1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */ 25f256becSEric W. Biederman /* 35f256becSEric W. Biederman * Operations on the network namespace 45f256becSEric W. Biederman */ 55f256becSEric W. Biederman #ifndef __NET_NET_NAMESPACE_H 65f256becSEric W. Biederman #define __NET_NET_NAMESPACE_H 75f256becSEric W. Biederman 860063497SArun Sharma #include <linux/atomic.h> 9c122e14dSReshetova, Elena #include <linux/refcount.h> 105f256becSEric W. Biederman #include <linux/workqueue.h> 115f256becSEric W. Biederman #include <linux/list.h> 12bee95250SDavid S. Miller #include <linux/sysctl.h> 13fbdeaed4STyler Hicks #include <linux/uidgid.h> 145f256becSEric W. Biederman 156a662719SCong Wang #include <net/flow.h> 168efa6e93SPavel Emelyanov #include <net/netns/core.h> 17852566f5SPavel Emelyanov #include <net/netns/mib.h> 18a0a53c8bSDenis V. Lunev #include <net/netns/unix.h> 192aaef4e4SDenis V. Lunev #include <net/netns/packet.h> 208afd351cSPavel Emelyanov #include <net/netns/ipv4.h> 21b0f159dbSDaniel Lezcano #include <net/netns/ipv6.h> 22ab84be7eSDavid Ahern #include <net/netns/nexthop.h> 23633fc86fSAlexander Aring #include <net/netns/ieee802154_6lowpan.h> 244db67e80SEric W. Biederman #include <net/netns/sctp.h> 25f3c1a44aSGao feng #include <net/netns/netfilter.h> 26dfdb8d79SAlexey Dobriyan #if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE) 27dfdb8d79SAlexey Dobriyan #include <net/netns/conntrack.h> 28dfdb8d79SAlexey Dobriyan #endif 2999633ab2SPablo Neira Ayuso #include <net/netns/nftables.h> 30d62ddc21SAlexey Dobriyan #include <net/netns/xfrm.h> 310189197fSEric W. Biederman #include <net/netns/mpls.h> 328e8cda6dSMario Kicherer #include <net/netns/can.h> 331d0dc069SBjörn Töpel #include <net/netns/xdp.h> 34194730a9SGuvenc Gulce #include <net/netns/smc.h> 35a3fd7ceeSJakub Sitnicki #include <net/netns/bpf.h> 36889b7da2SJeremy Kerr #include <net/netns/mctp.h> 37*9ba74e6cSEric Dumazet #include <net/net_trackers.h> 38435d5f4bSAl Viro #include <linux/ns_common.h> 3904c52decSPablo Neira Ayuso #include <linux/idr.h> 4004c52decSPablo Neira Ayuso #include <linux/skbuff.h> 41a30c7b42SJiri Pirko #include <linux/notifier.h> 42a0a53c8bSDenis V. Lunev 43038e7332SEric W. Biederman struct user_namespace; 44457c4cbcSEric W. Biederman struct proc_dir_entry; 452774c7abSEric W. Biederman struct net_device; 4697c53cacSDenis V. Lunev struct sock; 471597fbc0SPavel Emelyanov struct ctl_table_header; 48dec827d1SPavel Emelyanov struct net_generic; 4994e5e308SChristian Brauner struct uevent_sock; 502553d064SJulian Anastasov struct netns_ipvs; 51d58e468bSPetar Penkov struct bpf_prog; 521597fbc0SPavel Emelyanov 537c28bd0bSEric Dumazet 547c28bd0bSEric Dumazet #define NETDEV_HASHBITS 8 557c28bd0bSEric Dumazet #define NETDEV_HASHENTRIES (1 << NETDEV_HASHBITS) 567c28bd0bSEric Dumazet 575f256becSEric W. Biederman struct net { 582a06b898SEric Dumazet /* First cache line can be often dirtied. 592a06b898SEric Dumazet * Do not place here read-mostly fields. 602a06b898SEric Dumazet */ 61aad12c23SMike Rapoport refcount_t passive; /* To decide when the network 625f256becSEric W. Biederman * namespace should be freed. 635f256becSEric W. Biederman */ 648e602ce2SEric Dumazet spinlock_t rules_mod_lock; 658e602ce2SEric Dumazet 662a06b898SEric Dumazet unsigned int dev_unreg_count; 672a06b898SEric Dumazet 682a06b898SEric Dumazet unsigned int dev_base_seq; /* protected by rtnl_mutex */ 692a06b898SEric Dumazet int ifindex; 702a06b898SEric Dumazet 712a06b898SEric Dumazet spinlock_t nsid_lock; 722a06b898SEric Dumazet atomic_t fnhe_genid; 7333cf7c90SEric Dumazet 745f256becSEric W. Biederman struct list_head list; /* list of network namespaces */ 7519efbd93SKirill Tkhai struct list_head exit_list; /* To linked to call pernet exit 764420bf21SKirill Tkhai * methods on dead net ( 774420bf21SKirill Tkhai * pernet_ops_rwsem read locked), 784420bf21SKirill Tkhai * or to unregister pernet ops 794420bf21SKirill Tkhai * (pernet_ops_rwsem write locked). 8019efbd93SKirill Tkhai */ 8165b7b5b9SKirill Tkhai struct llist_node cleanup_list; /* namespaces on death row */ 8265b7b5b9SKirill Tkhai 839b242610SDavid Howells #ifdef CONFIG_KEYS 849b242610SDavid Howells struct key_tag *key_domain; /* Key domain of operation tag */ 859b242610SDavid Howells #endif 86038e7332SEric W. Biederman struct user_namespace *user_ns; /* Owning user namespace */ 8770328660SEric W. Biederman struct ucounts *ucounts; 880c7aecd4SNicolas Dichtel struct idr netns_ids; 89038e7332SEric W. Biederman 90435d5f4bSAl Viro struct ns_common ns; 91*9ba74e6cSEric Dumazet struct ref_tracker_dir refcnt_tracker; 9298f842e6SEric W. Biederman 932a06b898SEric Dumazet struct list_head dev_base_head; 94457c4cbcSEric W. Biederman struct proc_dir_entry *proc_net; 95457c4cbcSEric W. Biederman struct proc_dir_entry *proc_net_stat; 96881d966bSEric W. Biederman 9773455092SAl Viro #ifdef CONFIG_SYSCTL 9873455092SAl Viro struct ctl_table_set sysctls; 9973455092SAl Viro #endif 10095bdfccbSEric W. Biederman 1018e602ce2SEric Dumazet struct sock *rtnl; /* rtnetlink socket */ 1028e602ce2SEric Dumazet struct sock *genl_sock; 1032774c7abSEric W. Biederman 10494e5e308SChristian Brauner struct uevent_sock *uevent_sock; /* uevent socket */ 10594e5e308SChristian Brauner 106881d966bSEric W. Biederman struct hlist_head *dev_name_head; 107881d966bSEric W. Biederman struct hlist_head *dev_index_head; 108a30c7b42SJiri Pirko struct raw_notifier_head netdev_chain; 109a30c7b42SJiri Pirko 1102a06b898SEric Dumazet /* Note that @hash_mix can be read millions times per second, 1112a06b898SEric Dumazet * it is critical that it is on a read_mostly cache line. 1122a06b898SEric Dumazet */ 1132a06b898SEric Dumazet u32 hash_mix; 1142a06b898SEric Dumazet 1152a06b898SEric Dumazet struct net_device *loopback_dev; /* The loopback */ 11697c53cacSDenis V. Lunev 1175fd30ee7SDenis V. Lunev /* core fib_rules */ 1185fd30ee7SDenis V. Lunev struct list_head rules_ops; 1195fd30ee7SDenis V. Lunev 1208efa6e93SPavel Emelyanov struct netns_core core; 121852566f5SPavel Emelyanov struct netns_mib mib; 1222aaef4e4SDenis V. Lunev struct netns_packet packet; 123a0a53c8bSDenis V. Lunev struct netns_unix unx; 124ab84be7eSDavid Ahern struct netns_nexthop nexthop; 1258afd351cSPavel Emelyanov struct netns_ipv4 ipv4; 126dfd56b8bSEric Dumazet #if IS_ENABLED(CONFIG_IPV6) 127b0f159dbSDaniel Lezcano struct netns_ipv6 ipv6; 128b0f159dbSDaniel Lezcano #endif 129633fc86fSAlexander Aring #if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN) 130633fc86fSAlexander Aring struct netns_ieee802154_lowpan ieee802154_lowpan; 131633fc86fSAlexander