blob: 30caa289c5dbf589270768ce90d15f2990341231 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * xfrm6_policy.c: based on xfrm4_policy.c
3 *
4 * Authors:
5 * Mitsuru KANDA @USAGI
Ian Morris67ba4152014-08-24 21:53:10 +01006 * Kazunori MIYAZAWA @USAGI
7 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
8 * IPv6 support
9 * YOSHIFUJI Hideaki
10 * Split up af-specific portion
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +090011 *
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 */
13
Herbert Xu66cdb3c2007-11-13 21:37:28 -080014#include <linux/err.h>
15#include <linux/kernel.h>
Herbert Xuaabc9762005-05-03 16:27:10 -070016#include <linux/netdevice.h>
17#include <net/addrconf.h>
Herbert Xu45ff5a32007-11-13 21:35:32 -080018#include <net/dst.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <net/xfrm.h>
20#include <net/ip.h>
21#include <net/ipv6.h>
22#include <net/ip6_route.h>
David Ahern4ec3b282015-08-20 15:06:30 -070023#include <net/vrf.h>
Amerigo Wang07a93622012-10-29 16:23:10 +000024#if IS_ENABLED(CONFIG_IPV6_MIP6)
Masahide NAKAMURA2ce42722006-08-23 20:39:03 -070025#include <net/mip6.h>
26#endif
Linus Torvalds1da177e2005-04-16 15:20:36 -070027
Linus Torvalds1da177e2005-04-16 15:20:36 -070028static struct xfrm_policy_afinfo xfrm6_policy_afinfo;
29
David Ahern42a7b322015-08-10 16:58:11 -060030static struct dst_entry *xfrm6_dst_lookup(struct net *net, int tos, int oif,
David S. Miller5e6b9302011-02-24 00:14:45 -050031 const xfrm_address_t *saddr,
32 const xfrm_address_t *daddr)
Linus Torvalds1da177e2005-04-16 15:20:36 -070033{
David S. Miller7e1dc7b2011-03-12 02:42:11 -050034 struct flowi6 fl6;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080035 struct dst_entry *dst;
36 int err;
37
David S. Miller7e1dc7b2011-03-12 02:42:11 -050038 memset(&fl6, 0, sizeof(fl6));
David Ahern42a7b322015-08-10 16:58:11 -060039 fl6.flowi6_oif = oif;
David S. Miller7e1dc7b2011-03-12 02:42:11 -050040 memcpy(&fl6.daddr, daddr, sizeof(fl6.daddr));
Herbert Xu66cdb3c2007-11-13 21:37:28 -080041 if (saddr)
David S. Miller7e1dc7b2011-03-12 02:42:11 -050042 memcpy(&fl6.saddr, saddr, sizeof(fl6.saddr));
Herbert Xu66cdb3c2007-11-13 21:37:28 -080043
David S. Miller4c9483b2011-03-12 16:22:43 -050044 dst = ip6_route_output(net, NULL, &fl6);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080045
46 err = dst->error;
47 if (dst->error) {
Ville Nuorvala42513202006-10-16 22:10:05 -070048 dst_release(dst);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080049 dst = ERR_PTR(err);
50 }
51
52 return dst;
Linus Torvalds1da177e2005-04-16 15:20:36 -070053}
54
David Ahern42a7b322015-08-10 16:58:11 -060055static int xfrm6_get_saddr(struct net *net, int oif,
Alexey Dobriyanfbda33b2008-11-25 17:56:49 -080056 xfrm_address_t *saddr, xfrm_address_t *daddr)
Patrick McHardya1e59ab2006-09-19 12:57:34 -070057{
Herbert Xu66cdb3c2007-11-13 21:37:28 -080058 struct dst_entry *dst;
Brian Haley191cd582008-08-14 15:33:21 -070059 struct net_device *dev;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070060
David Ahern42a7b322015-08-10 16:58:11 -060061 dst = xfrm6_dst_lookup(net, 0, oif, NULL, daddr);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080062 if (IS_ERR(dst))
63 return -EHOSTUNREACH;
64
Brian Haley191cd582008-08-14 15:33:21 -070065 dev = ip6_dst_idev(dst)->dev;
Jiri Benc15e318b2015-03-29 16:59:24 +020066 ipv6_dev_get_saddr(dev_net(dev), dev, &daddr->in6, 0, &saddr->in6);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080067 dst_release(dst);
