------- Comment #4 from pinskia at gcc dot gnu dot org  2009-06-22 05:34 -------
as witness from:
In function ‘char* strncpy(char*, const char*, size_t)’,
    inlined from ‘void pat_read_waveheader(FILE*, WaveHeader*, int)’ at
t.cc:7132:40:
t.cc:1965:94: warning: call to char* __builtin___strncpy_chk(char*, const
char*, long unsigned int, long unsigned int) will always overflow destination
buffer


If I add an obvious check for block being NULL.


-- 


http://gcc.gnu.org/bugzilla/show_bug.cgi?id=40502


Reply via email to