linux-stable/net/llc
Kuniyuki Iwashima 831918c895 llc: Don't drop packet from non-root netns.
[ Upstream commit 6631463b6e ]

Now these upper layer protocol handlers can be called from llc_rcv()
as sap->rcv_func(), which is registered by llc_sap_open().

  * function which is passed to register_8022_client()
    -> no in-kernel user calls register_8022_client().

  * snap_rcv()
    `- proto->rcvfunc() : registered by register_snap_client()
       -> aarp_rcv() and atalk_rcv() drop packets from non-root netns

  * stp_pdu_rcv()
    `- garp_protos[]->rcv() : registered by stp_proto_register()
       -> garp_pdu_rcv() and br_stp_rcv() are netns-aware

So, we can safely remove the netns restriction in llc_rcv().

Fixes: e730c15519 ("[NET]: Make packet reception network namespace safe")
Signed-off-by: Kuniyuki Iwashima <kuniyu@amazon.com>
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: Sasha Levin <sashal@kernel.org>
2023-08-11 11:33:49 +02:00
..
af_llc.c llc: only change llc->dev when bind() succeeds 2022-03-28 08:22:27 +02:00
Kconfig
llc_c_ac.c llc: fix sk_buff leak in llc_conn_service() 2019-11-06 12:43:36 +01:00
llc_c_ev.c
llc_c_st.c
llc_conn.c llc: fix sk_buff refcounting in llc_conn_state_process() 2020-01-27 14:46:49 +01:00
llc_core.c llc: avoid blocking in llc_sap_close() 2019-11-20 17:59:59 +01:00
llc_if.c llc: fix another potential sk_buff leak in llc_ui_sendmsg() 2020-01-27 14:46:49 +01:00
llc_input.c llc: Don't drop packet from non-root netns. 2023-08-11 11:33:49 +02:00
llc_output.c llc: fix skb leak in llc_build_and_send_ui_pkt() 2019-06-09 09:18:10 +02:00
llc_pdu.c
llc_proc.c
llc_s_ac.c net: llc: fix skb_over_panic 2021-08-04 12:22:17 +02:00
llc_s_ev.c
llc_s_st.c
llc_sap.c llc: fix sk_buff leak in llc_sap_state_process() 2019-11-06 12:43:36 +01:00
llc_station.c llc2: Fix return statement of llc_stat_ev_rx_null_dsap_xid_c (and _test_c) 2020-01-12 12:12:01 +01:00
Makefile
sysctl_net_llc.c License cleanup: add SPDX GPL-2.0 license identifier to files with no license 2017-11-02 11:10:55 +01:00