Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.0 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 971DDC169C4 for ; Tue, 29 Jan 2019 20:35:02 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 6643E20881 for ; Tue, 29 Jan 2019 20:35:02 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727388AbfA2UfB (ORCPT ); Tue, 29 Jan 2019 15:35:01 -0500 Received: from mx1.redhat.com ([209.132.183.28]:2251 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727010AbfA2UfB (ORCPT ); Tue, 29 Jan 2019 15:35:01 -0500 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.phx2.redhat.com [10.5.11.16]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B248D58E23 for ; Tue, 29 Jan 2019 20:35:01 +0000 (UTC) Received: from steved.boston.devel.redhat.com (ovpn-116-222.phx2.redhat.com [10.3.116.222]) by smtp.corp.redhat.com (Postfix) with ESMTP id 656065C239 for ; Tue, 29 Jan 2019 20:35:01 +0000 (UTC) From: Steve Dickson To: Linux NFS Mailing list Subject: [PATCH] nfs-utils: Removed new error=format-overflow=2 errors Date: Tue, 29 Jan 2019 15:34:59 -0500 Message-Id: <20190129203459.38815-1-steved@redhat.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 2.79 on 10.5.11.16 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Tue, 29 Jan 2019 20:35:01 +0000 (UTC) Sender: linux-nfs-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-nfs@vger.kernel.org With the latest C99-compliant gcc printf, sprintf, etc now only support up to 4k in buffer sizes. There were only a couple places that had to change to not violated this new restriction Signed-off-by: Steve Dickson --- utils/blkmapd/device-discovery.c | 2 +- utils/mount/error.c | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/utils/blkmapd/device-discovery.c b/utils/blkmapd/device-discovery.c index 3a202e0..2ce60f8 100644 --- a/utils/blkmapd/device-discovery.c +++ b/utils/blkmapd/device-discovery.c @@ -239,7 +239,7 @@ int bl_discover_devices(void) { FILE *f; int n; - char buf[PATH_MAX], devname[PATH_MAX], fulldevname[PATH_MAX+NAME_MAX]; + char buf[PATH_MAX], devname[NAME_MAX], fulldevname[PATH_MAX]; /* release previous list */ bl_release_disk(); diff --git a/utils/mount/error.c b/utils/mount/error.c index dfe5c7d..562f312 100644 --- a/utils/mount/error.c +++ b/utils/mount/error.c @@ -50,8 +50,8 @@ extern char *progname; -static char errbuf[BUFSIZ]; -static char *erreob = &errbuf[BUFSIZ]; +static char errbuf[PATH_MAX]; +static char *erreob = &errbuf[PATH_MAX]; /* Convert RPC errors into strings */ static int rpc_strerror(int spos) -- 2.20.1