Problem: Coverity warning for strcpy() into fixed size array.
Solution: Add a type cast to hopefully silence the bogus warning.
static void
set_ufunc_name(ufunc_T *fp, char_u *name)
{
- STRCPY(fp->uf_name, name);
+ // Add a type cast to avoid a warning for an overflow, the uf_name[] array
+ // actually extends beyond the struct.
+ STRCPY((void *)fp->uf_name, name);
if (name[0] == K_SPECIAL)
{
static int included_patches[] =
{ /* Add new patch number below this line */
+/**/
+ 2456,
/**/
2455,
/**/