From owner-freebsd-current@FreeBSD.ORG Sat Nov 30 22:05:15 2013 Return-Path: Delivered-To: current@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 80954667; Sat, 30 Nov 2013 22:05:15 +0000 (UTC) Received: from phk.freebsd.dk (phk.freebsd.dk [130.225.244.222]) by mx1.freebsd.org (Postfix) with ESMTP id 456871CFC; Sat, 30 Nov 2013 22:05:15 +0000 (UTC) Received: from critter.freebsd.dk (critter.freebsd.dk [192.168.61.3]) by phk.freebsd.dk (Postfix) with ESMTP id C14113EB42; Sat, 30 Nov 2013 21:57:26 +0000 (UTC) Received: from critter.freebsd.dk (localhost [127.0.0.1]) by critter.freebsd.dk (8.14.7/8.14.7) with ESMTP id rAULvQfH068553; Sat, 30 Nov 2013 21:57:26 GMT (envelope-from phk@phk.freebsd.dk) To: Adrian Chadd Subject: Re: RFC: (Unconditionally) enable -fno-strict-overflow for kernel builds In-reply-to: From: "Poul-Henning Kamp" References: <20131130135616.GA59496@kib.kiev.ua> Content-Type: text/plain; charset=ISO-8859-1 Date: Sat, 30 Nov 2013 21:57:25 +0000 Message-ID: <68552.1385848645@critter.freebsd.dk> Cc: Konstantin Belousov , "current@freebsd.org" X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.16 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 30 Nov 2013 22:05:15 -0000 In message , Adrian Chadd writes: >> The compiler authors take the undefined part there as a blanket to perform >> optimizations which are assuming that signed overflow cannot happen. That's sufficient explanation for me to support your proposal. -- Poul-Henning Kamp | UNIX since Zilog Zeus 3.20 phk@FreeBSD.ORG | TCP/IP since RFC 956 FreeBSD committer | BSD since 4.3-tahoe Never attribute to malice what can adequately be explained by incompetence.