Re: [patch] hpsa: fix an sprintf() overflow in the reset handler

2015-06-24 Thread Dan Carpenter
On Fri, Jun 19, 2015 at 07:13:47AM +, Seymour, Shane M wrote: > With a size of 48 while it won't overflow since you're using snprintf the > string with a maximum value in %d: > > echo -n "cmd 2147483647 RESET FAILED, new lockup detected" |wc -c > 48 I actually just chose 48 because it was di

RE: [patch] hpsa: fix an sprintf() overflow in the reset handler

2015-06-19 Thread Seymour, Shane M
lto:linux-scsi-ow...@vger.kernel.org] On Behalf Of Don Brace Sent: Thursday, June 18, 2015 11:36 PM To: Dan Carpenter Cc: James E.J. Bottomley; ISS StorageDev; dl Team ESD Storage Dev Support; linux-scsi@vger.kernel.org; kernel-janit...@vger.kernel.org Subject: RE: [patch] hpsa: fix an sprintf() o

RE: [patch] hpsa: fix an sprintf() overflow in the reset handler

2015-06-18 Thread Don Brace
rnel.org > Subject: [patch] hpsa: fix an sprintf() overflow in the reset handler > > The string "cmd %d RESET FAILED, new lockup detected" is not quite > large enough so the sprintf() will overflow. I have increased the size > of the buffer and also changed the sprintf

RE: [patch] hpsa: fix an sprintf() overflow in the reset handler

2015-06-18 Thread Don Brace
it...@vger.kernel.org > Subject: Re: [patch] hpsa: fix an sprintf() overflow in the reset handler > > > > Am 04.06.2015 16:47, schrieb Dan Carpenter: > > The string "cmd %d RESET FAILED, new lockup detected" is not quite > > large enough so the sprintf() will overf

Re: [patch] hpsa: fix an sprintf() overflow in the reset handler

2015-06-04 Thread walter harms
Am 04.06.2015 16:47, schrieb Dan Carpenter: > The string "cmd %d RESET FAILED, new lockup detected" is not quite > large enough so the sprintf() will overflow. I have increased the size > of the buffer and also changed the sprintf calls to snprintf. > > Fixes: 73153fe533bc ('hpsa: use block lay

[patch] hpsa: fix an sprintf() overflow in the reset handler

2015-06-04 Thread Dan Carpenter
The string "cmd %d RESET FAILED, new lockup detected" is not quite large enough so the sprintf() will overflow. I have increased the size of the buffer and also changed the sprintf calls to snprintf. Fixes: 73153fe533bc ('hpsa: use block layer tag for command allocation') Signed-off-by: Dan Carpe