diff options
author | Nicolas Dichtel <nicolas.dichtel@6wind.com> | 2017-06-01 10:00:07 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2017-06-01 11:49:39 -0400 |
commit | 7212462fa6fdae61f7f40a4ead048def45bb23cb (patch) | |
tree | 26a869f3de07346f8b17219b4da34dbfedb8324f | |
parent | 5ea6d691aac6c93b790f0905e3460d44cc4c449b (diff) | |
download | linux-7212462fa6fdae61f7f40a4ead048def45bb23cb.tar.gz linux-7212462fa6fdae61f7f40a4ead048def45bb23cb.tar.bz2 linux-7212462fa6fdae61f7f40a4ead048def45bb23cb.zip |
netlink: don't send unknown nsid
The NETLINK_F_LISTEN_ALL_NSID otion enables to listen all netns that have a
nsid assigned into the netns where the netlink socket is opened.
The nsid is sent as metadata to userland, but the existence of this nsid is
checked only for netns that are different from the socket netns. Thus, if
no nsid is assigned to the socket netns, NETNSA_NSID_NOT_ASSIGNED is
reported to the userland. This value is confusing and useless.
After this patch, only valid nsid are sent to userland.
Reported-by: Flavio Leitner <fbl@sysclose.org>
Signed-off-by: Nicolas Dichtel <nicolas.dichtel@6wind.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/netlink/af_netlink.c | 4 |
1 files changed, 3 insertions, 1 deletions
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c index ee841f00a6ec..7586d446d7dc 100644 --- a/net/netlink/af_netlink.c +++ b/net/netlink/af_netlink.c @@ -62,6 +62,7 @@ #include <asm/cacheflush.h> #include <linux/hash.h> #include <linux/genetlink.h> +#include <linux/net_namespace.h> #include <net/net_namespace.h> #include <net/sock.h> @@ -1415,7 +1416,8 @@ static void do_one_broadcast(struct sock *sk, goto out; } NETLINK_CB(p->skb2).nsid = peernet2id(sock_net(sk), p->net); - NETLINK_CB(p->skb2).nsid_is_set = true; + if (NETLINK_CB(p->skb2).nsid != NETNSA_NSID_NOT_ASSIGNED) + NETLINK_CB(p->skb2).nsid_is_set = true; val = netlink_broadcast_deliver(sk, p->skb2); if (val < 0) { netlink_overrun(sk); |