[NET]: Make packet reception network namespace safe

This patch modifies every packet receive function
registered with dev_add_pack() to drop packets if they
are not from the initial network namespace.

This should ensure that the various network stacks do
not receive packets in a anything but the initial network
namespace until the code has been converted and is ready
for them.

Signed-off-by: Eric W. Biederman <ebiederm@xmission.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
Eric W. Biederman
2007-09-17 11:53:39 -07:00
committed by David S. Miller
parent 6d34b1c27a
commit e730c15519
26 changed files with 113 additions and 0 deletions

View File

@ -252,6 +252,9 @@ static int packet_rcv_spkt(struct sk_buff *skb, struct net_device *dev, struct
struct sock *sk;
struct sockaddr_pkt *spkt;
if (dev->nd_net != &init_net)
goto out;
/*
* When we registered the protocol we saved the socket in the data
* field for just this event.
@ -452,6 +455,9 @@ static int packet_rcv(struct sk_buff *skb, struct net_device *dev, struct packet
int skb_len = skb->len;
unsigned int snaplen, res;
if (dev->nd_net != &init_net)
goto drop;
if (skb->pkt_type == PACKET_LOOPBACK)
goto drop;
@ -568,6 +574,9 @@ static int tpacket_rcv(struct sk_buff *skb, struct net_device *dev, struct packe
struct sk_buff *copy_skb = NULL;
struct timeval tv;
if (dev->nd_net != &init_net)
goto drop;
if (skb->pkt_type == PACKET_LOOPBACK)
goto drop;