From 203f2b73e256c779a3ab73c5dc5efafd3d46f8e1 Mon Sep 17 00:00:00 2001 From: Martin Sebor Date: Wed, 22 Apr 2020 09:30:37 -0600 Subject: [PATCH] Fix an ILP32 failure. gcc/testsuite/ChangeLog: PR middle-end/94647 * c-c++-common/Warray-bounds-2.c: Replace a large value harcoded in an expected warning with a pattern. --- gcc/testsuite/ChangeLog | 6 ++++++ gcc/testsuite/c-c++-common/Warray-bounds-2.c | 2 +- 2 files changed, 7 insertions(+), 1 deletion(-) diff --git a/gcc/testsuite/ChangeLog b/gcc/testsuite/ChangeLog index 34669b2..e60da71 100644 --- a/gcc/testsuite/ChangeLog +++ b/gcc/testsuite/ChangeLog @@ -1,3 +1,9 @@ +2020-04-22 Martin Sebor + + PR middle-end/94647 + * c-c++-common/Warray-bounds-2.c: Replace a large value harcoded + in an expected warning with a pattern. + 2020-04-22 Christophe Lyon * lib/target-supports.exp (check_effective_target_arm_dsp) diff --git a/gcc/testsuite/c-c++-common/Warray-bounds-2.c b/gcc/testsuite/c-c++-common/Warray-bounds-2.c index 8c6e0a6..7400a29 100644 --- a/gcc/testsuite/c-c++-common/Warray-bounds-2.c +++ b/gcc/testsuite/c-c++-common/Warray-bounds-2.c @@ -189,7 +189,7 @@ void call_strncpy_src_diff_max_m1 (char *d, const char *s, size_t n) static void wrap_strncpy_src_diff_max (char *d, const char *s, ptrdiff_t i, size_t n) { - strncpy (d, s + i, n); /* { dg-warning "pointer overflow between offset 9223372036854775807 and size \\\[1, 0]" } */ + strncpy (d, s + i, n); /* { dg-warning "pointer overflow between offset \[0-9\]+ and size \\\[1, 0]" } */ } void call_strncpy_src_diff_max (char *d, const char *s, size_t n) -- 2.7.4