slist: buffer overflow in debugging code
commit9a2a72148457e9c58b0825ed97d0b4ac374b3eac
authorDan Carpenter <dan.carpenter@oracle.com>
Tue, 22 May 2012 11:50:57 +0000 (22 14:50 +0300)
committerDan Carpenter <dan.carpenter@oracle.com>
Tue, 22 May 2012 11:50:57 +0000 (22 14:50 +0300)
treef63f5b1a1cc07b27704b44bb6471757acecdd992
parenta7387dd3c4f429cfb9ee82f78ed85f5cab1e1c70
slist: buffer overflow in debugging code

In the kernel, passing a negative to snprintf() just triggers a WARN_ONCE()
but doesn't cause a buffer overflow.  In user space it causes a buffer
overflow.

Signed-off-by: Dan Carpenter <dan.carpenter@oracle.com>
smatch_slist.c