Search String: Display: Description: Sort:

Results:

References: [ +subject:/^(?:^\s*(re|sv|fwd|fw)[\[\]\d]*[:>-]+\s*)*\[PATCH\]\s+ipvs\:\s+Fix\s+signed\s+integer\s+overflow\s+when\s+setsockopt\s+timeout\s*$/: 3 ]

Total 3 documents matching your query.

1. Re: [PATCH] ipvs: Fix signed integer overflow when setsockopt timeout (score: 1)
Author: Simon Horman <horms@xxxxxxxxxxxx>
Date: Mon, 14 Jan 2019 13:15:13 +0100
Thanks, this looks good to me. Pablo, could you consider applying this to nf? Acked-by: Simon Horman <horms@xxxxxxxxxxxx>
/html/lvs-devel/2019-01/msg00009.html (12,476 bytes)

2. Re: [PATCH] ipvs: Fix signed integer overflow when setsockopt timeout (score: 1)
Author: "zhangxiaoxu (A)" <zhangxiaoxu5@xxxxxxxxxx>
Date: Mon, 14 Jan 2019 15:34:15 +0800
ping? Reproduce program: include <stdio.h> include <sys/types.h> include <sys/socket.h> /* The argument to IP_VS_SO_GET_TIMEOUT */ struct ipvs_timeout_t { int tcp_timeout; int tcp_fin_timeout; int ud
/html/lvs-devel/2019-01/msg00008.html (11,387 bytes)

3. [PATCH] ipvs: Fix signed integer overflow when setsockopt timeout (score: 1)
Author: ZhangXiaoxu <zhangxiaoxu5@xxxxxxxxxx>
Date: Thu, 10 Jan 2019 16:39:06 +0800
There is a UBSAN bug report as below: UBSAN: Undefined behaviour in net/netfilter/ipvs/ip_vs_ctl.c:2227:21 signed integer overflow: -2147483647 * 1000 cannot be represented in type 'int' Reproduce pr
/html/lvs-devel/2019-01/msg00007.html (10,886 bytes)


This search system is powered by Namazu