This is untrusted user data from vmci_host_do_send_datagram() so the
VMCI_DG_SIZE() macro can have an integer overflow.
Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
 
        BUILD_BUG_ON(sizeof(struct vmci_datagram) != 24);
 
-       if (VMCI_DG_SIZE(dg) > VMCI_MAX_DG_SIZE) {
+       if (dg->payload_size > VMCI_MAX_DG_SIZE ||
+           VMCI_DG_SIZE(dg) > VMCI_MAX_DG_SIZE) {
                pr_devel("Payload (size=%llu bytes) too big to send\n",
                         (unsigned long long)dg->payload_size);
                return VMCI_ERROR_INVALID_ARGS;