From 82acec1038c724ad8b633125507374ea67700649 Mon Sep 17 00:00:00 2001 From: Greg Kroah-Hartman Date: Wed, 8 Dec 2010 15:15:59 -0800 Subject: [PATCH] document a non-upstream patch better --- ...dp_mem-initializers-to-prevent-integer-overflows.patch | 8 ++++++-- ...dp_mem-initializers-to-prevent-integer-overflows.patch | 6 +++++- 2 files changed, 11 insertions(+), 3 deletions(-) diff --git a/review-2.6.27/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch b/review-2.6.27/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch index 7241a4eb01d..be5f372d126 100644 --- a/review-2.6.27/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch +++ b/review-2.6.27/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch @@ -5,8 +5,12 @@ Subject: Limit sysctl_tcp_mem and sysctl_udp_mem initializers to prevent integer From: Robin Holt -[ Problem was fixed differently upstream. -DaveM ] - +[ Upstream fixed this in a different way as parts of the commits: + 8d987e5c7510 (net: avoid limits overflow) + a9febbb4bd13 (sysctl: min/max bounds are optional) + 27b3d80a7b6a (sysctl: fix min/max handling in __do_proc_doulongvec_minmax()) + -DaveM ] + On a 16TB x86_64 machine, sysctl_tcp_mem[2], sysctl_udp_mem[2], and sysctl_sctp_mem[2] can integer overflow. Set limit such that they are maximized without overflowing. diff --git a/review-2.6.32/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch b/review-2.6.32/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch index f6a5acdd620..7ae4ca87aa2 100644 --- a/review-2.6.32/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch +++ b/review-2.6.32/limit-sysctl_tcp_mem-and-sysctl_udp_mem-initializers-to-prevent-integer-overflows.patch @@ -6,7 +6,11 @@ Subject: Limit sysctl_tcp_mem and sysctl_udp_mem initializers to prevent integer From: Robin Holt -[ Upstream fixed this in a different way. -DaveM ] +[ Upstream fixed this in a different way as parts of the commits: + 8d987e5c7510 (net: avoid limits overflow) + a9febbb4bd13 (sysctl: min/max bounds are optional) + 27b3d80a7b6a (sysctl: fix min/max handling in __do_proc_doulongvec_minmax()) + -DaveM ] On a 16TB x86_64 machine, sysctl_tcp_mem[2], sysctl_udp_mem[2], and sysctl_sctp_mem[2] can integer overflow. Set limit such that they are -- 2.47.3