From: Hans-Peter Nilsson Date: Thu, 16 Nov 2023 02:50:31 +0000 (+0100) Subject: gcc.dg/Wnonnull-4.c: Handle new overflow warning for 32-bit targets [PR112419] X-Git-Tag: basepoints/gcc-15~3936 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=0d51e17791c7876396ed0f6cc51bf103e518877d;p=thirdparty%2Fgcc.git gcc.dg/Wnonnull-4.c: Handle new overflow warning for 32-bit targets [PR112419] PR testsuite/112419 * gcc.dg/Wnonnull-4.c (test_fda_n_5): Expect warning for exceeding maximum object size for 32-bit targets. --- diff --git a/gcc/testsuite/gcc.dg/Wnonnull-4.c b/gcc/testsuite/gcc.dg/Wnonnull-4.c index 1f14fbba45df..d63e76da70a2 100644 --- a/gcc/testsuite/gcc.dg/Wnonnull-4.c +++ b/gcc/testsuite/gcc.dg/Wnonnull-4.c @@ -142,6 +142,7 @@ void test_fda_n_5 (int r_m1) T ( 1); // { dg-bogus "argument 2 of variable length array 'double\\\[n]\\\[5]' is null but the corresponding bound argument 1 value is 1" } T ( 9); // { dg-bogus "argument 2 of variable length array 'double\\\[n]\\\[5]' is null but the corresponding bound argument 1 value is 9" } T (max); // { dg-bogus "argument 2 of variable length array 'double\\\[n]\\\[5]' is null but the corresponding bound argument 1 value is \\d+" } +// { dg-warning "size 4294967256 exceeds maximum object size" "" { target ilp32 } .-1 } }