]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - net/ipv4/route.c
ipv4: Calling ->cow_metrics() now is a bug.
[mirror_ubuntu-artful-kernel.git] / net / ipv4 / route.c
CommitLineData
1da177e4
LT
1/*
2 * INET An implementation of the TCP/IP protocol suite for the LINUX
3 * operating system. INET is implemented using the BSD Socket
4 * interface as the means of communication with the user level.
5 *
6 * ROUTE - implementation of the IP router.
7 *
02c30a84 8 * Authors: Ross Biro
1da177e4
LT
9 * Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
10 * Alan Cox, <gw4pts@gw4pts.ampr.org>
11 * Linus Torvalds, <Linus.Torvalds@helsinki.fi>
12 * Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
13 *
14 * Fixes:
15 * Alan Cox : Verify area fixes.
16 * Alan Cox : cli() protects routing changes
17 * Rui Oliveira : ICMP routing table updates
18 * (rco@di.uminho.pt) Routing table insertion and update
19 * Linus Torvalds : Rewrote bits to be sensible
20 * Alan Cox : Added BSD route gw semantics
e905a9ed 21 * Alan Cox : Super /proc >4K
1da177e4
LT
22 * Alan Cox : MTU in route table
23 * Alan Cox : MSS actually. Also added the window
24 * clamper.
25 * Sam Lantinga : Fixed route matching in rt_del()
26 * Alan Cox : Routing cache support.
27 * Alan Cox : Removed compatibility cruft.
28 * Alan Cox : RTF_REJECT support.
29 * Alan Cox : TCP irtt support.
30 * Jonathan Naylor : Added Metric support.
31 * Miquel van Smoorenburg : BSD API fixes.
32 * Miquel van Smoorenburg : Metrics.
33 * Alan Cox : Use __u32 properly
34 * Alan Cox : Aligned routing errors more closely with BSD
35 * our system is still very different.
36 * Alan Cox : Faster /proc handling
37 * Alexey Kuznetsov : Massive rework to support tree based routing,
38 * routing caches and better behaviour.
e905a9ed 39 *
1da177e4
LT
40 * Olaf Erb : irtt wasn't being copied right.
41 * Bjorn Ekwall : Kerneld route support.
42 * Alan Cox : Multicast fixed (I hope)
43 * Pavel Krauz : Limited broadcast fixed
44 * Mike McLagan : Routing by source
45 * Alexey Kuznetsov : End of old history. Split to fib.c and
46 * route.c and rewritten from scratch.
47 * Andi Kleen : Load-limit warning messages.
48 * Vitaly E. Lavrov : Transparent proxy revived after year coma.
49 * Vitaly E. Lavrov : Race condition in ip_route_input_slow.
50 * Tobias Ringstrom : Uninitialized res.type in ip_route_output_slow.
51 * Vladimir V. Ivanov : IP rule info (flowid) is really useful.
52 * Marc Boucher : routing by fwmark
53 * Robert Olsson : Added rt_cache statistics
54 * Arnaldo C. Melo : Convert proc stuff to seq_file
bb1d23b0 55 * Eric Dumazet : hashed spinlocks and rt_check_expire() fixes.
cef2685e
IS
56 * Ilia Sotnikov : Ignore TOS on PMTUD and Redirect
57 * Ilia Sotnikov : Removed TOS from hash calculations
1da177e4
LT
58 *
59 * This program is free software; you can redistribute it and/or
60 * modify it under the terms of the GNU General Public License
61 * as published by the Free Software Foundation; either version
62 * 2 of the License, or (at your option) any later version.
63 */
64
afd46503
JP
65#define pr_fmt(fmt) "IPv4: " fmt
66
1da177e4
LT
67#include <linux/module.h>
68#include <asm/uaccess.h>
1da177e4
LT
69#include <linux/bitops.h>
70#include <linux/types.h>
71#include <linux/kernel.h>
1da177e4 72#include <linux/mm.h>
424c4b70 73#include <linux/bootmem.h>
1da177e4
LT
74#include <linux/string.h>
75#include <linux/socket.h>
76#include <linux/sockios.h>
77#include <linux/errno.h>
78#include <linux/in.h>
79#include <linux/inet.h>
80#include <linux/netdevice.h>
81#include <linux/proc_fs.h>
82#include <linux/init.h>
39c90ece 83#include <linux/workqueue.h>
1da177e4 84#include <linux/skbuff.h>
1da177e4
LT
85#include <linux/inetdevice.h>
86#include <linux/igmp.h>
87#include <linux/pkt_sched.h>
88#include <linux/mroute.h>
89#include <linux/netfilter_ipv4.h>
90#include <linux/random.h>
91#include <linux/jhash.h>
92#include <linux/rcupdate.h>
93#include <linux/times.h>
5a0e3ad6 94#include <linux/slab.h>
b9eda06f 95#include <linux/prefetch.h>
352e512c 96#include <net/dst.h>
457c4cbc 97#include <net/net_namespace.h>
1da177e4
LT
98#include <net/protocol.h>
99#include <net/ip.h>
100#include <net/route.h>
101#include <net/inetpeer.h>
102#include <net/sock.h>
103#include <net/ip_fib.h>
104#include <net/arp.h>
105#include <net/tcp.h>
106#include <net/icmp.h>
107#include <net/xfrm.h>
8d71740c 108#include <net/netevent.h>
63f3444f 109#include <net/rtnetlink.h>
1da177e4
LT
110#ifdef CONFIG_SYSCTL
111#include <linux/sysctl.h>
7426a564 112#include <linux/kmemleak.h>
1da177e4 113#endif
6e5714ea 114#include <net/secure_seq.h>
1da177e4 115
68a5e3dd 116#define RT_FL_TOS(oldflp4) \
f61759e6 117 ((oldflp4)->flowi4_tos & (IPTOS_RT_MASK | RTO_ONLINK))
1da177e4
LT
118
119#define IP_MAX_MTU 0xFFF0
120
121#define RT_GC_TIMEOUT (300*HZ)
122
1da177e4 123static int ip_rt_max_size;
817bc4db 124static int ip_rt_gc_timeout __read_mostly = RT_GC_TIMEOUT;
9f28a2fc 125static int ip_rt_gc_interval __read_mostly = 60 * HZ;
817bc4db
SH
126static int ip_rt_gc_min_interval __read_mostly = HZ / 2;
127static int ip_rt_redirect_number __read_mostly = 9;
128static int ip_rt_redirect_load __read_mostly = HZ / 50;
129static int ip_rt_redirect_silence __read_mostly = ((HZ / 50) << (9 + 1));
130static int ip_rt_error_cost __read_mostly = HZ;
131static int ip_rt_error_burst __read_mostly = 5 * HZ;
132static int ip_rt_gc_elasticity __read_mostly = 8;
133static int ip_rt_mtu_expires __read_mostly = 10 * 60 * HZ;
134static int ip_rt_min_pmtu __read_mostly = 512 + 20 + 20;
135static int ip_rt_min_advmss __read_mostly = 256;
1080d709 136static int rt_chain_length_max __read_mostly = 20;
1da177e4 137
9f28a2fc
ED
138static struct delayed_work expires_work;
139static unsigned long expires_ljiffies;
140
1da177e4
LT
141/*
142 * Interface to generic destination cache.
143 */
144
145static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie);
0dbaee3b 146static unsigned int ipv4_default_advmss(const struct dst_entry *dst);
ebb762f2 147static unsigned int ipv4_mtu(const struct dst_entry *dst);
1da177e4 148static void ipv4_dst_destroy(struct dst_entry *dst);
1da177e4
LT
149static struct dst_entry *ipv4_negative_advice(struct dst_entry *dst);
150static void ipv4_link_failure(struct sk_buff *skb);
151static void ip_rt_update_pmtu(struct dst_entry *dst, u32 mtu);
569d3645 152static int rt_garbage_collect(struct dst_ops *ops);
1da177e4 153
72cdd1d9
ED
154static void ipv4_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
155 int how)
156{
157}
1da177e4 158
62fa8a84
DM
159static u32 *ipv4_cow_metrics(struct dst_entry *dst, unsigned long old)
160{
31248731
DM
161 WARN_ON(1);
162 return NULL;
62fa8a84
DM
163}
164
f894cbf8
DM
165static struct neighbour *ipv4_neigh_lookup(const struct dst_entry *dst,
166 struct sk_buff *skb,
167 const void *daddr);
d3aaeb38 168
1da177e4
LT
169static struct dst_ops ipv4_dst_ops = {
170 .family = AF_INET,
09640e63 171 .protocol = cpu_to_be16(ETH_P_IP),
1da177e4
LT
172 .gc = rt_garbage_collect,
173 .check = ipv4_dst_check,
0dbaee3b 174 .default_advmss = ipv4_default_advmss,
ebb762f2 175 .mtu = ipv4_mtu,
62fa8a84 176 .cow_metrics = ipv4_cow_metrics,
1da177e4
LT
177 .destroy = ipv4_dst_destroy,
178 .ifdown = ipv4_dst_ifdown,
179 .negative_advice = ipv4_negative_advice,
180 .link_failure = ipv4_link_failure,
181 .update_pmtu = ip_rt_update_pmtu,
1ac06e03 182 .local_out = __ip_local_out,
d3aaeb38 183 .neigh_lookup = ipv4_neigh_lookup,
1da177e4
LT
184};
185
186#define ECN_OR_COST(class) TC_PRIO_##class
187
4839c52b 188const __u8 ip_tos2prio[16] = {
1da177e4 189 TC_PRIO_BESTEFFORT,
4a2b9c37 190 ECN_OR_COST(BESTEFFORT),
1da177e4
LT
191 TC_PRIO_BESTEFFORT,
192 ECN_OR_COST(BESTEFFORT),
193 TC_PRIO_BULK,
194 ECN_OR_COST(BULK),
195 TC_PRIO_BULK,
196 ECN_OR_COST(BULK),
197 TC_PRIO_INTERACTIVE,
198 ECN_OR_COST(INTERACTIVE),
199 TC_PRIO_INTERACTIVE,
200 ECN_OR_COST(INTERACTIVE),
201 TC_PRIO_INTERACTIVE_BULK,
202 ECN_OR_COST(INTERACTIVE_BULK),
203 TC_PRIO_INTERACTIVE_BULK,
204 ECN_OR_COST(INTERACTIVE_BULK)
205};
d4a96865 206EXPORT_SYMBOL(ip_tos2prio);
1da177e4
LT
207
208/*
209 * Route cache.
210 */
211
212/* The locking scheme is rather straight forward:
213 *
214 * 1) Read-Copy Update protects the buckets of the central route hash.
215 * 2) Only writers remove entries, and they hold the lock
216 * as they look at rtable reference counts.
217 * 3) Only readers acquire references to rtable entries,
218 * they do so with atomic increments and with the
219 * lock held.
220 */
221
222struct rt_hash_bucket {
1c31720a 223 struct rtable __rcu *chain;
22c047cc 224};
1080d709 225
8a25d5de
IM
226#if defined(CONFIG_SMP) || defined(CONFIG_DEBUG_SPINLOCK) || \
227 defined(CONFIG_PROVE_LOCKING)
22c047cc
ED
228/*
229 * Instead of using one spinlock for each rt_hash_bucket, we use a table of spinlocks
230 * The size of this table is a power of two and depends on the number of CPUS.
62051200 231 * (on lockdep we have a quite big spinlock_t, so keep the size down there)
22c047cc 232 */
62051200
IM
233#ifdef CONFIG_LOCKDEP
234# define RT_HASH_LOCK_SZ 256
22c047cc 235#else
62051200
IM
236# if NR_CPUS >= 32
237# define RT_HASH_LOCK_SZ 4096
238# elif NR_CPUS >= 16
239# define RT_HASH_LOCK_SZ 2048
240# elif NR_CPUS >= 8
241# define RT_HASH_LOCK_SZ 1024
242# elif NR_CPUS >= 4
243# define RT_HASH_LOCK_SZ 512
244# else
245# define RT_HASH_LOCK_SZ 256
246# endif
22c047cc
ED
247#endif
248
249static spinlock_t *rt_hash_locks;
250# define rt_hash_lock_addr(slot) &rt_hash_locks[(slot) & (RT_HASH_LOCK_SZ - 1)]
1ff1cc20
PE
251
252static __init void rt_hash_lock_init(void)
253{
254 int i;
255
256 rt_hash_locks = kmalloc(sizeof(spinlock_t) * RT_HASH_LOCK_SZ,
257 GFP_KERNEL);
258 if (!rt_hash_locks)
259 panic("IP: failed to allocate rt_hash_locks\n");
260
261 for (i = 0; i < RT_HASH_LOCK_SZ; i++)
262 spin_lock_init(&rt_hash_locks[i]);
263}
22c047cc
ED
264#else
265# define rt_hash_lock_addr(slot) NULL
1ff1cc20
PE
266
267static inline void rt_hash_lock_init(void)
268{
269}
22c047cc 270#endif
1da177e4 271
817bc4db 272static struct rt_hash_bucket *rt_hash_table __read_mostly;
95c96174 273static unsigned int rt_hash_mask __read_mostly;
817bc4db 274static unsigned int rt_hash_log __read_mostly;
1da177e4 275
2f970d83 276static DEFINE_PER_CPU(struct rt_cache_stat, rt_cache_stat);
27f39c73 277#define RT_CACHE_STAT_INC(field) __this_cpu_inc(rt_cache_stat.field)
1da177e4 278
b00180de 279static inline unsigned int rt_hash(__be32 daddr, __be32 saddr, int idx,
0eae88f3 280 int genid)
1da177e4 281{
0eae88f3 282 return jhash_3words((__force u32)daddr, (__force u32)saddr,
b00180de 283 idx, genid)
29e75252 284 & rt_hash_mask;
1da177e4
LT
285}
286
e84f84f2
DL
287static inline int rt_genid(struct net *net)
288{
289 return atomic_read(&net->ipv4.rt_genid);
290}
291
1da177e4
LT
292#ifdef CONFIG_PROC_FS
293struct rt_cache_iter_state {
a75e936f 294 struct seq_net_private p;
1da177e4 295 int bucket;
29e75252 296 int genid;
1da177e4
LT
297};
298
1218854a 299static struct rtable *rt_cache_get_first(struct seq_file *seq)
1da177e4 300{
1218854a 301 struct rt_cache_iter_state *st = seq->private;
1da177e4 302 struct rtable *r = NULL;
1da177e4
LT
303
304 for (st->bucket = rt_hash_mask; st->bucket >= 0; --st->bucket) {
33d480ce 305 if (!rcu_access_pointer(rt_hash_table[st->bucket].chain))
a6272665 306 continue;
1da177e4 307 rcu_read_lock_bh();
a898def2 308 r = rcu_dereference_bh(rt_hash_table[st->bucket].chain);
29e75252 309 while (r) {
d8d1f30b 310 if (dev_net(r->dst.dev) == seq_file_net(seq) &&
a75e936f 311 r->rt_genid == st->genid)
29e75252 312 return r;
d8d1f30b 313 r = rcu_dereference_bh(r->dst.rt_next);
29e75252 314 }
1da177e4
LT
315 rcu_read_unlock_bh();
316 }
29e75252 317 return r;
1da177e4
LT
318}
319
1218854a 320static struct rtable *__rt_cache_get_next(struct seq_file *seq,
642d6318 321 struct rtable *r)
1da177e4 322{
1218854a 323 struct rt_cache_iter_state *st = seq->private;
a6272665 324
1c31720a 325 r = rcu_dereference_bh(r->dst.rt_next);
1da177e4
LT
326 while (!r) {
327 rcu_read_unlock_bh();
a6272665
ED
328 do {
329 if (--st->bucket < 0)
330 return NULL;
33d480ce 331 } while (!rcu_access_pointer(rt_hash_table[st->bucket].chain));
1da177e4 332 rcu_read_lock_bh();
1c31720a 333 r = rcu_dereference_bh(rt_hash_table[st->bucket].chain);
1da177e4 334 }
1c31720a 335 return r;
1da177e4
LT
336}
337
1218854a 338static struct rtable *rt_cache_get_next(struct seq_file *seq,
642d6318
DL
339 struct rtable *r)
340{
1218854a
YH
341 struct rt_cache_iter_state *st = seq->private;
342 while ((r = __rt_cache_get_next(seq, r)) != NULL) {
d8d1f30b 343 if (dev_net(r->dst.dev) != seq_file_net(seq))
a75e936f 344 continue;
642d6318
DL
345 if (r->rt_genid == st->genid)
346 break;
347 }
348 return r;
349}
350
1218854a 351static struct rtable *rt_cache_get_idx(struct seq_file *seq, loff_t pos)
1da177e4 352{
1218854a 353 struct rtable *r = rt_cache_get_first(seq);
1da177e4
LT
354
355 if (r)
1218854a 356 while (pos && (r = rt_cache_get_next(seq, r)))
1da177e4
LT
357 --pos;
358 return pos ? NULL : r;
359}
360
361static void *rt_cache_seq_start(struct seq_file *seq, loff_t *pos)
362{
29e75252 363 struct rt_cache_iter_state *st = seq->private;
29e75252 364 if (*pos)
1218854a 365 return rt_cache_get_idx(seq, *pos - 1);
e84f84f2 366 st->genid = rt_genid(seq_file_net(seq));
29e75252 367 return SEQ_START_TOKEN;
1da177e4
LT
368}
369
370static void *rt_cache_seq_next(struct seq_file *seq, void *v, loff_t *pos)
371{
29e75252 372 struct rtable *r;
1da177e4
LT
373
374 if (v == SEQ_START_TOKEN)
1218854a 375 r = rt_cache_get_first(seq);
1da177e4 376 else
1218854a 377 r = rt_cache_get_next(seq, v);
1da177e4
LT
378 ++*pos;
379 return r;
380}
381
382static void rt_cache_seq_stop(struct seq_file *seq, void *v)
383{
384 if (v && v != SEQ_START_TOKEN)
385 rcu_read_unlock_bh();
386}
387
388static int rt_cache_seq_show(struct seq_file *seq, void *v)
389{
390 if (v == SEQ_START_TOKEN)
391 seq_printf(seq, "%-127s\n",
392 "Iface\tDestination\tGateway \tFlags\t\tRefCnt\tUse\t"
393 "Metric\tSource\t\tMTU\tWindow\tIRTT\tTOS\tHHRef\t"
394 "HHUptod\tSpecDst");
395 else {
396 struct rtable *r = v;
3c521f2b 397 int len;
218fa90f 398
0eae88f3 399 seq_printf(seq, "%s\t%08X\t%08X\t%8X\t%d\t%u\t%d\t"
794785bf
DM
400 "%08X\t%d\t%u\t%u\t%02X\t%d\t%1d\t%08X%n",
401 r->dst.dev ? r->dst.dev->name : "*",
402 (__force u32)r->rt_dst,
403 (__force u32)r->rt_gateway,
404 r->rt_flags, atomic_read(&r->dst.__refcnt),
405 r->dst.__use, 0, (__force u32)r->rt_src,
406 dst_metric_advmss(&r->dst) + 40,
407 dst_metric(&r->dst, RTAX_WINDOW), 0,
408 r->rt_key_tos,
409 -1, 0, 0, &len);
5e659e4c
PE
410
411 seq_printf(seq, "%*s\n", 127 - len, "");
e905a9ed
YH
412 }
413 return 0;
1da177e4
LT
414}
415
f690808e 416static const struct seq_operations rt_cache_seq_ops = {
1da177e4
LT
417 .start = rt_cache_seq_start,
418 .next = rt_cache_seq_next,
419 .stop = rt_cache_seq_stop,
420 .show = rt_cache_seq_show,
421};
422
423static int rt_cache_seq_open(struct inode *inode, struct file *file)
424{
a75e936f 425 return seq_open_net(inode, file, &rt_cache_seq_ops,
cf7732e4 426 sizeof(struct rt_cache_iter_state));
1da177e4
LT
427}
428
9a32144e 429static const struct file_operations rt_cache_seq_fops = {
1da177e4
LT
430 .owner = THIS_MODULE,
431 .open = rt_cache_seq_open,
432 .read = seq_read,
433 .llseek = seq_lseek,
a75e936f 434 .release = seq_release_net,
1da177e4
LT
435};
436
437
438static void *rt_cpu_seq_start(struct seq_file *seq, loff_t *pos)
439{
440 int cpu;
441
442 if (*pos == 0)
443 return SEQ_START_TOKEN;
444
0f23174a 445 for (cpu = *pos-1; cpu < nr_cpu_ids; ++cpu) {
1da177e4
LT
446 if (!cpu_possible(cpu))
447 continue;
448 *pos = cpu+1;
2f970d83 449 return &per_cpu(rt_cache_stat, cpu);
1da177e4
LT
450 }
451 return NULL;
452}
453
454static void *rt_cpu_seq_next(struct seq_file *seq, void *v, loff_t *pos)
455{
456 int cpu;
457
0f23174a 458 for (cpu = *pos; cpu < nr_cpu_ids; ++cpu) {
1da177e4
LT
459 if (!cpu_possible(cpu))
460 continue;
461 *pos = cpu+1;
2f970d83 462 return &per_cpu(rt_cache_stat, cpu);
1da177e4
LT
463 }
464 return NULL;
e905a9ed 465
1da177e4
LT
466}
467
468static void rt_cpu_seq_stop(struct seq_file *seq, void *v)
469{
470
471}
472
473static int rt_cpu_seq_show(struct seq_file *seq, void *v)
474{
475 struct rt_cache_stat *st = v;
476
477 if (v == SEQ_START_TOKEN) {
5bec0039 478 seq_printf(seq, "entries in_hit in_slow_tot in_slow_mc in_no_route in_brd in_martian_dst in_martian_src out_hit out_slow_tot out_slow_mc gc_total gc_ignored gc_goal_miss gc_dst_overflow in_hlist_search out_hlist_search\n");
1da177e4
LT
479 return 0;
480 }
e905a9ed 481
1da177e4
LT
482 seq_printf(seq,"%08x %08x %08x %08x %08x %08x %08x %08x "
483 " %08x %08x %08x %08x %08x %08x %08x %08x %08x \n",
fc66f95c 484 dst_entries_get_slow(&ipv4_dst_ops),
1da177e4
LT
485 st->in_hit,
486 st->in_slow_tot,
487 st->in_slow_mc,
488 st->in_no_route,
489 st->in_brd,
490 st->in_martian_dst,
491 st->in_martian_src,
492
493 st->out_hit,
494 st->out_slow_tot,
e905a9ed 495 st->out_slow_mc,
1da177e4
LT
496
497 st->gc_total,
498 st->gc_ignored,
499 st->gc_goal_miss,
500 st->gc_dst_overflow,
501 st->in_hlist_search,
502 st->out_hlist_search
503 );
504 return 0;
505}
506
f690808e 507static const struct seq_operations rt_cpu_seq_ops = {
1da177e4
LT
508 .start = rt_cpu_seq_start,
509 .next = rt_cpu_seq_next,
510 .stop = rt_cpu_seq_stop,
511 .show = rt_cpu_seq_show,
512};
513
514
515static int rt_cpu_seq_open(struct inode *inode, struct file *file)
516{
517 return seq_open(file, &rt_cpu_seq_ops);
518}
519
9a32144e 520static const struct file_operations rt_cpu_seq_fops = {
1da177e4
LT
521 .owner = THIS_MODULE,
522 .open = rt_cpu_seq_open,
523 .read = seq_read,
524 .llseek = seq_lseek,
525 .release = seq_release,
526};
527
c7066f70 528#ifdef CONFIG_IP_ROUTE_CLASSID
a661c419 529static int rt_acct_proc_show(struct seq_file *m, void *v)
78c686e9 530{
a661c419
AD
531 struct ip_rt_acct *dst, *src;
532 unsigned int i, j;
533
534 dst = kcalloc(256, sizeof(struct ip_rt_acct), GFP_KERNEL);
535 if (!dst)
536 return -ENOMEM;
537
538 for_each_possible_cpu(i) {
539 src = (struct ip_rt_acct *)per_cpu_ptr(ip_rt_acct, i);
540 for (j = 0; j < 256; j++) {
541 dst[j].o_bytes += src[j].o_bytes;
542 dst[j].o_packets += src[j].o_packets;
543 dst[j].i_bytes += src[j].i_bytes;
544 dst[j].i_packets += src[j].i_packets;
545 }
78c686e9
PE
546 }
547
a661c419
AD
548 seq_write(m, dst, 256 * sizeof(struct ip_rt_acct));
549 kfree(dst);
550 return 0;
551}
78c686e9 552
a661c419
AD
553static int rt_acct_proc_open(struct inode *inode, struct file *file)
554{
555 return single_open(file, rt_acct_proc_show, NULL);
78c686e9 556}
a661c419
AD
557
558static const struct file_operations rt_acct_proc_fops = {
559 .owner = THIS_MODULE,
560 .open = rt_acct_proc_open,
561 .read = seq_read,
562 .llseek = seq_lseek,
563 .release = single_release,
564};
78c686e9 565#endif
107f1634 566
73b38711 567static int __net_init ip_rt_do_proc_init(struct net *net)
107f1634
PE
568{
569 struct proc_dir_entry *pde;
570
571 pde = proc_net_fops_create(net, "rt_cache", S_IRUGO,
572 &rt_cache_seq_fops);
573 if (!pde)
574 goto err1;
575
77020720
WC
576 pde = proc_create("rt_cache", S_IRUGO,
577 net->proc_net_stat, &rt_cpu_seq_fops);
107f1634
PE
578 if (!pde)
579 goto err2;
580
c7066f70 581#ifdef CONFIG_IP_ROUTE_CLASSID
a661c419 582 pde = proc_create("rt_acct", 0, net->proc_net, &rt_acct_proc_fops);
107f1634
PE
583 if (!pde)
584 goto err3;
585#endif
586 return 0;
587
c7066f70 588#ifdef CONFIG_IP_ROUTE_CLASSID
107f1634
PE
589err3:
590 remove_proc_entry("rt_cache", net->proc_net_stat);
591#endif
592err2:
593 remove_proc_entry("rt_cache", net->proc_net);
594err1:
595 return -ENOMEM;
596}
73b38711
DL
597
598static void __net_exit ip_rt_do_proc_exit(struct net *net)
599{
600 remove_proc_entry("rt_cache", net->proc_net_stat);
601 remove_proc_entry("rt_cache", net->proc_net);
c7066f70 602#ifdef CONFIG_IP_ROUTE_CLASSID
73b38711 603 remove_proc_entry("rt_acct", net->proc_net);
0a931acf 604#endif
73b38711
DL
605}
606
607static struct pernet_operations ip_rt_proc_ops __net_initdata = {
608 .init = ip_rt_do_proc_init,
609 .exit = ip_rt_do_proc_exit,
610};
611
612static int __init ip_rt_proc_init(void)
613{
614 return register_pernet_subsys(&ip_rt_proc_ops);
615}
616
107f1634 617#else
73b38711 618static inline int ip_rt_proc_init(void)
107f1634
PE
619{
620 return 0;
621}
1da177e4 622#endif /* CONFIG_PROC_FS */
e905a9ed 623
5969f71d 624static inline void rt_free(struct rtable *rt)
1da177e4 625{
d8d1f30b 626 call_rcu_bh(&rt->dst.rcu_head, dst_rcu_free);
1da177e4
LT
627}
628
5969f71d 629static inline void rt_drop(struct rtable *rt)
1da177e4 630{
1da177e4 631 ip_rt_put(rt);
d8d1f30b 632 call_rcu_bh(&rt->dst.rcu_head, dst_rcu_free);
1da177e4
LT
633}
634
5969f71d 635static inline int rt_fast_clean(struct rtable *rth)
1da177e4
LT
636{
637 /* Kill broadcast/multicast entries very aggresively, if they
638 collide in hash table with more useful entries */
639 return (rth->rt_flags & (RTCF_BROADCAST | RTCF_MULTICAST)) &&
c7537967 640 rt_is_input_route(rth) && rth->dst.rt_next;
1da177e4
LT
641}
642
5969f71d 643static inline int rt_valuable(struct rtable *rth)
1da177e4
LT
644{
645 return (rth->rt_flags & (RTCF_REDIRECTED | RTCF_NOTIFY)) ||
5943634f 646 rth->dst.expires;
1da177e4
LT
647}
648
649static int rt_may_expire(struct rtable *rth, unsigned long tmo1, unsigned long tmo2)
650{
651 unsigned long age;
652 int ret = 0;
653
d8d1f30b 654 if (atomic_read(&rth->dst.__refcnt))
1da177e4
LT
655 goto out;
656
d8d1f30b 657 age = jiffies - rth->dst.lastuse;
1da177e4
LT
658 if ((age <= tmo1 && !rt_fast_clean(rth)) ||
659 (age <= tmo2 && rt_valuable(rth)))
660 goto out;
661 ret = 1;
662out: return ret;
663}
664
665/* Bits of score are:
666 * 31: very valuable
667 * 30: not quite useless
668 * 29..0: usage counter
669 */
670static inline u32 rt_score(struct rtable *rt)
671{
d8d1f30b 672 u32 score = jiffies - rt->dst.lastuse;
1da177e4
LT
673
674 score = ~score & ~(3<<30);
675
676 if (rt_valuable(rt))
677 score |= (1<<31);
678
c7537967 679 if (rt_is_output_route(rt) ||
1da177e4
LT
680 !(rt->rt_flags & (RTCF_BROADCAST|RTCF_MULTICAST|RTCF_LOCAL)))
681 score |= (1<<30);
682
683 return score;
684}
685
1080d709
NH
686static inline bool rt_caching(const struct net *net)
687{
688 return net->ipv4.current_rt_cache_rebuild_count <=
689 net->ipv4.sysctl_rt_cache_rebuild_count;
690}
691
5e2b61f7
DM
692static inline bool compare_hash_inputs(const struct rtable *rt1,
693 const struct rtable *rt2)
1080d709 694{
5e2b61f7
DM
695 return ((((__force u32)rt1->rt_key_dst ^ (__force u32)rt2->rt_key_dst) |
696 ((__force u32)rt1->rt_key_src ^ (__force u32)rt2->rt_key_src) |
97a80410 697 (rt1->rt_route_iif ^ rt2->rt_route_iif)) == 0);
1080d709
NH
698}
699
5e2b61f7 700static inline int compare_keys(struct rtable *rt1, struct rtable *rt2)
1da177e4 701{
5e2b61f7
DM
702 return (((__force u32)rt1->rt_key_dst ^ (__force u32)rt2->rt_key_dst) |
703 ((__force u32)rt1->rt_key_src ^ (__force u32)rt2->rt_key_src) |
704 (rt1->rt_mark ^ rt2->rt_mark) |
475949d8 705 (rt1->rt_key_tos ^ rt2->rt_key_tos) |
d547f727 706 (rt1->rt_route_iif ^ rt2->rt_route_iif) |
97a80410 707 (rt1->rt_oif ^ rt2->rt_oif)) == 0;
1da177e4
LT
708}
709
b5921910
DL
710static inline int compare_netns(struct rtable *rt1, struct rtable *rt2)
711{
d8d1f30b 712 return net_eq(dev_net(rt1->dst.dev), dev_net(rt2->dst.dev));
b5921910
DL
713}
714
e84f84f2
DL
715static inline int rt_is_expired(struct rtable *rth)
716{
d8d1f30b 717 return rth->rt_genid != rt_genid(dev_net(rth->dst.dev));
e84f84f2
DL
718}
719
beb659bd
ED
720/*
721 * Perform a full scan of hash table and free all entries.
722 * Can be called by a softirq or a process.
723 * In the later case, we want to be reschedule if necessary
724 */
6561a3b1 725static void rt_do_flush(struct net *net, int process_context)
beb659bd
ED
726{
727 unsigned int i;
728 struct rtable *rth, *next;
729
730 for (i = 0; i <= rt_hash_mask; i++) {
6561a3b1
DM
731 struct rtable __rcu **pprev;
732 struct rtable *list;
733
beb659bd
ED
734 if (process_context && need_resched())
735 cond_resched();
33d480ce 736 rth = rcu_access_pointer(rt_hash_table[i].chain);
beb659bd
ED
737 if (!rth)
738 continue;
739
740 spin_lock_bh(rt_hash_lock_addr(i));
32cb5b4e 741
6561a3b1
DM
742 list = NULL;
743 pprev = &rt_hash_table[i].chain;
744 rth = rcu_dereference_protected(*pprev,
1c31720a 745 lockdep_is_held(rt_hash_lock_addr(i)));
32cb5b4e 746
6561a3b1
DM
747 while (rth) {
748 next = rcu_dereference_protected(rth->dst.rt_next,
1c31720a 749 lockdep_is_held(rt_hash_lock_addr(i)));
6561a3b1
DM
750
751 if (!net ||
752 net_eq(dev_net(rth->dst.dev), net)) {
753 rcu_assign_pointer(*pprev, next);
754 rcu_assign_pointer(rth->dst.rt_next, list);
755 list = rth;
32cb5b4e 756 } else {
6561a3b1 757 pprev = &rth->dst.rt_next;
32cb5b4e 758 }
6561a3b1 759 rth = next;
32cb5b4e 760 }
6561a3b1 761
beb659bd
ED
762 spin_unlock_bh(rt_hash_lock_addr(i));
763
6561a3b1
DM
764 for (; list; list = next) {
765 next = rcu_dereference_protected(list->dst.rt_next, 1);
766 rt_free(list);
beb659bd
ED
767 }
768 }
769}
770
1080d709
NH
771/*
772 * While freeing expired entries, we compute average chain length
773 * and standard deviation, using fixed-point arithmetic.
774 * This to have an estimation of rt_chain_length_max
775 * rt_chain_length_max = max(elasticity, AVG + 4*SD)
776 * We use 3 bits for frational part, and 29 (or 61) for magnitude.
777 */
778
779#define FRACT_BITS 3
780#define ONE (1UL << FRACT_BITS)
781
98376387
ED
782/*
783 * Given a hash chain and an item in this hash chain,
784 * find if a previous entry has the same hash_inputs
785 * (but differs on tos, mark or oif)
786 * Returns 0 if an alias is found.
787 * Returns ONE if rth has no alias before itself.
788 */
789static int has_noalias(const struct rtable *head, const struct rtable *rth)
790{
791 const struct rtable *aux = head;
792
793 while (aux != rth) {
5e2b61f7 794 if (compare_hash_inputs(aux, rth))
98376387 795 return 0;
1c31720a 796 aux = rcu_dereference_protected(aux->dst.rt_next, 1);
98376387
ED
797 }
798 return ONE;
799}
800
9f28a2fc
ED
801static void rt_check_expire(void)
802{
803 static unsigned int rover;
804 unsigned int i = rover, goal;
805 struct rtable *rth;
806 struct rtable __rcu **rthp;
807 unsigned long samples = 0;
808 unsigned long sum = 0, sum2 = 0;
809 unsigned long delta;
810 u64 mult;
811
812 delta = jiffies - expires_ljiffies;
813 expires_ljiffies = jiffies;
814 mult = ((u64)delta) << rt_hash_log;
815 if (ip_rt_gc_timeout > 1)
816 do_div(mult, ip_rt_gc_timeout);
817 goal = (unsigned int)mult;
818 if (goal > rt_hash_mask)
819 goal = rt_hash_mask + 1;
820 for (; goal > 0; goal--) {
821 unsigned long tmo = ip_rt_gc_timeout;
822 unsigned long length;
823
824 i = (i + 1) & rt_hash_mask;
825 rthp = &rt_hash_table[i].chain;
826
827 if (need_resched())
828 cond_resched();
829
830 samples++;
831
832 if (rcu_dereference_raw(*rthp) == NULL)
833 continue;
834 length = 0;
835 spin_lock_bh(rt_hash_lock_addr(i));
836 while ((rth = rcu_dereference_protected(*rthp,
837 lockdep_is_held(rt_hash_lock_addr(i)))) != NULL) {
838 prefetch(rth->dst.rt_next);
df67e6c9
DM
839 if (rt_is_expired(rth) ||
840 rt_may_expire(rth, tmo, ip_rt_gc_timeout)) {
9f28a2fc
ED
841 *rthp = rth->dst.rt_next;
842 rt_free(rth);
843 continue;
844 }
df67e6c9
DM
845
846 /* We only count entries on a chain with equal
847 * hash inputs once so that entries for
848 * different QOS levels, and other non-hash
849 * input attributes don't unfairly skew the
850 * length computation
851 */
852 tmo >>= 1;
853 rthp = &rth->dst.rt_next;
854 length += has_noalias(rt_hash_table[i].chain, rth);
9f28a2fc
ED
855 }
856 spin_unlock_bh(rt_hash_lock_addr(i));
857 sum += length;
858 sum2 += length*length;
859 }
860 if (samples) {
861 unsigned long avg = sum / samples;
862 unsigned long sd = int_sqrt(sum2 / samples - avg*avg);
863 rt_chain_length_max = max_t(unsigned long,
864 ip_rt_gc_elasticity,
865 (avg + 4*sd) >> FRACT_BITS);
866 }
867 rover = i;
868}
869
870/*
871 * rt_worker_func() is run in process context.
