diff options
author | Rikard Falkeborn <rikard.falkeborn@gmail.com> | 2016-09-17 17:13:51 +0200 |
---|---|---|
committer | Andrew Gregory <andrew.gregory.8@gmail.com> | 2017-05-09 05:27:43 +0200 |
commit | 22cadea56aa4a991db5c97bc81b7ed60702269aa (patch) | |
tree | a4965cbd2840e4123a24f9ae2c349c41cce9bc23 /HACKING | |
parent | eca2e0f5edb5bee464c7173834c5a5972919d041 (diff) | |
download | pacman-22cadea56aa4a991db5c97bc81b7ed60702269aa.tar.gz pacman-22cadea56aa4a991db5c97bc81b7ed60702269aa.tar.xz |
Fix gcc strict-overflow error
Recent gcc (tested with 6.2.1) produces the following error when
compiling with both --enable-warningflags and --enable-debug.
In particular, it seems it is the combination of GCC_STACK_PROTECT_LIB
and -Wstrict-overflow=5 produces the error.
be_local.c:609:4: error: assuming signed overflow does not occur
when simplifying conditional
[-Werror=strict-overflow]
if(count > 0) {
Fix this by changing the type of count from int to size_t, which is
fine since count is never negative.
Signed-off-by: Rikard Falkeborn <rikard.falkeborn@gmail.com>
Signed-off-by: Allan McRae <allan@archlinux.org>
(cherry picked from commit 34f3f1e7a640488c4c32a3a825813afc1ad2ed68)
Diffstat (limited to 'HACKING')
0 files changed, 0 insertions, 0 deletions