Bug 80672 - bad source code
bad source code
Status: CLOSED RAWHIDE
Product: Red Hat Linux
Classification: Retired
Component: gv (Show other bugs)
8.0
All Linux
medium Severity medium
: ---
: ---
Assigned To: Dan Williams
David Lawrence
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2002-12-29 12:32 EST by d.binderman
Modified: 2007-04-18 12:49 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2004-05-18 14:35:24 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description d.binderman 2002-12-29 12:32:11 EST
From Bugzilla Helper:
User-Agent: Mozilla/4.6 [en-gb]C-CCK-MCD NetscapeOnline.co.uk  (Win98; I)

Description of problem:

Hello there,

I have just tried to compile package gv-3.5.8-18 from Redhat 8.0

I got the following messages from the compiler.

cc: Info: process.c, line 291: In this statement, an array is being accessed outside the bounds specified for the array type. (subscrbounds)

Here is an untested patch to shut up the compiler.

./source/process.c.old ./source/process.c
*** ./source/process.c.old	Sun Dec 15 14:40:47 2002
--- ./source/process.c	Sun Dec 15 14:41:03 2002
***************
*** 272,278 ****
     pid = fork();
  
     if (pid == 0) { /* child */
!       char *argv[3];
        char *c;
  
        INFMESSAGE(child process)
--- 272,278 ----
     pid = fork();
  
     if (pid == 0) { /* child */
!       char *argv[ 4];
        char *c;
  
        INFMESSAGE(child process)


Version-Release number of selected component (if applicable):


How reproducible:
Always

Steps to Reproduce:
1. compile with Compaq C compiler or any C compiler that
does literal constant array index checking.
2.
3.
    

Additional info:
Comment 1 Dan Williams 2004-05-18 14:35:24 EDT
Should be fixed in 3.5.8-27

Note You need to log in before you can comment on or make changes to this bug.