gdb: workaround sparc memcpy fortify error
authorMike Frysinger <vapier@gentoo.org>
Wed, 21 Apr 2010 20:13:41 +0000 (20:13 +0000)
committerMike Frysinger <vapier@gentoo.org>
Wed, 21 Apr 2010 20:13:41 +0000 (20:13 +0000)
commita9789a6b9df7e25448473dc45c47b64c980f04b5
treeed0c7d858e07c5ca06f9bfab80de6eb12bd339d7
parent2462afa169ca59e9d842f092f14d48479817eb5f
gdb: workaround sparc memcpy fortify error

Building on an x86_64-linux system with --enable-targets=all fails on the
sparc code with a fortify error:

cc1: warnings being treated as errors
In file included from /usr/include/string.h:640,
                 from gnulib/string.h:23,
                 from ../../gdb/gdb_string.h:25,
                 from ../../gdb/vec.h:25,
                 from ../../gdb/memattr.h:24,
                 from ../../gdb/target.h:60,
                 from ../../gdb/exec.h:23,
                 from ../../gdb/gdbcore.h:31,
                 from ../../gdb/sparc-tdep.c:29:
In function 'memcpy',
    inlined from 'sparc32_store_return_value' at ../../gdb/sparc-tdep.c:1112,
    inlined from 'sparc32_return_value' at ../../gdb/sparc-tdep.c:1170:
/usr/include/bits/string3.h:52: error: call to __builtin___memcpy_chk will
        always overflow destination buffer
make: *** [sparc-tdep.o] Error 1

This is due to the gcc optimizer bug PR37060, so tweak the gdb_assert ()
to avoid the issue.

Signed-off-by: Mike Frysinger <vapier@gentoo.org>
gdb/ChangeLog
gdb/sparc-tdep.c
This page took 0.024496 seconds and 4 git commands to generate.