1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */ 25f256becSEric W. Biederman /* 35f256becSEric W. Biederman * Operations on the network namespace 45f256becSEric W. Biederman */ 55f256becSEric W. Biederman #ifndef __NET_NET_NAMESPACE_H 65f256becSEric W. Biederman #define __NET_NET_NAMESPACE_H 75f256becSEric W. Biederman 860063497SArun Sharma #include <linux/atomic.h> 9c122e14dSReshetova, Elena #include <linux/refcount.h> 105f256becSEric W. Biederman #include <linux/workqueue.h> 115f256becSEric W. Biederman #include <linux/list.h> 12bee95250SDavid S. Miller #include <linux/sysctl.h> 13fbdeaed4STyler Hicks #include <linux/uidgid.h> 145f256becSEric W. Biederman 156a662719SCong Wang #include <net/flow.h> 168efa6e93SPavel Emelyanov #include <net/netns/core.h> 17852566f5SPavel Emelyanov #include <net/netns/mib.h> 18a0a53c8bSDenis V. Lunev #include <net/netns/unix.h> 192aaef4e4SDenis V. Lunev #include <net/netns/packet.h> 208afd351cSPavel Emelyanov #include <net/netns/ipv4.h> 21b0f159dbSDaniel Lezcano #include <net/netns/ipv6.h> 22ab84be7eSDavid Ahern #include <net/netns/nexthop.h> 23633fc86fSAlexander Aring #include <net/netns/ieee802154_6lowpan.h> 244db67e80SEric W. Biederman #include <net/netns/sctp.h> 2567019cc9SPavel Emelyanov #include <net/netns/dccp.h> 26f3c1a44aSGao feng #include <net/netns/netfilter.h> 278d870052SAlexey Dobriyan #include <net/netns/x_tables.h> 28dfdb8d79SAlexey Dobriyan #if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE) 29dfdb8d79SAlexey Dobriyan #include <net/netns/conntrack.h> 30dfdb8d79SAlexey Dobriyan #endif 3199633ab2SPablo Neira Ayuso #include <net/netns/nftables.h> 32d62ddc21SAlexey Dobriyan #include <net/netns/xfrm.h> 330189197fSEric W. Biederman #include <net/netns/mpls.h> 348e8cda6dSMario Kicherer #include <net/netns/can.h> 351d0dc069SBjörn Töpel #include <net/netns/xdp.h> 36a3fd7ceeSJakub Sitnicki #include <net/netns/bpf.h> 37435d5f4bSAl Viro #include <linux/ns_common.h> 3804c52decSPablo Neira Ayuso #include <linux/idr.h> 3904c52decSPablo Neira Ayuso #include <linux/skbuff.h> 40a30c7b42SJiri Pirko #include <linux/notifier.h> 41a0a53c8bSDenis V. Lunev 42038e7332SEric W. Biederman struct user_namespace; 43457c4cbcSEric W. Biederman struct proc_dir_entry; 442774c7abSEric W. Biederman struct net_device; 4597c53cacSDenis V. Lunev struct sock; 461597fbc0SPavel Emelyanov struct ctl_table_header; 47dec827d1SPavel Emelyanov struct net_generic; 4894e5e308SChristian Brauner struct uevent_sock; 492553d064SJulian Anastasov struct netns_ipvs; 50d58e468bSPetar Penkov struct bpf_prog; 511597fbc0SPavel Emelyanov 527c28bd0bSEric Dumazet 537c28bd0bSEric Dumazet #define NETDEV_HASHBITS 8 547c28bd0bSEric Dumazet #define NETDEV_HASHENTRIES (1 << NETDEV_HASHBITS) 557c28bd0bSEric Dumazet 565f256becSEric W. Biederman struct net { 572a06b898SEric Dumazet /* First cache line can be often dirtied. 582a06b898SEric Dumazet * Do not place here read-mostly fields. 592a06b898SEric Dumazet */ 60aad12c23SMike Rapoport refcount_t passive; /* To decide when the network 615f256becSEric W. Biederman * namespace should be freed. 