Merge remote-tracking branch 'regulator/topic/core' into regulator-next
[sfrench/cifs-2.6.git] / net / ipv4 / route.c
1 /*
2  * INET         An implementation of the TCP/IP protocol suite for the LINUX
3  *              operating system.  INET is implemented using the  BSD Socket
4  *              interface as the means of communication with the user level.
5  *
6  *              ROUTE - implementation of the IP router.
7  *
8  * Authors:     Ross Biro
9  *              Fred N. van Kempen, <waltje@uWalt.NL.Mugnet.ORG>
10  *              Alan Cox, <gw4pts@gw4pts.ampr.org>
11  *              Linus Torvalds, <Linus.Torvalds@helsinki.fi>
12  *              Alexey Kuznetsov, <kuznet@ms2.inr.ac.ru>
13  *
14  * Fixes:
15  *              Alan Cox        :       Verify area fixes.
16  *              Alan Cox        :       cli() protects routing changes
17  *              Rui Oliveira    :       ICMP routing table updates
18  *              (rco@di.uminho.pt)      Routing table insertion and update
19  *              Linus Torvalds  :       Rewrote bits to be sensible
20  *              Alan Cox        :       Added BSD route gw semantics
21  *              Alan Cox        :       Super /proc >4K
22  *              Alan Cox        :       MTU in route table
23  *              Alan Cox        :       MSS actually. Also added the window
24  *                                      clamper.
25  *              Sam Lantinga    :       Fixed route matching in rt_del()
26  *              Alan Cox        :       Routing cache support.
27  *              Alan Cox        :       Removed compatibility cruft.
28  *              Alan Cox        :       RTF_REJECT support.
29  *              Alan Cox        :       TCP irtt support.
30  *              Jonathan Naylor :       Added Metric support.
31  *      Miquel van Smoorenburg  :       BSD API fixes.
32  *      Miquel van Smoorenburg  :       Metrics.
33  *              Alan Cox        :       Use __u32 properly
34  *              Alan Cox        :       Aligned routing errors more closely with BSD
35  *                                      our system is still very different.
36  *              Alan Cox        :       Faster /proc handling
37  *      Alexey Kuznetsov        :       Massive rework to support tree based routing,
38  *                                      routing caches and better behaviour.
39  *
40  *              Olaf Erb        :       irtt wasn't being copied right.
41  *              Bjorn Ekwall    :       Kerneld route support.
42  *              Alan Cox        :       Multicast fixed (I hope)
43  *              Pavel Krauz     :       Limited broadcast fixed
44  *              Mike McLagan    :       Routing by source
45  *      Alexey Kuznetsov        :       End of old history. Split to fib.c and
46  *                                      route.c and rewritten from scratch.
47  *              Andi Kleen      :       Load-limit warning messages.
48  *      Vitaly E. Lavrov        :       Transparent proxy revived after year coma.
49  *      Vitaly E. Lavrov        :       Race condition in ip_route_input_slow.
50  *      Tobias Ringstrom        :       Uninitialized res.type in ip_route_output_slow.
51  *      Vladimir V. Ivanov      :       IP rule info (flowid) is really useful.
52  *              Marc Boucher    :       routing by fwmark
53  *      Robert Olsson           :       Added rt_cache statistics
54  *      Arnaldo C. Melo         :       Convert proc stuff to seq_file
55  *      Eric Dumazet            :       hashed spinlocks and rt_check_expire() fixes.
56  *      Ilia Sotnikov           :       Ignore TOS on PMTUD and Redirect
57  *      Ilia Sotnikov           :       Removed TOS from hash calculations
58  *
59  *              This program is free software; you can redistribute it and/or
60  *              modify it under the terms of the GNU General Public License
61  *              as published by the Free Software Foundation; either version
62  *              2 of the License, or (at your option) any later version.
63  */
64
65 #define pr_fmt(fmt) "IPv4: " fmt
66
67 #include <linux/module.h>
68 #include <linux/uaccess.h>
69 #include <linux/bitops.h>
70 #include <linux/types.h>
71 #include <linux/kernel.h>
72 #include <linux/mm.h>
73 #include <linux/string.h>
74 #include <linux/socket.h>
75 #include <linux/sockios.h>
76 #include <linux/errno.h>
77 #include <linux/in.h>
78 #include <linux/inet.h>
79 #include <linux/netdevice.h>
80 #include <linux/proc_fs.h>
81 #include <linux/init.h>
82 #include <linux/skbuff.h>
83 #include <linux/inetdevice.h>
84 #include <linux/igmp.h>
85 #include <linux/pkt_sched.h>
86 #include <linux/mroute.h>
87 #include <linux/netfilter_ipv4.h>
88 #include <linux/random.h>
89 #include <linux/rcupdate.h>
90 #include <linux/times.h>
91 #include <linux/slab.h>
92 #include <linux/jhash.h>
93 #include <net/dst.h>
94 #include <net/dst_metadata.h>
95 #include <net/net_namespace.h>
96 #include <net/protocol.h>
97 #include <net/ip.h>
98 #include <net/route.h>
99 #include <net/inetpeer.h>
100 #include <net/sock.h>
101 #include <net/ip_fib.h>
102 #include <net/arp.h>
103 #include <net/tcp.h>
104 #include <net/icmp.h>
105 #include <net/xfrm.h>
106 #include <net/lwtunnel.h>
107 #include <net/netevent.h>
108 #include <net/rtnetlink.h>
109 #ifdef CONFIG_SYSCTL
110 #include <linux/sysctl.h>
111 #include <linux/kmemleak.h>
112 #endif
113 #include <net/secure_seq.h>
114 #include <net/ip_tunnels.h>
115 #include <net/l3mdev.h>
116
117 #include "fib_lookup.h"
118
119 #define RT_FL_TOS(oldflp4) \
120         ((oldflp4)->flowi4_tos & (IPTOS_RT_MASK | RTO_ONLINK))
121
122 #define RT_GC_TIMEOUT (300*HZ)
123
124 static int ip_rt_max_size;
125 static int ip_rt_redirect_number __read_mostly  = 9;
126 static int ip_rt_redirect_load __read_mostly    = HZ / 50;
127 static int ip_rt_redirect_silence __read_mostly = ((HZ / 50) << (9 + 1));
128 static int ip_rt_error_cost __read_mostly       = HZ;
129 static int ip_rt_error_burst __read_mostly      = 5 * HZ;
130 static int ip_rt_mtu_expires __read_mostly      = 10 * 60 * HZ;
131 static int ip_rt_min_pmtu __read_mostly         = 512 + 20 + 20;
132 static int ip_rt_min_advmss __read_mostly       = 256;
133
134 static int ip_rt_gc_timeout __read_mostly       = RT_GC_TIMEOUT;
135 /*
136  *      Interface to generic destination cache.
137  */
138
139 static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie);
140 static unsigned int      ipv4_default_advmss(const struct dst_entry *dst);
141 static unsigned int      ipv4_mtu(const struct dst_entry *dst);
142 static struct dst_entry *ipv4_negative_advice(struct dst_entry *dst);
143 static void              ipv4_link_failure(struct sk_buff *skb);
144 static void              ip_rt_update_pmtu(struct dst_entry *dst, struct sock *sk,
145                                            struct sk_buff *skb, u32 mtu);
146 static void              ip_do_redirect(struct dst_entry *dst, struct sock *sk,
147                                         struct sk_buff *skb);
148 static void             ipv4_dst_destroy(struct dst_entry *dst);
149
150 static u32 *ipv4_cow_metrics(struct dst_entry *dst, unsigned long old)
151 {
152         WARN_ON(1);
153         return NULL;
154 }
155
156 static struct neighbour *ipv4_neigh_lookup(const struct dst_entry *dst,
157                                            struct sk_buff *skb,
158                                            const void *daddr);
159 static void ipv4_confirm_neigh(const struct dst_entry *dst, const void *daddr);
160
161 static struct dst_ops ipv4_dst_ops = {
162         .family =               AF_INET,
163         .check =                ipv4_dst_check,
164         .default_advmss =       ipv4_default_advmss,
165         .mtu =                  ipv4_mtu,
166         .cow_metrics =          ipv4_cow_metrics,
167         .destroy =              ipv4_dst_destroy,
168         .negative_advice =      ipv4_negative_advice,
169         .link_failure =         ipv4_link_failure,
170         .update_pmtu =          ip_rt_update_pmtu,
171         .redirect =             ip_do_redirect,
172         .local_out =            __ip_local_out,
173         .neigh_lookup =         ipv4_neigh_lookup,
174         .confirm_neigh =        ipv4_confirm_neigh,
175 };
176
177 #define ECN_OR_COST(class)      TC_PRIO_##class
178
179 const __u8 ip_tos2prio[16] = {
180         TC_PRIO_BESTEFFORT,
181         ECN_OR_COST(BESTEFFORT),
182         TC_PRIO_BESTEFFORT,
183         ECN_OR_COST(BESTEFFORT),
184         TC_PRIO_BULK,
185         ECN_OR_COST(BULK),
186         TC_PRIO_BULK,
187         ECN_OR_COST(BULK),
188         TC_PRIO_INTERACTIVE,
189         ECN_OR_COST(INTERACTIVE),
190         TC_PRIO_INTERACTIVE,
191         ECN_OR_COST(INTERACTIVE),
192         TC_PRIO_INTERACTIVE_BULK,
193         ECN_OR_COST(INTERACTIVE_BULK),
194         TC_PRIO_INTERACTIVE_BULK,
195         ECN_OR_COST(INTERACTIVE_BULK)
196 };
197 EXPORT_SYMBOL(ip_tos2prio);
198
199 static DEFINE_PER_CPU(struct rt_cache_stat, rt_cache_stat);
200 #define RT_CACHE_STAT_INC(field) raw_cpu_inc(rt_cache_stat.field)
201
202 #ifdef CONFIG_PROC_FS
203 static void *rt_cache_seq_start(struct seq_file *seq, loff_t *pos)
204 {
205         if (*pos)
206                 return NULL;
207         return SEQ_START_TOKEN;
208 }
209
210 static void *rt_cache_seq_next(struct seq_file *seq, void *v, loff_t *pos)
211 {
212         ++*pos;
213         return NULL;
214 }
215
216 static void rt_cache_seq_stop(struct seq_file *seq, void *v)
217 {
218 }
219
220 static int rt_cache_seq_show(struct seq_file *seq, void *v)
221 {
222         if (v == SEQ_START_TOKEN)
223                 seq_printf(seq, "%-127s\n",
224                            "Iface\tDestination\tGateway \tFlags\t\tRefCnt\tUse\t"
225                            "Metric\tSource\t\tMTU\tWindow\tIRTT\tTOS\tHHRef\t"
226                            "HHUptod\tSpecDst");
227         return 0;
228 }
229
230 static const struct seq_operations rt_cache_seq_ops = {
231         .start  = rt_cache_seq_start,
232         .next   = rt_cache_seq_next,
233         .stop   = rt_cache_seq_stop,
234         .show   = rt_cache_seq_show,
235 };
236
237 static int rt_cache_seq_open(struct inode *inode, struct file *file)
238 {
239         return seq_open(file, &rt_cache_seq_ops);
240 }
241
242 static const struct file_operations rt_cache_seq_fops = {
243         .owner   = THIS_MODULE,
244         .open    = rt_cache_seq_open,
245         .read    = seq_read,
246         .llseek  = seq_lseek,
247         .release = seq_release,
248 };
249
250
251 static void *rt_cpu_seq_start(struct seq_file *seq, loff_t *pos)
252 {
253         int cpu;
254
255         if (*pos == 0)
256                 return SEQ_START_TOKEN;
257
258         for (cpu = *pos-1; cpu < nr_cpu_ids; ++cpu) {
259                 if (!cpu_possible(cpu))
260                         continue;
261                 *pos = cpu+1;
262                 return &per_cpu(rt_cache_stat, cpu);
263         }
264         return NULL;
265 }
266
267 static void *rt_cpu_seq_next(struct seq_file *seq, void *v, loff_t *pos)
268 {
269         int cpu;
270
271         for (cpu = *pos; cpu < nr_cpu_ids; ++cpu) {
272                 if (!cpu_possible(cpu))
273                         continue;
274                 *pos = cpu+1;
275                 return &per_cpu(rt_cache_stat, cpu);
276         }
277         return NULL;
278
279 }
280
281 static void rt_cpu_seq_stop(struct seq_file *seq, void *v)
282 {
283
284 }
285
286 static int rt_cpu_seq_show(struct seq_file *seq, void *v)
287 {
288         struct rt_cache_stat *st = v;
289
290         if (v == SEQ_START_TOKEN) {
291                 seq_printf(seq, "entries  in_hit in_slow_tot in_slow_mc in_no_route in_brd in_martian_dst in_martian_src  out_hit out_slow_tot out_slow_mc  gc_total gc_ignored gc_goal_miss gc_dst_overflow in_hlist_search out_hlist_search\n");
292                 return 0;
293         }
294
295         seq_printf(seq,"%08x  %08x %08x %08x %08x %08x %08x %08x "
296                    " %08x %08x %08x %08x %08x %08x %08x %08x %08x \n",
297                    dst_entries_get_slow(&ipv4_dst_ops),
298                    0, /* st->in_hit */
299                    st->in_slow_tot,
300                    st->in_slow_mc,
301                    st->in_no_route,
302                    st->in_brd,
303                    st->in_martian_dst,
304                    st->in_martian_src,
305
306                    0, /* st->out_hit */
307                    st->out_slow_tot,
308                    st->out_slow_mc,
309
310                    0, /* st->gc_total */
311                    0, /* st->gc_ignored */
312                    0, /* st->gc_goal_miss */
313                    0, /* st->gc_dst_overflow */
314                    0, /* st->in_hlist_search */
315                    0  /* st->out_hlist_search */
316                 );
317         return 0;
318 }
319
320 static const struct seq_operations rt_cpu_seq_ops = {
321         .start  = rt_cpu_seq_start,
322         .next   = rt_cpu_seq_next,
323         .stop   = rt_cpu_seq_stop,
324         .show   = rt_cpu_seq_show,
325 };
326
327
328 static int rt_cpu_seq_open(struct inode *inode, struct file *file)
329 {
330         return seq_open(file, &rt_cpu_seq_ops);
331 }
332
333 static const struct file_operations rt_cpu_seq_fops = {
334         .owner   = THIS_MODULE,
335         .open    = rt_cpu_seq_open,
336         .read    = seq_read,
337         .llseek  = seq_lseek,
338         .release = seq_release,
339 };
340
341 #ifdef CONFIG_IP_ROUTE_CLASSID
342 static int rt_acct_proc_show(struct seq_file *m, void *v)
343 {
344         struct ip_rt_acct *dst, *src;
345         unsigned int i, j;
346
347         dst = kcalloc(256, sizeof(struct ip_rt_acct), GFP_KERNEL);
348         if (!dst)
349                 return -ENOMEM;
350
351         for_each_possible_cpu(i) {
352                 src = (struct ip_rt_acct *)per_cpu_ptr(ip_rt_acct, i);
353                 for (j = 0; j < 256; j++) {
354                         dst[j].o_bytes   += src[j].o_bytes;
355                         dst[j].o_packets += src[j].o_packets;
356                         dst[j].i_bytes   += src[j].i_bytes;
357                         dst[j].i_packets += src[j].i_packets;
358                 }
359         }
360
361         seq_write(m, dst, 256 * sizeof(struct ip_rt_acct));
362         kfree(dst);
363         return 0;
364 }
365
366 static int rt_acct_proc_open(struct inode *inode, struct file *file)
367 {
368         return single_open(file, rt_acct_proc_show, NULL);
369 }
370
371 static const struct file_operations rt_acct_proc_fops = {
372         .owner          = THIS_MODULE,
373         .open           = rt_acct_proc_open,
374         .read           = seq_read,
375         .llseek         = seq_lseek,
376         .release        = single_release,
377 };
378 #endif
379
380 static int __net_init ip_rt_do_proc_init(struct net *net)
381 {
382         struct proc_dir_entry *pde;
383
384         pde = proc_create("rt_cache", S_IRUGO, net->proc_net,
385                           &rt_cache_seq_fops);
386         if (!pde)
387                 goto err1;
388
389         pde = proc_create("rt_cache", S_IRUGO,
390                           net->proc_net_stat, &rt_cpu_seq_fops);
391         if (!pde)
392                 goto err2;
393
394 #ifdef CONFIG_IP_ROUTE_CLASSID
395         pde = proc_create("rt_acct", 0, net->proc_net, &rt_acct_proc_fops);
396         if (!pde)
397                 goto err3;
398 #endif
399         return 0;
400
401 #ifdef CONFIG_IP_ROUTE_CLASSID
402 err3:
403         remove_proc_entry("rt_cache", net->proc_net_stat);
404 #endif
405 err2:
406         remove_proc_entry("rt_cache", net->proc_net);
407 err1:
408         return -ENOMEM;
409 }
410
411 static void __net_exit ip_rt_do_proc_exit(struct net *net)
412 {
413         remove_proc_entry("rt_cache", net->proc_net_stat);
414         remove_proc_entry("rt_cache", net->proc_net);
415 #ifdef CONFIG_IP_ROUTE_CLASSID
416         remove_proc_entry("rt_acct", net->proc_net);
417 #endif
418 }
419
420 static struct pernet_operations ip_rt_proc_ops __net_initdata =  {
421         .init = ip_rt_do_proc_init,
422         .exit = ip_rt_do_proc_exit,
423 };
424
425 static int __init ip_rt_proc_init(void)
426 {
427         return register_pernet_subsys(&ip_rt_proc_ops);
428 }
429
430 #else
431 static inline int ip_rt_proc_init(void)
432 {
433         return 0;
434 }
435 #endif /* CONFIG_PROC_FS */
436
437 static inline bool rt_is_expired(const struct rtable *rth)
438 {
439         return rth->rt_genid != rt_genid_ipv4(dev_net(rth->dst.dev));
440 }
441
442 void rt_cache_flush(struct net *net)
443 {
444         rt_genid_bump_ipv4(net);
445 }
446
447 static struct neighbour *ipv4_neigh_lookup(const struct dst_entry *dst,
448                                            struct sk_buff *skb,
449                                            const void *daddr)
450 {
451         struct net_device *dev = dst->dev;
452         const __be32 *pkey = daddr;
453         const struct rtable *rt;
454         struct neighbour *n;
455
456         rt = (const struct rtable *) dst;
457         if (rt->rt_gateway)
458                 pkey = (const __be32 *) &rt->rt_gateway;
459         else if (skb)
460                 pkey = &ip_hdr(skb)->daddr;
461
462         n = __ipv4_neigh_lookup(dev, *(__force u32 *)pkey);
463         if (n)
464                 return n;
465         return neigh_create(&arp_tbl, pkey, dev);
466 }
467
468 static void ipv4_confirm_neigh(const struct dst_entry *dst, const void *daddr)
469 {
470         struct net_device *dev = dst->dev;
471         const __be32 *pkey = daddr;
472         const struct rtable *rt;
473
474         rt = (const struct rtable *)dst;
475         if (rt->rt_gateway)
476                 pkey = (const __be32 *)&rt->rt_gateway;
477         else if (!daddr ||
478                  (rt->rt_flags &
479                   (RTCF_MULTICAST | RTCF_BROADCAST | RTCF_LOCAL)))
480                 return;
481
482         __ipv4_confirm_neigh(dev, *(__force u32 *)pkey);
483 }
484
485 #define IP_IDENTS_SZ 2048u
486
487 static atomic_t *ip_idents __read_mostly;
488 static u32 *ip_tstamps __read_mostly;
489
490 /* In order to protect privacy, we add a perturbation to identifiers
491  * if one generator is seldom used. This makes hard for an attacker
492  * to infer how many packets were sent between two points in time.
