blob: 374cc7b260fcdf15a8fc2c709d0b0fc6d99e8c5c [file] [log] [blame]
Greg Kroah-Hartmanb2441312017-11-01 15:07:57 +01001/* SPDX-License-Identifier: GPL-2.0 */
Eric W. Biederman5f256be2007-09-12 11:50:50 +02002/*
3 * Operations on the network namespace
4 */
5#ifndef __NET_NET_NAMESPACE_H
6#define __NET_NET_NAMESPACE_H
7
Arun Sharma600634972011-07-26 16:09:06 -07008#include <linux/atomic.h>
Reshetova, Elenac122e142017-06-30 13:08:08 +03009#include <linux/refcount.h>
Eric W. Biederman5f256be2007-09-12 11:50:50 +020010#include <linux/workqueue.h>
11#include <linux/list.h>
David S. Millerbee95252011-05-26 16:40:37 -040012#include <linux/sysctl.h>
Tyler Hicksfbdeaed2018-07-20 21:56:53 +000013#include <linux/uidgid.h>
Eric W. Biederman5f256be2007-09-12 11:50:50 +020014
Cong Wang6a662712014-04-15 16:25:34 -070015#include <net/flow.h>
Pavel Emelyanov8efa6e92008-03-31 19:41:14 -070016#include <net/netns/core.h>
Pavel Emelyanov852566f52008-07-18 04:01:24 -070017#include <net/netns/mib.h>
Denis V. Luneva0a53c82007-12-11 04:19:17 -080018#include <net/netns/unix.h>
Denis V. Lunev2aaef4e2007-12-11 04:19:54 -080019#include <net/netns/packet.h>
Pavel Emelyanov8afd3512007-12-16 13:29:36 -080020#include <net/netns/ipv4.h>
Daniel Lezcanob0f159d2008-01-10 02:49:06 -080021#include <net/netns/ipv6.h>
David Ahernab84be72019-05-24 14:43:04 -070022#include <net/netns/nexthop.h>
Alexander Aring633fc862014-02-28 07:32:49 +010023#include <net/netns/ieee802154_6lowpan.h>
Eric W. Biederman4db67e82012-08-06 08:42:04 +000024#include <net/netns/sctp.h>
Gao fengf3c1a442013-03-24 23:50:39 +000025#include <net/netns/netfilter.h>
Alexey Dobriyandfdb8d72008-10-08 11:35:02 +020026#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
27#include <net/netns/conntrack.h>
28#endif
Pablo Neira Ayuso99633ab2013-10-10 23:28:33 +020029#include <net/netns/nftables.h>
Alexey Dobriyand62ddc22008-11-25 17:14:31 -080030#include <net/netns/xfrm.h>
Eric W. Biederman01891972015-03-03 19:10:47 -060031#include <net/netns/mpls.h>
Mario Kicherer8e8cda62017-02-21 12:19:47 +010032#include <net/netns/can.h>
Björn Töpel1d0dc062019-01-24 19:59:37 +010033#include <net/netns/xdp.h>
Guvenc Gulce194730a2021-06-16 16:52:58 +020034#include <net/netns/smc.h>
Jakub Sitnickia3fd7ce2020-05-31 10:28:36 +020035#include <net/netns/bpf.h>
Jeremy Kerr889b7da2021-07-29 10:20:45 +080036#include <net/netns/mctp.h>
Eric Dumazet9ba74e62021-12-09 23:44:21 -080037#include <net/net_trackers.h>
Al Viro435d5f42014-10-31 22:56:04 -040038#include <linux/ns_common.h>
Pablo Neira Ayuso04c52de2015-06-17 10:28:25 -050039#include <linux/idr.h>
40#include <linux/skbuff.h>
Jiri Pirkoa30c7b42019-09-30 10:15:10 +020041#include <linux/notifier.h>
Denis V. Luneva0a53c82007-12-11 04:19:17 -080042
Eric W. Biederman038e7332012-06-14 02:31:10 -070043struct user_namespace;
Eric W. Biederman457c4cb2007-09-12 12:01:34 +020044struct proc_dir_entry;
Eric W. Biederman2774c7a2007-09-26 22:10:56 -070045struct net_device;
Denis V. Lunev97c53ca2007-11-19 22:26:51 -080046struct sock;
Pavel Emelyanov1597fbc2007-12-01 23:51:01 +110047struct ctl_table_header;
Pavel Emelyanovdec827d2008-04-15 00:36:08 -070048struct net_generic;
Christian Brauner94e5e302018-03-19 13:17:30 +010049struct uevent_sock;
Julian Anastasov2553d062011-03-04 12:18:07 +020050struct netns_ipvs;
Petar Penkovd58e4682018-09-14 07:46:18 -070051struct bpf_prog;
Pavel Emelyanov1597fbc2007-12-01 23:51:01 +110052
Eric Dumazet7c28bd02009-10-24 06:13:17 -070053
54#define NETDEV_HASHBITS 8
55#define NETDEV_HASHENTRIES (1 << NETDEV_HASHBITS)
56
Eric W. Biederman5f256be2007-09-12 11:50:50 +020057struct net {
Eric Dumazet2a06b892019-10-18 15:20:05 -070058 /* First cache line can be often dirtied.
