2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
* Linux INET6 implementation
|
|
|
|
* FIB front-end.
|
|
|
|
*
|
|
|
|
* Authors:
|
2007-02-09 07:24:49 -07:00
|
|
|
* Pedro Roque <roque@di.fc.ul.pt>
|
2005-04-16 15:20:36 -07:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version
|
|
|
|
* 2 of the License, or (at your option) any later version.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/* Changes:
|
|
|
|
*
|
|
|
|
* YOSHIFUJI Hideaki @USAGI
|
|
|
|
* reworked default router selection.
|
|
|
|
* - respect outgoing interface
|
|
|
|
* - select from (probably) reachable routers (i.e.
|
|
|
|
* routers in REACHABLE, STALE, DELAY or PROBE states).
|
|
|
|
* - always select the same router if it is (probably)
|
|
|
|
* reachable. otherwise, round-robin the list.
|
2006-08-23 17:23:25 -07:00
|
|
|
* Ville Nuorvala
|
|
|
|
* Fixed routing subtrees.
|
2005-04-16 15:20:36 -07:00
|
|
|
*/
|
|
|
|
|
2006-01-11 13:17:47 -07:00
|
|
|
#include <linux/capability.h>
|
2005-04-16 15:20:36 -07:00
|
|
|
#include <linux/errno.h>
|
|
|
|
#include <linux/types.h>
|
|
|
|
#include <linux/times.h>
|
|
|
|
#include <linux/socket.h>
|
|
|
|
#include <linux/sockios.h>
|
|
|
|
#include <linux/net.h>
|
|
|
|
#include <linux/route.h>
|
|
|
|
#include <linux/netdevice.h>
|
|
|
|
#include <linux/in6.h>
|
2008-04-02 17:22:53 -07:00
|
|
|
#include <linux/mroute6.h>
|
2005-04-16 15:20:36 -07:00
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/if_arp.h>
|
|
|
|
#include <linux/proc_fs.h>
|
|
|
|
#include <linux/seq_file.h>
|
2008-03-04 00:28:58 -07:00
|
|
|
#include <linux/nsproxy.h>
|
include cleanup: Update gfp.h and slab.h includes to prepare for breaking implicit slab.h inclusion from percpu.h
percpu.h is included by sched.h and module.h and thus ends up being
included when building most .c files. percpu.h includes slab.h which
in turn includes gfp.h making everything defined by the two files
universally available and complicating inclusion dependencies.
percpu.h -> slab.h dependency is about to be removed. Prepare for
this change by updating users of gfp and slab facilities include those
headers directly instead of assuming availability. As this conversion
needs to touch large number of source files, the following script is
used as the basis of conversion.
http://userweb.kernel.org/~tj/misc/slabh-sweep.py
The script does the followings.
* Scan files for gfp and slab usages and update includes such that
only the necessary includes are there. ie. if only gfp is used,
gfp.h, if slab is used, slab.h.
* When the script inserts a new include, it looks at the include
blocks and try to put the new include such that its order conforms
to its surrounding. It's put in the include block which contains
core kernel includes, in the same order that the rest are ordered -
alphabetical, Christmas tree, rev-Xmas-tree or at the end if there
doesn't seem to be any matching order.
* If the script can't find a place to put a new include (mostly
because the file doesn't have fitting include block), it prints out
an error message indicating which .h file needs to be added to the
file.
The conversion was done in the following steps.
1. The initial automatic conversion of all .c files updated slightly
over 4000 files, deleting around 700 includes and adding ~480 gfp.h
and ~3000 slab.h inclusions. The script emitted errors for ~400
files.
2. Each error was manually checked. Some didn't need the inclusion,
some needed manual addition while adding it to implementation .h or
embedding .c file was more appropriate for others. This step added
inclusions to around 150 files.
3. The script was run again and the output was compared to the edits
from #2 to make sure no file was left behind.
4. Several build tests were done and a couple of problems were fixed.
e.g. lib/decompress_*.c used malloc/free() wrappers around slab
APIs requiring slab.h to be added manually.
5. The script was run on all .h files but without automatically
editing them as sprinkling gfp.h and slab.h inclusions around .h
files could easily lead to inclusion dependency hell. Most gfp.h
inclusion directives were ignored as stuff from gfp.h was usually
wildly available and often used in preprocessor macros. Each
slab.h inclusion directive was examined and added manually as
necessary.
6. percpu.h was updated not to include slab.h.
7. Build test were done on the following configurations and failures
were fixed. CONFIG_GCOV_KERNEL was turned off for all tests (as my
distributed build env didn't work with gcov compiles) and a few
more options had to be turned off depending on archs to make things
build (like ipr on powerpc/64 which failed due to missing writeq).
* x86 and x86_64 UP and SMP allmodconfig and a custom test config.
* powerpc and powerpc64 SMP allmodconfig
* sparc and sparc64 SMP allmodconfig
* ia64 SMP allmodconfig
* s390 SMP allmodconfig
* alpha SMP allmodconfig
* um on x86_64 SMP allmodconfig
8. percpu.h modifications were reverted so that it could be applied as
a separate patch and serve as bisection point.
Given the fact that I had only a couple of failures from tests on step
6, I'm fairly confident about the coverage of this conversion patch.
If there is a breakage, it's likely to be something in one of the arch
headers which should be easily discoverable easily on most builds of
the specific arch.
Signed-off-by: Tejun Heo <tj@kernel.org>
Guess-its-ok-by: Christoph Lameter <cl@linux-foundation.org>
Cc: Ingo Molnar <mingo@redhat.com>
Cc: Lee Schermerhorn <Lee.Schermerhorn@hp.com>
2010-03-24 01:04:11 -07:00
|
|
|
#include <linux/slab.h>
|
2007-09-12 03:01:34 -07:00
|
|
|
#include <net/net_namespace.h>
|
2005-04-16 15:20:36 -07:00
|
|
|
#include <net/snmp.h>
|
|
|
|
#include <net/ipv6.h>
|
|
|
|
#include <net/ip6_fib.h>
|
|
|
|
#include <net/ip6_route.h>
|
|
|
|
#include <net/ndisc.h>
|
|
|
|
#include <net/addrconf.h>
|
|
|
|
#include <net/tcp.h>
|
|
|
|
#include <linux/rtnetlink.h>
|
|
|
|
#include <net/dst.h>
|
|
|
|
#include <net/xfrm.h>
|
2006-07-30 20:43:36 -07:00
|
|
|
#include <net/netevent.h>
|
2006-08-15 00:35:24 -07:00
|
|
|
#include <net/netlink.h>
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
#include <asm/uaccess.h>
|
|
|
|
|
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
#include <linux/sysctl.h>
|
|
|
|
#endif
|
|
|
|
|
|
|
|
/* Set to 3 to get tracing. */
|
|
|
|
#define RT6_DEBUG 2
|
|
|
|
|
|
|
|
#if RT6_DEBUG >= 3
|
|
|
|
#define RDBG(x) printk x
|
|
|
|
#define RT6_TRACE(x...) printk(KERN_DEBUG x)
|
|
|
|
#else
|
|
|
|
#define RDBG(x)
|
|
|
|
#define RT6_TRACE(x...) do { ; } while (0)
|
|
|
|
#endif
|
|
|
|
|
2006-03-20 18:00:05 -07:00
|
|
|
#define CLONE_OFFLINK_ROUTE 0
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
static struct rt6_info * ip6_rt_copy(struct rt6_info *ort);
|
|
|
|
static struct dst_entry *ip6_dst_check(struct dst_entry *dst, u32 cookie);
|
|
|
|
static struct dst_entry *ip6_negative_advice(struct dst_entry *);
|
|
|
|
static void ip6_dst_destroy(struct dst_entry *);
|
|
|
|
static void ip6_dst_ifdown(struct dst_entry *,
|
|
|
|
struct net_device *dev, int how);
|
2008-01-18 04:56:57 -07:00
|
|
|
static int ip6_dst_gc(struct dst_ops *ops);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
static int ip6_pkt_discard(struct sk_buff *skb);
|
|
|
|
static int ip6_pkt_discard_out(struct sk_buff *skb);
|
|
|
|
static void ip6_link_failure(struct sk_buff *skb);
|
|
|
|
static void ip6_rt_update_pmtu(struct dst_entry *dst, u32 mtu);
|
|
|
|
|
2006-03-20 18:06:24 -07:00
|
|
|
#ifdef CONFIG_IPV6_ROUTE_INFO
|
2008-03-04 14:46:48 -07:00
|
|
|
static struct rt6_info *rt6_add_route_info(struct net *net,
|
|
|
|
struct in6_addr *prefix, int prefixlen,
|
2006-03-20 18:06:24 -07:00
|
|
|
struct in6_addr *gwaddr, int ifindex,
|
|
|
|
unsigned pref);
|
2008-03-04 14:46:48 -07:00
|
|
|
static struct rt6_info *rt6_get_route_info(struct net *net,
|
|
|
|
struct in6_addr *prefix, int prefixlen,
|
2006-03-20 18:06:24 -07:00
|
|
|
struct in6_addr *gwaddr, int ifindex);
|
|
|
|
#endif
|
|
|
|
|
2008-03-04 14:48:53 -07:00
|
|
|
static struct dst_ops ip6_dst_ops_template = {
|
2005-04-16 15:20:36 -07:00
|
|
|
.family = AF_INET6,
|
2009-02-01 01:45:17 -07:00
|
|
|
.protocol = cpu_to_be16(ETH_P_IPV6),
|
2005-04-16 15:20:36 -07:00
|
|
|
.gc = ip6_dst_gc,
|
|
|
|
.gc_thresh = 1024,
|
|
|
|
.check = ip6_dst_check,
|
|
|
|
.destroy = ip6_dst_destroy,
|
|
|
|
.ifdown = ip6_dst_ifdown,
|
|
|
|
.negative_advice = ip6_negative_advice,
|
|
|
|
.link_failure = ip6_link_failure,
|
|
|
|
.update_pmtu = ip6_rt_update_pmtu,
|
2008-05-20 14:32:14 -07:00
|
|
|
.local_out = __ip6_local_out,
|
2005-04-16 15:20:36 -07:00
|
|
|
};
|
|
|
|
|
2007-05-24 18:17:54 -07:00
|
|
|
static void ip6_rt_blackhole_update_pmtu(struct dst_entry *dst, u32 mtu)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct dst_ops ip6_dst_blackhole_ops = {
|
|
|
|
.family = AF_INET6,
|
2009-02-01 01:45:17 -07:00
|
|
|
.protocol = cpu_to_be16(ETH_P_IPV6),
|
2007-05-24 18:17:54 -07:00
|
|
|
.destroy = ip6_dst_destroy,
|
|
|
|
.check = ip6_dst_check,
|
|
|
|
.update_pmtu = ip6_rt_blackhole_update_pmtu,
|
|
|
|
};
|
|
|
|
|
2008-03-04 14:48:10 -07:00
|
|
|
static struct rt6_info ip6_null_entry_template = {
|
2010-06-10 23:31:35 -07:00
|
|
|
.dst = {
|
|
|
|
.__refcnt = ATOMIC_INIT(1),
|
|
|
|
.__use = 1,
|
|
|
|
.obsolete = -1,
|
|
|
|
.error = -ENETUNREACH,
|
|
|
|
.metrics = { [RTAX_HOPLIMIT - 1] = 255, },
|
|
|
|
.input = ip6_pkt_discard,
|
|
|
|
.output = ip6_pkt_discard_out,
|
2005-04-16 15:20:36 -07:00
|
|
|
},
|
|
|
|
.rt6i_flags = (RTF_REJECT | RTF_NONEXTHOP),
|
2009-05-20 17:38:59 -07:00
|
|
|
.rt6i_protocol = RTPROT_KERNEL,
|
2005-04-16 15:20:36 -07:00
|
|
|
.rt6i_metric = ~(u32) 0,
|
|
|
|
.rt6i_ref = ATOMIC_INIT(1),
|
|
|
|
};
|
|
|
|
|
2006-08-04 03:39:02 -07:00
|
|
|
#ifdef CONFIG_IPV6_MULTIPLE_TABLES
|
|
|
|
|
2006-10-18 21:20:57 -07:00
|
|
|
static int ip6_pkt_prohibit(struct sk_buff *skb);
|
|
|
|
static int ip6_pkt_prohibit_out(struct sk_buff *skb);
|
|
|
|
|
2008-04-21 02:29:32 -07:00
|
|
|
static struct rt6_info ip6_prohibit_entry_template = {
|
2010-06-10 23:31:35 -07:00
|
|
|
.dst = {
|
|
|
|
.__refcnt = ATOMIC_INIT(1),
|
|
|
|
.__use = 1,
|
|
|
|
.obsolete = -1,
|
|
|
|
.error = -EACCES,
|
|
|
|
.metrics = { [RTAX_HOPLIMIT - 1] = 255, },
|
|
|
|
.input = ip6_pkt_prohibit,
|
|
|
|
.output = ip6_pkt_prohibit_out,
|
2006-08-04 03:39:02 -07:00
|
|
|
},
|
|
|
|
.rt6i_flags = (RTF_REJECT | RTF_NONEXTHOP),
|
2009-05-20 17:38:59 -07:00
|
|
|
.rt6i_protocol = RTPROT_KERNEL,
|
2006-08-04 03:39:02 -07:00
|
|
|
.rt6i_metric = ~(u32) 0,
|
|
|
|
.rt6i_ref = ATOMIC_INIT(1),
|
|
|
|
};
|
|
|
|
|
2008-03-04 14:48:10 -07:00
|
|
|
static struct rt6_info ip6_blk_hole_entry_template = {
|
2010-06-10 23:31:35 -07:00
|
|
|
.dst = {
|
|
|
|
.__refcnt = ATOMIC_INIT(1),
|
|
|
|
.__use = 1,
|
|
|
|
.obsolete = -1,
|
|
|
|
.error = -EINVAL,
|
|
|
|
.metrics = { [RTAX_HOPLIMIT - 1] = 255, },
|
|
|
|
.input = dst_discard,
|
|
|
|
.output = dst_discard,
|
2006-08-04 03:39:02 -07:00
|
|
|
},
|
|
|
|
.rt6i_flags = (RTF_REJECT | RTF_NONEXTHOP),
|
2009-05-20 17:38:59 -07:00
|
|
|
.rt6i_protocol = RTPROT_KERNEL,
|
2006-08-04 03:39:02 -07:00
|
|
|
.rt6i_metric = ~(u32) 0,
|
|
|
|
.rt6i_ref = ATOMIC_INIT(1),
|
|
|
|
};
|
|
|
|
|
|
|
|
#endif
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/* allocate dst with ip6_dst_ops */
|
2008-03-04 14:49:23 -07:00
|
|
|
static inline struct rt6_info *ip6_dst_alloc(struct dst_ops *ops)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2008-03-04 14:49:23 -07:00
|
|
|
return (struct rt6_info *)dst_alloc(ops);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void ip6_dst_destroy(struct dst_entry *dst)
|
|
|
|
{
|
|
|
|
struct rt6_info *rt = (struct rt6_info *)dst;
|
|
|
|
struct inet6_dev *idev = rt->rt6i_idev;
|
|
|
|
|
|
|
|
if (idev != NULL) {
|
|
|
|
rt->rt6i_idev = NULL;
|
|
|
|
in6_dev_put(idev);
|
2007-02-09 07:24:49 -07:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void ip6_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
|
|
|
|
int how)
|
|
|
|
{
|
|
|
|
struct rt6_info *rt = (struct rt6_info *)dst;
|
|
|
|
struct inet6_dev *idev = rt->rt6i_idev;
|
2007-12-07 01:38:10 -07:00
|
|
|
struct net_device *loopback_dev =
|
2008-03-25 05:47:49 -07:00
|
|
|
dev_net(dev)->loopback_dev;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2007-12-07 01:38:10 -07:00
|
|
|
if (dev != loopback_dev && idev != NULL && idev->dev == dev) {
|
|
|
|
struct inet6_dev *loopback_idev =
|
|
|
|
in6_dev_get(loopback_dev);
|
2005-04-16 15:20:36 -07:00
|
|
|
if (loopback_idev != NULL) {
|
|
|
|
rt->rt6i_idev = loopback_idev;
|
|
|
|
in6_dev_put(idev);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static __inline__ int rt6_check_expired(const struct rt6_info *rt)
|
|
|
|
{
|
2010-09-22 13:43:57 -07:00
|
|
|
return (rt->rt6i_flags & RTF_EXPIRES) &&
|
|
|
|
time_after(jiffies, rt->rt6i_expires);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
static inline int rt6_need_strict(struct in6_addr *daddr)
|
|
|
|
{
|
2010-09-22 13:43:57 -07:00
|
|
|
return ipv6_addr_type(daddr) &
|
|
|
|
(IPV6_ADDR_MULTICAST | IPV6_ADDR_LINKLOCAL | IPV6_ADDR_LOOPBACK);
|
2006-08-04 23:20:06 -07:00
|
|
|
}
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
2006-08-04 23:20:06 -07:00
|
|
|
* Route lookup. Any table->tb6_lock is implied.
|
2005-04-16 15:20:36 -07:00
|
|
|
*/
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
static inline struct rt6_info *rt6_device_match(struct net *net,
|
|
|
|
struct rt6_info *rt,
|
2008-07-02 02:30:18 -07:00
|
|
|
struct in6_addr *saddr,
|
2005-04-16 15:20:36 -07:00
|
|
|
int oif,
|
2008-06-27 20:14:54 -07:00
|
|
|
int flags)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
struct rt6_info *local = NULL;
|
|
|
|
struct rt6_info *sprt;
|
|
|
|
|
2008-07-02 02:30:18 -07:00
|
|
|
if (!oif && ipv6_addr_any(saddr))
|
|
|
|
goto out;
|
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
for (sprt = rt; sprt; sprt = sprt->dst.rt6_next) {
|
2008-07-02 02:30:18 -07:00
|
|
|
struct net_device *dev = sprt->rt6i_dev;
|
|
|
|
|
|
|
|
if (oif) {
|
2005-04-16 15:20:36 -07:00
|
|
|
if (dev->ifindex == oif)
|
|
|
|
return sprt;
|
|
|
|
if (dev->flags & IFF_LOOPBACK) {
|
|
|
|
if (sprt->rt6i_idev == NULL ||
|
|
|
|
sprt->rt6i_idev->dev->ifindex != oif) {
|
2008-06-27 20:14:54 -07:00
|
|
|
if (flags & RT6_LOOKUP_F_IFACE && oif)
|
2005-04-16 15:20:36 -07:00
|
|
|
continue;
|
2007-02-09 07:24:49 -07:00
|
|
|
if (local && (!oif ||
|
2005-04-16 15:20:36 -07:00
|
|
|
local->rt6i_idev->dev->ifindex == oif))
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
local = sprt;
|
|
|
|
}
|
2008-07-02 02:30:18 -07:00
|
|
|
} else {
|
|
|
|
if (ipv6_chk_addr(net, saddr, dev,
|
|
|
|
flags & RT6_LOOKUP_F_IFACE))
|
|
|
|
return sprt;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2008-07-02 02:30:18 -07:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2008-07-02 02:30:18 -07:00
|
|
|
if (oif) {
|
2005-04-16 15:20:36 -07:00
|
|
|
if (local)
|
|
|
|
return local;
|
|
|
|
|
2008-06-27 20:14:54 -07:00
|
|
|
if (flags & RT6_LOOKUP_F_IFACE)
|
2008-03-04 14:48:30 -07:00
|
|
|
return net->ipv6.ip6_null_entry;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2008-07-02 02:30:18 -07:00
|
|
|
out:
|
2005-04-16 15:20:36 -07:00
|
|
|
return rt;
|
|
|
|
}
|
|
|
|
|
2006-03-20 18:05:13 -07:00
|
|
|
#ifdef CONFIG_IPV6_ROUTER_PREF
|
|
|
|
static void rt6_probe(struct rt6_info *rt)
|
|
|
|
{
|
|
|
|
struct neighbour *neigh = rt ? rt->rt6i_nexthop : NULL;
|
|
|
|
/*
|
|
|
|
* Okay, this does not seem to be appropriate
|
|
|
|
* for now, however, we need to check if it
|
|
|
|
* is really so; aka Router Reachability Probing.
|
|
|
|
*
|
|
|
|
* Router Reachability Probe MUST be rate-limited
|
|
|
|
* to no more than one per minute.
|
|
|
|
*/
|
|
|
|
if (!neigh || (neigh->nud_state & NUD_VALID))
|
|
|
|
return;
|
|
|
|
read_lock_bh(&neigh->lock);
|
|
|
|
if (!(neigh->nud_state & NUD_VALID) &&
|
2006-03-20 18:05:47 -07:00
|
|
|
time_after(jiffies, neigh->updated + rt->rt6i_idev->cnf.rtr_probe_interval)) {
|
2006-03-20 18:05:13 -07:00
|
|
|
struct in6_addr mcaddr;
|
|
|
|
struct in6_addr *target;
|
|
|
|
|
|
|
|
neigh->updated = jiffies;
|
|
|
|
read_unlock_bh(&neigh->lock);
|
|
|
|
|
|
|
|
target = (struct in6_addr *)&neigh->primary_key;
|
|
|
|
addrconf_addr_solict_mult(target, &mcaddr);
|
|
|
|
ndisc_send_ns(rt->rt6i_dev, NULL, target, &mcaddr, NULL);
|
|
|
|
} else
|
|
|
|
read_unlock_bh(&neigh->lock);
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
static inline void rt6_probe(struct rt6_info *rt)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
2006-03-20 18:00:26 -07:00
|
|
|
* Default Router Selection (RFC 2461 6.3.6)
|
2005-04-16 15:20:36 -07:00
|
|
|
*/
|
2007-03-22 12:27:49 -07:00
|
|
|
static inline int rt6_check_dev(struct rt6_info *rt, int oif)
|
2006-03-20 18:00:26 -07:00
|
|
|
{
|
|
|
|
struct net_device *dev = rt->rt6i_dev;
|
2007-04-06 11:42:27 -07:00
|
|
|
if (!oif || dev->ifindex == oif)
|
2006-03-20 18:00:26 -07:00
|
|
|
return 2;
|
2007-04-06 11:42:27 -07:00
|
|
|
if ((dev->flags & IFF_LOOPBACK) &&
|
|
|
|
rt->rt6i_idev && rt->rt6i_idev->dev->ifindex == oif)
|
|
|
|
return 1;
|
|
|
|
return 0;
|
2006-03-20 18:00:26 -07:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2007-03-22 12:27:49 -07:00
|
|
|
static inline int rt6_check_neigh(struct rt6_info *rt)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2006-03-20 18:00:26 -07:00
|
|
|
struct neighbour *neigh = rt->rt6i_nexthop;
|
2008-01-19 01:35:16 -07:00
|
|
|
int m;
|
2006-05-26 13:23:41 -07:00
|
|
|
if (rt->rt6i_flags & RTF_NONEXTHOP ||
|
|
|
|
!(rt->rt6i_flags & RTF_GATEWAY))
|
|
|
|
m = 1;
|
|
|
|
else if (neigh) {
|
2006-03-20 18:00:26 -07:00
|
|
|
read_lock_bh(&neigh->lock);
|
|
|
|
if (neigh->nud_state & NUD_VALID)
|
2006-05-26 13:23:41 -07:00
|
|
|
m = 2;
|
2008-01-19 01:35:16 -07:00
|
|
|
#ifdef CONFIG_IPV6_ROUTER_PREF
|
|
|
|
else if (neigh->nud_state & NUD_FAILED)
|
|
|
|
m = 0;
|
|
|
|
#endif
|
|
|
|
else
|
2006-11-06 10:45:44 -07:00
|
|
|
m = 1;
|
2006-03-20 18:00:26 -07:00
|
|
|
read_unlock_bh(&neigh->lock);
|
2008-01-19 01:35:16 -07:00
|
|
|
} else
|
|
|
|
m = 0;
|
2006-03-20 18:00:26 -07:00
|
|
|
return m;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2006-03-20 18:00:26 -07:00
|
|
|
static int rt6_score_route(struct rt6_info *rt, int oif,
|
|
|
|
int strict)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2006-05-26 13:23:41 -07:00
|
|
|
int m, n;
|
2007-02-09 07:24:49 -07:00
|
|
|
|
2006-05-26 13:23:41 -07:00
|
|
|
m = rt6_check_dev(rt, oif);
|
2006-08-23 17:25:05 -07:00
|
|
|
if (!m && (strict & RT6_LOOKUP_F_IFACE))
|
2006-03-20 18:00:26 -07:00
|
|
|
return -1;
|
2006-03-20 18:04:53 -07:00
|
|
|
#ifdef CONFIG_IPV6_ROUTER_PREF
|
|
|
|
m |= IPV6_DECODE_PREF(IPV6_EXTRACT_PREF(rt->rt6i_flags)) << 2;
|
|
|
|
#endif
|
2006-05-26 13:23:41 -07:00
|
|
|
n = rt6_check_neigh(rt);
|
2006-11-06 10:45:45 -07:00
|
|
|
if (!n && (strict & RT6_LOOKUP_F_REACHABLE))
|
2006-03-20 18:00:26 -07:00
|
|
|
return -1;
|
|
|
|
return m;
|
|
|
|
}
|
|
|
|
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
static struct rt6_info *find_match(struct rt6_info *rt, int oif, int strict,
|
|
|
|
int *mpri, struct rt6_info *match)
|
2006-03-20 18:00:26 -07:00
|
|
|
{
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
int m;
|
|
|
|
|
|
|
|
if (rt6_check_expired(rt))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
m = rt6_score_route(rt, oif, strict);
|
|
|
|
if (m < 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (m > *mpri) {
|
|
|
|
if (strict & RT6_LOOKUP_F_REACHABLE)
|
|
|
|
rt6_probe(match);
|
|
|
|
*mpri = m;
|
|
|
|
match = rt;
|
|
|
|
} else if (strict & RT6_LOOKUP_F_REACHABLE) {
|
|
|
|
rt6_probe(rt);
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
|
|
|
return match;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct rt6_info *find_rr_leaf(struct fib6_node *fn,
|
|
|
|
struct rt6_info *rr_head,
|
|
|
|
u32 metric, int oif, int strict)
|
|
|
|
{
|
|
|
|
struct rt6_info *rt, *match;
|
2006-03-20 18:00:26 -07:00
|
|
|
int mpri = -1;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
match = NULL;
|
|
|
|
for (rt = rr_head; rt && rt->rt6i_metric == metric;
|
2010-06-10 23:31:35 -07:00
|
|
|
rt = rt->dst.rt6_next)
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
match = find_match(rt, oif, strict, &mpri, match);
|
|
|
|
for (rt = fn->leaf; rt && rt != rr_head && rt->rt6i_metric == metric;
|
2010-06-10 23:31:35 -07:00
|
|
|
rt = rt->dst.rt6_next)
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
match = find_match(rt, oif, strict, &mpri, match);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
return match;
|
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
static struct rt6_info *rt6_select(struct fib6_node *fn, int oif, int strict)
|
|
|
|
{
|
|
|
|
struct rt6_info *match, *rt0;
|
2008-03-04 14:48:30 -07:00
|
|
|
struct net *net;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
RT6_TRACE("%s(fn->leaf=%p, oif=%d)\n",
|
2008-03-05 21:47:47 -07:00
|
|
|
__func__, fn->leaf, oif);
|
2006-03-20 18:00:26 -07:00
|
|
|
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
rt0 = fn->rr_ptr;
|
|
|
|
if (!rt0)
|
|
|
|
fn->rr_ptr = rt0 = fn->leaf;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
match = find_rr_leaf(fn, rt0, rt0->rt6i_metric, oif, strict);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-03-20 18:00:26 -07:00
|
|
|
if (!match &&
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
(strict & RT6_LOOKUP_F_REACHABLE)) {
|
2010-06-10 23:31:35 -07:00
|
|
|
struct rt6_info *next = rt0->dst.rt6_next;
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
|
2006-03-20 18:00:26 -07:00
|
|
|
/* no entries matched; do round-robin */
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
if (!next || next->rt6i_metric != rt0->rt6i_metric)
|
|
|
|
next = fn->leaf;
|
|
|
|
|
|
|
|
if (next != rt0)
|
|
|
|
fn->rr_ptr = next;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
[IPV6]: Fix routing round-robin locking.
As per RFC2461, section 6.3.6, item #2, when no routers on the
matching list are known to be reachable or probably reachable we
do round robin on those available routes so that we make sure
to probe as many of them as possible to detect when one becomes
reachable faster.
Each routing table has a rwlock protecting the tree and the linked
list of routes at each leaf. The round robin code executes during
lookup and thus with the rwlock taken as a reader. A small local
spinlock tries to provide protection but this does not work at all
for two reasons:
1) The round-robin list manipulation, as coded, goes like this (with
read lock held):
walk routes finding head and tail
spin_lock();
rotate list using head and tail
spin_unlock();
While one thread is rotating the list, another thread can
end up with stale values of head and tail and then proceed
to corrupt the list when it gets the lock. This ends up causing
the OOPS in fib6_add() later onthat many people have been hitting.
2) All the other code paths that run with the rwlock held as
a reader do not expect the list to change on them, they
expect it to remain completely fixed while they hold the
lock in that way.
So, simply stated, it is impossible to implement this correctly using
a manipulation of the list without violating the rwlock locking
semantics.
Reimplement using a per-fib6_node round-robin pointer. This way we
don't need to manipulate the list at all, and since the round-robin
pointer can only ever point to real existing entries we don't need
to perform any locking on the changing of the round-robin pointer
itself. We only need to reset the round-robin pointer to NULL when
the entry it is pointing to is removed.
The idea is from Thomas Graf and it is very similar to how this
was implemented before the advanced router selection code when in.
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-03-24 20:36:25 -07:00
|
|
|
RT6_TRACE("%s() => %p\n",
|
2008-03-05 21:47:47 -07:00
|
|
|
__func__, match);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2008-03-25 05:47:49 -07:00
|
|
|
net = dev_net(rt0->rt6i_dev);
|
2010-09-22 13:43:57 -07:00
|
|
|
return match ? match : net->ipv6.ip6_null_entry;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2006-03-20 18:06:24 -07:00
|
|
|
#ifdef CONFIG_IPV6_ROUTE_INFO
|
|
|
|
int rt6_route_rcv(struct net_device *dev, u8 *opt, int len,
|
|
|
|
struct in6_addr *gwaddr)
|
|
|
|
{
|
2008-03-25 05:47:49 -07:00
|
|
|
struct net *net = dev_net(dev);
|
2006-03-20 18:06:24 -07:00
|
|
|
struct route_info *rinfo = (struct route_info *) opt;
|
|
|
|
struct in6_addr prefix_buf, *prefix;
|
|
|
|
unsigned int pref;
|
2008-05-27 01:37:49 -07:00
|
|
|
unsigned long lifetime;
|
2006-03-20 18:06:24 -07:00
|
|
|
struct rt6_info *rt;
|
|
|
|
|
|
|
|
if (len < sizeof(struct route_info)) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Sanity check for prefix_len and length */
|
|
|
|
if (rinfo->length > 3) {
|
|
|
|
return -EINVAL;
|
|
|
|
} else if (rinfo->prefix_len > 128) {
|
|
|
|
return -EINVAL;
|
|
|
|
} else if (rinfo->prefix_len > 64) {
|
|
|
|
if (rinfo->length < 2) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
} else if (rinfo->prefix_len > 0) {
|
|
|
|
if (rinfo->length < 1) {
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
pref = rinfo->route_pref;
|
|
|
|
if (pref == ICMPV6_ROUTER_PREF_INVALID)
|
2009-09-09 23:25:11 -07:00
|
|
|
return -EINVAL;
|
2006-03-20 18:06:24 -07:00
|
|
|
|
2008-05-27 01:37:49 -07:00
|
|
|
lifetime = addrconf_timeout_fixup(ntohl(rinfo->lifetime), HZ);
|
2006-03-20 18:06:24 -07:00
|
|
|
|
|
|
|
if (rinfo->length == 3)
|
|
|
|
prefix = (struct in6_addr *)rinfo->prefix;
|
|
|
|
else {
|
|
|
|
/* this function is safe */
|
|
|
|
ipv6_addr_prefix(&prefix_buf,
|
|
|
|
(struct in6_addr *)rinfo->prefix,
|
|
|
|
rinfo->prefix_len);
|
|
|
|
prefix = &prefix_buf;
|
|
|
|
}
|
|
|
|
|
2008-03-04 14:46:48 -07:00
|
|
|
rt = rt6_get_route_info(net, prefix, rinfo->prefix_len, gwaddr,
|
|
|
|
dev->ifindex);
|
2006-03-20 18:06:24 -07:00
|
|
|
|
|
|
|
if (rt && !lifetime) {
|
2006-08-22 00:00:21 -07:00
|
|
|
ip6_del_rt(rt);
|
2006-03-20 18:06:24 -07:00
|
|
|
rt = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!rt && lifetime)
|
2008-03-04 14:46:48 -07:00
|
|
|
rt = rt6_add_route_info(net, prefix, rinfo->prefix_len, gwaddr, dev->ifindex,
|
2006-03-20 18:06:24 -07:00
|
|
|
pref);
|
|
|
|
else if (rt)
|
|
|
|
rt->rt6i_flags = RTF_ROUTEINFO |
|
|
|
|
(rt->rt6i_flags & ~RTF_PREF_MASK) | RTF_PREF(pref);
|
|
|
|
|
|
|
|
if (rt) {
|
2008-05-27 01:37:49 -07:00
|
|
|
if (!addrconf_finite_timeout(lifetime)) {
|
2006-03-20 18:06:24 -07:00
|
|
|
rt->rt6i_flags &= ~RTF_EXPIRES;
|
|
|
|
} else {
|
|
|
|
rt->rt6i_expires = jiffies + HZ * lifetime;
|
|
|
|
rt->rt6i_flags |= RTF_EXPIRES;
|
|
|
|
}
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_release(&rt->dst);
|
2006-03-20 18:06:24 -07:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
#define BACKTRACK(__net, saddr) \
|
2006-08-23 17:22:39 -07:00
|
|
|
do { \
|
2008-03-04 14:48:30 -07:00
|
|
|
if (rt == __net->ipv6.ip6_null_entry) { \
|
2006-08-23 17:22:39 -07:00
|
|
|
struct fib6_node *pn; \
|
2006-10-16 22:11:11 -07:00
|
|
|
while (1) { \
|
2006-08-23 17:22:39 -07:00
|
|
|
if (fn->fn_flags & RTN_TL_ROOT) \
|
|
|
|
goto out; \
|
|
|
|
pn = fn->parent; \
|
|
|
|
if (FIB6_SUBTREE(pn) && FIB6_SUBTREE(pn) != fn) \
|
2006-12-13 17:38:29 -07:00
|
|
|
fn = fib6_lookup(FIB6_SUBTREE(pn), NULL, saddr); \
|
2006-08-23 17:22:39 -07:00
|
|
|
else \
|
|
|
|
fn = pn; \
|
|
|
|
if (fn->fn_flags & RTN_RTINFO) \
|
|
|
|
goto restart; \
|
2006-08-04 23:20:06 -07:00
|
|
|
} \
|
|
|
|
} \
|
2006-08-23 17:22:39 -07:00
|
|
|
} while(0)
|
2006-08-04 23:20:06 -07:00
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
static struct rt6_info *ip6_pol_route_lookup(struct net *net,
|
|
|
|
struct fib6_table *table,
|
2006-08-04 23:20:06 -07:00
|
|
|
struct flowi *fl, int flags)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
struct fib6_node *fn;
|
|
|
|
struct rt6_info *rt;
|
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
read_lock_bh(&table->tb6_lock);
|
|
|
|
fn = fib6_lookup(&table->tb6_root, &fl->fl6_dst, &fl->fl6_src);
|
|
|
|
restart:
|
|
|
|
rt = fn->leaf;
|
2008-07-02 02:30:18 -07:00
|
|
|
rt = rt6_device_match(net, rt, &fl->fl6_src, fl->oif, flags);
|
2008-03-04 14:48:30 -07:00
|
|
|
BACKTRACK(net, &fl->fl6_src);
|
2006-08-04 23:20:06 -07:00
|
|
|
out:
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_use(&rt->dst, jiffies);
|
2006-08-04 23:20:06 -07:00
|
|
|
read_unlock_bh(&table->tb6_lock);
|
|
|
|
return rt;
|
|
|
|
|
|
|
|
}
|
|
|
|
|
[IPV6]: Make address arguments const.
- net/ipv6/addrconf.c:
ipv6_get_ifaddr(), ipv6_dev_get_saddr()
- net/ipv6/mcast.c:
ipv6_sock_mc_join(), ipv6_sock_mc_drop(),
inet6_mc_check(),
ipv6_dev_mc_inc(), __ipv6_dev_mc_dec(), ipv6_dev_mc_dec(),
ipv6_chk_mcast_addr()
- net/ipv6/route.c:
rt6_lookup(), icmp6_dst_alloc()
- net/ipv6/ip6_output.c:
ip6_nd_hdr()
- net/ipv6/ndisc.c:
ndisc_send_ns(), ndisc_send_rs(), ndisc_send_redirect(),
ndisc_get_neigh(), __ndisc_send()
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2008-04-09 23:42:10 -07:00
|
|
|
struct rt6_info *rt6_lookup(struct net *net, const struct in6_addr *daddr,
|
|
|
|
const struct in6_addr *saddr, int oif, int strict)
|
2006-08-04 23:20:06 -07:00
|
|
|
{
|
|
|
|
struct flowi fl = {
|
|
|
|
.oif = oif,
|
|
|
|
.nl_u = {
|
|
|
|
.ip6_u = {
|
|
|
|
.daddr = *daddr,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
};
|
|
|
|
struct dst_entry *dst;
|
2006-08-23 17:25:05 -07:00
|
|
|
int flags = strict ? RT6_LOOKUP_F_IFACE : 0;
|
2006-08-04 23:20:06 -07:00
|
|
|
|
2006-10-13 15:01:03 -07:00
|
|
|
if (saddr) {
|
|
|
|
memcpy(&fl.fl6_src, saddr, sizeof(*saddr));
|
|
|
|
flags |= RT6_LOOKUP_F_HAS_SADDR;
|
|
|
|
}
|
|
|
|
|
2008-03-04 14:45:59 -07:00
|
|
|
dst = fib6_rule_lookup(net, &fl, flags, ip6_pol_route_lookup);
|
2006-08-04 23:20:06 -07:00
|
|
|
if (dst->error == 0)
|
|
|
|
return (struct rt6_info *) dst;
|
|
|
|
|
|
|
|
dst_release(dst);
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2007-02-22 06:05:40 -07:00
|
|
|
EXPORT_SYMBOL(rt6_lookup);
|
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
/* ip6_ins_rt is called with FREE table->tb6_lock.
|
2005-04-16 15:20:36 -07:00
|
|
|
It takes new route entry, the addition fails by any reason the
|
|
|
|
route is freed. In any case, if caller does not hold it, it may
|
|
|
|
be destroyed.
|
|
|
|
*/
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
static int __ip6_ins_rt(struct rt6_info *rt, struct nl_info *info)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
int err;
|
2006-08-04 23:20:06 -07:00
|
|
|
struct fib6_table *table;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
table = rt->rt6i_table;
|
|
|
|
write_lock_bh(&table->tb6_lock);
|
2006-08-22 00:01:08 -07:00
|
|
|
err = fib6_add(&table->tb6_root, rt, info);
|
2006-08-04 23:20:06 -07:00
|
|
|
write_unlock_bh(&table->tb6_lock);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2006-08-22 00:00:45 -07:00
|
|
|
int ip6_ins_rt(struct rt6_info *rt)
|
|
|
|
{
|
2008-01-10 04:26:13 -07:00
|
|
|
struct nl_info info = {
|
2008-03-25 05:47:49 -07:00
|
|
|
.nl_net = dev_net(rt->rt6i_dev),
|
2008-01-10 04:26:13 -07:00
|
|
|
};
|
2007-12-13 10:45:12 -07:00
|
|
|
return __ip6_ins_rt(rt, &info);
|
2006-08-22 00:00:45 -07:00
|
|
|
}
|
|
|
|
|
2006-03-20 17:55:51 -07:00
|
|
|
static struct rt6_info *rt6_alloc_cow(struct rt6_info *ort, struct in6_addr *daddr,
|
|
|
|
struct in6_addr *saddr)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
struct rt6_info *rt;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Clone the route.
|
|
|
|
*/
|
|
|
|
|
|
|
|
rt = ip6_rt_copy(ort);
|
|
|
|
|
|
|
|
if (rt) {
|
2009-01-04 17:04:39 -07:00
|
|
|
struct neighbour *neigh;
|
|
|
|
int attempts = !in_softirq();
|
|
|
|
|
2005-12-21 06:56:42 -07:00
|
|
|
if (!(rt->rt6i_flags&RTF_GATEWAY)) {
|
|
|
|
if (rt->rt6i_dst.plen != 128 &&
|
|
|
|
ipv6_addr_equal(&rt->rt6i_dst.addr, daddr))
|
|
|
|
rt->rt6i_flags |= RTF_ANYCAST;
|
2005-04-16 15:20:36 -07:00
|
|
|
ipv6_addr_copy(&rt->rt6i_gateway, daddr);
|
2005-12-21 06:56:42 -07:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2005-12-21 06:56:42 -07:00
|
|
|
ipv6_addr_copy(&rt->rt6i_dst.addr, daddr);
|
2005-04-16 15:20:36 -07:00
|
|
|
rt->rt6i_dst.plen = 128;
|
|
|
|
rt->rt6i_flags |= RTF_CACHE;
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.flags |= DST_HOST;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
#ifdef CONFIG_IPV6_SUBTREES
|
|
|
|
if (rt->rt6i_src.plen && saddr) {
|
|
|
|
ipv6_addr_copy(&rt->rt6i_src.addr, saddr);
|
|
|
|
rt->rt6i_src.plen = 128;
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2009-01-04 17:04:39 -07:00
|
|
|
retry:
|
|
|
|
neigh = ndisc_get_neigh(rt->rt6i_dev, &rt->rt6i_gateway);
|
|
|
|
if (IS_ERR(neigh)) {
|
|
|
|
struct net *net = dev_net(rt->rt6i_dev);
|
|
|
|
int saved_rt_min_interval =
|
|
|
|
net->ipv6.sysctl.ip6_rt_gc_min_interval;
|
|
|
|
int saved_rt_elasticity =
|
|
|
|
net->ipv6.sysctl.ip6_rt_gc_elasticity;
|
|
|
|
|
|
|
|
if (attempts-- > 0) {
|
|
|
|
net->ipv6.sysctl.ip6_rt_gc_elasticity = 1;
|
|
|
|
net->ipv6.sysctl.ip6_rt_gc_min_interval = 0;
|
|
|
|
|
2009-08-28 18:34:49 -07:00
|
|
|
ip6_dst_gc(&net->ipv6.ip6_dst_ops);
|
2009-01-04 17:04:39 -07:00
|
|
|
|
|
|
|
net->ipv6.sysctl.ip6_rt_gc_elasticity =
|
|
|
|
saved_rt_elasticity;
|
|
|
|
net->ipv6.sysctl.ip6_rt_gc_min_interval =
|
|
|
|
saved_rt_min_interval;
|
|
|
|
goto retry;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (net_ratelimit())
|
|
|
|
printk(KERN_WARNING
|
2010-09-27 15:02:18 -07:00
|
|
|
"ipv6: Neighbour table overflow.\n");
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_free(&rt->dst);
|
2009-01-04 17:04:39 -07:00
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
rt->rt6i_nexthop = neigh;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-03-20 17:55:51 -07:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-03-20 17:55:51 -07:00
|
|
|
return rt;
|
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-03-20 17:58:32 -07:00
|
|
|
static struct rt6_info *rt6_alloc_clone(struct rt6_info *ort, struct in6_addr *daddr)
|
|
|
|
{
|
|
|
|
struct rt6_info *rt = ip6_rt_copy(ort);
|
|
|
|
if (rt) {
|
|
|
|
ipv6_addr_copy(&rt->rt6i_dst.addr, daddr);
|
|
|
|
rt->rt6i_dst.plen = 128;
|
|
|
|
rt->rt6i_flags |= RTF_CACHE;
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.flags |= DST_HOST;
|
2006-03-20 17:58:32 -07:00
|
|
|
rt->rt6i_nexthop = neigh_clone(ort->rt6i_nexthop);
|
|
|
|
}
|
|
|
|
return rt;
|
|
|
|
}
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
static struct rt6_info *ip6_pol_route(struct net *net, struct fib6_table *table, int oif,
|
|
|
|
struct flowi *fl, int flags)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
struct fib6_node *fn;
|
2006-03-20 18:00:05 -07:00
|
|
|
struct rt6_info *rt, *nrt;
|
2006-08-04 23:20:06 -07:00
|
|
|
int strict = 0;
|
2005-04-16 15:20:36 -07:00
|
|
|
int attempts = 3;
|
2006-03-20 18:00:05 -07:00
|
|
|
int err;
|
2008-07-19 22:35:03 -07:00
|
|
|
int reachable = net->ipv6.devconf_all->forwarding ? 0 : RT6_LOOKUP_F_REACHABLE;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-23 17:25:05 -07:00
|
|
|
strict |= flags & RT6_LOOKUP_F_IFACE;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
relookup:
|
2006-08-04 23:20:06 -07:00
|
|
|
read_lock_bh(&table->tb6_lock);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-03-20 18:04:35 -07:00
|
|
|
restart_2:
|
2006-08-04 23:20:06 -07:00
|
|
|
fn = fib6_lookup(&table->tb6_root, &fl->fl6_dst, &fl->fl6_src);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
restart:
|
2007-10-15 13:02:51 -07:00
|
|
|
rt = rt6_select(fn, oif, strict | reachable);
|
2008-03-04 14:48:30 -07:00
|
|
|
|
|
|
|
BACKTRACK(net, &fl->fl6_src);
|
|
|
|
if (rt == net->ipv6.ip6_null_entry ||
|
2006-03-20 18:04:35 -07:00
|
|
|
rt->rt6i_flags & RTF_CACHE)
|
2006-03-20 18:01:24 -07:00
|
|
|
goto out;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_hold(&rt->dst);
|
2006-08-04 23:20:06 -07:00
|
|
|
read_unlock_bh(&table->tb6_lock);
|
2006-03-20 17:59:08 -07:00
|
|
|
|
2006-03-20 18:00:05 -07:00
|
|
|
if (!rt->rt6i_nexthop && !(rt->rt6i_flags & RTF_NONEXTHOP))
|
2006-08-04 23:20:06 -07:00
|
|
|
nrt = rt6_alloc_cow(rt, &fl->fl6_dst, &fl->fl6_src);
|
2006-03-20 18:00:05 -07:00
|
|
|
else {
|
|
|
|
#if CLONE_OFFLINK_ROUTE
|
2006-08-04 23:20:06 -07:00
|
|
|
nrt = rt6_alloc_clone(rt, &fl->fl6_dst);
|
2006-03-20 18:00:05 -07:00
|
|
|
#else
|
|
|
|
goto out2;
|
|
|
|
#endif
|
|
|
|
}
|
2006-03-20 17:59:27 -07:00
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_release(&rt->dst);
|
2008-03-04 14:48:30 -07:00
|
|
|
rt = nrt ? : net->ipv6.ip6_null_entry;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_hold(&rt->dst);
|
2006-03-20 18:00:05 -07:00
|
|
|
if (nrt) {
|
2006-08-22 00:00:45 -07:00
|
|
|
err = ip6_ins_rt(nrt);
|
2006-03-20 18:00:05 -07:00
|
|
|
if (!err)
|
2005-04-16 15:20:36 -07:00
|
|
|
goto out2;
|
|
|
|
}
|
|
|
|
|
2006-03-20 18:00:05 -07:00
|
|
|
if (--attempts <= 0)
|
|
|
|
goto out2;
|
|
|
|
|
|
|
|
/*
|
2006-08-04 23:20:06 -07:00
|
|
|
* Race condition! In the gap, when table->tb6_lock was
|
2006-03-20 18:00:05 -07:00
|
|
|
* released someone could insert this route. Relookup.
