Return-path: Received: from shards.monkeyblade.net ([149.20.54.216]:55762 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753192AbcBXSpY (ORCPT ); Wed, 24 Feb 2016 13:45:24 -0500 Date: Wed, 24 Feb 2016 13:45:21 -0500 (EST) Message-Id: <20160224.134521.961009575129127582.davem@davemloft.net> (sfid-20160224_194534_316569_59049A93) To: xiyou.wangcong@gmail.com Cc: netdev@vger.kernel.org, dvyukov@google.com, linux-wireless@vger.kernel.org, julian.calaby@gmail.com, eric.dumazet@gmail.com, lauro.venancio@openbossa.org, aloisio.almeida@openbossa.org, sameo@linux.intel.com Subject: Re: [PATCH v2 net] nfc: use GFP_USER for user-controlled kmalloc From: David Miller In-Reply-To: References: <1454095465-16685-1-git-send-email-xiyou.wangcong@gmail.com> Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Sender: linux-wireless-owner@vger.kernel.org List-ID: From: Cong Wang Date: Wed, 24 Feb 2016 10:41:29 -0800 > On Fri, Jan 29, 2016 at 11:24 AM, Cong Wang wrote: >> These two functions are called in sendmsg path, and the >> 'len' is passed from user-space, so we should not allow >> malicious users to OOM kernel on purpose. >> >> Reported-by: Dmitry Vyukov >> Cc: Lauro Ramos Venancio >> Cc: Aloisio Almeida Jr >> Cc: Samuel Ortiz >> Signed-off-by: Cong Wang > > Ping... > > David, this patch seems still not applied, I guess you expect NFC > maintainer to take it, but this doesn't happen. Could you take it? The NFC maintainer needs to take this, ping them explicitly if you have to. Thanks.