lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Tue, 5 May 2009 10:23:44 +0200
From:	Christoph Hellwig <hch@....de>
To:	Geert Uytterhoeven <geert@...ux-m68k.org>
Cc:	xfs-masters@....sgi.com,
	Linux Kernel Development <linux-kernel@...r.kernel.org>
Subject: Re: [xfs-masters] fs/xfs/xfs_mount.c:1483: warning: array subscript is above array bounds

On Tue, May 05, 2009 at 10:05:05AM +0200, Geert Uytterhoeven wrote:
> 
> http://kisskb.ellerman.id.au/kisskb/buildresult/407608/:
> fs/xfs/xfs_mount.c:1483: warning: array subscript is above array bounds
> 
> xfs_mod_sb(xfs_trans_t *tp, __int64_t fields)
> {
> 	xfs_sb_field_t  f;
> 
> 	...
> 	first = xfs_sb_info[f].offset;
> 	...
> }
> 
> xfs_sb_field_t is an enum with 47 values.
> xfs_sb_info[] has at least 47 entries.

That's the conclusion I came to.   I also see similar bogus warnings in
a couple of other places in a full kernel build (not in xfs).

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