relay: prevent integer overflow in relay_open()
authorDan Carpenter <dan.carpenter@oracle.com>
Fri, 10 Feb 2012 08:03:58 +0000 (09:03 +0100)
committerJens Axboe <axboe@kernel.dk>
Fri, 10 Feb 2012 08:04:49 +0000 (09:04 +0100)
commitf6302f1bcd75a042df69866d98b8d775a668f8f1
tree06319873d688c602ef353120f94f63c3da85dfd1
parent306df0716aa285d378cc948fafed53c6ed895fe6
relay: prevent integer overflow in relay_open()

"subbuf_size" and "n_subbufs" come from the user and they need to be
capped to prevent an integer overflow.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: Jens Axboe <axboe@kernel.dk>
kernel/relay.c