Eric W. Biederman wrote:
> This patch allows you to create a new network namespace
> using sys_clone, or sys_unshare.
> 
> As the network namespace is still experimental and under development
> clone and unshare support is only made available when CONFIG_NET_NS is
> selected at compile time.
> 
> As this patch introduces network namespace support into code paths
> that exist when the CONFIG_NET is not selected there are a few
> additions made to net_namespace.h to allow a few more functions
> to be used when the networking stack is not compiled in.
> 
> Signed-off-by: Eric W. Biederman <[EMAIL PROTECTED]>
> ---
>  include/linux/sched.h       |    1 +
>  include/net/net_namespace.h |   18 ++++++++++++++++++
>  kernel/fork.c               |    3 ++-
>  kernel/nsproxy.c            |   15 +++++++++++++--
>  net/Kconfig                 |    8 ++++++++
>  net/core/net_namespace.c    |   43 
> +++++++++++++++++++++++++++++++++++++++++--
>  6 files changed, 83 insertions(+), 5 deletions(-)
> 
> diff --git a/include/linux/sched.h b/include/linux/sched.h
> index a01ac6d..e10a0a8 100644
> --- a/include/linux/sched.h
> +++ b/include/linux/sched.h
> @@ -27,6 +27,7 @@
>  #define CLONE_NEWUTS         0x04000000      /* New utsname group? */
>  #define CLONE_NEWIPC         0x08000000      /* New ipcs */
>  #define CLONE_NEWUSER                0x10000000      /* New user namespace */
> +#define CLONE_NEWNET         0x20000000      /* New network namespace */

This new flag is going to conflict with the pid namespace flag 
CLONE_NEWPID in -mm. It might be worth changing it to:

#define CLONE_NEWNET            0x40000000

The changes in nxproxy.c and fork.c will also conflict but I don't 
think we can do much about it for now.

C. 

>  /*
>   * Scheduling policies
> diff --git a/include/net/net_namespace.h b/include/net/net_namespace.h
> index ac8f830..3ea4194 100644
> --- a/include/net/net_namespace.h
> +++ b/include/net/net_namespace.h
> @@ -38,11 +38,23 @@ extern struct net init_net;
> 
>  extern struct list_head net_namespace_list;
> 
> +#ifdef CONFIG_NET
> +extern struct net *copy_net_ns(unsigned long flags, struct net *net_ns);
> +#else
> +static inline struct net *copy_net_ns(unsigned long flags, struct net 
> *net_ns)
> +{
> +     /* There is nothing to copy so this is a noop */
> +     return net_ns;
> +}
> +#endif
> +
>  extern void __put_net(struct net *net);
> 
>  static inline struct net *get_net(struct net *net)
>  {
> +#ifdef CONFIG_NET
>       atomic_inc(&net->count);
> +#endif
>       return net;
>  }
> 
> @@ -60,19 +72,25 @@ static inline struct net *maybe_get_net(struct net *net)
> 
>  static inline void put_net(struct net *net)
>  {
> +#ifdef CONFIG_NET
>       if (atomic_dec_and_test(&net->count))
>               __put_net(net);
> +#endif
>  }
> 
>  static inline struct net *hold_net(struct net *net)
>  {
> +#ifdef CONFIG_NET
>       atomic_inc(&net->use_count);
> +#endif
>       return net;
>  }
> 
>  static inline void release_net(struct net *net)
>  {
> +#ifdef CONFIG_NET
>       atomic_dec(&net->use_count);
> +#endif
>  }
> 
>  extern void net_lock(void);
> diff --git a/kernel/fork.c b/kernel/fork.c
> index 33f12f4..5e67f90 100644
> --- a/kernel/fork.c
> +++ b/kernel/fork.c
> @@ -1608,7 +1608,8 @@ asmlinkage long sys_unshare(unsigned long unshare_flags)
>       err = -EINVAL;
>       if (unshare_flags & ~(CLONE_THREAD|CLONE_FS|CLONE_NEWNS|CLONE_SIGHAND|
>                               CLONE_VM|CLONE_FILES|CLONE_SYSVSEM|
> -                             CLONE_NEWUTS|CLONE_NEWIPC|CLONE_NEWUSER))
> +                             CLONE_NEWUTS|CLONE_NEWIPC|CLONE_NEWUSER|
> +                             CLONE_NEWNET))
>               goto bad_unshare_out;
> 
>       if ((err = unshare_thread(unshare_flags)))
> diff --git a/kernel/nsproxy.c b/kernel/nsproxy.c
> index a4fb7d4..f1decd2 100644
> --- a/kernel/nsproxy.c
> +++ b/kernel/nsproxy.c
> @@ -20,6 +20,7 @@
>  #include <linux/mnt_namespace.h>
>  #include <linux/utsname.h>
>  #include <linux/pid_namespace.h>
> +#include <net/net_namespace.h>
> 
>  static struct kmem_cache *nsproxy_cachep;
> 
> @@ -98,8 +99,17 @@ static struct nsproxy *create_new_namespaces(unsigned long 
> flags,
>               goto out_user;
>       }
> 
> +     new_nsp->net_ns = copy_net_ns(flags, tsk->nsproxy->net_ns);
> +     if (IS_ERR(new_nsp->net_ns)) {
> +             err = PTR_ERR(new_nsp->net_ns);
> +             goto out_net;
> +     }
> +
>       return new_nsp;
> 
> +out_net:
> +     if (new_nsp->user_ns)
> +             put_user_ns(new_nsp->user_ns);
>  out_user:
>       if (new_nsp->pid_ns)
>               put_pid_ns(new_nsp->pid_ns);
> @@ -132,7 +142,7 @@ int copy_namespaces(unsigned long flags, struct 
> task_struct *tsk)
> 
>       get_nsproxy(old_ns);
> 
> -     if (!(flags & (CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC | 
> CLONE_NEWUSER)))
> +     if (!(flags & (CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC | 
> CLONE_NEWUSER | CLONE_NEWNET)))
>               return 0;
> 
>       if (!capable(CAP_SYS_ADMIN)) {
> @@ -164,6 +174,7 @@ void free_nsproxy(struct nsproxy *ns)
>               put_pid_ns(ns->pid_ns);
>       if (ns->user_ns)
>               put_user_ns(ns->user_ns);
> +     put_net(ns->net_ns);
>       kmem_cache_free(nsproxy_cachep, ns);
>  }
> 
> @@ -177,7 +188,7 @@ int unshare_nsproxy_namespaces(unsigned long 
> unshare_flags,
>       int err = 0;
> 
>       if (!(unshare_flags & (CLONE_NEWNS | CLONE_NEWUTS | CLONE_NEWIPC |
> -                            CLONE_NEWUSER)))
> +                            CLONE_NEWUSER | CLONE_NEWNET)))
>               return 0;
> 
>       if (!capable(CAP_SYS_ADMIN))
> diff --git a/net/Kconfig b/net/Kconfig
> index cdba08c..ab4e6da 100644
> --- a/net/Kconfig
> +++ b/net/Kconfig
> @@ -27,6 +27,14 @@ if NET
> 
>  menu "Networking options"
> 
> +config NET_NS
> +     bool "Network namespace support"
> +     default n
> +     depends on EXPERIMENTAL && !SYSFS
> +     help
> +       Allow user space to create what appear to be multiple instances
> +       of the network stack.
> +
>  source "net/packet/Kconfig"
>  source "net/unix/Kconfig"
>  source "net/xfrm/Kconfig"
> diff --git a/net/core/net_namespace.c b/net/core/net_namespace.c
> index 0e6cb02..e478e35 100644
> --- a/net/core/net_namespace.c
> +++ b/net/core/net_namespace.c
> @@ -4,6 +4,7 @@
>  #include <linux/slab.h>
>  #include <linux/list.h>
>  #include <linux/delay.h>
> +#include <linux/sched.h>
>  #include <net/net_namespace.h>
> 
>  /*
> @@ -32,12 +33,10 @@ void net_unlock(void)
>       mutex_unlock(&net_list_mutex);
>  }
> 
> -#if 0
>  static struct net *net_alloc(void)
>  {
>       return kmem_cache_alloc(net_cachep, GFP_KERNEL);
>  }
> -#endif
> 
>  static void net_free(struct net *net)
>  {
> @@ -128,6 +127,46 @@ out_undo:
>       goto out;
>  }
> 
> +struct net *copy_net_ns(unsigned long flags, struct net *old_net)
> +{
> +     struct net *new_net = NULL;
> +     int err;
> +
> +     get_net(old_net);
> +
> +     if (!(flags & CLONE_NEWNET))
> +             return old_net;
> +
> +#ifndef CONFIG_NET_NS
> +     return ERR_PTR(-EINVAL);
> +#endif
> +
> +     err = -ENOMEM;
> +     new_net = net_alloc();
> +     if (!new_net)
> +             goto out;
> +
> +     mutex_lock(&net_mutex);
> +     err = setup_net(new_net);
> +     if (err)
> +             goto out_unlock;
> +
> +     net_lock();
> +     list_add_tail(&new_net->list, &net_namespace_list);
> +     net_unlock();
> +
> +
> +out_unlock:
> +     mutex_unlock(&net_mutex);
> +out:
> +     put_net(old_net);
> +     if (err) {
> +             net_free(new_net);
> +             new_net = ERR_PTR(err);
> +     }
> +     return new_net;
> +}
> +
>  static int __init net_ns_init(void)
>  {
>       int err;

-
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Reply via email to