625f256becSEric W. Biederman */ 638e602ce2SEric Dumazet spinlock_t rules_mod_lock; 648e602ce2SEric Dumazet 652a06b898SEric Dumazet unsigned int dev_unreg_count; 662a06b898SEric Dumazet 672a06b898SEric Dumazet unsigned int dev_base_seq; /* protected by rtnl_mutex */ 682a06b898SEric Dumazet int ifindex; 692a06b898SEric Dumazet 702a06b898SEric Dumazet spinlock_t nsid_lock; 712a06b898SEric Dumazet atomic_t fnhe_genid; 7233cf7c90SEric Dumazet 735f256becSEric W. Biederman struct list_head list; /* list of network namespaces */ 7419efbd93SKirill Tkhai struct list_head exit_list; /* To linked to call pernet exit 754420bf21SKirill Tkhai * methods on dead net ( 764420bf21SKirill Tkhai * pernet_ops_rwsem read locked), 774420bf21SKirill Tkhai * or to unregister pernet ops 784420bf21SKirill Tkhai * (pernet_ops_rwsem write locked). 7919efbd93SKirill Tkhai */ 8065b7b5b9SKirill Tkhai struct llist_node cleanup_list; /* namespaces on death row */ 8165b7b5b9SKirill Tkhai 829b242610SDavid Howells #ifdef CONFIG_KEYS 839b242610SDavid Howells struct key_tag *key_domain; /* Key domain of operation tag */ 849b242610SDavid Howells #endif 85038e7332SEric W. Biederman struct user_namespace *user_ns; /* Owning user namespace */ 8670328660SEric W. Biederman struct ucounts *ucounts; 870c7aecd4SNicolas Dichtel struct idr netns_ids; 88038e7332SEric W. Biederman 89435d5f4bSAl Viro struct ns_common ns; 9098f842e6SEric W. Biederman 912a06b898SEric Dumazet struct list_head dev_base_head; 92457c4cbcSEric W. Biederman struct proc_dir_entry *proc_net; 93457c4cbcSEric W. Biederman struct proc_dir_entry *proc_net_stat; 94881d966bSEric W. Biederman 9573455092SAl Viro #ifdef CONFIG_SYSCTL 9673455092SAl Viro struct ctl_table_set sysctls; 9773455092SAl Viro #endif 9895bdfccbSEric W. Biederman 998e602ce2SEric Dumazet struct sock *rtnl; /* rtnetlink socket */ 1008e602ce2SEric Dumazet struct sock *genl_sock; 1012774c7abSEric W. Biederman 10294e5e308SChristian Brauner struct uevent_sock *uevent_sock; /* uevent socket */ 10394e5e308SChristian Brauner 104881d966bSEric W. Biederman struct hlist_head *dev_name_head; 105881d966bSEric W. Biederman struct hlist_head *dev_index_head; 106a30c7b42SJiri Pirko struct raw_notifier_head netdev_chain; 107a30c7b42SJiri Pirko 1082a06b898SEric Dumazet /* Note that @hash_mix can be read millions times per second, 1092a06b898SEric Dumazet * it is critical that it is on a read_mostly cache line. 1102a06b898SEric Dumazet */ 1112a06b898SEric Dumazet u32 hash_mix; 1122a06b898SEric Dumazet 1132a06b898SEric Dumazet struct net_device *loopback_dev; /* The loopback */ 11497c53cacSDenis V. Lunev 1155fd30ee7SDenis V. Lunev /* core fib_rules */ 1165fd30ee7SDenis V. Lunev struct list_head rules_ops; 1175fd30ee7SDenis V. Lunev 1188efa6e93SPavel Emelyanov struct netns_core core; 119852566f5SPavel Emelyanov struct netns_mib mib; 1202aaef4e4SDenis V. Lunev struct netns_packet packet; 121a0a53c8bSDenis V. Lunev struct netns_unix unx; 122ab84be7eSDavid Ahern struct netns_nexthop nexthop; 1238afd351cSPavel Emelyanov struct netns_ipv4 ipv4; 124dfd56b8bSEric Dumazet #if IS_ENABLED(CONFIG_IPV6) 125b0f159dbSDaniel Lezcano struct netns_ipv6 ipv6; 126b0f159dbSDaniel Lezcano #endif 127633fc86fSAlexander Aring #if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN) 128633fc86fSAlexander Aring struct netns_ieee802154_lowpan ieee802154_lowpan; 129633fc86fSAlexander Aring #endif 1304db67e80SEric W. Biederman #if defined(CONFIG_IP_SCTP) || defined(CONFIG_IP_SCTP_MODULE) 1314db67e80SEric W. Biederman struct netns_sctp sctp; 1324db67e80SEric W. Biederman #endif 13367019cc9SPavel Emelyanov #if defined(CONFIG_IP_DCCP) || defined(CONFIG_IP_DCCP_MODULE) 13467019cc9SPavel Emelyanov struct netns_dccp dccp; 13567019cc9SPavel Emelyanov #endif 1368d870052SAlexey Dobriyan #ifdef CONFIG_NETFILTER 137f3c1a44aSGao feng struct netns_nf nf; 1388d870052SAlexey Dobriyan struct netns_xt xt; 139dfdb8d79SAlexey Dobriyan #if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE) 140dfdb8d79SAlexey Dobriyan struct netns_ct ct; 141dfdb8d79SAlexey Dobriyan #endif 14299633ab2SPablo Neira Ayuso #if defined(CONFIG_NF_TABLES) || defined(CONFIG_NF_TABLES_MODULE) 14399633ab2SPablo Neira Ayuso struct netns_nftables nft; 14499633ab2SPablo Neira Ayuso #endif 145c038a767SAmerigo Wang #if IS_ENABLED(CONFIG_NF_DEFRAG_IPV6) 146c038a767SAmerigo Wang struct netns_nf_frag nf_frag; 1479ce7bc03SEric Dumazet struct ctl_table_header *nf_frag_frags_hdr; 148c038a767SAmerigo Wang #endif 149cd8c20b6SAlexey Dobriyan struct sock *nfnl; 150cd8c20b6SAlexey Dobriyan struct sock *nfnl_stash; 1513499abb2SAndreas Schultz #if IS_ENABLED(CONFIG_NETFILTER_NETLINK_ACCT) 1523499abb2SAndreas Schultz struct list_head nfnl_acct_list; 1533499abb2SAndreas Schultz #endif 15419576c94SPablo Neira #if IS_ENABLED(CONFIG_NF_CT_NETLINK_TIMEOUT) 15519576c94SPablo Neira struct list_head nfct_timeout_list; 15619576c94SPablo Neira #endif 1578d870052SAlexey Dobriyan #endif 1583d23e349SJohannes Berg #ifdef CONFIG_WEXT_CORE 159b333b3d2SJohannes Berg struct sk_buff_head wext_nlevents; 160b333b3d2SJohannes Berg #endif 1611c87733dSEric Dumazet struct net_generic __rcu *gen; 1628e602ce2SEric Dumazet 163a3fd7ceeSJakub Sitnicki /* Used to store attached BPF programs */ 164a3fd7ceeSJakub Sitnicki struct netns_bpf bpf; 165d58e468bSPetar Penkov 1668e602ce2SEric Dumazet /* Note : following structs are cache line aligned */ 1678e602ce2SEric Dumazet #ifdef CONFIG_XFRM 1688e602ce2SEric Dumazet struct netns_xfrm xfrm; 1698e602ce2SEric Dumazet #endif 170f318903cSDaniel Borkmann 171f318903cSDaniel Borkmann atomic64_t net_cookie; /* written once */ 172f318903cSDaniel Borkmann 1738b4d14d8SJunweiZhang #if IS_ENABLED(CONFIG_IP_VS) 17461b1ab45SHans Schillstrom struct netns_ipvs *ipvs; 1758b4d14d8SJunweiZhang #endif 1760189197fSEric W. Biederman #if IS_ENABLED(CONFIG_MPLS) 1770189197fSEric W. Biederman struct netns_mpls mpls; 1780189197fSEric W. Biederman #endif 1798e8cda6dSMario Kicherer #if IS_ENABLED(CONFIG_CAN) 1808e8cda6dSMario Kicherer struct netns_can can; 1818e8cda6dSMario Kicherer #endif 1821d0dc069SBjörn Töpel #ifdef CONFIG_XDP_SOCKETS 1831d0dc069SBjörn Töpel struct netns_xdp xdp; 1841d0dc069SBjörn Töpel #endif 18591b05a7eSOndrej Mosnacek #if IS_ENABLED(CONFIG_CRYPTO_USER) 18691b05a7eSOndrej Mosnacek struct sock *crypto_nlsk; 18791b05a7eSOndrej Mosnacek #endif 18851d7cccfSAndrey Vagin struct sock *diag_nlsk; 1893859a271SKees Cook } __randomize_layout; 1905f256becSEric W. Biederman 191c0f39322SDenis V. Lunev #include <linux/seq_file_net.h> 192c0f39322SDenis V. Lunev 1934fabcd71SDaniel Lezcano /* Init's network namespace */ 1945f256becSEric W. Biederman extern struct net init_net; 195a4aa834aSDenis V. Lunev 196d727abcbSEric W. Biederman #ifdef CONFIG_NET_NS 197e67e16eaSJoe Perches struct net *copy_net_ns(unsigned long flags, struct user_namespace *user_ns, 198e67e16eaSJoe Perches struct net *old_net); 199225c0a01SDenis V. Lunev 200fbdeaed4STyler Hicks void net_ns_get_ownership(const struct net *net, kuid_t *uid, kgid_t *gid); 201fbdeaed4STyler Hicks 2027866cc57SFlorian Westphal void net_ns_barrier(void); 203d727abcbSEric W. Biederman #else /* CONFIG_NET_NS */ 204d727abcbSEric W. Biederman #include <linux/sched.h> 205d727abcbSEric W. Biederman #include <linux/nsproxy.h> 206038e7332SEric W. Biederman static inline struct net *copy_net_ns(unsigned long flags, 207038e7332SEric W. Biederman struct user_namespace *user_ns, struct net *old_net) 2089dd776b6SEric W. Biederman { 209d727abcbSEric W. Biederman if (flags & CLONE_NEWNET) 210d727abcbSEric W. Biederman return ERR_PTR(-EINVAL); 211d727abcbSEric W. Biederman return old_net; 2129dd776b6SEric W. Biederman } 2137866cc57SFlorian Westphal 214fbdeaed4STyler Hicks static inline void net_ns_get_ownership(const struct net *net, 215fbdeaed4STyler Hicks kuid_t *uid, kgid_t *gid) 216fbdeaed4STyler Hicks { 217fbdeaed4STyler Hicks *uid = GLOBAL_ROOT_UID; 218fbdeaed4STyler Hicks *gid = GLOBAL_ROOT_GID; 219fbdeaed4STyler Hicks } 220fbdeaed4STyler Hicks 2217866cc57SFlorian Westphal static inline void net_ns_barrier(void) {} 222d727abcbSEric W. Biederman #endif /* CONFIG_NET_NS */ 223225c0a01SDenis V. Lunev 224225c0a01SDenis V. Lunev 225225c0a01SDenis V. Lunev extern struct list_head net_namespace_list; 2269dd776b6SEric W. Biederman 227e67e16eaSJoe Perches struct net *get_net_ns_by_pid(pid_t pid); 2280f5258cdSStefan Hajnoczi struct net *get_net_ns_by_fd(int fd); 22930ffee84SJohannes Berg 2305a95cbb8SDaniel Borkmann u64 net_gen_cookie(struct net *net); 2315a95cbb8SDaniel Borkmann 232535d3ae9SRashika Kheria #ifdef CONFIG_SYSCTL 233535d3ae9SRashika Kheria void ipx_register_sysctl(void); 234535d3ae9SRashika Kheria void ipx_unregister_sysctl(void); 235535d3ae9SRashika Kheria #else 236535d3ae9SRashika Kheria #define ipx_register_sysctl() 237535d3ae9SRashika Kheria #define ipx_unregister_sysctl() 238535d3ae9SRashika Kheria #endif 239535d3ae9SRashika Kheria 240d4655795SPavel Emelyanov #ifdef CONFIG_NET_NS 241e67e16eaSJoe Perches void __put_net(struct net *net); 2425f256becSEric W. Biederman 2435f256becSEric W. Biederman static inline struct net *get_net(struct net *net) 2445f256becSEric W. Biederman { 245*8b8f3e66SChristian Brauner refcount_inc(&net->ns.count); 2465f256becSEric W. Biederman return net; 2475f256becSEric W. Biederman } 2485f256becSEric W. Biederman 249077130c0SEric W. Biederman static inline struct