From 80a83a56b52e833e6d3afec4d0723d7625d52cee Mon Sep 17 00:00:00 2001 From: jvoisin Date: Wed, 27 Dec 2023 12:36:47 +0100 Subject: Don't check for overlapping in strncpy/stpncpy for now They check overlap across the whole range of the given length, but the given length is not what will actually be copied, rather it's the maximum length (if src is shorter, only length of src will be copied). This triggers false positives and traps where it shouldn't (e.g. in ICU tests). Reported-by: q66 --- tests/test_stpncpy_overwrite_under.c | 2 ++ 1 file changed, 2 insertions(+) (limited to 'tests/test_stpncpy_overwrite_under.c') diff --git a/tests/test_stpncpy_overwrite_under.c b/tests/test_stpncpy_overwrite_under.c index 5625ff8..845ae29 100644 --- a/tests/test_stpncpy_overwrite_under.c +++ b/tests/test_stpncpy_overwrite_under.c @@ -3,6 +3,7 @@ #include int main(int argc, char** argv) { +#if 0 char buffer[9] = {'A', 'A', 'A', 'A', 'B', 'B', 'B', 'B', '\0'}; puts(buffer); @@ -11,5 +12,6 @@ int main(int argc, char** argv) { CHK_FAIL_END puts(buffer); +#endif return ret; } -- cgit v1.3