Commit: 26ef5a951e8111d360586f1169b8fac2dc2cb613
Parent: e77884accdb22268eb65374fc96c35d9f8788d32
Author: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Committer: Luiz Augusto von Dentz <luiz.von.dentz@intel.com>
Date: 2025-02-04 19:51:52
Tree: 6a0ff10e02c954ceb8ed83576fdb6fb82cc4ebe1

build: Enable -Wstringop-overflow and -D_FORTIFY_SOURCE=3 This enables -Wstringop-overflow compiler warnings: 'Warn for calls to string manipulation functions such as "memcpy" and "strcpy" that are determined to overflow the destination buffer.' Along with -D_FORTIFY_SOURCE=3 so the errors like the following can be captured: In function ‘read’, inlined from ‘serial_read_callback’ at emulator/serial.c:90:8: /usr/include/bits/unistd.h:32:10: error: ‘__read_alias’ specified size between 18446744073709490177 and 18446744073709551615 exceeds maximum object size 9223372036854775807 [-Werror=stringop-overflow=] 32 | return __glibc_fortify (read, __nbytes, sizeof (char), | ^~~~~~~~~~~~~~~

Diffstat

M acinclude.m4 | 2 ++

1 files changed, 2 insertions(+), 0 deletions(-)

View Full Diff | Patch