872 * we call rt_check_expire() to scan part of the hash table
873 */
874static void rt_worker_func(struct work_struct *work)
875{
876 rt_check_expire();
877 schedule_delayed_work(&expires_work, ip_rt_gc_interval);
878}
879
29e75252 880/*
25985edc 881 * Perturbation of rt_genid by a small quantity [1..256]
29e75252
ED
882 * Using 8 bits of shuffling ensure we can call rt_cache_invalidate()
883 * many times (2^24) without giving recent rt_genid.
884 * Jenkins hash is strong enough that litle changes of rt_genid are OK.
1da177e4 885 */
86c657f6 886static void rt_cache_invalidate(struct net *net)
1da177e4 887{
29e75252 888 unsigned char shuffle;
1da177e4 889
29e75252 890 get_random_bytes(&shuffle, sizeof(shuffle));
e84f84f2 891 atomic_add(shuffle + 1U, &net->ipv4.rt_genid);
b48c80ec 892 inetpeer_invalidate_family(AF_INET);
1da177e4
LT
893}
894
29e75252
ED
895/*
896 * delay < 0 : invalidate cache (fast : entries will be deleted later)
897 * delay >= 0 : invalidate & flush cache (can be long)
898 */
76e6ebfb 899void rt_cache_flush(struct net *net, int delay)
1da177e4 900{
86c657f6 901 rt_cache_invalidate(net);
29e75252 902 if (delay >= 0)
6561a3b1 903 rt_do_flush(net, !in_softirq());
1da177e4
LT
904}
905
a5ee1551 906/* Flush previous cache invalidated entries from the cache */
6561a3b1 907void rt_cache_flush_batch(struct net *net)
a5ee1551 908{
6561a3b1 909 rt_do_flush(net, !in_softirq());
a5ee1551
EB
910}
911
1080d709
NH
912static void rt_emergency_hash_rebuild(struct net *net)
913{
e87cc472 914 net_warn_ratelimited("Route hash chain too long!\n");
3ee94372 915 rt_cache_invalidate(net);
1080d709
NH
916}
917
1da177e4
LT
918/*
919 Short description of GC goals.
920
921 We want to build algorithm, which will keep routing cache
922 at some equilibrium point, when number of aged off entries
923 is kept approximately equal to newly generated ones.
924
925 Current expiration strength is variable "expire".
926 We try to adjust it dynamically, so that if networking
927 is idle expires is large enough to keep enough of warm entries,
928 and when load increases it reduces to limit cache size.
929 */
930
569d3645 931static int rt_garbage_collect(struct dst_ops *ops)
1da177e4
LT
932{
933 static unsigned long expire = RT_GC_TIMEOUT;
934 static unsigned long last_gc;
935 static int rover;
936 static int equilibrium;
1c31720a
ED
937 struct rtable *rth;
938 struct rtable __rcu **rthp;
1da177e4
LT
939 unsigned long now = jiffies;
940 int goal;
fc66f95c 941 int entries = dst_entries_get_fast(&ipv4_dst_ops);
1da177e4
LT
942
943 /*
944 * Garbage collection is pretty expensive,
945 * do not make it too frequently.
946 */
947
948 RT_CACHE_STAT_INC(gc_total);
949
950 if (now - last_gc < ip_rt_gc_min_interval &&
fc66f95c 951 entries < ip_rt_max_size) {
1da177e4
LT
952 RT_CACHE_STAT_INC(gc_ignored);
953 goto out;
954 }
955
fc66f95c 956 entries = dst_entries_get_slow(&ipv4_dst_ops);
1da177e4 957 /* Calculate number of entries, which we want to expire now. */
fc66f95c 958 goal = entries - (ip_rt_gc_elasticity << rt_hash_log);
1da177e4
LT
959 if (goal <= 0) {
960 if (equilibrium < ipv4_dst_ops.gc_thresh)
961 equilibrium = ipv4_dst_ops.gc_thresh;
fc66f95c 962 goal = entries - equilibrium;
1da177e4 963 if (goal > 0) {
b790cedd 964 equilibrium += min_t(unsigned int, goal >> 1, rt_hash_mask + 1);
fc66f95c 965 goal = entries - equilibrium;
1da177e4
LT
966 }
967 } else {
968 /* We are in dangerous area. Try to reduce cache really
969 * aggressively.
970 */
b790cedd 971 goal = max_t(unsigned int, goal >> 1, rt_hash_mask + 1);
fc66f95c 972 equilibrium = entries - goal;
1da177e4
LT
973 }
974
975 if (now - last_gc >= ip_rt_gc_min_interval)
976 last_gc = now;
977
978 if (goal <= 0) {
979 equilibrium += goal;
980 goto work_done;
981 }
982
983 do {
984 int i, k;
985
986 for (i = rt_hash_mask, k = rover; i >= 0; i--) {
987 unsigned long tmo = expire;
988
989 k = (k + 1) & rt_hash_mask;
990 rthp = &rt_hash_table[k].chain;
22c047cc 991 spin_lock_bh(rt_hash_lock_addr(k));
1c31720a
ED
992 while ((rth = rcu_dereference_protected(*rthp,
993 lockdep_is_held(rt_hash_lock_addr(k)))) != NULL) {
e84f84f2 994 if (!rt_is_expired(rth) &&
29e75252 995 !rt_may_expire(rth, tmo, expire)) {
1da177e4 996 tmo >>= 1;
d8d1f30b 997 rthp = &rth->dst.rt_next;
1da177e4
LT
998 continue;
999 }
d8d1f30b 1000 *rthp = rth->dst.rt_next;
1da177e4
LT
1001 rt_free(rth);
1002 goal--;
1da177e4 1003 }
22c047cc 1004 spin_unlock_bh(rt_hash_lock_addr(k));
1da177e4
LT
1005 if (goal <= 0)
1006 break;
1007 }
1008 rover = k;
1009
1010 if (goal <= 0)
1011 goto work_done;
1012
1013 /* Goal is not achieved. We stop process if:
1014
1015 - if expire reduced to zero. Otherwise, expire is halfed.
1016 - if table is not full.
1017 - if we are called from interrupt.
1018 - jiffies check is just fallback/debug loop breaker.
1019 We will not spin here for long time in any case.
1020 */
1021
1022 RT_CACHE_STAT_INC(gc_goal_miss);
1023
1024 if (expire == 0)
1025 break;
1026
1027 expire >>= 1;
1da177e4 1028
fc66f95c 1029 if (dst_entries_get_fast(&ipv4_dst_ops) < ip_rt_max_size)
1da177e4
LT
1030 goto out;
1031 } while (!in_softirq() && time_before_eq(jiffies, now));
1032
fc66f95c
ED
1033 if (dst_entries_get_fast(&ipv4_dst_ops) < ip_rt_max_size)
1034 goto out;
1035 if (dst_entries_get_slow(&ipv4_dst_ops) < ip_rt_max_size)
1da177e4 1036 goto out;
e87cc472 1037 net_warn_ratelimited("dst cache overflow\n");
1da177e4
LT
1038 RT_CACHE_STAT_INC(gc_dst_overflow);
1039 return 1;
1040
1041work_done:
1042 expire += ip_rt_gc_min_interval;
1043 if (expire > ip_rt_gc_timeout ||
fc66f95c
ED
1044 dst_entries_get_fast(&ipv4_dst_ops) < ipv4_dst_ops.gc_thresh ||
1045 dst_entries_get_slow(&ipv4_dst_ops) < ipv4_dst_ops.gc_thresh)
1da177e4 1046 expire = ip_rt_gc_timeout;
1da177e4
LT
1047out: return 0;
1048}
1049
98376387
ED
1050/*
1051 * Returns number of entries in a hash chain that have different hash_inputs
1052 */
1053static int slow_chain_length(const struct rtable *head)
1054{
1055 int length = 0;
1056 const struct rtable *rth = head;
1057
1058 while (rth) {
1059 length += has_noalias(head, rth);
1c31720a 1060 rth = rcu_dereference_protected(rth->dst.rt_next, 1);
98376387
ED
1061 }
1062 return length >> FRACT_BITS;
1063}
1064
f894cbf8
DM
1065static struct neighbour *ipv4_neigh_lookup(const struct dst_entry *dst,
1066 struct sk_buff *skb,
1067 const void *daddr)
3769cffb 1068{
d3aaeb38
DM
1069 struct net_device *dev = dst->dev;
1070 const __be32 *pkey = daddr;
39232973 1071 const struct rtable *rt;
3769cffb
DM
1072 struct neighbour *n;
1073
39232973 1074 rt = (const struct rtable *) dst;
a263b309 1075 if (rt->rt_gateway)
39232973 1076 pkey = (const __be32 *) &rt->rt_gateway;
f894cbf8
DM
1077 else if (skb)
1078 pkey = &ip_hdr(skb)->daddr;
d3aaeb38 1079
80703d26 1080 n = __ipv4_neigh_lookup(dev, *(__force u32 *)pkey);
d3aaeb38
DM
1081 if (n)
1082 return n;
32092ecf 1083 return neigh_create(&arp_tbl, pkey, dev);
d3aaeb38
DM
1084}
1085
95c96174 1086static struct rtable *rt_intern_hash(unsigned int hash, struct rtable *rt,
b23dd4fe 1087 struct sk_buff *skb, int ifindex)
1da177e4 1088{
1c31720a
ED
1089 struct rtable *rth, *cand;
1090 struct rtable __rcu **rthp, **candp;
1da177e4 1091 unsigned long now;
1da177e4
LT
1092 u32 min_score;
1093 int chain_length;
1da177e4
LT
1094
1095restart:
1096 chain_length = 0;
1097 min_score = ~(u32)0;
1098 cand = NULL;
1099 candp = NULL;
1100 now = jiffies;
1101
7586eceb 1102 if (!rt_caching(dev_net(rt->dst.dev)) || (rt->dst.flags & DST_NOCACHE)) {
73e42897
NH
1103 /*
1104 * If we're not caching, just tell the caller we
1105 * were successful and don't touch the route. The
1106 * caller hold the sole reference to the cache entry, and
1107 * it will be released when the caller is done with it.
1108 * If we drop it here, the callers have no way to resolve routes
1109 * when we're not caching. Instead, just point *rp at rt, so
1110 * the caller gets a single use out of the route
b6280b47
NH
1111 * Note that we do rt_free on this new route entry, so that
1112 * once its refcount hits zero, we are still able to reap it
1113 * (Thanks Alexey)
27b75c95
ED
1114 * Note: To avoid expensive rcu stuff for this uncached dst,
1115 * we set DST_NOCACHE so that dst_release() can free dst without
1116 * waiting a grace period.
73e42897 1117 */
b6280b47 1118
c7d4426a 1119 rt->dst.flags |= DST_NOCACHE;
b6280b47 1120 goto skip_hashing;
1080d709
NH
1121 }
1122
1da177e4
LT
1123 rthp = &rt_hash_table[hash].chain;
1124
22c047cc 1125 spin_lock_bh(rt_hash_lock_addr(hash));
1c31720a
ED
1126 while ((rth = rcu_dereference_protected(*rthp,
1127 lockdep_is_held(rt_hash_lock_addr(hash)))) != NULL) {
e84f84f2 1128 if (rt_is_expired(rth)) {
d8d1f30b 1129 *rthp = rth->dst.rt_next;
29e75252
ED
1130 rt_free(rth);
1131 continue;
1132 }
5e2b61f7 1133 if (compare_keys(rth, rt) && compare_netns(rth, rt)) {
1da177e4 1134 /* Put it first */
d8d1f30b 1135 *rthp = rth->dst.rt_next;
1da177e4
LT
1136 /*
1137 * Since lookup is lockfree, the deletion
1138 * must be visible to another weakly ordered CPU before
1139 * the insertion at the start of the hash chain.
1140 */
d8d1f30b 1141 rcu_assign_pointer(rth->dst.rt_next,
1da177e4
LT
1142 rt_hash_table[hash].chain);
1143 /*
1144 * Since lookup is lockfree, the update writes
1145 * must be ordered for consistency on SMP.
1146 */
1147 rcu_assign_pointer(rt_hash_table[hash].chain, rth);
1148
d8d1f30b 1149 dst_use(&rth->dst, now);
22c047cc 1150 spin_unlock_bh(rt_hash_lock_addr(hash));
1da177e4
LT
1151
1152 rt_drop(rt);
b23dd4fe 1153 if (skb)
d8d1f30b 1154 skb_dst_set(skb, &rth->dst);
b23dd4fe 1155 return rth;
1da177e4
LT
1156 }
1157
d8d1f30b 1158 if (!atomic_read(&rth->dst.__refcnt)) {
1da177e4
LT
1159 u32 score = rt_score(rth);
1160
1161 if (score <= min_score) {
1162 cand = rth;
1163 candp = rthp;
1164 min_score = score;
1165 }
1166 }
1167
1168 chain_length++;
1169
d8d1f30b 1170 rthp = &rth->dst.rt_next;
1da177e4
LT
1171 }
1172
1173 if (cand) {
1174 /* ip_rt_gc_elasticity used to be average length of chain
1175 * length, when exceeded gc becomes really aggressive.
1176 *
1177 * The second limit is less certain. At the moment it allows
1178 * only 2 entries per bucket. We will see.
1179 */
1180 if (chain_length > ip_rt_gc_elasticity) {
d8d1f30b 1181 *candp = cand->dst.rt_next;
1da177e4
LT
1182 rt_free(cand);
1183 }
1080d709 1184 } else {
98376387
ED
1185 if (chain_length > rt_chain_length_max &&
1186 slow_chain_length(rt_hash_table[hash].chain) > rt_chain_length_max) {
d8d1f30b 1187 struct net *net = dev_net(rt->dst.dev);
1080d709 1188 int num = ++net->ipv4.current_rt_cache_rebuild_count;
b35ecb5d 1189 if (!rt_caching(net)) {
058bd4d2 1190 pr_warn("%s: %d rebuilds is over limit, route caching disabled\n",
d8d1f30b 1191 rt->dst.dev->name, num);
1080d709 1192 }
b35ecb5d 1193 rt_emergency_hash_rebuild(net);
6a2bad70
PE
1194 spin_unlock_bh(rt_hash_lock_addr(hash));
1195
5e2b61f7 1196 hash = rt_hash(rt->rt_key_dst, rt->rt_key_src,
6a2bad70
PE
1197 ifindex, rt_genid(net));
1198 goto restart;
1080d709 1199 }
1da177e4
LT
1200 }
1201
d8d1f30b 1202 rt->dst.rt_next = rt_hash_table[hash].chain;
1080d709 1203
00269b54
ED
1204 /*
1205 * Since lookup is lockfree, we must make sure
25985edc 1206 * previous writes to rt are committed to memory
00269b54
ED
1207 * before making rt visible to other CPUS.
1208 */
1ddbcb00 1209 rcu_assign_pointer(rt_hash_table[hash].chain, rt);
1080d709 1210
22c047cc 1211 spin_unlock_bh(rt_hash_lock_addr(hash));
73e42897 1212
b6280b47 1213skip_hashing:
b23dd4fe 1214 if (skb)
d8d1f30b 1215 skb_dst_set(skb, &rt->dst);
b23dd4fe 1216 return rt;
1da177e4
LT
1217}
1218
a48eff12 1219void rt_bind_peer(struct rtable *rt, __be32 daddr, int create)
1da177e4 1220{
97bab73f 1221 struct inet_peer_base *base;
1da177e4
LT
1222 struct inet_peer *peer;
1223
97bab73f
DM
1224 base = inetpeer_base_ptr(rt->_peer);
1225 if (!base)
1226 return;
1227
1228 peer = inet_getpeer_v4(base, daddr, create);
7b34ca2a
DM
1229 if (peer) {
1230 if (!rt_set_peer(rt, peer))
1231 inet_putpeer(peer);
7b34ca2a 1232 }
1da177e4
LT
1233}
1234
1235/*
1236 * Peer allocation may fail only in serious out-of-memory conditions. However
1237 * we still can generate some output.
1238 * Random ID selection looks a bit dangerous because we have no chances to
1239 * select ID being unique in a reasonable period of time.
1240 * But broken packet identifier may be better than no packet at all.
1241 */
1242static void ip_select_fb_ident(struct iphdr *iph)
1243{
1244 static DEFINE_SPINLOCK(ip_fb_id_lock);
1245 static u32 ip_fallback_id;
1246 u32 salt;
1247
1248 spin_lock_bh(&ip_fb_id_lock);
e448515c 1249 salt = secure_ip_id((__force __be32)ip_fallback_id ^ iph->daddr);
1da177e4
LT
1250 iph->id = htons(salt & 0xFFFF);
1251 ip_fallback_id = salt;
1252 spin_unlock_bh(&ip_fb_id_lock);
1253}
1254
1255void __ip_select_ident(struct iphdr *iph, struct dst_entry *dst, int more)
1256{
1d861aa4
DM
1257 struct net *net = dev_net(dst->dev);
1258 struct inet_peer *peer;
1da177e4 1259
1d861aa4
DM
1260 peer = inet_getpeer_v4(net->ipv4.peers, iph->daddr, 1);
1261 if (peer) {
1262 iph->id = htons(inet_getid(peer, more));
1263 inet_putpeer(peer);
1264 return;
1265 }
1da177e4
LT
1266
1267 ip_select_fb_ident(iph);
1268}
4bc2f18b 1269EXPORT_SYMBOL(__ip_select_ident);
1da177e4 1270
95c96174 1271static void rt_del(unsigned int hash, struct rtable *rt)
1da177e4 1272{
1c31720a
ED
1273 struct rtable __rcu **rthp;
1274 struct rtable *aux;
1da177e4 1275
29e75252 1276 rthp = &rt_hash_table[hash].chain;
22c047cc 1277 spin_lock_bh(rt_hash_lock_addr(hash));
1da177e4 1278 ip_rt_put(rt);
1c31720a
ED
1279 while ((aux = rcu_dereference_protected(*rthp,
1280 lockdep_is_held(rt_hash_lock_addr(hash)))) != NULL) {
e84f84f2 1281 if (aux == rt || rt_is_expired(aux)) {
d8d1f30b 1282 *rthp = aux->dst.rt_next;
29e75252
ED
1283 rt_free(aux);
1284 continue;
1da177e4 1285 }
d8d1f30b 1286 rthp = &aux->dst.rt_next;
29e75252 1287 }
22c047cc 1288 spin_unlock_bh(rt_hash_lock_addr(hash));
1da177e4
LT
1289}
1290
ed7865a4 1291/* called in rcu_read_lock() section */
f7655229
AV
1292void ip_rt_redirect(__be32 old_gw, __be32 daddr, __be32 new_gw,
1293 __be32 saddr, struct net_device *dev)
1da177e4 1294{
7cc9150e 1295 int s, i;
ed7865a4 1296 struct in_device *in_dev = __in_dev_get_rcu(dev);
7cc9150e
FL
1297 __be32 skeys[2] = { saddr, 0 };
1298 int ikeys[2] = { dev->ifindex, 0 };
317805b8 1299 struct net *net;
1da177e4 1300
1da177e4
LT
1301 if (!in_dev)
1302 return;
1303
c346dca1 1304 net = dev_net(dev);
9d4fb27d
JP
1305 if (new_gw == old_gw || !IN_DEV_RX_REDIRECTS(in_dev) ||
1306 ipv4_is_multicast(new_gw) || ipv4_is_lbcast(new_gw) ||
1307 ipv4_is_zeronet(new_gw))
1da177e4
LT
1308 goto reject_redirect;
1309
1310 if (!IN_DEV_SHARED_MEDIA(in_dev)) {
1311 if (!inet_addr_onlink(in_dev, new_gw, old_gw))
1312 goto reject_redirect;
1313 if (IN_DEV_SEC_REDIRECTS(in_dev) && ip_fib_check_default(new_gw, dev))
1314 goto reject_redirect;
1315 } else {
317805b8 1316 if (inet_addr_type(net, new_gw) != RTN_UNICAST)
1da177e4
LT
1317 goto reject_redirect;
1318 }
1319
7cc9150e
FL
1320 for (s = 0; s < 2; s++) {
1321 for (i = 0; i < 2; i++) {
9cc20b26
ED
1322 unsigned int hash;
1323 struct rtable __rcu **rthp;
1324 struct rtable *rt;
1325
1326 hash = rt_hash(daddr, skeys[s], ikeys[i], rt_genid(net));
1327
1328 rthp = &rt_hash_table[hash].chain;
1329
1330 while ((rt = rcu_dereference(*rthp)) != NULL) {
5943634f
DM
1331 struct neighbour *n;
1332
9cc20b26
ED
1333 rthp = &rt->dst.rt_next;
1334
1335 if (rt->rt_key_dst != daddr ||
1336 rt->rt_key_src != skeys[s] ||
1337 rt->rt_oif != ikeys[i] ||
1338 rt_is_input_route(rt) ||
1339 rt_is_expired(rt) ||
1340 !net_eq(dev_net(rt->dst.dev), net) ||
1341 rt->dst.error ||
1342 rt->dst.dev != dev ||
1343 rt->rt_gateway != old_gw)
1344 continue;
e905a9ed 1345
5943634f
DM
1346 n = ipv4_neigh_lookup(&rt->dst, NULL, &new_gw);
1347 if (n) {
1348 if (!(n->nud_state & NUD_VALID)) {
1349 neigh_event_send(n, NULL);
1350 } else {
1351 rt->rt_gateway = new_gw;
1352 rt->rt_flags |= RTCF_REDIRECTED;
1353 call_netevent_notifiers(NETEVENT_NEIGH_UPDATE, n);
9cc20b26 1354 }
5943634f 1355 neigh_release(n);
9cc20b26 1356 }
7cc9150e 1357 }
7cc9150e 1358 }
1da177e4 1359 }
1da177e4
LT
1360 return;
1361
1362reject_redirect:
1363#ifdef CONFIG_IP_ROUTE_VERBOSE
e87cc472
JP
1364 if (IN_DEV_LOG_MARTIANS(in_dev))
1365 net_info_ratelimited("Redirect from %pI4 on %s about %pI4 ignored\n"
1366 " Advised path = %pI4 -> %pI4\n",
1367 &old_gw, dev->name, &new_gw,
1368 &saddr, &daddr);
1da177e4 1369#endif
ed7865a4 1370 ;
1da177e4
LT
1371}
1372
1373static struct dst_entry *ipv4_negative_advice(struct dst_entry *dst)
1374{
ee6b9673 1375 struct rtable *rt = (struct rtable *)dst;
1da177e4
LT
1376 struct dst_entry *ret = dst;
1377
1378 if (rt) {
d11a4dc1 1379 if (dst->obsolete > 0) {
1da177e4
LT
1380 ip_rt_put(rt);
1381 ret = NULL;
5943634f
DM
1382 } else if ((rt->rt_flags & RTCF_REDIRECTED) ||
1383 rt->dst.expires) {
95c96174 1384 unsigned int hash = rt_hash(rt->rt_key_dst, rt->rt_key_src,
5e2b61f7 1385 rt->rt_oif,
e84f84f2 1386 rt_genid(dev_net(dst->dev)));
1da177e4
LT
1387 rt_del(hash, rt);
1388 ret = NULL;
1389 }
1390 }
1391 return ret;
1392}
1393
1394/*
1395 * Algorithm:
1396 * 1. The first ip_rt_redirect_number redirects are sent
1397 * with exponential backoff, then we stop sending them at all,
1398 * assuming that the host ignores our redirects.
1399 * 2. If we did not see packets requiring redirects
1400 * during ip_rt_redirect_silence, we assume that the host
1401 * forgot redirected route and start to send redirects again.
1402 *
1403 * This algorithm is much cheaper and more intelligent than dumb load limiting
1404 * in icmp.c.
1405 *
1406 * NOTE. Do not forget to inhibit load limiting for redirects (redundant)
1407 * and "frag. need" (breaks PMTU discovery) in icmp.c.
1408 */
1409
1410void ip_rt_send_redirect(struct sk_buff *skb)
1411{
511c3f92 1412 struct rtable *rt = skb_rtable(skb);
30038fc6 1413 struct in_device *in_dev;
92d86829 1414 struct inet_peer *peer;
1d861aa4 1415 struct net *net;
30038fc6 1416 int log_martians;
1da177e4 1417
30038fc6 1418 rcu_read_lock();
d8d1f30b 1419 in_dev = __in_dev_get_rcu(rt->dst.dev);
30038fc6
ED
1420 if (!in_dev || !IN_DEV_TX_REDIRECTS(in_dev)) {
1421 rcu_read_unlock();
1da177e4 1422 return;
30038fc6
ED
1423 }
1424 log_martians = IN_DEV_LOG_MARTIANS(in_dev);
1425 rcu_read_unlock();
1da177e4 1426
1d861aa4
DM
1427 net = dev_net(rt->dst.dev);
1428 peer = inet_getpeer_v4(net->ipv4.peers, ip_hdr(skb)->saddr, 1);
92d86829
DM
1429 if (!peer) {
1430 icmp_send(skb, ICMP_REDIRECT, ICMP_REDIR_HOST, rt->rt_gateway);
1431 return;
1432 }
1433
1da177e4
LT
1434 /* No redirected packets during ip_rt_redirect_silence;
1435 * reset the algorithm.
1436 */
92d86829
DM
1437 if (time_after(jiffies, peer->rate_last + ip_rt_redirect_silence))
1438 peer->rate_tokens = 0;
1da177e4
LT
1439
1440 /* Too many ignored redirects; do not send anything
d8d1f30b 1441 * set dst.rate_last to the last seen redirected packet.
1da177e4 1442 */
92d86829
DM
1443 if (peer->rate_tokens >= ip_rt_redirect_number) {
1444 peer->rate_last = jiffies;
1d861aa4 1445 goto out_put_peer;
1da177e4
LT
1446 }
1447
1448 /* Check for load limit; set rate_last to the latest sent
1449 * redirect.
1450 */
92d86829 1451 if (peer->rate_tokens == 0 ||
14fb8a76 1452 time_after(jiffies,
92d86829
DM
1453 (peer->rate_last +
1454 (ip_rt_redirect_load << peer->rate_tokens)))) {
1da177e4 1455 icmp_send(skb, ICMP_REDIRECT, ICMP_REDIR_HOST, rt->rt_gateway);
92d86829
DM
1456 peer->rate_last = jiffies;
1457 ++peer->rate_tokens;
1da177e4 1458#ifdef CONFIG_IP_ROUTE_VERBOSE
30038fc6 1459 if (log_martians &&
e87cc472
JP
1460 peer->rate_tokens == ip_rt_redirect_number)
1461 net_warn_ratelimited("host %pI4/if%d ignores redirects for %pI4 to %pI4\n",
1462 &ip_hdr(skb)->saddr, rt->rt_iif,
1463 &rt->rt_dst, &rt->rt_gateway);
1da177e4
LT
1464#endif
1465 }
1d861aa4
DM
1466out_put_peer:
1467 inet_putpeer(peer);
1da177e4
LT
1468}
1469
1470static int ip_error(struct sk_buff *skb)
1471{
251da413 1472 struct in_device *in_dev = __in_dev_get_rcu(skb->dev);
511c3f92 1473 struct rtable *rt = skb_rtable(skb);
92d86829 1474 struct inet_peer *peer;
1da177e4 1475 unsigned long now;
251da413 1476 struct net *net;
92d86829 1477 bool send;
1da177e4
LT
1478 int code;
1479
251da413
DM
1480 net = dev_net(rt->dst.dev);
1481 if (!IN_DEV_FORWARD(in_dev)) {
1482 switch (rt->dst.error) {
1483 case EHOSTUNREACH:
1484 IP_INC_STATS_BH(net, IPSTATS_MIB_INADDRERRORS);
1485 break;
1486
1487 case ENETUNREACH:
1488 IP_INC_STATS_BH(net, IPSTATS_MIB_INNOROUTES);
1489 break;
1490 }
1491 goto out;
1492 }
1493
d8d1f30b 1494 switch (rt->dst.error) {
4500ebf8
JP
1495 case EINVAL:
1496 default:
1497 goto out;
1498 case EHOSTUNREACH:
1499 code = ICMP_HOST_UNREACH;
1500 break;
1501 case ENETUNREACH:
1502 code = ICMP_NET_UNREACH;
251da413 1503 IP_INC_STATS_BH(net, IPSTATS_MIB_INNOROUTES);
4500ebf8
JP
1504 break;
1505 case EACCES:
1506 code = ICMP_PKT_FILTERED;
1507 break;
1da177e4
LT
1508 }
1509
1d861aa4 1510 peer = inet_getpeer_v4(net->ipv4.peers, ip_hdr(skb)->saddr, 1);
92d86829
DM
1511
1512 send = true;
1513 if (peer) {
1514 now = jiffies;
1515 peer->rate_tokens += now - peer->rate_last;
1516 if (peer->rate_tokens > ip_rt_error_burst)
1517 peer->rate_tokens = ip_rt_error_burst;
1518 peer->rate_last = now;
1519 if (peer->rate_tokens >= ip_rt_error_cost)
1520 peer->rate_tokens -= ip_rt_error_cost;
1521 else
1522 send = false;
1d861aa4 1523 inet_putpeer(peer);
1da177e4 1524 }
92d86829
DM
1525 if (send)
1526 icmp_send(skb, ICMP_DEST_UNREACH, code, 0);
1da177e4
LT
1527
1528out: kfree_skb(skb);
1529 return 0;
e905a9ed 1530}
1da177e4 1531
1da177e4
LT
1532static void ip_rt_update_pmtu(struct dst_entry *dst, u32 mtu)
1533{
2c8cec5c 1534 struct rtable *rt = (struct rtable *) dst;
2c8cec5c
DM
1535
1536 dst_confirm(dst);
1537
5943634f
DM
1538 if (mtu < ip_rt_min_pmtu)
1539 mtu = ip_rt_min_pmtu;
2c8cec5c 1540
5943634f
DM
1541 rt->rt_pmtu = mtu;
1542 dst_set_expires(&rt->dst, ip_rt_mtu_expires);
1da177e4
LT
1543}
1544
36393395
DM
1545void ipv4_update_pmtu(struct sk_buff *skb, struct net *net, u32 mtu,
1546 int oif, u32 mark, u8 protocol, int flow_flags)
1547{
1548 const struct iphdr *iph = (const struct iphdr *)skb->data;
1549 struct flowi4 fl4;
1550 struct rtable *rt;
1551
1552 flowi4_init_output(&fl4, oif, mark, RT_TOS(iph->tos), RT_SCOPE_UNIVERSE,
3e12939a 1553 protocol, flow_flags,
36393395
DM
1554 iph->daddr, iph->saddr, 0, 0);
1555 rt = __ip_route_output_key(net, &fl4);
1556 if (!IS_ERR(rt)) {
1557 ip_rt_update_pmtu(&rt->dst, mtu);
1558 ip_rt_put(rt);
1559 }
1560}
1561EXPORT_SYMBOL_GPL(ipv4_update_pmtu);
1562
1563void ipv4_sk_update_pmtu(struct sk_buff *skb, struct sock *sk, u32 mtu)
1564{
1565 const struct inet_sock *inet = inet_sk(sk);
1566
1567 return ipv4_update_pmtu(skb, sock_net(sk), mtu,
1568 sk->sk_bound_dev_if, sk->sk_mark,
1569 inet->hdrincl ? IPPROTO_RAW : sk->sk_protocol,
1570 inet_sk_flowi_flags(sk));
1571}
1572EXPORT_SYMBOL_GPL(ipv4_sk_update_pmtu);
f39925db 1573
efbc368d
DM
1574static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie)
1575{
1576 struct rtable *rt = (struct rtable *) dst;
1577
1578 if (rt_is_expired(rt))
1579 return NULL;
d11a4dc1 1580 return dst;
1da177e4
LT
1581}
1582
1583static void ipv4_dst_destroy(struct dst_entry *dst)
1584{
1585 struct rtable *rt = (struct rtable *) dst;
1da177e4 1586
62fa8a84
DM
1587 if (rt->fi) {
1588 fib_info_put(rt->fi);
1589 rt->fi = NULL;
1590 }
97bab73f
DM
1591 if (rt_has_peer(rt)) {
1592 struct inet_peer *peer = rt_peer_ptr(rt);
1da177e4
LT
1593 inet_putpeer(peer);
1594 }
1da177e4
LT
1595}
1596
1da177e4
LT
1597
1598static void ipv4_link_failure(struct sk_buff *skb)
1599{
1600 struct rtable *rt;
1601
1602 icmp_send(skb, ICMP_DEST_UNREACH, ICMP_HOST_UNREACH, 0);
1603
511c3f92 1604 rt = skb_rtable(skb);
5943634f
DM
1605 if (rt)
1606 dst_set_expires(&rt->dst, 0);
1da177e4
LT
1607}
1608
1609static int ip_rt_bug(struct sk_buff *skb)
1610{
91df42be
JP
1611 pr_debug("%s: %pI4 -> %pI4, %s\n",
1612 __func__, &ip_hdr(skb)->saddr, &ip_hdr(skb)->daddr,
1613 skb->dev ? skb->dev->name : "?");
1da177e4 1614 kfree_skb(skb);
c378a9c0 1615 WARN_ON(1);
1da177e4
LT
1616 return 0;
1617}
1618
1619/*
1620 We do not cache source address of outgoing interface,
1621 because it is used only by IP RR, TS and SRR options,
1622 so that it out of fast path.
1623
1624 BTW remember: "addr" is allowed to be not aligned
1625 in IP options!
1626 */
1627
8e36360a 1628void ip_rt_get_source(u8 *addr, struct sk_buff *skb, struct rtable *rt)
1da177e4 1629{
a61ced5d 1630 __be32 src;
1da177e4 1631
c7537967 1632 if (rt_is_output_route(rt))
c5be24ff 1633 src = ip_hdr(skb)->saddr;
ebc0ffae 1634 else {
8e36360a
DM
1635 struct fib_result res;
1636 struct flowi4 fl4;
1637 struct iphdr *iph;
1638
1639 iph = ip_hdr(skb);
1640
1641 memset(&fl4, 0, sizeof(fl4));
1642 fl4.daddr = iph->daddr;
1643 fl4.saddr = iph->saddr;
b0fe4a31 1644 fl4.flowi4_tos = RT_TOS(iph->tos);
8e36360a
DM
1645 fl4.flowi4_oif = rt->dst.dev->ifindex;
1646 fl4.flowi4_iif = skb->dev->ifindex;
1647 fl4.flowi4_mark = skb->mark;
5e2b61f7 1648
ebc0ffae 1649 rcu_read_lock();
68a5e3dd 1650 if (fib_lookup(dev_net(rt->dst.dev), &fl4, &res) == 0)
436c3b66 1651 src = FIB_RES_PREFSRC(dev_net(rt->dst.dev), res);
ebc0ffae
ED
1652 else
1653 src = inet_select_addr(rt->dst.dev, rt->rt_gateway,
1da177e4 1654 RT_SCOPE_UNIVERSE);
ebc0ffae
ED
1655 rcu_read_unlock();
1656 }
1da177e4
LT
1657 memcpy(addr, &src, 4);
1658}
1659
c7066f70 1660#ifdef CONFIG_IP_ROUTE_CLASSID
1da177e4
LT
1661static void set_class_tag(struct rtable *rt, u32 tag)
1662{
d8d1f30b
CG
1663 if (!(rt->dst.tclassid & 0xFFFF))
1664 rt->dst.tclassid |= tag & 0xFFFF;
1665 if (!(rt->dst.tclassid & 0xFFFF0000))
1666 rt->dst.tclassid |= tag & 0xFFFF0000;
1da177e4
LT
1667}
1668#endif
1669
0dbaee3b
DM
1670static unsigned int ipv4_default_advmss(const struct dst_entry *dst)
1671{
1672 unsigned int advmss = dst_metric_raw(dst, RTAX_ADVMSS);
1673
1674 if (advmss == 0) {
1675 advmss = max_t(unsigned int, dst->dev->mtu - 40,
1676 ip_rt_min_advmss);
1677 if (advmss > 65535 - 40)
1678 advmss = 65535 - 40;
1679 }
1680 return advmss;
1681}
1682
ebb762f2 1683static unsigned int ipv4_mtu(const struct dst_entry *dst)
d33e4553 1684{
261663b0 1685 const struct rtable *rt = (const struct rtable *) dst;
5943634f
DM
1686 unsigned int mtu = rt->rt_pmtu;
1687
1688 if (mtu && time_after_eq(jiffies, rt->dst.expires))
1689 mtu = 0;
1690
1691 if (!mtu)
1692 mtu = dst_metric_raw(dst, RTAX_MTU);
618f9bc7 1693
261663b0 1694 if (mtu && rt_is_output_route(rt))
618f9bc7
SK
1695 return mtu;
1696
1697 mtu = dst->dev->mtu;
d33e4553
DM
1698
1699 if (unlikely(dst_metric_locked(dst, RTAX_MTU))) {
d33e4553
DM
1700
1701 if (rt->rt_gateway != rt->rt_dst && mtu > 576)
1702 mtu = 576;
1703 }
1704
1705 if (mtu > IP_MAX_MTU)
1706 mtu = IP_MAX_MTU;
1707
1708 return mtu;
1709}
1710
813b3b5d 1711static void rt_init_metrics(struct rtable *rt, const struct flowi4 *fl4,
5e2b61f7 1712 struct fib_info *fi)
a4daad6b 1713{
97bab73f 1714 struct inet_peer_base *base;
0131ba45 1715 struct inet_peer *peer;
0131ba45 1716
97bab73f
DM
1717 base = inetpeer_base_ptr(rt->_peer);
1718 BUG_ON(!base);
1719
3e12939a 1720 peer = inet_getpeer_v4(base, rt->rt_dst, 0);
0131ba45 1721 if (peer) {
97bab73f 1722 __rt_set_peer(rt, peer);
a4daad6b
DM
1723 if (inet_metrics_new(peer))
1724 memcpy(peer->metrics, fi->fib_metrics,
1725 sizeof(u32) * RTAX_MAX);
1726 dst_init_metrics(&rt->dst, peer->metrics, false);
0131ba45
DM
1727 } else {
1728 if (fi->fib_metrics != (u32 *) dst_default_metrics) {
1729 rt->fi = fi;
1730 atomic_inc(&fi->fib_clntref);
1731 }
1732 dst_init_metrics(&rt->dst, fi->fib_metrics, true);
a4daad6b
DM
1733 }
1734}
1735
813b3b5d 1736static void rt_set_nexthop(struct rtable *rt, const struct flowi4 *fl4,
5e2b61f7 1737 const struct fib_result *res,
982721f3 1738 struct fib_info *fi, u16 type, u32 itag)
1da177e4 1739{
1da177e4
LT
1740 if (fi) {
1741 if (FIB_RES_GW(*res) &&
1742 FIB_RES_NH(*res).nh_scope == RT_SCOPE_LINK)
1743 rt->rt_gateway = FIB_RES_GW(*res);
813b3b5d 1744 rt_init_metrics(rt, fl4, fi);
c7066f70 1745#ifdef CONFIG_IP_ROUTE_CLASSID
710ab6c0 1746 rt->dst.tclassid = FIB_RES_NH(*res).nh_tclassid;
1da177e4 1747#endif
d33e4553 1748 }
defb3519 1749
c7066f70 1750#ifdef CONFIG_IP_ROUTE_CLASSID
1da177e4
LT
1751#ifdef CONFIG_IP_MULTIPLE_TABLES
1752 set_class_tag(rt, fib_rules_tclass(res));
1753#endif
1754 set_class_tag(rt, itag);
1755#endif
1da177e4
LT
1756}
1757
5c1e6aa3
DM
1758static struct rtable *rt_dst_alloc(struct net_device *dev,
1759 bool nopolicy, bool noxfrm)
0c4dcd58 1760{
5c1e6aa3
DM
1761 return dst_alloc(&ipv4_dst_ops, dev, 1, -1,
1762 DST_HOST |
1763 (nopolicy ? DST_NOPOLICY : 0) |
1764 (noxfrm ? DST_NOXFRM : 0));
0c4dcd58
DM
1765}
1766
96d36220 1767/* called in rcu_read_lock() section */
9e12bb22 1768static int ip_route_input_mc(struct sk_buff *skb, __be32 daddr, __be32 saddr,
1da177e4
LT
1769 u8 tos, struct net_device *dev, int our)
1770{
96d36220 1771 unsigned int hash;
1da177e4 1772 struct rtable *rth;
96d36220 1773 struct in_device *in_dev = __in_dev_get_rcu(dev);
1da177e4 1774 u32 itag = 0;
b5f7e755 1775 int err;
1da177e4
LT
1776
1777 /* Primary sanity checks. */
1778
1779 if (in_dev == NULL)
1780 return -EINVAL;
1781
1e637c74 1782 if (ipv4_is_multicast(saddr) || ipv4_is_lbcast(saddr) ||
d0daebc3 1783 skb->protocol != htons(ETH_P_IP))
1da177e4
LT
1784 goto e_inval;
1785
d0daebc3
TG
1786 if (likely(!IN_DEV_ROUTE_LOCALNET(in_dev)))
1787 if (ipv4_is_loopback(saddr))
1788 goto e_inval;
1789
f97c1e0c
JP
1790 if (ipv4_is_zeronet(saddr)) {
1791 if (!ipv4_is_local_multicast(daddr))
1da177e4 1792 goto e_inval;
b5f7e755 1793 } else {
9e56e380
DM
1794 err = fib_validate_source(skb, saddr, 0, tos, 0, dev,
1795 in_dev, &itag);
b5f7e755
ED
1796 if (err < 0)
1797 goto e_err;
1798 }
4e7b2f14 1799 rth = rt_dst_alloc(dev_net(dev)->loopback_dev,
5c1e6aa3 1800 IN_DEV_CONF_GET(in_dev, NOPOLICY), false);
1da177e4
LT
1801 if (!rth)
1802 goto e_nobufs;
1803
cf911662
DM
1804#ifdef CONFIG_IP_ROUTE_CLASSID
1805 rth->dst.tclassid = itag;
1806#endif
d8d1f30b 1807 rth->dst.output = ip_rt_bug;
1da177e4 1808
5e2b61f7 1809 rth->rt_key_dst = daddr;
5e2b61f7 1810 rth->rt_key_src = saddr;
cf911662
DM
1811 rth->rt_genid = rt_genid(dev_net(dev));
1812 rth->rt_flags = RTCF_MULTICAST;
1813 rth->rt_type = RTN_MULTICAST;
475949d8 1814 rth->rt_key_tos = tos;
cf911662 1815 rth->rt_dst = daddr;
1da177e4 1816 rth->rt_src = saddr;
1b86a58f 1817 rth->rt_route_iif = dev->ifindex;
5e2b61f7 1818 rth->rt_iif = dev->ifindex;
5e2b61f7 1819 rth->rt_oif = 0;
cf911662 1820 rth->rt_mark = skb->mark;
5943634f 1821 rth->rt_pmtu = 0;
1da177e4 1822 rth->rt_gateway = daddr;
97bab73f 1823 rt_init_peer(rth, dev_net(dev)->ipv4.peers);
cf911662 1824 rth->fi = NULL;
1da177e4 1825 if (our) {
d8d1f30b 1826 rth->dst.input= ip_local_deliver;
1da177e4
LT
1827 rth->rt_flags |= RTCF_LOCAL;
1828 }
1829
1830#ifdef CONFIG_IP_MROUTE
f97c1e0c 1831 if (!ipv4_is_local_multicast(daddr) && IN_DEV_MFORWARD(in_dev))
d8d1f30b 1832 rth->dst.input = ip_mr_input;
1da177e4
LT
1833#endif
1834 RT_CACHE_STAT_INC(in_slow_mc);
1835
e84f84f2 1836 hash = rt_hash(daddr, saddr, dev->ifindex, rt_genid(dev_net(dev)));
b23dd4fe 1837 rth = rt_intern_hash(hash, rth, skb, dev->ifindex);
9aa3c94c 1838 return IS_ERR(rth) ? PTR_ERR(rth) : 0;
1da177e4
LT
1839
1840e_nobufs:
1da177e4 1841 return -ENOBUFS;
1da177e4 1842e_inval:
96d36220 1843 return -EINVAL;
b5f7e755 1844e_err:
b5f7e755 1845 return err;
1da177e4
LT
1846}
1847
1848
1849static void ip_handle_martian_source(struct net_device *dev,
1850 struct in_device *in_dev,
1851 struct sk_buff *skb,
9e12bb22
AV
1852 __be32 daddr,
1853 __be32 saddr)
1da177e4
LT
1854{
1855 RT_CACHE_STAT_INC(in_martian_src);
1856#ifdef CONFIG_IP_ROUTE_VERBOSE
1857 if (IN_DEV_LOG_MARTIANS(in_dev) && net_ratelimit()) {
1858 /*
1859 * RFC1812 recommendation, if source is martian,
1860 * the only hint is MAC header.
1861 */
058bd4d2 1862 pr_warn("martian source %pI4 from %pI4, on dev %s\n",
673d57e7 1863 &daddr, &saddr, dev->name);
98e399f8 1864 if (dev->hard_header_len && skb_mac_header_was_set(skb)) {
058bd4d2
JP
1865 print_hex_dump(KERN_WARNING, "ll header: ",
1866 DUMP_PREFIX_OFFSET, 16, 1,
1867 skb_mac_header(skb),
1868 dev->hard_header_len, true);
1da177e4
LT
1869 }
1870 }
1871#endif
1872}
1873
47360228 1874/* called in rcu_read_lock() section */
5969f71d 1875static int __mkroute_input(struct sk_buff *skb,
982721f3 1876 const struct fib_result *res,
5969f71d
SH
1877 struct in_device *in_dev,
1878 __be32 daddr, __be32 saddr, u32 tos,
1879 struct rtable **result)
1da177e4 1880{
1da177e4
LT
1881 struct rtable *rth;
1882 int err;
1883 struct in_device *out_dev;
47360228 1884 unsigned int flags = 0;
d9c9df8c 1885 u32 itag;
1da177e4
LT
1886
1887 /* get a working reference to the output device */
47360228 1888 out_dev = __in_dev_get_rcu(FIB_RES_DEV(*res));
1da177e4 1889 if (out_dev == NULL) {
e87cc472 1890 net_crit_ratelimited("Bug in ip_route_input_slow(). Please report.\n");
1da177e4
LT
1891 return -EINVAL;
1892 }
1893
1894
5c04c819 1895 err = fib_validate_source(skb, saddr, daddr, tos, FIB_RES_OIF(*res),
9e56e380 1896 in_dev->dev, in_dev, &itag);
1da177e4 1897 if (err < 0) {
e905a9ed 1898 ip_handle_martian_source(in_dev->dev, in_dev, skb, daddr,
1da177e4 1899 saddr);
e905a9ed 1900
1da177e4
LT
1901 goto cleanup;
1902 }
1903
1904 if (err)
1905 flags |= RTCF_DIRECTSRC;
1906
51b77cae 1907 if (out_dev == in_dev && err &&
1da177e4
LT
1908 (IN_DEV_SHARED_MEDIA(out_dev) ||
1909 inet_addr_onlink(out_dev, saddr, FIB_RES_GW(*res))))
1910 flags |= RTCF_DOREDIRECT;
1911
1912 if (skb->protocol != htons(ETH_P_IP)) {
1913 /* Not IP (i.e. ARP). Do not create route, if it is
1914 * invalid for proxy arp. DNAT routes are always valid.
65324144
JDB
1915 *
1916 * Proxy arp feature have been extended to allow, ARP
1917 * replies back to the same interface, to support
1918 * Private VLAN switch technologies. See arp.c.
1da177e4 1919 */
65324144
JDB
1920 if (out_dev == in_dev &&
1921 IN_DEV_PROXY_ARP_PVLAN(in_dev) == 0) {
1da177e4
LT
1922 err = -EINVAL;
1923 goto cleanup;
1924 }
1925 }
1926
5c1e6aa3
DM
1927 rth = rt_dst_alloc(out_dev->dev,
1928 IN_DEV_CONF_GET(in_dev, NOPOLICY),
0c4dcd58 1929 IN_DEV_CONF_GET(out_dev, NOXFRM));
1da177e4
LT
1930 if (!rth) {
1931 err = -ENOBUFS;
1932 goto cleanup;
1933 }
1934
5e2b61f7 1935 rth->rt_key_dst = daddr;
5e2b61f7 1936 rth->rt_key_src = saddr;
cf911662
DM
1937 rth->rt_genid = rt_genid(dev_net(rth->dst.dev));
1938 rth->rt_flags = flags;
1939 rth->rt_type = res->type;
475949d8 1940 rth->rt_key_tos = tos;
cf911662 1941 rth->rt_dst = daddr;
1da177e4 1942 rth->rt_src = saddr;
1b86a58f 1943 rth->rt_route_iif = in_dev->dev->ifindex;
5e2b61f7 1944 rth->rt_iif = in_dev->dev->ifindex;
5e2b61f7 1945 rth->rt_oif = 0;
cf911662 1946 rth->rt_mark = skb->mark;
5943634f 1947 rth->rt_pmtu = 0;
cf911662 1948 rth->rt_gateway = daddr;
8b96d22d 1949 rt_init_peer(rth, &res->table->tb_peers);
cf911662 1950 rth->fi = NULL;
1da177e4 1951
d8d1f30b
CG
1952 rth->dst.input = ip_forward;
1953 rth->dst.output = ip_output;
1da177e4 1954
5e2b61f7 1955 rt_set_nexthop(rth, NULL, res, res->fi, res->type, itag);
1da177e4 1956
1da177e4
LT
1957 *result = rth;
1958 err = 0;
1959 cleanup:
1da177e4 1960 return err;
e905a9ed 1961}
1da177e4 1962
5969f71d
SH
1963static int ip_mkroute_input(struct sk_buff *skb,
1964 struct fib_result *res,
68a5e3dd 1965 const struct flowi4 *fl4,
5969f71d
SH
1966 struct in_device *in_dev,
1967 __be32 daddr, __be32 saddr, u32 tos)
1da177e4 1968{
5e73ea1a 1969 struct rtable *rth = NULL;
1da177e4 1970 int err;
95c96174 1971 unsigned int hash;
1da177e4
LT
1972
1973#ifdef CONFIG_IP_ROUTE_MULTIPATH
ff3fccb3 1974 if (res->fi && res->fi->fib_nhs > 1)
1b7fe593 1975 fib_select_multipath(res);
1da177e4
LT
1976#endif
1977
1978 /* create a routing cache entry */
1979 err = __mkroute_input(skb, res, in_dev, daddr, saddr, tos, &rth);
1980 if (err)
1981 return err;
1da177e4
LT
1982
1983 /* put it into the cache */
68a5e3dd 1984 hash = rt_hash(daddr, saddr, fl4->flowi4_iif,
d8d1f30b 1985 rt_genid(dev_net(rth->dst.dev)));
68a5e3dd 1986 rth = rt_intern_hash(hash, rth, skb, fl4->flowi4_iif);
b23dd4fe
DM
1987 if (IS_ERR(rth))
1988 return PTR_ERR(rth);
1989 return 0;
1da177e4
LT
1990}
1991
1da177e4
LT
1992/*
1993 * NOTE. We drop all the packets that has local source
1994 * addresses, because every properly looped back packet
1995 * must have correct destination already attached by output routine.
1996 *
1997 * Such approach solves two big problems:
1998 * 1. Not simplex devices are handled properly.
1999 * 2. IP spoofing attempts are filtered with 100% of guarantee.
ebc0ffae 2000 * called with rcu_read_lock()
1da177e4
LT
2001 */
2002
9e12bb22 2003static int ip_route_input_slow(struct sk_buff *skb, __be32 daddr, __be32 saddr,
c10237e0 2004 u8 tos, struct net_device *dev)
1da177e4
LT
2005{
2006 struct fib_result res;
96d36220 2007 struct in_device *in_dev = __in_dev_get_rcu(dev);
68a5e3dd 2008 struct flowi4 fl4;
95c96174 2009 unsigned int flags = 0;
1da177e4 2010 u32 itag = 0;
95c96174
ED
2011 struct rtable *rth;
2012 unsigned int hash;
1da177e4 2013 int err = -EINVAL;
5e73ea1a 2014 struct net *net = dev_net(dev);
1da177e4
LT
2015
2016 /* IP on this device is disabled. */
2017
2018 if (!in_dev)
2019 goto out;
2020
2021 /* Check for the most weird martians, which can be not detected
2022 by fib_lookup.
2023 */
2024
d0daebc3 2025 if (ipv4_is_multicast(saddr) || ipv4_is_lbcast(saddr))
1da177e4
LT
2026 goto martian_source;
2027
27a954bd 2028 if (ipv4_is_lbcast(daddr) || (saddr == 0 && daddr == 0))
1da177e4
LT
2029 goto brd_input;
2030
2031 /* Accept zero addresses only to limited broadcast;
2032 * I even do not know to fix it or not. Waiting for complains :-)
2033 */
f97c1e0c 2034 if (ipv4_is_zeronet(saddr))
1da177e4
LT
2035 goto martian_source;
2036
d0daebc3 2037 if (ipv4_is_zeronet(daddr))
1da177e4
LT
2038 goto martian_destination;
2039
d0daebc3
TG
2040 if (likely(!IN_DEV_ROUTE_LOCALNET(in_dev))) {
2041 if (ipv4_is_loopback(daddr))
2042 goto martian_destination;
2043
2044 if (ipv4_is_loopback(saddr))
2045 goto martian_source;
2046 }
2047
1da177e4
LT
2048 /*
2049 * Now we are ready to route packet.
