Hi Cong On Sat, Jan 30, 2016 at 6:46 AM, Eric Dumazet <eric.dumazet@xxxxxxxxx> wrote: > On Fri, 2016-01-29 at 11:24 -0800, Cong Wang wrote: >> These two functions are called in sendmsg path, and the >> 'len' is passed from user-space, so we should not allow >> malicious users to OOM kernel on purpose. >> >> Reported-by: Dmitry Vyukov <dvyukov@xxxxxxxxxx> >> Cc: Lauro Ramos Venancio <lauro.venancio@xxxxxxxxxxxxx> >> Cc: Aloisio Almeida Jr <aloisio.almeida@xxxxxxxxxxxxx> >> Cc: Samuel Ortiz <sameo@xxxxxxxxxxxxxxx> >> Signed-off-by: Cong Wang <xiyou.wangcong@xxxxxxxxx> >> --- > > Note that the issue is not OOM the kernel (as the allocation is > attempted even after your patch), but having a way to > spill stack traces in the syslog. > > Acked-by: Eric Dumazet <edumazet@xxxxxxxxxx> Reviewed-by: Julian Calaby <julian.calaby@xxxxxxxxx> Thanks, -- Julian Calaby Email: julian.calaby@xxxxxxxxx Profile: http://www.google.com/profiles/julian.calaby/ -- To unsubscribe from this list: send the line "unsubscribe linux-wireless" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html