Home
last modified time | relevance | path

Searched hist:"363 e0df0" (Results 1 – 1 of 1) sorted by relevance

/openbmc/linux/fs/nfs/
H A Dcallback_xdr.c363e0df0 Thu Jan 12 01:16:14 CST 2012 Dan Carpenter <dan.carpenter@oracle.com> nfs: check for integer overflow in decode_devicenotify_args()

On 32 bit, if n is too large then "n * sizeof(*args->devs)" could
overflow and args->devs would be smaller than expected.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
363e0df0 Thu Jan 12 01:16:14 CST 2012 Dan Carpenter <dan.carpenter@oracle.com> nfs: check for integer overflow in decode_devicenotify_args()

On 32 bit, if n is too large then "n * sizeof(*args->devs)" could
overflow and args->devs would be smaller than expected.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>