Loading...
1/*
2 * xfrm6_policy.c: based on xfrm4_policy.c
3 *
4 * Authors:
5 * Mitsuru KANDA @USAGI
6 * Kazunori MIYAZAWA @USAGI
7 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
8 * IPv6 support
9 * YOSHIFUJI Hideaki
10 * Split up af-specific portion
11 *
12 */
13
14#include <linux/err.h>
15#include <linux/kernel.h>
16#include <linux/netdevice.h>
17#include <net/addrconf.h>
18#include <net/dst.h>
19#include <net/xfrm.h>
20#include <net/ip.h>
21#include <net/ipv6.h>
22#include <net/ip6_route.h>
23#if IS_ENABLED(CONFIG_IPV6_MIP6)
24#include <net/mip6.h>
25#endif
26
27static struct xfrm_policy_afinfo xfrm6_policy_afinfo;
28
29static struct dst_entry *xfrm6_dst_lookup(struct net *net, int tos,
30 const xfrm_address_t *saddr,
31 const xfrm_address_t *daddr)
32{
33 struct flowi6 fl6;
34 struct dst_entry *dst;
35 int err;
36
37 memset(&fl6, 0, sizeof(fl6));
38 memcpy(&fl6.daddr, daddr, sizeof(fl6.daddr));
39 if (saddr)
40 memcpy(&fl6.saddr, saddr, sizeof(fl6.saddr));
41
42 dst = ip6_route_output(net, NULL, &fl6);
43
44 err = dst->error;
45 if (dst->error) {
46 dst_release(dst);
47 dst = ERR_PTR(err);
48 }
49
50 return dst;
51}
52
53static int xfrm6_get_saddr(struct net *net,
54 xfrm_address_t *saddr, xfrm_address_t *daddr)
55{
56 struct dst_entry *dst;
57 struct net_device *dev;
58
59 dst = xfrm6_dst_lookup(net, 0, NULL, daddr);
60 if (IS_ERR(dst))
61 return -EHOSTUNREACH;
62
63 dev = ip6_dst_idev(dst)->dev;
64 ipv6_dev_get_saddr(dev_net(dev), dev,
65 (struct in6_addr *)&daddr->a6, 0,
66 (struct in6_addr *)&saddr->a6);
67 dst_release(dst);
68 return 0;
69}
70
71static int xfrm6_get_tos(const struct flowi *fl)
72{
73 return 0;
74}
75
76static void xfrm6_init_dst(struct net *net, struct xfrm_dst *xdst)
77{
78 struct rt6_info *rt = (struct rt6_info *)xdst;
79
80 rt6_init_peer(rt, net->ipv6.peers);
81}
82
83static int xfrm6_init_path(struct xfrm_dst *path, struct dst_entry *dst,
84 int nfheader_len)
85{
86 if (dst->ops->family == AF_INET6) {
87 struct rt6_info *rt = (struct rt6_info*)dst;
88 if (rt->rt6i_node)
89 path->path_cookie = rt->rt6i_node->fn_sernum;
90 }
91
92 path->u.rt6.rt6i_nfheader_len = nfheader_len;
93
94 return 0;
95}
96
97static int xfrm6_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
98 const struct flowi *fl)
99{
100 struct rt6_info *rt = (struct rt6_info*)xdst->route;
101
102 xdst->u.dst.dev = dev;
103 dev_hold(dev);
104
105 xdst->u.rt6.rt6i_idev = in6_dev_get(dev);
106 if (!xdst->u.rt6.rt6i_idev) {
107 dev_put(dev);
108 return -ENODEV;
109 }
110
111 rt6_transfer_peer(&xdst->u.rt6, rt);
112
113 /* Sheit... I remember I did this right. Apparently,
114 * it was magically lost, so this code needs audit */
115 xdst->u.rt6.rt6i_flags = rt->rt6i_flags & (RTF_ANYCAST |
116 RTF_LOCAL);
117 xdst->u.rt6.rt6i_metric = rt->rt6i_metric;
118 xdst->u.rt6.rt6i_node = rt->rt6i_node;
119 if (rt->rt6i_node)
120 xdst->route_cookie = rt->rt6i_node->fn_sernum;
121 xdst->u.rt6.rt6i_gateway = rt->rt6i_gateway;
122 xdst->u.rt6.rt6i_dst = rt->rt6i_dst;
123 xdst->u.rt6.rt6i_src = rt->rt6i_src;
