On Mon, May 02, 2016 at 10:44:28AM +0200, Jan Matejka wrote: > > In function 'strncpy', > > inlined from 'rip_fill_authentication.isra.9' at > > ../../../proto/rip/packets.c:215:5: > > /usr/include/bits/string3.h:126:10: error: call to __builtin___strncpy_chk > > will always overflow destination buffer > > return __builtin___strncpy_chk (__dest, __src, __len, __bos (__dest)); > > ^ > > make[1]: *** [packets.o] Error 1 > > Thanks for your report, we will address it, it seems to be a real bug in > auth.
Well, IMHO it is not a bug but a false positive, see: http://bird.network.cz/pipermail/bird-users/2015-October/009966.html Although we could use there some less tricky construct. -- Elen sila lumenn' omentielvo Ondrej 'Santiago' Zajicek (email: [email protected]) OpenPGP encrypted e-mails preferred (KeyID 0x11DEADC3, wwwkeys.pgp.net) "To err is human -- to blame it on a computer is even more so."
signature.asc
Description: Digital signature
