[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.60.0708022211470.6774@poirot.grange>
Date: Thu, 2 Aug 2007 22:15:16 +0200 (CEST)
From: Guennadi Liakhovetski <g.liakhovetski@....de>
To: Jesper Juhl <jesper.juhl@...il.com>
cc: Jan Engelhardt <jengelh@...putergmbh.de>,
linux-kernel@...r.kernel.org
Subject: Re: gcc fixed size char array initialization bug - known?
On Thu, 2 Aug 2007, Jesper Juhl wrote:
> I believe Guennadi's point is that gcc does not warn about it in the
> case of c[4] = "0123"; but only in the case of c[4] = "01234" - so if
> we do have such initializations in the kernel we may have some bugs
> hiding there that gcc doesn't warn us about.
Exactly. Think of all structs with fixed-length char arrays (various
device name fields, etc.) static instances of which re scattered across
all possible drivers... Usually those strings should be long "enough", but
if someone manages to exactly hit the length, there won't be a warning.
Thanks
Guennadi
---
Guennadi Liakhovetski
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists