diff options
author | Frank Kühndel <frank.kuehndel@embedded-brains.de> | 2020-10-12 18:01:45 +0200 |
---|---|---|
committer | Sebastian Huber <sebastian.huber@embedded-brains.de> | 2020-10-15 19:14:48 +0200 |
commit | 529402f597184a735a691aa95fb32ab9a42946ef (patch) | |
tree | 64545f3fa03350e1e0e163d5385026f15239eb90 /cpukit/libmisc/shell/main_edit.c | |
parent | 2361b2c8cb73267342d603514d86b003932603a5 (diff) |
shell/shell.c: Fix illegal string copy
This is an illegal use of strcpy() because one is not allowed to
use this function with overlapping source and destination buffers;
whereas memmove() is explicitly designed to handle such cases.
The copiler warning was:
../../../cpukit/libmisc/shell/shell.c:626:13: warning:
'strcpy' accessing between 1 and 2147483645 bytes at offsets
0 and [1, 2147483647] may overlap up to 2147483644 bytes at
offset [1, 2147483644] [-Wrestrict]
Diffstat (limited to 'cpukit/libmisc/shell/main_edit.c')
0 files changed, 0 insertions, 0 deletions