blob: d7bf0b0418858cac8c2689fea8bfe3e83a160a15 [file] [log] [blame]
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09001/*
Linus Torvalds1da177e2005-04-16 15:20:36 -07002 * xfrm4_policy.c
3 *
4 * Changes:
5 * Kazunori MIYAZAWA @USAGI
6 * YOSHIFUJI Hideaki @USAGI
7 * Split up af-specific portion
YOSHIFUJI Hideakie905a9e2007-02-09 23:24:47 +09008 *
Linus Torvalds1da177e2005-04-16 15:20:36 -07009 */
10
Herbert Xu66cdb3c2007-11-13 21:37:28 -080011#include <linux/err.h>
12#include <linux/kernel.h>
Herbert Xuaabc9762005-05-03 16:27:10 -070013#include <linux/inetdevice.h>
Timo Teräscc9ff192010-11-03 04:41:38 +000014#include <linux/if_tunnel.h>
Herbert Xu45ff5a32007-11-13 21:35:32 -080015#include <net/dst.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070016#include <net/xfrm.h>
17#include <net/ip.h>
David Ahern385add92015-09-29 20:07:13 -070018#include <net/l3mdev.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019
David S. Miller8f01cb02011-05-09 15:13:28 -070020static struct dst_entry *__xfrm4_dst_lookup(struct net *net, struct flowi4 *fl4,
David Ahern42a7b322015-08-10 16:58:11 -060021 int tos, int oif,
David S. Miller8f01cb02011-05-09 15:13:28 -070022 const xfrm_address_t *saddr,
Lorenzo Colitti077fbac2017-08-11 02:11:33 +090023 const xfrm_address_t *daddr,
24 u32 mark)
Linus Torvalds1da177e2005-04-16 15:20:36 -070025{
Herbert Xu66cdb3c2007-11-13 21:37:28 -080026 struct rtable *rt;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070027
David S. Miller8f01cb02011-05-09 15:13:28 -070028 memset(fl4, 0, sizeof(*fl4));
29 fl4->daddr = daddr->a4;
30 fl4->flowi4_tos = tos;
David Ahern11d7a0b2016-08-14 19:52:56 -070031 fl4->flowi4_oif = l3mdev_master_ifindex_by_index(net, oif);
Lorenzo Colitti077fbac2017-08-11 02:11:33 +090032 fl4->flowi4_mark = mark;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080033 if (saddr)
David S. Miller8f01cb02011-05-09 15:13:28 -070034 fl4->saddr = saddr->a4;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080035
David Ahern58189ca2015-09-15 15:10:50 -070036 fl4->flowi4_flags = FLOWI_FLAG_SKIP_NH_OIF;
37
David S. Miller8f01cb02011-05-09 15:13:28 -070038 rt = __ip_route_output_key(net, fl4);
David S. Millerb23dd4f2011-03-02 14:31:35 -080039 if (!IS_ERR(rt))
40 return &rt->dst;
41
42 return ERR_CAST(rt);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080043}
44
David Ahern42a7b322015-08-10 16:58:11 -060045static struct dst_entry *xfrm4_dst_lookup(struct net *net, int tos, int oif,
David S. Miller8f01cb02011-05-09 15:13:28 -070046 const xfrm_address_t *saddr,
Lorenzo Colitti077fbac2017-08-11 02:11:33 +090047 const xfrm_address_t *daddr,
48 u32 mark)
David S. Miller8f01cb02011-05-09 15:13:28 -070049{
50 struct flowi4 fl4;
51
Lorenzo Colitti077fbac2017-08-11 02:11:33 +090052 return __xfrm4_dst_lookup(net, &fl4, tos, oif, saddr, daddr, mark);
David S. Miller8f01cb02011-05-09 15:13:28 -070053}
54
David Ahern42a7b322015-08-10 16:58:11 -060055static int xfrm4_get_saddr(struct net *net, int oif,
Lorenzo Colitti077fbac2017-08-11 02:11:33 +090056 xfrm_address_t *saddr, xfrm_address_t *daddr,
57 u32 mark)
Herbert Xu66cdb3c2007-11-13 21:37:28 -080058{
59 struct dst_entry *dst;
David S. Miller8f01cb02011-05-09 15:13:28 -070060 struct flowi4 fl4;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080061
Lorenzo Colitti077fbac2017-08-11 02:11:33 +090062 dst = __xfrm4_dst_lookup(net, &fl4, 0, oif, NULL, daddr, mark);
Herbert Xu66cdb3c2007-11-13 21:37:28 -080063 if (IS_ERR(dst))
64 return -EHOSTUNREACH;
65
David S. Miller8f01cb02011-05-09 15:13:28 -070066 saddr->a4 = fl4.saddr;
Herbert Xu66cdb3c2007-11-13 21:37:28 -080067 dst_release(dst);
68 return 0;
Patrick McHardya1e59ab2006-09-19 12:57:34 -070069}
70
David S. Miller05d84022011-02-22 17:47:10 -080071static int xfrm4_get_tos(const struct flowi *fl)
Linus Torvalds1da177e2005-04-16 15:20:36 -070072{
David S. Miller7e1dc7b2011-03-12 02:42:11 -050073 return IPTOS_RT_MASK & fl->u.ip4.flowi4_tos; /* Strip ECN bits */
Herbert Xu25ee3282007-12-11 09:32:34 -080074}
Linus Torvalds1da177e2005-04-16 15:20:36 -070075
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -080076static int xfrm4_init_path(struct xfrm_dst *path, struct dst_entry *dst,
77 int nfheader_len)
78{
79 return 0;
80}
81
Herbert Xu87c1e122010-03-02 02:51:56 +000082static int xfrm4_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
David S. Miller0c7b3ee2011-02-22 17:48:57 -080083 const struct flowi *fl)
Herbert Xu25ee3282007-12-11 09:32:34 -080084{
85 struct rtable *rt = (struct rtable *)xdst->route;
David S. Miller7e1dc7b2011-03-12 02:42:11 -050086 const struct flowi4 *fl4 = &fl->u.ip4;
Linus Torvalds1da177e2005-04-16 15:20:36 -070087
Yan, Zhengb7323392011-10-22 21:58:20 +000088 xdst->u.rt.rt_iif = fl4->flowi4_iif;
Linus Torvalds1da177e2005-04-16 15:20:36 -070089
Herbert Xu25ee3282007-12-11 09:32:34 -080090 xdst->u.dst.dev = dev;
91 dev_hold(dev);
Linus Torvalds1da177e2005-04-16 15:20:36 -070092
Herbert Xu25ee3282007-12-11 09:32:34 -080093 /* Sheit... I remember I did this right. Apparently,
94 * it was magically lost, so this code needs audit */
David S. Miller9917e1e82012-07-17 14:44:26 -070095 xdst->u.rt.rt_is_input = rt->rt_is_input;
Herbert Xu25ee3282007-12-11 09:32:34 -080096 xdst->u.rt.rt_flags = rt->rt_flags & (RTCF_BROADCAST | RTCF_MULTICAST |
97 RTCF_LOCAL);
98 xdst->u.rt.rt_type = rt->rt_type;
Herbert Xu25ee3282007-12-11 09:32:34 -080099 xdst->u.rt.rt_gateway = rt->rt_gateway;
Julian Anastasov155e8332012-10-08 11:41:18 +0000100 xdst->u.rt.rt_uses_gateway = rt->rt_uses_gateway;
David S. Miller59436342012-07-10 06:58:42 -0700101 xdst->u.rt.rt_pmtu = rt->rt_pmtu;
David Ahernb7503e02015-09-02 13:58:35 -0700102 xdst->u.rt.rt_table_id = rt->rt_table_id;
David S. Millercaacf052012-07-31 15:06:50 -0700103 INIT_LIST_HEAD(&xdst->u.rt.rt_uncached);
Miika Komu43372262007-02-06 14:27:32 -0800104
Linus Torvalds1da177e2005-04-16 15:20:36 -0700105 return 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700106}
107
108static void
Herbert Xud5422ef2007-12-12 10:44:16 -0800109_decode_session4(struct sk_buff *skb, struct flowi *fl, int reverse)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700110{
Eric Dumazetb71d1d42011-04-22 04:53:02 +0000111 const struct iphdr *iph = ip_hdr(skb);
Arnaldo Carvalho de Melod56f90a2007-04-10 20:50:43 -0700112 u8 *xprth = skb_network_header(skb) + iph->ihl * 4;
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500113 struct flowi4 *fl4 = &fl->u.ip4;
Steffen Klassert84502b52013-10-30 11:16:28 +0100114 int oif = 0;
115
David Ahern385add92015-09-29 20:07:13 -0700116 if (skb_dst(skb))
David Aherne0d56fd2016-09-10 12:09:57 -0700117 oif = skb_dst(skb)->dev->ifindex;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700118
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500119 memset(fl4, 0, sizeof(struct flowi4));
120 fl4->flowi4_mark = skb->mark;
Steffen Klassert84502b52013-10-30 11:16:28 +0100121 fl4->flowi4_oif = reverse ? skb->skb_iif : oif;
Peter Kosyh44b451f2010-07-02 07:47:55 +0000122
Paul Gortmaker56f8a752011-06-21 20:33:34 -0700123 if (!ip_is_fragment(iph)) {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700124 switch (iph->protocol) {
125 case IPPROTO_UDP:
