kernel-fxtec-pro1x/include/net/sctp
Xi Wang 2692ba61a8 sctp: fix incorrect overflow check on autoclose
Commit 8ffd3208 voids the previous patches f6778aab and 810c0719 for
limiting the autoclose value.  If userspace passes in -1 on 32-bit
platform, the overflow check didn't work and autoclose would be set
to 0xffffffff.

This patch defines a max_autoclose (in seconds) for limiting the value
and exposes it through sysctl, with the following intentions.

1) Avoid overflowing autoclose * HZ.

2) Keep the default autoclose bound consistent across 32- and 64-bit
   platforms (INT_MAX / HZ in this patch).

3) Keep the autoclose value consistent between setsockopt() and
   getsockopt() calls.

Suggested-by: Vlad Yasevich <vladislav.yasevich@hp.com>
Signed-off-by: Xi Wang <xi.wang@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2011-12-19 16:25:46 -05:00
..
auth.h
checksum.h
command.h sctp: deal with multiple COOKIE_ECHO chunks 2011-09-16 17:17:22 -04:00
constants.h sctp: remove completely unsed EMPTY state 2011-04-20 01:51:03 -07:00
sctp.h include/net: Remove unnecessary semicolons 2011-06-05 14:33:40 -07:00
sm.h sctp: implement event notification SCTP_SENDER_DRY_EVENT 2011-04-21 10:35:44 -07:00
structs.h sctp: fix incorrect overflow check on autoclose 2011-12-19 16:25:46 -05:00
tsnmap.h
ulpevent.h sctp: ABORT if receive, reassmbly, or reodering queue is not empty while closing socket 2011-07-08 09:53:08 -07:00
ulpqueue.h
user.h sctp: Add socket option operation for Auto-ASCONF. 2011-06-02 02:04:53 -07:00