diff options
author | Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> | 2014-08-06 00:02:34 +0400 |
---|---|---|
committer | Jozsef Kadlecsik <kadlec@blackhole.kfki.hu> | 2014-08-24 21:33:10 +0400 |
commit | 1b05756c48ea07ced9604ef01d11194d936da163 (patch) | |
tree | dc983e436607c9280f3d2bcea831d61d1e572b1a /include/linux/netfilter | |
parent | 94729f8a1e9d38c8df6c83799fde8d2eaef2ff54 (diff) | |
download | linux-1b05756c48ea07ced9604ef01d11194d936da163.tar.xz |
netfilter: ipset: Fix warn: integer overflows 'sizeof(*map) + size * set->dsize'
Dan Carpenter reported that the static checker emits the warning
net/netfilter/ipset/ip_set_list_set.c:600 init_list_set()
warn: integer overflows 'sizeof(*map) + size * set->dsize'
Limit the maximal number of elements in list type of sets.
Signed-off-by: Jozsef Kadlecsik <kadlec@blackhole.kfki.hu>
Diffstat (limited to 'include/linux/netfilter')
-rw-r--r-- | include/linux/netfilter/ipset/ip_set_list.h | 1 |
1 files changed, 1 insertions, 0 deletions
diff --git a/include/linux/netfilter/ipset/ip_set_list.h b/include/linux/netfilter/ipset/ip_set_list.h index 68c2aea897f5..fe2622a00151 100644 --- a/include/linux/netfilter/ipset/ip_set_list.h +++ b/include/linux/netfilter/ipset/ip_set_list.h @@ -6,5 +6,6 @@ #define IP_SET_LIST_DEFAULT_SIZE 8 #define IP_SET_LIST_MIN_SIZE 4 +#define IP_SET_LIST_MAX_SIZE 65536 #endif /* __IP_SET_LIST_H */ |