Drop RCS Ids in the ports I maintain

This commit is contained in:
jca 2022-03-10 00:04:05 +00:00
parent ee08de4c0c
commit cd0fba1ff1
228 changed files with 7 additions and 414 deletions

View File

@ -1,5 +1,3 @@
# $OpenBSD: Makefile,v 1.10 2021/05/12 23:37:31 jca Exp $
COMMENT = Symas Lightning Memory-Mapped Database
VERSION = 0.9.29

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-Makefile,v 1.1.1.1 2018/06/06 10:34:28 rsadowski Exp $
Index: Makefile
--- Makefile.orig
+++ Makefile

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-mdb_c,v 1.7 2021/05/12 23:37:31 jca Exp $
enforce MDB_WRITEMAP, because we have no UBC (Unified Buffer Cache).
Index: mdb.c

View File

@ -1,4 +1,3 @@
@comment $OpenBSD: PLIST,v 1.2 2019/12/06 14:22:54 jca Exp $
@bin bin/mdb_copy
@bin bin/mdb_dump
@bin bin/mdb_load

View File

@ -1,5 +1,3 @@
# $OpenBSD: Makefile,v 1.30 2021/11/02 00:00:24 sthen Exp $
COMMENT-main= hierarchical memory pool system with destructors
COMMENT-python= Python ${MODPY_VERSION} bindings for talloc

View File

@ -1,4 +1,3 @@
$OpenBSD: patch-Makefile,v 1.2 2019/12/04 00:15:22 jca Exp $
Index: Makefile
--- Makefile.orig
+++ Makefile

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-buildtools_wafsamba_samba_install_py,v 1.5 2021/05/12 23:31:39 jca Exp $
- respect OpenBSD shared libraries versioning
- --version-script fails if specified multipled times

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-buildtools_wafsamba_wafsamba_py,v 1.6 2021/05/12 23:31:39 jca Exp $
- allow the library version to be overriden
Index: buildtools/wafsamba/wafsamba.py

View File

@ -1,4 +1,3 @@
@comment $OpenBSD: PLIST-main,v 1.1 2021/03/05 10:42:29 sthen Exp $
@pkgpath devel/libtalloc
include/talloc.h
@lib lib/libtalloc.so.${LIBtalloc_VERSION}

View File

@ -1,4 +1,3 @@
@comment $OpenBSD: PLIST-python,v 1.2 2021/05/12 23:31:39 jca Exp $
@conflict libtalloc-<2.1.16p0
include/pytalloc.h
@comment @lib lib/libpytalloc-util.${PYTALLOC_UTIL_LIBSUFFIX}

View File

@ -1,5 +1,3 @@
# $OpenBSD: Makefile,v 1.23 2022/02/20 18:27:35 jca Exp $
COMMENT = user-level RCU implementation
DISTNAME = userspace-rcu-0.13.1

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_urcu_syscall-compat_h,v 1.2 2021/07/24 16:45:24 jca Exp $
Index: include/urcu/syscall-compat.h
--- include/urcu/syscall-compat.h.orig
+++ include/urcu/syscall-compat.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tests_benchmark_common_sh,v 1.2 2021/07/24 16:45:24 jca Exp $
Our time(1) doesn't support -a and -o options.
Index: tests/benchmark/common.sh

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tests_common_thread-id_h,v 1.3 2018/11/27 12:04:36 jca Exp $
XXX not portable, but used by tests only.
Index: tests/common/thread-id.h

View File

@ -1,4 +1,3 @@
@comment $OpenBSD: PLIST,v 1.7 2022/02/20 18:27:35 jca Exp $
include/urcu/
include/urcu-bp.h
include/urcu-call-rcu.h

View File

@ -1,4 +1,4 @@
# $OpenBSD: Makefile,v 1.290 2022/02/26 22:59:44 naddy Exp $
# $OpenBSD: Makefile,v 1.291 2022/03/10 00:04:05 jca Exp $
# XXX If broken on an architecture, remove the arch from LLVM_ARCHS.
ONLY_FOR_ARCHS = ${LLVM_ARCHS}
@ -17,7 +17,7 @@ PKGNAME = llvm-${LLVM_V}
PKGSPEC-main = llvm-=${LLVM_V}
PKGNAME-python = py3-llvm-${LLVM_V}
PKGNAME-lldb = lldb-${LLVM_V}
REVISION-main = 1
REVISION-main = 2
CATEGORIES = devel