2050 */
68a5e3dd
DM
2051 fl4.flowi4_oif = 0;
2052 fl4.flowi4_iif = dev->ifindex;
2053 fl4.flowi4_mark = skb->mark;
2054 fl4.flowi4_tos = tos;
2055 fl4.flowi4_scope = RT_SCOPE_UNIVERSE;
2056 fl4.daddr = daddr;
2057 fl4.saddr = saddr;
2058 err = fib_lookup(net, &fl4, &res);
251da413 2059 if (err != 0)
1da177e4 2060 goto no_route;
1da177e4
LT
2061
2062 RT_CACHE_STAT_INC(in_slow_tot);
2063
2064 if (res.type == RTN_BROADCAST)
2065 goto brd_input;
2066
2067 if (res.type == RTN_LOCAL) {
5c04c819 2068 err = fib_validate_source(skb, saddr, daddr, tos,
ebc0ffae 2069 net->loopback_dev->ifindex,
9e56e380 2070 dev, in_dev, &itag);
b5f7e755
ED
2071 if (err < 0)
2072 goto martian_source_keep_err;
2073 if (err)
1da177e4 2074 flags |= RTCF_DIRECTSRC;
1da177e4
LT
2075 goto local_input;
2076 }
2077
2078 if (!IN_DEV_FORWARD(in_dev))
251da413 2079 goto no_route;
1da177e4
LT
2080 if (res.type != RTN_UNICAST)
2081 goto martian_destination;
2082
68a5e3dd 2083 err = ip_mkroute_input(skb, &res, &fl4, in_dev, daddr, saddr, tos);
1da177e4
LT
2084out: return err;
2085
2086brd_input:
2087 if (skb->protocol != htons(ETH_P_IP))
2088 goto e_inval;
2089
41347dcd 2090 if (!ipv4_is_zeronet(saddr)) {
9e56e380
DM
2091 err = fib_validate_source(skb, saddr, 0, tos, 0, dev,
2092 in_dev, &itag);
1da177e4 2093 if (err < 0)
b5f7e755 2094 goto martian_source_keep_err;
1da177e4
LT
2095 if (err)
2096 flags |= RTCF_DIRECTSRC;
2097 }
2098 flags |= RTCF_BROADCAST;
2099 res.type = RTN_BROADCAST;
2100 RT_CACHE_STAT_INC(in_brd);
2101
2102local_input:
5c1e6aa3
DM
2103 rth = rt_dst_alloc(net->loopback_dev,
2104 IN_DEV_CONF_GET(in_dev, NOPOLICY), false);
1da177e4
LT
2105 if (!rth)
2106 goto e_nobufs;
2107
cf911662 2108 rth->dst.input= ip_local_deliver;
d8d1f30b 2109 rth->dst.output= ip_rt_bug;
cf911662
DM
2110#ifdef CONFIG_IP_ROUTE_CLASSID
2111 rth->dst.tclassid = itag;
2112#endif
1da177e4 2113
5e2b61f7 2114 rth->rt_key_dst = daddr;
5e2b61f7 2115 rth->rt_key_src = saddr;
cf911662
DM
2116 rth->rt_genid = rt_genid(net);
2117 rth->rt_flags = flags|RTCF_LOCAL;
2118 rth->rt_type = res.type;
475949d8 2119 rth->rt_key_tos = tos;
cf911662 2120 rth->rt_dst = daddr;
1da177e4 2121 rth->rt_src = saddr;
1b86a58f 2122 rth->rt_route_iif = dev->ifindex;
5e2b61f7 2123 rth->rt_iif = dev->ifindex;
cf911662
DM
2124 rth->rt_oif = 0;
2125 rth->rt_mark = skb->mark;
5943634f 2126 rth->rt_pmtu = 0;
1da177e4 2127 rth->rt_gateway = daddr;
97bab73f 2128 rt_init_peer(rth, net->ipv4.peers);
cf911662 2129 rth->fi = NULL;
1da177e4 2130 if (res.type == RTN_UNREACHABLE) {
d8d1f30b
CG
2131 rth->dst.input= ip_error;
2132 rth->dst.error= -err;
1da177e4
LT
2133 rth->rt_flags &= ~RTCF_LOCAL;
2134 }
68a5e3dd
DM
2135 hash = rt_hash(daddr, saddr, fl4.flowi4_iif, rt_genid(net));
2136 rth = rt_intern_hash(hash, rth, skb, fl4.flowi4_iif);
b23dd4fe
DM
2137 err = 0;
2138 if (IS_ERR(rth))
2139 err = PTR_ERR(rth);
ebc0ffae 2140 goto out;
1da177e4
LT
2141
2142no_route:
2143 RT_CACHE_STAT_INC(in_no_route);
1da177e4 2144 res.type = RTN_UNREACHABLE;
7f53878d
MC
2145 if (err == -ESRCH)
2146 err = -ENETUNREACH;
1da177e4
LT
2147 goto local_input;
2148
2149 /*
2150 * Do not cache martian addresses: they should be logged (RFC1812)
2151 */
2152martian_destination:
2153 RT_CACHE_STAT_INC(in_martian_dst);
2154#ifdef CONFIG_IP_ROUTE_VERBOSE
e87cc472
JP
2155 if (IN_DEV_LOG_MARTIANS(in_dev))
2156 net_warn_ratelimited("martian destination %pI4 from %pI4, dev %s\n",
2157 &daddr, &saddr, dev->name);
1da177e4 2158#endif
2c2910a4 2159
1da177e4
LT
2160e_inval:
2161 err = -EINVAL;
ebc0ffae 2162 goto out;
1da177e4
LT
2163
2164e_nobufs:
2165 err = -ENOBUFS;
ebc0ffae 2166 goto out;
1da177e4
LT
2167
2168martian_source:
b5f7e755
ED
2169 err = -EINVAL;
2170martian_source_keep_err:
1da177e4 2171 ip_handle_martian_source(dev, in_dev, skb, daddr, saddr);
ebc0ffae 2172 goto out;
1da177e4
LT
2173}
2174
407eadd9 2175int ip_route_input_common(struct sk_buff *skb, __be32 daddr, __be32 saddr,
c10237e0 2176 u8 tos, struct net_device *dev, bool noref)
1da177e4 2177{
95c96174
ED
2178 struct rtable *rth;
2179 unsigned int hash;
1da177e4 2180 int iif = dev->ifindex;
b5921910 2181 struct net *net;
96d36220 2182 int res;
1da177e4 2183
c346dca1 2184 net = dev_net(dev);
1080d709 2185
96d36220
ED
2186 rcu_read_lock();
2187
1080d709
NH
2188 if (!rt_caching(net))
2189 goto skip_cache;
2190
1da177e4 2191 tos &= IPTOS_RT_MASK;
e84f84f2 2192 hash = rt_hash(daddr, saddr, iif, rt_genid(net));
1da177e4 2193
1da177e4 2194 for (rth = rcu_dereference(rt_hash_table[hash].chain); rth;
d8d1f30b 2195 rth = rcu_dereference(rth->dst.rt_next)) {
5e2b61f7
DM
2196 if ((((__force u32)rth->rt_key_dst ^ (__force u32)daddr) |
2197 ((__force u32)rth->rt_key_src ^ (__force u32)saddr) |
97a80410 2198 (rth->rt_route_iif ^ iif) |
475949d8 2199 (rth->rt_key_tos ^ tos)) == 0 &&
5e2b61f7 2200 rth->rt_mark == skb->mark &&
d8d1f30b 2201 net_eq(dev_net(rth->dst.dev), net) &&
e84f84f2 2202 !rt_is_expired(rth)) {
407eadd9 2203 if (noref) {
d8d1f30b
CG
2204 dst_use_noref(&rth->dst, jiffies);
2205 skb_dst_set_noref(skb, &rth->dst);
407eadd9 2206 } else {
d8d1f30b
CG
2207 dst_use(&rth->dst, jiffies);
2208 skb_dst_set(skb, &rth->dst);
407eadd9 2209 }
1da177e4
LT
2210 RT_CACHE_STAT_INC(in_hit);
2211 rcu_read_unlock();
1da177e4
LT
2212 return 0;
2213 }
2214 RT_CACHE_STAT_INC(in_hlist_search);
2215 }
1da177e4 2216
1080d709 2217skip_cache:
1da177e4
LT
2218 /* Multicast recognition logic is moved from route cache to here.
2219 The problem was that too many Ethernet cards have broken/missing
2220 hardware multicast filters :-( As result the host on multicasting
2221 network acquires a lot of useless route cache entries, sort of
2222 SDR messages from all the world. Now we try to get rid of them.
2223 Really, provided software IP multicast filter is organized
2224 reasonably (at least, hashed), it does not result in a slowdown
2225 comparing with route cache reject entries.
2226 Note, that multicast routers are not affected, because
2227 route cache entry is created eventually.
2228 */
f97c1e0c 2229 if (ipv4_is_multicast(daddr)) {
96d36220 2230 struct in_device *in_dev = __in_dev_get_rcu(dev);
1da177e4 2231
96d36220 2232 if (in_dev) {
dbdd9a52
DM
2233 int our = ip_check_mc_rcu(in_dev, daddr, saddr,
2234 ip_hdr(skb)->protocol);
1da177e4
LT
2235 if (our
2236#ifdef CONFIG_IP_MROUTE
9d4fb27d
JP
2237 ||
2238 (!ipv4_is_local_multicast(daddr) &&
2239 IN_DEV_MFORWARD(in_dev))
1da177e4 2240#endif
9d4fb27d 2241 ) {
96d36220
ED
2242 int res = ip_route_input_mc(skb, daddr, saddr,
2243 tos, dev, our);
1da177e4 2244 rcu_read_unlock();
96d36220 2245 return res;
1da177e4
LT
2246 }
2247 }
2248 rcu_read_unlock();
2249 return -EINVAL;
2250 }
c10237e0 2251 res = ip_route_input_slow(skb, daddr, saddr, tos, dev);
96d36220
ED
2252 rcu_read_unlock();
2253 return res;
1da177e4 2254}
407eadd9 2255EXPORT_SYMBOL(ip_route_input_common);
1da177e4 2256
ebc0ffae 2257/* called with rcu_read_lock() */
982721f3 2258static struct rtable *__mkroute_output(const struct fib_result *res,
68a5e3dd 2259 const struct flowi4 *fl4,
813b3b5d 2260 __be32 orig_daddr, __be32 orig_saddr,
f61759e6
JA
2261 int orig_oif, __u8 orig_rtos,
2262 struct net_device *dev_out,
5ada5527 2263 unsigned int flags)
1da177e4 2264{
982721f3 2265 struct fib_info *fi = res->fi;
5ada5527 2266 struct in_device *in_dev;
982721f3 2267 u16 type = res->type;
5ada5527 2268 struct rtable *rth;
1da177e4 2269
d0daebc3
TG
2270 in_dev = __in_dev_get_rcu(dev_out);
2271 if (!in_dev)
5ada5527 2272 return ERR_PTR(-EINVAL);
1da177e4 2273
d0daebc3
TG
2274 if (likely(!IN_DEV_ROUTE_LOCALNET(in_dev)))
2275 if (ipv4_is_loopback(fl4->saddr) && !(dev_out->flags & IFF_LOOPBACK))
2276 return ERR_PTR(-EINVAL);
2277
68a5e3dd 2278 if (ipv4_is_lbcast(fl4->daddr))
982721f3 2279 type = RTN_BROADCAST;
68a5e3dd 2280 else if (ipv4_is_multicast(fl4->daddr))
982721f3 2281 type = RTN_MULTICAST;
68a5e3dd 2282 else if (ipv4_is_zeronet(fl4->daddr))
5ada5527 2283 return ERR_PTR(-EINVAL);
1da177e4
LT
2284
2285 if (dev_out->flags & IFF_LOOPBACK)
2286 flags |= RTCF_LOCAL;
2287
982721f3 2288 if (type == RTN_BROADCAST) {
1da177e4 2289 flags |= RTCF_BROADCAST | RTCF_LOCAL;
982721f3
DM
2290 fi = NULL;
2291 } else if (type == RTN_MULTICAST) {
dd28d1a0 2292 flags |= RTCF_MULTICAST | RTCF_LOCAL;
813b3b5d
DM
2293 if (!ip_check_mc_rcu(in_dev, fl4->daddr, fl4->saddr,
2294 fl4->flowi4_proto))
1da177e4
LT
2295 flags &= ~RTCF_LOCAL;
2296 /* If multicast route do not exist use
dd28d1a0
ED
2297 * default one, but do not gateway in this case.
2298 * Yes, it is hack.
1da177e4 2299 */
982721f3
DM
2300 if (fi && res->prefixlen < 4)
2301 fi = NULL;
1da177e4
LT
2302 }
2303
5c1e6aa3
DM
2304 rth = rt_dst_alloc(dev_out,
2305 IN_DEV_CONF_GET(in_dev, NOPOLICY),
0c4dcd58 2306 IN_DEV_CONF_GET(in_dev, NOXFRM));
8391d07b 2307 if (!rth)
5ada5527 2308 return ERR_PTR(-ENOBUFS);
8391d07b 2309
cf911662
DM
2310 rth->dst.output = ip_output;
2311
813b3b5d
DM
2312 rth->rt_key_dst = orig_daddr;
2313 rth->rt_key_src = orig_saddr;
cf911662
DM
2314 rth->rt_genid = rt_genid(dev_net(dev_out));
2315 rth->rt_flags = flags;
2316 rth->rt_type = type;
f61759e6 2317 rth->rt_key_tos = orig_rtos;
68a5e3dd
DM
2318 rth->rt_dst = fl4->daddr;
2319 rth->rt_src = fl4->saddr;
1b86a58f 2320 rth->rt_route_iif = 0;
813b3b5d
DM
2321 rth->rt_iif = orig_oif ? : dev_out->ifindex;
2322 rth->rt_oif = orig_oif;
2323 rth->rt_mark = fl4->flowi4_mark;
5943634f 2324 rth->rt_pmtu = 0;
68a5e3dd 2325 rth->rt_gateway = fl4->daddr;
8b96d22d
DM
2326 rt_init_peer(rth, (res->table ?
2327 &res->table->tb_peers :
2328 dev_net(dev_out)->ipv4.peers));
cf911662 2329 rth->fi = NULL;
1da177e4
LT
2330
2331 RT_CACHE_STAT_INC(out_slow_tot);
2332
41347dcd 2333 if (flags & RTCF_LOCAL)
d8d1f30b 2334 rth->dst.input = ip_local_deliver;
1da177e4 2335 if (flags & (RTCF_BROADCAST | RTCF_MULTICAST)) {
e905a9ed 2336 if (flags & RTCF_LOCAL &&
1da177e4 2337 !(dev_out->flags & IFF_LOOPBACK)) {
d8d1f30b 2338 rth->dst.output = ip_mc_output;
1da177e4
LT
2339 RT_CACHE_STAT_INC(out_slow_mc);
2340 }
2341#ifdef CONFIG_IP_MROUTE
982721f3 2342 if (type == RTN_MULTICAST) {
1da177e4 2343 if (IN_DEV_MFORWARD(in_dev) &&
813b3b5d 2344 !ipv4_is_local_multicast(fl4->daddr)) {
d8d1f30b
CG
2345 rth->dst.input = ip_mr_input;
2346 rth->dst.output = ip_mc_output;
1da177e4
LT
2347 }
2348 }
2349#endif
2350 }
2351
813b3b5d 2352 rt_set_nexthop(rth, fl4, res, fi, type, 0);
1da177e4 2353
7586eceb
ED
2354 if (fl4->flowi4_flags & FLOWI_FLAG_RT_NOCACHE)
2355 rth->dst.flags |= DST_NOCACHE;
2356
5ada5527 2357 return rth;
1da177e4
LT
2358}
2359
1da177e4
LT
2360/*
2361 * Major route resolver routine.
0197aa38 2362 * called with rcu_read_lock();
1da177e4
LT
2363 */
2364
813b3b5d 2365static struct rtable *ip_route_output_slow(struct net *net, struct flowi4 *fl4)
1da177e4 2366{
1da177e4 2367 struct net_device *dev_out = NULL;
f61759e6 2368 __u8 tos = RT_FL_TOS(fl4);
813b3b5d
DM
2369 unsigned int flags = 0;
2370 struct fib_result res;
5ada5527 2371 struct rtable *rth;
813b3b5d
DM
2372 __be32 orig_daddr;
2373 __be32 orig_saddr;
2374 int orig_oif;
1da177e4
LT
2375
2376 res.fi = NULL;
8b96d22d 2377 res.table = NULL;
1da177e4
LT
2378#ifdef CONFIG_IP_MULTIPLE_TABLES
2379 res.r = NULL;
2380#endif
2381
813b3b5d
DM
2382 orig_daddr = fl4->daddr;
2383 orig_saddr = fl4->saddr;
2384 orig_oif = fl4->flowi4_oif;
2385
2386 fl4->flowi4_iif = net->loopback_dev->ifindex;
2387 fl4->flowi4_tos = tos & IPTOS_RT_MASK;
2388 fl4->flowi4_scope = ((tos & RTO_ONLINK) ?
2389 RT_SCOPE_LINK : RT_SCOPE_UNIVERSE);
44713b67 2390
010c2708 2391 rcu_read_lock();
813b3b5d 2392 if (fl4->saddr) {
b23dd4fe 2393 rth = ERR_PTR(-EINVAL);
813b3b5d
DM
2394 if (ipv4_is_multicast(fl4->saddr) ||
2395 ipv4_is_lbcast(fl4->saddr) ||
2396 ipv4_is_zeronet(fl4->saddr))
1da177e4
LT
2397 goto out;
2398
1da177e4
LT
2399 /* I removed check for oif == dev_out->oif here.
2400 It was wrong for two reasons:
1ab35276
DL
2401 1. ip_dev_find(net, saddr) can return wrong iface, if saddr
2402 is assigned to multiple interfaces.
1da177e4
LT
2403 2. Moreover, we are allowed to send packets with saddr
2404 of another iface. --ANK
2405 */
2406
813b3b5d
DM
2407 if (fl4->flowi4_oif == 0 &&
2408 (ipv4_is_multicast(fl4->daddr) ||
2409 ipv4_is_lbcast(fl4->daddr))) {
a210d01a 2410 /* It is equivalent to inet_addr_type(saddr) == RTN_LOCAL */
813b3b5d 2411 dev_out = __ip_dev_find(net, fl4->saddr, false);
a210d01a
JA
2412 if (dev_out == NULL)
2413 goto out;
2414
1da177e4
LT
2415 /* Special hack: user can direct multicasts
2416 and limited broadcast via necessary interface
2417 without fiddling with IP_MULTICAST_IF or IP_PKTINFO.
2418 This hack is not just for fun, it allows
2419 vic,vat and friends to work.
2420 They bind socket to loopback, set ttl to zero
2421 and expect that it will work.
2422 From the viewpoint of routing cache they are broken,
2423 because we are not allowed to build multicast path
2424 with loopback source addr (look, routing cache
2425 cannot know, that ttl is zero, so that packet
2426 will not leave this host and route is valid).
2427 Luckily, this hack is good workaround.
2428 */
2429
813b3b5d 2430 fl4->flowi4_oif = dev_out->ifindex;
1da177e4
LT
2431 goto make_route;
2432 }
a210d01a 2433
813b3b5d 2434 if (!(fl4->flowi4_flags & FLOWI_FLAG_ANYSRC)) {
a210d01a 2435 /* It is equivalent to inet_addr_type(saddr) == RTN_LOCAL */
813b3b5d 2436 if (!__ip_dev_find(net, fl4->saddr, false))
a210d01a 2437 goto out;
a210d01a 2438 }
1da177e4
LT
2439 }
2440
2441
813b3b5d
DM
2442 if (fl4->flowi4_oif) {
2443 dev_out = dev_get_by_index_rcu(net, fl4->flowi4_oif);
b23dd4fe 2444 rth = ERR_PTR(-ENODEV);
1da177e4
LT
2445 if (dev_out == NULL)
2446 goto out;
e5ed6399
HX
2447
2448 /* RACE: Check return value of inet_select_addr instead. */
fc75fc83 2449 if (!(dev_out->flags & IFF_UP) || !__in_dev_get_rcu(dev_out)) {
b23dd4fe 2450 rth = ERR_PTR(-ENETUNREACH);
fc75fc83
ED
2451 goto out;
2452 }
813b3b5d
DM
2453 if (ipv4_is_local_multicast(fl4->daddr) ||
2454 ipv4_is_lbcast(fl4->daddr)) {
2455 if (!fl4->saddr)
2456 fl4->saddr = inet_select_addr(dev_out, 0,
2457 RT_SCOPE_LINK);
1da177e4
LT
2458 goto make_route;
2459 }
813b3b5d
DM
2460 if (fl4->saddr) {
2461 if (ipv4_is_multicast(fl4->daddr))
2462 fl4->saddr = inet_select_addr(dev_out, 0,
2463 fl4->flowi4_scope);
2464 else if (!fl4->daddr)
2465 fl4->saddr = inet_select_addr(dev_out, 0,
2466 RT_SCOPE_HOST);
1da177e4
LT
2467 }
2468 }
2469
813b3b5d
DM
2470 if (!fl4->daddr) {
2471 fl4->daddr = fl4->saddr;
2472 if (!fl4->daddr)
2473 fl4->daddr = fl4->saddr = htonl(INADDR_LOOPBACK);
b40afd0e 2474 dev_out = net->loopback_dev;
813b3b5d 2475 fl4->flowi4_oif = net->loopback_dev->ifindex;
1da177e4
LT
2476 res.type = RTN_LOCAL;
2477 flags |= RTCF_LOCAL;
2478 goto make_route;
2479 }
2480
813b3b5d 2481 if (fib_lookup(net, fl4, &res)) {
1da177e4 2482 res.fi = NULL;
8b96d22d 2483 res.table = NULL;
813b3b5d 2484 if (fl4->flowi4_oif) {
1da177e4
LT
2485 /* Apparently, routing tables are wrong. Assume,
2486 that the destination is on link.
2487
2488 WHY? DW.
2489 Because we are allowed to send to iface
2490 even if it has NO routes and NO assigned
2491 addresses. When oif is specified, routing
2492 tables are looked up with only one purpose:
2493 to catch if destination is gatewayed, rather than
2494 direct. Moreover, if MSG_DONTROUTE is set,
2495 we send packet, ignoring both routing tables
2496 and ifaddr state. --ANK
2497
2498
2499 We could make it even if oif is unknown,
2500 likely IPv6, but we do not.
2501 */
2502
813b3b5d
DM
2503 if (fl4->saddr == 0)
2504 fl4->saddr = inet_select_addr(dev_out, 0,
2505 RT_SCOPE_LINK);
1da177e4
LT
2506 res.type = RTN_UNICAST;
2507 goto make_route;
2508 }
b23dd4fe 2509 rth = ERR_PTR(-ENETUNREACH);
1da177e4
LT
2510 goto out;
2511 }
1da177e4
LT
2512
2513 if (res.type == RTN_LOCAL) {
813b3b5d 2514 if (!fl4->saddr) {
9fc3bbb4 2515 if (res.fi->fib_prefsrc)
813b3b5d 2516 fl4->saddr = res.fi->fib_prefsrc;
9fc3bbb4 2517 else
813b3b5d 2518 fl4->saddr = fl4->daddr;
9fc3bbb4 2519 }
b40afd0e 2520 dev_out = net->loopback_dev;
813b3b5d 2521 fl4->flowi4_oif = dev_out->ifindex;
1da177e4
LT
2522 res.fi = NULL;
2523 flags |= RTCF_LOCAL;
2524 goto make_route;
2525 }
2526
2527#ifdef CONFIG_IP_ROUTE_MULTIPATH
813b3b5d 2528 if (res.fi->fib_nhs > 1 && fl4->flowi4_oif == 0)
1b7fe593 2529 fib_select_multipath(&res);
1da177e4
LT
2530 else
2531#endif
21d8c49e
DM
2532 if (!res.prefixlen &&
2533 res.table->tb_num_default > 1 &&
813b3b5d 2534 res.type == RTN_UNICAST && !fl4->flowi4_oif)
0c838ff1 2535 fib_select_default(&res);
1da177e4 2536
813b3b5d
DM
2537 if (!fl4->saddr)
2538 fl4->saddr = FIB_RES_PREFSRC(net, res);
1da177e4 2539
1da177e4 2540 dev_out = FIB_RES_DEV(res);
813b3b5d 2541 fl4->flowi4_oif = dev_out->ifindex;
1da177e4
LT
2542
2543
2544make_route:
813b3b5d 2545 rth = __mkroute_output(&res, fl4, orig_daddr, orig_saddr, orig_oif,
f61759e6 2546 tos, dev_out, flags);
b23dd4fe 2547 if (!IS_ERR(rth)) {
5ada5527
DM
2548 unsigned int hash;
2549
813b3b5d 2550 hash = rt_hash(orig_daddr, orig_saddr, orig_oif,
5ada5527 2551 rt_genid(dev_net(dev_out)));
813b3b5d 2552 rth = rt_intern_hash(hash, rth, NULL, orig_oif);
5ada5527 2553 }
1da177e4 2554
010c2708
DM
2555out:
2556 rcu_read_unlock();
b23dd4fe 2557 return rth;
1da177e4
LT
2558}
2559
813b3b5d 2560struct rtable *__ip_route_output_key(struct net *net, struct flowi4 *flp4)
1da177e4 2561{
1da177e4 2562 struct rtable *rth;
010c2708 2563 unsigned int hash;
1da177e4 2564
1080d709
NH
2565 if (!rt_caching(net))
2566 goto slow_output;
2567
9d6ec938 2568 hash = rt_hash(flp4->daddr, flp4->saddr, flp4->flowi4_oif, rt_genid(net));
1da177e4
LT
2569
2570 rcu_read_lock_bh();
a898def2 2571 for (rth = rcu_dereference_bh(rt_hash_table[hash].chain); rth;
d8d1f30b 2572 rth = rcu_dereference_bh(rth->dst.rt_next)) {
9d6ec938
DM
2573 if (rth->rt_key_dst == flp4->daddr &&
2574 rth->rt_key_src == flp4->saddr &&
c7537967 2575 rt_is_output_route(rth) &&
9d6ec938
DM
2576 rth->rt_oif == flp4->flowi4_oif &&
2577 rth->rt_mark == flp4->flowi4_mark &&
475949d8 2578 !((rth->rt_key_tos ^ flp4->flowi4_tos) &
b5921910 2579 (IPTOS_RT_MASK | RTO_ONLINK)) &&
d8d1f30b 2580 net_eq(dev_net(rth->dst.dev), net) &&
e84f84f2 2581 !rt_is_expired(rth)) {
d8d1f30b 2582 dst_use(&rth->dst, jiffies);
1da177e4
LT
2583 RT_CACHE_STAT_INC(out_hit);
2584 rcu_read_unlock_bh();
56157872
DM
2585 if (!flp4->saddr)
2586 flp4->saddr = rth->rt_src;
2587 if (!flp4->daddr)
2588 flp4->daddr = rth->rt_dst;
b23dd4fe 2589 return rth;
1da177e4
LT
2590 }
2591 RT_CACHE_STAT_INC(out_hlist_search);
2592 }
2593 rcu_read_unlock_bh();
2594
1080d709 2595slow_output:
9d6ec938 2596 return ip_route_output_slow(net, flp4);
1da177e4 2597}
d8c97a94
ACM
2598EXPORT_SYMBOL_GPL(__ip_route_output_key);
2599
ae2688d5
JW
2600static struct dst_entry *ipv4_blackhole_dst_check(struct dst_entry *dst, u32 cookie)
2601{
2602 return NULL;
2603}
2604
ebb762f2 2605static unsigned int ipv4_blackhole_mtu(const struct dst_entry *dst)
ec831ea7 2606{
618f9bc7
SK
2607 unsigned int mtu = dst_metric_raw(dst, RTAX_MTU);
2608
2609 return mtu ? : dst->dev->mtu;
ec831ea7
RD
2610}
2611
14e50e57
DM
2612static void ipv4_rt_blackhole_update_pmtu(struct dst_entry *dst, u32 mtu)
2613{
2614}
2615
0972ddb2
HB
2616static u32 *ipv4_rt_blackhole_cow_metrics(struct dst_entry *dst,
2617 unsigned long old)
2618{
2619 return NULL;
2620}
2621
14e50e57
DM
2622static struct dst_ops ipv4_dst_blackhole_ops = {
2623 .family = AF_INET,
09640e63 2624 .protocol = cpu_to_be16(ETH_P_IP),
14e50e57 2625 .destroy = ipv4_dst_destroy,
ae2688d5 2626 .check = ipv4_blackhole_dst_check,
ebb762f2 2627 .mtu = ipv4_blackhole_mtu,
214f45c9 2628 .default_advmss = ipv4_default_advmss,
14e50e57 2629 .update_pmtu = ipv4_rt_blackhole_update_pmtu,
0972ddb2 2630 .cow_metrics = ipv4_rt_blackhole_cow_metrics,
d3aaeb38 2631 .neigh_lookup = ipv4_neigh_lookup,
14e50e57
DM
2632};
2633
2774c131 2634struct dst_entry *ipv4_blackhole_route(struct net *net, struct dst_entry *dst_orig)
14e50e57 2635{
5c1e6aa3 2636 struct rtable *rt = dst_alloc(&ipv4_dst_blackhole_ops, NULL, 1, 0, 0);
2774c131 2637 struct rtable *ort = (struct rtable *) dst_orig;
14e50e57
DM
2638
2639 if (rt) {
d8d1f30b 2640 struct dst_entry *new = &rt->dst;
14e50e57 2641
14e50e57 2642 new->__use = 1;
352e512c
HX
2643 new->input = dst_discard;
2644 new->output = dst_discard;
14e50e57 2645
d8d1f30b 2646 new->dev = ort->dst.dev;
14e50e57
DM
2647 if (new->dev)
2648 dev_hold(new->dev);
2649
5e2b61f7
DM
2650 rt->rt_key_dst = ort->rt_key_dst;
2651 rt->rt_key_src = ort->rt_key_src;
475949d8 2652 rt->rt_key_tos = ort->rt_key_tos;
1b86a58f 2653 rt->rt_route_iif = ort->rt_route_iif;
5e2b61f7
DM
2654 rt->rt_iif = ort->rt_iif;
2655 rt->rt_oif = ort->rt_oif;
2656 rt->rt_mark = ort->rt_mark;
5943634f 2657 rt->rt_pmtu = ort->rt_pmtu;
14e50e57 2658
e84f84f2 2659 rt->rt_genid = rt_genid(net);
14e50e57
DM
2660 rt->rt_flags = ort->rt_flags;
2661 rt->rt_type = ort->rt_type;
2662 rt->rt_dst = ort->rt_dst;
2663 rt->rt_src = ort->rt_src;
14e50e57 2664 rt->rt_gateway = ort->rt_gateway;
97bab73f 2665 rt_transfer_peer(rt, ort);
62fa8a84
DM
2666 rt->fi = ort->fi;
2667 if (rt->fi)
2668 atomic_inc(&rt->fi->fib_clntref);
14e50e57
DM
2669
2670 dst_free(new);
2671 }
2672
2774c131
DM
2673 dst_release(dst_orig);
2674
2675 return rt ? &rt->dst : ERR_PTR(-ENOMEM);
14e50e57
DM
2676}
2677
9d6ec938 2678struct rtable *ip_route_output_flow(struct net *net, struct flowi4 *flp4,
b23dd4fe 2679 struct sock *sk)
1da177e4 2680{
9d6ec938 2681 struct rtable *rt = __ip_route_output_key(net, flp4);
1da177e4 2682
b23dd4fe
DM
2683 if (IS_ERR(rt))
2684 return rt;
1da177e4 2685
56157872 2686 if (flp4->flowi4_proto)
9d6ec938
DM
2687 rt = (struct rtable *) xfrm_lookup(net, &rt->dst,
2688 flowi4_to_flowi(flp4),
2689 sk, 0);
1da177e4 2690
b23dd4fe 2691 return rt;
1da177e4 2692}
d8c97a94
ACM
2693EXPORT_SYMBOL_GPL(ip_route_output_flow);
2694
4feb88e5
BT
2695static int rt_fill_info(struct net *net,
2696 struct sk_buff *skb, u32 pid, u32 seq, int event,
b6544c0b 2697 int nowait, unsigned int flags)
1da177e4 2698{
511c3f92 2699 struct rtable *rt = skb_rtable(skb);
1da177e4 2700 struct rtmsg *r;
be403ea1 2701 struct nlmsghdr *nlh;
2bc8ca40 2702 unsigned long expires = 0;
81166dd6 2703 u32 id = 0, error;
be403ea1
TG
2704
2705 nlh = nlmsg_put(skb, pid, seq, event, sizeof(*r), flags);
2706 if (nlh == NULL)
26932566 2707 return -EMSGSIZE;
be403ea1
TG
2708
2709 r = nlmsg_data(nlh);
1da177e4
LT
2710 r->rtm_family = AF_INET;
2711 r->rtm_dst_len = 32;
2712 r->rtm_src_len = 0;
475949d8 2713 r->rtm_tos = rt->rt_key_tos;
1da177e4 2714 r->rtm_table = RT_TABLE_MAIN;
f3756b79
DM
2715 if (nla_put_u32(skb, RTA_TABLE, RT_TABLE_MAIN))
2716 goto nla_put_failure;
1da177e4
LT
2717 r->rtm_type = rt->rt_type;
2718 r->rtm_scope = RT_SCOPE_UNIVERSE;
2719 r->rtm_protocol = RTPROT_UNSPEC;
2720 r->rtm_flags = (rt->rt_flags & ~0xFFFF) | RTM_F_CLONED;
2721 if (rt->rt_flags & RTCF_NOTIFY)
2722 r->rtm_flags |= RTM_F_NOTIFY;
be403ea1 2723
f3756b79
DM
2724 if (nla_put_be32(skb, RTA_DST, rt->rt_dst))
2725 goto nla_put_failure;
5e2b61f7 2726 if (rt->rt_key_src) {
1da177e4 2727 r->rtm_src_len = 32;
f3756b79
DM
2728 if (nla_put_be32(skb, RTA_SRC, rt->rt_key_src))
2729 goto nla_put_failure;
1da177e4 2730 }
f3756b79
DM
2731 if (rt->dst.dev &&
2732 nla_put_u32(skb, RTA_OIF, rt->dst.dev->ifindex))
2733 goto nla_put_failure;
c7066f70 2734#ifdef CONFIG_IP_ROUTE_CLASSID
f3756b79
DM
2735 if (rt->dst.tclassid &&
2736 nla_put_u32(skb, RTA_FLOW, rt->dst.tclassid))
2737 goto nla_put_failure;
1da177e4 2738#endif
41347dcd
DM
2739 if (!rt_is_input_route(rt) &&
2740 rt->rt_src != rt->rt_key_src) {
f3756b79
DM
2741 if (nla_put_be32(skb, RTA_PREFSRC, rt->rt_src))
2742 goto nla_put_failure;
2743 }
2744 if (rt->rt_dst != rt->rt_gateway &&
2745 nla_put_be32(skb, RTA_GATEWAY, rt->rt_gateway))
2746 goto nla_put_failure;
be403ea1 2747
defb3519 2748 if (rtnetlink_put_metrics(skb, dst_metrics_ptr(&rt->dst)) < 0)
be403ea1
TG
2749 goto nla_put_failure;
2750
f3756b79
DM
2751 if (rt->rt_mark &&
2752 nla_put_be32(skb, RTA_MARK, rt->rt_mark))
2753 goto nla_put_failure;
963bfeee 2754
d8d1f30b 2755 error = rt->dst.error;
97bab73f
DM
2756 if (rt_has_peer(rt)) {
2757 const struct inet_peer *peer = rt_peer_ptr(rt);
2758 inet_peer_refcheck(peer);
fe6fe792 2759 id = atomic_read(&peer->ip_id_count) & 0xffff;
5943634f
DM
2760 }
2761 expires = rt->dst.expires;
2762 if (expires) {
2763 if (time_before(jiffies, expires))
2764 expires -= jiffies;
2765 else
2766 expires = 0;
1da177e4 2767 }
be403ea1 2768
c7537967 2769 if (rt_is_input_route(rt)) {
1da177e4 2770#ifdef CONFIG_IP_MROUTE
e448515c 2771 __be32 dst = rt->rt_dst;
1da177e4 2772
f97c1e0c 2773 if (ipv4_is_multicast(dst) && !ipv4_is_local_multicast(dst) &&
4feb88e5 2774 IPV4_DEVCONF_ALL(net, MC_FORWARDING)) {
9a1b9496
DM
2775 int err = ipmr_get_route(net, skb,
2776 rt->rt_src, rt->rt_dst,
2777 r, nowait);
1da177e4
LT
2778 if (err <= 0) {
2779 if (!nowait) {
2780 if (err == 0)
2781 return 0;
be403ea1 2782 goto nla_put_failure;
1da177e4
LT
2783 } else {
2784 if (err == -EMSGSIZE)
be403ea1 2785 goto nla_put_failure;
e3703b3d 2786 error = err;
1da177e4
LT
2787 }
2788 }
2789 } else
2790#endif
f3756b79
DM
2791 if (nla_put_u32(skb, RTA_IIF, rt->rt_iif))
2792 goto nla_put_failure;
1da177e4
LT
2793 }
2794
87a50699 2795 if (rtnl_put_cacheinfo(skb, &rt->dst, id, expires, error) < 0)
e3703b3d 2796 goto nla_put_failure;
be403ea1
TG
2797
2798 return nlmsg_end(skb, nlh);
1da177e4 2799
be403ea1 2800nla_put_failure:
26932566
PM
2801 nlmsg_cancel(skb, nlh);
2802 return -EMSGSIZE;
1da177e4
LT
2803}
2804
5e73ea1a 2805static int inet_rtm_getroute(struct sk_buff *in_skb, struct nlmsghdr *nlh, void *arg)
1da177e4 2806{
3b1e0a65 2807 struct net *net = sock_net(in_skb->sk);
d889ce3b
TG
2808 struct rtmsg *rtm;
2809 struct nlattr *tb[RTA_MAX+1];
1da177e4 2810 struct rtable *rt = NULL;
9e12bb22
AV
2811 __be32 dst = 0;
2812 __be32 src = 0;
2813 u32 iif;
d889ce3b 2814 int err;
963bfeee 2815 int mark;
1da177e4
LT
2816 struct sk_buff *skb;
2817
d889ce3b
TG
2818 err = nlmsg_parse(nlh, sizeof(*rtm), tb, RTA_MAX, rtm_ipv4_policy);
2819 if (err < 0)
2820 goto errout;
2821
2822 rtm = nlmsg_data(nlh);
2823
1da177e4 2824 skb = alloc_skb(NLMSG_GOODSIZE, GFP_KERNEL);
d889ce3b
TG
2825 if (skb == NULL) {
2826 err = -ENOBUFS;
2827 goto errout;
2828 }
1da177e4
LT
2829
2830 /* Reserve room for dummy headers, this skb can pass
2831 through good chunk of routing engine.
2832 */
459a98ed 2833 skb_reset_mac_header(skb);
c1d2bbe1 2834 skb_reset_network_header(skb);
d2c962b8
SH
2835
2836 /* Bugfix: need to give ip_route_input enough of an IP header to not gag. */
eddc9ec5 2837 ip_hdr(skb)->protocol = IPPROTO_ICMP;
1da177e4
LT
2838 skb_reserve(skb, MAX_HEADER + sizeof(struct iphdr));
2839
17fb2c64
AV
2840 src = tb[RTA_SRC] ? nla_get_be32(tb[RTA_SRC]) : 0;
2841 dst = tb[RTA_DST] ? nla_get_be32(tb[RTA_DST]) : 0;
d889ce3b 2842 iif = tb[RTA_IIF] ? nla_get_u32(tb[RTA_IIF]) : 0;
963bfeee 2843 mark = tb[RTA_MARK] ? nla_get_u32(tb[RTA_MARK]) : 0;
1da177e4
LT
2844
2845 if (iif) {
d889ce3b
TG
2846 struct net_device *dev;
2847
1937504d 2848 dev = __dev_get_by_index(net, iif);
d889ce3b
TG
2849 if (dev == NULL) {
2850 err = -ENODEV;
2851 goto errout_free;
2852 }
2853
1da177e4
LT
2854 skb->protocol = htons(ETH_P_IP);
2855 skb->dev = dev;
963bfeee 2856 skb->mark = mark;
1da177e4
LT
2857 local_bh_disable();
2858 err = ip_route_input(skb, dst, src, rtm->rtm_tos, dev);
2859 local_bh_enable();
d889ce3b 2860
511c3f92 2861 rt = skb_rtable(skb);
d8d1f30b
CG
2862 if (err == 0 && rt->dst.error)
2863 err = -rt->dst.error;
1da177e4 2864 } else {
68a5e3dd
DM
2865 struct flowi4 fl4 = {
2866 .daddr = dst,
2867 .saddr = src,
2868 .flowi4_tos = rtm->rtm_tos,
2869 .flowi4_oif = tb[RTA_OIF] ? nla_get_u32(tb[RTA_OIF]) : 0,
2870 .flowi4_mark = mark,
d889ce3b 2871 };
9d6ec938 2872 rt = ip_route_output_key(net, &fl4);
b23dd4fe
DM
2873
2874 err = 0;
2875 if (IS_ERR(rt))
2876 err = PTR_ERR(rt);
1da177e4 2877 }
d889ce3b 2878
1da177e4 2879 if (err)
d889ce3b 2880 goto errout_free;
1da177e4 2881
d8d1f30b 2882 skb_dst_set(skb, &rt->dst);
1da177e4
LT
2883 if (rtm->rtm_flags & RTM_F_NOTIFY)
2884 rt->rt_flags |= RTCF_NOTIFY;
2885
4feb88e5 2886 err = rt_fill_info(net, skb, NETLINK_CB(in_skb).pid, nlh->nlmsg_seq,
1937504d 2887 RTM_NEWROUTE, 0, 0);
d889ce3b
TG
2888 if (err <= 0)
2889 goto errout_free;
1da177e4 2890
1937504d 2891 err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).pid);
d889ce3b 2892errout:
2942e900 2893 return err;
1da177e4 2894
d889ce3b 2895errout_free:
1da177e4 2896 kfree_skb(skb);
d889ce3b 2897 goto errout;
1da177e4
LT
2898}
2899
2900int ip_rt_dump(struct sk_buff *skb, struct netlink_callback *cb)
2901{
2902 struct rtable *rt;
2903 int h, s_h;
2904 int idx, s_idx;
1937504d
DL
2905 struct net *net;
2906
3b1e0a65 2907 net = sock_net(skb->sk);
1da177e4
LT
2908
2909 s_h = cb->args[0];
d8c92830
ED
2910 if (s_h < 0)
2911 s_h = 0;
1da177e4 2912 s_idx = idx = cb->args[1];
a6272665
ED
2913 for (h = s_h; h <= rt_hash_mask; h++, s_idx = 0) {
2914 if (!rt_hash_table[h].chain)
2915 continue;
1da177e4 2916 rcu_read_lock_bh();
a898def2 2917 for (rt = rcu_dereference_bh(rt_hash_table[h].chain), idx = 0; rt;
d8d1f30b
CG
2918 rt = rcu_dereference_bh(rt->dst.rt_next), idx++) {
2919 if (!net_eq(dev_net(rt->dst.dev), net) || idx < s_idx)
1da177e4 2920 continue;
e84f84f2 2921 if (rt_is_expired(rt))
29e75252 2922 continue;
d8d1f30b 2923 skb_dst_set_noref(skb, &rt->dst);
4feb88e5 2924 if (rt_fill_info(net, skb, NETLINK_CB(cb->skb).pid,
e905a9ed 2925 cb->nlh->nlmsg_seq, RTM_NEWROUTE,
b6544c0b 2926 1, NLM_F_MULTI) <= 0) {
adf30907 2927 skb_dst_drop(skb);
1da177e4
LT
2928 rcu_read_unlock_bh();
2929 goto done;
2930 }
adf30907 2931 skb_dst_drop(skb);
1da177e4
LT
2932 }
2933 rcu_read_unlock_bh();
2934 }
2935
2936done:
2937 cb->args[0] = h;
2938 cb->args[1] = idx;
2939 return skb->len;
2940}
2941
2942void ip_rt_multicast_event(struct in_device *in_dev)
2943{
76e6ebfb 2944 rt_cache_flush(dev_net(in_dev->dev), 0);
1da177e4
LT
2945}
2946
2947#ifdef CONFIG_SYSCTL
81c684d1 2948static int ipv4_sysctl_rtcache_flush(ctl_table *__ctl, int write,
8d65af78 2949 void __user *buffer,
1da177e4
LT
2950 size_t *lenp, loff_t *ppos)
2951{
2952 if (write) {
639e104f 2953 int flush_delay;
81c684d1 2954 ctl_table ctl;
39a23e75 2955 struct net *net;
639e104f 2956
81c684d1
DL
2957 memcpy(&ctl, __ctl, sizeof(ctl));
2958 ctl.data = &flush_delay;
8d65af78 2959 proc_dointvec(&ctl, write, buffer, lenp, ppos);
639e104f 2960
81c684d1 2961 net = (struct net *)__ctl->extra1;
39a23e75 2962 rt_cache_flush(net, flush_delay);
1da177e4 2963 return 0;
e905a9ed 2964 }
1da177e4
LT
2965
2966 return -EINVAL;
2967}
2968
eeb61f71 2969static ctl_table ipv4_route_table[] = {
1da177e4 2970 {
1da177e4
LT
2971 .procname = "gc_thresh",
2972 .data = &ipv4_dst_ops.gc_thresh,
2973 .maxlen = sizeof(int),
2974 .mode = 0644,
6d9f239a 2975 .proc_handler = proc_dointvec,
1da177e4
LT
2976 },
2977 {
1da177e4
LT
2978 .procname = "max_size",
2979 .data = &ip_rt_max_size,
2980 .maxlen = sizeof(int),
2981 .mode = 0644,
6d9f239a 2982 .proc_handler = proc_dointvec,
1da177e4
LT
2983 },
2984 {
2985 /* Deprecated. Use gc_min_interval_ms */
e905a9ed 2986
1da177e4
LT
2987 .procname = "gc_min_interval",
2988 .data = &ip_rt_gc_min_interval,
2989 .maxlen = sizeof(int),
2990 .mode = 0644,
6d9f239a 2991 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
2992 },
2993 {
1da177e4
LT
2994 .procname = "gc_min_interval_ms",
2995 .data = &ip_rt_gc_min_interval,
2996 .maxlen = sizeof(int),
2997 .mode = 0644,
6d9f239a 2998 .proc_handler = proc_dointvec_ms_jiffies,
1da177e4
LT
2999 },
3000 {
1da177e4
LT
3001 .procname = "gc_timeout",
3002 .data = &ip_rt_gc_timeout,
3003 .maxlen = sizeof(int),
3004 .mode = 0644,
6d9f239a 3005 .proc_handler = proc_dointvec_jiffies,
1da177e4 3006 },
9f28a2fc
ED
3007 {
3008 .procname = "gc_interval",
3009 .data = &ip_rt_gc_interval,
3010 .maxlen = sizeof(int),
3011 .mode = 0644,
3012 .proc_handler = proc_dointvec_jiffies,
3013 },
1da177e4 3014 {
1da177e4
LT
3015 .procname = "redirect_load",
3016 .data = &ip_rt_redirect_load,
3017 .maxlen = sizeof(int),
3018 .mode = 0644,
6d9f239a 3019 .proc_handler = proc_dointvec,
1da177e4
LT
3020 },
3021 {
1da177e4
LT
3022 .procname = "redirect_number",
3023 .data = &ip_rt_redirect_number,
3024 .maxlen = sizeof(int),
3025 .mode = 0644,
6d9f239a 3026 .proc_handler = proc_dointvec,
1da177e4
LT
3027 },
3028 {
1da177e4
LT
3029 .procname = "redirect_silence",
3030 .data = &ip_rt_redirect_silence,
3031 .maxlen = sizeof(int),
3032 .mode = 0644,
6d9f239a 3033 .proc_handler = proc_dointvec,
1da177e4
LT
3034 },
3035 {
1da177e4
LT
3036 .procname = "error_cost",
3037 .data = &ip_rt_error_cost,
3038 .maxlen = sizeof(int),
3039 .mode = 0644,
6d9f239a 3040 .proc_handler = proc_dointvec,
1da177e4
LT
3041 },
3042 {
1da177e4
LT
3043 .procname = "error_burst",
3044 .data = &ip_rt_error_burst,
3045 .maxlen = sizeof(int),
3046 .mode = 0644,
6d9f239a 3047 .proc_handler = proc_dointvec,
1da177e4
LT
3048 },
3049 {
1da177e4
LT
3050 .procname = "gc_elasticity",
3051 .data = &ip_rt_gc_elasticity,
3052 .maxlen = sizeof(int),
3053 .mode = 0644,
6d9f239a 3054 .proc_handler = proc_dointvec,
1da177e4
LT
3055 },
3056 {
1da177e4
LT
3057 .procname = "mtu_expires",
3058 .data = &ip_rt_mtu_expires,
3059 .maxlen = sizeof(int),
3060 .mode = 0644,
6d9f239a 3061 .proc_handler = proc_dointvec_jiffies,
1da177e4
LT
3062 },
3063 {
1da177e4
LT
3064 .procname = "min_pmtu",
3065 .data = &ip_rt_min_pmtu,
3066 .maxlen = sizeof(int),
3067 .mode = 0644,
6d9f239a 3068 .proc_handler = proc_dointvec,
1da177e4
LT
3069 },
3070 {
1da177e4
LT
3071 .procname = "min_adv_mss",
3072 .data = &ip_rt_min_advmss,
3073 .maxlen = sizeof(int),
3074 .mode = 0644,
6d9f239a 3075 .proc_handler = proc_dointvec,
1da177e4 3076 },
f8572d8f 3077 { }
1da177e4 3078};
39a23e75 3079
39a23e75
DL
3080static struct ctl_table ipv4_route_flush_table[] = {
3081 {
39a23e75
DL
3082 .procname = "flush",
3083 .maxlen = sizeof(int),
3084 .mode = 0200,
6d9f239a 3085 .proc_handler = ipv4_sysctl_rtcache_flush,
39a23e75 3086 },
f8572d8f 3087 { },
39a23e75
DL
3088};
3089
3090static __net_init int sysctl_route_net_init(struct net *net)
3091{
3092 struct ctl_table *tbl;
3093
3094 tbl = ipv4_route_flush_table;
09ad9bc7 3095 if (!net_eq(net, &init_net)) {
39a23e75
DL
3096 tbl = kmemdup(tbl, sizeof(ipv4_route_flush_table), GFP_KERNEL);
3097 if (tbl == NULL)
3098 goto err_dup;
3099 }
3100 tbl[0].extra1 = net;
3101
ec8f23ce 3102 net->ipv4.route_hdr = register_net_sysctl(net, "net/ipv4/route", tbl);
39a23e75
DL
3103 if (net->ipv4.route_hdr == NULL)
3104 goto err_reg;
3105 return 0;
3106
3107err_reg:
3108 if (tbl != ipv4_route_flush_table)
3109 kfree(tbl);
3110err_dup:
3111 return -ENOMEM;
3112}
3113
3114static __net_exit void sysctl_route_net_exit(struct net *net)
3115{
3116 struct ctl_table *tbl;
3117
3118 tbl = net->ipv4.route_hdr->ctl_table_arg;
3119 unregister_net_sysctl_table(net->ipv4.route_hdr);
3120 BUG_ON(tbl == ipv4_route_flush_table);
3121 kfree(tbl);
3122}
3123
3124static __net_initdata struct pernet_operations sysctl_route_ops = {
3125 .init = sysctl_route_net_init,
3126 .exit = sysctl_route_net_exit,
3127};
1da177e4
LT
3128#endif
3129
3ee94372 3130static __net_init int rt_genid_init(struct net *net)
9f5e97e5 3131{
3ee94372
NH
3132 get_random_bytes(&net->ipv4.rt_genid,
3133 sizeof(net->ipv4.rt_genid));
436c3b66
DM
3134 get_random_bytes(&net->ipv4.dev_addr_genid,
3135 sizeof(net->ipv4.dev_addr_genid));
9f5e97e5
DL
3136 return 0;
3137}
3138
3ee94372
NH
3139static __net_initdata struct pernet_operations rt_genid_ops = {
3140 .init = rt_genid_init,
9f5e97e5
DL
3141};
3142
c3426b47
DM
3143static int __net_init ipv4_inetpeer_init(struct net *net)
3144{
3145 struct inet_peer_base *bp = kmalloc(sizeof(*bp), GFP_KERNEL);
3146
3147 if (!bp)
3148 return -ENOMEM;
3149 inet_peer_base_init(bp);
3150 net->ipv4.peers = bp;
3151 return 0;
3152}
3153
3154static void __net_exit ipv4_inetpeer_exit(struct net *net)
3155{
3156 struct inet_peer_base *bp = net->ipv4.peers;
3157
3158 net->ipv4.peers = NULL;
56a6b248 3159 inetpeer_invalidate_tree(bp);
c3426b47
DM
3160 kfree(bp);
3161}
3162
3163static __net_initdata struct pernet_operations ipv4_inetpeer_ops = {
3164 .init = ipv4_inetpeer_init,
3165 .exit = ipv4_inetpeer_exit,
3166};
9f5e97e5 3167
c7066f70 3168#ifdef CONFIG_IP_ROUTE_CLASSID
7d720c3e 3169struct ip_rt_acct __percpu *ip_rt_acct __read_mostly;
c7066f70 3170#endif /* CONFIG_IP_ROUTE_CLASSID */
1da177e4
LT
3171
3172static __initdata unsigned long rhash_entries;
3173static int __init set_rhash_entries(char *str)
3174{
413c27d8
EZ
3175 ssize_t ret;
3176
1da177e4
LT
3177 if (!str)
3178 return 0;
413c27d8
EZ
3179
3180 ret = kstrtoul(str, 0, &rhash_entries);
3181 if (ret)
3182 return 0;
3183
1da177e4
LT
3184 return 1;
3185}
3186__setup("rhash_entries=", set_rhash_entries);
3187
3188int __init ip_rt_init(void)
3189{
424c4b70 3190 int rc = 0;
1da177e4 3191
c7066f70 3192#ifdef CONFIG_IP_ROUTE_CLASSID
0dcec8c2 3193 ip_rt_acct = __alloc_percpu(256 * sizeof(struct ip_rt_acct), __alignof__(struct ip_rt_acct));
1da177e4
LT
3194 if (!ip_rt_acct)
3195 panic("IP: failed to allocate ip_rt_acct\n");
1da177e4
LT
3196#endif
3197
e5d679f3
AD
3198 ipv4_dst_ops.kmem_cachep =
3199 kmem_cache_create("ip_dst_cache", sizeof(struct rtable), 0,
20c2df83 3200 SLAB_HWCACHE_ALIGN|SLAB_PANIC, NULL);
1da177e4 3201
14e50e57
DM
3202 ipv4_dst_blackhole_ops.kmem_cachep = ipv4_dst_ops.kmem_cachep;
3203
fc66f95c
ED
3204 if (dst_entries_init(&ipv4_dst_ops) < 0)
3205 panic("IP: failed to allocate ipv4_dst_ops counter\n");
3206
3207 if (dst_entries_init(&ipv4_dst_blackhole_ops) < 0)
3208 panic("IP: failed to allocate ipv4_dst_blackhole_ops counter\n");
3209
424c4b70
ED
3210 rt_hash_table = (struct rt_hash_bucket *)
3211 alloc_large_system_hash("IP route cache",
3212 sizeof(struct rt_hash_bucket),
3213 rhash_entries,
4481374c 3214 (totalram_pages >= 128 * 1024) ?
18955cfc 3215 15 : 17,
8d1502de 3216 0,
424c4b70
ED
3217 &rt_hash_log,
3218 &rt_hash_mask,
31fe62b9 3219 0,
c9503e0f 3220 rhash_entries ? 0 : 512 * 1024);
22c047cc
ED
3221 memset(rt_hash_table, 0, (rt_hash_mask + 1) * sizeof(struct rt_hash_bucket));
3222 rt_hash_lock_init();
1da177e4
LT
3223
3224 ipv4_dst_ops.gc_thresh = (rt_hash_mask + 1);
3225 ip_rt_max_size = (rt_hash_mask + 1) * 16;
3226
1da177e4
LT
3227 devinet_init();
3228 ip_fib_init();
3229
9f28a2fc
ED
3230 INIT_DELAYED_WORK_DEFERRABLE(&expires_work, rt_worker_func);
3231 expires_ljiffies = jiffies;
3232 schedule_delayed_work(&expires_work,
3233 net_random() % ip_rt_gc_interval + ip_rt_gc_interval);
3234
73b38711 3235 if (ip_rt_proc_init())
058bd4d2 3236 pr_err("Unable to create route proc files\n");
1da177e4
LT
3237#ifdef CONFIG_XFRM
3238 xfrm_init();
a33bc5c1 3239 xfrm4_init(ip_rt_max_size);
1da177e4 3240#endif
c7ac8679 3241 rtnl_register(PF_INET, RTM_GETROUTE, inet_rtm_getroute, NULL, NULL);
63f3444f 3242
39a23e75
DL
3243#ifdef CONFIG_SYSCTL
3244 register_pernet_subsys(&sysctl_route_ops);
3245#endif
3ee94372 3246 register_pernet_subsys(&rt_genid_ops);
c3426b47 3247 register_pernet_subsys(&ipv4_inetpeer_ops);
1da177e4
LT
3248 return rc;
3249}
3250
a1bc6eb4 3251#ifdef CONFIG_SYSCTL
eeb61f71
AV
3252/*
3253 * We really need to sanitize the damn ipv4 init order, then all
3254 * this nonsense will go away.
3255 */
3256void __init ip_static_sysctl_init(void)
3257{
4e5ca785 3258 register_net_sysctl(&init_net, "net/ipv4/route", ipv4_route_table);
eeb61f71 3259}
a1bc6eb4 3260#endif