[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CALx6S35mAcKe5caMz-jiq9oy2M0e2c-kfKeCNb=f5A4j_Ct1=A@mail.gmail.com>
Date: Wed, 5 Aug 2015 11:32:05 -0700
From: Tom Herbert <tom@...bertland.com>
To: David Ahern <dsa@...ulusnetworks.com>
Cc: Linux Kernel Network Developers <netdev@...r.kernel.org>,
Shrijeet Mukherjee <shm@...ulusnetworks.com>,
Roopa Prabhu <roopa@...ulusnetworks.com>,
gospo@...ulusnetworks.com, jtoppins@...ulusnetworks.com,
nikolay@...ulusnetworks.com, ddutt@...ulusnetworks.com,
Hannes Frederic Sowa <hannes@...essinduktion.org>,
Nicolas Dichtel <nicolas.dichtel@...nd.com>,
Stephen Hemminger <stephen@...workplumber.org>,
hadi@...atatu.com, "Eric W. Biederman" <ebiederm@...ssion.com>,
"David S. Miller" <davem@...emloft.net>, svaidya@...cade.com
Subject: Re: [PATCH 09/10] net: Use VRF device index for socket lookups
On Wed, Aug 5, 2015 at 10:14 AM, David Ahern <dsa@...ulusnetworks.com> wrote:
> The intent of the VRF device is to leverage the existing SO_BINDTODEVICE
> as a means of creating L3 domains. Since sockets are expected to be bound
> to the VRF device the index of the master device needs to be used for
> socket lookups.
>
This patch set seems awfully invasive at the socket layer. Isn't there
anyway this functionality be contained in the routing layer and
sockets use existing API?
Thanks,
Tom
> Signed-off-by: Shrijeet Mukherjee <shm@...ulusnetworks.com>
> Signed-off-by: David Ahern <dsa@...ulusnetworks.com>
> ---
> net/ipv4/syncookies.c | 5 ++++-
> net/ipv4/tcp_input.c | 6 +++++-
> net/ipv4/tcp_ipv4.c | 11 +++++++++--
> 3 files changed, 18 insertions(+), 4 deletions(-)
>
> diff --git a/net/ipv4/syncookies.c b/net/ipv4/syncookies.c
> index d70b1f603692..e5c8b1240278 100644
> --- a/net/ipv4/syncookies.c
> +++ b/net/ipv4/syncookies.c
> @@ -18,6 +18,7 @@
> #include <linux/export.h>
> #include <net/tcp.h>
> #include <net/route.h>
> +#include <net/vrf.h>
>
> extern int sysctl_tcp_syncookies;
>
> @@ -348,7 +349,9 @@ struct sock *cookie_v4_check(struct sock *sk, struct sk_buff *skb)
> treq->snt_synack = tcp_opt.saw_tstamp ? tcp_opt.rcv_tsecr : 0;
> treq->tfo_listener = false;
>
> - ireq->ir_iif = sk->sk_bound_dev_if;
> + ireq->ir_iif = vrf_master_ifindex_by_index(sock_net(sk), skb->skb_iif);
> + if (!ireq->ir_iif)
> + ireq->ir_iif = sk->sk_bound_dev_if;
>
> /* We throwed the options of the initial SYN away, so we hope
> * the ACK carries the same options again (see RFC1122 4.2.3.8)
> diff --git a/net/ipv4/tcp_input.c b/net/ipv4/tcp_input.c
> index 4e4d6bcd0ca9..6b96240a4055 100644
> --- a/net/ipv4/tcp_input.c
> +++ b/net/ipv4/tcp_input.c
> @@ -72,6 +72,7 @@
> #include <net/dst.h>
> #include <net/tcp.h>
> #include <net/inet_common.h>
> +#include <net/vrf.h>
> #include <linux/ipsec.h>
> #include <asm/unaligned.h>
> #include <linux/errqueue.h>
> @@ -6141,7 +6142,10 @@ int tcp_conn_request(struct request_sock_ops *rsk_ops,
> tcp_openreq_init(req, &tmp_opt, skb, sk);
>
> /* Note: tcp_v6_init_req() might override ir_iif for link locals */
> - inet_rsk(req)->ir_iif = sk->sk_bound_dev_if;
> + inet_rsk(req)->ir_iif = vrf_master_ifindex_by_index(sock_net(sk),
> + skb->skb_iif);
> + if (!inet_rsk(req)->ir_iif)
> + inet_rsk(req)->ir_iif = sk->sk_bound_dev_if;
>
> af_ops->init_req(req, sk, skb);
>
> diff --git a/net/ipv4/tcp_ipv4.c b/net/ipv4/tcp_ipv4.c
> index d27eb549ced6..0f8ed98a2e64 100644
> --- a/net/ipv4/tcp_ipv4.c
> +++ b/net/ipv4/tcp_ipv4.c
> @@ -75,6 +75,7 @@
> #include <net/secure_seq.h>
> #include <net/tcp_memcontrol.h>
> #include <net/busy_poll.h>
> +#include <net/vrf.h>
>
> #include <linux/inet.h>
> #include <linux/ipv6.h>
> @@ -682,6 +683,8 @@ static void tcp_v4_send_reset(struct sock *sk, struct sk_buff *skb)
> */
> if (sk)
> arg.bound_dev_if = sk->sk_bound_dev_if;
> + if (!arg.bound_dev_if && skb->dev)
> + arg.bound_dev_if = vrf_master_ifindex_rcu(skb->dev);
>
> arg.tos = ip_hdr(skb)->tos;
> ip_send_unicast_reply(*this_cpu_ptr(net->ipv4.tcp_sk),
> @@ -766,8 +769,10 @@ static void tcp_v4_send_ack(struct sk_buff *skb, u32 seq, u32 ack,
> ip_hdr(skb)->saddr, /* XXX */
> arg.iov[0].iov_len, IPPROTO_TCP, 0);
> arg.csumoffset = offsetof(struct tcphdr, check) / 2;
> - if (oif)
> - arg.bound_dev_if = oif;
> + arg.bound_dev_if = oif ? : vrf_master_ifindex_rcu(skb_dst(skb)->dev);
> + if (!arg.bound_dev_if)
> + arg.bound_dev_if = vrf_master_ifindex_rcu(skb->dev);
> +
> arg.tos = tos;
> ip_send_unicast_reply(*this_cpu_ptr(net->ipv4.tcp_sk),
> skb, &TCP_SKB_CB(skb)->header.h4.opt,
> @@ -1269,6 +1274,8 @@ struct sock *tcp_v4_syn_recv_sock(struct sock *sk, struct sk_buff *skb,
> ireq = inet_rsk(req);
> sk_daddr_set(newsk, ireq->ir_rmt_addr);
> sk_rcv_saddr_set(newsk, ireq->ir_loc_addr);
> + if (netif_index_is_vrf(sock_net(newsk), ireq->ir_iif))
> + newsk->sk_bound_dev_if = ireq->ir_iif;
> newinet->inet_saddr = ireq->ir_loc_addr;
> inet_opt = ireq->opt;
> rcu_assign_pointer(newinet->inet_opt, inet_opt);
> --
> 2.3.2 (Apple Git-55)
>
> --
> To unsubscribe from this list: send the line "unsubscribe netdev" in
> the body of a message to majordomo@...r.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists