Thanks Orion! FWIW, we've already fixed this post-1.7.3; it'll be in the 1.7.4 release.
The code location for this opal_output() also moved; it's now in btl_usnic_stats.c, if you care. On Dec 4, 2013, at 12:32 PM, Orion Poplawski <or...@cora.nwra.com> wrote: > The attached patch fixes this issue. > > > -------- Original Message -------- > Subject: [Bug 1037231] New: openmpi FTBFS if "-Werror=format-security" flag > is used > Date: Tue, 03 Dec 2013 03:26:30 +0000 > From: bugzi...@redhat.com > To: or...@cora.nwra.com > > https://bugzilla.redhat.com/show_bug.cgi?id=1037231 > > Bug ID: 1037231 > Summary: openmpi FTBFS if "-Werror=format-security" flag is > used > Product: Fedora > Version: rawhide > Component: openmpi > Assignee: dledf...@redhat.com > Reporter: dkho...@redhat.com > QA Contact: extras...@fedoraproject.org > CC: dakin...@gmail.com, dledf...@redhat.com, > fenla...@redhat.com, or...@cora.nwra.com > > > > > Description of problem > ---------------------- > > openmpi fails to build if "-Werror=format-security" flag is used. > > ... > > btl_usnic_module.c:829:5: error: format not a string literal and no format > arguments [-Werror=format-security] > > ... > > We are working on a proposal to enable "-Werror=format-security" for all > packages. Once this flag is enabled, GCC will refuse to compile code that > could > be vulnerable to a string format security flaw. For more details, please see > https://fedorahosted.org/fesco/ticket/1185 page. > > To understand why it is important to fix this, please see > https://fedoraproject.org/wiki/Format-Security-FAQ page. > > How to fix this > --------------- > > The fix for these errors is quite simple. It's a matter of changing a > line like, > > printf(foo); > > to read, > > printf("%s", foo); > > That's it. > > Please fix this issue in rawhide with a patch (which you should submit > to upstream to merge moving forward). Please do a new build with the > fix in rawhide. Other releases do not need to be directly fixed, but > there should be no harm in pushing out this fix/patch with other needed > changes to those branches. > > In the event you don't fix this bug before the next mass rebuild, > provenpackagers may step in and update your package(s) to fix this > issue. > > How reproducible > ---------------- > > Build openmpi-1.7.3-1.fc21.src.rpm with "-Werror=format-security" flag to > reproduce the problem. > > To make this process easier, you can use a modified "redhat-rpm-config" > package > from http://people.fedoraproject.org/~halfie/artifacts/redhat-rpm-config/ URL. > > $ sha256sum redhat-rpm-config-9.1.0-56.fc20.* > faad7594b2080fe76497d0ce50808c905a93dd7b41c1defdde5ca57e3833d3d2 > redhat-rpm-config-9.1.0-56.fc20.noarch.rpm > 5aa9357174305c7285ffdbc92d7ffe1c07a8a95d5459b930461308f5aad75413 > redhat-rpm-config-9.1.0-56.fc20.src.rpm > > -- > You are receiving this mail because: > You are on the CC list for the bug. > Unsubscribe from this bug > https://bugzilla.redhat.com/token.cgi?t=g1lCzLGyFI&a=cc_unsubscribe > > > <openmpi-format.patch>_______________________________________________ > devel mailing list > de...@open-mpi.org > http://www.open-mpi.org/mailman/listinfo.cgi/devel -- Jeff Squyres jsquy...@cisco.com For corporate legal information go to: http://www.cisco.com/web/about/doing_business/legal/cri/