Hi Tobias,

> this patch broke Solaris bootstrap (both 32 and 64-bit sparc and x86):
>
> /vol/gcc/src/hg/master/local/gcc/gcc.c: In function 'bool
> check_offload_target_name(const char*, ptrdiff_t)':
> /vol/gcc/src/hg/master/local/gcc/gcc.c:4010:23: error: writing 1 byte into
> a region of size 0 [-Werror=stringop-overflow=]
>  4010 |           cand[n - c] = '\0';
>       |           ~~~~~~~~~~~~^~~~~~
> In file included from /vol/gcc/src/hg/master/local/gcc/system.h:706,
>                  from /vol/gcc/src/hg/master/local/gcc/gcc.c:31:
> /vol/gcc/src/hg/master/local/gcc/../include/libiberty.h:733:36: note: at 
> offset 1 into destination object of size 1 allocated by '__builtin_alloca'
>   733 | # define alloca(x) __builtin_alloca(x)
>       |                    ~~~~~~~~~~~~~~~~^~~
> /vol/gcc/src/hg/master/local/gcc/gcc.c:4000:29: note: in expansion of macro
> 'alloca'
>  4000 |       char *cand = (char *) alloca (strlen (OFFLOAD_TARGETS) + 1);
>       |                             ^~~~~~

as of your next patch

commit a3ce7d75dd9c0308b8565669f31127436cb2ba9f
Author: Tobias Burnus <tob...@codesourcery.com>
Date:   Wed Jun 30 13:17:54 2021 +0200

    gcc.c's check_offload_target_name: Fixes to inform hints

Solaris bootstrap has been restored.

        Rainer

-- 
-----------------------------------------------------------------------------
Rainer Orth, Center for Biotechnology, Bielefeld University

Reply via email to