diff options
author | Prarit Bhargava <prarit@redhat.com> | 2008-07-21 10:15:22 -0400 |
---|---|---|
committer | Ingo Molnar <mingo@elte.hu> | 2008-07-23 16:45:15 +0200 |
commit | 05d3ed0a1fe3ea05ab9f3b8d32576a0bc2e19660 (patch) | |
tree | 22bd4eb8e45d9a3c07ac7de5de3b30121820c4db /arch/arm/mach-ks8695 | |
parent | c010b2f76c3032e48097a6eef291d8593d5d79a6 (diff) |
x86, pci: iommu fix potential overflow in alloc_iommu()
It is possible that alloc_iommu()'s boundary_size overflows as
dma_get_seg_boundary can return 0xffffffff. In that case, further usage of
boundary_size triggers a BUG_ON() in the iommu code.
Signed-off-by: Prarit Bhargava <prarit@redhat.com>
Signed-off-by: Ingo Molnar <mingo@elte.hu>
Diffstat (limited to 'arch/arm/mach-ks8695')
0 files changed, 0 insertions, 0 deletions