1b2441318SGreg Kroah-Hartman /* SPDX-License-Identifier: GPL-2.0 */ 25f256becSEric W. Biederman /* 35f256becSEric W. Biederman * Operations on the network namespace 45f256becSEric W. Biederman */ 55f256becSEric W. Biederman #ifndef __NET_NET_NAMESPACE_H 65f256becSEric W. Biederman #define __NET_NET_NAMESPACE_H 75f256becSEric W. Biederman 860063497SArun Sharma #include <linux/atomic.h> 9c122e14dSReshetova, Elena #include <linux/refcount.h> 105f256becSEric W. Biederman #include <linux/workqueue.h> 115f256becSEric W. Biederman #include <linux/list.h> 12bee95250SDavid S. Miller #include <linux/sysctl.h> 13fbdeaed4STyler Hicks #include <linux/uidgid.h> 145f256becSEric W. Biederman 156a662719SCong Wang #include <net/flow.h> 168efa6e93SPavel Emelyanov #include <net/netns/core.h> 17852566f5SPavel Emelyanov #include <net/netns/mib.h> 18a0a53c8bSDenis V. Lunev #include <net/netns/unix.h> 192aaef4e4SDenis V. Lunev #include <net/netns/packet.h> 208afd351cSPavel Emelyanov #include <net/netns/ipv4.h> 21b0f159dbSDaniel Lezcano #include <net/netns/ipv6.h> 22ab84be7eSDavid Ahern #include <net/netns/nexthop.h> 23633fc86fSAlexander Aring #include <net/netns/ieee802154_6lowpan.h> 244db67e80SEric W. Biederman #include <net/netns/sctp.h> 25f3c1a44aSGao feng #include <net/netns/netfilter.h> 26dfdb8d79SAlexey Dobriyan #if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE) 27dfdb8d79SAlexey Dobriyan #include <net/netns/conntrack.h> 28dfdb8d79SAlexey Dobriyan #endif 2999633ab2SPablo Neira Ayuso #include <net/netns/nftables.h> 30d62ddc21SAlexey Dobriyan #include <net/netns/xfrm.h> 310189197fSEric W. Biederman #include <net/netns/mpls.h> 328e8cda6dSMario Kicherer #include <net/netns/can.h> 331d0dc069SBjörn Töpel #include <net/netns/xdp.h> 34194730a9SGuvenc Gulce #include <net/netns/smc.h> 35a3fd7ceeSJakub Sitnicki #include <net/netns/bpf.h> 36889b7da2SJeremy Kerr #include <net/netns/mctp.h> 379ba74e6cSEric Dumazet #include <net/net_trackers.h> 38435d5f4bSAl Viro #include <linux/ns_common.h> 3904c52decSPablo Neira Ayuso #include <linux/idr.h> 4004c52decSPablo Neira Ayuso #include <linux/skbuff.h> 41a30c7b42SJiri Pirko #include <linux/notifier.h> 42a0a53c8bSDenis V. Lunev 43038e7332SEric W. Biederman struct user_namespace; 44457c4cbcSEric W. Biederman struct proc_dir_entry; 452774c7abSEric W. Biederman struct net_device; 4697c53cacSDenis V. Lunev struct sock; 471597fbc0SPavel Emelyanov struct ctl_table_header; 48dec827d1SPavel Emelyanov struct net_generic; 4994e5e308SChristian Brauner struct uevent_sock; 502553d064SJulian Anastasov struct netns_ipvs; 51d58e468bSPetar Penkov struct bpf_prog; 521597fbc0SPavel Emelyanov 537c28bd0bSEric Dumazet 547c28bd0bSEric Dumazet #define NETDEV_HASHBITS 8 557c28bd0bSEric Dumazet #define NETDEV_HASHENTRIES (1 << NETDEV_HASHBITS) 567c28bd0bSEric Dumazet 575f256becSEric W. Biederman struct net { 582a06b898SEric Dumazet /* First cache line can be often dirtied. 592a06b898SEric Dumazet * Do not place here read-mostly fields. 602a06b898SEric Dumazet */ 61aad12c23SMike Rapoport refcount_t passive; /* To decide when the network 625f256becSEric W. Biederman * namespace should be freed. 635f256becSEric W. Biederman */ 648e602ce2SEric Dumazet spinlock_t rules_mod_lock; 658e602ce2SEric Dumazet 66ede6c39cSEric Dumazet atomic_t dev_unreg_count; 672a06b898SEric Dumazet 682a06b898SEric Dumazet unsigned int dev_base_seq; /* protected by rtnl_mutex */ 692a06b898SEric Dumazet int ifindex; 702a06b898SEric Dumazet 712a06b898SEric Dumazet spinlock_t nsid_lock; 722a06b898SEric Dumazet atomic_t fnhe_genid; 7333cf7c90SEric Dumazet 745f256becSEric W. Biederman struct list_head list; /* list of network namespaces */ 7519efbd93SKirill Tkhai struct list_head exit_list; /* To linked to call pernet exit 764420bf21SKirill Tkhai * methods on dead net ( 774420bf21SKirill Tkhai * pernet_ops_rwsem read locked), 784420bf21SKirill Tkhai * or to unregister pernet ops 794420bf21SKirill Tkhai * (pernet_ops_rwsem write locked). 8019efbd93SKirill Tkhai */ 8165b7b5b9SKirill Tkhai struct llist_node cleanup_list; /* namespaces on death row */ 8265b7b5b9SKirill Tkhai 839b242610SDavid Howells #ifdef CONFIG_KEYS 849b242610SDavid Howells struct key_tag *key_domain; /* Key domain of operation tag */ 859b242610SDavid Howells #endif 86038e7332SEric W. Biederman struct user_namespace *user_ns; /* Owning user namespace */ 8770328660SEric W. Biederman struct ucounts *ucounts; 880c7aecd4SNicolas Dichtel struct idr netns_ids; 89038e7332SEric W. Biederman 90435d5f4bSAl Viro struct ns_common ns; 919ba74e6cSEric Dumazet struct ref_tracker_dir refcnt_tracker; 9298f842e6SEric W. Biederman 932a06b898SEric Dumazet struct list_head dev_base_head; 94457c4cbcSEric W. Biederman struct proc_dir_entry *proc_net; 95457c4cbcSEric W. Biederman struct proc_dir_entry *proc_net_stat; 96881d966bSEric W. Biederman 9773455092SAl Viro #ifdef CONFIG_SYSCTL 9873455092SAl Viro struct ctl_table_set sysctls; 9973455092SAl Viro #endif 10095bdfccbSEric W. Biederman 1018e602ce2SEric Dumazet struct sock *rtnl; /* rtnetlink socket */ 1028e602ce2SEric Dumazet struct sock *genl_sock; 1032774c7abSEric W. Biederman 10494e5e308SChristian Brauner struct uevent_sock *uevent_sock; /* uevent socket */ 10594e5e308SChristian Brauner 106881d966bSEric W. Biederman struct hlist_head *dev_name_head; 107881d966bSEric W. Biederman struct hlist_head *dev_index_head; 108a30c7b42SJiri Pirko struct raw_notifier_head netdev_chain; 109a30c7b42SJiri Pirko 1102a06b898SEric Dumazet /* Note that @hash_mix can be read millions times per second, 1112a06b898SEric Dumazet * it is critical that it is on a read_mostly cache line. 1122a06b898SEric Dumazet */ 1132a06b898SEric Dumazet u32 hash_mix; 1142a06b898SEric Dumazet 1152a06b898SEric Dumazet struct net_device *loopback_dev; /* The loopback */ 11697c53cacSDenis V. Lunev 1175fd30ee7SDenis V. Lunev /* core fib_rules */ 1185fd30ee7SDenis V. Lunev struct list_head rules_ops; 1195fd30ee7SDenis V. Lunev 1208efa6e93SPavel Emelyanov struct netns_core core; 121852566f5SPavel Emelyanov struct netns_mib mib; 1222aaef4e4SDenis V. Lunev struct netns_packet packet; 123*b6e81138SKuniyuki Iwashima #if IS_ENABLED(CONFIG_UNIX) 124a0a53c8bSDenis V. Lunev struct netns_unix unx; 125*b6e81138SKuniyuki Iwashima #endif 126ab84be7eSDavid Ahern struct netns_nexthop nexthop; 1278afd351cSPavel Emelyanov struct netns_ipv4 ipv4; 128dfd56b8bSEric Dumazet #if IS_ENABLED(CONFIG_IPV6) 129b0f159dbSDaniel Lezcano struct netns_ipv6 ipv6; 130b0f159dbSDaniel Lezcano #endif 131633fc86fSAlexander Aring #if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN) 132633fc86fSAlexander Aring struct netns_ieee802154_lowpan ieee802154_lowpan; 