Aring #endif 1324db67e80SEric W. Biederman #if defined(CONFIG_IP_SCTP) || defined(CONFIG_IP_SCTP_MODULE) 1334db67e80SEric W. Biederman struct netns_sctp sctp; 1344db67e80SEric W. Biederman #endif 1358d870052SAlexey Dobriyan #ifdef CONFIG_NETFILTER 136f3c1a44aSGao feng struct netns_nf nf; 137dfdb8d79SAlexey Dobriyan #if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE) 138dfdb8d79SAlexey Dobriyan struct netns_ct ct; 139dfdb8d79SAlexey Dobriyan #endif 14099633ab2SPablo Neira Ayuso #if defined(CONFIG_NF_TABLES) || defined(CONFIG_NF_TABLES_MODULE) 14199633ab2SPablo Neira Ayuso struct netns_nftables nft; 14299633ab2SPablo Neira Ayuso #endif 1438d870052SAlexey Dobriyan #endif 1443d23e349SJohannes Berg #ifdef CONFIG_WEXT_CORE 145b333b3d2SJohannes Berg struct sk_buff_head wext_nlevents; 146b333b3d2SJohannes Berg #endif 1471c87733dSEric Dumazet struct net_generic __rcu *gen; 1488e602ce2SEric Dumazet 149a3fd7ceeSJakub Sitnicki /* Used to store attached BPF programs */ 150a3fd7ceeSJakub Sitnicki struct netns_bpf bpf; 151d58e468bSPetar Penkov 1528e602ce2SEric Dumazet /* Note : following structs are cache line aligned */ 1538e602ce2SEric Dumazet #ifdef CONFIG_XFRM 1548e602ce2SEric Dumazet struct netns_xfrm xfrm; 1558e602ce2SEric Dumazet #endif 156f318903cSDaniel Borkmann 1573d368ab8SEric Dumazet u64 net_cookie; /* written once */ 158f318903cSDaniel Borkmann 1598b4d14d8SJunweiZhang #if IS_ENABLED(CONFIG_IP_VS) 16061b1ab45SHans Schillstrom struct netns_ipvs *ipvs; 1618b4d14d8SJunweiZhang #endif 1620189197fSEric W. Biederman #if IS_ENABLED(CONFIG_MPLS) 1630189197fSEric W. Biederman struct netns_mpls mpls; 1640189197fSEric W. Biederman #endif 1658e8cda6dSMario Kicherer #if IS_ENABLED(CONFIG_CAN) 1668e8cda6dSMario Kicherer struct netns_can can; 1678e8cda6dSMario Kicherer #endif 1681d0dc069SBjörn Töpel #ifdef CONFIG_XDP_SOCKETS 1691d0dc069SBjörn Töpel struct netns_xdp xdp; 1701d0dc069SBjörn Töpel #endif 171889b7da2SJeremy Kerr #if IS_ENABLED(CONFIG_MCTP) 172889b7da2SJeremy Kerr struct netns_mctp mctp; 173889b7da2SJeremy Kerr #endif 17491b05a7eSOndrej Mosnacek #if IS_ENABLED(CONFIG_CRYPTO_USER) 17591b05a7eSOndrej Mosnacek struct sock *crypto_nlsk; 17691b05a7eSOndrej Mosnacek #endif 17751d7cccfSAndrey Vagin struct sock *diag_nlsk; 178194730a9SGuvenc Gulce #if IS_ENABLED(CONFIG_SMC) 179194730a9SGuvenc Gulce struct netns_smc smc; 180194730a9SGuvenc Gulce #endif 1813859a271SKees Cook } __randomize_layout; 1825f256becSEric W. Biederman 183c0f39322SDenis V. Lunev #include <linux/seq_file_net.h> 184c0f39322SDenis V. Lunev 1854fabcd71SDaniel Lezcano /* Init's network namespace */ 1865f256becSEric W. Biederman extern struct net init_net; 187a4aa834aSDenis V. Lunev 188d727abcbSEric W. Biederman #ifdef CONFIG_NET_NS 189e67e16eaSJoe Perches struct net *copy_net_ns(unsigned long flags, struct user_namespace *user_ns, 190e67e16eaSJoe Perches struct net *old_net); 191225c0a01SDenis V. Lunev 192fbdeaed4STyler Hicks void net_ns_get_ownership(const struct net *net, kuid_t *uid, kgid_t *gid); 193fbdeaed4STyler Hicks 1947866cc57SFlorian Westphal void net_ns_barrier(void); 195ea6932d7SChangbin Du 196ea6932d7SChangbin Du struct ns_common *get_net_ns(struct ns_common *ns); 197e34492deSChangbin Du struct net *get_net_ns_by_fd(int fd); 198d727abcbSEric W. Biederman #else /* CONFIG_NET_NS */ 199d727abcbSEric W. Biederman #include <linux/sched.h> 200d727abcbSEric W. Biederman #include <linux/nsproxy.h> 201038e7332SEric W. Biederman static inline struct net *copy_net_ns(unsigned long flags, 202038e7332SEric W. Biederman struct user_namespace *user_ns, struct net *old_net) 2039dd776b6SEric W. Biederman { 204d727abcbSEric W. Biederman if (flags & CLONE_NEWNET) 205d727abcbSEric W. Biederman return ERR_PTR(-EINVAL); 206d727abcbSEric W. Biederman return old_net; 2079dd776b6SEric W. Biederman } 2087866cc57SFlorian Westphal 209fbdeaed4STyler Hicks static inline void net_ns_get_ownership(const struct net *net, 210fbdeaed4STyler Hicks kuid_t *uid, kgid_t *gid) 211fbdeaed4STyler Hicks { 212fbdeaed4STyler Hicks *uid = GLOBAL_ROOT_UID; 213fbdeaed4STyler Hicks *gid = GLOBAL_ROOT_GID; 214fbdeaed4STyler Hicks } 215fbdeaed4STyler Hicks 2167866cc57SFlorian Westphal static inline void net_ns_barrier(void) {} 217ea6932d7SChangbin Du 218ea6932d7SChangbin Du static inline struct ns_common *get_net_ns(struct ns_common *ns) 219ea6932d7SChangbin Du { 220ea6932d7SChangbin Du return ERR_PTR(-EINVAL); 221ea6932d7SChangbin Du } 222e34492deSChangbin Du 223e34492deSChangbin Du static inline struct net *get_net_ns_by_fd(int fd) 224e34492deSChangbin Du { 225e34492deSChangbin Du return ERR_PTR(-EINVAL); 226e34492deSChangbin Du } 227d727abcbSEric W. Biederman #endif /* CONFIG_NET_NS */ 228225c0a01SDenis V. Lunev 229225c0a01SDenis V. Lunev 230225c0a01SDenis V. Lunev extern struct list_head net_namespace_list; 2319dd776b6SEric W. Biederman 232e67e16eaSJoe Perches struct net *get_net_ns_by_pid(pid_t pid); 23330ffee84SJohannes Berg 234535d3ae9SRashika Kheria #ifdef CONFIG_SYSCTL 235535d3ae9SRashika Kheria void ipx_register_sysctl(void); 236535d3ae9SRashika Kheria void ipx_unregister_sysctl(void); 237535d3ae9SRashika Kheria #else 238535d3ae9SRashika Kheria #define ipx_register_sysctl() 239535d3ae9SRashika Kheria #define ipx_unregister_sysctl() 240535d3ae9SRashika Kheria #endif 241535d3ae9SRashika Kheria 242d4655795SPavel Emelyanov #ifdef CONFIG_NET_NS 243e67e16eaSJoe Perches void __put_net(struct net *net); 2445f256becSEric W. Biederman 245*9ba74e6cSEric Dumazet /* Try using get_net_track() instead */ 2465f256becSEric W. Biederman static inline struct net *get_net(struct net *net) 2475f256becSEric W. Biederman { 2488b8f3e66SChristian Brauner refcount_inc(&net->ns.count); 2495f256becSEric W. Biederman return net; 2505f256becSEric W. Biederman } 2515f256becSEric W. Biederman 252077130c0SEric W. Biederman static inline struct net *maybe_get_net(struct net *net) 253077130c0SEric W. Biederman { 254077130c0SEric W. Biederman /* Used when we know struct net exists but we 255077130c0SEric W. Biederman * aren't guaranteed a previous reference count 256077130c0SEric W. Biederman * exists. If the reference count is zero this 257077130c0SEric W. Biederman * function fails and returns NULL. 258077130c0SEric W. Biederman */ 2598b8f3e66SChristian Brauner if (!refcount_inc_not_zero(&net->ns.count)) 260077130c0SEric W. Biederman net = NULL; 261077130c0SEric W. Biederman return net; 262077130c0SEric W. Biederman } 263077130c0SEric W. Biederman 264*9ba74e6cSEric Dumazet /* Try using put_net_track() instead */ 2655f256becSEric W. Biederman static inline void