blob: 7f9a8dfcfe180a3b345f3b1c310c85881922b310 [file] [log] [blame]
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07002 * xfrm4_policy.c
3 *
4 * Changes:
5 * Kazunori MIYAZAWA @USAGI
6 * YOSHIFUJI Hideaki @USAGI
7 * Split up af-specific portion
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09008 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 */
10
Herbert Xu66cdb3c2007-11-13 21:37:28 -080011#include <linux/err.h>
12#include <linux/kernel.h>
Herbert Xuaabc9762005-05-03 16:27:10 -070013#include <linux/inetdevice.h>
Timo Teräscc9ff192010-11-03 04:41:38 +000014#include <linux/if_tunnel.h>
Herbert Xu45ff5a32007-11-13 21:35:32 -080015#include <net/dst.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070016#include <net/xfrm.h>
17#include <net/ip.h>
David Ahern385add92015-09-29 20:07:13 -070018#include <net/l3mdev.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019
Linus Torvalds1da177e2005-04-16 15:20:36 -070020static struct xfrm_policy_afinfo xfrm4_policy_afinfo;
21
David S. Miller8f01cb02011-05-09 15:13:28 -070022static struct dst_entry *__xfrm4_dst_lookup(struct net *net, struct flowi4 *fl4,
David Ahern42a7b322015-08-10 16:58:11 -060023 int tos, int oif,
David S. Miller8f01cb02011-05-09 15:13:28 -070024 const xfrm_address_t *saddr,
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090025 const xfrm_address_t *daddr,
26 u32 mark)
Linus Torvalds1da177e2005-04-16 15:20:36 -070027{
Herbert Xu66cdb3c2007-11-13 21:37:28 -080028 struct rtable *rt;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070029
David S. Miller8f01cb02011-05-09 15:13:28 -070030 memset(fl4, 0, sizeof(*fl4));
31 fl4->daddr = daddr->a4;
32 fl4->flowi4_tos = tos;
David Ahern11d7a0b2016-08-14 19:52:56 -070033 fl4->flowi4_oif = l3mdev_master_ifindex_by_index(net, oif);
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090034 fl4->flowi4_mark = mark;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080035 if (saddr)
David S. Miller8f01cb02011-05-09 15:13:28 -070036 fl4->saddr = saddr->a4;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080037
David Ahern58189ca2015-09-15 15:10:50 -070038 fl4->flowi4_flags = FLOWI_FLAG_SKIP_NH_OIF;
39
David S. Miller8f01cb02011-05-09 15:13:28 -070040 rt = __ip_route_output_key(net, fl4);
David S. Millerb23dd4f2011-03-02 14:31:35 -080041 if (!IS_ERR(rt))
42 return &rt->dst;
43
44 return ERR_CAST(rt);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080045}
46
David Ahern42a7b322015-08-10 16:58:11 -060047static struct dst_entry *xfrm4_dst_lookup(struct net *net, int tos, int oif,
David S. Miller8f01cb02011-05-09 15:13:28 -070048 const xfrm_address_t *saddr,
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090049 const xfrm_address_t *daddr,
50 u32 mark)
David S. Miller8f01cb02011-05-09 15:13:28 -070051{
52 struct flowi4 fl4;
53
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090054 return __xfrm4_dst_lookup(net, &fl4, tos, oif, saddr, daddr, mark);
David S. Miller8f01cb02011-05-09 15:13:28 -070055}
56
David Ahern42a7b322015-08-10 16:58:11 -060057static int xfrm4_get_saddr(struct net *net, int oif,
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090058 xfrm_address_t *saddr, xfrm_address_t *daddr,
59 u32 mark)
Herbert Xu66cdb3c2007-11-13 21:37:28 -080060{
61 struct dst_entry *dst;
David S. Miller8f01cb02011-05-09 15:13:28 -070062 struct flowi4 fl4;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080063
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090064 dst = __xfrm4_dst_lookup(net, &fl4, 0, oif, NULL, daddr, mark);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080065 if (IS_ERR(dst))
66 return -EHOSTUNREACH;
67
David S. Miller8f01cb02011-05-09 15:13:28 -070068 saddr->a4 = fl4.saddr;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080069 dst_release(dst);