124
125 return 0;
126}
127
128static inline void
129_decode_session6(struct sk_buff *skb, struct flowi *fl, int reverse)
130{
131 struct flowi6 *fl6 = &fl->u.ip6;
132 int onlyproto = 0;
133 u16 offset = skb_network_header_len(skb);
134 const struct ipv6hdr *hdr = ipv6_hdr(skb);
135 struct ipv6_opt_hdr *exthdr;
136 const unsigned char *nh = skb_network_header(skb);
137 u8 nexthdr = nh[IP6CB(skb)->nhoff];
138 int oif = 0;
139
140 if (skb_dst(skb))
141 oif = skb_dst(skb)->dev->ifindex;
142
143 memset(fl6, 0, sizeof(struct flowi6));
144 fl6->flowi6_mark = skb->mark;
145 fl6->flowi6_oif = reverse ? skb->skb_iif : oif;
146
147 fl6->daddr = reverse ? hdr->saddr : hdr->daddr;
148 fl6->saddr = reverse ? hdr->daddr : hdr->saddr;
149
150 while (nh + offset + 1 < skb->data ||
151 pskb_may_pull(skb, nh + offset + 1 - skb->data)) {
152 nh = skb_network_header(skb);
153 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
154
155 switch (nexthdr) {
156 case NEXTHDR_FRAGMENT:
157 onlyproto = 1;
158 case NEXTHDR_ROUTING:
159 case NEXTHDR_HOP:
160 case NEXTHDR_DEST:
161 offset += ipv6_optlen(exthdr);
162 nexthdr = exthdr->nexthdr;
163 exthdr = (struct ipv6_opt_hdr *)(nh + offset);
164 break;
165
166 case IPPROTO_UDP:
167 case IPPROTO_UDPLITE:
168 case IPPROTO_TCP:
169 case IPPROTO_SCTP:
170 case IPPROTO_DCCP:
171 if (!onlyproto && (nh + offset + 4 < skb->data ||
172 pskb_may_pull(skb, nh + offset + 4 - skb->data))) {
173 __be16 *ports = (__be16 *)exthdr;
174
175 fl6->fl6_sport = ports[!!reverse];
176 fl6->fl6_dport = ports[!reverse];
177 }
178 fl6->flowi6_proto = nexthdr;
179 return;
180
181 case IPPROTO_ICMPV6:
182 if (!onlyproto && pskb_may_pull(skb, nh + offset + 2 - skb->data)) {
183 u8 *icmp = (u8 *)exthdr;
184
185 fl6->fl6_icmp_type = icmp[0];
186 fl6->fl6_icmp_code = icmp[1];
187 }
188 fl6->flowi6_proto = nexthdr;
189 return;
190
191#if IS_ENABLED(CONFIG_IPV6_MIP6)
192 case IPPROTO_MH:
193 if (!onlyproto && pskb_may_pull(skb, nh + offset + 3 - skb->data)) {
194 struct ip6_mh *mh;
195 mh = (struct ip6_mh *)exthdr;
196
197 fl6->fl6_mh_type = mh->ip6mh_type;
198 }
199 fl6->flowi6_proto = nexthdr;
200 return;
201#endif
202
203 /* XXX Why are there these headers? */
204 case IPPROTO_AH:
205 case IPPROTO_ESP:
206 case IPPROTO_COMP:
207 default:
208 fl6->fl6_ipsec_spi = 0;
209 fl6->flowi6_proto = nexthdr;
210 return;
211 }
212 }
213}
214
215static inline int xfrm6_garbage_collect(struct dst_ops *ops)
216{
217 struct net *net = container_of(ops, struct net, xfrm.xfrm6_dst_ops);
218
219 xfrm6_policy_afinfo.garbage_collect(net);
220 return dst_entries_get_fast(ops) > ops->gc_thresh * 2;
221}
222
223static void xfrm6_update_pmtu(struct dst_entry *dst, struct sock *sk,
224 struct sk_buff *skb, u32 mtu)
225{
226 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
227 struct dst_entry *path = xdst->route;
228
229 path->ops->update_pmtu(path, sk, skb, mtu);
230}
231
232static void xfrm6_redirect(struct dst_entry *dst, struct sock *sk,
233 struct sk_buff *skb)
234{
235 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
236 struct dst_entry *path = xdst->route;
237
238 path->ops->redirect(path, sk, skb);
239}
240
241static void xfrm6_dst_destroy(struct dst_entry *dst)
242{
243 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
244
245 if (likely(xdst->u.rt6.rt6i_idev))
246 in6_dev_put(xdst->u.rt6.rt6i_idev);
247 dst_destroy_metrics_generic(dst);
248 if (rt6_has_peer(&xdst->u.rt6)) {
249 struct inet_peer *peer = rt6_peer_ptr(&xdst->u.rt6);
250 inet_putpeer(peer);
251 }
252 xfrm_dst_destroy(xdst);
253}
254
255static void xfrm6_dst_ifdown(struct dst_entry *dst, struct net_device *dev,
256 int unregister)
257{
258 struct xfrm_dst *xdst;
259
260 if (!unregister)
261 return;
262
263 xdst = (struct xfrm_dst *)dst;
264 if (xdst->u.rt6.rt6i_idev->dev == dev) {
265 struct inet6_dev *loopback_idev =
266 in6_dev_get(dev_net(dev)->loopback_dev);
267 BUG_ON(!loopback_idev);
268
269 do {
270 in6_dev_put(xdst->u.rt6.rt6i_idev);
271 xdst->u.rt6.rt6i_idev = loopback_idev;
272 in6_dev_hold(loopback_idev);
273 xdst = (struct xfrm_dst *)xdst->u.dst.child;
274 } while (xdst->u.dst.xfrm);
275
276 __in6_dev_put(loopback_idev);
277 }
278
279 xfrm_dst_ifdown(dst, dev);
280}
281
282static struct dst_ops xfrm6_dst_ops = {
283 .family = AF_INET6,
284 .protocol = cpu_to_be16(ETH_P_IPV6),
285 .gc = xfrm6_garbage_collect,
286 .update_pmtu = xfrm6_update_pmtu,
287 .redirect = xfrm6_redirect,
288 .cow_metrics = dst_cow_metrics_generic,
289 .destroy = xfrm6_dst_destroy,
290 .ifdown = xfrm6_dst_ifdown,
291 .local_out = __ip6_local_out,
292 .gc_thresh = 32768,
293};
294
295static struct xfrm_policy_afinfo xfrm6_policy_afinfo = {
296 .family = AF_INET6,
297 .dst_ops = &xfrm6_dst_ops,
298 .dst_lookup = xfrm6_dst_lookup,
299 .get_saddr = xfrm6_get_saddr,
300 .decode_session = _decode_session6,
301 .get_tos = xfrm6_get_tos,
302 .init_dst = xfrm6_init_dst,
303 .init_path = xfrm6_init_path,
304 .fill_dst = xfrm6_fill_dst,
305 .blackhole_route = ip6_blackhole_route,
306};
307
308static int __init xfrm6_policy_init(void)
309{
310 return xfrm_policy_register_afinfo(&xfrm6_policy_afinfo);
311}
312
313static void xfrm6_policy_fini(void)
314{
315 xfrm_policy_unregister_afinfo(&xfrm6_policy_afinfo);
316}
317
318#ifdef CONFIG_SYSCTL
319static struct ctl_table xfrm6_policy_table[] = {
320 {
321 .procname = "xfrm6_gc_thresh",
322 .data = &init_net.xfrm.xfrm6_dst_ops.gc_thresh,
323 .maxlen = sizeof(int),
324 .mode = 0644,
325 .proc_handler = proc_dointvec,
326 },
327 { }
328};
329
330static int __net_init xfrm6_net_init(struct net *net)
331{
332 struct ctl_table *table;
333 struct ctl_table_header *hdr;
334
335 table = xfrm6_policy_table;
336 if (!net_eq(net, &init_net)) {
337 table = kmemdup(table, sizeof(xfrm6_policy_table), GFP_KERNEL);
338 if (!table)
339 goto err_alloc;
340
341 table[0].data = &net->xfrm.xfrm6_dst_ops.gc_thresh;
342 }
343
344 hdr = register_net_sysctl(net, "net/ipv6", table);
345 if (!hdr)
346 goto err_reg;
347
348 net->ipv6.sysctl.xfrm6_hdr = hdr;
349 return 0;
350
351err_reg:
352 if (!net_eq(net, &init_net))
353 kfree(table);
354err_alloc:
355 return -ENOMEM;
356}
357
358static void __net_exit xfrm6_net_exit(struct net *net)
359{
360 struct ctl_table *table;
361
362 if (net->ipv6.sysctl.xfrm6_hdr == NULL)
363 return;
364
365 table = net->ipv6.sysctl.xfrm6_hdr->ctl_table_arg;
366 unregister_net_sysctl_table(net->ipv6.sysctl.xfrm6_hdr);
367 if (!net_eq(net, &init_net))
368 kfree(table);
369}
370
371static struct pernet_operations xfrm6_net_ops = {
372 .init = xfrm6_net_init,
373 .exit = xfrm6_net_exit,
374};
375#endif
376
377int __init xfrm6_init(void)
378{
379 int ret;
380
381 dst_entries_init(&xfrm6_dst_ops);
382
383 ret = xfrm6_policy_init();
384 if (ret) {
385 dst_entries_destroy(&xfrm6_dst_ops);
386 goto out;
387 }
388 ret = xfrm6_state_init();
389 if (ret)
390 goto out_policy;
391
392 ret = xfrm6_protocol_init();
393 if (ret)
394 goto out_state;
395
396#ifdef CONFIG_SYSCTL
397 register_pernet_subsys(&xfrm6_net_ops);
398#endif
399out:
400 return ret;
401out_state:
402 xfrm6_state_fini();
403out_policy:
404 xfrm6_policy_fini();
405 goto out;
406}
407
408void xfrm6_fini(void)
409{
410#ifdef CONFIG_SYSCTL
411 unregister_pernet_subsys(&xfrm6_net_ops);
412#endif
413 xfrm6_protocol_fini();
414 xfrm6_policy_fini();
415 xfrm6_state_fini();
416 dst_entries_destroy(&xfrm6_dst_ops);
417}
1// SPDX-License-Identifier: GPL-2.0
2/*
3 * xfrm6_policy.c: based on xfrm4_policy.c
4 *
5 * Authors:
6 * Mitsuru KANDA @USAGI
7 * Kazunori MIYAZAWA @USAGI
8 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
9 * IPv6 support
10 * YOSHIFUJI Hideaki
11 * Split up af-specific portion
12 *
13 */
14
15#include <linux/err.h>
16#include <linux/kernel.h>
17#include <linux/netdevice.h>
18#include <net/addrconf.h>
19#include <net/dst.h>
20#include <net/xfrm.h>
21#include <net/ip.h>
22#include <net/ipv6.h>
23#include <net/ip6_route.h>
24#include <net/l3mdev.h>
25
26static struct dst_entry *xfrm6_dst_lookup(const struct xfrm_dst_lookup_params *params)
27{
28 struct flowi6 fl6;
29 struct dst_entry *dst;
30 int err;
31
32 memset(&fl6, 0, sizeof(fl6));
33 fl6.flowi6_l3mdev = l3mdev_master_ifindex_by_index(params->net,
34 params->oif);
35 fl6.flowi6_mark = params->mark;
36 memcpy(&fl6.daddr, params->daddr, sizeof(fl6.daddr));
37 if (params->saddr)
38 memcpy(&fl6.saddr, params->saddr, sizeof(fl6.saddr));
39
40 fl6.flowi4_proto = params->ipproto;
41 fl6.uli = params->uli;
42
43 dst = ip6_route_output(params->net, NULL, &fl6);
44
45 err = dst->error;
46 if (dst->error) {
47 dst_release(dst);
48 dst = ERR_PTR(err);
49 }
50
51 return dst;
52}
53
54static int xfrm6_get_saddr(xfrm_address_t *saddr,
55 const struct xfrm_dst_lookup_params *params)
56{
57 struct dst_entry *dst;
58 struct net_device *dev;
59 struct inet6_dev *idev;
60
61 dst = xfrm6_dst_lookup(params);
62 if (IS_ERR(dst))
63 return -EHOSTUNREACH;
64
65 idev = ip6_dst_idev(dst);
66 if (!idev) {
67 dst_release(dst);
68 return -EHOSTUNREACH;
69 }
70 dev = idev->dev;
71 ipv6_dev_get_saddr(dev_net(dev), dev, ¶ms->daddr->in6, 0,
72 &saddr->in6);
73 dst_release(dst);
74 return 0;
75}
76
77static int xfrm6_fill_dst(struct xfrm_dst *xdst, struct net_device *dev,
78 const struct flowi *fl)
79{
80 struct rt6_info *rt = dst_rt6_info(xdst->route);
81
82 xdst->u.dst.dev = dev;
83 netdev_hold(dev, &xdst->u.dst.dev_tracker, GFP_ATOMIC);
84
85 xdst->u.rt6.rt6i_idev = in6_dev_get(dev);
86 if (!xdst->u.rt6.rt6i_idev) {
87 netdev_put(dev, &xdst->u.dst.dev_tracker);
88 return -ENODEV;
89 }
90
91 /* Sheit... I remember I did this right. Apparently,
92 * it was magically lost, so this code needs audit */
93 xdst->u.rt6.rt6i_flags = rt->rt6i_flags & (RTF_ANYCAST |
94 RTF_LOCAL);
95 xdst->route_cookie = rt6_get_cookie(rt);
96 xdst->u.rt6.rt6i_gateway = rt->rt6i_gateway;
97 xdst->u.rt6.rt6i_dst = rt->rt6i_dst;
98 xdst->u.rt6.rt6i_src = rt->rt6i_src;
99 rt6_uncached_list_add(&xdst->u.rt6);
100
101 return 0;
102}
103
104static void xfrm6_update_pmtu(struct dst_entry *dst, struct sock *sk,
105 struct sk_buff *skb, u32 mtu,
106 bool confirm_neigh)
107{
108 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
109 struct dst_entry *path = xdst->route;
110
111 path->ops->update_pmtu(path, sk, skb, mtu, confirm_neigh);
112}
113
114static void xfrm6_redirect(struct dst_entry *dst, struct sock *sk,
115 struct sk_buff *skb)
116{
117 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
118 struct dst_entry *path = xdst->route;
119
120 path->ops->redirect(path, sk, skb);
121}
122
123static void xfrm6_dst_destroy(struct dst_entry *dst)
124{
125 struct xfrm_dst *xdst = (struct xfrm_dst *)dst;
126
127 dst_destroy_metrics_generic(dst);
128 rt6_uncached_list_del(&xdst->u.rt6);
129 if (likely(xdst->u.rt6.rt6i_idev))
130 in6_dev_put(xdst->u.rt6.rt6i_idev);
131 xfrm_dst_destroy(xdst);
132}
133
134static void xfrm6_dst_ifdown(struct dst_entry *dst, struct net_device *dev)
135{
136 struct xfrm_dst *xdst;
137
138 xdst = (struct xfrm_dst *)dst;
139 if (xdst->u.rt6.rt6i_idev->dev == dev) {
140 struct inet6_dev *loopback_idev =
141 in6_dev_get(dev_net(dev)->loopback_dev);
142
143 do {
144 in6_dev_put(xdst->u.rt6.rt6i_idev);
145 xdst->u.rt6.rt6i_idev = loopback_idev;
146 in6_dev_hold(loopback_idev);
147 xdst = (struct xfrm_dst *)xfrm_dst_child(&xdst->u.dst);
148 } while (xdst->u.dst.xfrm);
149
150 __in6_dev_put(loopback_idev);
151 }
152
153 xfrm_dst_ifdown(dst, dev);
154}
155
156static struct dst_ops xfrm6_dst_ops_template = {
157 .family = AF_INET6,
158 .update_pmtu = xfrm6_update_pmtu,
159 .redirect = xfrm6_redirect,
160 .cow_metrics = dst_cow_metrics_generic,
161 .destroy = xfrm6_dst_destroy,
162 .ifdown = xfrm6_dst_ifdown,
163 .local_out = __ip6_local_out,
164 .gc_thresh = 32768,
165};
166
167static const struct xfrm_policy_afinfo xfrm6_policy_afinfo = {
168 .dst_ops = &xfrm6_dst_ops_template,
169 .dst_lookup = xfrm6_dst_lookup,
170 .get_saddr = xfrm6_get_saddr,
171 .fill_dst = xfrm6_fill_dst,
172 .blackhole_route = ip6_blackhole_route,
173};
174
175static int __init xfrm6_policy_init(void)
176{
177 return xfrm_policy_register_afinfo(&xfrm6_policy_afinfo, AF_INET6);
178}
179
180static void xfrm6_policy_fini(void)
181{