133633fc86fSAlexander Aring #endif 1344db67e80SEric W. Biederman #if defined(CONFIG_IP_SCTP) || defined(CONFIG_IP_SCTP_MODULE) 1354db67e80SEric W. Biederman struct netns_sctp sctp; 1364db67e80SEric W. Biederman #endif 1378d870052SAlexey Dobriyan #ifdef CONFIG_NETFILTER 138f3c1a44aSGao feng struct netns_nf nf; 139dfdb8d79SAlexey Dobriyan #if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE) 140dfdb8d79SAlexey Dobriyan struct netns_ct ct; 141dfdb8d79SAlexey Dobriyan #endif 14299633ab2SPablo Neira Ayuso #if defined(CONFIG_NF_TABLES) || defined(CONFIG_NF_TABLES_MODULE) 14399633ab2SPablo Neira Ayuso struct netns_nftables nft; 14499633ab2SPablo Neira Ayuso #endif 1458d870052SAlexey Dobriyan #endif 1463d23e349SJohannes Berg #ifdef CONFIG_WEXT_CORE 147b333b3d2SJohannes Berg struct sk_buff_head wext_nlevents; 148b333b3d2SJohannes Berg #endif 1491c87733dSEric Dumazet struct net_generic __rcu *gen; 1508e602ce2SEric Dumazet 151a3fd7ceeSJakub Sitnicki /* Used to store attached BPF programs */ 152a3fd7ceeSJakub Sitnicki struct netns_bpf bpf; 153d58e468bSPetar Penkov 1548e602ce2SEric Dumazet /* Note : following structs are cache line aligned */ 1558e602ce2SEric Dumazet #ifdef CONFIG_XFRM 1568e602ce2SEric Dumazet struct netns_xfrm xfrm; 1578e602ce2SEric Dumazet #endif 158f318903cSDaniel Borkmann 1593d368ab8SEric Dumazet u64 net_cookie; /* written once */ 160f318903cSDaniel Borkmann 1618b4d14d8SJunweiZhang #if IS_ENABLED(CONFIG_IP_VS) 16261b1ab45SHans Schillstrom struct netns_ipvs *ipvs; 1638b4d14d8SJunweiZhang #endif 1640189197fSEric W. Biederman #if IS_ENABLED(CONFIG_MPLS) 1650189197fSEric W. Biederman struct netns_mpls mpls; 1660189197fSEric W. Biederman #endif 1678e8cda6dSMario Kicherer #if IS_ENABLED(CONFIG_CAN) 1688e8cda6dSMario Kicherer struct netns_can can; 1698e8cda6dSMario Kicherer #endif 1701d0dc069SBjörn Töpel #ifdef CONFIG_XDP_SOCKETS 1711d0dc069SBjörn Töpel struct netns_xdp xdp; 1721d0dc069SBjörn Töpel #endif 173889b7da2SJeremy Kerr #if IS_ENABLED(CONFIG_MCTP) 174889b7da2SJeremy Kerr struct netns_mctp mctp; 175889b7da2SJeremy Kerr #endif 17691b05a7eSOndrej Mosnacek #if IS_ENABLED(CONFIG_CRYPTO_USER) 17791b05a7eSOndrej Mosnacek struct sock *crypto_nlsk; 17891b05a7eSOndrej Mosnacek #endif 17951d7cccfSAndrey Vagin struct sock *diag_nlsk; 180194730a9SGuvenc Gulce #if IS_ENABLED(CONFIG_SMC) 181194730a9SGuvenc Gulce struct netns_smc smc; 182194730a9SGuvenc Gulce #endif 1833859a271SKees Cook } __randomize_layout; 1845f256becSEric W. Biederman 185c0f39322SDenis V. Lunev #include <linux/seq_file_net.h> 186c0f39322SDenis V. Lunev 1874fabcd71SDaniel Lezcano /* Init's network namespace */ 1885f256becSEric W. Biederman extern struct net init_net; 189a4aa834aSDenis V. Lunev 190d727abcbSEric W. Biederman #ifdef CONFIG_NET_NS 191e67e16eaSJoe Perches struct net *copy_net_ns(unsigned long flags, struct user_namespace *user_ns, 192e67e16eaSJoe Perches struct net *old_net); 193225c0a01SDenis V. Lunev 194fbdeaed4STyler Hicks void net_ns_get_ownership(const struct net *net, kuid_t *uid, kgid_t *gid); 195fbdeaed4STyler Hicks 1967866cc57SFlorian Westphal void net_ns_barrier(void); 197ea6932d7SChangbin Du 198ea6932d7SChangbin Du struct ns_common *get_net_ns(struct ns_common *ns); 199e34492deSChangbin Du struct net *get_net_ns_by_fd(int fd); 200d727abcbSEric W. Biederman #else /* CONFIG_NET_NS */ 201d727abcbSEric W. Biederman #include <linux/sched.h> 202d727abcbSEric W. Biederman #include <linux/nsproxy.h> 203038e7332SEric W. Biederman static inline struct net *copy_net_ns(unsigned long flags, 204038e7332SEric W. Biederman struct user_namespace *user_ns, struct net *old_net) 2059dd776b6SEric W. Biederman { 206d727abcbSEric W. Biederman if (flags & CLONE_NEWNET) 207d727abcbSEric W. Biederman return ERR_PTR(-EINVAL); 208d727abcbSEric W. Biederman return old_net; 2099dd776b6SEric W. Biederman } 2107866cc57SFlorian Westphal 211fbdeaed4STyler Hicks static inline void net_ns_get_ownership(const struct net *net, 212fbdeaed4STyler Hicks kuid_t *uid, kgid_t *gid) 213fbdeaed4STyler Hicks { 214fbdeaed4STyler Hicks *uid = GLOBAL_ROOT_UID; 215fbdeaed4STyler Hicks *gid = GLOBAL_ROOT_GID; 216fbdeaed4STyler Hicks } 217fbdeaed4STyler Hicks 2187866cc57SFlorian Westphal static inline void net_ns_barrier(void) {} 219ea6932d7SChangbin Du 220ea6932d7SChangbin Du static inline struct ns_common *get_net_ns(struct ns_common *ns) 221ea6932d7SChangbin Du { 222ea6932d7SChangbin Du return ERR_PTR(-EINVAL); 223ea6932d7SChangbin Du } 224e34492deSChangbin Du 225e34492deSChangbin Du static inline struct net *get_net_ns_by_fd(int fd) 226e34492deSChangbin Du { 227e34492deSChangbin Du return ERR_PTR(-EINVAL); 228e34492deSChangbin Du } 229d727abcbSEric W. Biederman #endif /* CONFIG_NET_NS */ 230225c0a01SDenis V. Lunev 231225c0a01SDenis V. Lunev 232225c0a01SDenis V. Lunev extern struct list_head net_namespace_list; 2339dd776b6SEric W. Biederman 234e67e16eaSJoe Perches struct net *get_net_ns_by_pid(pid_t pid); 23530ffee84SJohannes Berg 236535d3ae9SRashika Kheria #ifdef CONFIG_SYSCTL 237535d3ae9SRashika Kheria void ipx_register_sysctl(void); 238535d3ae9SRashika Kheria void ipx_unregister_sysctl(void); 239535d3ae9SRashika Kheria #else 240535d3ae9SRashika Kheria #define ipx_register_sysctl() 241535d3ae9SRashika Kheria #define ipx_unregister_sysctl() 242535d3ae9SRashika Kheria #endif 243535d3ae9SRashika Kheria 244d4655795SPavel Emelyanov #ifdef CONFIG_NET_NS 245e67e16eaSJoe Perches void __put_net(struct net *net); 2465f256becSEric W. Biederman 2479ba74e6cSEric Dumazet /* Try using get_net_track() instead */ 2485f256becSEric W. Biederman static inline struct net *get_net(struct net *net) 2495f256becSEric W. Biederman { 2508b8f3e66SChristian Brauner refcount_inc(&net->ns.count); 2515f256becSEric W. Biederman return net; 2525f256becSEric W. Biederman } 2535f256becSEric W. Biederman 254077130c0SEric W. Biederman static inline struct net *maybe_get_net(struct net *net) 255077130c0SEric W. Biederman { 256077130c0SEric W. Biederman /* Used when we know struct net exists but we 257077130c0SEric W. Biederman * aren't guaranteed a previous reference count 258077130c0SEric W. Biederman * exists. If the reference count is zero this 259077130c0SEric W. Biederman * function fails and returns NULL. 260077130c0SEric W. Biederman */ 2618b8f3e66SChristian Brauner if (!refcount_inc_not_zero(&net->ns.count)) 262077130c0SEric W. Biederman net = NULL; 263077130c0SEric W. Biederman return net; 264077130c0SEric W. Biederman } 265077130c0SEric W. Biederman 2669ba74e6cSEric Dumazet /* Try using put_net_track() instead */ 2675f256becSEric W. Biederman static inline void put_net(struct net *net) 2685f256becSEric W. Biederman { 2698b8f3e66SChristian Brauner if (refcount_dec_and_test(&net->ns.count)) 2705f256becSEric W. Biederman __put_net(net); 2715f256becSEric W. Biederman } 2725f256becSEric W. Biederman 273878628fbSYOSHIFUJI Hideaki static inline 274878628fbSYOSHIFUJI Hideaki int net_eq(const struct net *net1, const struct net *net2) 275878628fbSYOSHIFUJI Hideaki { 276878628fbSYOSHIFUJI Hideaki return net1 == net2; 277878628fbSYOSHIFUJI Hideaki } 278a685e089SAl Viro 2794ee806d5SDan Streetman static inline int check_net(const struct net *net) 2804ee806d5SDan Streetman { 2818b8f3e66SChristian Brauner return refcount_read(&net->ns.count) != 0; 2824ee806d5SDan Streetman } 2834ee806d5SDan Streetman 284e67e16eaSJoe Perches void net_drop_ns(void *); 285a685e089SAl Viro 286d4655795SPavel Emelyanov #else 287b9f75f45SEric W. Biederman 288d4655795SPavel Emelyanov static inline struct net *get_net(struct net *net) 289d4655795SPavel Emelyanov { 290d4655795SPavel Emelyanov return net; 291d4655795SPavel Emelyanov } 292d4655795SPavel Emelyanov 293d4655795SPavel Emelyanov static inline void put_net(struct net *net) 294d4655795SPavel Emelyanov { 295d4655795SPavel Emelyanov } 296d4655795SPavel Emelyanov 297d4655795SPavel Emelyanov static inline struct net *maybe_get_net(struct net *net) 298d4655795SPavel Emelyanov { 299d4655795SPavel Emelyanov return net; 300d4655795SPavel Emelyanov } 301878628fbSYOSHIFUJI Hideaki 302878628fbSYOSHIFUJI Hideaki static inline 303878628fbSYOSHIFUJI Hideaki int net_eq(const struct net *net1, const struct net *net2) 304878628fbSYOSHIFUJI Hideaki { 305878628fbSYOSHIFUJI Hideaki return 1; 306878628fbSYOSHIFUJI Hideaki } 307a685e089SAl Viro 3084ee806d5SDan Streetman static inline int check_net(const struct net *net) 3094ee806d5SDan Streetman { 3104ee806d5SDan Streetman return 1; 3114ee806d5SDan Streetman } 3124ee806d5SDan Streetman 313a685e089SAl Viro #define net_drop_ns NULL 314d4655795SPavel Emelyanov #endif 3155f256becSEric W. Biederman 3165d1e4468SDenis V. Lunev 3179ba74e6cSEric Dumazet static inline void netns_tracker_alloc(struct net *net, 3189ba74e6cSEric Dumazet netns_tracker *tracker, gfp_t gfp) 3199ba74e6cSEric Dumazet { 3209ba74e6cSEric Dumazet #ifdef CONFIG_NET_NS_REFCNT_TRACKER 3219ba74e6cSEric Dumazet ref_tracker_alloc(&net->refcnt_tracker, tracker, gfp); 3229ba74e6cSEric Dumazet #endif 3239ba74e6cSEric Dumazet } 3249ba74e6cSEric Dumazet 3259ba74e6cSEric Dumazet static inline void netns_tracker_free(struct net *net, 3269ba74e6cSEric Dumazet netns_tracker *tracker) 3279ba74e6cSEric Dumazet { 3289ba74e6cSEric Dumazet #ifdef CONFIG_NET_NS_REFCNT_TRACKER 3299ba74e6cSEric Dumazet ref_tracker_free(&net->refcnt_tracker, tracker); 3309ba74e6cSEric Dumazet #endif 3319ba74e6cSEric Dumazet } 3329ba74e6cSEric Dumazet 3339ba74e6cSEric Dumazet static inline struct net *get_net_track(struct net *net, 3349ba74e6cSEric Dumazet netns_tracker *tracker, gfp_t gfp) 3359ba74e6cSEric Dumazet { 3369ba74e6cSEric Dumazet get_net(net); 3379ba74e6cSEric Dumazet netns_tracker_alloc(net, tracker, gfp); 3389ba74e6cSEric Dumazet return net; 3399ba74e6cSEric Dumazet } 3409ba74e6cSEric Dumazet 3419ba74e6cSEric Dumazet static inline void put_net_track(struct net *net, netns_tracker *tracker) 3429ba74e6cSEric Dumazet { 3439ba74e6cSEric Dumazet netns_tracker_free(net, tracker); 3449ba74e6cSEric Dumazet put_net(net); 3459ba74e6cSEric Dumazet } 3469ba74e6cSEric Dumazet 3470c5c9fb5SEric W. Biederman typedef struct { 3488f424b5fSEric Dumazet #ifdef CONFIG_NET_NS 3490c5c9fb5SEric W. Biederman struct net *net; 3508f424b5fSEric Dumazet #endif 3510c5c9fb5SEric W. Biederman } possible_net_t; 3520c5c9fb5SEric W. Biederman 3530c5c9fb5SEric W. Biederman static inline void write_pnet(possible_net_t *pnet, struct net *net) 3540c5c9fb5SEric W. Biederman { 3550c5c9fb5SEric W. Biederman #ifdef CONFIG_NET_NS 3560c5c9fb5SEric W. Biederman pnet->net = net; 3570c5c9fb5SEric W. Biederman #endif 3580c5c9fb5SEric W. Biederman } 3590c5c9fb5SEric W. Biederman 3600c5c9fb5SEric W. Biederman static inline struct net *read_pnet(const possible_net_t *pnet) 3610c5c9fb5SEric W. Biederman { 3620c5c9fb5SEric W. Biederman #ifdef CONFIG_NET_NS 3630c5c9fb5SEric W. Biederman return pnet->net; 3640c5c9fb5SEric W. Biederman #else 3650c5c9fb5SEric W. Biederman return &init_net; 3660c5c9fb5SEric W. Biederman #endif 3670c5c9fb5SEric W. Biederman } 3685d1e4468SDenis V. Lunev 369f0b07bb1SKirill Tkhai /* Protected by net_rwsem */ 3705f256becSEric W. Biederman #define for_each_net(VAR) \ 3715f256becSEric W. Biederman list_for_each_entry(VAR, &net_namespace_list, list) 372afa0df59SJiri Pirko #define for_each_net_continue_reverse(VAR) \ 373afa0df59SJiri Pirko list_for_each_entry_continue_reverse(VAR, &net_namespace_list, list) 37411a28d37SJohannes Berg #define for_each_net_rcu(VAR) \ 37511a28d37SJohannes Berg list_for_each_entry_rcu(VAR, &net_namespace_list, list) 37611a28d37SJohannes Berg 3774665079cSPavel Emelyanov #ifdef CONFIG_NET_NS 3784665079cSPavel Emelyanov #define __net_init 3794665079cSPavel Emelyanov #define __net_exit 380022cbae6SDenis V. Lunev #define __net_initdata 38104a6f82cSAndi Kleen #define __net_initconst 3824665079cSPavel Emelyanov #else 3834665079cSPavel Emelyanov #define __net_init __init 384bd721ea7SFabian Frederick #define __net_exit __ref 385022cbae6SDenis V. Lunev #define __net_initdata __initdata 38604a6f82cSAndi Kleen #define __net_initconst __initconst 3874665079cSPavel Emelyanov #endif 3885f256becSEric W. Biederman 389d4e4fdf9SGuillaume Nault int peernet2id_alloc(struct net *net, struct net *peer, gfp_t gfp); 39056f200c7SGuillaume Nault int peernet2id(const struct net *net, struct net *peer); 39156f200c7SGuillaume Nault bool peernet_has_id(const struct net *net, struct net *peer); 39256f200c7SGuillaume Nault struct net *get_net_ns_by_id(const struct net *net, int id); 3930c7aecd4SNicolas Dichtel 3945f256becSEric W. Biederman struct pernet_operations { 3955f256becSEric W. Biederman struct list_head list; 3966056415dSKirill Tkhai /* 3976056415dSKirill Tkhai * Below methods are called without any exclusive locks. 3986056415dSKirill Tkhai * More than one net may be constructed and destructed 3996056415dSKirill Tkhai * in parallel on several cpus. Every pernet_operations 4006056415dSKirill Tkhai * have to keep in mind all other pernet_operations and 4016056415dSKirill Tkhai * to introduce a locking, if they share common resources. 4026056415dSKirill Tkhai * 4038518e9bbSKirill Tkhai * The only time they are called with exclusive lock is 4048518e9bbSKirill Tkhai * from register_pernet_subsys(), unregister_pernet_subsys() 4058518e9bbSKirill Tkhai * register_pernet_device() and unregister_pernet_device(). 4068518e9bbSKirill Tkhai * 4076056415dSKirill Tkhai * Exit methods using blocking RCU primitives, such as 4086056415dSKirill Tkhai * synchronize_rcu(), should be implemented via exit_batch. 4096056415dSKirill Tkhai * Then, destruction of a group of net requires single 4106056415dSKirill Tkhai * synchronize_rcu() related to these pernet_operations, 4116056415dSKirill Tkhai * instead of separate synchronize_rcu() for every net. 4126056415dSKirill Tkhai * Please, avoid synchronize_rcu() at all, where it's possible. 413d7d99872SEric Dumazet * 414d7d99872SEric Dumazet * Note that a combination of pre_exit() and exit() can 415d7d99872SEric Dumazet * be used, since a synchronize_rcu() is guaranteed between 416d7d99872SEric Dumazet * the calls. 4176056415dSKirill Tkhai */ 4185f256becSEric W. Biederman int (*init)(struct net *net); 419d7d99872SEric Dumazet void (*pre_exit)(struct net *net); 4205f256becSEric W. Biederman void (*exit)(struct net *net); 42172ad937aSEric W. Biederman void (*exit_batch)(struct list_head *net_exit_list); 422c7d03a00SAlexey Dobriyan unsigned int *id; 423f875bae0SEric W. Biederman size_t size; 4245f256becSEric W. Biederman }; 4255f256becSEric W. Biederman 42617edde52SEric W. Biederman /* 42717edde52SEric W. Biederman * Use these carefully. If you implement a network device and it 42817edde52SEric W. Biederman * needs per network namespace operations use device pernet operations, 42917edde52SEric W. Biederman * otherwise use pernet subsys operations. 43017edde52SEric W. Biederman * 4314edf547bSJohannes Berg * Network interfaces need to be removed from a dying netns _before_ 4324edf547bSJohannes Berg * subsys notifiers can be called, as most of the network code cleanup 4334edf547bSJohannes Berg * (which is done from subsys notifiers) runs with the assumption that 4344edf547bSJohannes Berg * dev_remove_pack has been called so no new packets will arrive during 4354edf547bSJohannes Berg * and after the cleanup functions have been called. dev_remove_pack 4364edf547bSJohannes Berg * is not per namespace so instead the guarantee of no more packets 4374edf547bSJohannes Berg * arriving in a network namespace is provided by ensuring that all 4384edf547bSJohannes Berg * network devices and all sockets have left the network namespace 4394edf547bSJohannes Berg * before the cleanup methods are called. 44017edde52SEric W. Biederman * 44117edde52SEric W. Biederman * For the longest time the ipv4 icmp code was registered as a pernet 44217edde52SEric W. Biederman * device which caused kernel oops, and panics during network 44317edde52SEric W. Biederman * namespace cleanup. So please don't get this wrong. 44417edde52SEric W. Biederman */ 445e67e16eaSJoe Perches int register_pernet_subsys(struct pernet_operations *); 446e67e16eaSJoe Perches void unregister_pernet_subsys(struct pernet_operations *); 447e67e16eaSJoe Perches int register_pernet_device(struct pernet_operations *); 448e67e16eaSJoe Perches void unregister_pernet_device(struct pernet_operations *); 449f875bae0SEric W. Biederman 45095bdfccbSEric W. Biederman struct ctl_table; 451d62c612eSPavel Emelyanov 4522ca794e5SEric W. Biederman #ifdef CONFIG_SYSCTL 453e67e16eaSJoe Perches int net_sysctl_init(void); 454e67e16eaSJoe Perches struct ctl_table_header *register_net_sysctl(struct net *net, const char *path, 