Gerrit Renkerba4e58e2006-11-27 11:10:57 -0800126 case IPPROTO_UDPLITE:
Linus Torvalds1da177e2005-04-16 15:20:36 -0700127 case IPPROTO_TCP:
128 case IPPROTO_SCTP:
Patrick McHardy9e999992005-12-19 14:03:46 -0800129 case IPPROTO_DCCP:
Wei Yongjunc615c9f2009-07-02 16:57:23 +0000130 if (xprth + 4 < skb->data ||
131 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200132 __be16 *ports;
133
134 xprth = skb_network_header(skb) + iph->ihl * 4;
135 ports = (__be16 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700136
David S. Miller9cce96d2011-03-12 03:00:33 -0500137 fl4->fl4_sport = ports[!!reverse];
138 fl4->fl4_dport = ports[!reverse];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700139 }
140 break;
141
142 case IPPROTO_ICMP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200143 if (xprth + 2 < skb->data ||
144 pskb_may_pull(skb, xprth + 2 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200145 u8 *icmp;
146
147 xprth = skb_network_header(skb) + iph->ihl * 4;
148 icmp = xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700149
David S. Miller9cce96d2011-03-12 03:00:33 -0500150 fl4->fl4_icmp_type = icmp[0];
151 fl4->fl4_icmp_code = icmp[1];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700152 }
153 break;
154
155 case IPPROTO_ESP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200156 if (xprth + 4 < skb->data ||
157 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200158 __be32 *ehdr;
159
160 xprth = skb_network_header(skb) + iph->ihl * 4;
161 ehdr = (__be32 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700162
David S. Miller9cce96d2011-03-12 03:00:33 -0500163 fl4->fl4_ipsec_spi = ehdr[0];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700164 }
165 break;
166
167 case IPPROTO_AH:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200168 if (xprth + 8 < skb->data ||
169 pskb_may_pull(skb, xprth + 8 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200170 __be32 *ah_hdr;
171
172 xprth = skb_network_header(skb) + iph->ihl * 4;
173 ah_hdr = (__be32 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700174
David S. Miller9cce96d2011-03-12 03:00:33 -0500175 fl4->fl4_ipsec_spi = ah_hdr[1];
Linus Torvalds1da177e2005-04-16 15:20:36 -0700176 }
177 break;
178
179 case IPPROTO_COMP:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200180 if (xprth + 4 < skb->data ||
181 pskb_may_pull(skb, xprth + 4 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200182 __be16 *ipcomp_hdr;
183
184 xprth = skb_network_header(skb) + iph->ihl * 4;
185 ipcomp_hdr = (__be16 *)xprth;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700186
David S. Miller9cce96d2011-03-12 03:00:33 -0500187 fl4->fl4_ipsec_spi = htonl(ntohs(ipcomp_hdr[1]));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700188 }
189 break;
Timo Teräscc9ff192010-11-03 04:41:38 +0000190
191 case IPPROTO_GRE:
Steffen Klassert1a14f1e2015-10-23 07:31:23 +0200192 if (xprth + 12 < skb->data ||
193 pskb_may_pull(skb, xprth + 12 - skb->data)) {
Steffen Klassertea673a42015-10-23 07:32:39 +0200194 __be16 *greflags;
195 __be32 *gre_hdr;
196
197 xprth = skb_network_header(skb) + iph->ihl * 4;
198 greflags = (__be16 *)xprth;
199 gre_hdr = (__be32 *)xprth;
Timo Teräscc9ff192010-11-03 04:41:38 +0000200
201 if (greflags[0] & GRE_KEY) {
202 if (greflags[0] & GRE_CSUM)
203 gre_hdr++;
David S. Miller9cce96d2011-03-12 03:00:33 -0500204 fl4->fl4_gre_key = gre_hdr[1];
Timo Teräscc9ff192010-11-03 04:41:38 +0000205 }
206 }
207 break;
208
Linus Torvalds1da177e2005-04-16 15:20:36 -0700209 default:
David S. Miller9cce96d2011-03-12 03:00:33 -0500210 fl4->fl4_ipsec_spi = 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700211 break;
Stephen Hemminger3ff50b72007-04-20 17:09:22 -0700212 }
Linus Torvalds1da177e2005-04-16 15:20:36 -0700213 }
David S. Miller7e1dc7b2011-03-12 02:42:11 -0500214 fl4->flowi4_proto = iph->protocol;
215 fl4->daddr = reverse ? iph->saddr : iph->daddr;
216 fl4->saddr = reverse ? iph->daddr : iph->saddr;
217 fl4->flowi4_tos = iph->tos;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700218}
219
David S. Miller6700c272012-07-17 03:29:28 -0700220static void xfrm4_update_pmtu(struct dst_entry *dst, struct sock *sk,
221 struct sk_buff *skb, u32 mtu)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700222{
223 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
224 struct dst_entry *path = xdst->route;
225
David S. Miller6700c272012-07-17 03:29:28 -0700226 path->ops->update_pmtu(path, sk, skb, mtu);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700227}
228
David S. Miller6700c272012-07-17 03:29:28 -0700229static void xfrm4_redirect(struct dst_entry *dst, struct sock *sk,
230 struct sk_buff *skb)
David S. Miller55be7a92012-07-11 21:27:49 -0700231{
232 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
233 struct dst_entry *path = xdst->route;
234
David S. Miller6700c272012-07-17 03:29:28 -0700235 path->ops->redirect(path, sk, skb);
David S. Miller55be7a92012-07-11 21:27:49 -0700236}
237
Herbert Xuaabc9762005-05-03 16:27:10 -0700238static void xfrm4_dst_destroy(struct dst_entry *dst)
239{
240 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
241
David S. Miller62fa8a82011-01-26 20:51:05 -0800242 dst_destroy_metrics_generic(dst);
243
Herbert Xuaabc9762005-05-03 16:27:10 -0700244 xfrm_dst_destroy(xdst);
245}
246
247static void xfrm4_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
248 int unregister)
249{
Herbert Xuaabc9762005-05-03 16:27:10 -0700250 if (!unregister)
251 return;
252
Herbert Xuaabc9762005-05-03 16:27:10 -0700253 xfrm_dst_ifdown(dst, dev);
254}
255
Dan Streetmana8a572a2015-10-29 09:51:16 -0400256static struct dst_ops xfrm4_dst_ops_template = {
Linus Torvalds1da177e2005-04-16 15:20:36 -0700257 .family = AF_INET,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700258 .update_pmtu = xfrm4_update_pmtu,
David S. Miller55be7a92012-07-11 21:27:49 -0700259 .redirect = xfrm4_redirect,
David S. Miller62fa8a82011-01-26 20:51:05 -0800260 .cow_metrics = dst_cow_metrics_generic,
Herbert Xuaabc9762005-05-03 16:27:10 -0700261 .destroy = xfrm4_dst_destroy,
262 .ifdown = xfrm4_dst_ifdown,
Herbert Xu862b82c2007-11-13 21:43:11 -0800263 .local_out = __ip_local_out,
Florian Westphal3c2a89d2017-07-17 13:57:20 +0200264 .gc_thresh = 32768,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700265};
266
Florian Westphal37b10382017-02-07 15:00:19 +0100267static const struct xfrm_policy_afinfo xfrm4_policy_afinfo = {
Dan Streetmana8a572a2015-10-29 09:51:16 -0400268 .dst_ops = &xfrm4_dst_ops_template,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700269 .dst_lookup = xfrm4_dst_lookup,
Patrick McHardya1e59ab2006-09-19 12:57:34 -0700270 .get_saddr = xfrm4_get_saddr,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700271 .decode_session = _decode_session4,
Herbert Xu25ee3282007-12-11 09:32:34 -0800272 .get_tos = xfrm4_get_tos,
Masahide NAKAMURAa1b05142007-12-20 20:41:12 -0800273 .init_path = xfrm4_init_path,
Herbert Xu25ee3282007-12-11 09:32:34 -0800274 .fill_dst = xfrm4_fill_dst,
David S. Miller2774c132011-03-01 14:59:04 -0800275 .blackhole_route = ipv4_blackhole_route,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700276};
277
Randy Dunlapf8167002009-08-04 20:18:33 -0700278#ifdef CONFIG_SYSCTL
Neil Hormana44a4a02009-07-27 08:22:46 +0000279static struct ctl_table xfrm4_policy_table[] = {
280 {
Neil Hormana44a4a02009-07-27 08:22:46 +0000281 .procname = "xfrm4_gc_thresh",
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800282 .data = &init_net.xfrm.xfrm4_dst_ops.gc_thresh,
Neil Hormana44a4a02009-07-27 08:22:46 +0000283 .maxlen = sizeof(int),
284 .mode = 0644,
285 .proc_handler = proc_dointvec,
286 },
287 { }
288};
289
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200290static __net_init int xfrm4_net_sysctl_init(struct net *net)
Michal Kubecek8d068872013-02-06 10:46:33 +0100291{
292 struct ctl_table *table;
293 struct ctl_table_header *hdr;
294
295 table = xfrm4_policy_table;
296 if (!net_eq(net, &init_net)) {
297 table = kmemdup(table, sizeof(xfrm4_policy_table), GFP_KERNEL);
298 if (!table)
299 goto err_alloc;
300
301 table[0].data = &net->xfrm.xfrm4_dst_ops.gc_thresh;
302 }
303
304 hdr = register_net_sysctl(net, "net/ipv4", table);
305 if (!hdr)
306 goto err_reg;
307
308 net->ipv4.xfrm4_hdr = hdr;
309 return 0;
310
311err_reg:
312 if (!net_eq(net, &init_net))
313 kfree(table);
314err_alloc:
315 return -ENOMEM;
316}
317
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200318static __net_exit void xfrm4_net_sysctl_exit(struct net *net)
Michal Kubecek8d068872013-02-06 10:46:33 +0100319{
320 struct ctl_table *table;
321
Ian Morris51456b22015-04-03 09:17:26 +0100322 if (!net->ipv4.xfrm4_hdr)
Michal Kubecek8d068872013-02-06 10:46:33 +0100323 return;
324
325 table = net->ipv4.xfrm4_hdr->ctl_table_arg;
326 unregister_net_sysctl_table(net->ipv4.xfrm4_hdr);
327 if (!net_eq(net, &init_net))
328 kfree(table);
329}
Dan Streetmana8a572a2015-10-29 09:51:16 -0400330#else /* CONFIG_SYSCTL */
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200331static inline int xfrm4_net_sysctl_init(struct net *net)
Dan Streetmana8a572a2015-10-29 09:51:16 -0400332{
333 return 0;
334}
335
Arnd Bergmann318d3cc2016-06-16 15:59:25 +0200336static inline void xfrm4_net_sysctl_exit(struct net *net)
Dan Streetmana8a572a2015-10-29 09:51:16 -0400337{
338}
339#endif
340
341static int __net_init xfrm4_net_init(struct net *net)
342{
343 int ret;
344
345 memcpy(&net->xfrm.xfrm4_dst_ops, &xfrm4_dst_ops_template,
346 sizeof(xfrm4_dst_ops_template));
347 ret = dst_entries_init(&net->xfrm.xfrm4_dst_ops);
348 if (ret)
349 return ret;
350
351 ret = xfrm4_net_sysctl_init(net);
352 if (ret)
353 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
354
355 return ret;
356}
357
358static void __net_exit xfrm4_net_exit(struct net *net)
359{
360 xfrm4_net_sysctl_exit(net);
361 dst_entries_destroy(&net->xfrm.xfrm4_dst_ops);
362}
Michal Kubecek8d068872013-02-06 10:46:33 +0100363
364static struct pernet_operations __net_initdata xfrm4_net_ops = {
365 .init = xfrm4_net_init,
366 .exit = xfrm4_net_exit,
367};
Neil Hormana44a4a02009-07-27 08:22:46 +0000368
Linus Torvalds1da177e2005-04-16 15:20:36 -0700369static void __init xfrm4_policy_init(void)
370{
Florian Westphala2817d82017-02-07 15:00:17 +0100371 xfrm_policy_register_afinfo(&xfrm4_policy_afinfo, AF_INET);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700372}
373
Steffen Klassert703fb942012-11-13 08:52:24 +0100374void __init xfrm4_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700375{
Alexey Dobriyand7c75442010-01-24 22:47:53 -0800376 xfrm4_state_init();
377 xfrm4_policy_init();
Steffen Klassert2f32b512014-03-14 07:28:07 +0100378 xfrm4_protocol_init();
Michal Kubecek8d068872013-02-06 10:46:33 +0100379 register_pernet_subsys(&xfrm4_net_ops);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700380}
381