68 return 0;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070069}
70
David S. Miller05d84022011-02-22 17:47:10 -080071static int xfrm6_get_tos(const struct flowi *fl)
Linus Torvalds1da177e2005-04-16 15:20:36 -070072{
Linus Torvalds1da177e2005-04-16 15:20:36 -070073 return 0;
Herbert Xu25ee3282007-12-11 09:32:34 -080074}
Linus Torvalds1da177e2005-04-16 15:20:36 -070075
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -080076static int xfrm6_init_path(struct xfrm_dst *path, struct dst_entry *dst,
77 int nfheader_len)
78{
79 if (dst->ops->family == AF_INET6) {
Ian Morris67ba4152014-08-24 21:53:10 +010080 struct rt6_info *rt = (struct rt6_info *)dst;
Martin KaFai Laub197df42015-05-22 20:56:01 -070081 path->path_cookie = rt6_get_cookie(rt);
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -080082 }
83
84 path->u.rt6.rt6i_nfheader_len = nfheader_len;
85
86 return 0;
87}
88
Herbert Xu87c1e122010-03-02 02:51:56 +000089static int xfrm6_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
David S. Miller0c7b3ee2011-02-22 17:48:57 -080090 const struct flowi *fl)
Herbert Xu25ee3282007-12-11 09:32:34 -080091{
Ian Morris67ba4152014-08-24 21:53:10 +010092 struct rt6_info *rt = (struct rt6_info *)xdst->route;
Herbert Xu25ee3282007-12-11 09:32:34 -080093
94 xdst->u.dst.dev = dev;
95 dev_hold(dev);
96
Nicolas Dichtelbc8e4b92010-04-21 16:25:30 -070097 xdst->u.rt6.rt6i_idev = in6_dev_get(dev);
Cong Wang84c4a9d2013-05-09 22:40:00 +000098 if (!xdst->u.rt6.rt6i_idev) {
99 dev_put(dev);
Herbert Xu25ee3282007-12-11 09:32:34 -0800100 return -ENODEV;
Cong Wang84c4a9d2013-05-09 22:40:00 +0000101 }
Herbert Xu25ee3282007-12-11 09:32:34 -0800102
103 /* Sheit... I remember I did this right. Apparently,
104 * it was magically lost, so this code needs audit */
105 xdst->u.rt6.rt6i_flags = rt->rt6i_flags & (RTF_ANYCAST |
106 RTF_LOCAL);
107 xdst->u.rt6.rt6i_metric = rt->rt6i_metric;
108 xdst->u.rt6.rt6i_node = rt->rt6i_node;
Martin KaFai Laub197df42015-05-22 20:56:01 -0700109 xdst->route_cookie = rt6_get_cookie(rt);
Herbert Xu25ee3282007-12-11 09:32:34 -0800110 xdst->u.rt6.rt6i_gateway = rt->rt6i_gateway;
111 xdst->u.rt6.rt6i_dst = rt->rt6i_dst;
112 xdst->u.rt6.rt6i_src = rt->rt6i_src;
113
114 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700115}
116
117static inline void
Herbert Xud5422ef2007-12-12 10:44:16 -0800118_decode_session6(struct sk_buff *skb, struct flowi *fl, int reverse)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700119{
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500120 struct flowi6 *fl6 = &fl->u.ip6;
Nicolas Dichtel7e3a42a2008-11-01 21:12:07 -0700121 int onlyproto = 0;
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000122 const struct ipv6hdr *hdr = ipv6_hdr(skb);
Steffen Klassertde3b7a02014-12-04 09:46:20 +0100123 u16 offset = sizeof(*hdr);
YOSHIFUJI Hideakie3cae902006-04-18 14:46:52 -0700124 struct ipv6_opt_hdr *exthdr;
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700125 const unsigned char *nh = skb_network_header(skb);
Steffen Klassertf8556912014-12-08 07:56:18 +0100126 u16 nhoff = IP6CB(skb)->nhoff;
Steffen Klassert84502b52013-10-30 11:16:28 +0100127 int oif = 0;
Steffen Klassertf8556912014-12-08 07:56:18 +0100128 u8 nexthdr;
129
130 if (!nhoff)
131 nhoff = offsetof(struct ipv6hdr, nexthdr);
132
133 nexthdr = nh[nhoff];
Steffen Klassert84502b52013-10-30 11:16:28 +0100134
David Ahern4ec3b282015-08-20 15:06:30 -0700135 if (skb_dst(skb)) {
136 oif = vrf_master_ifindex(skb_dst(skb)->dev) ?
137 : skb_dst(skb)->dev->ifindex;
138 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500140 memset(fl6, 0, sizeof(struct flowi6));
141 fl6->flowi6_mark = skb->mark;
Steffen Klassert84502b52013-10-30 11:16:28 +0100142 fl6->flowi6_oif = reverse ? skb->skb_iif : oif;
Peter Kosyh44b451f2010-07-02 07:47:55 +0000143
Alexey Dobriyan4e3fd7a2011-11-21 03:39:03 +0000144 fl6->daddr = reverse ? hdr->saddr : hdr->daddr;
145 fl6->saddr = reverse ? hdr->daddr : hdr->saddr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700146
Wei Yongjun59cae002009-07-02 16:59:49 +0000147 while (nh + offset + 1 < skb->data ||
148 pskb_may_pull(skb, nh + offset + 1 - skb->data)) {
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700149 nh = skb_network_header(skb);
150 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
YOSHIFUJI Hideakie3cae902006-04-18 14:46:52 -0700151
Linus Torvalds1da177e2005-04-16 15:20:36 -0700152 switch (nexthdr) {
Nicolas Dichtel7e3a42a2008-11-01 21:12:07 -0700153 case NEXTHDR_FRAGMENT:
154 onlyproto = 1;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700155 case NEXTHDR_ROUTING:
156 case NEXTHDR_HOP:
157 case NEXTHDR_DEST:
158 offset += ipv6_optlen(exthdr);
159 nexthdr = exthdr->nexthdr;
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700160 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700161 break;
162
163 case IPPROTO_UDP:
Gerrit Renkerba4e58e2006-11-27 11:10:57 -0800164 case IPPROTO_UDPLITE:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700165 case IPPROTO_TCP:
166 case IPPROTO_SCTP:
Patrick McHardy9e999992005-12-19 14:03:46 -0800167 case IPPROTO_DCCP:
Wei Yongjun59cae002009-07-02 16:59:49 +0000168 if (!onlyproto && (nh + offset + 4 < skb->data ||
169 pskb_may_pull(skb, nh + offset + 4 - skb->data))) {
Li RongQing789f2022014-10-22 17:09:53 +0800170 __be16 *ports;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700171
Li RongQing789f2022014-10-22 17:09:53 +0800172 nh = skb_network_header(skb);
173 ports = (__be16 *)(nh + offset);
David S. Miller1958b852011-03-12 16:36:19 -0500174 fl6->fl6_sport = ports[!!reverse];
175 fl6->fl6_dport = ports[!reverse];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700176 }
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500177 fl6->flowi6_proto = nexthdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700178 return;
179
180 case IPPROTO_ICMPV6:
Nicolas Dichtel7e3a42a2008-11-01 21:12:07 -0700181 if (!onlyproto && pskb_may_pull(skb, nh + offset + 2 - skb->data)) {
Li RongQing789f2022014-10-22 17:09:53 +0800182 u8 *icmp;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700183
Li RongQing789f2022014-10-22 17:09:53 +0800184 nh = skb_network_header(skb);
185 icmp = (u8 *)(nh + offset);
David S. Miller1958b852011-03-12 16:36:19 -0500186 fl6->fl6_icmp_type = icmp[0];
187 fl6->fl6_icmp_code = icmp[1];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700188 }
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500189 fl6->flowi6_proto = nexthdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700190 return;
191
Amerigo Wang07a93622012-10-29 16:23:10 +0000192#if IS_ENABLED(CONFIG_IPV6_MIP6)
Masahide NAKAMURA2ce42722006-08-23 20:39:03 -0700193 case IPPROTO_MH:
Hajime Tazakicd3bafc2015-02-04 23:31:10 +0900194 offset += ipv6_optlen(exthdr);
Nicolas Dichtel7e3a42a2008-11-01 21:12:07 -0700195 if (!onlyproto && pskb_may_pull(skb, nh + offset + 3 - skb->data)) {
Masahide NAKAMURA2ce42722006-08-23 20:39:03 -0700196 struct ip6_mh *mh;
Masahide NAKAMURA2ce42722006-08-23 20:39:03 -0700197
Li RongQing789f2022014-10-22 17:09:53 +0800198 nh = skb_network_header(skb);
199 mh = (struct ip6_mh *)(nh + offset);
David S. Miller1958b852011-03-12 16:36:19 -0500200 fl6->fl6_mh_type = mh->ip6mh_type;
Masahide NAKAMURA2ce42722006-08-23 20:39:03 -0700201 }
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500202 fl6->flowi6_proto = nexthdr;
Masahide NAKAMURA2ce42722006-08-23 20:39:03 -0700203 return;
204#endif
205
Linus Torvalds1da177e2005-04-16 15:20:36 -0700206 /* XXX Why are there these headers? */
207 case IPPROTO_AH:
208 case IPPROTO_ESP:
209 case IPPROTO_COMP:
210 default:
David S. Miller1958b852011-03-12 16:36:19 -0500211 fl6->fl6_ipsec_spi = 0;
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500212 fl6->flowi6_proto = nexthdr;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700213 return;
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700214 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700215 }
216}
217
Daniel Lezcano569d3642008-01-18 03:56:57 -0800218static inline int xfrm6_garbage_collect(struct dst_ops *ops)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700219{
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800220 struct net *net = container_of(ops, struct net, xfrm.xfrm6_dst_ops);
221
222 xfrm6_policy_afinfo.garbage_collect(net);
Eric Dumazetfc66f952010-10-08 06:37:34 +0000223 return dst_entries_get_fast(ops) > ops->gc_thresh * 2;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700224}
225
David S. Miller6700c272012-07-17 03:29:28 -0700226static void xfrm6_update_pmtu(struct dst_entry *dst, struct sock *sk,
227 struct sk_buff *skb, u32 mtu)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700228{
229 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
230 struct dst_entry *path = xdst->route;
231
David S. Miller6700c272012-07-17 03:29:28 -0700232 path->ops->update_pmtu(path, sk, skb, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700233}
234
David S. Miller6700c272012-07-17 03:29:28 -0700235static void xfrm6_redirect(struct dst_entry *dst, struct sock *sk,
236 struct sk_buff *skb)
David S. Millerec18d9a2012-07-12 00:25:15 -0700237{
238 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
239 struct dst_entry *path = xdst->route;
240
David S. Miller6700c272012-07-17 03:29:28 -0700241 path->ops->redirect(path, sk, skb);
David S. Millerec18d9a2012-07-12 00:25:15 -0700242}
243
Herbert Xuaabc9762005-05-03 16:27:10 -0700244static void xfrm6_dst_destroy(struct dst_entry *dst)
245{
246 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
247
248 if (likely(xdst->u.rt6.rt6i_idev))
249 in6_dev_put(xdst->u.rt6.rt6i_idev);
David S. Miller62fa8a82011-01-26 20:51:05 -0800250 dst_destroy_metrics_generic(dst);
Herbert Xuaabc9762005-05-03 16:27:10 -0700251 xfrm_dst_destroy(xdst);
252}
253
254static void xfrm6_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
255 int unregister)
