![]() |
lvs-devel
|
To: | Dan Carpenter <dan.carpenter@xxxxxxxxxx> |
---|---|
Subject: | Re: [PATCH net] ipvs: prevent integer overflow in do_ip_vs_get_ctl() |
Cc: | "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>, Simon Horman <horms@xxxxxxxxxxxx>, Julian Anastasov <ja@xxxxxx>, Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>, Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx>, "David S. Miller" <davem@xxxxxxxxxxxxx>, Eric Dumazet <edumazet@xxxxxxxxxx>, Jakub Kicinski <kuba@xxxxxxxxxx>, Paolo Abeni <pabeni@xxxxxxxxxx>, netdev@xxxxxxxxxxxxxxx, lvs-devel@xxxxxxxxxxxxxxx, netfilter-devel@xxxxxxxxxxxxxxx, coreteam@xxxxxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx, kernel-janitors@xxxxxxxxxxxxxxx |
From: | Jan Engelhardt <ej@xxxxxxx> |
Date: | Fri, 7 Mar 2025 15:06:38 +0100 (CET) |
On Friday 2025-03-07 14:44, Dan Carpenter wrote: > case IP_VS_SO_GET_SERVICES: > { > struct ip_vs_get_services *get; >- int size; >+ size_t size; > > get = (struct ip_vs_get_services *)arg; > size = struct_size(get, entrytable, get->num_services); > if (*len != size) { >- pr_err("length: %u != %u\n", *len, size); >+ pr_err("length: %u != %lu\n", *len, size); size_t wants %z not %l. |
<Prev in Thread] | Current Thread | [Next in Thread> |
---|---|---|
|
Previous by Date: | [PATCH net] ipvs: prevent integer overflow in do_ip_vs_get_ctl(), Dan Carpenter |
---|---|
Next by Date: | Re: [PATCH net] ipvs: prevent integer overflow in do_ip_vs_get_ctl(), Julian Anastasov |
Previous by Thread: | [PATCH net] ipvs: prevent integer overflow in do_ip_vs_get_ctl(), Dan Carpenter |
Next by Thread: | Re: [PATCH net] ipvs: prevent integer overflow in do_ip_vs_get_ctl(), Julian Anastasov |
Indexes: | [Date] [Thread] [Top] [All Lists] |