put_net(struct net *net) 2665f256becSEric W. Biederman { 2678b8f3e66SChristian Brauner if (refcount_dec_and_test(&net->ns.count)) 2685f256becSEric W. Biederman __put_net(net); 2695f256becSEric W. Biederman } 2705f256becSEric W. Biederman 271878628fbSYOSHIFUJI Hideaki static inline 272878628fbSYOSHIFUJI Hideaki int net_eq(const struct net *net1, const struct net *net2) 273878628fbSYOSHIFUJI Hideaki { 274878628fbSYOSHIFUJI Hideaki return net1 == net2; 275878628fbSYOSHIFUJI Hideaki } 276a685e089SAl Viro 2774ee806d5SDan Streetman static inline int check_net(const struct net *net) 2784ee806d5SDan Streetman { 2798b8f3e66SChristian Brauner return refcount_read(&net->ns.count) != 0; 2804ee806d5SDan Streetman } 2814ee806d5SDan Streetman 282e67e16eaSJoe Perches void net_drop_ns(void *); 283a685e089SAl Viro 284d4655795SPavel Emelyanov #else 285b9f75f45SEric W. Biederman 286d4655795SPavel Emelyanov static inline struct net *get_net(struct net *net) 287d4655795SPavel Emelyanov { 288d4655795SPavel Emelyanov return net; 289d4655795SPavel Emelyanov } 290d4655795SPavel Emelyanov 291d4655795SPavel Emelyanov static inline void put_net(struct net *net) 292d4655795SPavel Emelyanov { 293d4655795SPavel Emelyanov } 294d4655795SPavel Emelyanov 295d4655795SPavel Emelyanov static inline struct net *maybe_get_net(struct net *net) 296d4655795SPavel Emelyanov { 297d4655795SPavel Emelyanov return net; 298d4655795SPavel Emelyanov } 299878628fbSYOSHIFUJI Hideaki 300878628fbSYOSHIFUJI Hideaki static inline 301878628fbSYOSHIFUJI Hideaki int net_eq(const struct net *net1, const struct net *net2) 302878628fbSYOSHIFUJI Hideaki { 303878628fbSYOSHIFUJI Hideaki return 1; 304878628fbSYOSHIFUJI Hideaki } 305a685e089SAl Viro 3064ee806d5SDan Streetman static inline int check_net(const struct net *net) 3074ee806d5SDan Streetman { 3084ee806d5SDan Streetman return 1; 3094ee806d5SDan Streetman } 3104ee806d5SDan Streetman 311a685e089SAl Viro #define net_drop_ns NULL 312d4655795SPavel Emelyanov #endif 3135f256becSEric W. Biederman 3145d1e4468SDenis V. Lunev 315*9ba74e6cSEric Dumazet static inline void netns_tracker_alloc(struct net *net, 316*9ba74e6cSEric Dumazet netns_tracker *tracker, gfp_t gfp) 317*9ba74e6cSEric Dumazet { 318*9ba74e6cSEric Dumazet #ifdef CONFIG_NET_NS_REFCNT_TRACKER 319*9ba74e6cSEric Dumazet ref_tracker_alloc(&net->refcnt_tracker, tracker, gfp); 320*9ba74e6cSEric Dumazet #endif 321*9ba74e6cSEric Dumazet } 322*9ba74e6cSEric Dumazet 323*9ba74e6cSEric Dumazet static inline void netns_tracker_free(struct net *net, 324*9ba74e6cSEric Dumazet netns_tracker *tracker) 325*9ba74e6cSEric Dumazet { 326*9ba74e6cSEric Dumazet #ifdef CONFIG_NET_NS_REFCNT_TRACKER 327*9ba74e6cSEric Dumazet ref_tracker_free(&net->refcnt_tracker, tracker); 328*9ba74e6cSEric Dumazet #endif 329*9ba74e6cSEric Dumazet } 330*9ba74e6cSEric Dumazet 331*9ba74e6cSEric Dumazet static inline struct net *get_net_track(struct net *net, 332*9ba74e6cSEric Dumazet netns_tracker *tracker, gfp_t gfp) 333*9ba74e6cSEric Dumazet { 334*9ba74e6cSEric Dumazet get_net(net); 335*9ba74e6cSEric Dumazet netns_tracker_alloc(net, tracker, gfp); 336*9ba74e6cSEric Dumazet return net; 337*9ba74e6cSEric Dumazet } 338*9ba74e6cSEric Dumazet 339*9ba74e6cSEric Dumazet static inline void put_net_track(struct net *net, netns_tracker *tracker) 