net_namespace.c 14.4 KB
Newer Older
J
Joe Perches 已提交
1 2
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt

3 4 5 6 7 8
#include <linux/workqueue.h>
#include <linux/rtnetlink.h>
#include <linux/cache.h>
#include <linux/slab.h>
#include <linux/list.h>
#include <linux/delay.h>
9
#include <linux/sched.h>
10
#include <linux/idr.h>
11
#include <linux/rculist.h>
12
#include <linux/nsproxy.h>
13 14
#include <linux/proc_fs.h>
#include <linux/file.h>
15
#include <linux/export.h>
16
#include <net/net_namespace.h>
17
#include <net/netns/generic.h>
18 19 20 21 22 23 24 25 26 27

/*
 *	Our network namespace constructor/destructor lists
 */

static LIST_HEAD(pernet_list);
static struct list_head *first_device = &pernet_list;
static DEFINE_MUTEX(net_mutex);

LIST_HEAD(net_namespace_list);
A
Alexey Dobriyan 已提交
28
EXPORT_SYMBOL_GPL(net_namespace_list);
29

30 31 32
struct net init_net = {
	.dev_base_head = LIST_HEAD_INIT(init_net.dev_base_head),
};
33
EXPORT_SYMBOL(init_net);
34

35 36
#define INITIAL_NET_GEN_PTRS	13 /* +1 for len +2 for rcu_head */

E
Eric Dumazet 已提交
37 38 39 40 41 42 43 44 45 46 47 48 49 50
static unsigned int max_gen_ptrs = INITIAL_NET_GEN_PTRS;

static struct net_generic *net_alloc_generic(void)
{
	struct net_generic *ng;
	size_t generic_size = offsetof(struct net_generic, ptr[max_gen_ptrs]);

	ng = kzalloc(generic_size, GFP_KERNEL);
	if (ng)
		ng->len = max_gen_ptrs;

	return ng;
}

51 52 53 54 55 56 57
static int net_assign_generic(struct net *net, int id, void *data)
{
	struct net_generic *ng, *old_ng;

	BUG_ON(!mutex_is_locked(&net_mutex));
	BUG_ON(id == 0);

E
Eric Dumazet 已提交
58 59 60
	old_ng = rcu_dereference_protected(net->gen,
					   lockdep_is_held(&net_mutex));
	ng = old_ng;
61 62 63
	if (old_ng->len >= id)
		goto assign;

E
Eric Dumazet 已提交
64
	ng = net_alloc_generic();
65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81
	if (ng == NULL)
		return -ENOMEM;

	/*
	 * Some synchronisation notes:
	 *
	 * The net_generic explores the net->gen array inside rcu
	 * read section. Besides once set the net->gen->ptr[x]
	 * pointer never changes (see rules in netns/generic.h).
	 *
	 * That said, we simply duplicate this array and schedule
	 * the old copy for kfree after a grace period.
	 */

	memcpy(&ng->ptr, &old_ng->ptr, old_ng->len * sizeof(void*));

	rcu_assign_pointer(net->gen, ng);
82
	kfree_rcu(old_ng, rcu);
83 84 85 86 87
assign:
	ng->ptr[id - 1] = data;
	return 0;
}

88 89
static int ops_init(const struct pernet_operations *ops, struct net *net)
{
90 91 92
	int err = -ENOMEM;
	void *data = NULL;

93
	if (ops->id && ops->size) {
94
		data = kzalloc(ops->size, GFP_KERNEL);
95
		if (!data)
96
			goto out;
97 98

		err = net_assign_generic(net, *ops->id, data);
99 100
		if (err)
			goto cleanup;
101
	}
102
	err = 0;
103
	if (ops->init)
104 105 106 107 108 109 110 111 112
		err = ops->init(net);
	if (!err)
		return 0;

cleanup:
	kfree(data);

out:
	return err;
113 114 115 116 117 118 119 120 121 122
}

static void ops_free(const struct pernet_operations *ops, struct net *net)
{
	if (ops->id && ops->size) {
		int id = *ops->id;
		kfree(net_generic(net, id));
	}
}

123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144
static void ops_exit_list(const struct pernet_operations *ops,
			  struct list_head *net_exit_list)
{
	struct net *net;
	if (ops->exit) {
		list_for_each_entry(net, net_exit_list, exit_list)
			ops->exit(net);
	}
	if (ops->exit_batch)
		ops->exit_batch(net_exit_list);
}

static void ops_free_list(const struct pernet_operations *ops,
			  struct list_head *net_exit_list)
{
	struct net *net;
	if (ops->size && ops->id) {
		list_for_each_entry(net, net_exit_list, exit_list)
			ops_free(ops, net);
	}
}

145 146 147
/*
 * setup_net runs the initializers for the network namespace object.
 */
148
static __net_init int setup_net(struct net *net)
149 150
{
	/* Must be called with net_mutex held */
151
	const struct pernet_operations *ops, *saved_ops;
152
	int error = 0;
153
	LIST_HEAD(net_exit_list);
154 155

	atomic_set(&net->count, 1);
156
	atomic_set(&net->passive, 1);
157
	net->dev_base_seq = 1;
158

159
#ifdef NETNS_REFCNT_DEBUG
160
	atomic_set(&net->use_count, 0);
161
#endif
162

163
	list_for_each_entry(ops, &pernet_list, list) {
164 165 166
		error = ops_init(ops, net);
		if (error < 0)
			goto out_undo;
167 168 169
	}
out:
	return error;
170

171 172 173 174
out_undo:
	/* Walk through the list backwards calling the exit functions
	 * for the pernet modules whose init functions did not fail.
	 */
175
	list_add(&net->exit_list, &net_exit_list);
176
	saved_ops = ops;
177 178 179
	list_for_each_entry_continue_reverse(ops, &pernet_list, list)
		ops_exit_list(ops, &net_exit_list);

180 181
	ops = saved_ops;
	list_for_each_entry_continue_reverse(ops, &pernet_list, list)
182
		ops_free_list(ops, &net_exit_list);
183 184

	rcu_barrier();
185 186 187
	goto out;
}

188

189 190 191 192
#ifdef CONFIG_NET_NS
static struct kmem_cache *net_cachep;
static struct workqueue_struct *netns_wq;

193
static struct net *net_alloc(void)
194
{
195 196 197 198 199 200 201 202
	struct net *net = NULL;
	struct net_generic *ng;

	ng = net_alloc_generic();
	if (!ng)
		goto out;

	net = kmem_cache_zalloc(net_cachep, GFP_KERNEL);
203
	if (!net)
204
		goto out_free;
205

206 207 208 209 210 211 212 213 214 215 216
	rcu_assign_pointer(net->gen, ng);
out:
	return net;

out_free:
	kfree(ng);
	goto out;
}

static void net_free(struct net *net)
{
217
#ifdef NETNS_REFCNT_DEBUG
218
	if (unlikely(atomic_read(&net->use_count) != 0)) {
J
Joe Perches 已提交
219 220
		pr_emerg("network namespace not free! Usage: %d\n",
			 atomic_read(&net->use_count));
221 222
		return;
	}
223
#endif
224
	kfree(net->gen);
225 226 227
	kmem_cache_free(net_cachep, net);
}

228 229 230 231 232 233 234
void net_drop_ns(void *p)
{
	struct net *ns = p;
	if (ns && atomic_dec_and_test(&ns->passive))
		net_free(ns);
}

235
struct net *copy_net_ns(unsigned long flags, struct net *old_net)
236
{
237 238
	struct net *net;
	int rv;
239

240 241 242
	if (!(flags & CLONE_NEWNET))
		return get_net(old_net);

243 244 245
	net = net_alloc();
	if (!net)
		return ERR_PTR(-ENOMEM);
246
	mutex_lock(&net_mutex);
247 248
	rv = setup_net(net);
	if (rv == 0) {
249
		rtnl_lock();
250
		list_add_tail_rcu(&net->list, &net_namespace_list);
251 252
		rtnl_unlock();
	}
253
	mutex_unlock(&net_mutex);
254
	if (rv < 0) {
255
		net_drop_ns(net);
256 257 258 259
		return ERR_PTR(rv);
	}
	return net;
}
260

261 262 263
static DEFINE_SPINLOCK(cleanup_list_lock);
static LIST_HEAD(cleanup_list);  /* Must hold cleanup_list_lock to touch */

264 265
static void cleanup_net(struct work_struct *work)
{
266
	const struct pernet_operations *ops;
267 268
	struct net *net, *tmp;
	LIST_HEAD(net_kill_list);
269
	LIST_HEAD(net_exit_list);
270

271 272 273 274
	/* Atomically snapshot the list of namespaces to cleanup */
	spin_lock_irq(&cleanup_list_lock);
	list_replace_init(&cleanup_list, &net_kill_list);
	spin_unlock_irq(&cleanup_list_lock);
275 276 277 278 279

	mutex_lock(&net_mutex);

	/* Don't let anyone else find us. */
	rtnl_lock();
280
	list_for_each_entry(net, &net_kill_list, cleanup_list) {
281
		list_del_rcu(&net->list);
282 283
		list_add_tail(&net->exit_list, &net_exit_list);
	}
284 285
	rtnl_unlock();

286 287 288 289 290 291 292
	/*
	 * Another CPU might be rcu-iterating the list, wait for it.
	 * This needs to be before calling the exit() notifiers, so
	 * the rcu_barrier() below isn't sufficient alone.
	 */
	synchronize_rcu();

293
	/* Run all of the network namespace exit methods */
294 295 296
	list_for_each_entry_reverse(ops, &pernet_list, list)
		ops_exit_list(ops, &net_exit_list);

297
	/* Free the net generic variables */
298 299
	list_for_each_entry_reverse(ops, &pernet_list, list)
		ops_free_list(ops, &net_exit_list);
300 301 302 303 304 305 306 307 308

	mutex_unlock(&net_mutex);

	/* Ensure there are no outstanding rcu callbacks using this
	 * network namespace.
	 */
	rcu_barrier();

	/* Finally it is safe to free my network namespace structure */
309 310
	list_for_each_entry_safe(net, tmp, &net_exit_list, exit_list) {
		list_del_init(&net->exit_list);
311
		net_drop_ns(net);
312
	}
313
}
314
static DECLARE_WORK(net_cleanup_work, cleanup_net);
315 316 317 318

void __put_net(struct net *net)
{
	/* Cleanup the network namespace in process context */
319 320 321 322 323 324 325
	unsigned long flags;

	spin_lock_irqsave(&cleanup_list_lock, flags);
	list_add(&net->cleanup_list, &cleanup_list);
	spin_unlock_irqrestore(&cleanup_list_lock, flags);

	queue_work(netns_wq, &net_cleanup_work);
326 327 328
}
EXPORT_SYMBOL_GPL(__put_net);

329 330 331 332 333 334 335
struct net *get_net_ns_by_fd(int fd)
{
	struct proc_inode *ei;
	struct file *file;
	struct net *net;

	file = proc_ns_fget(fd);
336 337
	if (IS_ERR(file))
		return ERR_CAST(file);
338 339

	ei = PROC_I(file->f_dentry->d_inode);
340 341 342 343
	if (ei->ns_ops == &netns_operations)
		net = get_net(ei->ns);
	else
		net = ERR_PTR(-EINVAL);
344

345
	fput(file);
346 347 348
	return net;
}

349
#else
350 351 352 353
struct net *get_net_ns_by_fd(int fd)
{
	return ERR_PTR(-EINVAL);
}
354 355
#endif

356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375
struct net *get_net_ns_by_pid(pid_t pid)
{
	struct task_struct *tsk;
	struct net *net;

	/* Lookup the network namespace */
	net = ERR_PTR(-ESRCH);
	rcu_read_lock();
	tsk = find_task_by_vpid(pid);
	if (tsk) {
		struct nsproxy *nsproxy;
		nsproxy = task_nsproxy(tsk);
		if (nsproxy)
			net = get_net(nsproxy->net_ns);
	}
	rcu_read_unlock();
	return net;
}
EXPORT_SYMBOL_GPL(get_net_ns_by_pid);

376 377
static int __init net_ns_init(void)
{
378
	struct net_generic *ng;
379

380
#ifdef CONFIG_NET_NS
381 382 383
	net_cachep = kmem_cache_create("net_namespace", sizeof(struct net),
					SMP_CACHE_BYTES,
					SLAB_PANIC, NULL);
384 385 386 387 388

