blob: 9b5fdc50519acfbc6ab9219579e742fe79193194 [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
Eric W. Biederman5f256be2007-09-12 11:50:50 +02002/*
3 * Operations on the network namespace
4 */
5#ifndef __NET_NET_NAMESPACE_H
6#define __NET_NET_NAMESPACE_H
7
Arun Sharma600634972011-07-26 16:09:06 -07008#include <linux/atomic.h>
Reshetova, Elenac122e142017-06-30 13:08:08 +03009#include <linux/refcount.h>
Eric W. Biederman5f256be2007-09-12 11:50:50 +020010#include <linux/workqueue.h>
11#include <linux/list.h>
David S. Millerbee95252011-05-26 16:40:37 -040012#include <linux/sysctl.h>
Tyler Hicksfbdeaed2018-07-20 21:56:53 +000013#include <linux/uidgid.h>
Eric W. Biederman5f256be2007-09-12 11:50:50 +020014
Cong Wang6a662712014-04-15 16:25:34 -070015#include <net/flow.h>
Pavel Emelyanov8efa6e92008-03-31 19:41:14 -070016#include <net/netns/core.h>
Pavel Emelyanov852566f52008-07-18 04:01:24 -070017#include <net/netns/mib.h>
Denis V. Luneva0a53c82007-12-11 04:19:17 -080018#include <net/netns/unix.h>
Denis V. Lunev2aaef4e2007-12-11 04:19:54 -080019#include <net/netns/packet.h>
Pavel Emelyanov8afd3512007-12-16 13:29:36 -080020#include <net/netns/ipv4.h>
Daniel Lezcanob0f159d2008-01-10 02:49:06 -080021#include <net/netns/ipv6.h>
Alexander Aring633fc862014-02-28 07:32:49 +010022#include <net/netns/ieee802154_6lowpan.h>
Eric W. Biederman4db67e82012-08-06 08:42:04 +000023#include <net/netns/sctp.h>
Pavel Emelyanov67019cc2008-04-13 22:28:42 -070024#include <net/netns/dccp.h>
Gao fengf3c1a442013-03-24 23:50:39 +000025#include <net/netns/netfilter.h>
Alexey Dobriyan8d870052008-01-31 04:02:13 -080026#include <net/netns/x_tables.h>
Alexey Dobriyandfdb8d72008-10-08 11:35:02 +020027#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
28#include <net/netns/conntrack.h>
29#endif
Pablo Neira Ayuso99633ab2013-10-10 23:28:33 +020030#include <net/netns/nftables.h>
Alexey Dobriyand62ddc22008-11-25 17:14:31 -080031#include <net/netns/xfrm.h>
Eric W. Biederman01891972015-03-03 19:10:47 -060032#include <net/netns/mpls.h>
Mario Kicherer8e8cda62017-02-21 12:19:47 +010033#include <net/netns/can.h>
Al Viro435d5f42014-10-31 22:56:04 -040034#include <linux/ns_common.h>
Pablo Neira Ayuso04c52de2015-06-17 10:28:25 -050035#include <linux/idr.h>
36#include <linux/skbuff.h>
Denis V. Luneva0a53c82007-12-11 04:19:17 -080037
Eric W. Biederman038e7332012-06-14 02:31:10 -070038struct user_namespace;
Eric W. Biederman457c4cb2007-09-12 12:01:34 +020039struct proc_dir_entry;
Eric W. Biederman2774c7a2007-09-26 22:10:56 -070040struct net_device;
Denis V. Lunev97c53ca2007-11-19 22:26:51 -080041struct sock;
Pavel Emelyanov1597fbc2007-12-01 23:51:01 +110042struct ctl_table_header;
Pavel Emelyanovdec827d2008-04-15 00:36:08 -070043struct net_generic;
Christian Brauner94e5e302018-03-19 13:17:30 +010044struct uevent_sock;
Julian Anastasov2553d062011-03-04 12:18:07 +020045struct netns_ipvs;
Pavel Emelyanov1597fbc2007-12-01 23:51:01 +110046
Eric Dumazet7c28bd02009-10-24 06:13:17 -070047
48#define NETDEV_HASHBITS 8
49#define NETDEV_HASHENTRIES (1 << NETDEV_HASHBITS)
50
Eric W. Biederman5f256be2007-09-12 11:50:50 +020051struct net {
Reshetova, Elenac122e142017-06-30 13:08:08 +030052 refcount_t passive; /* To decided when the network
Al Viroa685e082011-06-08 21:13:01 -040053 * namespace should be freed.
