Signed-off-by: Rémi Bernon rbernon@codeweavers.com ---
FWIW the issue here is the same as in the other patches sent earlier, where GCC warns about an non-initialized buffer being passed as a pointer to const, probably assuming that it is then an input parameter and that uninitialized data might be read from it.
dlls/kernelbase/tests/path.c | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-)
diff --git a/dlls/kernelbase/tests/path.c b/dlls/kernelbase/tests/path.c index 1c0c8a2318b..dc0d3cc1184 100644 --- a/dlls/kernelbase/tests/path.c +++ b/dlls/kernelbase/tests/path.c @@ -1189,7 +1189,7 @@ static void test_PathCchCanonicalize(void)
static void test_PathCchCanonicalizeEx(void) { - WCHAR path_inW[PATHCCH_MAX_CCH + 1], path_outW[PATHCCH_MAX_CCH]; + WCHAR path_inW[PATHCCH_MAX_CCH + 1] = {0}, path_outW[PATHCCH_MAX_CCH]; CHAR path_outA[4096]; BOOL skip_new_flags = TRUE; HRESULT hr;