	/* Create workqueue for cleanup */
	netns_wq = create_singlethread_workqueue("netns");
	if (!netns_wq)
		panic("Could not create netns workq");
389
#endif
390

391 392 393 394 395 396
	ng = net_alloc_generic();
	if (!ng)
		panic("Could not allocate generic netns");

	rcu_assign_pointer(init_net.gen, ng);

397
	mutex_lock(&net_mutex);
S
Stephen Hemminger 已提交
398 399
	if (setup_net(&init_net))
		panic("Could not setup the initial network namespace");
400

401
	rtnl_lock();
402
	list_add_tail_rcu(&init_net.list, &net_namespace_list);
403
	rtnl_unlock();
404 405 406 407 408 409 410 411

	mutex_unlock(&net_mutex);

	return 0;
}

pure_initcall(net_ns_init);

412
#ifdef CONFIG_NET_NS
413 414
static int __register_pernet_operations(struct list_head *list,
					struct pernet_operations *ops)
415
{
416
	struct net *net;
417
	int error;
418
	LIST_HEAD(net_exit_list);
419 420

	list_add_tail(&ops->list, list);
421
	if (ops->init || (ops->id && ops->size)) {
422
		for_each_net(net) {
423
			error = ops_init(ops, net);
424 425
			if (error)
				goto out_undo;
426
			list_add_tail(&net->exit_list, &net_exit_list);
427 428
		}
	}
429
	return 0;
430 431 432 433

out_undo:
	/* If I have an error cleanup all namespaces I initialized */
	list_del(&ops->list);
434 435
	ops_exit_list(ops, &net_exit_list);
	ops_free_list(ops, &net_exit_list);
436
	return error;
437 438
}

439
static void __unregister_pernet_operations(struct pernet_operations *ops)
440 441
{
	struct net *net;
442
	LIST_HEAD(net_exit_list);
443 444

	list_del(&ops->list);
445 446 447 448
	for_each_net(net)
		list_add_tail(&net->exit_list, &net_exit_list);
	ops_exit_list(ops, &net_exit_list);
	ops_free_list(ops, &net_exit_list);
449 450
}

451 452
#else

453 454
static int __register_pernet_operations(struct list_head *list,
					struct pernet_operations *ops)
455
{
456
	return ops_init(ops, &init_net);
457 458
}

459
static void __unregister_pernet_operations(struct pernet_operations *ops)
460
{
461 462 463 464
	LIST_HEAD(net_exit_list);
	list_add(&init_net.exit_list, &net_exit_list);
	ops_exit_list(ops, &net_exit_list);
	ops_free_list(ops, &net_exit_list);
465
}
466 467

#endif /* CONFIG_NET_NS */
468

469 470
static DEFINE_IDA(net_generic_ids);

471 472 473 474 475 476 477 478 479 480 481 482 483 484 485
static int register_pernet_operations(struct list_head *list,
				      struct pernet_operations *ops)
{
	int error;

	if (ops->id) {
again:
		error = ida_get_new_above(&net_generic_ids, 1, ops->id);
		if (error < 0) {
			if (error == -EAGAIN) {
				ida_pre_get(&net_generic_ids, GFP_KERNEL);
				goto again;
			}
			return error;
		}
E
Eric Dumazet 已提交
486
		max_gen_ptrs = max_t(unsigned int, max_gen_ptrs, *ops->id);
487 488
	}
	error = __register_pernet_operations(list, ops);
489 490 491 492 493
	if (error) {
		rcu_barrier();
		if (ops->id)
			ida_remove(&net_generic_ids, *ops->id);
	}
494 495 496 497 498 499 500 501

	return error;
}

static void unregister_pernet_operations(struct pernet_operations *ops)
{
	
	__unregister_pernet_operations(ops);
502
	rcu_barrier();
503 504 505 506
	if (ops->id)
		ida_remove(&net_generic_ids, *ops->id);
}

507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540
/**
 *      register_pernet_subsys - register a network namespace subsystem
 *	@ops:  pernet operations structure for the subsystem
 *
 *	Register a subsystem which has init and exit functions
 *	that are called when network namespaces are created and
 *	destroyed respectively.
 *
 *	When registered all network namespace init functions are
 *	called for every existing network namespace.  Allowing kernel
 *	modules to have a race free view of the set of network namespaces.
 *
 *	When a new network namespace is created all of the init
 *	methods are called in the order in which they were registered.
 *
 *	When a network namespace is destroyed all of the exit methods
 *	are called in the reverse of the order with which they were
 *	registered.
 */
int register_pernet_subsys(struct pernet_operations *ops)
{
	int error;
	mutex_lock(&net_mutex);
	error =  register_pernet_operations(first_device, ops);
	mutex_unlock(&net_mutex);
	return error;
}
EXPORT_SYMBOL_GPL(register_pernet_subsys);

/**
 *      unregister_pernet_subsys - unregister a network namespace subsystem
 *	@ops: pernet operations structure to manipulate
 *
 *	Remove the pernet operations structure from the list to be
541
 *	used when network namespaces are created or destroyed.  In
542 543 544
 *	addition run the exit method for all existing network
 *	namespaces.
 */
545
void unregister_pernet_subsys(struct pernet_operations *ops)
546 547
{
	mutex_lock(&net_mutex);
548
	unregister_pernet_operations(ops);
549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564 565 566 567 568 569 570 571 572 573 574 575 576 577 578 579 580 581 582 583 584 585 586 587 588
	mutex_unlock(&net_mutex);
}
EXPORT_SYMBOL_GPL(unregister_pernet_subsys);

/**
 *      register_pernet_device - register a network namespace device
 *	@ops:  pernet operations structure for the subsystem
 *
 *	Register a device which has init and exit functions
 *	that are called when network namespaces are created and
 *	destroyed respectively.
 *
 *	When registered all network namespace init functions are
 *	called for every existing network namespace.  Allowing kernel
 *	modules to have a race free view of the set of network namespaces.
 *
 *	When a new network namespace is created all of the init
 *	methods are called in the order in which they were registered.
 *
 *	When a network namespace is destroyed all of the exit methods
 *	are called in the reverse of the order with which they were
 *	registered.
 */
int register_pernet_device(struct pernet_operations *ops)
{
	int error;
	mutex_lock(&net_mutex);
	error = register_pernet_operations(&pernet_list, ops);
	if (!error && (first_device == &pernet_list))
		first_device = &ops->list;
	mutex_unlock(&net_mutex);
	return error;
}
EXPORT_SYMBOL_GPL(register_pernet_device);

/**
 *      unregister_pernet_device - unregister a network namespace netdevice
 *	@ops: pernet operations structure to manipulate
 *
 *	Remove the pernet operations structure from the list to be
589
 *	used when network namespaces are created or destroyed.  In
590 591 592 593 594 595 596 597 598 599 600 601
 *	addition run the exit method for all existing network
 *	namespaces.
 */
void unregister_pernet_device(struct pernet_operations *ops)
{
	mutex_lock(&net_mutex);
	if (&ops->list == first_device)
		first_device = first_device->next;
	unregister_pernet_operations(ops);
	mutex_unlock(&net_mutex);
}
EXPORT_SYMBOL_GPL(unregister_pernet_device);
602 603 604 605

#ifdef CONFIG_NET_NS
static void *netns_get(struct task_struct *task)
{
606 607 608
	struct net *net = NULL;
	struct nsproxy *nsproxy;

609
	rcu_read_lock();
610 611 612
	nsproxy = task_nsproxy(task);
	if (nsproxy)
		net = get_net(nsproxy->net_ns);
613
	rcu_read_unlock();
614

615 616 617 618 619 620 621 622 623 624 625 626 627 628 629 630 631 632 633 634 635 636 637
	return net;
}

static void netns_put(void *ns)
{
	put_net(ns);
}

static int netns_install(struct nsproxy *nsproxy, void *ns)
{
	put_net(nsproxy->net_ns);
	nsproxy->net_ns = get_net(ns);
	return 0;
}

const struct proc_ns_operations netns_operations = {
	.name		= "net",
	.type		= CLONE_NEWNET,
	.get		= netns_get,
	.put		= netns_put,
	.install	= netns_install,
};
#endif