diff options
author | Eric Dumazet <edumazet@google.com> | 2015-02-09 07:39:13 +0300 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2015-02-09 08:54:09 +0300 |
commit | 93c1af6ca94c1e763efba76a127b5c135e3d23a6 (patch) | |
tree | 80725b4e6f7b9d10689a7d8a0132db7113d04a30 /net | |
parent | acde2c2d28c8afee41eb67ee1cbf9e47a3f3e475 (diff) | |
download | linux-93c1af6ca94c1e763efba76a127b5c135e3d23a6.tar.xz |
net:rfs: adjust table size checking
Make sure root user does not try something stupid.
Also make sure mask field in struct rps_sock_flow_table
does not share a cache line with the potentially often dirtied
flow table.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Fixes: 567e4b79731c ("net: rfs: add hash collision detection")
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'net')
-rw-r--r-- | net/core/sysctl_net_core.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/net/core/sysctl_net_core.c b/net/core/sysctl_net_core.c index 7a31be5e361f..eaa51ddf2368 100644 --- a/net/core/sysctl_net_core.c +++ b/net/core/sysctl_net_core.c @@ -52,7 +52,7 @@ static int rps_sock_flow_sysctl(struct ctl_table *table, int write, if (write) { if (size) { - if (size > 1<<30) { + if (size > 1<<29) { /* Enforce limit to prevent overflow */ mutex_unlock(&sock_flow_mutex); return -EINVAL; |