commit | 9d3fcde90f85fce9e769825730020e1f97a80bbf | [log] [tgz] |
---|---|---|
author | Eric Dumazet <edumazet@google.com> | Tue Feb 12 12:26:27 2019 -0800 |
committer | Greg Kroah-Hartman <gregkh@linuxfoundation.org> | Thu Dec 05 15:35:13 2019 +0100 |
tree | f9e7892cc3a63cc8794d782f925814c3ea7102c9 | |
parent | a253f13ad902926b07b7156878ac18bde3769e5c [diff] |
net: fix possible overflow in __sk_mem_raise_allocated() [ Upstream commit 5bf325a53202b8728cf7013b72688c46071e212e ] With many active TCP sockets, fat TCP sockets could fool __sk_mem_raise_allocated() thanks to an overflow. They would increase their share of the memory, instead of decreasing it. Signed-off-by: Eric Dumazet <edumazet@google.com> Signed-off-by: David S. Miller <davem@davemloft.net> Signed-off-by: Sasha Levin <sashal@kernel.org>