![](https://seccdn.libravatar.org/avatar/a895f78a81a109471893519443e4d933.jpg?s=120&d=mm&r=g)
16 Nov
2021
16 Nov
'21
16:12
https://bugzilla.suse.com/show_bug.cgi?id=1192473 https://bugzilla.suse.com/show_bug.cgi?id=1192473#c11 --- Comment #11 from Takashi Iwai <tiwai@suse.com> --- Thanks. Then the pointer cast doesn't seem helping for avoiding the compiler thinking of the constant size of the source. Then just putting __NO_FORTIFY would be the easiest way to go, as it seems. I'll try to refresh the test kernel again with that later. -- You are receiving this mail because: You are the assignee for the bug.