59 * Do not place here read-mostly fields.
60 */
Mike Rapoportaad12c22019-08-21 14:29:29 +030061 refcount_t passive; /* To decide when the network
Al Viroa685e082011-06-08 21:13:01 -040062 * namespace should be freed.
63 */
Eric Dumazet8e602ce2010-10-14 05:56:18 +000064 spinlock_t rules_mod_lock;
65
Eric Dumazet2a06b892019-10-18 15:20:05 -070066 unsigned int dev_unreg_count;
67
68 unsigned int dev_base_seq; /* protected by rtnl_mutex */
69 int ifindex;
70
71 spinlock_t nsid_lock;
72 atomic_t fnhe_genid;
Eric Dumazet33cf7c92015-03-11 18:53:14 -070073
Eric W. Biederman5f256be2007-09-12 11:50:50 +020074 struct list_head list; /* list of network namespaces */
Kirill Tkhai19efbd92018-02-19 12:58:38 +030075 struct list_head exit_list; /* To linked to call pernet exit
Kirill Tkhai4420bf22018-03-27 18:02:23 +030076 * methods on dead net (
77 * pernet_ops_rwsem read locked),
78 * or to unregister pernet ops
79 * (pernet_ops_rwsem write locked).
Kirill Tkhai19efbd92018-02-19 12:58:38 +030080 */
Kirill Tkhai65b7b5b2018-02-19 12:58:45 +030081 struct llist_node cleanup_list; /* namespaces on death row */
82
David Howells9b242612019-06-26 21:02:33 +010083#ifdef CONFIG_KEYS
84 struct key_tag *key_domain; /* Key domain of operation tag */
85#endif
Eric W. Biederman038e7332012-06-14 02:31:10 -070086 struct user_namespace *user_ns; /* Owning user namespace */
Eric W. Biederman70328662016-08-08 14:33:23 -050087 struct ucounts *ucounts;
Nicolas Dichtel0c7aecd2015-01-15 15:11:15 +010088 struct idr netns_ids;
Eric W. Biederman038e7332012-06-14 02:31:10 -070089
Al Viro435d5f42014-10-31 22:56:04 -040090 struct ns_common ns;
Eric Dumazet9ba74e62021-12-09 23:44:21 -080091 struct ref_tracker_dir refcnt_tracker;
Eric W. Biederman98f842e2011-06-15 10:21:48 -070092
Eric Dumazet2a06b892019-10-18 15:20:05 -070093 struct list_head dev_base_head;
Eric W. Biederman457c4cb2007-09-12 12:01:34 +020094 struct proc_dir_entry *proc_net;
95 struct proc_dir_entry *proc_net_stat;
Eric W. Biederman881d9662007-09-17 11:56:21 -070096
Al Viro73455092008-07-14 21:22:20 -040097#ifdef CONFIG_SYSCTL
98 struct ctl_table_set sysctls;
99#endif
Eric W. Biederman95bdfcc2007-11-30 23:55:42 +1100100
Eric Dumazet8e602ce2010-10-14 05:56:18 +0000101 struct sock *rtnl; /* rtnetlink socket */
102 struct sock *genl_sock;
Eric W. Biederman2774c7a2007-09-26 22:10:56 -0700103
Christian Brauner94e5e302018-03-19 13:17:30 +0100104 struct uevent_sock *uevent_sock; /* uevent socket */
105
Eric W. Biederman881d9662007-09-17 11:56:21 -0700106 struct hlist_head *dev_name_head;
107 struct hlist_head *dev_index_head;
Jiri Pirkoa30c7b42019-09-30 10:15:10 +0200108 struct raw_notifier_head netdev_chain;
109
Eric Dumazet2a06b892019-10-18 15:20:05 -0700110 /* Note that @hash_mix can be read millions times per second,
111 * it is critical that it is on a read_mostly cache line.
112 */
113 u32 hash_mix;
114
115 struct net_device *loopback_dev; /* The loopback */
Denis V. Lunev97c53ca2007-11-19 22:26:51 -0800116
Denis V. Lunev5fd30ee2008-01-10 03:20:28 -0800117 /* core fib_rules */
118 struct list_head rules_ops;
Denis V. Lunev5fd30ee2008-01-10 03:20:28 -0800119
Pavel Emelyanov8efa6e92008-03-31 19:41:14 -0700120 struct netns_core core;
Pavel Emelyanov852566f52008-07-18 04:01:24 -0700121 struct netns_mib mib;
Denis V. Lunev2aaef4e2007-12-11 04:19:54 -0800122 struct netns_packet packet;
Denis V. Luneva0a53c82007-12-11 04:19:17 -0800123 struct netns_unix unx;
David Ahernab84be72019-05-24 14:43:04 -0700124 struct netns_nexthop nexthop;
Pavel Emelyanov8afd3512007-12-16 13:29:36 -0800125 struct netns_ipv4 ipv4;
Eric Dumazetdfd56b82011-12-10 09:48:31 +0000126#if IS_ENABLED(CONFIG_IPV6)
Daniel Lezcanob0f159d2008-01-10 02:49:06 -0800127 struct netns_ipv6 ipv6;
128#endif
Alexander Aring633fc862014-02-28 07:32:49 +0100129#if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN)
130 struct netns_ieee802154_lowpan ieee802154_lowpan;
131#endif
Eric W. Biederman4db67e82012-08-06 08:42:04 +0000132#if defined(CONFIG_IP_SCTP) || defined(CONFIG_IP_SCTP_MODULE)
133 struct netns_sctp sctp;
134#endif
Alexey Dobriyan8d870052008-01-31 04:02:13 -0800135#ifdef CONFIG_NETFILTER
Gao fengf3c1a442013-03-24 23:50:39 +0000136 struct netns_nf nf;
Alexey Dobriyandfdb8d72008-10-08 11:35:02 +0200137#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
138 struct netns_ct ct;
139#endif
Pablo Neira Ayuso99633ab2013-10-10 23:28:33 +0200140#if defined(CONFIG_NF_TABLES) || defined(CONFIG_NF_TABLES_MODULE)
141 struct netns_nftables nft;
142#endif
Alexey Dobriyan8d870052008-01-31 04:02:13 -0800143#endif
Johannes Berg3d23e342009-09-29 23:27:28 +0200144#ifdef CONFIG_WEXT_CORE
Johannes Bergb333b3d222009-06-24 01:34:48 +0000145 struct sk_buff_head wext_nlevents;
146#endif
Eric Dumazet1c877332010-10-25 03:20:11 +0000147 struct net_generic __rcu *gen;
Eric Dumazet8e602ce2010-10-14 05:56:18 +0000148
Jakub Sitnickia3fd7ce2020-05-31 10:28:36 +0200149 /* Used to store attached BPF programs */
150 struct netns_bpf bpf;
Petar Penkovd58e4682018-09-14 07:46:18 -0700151
Eric Dumazet8e602ce2010-10-14 05:56:18 +0000152 /* Note : following structs are cache line aligned */
153#ifdef CONFIG_XFRM
154 struct netns_xfrm xfrm;
155#endif
Daniel Borkmannf3189032020-03-27 16:58:52 +0100156
Eric Dumazet3d368ab2021-02-10 06:41:44 -0800157 u64 net_cookie; /* written once */
Daniel Borkmannf3189032020-03-27 16:58:52 +0100158
JunweiZhang8b4d14d2013-06-26 16:40:06 +0800159#if IS_ENABLED(CONFIG_IP_VS)
Hans Schillstrom61b1ab42011-01-03 14:44:42 +0100160 struct netns_ipvs *ipvs;
JunweiZhang8b4d14d2013-06-26 16:40:06 +0800161#endif
Eric W. Biederman01891972015-03-03 19:10:47 -0600162#if IS_ENABLED(CONFIG_MPLS)
163 struct netns_mpls mpls;
164#endif
Mario Kicherer8e8cda62017-02-21 12:19:47 +0100165#if IS_ENABLED(CONFIG_CAN)
166 struct netns_can can;
167#endif
Björn Töpel1d0dc062019-01-24 19:59:37 +0100168#ifdef CONFIG_XDP_SOCKETS
169 struct netns_xdp xdp;
170#endif
Jeremy Kerr889b7da2021-07-29 10:20:45 +0800171#if IS_ENABLED(CONFIG_MCTP)
172 struct netns_mctp mctp;
173#endif
Ondrej Mosnacek91b05a72019-07-09 13:11:24 +0200174#if IS_ENABLED(CONFIG_CRYPTO_USER)
175 struct sock *crypto_nlsk;
176#endif
Andrey Vagin51d7ccc2012-07-16 04:28:49 +0000177 struct sock *diag_nlsk;
Guvenc Gulce194730a2021-06-16 16:52:58 +0200178#if IS_ENABLED(CONFIG_SMC)
179 struct netns_smc smc;
180#endif
Kees Cook3859a272016-10-28 01:22:25 -0700181} __randomize_layout;
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200182
Denis V. Lunevc0f39322008-04-02 00:10:28 -0700183#include <linux/seq_file_net.h>
184
Daniel Lezcano4fabcd72007-09-13 09:16:29 +0200185/* Init's network namespace */
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200186extern struct net init_net;
Denis V. Luneva4aa8342008-04-03 13:04:33 -0700187
Eric W. Biedermand727abc2012-06-14 02:16:42 -0700188#ifdef CONFIG_NET_NS
Joe Perchese67e16e2013-09-21 10:22:48 -0700189struct net *copy_net_ns(unsigned long flags, struct user_namespace *user_ns,
190 struct net *old_net);
Denis V. Lunev225c0a02008-04-02 00:09:29 -0700191
Tyler Hicksfbdeaed2018-07-20 21:56:53 +0000192void net_ns_get_ownership(const struct net *net, kuid_t *uid, kgid_t *gid);
193
Florian Westphal7866cc52017-05-30 11:38:12 +0200194void net_ns_barrier(void);
Changbin Duea6932d2021-06-11 22:29:59 +0800195
196struct ns_common *get_net_ns(struct ns_common *ns);
Changbin Due34492d2021-06-15 07:52:43 +0800197struct net *get_net_ns_by_fd(int fd);
Eric W. Biedermand727abc2012-06-14 02:16:42 -0700198#else /* CONFIG_NET_NS */
199#include <linux/sched.h>
200#include <linux/nsproxy.h>
Eric W. Biederman038e7332012-06-14 02:31:10 -0700201static inline struct net *copy_net_ns(unsigned long flags,
202 struct user_namespace *user_ns, struct net *old_net)
Eric W. Biederman9dd776b2007-09-26 22:04:26 -0700203{
Eric W. Biedermand727abc2012-06-14 02:16:42 -0700204 if (flags & CLONE_NEWNET)
205 return ERR_PTR(-EINVAL);
206 return old_net;
Eric W. Biederman9dd776b2007-09-26 22:04:26 -0700207}
Florian Westphal7866cc52017-05-30 11:38:12 +0200208
Tyler Hicksfbdeaed2018-07-20 21:56:53 +0000209static inline void net_ns_get_ownership(const struct net *net,
210 kuid_t *uid, kgid_t *gid)
211{
212 *uid = GLOBAL_ROOT_UID;
213 *gid = GLOBAL_ROOT_GID;
214}
215
Florian Westphal7866cc52017-05-30 11:38:12 +0200216static inline void net_ns_barrier(void) {}
Changbin Duea6932d2021-06-11 22:29:59 +0800217
218static inline struct ns_common *get_net_ns(struct ns_common *ns)
219{
220 return ERR_PTR(-EINVAL);
221}
Changbin Due34492d2021-06-15 07:52:43 +0800222
223static inline struct net *get_net_ns_by_fd(int fd)
224{
225 return ERR_PTR(-EINVAL);
226}
Eric W. Biedermand727abc2012-06-14 02:16:42 -0700227#endif /* CONFIG_NET_NS */
Denis V. Lunev225c0a02008-04-02 00:09:29 -0700228
229
230extern struct list_head net_namespace_list;
Eric W. Biederman9dd776b2007-09-26 22:04:26 -0700231
Joe Perchese67e16e2013-09-21 10:22:48 -0700232struct net *get_net_ns_by_pid(pid_t pid);
Johannes Berg30ffee82009-07-10 09:51:35 +0000233
Rashika Kheria535d3ae2014-02-09 22:29:14 +0530234#ifdef CONFIG_SYSCTL
235void ipx_register_sysctl(void);
236void ipx_unregister_sysctl(void);
237#else
238#define ipx_register_sysctl()
239#define ipx_unregister_sysctl()
240#endif
241
Pavel Emelyanovd4655792007-11-01 00:43:49 -0700242#ifdef CONFIG_NET_NS
Joe Perchese67e16e2013-09-21 10:22:48 -0700243void __put_net(struct net *net);
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200244
Eric Dumazet9ba74e62021-12-09 23:44:21 -0800245/* Try using get_net_track() instead */
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200246static inline struct net *get_net(struct net *net)
247{
Christian Brauner8b8f3e62020-08-19 14:06:36 +0200248 refcount_inc(&net->ns.count);
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200249 return net;
250}
251
Eric W. Biederman077130c2007-09-13 09:18:57 +0200252static inline struct net *maybe_get_net(struct net *net)
253{
254 /* Used when we know struct net exists but we
255 * aren't guaranteed a previous reference count
256 * exists. If the reference count is zero this
257 * function fails and returns NULL.
258 */
Christian Brauner8b8f3e62020-08-19 14:06:36 +0200259 if (!refcount_inc_not_zero(&net->ns.count))
Eric W. Biederman077130c2007-09-13 09:18:57 +0200260 net = NULL;
261 return net;
262}
263
Eric Dumazet9ba74e62021-12-09 23:44:21 -0800264/* Try using put_net_track() instead */
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200265static inline void put_net(struct net *net)
266{
Christian Brauner8b8f3e62020-08-19 14:06:36 +0200267 if (refcount_dec_and_test(&net->ns.count))
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200268 __put_net(net);
269}
270
YOSHIFUJI Hideaki878628f2008-03-26 03:57:35 +0900271static inline
272int net_eq(const struct net *net1, const struct net *net2)
273{
274 return net1 == net2;
275}
Al Viroa685e082011-06-08 21:13:01 -0400276
Dan Streetman4ee806d2018-01-18 16:14:26 -0500277static inline int check_net(const struct net *net)
278{
Christian Brauner8b8f3e62020-08-19 14:06:36 +0200279 return refcount_read(&net->ns.count) != 0;
Dan Streetman4ee806d2018-01-18 16:14:26 -0500280}
281
Joe Perchese67e16e2013-09-21 10:22:48 -0700282void net_drop_ns(void *);
Al Viroa685e082011-06-08 21:13:01 -0400283
Pavel Emelyanovd4655792007-11-01 00:43:49 -0700284#else
Eric W. Biedermanb9f75f42008-06-20 22:16:51 -0700285
Pavel Emelyanovd4655792007-11-01 00:43:49 -0700286static inline struct net *get_net(struct net *net)
287{
288 return net;
289}
290
291static inline void put_net(struct net *net)
292{
293}
294
Pavel Emelyanovd4655792007-11-01 00:43:49 -0700295static inline struct net *maybe_get_net(struct net *net)
296{
297 return net;
298}
YOSHIFUJI Hideaki878628f2008-03-26 03:57:35 +0900299
300static inline
301int net_eq(const struct net *net1, const struct net *net2)
302{
303 return 1;
304}
Al Viroa685e082011-06-08 21:13:01 -0400305
Dan Streetman4ee806d2018-01-18 16:14:26 -0500306static inline int check_net(const struct net *net)
307{
308 return 1;
309}
310
Al Viroa685e082011-06-08 21:13:01 -0400311#define net_drop_ns NULL
Pavel Emelyanovd4655792007-11-01 00:43:49 -0700312#endif
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200313
Denis V. Lunev5d1e4462008-04-16 01:58:04 -0700314
Eric Dumazet9ba74e62021-12-09 23:44:21 -0800315static inline void netns_tracker_alloc(struct net *net,
316 netns_tracker *tracker, gfp_t gfp)
317{
318#ifdef CONFIG_NET_NS_REFCNT_TRACKER
319 ref_tracker_alloc(&net->refcnt_tracker, tracker, gfp);
320#endif
321}
322
323static inline void netns_tracker_free(struct net *net,
324 netns_tracker *tracker)
325{
326#ifdef CONFIG_NET_NS_REFCNT_TRACKER
327 ref_tracker_free(&net->refcnt_tracker, tracker);
328#endif
329}
330
331static inline struct net *get_net_track(struct net *net,
332 netns_tracker *tracker, gfp_t gfp)
333{
334 get_net(net);
335 netns_tracker_alloc(net, tracker, gfp);
336 return net;
337}
338
339static inline void put_net_track(struct net *net, netns_tracker *tracker)
340{
341 netns_tracker_free(net, tracker);
342 put_net(net);
343}
344
Eric W. Biederman0c5c9fb2015-03-11 23:06:44 -0500345typedef struct {
Eric Dumazet8f424b52008-11-12 00:53:30 -0800346#ifdef CONFIG_NET_NS
Eric W. Biederman0c5c9fb2015-03-11 23:06:44 -0500347 struct net *net;
Eric Dumazet8f424b52008-11-12 00:53:30 -0800348#endif
Eric W. Biederman0c5c9fb2015-03-11 23:06:44 -0500349} possible_net_t;
350
351static inline void write_pnet(possible_net_t *pnet, struct net *net)
352{
353#ifdef CONFIG_NET_NS
354 pnet->net = net;
355#endif
356}
357
358static inline struct net *read_pnet(const possible_net_t *pnet)
359{
360#ifdef CONFIG_NET_NS
361 return pnet->net;
362#else
363 return &init_net;
364#endif
365}
Denis V. Lunev5d1e4462008-04-16 01:58:04 -0700366
Kirill Tkhaif0b07bb12018-03-29 19:20:32 +0300367/* Protected by net_rwsem */
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200368#define for_each_net(VAR) \
369 list_for_each_entry(VAR, &net_namespace_list, list)
Jiri Pirkoafa0df52019-09-30 10:15:09 +0200370#define for_each_net_continue_reverse(VAR) \
371 list_for_each_entry_continue_reverse(VAR, &net_namespace_list, list)
Johannes Berg11a28d32009-07-10 09:51:33 +0000372#define for_each_net_rcu(VAR) \
373 list_for_each_entry_rcu(VAR, &net_namespace_list, list)
374
Pavel Emelyanov46650792007-10-08 20:38:39 -0700375#ifdef CONFIG_NET_NS
376#define __net_init
377#define __net_exit
Denis V. Lunev022cbae2007-11-13 03:23:50 -0800378#define __net_initdata
Andi Kleen04a6f822012-10-04 17:12:11 -0700379#define __net_initconst
Pavel Emelyanov46650792007-10-08 20:38:39 -0700380#else
381#define __net_init __init
Fabian Frederickbd721ea2016-08-02 14:03:33 -0700382#define __net_exit __ref
Denis V. Lunev022cbae2007-11-13 03:23:50 -0800383#define __net_initdata __initdata
Andi Kleen04a6f822012-10-04 17:12:11 -0700384#define __net_initconst __initconst
Pavel Emelyanov46650792007-10-08 20:38:39 -0700385#endif
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200386
Guillaume Naultd4e4fdf2019-10-23 18:39:04 +0200387int peernet2id_alloc(struct net *net, struct net *peer, gfp_t gfp);
Guillaume Nault56f200c2020-01-16 21:16:46 +0100388int peernet2id(const struct net *net, struct net *peer);
389bool peernet_has_id(const struct net *net, struct net *peer);
390struct net *get_net_ns_by_id(const struct net *net, int id);
Nicolas Dichtel0c7aecd2015-01-15 15:11:15 +0100391
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200392struct pernet_operations {
393 struct list_head list;
Kirill Tkhai6056415d2018-03-13 13:55:55 +0300394 /*
395 * Below methods are called without any exclusive locks.
396 * More than one net may be constructed and destructed
397 * in parallel on several cpus. Every pernet_operations
398 * have to keep in mind all other pernet_operations and
399 * to introduce a locking, if they share common resources.
400 *
Kirill Tkhai8518e9b2018-03-27 18:02:32 +0300401 * The only time they are called with exclusive lock is
402 * from register_pernet_subsys(), unregister_pernet_subsys()
403 * register_pernet_device() and unregister_pernet_device().
404 *
Kirill Tkhai6056415d2018-03-13 13:55:55 +0300405 * Exit methods using blocking RCU primitives, such as
406 * synchronize_rcu(), should be implemented via exit_batch.
407 * Then, destruction of a group of net requires single
408 * synchronize_rcu() related to these pernet_operations,
409 * instead of separate synchronize_rcu() for every net.
410 * Please, avoid synchronize_rcu() at all, where it's possible.
Eric Dumazetd7d99872019-06-18 11:08:59 -0700411 *
412 * Note that a combination of pre_exit() and exit() can
413 * be used, since a synchronize_rcu() is guaranteed between
414 * the calls.
Kirill Tkhai6056415d2018-03-13 13:55:55 +0300415 */
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200416 int (*init)(struct net *net);
Eric Dumazetd7d99872019-06-18 11:08:59 -0700417 void (*pre_exit)(struct net *net);
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200418 void (*exit)(struct net *net);
Eric W. Biederman72ad9372009-12-03 02:29:03 +0000419 void (*exit_batch)(struct list_head *net_exit_list);
Alexey Dobriyanc7d03a02016-11-17 04:58:21 +0300420 unsigned int *id;
Eric W. Biedermanf875bae2009-11-29 22:25:28 +0000421 size_t size;
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200422};
423
Eric W. Biederman17edde52009-02-22 00:11:09 -0800424/*
425 * Use these carefully. If you implement a network device and it
426 * needs per network namespace operations use device pernet operations,
427 * otherwise use pernet subsys operations.
428 *
Johannes Berg4edf5472009-07-15 06:16:34 +0000429 * Network interfaces need to be removed from a dying netns _before_
430 * subsys notifiers can be called, as most of the network code cleanup
431 * (which is done from subsys notifiers) runs with the assumption that
432 * dev_remove_pack has been called so no new packets will arrive during
433 * and after the cleanup functions have been called. dev_remove_pack
434 * is not per namespace so instead the guarantee of no more packets
435 * arriving in a network namespace is provided by ensuring that all
436 * network devices and all sockets have left the network namespace
437 * before the cleanup methods are called.
Eric W. Biederman17edde52009-02-22 00:11:09 -0800438 *
439 * For the longest time the ipv4 icmp code was registered as a pernet
440 * device which caused kernel oops, and panics during network
441 * namespace cleanup. So please don't get this wrong.
442 */
Joe Perchese67e16e2013-09-21 10:22:48 -0700443int register_pernet_subsys(struct pernet_operations *);
444void unregister_pernet_subsys(struct pernet_operations *);
445int register_pernet_device(struct pernet_operations *);
446void unregister_pernet_device(struct pernet_operations *);
Eric W. Biedermanf875bae2009-11-29 22:25:28 +0000447
Eric W. Biederman95bdfcc2007-11-30 23:55:42 +1100448struct ctl_table;
Pavel Emelyanovd62c6122008-05-19 13:45:33 -0700449
Eric W. Biederman2ca794e2012-04-19 13:20:32 +0000450#ifdef CONFIG_SYSCTL
Joe Perchese67e16e2013-09-21 10:22:48 -0700451int net_sysctl_init(void);
452struct ctl_table_header *register_net_sysctl(struct net *net, const char *path,
453 struct ctl_table *table);
454void unregister_net_sysctl_table(struct ctl_table_header *header);
Eric W. Biederman48c74952012-04-23 12:13:02 +0000455#else
456static inline int net_sysctl_init(void) { return 0; }
457static inline struct ctl_table_header *register_net_sysctl(struct net *net,
458 const char *path, struct ctl_table *table)
459{
460 return NULL;
461}
462static inline void unregister_net_sysctl_table(struct ctl_table_header *header)
463{
464}
465#endif
466
Guillaume Nault56f200c2020-01-16 21:16:46 +0100467static inline int rt_genid_ipv4(const struct net *net)
Nicolas Dichtelb42664f2012-09-10 22:09:44 +0000468{
fan.duca4c3fc2013-07-30 08:33:53 +0800469 return atomic_read(&net->ipv4.rt_genid);
Nicolas Dichtelb42664f2012-09-10 22:09:44 +0000470}
471
David Ahern8f34e53b2020-05-01 08:53:08 -0600472#if IS_ENABLED(CONFIG_IPV6)
473static inline int rt_genid_ipv6(const struct net *net)
474{
475 return atomic_read(&net->ipv6.fib6_sernum);
476}
477#endif
478
fan.duca4c3fc2013-07-30 08:33:53 +0800479static inline void rt_genid_bump_ipv4(struct net *net)
Nicolas Dichtelb42664f2012-09-10 22:09:44 +0000480{
fan.duca4c3fc2013-07-30 08:33:53 +0800481 atomic_inc(&net->ipv4.rt_genid);
482}
483
Hannes Frederic Sowa705f1c82014-09-28 00:46:06 +0200484extern void (*__fib6_flush_trees)(struct net *net);
fan.duca4c3fc2013-07-30 08:33:53 +0800485static inline void rt_genid_bump_ipv6(struct net *net)
486{
Hannes Frederic Sowa705f1c82014-09-28 00:46:06 +0200487 if (__fib6_flush_trees)
488 __fib6_flush_trees(net);
fan.duca4c3fc2013-07-30 08:33:53 +0800489}
fan.duca4c3fc2013-07-30 08:33:53 +0800490
Luis R. Rodriguez599018a2014-04-17 18:22:54 -0700491#if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN)
492static inline struct netns_ieee802154_lowpan *
493net_ieee802154_lowpan(struct net *net)
494{
495 return &net->ieee802154_lowpan;
496}
Luis R. Rodriguez599018a2014-04-17 18:22:54 -0700497#endif
498
fan.duca4c3fc2013-07-30 08:33:53 +0800499/* For callers who don't really care about whether it's IPv4 or IPv6 */
500static inline void rt_genid_bump_all(struct net *net)
501{
502 rt_genid_bump_ipv4(net);
503 rt_genid_bump_ipv6(net);
Nicolas Dichtelb42664f2012-09-10 22:09:44 +0000504}
Eric W. Biederman95bdfcc2007-11-30 23:55:42 +1100505
Guillaume Nault56f200c2020-01-16 21:16:46 +0100506static inline int fnhe_genid(const struct net *net)
Timo Teräs5aad1de2013-05-27 20:46:33 +0000507{
508 return atomic_read(&net->fnhe_genid);
509}
510
511static inline void fnhe_genid_bump(struct net *net)
512{
513 atomic_inc(&net->fnhe_genid);
514}
515
Eric Dumazet9c1be1932022-02-05 09:01:25 -0800516#ifdef CONFIG_NET
517void net_ns_init(void);
518#else
519static inline void net_ns_init(void) {}
520#endif
521
Eric W. Biederman5f256be2007-09-12 11:50:50 +0200522#endif /* __NET_NET_NAMESPACE_H */