relay: prevent integer overflow in relay_open()
authorDan Carpenter <dan.carpenter@oracle.com>
Fri, 10 Feb 2012 08:03:58 +0000 (09:03 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 20 Feb 2012 20:46:16 +0000 (12:46 -0800)
commita0cbc2da8ed19f3affb50a249dc16a04d5d6f42f
tree9e0c4af403a96b43a2340d6765fe04013ff60c92
parent736020248ccb92a11af037e1cec4a2c79946be8a
relay: prevent integer overflow in relay_open()

commit f6302f1bcd75a042df69866d98b8d775a668f8f1 upstream.

"subbuf_size" and "n_subbufs" come from the user and they need to be
capped to prevent an integer overflow.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
kernel/relay.c