Avoid clang bug on earm with SSP/FORTIFY:

rt_libelftc_dem_gnu3.c:3567:3: warning: '__builtin___memset_chk' will always
      overflow destination buffer [-Wbuiltin-memcpy-chk-size]
		      memset(&f, 0, FLOAT_EXTENED_BYTES);
This commit is contained in:
christos 2019-05-06 23:20:51 +00:00
parent 41bb817512
commit c1f68528e1

View File

@ -1,4 +1,4 @@
# $NetBSD: Makefile,v 1.12 2018/07/17 18:58:10 joerg Exp $
# $NetBSD: Makefile,v 1.13 2019/05/06 23:20:51 christos Exp $
LIB= c++
WARNS= 4
@ -44,6 +44,9 @@ CWARNFLAGS.clang+= -Wno-error=missing-prototypes -Wno-error=sometimes-uninitiali
CWARNFLAGS.clang+= -Wno-error=missing-field-initializers -Wno-error=switch
CWARNFLAGS.clang+= -Wno-error=implicit-exception-spec-mismatch
# with SSP and FORTIFY, on earm...
COPTS.rt_libelftc_dem_gnu3.c += ${${ACTIVE_CC} == "clang":? -Wno-error=builtin-memcpy-chk-size :}
.if ${MKSANITIZER} != "yes"
LDFLAGS+= -Wl,-z,defs
.endif