340*9ba74e6cSEric Dumazet { 341*9ba74e6cSEric Dumazet netns_tracker_free(net, tracker); 342*9ba74e6cSEric Dumazet put_net(net); 343*9ba74e6cSEric Dumazet } 344*9ba74e6cSEric Dumazet 3450c5c9fb5SEric W. Biederman typedef struct { 3468f424b5fSEric Dumazet #ifdef CONFIG_NET_NS 3470c5c9fb5SEric W. Biederman struct net *net; 3488f424b5fSEric Dumazet #endif 3490c5c9fb5SEric W. Biederman } possible_net_t; 3500c5c9fb5SEric W. Biederman 3510c5c9fb5SEric W. Biederman static inline void write_pnet(possible_net_t *pnet, struct net *net) 3520c5c9fb5SEric W. Biederman { 3530c5c9fb5SEric W. Biederman #ifdef CONFIG_NET_NS 3540c5c9fb5SEric W. Biederman pnet->net = net; 3550c5c9fb5SEric W. Biederman #endif 3560c5c9fb5SEric W. Biederman } 3570c5c9fb5SEric W. Biederman 3580c5c9fb5SEric W. Biederman static inline struct net *read_pnet(const possible_net_t *pnet) 3590c5c9fb5SEric W. Biederman { 3600c5c9fb5SEric W. Biederman #ifdef CONFIG_NET_NS 3610c5c9fb5SEric W. Biederman return pnet->net; 3620c5c9fb5SEric W. Biederman #else 3630c5c9fb5SEric W. Biederman return &init_net; 3640c5c9fb5SEric W. Biederman #endif 3650c5c9fb5SEric W. Biederman } 3665d1e4468SDenis V. Lunev 367f0b07bb1SKirill Tkhai /* Protected by net_rwsem */ 3685f256becSEric W. Biederman #define for_each_net(VAR) \ 3695f256becSEric W. Biederman list_for_each_entry(VAR, &net_namespace_list, list) 370afa0df59SJiri Pirko #define for_each_net_continue_reverse(VAR) \ 371afa0df59SJiri Pirko list_for_each_entry_continue_reverse(VAR, &net_namespace_list, list) 37211a28d37SJohannes Berg #define for_each_net_rcu(VAR) \ 37311a28d37SJohannes Berg list_for_each_entry_rcu(VAR, &net_namespace_list, list) 37411a28d37SJohannes Berg 3754665079cSPavel Emelyanov #ifdef CONFIG_NET_NS 3764665079cSPavel Emelyanov #define __net_init 3774665079cSPavel Emelyanov #define __net_exit 378022cbae6SDenis V. Lunev #define __net_initdata 37904a6f82cSAndi Kleen #define __net_initconst 3804665079cSPavel Emelyanov #else 3814665079cSPavel Emelyanov #define __net_init __init 382bd721ea7SFabian Frederick #define __net_exit __ref 383022cbae6SDenis V. Lunev #define __net_initdata __initdata 38404a6f82cSAndi Kleen #define __net_initconst __initconst 3854665079cSPavel Emelyanov #endif 3865f256becSEric W. Biederman 387d4e4fdf9SGuillaume Nault int peernet2id_alloc(struct net *net, struct net *peer, gfp_t gfp); 38856f200c7SGuillaume Nault int peernet2id(const struct net *net, struct net *peer); 38956f200c7SGuillaume Nault bool peernet_has_id(const struct net *net, struct net *peer); 39056f200c7SGuillaume Nault struct net *get_net_ns_by_id(const struct net *net, int id); 3910c7aecd4SNicolas Dichtel 3925f256becSEric W. Biederman struct pernet_operations { 3935f256becSEric W. Biederman struct list_head list; 3946056415dSKirill Tkhai /* 3956056415dSKirill Tkhai * Below methods are called without any exclusive locks. 3966056415dSKirill Tkhai * More than one net may be constructed and destructed 3976056415dSKirill Tkhai * in parallel on several cpus. Every pernet_operations 3986056415dSKirill Tkhai * have to keep in mind all other pernet_operations and 3996056415dSKirill Tkhai * to introduce a locking, if they share common resources. 4006056415dSKirill Tkhai * 4018518e9bbSKirill Tkhai * The only time they are called with exclusive lock is 4028518e9bbSKirill Tkhai * from register_pernet_subsys(), unregister_pernet_subsys() 4038518e9bbSKirill Tkhai * register_pernet_device() and unregister_pernet_device(). 4048518e9bbSKirill Tkhai * 4056056415dSKirill Tkhai * Exit methods using blocking RCU primitives, such as 4066056415dSKirill Tkhai * synchronize_rcu(), should be implemented via exit_batch. 4076056415dSKirill Tkhai * Then, destruction of a group of net requires single 4086056415dSKirill Tkhai * synchronize_rcu() related to these pernet_operations, 4096056415dSKirill Tkhai * instead of separate synchronize_rcu() for every net. 4106056415dSKirill Tkhai * Please, avoid synchronize_rcu() at all, where it's possible. 411d7d99872SEric Dumazet * 412d7d99872SEric Dumazet * Note that a combination of pre_exit() and exit() can 413d7d99872SEric Dumazet * be used, since a synchronize_rcu() is guaranteed between 414d7d99872SEric Dumazet * the calls. 4156056415dSKirill Tkhai */ 4165f256becSEric W. Biederman int (*init)(struct net *net); 417d7d99872SEric Dumazet void (*pre_exit)(struct net *net); 4185f256becSEric W. Biederman void (*exit)(struct net *net); 41972ad937aSEric W. Biederman void (*exit_batch)(struct list_head *net_exit_list); 420c7d03a00SAlexey Dobriyan unsigned int *id; 421f875bae0SEric W. Biederman size_t size; 4225f256becSEric W. Biederman }; 4235f256becSEric W. Biederman 42417edde52SEric W. Biederman /* 42517edde52SEric W. Biederman * Use these carefully. If you implement a network device and it 42617edde52SEric W. Biederman * needs per network namespace operations use device pernet operations, 42717edde52SEric W. Biederman * otherwise use pernet subsys operations. 42817edde52SEric W. Biederman * 4294edf547bSJohannes Berg * Network interfaces need to be removed from a dying netns _before_ 4304edf547bSJohannes Berg * subsys notifiers can be called, as most of the network code cleanup 4314edf547bSJohannes Berg * (which is done from subsys notifiers) runs with the assumption that 4324edf547bSJohannes Berg * dev_remove_pack has been called so no new packets will arrive during 4334edf547bSJohannes Berg * and after the cleanup functions have been called. dev_remove_pack 4344edf547bSJohannes Berg * is not per namespace so instead the guarantee of no more packets 4354edf547bSJohannes Berg * arriving in a network namespace is provided by ensuring that all 4364edf547bSJohannes Berg * network devices and all sockets have left the network namespace 4374edf547bSJohannes Berg * before the cleanup methods are called. 43817edde52SEric W. Biederman * 43917edde52SEric W. Biederman * For the longest time the ipv4 icmp code was registered as a pernet 44017edde52SEric W. Biederman * device which caused kernel oops, and panics during network 44117edde52SEric W. Biederman * namespace cleanup. So please don't get this wrong. 44217edde52SEric W. Biederman */ 443e67e16eaSJoe Perches int register_pernet_subsys(struct pernet_operations *); 444e67e16eaSJoe Perches void unregister_pernet_subsys(struct pernet_operations *); 445e67e16eaSJoe Perches int register_pernet_device(struct pernet_operations *); 446e67e16eaSJoe Perches void unregister_pernet_device(struct pernet_operations *); 447f875bae0SEric W. Biederman 44895bdfccbSEric W. Biederman struct ctl_table; 449d62c612eSPavel Emelyanov 4502ca794e5SEric W. Biederman #ifdef CONFIG_SYSCTL 451e67e16eaSJoe Perches int net_sysctl_init(void); 452e67e16eaSJoe Perches struct ctl_table_header *register_net_sysctl(struct net *net, const char *path, 453e67e16eaSJoe Perches struct ctl_table *table); 454e67e16eaSJoe Perches void unregister_net_sysctl_table(struct ctl_table_header *header); 45548c74958SEric W. Biederman #else 45648c74958SEric W. Biederman static inline int net_sysctl_init(void) { return 0; } 45748c74958SEric W. Biederman static inline struct ctl_table_header *register_net_sysctl(struct net *net, 45848c74958SEric W. Biederman const char *path, struct ctl_table *table) 45948c74958SEric W. Biederman { 46048c74958SEric W. Biederman return NULL; 46148c74958SEric W. Biederman } 46248c74958SEric W. Biederman static inline void unregister_net_sysctl_table(struct ctl_table_header *header) 46348c74958SEric W. Biederman { 46448c74958SEric W. Biederman } 46548c74958SEric W. Biederman #endif 46648c74958SEric W. Biederman 46756f200c7SGuillaume Nault static inline int rt_genid_ipv4(const struct net *net) 468b42664f8SNicolas Dichtel { 469ca4c3fc2Sfan.du return atomic_read(&net->ipv4.rt_genid); 470b42664f8SNicolas Dichtel } 471b42664f8SNicolas Dichtel 4728f34e53bSDavid Ahern #if IS_ENABLED(CONFIG_IPV6) 4738f34e53bSDavid Ahern static inline int rt_genid_ipv6(const struct net *net) 4748f34e53bSDavid Ahern { 4758f34e53bSDavid Ahern return atomic_read(&net->ipv6.fib6_sernum); 4768f34e53bSDavid Ahern } 4778f34e53bSDavid Ahern #endif 4788f34e53bSDavid Ahern 479ca4c3fc2Sfan.du static inline void rt_genid_bump_ipv4(struct net *net) 480b42664f8SNicolas Dichtel { 481ca4c3fc2Sfan.du atomic_inc(&net->ipv4.rt_genid); 482ca4c3fc2Sfan.du } 483ca4c3fc2Sfan.du 484705f1c86SHannes Frederic Sowa extern void (*__fib6_flush_trees)(struct net *net); 485ca4c3fc2Sfan.du static inline void rt_genid_bump_ipv6(struct net *net) 486ca4c3fc2Sfan.du { 487705f1c86SHannes Frederic Sowa if (__fib6_flush_trees) 488705f1c86SHannes Frederic Sowa __fib6_flush_trees(net); 489ca4c3fc2Sfan.du } 490ca4c3fc2Sfan.du 491599018a7SLuis R. Rodriguez #if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN) 492599018a7SLuis R. Rodriguez static inline struct netns_ieee802154_lowpan * 493599018a7SLuis R. Rodriguez net_ieee802154_lowpan(struct net *net) 494599018a7SLuis R. Rodriguez { 495599018a7SLuis R. Rodriguez return &net->ieee802154_lowpan; 496599018a7SLuis R. Rodriguez } 497599018a7SLuis R. Rodriguez #endif 498599018a7SLuis R. Rodriguez 499ca4c3fc2Sfan.du /* For callers who don't really care about whether it's IPv4 or IPv6 */ 500ca4c3fc2Sfan.du static inline void rt_genid_bump_all(struct net *net) 501ca4c3fc2Sfan.du { 502ca4c3fc2Sfan.du rt_genid_bump_ipv4(net); 503ca4c3fc2Sfan.du rt_genid_bump_ipv6(net); 504b42664f8SNicolas Dichtel } 50595bdfccbSEric W. Biederman 50656f200c7SGuillaume Nault static inline int fnhe_genid(const struct net *net) 5075aad1de5STimo Teräs { 5085aad1de5STimo Teräs return atomic_read(&net->fnhe_genid); 5095aad1de5STimo Teräs } 5105aad1de5STimo Teräs 5115aad1de5STimo Teräs static inline void fnhe_genid_bump(struct net *net) 5125aad1de5STimo Teräs { 5135aad1de5STimo Teräs atomic_inc(&net->fnhe_genid); 5145aad1de5STimo Teräs } 5155aad1de5STimo Teräs 5165f256becSEric W. Biederman #endif /* __NET_NET_NAMESPACE_H */ 517