54 */
Kirill Tkhai273c28b2018-01-12 18:28:31 +030055 refcount_t count; /* To decided when the network
Al Viroa685e082011-06-08 21:13:01 -040056 * namespace should be shut down.
Eric W. Biederman5f256be2007-09-12 11:50:50 +020057 */
Eric Dumazet8e602ce2010-10-14 05:56:18 +000058 spinlock_t rules_mod_lock;
59
Eric Dumazet33cf7c92015-03-11 18:53:14 -070060 atomic64_t cookie_gen;
61
Eric W. Biederman5f256be2007-09-12 11:50:50 +020062 struct list_head list; /* list of network namespaces */
Kirill Tkhai19efbd92018-02-19 12:58:38 +030063 struct list_head exit_list; /* To linked to call pernet exit
Kirill Tkhai4420bf22018-03-27 18:02:23 +030064 * methods on dead net (
65 * pernet_ops_rwsem read locked),
66 * or to unregister pernet ops
67 * (pernet_ops_rwsem write locked).
Kirill Tkhai19efbd92018-02-19 12:58:38 +030068 */
Kirill Tkhai65b7b5b2018-02-19 12:58:45 +030069 struct llist_node cleanup_list; /* namespaces on death row */
70
Eric W. Biederman038e7332012-06-14 02:31:10 -070071 struct user_namespace *user_ns; /* Owning user namespace */
Eric W. Biederman70328662016-08-08 14:33:23 -050072 struct ucounts *ucounts;
WANG Congde133462015-05-15 14:47:32 -070073 spinlock_t nsid_lock;
Nicolas Dichtel0c7aecd2015-01-15 15:11:15 +010074 struct idr netns_ids;
Eric W. Biederman038e7332012-06-14 02:31:10 -070075
Al Viro435d5f42014-10-31 22:56:04 -040076 struct ns_common ns;
Eric W. Biederman98f842e2011-06-15 10:21:48 -070077
Eric W. Biederman457c4cb2007-09-12 12:01:34 +020078 struct proc_dir_entry *proc_net;
79 struct proc_dir_entry *proc_net_stat;
Eric W. Biederman881d9662007-09-17 11:56:21 -070080
Al Viro73455092008-07-14 21:22:20 -040081#ifdef CONFIG_SYSCTL
82 struct ctl_table_set sysctls;
83#endif
Eric W. Biederman95bdfcc2007-11-30 23:55:42 +110084
Eric Dumazet8e602ce2010-10-14 05:56:18 +000085 struct sock *rtnl; /* rtnetlink socket */
86 struct sock *genl_sock;
Eric W. Biederman2774c7a2007-09-26 22:10:56 -070087
Christian Brauner94e5e302018-03-19 13:17:30 +010088 struct uevent_sock *uevent_sock; /* uevent socket */
89
Eric W. Biederman881d9662007-09-17 11:56:21 -070090 struct list_head dev_base_head;
91 struct hlist_head *dev_name_head;
92 struct hlist_head *dev_index_head;
Thomas Graf4e985ad2011-06-21 03:11:20 +000093 unsigned int dev_base_seq; /* protected by rtnl_mutex */
Pavel Emelyanovaa79e662012-08-08 21:53:19 +000094 int ifindex;
Eric W. Biederman50624c92013-09-23 21:19:49 -070095 unsigned int dev_unreg_count;
Denis V. Lunev97c53ca2007-11-19 22:26:51 -080096
Denis V. Lunev5fd30ee2008-01-10 03:20:28 -080097 /* core fib_rules */
98 struct list_head rules_ops;
Denis V. Lunev5fd30ee2008-01-10 03:20:28 -080099
Kirill Tkhai4420bf22018-03-27 18:02:23 +0300100 struct list_head fib_notifier_ops; /* Populated by
101 * register_pernet_subsys()
102 */
Eric Dumazet8e602ce2010-10-14 05:56:18 +0000103 struct net_device *loopback_dev; /* The loopback */
Pavel Emelyanov8efa6e92008-03-31 19:41:14 -0700104 struct netns_core core;
Pavel Emelyanov852566f52008-07-18 04:01:24 -0700105 struct netns_mib mib;
Denis V. Lunev2aaef4e2007-12-11 04:19:54 -0800106 struct netns_packet packet;
Denis V. Luneva0a53c82007-12-11 04:19:17 -0800107 struct netns_unix unx;
Pavel Emelyanov8afd3512007-12-16 13:29:36 -0800108 struct netns_ipv4 ipv4;
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000109#if IS_ENABLED(CONFIG_IPV6)
Daniel Lezcanob0f159d2008-01-10 02:49:06 -0800110 struct netns_ipv6 ipv6;
111#endif
Alexander Aring633fc862014-02-28 07:32:49 +0100112#if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN)
113 struct netns_ieee802154_lowpan ieee802154_lowpan;
114#endif
Eric W. Biederman4db67e82012-08-06 08:42:04 +0000115#if defined(CONFIG_IP_SCTP) || defined(CONFIG_IP_SCTP_MODULE)
116 struct netns_sctp sctp;
117#endif
Pavel Emelyanov67019cc2008-04-13 22:28:42 -0700118#if defined(CONFIG_IP_DCCP) || defined(CONFIG_IP_DCCP_MODULE)
119 struct netns_dccp dccp;
120#endif
Alexey Dobriyan8d870052008-01-31 04:02:13 -0800121#ifdef CONFIG_NETFILTER
Gao fengf3c1a442013-03-24 23:50:39 +0000122 struct netns_nf nf;
Alexey Dobriyan8d870052008-01-31 04:02:13 -0800123 struct netns_xt xt;
Alexey Dobriyandfdb8d72008-10-08 11:35:02 +0200124#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
125 struct netns_ct ct;
126#endif
Pablo Neira Ayuso99633ab2013-10-10 23:28:33 +0200127#if defined(CONFIG_NF_TABLES) || defined(CONFIG_NF_TABLES_MODULE)
128 struct netns_nftables nft;
129#endif
Amerigo Wangc038a762012-09-18 16:50:08 +0000130#if IS_ENABLED(CONFIG_NF_DEFRAG_IPV6)
131 struct netns_nf_frag nf_frag;
Eric Dumazet9ce7bc02018-06-13 10:11:56 -0700132 struct ctl_table_header *nf_frag_frags_hdr;
Amerigo Wangc038a762012-09-18 16:50:08 +0000133#endif
Alexey Dobriyancd8c20b2010-01-13 16:02:14 +0100134 struct sock *nfnl;
135 struct sock *nfnl_stash;
Andreas Schultz3499abb2015-08-05 17:51:45 +0200136#if IS_ENABLED(CONFIG_NETFILTER_NETLINK_ACCT)
137 struct list_head nfnl_acct_list;
138#endif
Pablo Neira19576c92015-12-09 14:07:40 +0100139#if IS_ENABLED(CONFIG_NF_CT_NETLINK_TIMEOUT)
140 struct list_head nfct_timeout_list;
141#endif
Alexey Dobriyan8d870052008-01-31 04:02:13 -0800142#endif
Johannes Berg3d23e342009-09-29 23:27:28 +0200143#ifdef CONFIG_WEXT_CORE
Johannes Bergb333b3d222009-06-24 01:34:48 +0000144 struct sk_buff_head wext_nlevents;
145#endif
Eric Dumazet1c877332010-10-25 03:20:11 +0000146 struct net_generic __rcu *gen;
Eric Dumazet8e602ce2010-10-14 05:56:18 +0000147
148 /* Note : following structs are cache line aligned */
149#ifdef CONFIG_XFRM
150 struct netns_xfrm xfrm;
151#endif
JunweiZhang8b4d14d2013-06-26 16:40:06 +0800152#if IS_ENABLED(CONFIG_IP_VS)
Hans Schillstrom61b1ab42011-01-03 14:44:42 +0100153 struct netns_ipvs *ipvs;
JunweiZhang8b4d14d2013-06-26 16:40:06 +0800154#endif
Eric W. Biederman01891972015-03-03 19:10:47 -0600155#if IS_ENABLED(CONFIG_MPLS)
156 struct netns_mpls mpls;
157#endif
Mario Kicherer8e8cda62017-02-21 12:19:47 +0100158#if IS_ENABLED(CONFIG_CAN)
159 struct netns_can can;
160#endif
Andrey Vagin51d7ccc2012-07-16 04:28:49 +0000161 struct sock *diag_nlsk;
Timo Teräs5aad1de2013-05-27 20:46:33 +0000162 atomic_t fnhe_genid;
Kees Cook3859a272016-10-28 01:22:25 -0700163} __randomize_layout;
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200164
Denis V. Lunevc0f39322008-04-02 00:10:28 -0700165#include <linux/seq_file_net.h>
166
Daniel Lezcano4fabcd72007-09-13 09:16:29 +0200167/* Init's network namespace */
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200168extern struct net init_net;
Denis V. Luneva4aa8342008-04-03 13:04:33 -0700169
Eric W. Biedermand727abc2012-06-14 02:16:42 -0700170#ifdef CONFIG_NET_NS
Joe Perchese67e16e2013-09-21 10:22:48 -0700171struct net *copy_net_ns(unsigned long flags, struct user_namespace *user_ns,
172 struct net *old_net);
Denis V. Lunev225c0a02008-04-02 00:09:29 -0700173
Tyler Hicksfbdeaed2018-07-20 21:56:53 +0000174void net_ns_get_ownership(const struct net *net, kuid_t *uid, kgid_t *gid);
175
Florian Westphal7866cc52017-05-30 11:38:12 +0200176void net_ns_barrier(void);
Eric W. Biedermand727abc2012-06-14 02:16:42 -0700177#else /* CONFIG_NET_NS */
178#include <linux/sched.h>
179#include <linux/nsproxy.h>
Eric W. Biederman038e7332012-06-14 02:31:10 -0700180static inline struct net *copy_net_ns(unsigned long flags,
181 struct user_namespace *user_ns, struct net *old_net)
Eric W. Biederman9dd776b2007-09-26 22:04:26 -0700182{
Eric W. Biedermand727abc2012-06-14 02:16:42 -0700183 if (flags & CLONE_NEWNET)
184 return ERR_PTR(-EINVAL);
185 return old_net;
Eric W. Biederman9dd776b2007-09-26 22:04:26 -0700186}
Florian Westphal7866cc52017-05-30 11:38:12 +0200187
Tyler Hicksfbdeaed2018-07-20 21:56:53 +0000188static inline void net_ns_get_ownership(const struct net *net,
189 kuid_t *uid, kgid_t *gid)
190{
191 *uid = GLOBAL_ROOT_UID;
192 *gid = GLOBAL_ROOT_GID;
193}
194
Florian Westphal7866cc52017-05-30 11:38:12 +0200195static inline void net_ns_barrier(void) {}
Eric W. Biedermand727abc2012-06-14 02:16:42 -0700196#endif /* CONFIG_NET_NS */
Denis V. Lunev225c0a02008-04-02 00:09:29 -0700197
198
199extern struct list_head net_namespace_list;
Eric W. Biederman9dd776b2007-09-26 22:04:26 -0700200
Joe Perchese67e16e2013-09-21 10:22:48 -0700201struct net *get_net_ns_by_pid(pid_t pid);
Stefan Hajnoczi0f5258c2016-11-18 09:41:46 +0000202struct net *get_net_ns_by_fd(int fd);
Johannes Berg30ffee82009-07-10 09:51:35 +0000203
Rashika Kheria535d3ae2014-02-09 22:29:14 +0530204#ifdef CONFIG_SYSCTL
205void ipx_register_sysctl(void);
206void ipx_unregister_sysctl(void);
207#else
208#define ipx_register_sysctl()
209#define ipx_unregister_sysctl()
210#endif
211
Pavel Emelyanovd4655792007-11-01 00:43:49 -0700212#ifdef CONFIG_NET_NS
Joe Perchese67e16e2013-09-21 10:22:48 -0700213void __put_net(struct net *net);
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200214
215static inline struct net *get_net(struct net *net)
216{
Kirill Tkhai273c28b2018-01-12 18:28:31 +0300217 refcount_inc(&net->count);
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200218 return net;
219}
220
Eric W. Biederman077130c2007-09-13 09:18:57 +0200221static inline struct net *maybe_get_net(struct net *net)
222{
223 /* Used when we know struct net exists but we
224 * aren't guaranteed a previous reference count
225 * exists. If the reference count is zero this
226 * function fails and returns NULL.
227 */
Kirill Tkhai273c28b2018-01-12 18:28:31 +0300228 if (!refcount_inc_not_zero(&net->count))
Eric W. Biederman077130c2007-09-13 09:18:57 +0200229 net = NULL;
230 return net;
231}
232
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200233static inline void put_net(struct net *net)
234{
Kirill Tkhai273c28b2018-01-12 18:28:31 +0300235 if (refcount_dec_and_test(&net->count))
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200236 __put_net(net);
237}
238
YOSHIFUJI Hideaki878628f2008-03-26 03:57:35 +0900239static inline
240int net_eq(const struct net *net1, const struct net *net2)
241{
242 return net1 == net2;
243}
Al Viroa685e082011-06-08 21:13:01 -0400244
Dan Streetman4ee806d2018-01-18 16:14:26 -0500245static inline int check_net(const struct net *net)
246{
David S. Miller3e3ab9c2018-01-29 10:14:59 -0500247 return refcount_read(&net->count) != 0;
Dan Streetman4ee806d2018-01-18 16:14:26 -0500248}
249
Joe Perchese67e16e2013-09-21 10:22:48 -0700250void net_drop_ns(void *);
Al Viroa685e082011-06-08 21:13:01 -0400251
Pavel Emelyanovd4655792007-11-01 00:43:49 -0700252#else
Eric W. Biedermanb9f75f42008-06-20 22:16:51 -0700253
Pavel Emelyanovd4655792007-11-01 00:43:49 -0700254static inline struct net *get_net(struct net *net)
255{
256 return net;
257}
258
259static inline void put_net(struct net *net)
260{
261}
262
Pavel Emelyanovd4655792007-11-01 00:43:49 -0700263static inline struct net *maybe_get_net(struct net *net)
264{
265 return net;
266}
YOSHIFUJI Hideaki878628f2008-03-26 03:57:35 +0900267
268static inline
269int net_eq(const struct net *net1, const struct net *net2)
270{
271 return 1;
272}
Al Viroa685e082011-06-08 21:13:01 -0400273
Dan Streetman4ee806d2018-01-18 16:14:26 -0500274static inline int check_net(const struct net *net)
275{
276 return 1;
277}
278
Al Viroa685e082011-06-08 21:13:01 -0400279#define net_drop_ns NULL
Pavel Emelyanovd4655792007-11-01 00:43:49 -0700280#endif
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200281
Denis V. Lunev5d1e4462008-04-16 01:58:04 -0700282
Eric W. Biederman0c5c9fb2015-03-11 23:06:44 -0500283typedef struct {
Eric Dumazet8f424b52008-11-12 00:53:30 -0800284#ifdef CONFIG_NET_NS
Eric W. Biederman0c5c9fb2015-03-11 23:06:44 -0500285 struct net *net;
Eric Dumazet8f424b52008-11-12 00:53:30 -0800286#endif
Eric W. Biederman0c5c9fb2015-03-11 23:06:44 -0500287} possible_net_t;
288
289static inline void write_pnet(possible_net_t *pnet, struct net *net)
290{
291#ifdef CONFIG_NET_NS
292 pnet->net = net;
293#endif
294}
295
296static inline struct net *read_pnet(const possible_net_t *pnet)
297{
298#ifdef CONFIG_NET_NS
299 return pnet->net;
300#else
301 return &init_net;
302#endif
303}
Denis V. Lunev5d1e4462008-04-16 01:58:04 -0700304
Kirill Tkhaif0b07bb12018-03-29 19:20:32 +0300305/* Protected by net_rwsem */
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200306#define for_each_net(VAR) \
307 list_for_each_entry(VAR, &net_namespace_list, list)
308
Johannes Berg11a28d32009-07-10 09:51:33 +0000309#define for_each_net_rcu(VAR) \
310 list_for_each_entry_rcu(VAR, &net_namespace_list, list)
311
Pavel Emelyanov46650792007-10-08 20:38:39 -0700312#ifdef CONFIG_NET_NS
313#define __net_init
314#define __net_exit
Denis V. Lunev022cbae2007-11-13 03:23:50 -0800315#define __net_initdata
Andi Kleen04a6f822012-10-04 17:12:11 -0700316#define __net_initconst
Pavel Emelyanov46650792007-10-08 20:38:39 -0700317#else
318#define __net_init __init
Fabian Frederickbd721ea2016-08-02 14:03:33 -0700319#define __net_exit __ref
Denis V. Lunev022cbae2007-11-13 03:23:50 -0800320#define __net_initdata __initdata
Andi Kleen04a6f822012-10-04 17:12:11 -0700321#define __net_initconst __initconst
Pavel Emelyanov46650792007-10-08 20:38:39 -0700322#endif
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200323
Nicolas Dichtel7a0877d2015-05-07 11:02:49 +0200324int peernet2id_alloc(struct net *net, struct net *peer);
Nicolas Dichtel59324cf2015-05-07 11:02:53 +0200325int peernet2id(struct net *net, struct net *peer);
326bool peernet_has_id(struct net *net, struct net *peer);
Nicolas Dichtel0c7aecd2015-01-15 15:11:15 +0100327struct net *get_net_ns_by_id(struct net *net, int id);
328
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200329struct pernet_operations {
330 struct list_head list;
Kirill Tkhai6056415d2018-03-13 13:55:55 +0300331 /*
332 * Below methods are called without any exclusive locks.
333 * More than one net may be constructed and destructed
334 * in parallel on several cpus. Every pernet_operations
335 * have to keep in mind all other pernet_operations and
336 * to introduce a locking, if they share common resources.
337 *
Kirill Tkhai8518e9b2018-03-27 18:02:32 +0300338 * The only time they are called with exclusive lock is
339 * from register_pernet_subsys(), unregister_pernet_subsys()
340 * register_pernet_device() and unregister_pernet_device().
341 *
Kirill Tkhai6056415d2018-03-13 13:55:55 +0300342 * Exit methods using blocking RCU primitives, such as
343 * synchronize_rcu(), should be implemented via exit_batch.
344 * Then, destruction of a group of net requires single
345 * synchronize_rcu() related to these pernet_operations,
346 * instead of separate synchronize_rcu() for every net.
347 * Please, avoid synchronize_rcu() at all, where it's possible.
348 */
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200349 int (*init)(struct net *net);
350 void (*exit)(struct net *net);
Eric W. Biederman72ad9372009-12-03 02:29:03 +0000351 void (*exit_batch)(struct list_head *net_exit_list);
Alexey Dobriyanc7d03a02016-11-17 04:58:21 +0300352 unsigned int *id;
Eric W. Biedermanf875bae2009-11-29 22:25:28 +0000353 size_t size;
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200354};
355
Eric W. Biederman17edde52009-02-22 00:11:09 -0800356/*
357 * Use these carefully. If you implement a network device and it
358 * needs per network namespace operations use device pernet operations,
359 * otherwise use pernet subsys operations.
360 *
Johannes Berg4edf5472009-07-15 06:16:34 +0000361 * Network interfaces need to be removed from a dying netns _before_
362 * subsys notifiers can be called, as most of the network code cleanup
363 * (which is done from subsys notifiers) runs with the assumption that
364 * dev_remove_pack has been called so no new packets will arrive during
365 * and after the cleanup functions have been called. dev_remove_pack
366 * is not per namespace so instead the guarantee of no more packets
367 * arriving in a network namespace is provided by ensuring that all
368 * network devices and all sockets have left the network namespace
369 * before the cleanup methods are called.