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-cmake_modules_GetLibraryName_cmake,v 1.1 2022/01/03 21:33:51 jca Exp $
Properly parse library suffixes on OpenBSD
Index: cmake/modules/GetLibraryName.cmake

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-cmake_modules_LLVMProcessSources_cmake,v 1.1 2019/12/25 21:58:23 jca Exp $
Avoid adding a dep on all headers in ${LOCALBASE}/include, not
compatible with dpb(1) junking.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_CodeGen_AsmPrinter_h,v 1.8 2022/01/03 21:33:51 jca Exp $
Use int3 trap padding between functions instead of trapsleds with a leading jump.
Index: include/llvm/CodeGen/AsmPrinter.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_CodeGen_MachineFrameInfo_h,v 1.6 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_CodeGen_Passes_h,v 1.5 2022/01/03 21:33:51 jca Exp $
Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_CodeGen_ReturnProtectorLowering_h,v 1.2 2019/07/09 13:21:37 jca Exp $
- Refactor retguard to make adding additional arches easier.
- Do not store the retguard cookie in frame in leaf functions if possible.
Makes things slightly faster and also improves security in these functions,

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_CodeGen_TargetFrameLowering_h,v 1.7 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_InitializePasses_h,v 1.6 2022/01/03 21:33:51 jca Exp $
Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_AsmPrinter_AsmPrinter_cpp,v 1.13 2022/01/03 21:33:51 jca Exp $
- Use int3 trap padding between functions instead of trapsleds with a leading jump.
- Emit trap alignment between basic blocks that are unreachable via
fallthrough. Avoids unnecessary jmp instructions in the middle

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_CMakeLists_txt,v 1.7 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_PrologEpilogInserter_cpp,v 1.7 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_ReturnProtectorLowering_cpp,v 1.4 2021/05/13 23:54:24 jca Exp $
- Refactor retguard to make adding additional arches easier.
- Do not store the retguard cookie in frame in leaf functions if possible.
Makes things slightly faster and also improves security in these functions,

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_ReturnProtectorPass_cpp,v 1.4 2020/08/05 06:49:48 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_TargetPassConfig_cpp,v 1.6 2022/01/03 21:33:51 jca Exp $
Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_MC_MCAsmInfoELF_cpp,v 1.4 2020/08/05 06:49:48 jca Exp $
Do not use ident.
Index: lib/MC/MCAsmInfoELF.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_MC_MCELFStreamer_cpp,v 1.9 2022/01/03 21:33:51 jca Exp $
getNonexecutableStackSection() may return nullptr.
Index: lib/MC/MCELFStreamer.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_MC_MCParser_AsmParser_cpp,v 1.10 2022/01/03 21:33:51 jca Exp $
make clang include a FILE symbol for .(s|S) files
This is mostly needed by syspatch at the moment to be

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64AsmPrinter_cpp,v 1.6 2022/01/03 21:33:51 jca Exp $
Add retguard for arm64.
Index: lib/Target/AArch64/AArch64AsmPrinter.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64FrameLowering_cpp,v 1.7 2022/01/03 21:33:51 jca Exp $
Add retguard for arm64.
Index: lib/Target/AArch64/AArch64FrameLowering.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64FrameLowering_h,v 1.4 2022/01/03 21:33:51 jca Exp $
Add retguard for arm64.
Index: lib/Target/AArch64/AArch64FrameLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64ISelLowering_cpp,v 1.13 2022/01/03 21:33:51 jca Exp $
Disable the Load Stack Guard for OpenBSD on AArch64. We don't use it
on any other platform and it causes a segfault in combination with our
IR Stack Guard.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64InstrInfo_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
XXX no comment
Index: lib/Target/AArch64/AArch64InstrInfo.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64InstrInfo_td,v 1.6 2022/01/03 21:33:51 jca Exp $
Add retguard for arm64.
Index: lib/Target/AArch64/AArch64InstrInfo.td

