data contained in the main table.
1551 */
1552 for (i = FIB_TABLE_HASHSZ - 1; i >= 0; i--) {
a7e53531 1553 struct hlist_head *head = &net->ipv4.fib_table_hash[i];
b67bfe0d 1554 struct hlist_node *tmp;
a7e53531
AD
1555 struct fib_table *tb;
1556
b67bfe0d
SL
1557 hlist_for_each_entry_safe(tb, tmp, head, tb_hlist) {
1558 hlist_del(&tb->tb_hlist);
f97f4dd8 1559 fib_table_flush(net, tb, true);
4aa2c466 1560 fib_free_table(tb);
7b1a74fd
DL
1561 }
1562 }
ad88d051
AD
1563
1564#ifdef CONFIG_IP_MULTIPLE_TABLES
1565 fib4_rules_exit(net);
1566#endif
e2666f84 1567 rtnl_unlock();
e4aef8ae 1568 kfree(net->ipv4.fib_table_hash);
04b1d4e5 1569 fib4_notifier_exit(net);
7b1a74fd
DL
1570}
1571
1572static int __net_init fib_net_init(struct net *net)
1573{
1574 int error;
1575
f4530fa5
DM
1576#ifdef CONFIG_IP_ROUTE_CLASSID
1577 net->ipv4.fib_num_tclassid_users = 0;
1578#endif
7b1a74fd
DL
1579 error = ip_fib_net_init(net);
1580 if (error < 0)
1581 goto out;
1582 error = nl_fib_lookup_init(net);
1583 if (error < 0)
1584 goto out_nlfl;
1585 error = fib_proc_init(net);
1586 if (error < 0)
1587 goto out_proc;
1588out:
1589 return error;
1590
1591out_proc:
1592 nl_fib_lookup_exit(net);
1593out_nlfl:
1594 ip_fib_net_exit(net);
1595 goto out;
1596}
1597
1598static void __net_exit fib_net_exit(struct net *net)
1599{
1600 fib_proc_exit(net);
1601 nl_fib_lookup_exit(net);
1602 ip_fib_net_exit(net);
1603}
1604
1605static struct pernet_operations fib_net_ops = {
1606 .init = fib_net_init,
1607 .exit = fib_net_exit,
1608};
1609
1610void __init ip_fib_init(void)
1611{
8799a221 1612 fib_trie_init();
7b1a74fd
DL
1613
1614 register_pernet_subsys(&fib_net_ops);
8799a221 1615
7b1a74fd
DL
1616 register_netdevice_notifier(&fib_netdev_notifier);
1617 register_inetaddr_notifier(&fib_inetaddr_notifier);
7f9b8052 1618
b97bac64
FW
1619 rtnl_register(PF_INET, RTM_NEWROUTE, inet_rtm_newroute, NULL, 0);
1620 rtnl_register(PF_INET, RTM_DELROUTE, inet_rtm_delroute, NULL, 0);
1621 rtnl_register(PF_INET, RTM_GETROUTE, NULL, inet_dump_fib, 0);
1da177e4 1622}