Commit 67e1e2f4 authored by Guillaume Nault's avatar Guillaume Nault Committed by David S. Miller

ipv4: Avoid using RTO_ONLINK with ip_route_connect().

Now that ip_rt_fix_tos() doesn't reset ->flowi4_scope unconditionally,
we don't have to rely on the RTO_ONLINK bit to properly set the scope
of a flowi4 structure. We can just set ->flowi4_scope explicitly and
avoid using RTO_ONLINK in ->flowi4_tos.

This patch converts callers of ip_route_connect(). Instead of setting
the tos parameter with RT_CONN_FLAGS(sk), as all callers do, we can:

  1- Drop the tos parameter from ip_route_connect(): its value was
     entirely based on sk, which is also passed as parameter.

  2- Set ->flowi4_scope depending on the SOCK_LOCALROUTE socket option
     instead of always initialising it with RT_SCOPE_UNIVERSE (let's
     define ip_sock_rt_scope() for this purpose).

  3- Avoid overloading ->flowi4_tos with RTO_ONLINK: since the scope is
     now properly initialised, we don't need to tell ip_rt_fix_tos() to
     adjust ->flowi4_scope for us. So let's define ip_sock_rt_tos(),
     which is the same as RT_CONN_FLAGS() but without the RTO_ONLINK
     bit overload.

Note:
  In the original ip_route_connect() code, __ip_route_output_key()
  might clear the RTO_ONLINK bit of fl4->flowi4_tos (because of
  ip_rt_fix_tos()). Therefore flowi4_update_output() had to reuse the
  original tos variable. Now that we don't set RTO_ONLINK any more,
  this is not a problem and we can use fl4->flowi4_tos in
  flowi4_update_output().
Signed-off-by: default avatarGuillaume Nault <gnault@redhat.com>
Reviewed-by: default avatarDavid Ahern <dsahern@kernel.org>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent 16a28267
...@@ -43,6 +43,19 @@ ...@@ -43,6 +43,19 @@
#define RT_CONN_FLAGS(sk) (RT_TOS(inet_sk(sk)->tos) | sock_flag(sk, SOCK_LOCALROUTE)) #define RT_CONN_FLAGS(sk) (RT_TOS(inet_sk(sk)->tos) | sock_flag(sk, SOCK_LOCALROUTE))
#define RT_CONN_FLAGS_TOS(sk,tos) (RT_TOS(tos) | sock_flag(sk, SOCK_LOCALROUTE)) #define RT_CONN_FLAGS_TOS(sk,tos) (RT_TOS(tos) | sock_flag(sk, SOCK_LOCALROUTE))
static inline __u8 ip_sock_rt_scope(const struct sock *sk)
{
if (sock_flag(sk, SOCK_LOCALROUTE))
return RT_SCOPE_LINK;
return RT_SCOPE_UNIVERSE;
}
static inline __u8 ip_sock_rt_tos(const struct sock *sk)
{
return RT_TOS(inet_sk(sk)->tos);
}
struct ip_tunnel_info; struct ip_tunnel_info;
struct fib_nh; struct fib_nh;
struct fib_info; struct fib_info;
...@@ -289,39 +302,38 @@ static inline char rt_tos2priority(u8 tos) ...@@ -289,39 +302,38 @@ static inline char rt_tos2priority(u8 tos)
* ip_route_newports() calls. * ip_route_newports() calls.
*/ */
static inline void ip_route_connect_init(struct flowi4 *fl4, __be32 dst, __be32 src, static inline void ip_route_connect_init(struct flowi4 *fl4, __be32 dst,
u32 tos, int oif, u8 protocol, __be32 src, int oif, u8 protocol,
__be16 sport, __be16 dport, __be16 sport, __be16 dport,
struct sock *sk) const struct sock *sk)
{ {
__u8 flow_flags = 0; __u8 flow_flags = 0;
if (inet_sk(sk)->transparent) if (inet_sk(sk)->transparent)
flow_flags |= FLOWI_FLAG_ANYSRC; flow_flags |= FLOWI_FLAG_ANYSRC;
flowi4_init_output(fl4, oif, sk->sk_mark, tos, RT_SCOPE_UNIVERSE, flowi4_init_output(fl4, oif, sk->sk_mark, ip_sock_rt_tos(sk),
protocol, flow_flags, dst, src, dport, sport, ip_sock_rt_scope(sk), protocol, flow_flags, dst,
sk->sk_uid); src, dport, sport, sk->sk_uid);
} }
static inline struct rtable *ip_route_connect(struct flowi4 *fl4, static inline struct rtable *ip_route_connect(struct flowi4 *fl4, __be32 dst,
__be32 dst, __be32 src, u32 tos, __be32 src, int oif, u8 protocol,
int oif, u8 protocol,
__be16 sport, __be16 dport, __be16 sport, __be16 dport,
struct sock *sk) struct sock *sk)
{ {
struct net *net = sock_net(sk); struct net *net = sock_net(sk);
struct rtable *rt; struct rtable *rt;
ip_route_connect_init(fl4, dst, src, tos, oif, protocol, ip_route_connect_init(fl4, dst, src, oif, protocol, sport, dport, sk);
sport, dport, sk);
if (!dst || !src) { if (!dst || !src) {
rt = __ip_route_output_key(net, fl4); rt = __ip_route_output_key(net, fl4);
if (IS_ERR(rt)) if (IS_ERR(rt))
return rt; return rt;
ip_rt_put(rt); ip_rt_put(rt);
flowi4_update_output(fl4, oif, tos, fl4->daddr, fl4->saddr); flowi4_update_output(fl4, oif, fl4->flowi4_tos, fl4->daddr,
fl4->saddr);
} }
security_sk_classify_flow(sk, flowi4_to_flowi_common(fl4)); security_sk_classify_flow(sk, flowi4_to_flowi_common(fl4));
return ip_route_output_flow(net, fl4, sk); return ip_route_output_flow(net, fl4, sk);
......
...@@ -76,9 +76,8 @@ int dccp_v4_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len) ...@@ -76,9 +76,8 @@ int dccp_v4_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len)
orig_dport = usin->sin_port; orig_dport = usin->sin_port;
fl4 = &inet->cork.fl.u.ip4; fl4 = &inet->cork.fl.u.ip4;
rt = ip_route_connect(fl4, nexthop, inet->inet_saddr, rt = ip_route_connect(fl4, nexthop, inet->inet_saddr,
RT_CONN_FLAGS(sk), sk->sk_bound_dev_if, sk->sk_bound_dev_if, IPPROTO_DCCP, orig_sport,
IPPROTO_DCCP, orig_dport, sk);
orig_sport, orig_dport, sk);
if (IS_ERR(rt)) if (IS_ERR(rt))
return PTR_ERR(rt); return PTR_ERR(rt);
......
...@@ -1233,9 +1233,9 @@ static int inet_sk_reselect_saddr(struct sock *sk) ...@@ -1233,9 +1233,9 @@ static int inet_sk_reselect_saddr(struct sock *sk)
/* Query new route. */ /* Query new route. */
fl4 = &inet->cork.fl.u.ip4; fl4 = &inet->cork.fl.u.ip4;
rt = ip_route_connect(fl4, daddr, 0, RT_CONN_FLAGS(sk), rt = ip_route_connect(fl4, daddr, 0, sk->sk_bound_dev_if,
sk->sk_bound_dev_if, sk->sk_protocol, sk->sk_protocol, inet->inet_sport,
inet->inet_sport, inet->inet_dport, sk); inet->inet_dport, sk);
if (IS_ERR(rt)) if (IS_ERR(rt))
return PTR_ERR(rt); return PTR_ERR(rt);
......
...@@ -44,10 +44,9 @@ int __ip4_datagram_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len ...@@ -44,10 +44,9 @@ int __ip4_datagram_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len
saddr = inet->mc_addr; saddr = inet->mc_addr;
} }
fl4 = &inet->cork.fl.u.ip4; fl4 = &inet->cork.fl.u.ip4;
rt = ip_route_connect(fl4, usin->sin_addr.s_addr, saddr, rt = ip_route_connect(fl4, usin->sin_addr.s_addr, saddr, oif,
RT_CONN_FLAGS(sk), oif, sk->sk_protocol, inet->inet_sport,
sk->sk_protocol, usin->sin_port, sk);
inet->inet_sport, usin->sin_port, sk);
if (IS_ERR(rt)) { if (IS_ERR(rt)) {
err = PTR_ERR(rt); err = PTR_ERR(rt);
if (err == -ENETUNREACH) if (err == -ENETUNREACH)
......
...@@ -229,9 +229,8 @@ int tcp_v4_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len) ...@@ -229,9 +229,8 @@ int tcp_v4_connect(struct sock *sk, struct sockaddr *uaddr, int addr_len)
orig_dport = usin->sin_port; orig_dport = usin->sin_port;
fl4 = &inet->cork.fl.u.ip4; fl4 = &inet->cork.fl.u.ip4;
rt = ip_route_connect(fl4, nexthop, inet->inet_saddr, rt = ip_route_connect(fl4, nexthop, inet->inet_saddr,
RT_CONN_FLAGS(sk), sk->sk_bound_dev_if, sk->sk_bound_dev_if, IPPROTO_TCP, orig_sport,
IPPROTO_TCP, orig_dport, sk);
orig_sport, orig_dport, sk);
if (IS_ERR(rt)) { if (IS_ERR(rt)) {
err = PTR_ERR(rt); err = PTR_ERR(rt);
if (err == -ENETUNREACH) if (err == -ENETUNREACH)
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment