From: Greg Kroah-Hartman Date: Wed, 8 Dec 2010 23:15:59 +0000 (-0800) Subject: document a non-upstream patch better X-Git-Tag: v2.6.27.57~2 X-Git-Url: http://git.ipfire.org/gitweb.cgi?a=commitdiff_plain;h=82acec1038c724ad8b633125507374ea67700649;p=thirdparty%2Fkernel%2Fstable-queue.git document a non-upstream patch better --- diff --git a/review-2.6.27/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch b/review-2.6.27/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch index 7241a4eb01d..be5f372d126 100644 --- a/review-2.6.27/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch +++ b/review-2.6.27/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch @@ -5,8 +5,12 @@ Subject: Limit sysctl_tcp_mem and sysctl_udp_mem initializers to prevent integer From: Robin Holt -[ Problem was fixed differently upstream. -DaveM ] - +[ Upstream fixed this in a different way as parts of the commits: + 8d987e5c7510 (net: avoid limits overflow) + a9febbb4bd13 (sysctl: min/max bounds are optional) + 27b3d80a7b6a (sysctl: fix min/max handling in __do_proc_doulongvec_minmax()) + -DaveM ] + On a 16TB x86_64 machine, sysctl_tcp_mem[2], sysctl_udp_mem[2], and sysctl_sctp_mem[2] can integer overflow. Set limit such that they are maximized without overflowing. diff --git a/review-2.6.32/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch b/review-2.6.32/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch index f6a5acdd620..7ae4ca87aa2 100644 --- a/review-2.6.32/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch +++ b/review-2.6.32/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch @@ -6,7 +6,11 @@ Subject: Limit sysctl_tcp_mem and sysctl_udp_mem initializers to prevent integer From: Robin Holt -[ Upstream fixed this in a different way. -DaveM ] +[ Upstream fixed this in a different way as parts of the commits: + 8d987e5c7510 (net: avoid limits overflow) + a9febbb4bd13 (sysctl: min/max bounds are optional) + 27b3d80a7b6a (sysctl: fix min/max handling in __do_proc_doulongvec_minmax()) + -DaveM ] On a 16TB x86_64 machine, sysctl_tcp_mem[2], sysctl_udp_mem[2], and sysctl_sctp_mem[2] can integer overflow. Set limit such that they are