70 return 0;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070071}
72
David S. Miller05d84022011-02-22 17:47:10 -080073static int xfrm4_get_tos(const struct flowi *fl)
Linus Torvalds1da177e2005-04-16 15:20:36 -070074{
David S. Miller7e1dc7b2011-03-12 02:42:11 -050075 return IPTOS_RT_MASK & fl->u.ip4.flowi4_tos; /* Strip ECN bits */
Herbert Xu25ee3282007-12-11 09:32:34 -080076}
Linus Torvalds1da177e2005-04-16 15:20:36 -070077
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -080078static int xfrm4_init_path(struct xfrm_dst *path, struct dst_entry *dst,
79 int nfheader_len)
80{
81 return 0;
82}
83
Herbert Xu87c1e122010-03-02 02:51:56 +000084static int xfrm4_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
David S. Miller0c7b3ee2011-02-22 17:48:57 -080085 const struct flowi *fl)
Herbert Xu25ee3282007-12-11 09:32:34 -080086{
87 struct rtable *rt = (struct rtable *)xdst->route;
David S. Miller7e1dc7b2011-03-12 02:42:11 -050088 const struct flowi4 *fl4 = &fl->u.ip4;
Linus Torvalds1da177e2005-04-16 15:20:36 -070089
Yan, Zhengb7323392011-10-22 21:58:20 +000090 xdst->u.rt.rt_iif = fl4->flowi4_iif;
Linus Torvalds1da177e2005-04-16 15:20:36 -070091
Herbert Xu25ee3282007-12-11 09:32:34 -080092 xdst->u.dst.dev = dev;
93 dev_hold(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -070094
Herbert Xu25ee3282007-12-11 09:32:34 -080095 /* Sheit... I remember I did this right. Apparently,
96 * it was magically lost, so this code needs audit */
David S. Miller9917e1e82012-07-17 14:44:26 -070097 xdst->u.rt.rt_is_input = rt->rt_is_input;
Herbert Xu25ee3282007-12-11 09:32:34 -080098 xdst->u.rt.rt_flags = rt->rt_flags & (RTCF_BROADCAST | RTCF_MULTICAST |
99 RTCF_LOCAL);
100 xdst->u.rt.rt_type = rt->rt_type;
Herbert Xu25ee3282007-12-11 09:32:34 -0800101 xdst->u.rt.rt_gateway = rt->rt_gateway;
Julian Anastasov155e8332012-10-08 11:41:18 +0000102 xdst->u.rt.rt_uses_gateway = rt->rt_uses_gateway;
David S. Miller59436342012-07-10 06:58:42 -0700103 xdst->u.rt.rt_pmtu = rt->rt_pmtu;
David Ahernb7503e02015-09-02 13:58:35 -0700104 xdst->u.rt.rt_table_id = rt->rt_table_id;
David S. Millercaacf052012-07-31 15:06:50 -0700105 INIT_LIST_HEAD(&xdst->u.rt.rt_uncached);
Miika Komu43372262007-02-06 14:27:32 -0800106
Linus Torvalds1da177e2005-04-16 15:20:36 -0700107 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700108}
109
110static void
Herbert Xud5422ef2007-12-12 10:44:16 -0800111_decode_session4(struct sk_buff *skb, struct flowi *fl, int reverse)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700112{
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000113 const struct iphdr *iph = ip_hdr(skb);
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700114 u8 *xprth = skb_network_header(skb) + iph->ihl * 4;
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500115 struct flowi4 *fl4 = &fl->u.ip4;
Steffen Klassert84502b52013-10-30 11:16:28 +0100116 int oif = 0;
117
David Ahern385add92015-09-29 20:07:13 -0700118 if (skb_dst(skb))
David Aherne0d56fd2016-09-10 12:09:57 -0700119 oif = skb_dst(skb)->dev->ifindex;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700120
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500121 memset(fl4, 0, sizeof(struct flowi4));
122 fl4->flowi4_mark = skb->mark;
Steffen Klassert84502b52013-10-30 11:16:28 +0100123 fl4->flowi4_oif = reverse ? skb->skb_iif : oif;
Peter Kosyh44b451f2010-07-02 07:47:55 +0000124
Paul Gortmaker56f8a752011-06-21 20:33:34 -0700125 if (!ip_is_fragment(iph)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700126 switch (iph->protocol) {
127 case IPPROTO_UDP:
Gerrit Renkerba4e58e2006-11-27 11:10:57 -0800128 case IPPROTO_UDPLITE:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700129 case IPPROTO_TCP:
130 case IPPROTO_SCTP:
Patrick McHardy9e999992005-12-19 14:03:46 -0800131 case IPPROTO_DCCP:
Wei Yongjunc615c9f2009-07-02 16:57:23 +0000132 if (xprth + 4 < skb->data ||
133 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200134 __be16 *ports;
135
136 xprth = skb_network_header(skb) + iph->ihl * 4;
137 ports = (__be16 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700138
David S. Miller9cce96d2011-03-12 03:00:33 -0500139 fl4->fl4_sport = ports[!!reverse];
140 fl4->fl4_dport = ports[!reverse];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700141 }
142 break;
143
144 case IPPROTO_ICMP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200145 if (xprth + 2 < skb->data ||
146 pskb_may_pull(skb, xprth + 2 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200147 u8 *icmp;
148
149 xprth = skb_network_header(skb) + iph->ihl * 4;
150 icmp = xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700151
David S. Miller9cce96d2011-03-12 03:00:33 -0500152 fl4->fl4_icmp_type = icmp[0];
153 fl4->fl4_icmp_code = icmp[1];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700154 }
155 break;
156
157 case IPPROTO_ESP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200158 if (xprth + 4 < skb->data ||
159 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200160 __be32 *ehdr;
161
162 xprth = skb_network_header(skb) + iph->ihl * 4;
163 ehdr = (__be32 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700164
David S. Miller9cce96d2011-03-12 03:00:33 -0500165 fl4->fl4_ipsec_spi = ehdr[0];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700166 }
167 break;
168
169 case IPPROTO_AH:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200170 if (xprth + 8 < skb->data ||
171 pskb_may_pull(skb, xprth + 8 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200172 __be32 *ah_hdr;
173
174 xprth = skb_network_header(skb) + iph->ihl * 4;
175 ah_hdr = (__be32 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700176
David S. Miller9cce96d2011-03-12 03:00:33 -0500177 fl4->fl4_ipsec_spi = ah_hdr[1];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700178 }
179 break;
180
181 case IPPROTO_COMP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200182 if (xprth + 4 < skb->data ||
183 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200184 __be16 *ipcomp_hdr;
185
186 xprth = skb_network_header(skb) + iph->ihl * 4;
187 ipcomp_hdr = (__be16 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700188
David S. Miller9cce96d2011-03-12 03:00:33 -0500189 fl4->fl4_ipsec_spi = htonl(ntohs(ipcomp_hdr[1]));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700190 }
191 break;
Timo Teräscc9ff192010-11-03 04:41:38 +0000192
193 case IPPROTO_GRE:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200194 if (xprth + 12 < skb->data ||
195 pskb_may_pull(skb, xprth + 12 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200196 __be16 *greflags;
197 __be32 *gre_hdr;
198
199 xprth = skb_network_header(skb) + iph->ihl * 4;
200 greflags = (__be16 *)xprth;
201 gre_hdr = (__be32 *)xprth;
Timo Teräscc9ff192010-11-03 04:41:38 +0000202
203 if (greflags[0] & GRE_KEY) {
204 if (greflags[0] & GRE_CSUM)
205 gre_hdr++;
David S. Miller9cce96d2011-03-12 03:00:33 -0500206 fl4->fl4_gre_key = gre_hdr[1];
Timo Teräscc9ff192010-11-03 04:41:38 +0000207 }
208 }
209 break;
210
Linus Torvalds1da177e2005-04-16 15:20:36 -0700211 default:
David S. Miller9cce96d2011-03-12 03:00:33 -0500212 fl4->fl4_ipsec_spi = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700213 break;
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700214 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700215 }
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500216 fl4->flowi4_proto = iph->protocol;