493  */
494 u32 ip_idents_reserve(u32 hash, int segs)
495 {
496         u32 *p_tstamp = ip_tstamps + hash % IP_IDENTS_SZ;
497         atomic_t *p_id = ip_idents + hash % IP_IDENTS_SZ;
498         u32 old = READ_ONCE(*p_tstamp);
499         u32 now = (u32)jiffies;
500         u32 new, delta = 0;
501
502         if (old != now && cmpxchg(p_tstamp, old, now) == old)
503                 delta = prandom_u32_max(now - old);
504
505         /* Do not use atomic_add_return() as it makes UBSAN unhappy */
506         do {
507                 old = (u32)atomic_read(p_id);
508                 new = old + delta + segs;
509         } while (atomic_cmpxchg(p_id, old, new) != old);
510
511         return new - segs;
512 }
513 EXPORT_SYMBOL(ip_idents_reserve);
514
515 void __ip_select_ident(struct net *net, struct iphdr *iph, int segs)
516 {
517         static u32 ip_idents_hashrnd __read_mostly;
518         u32 hash, id;
519
520         net_get_random_once(&ip_idents_hashrnd, sizeof(ip_idents_hashrnd));
521
522         hash = jhash_3words((__force u32)iph->daddr,
523                             (__force u32)iph->saddr,
524                             iph->protocol ^ net_hash_mix(net),
525                             ip_idents_hashrnd);
526         id = ip_idents_reserve(hash, segs);
527         iph->id = htons(id);
528 }
529 EXPORT_SYMBOL(__ip_select_ident);
530
531 static void __build_flow_key(const struct net *net, struct flowi4 *fl4,
532                              const struct sock *sk,
533                              const struct iphdr *iph,
534                              int oif, u8 tos,
535                              u8 prot, u32 mark, int flow_flags)
536 {
537         if (sk) {
538                 const struct inet_sock *inet = inet_sk(sk);
539
540                 oif = sk->sk_bound_dev_if;
541                 mark = sk->sk_mark;
542                 tos = RT_CONN_FLAGS(sk);
543                 prot = inet->hdrincl ? IPPROTO_RAW : sk->sk_protocol;
544         }
545         flowi4_init_output(fl4, oif, mark, tos,
546                            RT_SCOPE_UNIVERSE, prot,
547                            flow_flags,
548                            iph->daddr, iph->saddr, 0, 0,
549                            sock_net_uid(net, sk));
550 }
551
552 static void build_skb_flow_key(struct flowi4 *fl4, const struct sk_buff *skb,
553                                const struct sock *sk)
554 {
555         const struct net *net = dev_net(skb->dev);
556         const struct iphdr *iph = ip_hdr(skb);
557         int oif = skb->dev->ifindex;
558         u8 tos = RT_TOS(iph->tos);
559         u8 prot = iph->protocol;
560         u32 mark = skb->mark;
561
562         __build_flow_key(net, fl4, sk, iph, oif, tos, prot, mark, 0);
563 }
564
565 static void build_sk_flow_key(struct flowi4 *fl4, const struct sock *sk)
566 {
567         const struct inet_sock *inet = inet_sk(sk);
568         const struct ip_options_rcu *inet_opt;
569         __be32 daddr = inet->inet_daddr;
570
571         rcu_read_lock();
572         inet_opt = rcu_dereference(inet->inet_opt);
573         if (inet_opt && inet_opt->opt.srr)
574                 daddr = inet_opt->opt.faddr;
575         flowi4_init_output(fl4, sk->sk_bound_dev_if, sk->sk_mark,
576                            RT_CONN_FLAGS(sk), RT_SCOPE_UNIVERSE,
577                            inet->hdrincl ? IPPROTO_RAW : sk->sk_protocol,
578                            inet_sk_flowi_flags(sk),
579                            daddr, inet->inet_saddr, 0, 0, sk->sk_uid);
580         rcu_read_unlock();
581 }
582
583 static void ip_rt_build_flow_key(struct flowi4 *fl4, const struct sock *sk,
584                                  const struct sk_buff *skb)
585 {
586         if (skb)
587                 build_skb_flow_key(fl4, skb, sk);
588         else
589                 build_sk_flow_key(fl4, sk);
590 }
591
592 static DEFINE_SPINLOCK(fnhe_lock);
593
594 static void fnhe_flush_routes(struct fib_nh_exception *fnhe)
595 {
596         struct rtable *rt;
597
598         rt = rcu_dereference(fnhe->fnhe_rth_input);
599         if (rt) {
600                 RCU_INIT_POINTER(fnhe->fnhe_rth_input, NULL);
601                 dst_dev_put(&rt->dst);
602                 dst_release(&rt->dst);
603         }
604         rt = rcu_dereference(fnhe->fnhe_rth_output);
605         if (rt) {
606                 RCU_INIT_POINTER(fnhe->fnhe_rth_output, NULL);
607                 dst_dev_put(&rt->dst);
608                 dst_release(&rt->dst);
609         }
610 }
611
612 static struct fib_nh_exception *fnhe_oldest(struct fnhe_hash_bucket *hash)
613 {
614         struct fib_nh_exception *fnhe, *oldest;
615
616         oldest = rcu_dereference(hash->chain);
617         for (fnhe = rcu_dereference(oldest->fnhe_next); fnhe;
618              fnhe = rcu_dereference(fnhe->fnhe_next)) {
619                 if (time_before(fnhe->fnhe_stamp, oldest->fnhe_stamp))
620                         oldest = fnhe;
621         }
622         fnhe_flush_routes(oldest);
623         return oldest;
624 }
625
626 static inline u32 fnhe_hashfun(__be32 daddr)
627 {
628         static u32 fnhe_hashrnd __read_mostly;
629         u32 hval;
630
631         net_get_random_once(&fnhe_hashrnd, sizeof(fnhe_hashrnd));
632         hval = jhash_1word((__force u32) daddr, fnhe_hashrnd);
633         return hash_32(hval, FNHE_HASH_SHIFT);
634 }
635
636 static void fill_route_from_fnhe(struct rtable *rt, struct fib_nh_exception *fnhe)
637 {
638         rt->rt_pmtu = fnhe->fnhe_pmtu;
639         rt->dst.expires = fnhe->fnhe_expires;
640
641         if (fnhe->fnhe_gw) {
642                 rt->rt_flags |= RTCF_REDIRECTED;
643                 rt->rt_gateway = fnhe->fnhe_gw;
644                 rt->rt_uses_gateway = 1;
645         }
646 }
647
648 static void update_or_create_fnhe(struct fib_nh *nh, __be32 daddr, __be32 gw,
649                                   u32 pmtu, unsigned long expires)
650 {
651         struct fnhe_hash_bucket *hash;
652         struct fib_nh_exception *fnhe;
653         struct rtable *rt;
654         u32 genid, hval;
655         unsigned int i;
656         int depth;
657
658         genid = fnhe_genid(dev_net(nh->nh_dev));
659         hval = fnhe_hashfun(daddr);
660
661         spin_lock_bh(&fnhe_lock);
662
663         hash = rcu_dereference(nh->nh_exceptions);
664         if (!hash) {
665                 hash = kzalloc(FNHE_HASH_SIZE * sizeof(*hash), GFP_ATOMIC);
666                 if (!hash)
667                         goto out_unlock;
668                 rcu_assign_pointer(nh->nh_exceptions, hash);
669         }
670
671         hash += hval;
672
673         depth = 0;
674         for (fnhe = rcu_dereference(hash->chain); fnhe;
675              fnhe = rcu_dereference(fnhe->fnhe_next)) {
676                 if (fnhe->fnhe_daddr == daddr)
677                         break;
678                 depth++;
679         }
680
681         if (fnhe) {
682                 if (fnhe->fnhe_genid != genid)
683                         fnhe->fnhe_genid = genid;
684                 if (gw)
685                         fnhe->fnhe_gw = gw;
686                 if (pmtu)
687                         fnhe->fnhe_pmtu = pmtu;
688                 fnhe->fnhe_expires = max(1UL, expires);
689                 /* Update all cached dsts too */
690                 rt = rcu_dereference(fnhe->fnhe_rth_input);
691                 if (rt)
692                         fill_route_from_fnhe(rt, fnhe);
693                 rt = rcu_dereference(fnhe->fnhe_rth_output);
694                 if (rt)
695                         fill_route_from_fnhe(rt, fnhe);
696         } else {
697                 if (depth > FNHE_RECLAIM_DEPTH)
698                         fnhe = fnhe_oldest(hash);
699                 else {
700                         fnhe = kzalloc(sizeof(*fnhe), GFP_ATOMIC);
701                         if (!fnhe)
702                                 goto out_unlock;
703
704                         fnhe->fnhe_next = hash->chain;
705                         rcu_assign_pointer(hash->chain, fnhe);
706                 }
707                 fnhe->fnhe_genid = genid;
708                 fnhe->fnhe_daddr = daddr;
709                 fnhe->fnhe_gw = gw;
710                 fnhe->fnhe_pmtu = pmtu;
711                 fnhe->fnhe_expires = expires;
712
713                 /* Exception created; mark the cached routes for the nexthop
714                  * stale, so anyone caching it rechecks if this exception
715                  * applies to them.
716                  */
717                 rt = rcu_dereference(nh->nh_rth_input);
718                 if (rt)
719                         rt->dst.obsolete = DST_OBSOLETE_KILL;
720
721                 for_each_possible_cpu(i) {
722                         struct rtable __rcu **prt;
723                         prt = per_cpu_ptr(nh->nh_pcpu_rth_output, i);
724                         rt = rcu_dereference(*prt);
725                         if (rt)
726                                 rt->dst.obsolete = DST_OBSOLETE_KILL;
727                 }
728         }
729
730         fnhe->fnhe_stamp = jiffies;
731
732 out_unlock:
733         spin_unlock_bh(&fnhe_lock);
734 }
735
736 static void __ip_do_redirect(struct rtable *rt, struct sk_buff *skb, struct flowi4 *fl4,
737                              bool kill_route)
738 {
739         __be32 new_gw = icmp_hdr(skb)->un.gateway;
740         __be32 old_gw = ip_hdr(skb)->saddr;
741         struct net_device *dev = skb->dev;
742         struct in_device *in_dev;
743         struct fib_result res;
744         struct neighbour *n;
745         struct net *net;
746
747         switch (icmp_hdr(skb)->code & 7) {
748         case ICMP_REDIR_NET:
749         case ICMP_REDIR_NETTOS:
750         case ICMP_REDIR_HOST:
751         case ICMP_REDIR_HOSTTOS:
752                 break;
753
754         default:
755                 return;
756         }
757
758         if (rt->rt_gateway != old_gw)
759                 return;
760
761         in_dev = __in_dev_get_rcu(dev);
762         if (!in_dev)
763                 return;
764
765         net = dev_net(dev);
766         if (new_gw == old_gw || !IN_DEV_RX_REDIRECTS(in_dev) ||
767             ipv4_is_multicast(new_gw) || ipv4_is_lbcast(new_gw) ||
768             ipv4_is_zeronet(new_gw))
769                 goto reject_redirect;
770
771         if (!IN_DEV_SHARED_MEDIA(in_dev)) {
772                 if (!inet_addr_onlink(in_dev, new_gw, old_gw))
773                         goto reject_redirect;
774                 if (IN_DEV_SEC_REDIRECTS(in_dev) && ip_fib_check_default(new_gw, dev))
775                         goto reject_redirect;
776         } else {
777                 if (inet_addr_type(net, new_gw) != RTN_UNICAST)
778                         goto reject_redirect;
779         }
780
781         n = __ipv4_neigh_lookup(rt->dst.dev, new_gw);
782         if (!n)
783                 n = neigh_create(&arp_tbl, &new_gw, rt->dst.dev);
784         if (!IS_ERR(n)) {
785                 if (!(n->nud_state & NUD_VALID)) {
786                         neigh_event_send(n, NULL);
787                 } else {
788                         if (fib_lookup(net, fl4, &res, 0) == 0) {
789                                 struct fib_nh *nh = &FIB_RES_NH(res);
790
791                                 update_or_create_fnhe(nh, fl4->daddr, new_gw,
792                                                 0, jiffies + ip_rt_gc_timeout);
793                         }
794                         if (kill_route)
795                                 rt->dst.obsolete = DST_OBSOLETE_KILL;
796                         call_netevent_notifiers(NETEVENT_NEIGH_UPDATE, n);
797                 }
798                 neigh_release(n);
799         }
800         return;
801
802 reject_redirect:
803 #ifdef CONFIG_IP_ROUTE_VERBOSE
804         if (IN_DEV_LOG_MARTIANS(in_dev)) {
805                 const struct iphdr *iph = (const struct iphdr *) skb->data;
806                 __be32 daddr = iph->daddr;
807                 __be32 saddr = iph->saddr;
808
809                 net_info_ratelimited("Redirect from %pI4 on %s about %pI4 ignored\n"
810                                      "  Advised path = %pI4 -> %pI4\n",
811                                      &old_gw, dev->name, &new_gw,
812                                      &saddr, &daddr);
813         }
814 #endif
815         ;
816 }
817
818 static void ip_do_redirect(struct dst_entry *dst, struct sock *sk, struct sk_buff *skb)
819 {
820         struct rtable *rt;
821         struct flowi4 fl4;
822         const struct iphdr *iph = (const struct iphdr *) skb->data;
823         struct net *net = dev_net(skb->dev);
824         int oif = skb->dev->ifindex;
825         u8 tos = RT_TOS(iph->tos);
826         u8 prot = iph->protocol;
827         u32 mark = skb->mark;
828
829         rt = (struct rtable *) dst;
830
831         __build_flow_key(net, &fl4, sk, iph, oif, tos, prot, mark, 0);
832         __ip_do_redirect(rt, skb, &fl4, true);
833 }
834
835 static struct dst_entry *ipv4_negative_advice(struct dst_entry *dst)
836 {
837         struct rtable *rt = (struct rtable *)dst;
838         struct dst_entry *ret = dst;
839
840         if (rt) {
841                 if (dst->obsolete > 0) {
842                         ip_rt_put(rt);
843                         ret = NULL;
844                 } else if ((rt->rt_flags & RTCF_REDIRECTED) ||
845                            rt->dst.expires) {
846                         ip_rt_put(rt);
847                         ret = NULL;
848                 }
849         }
850         return ret;
851 }
852
853 /*
854  * Algorithm:
855  *      1. The first ip_rt_redirect_number redirects are sent
856  *         with exponential backoff, then we stop sending them at all,
857  *         assuming that the host ignores our redirects.
858  *      2. If we did not see packets requiring redirects
859  *         during ip_rt_redirect_silence, we assume that the host
860  *         forgot redirected route and start to send redirects again.
861  *
862  * This algorithm is much cheaper and more intelligent than dumb load limiting
863  * in icmp.c.
864  *
865  * NOTE. Do not forget to inhibit load limiting for redirects (redundant)
866  * and "frag. need" (breaks PMTU discovery) in icmp.c.
867  */
868
869 void ip_rt_send_redirect(struct sk_buff *skb)
870 {
871         struct rtable *rt = skb_rtable(skb);
872         struct in_device *in_dev;
873         struct inet_peer *peer;
874         struct net *net;
875         int log_martians;
876         int vif;
877
878         rcu_read_lock();
879         in_dev = __in_dev_get_rcu(rt->dst.dev);
880         if (!in_dev || !IN_DEV_TX_REDIRECTS(in_dev)) {
881                 rcu_read_unlock();
882                 return;
883         }
884         log_martians = IN_DEV_LOG_MARTIANS(in_dev);
885         vif = l3mdev_master_ifindex_rcu(rt->dst.dev);
886         rcu_read_unlock();
887
888         net = dev_net(rt->dst.dev);
889         peer = inet_getpeer_v4(net->ipv4.peers, ip_hdr(skb)->saddr, vif, 1);
890         if (!peer) {
891                 icmp_send(skb, ICMP_REDIRECT, ICMP_REDIR_HOST,
892                           rt_nexthop(rt, ip_hdr(skb)->daddr));
893                 return;
894         }
895
896         /* No redirected packets during ip_rt_redirect_silence;
897          * reset the algorithm.
898          */
899         if (time_after(jiffies, peer->rate_last + ip_rt_redirect_silence))
900                 peer->rate_tokens = 0;
901
902         /* Too many ignored redirects; do not send anything
903          * set dst.rate_last to the last seen redirected packet.
904          */
905         if (peer->rate_tokens >= ip_rt_redirect_number) {
906                 peer->rate_last = jiffies;
907                 goto out_put_peer;
908         }
909
910         /* Check for load limit; set rate_last to the latest sent
911          * redirect.
912          */
913         if (peer->rate_tokens == 0 ||
914             time_after(jiffies,
915                        (peer->rate_last +
916                         (ip_rt_redirect_load << peer->rate_tokens)))) {
917                 __be32 gw = rt_nexthop(rt, ip_hdr(skb)->daddr);
918
919                 icmp_send(skb, ICMP_REDIRECT, ICMP_REDIR_HOST, gw);
920                 peer->rate_last = jiffies;
921                 ++peer->rate_tokens;
922 #ifdef CONFIG_IP_ROUTE_VERBOSE
923                 if (log_martians &&
924                     peer->rate_tokens == ip_rt_redirect_number)
925                         net_warn_ratelimited("host %pI4/if%d ignores redirects for %pI4 to %pI4\n",
926                                              &ip_hdr(skb)->saddr, inet_iif(skb),
927                                              &ip_hdr(skb)->daddr, &gw);
928 #endif
929         }
930 out_put_peer:
931         inet_putpeer(peer);
932 }
933
934 static int ip_error(struct sk_buff *skb)
935 {
936         struct in_device *in_dev = __in_dev_get_rcu(skb->dev);
937         struct rtable *rt = skb_rtable(skb);
938         struct inet_peer *peer;
939         unsigned long now;
940         struct net *net;
941         bool send;
942         int code;
943
944         /* IP on this device is disabled. */
945         if (!in_dev)
946                 goto out;
947
948         net = dev_net(rt->dst.dev);
949         if (!IN_DEV_FORWARD(in_dev)) {
950                 switch (rt->dst.error) {
951                 case EHOSTUNREACH:
952                         __IP_INC_STATS(net, IPSTATS_MIB_INADDRERRORS);
953                         break;
954
955                 case ENETUNREACH:
956                         __IP_INC_STATS(net, IPSTATS_MIB_INNOROUTES);
957                         break;
958                 }
959                 goto out;
960         }
961
962         switch (rt->dst.error) {
963         case EINVAL:
964         default:
965                 goto out;
966         case EHOSTUNREACH:
967                 code = ICMP_HOST_UNREACH;
968                 break;
969         case ENETUNREACH:
970                 code = ICMP_NET_UNREACH;
971                 __IP_INC_STATS(net, IPSTATS_MIB_INNOROUTES);
972                 break;
973         case EACCES:
974                 code = ICMP_PKT_FILTERED;
975                 break;
976         }
977
978         peer = inet_getpeer_v4(net->ipv4.peers, ip_hdr(skb)->saddr,
979                                l3mdev_master_ifindex(skb->dev), 1);
980
981         send = true;
982         if (peer) {
983                 now = jiffies;
984                 peer->rate_tokens += now - peer->rate_last;
985                 if (peer->rate_tokens > ip_rt_error_burst)
986                         peer->rate_tokens = ip_rt_error_burst;
987                 peer->rate_last = now;
988                 if (peer->rate_tokens >= ip_rt_error_cost)
989                         peer->rate_tokens -= ip_rt_error_cost;
990                 else
991                         send = false;
992                 inet_putpeer(peer);
993         }
994         if (send)
995                 icmp_send(skb, ICMP_DEST_UNREACH, code, 0);
996
997 out:    kfree_skb(skb);
998         return 0;
999 }
1000
1001 static void __ip_rt_update_pmtu(struct rtable *rt, struct flowi4 *fl4, u32 mtu)
1002 {
1003         struct dst_entry *dst = &rt->dst;
1004         struct fib_result res;
1005
1006         if (dst_metric_locked(dst, RTAX_MTU))
1007                 return;
1008
1009         if (ipv4_mtu(dst) < mtu)
1010                 return;
1011
1012         if (mtu < ip_rt_min_pmtu)
1013                 mtu = ip_rt_min_pmtu;
1014
1015         if (rt->rt_pmtu == mtu &&
1016             time_before(jiffies, dst->expires - ip_rt_mtu_expires / 2))
1017                 return;
1018
1019         rcu_read_lock();
1020         if (fib_lookup(dev_net(dst->dev), fl4, &res, 0) == 0) {
1021                 struct fib_nh *nh = &FIB_RES_NH(res);
1022
1023                 update_or_create_fnhe(nh, fl4->daddr, 0, mtu,
1024                                       jiffies + ip_rt_mtu_expires);
1025         }
1026         rcu_read_unlock();
1027 }
1028
1029 static void ip_rt_update_pmtu(struct dst_entry *dst, struct sock *sk,
1030                               struct sk_buff *skb, u32 mtu)
1031 {
1032         struct rtable *rt = (struct rtable *) dst;
1033         struct flowi4 fl4;
1034
1035         ip_rt_build_flow_key(&fl4, sk, skb);
1036         __ip_rt_update_pmtu(rt, &fl4, mtu);
1037 }
1038
1039 void ipv4_update_pmtu(struct sk_buff *skb, struct net *net, u32 mtu,
1040                       int oif, u32 mark, u8 protocol, int flow_flags)
1041 {
1042         const struct iphdr *iph = (const struct iphdr *) skb->data;
1043         struct flowi4 fl4;
1044         struct rtable *rt;
1045
1046         if (!mark)
1047                 mark = IP4_REPLY_MARK(net, skb->mark);
1048
1049         __build_flow_key(net, &fl4, NULL, iph, oif,
1050                          RT_TOS(iph->tos), protocol, mark, flow_flags);
1051         rt = __ip_route_output_key(net, &fl4);
1052         if (!IS_ERR(rt)) {
1053                 __ip_rt_update_pmtu(rt, &fl4, mtu);
1054                 ip_rt_put(rt);
1055         }
1056 }
1057 EXPORT_SYMBOL_GPL(ipv4_update_pmtu);
1058
1059 static void __ipv4_sk_update_pmtu(struct sk_buff *skb, struct sock *sk, u32 mtu)
1060 {
1061         const struct iphdr *iph = (const struct iphdr *) skb->data;
1062         struct flowi4 fl4;
1063         struct rtable *rt;
1064
1065         __build_flow_key(sock_net(sk), &fl4, sk, iph, 0, 0, 0, 0, 0);
1066
1067         if (!fl4.flowi4_mark)
1068                 fl4.flowi4_mark = IP4_REPLY_MARK(sock_net(sk), skb->mark);
1069
1070         rt = __ip_route_output_key(sock_net(sk), &fl4);
1071         if (!IS_ERR(rt)) {
1072                 __ip_rt_update_pmtu(rt, &fl4, mtu);
1073                 ip_rt_put(rt);
1074         }
1075 }
1076
1077 void ipv4_sk_update_pmtu(struct sk_buff *skb, struct sock *sk, u32 mtu)
1078 {
1079         const struct iphdr *iph = (const struct iphdr *) skb->data;
1080         struct flowi4 fl4;
1081         struct rtable *rt;
1082         struct dst_entry *odst = NULL;
1083         bool new = false;
1084         struct net *net = sock_net(sk);
1085
1086         bh_lock_sock(sk);
1087
1088         if (!ip_sk_accept_pmtu(sk))
1089                 goto out;
1090
1091         odst = sk_dst_get(sk);
1092
1093         if (sock_owned_by_user(sk) || !odst) {
1094                 __ipv4_sk_update_pmtu(skb, sk, mtu);
1095                 goto out;
1096         }
1097
1098         __build_flow_key(net, &fl4, sk, iph, 0, 0, 0, 0, 0);
1099
1100         rt = (struct rtable *)odst;
1101         if (odst->obsolete && !odst->ops->check(odst, 0)) {
1102                 rt = ip_route_output_flow(sock_net(sk), &fl4, sk);
1103                 if (IS_ERR(rt))
1104                         goto out;
1105
1106                 new = true;
1107         }
1108
1109         __ip_rt_update_pmtu((struct rtable *) rt->dst.path, &fl4, mtu);
1110
1111         if (!dst_check(&rt->dst, 0)) {
1112                 if (new)
1113                         dst_release(&rt->dst);
1114
1115                 rt = ip_route_output_flow(sock_net(sk), &fl4, sk);
1116                 if (IS_ERR(rt))
1117                         goto out;
1118
1119                 new = true;
1120         }
1121
1122         if (new)
1123                 sk_dst_set(sk, &rt->dst);
1124
1125 out:
1126         bh_unlock_sock(sk);
1127         dst_release(odst);
1128 }
1129 EXPORT_SYMBOL_GPL(ipv4_sk_update_pmtu);
1130
1131 void ipv4_redirect(struct sk_buff *skb, struct net *net,
1132                    int oif, u32 mark, u8 protocol, int flow_flags)
1133 {
1134         const struct iphdr *iph = (const struct iphdr *) skb->data;
1135         struct flowi4 fl4;
1136         struct rtable *rt;
1137
1138         __build_flow_key(net, &fl4, NULL, iph, oif,
1139                          RT_TOS(iph->tos), protocol, mark, flow_flags);
1140         rt = __ip_route_output_key(net, &fl4);
1141         if (!IS_ERR(rt)) {
1142                 __ip_do_redirect(rt, skb, &fl4, false);
1143                 ip_rt_put(rt);
1144         }
1145 }
1146 EXPORT_SYMBOL_GPL(ipv4_redirect);
1147
1148 void ipv4_sk_redirect(struct sk_buff *skb, struct sock *sk)
1149 {
1150         const struct iphdr *iph = (const struct iphdr *) skb->data;
1151         struct flowi4 fl4;
1152         struct rtable *rt;
1153         struct net *net = sock_net(sk);
1154
1155         __build_flow_key(net, &fl4, sk, iph, 0, 0, 0, 0, 0);
1156         rt = __ip_route_output_key(net, &fl4);
1157         if (!IS_ERR(rt)) {
1158                 __ip_do_redirect(rt, skb, &fl4, false);
1159                 ip_rt_put(rt);
1160         }
1161 }
1162 EXPORT_SYMBOL_GPL(ipv4_sk_redirect);
1163
1164 static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie)
1165 {
1166         struct rtable *rt = (struct rtable *) dst;
1167
1168         /* All IPV4 dsts are created with ->obsolete set to the value
1169          * DST_OBSOLETE_FORCE_CHK which forces validation calls down
1170          * into this function always.
1171          *
1172          * When a PMTU/redirect information update invalidates a route,
1173          * this is indicated by setting obsolete to DST_OBSOLETE_KILL or
1174          * DST_OBSOLETE_DEAD by dst_free().
1175          */
1176         if (dst->obsolete != DST_OBSOLETE_FORCE_CHK || rt_is_expired(rt))
1177                 return NULL;
1178         return dst;
1179 }
1180
1181 static void ipv4_link_failure(struct sk_buff *skb)
1182 {
1183         struct rtable *rt;
1184
1185         icmp_send(skb, ICMP_DEST_UNREACH, ICMP_HOST_UNREACH, 0);
1186
1187         rt = skb_rtable(skb);
1188         if (rt)
1189                 dst_set_expires(&rt->dst, 0);
1190 }
1191
1192 static int ip_rt_bug(struct net *net, struct sock *sk, struct sk_buff *skb)
1193 {
1194         pr_debug("%s: %pI4 -> %pI4, %s\n",
1195                  __func__, &ip_hdr(skb)->saddr, &ip_hdr(skb)->daddr,
1196                  skb->dev ? skb->dev->name : "?");
1197         kfree_skb(skb);
1198         WARN_ON(1);
1199         return 0;
1200 }
1201
1202 /*
1203    We do not cache source address of outgoing interface,
1204    because it is used only by IP RR, TS and SRR options,
1205    so that it out of fast path.
1206
1207    BTW remember: "addr" is allowed to be not aligned
1208    in IP options!
1209  */
1210
1211 void ip_rt_get_source(u8 *addr, struct sk_buff *skb, struct rtable *rt)
1212 {
1213         __be32 src;
1214
1215         if (rt_is_output_route(rt))
1216                 src = ip_hdr(skb)->saddr;
1217         else {
1218                 struct fib_result res;
1219                 struct flowi4 fl4;
1220                 struct iphdr *iph;
1221
1222                 iph = ip_hdr(skb);
1223
1224                 memset(&fl4, 0, sizeof(fl4));
1225                 fl4.daddr = iph->daddr;
1226                 fl4.saddr = iph->saddr;
1227                 fl4.flowi4_tos = RT_TOS(iph->tos);
1228                 fl4.flowi4_oif = rt->dst.dev->ifindex;
1229                 fl4.flowi4_iif = skb->dev->ifindex;
1230                 fl4.flowi4_mark = skb->mark;
1231
1232                 rcu_read_lock();
1233                 if (fib_lookup(dev_net(rt->dst.dev), &fl4, &res, 0) == 0)
1234                         src = FIB_RES_PREFSRC(dev_net(rt->dst.dev), res);
1235                 else
1236                         src = inet_select_addr(rt->dst.dev,
1237                                                rt_nexthop(rt, iph->daddr),
1238                                                RT_SCOPE_UNIVERSE);
1239                 rcu_read_unlock();
1240         }
1241         memcpy(addr, &src, 4);
1242 }
1243
1244 #ifdef CONFIG_IP_ROUTE_CLASSID
1245 static void set_class_tag(struct rtable *rt, u32 tag)
1246 {
1247         if (!(rt->dst.tclassid & 0xFFFF))
1248                 rt->dst.tclassid |= tag & 0xFFFF;
1249         if (!(rt->dst.tclassid & 0xFFFF0000))
1250                 rt->dst.tclassid |= tag & 0xFFFF0000;
1251 }
1252 #endif
1253
1254 static unsigned int ipv4_default_advmss(const struct dst_entry *dst)
1255 {
1256         unsigned int header_size = sizeof(struct tcphdr) + sizeof(struct iphdr);
1257         unsigned int advmss = max_t(unsigned int, ipv4_mtu(dst) - header_size,
1258                                     ip_rt_min_advmss);
1259
1260         return min(advmss, IPV4_MAX_PMTU - header_size);
1261 }
1262
1263 static unsigned int ipv4_mtu(const struct dst_entry *dst)
1264 {
1265         const struct rtable *rt = (const struct rtable *) dst;
1266         unsigned int mtu = rt->rt_pmtu;
1267
1268         if (!mtu || time_after_eq(jiffies, rt->dst.expires))
1269                 mtu = dst_metric_raw(dst, RTAX_MTU);
1270
1271         if (mtu)
1272                 return mtu;
1273
1274         mtu = READ_ONCE(dst->dev->mtu);
1275
1276         if (unlikely(dst_metric_locked(dst, RTAX_MTU))) {
1277                 if (rt->rt_uses_gateway && mtu > 576)
1278                         mtu = 576;
1279         }
1280
1281         mtu = min_t(unsigned int, mtu, IP_MAX_MTU);
1282
1283         return mtu - lwtunnel_headroom(dst->lwtstate, mtu);
1284 }
1285
1286 static struct fib_nh_exception *find_exception(struct fib_nh *nh, __be32 daddr)
1287 {
1288         struct fnhe_hash_bucket *hash = rcu_dereference(nh->nh_exceptions);
1289         struct fib_nh_exception *fnhe;
1290         u32 hval;
1291
1292         if (!hash)
1293                 return NULL;
1294
1295         hval = fnhe_hashfun(daddr);
1296
1297         for (fnhe = rcu_dereference(hash[hval].chain); fnhe;
1298              fnhe = rcu_dereference(fnhe->fnhe_next)) {
1299                 if (fnhe->fnhe_daddr == daddr)
1300                         return fnhe;
1301         }
1302         return NULL;
1303 }
1304
1305 static bool rt_bind_exception(struct rtable *rt, struct fib_nh_exception *fnhe,
1306                               __be32 daddr, const bool do_cache)
1307 {
1308         bool ret = false;
1309
1310         spin_lock_bh(&fnhe_lock);
1311
1312         if (daddr == fnhe->fnhe_daddr) {
1313                 struct rtable __rcu **porig;
1314                 struct rtable *orig;
1315                 int genid = fnhe_genid(dev_net(rt->dst.dev));
1316
1317                 if (rt_is_input_route(rt))
1318                         porig = &fnhe->fnhe_rth_input;
1319                 else
1320                         porig = &fnhe->fnhe_rth_output;
1321                 orig = rcu_dereference(*porig);
1322
1323                 if (fnhe->fnhe_genid != genid) {
1324                         fnhe->fnhe_genid = genid;
1325                         fnhe->fnhe_gw = 0;
1326                         fnhe->fnhe_pmtu = 0;
1327                         fnhe->fnhe_expires = 0;
1328                         fnhe_flush_routes(fnhe);
1329                         orig = NULL;
1330                 }
1331                 fill_route_from_fnhe(rt, fnhe);
1332                 if (!rt->rt_gateway)
1333                         rt->rt_gateway = daddr;
1334
1335                 if (do_cache) {
1336                         dst_hold(&rt->dst);
1337                         rcu_assign_pointer(*porig, rt);
1338                         if (orig) {
1339                                 dst_dev_put(&orig->dst);
1340                                 dst_release(&orig->dst);
1341                         }
1342                         ret = true;
1343                 }
1344
1345                 fnhe->fnhe_stamp = jiffies;
1346         }
1347         spin_unlock_bh(&fnhe_lock);
1348
1349         return ret;
1350 }
1351
1352 static bool rt_cache_route(struct fib_nh *nh, struct rtable *rt)
1353 {
1354         struct rtable *orig, *prev, **p;
1355         bool ret = true;
1356
1357         if (rt_is_input_route(rt)) {
1358                 p = (struct rtable **)&nh->nh_rth_input;
1359         } else {
1360                 p = (struct rtable **)raw_cpu_ptr(nh->nh_pcpu_rth_output);
1361         }
1362         orig = *p;
1363
1364         /* hold dst before doing cmpxchg() to avoid race condition
1365          * on this dst
1366          */
1367         dst_hold(&rt->dst);
1368         prev = cmpxchg(p, orig, rt);
1369         if (prev == orig) {
1370                 if (orig) {
1371                         dst_dev_put(&orig->dst);
1372                         dst_release(&orig->dst);
1373                 }
1374         } else {
1375                 dst_release(&rt->dst);
1376                 ret = false;
1377         }
1378
1379         return ret;
1380 }
1381
1382 struct uncached_list {
1383         spinlock_t              lock;
1384         struct list_head        head;
1385 };
1386
1387 static DEFINE_PER_CPU_ALIGNED(struct uncached_list, rt_uncached_list);
1388
1389 static void rt_add_uncached_list(struct rtable *rt)
1390 {
1391         struct uncached_list *ul = raw_cpu_ptr(&rt_uncached_list);
1392
1393         rt->rt_uncached_list = ul;
1394
1395         spin_lock_bh(&ul->lock);
1396         list_add_tail(&rt->rt_uncached, &ul->head);
1397         spin_unlock_bh(&ul->lock);
1398 }
1399
1400 static void ipv4_dst_destroy(struct dst_entry *dst)
1401 {
1402         struct dst_metrics *p = (struct dst_metrics *)DST_METRICS_PTR(dst);
1403         struct rtable *rt = (struct rtable *) dst;
1404
1405         if (p != &dst_default_metrics && refcount_dec_and_test(&p->refcnt))
1406                 kfree(p);
1407
1408         if (!list_empty(&rt->rt_uncached)) {
1409                 struct uncached_list *ul = rt->rt_uncached_list;
1410
1411                 spin_lock_bh(&ul->lock);
1412                 list_del(&rt->rt_uncached);
1413                 spin_unlock_bh(&ul->lock);
1414         }
1415 }
1416
1417 void rt_flush_dev(struct net_device *dev)
1418 {
1419         struct net *net = dev_net(dev);
1420         struct rtable *rt;
1421         int cpu;
1422
1423         for_each_possible_cpu(cpu) {
1424                 struct uncached_list *ul = &per_cpu(rt_uncached_list, cpu);
1425
1426                 spin_lock_bh(&ul->lock);
1427                 list_for_each_entry(rt, &ul->head, rt_uncached) {
1428                         if (rt->dst.dev != dev)
1429                                 continue;
1430                         rt->dst.dev = net->loopback_dev;
1431                         dev_hold(rt->dst.dev);
1432                         dev_put(dev);
1433                 }
1434                 spin_unlock_bh(&ul->lock);
1435         }
1436 }
1437
1438 static bool rt_cache_valid(const struct rtable *rt)
1439 {
1440         return  rt &&
1441                 rt->dst.obsolete == DST_OBSOLETE_FORCE_CHK &&
1442                 !rt_is_expired(rt);
1443 }
1444
1445 static void rt_set_nexthop(struct rtable *rt, __be32 daddr,
1446                            const struct fib_result *res,
1447                            struct fib_nh_exception *fnhe,
1448                            struct fib_info *fi, u16 type, u32 itag,
1449                            const bool do_cache)
1450 {
1451         bool cached = false;
1452
1453         if (fi) {
1454                 struct fib_nh *nh = &FIB_RES_NH(*res);
1455
1456                 if (nh->nh_gw && nh->nh_scope == RT_SCOPE_LINK) {
1457                         rt->rt_gateway = nh->nh_gw;
1458                         rt->rt_uses_gateway = 1;
1459                 }
1460                 dst_init_metrics(&rt->dst, fi->fib_metrics->metrics, true);
1461                 if (fi->fib_metrics != &dst_default_metrics) {
1462                         rt->dst._metrics |= DST_METRICS_REFCOUNTED;
1463                         refcount_inc(&fi->fib_metrics->refcnt);
1464                 }
1465 #ifdef CONFIG_IP_ROUTE_CLASSID
1466                 rt->dst.tclassid = nh->nh_tclassid;
1467 #endif
1468                 rt->dst.lwtstate = lwtstate_get(nh->nh_lwtstate);
1469                 if (unlikely(fnhe))
1470                         cached = rt_bind_exception(rt, fnhe, daddr, do_cache);
1471                 else if (do_cache)
1472                         cached = rt_cache_route(nh, rt);
1473                 if (unlikely(!cached)) {
1474                         /* Routes we intend to cache in nexthop exception or
1475                          * FIB nexthop have the DST_NOCACHE bit clear.
1476                          * However, if we are unsuccessful at storing this
1477                          * route into the cache we really need to set it.
1478                          */
1479                         if (!rt->rt_gateway)
1480                                 rt->rt_gateway = daddr;
1481                         rt_add_uncached_list(rt);
1482                 }
1483         } else
1484                 rt_add_uncached_list(rt);
1485
1486 #ifdef CONFIG_IP_ROUTE_CLASSID
1487 #ifdef CONFIG_IP_MULTIPLE_TABLES
1488         set_class_tag(rt, res->tclassid);
1489 #endif
1490         set_class_tag(rt, itag);
1491 #endif
1492 }
1493
1494 struct rtable *rt_dst_alloc(struct net_device *dev,
1495                             unsigned int flags, u16 type,
1496                             bool nopolicy, bool noxfrm, bool will_cache)
1497 {
1498         struct rtable *rt;
1499
1500         rt = dst_alloc(&ipv4_dst_ops, dev, 1, DST_OBSOLETE_FORCE_CHK,
1501                        (will_cache ? 0 : DST_HOST) |
1502                        (nopolicy ? DST_NOPOLICY : 0) |
1503                        (noxfrm ? DST_NOXFRM : 0));
1504
1505         if (rt) {
1506                 rt->rt_genid = rt_genid_ipv4(dev_net(dev));
1507                 rt->rt_flags = flags;
1508                 rt->rt_type = type;
1509                 rt->rt_is_input = 0;
1510                 rt->rt_iif = 0;
1511                 rt->rt_pmtu = 0;
1512                 rt->rt_gateway = 0;
1513                 rt->rt_uses_gateway = 0;
1514                 rt->rt_table_id = 0;
1515                 INIT_LIST_HEAD(&rt->rt_uncached);
1516
1517                 rt->dst.output = ip_output;
1518                 if (flags & RTCF_LOCAL)
1519                         rt->dst.input = ip_local_deliver;
1520         }
1521
1522         return rt;
1523 }
1524 EXPORT_SYMBOL(rt_dst_alloc);
1525
1526 /* called in rcu_read_lock() section */
1527 int ip_mc_validate_source(struct sk_buff *skb, __be32 daddr, __be32 saddr,
1528                           u8 tos, struct net_device *dev,
1529                           struct in_device *in_dev, u32 *itag)
1530 {
1531         int err;
1532
1533         /* Primary sanity checks. */
1534         if (!in_dev)
1535                 return -EINVAL;
1536
1537         if (ipv4_is_multicast(saddr) || ipv4_is_lbcast(saddr) ||
1538             skb->protocol != htons(ETH_P_IP))
1539                 return -EINVAL;
1540
1541         if (ipv4_is_loopback(saddr) && !IN_DEV_ROUTE_LOCALNET(in_dev))
1542                 return -EINVAL;
1543
1544         if (ipv4_is_zeronet(saddr)) {
1545                 if (!ipv4_is_local_multicast(daddr))
1546                         return -EINVAL;
1547         } else {
1548                 err = fib_validate_source(skb, saddr, 0, tos, 0, dev,
1549                                           in_dev, itag);
1550                 if (err < 0)
1551                         return err;
1552         }
1553         return 0;
1554 }
1555
1556 /* called in rcu_read_lock() section */
1557 static int ip_route_input_mc(struct sk_buff *skb, __be32 daddr, __be32 saddr,
1558                              u8 tos, struct net_device *dev, int our)
1559 {
1560         struct in_device *in_dev = __in_dev_get_rcu(dev);
1561         unsigned int flags = RTCF_MULTICAST;
1562         struct rtable *rth;
1563         u32 itag = 0;
1564         int err;
1565
1566         err = ip_mc_validate_source(skb, daddr, saddr, tos, dev, in_dev, &itag);
1567         if (err)
1568                 return err;
1569
1570         if (our)
1571                 flags |= RTCF_LOCAL;
1572
1573         rth = rt_dst_alloc(dev_net(dev)->loopback_dev, flags, RTN_MULTICAST,
1574                            IN_DEV_CONF_GET(in_dev, NOPOLICY), false, false);
1575         if (!rth)
1576                 return -ENOBUFS;
1577
1578 #ifdef CONFIG_IP_ROUTE_CLASSID
1579         rth->dst.tclassid = itag;
1580 #endif
1581         rth->dst.output = ip_rt_bug;
1582         rth->rt_is_input= 1;
1583
1584 #ifdef CONFIG_IP_MROUTE
1585         if (!ipv4_is_local_multicast(daddr) && IN_DEV_MFORWARD(in_dev))
1586                 rth->dst.input = ip_mr_input;
1587 #endif
1588         RT_CACHE_STAT_INC(in_slow_mc);
1589
1590         skb_dst_set(skb, &rth->dst);
1591         return 0;
1592 }
1593
1594
1595 static void ip_handle_martian_source(struct net_device *dev,
1596                                      struct in_device *in_dev,
1597                                      struct sk_buff *skb,
1598                                      __be32 daddr,
1599                                      __be32 saddr)
1600 {
1601         RT_CACHE_STAT_INC(in_martian_src);
1602 #ifdef CONFIG_IP_ROUTE_VERBOSE
1603         if (IN_DEV_LOG_MARTIANS(in_dev) && net_ratelimit()) {
1604                 /*
1605                  *      RFC1812 recommendation, if source is martian,
1606                  *      the only hint is MAC header.
1607                  */
1608                 pr_warn("martian source %pI4 from %pI4, on dev %s\n",
1609                         &daddr, &saddr, dev->name);
1610                 if (dev->hard_header_len && skb_mac_header_was_set(skb)) {
1611                         print_hex_dump(KERN_WARNING, "ll header: ",
1612                                        DUMP_PREFIX_OFFSET, 16, 1,
1613                                        skb_mac_header(skb),
1614                                        dev->hard_header_len, true);
1615                 }
1616         }
1617 #endif
1618 }
1619
1620 static void ip_del_fnhe(struct fib_nh *nh, __be32 daddr)
1621 {
1622         struct fnhe_hash_bucket *hash;
1623         struct fib_nh_exception *fnhe, __rcu **fnhe_p;
1624         u32 hval = fnhe_hashfun(daddr);
1625
1626         spin_lock_bh(&fnhe_lock);
1627
1628         hash = rcu_dereference_protected(nh->nh_exceptions,
1629                                          lockdep_is_held(&fnhe_lock));
1630         hash += hval;
1631
1632         fnhe_p = &hash->chain;
1633         fnhe = rcu_dereference_protected(*fnhe_p, lockdep_is_held(&fnhe_lock));
1634         while (fnhe) {
1635                 if (fnhe->fnhe_daddr == daddr) {
1636                         rcu_assign_pointer(*fnhe_p, rcu_dereference_protected(
1637                                 fnhe->fnhe_next, lockdep_is_held(&fnhe_lock)));
1638                         fnhe_flush_routes(fnhe);
1639                         kfree_rcu(fnhe, rcu);
1640                         break;
1641                 }
1642                 fnhe_p = &fnhe->fnhe_next;
1643                 fnhe = rcu_dereference_protected(fnhe->fnhe_next,
1644                                                  lockdep_is_held(&fnhe_lock));
1645         }
1646
1647         spin_unlock_bh(&fnhe_lock);
1648 }
1649
1650 static void set_lwt_redirect(struct rtable *rth)
1651 {
1652         if (lwtunnel_output_redirect(rth->dst.lwtstate)) {
1653                 rth->dst.lwtstate->orig_output = rth->dst.output;
1654                 rth->dst.output = lwtunnel_output;
1655         }
1656
1657         if (lwtunnel_input_redirect(rth->dst.lwtstate)) {
1658                 rth->dst.lwtstate->orig_input = rth->dst.input;
1659                 rth->dst.input = lwtunnel_input;
1660         }
1661 }
1662
1663 /* called in rcu_read_lock() section */
1664 static int __mkroute_input(struct sk_buff *skb,
1665                            const struct fib_result *res,
1666                            struct in_device *in_dev,
1667                            __be32 daddr, __be32 saddr, u32 tos)
1668 {
1669         struct fib_nh_exception *fnhe;
1670         struct rtable *rth;
1671         int err;
1672         struct in_device *out_dev;
1673         bool do_cache;
1674         u32 itag = 0;
1675
1676         /* get a working reference to the output device */
1677         out_dev = __in_dev_get_rcu(FIB_RES_DEV(*res));
1678         if (!out_dev) {
1679                 net_crit_ratelimited("Bug in ip_route_input_slow(). Please report.\n");
1680                 return -EINVAL;
1681         }
1682
1683         err = fib_validate_source(skb, saddr, daddr, tos, FIB_RES_OIF(*res),
1684                                   in_dev->dev, in_dev, &itag);
1685         if (err < 0) {
1686                 ip_handle_martian_source(in_dev->dev, in_dev, skb, daddr,
1687                                          saddr);
1688
1689                 goto cleanup;
1690         }
1691
1692         do_cache = res->fi && !itag;
1693         if (out_dev == in_dev && err && IN_DEV_TX_REDIRECTS(out_dev) &&
1694             skb->protocol == htons(ETH_P_IP) &&
1695             (IN_DEV_SHARED_MEDIA(out_dev) ||
1696              inet_addr_onlink(out_dev, saddr, FIB_RES_GW(*res))))
1697                 IPCB(skb)->flags |= IPSKB_DOREDIRECT;
1698
1699         if (skb->protocol != htons(ETH_P_IP)) {
1700                 /* Not IP (i.e. ARP). Do not create route, if it is
1701                  * invalid for proxy arp. DNAT routes are always valid.
1702                  *
1703                  * Proxy arp feature have been extended to allow, ARP
1704                  * replies back to the same interface, to support
1705                  * Private VLAN switch technologies. See arp.c.
1706                  */
1707                 if (out_dev == in_dev &&
1708                     IN_DEV_PROXY_ARP_PVLAN(in_dev) == 0) {
1709                         err = -EINVAL;
1710                         goto cleanup;
1711                 }
1712         }
1713
1714         fnhe = find_exception(&FIB_RES_NH(*res), daddr);
1715         if (do_cache) {
1716                 if (fnhe) {
1717                         rth = rcu_dereference(fnhe->fnhe_rth_input);
1718                         if (rth && rth->dst.expires &&
1719                             time_after(jiffies, rth->dst.expires)) {
1720                                 ip_del_fnhe(&FIB_RES_NH(*res), daddr);
1721                                 fnhe = NULL;
1722                         } else {
1723                                 goto rt_cache;
1724                         }
1725                 }
1726
1727                 rth = rcu_dereference(FIB_RES_NH(*res).nh_rth_input);
1728
1729 rt_cache:
1730                 if (rt_cache_valid(rth)) {
1731                         skb_dst_set_noref(skb, &rth->dst);
1732                         goto out;
1733                 }
1734         }
1735
1736         rth = rt_dst_alloc(out_dev->dev, 0, res->type,
1737                            IN_DEV_CONF_GET(in_dev, NOPOLICY),
1738                            IN_DEV_CONF_GET(out_dev, NOXFRM), do_cache);
1739         if (!rth) {
1740                 err = -ENOBUFS;
1741                 goto cleanup;
1742         }
1743
1744         rth->rt_is_input = 1;
1745         if (res->table)
1746                 rth->rt_table_id = res->table->tb_id;
1747         RT_CACHE_STAT_INC(in_slow_tot);
1748
1749         rth->dst.input = ip_forward;
1750
1751         rt_set_nexthop(rth, daddr, res, fnhe, res->fi, res->type, itag,
1752                        do_cache);
1753         set_lwt_redirect(rth);
1754         skb_dst_set(skb, &rth->dst);
1755 out:
1756         err = 0;
1757  cleanup:
1758         return err;
1759 }
1760
1761 #ifdef CONFIG_IP_ROUTE_MULTIPATH
1762 /* To make ICMP packets follow the right flow, the multipath hash is
1763  * calculated from the inner IP addresses.
1764  */
1765 static void ip_multipath_l3_keys(const struct sk_buff *skb,
1766                                  struct flow_keys *hash_keys)
1767 {
1768         const struct iphdr *outer_iph = ip_hdr(skb);
1769         const struct iphdr *inner_iph;
1770         const struct icmphdr *icmph;
1771         struct iphdr _inner_iph;
1772         struct icmphdr _icmph;
1773
1774         hash_keys->addrs.v4addrs.src = outer_iph->saddr;
1775         hash_keys->addrs.v4addrs.dst = outer_iph->daddr;
1776         if (likely(outer_iph->protocol != IPPROTO_ICMP))
1777                 return;
1778
1779         if (unlikely((outer_iph->frag_off & htons(IP_OFFSET)) != 0))
1780                 return;
1781
1782         icmph = skb_header_pointer(skb, outer_iph->ihl * 4, sizeof(_icmph),
1783                                    &_icmph);
1784         if (!icmph)
1785                 return;
1786
1787         if (icmph->type != ICMP_DEST_UNREACH &&
1788             icmph->type != ICMP_REDIRECT &&
1789             icmph->type != ICMP_TIME_EXCEEDED &&
1790             icmph->type != ICMP_PARAMETERPROB)
1791                 return;
1792
1793         inner_iph = skb_header_pointer(skb,
1794                                        outer_iph->ihl * 4 + sizeof(_icmph),
1795                                        sizeof(_inner_iph), &_inner_iph);
1796         if (!inner_iph)
1797                 return;
1798         hash_keys->addrs.v4addrs.src = inner_iph->saddr;
1799         hash_keys->addrs.v4addrs.dst = inner_iph->daddr;
1800 }
1801
1802 /* if skb is set it will be used and fl4 can be NULL */
1803 int fib_multipath_hash(const struct fib_info *fi, const struct flowi4 *fl4,
1804                        const struct sk_buff *skb)
1805 {
1806         struct net *net = fi->fib_net;
1807         struct flow_keys hash_keys;
1808         u32 mhash;
1809
1810         switch (net->ipv4.sysctl_fib_multipath_hash_policy) {
1811         case 0:
1812                 memset(&hash_keys, 0, sizeof(hash_keys));
1813                 hash_keys.control.addr_type = FLOW_DISSECTOR_KEY_IPV4_ADDRS;
1814                 if (skb) {
1815                         ip_multipath_l3_keys(skb, &hash_keys);
1816                 } else {
1817                         hash_keys.addrs.v4addrs.src = fl4->saddr;
1818                         hash_keys.addrs.v4addrs.dst = fl4->daddr;
1819                 }
1820                 break;
1821         case 1:
1822                 /* skb is currently provided only when forwarding */
1823                 if (skb) {
1824                         unsigned int flag = FLOW_DISSECTOR_F_STOP_AT_ENCAP;
1825                         struct flow_keys keys;
1826
1827                         /* short-circuit if we already have L4 hash present */
1828                         if (skb->l4_hash)
1829                                 return skb_get_hash_raw(skb) >> 1;
1830                         memset(&hash_keys, 0, sizeof(hash_keys));
1831                         skb_flow_dissect_flow_keys(skb, &keys, flag);
1832                         hash_keys.addrs.v4addrs.src = keys.addrs.v4addrs.src;
1833                         hash_keys.addrs.v4addrs.dst = keys.addrs.v4addrs.dst;
1834                         hash_keys.ports.src = keys.ports.src;
1835                         hash_keys.ports.dst = keys.ports.dst;
1836                         hash_keys.basic.ip_proto = keys.basic.ip_proto;
1837                 } else {
1838                         memset(&hash_keys, 0, sizeof(hash_keys));
1839                         hash_keys.control.addr_type = FLOW_DISSECTOR_KEY_IPV4_ADDRS;
1840                         hash_keys.addrs.v4addrs.src = fl4->saddr;
1841                         hash_keys.addrs.v4addrs.dst = fl4->daddr;
1842                         hash_keys.ports.src = fl4->fl4_sport;
1843                         hash_keys.ports.dst = fl4->fl4_dport;
1844                         hash_keys.basic.ip_proto = fl4->flowi4_proto;
1845                 }
1846                 break;
1847         }
1848         mhash = flow_hash_from_keys(&hash_keys);
1849
1850         return mhash >> 1;
1851 }
1852 EXPORT_SYMBOL_GPL(fib_multipath_hash);
1853 #endif /* CONFIG_IP_ROUTE_MULTIPATH */
1854
1855 static int ip_mkroute_input(struct sk_buff *skb,
1856                             struct fib_result *res,
1857                             struct in_device *in_dev,
1858                             __be32 daddr, __be32 saddr, u32 tos)
1859 {
1860 #ifdef CONFIG_IP_ROUTE_MULTIPATH
1861         if (res->fi && res->fi->fib_nhs > 1) {
1862                 int h = fib_multipath_hash(res->fi, NULL, skb);
1863
1864                 fib_select_multipath(res, h);
1865         }
1866 #endif
1867
1868         /* create a routing cache entry */
1869         return __mkroute_input(skb, res, in_dev, daddr, saddr, tos);
1870 }
1871
1872 /*
1873  *      NOTE. We drop all the packets that has local source
1874  *      addresses, because every properly looped back packet
1875  *      must have correct destination already attached by output routine.
1876  *
1877  *      Such approach solves two big problems:
1878  *      1. Not simplex devices are handled properly.
1879  *      2. IP spoofing attempts are filtered with 100% of guarantee.
1880  *      called with rcu_read_lock()
1881  */
1882
1883 static int ip_route_input_slow(struct sk_buff *skb, __be32 daddr, __be32 saddr,
1884                                u8 tos, struct net_device *dev,
1885                                struct fib_result *res)
1886 {
1887         struct in_device *in_dev = __in_dev_get_rcu(dev);
1888         struct ip_tunnel_info *tun_info;
1889         struct flowi4   fl4;
1890         unsigned int    flags = 0;
1891         u32             itag = 0;
1892         struct rtable   *rth;
1893         int             err = -EINVAL;
1894         struct net    *net = dev_net(dev);
1895         bool do_cache;
1896
1897         /* IP on this device is disabled. */
1898
1899         if (!in_dev)
1900                 goto out;
1901
1902         /* Check for the most weird martians, which can be not detected
1903            by fib_lookup.
1904          */
1905
1906         tun_info = skb_tunnel_info(skb);
1907         if (tun_info && !(tun_info->mode & IP_TUNNEL_INFO_TX))
1908                 fl4.flowi4_tun_key.tun_id = tun_info->key.tun_id;
1909         else
1910                 fl4.flowi4_tun_key.tun_id = 0;
1911         skb_dst_drop(skb);
1912
1913         if (ipv4_is_multicast(saddr) || ipv4_is_lbcast(saddr))
1914                 goto martian_source;
1915
1916         res->fi = NULL;
1917         res->table = NULL;
1918         if (ipv4_is_lbcast(daddr) || (saddr == 0 && daddr == 0))
1919                 goto brd_input;
1920
1921         /* Accept zero addresses only to limited broadcast;
1922          * I even do not know to fix it or not. Waiting for complains :-)
1923          */
1924         if (ipv4_is_zeronet(saddr))
1925                 goto martian_source;
1926
1927         if (ipv4_is_zeronet(daddr))
1928                 goto martian_destination;
1929
1930         /* Following code try to avoid calling IN_DEV_NET_ROUTE_LOCALNET(),
1931          * and call it once if daddr or/and saddr are loopback addresses
1932          */
1933         if (ipv4_is_loopback(daddr)) {
1934                 if (!IN_DEV_NET_ROUTE_LOCALNET(in_dev, net))
1935                         goto martian_destination;
1936         } else if (ipv4_is_loopback(saddr)) {
1937                 if (!IN_DEV_NET_ROUTE_LOCALNET(in_dev, net))
1938                         goto martian_source;
1939         }
1940
1941         /*
1942          *      Now we are ready to route packet.
1943          */
1944         fl4.flowi4_oif = 0;
1945         fl4.flowi4_iif = dev->ifindex;
1946         fl4.flowi4_mark = skb->mark;
1947         fl4.flowi4_tos = tos;
1948         fl4.flowi4_scope = RT_SCOPE_UNIVERSE;
1949         fl4.flowi4_flags = 0;
1950         fl4.daddr = daddr;
1951         fl4.saddr = saddr;
1952         fl4.flowi4_uid = sock_net_uid(net, NULL);
1953         err = fib_lookup(net, &fl4, res, 0);
1954         if (err != 0) {
1955                 if (!IN_DEV_FORWARD(in_dev))
1956                         err = -EHOSTUNREACH;
1957                 goto no_route;
1958         }
1959
1960         if (res->type == RTN_BROADCAST)
1961                 goto brd_input;
1962
1963         if (res->type == RTN_LOCAL) {
1964                 err = fib_validate_source(skb, saddr, daddr, tos,
1965                                           0, dev, in_dev, &itag);
1966                 if (err < 0)
1967                         goto martian_source;
1968                 goto local_input;
1969         }
1970
1971         if (!IN_DEV_FORWARD(in_dev)) {
1972                 err = -EHOSTUNREACH;
1973                 goto no_route;
1974         }
1975         if (res->type != RTN_UNICAST)
1976                 goto martian_destination;
1977
1978         err = ip_mkroute_input(skb, res, in_dev, daddr, saddr, tos);
1979 out:    return err;
1980
1981 brd_input:
1982         if (skb->protocol != htons(ETH_P_IP))
1983                 goto e_inval;
1984
1985         if (!ipv4_is_zeronet(saddr)) {
1986                 err = fib_validate_source(skb, saddr, 0, tos, 0, dev,
1987                                           in_dev, &itag);
1988                 if (err < 0)
1989                         goto martian_source;
1990         }
1991         flags |= RTCF_BROADCAST;
1992         res->type = RTN_BROADCAST;
1993         RT_CACHE_STAT_INC(in_brd);
1994
1995 local_input:
1996         do_cache = false;
1997         if (res->fi) {
1998                 if (!itag) {
1999                         rth = rcu_dereference(FIB_RES_NH(*res).nh_rth_input);
2000                         if (rt_cache_valid(rth)) {
2001                                 skb_dst_set_noref(skb, &rth->dst);
2002                                 err = 0;
2003                                 goto out;
2004                         }
2005                         do_cache = true;
2006                 }
2007         }
2008
2009         rth = rt_dst_alloc(l3mdev_master_dev_rcu(dev) ? : net->loopback_dev,
2010                            flags | RTCF_LOCAL, res->type,
2011                            IN_DEV_CONF_GET(in_dev, NOPOLICY), false, do_cache);
2012         if (!rth)
2013                 goto e_nobufs;
2014
2015         rth->dst.output= ip_rt_bug;
2016 #ifdef CONFIG_IP_ROUTE_CLASSID
2017         rth->dst.tclassid = itag;
2018 #endif
2019         rth->rt_is_input = 1;
2020         if (res->table)
2021                 rth->rt_table_id = res->table->tb_id;
2022
2023         RT_CACHE_STAT_INC(in_slow_tot);
2024         if (res->type == RTN_UNREACHABLE) {
2025                 rth->dst.input= ip_error;
2026                 rth->dst.error= -err;
2027                 rth->rt_flags   &= ~RTCF_LOCAL;
2028         }
2029
2030         if (do_cache) {
2031                 struct fib_nh *nh = &FIB_RES_NH(*res);
2032
2033                 rth->dst.lwtstate = lwtstate_get(nh->nh_lwtstate);
2034                 if (lwtunnel_input_redirect(rth->dst.lwtstate)) {
2035                         WARN_ON(rth->dst.input == lwtunnel_input);
2036                         rth->dst.lwtstate->orig_input = rth->dst.input;
2037                         rth->dst.input = lwtunnel_input;
2038                 }
2039
2040                 if (unlikely(!rt_cache_route(nh, rth)))
2041                         rt_add_uncached_list(rth);
2042         }
2043         skb_dst_set(skb, &rth->dst);
2044         err = 0;
2045         goto out;
2046
2047 no_route:
2048         RT_CACHE_STAT_INC(in_no_route);
2049         res->type = RTN_UNREACHABLE;
2050         res->fi = NULL;
2051         res->table = NULL;
2052         goto local_input;
2053
2054         /*
2055          *      Do not cache martian addresses: they should be logged (RFC1812)
2056          */
2057 martian_destination:
2058         RT_CACHE_STAT_INC(in_martian_dst);
2059 #ifdef CONFIG_IP_ROUTE_VERBOSE
2060         if (IN_DEV_LOG_MARTIANS(in_dev))
2061                 net_warn_ratelimited("martian destination %pI4 from %pI4, dev %s\n",
2062                                      &daddr, &saddr, dev->name);
2063 #endif
2064
2065 e_inval:
2066         err = -EINVAL;
2067         goto out;
2068
2069 e_nobufs:
2070         err = -ENOBUFS;
2071         goto out;
2072
2073 martian_source:
2074         ip_handle_martian_source(dev, in_dev, skb, daddr, saddr);
2075         goto out;
2076 }
2077
2078 int ip_route_input_noref(struct sk_buff *skb, __be32 daddr, __be32 saddr,
2079                          u8 tos, struct net_device *dev)
2080 {
2081         struct fib_result res;
2082         int err;
2083
2084         tos &= IPTOS_RT_MASK;
2085         rcu_read_lock();
2086         err = ip_route_input_rcu(skb, daddr, saddr, tos, dev, &res);
2087         rcu_read_unlock();
2088
2089         return err;
2090 }
2091 EXPORT_SYMBOL(ip_route_input_noref);
2092
2093 /* called with rcu_read_lock held */
2094 int ip_route_input_rcu(struct sk_buff *skb, __be32 daddr, __be32 saddr,
2095                        u8 tos, struct net_device *dev, struct fib_result *res)
2096 {
2097         /* Multicast recognition logic is moved from route cache to here.
2098            The problem was that too many Ethernet cards have broken/missing
2099            hardware multicast filters :-( As result the host on multicasting
2100            network acquires a lot of useless route cache entries, sort of
2101            SDR messages from all the world. Now we try to get rid of them.
2102            Really, provided software IP multicast filter is organized
2103            reasonably (at least, hashed), it does not result in a slowdown
2104            comparing with route cache reject entries.
2105            Note, that multicast routers are not affected, because
2106            route cache entry is created eventually.
2107          */
2108         if (ipv4_is_multicast(daddr)) {
2109                 struct in_device *in_dev = __in_dev_get_rcu(dev);
2110                 int our = 0;
2111                 int err = -EINVAL;
2112
2113                 if (in_dev)
2114                         our = ip_check_mc_rcu(in_dev, daddr, saddr,
2115                                               ip_hdr(skb)->protocol);
2116
2117                 /* check l3 master if no match yet */
2118                 if ((!in_dev || !our) && netif_is_l3_slave(dev)) {
2119                         struct in_device *l3_in_dev;
2120
2121                         l3_in_dev = __in_dev_get_rcu(skb->dev);
2122                         if (l3_in_dev)
2123                                 our = ip_check_mc_rcu(l3_in_dev, daddr, saddr,
2124                                                       ip_hdr(skb)->protocol);
2125                 }
2126
2127                 if (our
2128 #ifdef CONFIG_IP_MROUTE
2129                         ||
2130                     (!ipv4_is_local_multicast(daddr) &&
2131                      IN_DEV_MFORWARD(in_dev))
2132 #endif
2133                    ) {
2134                         err = ip_route_input_mc(skb, daddr, saddr,
2135                                                 tos, dev, our);
2136                 }
2137                 return err;
2138         }
2139
2140         return ip_route_input_slow(skb, daddr, saddr, tos, dev, res);
2141 }
2142
2143 /* called with rcu_read_lock() */
2144 static struct rtable *__mkroute_output(const struct fib_result *res,
2145                                        const struct flowi4 *fl4, int orig_oif,
2146                                        struct net_device *dev_out,
2147                                        unsigned int flags)
2148 {
2149         struct fib_info *fi = res->fi;
2150         struct fib_nh_exception *fnhe;
2151         struct in_device *in_dev;
2152         u16 type = res->type;
2153         struct rtable *rth;
2154         bool do_cache;
2155
2156         in_dev = __in_dev_get_rcu(dev_out);
2157         if (!in_dev)
2158                 return ERR_PTR(-EINVAL);
2159
2160         if (likely(!IN_DEV_ROUTE_LOCALNET(in_dev)))
2161                 if (ipv4_is_loopback(fl4->saddr) &&
2162                     !(dev_out->flags & IFF_LOOPBACK) &&
2163                     !netif_is_l3_master(dev_out))
2164                         return ERR_PTR(-EINVAL);
2165
2166         if (ipv4_is_lbcast(fl4->daddr))
2167                 type = RTN_BROADCAST;
2168         else if (ipv4_is_multicast(fl4->daddr))
2169                 type = RTN_MULTICAST;
2170         else if (ipv4_is_zeronet(fl4->daddr))
2171                 return ERR_PTR(-EINVAL);
2172
2173         if (dev_out->flags & IFF_LOOPBACK)
2174                 flags |= RTCF_LOCAL;
2175
2176         do_cache = true;
2177         if (type == RTN_BROADCAST) {
2178                 flags |= RTCF_BROADCAST | RTCF_LOCAL;
2179                 fi = NULL;
2180         } else if (type == RTN_MULTICAST) {
2181                 flags |= RTCF_MULTICAST | RTCF_LOCAL;
2182                 if (!ip_check_mc_rcu(in_dev, fl4->daddr, fl4->saddr,
2183                                      fl4->flowi4_proto))
2184                         flags &= ~RTCF_LOCAL;
2185                 else
2186                         do_cache = false;
2187                 /* If multicast route do not exist use
2188                  * default one, but do not gateway in this case.
2189                  * Yes, it is hack.
2190                  */
2191                 if (fi && res->prefixlen < 4)
2192                         fi = NULL;
2193         } else if ((type == RTN_LOCAL) && (orig_oif != 0) &&
2194                    (orig_oif != dev_out->ifindex)) {
2195                 /* For local routes that require a particular output interface
2196                  * we do not want to cache the result.  Caching the result
2197                  * causes incorrect behaviour when there are multiple source
2198                  * addresses on the interface, the end result being that if the
2199                  * intended recipient is waiting on that interface for the
2200                  * packet he won't receive it because it will be delivered on
2201                  * the loopback interface and the IP_PKTINFO ipi_ifindex will
2202                  * be set to the loopback interface as well.
2203                  */
2204                 fi = NULL;
2205         }
2206
2207         fnhe = NULL;
2208         do_cache &= fi != NULL;
2209         if (do_cache) {
2210                 struct rtable __rcu **prth;
2211                 struct fib_nh *nh = &FIB_RES_NH(*res);
2212
2213                 fnhe = find_exception(nh, fl4->daddr);
2214                 if (fnhe) {
2215                         prth = &fnhe->fnhe_rth_output;
2216                         rth = rcu_dereference(*prth);
2217                         if (rth && rth->dst.expires &&
2218                             time_after(jiffies, rth->dst.expires)) {
2219                                 ip_del_fnhe(nh, fl4->daddr);
2220                                 fnhe = NULL;
2221                         } else {
2222                                 goto rt_cache;
2223                         }
2224                 }
2225
2226                 if (unlikely(fl4->flowi4_flags &
2227                              FLOWI_FLAG_KNOWN_NH &&
2228                              !(nh->nh_gw &&
2229                                nh->nh_scope == RT_SCOPE_LINK))) {
2230                         do_cache = false;
2231                         goto add;
2232                 }
2233                 prth = raw_cpu_ptr(nh->nh_pcpu_rth_output);
2234                 rth = rcu_dereference(*prth);
2235
2236 rt_cache:
2237                 if (rt_cache_valid(rth) && dst_hold_safe(&rth->dst))
2238                         return rth;
2239         }
2240
2241 add:
2242         rth = rt_dst_alloc(dev_out, flags, type,
2243                            IN_DEV_CONF_GET(in_dev, NOPOLICY),
2244                            IN_DEV_CONF_GET(in_dev, NOXFRM),
2245                            do_cache);
2246         if (!rth)
2247                 return ERR_PTR(-ENOBUFS);
2248
2249         rth->rt_iif = orig_oif;
2250         if (res->table)
2251                 rth->rt_table_id = res->table->tb_id;
2252
2253         RT_CACHE_STAT_INC(out_slow_tot);
2254
2255         if (flags & (RTCF_BROADCAST | RTCF_MULTICAST)) {
2256                 if (flags & RTCF_LOCAL &&
2257                     !(dev_out->flags & IFF_LOOPBACK)) {
2258                         rth->dst.output = ip_mc_output;
2259                         RT_CACHE_STAT_INC(out_slow_mc);
2260                 }
2261 #ifdef CONFIG_IP_MROUTE
2262                 if (type == RTN_MULTICAST) {
2263                         if (IN_DEV_MFORWARD(in_dev) &&
2264                             !ipv4_is_local_multicast(fl4->daddr)) {
2265                                 rth->dst.input = ip_mr_input;
2266                                 rth->dst.output = ip_mc_output;
2267                         }
2268                 }
2269 #endif
2270         }
2271
2272         rt_set_nexthop(rth, fl4->daddr, res, fnhe, fi, type, 0, do_cache);
2273         set_lwt_redirect(rth);
2274
2275         return rth;
2276 }
2277
2278 /*
2279  * Major route resolver routine.
2280  */
2281
2282 struct rtable *ip_route_output_key_hash(struct net *net, struct flowi4 *fl4,
2283                                         const struct sk_buff *skb)
2284 {
2285         __u8 tos = RT_FL_TOS(fl4);
2286         struct fib_result res;
2287         struct rtable *rth;
2288
2289         res.tclassid    = 0;
2290         res.fi          = NULL;
2291         res.table       = NULL;
2292
2293         fl4->flowi4_iif = LOOPBACK_IFINDEX;
2294         fl4->flowi4_tos = tos & IPTOS_RT_MASK;
2295         fl4->flowi4_scope = ((tos & RTO_ONLINK) ?
2296                          RT_SCOPE_LINK : RT_SCOPE_UNIVERSE);
2297
2298         rcu_read_lock();
2299         rth = ip_route_output_key_hash_rcu(net, fl4, &res, skb);
2300         rcu_read_unlock();
2301
2302         return rth;
2303 }
2304 EXPORT_SYMBOL_GPL(ip_route_output_key_hash);
2305
2306 struct rtable *ip_route_output_key_hash_rcu(struct net *net, struct flowi4 *fl4,
2307                                             struct fib_result *res,
2308                                             const struct sk_buff *skb)
2309 {
2310         struct net_device *dev_out = NULL;
2311         int orig_oif = fl4->flowi4_oif;
2312         unsigned int flags = 0;
2313         struct rtable *rth;
2314         int err = -ENETUNREACH;
2315
2316         if (fl4->saddr) {
2317                 rth = ERR_PTR(-EINVAL);
2318                 if (ipv4_is_multicast(fl4->saddr) ||
2319                     ipv4_is_lbcast(fl4->saddr) ||
2320                     ipv4_is_zeronet(fl4->saddr))
2321                         goto out;
2322
2323                 /* I removed check for oif == dev_out->oif here.
2324                    It was wrong for two reasons:
2325                    1. ip_dev_find(net, saddr) can return wrong iface, if saddr
2326                       is assigned to multiple interfaces.
2327                    2. Moreover, we are allowed to send packets with saddr
2328                       of another iface. --ANK
2329                  */
2330
2331                 if (fl4->flowi4_oif == 0 &&
2332                     (ipv4_is_multicast(fl4->daddr) ||
2333                      ipv4_is_lbcast(fl4->daddr))) {
2334                         /* It is equivalent to inet_addr_type(saddr) == RTN_LOCAL */
2335                         dev_out = __ip_dev_find(net, fl4->saddr, false);
2336                         if (!dev_out)
2337                                 goto out;
2338
2339                         /* Special hack: user can direct multicasts
2340                            and limited broadcast via necessary interface
2341                            without fiddling with IP_MULTICAST_IF or IP_PKTINFO.
2342                            This hack is not just for fun, it allows
2343                            vic,vat and friends to work.
2344                            They bind socket to loopback, set ttl to zero
2345                            and expect that it will work.
2346                            From the viewpoint of routing cache they are broken,
2347                            because we are not allowed to build multicast path
2348                            with loopback source addr (look, routing cache
2349                            cannot know, that ttl is zero, so that packet
2350                            will not leave this host and route is valid).
2351                            Luckily, this hack is good workaround.
2352                          */
2353
2354                         fl4->flowi4_oif = dev_out->ifindex;
2355                         goto make_route;
2356                 }
2357
2358                 if (!(fl4->flowi4_flags & FLOWI_FLAG_ANYSRC)) {
2359                         /* It is equivalent to inet_addr_type(saddr) == RTN_LOCAL */
2360                         if (!__ip_dev_find(net, fl4->saddr, false))
2361                                 goto out;
2362                 }
2363         }
2364
2365
2366         if (fl4->flowi4_oif) {
2367                 dev_out = dev_get_by_index_rcu(net, fl4->flowi4_oif);
2368                 rth = ERR_PTR(-ENODEV);
2369                 if (!dev_out)
2370                         goto out;
2371
2372                 /* RACE: Check return value of inet_select_addr instead. */
2373                 if (!(dev_out->flags & IFF_UP) || !__in_dev_get_rcu(dev_out)) {
2374                         rth = ERR_PTR(-ENETUNREACH);
2375                         goto out;
2376                 }
2377                 if (ipv4_is_local_multicast(fl4->daddr) ||
2378                     ipv4_is_lbcast(fl4->daddr) ||
2379                     fl4->flowi4_proto == IPPROTO_IGMP) {
2380                         if (!fl4->saddr)
2381                                 fl4->saddr = inet_select_addr(dev_out, 0,
2382                                                               RT_SCOPE_LINK);
2383                         goto make_route;
2384                 }
2385                 if (!fl4->saddr) {
2386                         if (ipv4_is_multicast(fl4->daddr))
2387                                 fl4->saddr = inet_select_addr(dev_out, 0,
2388                                                               fl4->flowi4_scope);
2389                         else if (!fl4->daddr)
2390                                 fl4->saddr = inet_select_addr(dev_out, 0,
2391                                                               RT_SCOPE_HOST);
2392                 }
2393         }
2394
2395         if (!fl4->daddr) {
2396                 fl4->daddr = fl4->saddr;
2397                 if (!fl4->daddr)
2398                         fl4->daddr = fl4->saddr = htonl(INADDR_LOOPBACK);
2399                 dev_out = net->loopback_dev;
2400                 fl4->flowi4_oif = LOOPBACK_IFINDEX;
2401                 res->type = RTN_LOCAL;
2402                 flags |= RTCF_LOCAL;
2403                 goto make_route;
2404         }
2405
2406         err = fib_lookup(net, fl4, res, 0);
2407         if (err) {
2408                 res->fi = NULL;
2409                 res->table = NULL;
2410                 if (fl4->flowi4_oif &&
2411                     (ipv4_is_multicast(fl4->daddr) ||
2412                     !netif_index_is_l3_master(net, fl4->flowi4_oif))) {
2413                         /* Apparently, routing tables are wrong. Assume,
2414                            that the destination is on link.
2415
2416                            WHY? DW.
2417                            Because we are allowed to send to iface
2418                            even if it has NO routes and NO assigned
2419                            addresses. When oif is specified, routing
2420                            tables are looked up with only one purpose:
2421                            to catch if destination is gatewayed, rather than
2422                            direct. Moreover, if MSG_DONTROUTE is set,
2423                            we send packet, ignoring both routing tables
2424                            and ifaddr state. --ANK
2425
2426
2427                            We could make it even if oif is unknown,
2428                            likely IPv6, but we do not.
2429                          */
2430
2431                         if (fl4->saddr == 0)
2432                                 fl4->saddr = inet_select_addr(dev_out, 0,
2433                                                               RT_SCOPE_LINK);
2434                         res->type = RTN_UNICAST;
2435                         goto make_route;
2436                 }
2437                 rth = ERR_PTR(err);
2438                 goto out;
2439         }
2440
2441         if (res->type == RTN_LOCAL) {
2442                 if (!fl4->saddr) {
2443                         if (res->fi->fib_prefsrc)
2444                                 fl4->saddr = res->fi->fib_prefsrc;
2445                         else
2446                                 fl4->saddr = fl4->daddr;
2447                 }
2448
2449                 /* L3 master device is the loopback for that domain */
2450                 dev_out = l3mdev_master_dev_rcu(FIB_RES_DEV(*res)) ? :
2451                         net->loopback_dev;
2452
2453                 /* make sure orig_oif points to fib result device even
2454                  * though packet rx/tx happens over loopback or l3mdev
2455                  */
2456                 orig_oif = FIB_RES_OIF(*res);
2457
2458                 fl4->flowi4_oif = dev_out->ifindex;
2459                 flags |= RTCF_LOCAL;
2460                 goto make_route;
2461         }
2462
2463         fib_select_path(net, res, fl4, skb);
2464
2465         dev_out = FIB_RES_DEV(*res);
2466         fl4->flowi4_oif = dev_out->ifindex;
2467
2468
2469 make_route:
2470         rth = __mkroute_output(res, fl4, orig_oif, dev_out, flags);
2471
2472 out:
2473         return rth;
2474 }
2475
2476 static struct dst_entry *ipv4_blackhole_dst_check(struct dst_entry *dst, u32 cookie)
2477 {
2478         return NULL;
2479 }
2480
2481 static unsigned int ipv4_blackhole_mtu(const struct dst_entry *dst)
2482 {
2483         unsigned int mtu = dst_metric_raw(dst, RTAX_MTU);
2484
2485         return mtu ? : dst->dev->mtu;
2486 }
2487
2488 static void ipv4_rt_blackhole_update_pmtu(struct dst_entry *dst, struct sock *sk,
2489                                           struct sk_buff *skb, u32 mtu)
2490 {
2491 }
2492
2493 static void ipv4_rt_blackhole_redirect(struct dst_entry *dst, struct sock *sk,
2494                                        struct sk_buff *skb)
2495 {
2496 }
2497
2498 static u32 *ipv4_rt_blackhole_cow_metrics(struct dst_entry *dst,
2499                                           unsigned long old)
2500 {
2501         return NULL;
2502 }
2503
2504 static struct dst_ops ipv4_dst_blackhole_ops = {
2505         .family                 =       AF_INET,
2506         .check                  =       ipv4_blackhole_dst_check,
2507         .mtu                    =       ipv4_blackhole_mtu,
2508         .default_advmss         =       ipv4_default_advmss,
2509         .update_pmtu            =       ipv4_rt_blackhole_update_pmtu,
2510         .redirect               =       ipv4_rt_blackhole_redirect,
2511         .cow_metrics            =       ipv4_rt_blackhole_cow_metrics,
2512         .neigh_lookup           =       ipv4_neigh_lookup,
2513 };
2514
2515 struct dst_entry *ipv4_blackhole_route(struct net *net, struct dst_entry *dst_orig)
2516 {
2517         struct rtable *ort = (struct rtable *) dst_orig;
2518         struct rtable *rt;
2519
2520         rt = dst_alloc(&ipv4_dst_blackhole_ops, NULL, 1, DST_OBSOLETE_DEAD, 0);
2521         if (rt) {
2522                 struct dst_entry *new = &rt->dst;
2523
2524                 new->__use = 1;
2525                 new->input = dst_discard;
2526                 new->output = dst_discard_out;
2527
2528                 new->dev = net->loopback_dev;
2529                 if (new->dev)
2530                         dev_hold(new->dev);
2531
2532                 rt->rt_is_input = ort->rt_is_input;
2533                 rt->rt_iif = ort->rt_iif;
2534                 rt->rt_pmtu = ort->rt_pmtu;
2535
2536                 rt->rt_genid = rt_genid_ipv4(net);
2537                 rt->rt_flags = ort->rt_flags;
2538                 rt->rt_type = ort->rt_type;
2539                 rt->rt_gateway = ort->rt_gateway;
2540                 rt->rt_uses_gateway = ort->rt_uses_gateway;
2541
2542                 INIT_LIST_HEAD(&rt->rt_uncached);
2543         }
2544
2545         dst_release(dst_orig);
2546
2547         return rt ? &rt->dst : ERR_PTR(-ENOMEM);
2548 }
2549
2550 struct rtable *ip_route_output_flow(struct net *net, struct flowi4 *flp4,
2551                                     const struct sock *sk)
2552 {
2553         struct rtable *rt = __ip_route_output_key(net, flp4);
2554
2555         if (IS_ERR(rt))
2556                 return rt;
2557
2558         if (flp4->flowi4_proto)
2559                 rt = (struct rtable *)xfrm_lookup_route(net, &rt->dst,
2560                                                         flowi4_to_flowi(flp4),
2561                                                         sk, 0);
2562
2563         return rt;
2564 }
2565 EXPORT_SYMBOL_GPL(ip_route_output_flow);
2566
2567 /* called with rcu_read_lock held */
2568 static int rt_fill_info(struct net *net,  __be32 dst, __be32 src, u32 table_id,
2569                         struct flowi4 *fl4, struct sk_buff *skb, u32 portid,
2570                         u32 seq)
2571 {
2572         struct rtable *rt = skb_rtable(skb);
2573         struct rtmsg *r;
2574         struct nlmsghdr *nlh;
2575         unsigned long expires = 0;
2576         u32 error;
2577         u32 metrics[RTAX_MAX];
2578
2579         nlh = nlmsg_put(skb, portid, seq, RTM_NEWROUTE, sizeof(*r), 0);
2580         if (!nlh)
2581                 return -EMSGSIZE;
2582
2583         r = nlmsg_data(nlh);
2584         r->rtm_family    = AF_INET;
2585         r->rtm_dst_len  = 32;
2586         r->rtm_src_len  = 0;
2587         r->rtm_tos      = fl4->flowi4_tos;
2588         r->rtm_table    = table_id < 256 ? table_id : RT_TABLE_COMPAT;
2589         if (nla_put_u32(skb, RTA_TABLE, table_id))
2590                 goto nla_put_failure;
2591         r->rtm_type     = rt->rt_type;
2592         r->rtm_scope    = RT_SCOPE_UNIVERSE;
2593         r->rtm_protocol = RTPROT_UNSPEC;
2594         r->rtm_flags    = (rt->rt_flags & ~0xFFFF) | RTM_F_CLONED;
2595         if (rt->rt_flags & RTCF_NOTIFY)
2596                 r->rtm_flags |= RTM_F_NOTIFY;
2597         if (IPCB(skb)->flags & IPSKB_DOREDIRECT)
2598                 r->rtm_flags |= RTCF_DOREDIRECT;
2599
2600         if (nla_put_in_addr(skb, RTA_DST, dst))
2601                 goto nla_put_failure;
2602         if (src) {
2603                 r->rtm_src_len = 32;
2604                 if (nla_put_in_addr(skb, RTA_SRC, src))
2605                         goto nla_put_failure;
2606         }
2607         if (rt->dst.dev &&
2608             nla_put_u32(skb, RTA_OIF, rt->dst.dev->ifindex))
2609                 goto nla_put_failure;
2610 #ifdef CONFIG_IP_ROUTE_CLASSID
2611         if (rt->dst.tclassid &&
2612             nla_put_u32(skb, RTA_FLOW, rt->dst.tclassid))
2613                 goto nla_put_failure;
2614 #endif
2615         if (!rt_is_input_route(rt) &&
2616             fl4->saddr != src) {
2617                 if (nla_put_in_addr(skb, RTA_PREFSRC, fl4->saddr))
2618                         goto nla_put_failure;
2619         }
2620         if (rt->rt_uses_gateway &&
2621             nla_put_in_addr(skb, RTA_GATEWAY, rt->rt_gateway))
2622                 goto nla_put_failure;
2623
2624         expires = rt->dst.expires;
2625         if (expires) {
2626                 unsigned long now = jiffies;
2627
2628                 if (time_before(now, expires))
2629                         expires -= now;
2630                 else
2631                         expires = 0;
2632         }
2633
2634         memcpy(metrics, dst_metrics_ptr(&rt->dst), sizeof(metrics));
2635         if (rt->rt_pmtu && expires)
2636                 metrics[RTAX_MTU - 1] = rt->rt_pmtu;
2637         if (rtnetlink_put_metrics(skb, metrics) < 0)
2638                 goto nla_put_failure;
2639
2640         if (fl4->flowi4_mark &&
2641             nla_put_u32(skb, RTA_MARK, fl4->flowi4_mark))
2642                 goto nla_put_failure;
2643
2644         if (!uid_eq(fl4->flowi4_uid, INVALID_UID) &&
2645             nla_put_u32(skb, RTA_UID,
2646                         from_kuid_munged(current_user_ns(), fl4->flowi4_uid)))
2647                 goto nla_put_failure;
2648
2649         error = rt->dst.error;
2650
2651         if (rt_is_input_route(rt)) {
2652 #ifdef CONFIG_IP_MROUTE
2653                 if (ipv4_is_multicast(dst) && !ipv4_is_local_multicast(dst) &&
2654                     IPV4_DEVCONF_ALL(net, MC_FORWARDING)) {
2655                         int err = ipmr_get_route(net, skb,
2656                                                  fl4->saddr, fl4->daddr,
2657                                                  r, portid);
2658
2659                         if (err <= 0) {
2660                                 if (err == 0)
2661                                         return 0;
2662                                 goto nla_put_failure;
2663                         }
2664                 } else
2665 #endif
2666                         if (nla_put_u32(skb, RTA_IIF, skb->dev->ifindex))
2667                                 goto nla_put_failure;
2668         }
2669
2670         if (rtnl_put_cacheinfo(skb, &rt->dst, 0, expires, error) < 0)
2671                 goto nla_put_failure;
2672
2673         nlmsg_end(skb, nlh);
2674         return 0;
2675
2676 nla_put_failure:
2677         nlmsg_cancel(skb, nlh);
2678         return -EMSGSIZE;
2679 }
2680
2681 static int inet_rtm_getroute(struct sk_buff *in_skb, struct nlmsghdr *nlh,
2682                              struct netlink_ext_ack *extack)
2683 {
2684         struct net *net = sock_net(in_skb->sk);
2685         struct rtmsg *rtm;
2686         struct nlattr *tb[RTA_MAX+1];
2687         struct fib_result res = {};
2688         struct rtable *rt = NULL;
2689         struct flowi4 fl4;
2690         __be32 dst = 0;
2691         __be32 src = 0;
2692         u32 iif;
2693         int err;
2694         int mark;
2695         struct sk_buff *skb;
2696         u32 table_id = RT_TABLE_MAIN;
2697         kuid_t uid;
2698
2699         err = nlmsg_parse(nlh, sizeof(*rtm), tb, RTA_MAX, rtm_ipv4_policy,
2700                           extack);
2701         if (err < 0)
2702                 goto errout;
2703
2704         rtm = nlmsg_data(nlh);
2705
2706         skb = alloc_skb(NLMSG_GOODSIZE, GFP_KERNEL);
2707         if (!skb) {
2708                 err = -ENOBUFS;
2709                 goto errout;
2710         }
2711
2712         /* Reserve room for dummy headers, this skb can pass
2713            through good chunk of routing engine.
2714          */
2715         skb_reset_mac_header(skb);
2716         skb_reset_network_header(skb);
2717
2718         src = tb[RTA_SRC] ? nla_get_in_addr(tb[RTA_SRC]) : 0;
2719         dst = tb[RTA_DST] ? nla_get_in_addr(tb[RTA_DST]) : 0;
2720         iif = tb[RTA_IIF] ? nla_get_u32(tb[RTA_IIF]) : 0;
2721         mark = tb[RTA_MARK] ? nla_get_u32(tb[RTA_MARK]) : 0;
2722         if (tb[RTA_UID])
2723                 uid = make_kuid(current_user_ns(), nla_get_u32(tb[RTA_UID]));
2724         else
2725                 uid = (iif ? INVALID_UID : current_uid());
2726
2727         /* Bugfix: need to give ip_route_input enough of an IP header to
2728          * not gag.
2729          */
2730         ip_hdr(skb)->protocol = IPPROTO_UDP;
2731         ip_hdr(skb)->saddr = src;
2732         ip_hdr(skb)->daddr = dst;
2733
2734         skb_reserve(skb, MAX_HEADER + sizeof(struct iphdr));
2735
2736         memset(&fl4, 0, sizeof(fl4));
2737         fl4.daddr = dst;
2738         fl4.saddr = src;
2739         fl4.flowi4_tos = rtm->rtm_tos;
2740         fl4.flowi4_oif = tb[RTA_OIF] ? nla_get_u32(tb[RTA_OIF]) : 0;
2741         fl4.flowi4_mark = mark;
2742         fl4.flowi4_uid = uid;
2743
2744         rcu_read_lock();
2745
2746         if (iif) {
2747                 struct net_device *dev;
2748
2749                 dev = dev_get_by_index_rcu(net, iif);
2750                 if (!dev) {
2751                         err = -ENODEV;
2752                         goto errout_free;
2753                 }
2754
2755                 skb->protocol   = htons(ETH_P_IP);
2756                 skb->dev        = dev;
2757                 skb->mark       = mark;
2758                 err = ip_route_input_rcu(skb, dst, src, rtm->rtm_tos,
2759                                          dev, &res);
2760
2761                 rt = skb_rtable(skb);
2762                 if (err == 0 && rt->dst.error)
2763                         err = -rt->dst.error;
2764         } else {
2765                 fl4.flowi4_iif = LOOPBACK_IFINDEX;
2766                 rt = ip_route_output_key_hash_rcu(net, &fl4, &res, skb);
2767                 err = 0;
2768                 if (IS_ERR(rt))
2769                         err = PTR_ERR(rt);
2770                 else
2771                         skb_dst_set(skb, &rt->dst);
2772         }
2773
2774         if (err)
2775                 goto errout_free;
2776
2777         if (rtm->rtm_flags & RTM_F_NOTIFY)
2778                 rt->rt_flags |= RTCF_NOTIFY;
2779
2780         if (rtm->rtm_flags & RTM_F_LOOKUP_TABLE)
2781                 table_id = rt->rt_table_id;
2782
2783         if (rtm->rtm_flags & RTM_F_FIB_MATCH) {
2784                 if (!res.fi) {
2785                         err = fib_props[res.type].error;
2786                         if (!err)
2787                                 err = -EHOSTUNREACH;
2788                         goto errout_free;
2789                 }
2790                 err = fib_dump_info(skb, NETLINK_CB(in_skb).portid,
2791                                     nlh->nlmsg_seq, RTM_NEWROUTE, table_id,
2792                                     rt->rt_type, res.prefix, res.prefixlen,
2793                                     fl4.flowi4_tos, res.fi, 0);
2794         } else {
2795                 err = rt_fill_info(net, dst, src, table_id, &fl4, skb,
2796                                    NETLINK_CB(in_skb).portid, nlh->nlmsg_seq);
2797         }
2798         if (err < 0)
2799                 goto errout_free;
2800
2801         rcu_read_unlock();
2802
2803         err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).portid);
2804 errout:
2805         return err;
2806
2807 errout_free:
2808         rcu_read_unlock();
2809         kfree_skb(skb);
2810         goto errout;
2811 }
2812
2813 void ip_rt_multicast_event(struct in_device *in_dev)
2814 {
2815         rt_cache_flush(dev_net(in_dev->dev));
2816 }
2817
2818 #ifdef CONFIG_SYSCTL
2819 static int ip_rt_gc_interval __read_mostly  = 60 * HZ;
2820 static int ip_rt_gc_min_interval __read_mostly  = HZ / 2;
2821 static int ip_rt_gc_elasticity __read_mostly    = 8;
2822
2823 static int ipv4_sysctl_rtcache_flush(struct ctl_table *__ctl, int write,
2824                                         void __user *buffer,
2825                                         size_t *lenp, loff_t *ppos)
2826 {
2827         struct net *net = (struct net *)__ctl->extra1;
2828
2829         if (write) {
2830                 rt_cache_flush(net);
2831                 fnhe_genid_bump(net);
2832                 return 0;
2833         }
2834
2835         return -EINVAL;
2836 }
2837
2838 static struct ctl_table ipv4_route_table[] = {
2839         {
2840                 .procname       = "gc_thresh",
2841                 .data           = &ipv4_dst_ops.gc_thresh,
2842                 .maxlen         = sizeof(int),
2843                 .mode           = 0644,
2844                 .proc_handler   = proc_dointvec,
2845         },
2846         {
2847                 .procname       = "max_size",
2848                 .data           = &ip_rt_max_size,
2849                 .maxlen         = sizeof(int),
2850                 .mode           = 0644,
2851                 .proc_handler   = proc_dointvec,
2852         },
2853         {
2854                 /*  Deprecated. Use gc_min_interval_ms */
2855
2856                 .procname       = "gc_min_interval",
2857                 .data           = &ip_rt_gc_min_interval,
2858                 .maxlen         = sizeof(int),
2859                 .mode           = 0644,
2860                 .proc_handler   = proc_dointvec_jiffies,
2861         },
2862         {
2863                 .procname       = "gc_min_interval_ms",
2864                 .data           = &ip_rt_gc_min_interval,
2865                 .maxlen         = sizeof(int),
2866                 .mode           = 0644,
2867                 .proc_handler   = proc_dointvec_ms_jiffies,
2868         },
2869         {
2870                 .procname       = "gc_timeout",
2871                 .data           = &ip_rt_gc_timeout,
2872                 .maxlen         = sizeof(int),
2873                 .mode           = 0644,
2874                 .proc_handler   = proc_dointvec_jiffies,
2875         },
2876         {
2877                 .procname       = "gc_interval",
2878                 .data           = &ip_rt_gc_interval,
2879                 .maxlen         = sizeof(int),
2880                 .mode           = 0644,
2881                 .proc_handler   = proc_dointvec_jiffies,
2882         },
2883         {
2884                 .procname       = "redirect_load",
2885                 .data           = &ip_rt_redirect_load,
2886                 .maxlen         = sizeof(int),
2887                 .mode           = 0644,
2888                 .proc_handler   = proc_dointvec,
2889         },
2890         {
2891                 .procname       = "redirect_number",
2892                 .data           = &ip_rt_redirect_number,
2893                 .maxlen         = sizeof(int),
2894                 .mode           = 0644,
2895                 .proc_handler   = proc_dointvec,
2896         },
2897         {
2898                 .procname       = "redirect_silence",
2899                 .data           = &ip_rt_redirect_silence,
2900                 .maxlen         = sizeof(int),
2901                 .mode           = 0644,
2902                 .proc_handler   = proc_dointvec,
2903         },
2904         {
2905                 .procname       = "error_cost",
2906                 .data           = &ip_rt_error_cost,
2907                 .maxlen         = sizeof(int),
2908                 .mode           = 0644,
2909                 .proc_handler   = proc_dointvec,
2910         },
2911         {
2912                 .procname       = "error_burst",
2913                 .data           = &ip_rt_error_burst,
2914                 .maxlen         = sizeof(int),
2915                 .mode           = 0644,
2916                 .proc_handler   = proc_dointvec,
2917         },
2918         {
2919                 .procname       = "gc_elasticity",
2920                 .data           = &ip_rt_gc_elasticity,
2921                 .maxlen         = sizeof(int),
2922                 .mode           = 0644,
2923                 .proc_handler   = proc_dointvec,
2924         },
2925         {
2926                 .procname       = "mtu_expires",
2927                 .data           = &ip_rt_mtu_expires,
2928                 .maxlen         = sizeof(int),
2929                 .mode           = 0644,
2930                 .proc_handler   = proc_dointvec_jiffies,
2931         },
2932         {
2933                 .procname       = "min_pmtu",
2934                 .data           = &ip_rt_min_pmtu,
2935                 .maxlen         = sizeof(int),
2936                 .mode           = 0644,
2937                 .proc_handler   = proc_dointvec,
2938         },
2939         {
2940                 .procname       = "min_adv_mss",
2941                 .data           = &ip_rt_min_advmss,
2942                 .maxlen         = sizeof(int),
2943                 .mode           = 0644,
2944                 .proc_handler   = proc_dointvec,
2945         },
2946         { }
2947 };
2948
2949 static struct ctl_table ipv4_route_flush_table[] = {
2950         {
2951                 .procname       = "flush",
2952                 .maxlen         = sizeof(int),
2953                 .mode           = 0200,
2954                 .proc_handler   = ipv4_sysctl_rtcache_flush,
2955         },
2956         { },
2957 };
2958
2959 static __net_init int sysctl_route_net_init(struct net *net)
2960 {
2961         struct ctl_table *tbl;
2962
2963         tbl = ipv4_route_flush_table;
2964         if (!net_eq(net, &init_net)) {
2965                 tbl = kmemdup(tbl, sizeof(ipv4_route_flush_table), GFP_KERNEL);
2966                 if (!tbl)
2967                         goto err_dup;
2968
2969                 /* Don't export sysctls to unprivileged users */
2970                 if (net->user_ns != &init_user_ns)
2971                         tbl[0].procname = NULL;
2972         }
2973         tbl[0].extra1 = net;
2974
2975         net->ipv4.route_hdr = register_net_sysctl(net, "net/ipv4/route", tbl);
2976         if (!net->ipv4.route_hdr)
2977                 goto err_reg;
2978         return 0;
2979
2980 err_reg:
2981         if (tbl != ipv4_route_flush_table)
2982                 kfree(tbl);
2983 err_dup:
2984         return -ENOMEM;
2985 }
2986
2987 static __net_exit void sysctl_route_net_exit(struct net *net)
2988 {
2989         struct ctl_table *tbl;
2990
2991         tbl = net->ipv4.route_hdr->ctl_table_arg;
2992         unregister_net_sysctl_table(net->ipv4.route_hdr);
2993         BUG_ON(tbl == ipv4_route_flush_table);
2994         kfree(tbl);
2995 }
2996
2997 static __net_initdata struct pernet_operations sysctl_route_ops = {
2998         .init = sysctl_route_net_init,
2999         .exit = sysctl_route_net_exit,
3000 };
3001 #endif
3002
3003 static __net_init int rt_genid_init(struct net *net)
3004 {
3005         atomic_set(&net->ipv4.rt_genid, 0);
3006         atomic_set(&net->fnhe_genid, 0);
3007         atomic_set(&net->ipv4.dev_addr_genid, get_random_int());
3008         return 0;
3009 }
3010
3011 static __net_initdata struct pernet_operations rt_genid_ops = {
3012         .init = rt_genid_init,
3013 };
3014
3015 static int __net_init ipv4_inetpeer_init(struct net *net)
3016 {
3017         struct inet_peer_base *bp = kmalloc(sizeof(*bp), GFP_KERNEL);
3018
3019         if (!bp)
3020                 return -ENOMEM;
3021         inet_peer_base_init(bp);
3022         net->ipv4.peers = bp;
3023         return 0;
3024 }
3025
3026 static void __net_exit ipv4_inetpeer_exit(struct net *net)
3027 {
3028         struct inet_peer_base *bp = net->ipv4.peers;
3029
3030         net->ipv4.peers = NULL;
3031         inetpeer_invalidate_tree(bp);
3032         kfree(bp);
3033 }
3034
3035 static __net_initdata struct pernet_operations ipv4_inetpeer_ops = {
3036         .init   =       ipv4_inetpeer_init,
3037         .exit   =       ipv4_inetpeer_exit,
3038 };
3039
3040 #ifdef CONFIG_IP_ROUTE_CLASSID
3041 struct ip_rt_acct __percpu *ip_rt_acct __read_mostly;
3042 #endif /* CONFIG_IP_ROUTE_CLASSID */
3043
3044 int __init ip_rt_init(void)
3045 {
3046         int cpu;
3047
3048         ip_idents = kmalloc(IP_IDENTS_SZ * sizeof(*ip_idents), GFP_KERNEL);
3049         if (!ip_idents)
3050                 panic("IP: failed to allocate ip_idents\n");
3051
3052         prandom_bytes(ip_idents, IP_IDENTS_SZ * sizeof(*ip_idents));
3053
3054         ip_tstamps = kcalloc(IP_IDENTS_SZ, sizeof(*ip_tstamps), GFP_KERNEL);
3055         if (!ip_tstamps)
3056                 panic("IP: failed to allocate ip_tstamps\n");
3057
3058         for_each_possible_cpu(cpu) {
3059                 struct uncached_list *ul = &per_cpu(rt_uncached_list, cpu);
3060
3061                 INIT_LIST_HEAD(&ul->head);
3062                 spin_lock_init(&ul->lock);
3063         }
3064 #ifdef CONFIG_IP_ROUTE_CLASSID
3065         ip_rt_acct = __alloc_percpu(256 * sizeof(struct ip_rt_acct), __alignof__(struct ip_rt_acct));
3066         if (!ip_rt_acct)
3067                 panic("IP: failed to allocate ip_rt_acct\n");
3068 #endif
3069
3070         ipv4_dst_ops.kmem_cachep =
3071                 kmem_cache_create("ip_dst_cache", sizeof(struct rtable), 0,
3072                                   SLAB_HWCACHE_ALIGN|SLAB_PANIC, NULL);
3073
3074         ipv4_dst_blackhole_ops.kmem_cachep = ipv4_dst_ops.kmem_cachep;
3075
3076         if (dst_entries_init(&ipv4_dst_ops) < 0)
3077                 panic("IP: failed to allocate ipv4_dst_ops counter\n");
3078
3079         if (dst_entries_init(&ipv4_dst_blackhole_ops) < 0)
3080                 panic("IP: failed to allocate ipv4_dst_blackhole_ops counter\n");
3081
3082         ipv4_dst_ops.gc_thresh = ~0;
3083         ip_rt_max_size = INT_MAX;
3084
3085         devinet_init();
3086         ip_fib_init();
3087
3088         if (ip_rt_proc_init())
3089                 pr_err("Unable to create route proc files\n");
3090 #ifdef CONFIG_XFRM
3091         xfrm_init();
3092         xfrm4_init();
3093 #endif
3094         rtnl_register(PF_INET, RTM_GETROUTE, inet_rtm_getroute, NULL,
3095                       RTNL_FLAG_DOIT_UNLOCKED);
3096
3097 #ifdef CONFIG_SYSCTL
3098         register_pernet_subsys(&sysctl_route_ops);
3099 #endif
3100         register_pernet_subsys(&rt_genid_ops);
3101         register_pernet_subsys(&ipv4_inetpeer_ops);
3102         return 0;
3103 }
3104
3105 #ifdef CONFIG_SYSCTL
3106 /*
3107  * We really need to sanitize the damn ipv4 init order, then all
3108  * this nonsense will go away.
3109  */
3110 void __init ip_static_sysctl_init(void)
3111 {
3112         register_net_sysctl(&init_net, "net/ipv4/route", ipv4_route_table);
3113 }
3114 #endif