diff options
author | Paul Eggert <eggert@cs.ucla.edu> | 2011-04-17 21:13:51 -0700 |
---|---|---|
committer | Paul Eggert <eggert@cs.ucla.edu> | 2011-04-17 21:13:51 -0700 |
commit | bfd1c7811d3661512b382906334ac959d332735b (patch) | |
tree | 7ec57551a9d6f60d53705cb5d410b56fc1e033d2 /src/alloc.c | |
parent | 83998b7a924b8362ec0c5650aa2c2911ac96cf70 (diff) | |
download | emacs-bfd1c7811d3661512b382906334ac959d332735b.tar.gz |
* alloc.c (string_overrun_cookie): Now const. Use initializers that
don't formally overflow signed char, to avoid warnings.
Diffstat (limited to 'src/alloc.c')
-rw-r--r-- | src/alloc.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/src/alloc.c b/src/alloc.c index 8e0cf5d43e1..2029383dec8 100644 --- a/src/alloc.c +++ b/src/alloc.c @@ -1628,8 +1628,8 @@ static EMACS_INT total_string_size; presence of this cookie during GC. */ #define GC_STRING_OVERRUN_COOKIE_SIZE 4 -static char string_overrun_cookie[GC_STRING_OVERRUN_COOKIE_SIZE] = - { 0xde, 0xad, 0xbe, 0xef }; +static char const string_overrun_cookie[GC_STRING_OVERRUN_COOKIE_SIZE] = + { '\xde', '\xad', '\xbe', '\xef' }; #else #define GC_STRING_OVERRUN_COOKIE_SIZE 0 |