net *maybe_get_net(struct net *net) 250077130c0SEric W. Biederman { 251077130c0SEric W. Biederman /* Used when we know struct net exists but we 252077130c0SEric W. Biederman * aren't guaranteed a previous reference count 253077130c0SEric W. Biederman * exists. If the reference count is zero this 254077130c0SEric W. Biederman * function fails and returns NULL. 255077130c0SEric W. Biederman */ 256*8b8f3e66SChristian Brauner if (!refcount_inc_not_zero(&net->ns.count)) 257077130c0SEric W. Biederman net = NULL; 258077130c0SEric W. Biederman return net; 259077130c0SEric W. Biederman } 260077130c0SEric W. Biederman 2615f256becSEric W. Biederman static inline void put_net(struct net *net) 2625f256becSEric W. Biederman { 263*8b8f3e66SChristian Brauner if (refcount_dec_and_test(&net->ns.count)) 2645f256becSEric W. Biederman __put_net(net); 2655f256becSEric W. Biederman } 2665f256becSEric W. Biederman 267878628fbSYOSHIFUJI Hideaki static inline 268878628fbSYOSHIFUJI Hideaki int net_eq(const struct net *net1, const struct net *net2) 269878628fbSYOSHIFUJI Hideaki { 270878628fbSYOSHIFUJI Hideaki return net1 == net2; 271878628fbSYOSHIFUJI Hideaki } 272a685e089SAl Viro 2734ee806d5SDan Streetman static inline int check_net(const struct net *net) 2744ee806d5SDan Streetman { 275*8b8f3e66SChristian Brauner return refcount_read(&net->ns.count) != 0; 2764ee806d5SDan Streetman } 2774ee806d5SDan Streetman 278e67e16eaSJoe Perches void net_drop_ns(void *); 279a685e089SAl Viro 280d4655795SPavel Emelyanov #else 281b9f75f45SEric W. Biederman 282d4655795SPavel Emelyanov static inline struct net *get_net(struct net *net) 283d4655795SPavel Emelyanov { 284d4655795SPavel Emelyanov return net; 285d4655795SPavel Emelyanov } 286d4655795SPavel Emelyanov 287d4655795SPavel Emelyanov static inline void put_net(struct net *net) 288d4655795SPavel Emelyanov { 289d4655795SPavel Emelyanov } 290d4655795SPavel Emelyanov 291d4655795SPavel Emelyanov static inline struct net *maybe_get_net(struct net *net) 292d4655795SPavel Emelyanov { 293d4655795SPavel Emelyanov return net; 294d4655795SPavel Emelyanov } 295878628fbSYOSHIFUJI Hideaki 296878628fbSYOSHIFUJI Hideaki static inline 297878628fbSYOSHIFUJI Hideaki int net_eq(const struct net *net1, const struct net *net2) 298878628fbSYOSHIFUJI Hideaki { 299878628fbSYOSHIFUJI Hideaki return 1; 300878628fbSYOSHIFUJI Hideaki } 301a685e089SAl Viro 3024ee806d5SDan Streetman static inline int check_net(const struct net *net) 3034ee806d5SDan Streetman { 3044ee806d5SDan Streetman return 1; 3054ee806d5SDan Streetman } 3064ee806d5SDan Streetman 307a685e089SAl Viro #define net_drop_ns NULL 308d4655795SPavel Emelyanov #endif 3095f256becSEric W. Biederman 3105d1e4468SDenis V. Lunev 3110c5c9fb5SEric W. Biederman typedef struct { 3128f424b5fSEric Dumazet #ifdef CONFIG_NET_NS 3130c5c9fb5SEric W. Biederman struct net *net; 3148f424b5fSEric Dumazet #endif 3150c5c9fb5SEric W. Biederman } possible_net_t; 3160c5c9fb5SEric W. Biederman 3170c5c9fb5SEric W. Biederman static inline void write_pnet(possible_net_t *pnet, struct net *net) 3180c5c9fb5SEric W. Biederman { 3190c5c9fb5SEric