> From: Neil Horman > Currently, sctp associations latch a sockets autoclose value to an association > at association init time, subject to capping constraints from the max_autoclose > sysctl value. This leads to an odd situation where an application may set a > socket level autoclose timeout, but sliently sctp will limit the autoclose > timeout to something less than that. > > Fix this by modifying the autoclose setsockopt function to check the limit, cap > it and warn the user via syslog that the timeout is capped. This will allow > getsockopt to return valid autoclose timeout values that reflect what subsequent > associations actually use. ... > + if (sp->autoclose > net->sctp.max_autoclose) { > + pr_warn("Capping autoclose value %d to defined maximum of %lu\n", > + sp->autoclose, net->sctp.max_autoclose); > + sp->autoclose = net->sctp.max_autoclose; > + } Is it really reasonable to allow a user to spam syslog this way? David -- To unsubscribe from this list: send the line "unsubscribe linux-sctp" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html