Eric W. Biederman17edde52009-02-22 00:11:09 -0800370 *
371 * For the longest time the ipv4 icmp code was registered as a pernet
372 * device which caused kernel oops, and panics during network
373 * namespace cleanup. So please don't get this wrong.
374 */
Joe Perchese67e16e2013-09-21 10:22:48 -0700375int register_pernet_subsys(struct pernet_operations *);
376void unregister_pernet_subsys(struct pernet_operations *);
377int register_pernet_device(struct pernet_operations *);
378void unregister_pernet_device(struct pernet_operations *);
Eric W. Biedermanf875bae2009-11-29 22:25:28 +0000379
Eric W. Biederman95bdfcc2007-11-30 23:55:42 +1100380struct ctl_table;
381struct ctl_table_header;
Pavel Emelyanovd62c6122008-05-19 13:45:33 -0700382
Eric W. Biederman2ca794e2012-04-19 13:20:32 +0000383#ifdef CONFIG_SYSCTL
Joe Perchese67e16e2013-09-21 10:22:48 -0700384int net_sysctl_init(void);
385struct ctl_table_header *register_net_sysctl(struct net *net, const char *path,
386 struct ctl_table *table);
387void unregister_net_sysctl_table(struct ctl_table_header *header);
Eric W. Biederman48c74952012-04-23 12:13:02 +0000388#else
389static inline int net_sysctl_init(void) { return 0; }
390static inline struct ctl_table_header *register_net_sysctl(struct net *net,
391 const char *path, struct ctl_table *table)
392{
393 return NULL;
394}
395static inline void unregister_net_sysctl_table(struct ctl_table_header *header)
396{
397}
398#endif
399
fan.duca4c3fc2013-07-30 08:33:53 +0800400static inline int rt_genid_ipv4(struct net *net)
Nicolas Dichtelb42664f2012-09-10 22:09:44 +0000401{
fan.duca4c3fc2013-07-30 08:33:53 +0800402 return atomic_read(&net->ipv4.rt_genid);
Nicolas Dichtelb42664f2012-09-10 22:09:44 +0000403}
404
fan.duca4c3fc2013-07-30 08:33:53 +0800405static inline void rt_genid_bump_ipv4(struct net *net)
Nicolas Dichtelb42664f2012-09-10 22:09:44 +0000406{
fan.duca4c3fc2013-07-30 08:33:53 +0800407 atomic_inc(&net->ipv4.rt_genid);
408}
409
Hannes Frederic Sowa705f1c82014-09-28 00:46:06 +0200410extern void (*__fib6_flush_trees)(struct net *net);
fan.duca4c3fc2013-07-30 08:33:53 +0800411static inline void rt_genid_bump_ipv6(struct net *net)
412{
Hannes Frederic Sowa705f1c82014-09-28 00:46:06 +0200413 if (__fib6_flush_trees)
414 __fib6_flush_trees(net);
fan.duca4c3fc2013-07-30 08:33:53 +0800415}
fan.duca4c3fc2013-07-30 08:33:53 +0800416
Luis R. Rodriguez599018a2014-04-17 18:22:54 -0700417#if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN)
418static inline struct netns_ieee802154_lowpan *
419net_ieee802154_lowpan(struct net *net)
420{
421 return &net->ieee802154_lowpan;
422}
Luis R. Rodriguez599018a2014-04-17 18:22:54 -0700423#endif
424
fan.duca4c3fc2013-07-30 08:33:53 +0800425/* For callers who don't really care about whether it's IPv4 or IPv6 */
426static inline void rt_genid_bump_all(struct net *net)
427{
428 rt_genid_bump_ipv4(net);
429 rt_genid_bump_ipv6(net);
Nicolas Dichtelb42664f2012-09-10 22:09:44 +0000430}
Eric W. Biederman95bdfcc2007-11-30 23:55:42 +1100431
Timo Teräs5aad1de2013-05-27 20:46:33 +0000432static inline int fnhe_genid(struct net *net)
433{
434 return atomic_read(&net->fnhe_genid);
435}
436
437static inline void fnhe_genid_bump(struct net *net)
438{
439 atomic_inc(&net->fnhe_genid);
440}
441
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200442#endif /* __NET_NET_NAMESPACE_H */