------- You are receiving this mail because: -------
You are on the CC list for the bug.
http://bugs.exim.org/show_bug.cgi?id=790
--- Comment #2 from Ling Meng <ling.meng@???> 2008-12-11 22:47:17 ---
From Coverity Prevent documentation:
" The STACK_USE checker finds many instances of overall stack use exceeding a
configured maximum (default 32768 bytes), or of a single stack use exceeding a
configured maximum (default 1024 bytes). ... To enable this checker, use the
analysis option --enable STACK_USE. ... stack_use_local_overflow — A single
local variable exceeded the configured maximum stack size (default 1024 bytes).
"
-----Original Message-----
From: admin@??? [
mailto:admin@bugs.exim.org] On Behalf Of Nuno Lopes
Sent: Thursday, December 11, 2008 2:05 PM
To: Meng.Ling
Subject: [Bug 790] Stack Use
------- You are receiving this mail because: -------
You reported the bug.
http://bugs.exim.org/show_bug.cgi?id=790
Nuno Lopes <nunoplopes@???> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |nunoplopes@???
--- Comment #1 from Nuno Lopes <nunoplopes@???> 2008-12-11 22:05:03 ---
I've grep'ed through the C99 specification and I couldn't find any reference to
that 1024 bytes limit.
Moreover, I also have access to a coverity scan (PHP) and we don't have report
about PCRE at the moment.
So, don't you have some custom checkers in place that are triggering those
warnings? Could you please point me to a document that specifies that arbitrary
limitation for each local variable?
--
Configure bugmail:
http://bugs.exim.org/userprefs.cgi?tab=email
--
Configure bugmail:
http://bugs.exim.org/userprefs.cgi?tab=email