Hi Cong On Sat, Jan 30, 2016 at 6:46 AM, Eric Dumazet <eric.duma...@gmail.com> wrote: > On Fri, 2016-01-29 at 11:24 -0800, Cong Wang wrote: >> These two functions are called in sendmsg path, and the >> 'len' is passed from user-space, so we should not allow >> malicious users to OOM kernel on purpose. >> >> Reported-by: Dmitry Vyukov <dvyu...@google.com> >> Cc: Lauro Ramos Venancio <lauro.venan...@openbossa.org> >> Cc: Aloisio Almeida Jr <aloisio.alme...@openbossa.org> >> Cc: Samuel Ortiz <sa...@linux.intel.com> >> Signed-off-by: Cong Wang <xiyou.wangc...@gmail.com> >> --- > > Note that the issue is not OOM the kernel (as the allocation is > attempted even after your patch), but having a way to > spill stack traces in the syslog. > > Acked-by: Eric Dumazet <eduma...@google.com>
Reviewed-by: Julian Calaby <julian.cal...@gmail.com> Thanks, -- Julian Calaby Email: julian.cal...@gmail.com Profile: http://www.google.com/profiles/julian.calaby/