1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */ 25f256becSEric W. Biederman /* 35f256becSEric W. Biederman * Operations on the network namespace 45f256becSEric W. Biederman */ 55f256becSEric W. Biederman #ifndef __NET_NET_NAMESPACE_H 65f256becSEric W. Biederman #define __NET_NET_NAMESPACE_H 75f256becSEric W. Biederman 860063497SArun Sharma #include <linux/atomic.h> 9c122e14dSReshetova, Elena #include <linux/refcount.h> 105f256becSEric W. Biederman #include <linux/workqueue.h> 115f256becSEric W. Biederman #include <linux/list.h> 12bee95250SDavid S. Miller #include <linux/sysctl.h> 13fbdeaed4STyler Hicks #include <linux/uidgid.h> 145f256becSEric W. Biederman 156a662719SCong Wang #include <net/flow.h> 168efa6e93SPavel Emelyanov #include <net/netns/core.h> 17852566f5SPavel Emelyanov #include <net/netns/mib.h> 18a0a53c8bSDenis V. Lunev #include <net/netns/unix.h> 192aaef4e4SDenis V. Lunev #include <net/netns/packet.h> 208afd351cSPavel Emelyanov #include <net/netns/ipv4.h> 21b0f159dbSDaniel Lezcano #include <net/netns/ipv6.h> 22ab84be7eSDavid Ahern #include <net/netns/nexthop.h> 23633fc86fSAlexander Aring #include <net/netns/ieee802154_6lowpan.h> 244db67e80SEric W. Biederman #include <net/netns/sctp.h> 25f3c1a44aSGao feng #include <net/netns/netfilter.h> 26dfdb8d79SAlexey Dobriyan #if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE) 27dfdb8d79SAlexey Dobriyan #include <net/netns/conntrack.h> 28dfdb8d79SAlexey Dobriyan #endif 29b0381776SVlad Buslov #if IS_ENABLED(CONFIG_NF_FLOW_TABLE) 30b0381776SVlad Buslov #include <net/netns/flow_table.h> 31b0381776SVlad Buslov #endif 3299633ab2SPablo Neira Ayuso #include <net/netns/nftables.h> 33d62ddc21SAlexey Dobriyan #include <net/netns/xfrm.h> 340189197fSEric W. Biederman #include <net/netns/mpls.h> 358e8cda6dSMario Kicherer #include <net/netns/can.h> 361d0dc069SBjörn Töpel #include <net/netns/xdp.h> 37194730a9SGuvenc Gulce #include <net/netns/smc.h> 38a3fd7ceeSJakub Sitnicki #include <net/netns/bpf.h> 39889b7da2SJeremy Kerr #include <net/netns/mctp.h> 409ba74e6cSEric Dumazet #include <net/net_trackers.h> 41435d5f4bSAl Viro #include <linux/ns_common.h> 4204c52decSPablo Neira Ayuso #include <linux/idr.h> 4304c52decSPablo Neira Ayuso #include <linux/skbuff.h> 44a30c7b42SJiri Pirko #include <linux/notifier.h> 45a0a53c8bSDenis V. Lunev 46038e7332SEric W. Biederman struct user_namespace; 47457c4cbcSEric W. Biederman struct proc_dir_entry; 482774c7abSEric W. Biederman struct net_device; 4997c53cacSDenis V. Lunev struct sock; 501597fbc0SPavel Emelyanov struct ctl_table_header; 51dec827d1SPavel Emelyanov struct net_generic; 5294e5e308SChristian Brauner struct uevent_sock; 532553d064SJulian Anastasov struct netns_ipvs; 54d58e468bSPetar Penkov struct bpf_prog; 551597fbc0SPavel Emelyanov 567c28bd0bSEric Dumazet 577c28bd0bSEric Dumazet #define NETDEV_HASHBITS 8 587c28bd0bSEric Dumazet #define NETDEV_HASHENTRIES (1 << NETDEV_HASHBITS) 597c28bd0bSEric Dumazet 605f256becSEric W. Biederman struct net { 612a06b898SEric Dumazet /* First cache line can be often dirtied. 622a06b898SEric Dumazet * Do not place here read-mostly fields. 632a06b898SEric Dumazet */ 64aad12c23SMike Rapoport refcount_t passive; /* To decide when the network 655f256becSEric W. Biederman * namespace should be freed. 665f256becSEric W. Biederman */ 678e602ce2SEric Dumazet spinlock_t rules_mod_lock; 688e602ce2SEric Dumazet 69ede6c39cSEric Dumazet atomic_t dev_unreg_count; 702a06b898SEric Dumazet 712a06b898SEric Dumazet unsigned int dev_base_seq; /* protected by rtnl_mutex */ 722a06b898SEric Dumazet int ifindex; 732a06b898SEric Dumazet 742a06b898SEric Dumazet spinlock_t nsid_lock; 752a06b898SEric Dumazet atomic_t fnhe_genid; 7633cf7c90SEric Dumazet 775f256becSEric W. Biederman struct list_head list; /* list of network namespaces */ 7819efbd93SKirill Tkhai struct list_head exit_list; /* To linked to call pernet exit 794420bf21SKirill Tkhai * methods on dead net ( 804420bf21SKirill Tkhai * pernet_ops_rwsem read locked), 814420bf21SKirill Tkhai * or to unregister pernet ops 824420bf21SKirill Tkhai * (pernet_ops_rwsem write locked). 8319efbd93SKirill Tkhai */ 8465b7b5b9SKirill Tkhai struct llist_node cleanup_list; /* namespaces on death row */ 8565b7b5b9SKirill Tkhai 869b242610SDavid Howells #ifdef CONFIG_KEYS 879b242610SDavid Howells struct key_tag *key_domain; /* Key domain of operation tag */ 889b242610SDavid Howells #endif 89038e7332SEric W. Biederman struct user_namespace *user_ns; /* Owning user namespace */ 9070328660SEric W. Biederman struct ucounts *ucounts; 910c7aecd4SNicolas Dichtel struct idr netns_ids; 92038e7332SEric W. Biederman 93435d5f4bSAl Viro struct ns_common ns; 949ba74e6cSEric Dumazet struct ref_tracker_dir refcnt_tracker; 950cafd77dSEric Dumazet struct ref_tracker_dir notrefcnt_tracker; /* tracker for objects not 960cafd77dSEric Dumazet * refcounted against netns 970cafd77dSEric Dumazet */ 982a06b898SEric Dumazet struct list_head dev_base_head; 99457c4cbcSEric W. Biederman struct proc_dir_entry *proc_net; 100457c4cbcSEric W. Biederman struct proc_dir_entry *proc_net_stat; 101881d966bSEric W. Biederman 10273455092SAl Viro #ifdef CONFIG_SYSCTL 10373455092SAl Viro struct ctl_table_set sysctls; 10473455092SAl Viro #endif 10595bdfccbSEric W. Biederman 1068e602ce2SEric Dumazet struct sock *rtnl; /* rtnetlink socket */ 1078e602ce2SEric Dumazet struct sock *genl_sock; 1082774c7abSEric W. Biederman 10994e5e308SChristian Brauner struct uevent_sock *uevent_sock; /* uevent socket */ 11094e5e308SChristian Brauner 111881d966bSEric W. Biederman struct hlist_head *dev_name_head; 112881d966bSEric W. Biederman struct hlist_head *dev_index_head; 113a30c7b42SJiri Pirko struct raw_notifier_head netdev_chain; 114a30c7b42SJiri Pirko 1152a06b898SEric Dumazet /* Note that @hash_mix can be read millions times per second, 1162a06b898SEric Dumazet * it is critical that it is on a read_mostly cache line. 1172a06b898SEric Dumazet */ 1182a06b898SEric Dumazet u32 hash_mix; 1192a06b898SEric Dumazet 1202a06b898SEric Dumazet struct net_device *loopback_dev; /* The loopback */ 12197c53cacSDenis V. Lunev 1225fd30ee7SDenis V. Lunev /* core fib_rules */ 1235fd30ee7SDenis V. Lunev struct list_head rules_ops; 1245fd30ee7SDenis V. Lunev 1258efa6e93SPavel Emelyanov struct netns_core core; 126852566f5SPavel Emelyanov struct netns_mib mib; 1272aaef4e4SDenis V. Lunev struct netns_packet packet; 128b6e81138SKuniyuki Iwashima #if IS_ENABLED(CONFIG_UNIX) 129a0a53c8bSDenis V. Lunev struct netns_unix unx; 130b6e81138SKuniyuki Iwashima #endif 131ab84be7eSDavid Ahern struct netns_nexthop nexthop; 1328afd351cSPavel Emelyanov struct netns_ipv4 ipv4; 133dfd56b8bSEric Dumazet #if IS_ENABLED(CONFIG_IPV6) 134b0f159dbSDaniel Lezcano struct netns_ipv6 ipv6; 135b0f159dbSDaniel Lezcano #endif 136633fc86fSAlexander Aring #if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN) 137633fc86fSAlexander Aring struct netns_ieee802154_lowpan ieee802154_lowpan; 138633fc86fSAlexander Aring #endif 1394db67e80SEric W. Biederman #if defined(CONFIG_IP_SCTP) || defined(CONFIG_IP_SCTP_MODULE) 1404db67e80SEric W. Biederman struct netns_sctp sctp; 1414db67e80SEric W. Biederman #endif 1428d870052SAlexey Dobriyan #ifdef CONFIG_NETFILTER 143f3c1a44aSGao feng struct netns_nf nf; 144dfdb8d79SAlexey Dobriyan #if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE) 145dfdb8d79SAlexey Dobriyan struct netns_ct ct; 146dfdb8d79SAlexey Dobriyan #endif 14799633ab2SPablo Neira Ayuso #if defined(CONFIG_NF_TABLES) || defined(CONFIG_NF_TABLES_MODULE) 14899633ab2SPablo Neira Ayuso struct netns_nftables nft; 14999633ab2SPablo Neira Ayuso #endif 150b0381776SVlad Buslov #if IS_ENABLED(CONFIG_NF_FLOW_TABLE) 151b0381776SVlad Buslov struct netns_ft ft; 152b0381776SVlad Buslov #endif 1538d870052SAlexey Dobriyan #endif 1543d23e349SJohannes Berg #ifdef CONFIG_WEXT_CORE 155b333b3d2SJohannes Berg struct sk_buff_head wext_nlevents; 156b333b3d2SJohannes Berg #endif 1571c87733dSEric Dumazet struct net_generic __rcu *gen; 1588e602ce2SEric Dumazet 159a3fd7ceeSJakub Sitnicki /* Used to store attached BPF programs */ 160a3fd7ceeSJakub Sitnicki struct netns_bpf bpf; 161d58e468bSPetar Penkov 1628e602ce2SEric Dumazet /* Note : following structs are cache line aligned */ 1638e602ce2SEric Dumazet #ifdef CONFIG_XFRM 1648e602ce2SEric Dumazet struct netns_xfrm xfrm; 1658e602ce2SEric Dumazet #endif 166f318903cSDaniel Borkmann 1673d368ab8SEric Dumazet u64 net_cookie; /* written once */ 168f318903cSDaniel Borkmann 1698b4d14d8SJunweiZhang #if IS_ENABLED(CONFIG_IP_VS) 17061b1ab45SHans Schillstrom struct netns_ipvs *ipvs; 1718b4d14d8SJunweiZhang #endif 1720189197fSEric W. Biederman #if IS_ENABLED(CONFIG_MPLS) 1730189197fSEric W. Biederman struct netns_mpls mpls; 1740189197fSEric W. Biederman #endif 1758e8cda6dSMario Kicherer #if IS_ENABLED(CONFIG_CAN) 1768e8cda6dSMario Kicherer struct netns_can can; 1778e8cda6dSMario Kicherer #endif 1781d0dc069SBjörn Töpel #ifdef CONFIG_XDP_SOCKETS 1791d0dc069SBjörn Töpel struct netns_xdp xdp; 1801d0dc069SBjörn Töpel #endif 181889b7da2SJeremy Kerr #if IS_ENABLED(CONFIG_MCTP) 182889b7da2SJeremy Kerr struct netns_mctp mctp; 183889b7da2SJeremy Kerr #endif 18491b05a7eSOndrej Mosnacek #if IS_ENABLED(CONFIG_CRYPTO_USER) 18591b05a7eSOndrej Mosnacek struct sock *crypto_nlsk; 18691b05a7eSOndrej Mosnacek #endif 18751d7cccfSAndrey Vagin struct sock *diag_nlsk; 188194730a9SGuvenc Gulce #if IS_ENABLED(CONFIG_SMC) 189194730a9SGuvenc Gulce struct netns_smc smc; 190194730a9SGuvenc Gulce #endif 1913859a271SKees Cook } __randomize_layout; 1925f256becSEric W. Biederman 193c0f39322SDenis V. Lunev #include <linux/seq_file_net.h> 194c0f39322SDenis V. Lunev 1954fabcd71SDaniel Lezcano /* Init's network namespace */ 1965f256becSEric W. Biederman extern struct net init_net; 197a4aa834aSDenis V. Lunev 198d727abcbSEric W. Biederman #ifdef CONFIG_NET_NS 199e67e16eaSJoe Perches struct net *copy_net_ns(unsigned long flags, struct user_namespace *user_ns, 200e67e16eaSJoe Perches struct net *old_net); 201225c0a01SDenis V. Lunev 202fbdeaed4STyler Hicks void net_ns_get_ownership(const struct net *net, kuid_t *uid, kgid_t *gid); 203fbdeaed4STyler Hicks 2047866cc57SFlorian Westphal void net_ns_barrier(void); 205ea6932d7SChangbin Du 206ea6932d7SChangbin Du struct ns_common *get_net_ns(struct ns_common *ns); 207e34492deSChangbin Du struct net *get_net_ns_by_fd(int fd); 208d727abcbSEric W. Biederman #else /* CONFIG_NET_NS */ 209d727abcbSEric W. Biederman #include <linux/sched.h> 210d727abcbSEric W. Biederman #include <linux/nsproxy.h> 211038e7332SEric W. Biederman static inline struct net *copy_net_ns(unsigned long flags, 212038e7332SEric W. Biederman struct user_namespace *user_ns, struct net *old_net) 2139dd776b6SEric W. Biederman { 214d727abcbSEric W. Biederman if (flags & CLONE_NEWNET) 215d727abcbSEric W. Biederman return ERR_PTR(-EINVAL); 216d727abcbSEric W. Biederman return old_net; 2179dd776b6SEric W. Biederman } 2187866cc57SFlorian Westphal 219fbdeaed4STyler Hicks static inline void net_ns_get_ownership(const struct net *net, 220fbdeaed4STyler Hicks kuid_t *uid, kgid_t *gid) 221fbdeaed4STyler Hicks { 222fbdeaed4STyler Hicks *uid = GLOBAL_ROOT_UID; 223fbdeaed4STyler Hicks *gid = GLOBAL_ROOT_GID; 224fbdeaed4STyler Hicks } 225fbdeaed4STyler Hicks 2267866cc57SFlorian Westphal static inline void net_ns_barrier(void) {} 227ea6932d7SChangbin Du 228ea6932d7SChangbin Du static inline struct ns_common *get_net_ns(struct ns_common *ns) 229ea6932d7SChangbin Du { 230ea6932d7SChangbin Du return ERR_PTR(-EINVAL); 231ea6932d7SChangbin Du } 232e34492deSChangbin Du 233e34492deSChangbin Du static inline struct net *get_net_ns_by_fd(int fd) 234e34492deSChangbin Du { 235e34492deSChangbin Du return ERR_PTR(-EINVAL); 236e34492deSChangbin Du } 237d727abcbSEric W. Biederman #endif /* CONFIG_NET_NS */ 238225c0a01SDenis V. Lunev 239225c0a01SDenis V. Lunev 240225c0a01SDenis V. Lunev extern struct list_head net_namespace_list; 2419dd776b6SEric W. Biederman 242e67e16eaSJoe Perches struct net *get_net_ns_by_pid(pid_t pid); 24330ffee84SJohannes Berg 244535d3ae9SRashika Kheria #ifdef CONFIG_SYSCTL 245535d3ae9SRashika Kheria void ipx_register_sysctl(void); 246535d3ae9SRashika Kheria void ipx_unregister_sysctl(void); 247535d3ae9SRashika Kheria #else 248535d3ae9SRashika Kheria #define ipx_register_sysctl() 249535d3ae9SRashika Kheria #define ipx_unregister_sysctl() 250535d3ae9SRashika Kheria #endif 251535d3ae9SRashika Kheria 252d4655795SPavel Emelyanov #ifdef CONFIG_NET_NS 253e67e16eaSJoe Perches void __put_net(struct net *net); 2545f256becSEric W. Biederman 2559ba74e6cSEric Dumazet /* Try using get_net_track() instead */ 2565f256becSEric W. Biederman static inline struct net *get_net(struct net *net) 2575f256becSEric W. Biederman { 2588b8f3e66SChristian Brauner refcount_inc(&net->ns.count); 2595f256becSEric W. Biederman return net; 2605f256becSEric W. Biederman } 2615f256becSEric W. Biederman 262077130c0SEric W. Biederman static inline struct net *maybe_get_net(struct net *net) 263077130c0SEric W. Biederman { 264077130c0SEric W. Biederman /* Used when we know struct net exists but we 265077130c0SEric W. Biederman * aren't guaranteed a previous reference count 266077130c0SEric W. Biederman * exists. If the reference count is zero this 267077130c0SEric W. Biederman * function fails and returns NULL. 268077130c0SEric W. Biederman */ 2698b8f3e66SChristian Brauner if (!refcount_inc_not_zero(&net->ns.count)) 270077130c0SEric W. Biederman net = NULL; 271077130c0SEric W. Biederman return net; 272077130c0SEric W. Biederman } 273077130c0SEric W. Biederman 2749ba74e6cSEric Dumazet /* Try using put_net_track() instead */ 2755f256becSEric W. Biederman static inline void put_net(struct net *net) 2765f256becSEric W. Biederman { 2778b8f3e66SChristian Brauner if (refcount_dec_and_test(&net->ns.count)) 2785f256becSEric W. Biederman __put_net(net); 2795f256becSEric W. Biederman } 2805f256becSEric W. Biederman 