W. Biederman #ifdef CONFIG_NET_NS 3200c5c9fb5SEric W. Biederman pnet->net = net; 3210c5c9fb5SEric W. Biederman #endif 3220c5c9fb5SEric W. Biederman } 3230c5c9fb5SEric W. Biederman 3240c5c9fb5SEric W. Biederman static inline struct net *read_pnet(const possible_net_t *pnet) 3250c5c9fb5SEric W. Biederman { 3260c5c9fb5SEric W. Biederman #ifdef CONFIG_NET_NS 3270c5c9fb5SEric W. Biederman return pnet->net; 3280c5c9fb5SEric W. Biederman #else 3290c5c9fb5SEric W. Biederman return &init_net; 3300c5c9fb5SEric W. Biederman #endif 3310c5c9fb5SEric W. Biederman } 3325d1e4468SDenis V. Lunev 333f0b07bb1SKirill Tkhai /* Protected by net_rwsem */ 3345f256becSEric W. Biederman #define for_each_net(VAR) \ 3355f256becSEric W. Biederman list_for_each_entry(VAR, &net_namespace_list, list) 336afa0df59SJiri Pirko #define for_each_net_continue_reverse(VAR) \ 337afa0df59SJiri Pirko list_for_each_entry_continue_reverse(VAR, &net_namespace_list, list) 33811a28d37SJohannes Berg #define for_each_net_rcu(VAR) \ 33911a28d37SJohannes Berg list_for_each_entry_rcu(VAR, &net_namespace_list, list) 34011a28d37SJohannes Berg 3414665079cSPavel Emelyanov #ifdef CONFIG_NET_NS 3424665079cSPavel Emelyanov #define __net_init 3434665079cSPavel Emelyanov #define __net_exit 344022cbae6SDenis V. Lunev #define __net_initdata 34504a6f82cSAndi Kleen #define __net_initconst 3464665079cSPavel Emelyanov #else 3474665079cSPavel Emelyanov #define __net_init __init 348bd721ea7SFabian Frederick #define __net_exit __ref 349022cbae6SDenis V. Lunev #define __net_initdata __initdata 35004a6f82cSAndi Kleen #define __net_initconst __initconst 3514665079cSPavel Emelyanov #endif 3525f256becSEric W. Biederman 353d4e4fdf9SGuillaume Nault int peernet2id_alloc(struct net *net, struct net *peer, gfp_t gfp); 35456f200c7SGuillaume Nault int peernet2id(const struct net *net, struct net *peer); 35556f200c7SGuillaume Nault bool peernet_has_id(const struct net *net, struct net *peer); 35656f200c7SGuillaume Nault struct net *get_net_ns_by_id(const struct net *net, int id); 3570c7aecd4SNicolas Dichtel 3585f256becSEric W. Biederman struct pernet_operations { 3595f256becSEric W. Biederman struct list_head list; 3606056415dSKirill Tkhai /* 3616056415dSKirill Tkhai * Below methods are called without any exclusive locks. 3626056415dSKirill Tkhai * More than one net may be constructed and destructed 3636056415dSKirill Tkhai * in parallel on several cpus. Every pernet_operations 3646056415dSKirill Tkhai * have to keep in mind all other pernet_operations and 3656056415dSKirill Tkhai * to introduce a locking, if they share common resources. 3666056415dSKirill Tkhai * 3678518e9bbSKirill Tkhai * The only time they are called with exclusive lock is 3688518e9bbSKirill Tkhai * from register_pernet_subsys(), unregister_pernet_subsys() 3698518e9bbSKirill Tkhai * register_pernet_device() and unregister_pernet_device(). 3708518e9bbSKirill Tkhai * 3716056415dSKirill Tkhai * Exit methods using blocking RCU primitives, such as 3726056415dSKirill Tkhai * synchronize_rcu(), should be implemented via exit_batch. 3736056415dSKirill Tkhai * Then, destruction of a group of net requires single 3746056415dSKirill Tkhai * synchronize_rcu() related to these pernet_operations, 3756056415dSKirill Tkhai * instead of separate synchronize_rcu() for every net. 3766056415dSKirill Tkhai * Please, avoid synchronize_rcu() at all, where it's possible. 377d7d99872SEric Dumazet * 378d7d99872SEric Dumazet * Note that a combination of pre_exit() and exit() can 379d7d99872SEric Dumazet * be used, since a synchronize_rcu() is guaranteed between 380d7d99872SEric Dumazet * the calls. 3816056415dSKirill Tkhai */ 3825f256becSEric W. Biederman int (*init)(struct net *net); 383d7d99872SEric Dumazet void (*pre_exit)(struct net *net); 3845f256becSEric W. Biederman void (*exit)(struct net *net); 38572ad937aSEric W. Biederman void (*exit_batch)(struct list_head *net_exit_list); 386c7d03a00SAlexey Dobriyan unsigned int *id; 387f875bae0SEric W. Biederman size_t size; 3885f256becSEric W. Biederman }; 3895f256becSEric W. Biederman 39017edde52SEric W. Biederman /* 39117edde52SEric W. Biederman * Use these carefully. If you implement a network device and it 39217edde52SEric W. Biederman * needs per network namespace operations use device pernet operations, 39317edde52SEric W. Biederman * otherwise use pernet subsys operations. 39417edde52SEric W. Biederman * 3954edf547bSJohannes Berg * Network interfaces need to be removed from a dying netns _before_ 3964edf547bSJohannes Berg * subsys notifiers can be called, as most of the network code cleanup 3974edf547bSJohannes Berg * (which is done from subsys notifiers) runs with the assumption that 3984edf547bSJohannes Berg * dev_remove_pack has been called so no new packets will arrive during 3994edf547bSJohannes Berg * and after the cleanup functions have been called. dev_remove_pack 4004edf547bSJohannes Berg * is not per namespace so instead the guarantee of no more packets 4014edf547bSJohannes Berg * arriving in a network namespace is provided by ensuring that all 4024edf547bSJohannes Berg * network devices and all sockets have left the network namespace 4034edf547bSJohannes Berg * before the cleanup methods are called. 40417edde52SEric W. Biederman * 40517edde52SEric W. Biederman * For the longest time the ipv4 icmp code was registered as a pernet 40617edde52SEric W. Biederman * device which caused kernel oops, and panics during network 40717edde52SEric W. Biederman * namespace cleanup. So please don't get this wrong. 40817edde52SEric W. Biederman */ 409e67e16eaSJoe Perches int register_pernet_subsys(struct pernet_operations *); 410e67e16eaSJoe Perches void unregister_pernet_subsys(struct pernet_operations *); 411e67e16eaSJoe Perches int register_pernet_device(struct pernet_operations *); 412e67e16eaSJoe Perches void unregister_pernet_device(struct pernet_operations *); 413f875bae0SEric W. Biederman 41495bdfccbSEric W. Biederman struct ctl_table; 41595bdfccbSEric W. Biederman struct ctl_table_header; 416d62c612eSPavel Emelyanov 4172ca794e5SEric W. Biederman #ifdef CONFIG_SYSCTL 418e67e16eaSJoe Perches int net_sysctl_init(void); 419e67e16eaSJoe Perches struct ctl_table_header *register_net_sysctl(struct net *net, const