Allow tasks to have a default device index for binding sockets. If set the value is passed to all AF_INET/AF_INET6 sockets when they are created.
The task setting is passed parent to child on fork, but can be set or changed after task creation using prctl (if task has CAP_NET_ADMIN permissions). The setting for a socket can be retrieved using prctl(). This option allows an administrator to restrict a task to only send/receive packets through the specified device. In the case of VRF devices this option restricts tasks to a specific VRF. Correlation of the device index to a specific VRF, ie., ifindex --> VRF device --> VRF id is left to userspace. Example using VRF devices: 1. vrf1 is created and assigned to table 5 2. eth2 is enslaved to vrf1 3. eth2 is given the address 1.1.1.1/24 $ ip route ls table 5 prohibit default 1.1.1.0/24 dev eth2 scope link local 1.1.1.1 dev eth2 proto kernel scope host src 1.1.1.1 With out setting a VRF context ping, tcp and udp attempts fail. e.g, $ ping 1.1.1.254 connect: Network is unreachable After binding the task to the vrf device ping succeeds: $ ./chvrf -v 1 ping -c1 1.1.1.254 PING 1.1.1.254 (1.1.1.254) 56(84) bytes of data. 64 bytes from 1.1.1.254: icmp_seq=1 ttl=64 time=2.32 ms --- include/linux/sched.h | 3 +++ include/uapi/linux/prctl.h | 4 ++++ kernel/fork.c | 2 ++ kernel/sys.c | 35 +++++++++++++++++++++++++++++++++++ net/ipv4/af_inet.c | 1 + net/ipv6/af_inet6.c | 1 + 6 files changed, 46 insertions(+) diff --git a/include/linux/sched.h b/include/linux/sched.h index 6633e83e608a..0b6ab0e2ea57 100644 --- a/include/linux/sched.h +++ b/include/linux/sched.h @@ -1543,6 +1543,9 @@ struct task_struct { struct files_struct *files; /* namespaces */ struct nsproxy *nsproxy; +/* network */ + /* if set INET/INET6 sockets are bound to given dev index on create */ + int sk_bind_dev_if; /* signal handlers */ struct signal_struct *signal; struct sighand_struct *sighand; diff --git a/include/uapi/linux/prctl.h b/include/uapi/linux/prctl.h index 31891d9535e2..1ef45195d146 100644 --- a/include/uapi/linux/prctl.h +++ b/include/uapi/linux/prctl.h @@ -190,4 +190,8 @@ struct prctl_mm_map { # define PR_FP_MODE_FR (1 << 0) /* 64b FP registers */ # define PR_FP_MODE_FRE (1 << 1) /* 32b compatibility */ +/* get/set network interface sockets are bound to by default */ +#define PR_SET_SK_BIND_DEV_IF 47 +#define PR_GET_SK_BIND_DEV_IF 48 + #endif /* _LINUX_PRCTL_H */ diff --git a/kernel/fork.c b/kernel/fork.c index 0bb88b555550..d2c7f32370ef 100644 --- a/kernel/fork.c +++ b/kernel/fork.c @@ -375,6 +375,8 @@ static struct task_struct *dup_task_struct(struct task_struct *orig) tsk->splice_pipe = NULL; tsk->task_frag.page = NULL; + tsk->sk_bind_dev_if = orig->sk_bind_dev_if; + account_kernel_stack(ti, 1); return tsk; diff --git a/kernel/sys.c b/kernel/sys.c index 8571296b7ddb..7e56fb9dbf8e 100644 --- a/kernel/sys.c +++ b/kernel/sys.c @@ -52,6 +52,7 @@ #include <linux/rcupdate.h> #include <linux/uidgid.h> #include <linux/cred.h> +#include <linux/netdevice.h> #include <linux/kmsg_dump.h> /* Move somewhere else to avoid recompiling? */ @@ -2243,6 +2244,40 @@ SYSCALL_DEFINE5(prctl, int, option, unsigned long, arg2, unsigned long, arg3, case PR_GET_FP_MODE: error = GET_FP_MODE(me); break; +#ifdef CONFIG_NET + case PR_SET_SK_BIND_DEV_IF: + { + struct net_device *dev; + int idx = (int) arg2; + + if (!capable(CAP_NET_ADMIN)) + return -EPERM; + + if (idx) { + dev = dev_get_by_index(me->nsproxy->net_ns, idx); + if (!dev) + return -EINVAL; + dev_put(dev); + } + me->sk_bind_dev_if = idx; + break; + } + case PR_GET_SK_BIND_DEV_IF: + { + struct task_struct *tsk; + int sk_bind_dev_if = -EINVAL; + + rcu_read_lock(); + tsk = find_task_by_vpid(arg2); + if (tsk) + sk_bind_dev_if = tsk->sk_bind_dev_if; + rcu_read_unlock(); + if (tsk != me && !capable(CAP_NET_ADMIN)) + return -EPERM; + error = sk_bind_dev_if; + break; + } +#endif default: error = -EINVAL; break; diff --git a/net/ipv4/af_inet.c b/net/ipv4/af_inet.c index 9532ee87151f..a3b24f14e378 100644 --- a/net/ipv4/af_inet.c +++ b/net/ipv4/af_inet.c @@ -350,6 +350,7 @@ static int inet_create(struct net *net, struct socket *sock, int protocol, sk->sk_destruct = inet_sock_destruct; sk->sk_protocol = protocol; sk->sk_backlog_rcv = sk->sk_prot->backlog_rcv; + sk->sk_bound_dev_if = current->sk_bind_dev_if; inet->uc_ttl = -1; inet->mc_loop = 1; diff --git a/net/ipv6/af_inet6.c b/net/ipv6/af_inet6.c index 7de52b65173f..165bc4d9f987 100644 --- a/net/ipv6/af_inet6.c +++ b/net/ipv6/af_inet6.c @@ -189,6 +189,7 @@ static int inet6_create(struct net *net, struct socket *sock, int protocol, sk->sk_destruct = inet_sock_destruct; sk->sk_family = PF_INET6; sk->sk_protocol = protocol; + sk->sk_bound_dev_if = current->sk_bind_dev_if; sk->sk_backlog_rcv = answer->prot->backlog_rcv; -- 2.3.2 (Apple Git-55) -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majord...@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html