diff options
author | Eric Dumazet <edumazet@google.com> | 2023-10-25 14:10:37 +0000 |
---|---|---|
committer | Paolo Abeni <pabeni@redhat.com> | 2023-11-02 09:31:02 +0100 |
commit | 1726483b79a72e0150734d5367e4a0238bf8fcff (patch) | |
tree | e96b21b63b8acfc1acfe7afd583b20ea1be6154c /include | |
parent | 61e4a86600029e6e8d468d1fad6b6c749bebed19 (diff) | |
download | linux-stable-1726483b79a72e0150734d5367e4a0238bf8fcff.tar.gz linux-stable-1726483b79a72e0150734d5367e4a0238bf8fcff.tar.bz2 linux-stable-1726483b79a72e0150734d5367e4a0238bf8fcff.zip |
inet: shrink struct flowi_common
I am looking at syzbot reports triggering kernel stack overflows
involving a cascade of ipvlan devices.
We can save 8 bytes in struct flowi_common.
This patch alone will not fix the issue, but is a start.
Fixes: 24ba14406c5c ("route: Add multipath_hash in flowi_common to make user-define hash")
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: wenxu <wenxu@ucloud.cn>
Reviewed-by: David Ahern <dsahern@kernel.org>
Link: https://lore.kernel.org/r/20231025141037.3448203-1-edumazet@google.com
Signed-off-by: Paolo Abeni <pabeni@redhat.com>
Diffstat (limited to 'include')
-rw-r--r-- | include/net/flow.h | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/include/net/flow.h b/include/net/flow.h index 7f0adda3bf2f..335bbc52171c 100644 --- a/include/net/flow.h +++ b/include/net/flow.h @@ -40,8 +40,8 @@ struct flowi_common { #define FLOWI_FLAG_KNOWN_NH 0x02 __u32 flowic_secid; kuid_t flowic_uid; - struct flowi_tunnel flowic_tun_key; __u32 flowic_multipath_hash; + struct flowi_tunnel flowic_tun_key; }; union flowi_uli { |