256{
257 struct xfrm_dst *xdst;
258
259 if (!unregister)
260 return;
261
262 xdst = (struct xfrm_dst *)dst;
263 if (xdst->u.rt6.rt6i_idev->dev == dev) {
Denis V. Lunev5a3e55d2007-12-07 00:38:10 -0800264 struct inet6_dev *loopback_idev =
YOSHIFUJI Hideakic346dca2008-03-25 21:47:49 +0900265 in6_dev_get(dev_net(dev)->loopback_dev);
Herbert Xuaabc9762005-05-03 16:27:10 -0700266 BUG_ON(!loopback_idev);
267
268 do {
269 in6_dev_put(xdst->u.rt6.rt6i_idev);
270 xdst->u.rt6.rt6i_idev = loopback_idev;
271 in6_dev_hold(loopback_idev);
272 xdst = (struct xfrm_dst *)xdst->u.dst.child;
273 } while (xdst->u.dst.xfrm);
274
275 __in6_dev_put(loopback_idev);
276 }
277
278 xfrm_dst_ifdown(dst, dev);
279}
280
Linus Torvalds1da177e2005-04-16 15:20:36 -0700281static struct dst_ops xfrm6_dst_ops = {
282 .family = AF_INET6,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700283 .gc = xfrm6_garbage_collect,
284 .update_pmtu = xfrm6_update_pmtu,
David S. Millerec18d9a2012-07-12 00:25:15 -0700285 .redirect = xfrm6_redirect,
David S. Miller62fa8a82011-01-26 20:51:05 -0800286 .cow_metrics = dst_cow_metrics_generic,
Herbert Xuaabc9762005-05-03 16:27:10 -0700287 .destroy = xfrm6_dst_destroy,
288 .ifdown = xfrm6_dst_ifdown,
Herbert Xu862b82c2007-11-13 21:43:11 -0800289 .local_out = __ip6_local_out,
Steffen Klasserteeb1b732013-10-25 10:21:32 +0200290 .gc_thresh = 32768,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700291};
292
293static struct xfrm_policy_afinfo xfrm6_policy_afinfo = {
294 .family = AF_INET6,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700295 .dst_ops = &xfrm6_dst_ops,
296 .dst_lookup = xfrm6_dst_lookup,
Ian Morris67ba4152014-08-24 21:53:10 +0100297 .get_saddr = xfrm6_get_saddr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700298 .decode_session = _decode_session6,
Herbert Xu25ee3282007-12-11 09:32:34 -0800299 .get_tos = xfrm6_get_tos,
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -0800300 .init_path = xfrm6_init_path,
Herbert Xu25ee3282007-12-11 09:32:34 -0800301 .fill_dst = xfrm6_fill_dst,
David S. Miller2774c132011-03-01 14:59:04 -0800302 .blackhole_route = ip6_blackhole_route,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700303};
304
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800305static int __init xfrm6_policy_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700306{
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800307 return xfrm_policy_register_afinfo(&xfrm6_policy_afinfo);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700308}
309
310static void xfrm6_policy_fini(void)
311{
312 xfrm_policy_unregister_afinfo(&xfrm6_policy_afinfo);
313}
314
David S. Millerdb717892009-08-04 20:32:16 -0700315#ifdef CONFIG_SYSCTL
Neil Hormana44a4a02009-07-27 08:22:46 +0000316static struct ctl_table xfrm6_policy_table[] = {
317 {
Neil Hormana44a4a02009-07-27 08:22:46 +0000318 .procname = "xfrm6_gc_thresh",
Ian Morris67ba4152014-08-24 21:53:10 +0100319 .data = &init_net.xfrm.xfrm6_dst_ops.gc_thresh,
320 .maxlen = sizeof(int),
321 .mode = 0644,
Neil Hormana44a4a02009-07-27 08:22:46 +0000322 .proc_handler = proc_dointvec,
323 },
324 { }
325};
326
Michal Kubecek8d068872013-02-06 10:46:33 +0100327static int __net_init xfrm6_net_init(struct net *net)
328{
329 struct ctl_table *table;
330 struct ctl_table_header *hdr;
331
332 table = xfrm6_policy_table;
333 if (!net_eq(net, &init_net)) {
334 table = kmemdup(table, sizeof(xfrm6_policy_table), GFP_KERNEL);
335 if (!table)
336 goto err_alloc;
337
338 table[0].data = &net->xfrm.xfrm6_dst_ops.gc_thresh;
339 }
340
341 hdr = register_net_sysctl(net, "net/ipv6", table);
342 if (!hdr)
343 goto err_reg;
344
345 net->ipv6.sysctl.xfrm6_hdr = hdr;
346 return 0;
347
348err_reg:
349 if (!net_eq(net, &init_net))
350 kfree(table);
351err_alloc:
352 return -ENOMEM;
353}
354
355static void __net_exit xfrm6_net_exit(struct net *net)
356{
357 struct ctl_table *table;
358
Ian Morris63159f22015-03-29 14:00:04 +0100359 if (!net->ipv6.sysctl.xfrm6_hdr)
Michal Kubecek8d068872013-02-06 10:46:33 +0100360 return;
361
362 table = net->ipv6.sysctl.xfrm6_hdr->ctl_table_arg;
363 unregister_net_sysctl_table(net->ipv6.sysctl.xfrm6_hdr);
364 if (!net_eq(net, &init_net))
365 kfree(table);
366}
367
368static struct pernet_operations xfrm6_net_ops = {
369 .init = xfrm6_net_init,
370 .exit = xfrm6_net_exit,
371};
David S. Millerdb717892009-08-04 20:32:16 -0700372#endif
Neil Hormana44a4a02009-07-27 08:22:46 +0000373
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800374int __init xfrm6_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700375{
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800376 int ret;
377
Eric Dumazetfc66f952010-10-08 06:37:34 +0000378 dst_entries_init(&xfrm6_dst_ops);
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800379
380 ret = xfrm6_policy_init();
Eric Dumazetfc66f952010-10-08 06:37:34 +0000381 if (ret) {
382 dst_entries_destroy(&xfrm6_dst_ops);
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800383 goto out;
Eric Dumazetfc66f952010-10-08 06:37:34 +0000384 }
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800385 ret = xfrm6_state_init();
386 if (ret)
387 goto out_policy;
388
Steffen Klassert7e14ea12014-03-14 07:28:07 +0100389 ret = xfrm6_protocol_init();
390 if (ret)
391 goto out_state;
392
David S. Millerdb717892009-08-04 20:32:16 -0700393#ifdef CONFIG_SYSCTL
Michal Kubecek8d068872013-02-06 10:46:33 +0100394 register_pernet_subsys(&xfrm6_net_ops);
David S. Millerdb717892009-08-04 20:32:16 -0700395#endif
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800396out:
397 return ret;
Steffen Klassert7e14ea12014-03-14 07:28:07 +0100398out_state:
399 xfrm6_state_fini();
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800400out_policy:
401 xfrm6_policy_fini();
402 goto out;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700403}
404
405void xfrm6_fini(void)
406{
David S. Millerdb717892009-08-04 20:32:16 -0700407#ifdef CONFIG_SYSCTL
Michal Kubecek8d068872013-02-06 10:46:33 +0100408 unregister_pernet_subsys(&xfrm6_net_ops);
David S. Millerdb717892009-08-04 20:32:16 -0700409#endif
Steffen Klassert7e14ea12014-03-14 07:28:07 +0100410 xfrm6_protocol_fini();
Linus Torvalds1da177e2005-04-16 15:20:36 -0700411 xfrm6_policy_fini();
412 xfrm6_state_fini();
Eric Dumazetfc66f952010-10-08 06:37:34 +0000413 dst_entries_destroy(&xfrm6_dst_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700414}