Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net
This commit is contained in:
@ -111,7 +111,7 @@
|
||||
#include <net/secure_seq.h>
|
||||
|
||||
#define RT_FL_TOS(oldflp4) \
|
||||
((u32)(oldflp4->flowi4_tos & (IPTOS_RT_MASK | RTO_ONLINK)))
|
||||
((oldflp4)->flowi4_tos & (IPTOS_RT_MASK | RTO_ONLINK))
|
||||
|
||||
#define IP_MAX_MTU 0xFFF0
|
||||
|
||||
@ -1304,7 +1304,7 @@ static void rt_del(unsigned hash, struct rtable *rt)
|
||||
spin_unlock_bh(rt_hash_lock_addr(hash));
|
||||
}
|
||||
|
||||
static int check_peer_redir(struct dst_entry *dst, struct inet_peer *peer)
|
||||
static void check_peer_redir(struct dst_entry *dst, struct inet_peer *peer)
|
||||
{
|
||||
struct rtable *rt = (struct rtable *) dst;
|
||||
__be32 orig_gw = rt->rt_gateway;
|
||||
@ -1315,21 +1315,19 @@ static int check_peer_redir(struct dst_entry *dst, struct inet_peer *peer)
|
||||
rt->rt_gateway = peer->redirect_learned.a4;
|
||||
|
||||
n = ipv4_neigh_lookup(&rt->dst, &rt->rt_gateway);
|
||||
if (IS_ERR(n))
|
||||
return PTR_ERR(n);
|
||||
if (IS_ERR(n)) {
|
||||
rt->rt_gateway = orig_gw;
|
||||
return;
|
||||
}
|
||||
old_n = xchg(&rt->dst._neighbour, n);
|
||||
if (old_n)
|
||||
neigh_release(old_n);
|
||||
if (!n || !(n->nud_state & NUD_VALID)) {
|
||||
if (n)
|
||||
neigh_event_send(n, NULL);
|
||||
rt->rt_gateway = orig_gw;
|
||||
return -EAGAIN;
|
||||
if (!(n->nud_state & NUD_VALID)) {
|
||||
neigh_event_send(n, NULL);
|
||||
} else {
|
||||
rt->rt_flags |= RTCF_REDIRECTED;
|
||||
call_netevent_notifiers(NETEVENT_NEIGH_UPDATE, n);
|
||||
}
|
||||
return 0;
|
||||
}
|
||||
|
||||
/* called in rcu_read_lock() section */
|
||||
@ -1687,7 +1685,7 @@ static void ip_rt_update_pmtu(struct dst_entry *dst, u32 mtu)
|
||||
}
|
||||
|
||||
|
||||
static struct rtable *ipv4_validate_peer(struct rtable *rt)
|
||||
static void ipv4_validate_peer(struct rtable *rt)
|
||||
{
|
||||
if (rt->rt_peer_genid != rt_peer_genid()) {
|
||||
struct inet_peer *peer;
|
||||
@ -1702,15 +1700,12 @@ static struct rtable *ipv4_validate_peer(struct rtable *rt)
|
||||
if (peer->redirect_genid != redirect_genid)
|
||||
peer->redirect_learned.a4 = 0;
|
||||
if (peer->redirect_learned.a4 &&
|
||||
peer->redirect_learned.a4 != rt->rt_gateway) {
|
||||
if (check_peer_redir(&rt->dst, peer))
|
||||
return NULL;
|
||||
}
|
||||
peer->redirect_learned.a4 != rt->rt_gateway)
|
||||
check_peer_redir(&rt->dst, peer);
|
||||
}
|
||||
|
||||
rt->rt_peer_genid = rt_peer_genid();
|
||||
}
|
||||
return rt;
|
||||
}
|
||||
|
||||
static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie)
|
||||
@ -1719,7 +1714,7 @@ static struct dst_entry *ipv4_dst_check(struct dst_entry *dst, u32 cookie)
|
