diff options
author | Johannes Berg <johannes.berg@intel.com> | 2014-12-23 21:00:06 +0100 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2014-12-27 03:07:50 -0500 |
commit | 023e2cfa36c31b0ad28c159a1bb0d61ff57334c8 (patch) | |
tree | fb696a81e6c2246cec25cfa35741de31c090ed7a /kernel/audit.c | |
parent | eb69c5bf8273edbe1c5c748fa299b5e5a08f35d6 (diff) | |
download | linux-023e2cfa36c31b0ad28c159a1bb0d61ff57334c8.tar.gz linux-023e2cfa36c31b0ad28c159a1bb0d61ff57334c8.tar.bz2 linux-023e2cfa36c31b0ad28c159a1bb0d61ff57334c8.zip |
netlink/genetlink: pass network namespace to bind/unbind
Netlink families can exist in multiple namespaces, and for the most
part multicast subscriptions are per network namespace. Thus it only
makes sense to have bind/unbind notifications per network namespace.
To achieve this, pass the network namespace of a given client socket
to the bind/unbind functions.
Also do this in generic netlink, and there also make sure that any
bind for multicast groups that only exist in init_net is rejected.
This isn't really a problem if it is accepted since a client in a
different namespace will never receive any notifications from such
a group, but it can confuse the family if not rejected (it's also
possible to silently (without telling the family) accept it, but it
would also have to be ignored on unbind so families that take any
kind of action on bind/unbind won't do unnecessary work for invalid
clients like that.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'kernel/audit.c')
-rw-r--r-- | kernel/audit.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/kernel/audit.c b/kernel/audit.c index f8f203e8018c..aba9d9fadf0c 100644 --- a/kernel/audit.c +++ b/kernel/audit.c @@ -1100,7 +1100,7 @@ static void audit_receive(struct sk_buff *skb) } /* Run custom bind function on netlink socket group connect or bind requests. */ -static int audit_bind(int group) +static int audit_bind(struct net *net, int group) { if (!capable(CAP_AUDIT_READ)) return -EPERM; |