On 01/19/2011 02:11 AM, Mike Snitzer wrote: > For Target Portal Group IDs occupying the full 2 bytes in the RTPG > response, the following group_id check in alua_rtpg() always fails > because 'ucp' is only a signed char: > if (h->group_id == (ucp[2] << 8) + ucp[3]) { > > Fix this signed char overflow by changing 'ucp' to an unsigned char > pointer (same type used for 'buff' member of alua_dh_data structure). > > Reported-by: Martin George <marting@xxxxxxxxxx> > Signed-off-by: Mike Snitzer <snitzer@xxxxxxxxxx> Acked-by: Hannes Reinecke <hare@xxxxxxx> Cheers, Hannes -- Dr. Hannes Reinecke zSeries & Storage hare@xxxxxxx +49 911 74053 688 SUSE LINUX Products GmbH, Maxfeldstr. 5, 90409 Nürnberg GF: Markus Rex, HRB 16746 (AG Nürnberg) -- To unsubscribe from this list: send the line "unsubscribe linux-scsi" in the body of a message to majordomo@xxxxxxxxxxxxxxx More majordomo info at http://vger.kernel.org/majordomo-info.html