281878628fbSYOSHIFUJI Hideaki static inline 282878628fbSYOSHIFUJI Hideaki int net_eq(const struct net *net1, const struct net *net2) 283878628fbSYOSHIFUJI Hideaki { 284878628fbSYOSHIFUJI Hideaki return net1 == net2; 285878628fbSYOSHIFUJI Hideaki } 286a685e089SAl Viro 2874ee806d5SDan Streetman static inline int check_net(const struct net *net) 2884ee806d5SDan Streetman { 2898b8f3e66SChristian Brauner return refcount_read(&net->ns.count) != 0; 2904ee806d5SDan Streetman } 2914ee806d5SDan Streetman 292e67e16eaSJoe Perches void net_drop_ns(void *); 293a685e089SAl Viro 294d4655795SPavel Emelyanov #else 295b9f75f45SEric W. Biederman 296d4655795SPavel Emelyanov static inline struct net *get_net(struct net *net) 297d4655795SPavel Emelyanov { 298d4655795SPavel Emelyanov return net; 299d4655795SPavel Emelyanov } 300d4655795SPavel Emelyanov 301d4655795SPavel Emelyanov static inline void put_net(struct net *net) 302d4655795SPavel Emelyanov { 303d4655795SPavel Emelyanov } 304d4655795SPavel Emelyanov 305d4655795SPavel Emelyanov static inline struct net *maybe_get_net(struct net *net) 306d4655795SPavel Emelyanov { 307d4655795SPavel Emelyanov return net; 308d4655795SPavel Emelyanov } 309878628fbSYOSHIFUJI Hideaki 310878628fbSYOSHIFUJI Hideaki static inline 311878628fbSYOSHIFUJI Hideaki int net_eq(const struct net *net1, const struct net *net2) 312878628fbSYOSHIFUJI Hideaki { 313878628fbSYOSHIFUJI Hideaki return 1; 314878628fbSYOSHIFUJI Hideaki } 315a685e089SAl Viro 3164ee806d5SDan Streetman static inline int check_net(const struct net *net) 3174ee806d5SDan Streetman { 3184ee806d5SDan Streetman return 1; 3194ee806d5SDan Streetman } 3204ee806d5SDan Streetman 321a685e089SAl Viro #define net_drop_ns NULL 322d4655795SPavel Emelyanov #endif 3235f256becSEric W. Biederman 3245d1e4468SDenis V. Lunev 3250cafd77dSEric Dumazet static inline void __netns_tracker_alloc(struct net *net, 3260cafd77dSEric Dumazet netns_tracker *tracker, 3270cafd77dSEric Dumazet bool refcounted, 3280cafd77dSEric Dumazet gfp_t gfp) 3299ba74e6cSEric Dumazet { 3309ba74e6cSEric Dumazet #ifdef CONFIG_NET_NS_REFCNT_TRACKER 3310cafd77dSEric Dumazet ref_tracker_alloc(refcounted ? &net->refcnt_tracker : 3320cafd77dSEric Dumazet &net->notrefcnt_tracker, 3330cafd77dSEric Dumazet tracker, gfp); 3349ba74e6cSEric Dumazet #endif 3359ba74e6cSEric Dumazet } 3369ba74e6cSEric Dumazet 3370cafd77dSEric Dumazet static inline void netns_tracker_alloc(struct net *net, netns_tracker *tracker, 3380cafd77dSEric Dumazet gfp_t gfp) 3390cafd77dSEric Dumazet { 3400cafd77dSEric Dumazet __netns_tracker_alloc(net, tracker, true, gfp); 3410cafd77dSEric Dumazet } 3420cafd77dSEric Dumazet 3430cafd77dSEric Dumazet static inline void __netns_tracker_free(struct net *net, 3440cafd77dSEric Dumazet netns_tracker *tracker, 3450cafd77dSEric Dumazet bool refcounted) 3469ba74e6cSEric Dumazet { 3479ba74e6cSEric Dumazet #ifdef CONFIG_NET_NS_REFCNT_TRACKER 3480cafd77dSEric Dumazet ref_tracker_free(refcounted ? &net->refcnt_tracker : 3490cafd77dSEric Dumazet &net->notrefcnt_tracker, tracker); 3509ba74e6cSEric Dumazet #endif 3519ba74e6cSEric Dumazet } 3529ba74e6cSEric Dumazet 3539ba74e6cSEric Dumazet static inline struct net *get_net_track(struct net *net, 3549ba74e6cSEric Dumazet netns_tracker *tracker, gfp_t gfp) 3559ba74e6cSEric Dumazet { 3569ba74e6cSEric Dumazet get_net(net); 3579ba74e6cSEric Dumazet netns_tracker_alloc(net, tracker, gfp); 3589ba74e6cSEric Dumazet return net; 3599ba74e6cSEric Dumazet } 3609ba74e6cSEric Dumazet 3619ba74e6cSEric Dumazet static inline void put_net_track(struct net *net, netns_tracker *tracker) 3629ba74e6cSEric Dumazet { 3630cafd77dSEric Dumazet __netns_tracker_free(net, tracker, true); 3649ba74e6cSEric Dumazet put_net(net); 3659ba74e6cSEric Dumazet } 3669ba74e6cSEric Dumazet 3670c5c9fb5SEric W. Biederman typedef struct { 3688f424b5fSEric Dumazet #ifdef CONFIG_NET_NS 3690c5c9fb5SEric W. Biederman struct net *net; 3708f424b5fSEric Dumazet #endif 3710c5c9fb5SEric W. Biederman } possible_net_t; 3720c5c9fb5SEric W. Biederman 3730c5c9fb5SEric W. Biederman static inline void write_pnet(possible_net_t *pnet, struct net *net) 3740c5c9fb5SEric W. Biederman { 3750c5c9fb5SEric W. Biederman #ifdef CONFIG_NET_NS 3760c5c9fb5SEric W. Biederman pnet->net = net; 3770c5c9fb5SEric W. Biederman #endif 3780c5c9fb5SEric W. Biederman } 3790c5c9fb5SEric W. Biederman 3800c5c9fb5SEric W. Biederman static inline struct net *read_pnet(const possible_net_t *pnet) 3810c5c9fb5SEric W. Biederman { 3820c5c9fb5SEric W. Biederman #ifdef CONFIG_NET_NS 3830c5c9fb5SEric W. Biederman return pnet->net; 3840c5c9fb5SEric W. Biederman #else 3850c5c9fb5SEric W. Biederman return &init_net; 3860c5c9fb5SEric W. Biederman #endif 3870c5c9fb5SEric W. Biederman } 3885d1e4468SDenis V. Lunev 389f0b07bb1SKirill Tkhai /* Protected by net_rwsem */ 3905f256becSEric W. Biederman #define for_each_net(VAR) \ 3915f256becSEric W. Biederman list_for_each_entry(VAR, &net_namespace_list, list) 392afa0df59SJiri Pirko #define for_each_net_continue_reverse(VAR) \ 393afa0df59SJiri Pirko list_for_each_entry_continue_reverse(VAR, &net_namespace_list, list) 39411a28d37SJohannes Berg #define for_each_net_rcu(VAR) \ 39511a28d37SJohannes Berg list_for_each_entry_rcu(VAR, &net_namespace_list, list) 39611a28d37SJohannes Berg 3974665079cSPavel Emelyanov #ifdef CONFIG_NET_NS 3984665079cSPavel Emelyanov #define __net_init 3994665079cSPavel Emelyanov #define __net_exit 400022cbae6SDenis V. Lunev #define __net_initdata 40104a6f82cSAndi Kleen #define __net_initconst 4024665079cSPavel Emelyanov #else 4034665079cSPavel Emelyanov #define __net_init __init 404bd721ea7SFabian Frederick #define __net_exit __ref 405022cbae6SDenis V. Lunev #define __net_initdata __initdata 40604a6f82cSAndi Kleen #define __net_initconst __initconst 4074665079cSPavel Emelyanov #endif 4085f256becSEric W. Biederman 409d4e4fdf9SGuillaume Nault int peernet2id_alloc(struct net *net, struct net *peer, gfp_t gfp); 41056f200c7SGuillaume Nault int peernet2id(const struct net *net, struct net *peer); 41156f200c7SGuillaume Nault bool peernet_has_id(const struct net *net, struct net *peer); 41256f200c7SGuillaume Nault struct net *get_net_ns_by_id(const struct net *net, int id); 4130c7aecd4SNicolas Dichtel 4145f256becSEric W. Biederman struct pernet_operations { 4155f256becSEric W. Biederman struct list_head list; 4166056415dSKirill Tkhai /* 4176056415dSKirill Tkhai * Below methods are called without any exclusive locks. 4186056415dSKirill Tkhai * More than one net may be constructed and destructed 4196056415dSKirill Tkhai * in parallel on several cpus. Every pernet_operations 4206056415dSKirill Tkhai * have to keep in mind all other pernet_operations and 4216056415dSKirill Tkhai * to introduce a locking, if they share common resources. 4226056415dSKirill Tkhai * 4238518e9bbSKirill Tkhai * The only time they are called with exclusive lock is 4248518e9bbSKirill Tkhai * from register_pernet_subsys(), unregister_pernet_subsys() 4258518e9bbSKirill Tkhai * register_pernet_device() and unregister_pernet_device(). 