On 10/08/23 3:04 am, Joseph Myers wrote: > On Wed, 9 Aug 2023, bmahi496--- via Libc-alpha wrote: > >> From: Mahesh Bodapati >> >> When building with fortify enabled, GCC < 12 issues a warning on the >> fortify strncat wrapper might overflow the destination buffer. However, >> GCC does not provide a specific flag to disable the warning (the >> failure is tied to -Werror). So to avoid disable all errors, only >> enable the check for GCC 12 or newer. > What is the exact diagnostic message? The error looks like below . /In file included from ../include/bits/string_fortified.h:1,// //                 from ../string/string.h:548,// //                 from ../include/string.h:60,// //                 from tester.c:41,// //                 from inl-tester.c:6:// //In function 'strncat',// //    inlined from 'test_strncat' at tester.c:446:13:// //../string/bits/string_fortified.h:138:10:*error: '__builtin_strncat' specified bound [18446744073709551600, 18446744073709551615] exceeds maximum object size 9223372036854775807 [-Werror=stringop-overread]*// //  138 |   return __builtin___strncat_chk (__dest, __src, __len,// //      | ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~// //  139 |                                   __glibc_objsize (__dest));// //      | ~~~~~~~~~~~~~~~~~~~~~~~~~/ >