http://gcc.gnu.org/bugzilla/show_bug.cgi?id=52617

Manuel López-Ibáñez <manu at gcc dot gnu.org> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|UNCONFIRMED                 |RESOLVED
                 CC|                            |manu at gcc dot gnu.org
         Resolution|                            |INVALID

--- Comment #2 from Manuel López-Ibáñez <manu at gcc dot gnu.org> 2012-05-09 
13:11:56 UTC ---
This is not a bug, but a feature. If the result of strlen fits in the target
type, no warning is given. If you make s1 a signed char and strlen a very very
long string, then you get an overflow warning.

Reply via email to