From 784ae968113011ce832b1808d4d42369f5d2e320 Mon Sep 17 00:00:00 2001 From: Adhemerval Zanella Netto Date: Tue, 25 Jul 2023 12:16:41 -0300 Subject: string: Fix tester build with fortify enable with gcc 6 When building with fortify enabled, GCC 6 issues an warning the fortify wrapper might overflow the destination buffer. However, GCC does not provide a specific flag to disable the warning (the failure is tied to -Werror). So to avoid disable all errors, only enable the check for GCC 7 or newer. Checked on i686-linux-gnu. Reviewed-by: Carlos O'Donell --- string/tester.c | 9 +++++++++ 1 file changed, 9 insertions(+) (limited to 'string') diff --git a/string/tester.c b/string/tester.c index da42c72141..f7d4bac5a8 100644 --- a/string/tester.c +++ b/string/tester.c @@ -385,8 +385,17 @@ test_strncat (void) (void) strcpy (one, "gh"); (void) strcpy (two, "ef"); + /* When building with fortify enabled, GCC 6 issues an warning the fortify + wrapper might overflow the destination buffer. However, GCC does not + provide a specific flag to disable the warning (the failure is tied to + -Werror). So to avoid disable all errors, only enable the check for + GCC 7 or newer. */ +#if __GNUC_PREREQ (7, 0) (void) strncat (one, two, 99); equal (one, "ghef", 5); /* Basic test encore. */ +#else + equal (one, "gh", 2); +#endif equal (two, "ef", 6); /* Stomped on source? */ (void) strcpy (one, ""); -- cgit 1.4.1