relay: prevent integer overflow in relay_open()
authorDan Carpenter <dan.carpenter@oracle.com>
Fri, 10 Feb 2012 08:03:58 +0000 (09:03 +0100)
committerGreg Kroah-Hartman <gregkh@linuxfoundation.org>
Mon, 20 Feb 2012 20:48:10 +0000 (12:48 -0800)
commit4ac2f3d3f1d4a08ad6a450127c4b0f590fe28bdf
tree5d8920dba4905232f9f3adff147883126d61c4c9
parent9a3626a437ddbc0d8e60bda9480739cd850bb48f
relay: prevent integer overflow in relay_open()

commit f6302f1bcd75a042df69866d98b8d775a668f8f1 upstream.

"subbuf_size" and "n_subbufs" come from the user and they need to be
capped to prevent an integer overflow.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Signed-off-by: Jens Axboe <axboe@kernel.dk>
Signed-off-by: Greg Kroah-Hartman <gregkh@linuxfoundation.org>
kernel/relay.c