diff options
| author | 2017-08-16 10:36:47 -0700 | |
|---|---|---|
| committer | 2017-08-16 16:28:47 -0700 | |
| commit | 81fbfe8adaf38d4f5a98c19bebfd41c5d6acaee8 (patch) | |
| tree | d6b6fc17c19f0df3e916e55726dee279c055deb6 /net/unix/af_unix.c | |
| parent | dccp: defer ccid_hc_tx_delete() at dismantle time (diff) | |
| download | wireguard-linux-81fbfe8adaf38d4f5a98c19bebfd41c5d6acaee8.tar.xz wireguard-linux-81fbfe8adaf38d4f5a98c19bebfd41c5d6acaee8.zip | |
ptr_ring: use kmalloc_array()
As found by syzkaller, malicious users can set whatever tx_queue_len
on a tun device and eventually crash the kernel.
Lets remove the ALIGN(XXX, SMP_CACHE_BYTES) thing since a small
ring buffer is not fast anyway.
Fixes: 2e0ab8ca83c1 ("ptr_ring: array based FIFO for pointers")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Reported-by: Dmitry Vyukov <dvyukov@google.com>
Cc: Michael S. Tsirkin <mst@redhat.com>
Cc: Jason Wang <jasowang@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net/unix/af_unix.c')
0 files changed, 0 insertions, 0 deletions
