| lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
|
Open Source and information security mailing list archives
| ||
|
Message-Id: <8EEC521A-CA38-4CE9-BCFD-BA6FC9A85D18@gmail.com> Date: Fri, 9 Dec 2011 13:04:34 -0500 From: Xi Wang <xi.wang@...il.com> To: Vladislav Yasevich <vladislav.yasevich@...com> Cc: netdev@...r.kernel.org, linux-sctp@...r.kernel.org, Andrew Morton <akpm@...ux-foundation.org>, Andrei Pelinescu-Onciul <andrei@...el.org>, "David S. Miller" <davem@...emloft.net> Subject: Re: [PATCH RESEND] sctp: fix incorrect overflow check on autoclose On Dec 9, 2011, at 12:38 PM, Vladislav Yasevich wrote: > I think this should be u32 since that's what sp->autoclose is. Do you mean something like this? min_t(u32, sp->autoclose, MAX_SCHEDULE_TIMEOUT / HZ) On 64-bit platform this would limit autoclose for no good reason to (u32)(MAX_SCHEDULE_TIMEOUT / HZ), which is basically 0x978d4fdf (assuming HZ is 250). I guess the intention was to allow autoclose to be any u32 on 64-bit platform. - xi -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists