https://sourceware.org/bugzilla/show_bug.cgi?id=29141
--- Comment #7 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> --- The master branch has been updated by Siddhesh Poyarekar <siddh...@sourceware.org>: https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=61a87530108ec9181e1b18a9b727ec3cc3ba7532 commit 61a87530108ec9181e1b18a9b727ec3cc3ba7532 Author: Siddhesh Poyarekar <siddh...@sourceware.org> Date: Fri May 13 10:01:47 2022 +0530 fortify: Ensure that __glibc_fortify condition is a constant [BZ #29141] The fix c8ee1c85 introduced a -1 check for object size without also checking that object size is a constant. Because of this, the tree optimizer passes in gcc fail to fold away one of the branches in __glibc_fortify and trips on a spurious Wstringop-overflow. The warning itself is incorrect and the branch does go away eventually in DCE in the rtl passes in gcc, but the constant check is a helpful hint to simplify code early, so add it in. Resolves: BZ #29141 Signed-off-by: Siddhesh Poyarekar <siddh...@sourceware.org> -- You are receiving this mail because: You are on the CC list for the bug.