From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on dcvr.yhbt.net X-Spam-Level: X-Spam-ASN: AS3215 2.6.0.0/16 X-Spam-Status: No, score=-3.8 required=3.0 tests=AWL,BAYES_00, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RCVD_IN_DNSWL_MED, SPF_HELO_PASS,SPF_PASS shortcircuit=no autolearn=ham autolearn_force=no version=3.4.2 Received: from sourceware.org (server2.sourceware.org [IPv6:2620:52:3:1:0:246e:9693:128c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by dcvr.yhbt.net (Postfix) with ESMTPS id CB9591F8C6 for ; Mon, 23 Aug 2021 16:10:16 +0000 (UTC) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id AFDC83853C09 for ; Mon, 23 Aug 2021 16:10:14 +0000 (GMT) Received: from mail-out.m-online.net (mail-out.m-online.net [212.18.0.9]) by sourceware.org (Postfix) with ESMTPS id EEA6D3858C2C for ; Mon, 23 Aug 2021 16:09:46 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org EEA6D3858C2C Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=linux-m68k.org Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=nefkom.net Received: from frontend01.mail.m-online.net (unknown [192.168.8.182]) by mail-out.m-online.net (Postfix) with ESMTP id 4GtcdP6n5tz1qwGf; Mon, 23 Aug 2021 18:09:45 +0200 (CEST) Received: from localhost (dynscan1.mnet-online.de [192.168.6.70]) by mail.m-online.net (Postfix) with ESMTP id 4GtcdP3tmFz1qrNx; Mon, 23 Aug 2021 18:09:45 +0200 (CEST) X-Virus-Scanned: amavisd-new at mnet-online.de Received: from mail.mnet-online.de ([192.168.8.182]) by localhost (dynscan1.mail.m-online.net [192.168.6.70]) (amavisd-new, port 10024) with ESMTP id rxUAfBfSPiub; Mon, 23 Aug 2021 18:09:44 +0200 (CEST) X-Auth-Info: Kegu4QC4z7seRrDH+6lqxi7yrIuFKuOBoJ7uOvL4W7q28fvo2OLod9agMNeU13Ni Received: from igel.home (ppp-46-244-177-181.dynamic.mnet-online.de [46.244.177.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mail.mnet-online.de (Postfix) with ESMTPSA; Mon, 23 Aug 2021 18:09:44 +0200 (CEST) Received: by igel.home (Postfix, from userid 1000) id 076E72C0A7F; Mon, 23 Aug 2021 18:09:44 +0200 (CEST) From: Andreas Schwab To: Joseph Myers Subject: Re: Fix iconv build with GCC mainline References: X-Yow: My polyvinyl cowboy wallet was made in Hong Kong by Montgomery Clift! Date: Mon, 23 Aug 2021 18:09:43 +0200 In-Reply-To: (Joseph Myers's message of "Thu, 19 Aug 2021 16:56:19 +0000") Message-ID: <87eeakrvlk.fsf@igel.home> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/27.2 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-BeenThere: libc-alpha@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Libc-alpha mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Cc: libc-alpha@sourceware.org Errors-To: libc-alpha-bounces+e=80x24.org@sourceware.org Sender: "Libc-alpha" On Aug 19 2021, Joseph Myers wrote: > Current GCC mainline produces -Wstringop-overflow errors building some > iconv converters, as discussed at > . Add an > __builtin_unreachable call as suggested so that GCC can see the case > that would involve a buffer overflow is unreachable; because the > unreachability depends on valid conversion state being passed into the > function from previous conversion steps, it's not something the > compiler can reasonably deduce on its own. Ok. Andreas. -- Andreas Schwab, schwab@linux-m68k.org GPG Key fingerprint = 7578 EB47 D4E5 4D69 2510 2552 DF73 E780 A9DA AEC1 "And now for something completely different."