Hi Tobias, > this patch broke Solaris bootstrap (both 32 and 64-bit sparc and x86): > > /vol/gcc/src/hg/master/local/gcc/gcc.c: In function 'bool > check_offload_target_name(const char*, ptrdiff_t)': > /vol/gcc/src/hg/master/local/gcc/gcc.c:4010:23: error: writing 1 byte into > a region of size 0 [-Werror=stringop-overflow=] > 4010 | cand[n - c] = '\0'; > | ~~~~~~~~~~~~^~~~~~ > In file included from /vol/gcc/src/hg/master/local/gcc/system.h:706, > from /vol/gcc/src/hg/master/local/gcc/gcc.c:31: > /vol/gcc/src/hg/master/local/gcc/../include/libiberty.h:733:36: note: at > offset 1 into destination object of size 1 allocated by '__builtin_alloca' > 733 | # define alloca(x) __builtin_alloca(x) > | ~~~~~~~~~~~~~~~~^~~ > /vol/gcc/src/hg/master/local/gcc/gcc.c:4000:29: note: in expansion of macro > 'alloca' > 4000 | char *cand = (char *) alloca (strlen (OFFLOAD_TARGETS) + 1); > | ^~~~~~
as of your next patch commit a3ce7d75dd9c0308b8565669f31127436cb2ba9f Author: Tobias Burnus <tob...@codesourcery.com> Date: Wed Jun 30 13:17:54 2021 +0200 gcc.c's check_offload_target_name: Fixes to inform hints Solaris bootstrap has been restored. Rainer -- ----------------------------------------------------------------------------- Rainer Orth, Center for Biotechnology, Bielefeld University