On Fri, 23 Mar 2007, Eric Dumazet wrote:

> -     if (max_loop < 1 || max_loop > 256) {
> -             printk(KERN_WARNING "loop: invalid max_loop (must be between"
> -                                 " 1 and 256), using default (8)\n");
> +     if (max_loop < 1) {
> +             printk(KERN_WARNING "loop: invalid max_loop (must be > 1)"
> +                                 ", using default (8)\n");
>               max_loop = 8;
>       }
[...]
> +     loop_dev = kmalloc(max_loop * sizeof(struct loop_device *), GFP_KERNEL);
> +     if (!loop_dev) {
> +             loop_dev = vmalloc(max_loop * sizeof(struct loop_device *));
> +             if (!loop_dev)
> +                     goto out_mem;
> +             loop_dev_vmalloced = 1;
>       }

Why did you remove the upper bound check for max_loop value? Now you 
effectively allow to max_loop * sizeof(struct loop_device *) to overflow, 
when passed value of max_loop which is large enough. Or am I just blind?

The "while (nbl < max_loop)" which immediately follows is then going to 
corrupt memory, right?

-- 
Jiri Kosina
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to [EMAIL PROTECTED]
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Reply via email to