Displaying 5 results from an estimated 5 matches for "string_fortifi".
Did you mean:
string_fortified
2020 May 22
2
GCC warning
...mit a package on CRAN, and everything passes ok on all platforms but Debian, where CRAN responds with an automatic "significant" warning:
* checking whether package ?QCA? can be installed ... [35s/35s] WARNING
Found the following significant warnings:
/usr/include/x86_64-linux-gnu/bits/string_fortified.h:106:10: warning: ?__builtin_strncpy? output may be truncated copying 12 bytes from a string of length 79 [-Wstringop-truncation]
See ?/srv/hornik/tmp/CRAN/QCA.Rcheck/00install.out? for details.
I know the cause of this: using a cursomized version of some external C library, coupled with <S...
2023 Jun 06
1
Possible overflow bug?
...me related work I built openssh 9.3p1 with
-fsanitize=address and this came up during compilation.
In file included from /usr/include/string.h:535,
from kex.c:34:
In function 'explicit_bzero',
inlined from 'kex_free_newkeys' at kex.c:743:2:
/usr/include/bits/string_fortified.h:72:3: warning:
'__explicit_bzero_chk' writing 48 bytes into a region of size 8
overflows the destination [-Wstringop-overflow=]
72 | __explicit_bzero_chk (__dest, __len, __glibc_objsize0 (__dest));
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In fil...
2020 May 23
0
GCC warning
...AN, and everything passes ok on all platforms but Debian, where CRAN responds with an automatic "significant" warning:
>
> * checking whether package ?QCA? can be installed ... [35s/35s] WARNING
> Found the following significant warnings:
> /usr/include/x86_64-linux-gnu/bits/string_fortified.h:106:10: warning: ?__builtin_strncpy? output may be truncated copying 12 bytes from a string of length 79 [-Wstringop-truncation]
> See ?/srv/hornik/tmp/CRAN/QCA.Rcheck/00install.out? for details.
>
>
> I know the cause of this: using a cursomized version of some external C library...
2023 May 16
1
xfer_sum_len type bug
...from /home/demartin/BuildClients/cobrasync-8.80-alsi11-lib32/cobrasync/rsync-3.2.7/match.c:22:
In function 'memset',
inlined from 'match_sums' at /home/demartin/BuildClients/cobrasync-8.80-alsi11-lib32/cobrasync/rsync-3.2.7/match.c:431:3:
/usr/include/i386-linux-gnu/bits/string_fortified.h:71:10: error: '__builtin___memset_chk' specified size between 2147483648 and 4294967295 exceeds maximum object size 2147483647 [-Werror=stringop-overflow=]
71 | return __builtin___memset_chk (__dest, __ch, __len, __bos0 (__dest));
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~...
2020 May 23
1
GCC warning
...ng passes ok on all platforms but Debian, where CRAN responds with an automatic "significant" warning:
>>
>> * checking whether package ?QCA? can be installed ... [35s/35s] WARNING
>> Found the following significant warnings:
>> /usr/include/x86_64-linux-gnu/bits/string_fortified.h:106:10: warning: ?__builtin_strncpy? output may be truncated copying 12 bytes from a string of length 79 [-Wstringop-truncation]
>> See ?/srv/hornik/tmp/CRAN/QCA.Rcheck/00install.out? for details.
>>
>>
>> I know the cause of this: using a cursomized version of some exte...