455e67e16eaSJoe Perches struct ctl_table *table); 456e67e16eaSJoe Perches void unregister_net_sysctl_table(struct ctl_table_header *header); 45748c74958SEric W. Biederman #else 45848c74958SEric W. Biederman static inline int net_sysctl_init(void) { return 0; } 45948c74958SEric W. Biederman static inline struct ctl_table_header *register_net_sysctl(struct net *net, 46048c74958SEric W. Biederman const char *path, struct ctl_table *table) 46148c74958SEric W. Biederman { 46248c74958SEric W. Biederman return NULL; 46348c74958SEric W. Biederman } 46448c74958SEric W. Biederman static inline void unregister_net_sysctl_table(struct ctl_table_header *header) 46548c74958SEric W. Biederman { 46648c74958SEric W. Biederman } 46748c74958SEric W. Biederman #endif 46848c74958SEric W. Biederman 46956f200c7SGuillaume Nault static inline int rt_genid_ipv4(const struct net *net) 470b42664f8SNicolas Dichtel { 471ca4c3fc2Sfan.du return atomic_read(&net->ipv4.rt_genid); 472b42664f8SNicolas Dichtel } 473b42664f8SNicolas Dichtel 4748f34e53bSDavid Ahern #if IS_ENABLED(CONFIG_IPV6) 4758f34e53bSDavid Ahern static inline int rt_genid_ipv6(const struct net *net) 4768f34e53bSDavid Ahern { 4778f34e53bSDavid Ahern return atomic_read(&net->ipv6.fib6_sernum); 4788f34e53bSDavid Ahern } 4798f34e53bSDavid Ahern #endif 4808f34e53bSDavid Ahern 481ca4c3fc2Sfan.du static inline void rt_genid_bump_ipv4(struct net *net) 482b42664f8SNicolas Dichtel { 483ca4c3fc2Sfan.du atomic_inc(&net->ipv4.rt_genid); 484ca4c3fc2Sfan.du } 485ca4c3fc2Sfan.du 486705f1c86SHannes Frederic Sowa extern void (*__fib6_flush_trees)(struct net *net); 487ca4c3fc2Sfan.du static inline void rt_genid_bump_ipv6(struct net *net) 488ca4c3fc2Sfan.du { 489705f1c86SHannes Frederic Sowa if (__fib6_flush_trees) 490705f1c86SHannes Frederic Sowa __fib6_flush_trees(net); 491ca4c3fc2Sfan.du } 492ca4c3fc2Sfan.du 493599018a7SLuis R. Rodriguez #if IS_ENABLED(CONFIG_IEEE802154_6LOWPAN) 494599018a7SLuis R. Rodriguez static inline struct netns_ieee802154_lowpan * 495599018a7SLuis R. Rodriguez net_ieee802154_lowpan(struct net *net) 496599018a7SLuis R. Rodriguez { 497599018a7SLuis R. Rodriguez return &net->ieee802154_lowpan; 498599018a7SLuis R. Rodriguez } 499599018a7SLuis R. Rodriguez #endif 500599018a7SLuis R. Rodriguez 501ca4c3fc2Sfan.du /* For callers who don't really care about whether it's IPv4 or IPv6 */ 502ca4c3fc2Sfan.du static inline void rt_genid_bump_all(struct net *net) 503ca4c3fc2Sfan.du { 504ca4c3fc2Sfan.du rt_genid_bump_ipv4(net); 505ca4c3fc2Sfan.du rt_genid_bump_ipv6(net); 506b42664f8SNicolas Dichtel } 50795bdfccbSEric W. Biederman 50856f200c7SGuillaume Nault static inline int fnhe_genid(const struct net *net) 5095aad1de5STimo Teräs { 5105aad1de5STimo Teräs return atomic_read(&net->fnhe_genid); 5115aad1de5STimo Teräs } 5125aad1de5STimo Teräs 5135aad1de5STimo Teräs static inline void fnhe_genid_bump(struct net *net) 5145aad1de5STimo Teräs { 5155aad1de5STimo Teräs atomic_inc(&net->fnhe_genid); 5165aad1de5STimo Teräs } 5175aad1de5STimo Teräs 5189c1be193SEric Dumazet #ifdef CONFIG_NET 5199c1be193SEric Dumazet void net_ns_init(void); 5209c1be193SEric Dumazet #else 5219c1be193SEric Dumazet static inline void net_ns_init(void) {} 5229c1be193SEric Dumazet #endif 5239c1be193SEric Dumazet 5245f256becSEric W. Biederman #endif /* __NET_NET_NAMESPACE_H */ 525