lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Mon, 28 Jan 2013 23:16:23 -0500 (EST) From: David Miller <davem@...emloft.net> To: raise.sail@...il.com Cc: netdev@...r.kernel.org, eric.dumazet@...il.com, panweiping3@...il.com, bingtian.ly@...bao.com Subject: Re: [PATCH net-next] avoid to hang up on sending since sysctl configuration overflow. From: Li Yu <raise.sail@...il.com> Date: Thu, 24 Jan 2013 14:35:28 +0800 > From: bingtian.ly@...bao.com > > I found if we write large than 4GB value to some sysctl variables, > the sending syscall will hang up forever, because of these variables > are 32 bits, such large value bring them overflow to 0 or negative. > > This patch try to fix overflow or prevent from zero value setup > of below sysctl variables: > > net.core.wmem_default > net.core.rmem_default > > net.core.rmem_max > net.core.wmem_max > > net.ipv4.udp_rmem_min > net.ipv4.udp_wmem_min > > net.ipv4.tcp_wmem > net.ipv4.tcp_rmem > > Signed-off-by: Eric Dumazet <eric.dumazet@...il.com> > Signed-off-by: Li Yu <raise.sail@...il.com> Applied, thanks. -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists