kernel_optimize_test/net/sctp
Andrei Pelinescu-Onciul da85b7396f sctp: fix integer overflow when setting the autoclose timer
When setting the autoclose timeout in jiffies there is a possible
integer overflow if the value in seconds is very large
(e.g. for 2^22 s with HZ=1024). The problem appears even on
64-bit due to the integer promotion rules. The fix is just a cast
 to unsigned long.

Signed-off-by: Andrei Pelinescu-Onciul <andrei@iptel.org>
Signed-off-by: Vlad Yasevich <vladislav.yasevich@hp.com>
2009-11-23 15:54:01 -05:00
..
associola.c sctp: fix integer overflow when setting the autoclose timer 2009-11-23 15:54:01 -05:00
auth.c
bind_addr.c
chunk.c
command.c
debug.c
endpointola.c
input.c
inqueue.c
ipv6.c
Kconfig
Makefile
objcnt.c
output.c sctp: Fix mis-ordering of user space data when multihoming in use 2009-11-23 15:54:00 -05:00
outqueue.c sctp: Update max.burst implementation 2009-11-23 15:54:00 -05:00
primitive.c
proc.c
protocol.c sctp: Update SWS avaoidance receiver side algorithm 2009-11-23 15:53:57 -05:00
sm_make_chunk.c sctp: Fix malformed "Invalid Stream Identifier" error 2009-11-23 15:53:56 -05:00
sm_sideeffect.c sctp: Update SWS avaoidance receiver side algorithm 2009-11-23 15:53:57 -05:00
sm_statefuns.c sctp: Remove useless last_time_used variable 2009-11-23 15:53:58 -05:00
sm_statetable.c
socket.c sctp: limit maximum autoclose setsockopt value 2009-11-23 15:54:01 -05:00
ssnmap.c
sysctl.c sctp: Update SWS avaoidance receiver side algorithm 2009-11-23 15:53:57 -05:00
transport.c sctp: Update max.burst implementation 2009-11-23 15:54:00 -05:00
tsnmap.c
ulpevent.c
ulpqueue.c