aboutsummaryrefslogtreecommitdiffstatshomepage
diff options
authorJeff Layton <jlayton@kernel.org>2023-02-27 14:39:27 -0500
committerLuc Van Oostenryck <luc.vanoostenryck@gmail.com>2023-12-18 14:04:46 +0100
commitadceff0ab6e3d8bf43de52e2c2fbebf27db30deb (patch)
tree54b012a888edca87c8ecc020f1bded92622f5d58
parent98b203419679a4ccb224ff6a48ed39119faf8d71 (diff)
downloadsparse-dev-adceff0ab6e3d8bf43de52e2c2fbebf27db30deb.tar.gz
linearize.c: fix buffer overrun warning from fortify
The resulting string from snprintf, won't be nearly 64 bytes, but "buf" is only 16 bytes long here. This causes FORTIFY_SOURCE to complain when given the right options. Signed-off-by: Jeff Layton <jlayton@kernel.org> Signed-off-by: Luc Van Oostenryck <luc.vanoostenryck@gmail.com>
-rw-r--r--linearize.c2
1 files changed, 1 insertions, 1 deletions
diff --git a/linearize.c b/linearize.c
index d9aed61b..1db2d505 100644
--- a/linearize.c
+++ b/linearize.c
@@ -91,7 +91,7 @@ const char *show_label(struct basic_block *bb)
if (!bb)
return ".L???";
- snprintf(buf, 64, ".L%u", bb->nr);
+ snprintf(buf, 16, ".L%u", bb->nr);
return buf;
}