182 xfrm_policy_unregister_afinfo(&xfrm6_policy_afinfo);
183}
184
185#ifdef CONFIG_SYSCTL
186static struct ctl_table xfrm6_policy_table[] = {
187 {
188 .procname = "xfrm6_gc_thresh",
189 .data = &init_net.xfrm.xfrm6_dst_ops.gc_thresh,
190 .maxlen = sizeof(int),
191 .mode = 0644,
192 .proc_handler = proc_dointvec,
193 },
194};
195
196static int __net_init xfrm6_net_sysctl_init(struct net *net)
197{
198 struct ctl_table *table;
199 struct ctl_table_header *hdr;
200
201 table = xfrm6_policy_table;
202 if (!net_eq(net, &init_net)) {
203 table = kmemdup(table, sizeof(xfrm6_policy_table), GFP_KERNEL);
204 if (!table)
205 goto err_alloc;
206
207 table[0].data = &net->xfrm.xfrm6_dst_ops.gc_thresh;
208 }
209
210 hdr = register_net_sysctl_sz(net, "net/ipv6", table,
211 ARRAY_SIZE(xfrm6_policy_table));
212 if (!hdr)
213 goto err_reg;
214
215 net->ipv6.sysctl.xfrm6_hdr = hdr;
216 return 0;
217
218err_reg:
219 if (!net_eq(net, &init_net))
220 kfree(table);
221err_alloc:
222 return -ENOMEM;
223}
224
225static void __net_exit xfrm6_net_sysctl_exit(struct net *net)
226{
227 const struct ctl_table *table;
228
229 if (!net->ipv6.sysctl.xfrm6_hdr)
230 return;
231
232 table = net->ipv6.sysctl.xfrm6_hdr->ctl_table_arg;
233 unregister_net_sysctl_table(net->ipv6.sysctl.xfrm6_hdr);
234 if (!net_eq(net, &init_net))
235 kfree(table);
236}
237#else /* CONFIG_SYSCTL */
238static inline int xfrm6_net_sysctl_init(struct net *net)
239{
240 return 0;
241}
242
243static inline void xfrm6_net_sysctl_exit(struct net *net)
244{
245}
246#endif
247
248static int __net_init xfrm6_net_init(struct net *net)
249{
250 int ret;
251
252 memcpy(&net->xfrm.xfrm6_dst_ops, &xfrm6_dst_ops_template,
253 sizeof(xfrm6_dst_ops_template));
254 ret = dst_entries_init(&net->xfrm.xfrm6_dst_ops);
255 if (ret)
256 return ret;
257
258 ret = xfrm6_net_sysctl_init(net);
259 if (ret)
260 dst_entries_destroy(&net->xfrm.xfrm6_dst_ops);
261
262 return ret;
263}
264
265static void __net_exit xfrm6_net_exit(struct net *net)
266{
267 xfrm6_net_sysctl_exit(net);
268 dst_entries_destroy(&net->xfrm.xfrm6_dst_ops);
269}
270
271static struct pernet_operations xfrm6_net_ops = {
272 .init = xfrm6_net_init,
273 .exit = xfrm6_net_exit,
274};
275
276int __init xfrm6_init(void)
277{
278 int ret;
279
280 ret = xfrm6_policy_init();
281 if (ret)
282 goto out;
283 ret = xfrm6_state_init();
284 if (ret)
285 goto out_policy;
286
287 ret = xfrm6_protocol_init();
288 if (ret)
289 goto out_state;
290
291 ret = register_pernet_subsys(&xfrm6_net_ops);
292 if (ret)
293 goto out_protocol;
294
295 ret = xfrm_nat_keepalive_init(AF_INET6);
296 if (ret)
297 goto out_nat_keepalive;
298out:
299 return ret;
300out_nat_keepalive:
301 unregister_pernet_subsys(&xfrm6_net_ops);
302out_protocol:
303 xfrm6_protocol_fini();
304out_state:
305 xfrm6_state_fini();
306out_policy:
307 xfrm6_policy_fini();
308 goto out;
309}
310
311void xfrm6_fini(void)
312{
313 xfrm_nat_keepalive_fini(AF_INET6);
314 unregister_pernet_subsys(&xfrm6_net_ops);
315 xfrm6_protocol_fini();
316 xfrm6_policy_fini();
317 xfrm6_state_fini();
318}