send-to-self-2.6.25-1.patch 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174
  1. diff -urp v2.6.25/linux/Documentation/filesystems/proc.txt linux/Documentation/filesystems/proc.txt
  2. --- v2.6.25/linux/Documentation/filesystems/proc.txt 2008-04-17 09:57:59.000000000 +0300
  3. +++ linux/Documentation/filesystems/proc.txt 2008-04-19 18:42:08.000000000 +0300
  4. @@ -1905,6 +1905,15 @@ log_martians
  5. Log packets with source addresses with no known route to kernel log.
  6. +loop
  7. +----
  8. +
  9. +By default (loop=0) the traffic between local IP addresses
  10. +is routed via interface "lo". Setting this flag for two
  11. +interfaces allows traffic between their IP addresses to
  12. +be looped externally. This is useful for setups where the
  13. +interfaces are attached to same broadcast medium.
  14. +
  15. mc_forwarding
  16. -------------
  17. diff -urp v2.6.25/linux/Documentation/networking/ip-sysctl.txt linux/Documentation/networking/ip-sysctl.txt
  18. --- v2.6.25/linux/Documentation/networking/ip-sysctl.txt 2008-04-17 09:57:59.000000000 +0300
  19. +++ linux/Documentation/networking/ip-sysctl.txt 2008-04-19 18:42:08.000000000 +0300
  20. @@ -627,6 +627,13 @@ accept_redirects - BOOLEAN
  21. forwarding - BOOLEAN
  22. Enable IP forwarding on this interface.
  23. +loop - BOOLEAN
  24. + By default (loop=0) the traffic between local IP addresses
  25. + is routed via interface "lo". Setting this flag for two
  26. + interfaces allows traffic between their IP addresses to
  27. + be looped externally. This is useful for setups where the
  28. + interfaces are attached to same broadcast medium.
  29. +
  30. mc_forwarding - BOOLEAN
  31. Do multicast routing. The kernel needs to be compiled with CONFIG_MROUTE
  32. and a multicast routing daemon is required.
  33. diff -urp v2.6.25/linux/include/linux/inetdevice.h linux/include/linux/inetdevice.h
  34. --- v2.6.25/linux/include/linux/inetdevice.h 2008-04-17 09:58:08.000000000 +0300
  35. +++ linux/include/linux/inetdevice.h 2008-04-19 18:42:08.000000000 +0300
  36. @@ -105,6 +105,7 @@ static inline void ipv4_devconf_setall(s
  37. IN_DEV_ORCONF((in_dev), ACCEPT_REDIRECTS)))
  38. #define IN_DEV_ARPFILTER(in_dev) IN_DEV_ORCONF((in_dev), ARPFILTER)
  39. +#define IN_DEV_LOOP(in_dev) IN_DEV_CONF_GET(in_dev, LOOP)
  40. #define IN_DEV_ARP_ANNOUNCE(in_dev) IN_DEV_MAXCONF((in_dev), ARP_ANNOUNCE)
  41. #define IN_DEV_ARP_IGNORE(in_dev) IN_DEV_MAXCONF((in_dev), ARP_IGNORE)
  42. diff -urp v2.6.25/linux/include/linux/sysctl.h linux/include/linux/sysctl.h
  43. --- v2.6.25/linux/include/linux/sysctl.h 2008-04-17 09:58:08.000000000 +0300
  44. +++ linux/include/linux/sysctl.h 2008-04-19 18:42:08.000000000 +0300
  45. @@ -490,6 +490,7 @@ enum
  46. NET_IPV4_CONF_ARP_IGNORE=19,
  47. NET_IPV4_CONF_PROMOTE_SECONDARIES=20,
  48. NET_IPV4_CONF_ARP_ACCEPT=21,
  49. + NET_IPV4_CONF_LOOP=22,
  50. __NET_IPV4_CONF_MAX
  51. };
  52. diff -urp v2.6.25/linux/kernel/sysctl_check.c linux/kernel/sysctl_check.c
  53. --- v2.6.25/linux/kernel/sysctl_check.c 2008-04-17 09:58:08.000000000 +0300
  54. +++ linux/kernel/sysctl_check.c 2008-04-19 18:42:08.000000000 +0300
  55. @@ -219,6 +219,7 @@ static const struct trans_ctl_table tran
  56. { NET_IPV4_CONF_ARP_IGNORE, "arp_ignore" },
  57. { NET_IPV4_CONF_PROMOTE_SECONDARIES, "promote_secondaries" },
  58. { NET_IPV4_CONF_ARP_ACCEPT, "arp_accept" },
  59. + { NET_IPV4_CONF_LOOP, "loop" },
  60. {}
  61. };
  62. diff -urp v2.6.25/linux/net/ipv4/devinet.c linux/net/ipv4/devinet.c
  63. --- v2.6.25/linux/net/ipv4/devinet.c 2008-04-17 09:58:09.000000000 +0300
  64. +++ linux/net/ipv4/devinet.c 2008-04-19 18:42:08.000000000 +0300
  65. @@ -1447,6 +1447,7 @@ static struct devinet_sysctl_table {
  66. DEVINET_SYSCTL_RW_ENTRY(ARP_ANNOUNCE, "arp_announce"),
  67. DEVINET_SYSCTL_RW_ENTRY(ARP_IGNORE, "arp_ignore"),
  68. DEVINET_SYSCTL_RW_ENTRY(ARP_ACCEPT, "arp_accept"),
  69. + DEVINET_SYSCTL_RW_ENTRY(LOOP, "loop"),
  70. DEVINET_SYSCTL_FLUSHING_ENTRY(NOXFRM, "disable_xfrm"),
  71. DEVINET_SYSCTL_FLUSHING_ENTRY(NOPOLICY, "disable_policy"),
  72. diff -urp v2.6.25/linux/net/ipv4/fib_frontend.c linux/net/ipv4/fib_frontend.c
  73. --- v2.6.25/linux/net/ipv4/fib_frontend.c 2008-04-17 09:58:09.000000000 +0300
  74. +++ linux/net/ipv4/fib_frontend.c 2008-04-19 18:43:47.000000000 +0300
  75. @@ -241,16 +241,17 @@ int fib_validate_source(__be32 src, __be
  76. .tos = tos } },
  77. .iif = oif };
  78. struct fib_result res;
  79. - int no_addr, rpf;
  80. + int no_addr, rpf, loop;
  81. int ret;
  82. struct net *net;
  83. - no_addr = rpf = 0;
  84. + no_addr = rpf = loop = 0;
  85. rcu_read_lock();
  86. in_dev = __in_dev_get_rcu(dev);
  87. if (in_dev) {
  88. no_addr = in_dev->ifa_list == NULL;
  89. rpf = IN_DEV_RPFILTER(in_dev);
  90. + loop = IN_DEV_LOOP(in_dev);
  91. }
  92. rcu_read_unlock();
  93. @@ -260,6 +261,11 @@ int fib_validate_source(__be32 src, __be
  94. net = dev->nd_net;
  95. if (fib_lookup(net, &fl, &res))
  96. goto last_resort;
  97. + if (loop && res.type == RTN_LOCAL) {
  98. + *spec_dst = FIB_RES_PREFSRC(res);
  99. + fib_res_put(&res);
  100. + return 0;
  101. + }
  102. if (res.type != RTN_UNICAST)
  103. goto e_inval_res;
  104. *spec_dst = FIB_RES_PREFSRC(res);
  105. diff -urp v2.6.25/linux/net/ipv4/route.c linux/net/ipv4/route.c
  106. --- v2.6.25/linux/net/ipv4/route.c 2008-04-17 09:58:09.000000000 +0300
  107. +++ linux/net/ipv4/route.c 2008-04-19 18:45:48.000000000 +0300
  108. @@ -2327,6 +2327,11 @@ static int ip_route_output_slow(struct n
  109. dev_put(dev_out);
  110. goto out; /* Wrong error code */
  111. }
  112. + err = -ENETDOWN;
  113. + if (!(dev_out->flags&IFF_UP)) {
  114. + dev_put(dev_out);
  115. + goto out;
  116. + }
  117. if (ipv4_is_local_multicast(oldflp->fl4_dst) ||
  118. oldflp->fl4_dst == htonl(0xFFFFFFFF)) {
  119. @@ -2394,10 +2399,41 @@ static int ip_route_output_slow(struct n
  120. free_res = 1;
  121. if (res.type == RTN_LOCAL) {
  122. - if (!fl.fl4_src)
  123. - fl.fl4_src = fl.fl4_dst;
  124. + struct in_device *in_dev;
  125. + __be32 src;
  126. +
  127. if (dev_out)
  128. dev_put(dev_out);
  129. + dev_out = FIB_RES_DEV(res);
  130. + in_dev = in_dev_get(dev_out);
  131. + src = fl.fl4_src? : FIB_RES_PREFSRC(res);
  132. + if (in_dev && IN_DEV_LOOP(in_dev) && src) {
  133. + struct net_device *dev_src;
  134. +
  135. + in_dev_put(in_dev);
  136. + in_dev = NULL;
  137. + dev_src = ip_dev_find(dev_out->nd_net, src);
  138. + if (dev_src && dev_src != dev_out &&
  139. + (in_dev = in_dev_get(dev_src)) &&
  140. + IN_DEV_LOOP(in_dev)) {
  141. + in_dev_put(in_dev);
  142. + dev_out = dev_src;
  143. + fl.fl4_src = src;
  144. + fl.oif = dev_out->ifindex;
  145. + res.type = RTN_UNICAST;
  146. + if (res.fi) {
  147. + fib_info_put(res.fi);
  148. + res.fi = NULL;
  149. + }
  150. + goto make_route;
  151. + }
  152. + if (dev_src)
  153. + dev_put(dev_src);
  154. + }
  155. + if (in_dev)
  156. + in_dev_put(in_dev);
  157. + if (!fl.fl4_src)
  158. + fl.fl4_src = fl.fl4_dst;
  159. dev_out = net->loopback_dev;
  160. dev_hold(dev_out);
  161. fl.oif = dev_out->ifindex;