char *path, 420e67e16eaSJoe Perches struct ctl_table *table); 421e67e16eaSJoe Perches void unregister_net_sysctl_table(struct ctl_table_header *header); 42248c74958SEric W. Biederman #else 42348c74958SEric W. Biederman static inline int net_sysctl_init(void) { return 0; } 42448c74958SEric W. Biederman static inline struct ctl_table_header *register_net_sysctl(struct net *net, 42548c74958SEric W. Biederman const char *path, struct ctl_table *table) 42648c74958SEric W. Biederman { 42748c74958SEric W. Biederman return NULL; 42848c74958SEric W. Biederman } 42948c74958SEric W. Biederman static inline void unregister_net_sysctl_table(struct ctl_table_header *header) 43048c74958SEric W. Biederman { 43148c74958SEric W. Biederman } 43248c74958SEric W. Biederman #endif 43348c74958SEric W. Biederman 43456f200c7SGuillaume Nault static inline int rt_genid_ipv4(const struct net *net) 435b42664f8SNicolas Dichtel { 436ca4c3fc2Sfan.du return atomic_read(&net->ipv4.rt_genid); 437b42664f8SNicolas Dichtel } 438b42664f8SNicolas Dichtel 4398f34e53bSDavid Ahern #if IS_ENABLED(CONFIG_IPV6) 4408f34e53bSDavid Ahern static inline int rt_genid_ipv6(const struct net *net) 4418f34e53bSDavid Ahern { 4428f34e53bSDavid Ahern return atomic_read(&net->ipv6.fib6_sernum); 4438f34e53bSDavid Ahern } 4448f34e53bSDavid Ahern #endif 4458f34e53bSDavid Ahern 446ca4c3fc2Sfan.du static inline void rt_genid_bump_ipv4(struct net *net) 447b42664f8SNicolas Dichtel { 448ca4c3fc2Sfan.du atomic_inc(&net->ipv4.rt_genid); 449ca4c3fc2Sfan.du } 450ca4c3fc2Sfan.du 451705f1c86SHannes Frederic Sowa extern void (*__fib6_flush_trees)(struct net *net); 452ca4c3fc2Sfan.du static inline void rt_genid_bump_ipv6(struct net *net) 453ca4c3fc2Sfan.du { 454705f1c86SHannes Frederic Sowa if (__fib6_flush_trees) 455705f1c86SHannes Frederic Sowa __fib6_flush_trees(net); 456ca4c3fc2Sfan.du } 457ca4c3fc2Sfan.du 458599018a7SLuis R. Rodriguez #if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN) 459599018a7SLuis R. Rodriguez static inline struct netns_ieee802154_lowpan * 460599018a7SLuis R. Rodriguez net_ieee802154_lowpan(struct net *net) 461599018a7SLuis R. Rodriguez { 462599018a7SLuis R. Rodriguez return &net->ieee802154_lowpan; 463599018a7SLuis R. Rodriguez } 464599018a7SLuis R. Rodriguez #endif 465599018a7SLuis R. Rodriguez 466ca4c3fc2Sfan.du /* For callers who don't really care about whether it's IPv4 or IPv6 */ 467ca4c3fc2Sfan.du static inline void rt_genid_bump_all(struct net *net) 468ca4c3fc2Sfan.du { 469ca4c3fc2Sfan.du rt_genid_bump_ipv4(net); 470ca4c3fc2Sfan.du rt_genid_bump_ipv6(net); 471b42664f8SNicolas Dichtel } 47295bdfccbSEric W. Biederman 47356f200c7SGuillaume Nault static inline int fnhe_genid(const struct net *net) 4745aad1de5STimo Teräs { 4755aad1de5STimo Teräs return atomic_read(&net->fnhe_genid); 4765aad1de5STimo Teräs } 4775aad1de5STimo Teräs 4785aad1de5STimo Teräs static inline void fnhe_genid_bump(struct net *net) 4795aad1de5STimo Teräs { 4805aad1de5STimo Teräs atomic_inc(&net->fnhe_genid); 4815aad1de5STimo Teräs } 4825aad1de5STimo Teräs 4835f256becSEric W. Biederman #endif /* __NET_NET_NAMESPACE_H */ 484