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64ReturnProtectorLowering_cpp,v 1.3 2020/11/18 21:13:37 jca Exp $
- Add retguard for arm64.
- Do not store the retguard cookie in frame in leaf functions if possible.
Makes things slightly faster and also improves security in these functions,

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64ReturnProtectorLowering_h,v 1.2 2019/07/09 13:21:37 jca Exp $
- Add retguard for arm64.
- Do not store the retguard cookie in frame in leaf functions if possible.
Makes things slightly faster and also improves security in these functions,

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64Subtarget_h,v 1.9 2022/01/03 21:33:51 jca Exp $
Disable the Load Stack Guard for OpenBSD on AArch64. We don't use it
on any other platform and it causes a segfault in combination with our
IR Stack Guard.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64TargetMachine_cpp,v 1.4 2022/01/03 21:33:51 jca Exp $
Always disable GlobalISel on aarch64, fixes a crash when building on
aarch64 without retguard, with a stack protector and without
optimizations.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_CMakeLists_txt,v 1.5 2022/01/03 21:33:51 jca Exp $
Add retguard for arm64.
Index: lib/Target/AArch64/CMakeLists.txt

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_AsmParser_MipsAsmParser_cpp,v 1.5 2021/05/13 23:54:24 jca Exp $
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
Index: lib/Target/Mips/AsmParser/MipsAsmParser.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_CMakeLists_txt,v 1.4 2022/01/03 21:33:51 jca Exp $
- Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
- Add retguard for octeon/mips64.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MCTargetDesc_MipsABIInfo_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
Index: lib/Target/Mips/MCTargetDesc/MipsABIInfo.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsAsmPrinter_cpp,v 1.5 2021/05/13 23:54:24 jca Exp $
- Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsAsmPrinter.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsFrameLowering_cpp,v 1.2 2020/08/05 06:49:48 jca Exp $
Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsFrameLowering.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsFrameLowering_h,v 1.2 2020/08/05 06:49:48 jca Exp $
Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsFrameLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsISelLowering_cpp,v 1.4 2022/01/03 21:33:51 jca Exp $
- Implement the 'h' register constraint on mips64. This lets clang build
pieces of software that use the constraint if the compiler claims
to be compatible with GCC 4.2.1.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsInstrInfo_td,v 1.4 2021/05/13 23:54:24 jca Exp $
- Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsInstrInfo.td

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsLoongson2FBTBFix_cpp,v 1.1 2020/12/21 21:38:51 jca Exp $
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
Index: lib/Target/Mips/MipsLoongson2FBTBFix.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsReturnProtectorLowering_cpp,v 1.2 2020/06/15 21:34:58 gkoehler Exp $
Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsReturnProtectorLowering.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsReturnProtectorLowering_h,v 1.1 2020/01/07 22:59:43 jca Exp $
Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsReturnProtectorLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsTargetMachine_cpp,v 1.3 2022/01/03 21:33:51 jca Exp $
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
Index: lib/Target/Mips/MipsTargetMachine.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_Mips_h,v 1.1 2020/12/21 21:38:51 jca Exp $
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
Index: lib/Target/Mips/Mips.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_CMakeLists_txt,v 1.3 2022/01/03 21:33:51 jca Exp $
Index: lib/Target/PowerPC/CMakeLists.txt
--- lib/Target/PowerPC/CMakeLists.txt.orig
+++ lib/Target/PowerPC/CMakeLists.txt

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCAsmPrinter_cpp,v 1.10 2022/01/03 21:33:51 jca Exp $
Add RETGUARD implementation for powerpc and powerpc64.
Index: lib/Target/PowerPC/PPCAsmPrinter.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCFrameLowering_cpp,v 1.5 2022/01/03 21:33:51 jca Exp $
Add RETGUARD implementation for powerpc and powerpc64.
Index: lib/Target/PowerPC/PPCFrameLowering.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCFrameLowering_h,v 1.5 2022/01/03 21:33:51 jca Exp $
Add RETGUARD implementation for powerpc and powerpc64.
Index: lib/Target/PowerPC/PPCFrameLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCInstrInfo_td,v 1.5 2022/01/03 21:33:51 jca Exp $
Add RETGUARD implementation for powerpc and powerpc64.
Index: lib/Target/PowerPC/PPCInstrInfo.td

