diff options
| author | Martin Schwidefsky <[email protected]> | 2011-04-27 07:34:33 +0000 |
|---|---|---|
| committer | Martin Schwidefsky <[email protected]> | 2011-04-27 07:34:45 +0000 |
| commit | ed961581a7ca91d6a4852af2e44333e983100505 (patch) | |
| tree | 8d3b2cf0b718879b802fc28f4eac9f3020fc3d1c /security/selinux/hooks.c | |
| parent | Linux 2.6.39-rc5 (diff) | |
| download | kernel-ed961581a7ca91d6a4852af2e44333e983100505.tar.gz kernel-ed961581a7ca91d6a4852af2e44333e983100505.zip | |
[S390] prng: fix pointer arithmetic
The git commit c708c57e247775928b9a6bce7b4d8d14883bf39b fixed the
access beyond the end of the stack in prng_seed but the pointer
arithmetic is still incorrect. The calculation has been off by
a factor of 64, now it is only off by a factor of 8. prng_seed
is called with a maximum of 16 for nbytes, small enough that
the incorrect calculation stays insides the limits of the stack.
Place parentheses for correct pointer arithmetic.
Signed-off-by: Martin Schwidefsky <[email protected]>
Diffstat (limited to 'security/selinux/hooks.c')
0 files changed, 0 insertions, 0 deletions
