| 1234567891011121314151617181920212223242526272829303132333435363738394041 | From b5c3206190f1fddd100b3060eb15f0d775ffeab8 Mon Sep 17 00:00:00 2001From: Dan Carpenter <dan.carpenter@oracle.com>Date: Fri, 25 Nov 2016 14:03:55 +0300Subject: [PATCH] sparc64: make string buffers large enoughMy static checker complains that if "lvl" is ULONG_MAX (this is 64 bit)then some of the strings will overflow.  I don't know if that's possiblebut it seems simple enough to make the buffers slightly larger.Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>Signed-off-by: David S. Miller <davem@davemloft.net>Signed-off-by: Waldemar Brodkorb <wbx@openadk.org>--- arch/sparc/kernel/traps_64.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)diff --git a/arch/sparc/kernel/traps_64.c b/arch/sparc/kernel/traps_64.cindex 4094a51..496fa92 100644--- a/arch/sparc/kernel/traps_64.c+++ b/arch/sparc/kernel/traps_64.c@@ -85,7 +85,7 @@ static void dump_tl1_traplog(struct tl1_traplog *p)  void bad_trap(struct pt_regs *regs, long lvl) {-	char buffer[32];+	char buffer[36]; 	siginfo_t info;  	if (notify_die(DIE_TRAP, "bad trap", regs,@@ -116,7 +116,7 @@ void bad_trap(struct pt_regs *regs, long lvl)  void bad_trap_tl1(struct pt_regs *regs, long lvl) {-	char buffer[32];+	char buffer[36]; 	 	if (notify_die(DIE_TRAP_TL1, "bad trap tl1", regs, 		       0, lvl, SIGTRAP) == NOTIFY_STOP)-- 2.1.4
 |