Re: [PATCH] usb: usbtest: avoid integer overflow in alloc_sglist()

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Fri, Apr 06, 2012 at 05:30:12PM -0400, Xi Wang wrote:
> On Apr 6, 2012, at 5:18 PM, Greg Kroah-Hartman wrote:
> > How does that avoid the overflow?  We still would have allocated a huge
> > chunk, which would not be good.  How about bounding the size of nents
> > instead?
> 
> kmalloc_array() checks for integer overflow.  I agree with you that it's
> better to have a tight limit.  We might also need to bound iterations to
> avoid overflow: context.count = param->sglen * param->iterations.
> 
> How about limit them to 1024?

Is that a realistic number?  Would the userspace tool still work fine
with that?

thanks,

greg k-h
--
To unsubscribe from this list: send the line "unsubscribe linux-usb" in
the body of a message to majordomo@xxxxxxxxxxxxxxx
More majordomo info at  http://vger.kernel.org/majordomo-info.html


[Index of Archives]     [Linux Media]     [Linux Input]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]     [Old Linux USB Devel Archive]

  Powered by Linux