[PATCH] shell32: use flexible arrays to avoid fortify failures
Alexandre Julliard
julliard at winehq.org
Sun Sep 19 07:58:42 CDT 2010
Mike Frysinger <vapier at gentoo.org> writes:
> Newer versions of gcc/glibc with fortify checks enabled will complain
> about the handling of the network's szNames field. Currently it is
> always defined with a length of one which means writing more then a
> single byte will trigger:
> In function 'strcpy', inlined from '_ILCreateEntireNetwork' at
> dlls/shell32/pidl.c:1762:15:
> warning: call to __builtin___strcpy_chk will always overflow destination buffer
> and then at runtime, we hit an abort().
>
> Since this field is really serving as the header to an arbitrary buffer,
> using a flexible array instead should solve the issue.
What you want is ANYSIZE_ARRAY, which already exists.
--
Alexandre Julliard
julliard at winehq.org
More information about the wine-devel
mailing list