From: Robin Holt <holt@sgi.com>
-[ Problem was fixed differently upstream. -DaveM ]
-
+[ Upstream fixed this in a different way as parts of the commits:
+ 8d987e5c7510 (net: avoid limits overflow)
+ a9febbb4bd13 (sysctl: min/max bounds are optional)
+ 27b3d80a7b6a (sysctl: fix min/max handling in __do_proc_doulongvec_minmax())
+ -DaveM ]
+
On a 16TB x86_64 machine, sysctl_tcp_mem[2], sysctl_udp_mem[2], and
sysctl_sctp_mem[2] can integer overflow. Set limit such that they are
maximized without overflowing.
From: Robin Holt <holt@sgi.com>
-[ Upstream fixed this in a different way. -DaveM ]
+[ Upstream fixed this in a different way as parts of the commits:
+ 8d987e5c7510 (net: avoid limits overflow)
+ a9febbb4bd13 (sysctl: min/max bounds are optional)
+ 27b3d80a7b6a (sysctl: fix min/max handling in __do_proc_doulongvec_minmax())
+ -DaveM ]
On a 16TB x86_64 machine, sysctl_tcp_mem[2], sysctl_udp_mem[2], and
sysctl_sctp_mem[2] can integer overflow. Set limit such that they are