diff options
Diffstat (limited to 'net/ipv4')
-rw-r--r-- | net/ipv4/af_inet.c | 2 | ||||
-rw-r--r-- | net/ipv4/inet_connection_sock.c | 2 | ||||
-rw-r--r-- | net/ipv4/ip_output.c | 2 | ||||
-rw-r--r-- | net/ipv4/raw.c | 2 | ||||
-rw-r--r-- | net/ipv4/route.c | 7 | ||||
-rw-r--r-- | net/ipv4/udp.c | 2 |
6 files changed, 9 insertions, 8 deletions
diff --git a/net/ipv4/af_inet.c b/net/ipv4/af_inet.c index bcf8c8a4a3ad..09ca5293d08f 100644 --- a/net/ipv4/af_inet.c +++ b/net/ipv4/af_inet.c | |||
@@ -1113,7 +1113,7 @@ int inet_sk_rebuild_header(struct sock *sk) | |||
1113 | }; | 1113 | }; |
1114 | 1114 | ||
1115 | security_sk_classify_flow(sk, &fl); | 1115 | security_sk_classify_flow(sk, &fl); |
1116 | err = ip_route_output_flow(&rt, &fl, sk, 0); | 1116 | err = ip_route_output_flow(&init_net, &rt, &fl, sk, 0); |
1117 | } | 1117 | } |
1118 | if (!err) | 1118 | if (!err) |
1119 | sk_setup_caps(sk, &rt->u.dst); | 1119 | sk_setup_caps(sk, &rt->u.dst); |
diff --git a/net/ipv4/inet_connection_sock.c b/net/ipv4/inet_connection_sock.c index 1c2a32f6bfc4..7801cceb2d1b 100644 --- a/net/ipv4/inet_connection_sock.c +++ b/net/ipv4/inet_connection_sock.c | |||
@@ -333,7 +333,7 @@ struct dst_entry* inet_csk_route_req(struct sock *sk, | |||
333 | .dport = ireq->rmt_port } } }; | 333 | .dport = ireq->rmt_port } } }; |
334 | 334 | ||
335 | security_req_classify_flow(req, &fl); | 335 | security_req_classify_flow(req, &fl); |
336 | if (ip_route_output_flow(&rt, &fl, sk, 0)) { | 336 | if (ip_route_output_flow(&init_net, &rt, &fl, sk, 0)) { |
337 | IP_INC_STATS_BH(IPSTATS_MIB_OUTNOROUTES); | 337 | IP_INC_STATS_BH(IPSTATS_MIB_OUTNOROUTES); |
338 | return NULL; | 338 | return NULL; |
339 | } | 339 | } |
diff --git a/net/ipv4/ip_output.c b/net/ipv4/ip_output.c index 8950d18001f1..6d78e1d6b785 100644 --- a/net/ipv4/ip_output.c +++ b/net/ipv4/ip_output.c | |||
@@ -350,7 +350,7 @@ int ip_queue_xmit(struct sk_buff *skb, int ipfragok) | |||
350 | * itself out. | 350 | * itself out. |
351 | */ | 351 | */ |
352 | security_sk_classify_flow(sk, &fl); | 352 | security_sk_classify_flow(sk, &fl); |
353 | if (ip_route_output_flow(&rt, &fl, sk, 0)) | 353 | if (ip_route_output_flow(&init_net, &rt, &fl, sk, 0)) |
354 | goto no_route; | 354 | goto no_route; |
355 | } | 355 | } |
356 | sk_setup_caps(sk, &rt->u.dst); | 356 | sk_setup_caps(sk, &rt->u.dst); |
diff --git a/net/ipv4/raw.c b/net/ipv4/raw.c index 91a52184351d..85c08696abbe 100644 --- a/net/ipv4/raw.c +++ b/net/ipv4/raw.c | |||
@@ -558,7 +558,7 @@ static int raw_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg, | |||
558 | } | 558 | } |
559 | 559 | ||
560 | security_sk_classify_flow(sk, &fl); | 560 | security_sk_classify_flow(sk, &fl); |
561 | err = ip_route_output_flow(&rt, &fl, sk, 1); | 561 | err = ip_route_output_flow(&init_net, &rt, &fl, sk, 1); |
562 | } | 562 | } |
563 | if (err) | 563 | if (err) |
564 | goto done; | 564 | goto done; |
diff --git a/net/ipv4/route.c b/net/ipv4/route.c index 971ab0253a09..c75fc20b07e2 100644 --- a/net/ipv4/route.c +++ b/net/ipv4/route.c | |||
@@ -2533,11 +2533,12 @@ static int ipv4_dst_blackhole(struct rtable **rp, struct flowi *flp, struct sock | |||
2533 | return (rt ? 0 : -ENOMEM); | 2533 | return (rt ? 0 : -ENOMEM); |
2534 | } | 2534 | } |
2535 | 2535 | ||
2536 | int ip_route_output_flow(struct rtable **rp, struct flowi *flp, struct sock *sk, int flags) | 2536 | int ip_route_output_flow(struct net *net, struct rtable **rp, struct flowi *flp, |
2537 | struct sock *sk, int flags) | ||
2537 | { | 2538 | { |
2538 | int err; | 2539 | int err; |
2539 | 2540 | ||
2540 | if ((err = __ip_route_output_key(&init_net, rp, flp)) != 0) | 2541 | if ((err = __ip_route_output_key(net, rp, flp)) != 0) |
2541 | return err; | 2542 | return err; |
2542 | 2543 | ||
2543 | if (flp->proto) { | 2544 | if (flp->proto) { |
@@ -2560,7 +2561,7 @@ EXPORT_SYMBOL_GPL(ip_route_output_flow); | |||
2560 | 2561 | ||
2561 | int ip_route_output_key(struct rtable **rp, struct flowi *flp) | 2562 | int ip_route_output_key(struct rtable **rp, struct flowi *flp) |
2562 | { | 2563 | { |
2563 | return ip_route_output_flow(rp, flp, NULL, 0); | 2564 | return ip_route_output_flow(&init_net, rp, flp, NULL, 0); |
2564 | } | 2565 | } |
2565 | 2566 | ||
2566 | static int rt_fill_info(struct sk_buff *skb, u32 pid, u32 seq, int event, | 2567 | static int rt_fill_info(struct sk_buff *skb, u32 pid, u32 seq, int event, |
diff --git a/net/ipv4/udp.c b/net/ipv4/udp.c index ecd9d91b30c6..2fb8d731026b 100644 --- a/net/ipv4/udp.c +++ b/net/ipv4/udp.c | |||
@@ -660,7 +660,7 @@ int udp_sendmsg(struct kiocb *iocb, struct sock *sk, struct msghdr *msg, | |||
660 | { .sport = inet->sport, | 660 | { .sport = inet->sport, |
661 | .dport = dport } } }; | 661 | .dport = dport } } }; |
662 | security_sk_classify_flow(sk, &fl); | 662 | security_sk_classify_flow(sk, &fl); |
663 | err = ip_route_output_flow(&rt, &fl, sk, 1); | 663 | err = ip_route_output_flow(&init_net, &rt, &fl, sk, 1); |
664 | if (err) { | 664 | if (err) { |
665 | if (err == -ENETUNREACH) | 665 | if (err == -ENETUNREACH) |
666 | IP_INC_STATS_BH(IPSTATS_MIB_OUTNOROUTES); | 666 | IP_INC_STATS_BH(IPSTATS_MIB_OUTNOROUTES); |