|
|
|
|
*/
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_release(&rt->dst);
|
2006-03-20 18:00:05 -07:00
|
|
|
goto relookup;
|
|
|
|
|
|
|
|
out:
|
2006-03-20 18:04:35 -07:00
|
|
|
if (reachable) {
|
|
|
|
reachable = 0;
|
|
|
|
goto restart_2;
|
|
|
|
}
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_hold(&rt->dst);
|
2006-08-04 23:20:06 -07:00
|
|
|
read_unlock_bh(&table->tb6_lock);
|
2005-04-16 15:20:36 -07:00
|
|
|
out2:
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.lastuse = jiffies;
|
|
|
|
rt->dst.__use++;
|
2006-08-04 23:20:06 -07:00
|
|
|
|
|
|
|
return rt;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
static struct rt6_info *ip6_pol_route_input(struct net *net, struct fib6_table *table,
|
2007-10-15 13:02:51 -07:00
|
|
|
struct flowi *fl, int flags)
|
|
|
|
{
|
2008-03-04 14:48:30 -07:00
|
|
|
return ip6_pol_route(net, table, fl->iif, fl, flags);
|
2007-10-15 13:02:51 -07:00
|
|
|
}
|
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
void ip6_route_input(struct sk_buff *skb)
|
|
|
|
{
|
2007-04-25 17:54:47 -07:00
|
|
|
struct ipv6hdr *iph = ipv6_hdr(skb);
|
2008-03-25 05:47:49 -07:00
|
|
|
struct net *net = dev_net(skb->dev);
|
2006-10-13 15:01:03 -07:00
|
|
|
int flags = RT6_LOOKUP_F_HAS_SADDR;
|
2006-08-04 23:20:06 -07:00
|
|
|
struct flowi fl = {
|
|
|
|
.iif = skb->dev->ifindex,
|
|
|
|
.nl_u = {
|
|
|
|
.ip6_u = {
|
|
|
|
.daddr = iph->daddr,
|
|
|
|
.saddr = iph->saddr,
|
2006-11-08 01:25:17 -07:00
|
|
|
.flowlabel = (* (__be32 *) iph)&IPV6_FLOWINFO_MASK,
|
2006-08-04 23:20:06 -07:00
|
|
|
},
|
|
|
|
},
|
2007-02-09 07:24:49 -07:00
|
|
|
.mark = skb->mark,
|
2006-08-04 23:20:06 -07:00
|
|
|
.proto = iph->nexthdr,
|
|
|
|
};
|
2006-10-13 15:01:03 -07:00
|
|
|
|
2009-01-27 23:39:59 -07:00
|
|
|
if (rt6_need_strict(&iph->daddr) && skb->dev->type != ARPHRD_PIMREG)
|
2006-10-13 15:01:03 -07:00
|
|
|
flags |= RT6_LOOKUP_F_IFACE;
|
2006-08-04 23:20:06 -07:00
|
|
|
|
2009-06-01 22:19:30 -07:00
|
|
|
skb_dst_set(skb, fib6_rule_lookup(net, &fl, flags, ip6_pol_route_input));
|
2006-08-04 23:20:06 -07:00
|
|
|
}
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
static struct rt6_info *ip6_pol_route_output(struct net *net, struct fib6_table *table,
|
2006-08-04 23:20:06 -07:00
|
|
|
struct flowi *fl, int flags)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2008-03-04 14:48:30 -07:00
|
|
|
return ip6_pol_route(net, table, fl->oif, fl, flags);
|
2006-08-04 23:20:06 -07:00
|
|
|
}
|
|
|
|
|
2008-03-05 11:48:10 -07:00
|
|
|
struct dst_entry * ip6_route_output(struct net *net, struct sock *sk,
|
|
|
|
struct flowi *fl)
|
2006-08-04 23:20:06 -07:00
|
|
|
{
|
|
|
|
int flags = 0;
|
|
|
|
|
2010-05-28 23:02:35 -07:00
|
|
|
if ((sk && sk->sk_bound_dev_if) || rt6_need_strict(&fl->fl6_dst))
|
2006-08-23 17:25:05 -07:00
|
|
|
flags |= RT6_LOOKUP_F_IFACE;
|
2006-08-04 23:20:06 -07:00
|
|
|
|
2006-10-13 15:01:03 -07:00
|
|
|
if (!ipv6_addr_any(&fl->fl6_src))
|
|
|
|
flags |= RT6_LOOKUP_F_HAS_SADDR;
|
2010-03-06 17:14:44 -07:00
|
|
|
else if (sk)
|
|
|
|
flags |= rt6_srcprefs2flags(inet6_sk(sk)->srcprefs);
|
2006-10-13 15:01:03 -07:00
|
|
|
|
2008-03-05 11:48:10 -07:00
|
|
|
return fib6_rule_lookup(net, fl, flags, ip6_pol_route_output);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2007-02-22 06:05:40 -07:00
|
|
|
EXPORT_SYMBOL(ip6_route_output);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2007-05-24 18:17:54 -07:00
|
|
|
int ip6_dst_blackhole(struct sock *sk, struct dst_entry **dstp, struct flowi *fl)
|
|
|
|
{
|
|
|
|
struct rt6_info *ort = (struct rt6_info *) *dstp;
|
|
|
|
struct rt6_info *rt = (struct rt6_info *)
|
|
|
|
dst_alloc(&ip6_dst_blackhole_ops);
|
|
|
|
struct dst_entry *new = NULL;
|
|
|
|
|
|
|
|
if (rt) {
|
2010-06-10 23:31:35 -07:00
|
|
|
new = &rt->dst;
|
2007-05-24 18:17:54 -07:00
|
|
|
|
|
|
|
atomic_set(&new->__refcnt, 1);
|
|
|
|
new->__use = 1;
|
2007-11-13 22:34:06 -07:00
|
|
|
new->input = dst_discard;
|
|
|
|
new->output = dst_discard;
|
2007-05-24 18:17:54 -07:00
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
memcpy(new->metrics, ort->dst.metrics, RTAX_MAX*sizeof(u32));
|
|
|
|
new->dev = ort->dst.dev;
|
2007-05-24 18:17:54 -07:00
|
|
|
if (new->dev)
|
|
|
|
dev_hold(new->dev);
|
|
|
|
rt->rt6i_idev = ort->rt6i_idev;
|
|
|
|
if (rt->rt6i_idev)
|
|
|
|
in6_dev_hold(rt->rt6i_idev);
|
|
|
|
rt->rt6i_expires = 0;
|
|
|
|
|
|
|
|
ipv6_addr_copy(&rt->rt6i_gateway, &ort->rt6i_gateway);
|
|
|
|
rt->rt6i_flags = ort->rt6i_flags & ~RTF_EXPIRES;
|
|
|
|
rt->rt6i_metric = 0;
|
|
|
|
|
|
|
|
memcpy(&rt->rt6i_dst, &ort->rt6i_dst, sizeof(struct rt6key));
|
|
|
|
#ifdef CONFIG_IPV6_SUBTREES
|
|
|
|
memcpy(&rt->rt6i_src, &ort->rt6i_src, sizeof(struct rt6key));
|
|
|
|
#endif
|
|
|
|
|
|
|
|
dst_free(new);
|
|
|
|
}
|
|
|
|
|
|
|
|
dst_release(*dstp);
|
|
|
|
*dstp = new;
|
2010-09-22 13:43:57 -07:00
|
|
|
return new ? 0 : -ENOMEM;
|
2007-05-24 18:17:54 -07:00
|
|
|
}
|
|
|
|
EXPORT_SYMBOL_GPL(ip6_dst_blackhole);
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
* Destination cache support functions
|
|
|
|
*/
|
|
|
|
|
|
|
|
static struct dst_entry *ip6_dst_check(struct dst_entry *dst, u32 cookie)
|
|
|
|
{
|
|
|
|
struct rt6_info *rt;
|
|
|
|
|
|
|
|
rt = (struct rt6_info *) dst;
|
|
|
|
|
2010-03-18 16:00:22 -07:00
|
|
|
if (rt->rt6i_node && (rt->rt6i_node->fn_sernum == cookie))
|
2005-04-16 15:20:36 -07:00
|
|
|
return dst;
|
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static struct dst_entry *ip6_negative_advice(struct dst_entry *dst)
|
|
|
|
{
|
|
|
|
struct rt6_info *rt = (struct rt6_info *) dst;
|
|
|
|
|
|
|
|
if (rt) {
|
2010-03-28 00:15:45 -07:00
|
|
|
if (rt->rt6i_flags & RTF_CACHE) {
|
|
|
|
if (rt6_check_expired(rt)) {
|
|
|
|
ip6_del_rt(rt);
|
|
|
|
dst = NULL;
|
|
|
|
}
|
|
|
|
} else {
|
2005-04-16 15:20:36 -07:00
|
|
|
dst_release(dst);
|
2010-03-28 00:15:45 -07:00
|
|
|
dst = NULL;
|
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2010-03-28 00:15:45 -07:00
|
|
|
return dst;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static void ip6_link_failure(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct rt6_info *rt;
|
|
|
|
|
2010-02-18 01:25:24 -07:00
|
|
|
icmpv6_send(skb, ICMPV6_DEST_UNREACH, ICMPV6_ADDR_UNREACH, 0);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2009-06-01 22:19:30 -07:00
|
|
|
rt = (struct rt6_info *) skb_dst(skb);
|
2005-04-16 15:20:36 -07:00
|
|
|
if (rt) {
|
|
|
|
if (rt->rt6i_flags&RTF_CACHE) {
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_set_expires(&rt->dst, 0);
|
2005-04-16 15:20:36 -07:00
|
|
|
rt->rt6i_flags |= RTF_EXPIRES;
|
|
|
|
} else if (rt->rt6i_node && (rt->rt6i_flags & RTF_DEFAULT))
|
|
|
|
rt->rt6i_node->fn_sernum = -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void ip6_rt_update_pmtu(struct dst_entry *dst, u32 mtu)
|
|
|
|
{
|
|
|
|
struct rt6_info *rt6 = (struct rt6_info*)dst;
|
|
|
|
|
|
|
|
if (mtu < dst_mtu(dst) && rt6->rt6i_dst.plen == 128) {
|
|
|
|
rt6->rt6i_flags |= RTF_MODIFIED;
|
|
|
|
if (mtu < IPV6_MIN_MTU) {
|
|
|
|
mtu = IPV6_MIN_MTU;
|
|
|
|
dst->metrics[RTAX_FEATURES-1] |= RTAX_FEATURE_ALLFRAG;
|
|
|
|
}
|
|
|
|
dst->metrics[RTAX_MTU-1] = mtu;
|
2006-07-30 20:43:36 -07:00
|
|
|
call_netevent_notifiers(NETEVENT_PMTU_UPDATE, dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ipv6_get_mtu(struct net_device *dev);
|
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
static inline unsigned int ipv6_advmss(struct net *net, unsigned int mtu)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
mtu -= sizeof(struct ipv6hdr) + sizeof(struct tcphdr);
|
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
if (mtu < net->ipv6.sysctl.ip6_rt_min_advmss)
|
|
|
|
mtu = net->ipv6.sysctl.ip6_rt_min_advmss;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
/*
|
2007-02-09 07:24:49 -07:00
|
|
|
* Maximal non-jumbo IPv6 payload is IPV6_MAXPLEN and
|
|
|
|
* corresponding MSS is IPV6_MAXPLEN - tcp_header_size.
|
|
|
|
* IPV6_MAXPLEN is also valid and means: "any MSS,
|
2005-04-16 15:20:36 -07:00
|
|
|
* rely only on pmtu discovery"
|
|
|
|
*/
|
|
|
|
if (mtu > IPV6_MAXPLEN - sizeof(struct tcphdr))
|
|
|
|
mtu = IPV6_MAXPLEN;
|
|
|
|
return mtu;
|
|
|
|
}
|
|
|
|
|
2007-12-06 17:11:48 -07:00
|
|
|
static struct dst_entry *icmp6_dst_gc_list;
|
|
|
|
static DEFINE_SPINLOCK(icmp6_dst_lock);
|
2006-08-04 03:37:36 -07:00
|
|
|
|
2007-12-06 17:11:48 -07:00
|
|
|
struct dst_entry *icmp6_dst_alloc(struct net_device *dev,
|
2005-04-16 15:20:36 -07:00
|
|
|
struct neighbour *neigh,
|
[IPV6]: Make address arguments const.
- net/ipv6/addrconf.c:
ipv6_get_ifaddr(), ipv6_dev_get_saddr()
- net/ipv6/mcast.c:
ipv6_sock_mc_join(), ipv6_sock_mc_drop(),
inet6_mc_check(),
ipv6_dev_mc_inc(), __ipv6_dev_mc_dec(), ipv6_dev_mc_dec(),
ipv6_chk_mcast_addr()
- net/ipv6/route.c:
rt6_lookup(), icmp6_dst_alloc()
- net/ipv6/ip6_output.c:
ip6_nd_hdr()
- net/ipv6/ndisc.c:
ndisc_send_ns(), ndisc_send_rs(), ndisc_send_redirect(),
ndisc_get_neigh(), __ndisc_send()
Signed-off-by: YOSHIFUJI Hideaki <yoshfuji@linux-ipv6.org>
2008-04-09 23:42:10 -07:00
|
|
|
const struct in6_addr *addr)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
struct rt6_info *rt;
|
|
|
|
struct inet6_dev *idev = in6_dev_get(dev);
|
2008-03-25 05:47:49 -07:00
|
|
|
struct net *net = dev_net(dev);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
if (unlikely(idev == NULL))
|
|
|
|
return NULL;
|
|
|
|
|
2009-08-28 18:34:49 -07:00
|
|
|
rt = ip6_dst_alloc(&net->ipv6.ip6_dst_ops);
|
2005-04-16 15:20:36 -07:00
|
|
|
if (unlikely(rt == NULL)) {
|
|
|
|
in6_dev_put(idev);
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
dev_hold(dev);
|
|
|
|
if (neigh)
|
|
|
|
neigh_hold(neigh);
|
2009-01-04 17:04:39 -07:00
|
|
|
else {
|
2005-04-16 15:20:36 -07:00
|
|
|
neigh = ndisc_get_neigh(dev, addr);
|
2009-01-04 17:04:39 -07:00
|
|
|
if (IS_ERR(neigh))
|
|
|
|
neigh = NULL;
|
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
rt->rt6i_dev = dev;
|
|
|
|
rt->rt6i_idev = idev;
|
|
|
|
rt->rt6i_nexthop = neigh;
|
2010-06-10 23:31:35 -07:00
|
|
|
atomic_set(&rt->dst.__refcnt, 1);
|
|
|
|
rt->dst.metrics[RTAX_HOPLIMIT-1] = 255;
|
|
|
|
rt->dst.metrics[RTAX_MTU-1] = ipv6_get_mtu(rt->rt6i_dev);
|
|
|
|
rt->dst.metrics[RTAX_ADVMSS-1] = ipv6_advmss(net, dst_mtu(&rt->dst));
|
|
|
|
rt->dst.output = ip6_output;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
#if 0 /* there's no chance to use these for ndisc */
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.flags = ipv6_addr_type(addr) & IPV6_ADDR_UNICAST
|
2007-02-09 07:24:49 -07:00
|
|
|
? DST_HOST
|
2005-04-16 15:20:36 -07:00
|
|
|
: 0;
|
|
|
|
ipv6_addr_copy(&rt->rt6i_dst.addr, addr);
|
|
|
|
rt->rt6i_dst.plen = 128;
|
|
|
|
#endif
|
|
|
|
|
2007-12-06 17:11:48 -07:00
|
|
|
spin_lock_bh(&icmp6_dst_lock);
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.next = icmp6_dst_gc_list;
|
|
|
|
icmp6_dst_gc_list = &rt->dst;
|
2007-12-06 17:11:48 -07:00
|
|
|
spin_unlock_bh(&icmp6_dst_lock);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
fib6_force_start_gc(net);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
out:
|
2010-06-10 23:31:35 -07:00
|
|
|
return &rt->dst;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2008-07-22 14:35:50 -07:00
|
|
|
int icmp6_dst_gc(void)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
struct dst_entry *dst, *next, **pprev;
|
2008-07-22 14:35:50 -07:00
|
|
|
int more = 0;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
next = NULL;
|
2006-08-04 03:37:36 -07:00
|
|
|
|
2007-12-06 17:11:48 -07:00
|
|
|
spin_lock_bh(&icmp6_dst_lock);
|
|
|
|
pprev = &icmp6_dst_gc_list;
|
2006-08-04 03:37:36 -07:00
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
while ((dst = *pprev) != NULL) {
|
|
|
|
if (!atomic_read(&dst->__refcnt)) {
|
|
|
|
*pprev = dst->next;
|
|
|
|
dst_free(dst);
|
|
|
|
} else {
|
|
|
|
pprev = &dst->next;
|
2008-07-22 14:35:50 -07:00
|
|
|
++more;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2007-12-06 17:11:48 -07:00
|
|
|
spin_unlock_bh(&icmp6_dst_lock);
|
2006-08-04 03:37:36 -07:00
|
|
|
|
2008-07-22 14:35:50 -07:00
|
|
|
return more;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2008-09-10 17:27:15 -07:00
|
|
|
static void icmp6_clean_all(int (*func)(struct rt6_info *rt, void *arg),
|
|
|
|
void *arg)
|
|
|
|
{
|
|
|
|
struct dst_entry *dst, **pprev;
|
|
|
|
|
|
|
|
spin_lock_bh(&icmp6_dst_lock);
|
|
|
|
pprev = &icmp6_dst_gc_list;
|
|
|
|
while ((dst = *pprev) != NULL) {
|
|
|
|
struct rt6_info *rt = (struct rt6_info *) dst;
|
|
|
|
if (func(rt, arg)) {
|
|
|
|
*pprev = dst->next;
|
|
|
|
dst_free(dst);
|
|
|
|
} else {
|
|
|
|
pprev = &dst->next;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
spin_unlock_bh(&icmp6_dst_lock);
|
|
|
|
}
|
|
|
|
|
2008-01-18 04:56:57 -07:00
|
|
|
static int ip6_dst_gc(struct dst_ops *ops)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
unsigned long now = jiffies;
|
2009-08-28 18:34:49 -07:00
|
|
|
struct net *net = container_of(ops, struct net, ipv6.ip6_dst_ops);
|
2008-03-04 14:50:14 -07:00
|
|
|
int rt_min_interval = net->ipv6.sysctl.ip6_rt_gc_min_interval;
|
|
|
|
int rt_max_size = net->ipv6.sysctl.ip6_rt_max_size;
|
|
|
|
int rt_elasticity = net->ipv6.sysctl.ip6_rt_gc_elasticity;
|
|
|
|
int rt_gc_timeout = net->ipv6.sysctl.ip6_rt_gc_timeout;
|
|
|
|
unsigned long rt_last_gc = net->ipv6.ip6_rt_last_gc;
|
2010-10-07 23:37:34 -07:00
|
|
|
int entries;
|
2008-03-04 14:50:14 -07:00
|
|
|
|
2010-10-07 23:37:34 -07:00
|
|
|
entries = dst_entries_get_fast(ops);
|
2008-03-04 14:50:14 -07:00
|
|
|
if (time_after(rt_last_gc + rt_min_interval, now) &&
|
2010-10-07 23:37:34 -07:00
|
|
|
entries <= rt_max_size)
|
2005-04-16 15:20:36 -07:00
|
|
|
goto out;
|
|
|
|
|
2008-03-04 14:49:47 -07:00
|
|
|
net->ipv6.ip6_rt_gc_expire++;
|
|
|
|
fib6_run_gc(net->ipv6.ip6_rt_gc_expire, net);
|
|
|
|
net->ipv6.ip6_rt_last_gc = now;
|
2010-10-07 23:37:34 -07:00
|
|
|
entries = dst_entries_get_slow(ops);
|
|
|
|
if (entries < ops->gc_thresh)
|
2008-03-04 14:50:14 -07:00
|
|
|
net->ipv6.ip6_rt_gc_expire = rt_gc_timeout>>1;
|
2005-04-16 15:20:36 -07:00
|
|
|
out:
|
2008-03-04 14:50:14 -07:00
|
|
|
net->ipv6.ip6_rt_gc_expire -= net->ipv6.ip6_rt_gc_expire>>rt_elasticity;
|
2010-10-07 23:37:34 -07:00
|
|
|
return entries > rt_max_size;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/* Clean host part of a prefix. Not necessary in radix tree,
|
|
|
|
but results in cleaner routing tables.
|
|
|
|
|
|
|
|
Remove it only when all the things will work!
|
|
|
|
*/
|
|
|
|
|
|
|
|
static int ipv6_get_mtu(struct net_device *dev)
|
|
|
|
{
|
|
|
|
int mtu = IPV6_MIN_MTU;
|
|
|
|
struct inet6_dev *idev;
|
|
|
|
|
2010-06-13 21:46:20 -07:00
|
|
|
rcu_read_lock();
|
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (idev)
|
2005-04-16 15:20:36 -07:00
|
|
|
mtu = idev->cnf.mtu6;
|
2010-06-13 21:46:20 -07:00
|
|
|
rcu_read_unlock();
|
2005-04-16 15:20:36 -07:00
|
|
|
return mtu;
|
|
|
|
}
|
|
|
|
|
2008-03-10 03:00:30 -07:00
|
|
|
int ip6_dst_hoplimit(struct dst_entry *dst)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2008-03-10 03:00:30 -07:00
|
|
|
int hoplimit = dst_metric(dst, RTAX_HOPLIMIT);
|
|
|
|
if (hoplimit < 0) {
|
|
|
|
struct net_device *dev = dst->dev;
|
2010-06-13 21:46:20 -07:00
|
|
|
struct inet6_dev *idev;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
idev = __in6_dev_get(dev);
|
|
|
|
if (idev)
|
2008-03-10 03:00:30 -07:00
|
|
|
hoplimit = idev->cnf.hop_limit;
|
2010-06-13 21:46:20 -07:00
|
|
|
else
|
2008-07-19 22:35:03 -07:00
|
|
|
hoplimit = dev_net(dev)->ipv6.devconf_all->hop_limit;
|
2010-06-13 21:46:20 -07:00
|
|
|
rcu_read_unlock();
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
return hoplimit;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
int ip6_route_add(struct fib6_config *cfg)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
int err;
|
2008-03-04 14:47:47 -07:00
|
|
|
struct net *net = cfg->fc_nlinfo.nl_net;
|
2005-04-16 15:20:36 -07:00
|
|
|
struct rt6_info *rt = NULL;
|
|
|
|
struct net_device *dev = NULL;
|
|
|
|
struct inet6_dev *idev = NULL;
|
2006-08-04 23:20:06 -07:00
|
|
|
struct fib6_table *table;
|
2005-04-16 15:20:36 -07:00
|
|
|
int addr_type;
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
if (cfg->fc_dst_len > 128 || cfg->fc_src_len > 128)
|
2005-04-16 15:20:36 -07:00
|
|
|
return -EINVAL;
|
|
|
|
#ifndef CONFIG_IPV6_SUBTREES
|
2006-08-22 00:01:08 -07:00
|
|
|
if (cfg->fc_src_len)
|
2005-04-16 15:20:36 -07:00
|
|
|
return -EINVAL;
|
|
|
|
#endif
|
2006-08-22 00:01:08 -07:00
|
|
|
if (cfg->fc_ifindex) {
|
2005-04-16 15:20:36 -07:00
|
|
|
err = -ENODEV;
|
2008-03-04 14:47:47 -07:00
|
|
|
dev = dev_get_by_index(net, cfg->fc_ifindex);
|
2005-04-16 15:20:36 -07:00
|
|
|
if (!dev)
|
|
|
|
goto out;
|
|
|
|
idev = in6_dev_get(dev);
|
|
|
|
if (!idev)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
if (cfg->fc_metric == 0)
|
|
|
|
cfg->fc_metric = IP6_RT_PRIO_USER;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
table = fib6_new_table(net, cfg->fc_table);
|
2006-08-04 23:20:06 -07:00
|
|
|
if (table == NULL) {
|
|
|
|
err = -ENOBUFS;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2009-08-28 18:34:49 -07:00
|
|
|
rt = ip6_dst_alloc(&net->ipv6.ip6_dst_ops);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
if (rt == NULL) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.obsolete = -1;
|
2008-05-19 16:56:11 -07:00
|
|
|
rt->rt6i_expires = (cfg->fc_flags & RTF_EXPIRES) ?
|
|
|
|
jiffies + clock_t_to_jiffies(cfg->fc_expires) :
|
|
|
|
0;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
if (cfg->fc_protocol == RTPROT_UNSPEC)
|
|
|
|
cfg->fc_protocol = RTPROT_BOOT;
|
|
|
|
rt->rt6i_protocol = cfg->fc_protocol;
|
|
|
|
|
|
|
|
addr_type = ipv6_addr_type(&cfg->fc_dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
if (addr_type & IPV6_ADDR_MULTICAST)
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.input = ip6_mc_input;
|
2010-09-26 17:07:02 -07:00
|
|
|
else if (cfg->fc_flags & RTF_LOCAL)
|
|
|
|
rt->dst.input = ip6_input;
|
2005-04-16 15:20:36 -07:00
|
|
|
else
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.input = ip6_forward;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.output = ip6_output;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
ipv6_addr_prefix(&rt->rt6i_dst.addr, &cfg->fc_dst, cfg->fc_dst_len);
|
|
|
|
rt->rt6i_dst.plen = cfg->fc_dst_len;
|
2005-04-16 15:20:36 -07:00
|
|
|
if (rt->rt6i_dst.plen == 128)
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.flags = DST_HOST;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
#ifdef CONFIG_IPV6_SUBTREES
|
2006-08-22 00:01:08 -07:00
|
|
|
ipv6_addr_prefix(&rt->rt6i_src.addr, &cfg->fc_src, cfg->fc_src_len);
|
|
|
|
rt->rt6i_src.plen = cfg->fc_src_len;
|
2005-04-16 15:20:36 -07:00
|
|
|
#endif
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
rt->rt6i_metric = cfg->fc_metric;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
/* We cannot add true routes via loopback here,
|
|
|
|
they would result in kernel looping; promote them to reject routes
|
|
|
|
*/
|
2006-08-22 00:01:08 -07:00
|
|
|
if ((cfg->fc_flags & RTF_REJECT) ||
|
2010-09-26 17:07:02 -07:00
|
|
|
(dev && (dev->flags&IFF_LOOPBACK) && !(addr_type&IPV6_ADDR_LOOPBACK)
|
|
|
|
&& !(cfg->fc_flags&RTF_LOCAL))) {
|
2005-04-16 15:20:36 -07:00
|
|
|
/* hold loopback dev/idev if we haven't done so. */
|
2008-03-04 14:47:47 -07:00
|
|
|
if (dev != net->loopback_dev) {
|
2005-04-16 15:20:36 -07:00
|
|
|
if (dev) {
|
|
|
|
dev_put(dev);
|
|
|
|
in6_dev_put(idev);
|
|
|
|
}
|
2008-03-04 14:47:47 -07:00
|
|
|
dev = net->loopback_dev;
|
2005-04-16 15:20:36 -07:00
|
|
|
dev_hold(dev);
|
|
|
|
idev = in6_dev_get(dev);
|
|
|
|
if (!idev) {
|
|
|
|
err = -ENODEV;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.output = ip6_pkt_discard_out;
|
|
|
|
rt->dst.input = ip6_pkt_discard;
|
|
|
|
rt->dst.error = -ENETUNREACH;
|
2005-04-16 15:20:36 -07:00
|
|
|
rt->rt6i_flags = RTF_REJECT|RTF_NONEXTHOP;
|
|
|
|
goto install_route;
|
|
|
|
}
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
if (cfg->fc_flags & RTF_GATEWAY) {
|
2005-04-16 15:20:36 -07:00
|
|
|
struct in6_addr *gw_addr;
|
|
|
|
int gwa_type;
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
gw_addr = &cfg->fc_gateway;
|
|
|
|
ipv6_addr_copy(&rt->rt6i_gateway, gw_addr);
|
2005-04-16 15:20:36 -07:00
|
|
|
gwa_type = ipv6_addr_type(gw_addr);
|
|
|
|
|
|
|
|
if (gwa_type != (IPV6_ADDR_LINKLOCAL|IPV6_ADDR_UNICAST)) {
|
|
|
|
struct rt6_info *grt;
|
|
|
|
|
|
|
|
/* IPv6 strictly inhibits using not link-local
|
|
|
|
addresses as nexthop address.
|
|
|
|
Otherwise, router will not able to send redirects.
|
|
|
|
It is very good, but in some (rare!) circumstances
|
|
|
|
(SIT, PtP, NBMA NOARP links) it is handy to allow
|
|
|
|
some exceptions. --ANK
|
|
|
|
*/
|
|
|
|
err = -EINVAL;
|
|
|
|
if (!(gwa_type&IPV6_ADDR_UNICAST))
|
|
|
|
goto out;
|
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
grt = rt6_lookup(net, gw_addr, NULL, cfg->fc_ifindex, 1);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
err = -EHOSTUNREACH;
|
|
|
|
if (grt == NULL)
|
|
|
|
goto out;
|
|
|
|
if (dev) {
|
|
|
|
if (dev != grt->rt6i_dev) {
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_release(&grt->dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
dev = grt->rt6i_dev;
|
|
|
|
idev = grt->rt6i_idev;
|
|
|
|
dev_hold(dev);
|
|
|
|
in6_dev_hold(grt->rt6i_idev);
|
|
|
|
}
|
|
|
|
if (!(grt->rt6i_flags&RTF_GATEWAY))
|
|
|
|
err = 0;
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_release(&grt->dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
if (err)
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
err = -EINVAL;
|
|
|
|
if (dev == NULL || (dev->flags&IFF_LOOPBACK))
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
err = -ENODEV;
|
|
|
|
if (dev == NULL)
|
|
|
|
goto out;
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
if (cfg->fc_flags & (RTF_GATEWAY | RTF_NONEXTHOP)) {
|
2005-04-16 15:20:36 -07:00
|
|
|
rt->rt6i_nexthop = __neigh_lookup_errno(&nd_tbl, &rt->rt6i_gateway, dev);
|
|
|
|
if (IS_ERR(rt->rt6i_nexthop)) {
|
|
|
|
err = PTR_ERR(rt->rt6i_nexthop);
|
|
|
|
rt->rt6i_nexthop = NULL;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
rt->rt6i_flags = cfg->fc_flags;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
install_route:
|
2006-08-22 00:01:08 -07:00
|
|
|
if (cfg->fc_mx) {
|
|
|
|
struct nlattr *nla;
|
|
|
|
int remaining;
|
|
|
|
|
|
|
|
nla_for_each_attr(nla, cfg->fc_mx, cfg->fc_mx_len, remaining) {
|
2007-09-12 05:44:36 -07:00
|
|
|
int type = nla_type(nla);
|
2006-08-22 00:01:08 -07:00
|
|
|
|
|
|
|
if (type) {
|
|
|
|
if (type > RTAX_MAX) {
|
2005-04-16 15:20:36 -07:00
|
|
|
err = -EINVAL;
|
|
|
|
goto out;
|
|
|
|
}
|
2006-08-22 00:01:08 -07:00
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.metrics[type - 1] = nla_get_u32(nla);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
if (dst_metric(&rt->dst, RTAX_HOPLIMIT) == 0)
|
|
|
|
rt->dst.metrics[RTAX_HOPLIMIT-1] = -1;
|
|
|
|
if (!dst_mtu(&rt->dst))
|
|
|
|
rt->dst.metrics[RTAX_MTU-1] = ipv6_get_mtu(dev);
|
|
|
|
if (!dst_metric(&rt->dst, RTAX_ADVMSS))
|
|
|
|
rt->dst.metrics[RTAX_ADVMSS-1] = ipv6_advmss(net, dst_mtu(&rt->dst));
|
|
|
|
rt->dst.dev = dev;
|
2005-04-16 15:20:36 -07:00
|
|
|
rt->rt6i_idev = idev;
|
2006-08-04 23:20:06 -07:00
|
|
|
rt->rt6i_table = table;
|
2008-03-04 00:31:11 -07:00
|
|
|
|
2008-03-25 05:47:49 -07:00
|
|
|
cfg->fc_nlinfo.nl_net = dev_net(dev);
|
2008-03-04 00:31:11 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
return __ip6_ins_rt(rt, &cfg->fc_nlinfo);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
out:
|
|
|
|
if (dev)
|
|
|
|
dev_put(dev);
|
|
|
|
if (idev)
|
|
|
|
in6_dev_put(idev);
|
|
|
|
if (rt)
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_free(&rt->dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
static int __ip6_del_rt(struct rt6_info *rt, struct nl_info *info)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
int err;
|
2006-08-04 23:20:06 -07:00
|
|
|
struct fib6_table *table;
|
2008-03-25 05:47:49 -07:00
|
|
|
struct net *net = dev_net(rt->rt6i_dev);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
if (rt == net->ipv6.ip6_null_entry)
|
2006-08-06 22:22:47 -07:00
|
|
|
return -ENOENT;
|
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
table = rt->rt6i_table;
|
|
|
|
write_lock_bh(&table->tb6_lock);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
err = fib6_del(rt, info);
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_release(&rt->dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
write_unlock_bh(&table->tb6_lock);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2006-08-22 00:00:21 -07:00
|
|
|
int ip6_del_rt(struct rt6_info *rt)
|
|
|
|
{
|
2008-01-10 04:26:13 -07:00
|
|
|
struct nl_info info = {
|
2008-03-25 05:47:49 -07:00
|
|
|
.nl_net = dev_net(rt->rt6i_dev),
|
2008-01-10 04:26:13 -07:00
|
|
|
};
|
2007-12-13 10:45:12 -07:00
|
|
|
return __ip6_del_rt(rt, &info);
|
2006-08-22 00:00:21 -07:00
|
|
|
}
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
static int ip6_route_del(struct fib6_config *cfg)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2006-08-04 23:20:06 -07:00
|
|
|
struct fib6_table *table;
|
2005-04-16 15:20:36 -07:00
|
|
|
struct fib6_node *fn;
|
|
|
|
struct rt6_info *rt;
|
|
|
|
int err = -ESRCH;
|
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
table = fib6_get_table(cfg->fc_nlinfo.nl_net, cfg->fc_table);
|
2006-08-04 23:20:06 -07:00
|
|
|
if (table == NULL)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
read_lock_bh(&table->tb6_lock);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
fn = fib6_locate(&table->tb6_root,
|
2006-08-22 00:01:08 -07:00
|
|
|
&cfg->fc_dst, cfg->fc_dst_len,
|
|
|
|
&cfg->fc_src, cfg->fc_src_len);
|
2007-02-09 07:24:49 -07:00
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
if (fn) {
|
2010-06-10 23:31:35 -07:00
|
|
|
for (rt = fn->leaf; rt; rt = rt->dst.rt6_next) {
|
2006-08-22 00:01:08 -07:00
|
|
|
if (cfg->fc_ifindex &&
|
2005-04-16 15:20:36 -07:00
|
|
|
(rt->rt6i_dev == NULL ||
|
2006-08-22 00:01:08 -07:00
|
|
|
rt->rt6i_dev->ifindex != cfg->fc_ifindex))
|
2005-04-16 15:20:36 -07:00
|
|
|
continue;
|
2006-08-22 00:01:08 -07:00
|
|
|
if (cfg->fc_flags & RTF_GATEWAY &&
|
|
|
|
!ipv6_addr_equal(&cfg->fc_gateway, &rt->rt6i_gateway))
|
2005-04-16 15:20:36 -07:00
|
|
|
continue;
|
2006-08-22 00:01:08 -07:00
|
|
|
if (cfg->fc_metric && cfg->fc_metric != rt->rt6i_metric)
|
2005-04-16 15:20:36 -07:00
|
|
|
continue;
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_hold(&rt->dst);
|
2006-08-04 23:20:06 -07:00
|
|
|
read_unlock_bh(&table->tb6_lock);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
return __ip6_del_rt(rt, &cfg->fc_nlinfo);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
}
|
2006-08-04 23:20:06 -07:00
|
|
|
read_unlock_bh(&table->tb6_lock);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Handle redirects
|
|
|
|
*/
|
2006-08-23 17:18:26 -07:00
|
|
|
struct ip6rd_flowi {
|
|
|
|
struct flowi fl;
|
|
|
|
struct in6_addr gateway;
|
|
|
|
};
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
static struct rt6_info *__ip6_route_redirect(struct net *net,
|
|
|
|
struct fib6_table *table,
|
2006-08-23 17:18:26 -07:00
|
|
|
struct flowi *fl,
|
|
|
|
int flags)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2006-08-23 17:18:26 -07:00
|
|
|
struct ip6rd_flowi *rdfl = (struct ip6rd_flowi *)fl;
|
|
|
|
struct rt6_info *rt;
|
2006-03-20 18:07:49 -07:00
|
|
|
struct fib6_node *fn;
|
2006-08-04 23:20:06 -07:00
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
2006-03-20 18:07:49 -07:00
|
|
|
* Get the "current" route for this destination and
|
|
|
|
* check if the redirect has come from approriate router.
|
|
|
|
*
|
|
|
|
* RFC 2461 specifies that redirects should only be
|
|
|
|
* accepted if they come from the nexthop to the target.
|
|
|
|
* Due to the way the routes are chosen, this notion
|
|
|
|
* is a bit fuzzy and one might need to check all possible
|
|
|
|
* routes.
|
2005-04-16 15:20:36 -07:00
|
|
|
*/
|
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
read_lock_bh(&table->tb6_lock);
|
2006-08-23 17:18:26 -07:00
|
|
|
fn = fib6_lookup(&table->tb6_root, &fl->fl6_dst, &fl->fl6_src);
|
2006-03-20 18:07:49 -07:00
|
|
|
restart:
|
2010-06-10 23:31:35 -07:00
|
|
|
for (rt = fn->leaf; rt; rt = rt->dst.rt6_next) {
|
2006-03-20 18:07:49 -07:00
|
|
|
/*
|
|
|
|
* Current route is on-link; redirect is always invalid.
|
|
|
|
*
|
|
|
|
* Seems, previous statement is not true. It could
|
|
|
|
* be node, which looks for us as on-link (f.e. proxy ndisc)
|
|
|
|
* But then router serving it might decide, that we should
|
|
|
|
* know truth 8)8) --ANK (980726).
|
|
|
|
*/
|
|
|
|
if (rt6_check_expired(rt))
|
|
|
|
continue;
|
|
|
|
if (!(rt->rt6i_flags & RTF_GATEWAY))
|
|
|
|
continue;
|
2006-08-23 17:18:26 -07:00
|
|
|
if (fl->oif != rt->rt6i_dev->ifindex)
|
2006-03-20 18:07:49 -07:00
|
|
|
continue;
|
2006-08-23 17:18:26 -07:00
|
|
|
if (!ipv6_addr_equal(&rdfl->gateway, &rt->rt6i_gateway))
|
2006-03-20 18:07:49 -07:00
|
|
|
continue;
|
|
|
|
break;
|
|
|
|
}
|
2006-08-23 17:18:26 -07:00
|
|
|
|
2006-08-23 17:23:11 -07:00
|
|
|
if (!rt)
|
2008-03-04 14:48:30 -07:00
|
|
|
rt = net->ipv6.ip6_null_entry;
|
|
|
|
BACKTRACK(net, &fl->fl6_src);
|
2006-08-23 17:23:11 -07:00
|
|
|
out:
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_hold(&rt->dst);
|
2006-08-23 17:18:26 -07:00
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
read_unlock_bh(&table->tb6_lock);
|
2006-03-20 18:07:49 -07:00
|
|
|
|
2006-08-23 17:18:26 -07:00
|
|
|
return rt;
|
|
|
|
};
|
|
|
|
|
|
|
|
static struct rt6_info *ip6_route_redirect(struct in6_addr *dest,
|
|
|
|
struct in6_addr *src,
|
|
|
|
struct in6_addr *gateway,
|
|
|
|
struct net_device *dev)
|
|
|
|
{
|
2006-10-13 15:01:03 -07:00
|
|
|
int flags = RT6_LOOKUP_F_HAS_SADDR;
|
2008-03-25 05:47:49 -07:00
|
|
|
struct net *net = dev_net(dev);
|
2006-08-23 17:18:26 -07:00
|
|
|
struct ip6rd_flowi rdfl = {
|
|
|
|
.fl = {
|
|
|
|
.oif = dev->ifindex,
|
|
|
|
.nl_u = {
|
|
|
|
.ip6_u = {
|
|
|
|
.daddr = *dest,
|
|
|
|
.saddr = *src,
|
|
|
|
},
|
|
|
|
},
|
|
|
|
},
|
|
|
|
};
|
2006-10-13 15:01:03 -07:00
|
|
|
|
2009-10-07 13:58:01 -07:00
|
|
|
ipv6_addr_copy(&rdfl.gateway, gateway);
|
|
|
|
|
2006-10-13 15:01:03 -07:00
|
|
|
if (rt6_need_strict(dest))
|
|
|
|
flags |= RT6_LOOKUP_F_IFACE;
|
2006-08-23 17:18:26 -07:00
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
return (struct rt6_info *)fib6_rule_lookup(net, (struct flowi *)&rdfl,
|
2008-03-04 00:25:27 -07:00
|
|
|
flags, __ip6_route_redirect);
|
2006-08-23 17:18:26 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
void rt6_redirect(struct in6_addr *dest, struct in6_addr *src,
|
|
|
|
struct in6_addr *saddr,
|
|
|
|
struct neighbour *neigh, u8 *lladdr, int on_link)
|
|
|
|
{
|
|
|
|
struct rt6_info *rt, *nrt = NULL;
|
|
|
|
struct netevent_redirect netevent;
|
2008-03-25 05:47:49 -07:00
|
|
|
struct net *net = dev_net(neigh->dev);
|
2006-08-23 17:18:26 -07:00
|
|
|
|
|
|
|
rt = ip6_route_redirect(dest, src, saddr, neigh->dev);
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
if (rt == net->ipv6.ip6_null_entry) {
|
2005-04-16 15:20:36 -07:00
|
|
|
if (net_ratelimit())
|
|
|
|
printk(KERN_DEBUG "rt6_redirect: source isn't a valid nexthop "
|
|
|
|
"for redirect target\n");
|
2006-08-23 17:18:26 -07:00
|
|
|
goto out;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* We have finally decided to accept it.
|
|
|
|
*/
|
|
|
|
|
2007-02-09 07:24:49 -07:00
|
|
|
neigh_update(neigh, lladdr, NUD_STALE,
|
2005-04-16 15:20:36 -07:00
|
|
|
NEIGH_UPDATE_F_WEAK_OVERRIDE|
|
|
|
|
NEIGH_UPDATE_F_OVERRIDE|
|
|
|
|
(on_link ? 0 : (NEIGH_UPDATE_F_OVERRIDE_ISROUTER|
|
|
|
|
NEIGH_UPDATE_F_ISROUTER))
|
|
|
|
);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Redirect received -> path was valid.
|
|
|
|
* Look, redirects are sent only in response to data packets,
|
|
|
|
* so that this nexthop apparently is reachable. --ANK
|
|
|
|
*/
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_confirm(&rt->dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
/* Duplicate redirect: silently ignore. */
|
2010-06-10 23:31:35 -07:00
|
|
|
if (neigh == rt->dst.neighbour)
|
2005-04-16 15:20:36 -07:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
nrt = ip6_rt_copy(rt);
|
|
|
|
if (nrt == NULL)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
nrt->rt6i_flags = RTF_GATEWAY|RTF_UP|RTF_DYNAMIC|RTF_CACHE;
|
|
|
|
if (on_link)
|
|
|
|
nrt->rt6i_flags &= ~RTF_GATEWAY;
|
|
|
|
|
|
|
|
ipv6_addr_copy(&nrt->rt6i_dst.addr, dest);
|
|
|
|
nrt->rt6i_dst.plen = 128;
|
2010-06-10 23:31:35 -07:00
|
|
|
nrt->dst.flags |= DST_HOST;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
ipv6_addr_copy(&nrt->rt6i_gateway, (struct in6_addr*)neigh->primary_key);
|
|
|
|
nrt->rt6i_nexthop = neigh_clone(neigh);
|
|
|
|
/* Reset pmtu, it may be better */
|
2010-06-10 23:31:35 -07:00
|
|
|
nrt->dst.metrics[RTAX_MTU-1] = ipv6_get_mtu(neigh->dev);
|
|
|
|
nrt->dst.metrics[RTAX_ADVMSS-1] = ipv6_advmss(dev_net(neigh->dev),
|
|
|
|
dst_mtu(&nrt->dst));
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:00:45 -07:00
|
|
|
if (ip6_ins_rt(nrt))
|
2005-04-16 15:20:36 -07:00
|
|
|
goto out;
|
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
netevent.old = &rt->dst;
|
|
|
|
netevent.new = &nrt->dst;
|
2006-07-30 20:43:36 -07:00
|
|
|
call_netevent_notifiers(NETEVENT_REDIRECT, &netevent);
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
if (rt->rt6i_flags&RTF_CACHE) {
|
2006-08-22 00:00:21 -07:00
|
|
|
ip6_del_rt(rt);
|
2005-04-16 15:20:36 -07:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
out:
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_release(&rt->dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Handle ICMP "packet too big" messages
|
|
|
|
* i.e. Path MTU discovery
|
|
|
|
*/
|
|
|
|
|
2010-10-03 14:49:00 -07:00
|
|
|
static void rt6_do_pmtu_disc(struct in6_addr *daddr, struct in6_addr *saddr,
|
|
|
|
struct net *net, u32 pmtu, int ifindex)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
struct rt6_info *rt, *nrt;
|
|
|
|
int allfrag = 0;
|
|
|
|
|
2010-10-03 14:49:00 -07:00
|
|
|
rt = rt6_lookup(net, daddr, saddr, ifindex, 0);
|
2005-04-16 15:20:36 -07:00
|
|
|
if (rt == NULL)
|
|
|
|
return;
|
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
if (pmtu >= dst_mtu(&rt->dst))
|
2005-04-16 15:20:36 -07:00
|
|
|
goto out;
|
|
|
|
|
|
|
|
if (pmtu < IPV6_MIN_MTU) {
|
|
|
|
/*
|
2007-02-09 07:24:49 -07:00
|
|
|
* According to RFC2460, PMTU is set to the IPv6 Minimum Link
|
2005-04-16 15:20:36 -07:00
|
|
|
* MTU (1280) and a fragment header should always be included
|
|
|
|
* after a node receiving Too Big message reporting PMTU is
|
|
|
|
* less than the IPv6 Minimum Link MTU.
|
|
|
|
*/
|
|
|
|
pmtu = IPV6_MIN_MTU;
|
|
|
|
allfrag = 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* New mtu received -> path was valid.
|
|
|
|
They are sent only in response to data packets,
|
|
|
|
so that this nexthop apparently is reachable. --ANK
|
|
|
|
*/
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_confirm(&rt->dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
/* Host route. If it is static, it would be better
|
|
|
|
not to override it, but add new one, so that
|
|
|
|
when cache entry will expire old pmtu
|
|
|
|
would return automatically.
|
|
|
|
*/
|
|
|
|
if (rt->rt6i_flags & RTF_CACHE) {
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.metrics[RTAX_MTU-1] = pmtu;
|
2005-04-16 15:20:36 -07:00
|
|
|
if (allfrag)
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.metrics[RTAX_FEATURES-1] |= RTAX_FEATURE_ALLFRAG;
|
|
|
|
dst_set_expires(&rt->dst, net->ipv6.sysctl.ip6_rt_mtu_expires);
|
2005-04-16 15:20:36 -07:00
|
|
|
rt->rt6i_flags |= RTF_MODIFIED|RTF_EXPIRES;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Network route.
|
|
|
|
Two cases are possible:
|
|
|
|
1. It is connected route. Action: COW
|
|
|
|
2. It is gatewayed route or NONEXTHOP route. Action: clone it.
|
|
|
|
*/
|
2006-03-20 17:58:48 -07:00
|
|
|
if (!rt->rt6i_nexthop && !(rt->rt6i_flags & RTF_NONEXTHOP))
|
2006-03-20 17:56:32 -07:00
|
|
|
nrt = rt6_alloc_cow(rt, daddr, saddr);
|
2006-03-20 17:58:48 -07:00
|
|
|
else
|
|
|
|
nrt = rt6_alloc_clone(rt, daddr);
|
2006-03-20 17:56:32 -07:00
|
|
|
|
2006-03-20 17:58:48 -07:00
|
|
|
if (nrt) {
|
2010-06-10 23:31:35 -07:00
|
|
|
nrt->dst.metrics[RTAX_MTU-1] = pmtu;
|
2006-03-20 17:56:32 -07:00
|
|
|
if (allfrag)
|
2010-06-10 23:31:35 -07:00
|
|
|
nrt->dst.metrics[RTAX_FEATURES-1] |= RTAX_FEATURE_ALLFRAG;
|
2006-03-20 17:56:32 -07:00
|
|
|
|
|
|
|
/* According to RFC 1981, detecting PMTU increase shouldn't be
|
|
|
|
* happened within 5 mins, the recommended timer is 10 mins.
|
|
|
|
* Here this route expiration time is set to ip6_rt_mtu_expires
|
|
|
|
* which is 10 mins. After 10 mins the decreased pmtu is expired
|
|
|
|
* and detecting PMTU increase will be automatically happened.
|
|
|
|
*/
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_set_expires(&nrt->dst, net->ipv6.sysctl.ip6_rt_mtu_expires);
|
2006-03-20 17:56:32 -07:00
|
|
|
nrt->rt6i_flags |= RTF_DYNAMIC|RTF_EXPIRES;
|
|
|
|
|
2006-08-22 00:00:45 -07:00
|
|
|
ip6_ins_rt(nrt);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
out:
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_release(&rt->dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2010-10-03 14:49:00 -07:00
|
|
|
void rt6_pmtu_discovery(struct in6_addr *daddr, struct in6_addr *saddr,
|
|
|
|
struct net_device *dev, u32 pmtu)
|
|
|
|
{
|
|
|
|
struct net *net = dev_net(dev);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* RFC 1981 states that a node "MUST reduce the size of the packets it
|
|
|
|
* is sending along the path" that caused the Packet Too Big message.
|
|
|
|
* Since it's not possible in the general case to determine which
|
|
|
|
* interface was used to send the original packet, we update the MTU
|
|
|
|
* on the interface that will be used to send future packets. We also
|
|
|
|
* update the MTU on the interface that received the Packet Too Big in
|
|
|
|
* case the original packet was forced out that interface with
|
|
|
|
* SO_BINDTODEVICE or similar. This is the next best thing to the
|
|
|
|
* correct behaviour, which would be to update the MTU on all
|
|
|
|
* interfaces.
|
|
|
|
*/
|
|
|
|
rt6_do_pmtu_disc(daddr, saddr, net, pmtu, 0);
|
|
|
|
rt6_do_pmtu_disc(daddr, saddr, net, pmtu, dev->ifindex);
|
|
|
|
}
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
* Misc support functions
|
|
|
|
*/
|
|
|
|
|
|
|
|
static struct rt6_info * ip6_rt_copy(struct rt6_info *ort)
|
|
|
|
{
|
2008-03-25 05:47:49 -07:00
|
|
|
struct net *net = dev_net(ort->rt6i_dev);
|
2009-08-28 18:34:49 -07:00
|
|
|
struct rt6_info *rt = ip6_dst_alloc(&net->ipv6.ip6_dst_ops);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
if (rt) {
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.input = ort->dst.input;
|
|
|
|
rt->dst.output = ort->dst.output;
|
|
|
|
|
|
|
|
memcpy(rt->dst.metrics, ort->dst.metrics, RTAX_MAX*sizeof(u32));
|
|
|
|
rt->dst.error = ort->dst.error;
|
|
|
|
rt->dst.dev = ort->dst.dev;
|
|
|
|
if (rt->dst.dev)
|
|
|
|
dev_hold(rt->dst.dev);
|
2005-04-16 15:20:36 -07:00
|
|
|
rt->rt6i_idev = ort->rt6i_idev;
|
|
|
|
if (rt->rt6i_idev)
|
|
|
|
in6_dev_hold(rt->rt6i_idev);
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.lastuse = jiffies;
|
2005-04-16 15:20:36 -07:00
|
|
|
rt->rt6i_expires = 0;
|
|
|
|
|
|
|
|
ipv6_addr_copy(&rt->rt6i_gateway, &ort->rt6i_gateway);
|
|
|
|
rt->rt6i_flags = ort->rt6i_flags & ~RTF_EXPIRES;
|
|
|
|
rt->rt6i_metric = 0;
|
|
|
|
|
|
|
|
memcpy(&rt->rt6i_dst, &ort->rt6i_dst, sizeof(struct rt6key));
|
|
|
|
#ifdef CONFIG_IPV6_SUBTREES
|
|
|
|
memcpy(&rt->rt6i_src, &ort->rt6i_src, sizeof(struct rt6key));
|
|
|
|
#endif
|
2006-08-04 23:20:06 -07:00
|
|
|
rt->rt6i_table = ort->rt6i_table;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
return rt;
|
|
|
|
}
|
|
|
|
|
2006-03-20 18:06:24 -07:00
|
|
|
#ifdef CONFIG_IPV6_ROUTE_INFO
|
2008-03-04 14:46:48 -07:00
|
|
|
static struct rt6_info *rt6_get_route_info(struct net *net,
|
|
|
|
struct in6_addr *prefix, int prefixlen,
|
2006-03-20 18:06:24 -07:00
|
|
|
struct in6_addr *gwaddr, int ifindex)
|
|
|
|
{
|
|
|
|
struct fib6_node *fn;
|
|
|
|
struct rt6_info *rt = NULL;
|
2006-08-04 23:20:06 -07:00
|
|
|
struct fib6_table *table;
|
|
|
|
|
2008-03-04 14:46:48 -07:00
|
|
|
table = fib6_get_table(net, RT6_TABLE_INFO);
|
2006-08-04 23:20:06 -07:00
|
|
|
if (table == NULL)
|
|
|
|
return NULL;
|
2006-03-20 18:06:24 -07:00
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
write_lock_bh(&table->tb6_lock);
|
|
|
|
fn = fib6_locate(&table->tb6_root, prefix ,prefixlen, NULL, 0);
|
2006-03-20 18:06:24 -07:00
|
|
|
if (!fn)
|
|
|
|
goto out;
|
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
for (rt = fn->leaf; rt; rt = rt->dst.rt6_next) {
|
2006-03-20 18:06:24 -07:00
|
|
|
if (rt->rt6i_dev->ifindex != ifindex)
|
|
|
|
continue;
|
|
|
|
if ((rt->rt6i_flags & (RTF_ROUTEINFO|RTF_GATEWAY)) != (RTF_ROUTEINFO|RTF_GATEWAY))
|
|
|
|
continue;
|
|
|
|
if (!ipv6_addr_equal(&rt->rt6i_gateway, gwaddr))
|
|
|
|
continue;
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_hold(&rt->dst);
|
2006-03-20 18:06:24 -07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
out:
|
2006-08-04 23:20:06 -07:00
|
|
|
write_unlock_bh(&table->tb6_lock);
|
2006-03-20 18:06:24 -07:00
|
|
|
return rt;
|
|
|
|
}
|
|
|
|
|
2008-03-04 14:46:48 -07:00
|
|
|
static struct rt6_info *rt6_add_route_info(struct net *net,
|
|
|
|
struct in6_addr *prefix, int prefixlen,
|
2006-03-20 18:06:24 -07:00
|
|
|
struct in6_addr *gwaddr, int ifindex,
|
|
|
|
unsigned pref)
|
|
|
|
{
|
2006-08-22 00:01:08 -07:00
|
|
|
struct fib6_config cfg = {
|
|
|
|
.fc_table = RT6_TABLE_INFO,
|
2008-02-10 00:43:11 -07:00
|
|
|
.fc_metric = IP6_RT_PRIO_USER,
|
2006-08-22 00:01:08 -07:00
|
|
|
.fc_ifindex = ifindex,
|
|
|
|
.fc_dst_len = prefixlen,
|
|
|
|
.fc_flags = RTF_GATEWAY | RTF_ADDRCONF | RTF_ROUTEINFO |
|
|
|
|
RTF_UP | RTF_PREF(pref),
|
2008-03-04 14:46:48 -07:00
|
|
|
.fc_nlinfo.pid = 0,
|
|
|
|
.fc_nlinfo.nlh = NULL,
|
|
|
|
.fc_nlinfo.nl_net = net,
|
2006-08-22 00:01:08 -07:00
|
|
|
};
|
|
|
|
|
|
|
|
ipv6_addr_copy(&cfg.fc_dst, prefix);
|
|
|
|
ipv6_addr_copy(&cfg.fc_gateway, gwaddr);
|
2006-03-20 18:06:24 -07:00
|
|
|
|
2006-03-20 18:06:42 -07:00
|
|
|
/* We should treat it as a default route if prefix length is 0. */
|
|
|
|
if (!prefixlen)
|
2006-08-22 00:01:08 -07:00
|
|
|
cfg.fc_flags |= RTF_DEFAULT;
|
2006-03-20 18:06:24 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
ip6_route_add(&cfg);
|
2006-03-20 18:06:24 -07:00
|
|
|
|
2008-03-04 14:46:48 -07:00
|
|
|
return rt6_get_route_info(net, prefix, prefixlen, gwaddr, ifindex);
|
2006-03-20 18:06:24 -07:00
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
struct rt6_info *rt6_get_dflt_router(struct in6_addr *addr, struct net_device *dev)
|
2007-02-09 07:24:49 -07:00
|
|
|
{
|
2005-04-16 15:20:36 -07:00
|
|
|
struct rt6_info *rt;
|
2006-08-04 23:20:06 -07:00
|
|
|
struct fib6_table *table;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2008-03-25 05:47:49 -07:00
|
|
|
table = fib6_get_table(dev_net(dev), RT6_TABLE_DFLT);
|
2006-08-04 23:20:06 -07:00
|
|
|
if (table == NULL)
|
|
|
|
return NULL;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-04 23:20:06 -07:00
|
|
|
write_lock_bh(&table->tb6_lock);
|
2010-06-10 23:31:35 -07:00
|
|
|
for (rt = table->tb6_root.leaf; rt; rt=rt->dst.rt6_next) {
|
2005-04-16 15:20:36 -07:00
|
|
|
if (dev == rt->rt6i_dev &&
|
2006-03-20 18:00:48 -07:00
|
|
|
((rt->rt6i_flags & (RTF_ADDRCONF | RTF_DEFAULT)) == (RTF_ADDRCONF | RTF_DEFAULT)) &&
|
2005-04-16 15:20:36 -07:00
|
|
|
ipv6_addr_equal(&rt->rt6i_gateway, addr))
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
if (rt)
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_hold(&rt->dst);
|
2006-08-04 23:20:06 -07:00
|
|
|
write_unlock_bh(&table->tb6_lock);
|
2005-04-16 15:20:36 -07:00
|
|
|
return rt;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct rt6_info *rt6_add_dflt_router(struct in6_addr *gwaddr,
|
2006-03-20 18:04:53 -07:00
|
|
|
struct net_device *dev,
|
|
|
|
unsigned int pref)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2006-08-22 00:01:08 -07:00
|
|
|
struct fib6_config cfg = {
|
|
|
|
.fc_table = RT6_TABLE_DFLT,
|
2008-02-10 00:43:11 -07:00
|
|
|
.fc_metric = IP6_RT_PRIO_USER,
|
2006-08-22 00:01:08 -07:00
|
|
|
.fc_ifindex = dev->ifindex,
|
|
|
|
.fc_flags = RTF_GATEWAY | RTF_ADDRCONF | RTF_DEFAULT |
|
|
|
|
RTF_UP | RTF_EXPIRES | RTF_PREF(pref),
|
2008-03-04 14:47:47 -07:00
|
|
|
.fc_nlinfo.pid = 0,
|
|
|
|
.fc_nlinfo.nlh = NULL,
|
2008-03-25 05:47:49 -07:00
|
|
|
.fc_nlinfo.nl_net = dev_net(dev),
|
2006-08-22 00:01:08 -07:00
|
|
|
};
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
ipv6_addr_copy(&cfg.fc_gateway, gwaddr);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
ip6_route_add(&cfg);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
return rt6_get_dflt_router(gwaddr, dev);
|
|
|
|
}
|
|
|
|
|
2008-03-04 14:47:14 -07:00
|
|
|
void rt6_purge_dflt_routers(struct net *net)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
struct rt6_info *rt;
|
2006-08-04 23:20:06 -07:00
|
|
|
struct fib6_table *table;
|
|
|
|
|
|
|
|
/* NOTE: Keep consistent with rt6_get_dflt_router */
|
2008-03-04 14:47:14 -07:00
|
|
|
table = fib6_get_table(net, RT6_TABLE_DFLT);
|
2006-08-04 23:20:06 -07:00
|
|
|
if (table == NULL)
|
|
|
|
return;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
restart:
|
2006-08-04 23:20:06 -07:00
|
|
|
read_lock_bh(&table->tb6_lock);
|
2010-06-10 23:31:35 -07:00
|
|
|
for (rt = table->tb6_root.leaf; rt; rt = rt->dst.rt6_next) {
|
2005-04-16 15:20:36 -07:00
|
|
|
if (rt->rt6i_flags & (RTF_DEFAULT | RTF_ADDRCONF)) {
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_hold(&rt->dst);
|
2006-08-04 23:20:06 -07:00
|
|
|
read_unlock_bh(&table->tb6_lock);
|
2006-08-22 00:00:21 -07:00
|
|
|
ip6_del_rt(rt);
|
2005-04-16 15:20:36 -07:00
|
|
|
goto restart;
|
|
|
|
}
|
|
|
|
}
|
2006-08-04 23:20:06 -07:00
|
|
|
read_unlock_bh(&table->tb6_lock);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
static void rtmsg_to_fib6_config(struct net *net,
|
|
|
|
struct in6_rtmsg *rtmsg,
|
2006-08-22 00:01:08 -07:00
|
|
|
struct fib6_config *cfg)
|
|
|
|
{
|
|
|
|
memset(cfg, 0, sizeof(*cfg));
|
|
|
|
|
|
|
|
cfg->fc_table = RT6_TABLE_MAIN;
|
|
|
|
cfg->fc_ifindex = rtmsg->rtmsg_ifindex;
|
|
|
|
cfg->fc_metric = rtmsg->rtmsg_metric;
|
|
|
|
cfg->fc_expires = rtmsg->rtmsg_info;
|
|
|
|
cfg->fc_dst_len = rtmsg->rtmsg_dst_len;
|
|
|
|
cfg->fc_src_len = rtmsg->rtmsg_src_len;
|
|
|
|
cfg->fc_flags = rtmsg->rtmsg_flags;
|
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
cfg->fc_nlinfo.nl_net = net;
|
2008-02-26 19:10:03 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
ipv6_addr_copy(&cfg->fc_dst, &rtmsg->rtmsg_dst);
|
|
|
|
ipv6_addr_copy(&cfg->fc_src, &rtmsg->rtmsg_src);
|
|
|
|
ipv6_addr_copy(&cfg->fc_gateway, &rtmsg->rtmsg_gateway);
|
|
|
|
}
|
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
int ipv6_route_ioctl(struct net *net, unsigned int cmd, void __user *arg)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2006-08-22 00:01:08 -07:00
|
|
|
struct fib6_config cfg;
|
2005-04-16 15:20:36 -07:00
|
|
|
struct in6_rtmsg rtmsg;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
switch(cmd) {
|
|
|
|
case SIOCADDRT: /* Add a route */
|
|
|
|
case SIOCDELRT: /* Delete a route */
|
|
|
|
if (!capable(CAP_NET_ADMIN))
|
|
|
|
return -EPERM;
|
|
|
|
err = copy_from_user(&rtmsg, arg,
|
|
|
|
sizeof(struct in6_rtmsg));
|
|
|
|
if (err)
|
|
|
|
return -EFAULT;
|
2006-08-22 00:01:08 -07:00
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
rtmsg_to_fib6_config(net, &rtmsg, &cfg);
|
2006-08-22 00:01:08 -07:00
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
rtnl_lock();
|
|
|
|
switch (cmd) {
|
|
|
|
case SIOCADDRT:
|
2006-08-22 00:01:08 -07:00
|
|
|
err = ip6_route_add(&cfg);
|
2005-04-16 15:20:36 -07:00
|
|
|
break;
|
|
|
|
case SIOCDELRT:
|
2006-08-22 00:01:08 -07:00
|
|
|
err = ip6_route_del(&cfg);
|
2005-04-16 15:20:36 -07:00
|
|
|
break;
|
|
|
|
default:
|
|
|
|
err = -EINVAL;
|
|
|
|
}
|
|
|
|
rtnl_unlock();
|
|
|
|
|
|
|
|
return err;
|
2007-04-20 17:09:22 -07:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Drop the packet on the floor
|
|
|
|
*/
|
|
|
|
|
2009-06-23 04:31:07 -07:00
|
|
|
static int ip6_pkt_drop(struct sk_buff *skb, u8 code, int ipstats_mib_noroutes)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2007-04-13 16:18:02 -07:00
|
|
|
int type;
|
2009-06-01 22:19:30 -07:00
|
|
|
struct dst_entry *dst = skb_dst(skb);
|
2007-04-13 16:18:02 -07:00
|
|
|
switch (ipstats_mib_noroutes) {
|
|
|
|
case IPSTATS_MIB_INNOROUTES:
|
2007-04-25 17:54:47 -07:00
|
|
|
type = ipv6_addr_type(&ipv6_hdr(skb)->daddr);
|
2010-02-25 16:28:58 -07:00
|
|
|
if (type == IPV6_ADDR_ANY) {
|
2008-10-08 10:54:51 -07:00
|
|
|
IP6_INC_STATS(dev_net(dst->dev), ip6_dst_idev(dst),
|
|
|
|
IPSTATS_MIB_INADDRERRORS);
|
2007-04-13 16:18:02 -07:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
case IPSTATS_MIB_OUTNOROUTES:
|
2008-10-08 10:54:51 -07:00
|
|
|
IP6_INC_STATS(dev_net(dst->dev), ip6_dst_idev(dst),
|
|
|
|
ipstats_mib_noroutes);
|
2007-04-13 16:18:02 -07:00
|
|
|
break;
|
|
|
|
}
|
2010-02-18 01:25:24 -07:00
|
|
|
icmpv6_send(skb, ICMPV6_DEST_UNREACH, code, 0);
|
2005-04-16 15:20:36 -07:00
|
|
|
kfree_skb(skb);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2006-10-18 20:46:54 -07:00
|
|
|
static int ip6_pkt_discard(struct sk_buff *skb)
|
|
|
|
{
|
2007-04-13 16:18:02 -07:00
|
|
|
return ip6_pkt_drop(skb, ICMPV6_NOROUTE, IPSTATS_MIB_INNOROUTES);
|
2006-10-18 20:46:54 -07:00
|
|
|
}
|
|
|
|
|
2005-08-15 22:18:02 -07:00
|
|
|
static int ip6_pkt_discard_out(struct sk_buff *skb)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2009-06-01 22:19:30 -07:00
|
|
|
skb->dev = skb_dst(skb)->dev;
|
2007-04-13 16:18:02 -07:00
|
|
|
return ip6_pkt_drop(skb, ICMPV6_NOROUTE, IPSTATS_MIB_OUTNOROUTES);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2006-10-18 21:20:57 -07:00
|
|
|
#ifdef CONFIG_IPV6_MULTIPLE_TABLES
|
|
|
|
|
2006-10-18 20:46:54 -07:00
|
|
|
static int ip6_pkt_prohibit(struct sk_buff *skb)
|
|
|
|
{
|
2007-04-13 16:18:02 -07:00
|
|
|
return ip6_pkt_drop(skb, ICMPV6_ADM_PROHIBITED, IPSTATS_MIB_INNOROUTES);
|
2006-10-18 20:46:54 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static int ip6_pkt_prohibit_out(struct sk_buff *skb)
|
|
|
|
{
|
2009-06-01 22:19:30 -07:00
|
|
|
skb->dev = skb_dst(skb)->dev;
|
2007-04-13 16:18:02 -07:00
|
|
|
return ip6_pkt_drop(skb, ICMPV6_ADM_PROHIBITED, IPSTATS_MIB_OUTNOROUTES);
|
2006-10-18 20:46:54 -07:00
|
|
|
}
|
|
|
|
|
2006-10-18 21:20:57 -07:00
|
|
|
#endif
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
* Allocate a dst for local (unicast / anycast) address.
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct rt6_info *addrconf_dst_alloc(struct inet6_dev *idev,
|
|
|
|
const struct in6_addr *addr,
|
|
|
|
int anycast)
|
|
|
|
{
|
2008-03-25 05:47:49 -07:00
|
|
|
struct net *net = dev_net(idev->dev);
|
2009-08-28 18:34:49 -07:00
|
|
|
struct rt6_info *rt = ip6_dst_alloc(&net->ipv6.ip6_dst_ops);
|
2009-01-04 17:04:39 -07:00
|
|
|
struct neighbour *neigh;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
if (rt == NULL)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
dev_hold(net->loopback_dev);
|
2005-04-16 15:20:36 -07:00
|
|
|
in6_dev_hold(idev);
|
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.flags = DST_HOST;
|
|
|
|
rt->dst.input = ip6_input;
|
|
|
|
rt->dst.output = ip6_output;
|
2008-03-04 14:47:47 -07:00
|
|
|
rt->rt6i_dev = net->loopback_dev;
|
2005-04-16 15:20:36 -07:00
|
|
|
rt->rt6i_idev = idev;
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->dst.metrics[RTAX_MTU-1] = ipv6_get_mtu(rt->rt6i_dev);
|
|
|
|
rt->dst.metrics[RTAX_ADVMSS-1] = ipv6_advmss(net, dst_mtu(&rt->dst));
|
|
|
|
rt->dst.metrics[RTAX_HOPLIMIT-1] = -1;
|
|
|
|
rt->dst.obsolete = -1;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
rt->rt6i_flags = RTF_UP | RTF_NONEXTHOP;
|
2005-12-21 06:56:42 -07:00
|
|
|
if (anycast)
|
|
|
|
rt->rt6i_flags |= RTF_ANYCAST;
|
|
|
|
else
|
2005-04-16 15:20:36 -07:00
|
|
|
rt->rt6i_flags |= RTF_LOCAL;
|
2009-01-04 17:04:39 -07:00
|
|
|
neigh = ndisc_get_neigh(rt->rt6i_dev, &rt->rt6i_gateway);
|
|
|
|
if (IS_ERR(neigh)) {
|
2010-06-10 23:31:35 -07:00
|
|
|
dst_free(&rt->dst);
|
2009-01-04 17:04:39 -07:00
|
|
|
|
|
|
|
/* We are casting this because that is the return
|
|
|
|
* value type. But an errno encoded pointer is the
|
|
|
|
* same regardless of the underlying pointer type,
|
|
|
|
* and that's what we are returning. So this is OK.
|
|
|
|
*/
|
|
|
|
return (struct rt6_info *) neigh;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2009-01-04 17:04:39 -07:00
|
|
|
rt->rt6i_nexthop = neigh;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
ipv6_addr_copy(&rt->rt6i_dst.addr, addr);
|
|
|
|
rt->rt6i_dst.plen = 128;
|
2008-03-04 14:47:47 -07:00
|
|
|
rt->rt6i_table = fib6_get_table(net, RT6_TABLE_LOCAL);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
atomic_set(&rt->dst.__refcnt, 1);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
return rt;
|
|
|
|
}
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
struct arg_dev_net {
|
|
|
|
struct net_device *dev;
|
|
|
|
struct net *net;
|
|
|
|
};
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
static int fib6_ifdown(struct rt6_info *rt, void *arg)
|
|
|
|
{
|
2008-03-04 14:48:30 -07:00
|
|
|
struct net_device *dev = ((struct arg_dev_net *)arg)->dev;
|
|
|
|
struct net *net = ((struct arg_dev_net *)arg)->net;
|
|
|
|
|
|
|
|
if (((void *)rt->rt6i_dev == dev || dev == NULL) &&
|
|
|
|
rt != net->ipv6.ip6_null_entry) {
|
2005-04-16 15:20:36 -07:00
|
|
|
RT6_TRACE("deleted by ifdown %p\n", rt);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2008-03-04 00:27:06 -07:00
|
|
|
void rt6_ifdown(struct net *net, struct net_device *dev)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2008-03-04 14:48:30 -07:00
|
|
|
struct arg_dev_net adn = {
|
|
|
|
.dev = dev,
|
|
|
|
.net = net,
|
|
|
|
};
|
|
|
|
|
|
|
|
fib6_clean_all(net, fib6_ifdown, 0, &adn);
|
2008-09-10 17:27:15 -07:00
|
|
|
icmp6_clean_all(fib6_ifdown, &adn);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
struct rt6_mtu_change_arg
|
|
|
|
{
|
|
|
|
struct net_device *dev;
|
|
|
|
unsigned mtu;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int rt6_mtu_change_route(struct rt6_info *rt, void *p_arg)
|
|
|
|
{
|
|
|
|
struct rt6_mtu_change_arg *arg = (struct rt6_mtu_change_arg *) p_arg;
|
|
|
|
struct inet6_dev *idev;
|
2008-03-25 05:47:49 -07:00
|
|
|
struct net *net = dev_net(arg->dev);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
/* In IPv6 pmtu discovery is not optional,
|
|
|
|
so that RTAX_MTU lock cannot disable it.
|
|
|
|
We still use this lock to block changes
|
|
|
|
caused by addrconf/ndisc.
|
|
|
|
*/
|
|
|
|
|
|
|
|
idev = __in6_dev_get(arg->dev);
|
|
|
|
if (idev == NULL)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
/* For administrative MTU increase, there is no way to discover
|
|
|
|
IPv6 PMTU increase, so PMTU increase should be updated here.
|
|
|
|
Since RFC 1981 doesn't include administrative MTU increase
|
|
|
|
update PMTU increase is a MUST. (i.e. jumbo frame)
|
|
|
|
*/
|
|
|
|
/*
|
|
|
|
If new MTU is less than route PMTU, this new MTU will be the
|
|
|
|
lowest MTU in the path, update the route PMTU to reflect PMTU
|
|
|
|
decreases; if new MTU is greater than route PMTU, and the
|
|
|
|
old MTU is the lowest MTU in the path, update the route PMTU
|
|
|
|
to reflect the increase. In this case if the other nodes' MTU
|
|
|
|
also have the lowest MTU, TOO BIG MESSAGE will be lead to
|
|
|
|
PMTU discouvery.
|
|
|
|
*/
|
|
|
|
if (rt->rt6i_dev == arg->dev &&
|
2010-06-10 23:31:35 -07:00
|
|
|
!dst_metric_locked(&rt->dst, RTAX_MTU) &&
|
|
|
|
(dst_mtu(&rt->dst) >= arg->mtu ||
|
|
|
|
(dst_mtu(&rt->dst) < arg->mtu &&
|
|
|
|
dst_mtu(&rt->dst) == idev->cnf.mtu6))) {
|
|
|
|
rt->dst.metrics[RTAX_MTU-1] = arg->mtu;
|
|
|
|
rt->dst.metrics[RTAX_ADVMSS-1] = ipv6_advmss(net, arg->mtu);
|
2007-07-26 00:09:55 -07:00
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
void rt6_mtu_change(struct net_device *dev, unsigned mtu)
|
|
|
|
{
|
2006-08-04 23:20:06 -07:00
|
|
|
struct rt6_mtu_change_arg arg = {
|
|
|
|
.dev = dev,
|
|
|
|
.mtu = mtu,
|
|
|
|
};
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2008-03-25 05:47:49 -07:00
|
|
|
fib6_clean_all(dev_net(dev), rt6_mtu_change_route, 0, &arg);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2007-06-05 12:38:30 -07:00
|
|
|
static const struct nla_policy rtm_ipv6_policy[RTA_MAX+1] = {
|
2006-08-26 20:13:18 -07:00
|
|
|
[RTA_GATEWAY] = { .len = sizeof(struct in6_addr) },
|
2006-08-22 00:01:08 -07:00
|
|
|
[RTA_OIF] = { .type = NLA_U32 },
|
2006-08-22 00:01:47 -07:00
|
|
|
[RTA_IIF] = { .type = NLA_U32 },
|
2006-08-22 00:01:08 -07:00
|
|
|
[RTA_PRIORITY] = { .type = NLA_U32 },
|
|
|
|
[RTA_METRICS] = { .type = NLA_NESTED },
|
|
|
|
};
|
|
|
|
|
|
|
|
static int rtm_to_fib6_config(struct sk_buff *skb, struct nlmsghdr *nlh,
|
|
|
|
struct fib6_config *cfg)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2006-08-22 00:01:08 -07:00
|
|
|
struct rtmsg *rtm;
|
|
|
|
struct nlattr *tb[RTA_MAX+1];
|
|
|
|
int err;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
err = nlmsg_parse(nlh, sizeof(*rtm), tb, RTA_MAX, rtm_ipv6_policy);
|
|
|
|
if (err < 0)
|
|
|
|
goto errout;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
err = -EINVAL;
|
|
|
|
rtm = nlmsg_data(nlh);
|
|
|
|
memset(cfg, 0, sizeof(*cfg));
|
|
|
|
|
|
|
|
cfg->fc_table = rtm->rtm_table;
|
|
|
|
cfg->fc_dst_len = rtm->rtm_dst_len;
|
|
|
|
cfg->fc_src_len = rtm->rtm_src_len;
|
|
|
|
cfg->fc_flags = RTF_UP;
|
|
|
|
cfg->fc_protocol = rtm->rtm_protocol;
|
|
|
|
|
|
|
|
if (rtm->rtm_type == RTN_UNREACHABLE)
|
|
|
|
cfg->fc_flags |= RTF_REJECT;
|
|
|
|
|
2010-09-26 17:07:02 -07:00
|
|
|
if (rtm->rtm_type == RTN_LOCAL)
|
|
|
|
cfg->fc_flags |= RTF_LOCAL;
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
cfg->fc_nlinfo.pid = NETLINK_CB(skb).pid;
|
|
|
|
cfg->fc_nlinfo.nlh = nlh;
|
2008-03-25 10:26:21 -07:00
|
|
|
cfg->fc_nlinfo.nl_net = sock_net(skb->sk);
|
2006-08-22 00:01:08 -07:00
|
|
|
|
|
|
|
if (tb[RTA_GATEWAY]) {
|
|
|
|
nla_memcpy(&cfg->fc_gateway, tb[RTA_GATEWAY], 16);
|
|
|
|
cfg->fc_flags |= RTF_GATEWAY;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2006-08-22 00:01:08 -07:00
|
|
|
|
|
|
|
if (tb[RTA_DST]) {
|
|
|
|
int plen = (rtm->rtm_dst_len + 7) >> 3;
|
|
|
|
|
|
|
|
if (nla_len(tb[RTA_DST]) < plen)
|
|
|
|
goto errout;
|
|
|
|
|
|
|
|
nla_memcpy(&cfg->fc_dst, tb[RTA_DST], plen);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2006-08-22 00:01:08 -07:00
|
|
|
|
|
|
|
if (tb[RTA_SRC]) {
|
|
|
|
int plen = (rtm->rtm_src_len + 7) >> 3;
|
|
|
|
|
|
|
|
if (nla_len(tb[RTA_SRC]) < plen)
|
|
|
|
goto errout;
|
|
|
|
|
|
|
|
nla_memcpy(&cfg->fc_src, tb[RTA_SRC], plen);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2006-08-22 00:01:08 -07:00
|
|
|
|
|
|
|
if (tb[RTA_OIF])
|
|
|
|
cfg->fc_ifindex = nla_get_u32(tb[RTA_OIF]);
|
|
|
|
|
|
|
|
if (tb[RTA_PRIORITY])
|
|
|
|
cfg->fc_metric = nla_get_u32(tb[RTA_PRIORITY]);
|
|
|
|
|
|
|
|
if (tb[RTA_METRICS]) {
|
|
|
|
cfg->fc_mx = nla_data(tb[RTA_METRICS]);
|
|
|
|
cfg->fc_mx_len = nla_len(tb[RTA_METRICS]);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2006-08-22 00:01:08 -07:00
|
|
|
|
|
|
|
if (tb[RTA_TABLE])
|
|
|
|
cfg->fc_table = nla_get_u32(tb[RTA_TABLE]);
|
|
|
|
|
|
|
|
err = 0;
|
|
|
|
errout:
|
|
|
|
return err;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2007-03-22 11:58:32 -07:00
|
|
|
static int inet6_rtm_delroute(struct sk_buff *skb, struct nlmsghdr* nlh, void *arg)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2006-08-22 00:01:08 -07:00
|
|
|
struct fib6_config cfg;
|
|
|
|
int err;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
err = rtm_to_fib6_config(skb, nlh, &cfg);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
return ip6_route_del(&cfg);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2007-03-22 11:58:32 -07:00
|
|
|
static int inet6_rtm_newroute(struct sk_buff *skb, struct nlmsghdr* nlh, void *arg)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2006-08-22 00:01:08 -07:00
|
|
|
struct fib6_config cfg;
|
|
|
|
int err;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
err = rtm_to_fib6_config(skb, nlh, &cfg);
|
|
|
|
if (err < 0)
|
|
|
|
return err;
|
|
|
|
|
|
|
|
return ip6_route_add(&cfg);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2006-11-10 15:10:15 -07:00
|
|
|
static inline size_t rt6_nlmsg_size(void)
|
|
|
|
{
|
|
|
|
return NLMSG_ALIGN(sizeof(struct rtmsg))
|
|
|
|
+ nla_total_size(16) /* RTA_SRC */
|
|
|
|
+ nla_total_size(16) /* RTA_DST */
|
|
|
|
+ nla_total_size(16) /* RTA_GATEWAY */
|
|
|
|
+ nla_total_size(16) /* RTA_PREFSRC */
|
|
|
|
+ nla_total_size(4) /* RTA_TABLE */
|
|
|
|
+ nla_total_size(4) /* RTA_IIF */
|
|
|
|
+ nla_total_size(4) /* RTA_OIF */
|
|
|
|
+ nla_total_size(4) /* RTA_PRIORITY */
|
2007-01-23 23:09:41 -07:00
|
|
|
+ RTAX_MAX * nla_total_size(4) /* RTA_METRICS */
|
2006-11-10 15:10:15 -07:00
|
|
|
+ nla_total_size(sizeof(struct rta_cacheinfo));
|
|
|
|
}
|
|
|
|
|
2008-08-14 15:33:21 -07:00
|
|
|
static int rt6_fill_node(struct net *net,
|
|
|
|
struct sk_buff *skb, struct rt6_info *rt,
|
2005-06-21 13:51:04 -07:00
|
|
|
struct in6_addr *dst, struct in6_addr *src,
|
|
|
|
int iif, int type, u32 pid, u32 seq,
|
2008-04-02 17:22:53 -07:00
|
|
|
int prefix, int nowait, unsigned int flags)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
struct rtmsg *rtm;
|
2006-08-22 00:01:27 -07:00
|
|
|
struct nlmsghdr *nlh;
|
2006-11-27 10:27:07 -07:00
|
|
|
long expires;
|
2006-08-10 23:09:48 -07:00
|
|
|
u32 table;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
if (prefix) { /* user wants prefix routes only */
|
|
|
|
if (!(rt->rt6i_flags & RTF_PREFIX_RT)) {
|
|
|
|
/* success since this is not a prefix route */
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-08-22 00:01:27 -07:00
|
|
|
nlh = nlmsg_put(skb, pid, seq, type, sizeof(*rtm), flags);
|
|
|
|
if (nlh == NULL)
|
2007-02-01 00:16:40 -07:00
|
|
|
return -EMSGSIZE;
|
2006-08-22 00:01:27 -07:00
|
|
|
|
|
|
|
rtm = nlmsg_data(nlh);
|
2005-04-16 15:20:36 -07:00
|
|
|
rtm->rtm_family = AF_INET6;
|
|
|
|
rtm->rtm_dst_len = rt->rt6i_dst.plen;
|
|
|
|
rtm->rtm_src_len = rt->rt6i_src.plen;
|
|
|
|
rtm->rtm_tos = 0;
|
2006-08-04 23:20:06 -07:00
|
|
|
if (rt->rt6i_table)
|
2006-08-10 23:09:48 -07:00
|
|
|
table = rt->rt6i_table->tb6_id;
|
2006-08-04 23:20:06 -07:00
|
|
|
else
|
2006-08-10 23:09:48 -07:00
|
|
|
table = RT6_TABLE_UNSPEC;
|
|
|
|
rtm->rtm_table = table;
|
2006-08-22 00:01:27 -07:00
|
|
|
NLA_PUT_U32(skb, RTA_TABLE, table);
|
2005-04-16 15:20:36 -07:00
|
|
|
if (rt->rt6i_flags&RTF_REJECT)
|
|
|
|
rtm->rtm_type = RTN_UNREACHABLE;
|
2010-09-26 17:07:02 -07:00
|
|
|
else if (rt->rt6i_flags&RTF_LOCAL)
|
|
|
|
rtm->rtm_type = RTN_LOCAL;
|
2005-04-16 15:20:36 -07:00
|
|
|
else if (rt->rt6i_dev && (rt->rt6i_dev->flags&IFF_LOOPBACK))
|
|
|
|
rtm->rtm_type = RTN_LOCAL;
|
|
|
|
else
|
|
|
|
rtm->rtm_type = RTN_UNICAST;
|
|
|
|
rtm->rtm_flags = 0;
|
|
|
|
rtm->rtm_scope = RT_SCOPE_UNIVERSE;
|
|
|
|
rtm->rtm_protocol = rt->rt6i_protocol;
|
|
|
|
if (rt->rt6i_flags&RTF_DYNAMIC)
|
|
|
|
rtm->rtm_protocol = RTPROT_REDIRECT;
|
|
|
|
else if (rt->rt6i_flags & RTF_ADDRCONF)
|
|
|
|
rtm->rtm_protocol = RTPROT_KERNEL;
|
|
|
|
else if (rt->rt6i_flags&RTF_DEFAULT)
|
|
|
|
rtm->rtm_protocol = RTPROT_RA;
|
|
|
|
|
|
|
|
if (rt->rt6i_flags&RTF_CACHE)
|
|
|
|
rtm->rtm_flags |= RTM_F_CLONED;
|
|
|
|
|
|
|
|
if (dst) {
|
2006-08-22 00:01:27 -07:00
|
|
|
NLA_PUT(skb, RTA_DST, 16, dst);
|
2007-02-09 07:24:49 -07:00
|
|
|
rtm->rtm_dst_len = 128;
|
2005-04-16 15:20:36 -07:00
|
|
|
} else if (rtm->rtm_dst_len)
|
2006-08-22 00:01:27 -07:00
|
|
|
NLA_PUT(skb, RTA_DST, 16, &rt->rt6i_dst.addr);
|
2005-04-16 15:20:36 -07:00
|
|
|
#ifdef CONFIG_IPV6_SUBTREES
|
|
|
|
if (src) {
|
2006-08-22 00:01:27 -07:00
|
|
|
NLA_PUT(skb, RTA_SRC, 16, src);
|
2007-02-09 07:24:49 -07:00
|
|
|
rtm->rtm_src_len = 128;
|
2005-04-16 15:20:36 -07:00
|
|
|
} else if (rtm->rtm_src_len)
|
2006-08-22 00:01:27 -07:00
|
|
|
NLA_PUT(skb, RTA_SRC, 16, &rt->rt6i_src.addr);
|
2005-04-16 15:20:36 -07:00
|
|
|
#endif
|
2008-04-02 17:22:53 -07:00
|
|
|
if (iif) {
|
|
|
|
#ifdef CONFIG_IPV6_MROUTE
|
|
|
|
if (ipv6_addr_is_multicast(&rt->rt6i_dst.addr)) {
|
2008-12-10 17:30:15 -07:00
|
|
|
int err = ip6mr_get_route(net, skb, rtm, nowait);
|
2008-04-02 17:22:53 -07:00
|
|
|
if (err <= 0) {
|
|
|
|
if (!nowait) {
|
|
|
|
if (err == 0)
|
|
|
|
return 0;
|
|
|
|
goto nla_put_failure;
|
|
|
|
} else {
|
|
|
|
if (err == -EMSGSIZE)
|
|
|
|
goto nla_put_failure;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else
|
|
|
|
#endif
|
|
|
|
NLA_PUT_U32(skb, RTA_IIF, iif);
|
|
|
|
} else if (dst) {
|
2010-06-10 23:31:35 -07:00
|
|
|
struct inet6_dev *idev = ip6_dst_idev(&rt->dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
struct in6_addr saddr_buf;
|
2008-08-14 15:33:21 -07:00
|
|
|
if (ipv6_dev_get_saddr(net, idev ? idev->dev : NULL,
|
2008-03-24 17:37:42 -07:00
|
|
|
dst, 0, &saddr_buf) == 0)
|
2006-08-22 00:01:27 -07:00
|
|
|
NLA_PUT(skb, RTA_PREFSRC, 16, &saddr_buf);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2006-08-22 00:01:27 -07:00
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
if (rtnetlink_put_metrics(skb, rt->dst.metrics) < 0)
|
2006-08-22 00:01:27 -07:00
|
|
|
goto nla_put_failure;
|
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
if (rt->dst.neighbour)
|
|
|
|
NLA_PUT(skb, RTA_GATEWAY, 16, &rt->dst.neighbour->primary_key);
|
2006-08-22 00:01:27 -07:00
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
if (rt->dst.dev)
|
2006-08-22 00:01:27 -07:00
|
|
|
NLA_PUT_U32(skb, RTA_OIF, rt->rt6i_dev->ifindex);
|
|
|
|
|
|
|
|
NLA_PUT_U32(skb, RTA_PRIORITY, rt->rt6i_metric);
|
2006-11-27 10:27:07 -07:00
|
|
|
|
2008-05-12 10:52:55 -07:00
|
|
|
if (!(rt->rt6i_flags & RTF_EXPIRES))
|
|
|
|
expires = 0;
|
|
|
|
else if (rt->rt6i_expires - jiffies < INT_MAX)
|
|
|
|
expires = rt->rt6i_expires - jiffies;
|
|
|
|
else
|
|
|
|
expires = INT_MAX;
|
2008-05-19 16:55:13 -07:00
|
|
|
|
2010-06-10 23:31:35 -07:00
|
|
|
if (rtnl_put_cacheinfo(skb, &rt->dst, 0, 0, 0,
|
|
|
|
expires, rt->dst.error) < 0)
|
2006-11-27 10:27:07 -07:00
|
|
|
goto nla_put_failure;
|
2006-08-22 00:01:27 -07:00
|
|
|
|
|
|
|
return nlmsg_end(skb, nlh);
|
|
|
|
|
|
|
|
nla_put_failure:
|
2007-02-01 00:16:40 -07:00
|
|
|
nlmsg_cancel(skb, nlh);
|
|
|
|
return -EMSGSIZE;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2006-08-10 23:11:17 -07:00
|
|
|
int rt6_dump_route(struct rt6_info *rt, void *p_arg)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
struct rt6_rtnl_dump_arg *arg = (struct rt6_rtnl_dump_arg *) p_arg;
|
|
|
|
int prefix;
|
|
|
|
|
2006-08-22 00:01:27 -07:00
|
|
|
if (nlmsg_len(arg->cb->nlh) >= sizeof(struct rtmsg)) {
|
|
|
|
struct rtmsg *rtm = nlmsg_data(arg->cb->nlh);
|
2005-04-16 15:20:36 -07:00
|
|
|
prefix = (rtm->rtm_flags & RTM_F_PREFIX) != 0;
|
|
|
|
} else
|
|
|
|
prefix = 0;
|
|
|
|
|
2008-08-14 15:33:21 -07:00
|
|
|
return rt6_fill_node(arg->net,
|
|
|
|
arg->skb, rt, NULL, NULL, 0, RTM_NEWROUTE,
|
2005-04-16 15:20:36 -07:00
|
|
|
NETLINK_CB(arg->cb->skb).pid, arg->cb->nlh->nlmsg_seq,
|
2008-04-02 17:22:53 -07:00
|
|
|
prefix, 0, NLM_F_MULTI);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2007-03-22 11:58:32 -07:00
|
|
|
static int inet6_rtm_getroute(struct sk_buff *in_skb, struct nlmsghdr* nlh, void *arg)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2008-03-25 10:26:21 -07:00
|
|
|
struct net *net = sock_net(in_skb->sk);
|
2006-08-22 00:01:47 -07:00
|
|
|
struct nlattr *tb[RTA_MAX+1];
|
|
|
|
struct rt6_info *rt;
|
2005-04-16 15:20:36 -07:00
|
|
|
struct sk_buff *skb;
|
2006-08-22 00:01:47 -07:00
|
|
|
struct rtmsg *rtm;
|
2005-04-16 15:20:36 -07:00
|
|
|
struct flowi fl;
|
2006-08-22 00:01:47 -07:00
|
|
|
int err, iif = 0;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:47 -07:00
|
|
|
err = nlmsg_parse(nlh, sizeof(*rtm), tb, RTA_MAX, rtm_ipv6_policy);
|
|
|
|
if (err < 0)
|
|
|
|
goto errout;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:47 -07:00
|
|
|
err = -EINVAL;
|
2005-04-16 15:20:36 -07:00
|
|
|
memset(&fl, 0, sizeof(fl));
|
|
|
|
|
2006-08-22 00:01:47 -07:00
|
|
|
if (tb[RTA_SRC]) {
|
|
|
|
if (nla_len(tb[RTA_SRC]) < sizeof(struct in6_addr))
|
|
|
|
goto errout;
|
|
|
|
|
|
|
|
ipv6_addr_copy(&fl.fl6_src, nla_data(tb[RTA_SRC]));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tb[RTA_DST]) {
|
|
|
|
if (nla_len(tb[RTA_DST]) < sizeof(struct in6_addr))
|
|
|
|
goto errout;
|
|
|
|
|
|
|
|
ipv6_addr_copy(&fl.fl6_dst, nla_data(tb[RTA_DST]));
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tb[RTA_IIF])
|
|
|
|
iif = nla_get_u32(tb[RTA_IIF]);
|
|
|
|
|
|
|
|
if (tb[RTA_OIF])
|
|
|
|
fl.oif = nla_get_u32(tb[RTA_OIF]);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
if (iif) {
|
|
|
|
struct net_device *dev;
|
2008-03-04 14:47:47 -07:00
|
|
|
dev = __dev_get_by_index(net, iif);
|
2005-04-16 15:20:36 -07:00
|
|
|
if (!dev) {
|
|
|
|
err = -ENODEV;
|
2006-08-22 00:01:47 -07:00
|
|
|
goto errout;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-08-22 00:01:47 -07:00
|
|
|
skb = alloc_skb(NLMSG_GOODSIZE, GFP_KERNEL);
|
|
|
|
if (skb == NULL) {
|
|
|
|
err = -ENOBUFS;
|
|
|
|
goto errout;
|
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2006-08-22 00:01:47 -07:00
|
|
|
/* Reserve room for dummy headers, this skb can pass
|
|
|
|
through good chunk of routing engine.
|
|
|
|
*/
|
2007-03-19 15:30:44 -07:00
|
|
|
skb_reset_mac_header(skb);
|
2006-08-22 00:01:47 -07:00
|
|
|
skb_reserve(skb, MAX_HEADER + sizeof(struct ipv6hdr));
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2008-03-07 12:14:16 -07:00
|
|
|
rt = (struct rt6_info*) ip6_route_output(net, NULL, &fl);
|
2010-06-10 23:31:35 -07:00
|
|
|
skb_dst_set(skb, &rt->dst);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2008-08-14 15:33:21 -07:00
|
|
|
err = rt6_fill_node(net, skb, rt, &fl.fl6_dst, &fl.fl6_src, iif,
|
2005-04-16 15:20:36 -07:00
|
|
|
RTM_NEWROUTE, NETLINK_CB(in_skb).pid,
|
2008-04-02 17:22:53 -07:00
|
|
|
nlh->nlmsg_seq, 0, 0, 0);
|
2005-04-16 15:20:36 -07:00
|
|
|
if (err < 0) {
|
2006-08-22 00:01:47 -07:00
|
|
|
kfree_skb(skb);
|
|
|
|
goto errout;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2008-03-04 14:47:47 -07:00
|
|
|
err = rtnl_unicast(skb, net, NETLINK_CB(in_skb).pid);
|
2006-08-22 00:01:47 -07:00
|
|
|
errout:
|
2005-04-16 15:20:36 -07:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2006-08-22 00:01:08 -07:00
|
|
|
void inet6_rt_notify(int event, struct rt6_info *rt, struct nl_info *info)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
2008-03-04 14:47:47 -07:00
|
|
|
struct net *net = info->nl_net;
|
2007-12-13 10:45:12 -07:00
|
|
|
u32 seq;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = -ENOBUFS;
|
|
|
|
seq = info->nlh != NULL ? info->nlh->nlmsg_seq : 0;
|
2006-08-22 00:01:08 -07:00
|
|
|
|
2006-11-10 15:10:15 -07:00
|
|
|
skb = nlmsg_new(rt6_nlmsg_size(), gfp_any());
|
2006-08-15 00:35:24 -07:00
|
|
|
if (skb == NULL)
|
|
|
|
goto errout;
|
|
|
|
|
2008-08-14 15:33:21 -07:00
|
|
|
err = rt6_fill_node(net, skb, rt, NULL, NULL, 0,
|
2008-04-02 17:22:53 -07:00
|
|
|
event, info->pid, seq, 0, 0, 0);
|
2007-02-01 00:16:40 -07:00
|
|
|
if (err < 0) {
|
|
|
|
/* -EMSGSIZE implies BUG in rt6_nlmsg_size() */
|
|
|
|
WARN_ON(err == -EMSGSIZE);
|
|
|
|
kfree_skb(skb);
|
|
|
|
goto errout;
|
|
|
|
}
|
2009-02-25 00:18:28 -07:00
|
|
|
rtnl_notify(skb, net, info->pid, RTNLGRP_IPV6_ROUTE,
|
|
|
|
info->nlh, gfp_any());
|
|
|
|
return;
|
2006-08-15 00:35:24 -07:00
|
|
|
errout:
|
|
|
|
if (err < 0)
|
2008-03-04 14:47:47 -07:00
|
|
|
rtnl_set_sk_err(net, RTNLGRP_IPV6_ROUTE, err);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
static int ip6_route_dev_notify(struct notifier_block *this,
|
|
|
|
unsigned long event, void *data)
|
|
|
|
{
|
|
|
|
struct net_device *dev = (struct net_device *)data;
|
2008-03-25 05:47:49 -07:00
|
|
|
struct net *net = dev_net(dev);
|
2008-03-04 14:48:30 -07:00
|
|
|
|
|
|
|
if (event == NETDEV_REGISTER && (dev->flags & IFF_LOOPBACK)) {
|
2010-06-10 23:31:35 -07:00
|
|
|
net->ipv6.ip6_null_entry->dst.dev = dev;
|
2008-03-04 14:48:30 -07:00
|
|
|
net->ipv6.ip6_null_entry->rt6i_idev = in6_dev_get(dev);
|
|
|
|
#ifdef CONFIG_IPV6_MULTIPLE_TABLES
|
2010-06-10 23:31:35 -07:00
|
|
|
net->ipv6.ip6_prohibit_entry->dst.dev = dev;
|
2008-03-04 14:48:30 -07:00
|
|
|
net->ipv6.ip6_prohibit_entry->rt6i_idev = in6_dev_get(dev);
|
2010-06-10 23:31:35 -07:00
|
|
|
net->ipv6.ip6_blk_hole_entry->dst.dev = dev;
|
2008-03-04 14:48:30 -07:00
|
|
|
net->ipv6.ip6_blk_hole_entry->rt6i_idev = in6_dev_get(dev);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
return NOTIFY_OK;
|
|
|
|
}
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
/*
|
|
|
|
* /proc
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifdef CONFIG_PROC_FS
|
|
|
|
|
|
|
|
#define RT6_INFO_LEN (32 + 4 + 32 + 4 + 32 + 40 + 5 + 1)
|
|
|
|
|
|
|
|
struct rt6_proc_arg
|
|
|
|
{
|
|
|
|
char *buffer;
|
|
|
|
int offset;
|
|
|
|
int length;
|
|
|
|
int skip;
|
|
|
|
int len;
|
|
|
|
};
|
|
|
|
|
|
|
|
static int rt6_info_route(struct rt6_info *rt, void *p_arg)
|
|
|
|
{
|
2007-11-06 06:27:11 -07:00
|
|
|
struct seq_file *m = p_arg;
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2008-10-29 12:50:24 -07:00
|
|
|
seq_printf(m, "%pi6 %02x ", &rt->rt6i_dst.addr, rt->rt6i_dst.plen);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
#ifdef CONFIG_IPV6_SUBTREES
|
2008-10-29 12:50:24 -07:00
|
|
|
seq_printf(m, "%pi6 %02x ", &rt->rt6i_src.addr, rt->rt6i_src.plen);
|
2005-04-16 15:20:36 -07:00
|
|
|
#else
|
2007-11-06 06:27:11 -07:00
|
|
|
seq_puts(m, "00000000000000000000000000000000 00 ");
|
2005-04-16 15:20:36 -07:00
|
|
|
#endif
|
|
|
|
|
|
|
|
if (rt->rt6i_nexthop) {
|
2008-10-29 12:50:24 -07:00
|
|
|
seq_printf(m, "%pi6", rt->rt6i_nexthop->primary_key);
|
2005-04-16 15:20:36 -07:00
|
|
|
} else {
|
2007-11-06 06:27:11 -07:00
|
|
|
seq_puts(m, "00000000000000000000000000000000");
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
2007-11-06 06:27:11 -07:00
|
|
|
seq_printf(m, " %08x %08x %08x %08x %8s\n",
|
2010-06-10 23:31:35 -07:00
|
|
|
rt->rt6i_metric, atomic_read(&rt->dst.__refcnt),
|
|
|
|
rt->dst.__use, rt->rt6i_flags,
|
2007-11-06 06:27:11 -07:00
|
|
|
rt->rt6i_dev ? rt->rt6i_dev->name : "");
|
2005-04-16 15:20:36 -07:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2007-11-06 06:27:11 -07:00
|
|
|
static int ipv6_route_show(struct seq_file *m, void *v)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2008-03-04 00:27:06 -07:00
|
|
|
struct net *net = (struct net *)m->private;
|
|
|
|
fib6_clean_all(net, rt6_info_route, 0, m);
|
2007-11-06 06:27:11 -07:00
|
|
|
return 0;
|
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
|
2007-11-06 06:27:11 -07:00
|
|
|
static int ipv6_route_open(struct inode *inode, struct file *file)
|
|
|
|
{
|
2008-07-18 04:07:21 -07:00
|
|
|
return single_open_net(inode, file, ipv6_route_show);
|
2008-03-04 00:27:06 -07:00
|
|
|
}
|
|
|
|
|
2007-11-06 06:27:11 -07:00
|
|
|
static const struct file_operations ipv6_route_proc_fops = {
|
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.open = ipv6_route_open,
|
|
|
|
.read = seq_read,
|
|
|
|
.llseek = seq_lseek,
|
2008-07-18 04:07:44 -07:00
|
|
|
.release = single_release_net,
|
2007-11-06 06:27:11 -07:00
|
|
|
};
|
|
|
|
|
2005-04-16 15:20:36 -07:00
|
|
|
static int rt6_stats_seq_show(struct seq_file *seq, void *v)
|
|
|
|
{
|
2008-03-04 14:46:23 -07:00
|
|
|
struct net *net = (struct net *)seq->private;
|
2005-04-16 15:20:36 -07:00
|
|
|
seq_printf(seq, "%04x %04x %04x %04x %04x %04x %04x\n",
|
2008-03-04 14:46:23 -07:00
|
|
|
net->ipv6.rt6_stats->fib_nodes,
|
|
|
|
net->ipv6.rt6_stats->fib_route_nodes,
|
|
|
|
net->ipv6.rt6_stats->fib_rt_alloc,
|
|
|
|
net->ipv6.rt6_stats->fib_rt_entries,
|
|
|
|
net->ipv6.rt6_stats->fib_rt_cache,
|
2010-10-07 23:37:34 -07:00
|
|
|
dst_entries_get_slow(&net->ipv6.ip6_dst_ops),
|
2008-03-04 14:46:23 -07:00
|
|
|
net->ipv6.rt6_stats->fib_discarded_routes);
|
2005-04-16 15:20:36 -07:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int rt6_stats_seq_open(struct inode *inode, struct file *file)
|
|
|
|
{
|
2008-07-18 04:07:21 -07:00
|
|
|
return single_open_net(inode, file, rt6_stats_seq_show);
|
2008-03-04 14:46:23 -07:00
|
|
|
}
|
|
|
|
|
2007-02-12 01:55:35 -07:00
|
|
|
static const struct file_operations rt6_stats_seq_fops = {
|
2005-04-16 15:20:36 -07:00
|
|
|
.owner = THIS_MODULE,
|
|
|
|
.open = rt6_stats_seq_open,
|
|
|
|
.read = seq_read,
|
|
|
|
.llseek = seq_lseek,
|
2008-07-18 04:07:44 -07:00
|
|
|
.release = single_release_net,
|
2005-04-16 15:20:36 -07:00
|
|
|
};
|
|
|
|
#endif /* CONFIG_PROC_FS */
|
|
|
|
|
|
|
|
#ifdef CONFIG_SYSCTL
|
|
|
|
|
|
|
|
static
|
2009-09-23 15:57:19 -07:00
|
|
|
int ipv6_sysctl_rtcache_flush(ctl_table *ctl, int write,
|
2005-04-16 15:20:36 -07:00
|
|
|
void __user *buffer, size_t *lenp, loff_t *ppos)
|
|
|
|
{
|
2008-03-04 00:28:58 -07:00
|
|
|
struct net *net = current->nsproxy->net_ns;
|
|
|
|
int delay = net->ipv6.sysctl.flush_delay;
|
2005-04-16 15:20:36 -07:00
|
|
|
if (write) {
|
2009-09-23 15:57:19 -07:00
|
|
|
proc_dointvec(ctl, write, buffer, lenp, ppos);
|
2008-03-04 00:28:58 -07:00
|
|
|
fib6_run_gc(delay <= 0 ? ~0UL : (unsigned long)delay, net);
|
2005-04-16 15:20:36 -07:00
|
|
|
return 0;
|
|
|
|
} else
|
|
|
|
return -EINVAL;
|
|
|
|
}
|
|
|
|
|
2008-01-10 03:53:43 -07:00
|
|
|
ctl_table ipv6_route_table_template[] = {
|
2007-02-09 07:24:49 -07:00
|
|
|
{
|
2005-04-16 15:20:36 -07:00
|
|
|
.procname = "flush",
|
2008-01-10 04:01:01 -07:00
|
|
|
.data = &init_net.ipv6.sysctl.flush_delay,
|
2005-04-16 15:20:36 -07:00
|
|
|
.maxlen = sizeof(int),
|
2005-04-28 12:11:49 -07:00
|
|
|
.mode = 0200,
|
2008-11-03 19:21:05 -07:00
|
|
|
.proc_handler = ipv6_sysctl_rtcache_flush
|
2005-04-16 15:20:36 -07:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "gc_thresh",
|
2008-03-04 14:48:53 -07:00
|
|
|
.data = &ip6_dst_ops_template.gc_thresh,
|
2005-04-16 15:20:36 -07:00
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
2008-11-03 19:21:05 -07:00
|
|
|
.proc_handler = proc_dointvec,
|
2005-04-16 15:20:36 -07:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "max_size",
|
2008-01-10 04:01:01 -07:00
|
|
|
.data = &init_net.ipv6.sysctl.ip6_rt_max_size,
|
2005-04-16 15:20:36 -07:00
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
2008-11-03 19:21:05 -07:00
|
|
|
.proc_handler = proc_dointvec,
|
2005-04-16 15:20:36 -07:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "gc_min_interval",
|
2008-01-10 04:01:01 -07:00
|
|
|
.data = &init_net.ipv6.sysctl.ip6_rt_gc_min_interval,
|
2005-04-16 15:20:36 -07:00
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
2008-11-03 19:21:05 -07:00
|
|
|
.proc_handler = proc_dointvec_jiffies,
|
2005-04-16 15:20:36 -07:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "gc_timeout",
|
