blob: 16f03d8ab7582fd0eca0af686090fa20a8051ea6 [file] [log] [blame]
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07002 * xfrm4_policy.c
3 *
4 * Changes:
5 * Kazunori MIYAZAWA @USAGI
6 * YOSHIFUJI Hideaki @USAGI
7 * Split up af-specific portion
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09008 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 */
10
Herbert Xu66cdb3c2007-11-13 21:37:28 -080011#include <linux/err.h>
12#include <linux/kernel.h>
Herbert Xuaabc9762005-05-03 16:27:10 -070013#include <linux/inetdevice.h>
Timo Teräscc9ff192010-11-03 04:41:38 +000014#include <linux/if_tunnel.h>
Herbert Xu45ff5a32007-11-13 21:35:32 -080015#include <net/dst.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070016#include <net/xfrm.h>
17#include <net/ip.h>
David Ahern385add92015-09-29 20:07:13 -070018#include <net/l3mdev.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019
Linus Torvalds1da177e2005-04-16 15:20:36 -070020static struct xfrm_policy_afinfo xfrm4_policy_afinfo;
21
David S. Miller8f01cb02011-05-09 15:13:28 -070022static struct dst_entry *__xfrm4_dst_lookup(struct net *net, struct flowi4 *fl4,
David Ahern42a7b322015-08-10 16:58:11 -060023 int tos, int oif,
David S. Miller8f01cb02011-05-09 15:13:28 -070024 const xfrm_address_t *saddr,
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090025 const xfrm_address_t *daddr,
26 u32 mark)
Linus Torvalds1da177e2005-04-16 15:20:36 -070027{
Herbert Xu66cdb3c2007-11-13 21:37:28 -080028 struct rtable *rt;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070029
David S. Miller8f01cb02011-05-09 15:13:28 -070030 memset(fl4, 0, sizeof(*fl4));
31 fl4->daddr = daddr->a4;
32 fl4->flowi4_tos = tos;
David Ahern11d7a0b2016-08-14 19:52:56 -070033 fl4->flowi4_oif = l3mdev_master_ifindex_by_index(net, oif);
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090034 fl4->flowi4_mark = mark;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080035 if (saddr)
David S. Miller8f01cb02011-05-09 15:13:28 -070036 fl4->saddr = saddr->a4;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080037
David Ahern58189ca2015-09-15 15:10:50 -070038 fl4->flowi4_flags = FLOWI_FLAG_SKIP_NH_OIF;
39
David S. Miller8f01cb02011-05-09 15:13:28 -070040 rt = __ip_route_output_key(net, fl4);
David S. Millerb23dd4f2011-03-02 14:31:35 -080041 if (!IS_ERR(rt))
42 return &rt->dst;
43
44 return ERR_CAST(rt);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080045}
46
David Ahern42a7b322015-08-10 16:58:11 -060047static struct dst_entry *xfrm4_dst_lookup(struct net *net, int tos, int oif,
David S. Miller8f01cb02011-05-09 15:13:28 -070048 const xfrm_address_t *saddr,
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090049 const xfrm_address_t *daddr,
50 u32 mark)
David S. Miller8f01cb02011-05-09 15:13:28 -070051{
52 struct flowi4 fl4;
53
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090054 return __xfrm4_dst_lookup(net, &fl4, tos, oif, saddr, daddr, mark);
David S. Miller8f01cb02011-05-09 15:13:28 -070055}
56
David Ahern42a7b322015-08-10 16:58:11 -060057static int xfrm4_get_saddr(struct net *net, int oif,
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090058 xfrm_address_t *saddr, xfrm_address_t *daddr,
59 u32 mark)
Herbert Xu66cdb3c2007-11-13 21:37:28 -080060{
61 struct dst_entry *dst;
David S. Miller8f01cb02011-05-09 15:13:28 -070062 struct flowi4 fl4;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080063
Lorenzo Colitti34e23de2017-08-11 02:11:33 +090064 dst = __xfrm4_dst_lookup(net, &fl4, 0, oif, NULL, daddr, mark);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080065 if (IS_ERR(dst))
66 return -EHOSTUNREACH;
67
David S. Miller8f01cb02011-05-09 15:13:28 -070068 saddr->a4 = fl4.saddr;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080069 dst_release(dst);
70 return 0;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070071}
72
David S. Miller05d84022011-02-22 17:47:10 -080073static int xfrm4_get_tos(const struct flowi *fl)
Linus Torvalds1da177e2005-04-16 15:20:36 -070074{
David S. Miller7e1dc7b2011-03-12 02:42:11 -050075 return IPTOS_RT_MASK & fl->u.ip4.flowi4_tos; /* Strip ECN bits */
Herbert Xu25ee3282007-12-11 09:32:34 -080076}
Linus Torvalds1da177e2005-04-16 15:20:36 -070077
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -080078static int xfrm4_init_path(struct xfrm_dst *path, struct dst_entry *dst,
79 int nfheader_len)
80{
81 return 0;
82}
83
Herbert Xu87c1e122010-03-02 02:51:56 +000084static int xfrm4_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
David S. Miller0c7b3ee2011-02-22 17:48:57 -080085 const struct flowi *fl)
Herbert Xu25ee3282007-12-11 09:32:34 -080086{
87 struct rtable *rt = (struct rtable *)xdst->route;
David S. Miller7e1dc7b2011-03-12 02:42:11 -050088 const struct flowi4 *fl4 = &fl->u.ip4;
Linus Torvalds1da177e2005-04-16 15:20:36 -070089
Yan, Zhengb7323392011-10-22 21:58:20 +000090 xdst->u.rt.rt_iif = fl4->flowi4_iif;
Linus Torvalds1da177e2005-04-16 15:20:36 -070091
Herbert Xu25ee3282007-12-11 09:32:34 -080092 xdst->u.dst.dev = dev;
93 dev_hold(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -070094
Herbert Xu25ee3282007-12-11 09:32:34 -080095 /* Sheit... I remember I did this right. Apparently,
96 * it was magically lost, so this code needs audit */
David S. Miller9917e1e82012-07-17 14:44:26 -070097 xdst->u.rt.rt_is_input = rt->rt_is_input;
Herbert Xu25ee3282007-12-11 09:32:34 -080098 xdst->u.rt.rt_flags = rt->rt_flags & (RTCF_BROADCAST | RTCF_MULTICAST |
99 RTCF_LOCAL);
100 xdst->u.rt.rt_type = rt->rt_type;
Herbert Xu25ee3282007-12-11 09:32:34 -0800101 xdst->u.rt.rt_gateway = rt->rt_gateway;
Julian Anastasov155e8332012-10-08 11:41:18 +0000102 xdst->u.rt.rt_uses_gateway = rt->rt_uses_gateway;
David S. Miller59436342012-07-10 06:58:42 -0700103 xdst->u.rt.rt_pmtu = rt->rt_pmtu;
Sabrina Dubrocad5439072018-03-14 10:21:14 +0100104 xdst->u.rt.rt_mtu_locked = rt->rt_mtu_locked;
David Ahernb7503e02015-09-02 13:58:35 -0700105 xdst->u.rt.rt_table_id = rt->rt_table_id;
David S. Millercaacf052012-07-31 15:06:50 -0700106 INIT_LIST_HEAD(&xdst->u.rt.rt_uncached);
Miika Komu43372262007-02-06 14:27:32 -0800107
Linus Torvalds1da177e2005-04-16 15:20:36 -0700108 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700109}
110
111static void
Herbert Xud5422ef2007-12-12 10:44:16 -0800112_decode_session4(struct sk_buff *skb, struct flowi *fl, int reverse)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113{
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000114 const struct iphdr *iph = ip_hdr(skb);
Steffen Klassert5b28db52019-02-26 07:04:50 +0100115 int ihl = iph->ihl;
116 u8 *xprth = skb_network_header(skb) + ihl * 4;
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500117 struct flowi4 *fl4 = &fl->u.ip4;
Steffen Klassert84502b52013-10-30 11:16:28 +0100118 int oif = 0;
119
David Ahern385add92015-09-29 20:07:13 -0700120 if (skb_dst(skb))
David Aherne0d56fd2016-09-10 12:09:57 -0700121 oif = skb_dst(skb)->dev->ifindex;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700122
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500123 memset(fl4, 0, sizeof(struct flowi4));
124 fl4->flowi4_mark = skb->mark;
Steffen Klassert84502b52013-10-30 11:16:28 +0100125 fl4->flowi4_oif = reverse ? skb->skb_iif : oif;
Peter Kosyh44b451f2010-07-02 07:47:55 +0000126
Steffen Klassert5b28db52019-02-26 07:04:50 +0100127 fl4->flowi4_proto = iph->protocol;
128 fl4->daddr = reverse ? iph->saddr : iph->daddr;
129 fl4->saddr = reverse ? iph->daddr : iph->saddr;
130 fl4->flowi4_tos = iph->tos;
131
Paul Gortmaker56f8a752011-06-21 20:33:34 -0700132 if (!ip_is_fragment(iph)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700133 switch (iph->protocol) {
134 case IPPROTO_UDP:
Gerrit Renkerba4e58e2006-11-27 11:10:57 -0800135 case IPPROTO_UDPLITE:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136 case IPPROTO_TCP:
137 case IPPROTO_SCTP:
Patrick McHardy9e999992005-12-19 14:03:46 -0800138 case IPPROTO_DCCP:
Wei Yongjunc615c9f2009-07-02 16:57:23 +0000139 if (xprth + 4 < skb->data ||
140 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200141 __be16 *ports;
142
Steffen Klassert5b28db52019-02-26 07:04:50 +0100143 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200144 ports = (__be16 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700145
David S. Miller9cce96d2011-03-12 03:00:33 -0500146 fl4->fl4_sport = ports[!!reverse];
147 fl4->fl4_dport = ports[!reverse];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700148 }
149 break;
150
151 case IPPROTO_ICMP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200152 if (xprth + 2 < skb->data ||
153 pskb_may_pull(skb, xprth + 2 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200154 u8 *icmp;
155
Steffen Klassert5b28db52019-02-26 07:04:50 +0100156 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200157 icmp = xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700158
David S. Miller9cce96d2011-03-12 03:00:33 -0500159 fl4->fl4_icmp_type = icmp[0];
160 fl4->fl4_icmp_code = icmp[1];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700161 }
162 break;
163
164 case IPPROTO_ESP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200165 if (xprth + 4 < skb->data ||
166 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200167 __be32 *ehdr;
168
Steffen Klassert5b28db52019-02-26 07:04:50 +0100169 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200170 ehdr = (__be32 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700171
David S. Miller9cce96d2011-03-12 03:00:33 -0500172 fl4->fl4_ipsec_spi = ehdr[0];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700173 }
174 break;
175
176 case IPPROTO_AH:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200177 if (xprth + 8 < skb->data ||
178 pskb_may_pull(skb, xprth + 8 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200179 __be32 *ah_hdr;
180
Steffen Klassert5b28db52019-02-26 07:04:50 +0100181 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200182 ah_hdr = (__be32 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700183
David S. Miller9cce96d2011-03-12 03:00:33 -0500184 fl4->fl4_ipsec_spi = ah_hdr[1];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700185 }
186 break;
187
188 case IPPROTO_COMP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200189 if (xprth + 4 < skb->data ||
190 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200191 __be16 *ipcomp_hdr;
192
Steffen Klassert5b28db52019-02-26 07:04:50 +0100193 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200194 ipcomp_hdr = (__be16 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700195
David S. Miller9cce96d2011-03-12 03:00:33 -0500196 fl4->fl4_ipsec_spi = htonl(ntohs(ipcomp_hdr[1]));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700197 }
198 break;
Timo Teräscc9ff192010-11-03 04:41:38 +0000199
200 case IPPROTO_GRE:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200201 if (xprth + 12 < skb->data ||
202 pskb_may_pull(skb, xprth + 12 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200203 __be16 *greflags;
204 __be32 *gre_hdr;
205
Steffen Klassert5b28db52019-02-26 07:04:50 +0100206 xprth = skb_network_header(skb) + ihl * 4;
Steffen Klassertea673a42015-10-23 07:32:39 +0200207 greflags = (__be16 *)xprth;
208 gre_hdr = (__be32 *)xprth;
Timo Teräscc9ff192010-11-03 04:41:38 +0000209
210 if (greflags[0] & GRE_KEY) {
211 if (greflags[0] & GRE_CSUM)
212 gre_hdr++;
David S. Miller9cce96d2011-03-12 03:00:33 -0500213 fl4->fl4_gre_key = gre_hdr[1];
Timo Teräscc9ff192010-11-03 04:41:38 +0000214 }
215 }
216 break;
217
Linus Torvalds1da177e2005-04-16 15:20:36 -0700218 default:
David S. Miller9cce96d2011-03-12 03:00:33 -0500219 fl4->fl4_ipsec_spi = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700220 break;
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700221 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700222 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700223}
224
Daniel Lezcano569d3642008-01-18 03:56:57 -0800225static inline int xfrm4_garbage_collect(struct dst_ops *ops)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700226{
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800227 struct net *net = container_of(ops, struct net, xfrm.xfrm4_dst_ops);
228
229 xfrm4_policy_afinfo.garbage_collect(net);
Eric Dumazetfc66f952010-10-08 06:37:34 +0000230 return (dst_entries_get_slow(ops) > ops->gc_thresh * 2);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700231}
232
David S. Miller6700c272012-07-17 03:29:28 -0700233static void xfrm4_update_pmtu(struct dst_entry *dst, struct sock *sk,
234 struct sk_buff *skb, u32 mtu)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700235{
236 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
237 struct dst_entry *path = xdst->route;
238
David S. Miller6700c272012-07-17 03:29:28 -0700239 path->ops->update_pmtu(path, sk, skb, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700240}
241
David S. Miller6700c272012-07-17 03:29:28 -0700242static void xfrm4_redirect(struct dst_entry *dst, struct sock *sk,
243 struct sk_buff *skb)
David S. Miller55be7a92012-07-11 21:27:49 -0700244{
245 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
246 struct dst_entry *path = xdst->route;
247
David S. Miller6700c272012-07-17 03:29:28 -0700248 path->ops->redirect(path, sk, skb);
David S. Miller55be7a92012-07-11 21:27:49 -0700249}
250
Herbert Xuaabc9762005-05-03 16:27:10 -0700251static void xfrm4_dst_destroy(struct dst_entry *dst)
252{
253 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
254
David S. Miller62fa8a82011-01-26 20:51:05 -0800255 dst_destroy_metrics_generic(dst);
256
Herbert Xuaabc9762005-05-03 16:27:10 -0700257 xfrm_dst_destroy(xdst);
258}
259
260static void xfrm4_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
261 int unregister)
262{
Herbert Xuaabc9762005-05-03 16:27:10 -0700263 if (!unregister)
264 return;
265
Herbert Xuaabc9762005-05-03 16:27:10 -0700266 xfrm_dst_ifdown(dst, dev);
267}
268
Dan Streetmana8a572a2015-10-29 09:51:16 -0400269static struct dst_ops xfrm4_dst_ops_template = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700270 .family = AF_INET,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700271 .gc = xfrm4_garbage_collect,
272 .update_pmtu = xfrm4_update_pmtu,
David S. Miller55be7a92012-07-11 21:27:49 -0700273 .redirect = xfrm4_redirect,
David S. Miller62fa8a82011-01-26 20:51:05 -0800274 .cow_metrics = dst_cow_metrics_generic,
Herbert Xuaabc9762005-05-03 16:27:10 -0700275 .destroy = xfrm4_dst_destroy,
276 .ifdown = xfrm4_dst_ifdown,
Herbert Xu862b82c2007-11-13 21:43:11 -0800277 .local_out = __ip_local_out,
Steffen Klassertc3865782015-09-29 11:40:49 +0200278 .gc_thresh = INT_MAX,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700279};
280
281static struct xfrm_policy_afinfo xfrm4_policy_afinfo = {
282 .family = AF_INET,
Dan Streetmana8a572a2015-10-29 09:51:16 -0400283 .dst_ops = &xfrm4_dst_ops_template,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700284 .dst_lookup = xfrm4_dst_lookup,
Patrick McHardya1e59ab2006-09-19 12:57:34 -0700285 .get_saddr = xfrm4_get_saddr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700286 .decode_session = _decode_session4,
Herbert Xu25ee3282007-12-11 09:32:34 -0800287 .get_tos = xfrm4_get_tos,
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -0800288 .init_path = xfrm4_init_path,
Herbert Xu25ee3282007-12-11 09:32:34 -0800289 .fill_dst = xfrm4_fill_dst,
David S. Miller2774c132011-03-01 14:59:04 -0800290 .blackhole_route = ipv4_blackhole_route,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700291};
292
Randy Dunlapf8167002009-08-04 20:18:33 -0700293#ifdef CONFIG_SYSCTL
Neil Hormana44a4a02009-07-27 08:22:46 +0000294static struct ctl_table xfrm4_policy_table[] = {
295 {
Neil Hormana44a4a02009-07-27 08:22:46 +0000296 .procname = "xfrm4_gc_thresh",
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800297 .data = &init_net.xfrm.xfrm4_dst_ops.gc_thresh,
Neil Hormana44a4a02009-07-27 08:22:46 +0000298 .maxlen = sizeof(int),
299 .mode = 0644,
300 .proc_handler = proc_dointvec,
301 },
302 { }
303};
304
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200305static __net_init int xfrm4_net_sysctl_init(struct net *net)
Michal Kubecek8d068872013-02-06 10:46:33 +0100306{
307 struct ctl_table *table;
308 struct ctl_table_header *hdr;
309
310 table = xfrm4_policy_table;
311 if (!net_eq(net, &init_net)) {
312 table = kmemdup(table, sizeof(xfrm4_policy_table), GFP_KERNEL);
313 if (!table)
314 goto err_alloc;
315
316 table[0].data = &net->xfrm.xfrm4_dst_ops.gc_thresh;
317 }
318
319 hdr = register_net_sysctl(net, "net/ipv4", table);
320 if (!hdr)
321 goto err_reg;
322
323 net->ipv4.xfrm4_hdr = hdr;
324 return 0;
325
326err_reg:
327 if (!net_eq(net, &init_net))
328 kfree(table);
329err_alloc:
330 return -ENOMEM;
331}
332
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200333static __net_exit void xfrm4_net_sysctl_exit(struct net *net)
Michal Kubecek8d068872013-02-06 10:46:33 +0100334{
335 struct ctl_table *table;
336
Ian Morris51456b22015-04-03 09:17:26 +0100337 if (!net->ipv4.xfrm4_hdr)
Michal Kubecek8d068872013-02-06 10:46:33 +0100338 return;
339
340 table = net->ipv4.xfrm4_hdr->ctl_table_arg;
341 unregister_net_sysctl_table(net->ipv4.xfrm4_hdr);
342 if (!net_eq(net, &init_net))
343 kfree(table);
344}
Dan Streetmana8a572a2015-10-29 09:51:16 -0400345#else /* CONFIG_SYSCTL */
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200346static inline int xfrm4_net_sysctl_init(struct net *net)
Dan Streetmana8a572a2015-10-29 09:51:16 -0400347{
348 return 0;
349}
350
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200351static inline void xfrm4_net_sysctl_exit(struct net *net)
Dan Streetmana8a572a2015-10-29 09:51:16 -0400352{
353}
354#endif
355
356static int __net_init xfrm4_net_init(struct net *net)
357{
358 int ret;
359
360 memcpy(&net->xfrm.xfrm4_dst_ops, &xfrm4_dst_ops_template,
361 sizeof(xfrm4_dst_ops_template));
362 ret = dst_entries_init(&net->xfrm.xfrm4_dst_ops);
363 if (ret)
364 return ret;
365
366 ret = xfrm4_net_sysctl_init(net);
367 if (ret)
368 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
369
370 return ret;
371}
372
373static void __net_exit xfrm4_net_exit(struct net *net)
374{
375 xfrm4_net_sysctl_exit(net);
376 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
377}
Michal Kubecek8d068872013-02-06 10:46:33 +0100378
379static struct pernet_operations __net_initdata xfrm4_net_ops = {
380 .init = xfrm4_net_init,
381 .exit = xfrm4_net_exit,
382};
Neil Hormana44a4a02009-07-27 08:22:46 +0000383
Linus Torvalds1da177e2005-04-16 15:20:36 -0700384static void __init xfrm4_policy_init(void)
385{
386 xfrm_policy_register_afinfo(&xfrm4_policy_afinfo);
387}
388
Steffen Klassert703fb942012-11-13 08:52:24 +0100389void __init xfrm4_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700390{
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800391 xfrm4_state_init();
392 xfrm4_policy_init();
Steffen Klassert2f32b512014-03-14 07:28:07 +0100393 xfrm4_protocol_init();
Michal Kubecek8d068872013-02-06 10:46:33 +0100394 register_pernet_subsys(&xfrm4_net_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700395}
396