||||
|
||||
if (rt_is_expired(rt))
|
||||
return NULL;
|
||||
dst = (struct dst_entry *) ipv4_validate_peer(rt);
|
||||
ipv4_validate_peer(rt);
|
||||
return dst;
|
||||
}
|
||||
|
||||
@ -2374,9 +2369,7 @@ int ip_route_input_common(struct sk_buff *skb, __be32 daddr, __be32 saddr,
|
||||
rth->rt_mark == skb->mark &&
|
||||
net_eq(dev_net(rth->dst.dev), net) &&
|
||||
!rt_is_expired(rth)) {
|
||||
rth = ipv4_validate_peer(rth);
|
||||
if (!rth)
|
||||
continue;
|
||||
ipv4_validate_peer(rth);
|
||||
if (noref) {
|
||||
dst_use_noref(&rth->dst, jiffies);
|
||||
skb_dst_set_noref(skb, &rth->dst);
|
||||
@ -2435,11 +2428,11 @@ EXPORT_SYMBOL(ip_route_input_common);
|
||||
static struct rtable *__mkroute_output(const struct fib_result *res,
|
||||
const struct flowi4 *fl4,
|
||||
__be32 orig_daddr, __be32 orig_saddr,
|
||||
int orig_oif, struct net_device *dev_out,
|
||||
int orig_oif, __u8 orig_rtos,
|
||||
struct net_device *dev_out,
|
||||
unsigned int flags)
|
||||
{
|
||||
struct fib_info *fi = res->fi;
|
||||
u32 tos = RT_FL_TOS(fl4);
|
||||
struct in_device *in_dev;
|
||||
u16 type = res->type;
|
||||
struct rtable *rth;
|
||||
@ -2490,7 +2483,7 @@ static struct rtable *__mkroute_output(const struct fib_result *res,
|
||||
rth->rt_genid = rt_genid(dev_net(dev_out));
|
||||
rth->rt_flags = flags;
|
||||
rth->rt_type = type;
|
||||
rth->rt_key_tos = tos;
|
||||
rth->rt_key_tos = orig_rtos;
|
||||
rth->rt_dst = fl4->daddr;
|
||||
rth->rt_src = fl4->saddr;
|
||||
rth->rt_route_iif = 0;
|
||||
@ -2540,7 +2533,7 @@ static struct rtable *__mkroute_output(const struct fib_result *res,
|
||||
static struct rtable *ip_route_output_slow(struct net *net, struct flowi4 *fl4)
|
||||
{
|
||||
struct net_device *dev_out = NULL;
|
||||
u32 tos = RT_FL_TOS(fl4);
|
||||
__u8 tos = RT_FL_TOS(fl4);
|
||||
unsigned int flags = 0;
|
||||
struct fib_result res;
|
||||
struct rtable *rth;
|
||||
@ -2716,7 +2709,7 @@ static struct rtable *ip_route_output_slow(struct net *net, struct flowi4 *fl4)
|
||||
|
||||
make_route:
|
||||
rth = __mkroute_output(&res, fl4, orig_daddr, orig_saddr, orig_oif,
|
||||
dev_out, flags);
|
||||
tos, dev_out, flags);
|
||||
if (!IS_ERR(rth)) {
|
||||
unsigned int hash;
|
||||
|
||||
@ -2752,9 +2745,7 @@ struct rtable *__ip_route_output_key(struct net *net, struct flowi4 *flp4)
|
||||
(IPTOS_RT_MASK | RTO_ONLINK)) &&
|
||||
net_eq(dev_net(rth->dst.dev), net) &&
|
||||
!rt_is_expired(rth)) {
|
||||
rth = ipv4_validate_peer(rth);
|
||||
if (!rth)
|
||||
continue;
|
||||
ipv4_validate_peer(rth);
|
||||
dst_use(&rth->dst, jiffies);
|
||||
RT_CACHE_STAT_INC(out_hit);
|
||||
rcu_read_unlock_bh();
|
||||
|
Reference in New Issue
Block a user