On Sun, May 19, 2013 at 8:02 PM, Tony Mechelynck
<[email protected]> wrote:
> Compiling on linux_x86_64:
>
> gcc -c -I. -Iproto -DHAVE_CONFIG_H   -I/usr/local/include  -O2
> -fno-strength-reduce -Wall -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=1 -o
> objects/regexp.o regexp.c
> In file included from regexp.c:7749:0:
> regexp_nfa.c: In function ‘nfa_regatom’:
> regexp_nfa.c:762:6: warning: cast to pointer from integer of different size
> [-Wint-to-pointer-cast]
> regexp_nfa.c:773:6: warning: cast to pointer from integer of different size
> [-Wint-to-pointer-cast]
> regexp_nfa.c:819:7: warning: cast to pointer from integer of different size
> [-Wint-to-pointer-cast]
> regexp_nfa.c: In function ‘nfa_regpiece’:
> regexp_nfa.c:1366:7: warning: cast to pointer from integer of different size
> [-Wint-to-pointer-cast]
> In file included from /usr/include/string.h:642:0,
>                  from os_unix.h:522,
>                  from vim.h:268,
>                  from regexp.c:47:
> In function ‘strcpy’,
>     inlined from ‘nfa_recognize_char_class.constprop.24’ at
> regexp_nfa.c:379:5:
> /usr/include/bits/string3.h:105:3: warning: call to __builtin___strcpy_chk
> will always overflow destination buffer [enabled by default]
>
> The above is with "tiny" features but "huge" features give me the same (with
> a much longer gcc command line).

Same here on Mac OS X 10.6.8 --with-features=big:

gcc -c -I. -Iproto -DHAVE_CONFIG_H   -DMACOS_X_UNIX -no-cpp-precomp
-g -O2 -U_FORTIFY_SOURCE -D_FORTIFY_SOURCE=1       -o objects/regexp.o
regexp.c
In file included from regexp.c:7749:
regexp_nfa.c: In function ‘nfa_regatom’:
regexp_nfa.c:762: warning: cast to pointer from integer of different size
regexp_nfa.c:773: warning: cast to pointer from integer of different size
regexp_nfa.c:819: warning: cast to pointer from integer of different size
regexp_nfa.c: In function ‘nfa_regpiece’:
regexp_nfa.c:1366: warning: cast to pointer from integer of different size
regexp_nfa.c: In function ‘nfa_regatom’:
regexp_nfa.c:379: warning: call to __builtin___strcpy_chk will always
overflow destination buffer

-- 
-- 
You received this message from the "vim_dev" maillist.
Do not top-post! Type your reply below the text you are replying to.
For more information, visit http://www.vim.org/maillist.php

--- 
You received this message because you are subscribed to the Google Groups 
"vim_dev" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.


Raspunde prin e-mail lui