From mboxrd@z Thu Jan 1 00:00:00 1970 From: David Miller Subject: Re: [PATCH net-next 1/2] neigh: prevent overflowing params in /proc/sys/net/ipv4/neigh/ Date: Fri, 26 Jul 2013 14:22:31 -0700 (PDT) Message-ID: <20130726.142231.339341472515071199.davem@davemloft.net> References: Mime-Version: 1.0 Content-Type: Text/Plain; charset=us-ascii Content-Transfer-Encoding: 7bit Cc: netdev@vger.kernel.org To: ffusco@redhat.com Return-path: Received: from shards.monkeyblade.net ([149.20.54.216]:37616 "EHLO shards.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1760631Ab3GZVWf (ORCPT ); Fri, 26 Jul 2013 17:22:35 -0400 In-Reply-To: Sender: netdev-owner@vger.kernel.org List-ID: From: Francesco Fusco Date: Wed, 24 Jul 2013 10:39:06 +0200 > Without this patch, the fields app_solicit, gc_thresh1, gc_thresh2, > gc_thresh3, proxy_qlen, ucast_solicit, mcast_solicit could have > assumed negative values when setting large numbers. > > Signed-off-by: Francesco Fusco Applied.