diff options
author | Gerrit Renker <gerrit@erg.abdn.ac.uk> | 2008-07-21 13:35:08 -0700 |
---|---|---|
committer | David S. Miller <davem@davemloft.net> | 2008-07-21 13:35:08 -0700 |
commit | 47112e25da41d9059626033986dc3353e101f815 (patch) | |
tree | 72857968c318960ba50a4cc7232041228e8361dc /Documentation | |
parent | 6579e57b31d79d31d9b806e41ba48774e73257dc (diff) |
udplite: Protection against coverage value wrap-around
This patch clamps the cscov setsockopt values to a maximum of 0xFFFF.
Setsockopt values greater than 0xffff can cause an unwanted
wrap-around. Further, IPv6 jumbograms are not supported (RFC 3838,
3.5), so that values greater than 0xffff are not even useful.
Further changes: fixed a typo in the documentation.
Signed-off-by: Gerrit Renker <gerrit@erg.abdn.ac.uk>
Signed-off-by: David S. Miller <davem@davemloft.net>
Diffstat (limited to 'Documentation')
-rw-r--r-- | Documentation/networking/udplite.txt | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/Documentation/networking/udplite.txt b/Documentation/networking/udplite.txt index 3870f280280..855d8da57a2 100644 --- a/Documentation/networking/udplite.txt +++ b/Documentation/networking/udplite.txt @@ -148,7 +148,7 @@ getsockopt(sockfd, SOL_SOCKET, SO_NO_CHECK, &value, ...); is meaningless (as in TCP). Packets with a zero checksum field are - illegal (cf. RFC 3828, sec. 3.1) will be silently discarded. + illegal (cf. RFC 3828, sec. 3.1) and will be silently discarded. 4) Fragmentation |