4268518e9bbSKirill Tkhai * 4276056415dSKirill Tkhai * Exit methods using blocking RCU primitives, such as 4286056415dSKirill Tkhai * synchronize_rcu(), should be implemented via exit_batch. 4296056415dSKirill Tkhai * Then, destruction of a group of net requires single 4306056415dSKirill Tkhai * synchronize_rcu() related to these pernet_operations, 4316056415dSKirill Tkhai * instead of separate synchronize_rcu() for every net. 4326056415dSKirill Tkhai * Please, avoid synchronize_rcu() at all, where it's possible. 433d7d99872SEric Dumazet * 434d7d99872SEric Dumazet * Note that a combination of pre_exit() and exit() can 435d7d99872SEric Dumazet * be used, since a synchronize_rcu() is guaranteed between 436d7d99872SEric Dumazet * the calls. 4376056415dSKirill Tkhai */ 4385f256becSEric W. Biederman int (*init)(struct net *net); 439d7d99872SEric Dumazet void (*pre_exit)(struct net *net); 4405f256becSEric W. Biederman void (*exit)(struct net *net); 44172ad937aSEric W. Biederman void (*exit_batch)(struct list_head *net_exit_list); 442c7d03a00SAlexey Dobriyan unsigned int *id; 443f875bae0SEric W. Biederman size_t size; 4445f256becSEric W. Biederman }; 4455f256becSEric W. Biederman 44617edde52SEric W. Biederman /* 44717edde52SEric W. Biederman * Use these carefully. If you implement a network device and it 44817edde52SEric W. Biederman * needs per network namespace operations use device pernet operations, 44917edde52SEric W. Biederman * otherwise use pernet subsys operations. 45017edde52SEric W. Biederman * 4514edf547bSJohannes Berg * Network interfaces need to be removed from a dying netns _before_ 4524edf547bSJohannes Berg * subsys notifiers can be called, as most of the network code cleanup 4534edf547bSJohannes Berg * (which is done from subsys notifiers) runs with the assumption that 4544edf547bSJohannes Berg * dev_remove_pack has been called so no new packets will arrive during 4554edf547bSJohannes Berg * and after the cleanup functions have been called. dev_remove_pack 4564edf547bSJohannes Berg * is not per namespace so instead the guarantee of no more packets 4574edf547bSJohannes Berg * arriving in a network namespace is provided by ensuring that all 4584edf547bSJohannes Berg * network devices and all sockets have left the network namespace 4594edf547bSJohannes Berg * before the cleanup methods are called. 46017edde52SEric W. Biederman * 46117edde52SEric W. Biederman * For the longest time the ipv4 icmp code was registered as a pernet 46217edde52SEric W. Biederman * device which caused kernel oops, and panics during network 46317edde52SEric W. Biederman * namespace cleanup. So please don't get this wrong. 46417edde52SEric W. Biederman */ 465e67e16eaSJoe Perches int register_pernet_subsys(struct pernet_operations *); 466e67e16eaSJoe Perches void unregister_pernet_subsys(struct pernet_operations *); 467e67e16eaSJoe Perches int register_pernet_device(struct pernet_operations *); 468e67e16eaSJoe Perches void unregister_pernet_device(struct pernet_operations *); 469f875bae0SEric W. Biederman 47095bdfccbSEric W. Biederman struct ctl_table; 471d62c612eSPavel Emelyanov 472*95d49778SJoel Granados #define register_net_sysctl(net, path, table) \ 473*95d49778SJoel Granados register_net_sysctl_sz(net, path, table, SIZE_MAX) 4742ca794e5SEric W. Biederman #ifdef CONFIG_SYSCTL 475e67e16eaSJoe Perches int net_sysctl_init(void); 476*95d49778SJoel Granados struct ctl_table_header *register_net_sysctl_sz(struct net *net, const char *path, 477*95d49778SJoel Granados struct ctl_table *table, size_t table_size); 478e67e16eaSJoe Perches void unregister_net_sysctl_table(struct ctl_table_header *header); 47948c74958SEric W. Biederman #else 48048c74958SEric W. Biederman static inline int net_sysctl_init(void) { return 0; } 481*95d49778SJoel Granados static inline struct ctl_table_header *register_net_sysctl_sz(struct net *net, 482*95d49778SJoel Granados const char *path, struct ctl_table *table, size_t table_size) 48348c74958SEric W. Biederman { 48448c74958SEric W. Biederman return NULL; 48548c74958SEric W. Biederman } 48648c74958SEric W. Biederman static inline void unregister_net_sysctl_table(struct ctl_table_header *header) 48748c74958SEric W. Biederman { 48848c74958SEric W. Biederman } 48948c74958SEric W. Biederman #endif 49048c74958SEric W. Biederman 49156f200c7SGuillaume Nault static inline int rt_genid_ipv4(const struct net *net) 492b42664f8SNicolas Dichtel { 493ca4c3fc2Sfan.du return atomic_read(&net->ipv4.rt_genid); 494b42664f8SNicolas Dichtel } 495b42664f8SNicolas Dichtel 4968f34e53bSDavid Ahern #if IS_ENABLED(CONFIG_IPV6) 4978f34e53bSDavid Ahern static inline int rt_genid_ipv6(const struct net *net) 4988f34e53bSDavid Ahern { 4998f34e53bSDavid Ahern return atomic_read(&net->ipv6.fib6_sernum); 5008f34e53bSDavid Ahern } 5018f34e53bSDavid Ahern #endif 5028f34e53bSDavid Ahern 503ca4c3fc2Sfan.du static inline void rt_genid_bump_ipv4(struct net *net) 504b42664f8SNicolas Dichtel { 505ca4c3fc2Sfan.du atomic_inc(&net->ipv4.rt_genid); 506ca4c3fc2Sfan.du } 507ca4c3fc2Sfan.du 508705f1c86SHannes Frederic Sowa extern void (*__fib6_flush_trees)(struct net *net); 509ca4c3fc2Sfan.du static inline void rt_genid_bump_ipv6(struct net *net) 510ca4c3fc2Sfan.du { 511705f1c86SHannes Frederic Sowa if (__fib6_flush_trees) 512705f1c86SHannes Frederic Sowa __fib6_flush_trees(net); 513ca4c3fc2Sfan.du } 514ca4c3fc2Sfan.du 515599018a7SLuis R. Rodriguez #if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN) 516599018a7SLuis R. Rodriguez static inline struct netns_ieee802154_lowpan * 517599018a7SLuis R. Rodriguez net_ieee802154_lowpan(struct net *net) 518599018a7SLuis R. Rodriguez { 519599018a7SLuis R. Rodriguez return &net->ieee802154_lowpan; 520599018a7SLuis R. Rodriguez } 521599018a7SLuis R. Rodriguez #endif 522599018a7SLuis R. Rodriguez 523ca4c3fc2Sfan.du /* For callers who don't really care about whether it's IPv4 or IPv6 */ 524ca4c3fc2Sfan.du static inline void rt_genid_bump_all(struct net *net) 525ca4c3fc2Sfan.du { 526ca4c3fc2Sfan.du rt_genid_bump_ipv4(net); 527ca4c3fc2Sfan.du rt_genid_bump_ipv6(net); 528b42664f8SNicolas Dichtel } 52995bdfccbSEric W. Biederman 53056f200c7SGuillaume Nault static inline int fnhe_genid(const struct net *net) 5315aad1de5STimo Teräs { 5325aad1de5STimo Teräs return atomic_read(&net->fnhe_genid); 5335aad1de5STimo Teräs } 5345aad1de5STimo Teräs 5355aad1de5STimo Teräs static inline void fnhe_genid_bump(struct net *net) 5365aad1de5STimo Teräs { 5375aad1de5STimo Teräs atomic_inc(&net->fnhe_genid); 5385aad1de5STimo Teräs } 5395aad1de5STimo Teräs 5409c1be193SEric Dumazet #ifdef CONFIG_NET 5419c1be193SEric Dumazet void net_ns_init(void); 5429c1be193SEric Dumazet #else 5439c1be193SEric Dumazet static inline void net_ns_init(void) {} 5449c1be193SEric Dumazet #endif 5459c1be193SEric Dumazet 5465f256becSEric W. Biederman #endif /* __NET_NET_NAMESPACE_H */ 547