217 fl4->daddr = reverse ? iph->saddr : iph->daddr;
218 fl4->saddr = reverse ? iph->daddr : iph->saddr;
219 fl4->flowi4_tos = iph->tos;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700220}
221
Daniel Lezcano569d3642008-01-18 03:56:57 -0800222static inline int xfrm4_garbage_collect(struct dst_ops *ops)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700223{
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800224 struct net *net = container_of(ops, struct net, xfrm.xfrm4_dst_ops);
225
226 xfrm4_policy_afinfo.garbage_collect(net);
Eric Dumazetfc66f952010-10-08 06:37:34 +0000227 return (dst_entries_get_slow(ops) > ops->gc_thresh * 2);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700228}
229
David S. Miller6700c272012-07-17 03:29:28 -0700230static void xfrm4_update_pmtu(struct dst_entry *dst, struct sock *sk,
231 struct sk_buff *skb, u32 mtu)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700232{
233 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
234 struct dst_entry *path = xdst->route;
235
David S. Miller6700c272012-07-17 03:29:28 -0700236 path->ops->update_pmtu(path, sk, skb, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700237}
238
David S. Miller6700c272012-07-17 03:29:28 -0700239static void xfrm4_redirect(struct dst_entry *dst, struct sock *sk,
240 struct sk_buff *skb)
David S. Miller55be7a92012-07-11 21:27:49 -0700241{
242 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
243 struct dst_entry *path = xdst->route;
244
David S. Miller6700c272012-07-17 03:29:28 -0700245 path->ops->redirect(path, sk, skb);
David S. Miller55be7a92012-07-11 21:27:49 -0700246}
247
Herbert Xuaabc9762005-05-03 16:27:10 -0700248static void xfrm4_dst_destroy(struct dst_entry *dst)
249{
250 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
251
David S. Miller62fa8a82011-01-26 20:51:05 -0800252 dst_destroy_metrics_generic(dst);
253
Herbert Xuaabc9762005-05-03 16:27:10 -0700254 xfrm_dst_destroy(xdst);
255}
256
257static void xfrm4_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
258 int unregister)
259{
Herbert Xuaabc9762005-05-03 16:27:10 -0700260 if (!unregister)
261 return;
262
Herbert Xuaabc9762005-05-03 16:27:10 -0700263 xfrm_dst_ifdown(dst, dev);
264}
265
Dan Streetmana8a572a2015-10-29 09:51:16 -0400266static struct dst_ops xfrm4_dst_ops_template = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700267 .family = AF_INET,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700268 .gc = xfrm4_garbage_collect,
269 .update_pmtu = xfrm4_update_pmtu,
David S. Miller55be7a92012-07-11 21:27:49 -0700270 .redirect = xfrm4_redirect,
David S. Miller62fa8a82011-01-26 20:51:05 -0800271 .cow_metrics = dst_cow_metrics_generic,
Herbert Xuaabc9762005-05-03 16:27:10 -0700272 .destroy = xfrm4_dst_destroy,
273 .ifdown = xfrm4_dst_ifdown,
Herbert Xu862b82c2007-11-13 21:43:11 -0800274 .local_out = __ip_local_out,
Steffen Klassertc3865782015-09-29 11:40:49 +0200275 .gc_thresh = INT_MAX,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700276};
277
278static struct xfrm_policy_afinfo xfrm4_policy_afinfo = {
279 .family = AF_INET,
Dan Streetmana8a572a2015-10-29 09:51:16 -0400280 .dst_ops = &xfrm4_dst_ops_template,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700281 .dst_lookup = xfrm4_dst_lookup,
Patrick McHardya1e59ab2006-09-19 12:57:34 -0700282 .get_saddr = xfrm4_get_saddr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700283 .decode_session = _decode_session4,
Herbert Xu25ee3282007-12-11 09:32:34 -0800284 .get_tos = xfrm4_get_tos,
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -0800285 .init_path = xfrm4_init_path,
Herbert Xu25ee3282007-12-11 09:32:34 -0800286 .fill_dst = xfrm4_fill_dst,
David S. Miller2774c132011-03-01 14:59:04 -0800287 .blackhole_route = ipv4_blackhole_route,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700288};
289
Randy Dunlapf8167002009-08-04 20:18:33 -0700290#ifdef CONFIG_SYSCTL
Neil Hormana44a4a02009-07-27 08:22:46 +0000291static struct ctl_table xfrm4_policy_table[] = {
292 {
Neil Hormana44a4a02009-07-27 08:22:46 +0000293 .procname = "xfrm4_gc_thresh",
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800294 .data = &init_net.xfrm.xfrm4_dst_ops.gc_thresh,
Neil Hormana44a4a02009-07-27 08:22:46 +0000295 .maxlen = sizeof(int),
296 .mode = 0644,
297 .proc_handler = proc_dointvec,
298 },
299 { }
300};
301
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200302static __net_init int xfrm4_net_sysctl_init(struct net *net)
Michal Kubecek8d068872013-02-06 10:46:33 +0100303{
304 struct ctl_table *table;
305 struct ctl_table_header *hdr;
306
307 table = xfrm4_policy_table;
308 if (!net_eq(net, &init_net)) {
309 table = kmemdup(table, sizeof(xfrm4_policy_table), GFP_KERNEL);
310 if (!table)
311 goto err_alloc;
312
313 table[0].data = &net->xfrm.xfrm4_dst_ops.gc_thresh;
314 }
315
316 hdr = register_net_sysctl(net, "net/ipv4", table);
317 if (!hdr)
318 goto err_reg;
319
320 net->ipv4.xfrm4_hdr = hdr;
321 return 0;
322
323err_reg:
324 if (!net_eq(net, &init_net))
325 kfree(table);
326err_alloc:
327 return -ENOMEM;
328}
329
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200330static __net_exit void xfrm4_net_sysctl_exit(struct net *net)
Michal Kubecek8d068872013-02-06 10:46:33 +0100331{
332 struct ctl_table *table;
333
Ian Morris51456b22015-04-03 09:17:26 +0100334 if (!net->ipv4.xfrm4_hdr)
Michal Kubecek8d068872013-02-06 10:46:33 +0100335 return;
336
337 table = net->ipv4.xfrm4_hdr->ctl_table_arg;
338 unregister_net_sysctl_table(net->ipv4.xfrm4_hdr);
339 if (!net_eq(net, &init_net))
340 kfree(table);
341}
Dan Streetmana8a572a2015-10-29 09:51:16 -0400342#else /* CONFIG_SYSCTL */
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200343static inline int xfrm4_net_sysctl_init(struct net *net)
Dan Streetmana8a572a2015-10-29 09:51:16 -0400344{
345 return 0;
346}
347
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200348static inline void xfrm4_net_sysctl_exit(struct net *net)
Dan Streetmana8a572a2015-10-29 09:51:16 -0400349{
350}
351#endif
352
353static int __net_init xfrm4_net_init(struct net *net)
354{
355 int ret;
356
357 memcpy(&net->xfrm.xfrm4_dst_ops, &xfrm4_dst_ops_template,
358 sizeof(xfrm4_dst_ops_template));
359 ret = dst_entries_init(&net->xfrm.xfrm4_dst_ops);
360 if (ret)
361 return ret;
362
363 ret = xfrm4_net_sysctl_init(net);
364 if (ret)
365 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
366
367 return ret;
368}
369
370static void __net_exit xfrm4_net_exit(struct net *net)
371{
372 xfrm4_net_sysctl_exit(net);
373 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
374}
Michal Kubecek8d068872013-02-06 10:46:33 +0100375
376static struct pernet_operations __net_initdata xfrm4_net_ops = {
377 .init = xfrm4_net_init,
378 .exit = xfrm4_net_exit,
379};
Neil Hormana44a4a02009-07-27 08:22:46 +0000380
Linus Torvalds1da177e2005-04-16 15:20:36 -0700381static void __init xfrm4_policy_init(void)
382{
383 xfrm_policy_register_afinfo(&xfrm4_policy_afinfo);
384}
385
Steffen Klassert703fb942012-11-13 08:52:24 +0100386void __init xfrm4_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700387{
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800388 xfrm4_state_init();
389 xfrm4_policy_init();
Steffen Klassert2f32b512014-03-14 07:28:07 +0100390 xfrm4_protocol_init();
Michal Kubecek8d068872013-02-06 10:46:33 +0100391 register_pernet_subsys(&xfrm4_net_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700392}
393