2008-01-10 04:01:01 -07:00
|
|
|
.data = &init_net.ipv6.sysctl.ip6_rt_gc_timeout,
|
2005-04-16 15:20:36 -07:00
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
2008-11-03 19:21:05 -07:00
|
|
|
.proc_handler = proc_dointvec_jiffies,
|
2005-04-16 15:20:36 -07:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "gc_interval",
|
2008-01-10 04:01:01 -07:00
|
|
|
.data = &init_net.ipv6.sysctl.ip6_rt_gc_interval,
|
2005-04-16 15:20:36 -07:00
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
2008-11-03 19:21:05 -07:00
|
|
|
.proc_handler = proc_dointvec_jiffies,
|
2005-04-16 15:20:36 -07:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "gc_elasticity",
|
2008-01-10 04:01:01 -07:00
|
|
|
.data = &init_net.ipv6.sysctl.ip6_rt_gc_elasticity,
|
2005-04-16 15:20:36 -07:00
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
2010-08-14 22:42:51 -07:00
|
|
|
.proc_handler = proc_dointvec,
|
2005-04-16 15:20:36 -07:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "mtu_expires",
|
2008-01-10 04:01:01 -07:00
|
|
|
.data = &init_net.ipv6.sysctl.ip6_rt_mtu_expires,
|
2005-04-16 15:20:36 -07:00
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
2008-11-03 19:21:05 -07:00
|
|
|
.proc_handler = proc_dointvec_jiffies,
|
2005-04-16 15:20:36 -07:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "min_adv_mss",
|
2008-01-10 04:01:01 -07:00
|
|
|
.data = &init_net.ipv6.sysctl.ip6_rt_min_advmss,
|
2005-04-16 15:20:36 -07:00
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
2010-08-14 22:42:51 -07:00
|
|
|
.proc_handler = proc_dointvec,
|
2005-04-16 15:20:36 -07:00
|
|
|
},
|
|
|
|
{
|
|
|
|
.procname = "gc_min_interval_ms",
|
2008-01-10 04:01:01 -07:00
|
|
|
.data = &init_net.ipv6.sysctl.ip6_rt_gc_min_interval,
|
2005-04-16 15:20:36 -07:00
|
|
|
.maxlen = sizeof(int),
|
|
|
|
.mode = 0644,
|
2008-11-03 19:21:05 -07:00
|
|
|
.proc_handler = proc_dointvec_ms_jiffies,
|
2005-04-16 15:20:36 -07:00
|
|
|
},
|
2009-11-05 14:32:03 -07:00
|
|
|
{ }
|
2005-04-16 15:20:36 -07:00
|
|
|
};
|
|
|
|
|
2010-01-16 20:35:32 -07:00
|
|
|
struct ctl_table * __net_init ipv6_route_sysctl_init(struct net *net)
|
2008-01-10 03:53:43 -07:00
|
|
|
{
|
|
|
|
struct ctl_table *table;
|
|
|
|
|
|
|
|
table = kmemdup(ipv6_route_table_template,
|
|
|
|
sizeof(ipv6_route_table_template),
|
|
|
|
GFP_KERNEL);
|
2008-02-27 08:24:28 -07:00
|
|
|
|
|
|
|
if (table) {
|
|
|
|
table[0].data = &net->ipv6.sysctl.flush_delay;
|
2009-08-28 18:34:49 -07:00
|
|
|
table[1].data = &net->ipv6.ip6_dst_ops.gc_thresh;
|
2008-02-27 08:24:28 -07:00
|
|
|
table[2].data = &net->ipv6.sysctl.ip6_rt_max_size;
|
|
|
|
table[3].data = &net->ipv6.sysctl.ip6_rt_gc_min_interval;
|
|
|
|
table[4].data = &net->ipv6.sysctl.ip6_rt_gc_timeout;
|
|
|
|
table[5].data = &net->ipv6.sysctl.ip6_rt_gc_interval;
|
|
|
|
table[6].data = &net->ipv6.sysctl.ip6_rt_gc_elasticity;
|
|
|
|
table[7].data = &net->ipv6.sysctl.ip6_rt_mtu_expires;
|
|
|
|
table[8].data = &net->ipv6.sysctl.ip6_rt_min_advmss;
|
2009-12-18 21:11:03 -07:00
|
|
|
table[9].data = &net->ipv6.sysctl.ip6_rt_gc_min_interval;
|
2008-02-27 08:24:28 -07:00
|
|
|
}
|
|
|
|
|
2008-01-10 03:53:43 -07:00
|
|
|
return table;
|
|
|
|
}
|
2005-04-16 15:20:36 -07:00
|
|
|
#endif
|
|
|
|
|
2010-01-16 20:35:32 -07:00
|
|
|
static int __net_init ip6_route_net_init(struct net *net)
|
2008-03-04 14:45:33 -07:00
|
|
|
{
|
2008-04-21 14:25:23 -07:00
|
|
|
int ret = -ENOMEM;
|
2008-03-04 14:48:30 -07:00
|
|
|
|
2009-08-28 18:34:49 -07:00
|
|
|
memcpy(&net->ipv6.ip6_dst_ops, &ip6_dst_ops_template,
|
|
|
|
sizeof(net->ipv6.ip6_dst_ops));
|
2008-03-04 14:49:23 -07:00
|
|
|
|
2010-10-07 23:37:34 -07:00
|
|
|
if (dst_entries_init(&net->ipv6.ip6_dst_ops) < 0)
|
|
|
|
goto out_ip6_dst_ops;
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
net->ipv6.ip6_null_entry = kmemdup(&ip6_null_entry_template,
|
|
|
|
sizeof(*net->ipv6.ip6_null_entry),
|
|
|
|
GFP_KERNEL);
|
|
|
|
if (!net->ipv6.ip6_null_entry)
|
2010-10-07 23:37:34 -07:00
|
|
|
goto out_ip6_dst_entries;
|
2010-06-10 23:31:35 -07:00
|
|
|
net->ipv6.ip6_null_entry->dst.path =
|
2008-03-04 14:48:30 -07:00
|
|
|
(struct dst_entry *)net->ipv6.ip6_null_entry;
|
2010-06-10 23:31:35 -07:00
|
|
|
net->ipv6.ip6_null_entry->dst.ops = &net->ipv6.ip6_dst_ops;
|
2008-03-04 14:48:30 -07:00
|
|
|
|
|
|
|
#ifdef CONFIG_IPV6_MULTIPLE_TABLES
|
|
|
|
net->ipv6.ip6_prohibit_entry = kmemdup(&ip6_prohibit_entry_template,
|
|
|
|
sizeof(*net->ipv6.ip6_prohibit_entry),
|
|
|
|
GFP_KERNEL);
|
2008-10-07 14:12:10 -07:00
|
|
|
if (!net->ipv6.ip6_prohibit_entry)
|
|
|
|
goto out_ip6_null_entry;
|
2010-06-10 23:31:35 -07:00
|
|
|
net->ipv6.ip6_prohibit_entry->dst.path =
|
2008-03-04 14:48:30 -07:00
|
|
|
(struct dst_entry *)net->ipv6.ip6_prohibit_entry;
|
2010-06-10 23:31:35 -07:00
|
|
|
net->ipv6.ip6_prohibit_entry->dst.ops = &net->ipv6.ip6_dst_ops;
|
2008-03-04 14:48:30 -07:00
|
|
|
|
|
|
|
net->ipv6.ip6_blk_hole_entry = kmemdup(&ip6_blk_hole_entry_template,
|
|
|
|
sizeof(*net->ipv6.ip6_blk_hole_entry),
|
|
|
|
GFP_KERNEL);
|
2008-10-07 14:12:10 -07:00
|
|
|
if (!net->ipv6.ip6_blk_hole_entry)
|
|
|
|
goto out_ip6_prohibit_entry;
|
2010-06-10 23:31:35 -07:00
|
|
|
net->ipv6.ip6_blk_hole_entry->dst.path =
|
2008-03-04 14:48:30 -07:00
|
|
|
(struct dst_entry *)net->ipv6.ip6_blk_hole_entry;
|
2010-06-10 23:31:35 -07:00
|
|
|
net->ipv6.ip6_blk_hole_entry->dst.ops = &net->ipv6.ip6_dst_ops;
|
2008-03-04 14:48:30 -07:00
|
|
|
#endif
|
|
|
|
|
2008-10-07 14:15:00 -07:00
|
|
|
net->ipv6.sysctl.flush_delay = 0;
|
|
|
|
net->ipv6.sysctl.ip6_rt_max_size = 4096;
|
|
|
|
net->ipv6.sysctl.ip6_rt_gc_min_interval = HZ / 2;
|
|
|
|
net->ipv6.sysctl.ip6_rt_gc_timeout = 60*HZ;
|
|
|
|
net->ipv6.sysctl.ip6_rt_gc_interval = 30*HZ;
|
|
|
|
net->ipv6.sysctl.ip6_rt_gc_elasticity = 9;
|
|
|
|
net->ipv6.sysctl.ip6_rt_mtu_expires = 10*60*HZ;
|
|
|
|
net->ipv6.sysctl.ip6_rt_min_advmss = IPV6_MIN_MTU - 20 - 40;
|
|
|
|
|
2008-03-04 14:45:33 -07:00
|
|
|
#ifdef CONFIG_PROC_FS
|
|
|
|
proc_net_fops_create(net, "ipv6_route", 0, &ipv6_route_proc_fops);
|
|
|
|
proc_net_fops_create(net, "rt6_stats", S_IRUGO, &rt6_stats_seq_fops);
|
|
|
|
#endif
|
2008-03-04 14:49:47 -07:00
|
|
|
net->ipv6.ip6_rt_gc_expire = 30*HZ;
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
ret = 0;
|
|
|
|
out:
|
|
|
|
return ret;
|
2008-03-04 14:49:23 -07:00
|
|
|
|
2008-10-07 14:12:10 -07:00
|
|
|
#ifdef CONFIG_IPV6_MULTIPLE_TABLES
|
|
|
|
out_ip6_prohibit_entry:
|
|
|
|
kfree(net->ipv6.ip6_prohibit_entry);
|
|
|
|
out_ip6_null_entry:
|
|
|
|
kfree(net->ipv6.ip6_null_entry);
|
|
|
|
#endif
|
2010-10-07 23:37:34 -07:00
|
|
|
out_ip6_dst_entries:
|
|
|
|
dst_entries_destroy(&net->ipv6.ip6_dst_ops);
|
2008-03-04 14:49:23 -07:00
|
|
|
out_ip6_dst_ops:
|
|
|
|
goto out;
|
2008-03-04 14:45:33 -07:00
|
|
|
}
|
|
|
|
|
2010-01-16 20:35:32 -07:00
|
|
|
static void __net_exit ip6_route_net_exit(struct net *net)
|
2008-03-04 14:45:33 -07:00
|
|
|
{
|
|
|
|
#ifdef CONFIG_PROC_FS
|
|
|
|
proc_net_remove(net, "ipv6_route");
|
|
|
|
proc_net_remove(net, "rt6_stats");
|
|
|
|
#endif
|
2008-03-04 14:48:30 -07:00
|
|
|
kfree(net->ipv6.ip6_null_entry);
|
|
|
|
#ifdef CONFIG_IPV6_MULTIPLE_TABLES
|
|
|
|
kfree(net->ipv6.ip6_prohibit_entry);
|
|
|
|
kfree(net->ipv6.ip6_blk_hole_entry);
|
|
|
|
#endif
|
net dst: fix percpu_counter list corruption and poison overwritten
There're some percpu_counter list corruption and poison overwritten warnings
in recent kernel, which is resulted by fc66f95c.
commit fc66f95c switches to use percpu_counter, in ip6_route_net_init, kernel
init the percpu_counter for dst entries, but, the percpu_counter is never destroyed
in ip6_route_net_exit. So if the related data is freed by kernel, the freed percpu_counter
is still on the list, then if we insert/remove other percpu_counter, list corruption
resulted. Also, if the insert/remove option modifies the ->prev,->next pointer of
the freed value, the poison overwritten is resulted then.
With the following patch, the percpu_counter list corruption and poison overwritten
warnings disappeared.
Signed-off-by: Xiaotian Feng <dfeng@redhat.com>
Cc: "David S. Miller" <davem@davemloft.net>
Cc: Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
Cc: "Pekka Savola (ipv6)" <pekkas@netcore.fi>
Cc: James Morris <jmorris@namei.org>
Cc: Hideaki YOSHIFUJI <yoshfuji@linux-ipv6.org>
Cc: Patrick McHardy <kaber@trash.net>
Acked-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-11-02 09:11:05 -07:00
|
|
|
dst_entries_destroy(&net->ipv6.ip6_dst_ops);
|
2008-03-04 14:45:33 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct pernet_operations ip6_route_net_ops = {
|
|
|
|
.init = ip6_route_net_init,
|
|
|
|
.exit = ip6_route_net_exit,
|
|
|
|
};
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
static struct notifier_block ip6_route_dev_notifier = {
|
|
|
|
.notifier_call = ip6_route_dev_notify,
|
|
|
|
.priority = 0,
|
|
|
|
};
|
|
|
|
|
2007-12-07 01:43:48 -07:00
|
|
|
int __init ip6_route_init(void)
|
2005-04-16 15:20:36 -07:00
|
|
|
{
|
2007-12-07 01:43:48 -07:00
|
|
|
int ret;
|
|
|
|
|
2008-03-04 14:48:53 -07:00
|
|
|
ret = -ENOMEM;
|
|
|
|
ip6_dst_ops_template.kmem_cachep =
|
2006-08-26 19:25:52 -07:00
|
|
|
kmem_cache_create("ip6_dst_cache", sizeof(struct rt6_info), 0,
|
2007-12-07 01:45:16 -07:00
|
|
|
SLAB_HWCACHE_ALIGN, NULL);
|
2008-03-04 14:48:53 -07:00
|
|
|
if (!ip6_dst_ops_template.kmem_cachep)
|
2009-01-07 19:09:08 -07:00
|
|
|
goto out;
|
2007-05-24 18:17:54 -07:00
|
|
|
|
2010-10-07 23:37:34 -07:00
|
|
|
ret = dst_entries_init(&ip6_dst_blackhole_ops);
|
2008-03-04 14:48:30 -07:00
|
|
|
if (ret)
|
2008-03-04 14:48:10 -07:00
|
|
|
goto out_kmem_cache;
|
|
|
|
|
2010-10-07 23:37:34 -07:00
|
|
|
ret = register_pernet_subsys(&ip6_route_net_ops);
|
|
|
|
if (ret)
|
|
|
|
goto out_dst_entries;
|
|
|
|
|
2008-10-01 02:37:56 -07:00
|
|
|
ip6_dst_blackhole_ops.kmem_cachep = ip6_dst_ops_template.kmem_cachep;
|
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
/* Registering of the loopback is done before this portion of code,
|
|
|
|
* the loopback reference in rt6_info will not be taken, do it
|
|
|
|
* manually for init_net */
|
2010-06-10 23:31:35 -07:00
|
|
|
init_net.ipv6.ip6_null_entry->dst.dev = init_net.loopback_dev;
|
2008-03-04 14:48:30 -07:00
|
|
|
init_net.ipv6.ip6_null_entry->rt6i_idev = in6_dev_get(init_net.loopback_dev);
|
|
|
|
#ifdef CONFIG_IPV6_MULTIPLE_TABLES
|
2010-06-10 23:31:35 -07:00
|
|
|
init_net.ipv6.ip6_prohibit_entry->dst.dev = init_net.loopback_dev;
|
2008-03-04 14:48:30 -07:00
|
|
|
init_net.ipv6.ip6_prohibit_entry->rt6i_idev = in6_dev_get(init_net.loopback_dev);
|
2010-06-10 23:31:35 -07:00
|
|
|
init_net.ipv6.ip6_blk_hole_entry->dst.dev = init_net.loopback_dev;
|
2008-03-04 14:48:30 -07:00
|
|
|
init_net.ipv6.ip6_blk_hole_entry->rt6i_idev = in6_dev_get(init_net.loopback_dev);
|
|
|
|
#endif
|
2007-12-07 01:43:48 -07:00
|
|
|
ret = fib6_init();
|
|
|
|
if (ret)
|
2008-03-04 14:48:30 -07:00
|
|
|
goto out_register_subsys;
|
2007-12-07 01:43:48 -07:00
|
|
|
|
|
|
|
ret = xfrm6_init();
|
|
|
|
if (ret)
|
2008-03-04 14:45:33 -07:00
|
|
|
goto out_fib6_init;
|
2007-12-08 01:14:11 -07:00
|
|
|
|
2007-12-07 01:43:48 -07:00
|
|
|
ret = fib6_rules_init();
|
|
|
|
if (ret)
|
|
|
|
goto xfrm6_init;
|
2007-12-08 01:14:54 -07:00
|
|
|
|
2007-12-07 01:43:48 -07:00
|
|
|
ret = -ENOBUFS;
|
|
|
|
if (__rtnl_register(PF_INET6, RTM_NEWROUTE, inet6_rtm_newroute, NULL) ||
|
|
|
|
__rtnl_register(PF_INET6, RTM_DELROUTE, inet6_rtm_delroute, NULL) ||
|
|
|
|
__rtnl_register(PF_INET6, RTM_GETROUTE, inet6_rtm_getroute, NULL))
|
|
|
|
goto fib6_rules_init;
|
2007-03-22 11:58:32 -07:00
|
|
|
|
2008-03-04 14:48:30 -07:00
|
|
|
ret = register_netdevice_notifier(&ip6_route_dev_notifier);
|
2008-03-04 14:45:33 -07:00
|
|
|
if (ret)
|
|
|
|
goto fib6_rules_init;
|
2008-03-04 14:48:30 -07:00
|
|
|
|
2007-12-07 01:43:48 -07:00
|
|
|
out:
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
fib6_rules_init:
|
|
|
|
fib6_rules_cleanup();
|
|
|
|
xfrm6_init:
|
|
|
|
xfrm6_fini();
|
|
|
|
out_fib6_init:
|
|
|
|
fib6_gc_cleanup();
|
2008-03-04 14:48:30 -07:00
|
|
|
out_register_subsys:
|
|
|
|
unregister_pernet_subsys(&ip6_route_net_ops);
|
2010-10-07 23:37:34 -07:00
|
|
|
out_dst_entries:
|
|
|
|
dst_entries_destroy(&ip6_dst_blackhole_ops);
|
2007-12-07 01:43:48 -07:00
|
|
|
out_kmem_cache:
|
2008-03-04 14:49:23 -07:00
|
|
|
kmem_cache_destroy(ip6_dst_ops_template.kmem_cachep);
|
2007-12-07 01:43:48 -07:00
|
|
|
goto out;
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|
|
|
|
|
|
|
|
void ip6_route_cleanup(void)
|
|
|
|
{
|
2008-03-04 14:48:30 -07:00
|
|
|
unregister_netdevice_notifier(&ip6_route_dev_notifier);
|
2006-08-04 03:39:02 -07:00
|
|
|
fib6_rules_cleanup();
|
2005-04-16 15:20:36 -07:00
|
|
|
xfrm6_fini();
|
|
|
|
fib6_gc_cleanup();
|
2008-03-04 14:48:30 -07:00
|
|
|
unregister_pernet_subsys(&ip6_route_net_ops);
|
net dst: fix percpu_counter list corruption and poison overwritten
There're some percpu_counter list corruption and poison overwritten warnings
in recent kernel, which is resulted by fc66f95c.
commit fc66f95c switches to use percpu_counter, in ip6_route_net_init, kernel
init the percpu_counter for dst entries, but, the percpu_counter is never destroyed
in ip6_route_net_exit. So if the related data is freed by kernel, the freed percpu_counter
is still on the list, then if we insert/remove other percpu_counter, list corruption
resulted. Also, if the insert/remove option modifies the ->prev,->next pointer of
the freed value, the poison overwritten is resulted then.
With the following patch, the percpu_counter list corruption and poison overwritten
warnings disappeared.
Signed-off-by: Xiaotian Feng <dfeng@redhat.com>
Cc: "David S. Miller" <davem@davemloft.net>
Cc: Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
Cc: "Pekka Savola (ipv6)" <pekkas@netcore.fi>
Cc: James Morris <jmorris@namei.org>
Cc: Hideaki YOSHIFUJI <yoshfuji@linux-ipv6.org>
Cc: Patrick McHardy <kaber@trash.net>
Acked-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2010-11-02 09:11:05 -07:00
|
|
|
dst_entries_destroy(&ip6_dst_blackhole_ops);
|
2008-03-04 14:49:23 -07:00
|
|
|
kmem_cache_destroy(ip6_dst_ops_template.kmem_cachep);
|
2005-04-16 15:20:36 -07:00
|
|
|
}
|