Skip to content
Commit f6302f1b authored by Dan Carpenter's avatar Dan Carpenter Committed by Jens Axboe
Browse files

relay: prevent integer overflow in relay_open()



"subbuf_size" and "n_subbufs" come from the user and they need to be
capped to prevent an integer overflow.

Signed-off-by: default avatarDan Carpenter <dan.carpenter@oracle.com>
Cc: stable@kernel.org
Signed-off-by: default avatarJens Axboe <axboe@kernel.dk>
parent 306df071
0% or .
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment