diff options
| author | Linus Torvalds <torvalds@linux-foundation.org> | 2017-09-07 00:45:08 +0300 | 
|---|---|---|
| committer | Linus Torvalds <torvalds@linux-foundation.org> | 2017-09-07 00:45:08 +0300 | 
| commit | aae3dbb4776e7916b6cd442d00159bea27a695c1 (patch) | |
| tree | d074c5d783a81e7e2e084b1eba77f57459da7e37 /net/unix/af_unix.c | |
| parent | ec3604c7a5aae8953545b0d05495357009a960e5 (diff) | |
| parent | 66bed8465a808400eb14562510e26c8818082cb8 (diff) | |
| download | linux-aae3dbb4776e7916b6cd442d00159bea27a695c1.tar.xz | |
Merge git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next
Pull networking updates from David Miller:
 1) Support ipv6 checksum offload in sunvnet driver, from Shannon
    Nelson.
 2) Move to RB-tree instead of custom AVL code in inetpeer, from Eric
    Dumazet.
 3) Allow generic XDP to work on virtual devices, from John Fastabend.
 4) Add bpf device maps and XDP_REDIRECT, which can be used to build
    arbitrary switching frameworks using XDP. From John Fastabend.
 5) Remove UFO offloads from the tree, gave us little other than bugs.
 6) Remove the IPSEC flow cache, from Florian Westphal.
 7) Support ipv6 route offload in mlxsw driver.
 8) Support VF representors in bnxt_en, from Sathya Perla.
 9) Add support for forward error correction modes to ethtool, from
    Vidya Sagar Ravipati.
10) Add time filter for packet scheduler action dumping, from Jamal Hadi
    Salim.
11) Extend the zerocopy sendmsg() used by virtio and tap to regular
    sockets via MSG_ZEROCOPY. From Willem de Bruijn.
12) Significantly rework value tracking in the BPF verifier, from Edward
    Cree.
13) Add new jump instructions to eBPF, from Daniel Borkmann.
14) Rework rtnetlink plumbing so that operations can be run without
    taking the RTNL semaphore. From Florian Westphal.
15) Support XDP in tap driver, from Jason Wang.
16) Add 32-bit eBPF JIT for ARM, from Shubham Bansal.
17) Add Huawei hinic ethernet driver.
18) Allow to report MD5 keys in TCP inet_diag dumps, from Ivan
    Delalande.
* git://git.kernel.org/pub/scm/linux/kernel/git/davem/net-next: (1780 commits)
  i40e: point wb_desc at the nvm_wb_desc during i40e_read_nvm_aq
  i40e: avoid NVM acquire deadlock during NVM update
  drivers: net: xgene: Remove return statement from void function
  drivers: net: xgene: Configure tx/rx delay for ACPI
  drivers: net: xgene: Read tx/rx delay for ACPI
  rocker: fix kcalloc parameter order
  rds: Fix non-atomic operation on shared flag variable
  net: sched: don't use GFP_KERNEL under spin lock
  vhost_net: correctly check tx avail during rx busy polling
  net: mdio-mux: add mdio_mux parameter to mdio_mux_init()
  rxrpc: Make service connection lookup always check for retry
  net: stmmac: Delete dead code for MDIO registration
  gianfar: Fix Tx flow control deactivation
  cxgb4: Ignore MPS_TX_INT_CAUSE[Bubble] for T6
  cxgb4: Fix pause frame count in t4_get_port_stats
  cxgb4: fix memory leak
  tun: rename generic_xdp to skb_xdp
  tun: reserve extra headroom only when XDP is set
  net: dsa: bcm_sf2: Configure IMP port TC2QOS mapping
  net: dsa: bcm_sf2: Advertise number of egress queues
  ...
Diffstat (limited to 'net/unix/af_unix.c')
| -rw-r--r-- | net/unix/af_unix.c | 24 | 
1 files changed, 1 insertions, 23 deletions
diff --git a/net/unix/af_unix.c b/net/unix/af_unix.c index be8982b4f8c0..7f46bab4ce5c 100644 --- a/net/unix/af_unix.c +++ b/net/unix/af_unix.c @@ -1528,26 +1528,13 @@ static inline bool too_many_unix_fds(struct task_struct *p)  	return false;  } -#define MAX_RECURSION_LEVEL 4 -  static int unix_attach_fds(struct scm_cookie *scm, struct sk_buff *skb)  {  	int i; -	unsigned char max_level = 0;  	if (too_many_unix_fds(current))  		return -ETOOMANYREFS; -	for (i = scm->fp->count - 1; i >= 0; i--) { -		struct sock *sk = unix_get_socket(scm->fp->fp[i]); - -		if (sk) -			max_level = max(max_level, -					unix_sk(sk)->recursion_level); -	} -	if (unlikely(max_level > MAX_RECURSION_LEVEL)) -		return -ETOOMANYREFS; -  	/*  	 * Need to duplicate file references for the sake of garbage  	 * collection.  Otherwise a socket in the fps might become a @@ -1559,7 +1546,7 @@ static int unix_attach_fds(struct scm_cookie *scm, struct sk_buff *skb)  	for (i = scm->fp->count - 1; i >= 0; i--)  		unix_inflight(scm->fp->user, scm->fp->fp[i]); -	return max_level; +	return 0;  }  static int unix_scm_to_skb(struct scm_cookie *scm, struct sk_buff *skb, bool send_fds) @@ -1649,7 +1636,6 @@ static int unix_dgram_sendmsg(struct socket *sock, struct msghdr *msg,  	struct sk_buff *skb;  	long timeo;  	struct scm_cookie scm; -	int max_level;  	int data_len = 0;  	int sk_locked; @@ -1701,7 +1687,6 @@ static int unix_dgram_sendmsg(struct socket *sock, struct msghdr *msg,  	err = unix_scm_to_skb(&scm, skb, true);  	if (err < 0)  		goto out_free; -	max_level = err + 1;  	skb_put(skb, len - data_len);  	skb->data_len = data_len; @@ -1819,8 +1804,6 @@ restart_locked:  		__net_timestamp(skb);  	maybe_add_creds(skb, sock, other);  	skb_queue_tail(&other->sk_receive_queue, skb); -	if (max_level > unix_sk(other)->recursion_level) -		unix_sk(other)->recursion_level = max_level;  	unix_state_unlock(other);  	other->sk_data_ready(other);  	sock_put(other); @@ -1855,7 +1838,6 @@ static int unix_stream_sendmsg(struct socket *sock, struct msghdr *msg,  	int sent = 0;  	struct scm_cookie scm;  	bool fds_sent = false; -	int max_level;  	int data_len;  	wait_for_unix_gc(); @@ -1905,7 +1887,6 @@ static int unix_stream_sendmsg(struct socket *sock, struct msghdr *msg,  			kfree_skb(skb);  			goto out_err;  		} -		max_level = err + 1;  		fds_sent = true;  		skb_put(skb, size - data_len); @@ -1925,8 +1906,6 @@ static int unix_stream_sendmsg(struct socket *sock, struct msghdr *msg,  		maybe_add_creds(skb, sock, other);  		skb_queue_tail(&other->sk_receive_queue, skb); -		if (max_level > unix_sk(other)->recursion_level) -			unix_sk(other)->recursion_level = max_level;  		unix_state_unlock(other);  		other->sk_data_ready(other);  		sent += size; @@ -2321,7 +2300,6 @@ redo:  		last_len = last ? last->len : 0;  again:  		if (skb == NULL) { -			unix_sk(sk)->recursion_level = 0;  			if (copied >= target)  				goto unlock;  | 
