commit | cb4644cac4a2797afc847e6c92736664d4b0ea34 | [log] [tgz] |
---|---|---|
author | Jens Axboe <jaxboe@fusionio.com> | Wed Nov 10 14:36:25 2010 +0100 |
committer | Jens Axboe <jaxboe@fusionio.com> | Wed Nov 10 14:40:43 2010 +0100 |
tree | 14170d74d5040be49af14b484f252d888141a99f | |
parent | f3f63c1c28bc861a931fac283b5bc3585efb8967 [diff] |
bio: take care not overflow page count when mapping/copying user data If the iovec is being set up in a way that causes uaddr + PAGE_SIZE to overflow, we could end up attempting to map a huge number of pages. Check for this invalid input type. Reported-by: Dan Rosenberg <drosenberg@vsecurity.com> Cc: stable@kernel.org Signed-off-by: Jens Axboe <jaxboe@fusionio.com>