diff options
| author | Jeff Layton <jlayton@kernel.org> | 2023-02-27 14:39:27 -0500 |
|---|---|---|
| committer | Luc Van Oostenryck <luc.vanoostenryck@gmail.com> | 2023-12-18 14:04:46 +0100 |
| commit | adceff0ab6e3d8bf43de52e2c2fbebf27db30deb (patch) | |
| tree | 54b012a888edca87c8ecc020f1bded92622f5d58 | |
| parent | 98b203419679a4ccb224ff6a48ed39119faf8d71 (diff) | |
| download | sparse-dev-adceff0ab6e3d8bf43de52e2c2fbebf27db30deb.tar.gz | |
linearize.c: fix buffer overrun warning from fortify
The resulting string from snprintf, won't be nearly 64 bytes, but "buf"
is only 16 bytes long here. This causes FORTIFY_SOURCE to complain when
given the right options.
Signed-off-by: Jeff Layton <jlayton@kernel.org>
Signed-off-by: Luc Van Oostenryck <luc.vanoostenryck@gmail.com>
| -rw-r--r-- | linearize.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/linearize.c b/linearize.c index d9aed61b..1db2d505 100644 --- a/linearize.c +++ b/linearize.c @@ -91,7 +91,7 @@ const char *show_label(struct basic_block *bb) if (!bb) return ".L???"; - snprintf(buf, 64, ".L%u", bb->nr); + snprintf(buf, 16, ".L%u", bb->nr); return buf; } |
