From 2cb3be76bf1435326984907d1fa04b6238dd0a03 Mon Sep 17 00:00:00 2001 From: Willy Tarreau Date: Tue, 24 May 2022 07:43:57 +0200 Subject: [PATCH] CLEANUP: init: address a coverity warning about possible multiply overflow In issue #1585 Coverity suspects a risk of multiply overflow when calculating the SSL cache size, though in practice the cache is limited to 2^32 anyway thus it cannot really happen. Nevertheless, casting the operation should be sufficient to avoid marking it as a false positive. --- src/haproxy.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/src/haproxy.c b/src/haproxy.c index 1d6612619e..130bc9b354 100644 --- a/src/haproxy.c +++ b/src/haproxy.c @@ -2302,7 +2302,7 @@ static void init(int argc, char **argv) int64_t mem = global.rlimit_memmax * 1048576ULL; int retried = 0; - mem -= global.tune.sslcachesize * 200; // about 200 bytes per SSL cache entry + mem -= global.tune.sslcachesize * 200ULL; // about 200 bytes per SSL cache entry mem -= global.maxzlibmem; mem = mem * MEM_USABLE_RATIO; -- 2.39.5