diff options
| author | Adhemerval Zanella Netto <adhemerval.zanella@linaro.org> | 2023-07-25 12:16:41 -0300 |
|---|---|---|
| committer | Adhemerval Zanella <adhemerval.zanella@linaro.org> | 2023-07-26 10:45:49 -0300 |
| commit | 784ae968113011ce832b1808d4d42369f5d2e320 (patch) | |
| tree | 71eeb7adf838ac6c472d955d2e63e6066ce66780 /string/explicit_bzero.c | |
| parent | dbc4b032dc5c4ef0c46e9de23c46b1698bad4412 (diff) | |
| download | glibc-784ae968113011ce832b1808d4d42369f5d2e320.tar.xz glibc-784ae968113011ce832b1808d4d42369f5d2e320.zip | |
string: Fix tester build with fortify enable with gcc 6
When building with fortify enabled, GCC 6 issues an warning the fortify
wrapper might overflow the destination buffer. However, GCC does not
provide a specific flag to disable the warning (the failure is tied to
-Werror). So to avoid disable all errors, only enable the check for
GCC 7 or newer.
Checked on i686-linux-gnu.
Reviewed-by: Carlos O'Donell <carlos@redhat.com>
Diffstat (limited to 'string/explicit_bzero.c')
0 files changed, 0 insertions, 0 deletions
