fs/ntfs3: Harden against integer overflows
Smatch complains that the "add_bytes" is not to be trusted. Use
size_add() to prevent an integer overflow.
Fixes: be71b5cba2
("fs/ntfs3: Add attrib operations")
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Konstantin Komarov <almaz.alexandrovich@paragon-software.com>
This commit is contained in:
parent
4f1dc7d975
commit
e001e60869
|
@ -107,7 +107,7 @@ static int ntfs_read_ea(struct ntfs_inode *ni, struct EA_FULL **ea,
|
||||||
return -EFBIG;
|
return -EFBIG;
|
||||||
|
|
||||||
/* Allocate memory for packed Ea. */
|
/* Allocate memory for packed Ea. */
|
||||||
ea_p = kmalloc(size + add_bytes, GFP_NOFS);
|
ea_p = kmalloc(size_add(size, add_bytes), GFP_NOFS);
|
||||||
if (!ea_p)
|
if (!ea_p)
|
||||||
return -ENOMEM;
|
return -ENOMEM;
|
||||||
|
|
||||||
|
|
Loading…
Reference in New Issue