https://bugzilla.novell.com/show_bug.cgi?id=234347 ------- Comment #5 from dcb314@hotmail.com 2007-01-24 07:36 MST ------- (In reply to comment #4)
there is a general problem with the *_chk functions that they are optimized and do long word reads ... reading over the end of strings.
This is an unexpected answer. valgrind doesn't report merely reading uninitialised memory, only using that memory in conditions.
Since they are aligned before these reads can never cross a page boundary, so this strcpy/stpcpy implementation should be safe as-is.
Most surprising. So can I confirm that you are sure that the strings are sufficiently short that they never cross a page boundary, independent of their location in memory ? -- Configure bugmail: https://bugzilla.novell.com/userprefs.cgi?tab=email ------- You are receiving this mail because: ------- You are on the CC list for the bug, or are watching someone who is.