diff options
author | Yann Droneaud <ydroneaud@opteya.com> | 2013-07-02 18:39:36 +0200 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2013-07-02 16:14:11 -0700 |
commit | 8a59bd3e9b296b93b905b5509c4ff540ee0e00bf (patch) | |
tree | f4ce549a3a6beaac973d3d60c997e80bc474b86f | |
parent | 83d7af64ac9eaf4f4db7228677bc25f23c383790 (diff) | |
download | op-kernel-dev-8a59bd3e9b296b93b905b5509c4ff540ee0e00bf.zip op-kernel-dev-8a59bd3e9b296b93b905b5509c4ff540ee0e00bf.tar.gz |
sctp: use get_unused_fd_flags(0) instead of get_unused_fd()
Macro get_unused_fd() is used to allocate a file descriptor with
default flags. Those default flags (0) can be "unsafe":
O_CLOEXEC must be used by default to not leak file descriptor
across exec().
Instead of macro get_unused_fd(), functions anon_inode_getfd()
or get_unused_fd_flags() should be used with flags given by userspace.
If not possible, flags should be set to O_CLOEXEC to provide userspace
with a default safe behavor.
In a further patch, get_unused_fd() will be removed so that
new code start using anon_inode_getfd() or get_unused_fd_flags()
with correct flags.
This patch replaces calls to get_unused_fd() with equivalent call to
get_unused_fd_flags(0) to preserve current behavor for existing code.
The hard coded flag value (0) should be reviewed on a per-subsystem basis,
and, if possible, set to O_CLOEXEC.
Signed-off-by: Yann Droneaud <ydroneaud@opteya.com>
Acked-by: Vlad Yasevich <vyasevich@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
-rw-r--r-- | net/sctp/socket.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/sctp/socket.c b/net/sctp/socket.c index d5c6a28..c6670d2 100644 --- a/net/sctp/socket.c +++ b/net/sctp/socket.c @@ -4312,7 +4312,7 @@ static int sctp_getsockopt_peeloff(struct sock *sk, int len, char __user *optval goto out; /* Map the socket to an unused fd that can be returned to the user. */ - retval = get_unused_fd(); + retval = get_unused_fd_flags(0); if (retval < 0) { sock_release(newsock); goto out; |