diff options
author | Prarit Bhargava <[email protected]> | 2008-07-21 10:15:22 -0400 |
---|---|---|
committer | Ingo Molnar <[email protected]> | 2008-07-23 16:45:15 +0200 |
commit | 05d3ed0a1fe3ea05ab9f3b8d32576a0bc2e19660 (patch) | |
tree | 22bd4eb8e45d9a3c07ac7de5de3b30121820c4db /net/unix/sysctl_net_unix.c | |
parent | c010b2f76c3032e48097a6eef291d8593d5d79a6 (diff) |
x86, pci: iommu fix potential overflow in alloc_iommu()
It is possible that alloc_iommu()'s boundary_size overflows as
dma_get_seg_boundary can return 0xffffffff. In that case, further usage of
boundary_size triggers a BUG_ON() in the iommu code.
Signed-off-by: Prarit Bhargava <[email protected]>
Signed-off-by: Ingo Molnar <[email protected]>
Diffstat (limited to 'net/unix/sysctl_net_unix.c')
0 files changed, 0 insertions, 0 deletions