LVS
lvs-devel
Google
 
Web LinuxVirtualServer.org

Re: [PATCH net] ipvs: prevent integer overflow in do_ip_vs_get_ctl()

To: Dan Carpenter <dan.carpenter@xxxxxxxxxx>
Subject: Re: [PATCH net] ipvs: prevent integer overflow in do_ip_vs_get_ctl()
Cc: "Gustavo A. R. Silva" <gustavo@xxxxxxxxxxxxxx>, Simon Horman <horms@xxxxxxxxxxxx>, Julian Anastasov <ja@xxxxxx>, Pablo Neira Ayuso <pablo@xxxxxxxxxxxxx>, Jozsef Kadlecsik <kadlec@xxxxxxxxxxxxx>, "David S. Miller" <davem@xxxxxxxxxxxxx>, Eric Dumazet <edumazet@xxxxxxxxxx>, Jakub Kicinski <kuba@xxxxxxxxxx>, Paolo Abeni <pabeni@xxxxxxxxxx>, netdev@xxxxxxxxxxxxxxx, lvs-devel@xxxxxxxxxxxxxxx, netfilter-devel@xxxxxxxxxxxxxxx, coreteam@xxxxxxxxxxxxx, linux-kernel@xxxxxxxxxxxxxxx, kernel-janitors@xxxxxxxxxxxxxxx
From: Jan Engelhardt <ej@xxxxxxx>
Date: Fri, 7 Mar 2025 15:06:38 +0100 (CET)
On Friday 2025-03-07 14:44, Dan Carpenter wrote:
>       case IP_VS_SO_GET_SERVICES:
>       {
>               struct ip_vs_get_services *get;
>-              int size;
>+              size_t size;
> 
>               get = (struct ip_vs_get_services *)arg;
>               size = struct_size(get, entrytable, get->num_services);
>               if (*len != size) {
>-                      pr_err("length: %u != %u\n", *len, size);
>+                      pr_err("length: %u != %lu\n", *len, size);

size_t wants %z not %l.


<Prev in Thread] Current Thread [Next in Thread>