RDMA/amso1100: Check for integer overflow in c2_alloc_cq_buf()
authorDan Carpenter <dan.carpenter@oracle.com>
Tue, 12 Aug 2014 23:20:04 +0000 (19:20 -0400)
committerRoland Dreier <roland@purestorage.com>
Wed, 13 Aug 2014 05:00:03 +0000 (22:00 -0700)
commit859976da0307618d1169616f9cb03936716106eb
treed7b5e0e805a0411553495476cd8f56482c23ba70
parent64aa90f26c06e1cb2aacfb98a7d0eccfbd6c1a91
RDMA/amso1100: Check for integer overflow in c2_alloc_cq_buf()

This is a static checker fix.  The static checker says that q_size comes
from the user and can be any 32 bit value.  The call tree is:
  --> ib_uverbs_create_cq()
      --> c2_create_cq()
          --> c2_init_cq()

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Doug Ledford <dledford@redhat.com>
Signed-off-by: Roland Dreier <roland@purestorage.com>
drivers/infiniband/hw/amso1100/c2_cq.c