diff options
author | Colin Cross <ccross@android.com> | 2023-02-09 14:50:49 -0800 |
---|---|---|
committer | Rich Felker <dalias@aerifal.cx> | 2023-02-12 17:38:37 -0500 |
commit | f79b973d92a322800b3e8411ccc95db280d997ae (patch) | |
tree | 79452ad4169d2c144fa236241879750c41911d33 /src | |
parent | 0ab97350f01b42de0f9fd811ee08653169661859 (diff) | |
download | musl-f79b973d92a322800b3e8411ccc95db280d997ae.tar.gz musl-f79b973d92a322800b3e8411ccc95db280d997ae.tar.bz2 musl-f79b973d92a322800b3e8411ccc95db280d997ae.tar.xz musl-f79b973d92a322800b3e8411ccc95db280d997ae.zip |
increase sendmsg internal buffer to support SCM_MAX_FD
The kernel defines a limit on the number of fds that can be passed
through an SCM_RIGHTS ancillary message as SCM_MAX_FD. The value was
255 before kernel 2.6.38 (after that it is 253), and an SCM_RIGHTS
ancillary message with 255 fds requires 1040 bytes, slightly more than
the current 1024 byte internal buffer in sendmsg. 1024 is an arbitrary
size, so increase it to match the the arbitrary size limit in the
kernel. This fixes tests that are verifying they support up to
SCM_MAX_FD fds.
Diffstat (limited to 'src')
-rw-r--r-- | src/network/sendmsg.c | 7 |
1 files changed, 5 insertions, 2 deletions
diff --git a/src/network/sendmsg.c b/src/network/sendmsg.c index 80cc5f41..acdfdf29 100644 --- a/src/network/sendmsg.c +++ b/src/network/sendmsg.c @@ -8,13 +8,16 @@ ssize_t sendmsg(int fd, const struct msghdr *msg, int flags) { #if LONG_MAX > INT_MAX struct msghdr h; - struct cmsghdr chbuf[1024/sizeof(struct cmsghdr)+1], *c; + /* Kernels before 2.6.38 set SCM_MAX_FD to 255, allocate enough + * space to support an SCM_RIGHTS ancillary message with 255 fds. + * Kernels since 2.6.38 set SCM_MAX_FD to 253. */ + struct cmsghdr chbuf[CMSG_SPACE(255*sizeof(int))/sizeof(struct cmsghdr)+1], *c; if (msg) { h = *msg; h.__pad1 = h.__pad2 = 0; msg = &h; if (h.msg_controllen) { - if (h.msg_controllen > 1024) { + if (h.msg_controllen > sizeof chbuf) { errno = ENOMEM; return -1; } |