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCReturnProtectorLowering_cpp,v 1.1 2020/11/18 21:20:00 jca Exp $
- Add RETGUARD implementation for powerpc and powerpc64.
- Use all 64 bits of the RETGUARD cookie on powerpc64.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCReturnProtectorLowering_h,v 1.1 2020/11/18 21:20:00 jca Exp $
Add RETGUARD implementation for powerpc and powerpc64.
Index: lib/Target/PowerPC/PPCReturnProtectorLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCTargetMachine_cpp,v 1.4 2022/01/03 21:33:51 jca Exp $
Switch Powerpc64 Big Endian to ELFv2 on OpenBSD.
Index: lib/Target/PowerPC/PPCTargetMachine.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_RISCV_RISCVISelLowering_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
- enable EmuTLS on RiscV.
Index: lib/Target/RISCV/RISCVISelLowering.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Sparc_SparcISelLowering_cpp,v 1.9 2022/01/03 21:33:51 jca Exp $
- Make sure that we really don't emit quad-precision unless the
"hard-quad-float" feature is available

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Sparc_SparcInstr64Bit_td,v 1.8 2020/08/05 06:49:48 jca Exp $
Make sure that we really don't emit quad-precision unless the
"hard-quad-float" feature is available.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Sparc_SparcInstrInfo_td,v 1.12 2022/01/03 21:33:51 jca Exp $
Make sure that we really don't emit quad-precision unless the
"hard-quad-float" feature is available

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_CMakeLists_txt,v 1.7 2022/01/03 21:33:51 jca Exp $
- Add a clang pass that identifies potential ROP gadgets and replaces ROP
friendly instructions with safe alternatives. This initial commit fixes
3 instruction forms that will lower to include a c3 (return) byte.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86AsmPrinter_h,v 1.8 2021/05/13 23:54:25 jca Exp $
Use int3 trap padding between functions instead of trapsleds with a leading jump.
Index: lib/Target/X86/X86AsmPrinter.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86FixupGadgets_cpp,v 1.5 2021/07/12 23:54:05 jca Exp $
- Add a clang pass that identifies potential ROP gadgets and replaces ROP
friendly instructions with safe alternatives. This initial commit fixes
3 instruction forms that will lower to include a c3 (return) byte.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86FrameLowering_cpp,v 1.10 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86FrameLowering_h,v 1.8 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86IndirectThunks_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
Add lfence after ret in retpoline thunk.
Index: lib/Target/X86/X86IndirectThunks.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86InstrCompiler_td,v 1.6 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86MCInstLower_cpp,v 1.11 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86MachineFunctionInfo_h,v 1.6 2022/01/03 21:33:51 jca Exp $
implement -msave-args in clang/llvm, like the sun did for gcc
Index: lib/Target/X86/X86MachineFunctionInfo.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86RegisterInfo_td,v 1.9 2022/01/03 21:33:52 jca Exp $
- The compiler is generally free to allocate general purpose registers in
whatever order it chooses. Reasons for choosing one register before another
usually include compiled instruction size (avoidance of REX prefixes, etc.)

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86ReturnProtectorLowering_cpp,v 1.2 2019/07/09 13:21:37 jca Exp $
- Refactor retguard to make adding additional arches easier.
- Do not store the retguard cookie in frame in leaf functions if possible.
Makes things slightly faster and also improves security in these functions,

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86ReturnProtectorLowering_h,v 1.1 2018/08/21 06:56:09 ajacoutot Exp $
Refactor retguard to make adding additional arches easier.
Index: lib/Target/X86/X86ReturnProtectorLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86Subtarget_h,v 1.10 2022/01/03 21:33:52 jca Exp $
- implement -msave-args in clang/llvm, like the sun did for gcc
- Turn on -mretpoline by default in clang on amd64.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86TargetMachine_cpp,v 1.10 2022/01/03 21:33:52 jca Exp $
Add a clang pass that identifies potential ROP gadgets and replaces ROP
friendly instructions with safe alternatives. This initial commit fixes
3 instruction forms that will lower to include a c3 (return) byte.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86_h,v 1.5 2022/01/03 21:33:52 jca Exp $
Add a clang pass that identifies potential ROP gadgets and replaces ROP
friendly instructions with safe alternatives. This initial commit fixes
3 instruction forms that will lower to include a c3 (return) byte.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86_td,v 1.7 2022/01/03 21:33:52 jca Exp $
implement -msave-args in clang/llvm, like the sun did for gcc
Index: lib/Target/X86/X86.td

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Transforms_Scalar_LoopIdiomRecognize_cpp,v 1.8 2022/01/03 21:33:52 jca Exp $
Disable loop idiom recognition for _libc_memset and _libc_memcpy. These are
the internal names we use in libc for memset and memcpy and having the
compiler optimize them as calls to memset and memcpy will lead to infinite

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_include_clang_AST_FormatString_h,v 1.1 2019/07/09 13:21:37 jca Exp $
- The %b printf extension in the kernel is not fixed to a int type. On sparc64
there are various %llb formats. Adjust the code to handle the length specifiers
and type check like it is used by the regular case.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_include_clang_Basic_CodeGenOptions_def,v 1.8 2022/01/03 21:33:52 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_include_clang_Basic_DiagnosticSemaKinds_td,v 1.11 2022/01/03 21:33:52 jca Exp $
- Disable -Waddress-of-packed-member by default.
While these warnings have the potential to be useful, there are too many

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_include_clang_Driver_Options_td,v 1.29 2022/01/03 21:33:52 jca Exp $
- Add ret protector options as no-ops.
- Improve the X86FixupGadgets pass
- Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_include_clang_Sema_Sema_h,v 1.8 2022/01/03 21:33:52 jca Exp $
Teach Clang about syslog format attribute
Index: tools/clang/include/clang/Sema/Sema.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_AST_FormatString_cpp,v 1.3 2021/05/13 23:54:25 jca Exp $
- The %b printf extension in the kernel is not fixed to a int type. On sparc64
there are various %llb formats. Adjust the code to handle the length specifiers
and type check like it is used by the regular case.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Basic_Targets_Mips_h,v 1.2 2020/08/05 06:49:49 jca Exp $
- Implement the 'h' register constraint on mips64. This lets clang build
pieces of software that use the constraint if the compiler claims
to be compatible with GCC 4.2.1.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Basic_Targets_X86_cpp,v 1.7 2022/01/03 21:33:52 jca Exp $
implement -msave-args in clang/llvm, like the sun did for gcc
Index: tools/clang/lib/Basic/Targets/X86.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Basic_Targets_X86_h,v 1.8 2022/01/03 21:33:52 jca Exp $
- implement -msave-args in clang/llvm, like the sun did for gcc.
Index: tools/clang/lib/Basic/Targets/X86.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_CodeGen_CGCall_cpp,v 1.6 2022/01/03 21:33:52 jca Exp $
Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Arch_RISCV_cpp,v 1.2 2022/01/03 21:33:52 jca Exp $
- ld.lld doesn't properly support R_RISCV_RELAX relocations, switch the default to -no-relax
Index: tools/clang/lib/Driver/ToolChains/Arch/RISCV.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Arch_X86_cpp,v 1.7 2022/01/03 21:33:52 jca Exp $
- Turn on -mretpoline by default in clang on amd64.
Index: tools/clang/lib/Driver/ToolChains/Arch/X86.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Clang_cpp,v 1.22 2022/01/03 21:33:52 jca Exp $
- Switch Powerpc64 Big Endian to ELFv2 on OpenBSD.
- Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
- Disable -fstrict-aliasing per default on OpenBSD.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Gnu_cpp,v 1.11 2022/01/03 21:33:52 jca Exp $
- Disable IAS for OpenBSD SPARC.
Index: tools/clang/lib/Driver/ToolChains/Gnu.cpp

Some files were not shown because too many files have changed in this diff Show More