Drop RCS Ids in the ports I maintain
This commit is contained in:
parent
ee08de4c0c
commit
cd0fba1ff1
@ -1,5 +1,3 @@
|
||||
# $OpenBSD: Makefile,v 1.10 2021/05/12 23:37:31 jca Exp $
|
||||
|
||||
COMMENT = Symas Lightning Memory-Mapped Database
|
||||
|
||||
VERSION = 0.9.29
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-Makefile,v 1.1.1.1 2018/06/06 10:34:28 rsadowski Exp $
|
||||
|
||||
Index: Makefile
|
||||
--- Makefile.orig
|
||||
+++ Makefile
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-mdb_c,v 1.7 2021/05/12 23:37:31 jca Exp $
|
||||
|
||||
enforce MDB_WRITEMAP, because we have no UBC (Unified Buffer Cache).
|
||||
|
||||
Index: mdb.c
|
||||
|
@ -1,4 +1,3 @@
|
||||
@comment $OpenBSD: PLIST,v 1.2 2019/12/06 14:22:54 jca Exp $
|
||||
@bin bin/mdb_copy
|
||||
@bin bin/mdb_dump
|
||||
@bin bin/mdb_load
|
||||
|
@ -1,5 +1,3 @@
|
||||
# $OpenBSD: Makefile,v 1.30 2021/11/02 00:00:24 sthen Exp $
|
||||
|
||||
COMMENT-main= hierarchical memory pool system with destructors
|
||||
COMMENT-python= Python ${MODPY_VERSION} bindings for talloc
|
||||
|
||||
|
@ -1,4 +1,3 @@
|
||||
$OpenBSD: patch-Makefile,v 1.2 2019/12/04 00:15:22 jca Exp $
|
||||
Index: Makefile
|
||||
--- Makefile.orig
|
||||
+++ Makefile
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-buildtools_wafsamba_samba_install_py,v 1.5 2021/05/12 23:31:39 jca Exp $
|
||||
|
||||
- respect OpenBSD shared libraries versioning
|
||||
- --version-script fails if specified multipled times
|
||||
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-buildtools_wafsamba_wafsamba_py,v 1.6 2021/05/12 23:31:39 jca Exp $
|
||||
|
||||
- allow the library version to be overriden
|
||||
|
||||
Index: buildtools/wafsamba/wafsamba.py
|
||||
|
@ -1,4 +1,3 @@
|
||||
@comment $OpenBSD: PLIST-main,v 1.1 2021/03/05 10:42:29 sthen Exp $
|
||||
@pkgpath devel/libtalloc
|
||||
include/talloc.h
|
||||
@lib lib/libtalloc.so.${LIBtalloc_VERSION}
|
||||
|
@ -1,4 +1,3 @@
|
||||
@comment $OpenBSD: PLIST-python,v 1.2 2021/05/12 23:31:39 jca Exp $
|
||||
@conflict libtalloc-<2.1.16p0
|
||||
include/pytalloc.h
|
||||
@comment @lib lib/libpytalloc-util.${PYTALLOC_UTIL_LIBSUFFIX}
|
||||
|
@ -1,5 +1,3 @@
|
||||
# $OpenBSD: Makefile,v 1.23 2022/02/20 18:27:35 jca Exp $
|
||||
|
||||
COMMENT = user-level RCU implementation
|
||||
|
||||
DISTNAME = userspace-rcu-0.13.1
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-include_urcu_syscall-compat_h,v 1.2 2021/07/24 16:45:24 jca Exp $
|
||||
|
||||
Index: include/urcu/syscall-compat.h
|
||||
--- include/urcu/syscall-compat.h.orig
|
||||
+++ include/urcu/syscall-compat.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tests_benchmark_common_sh,v 1.2 2021/07/24 16:45:24 jca Exp $
|
||||
|
||||
Our time(1) doesn't support -a and -o options.
|
||||
|
||||
Index: tests/benchmark/common.sh
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tests_common_thread-id_h,v 1.3 2018/11/27 12:04:36 jca Exp $
|
||||
|
||||
XXX not portable, but used by tests only.
|
||||
|
||||
Index: tests/common/thread-id.h
|
||||
|
@ -1,4 +1,3 @@
|
||||
@comment $OpenBSD: PLIST,v 1.7 2022/02/20 18:27:35 jca Exp $
|
||||
include/urcu/
|
||||
include/urcu-bp.h
|
||||
include/urcu-call-rcu.h
|
||||
|
@ -1,4 +1,4 @@
|
||||
# $OpenBSD: Makefile,v 1.290 2022/02/26 22:59:44 naddy Exp $
|
||||
# $OpenBSD: Makefile,v 1.291 2022/03/10 00:04:05 jca Exp $
|
||||
|
||||
# XXX If broken on an architecture, remove the arch from LLVM_ARCHS.
|
||||
ONLY_FOR_ARCHS = ${LLVM_ARCHS}
|
||||
@ -17,7 +17,7 @@ PKGNAME = llvm-${LLVM_V}
|
||||
PKGSPEC-main = llvm-=${LLVM_V}
|
||||
PKGNAME-python = py3-llvm-${LLVM_V}
|
||||
PKGNAME-lldb = lldb-${LLVM_V}
|
||||
REVISION-main = 1
|
||||
REVISION-main = 2
|
||||
|
||||
CATEGORIES = devel
|
||||
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-cmake_modules_GetLibraryName_cmake,v 1.1 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Properly parse library suffixes on OpenBSD
|
||||
|
||||
Index: cmake/modules/GetLibraryName.cmake
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-cmake_modules_LLVMProcessSources_cmake,v 1.1 2019/12/25 21:58:23 jca Exp $
|
||||
|
||||
Avoid adding a dep on all headers in ${LOCALBASE}/include, not
|
||||
compatible with dpb(1) junking.
|
||||
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-include_llvm_CodeGen_AsmPrinter_h,v 1.8 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Use int3 trap padding between functions instead of trapsleds with a leading jump.
|
||||
|
||||
Index: include/llvm/CodeGen/AsmPrinter.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-include_llvm_CodeGen_MachineFrameInfo_h,v 1.6 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-include_llvm_CodeGen_Passes_h,v 1.5 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-include_llvm_CodeGen_ReturnProtectorLowering_h,v 1.2 2019/07/09 13:21:37 jca Exp $
|
||||
|
||||
- Refactor retguard to make adding additional arches easier.
|
||||
- Do not store the retguard cookie in frame in leaf functions if possible.
|
||||
Makes things slightly faster and also improves security in these functions,
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-include_llvm_CodeGen_TargetFrameLowering_h,v 1.7 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-include_llvm_InitializePasses_h,v 1.6 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_CodeGen_AsmPrinter_AsmPrinter_cpp,v 1.13 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Use int3 trap padding between functions instead of trapsleds with a leading jump.
|
||||
- Emit trap alignment between basic blocks that are unreachable via
|
||||
fallthrough. Avoids unnecessary jmp instructions in the middle
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_CodeGen_CMakeLists_txt,v 1.7 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_CodeGen_PrologEpilogInserter_cpp,v 1.7 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_CodeGen_ReturnProtectorLowering_cpp,v 1.4 2021/05/13 23:54:24 jca Exp $
|
||||
|
||||
- Refactor retguard to make adding additional arches easier.
|
||||
- Do not store the retguard cookie in frame in leaf functions if possible.
|
||||
Makes things slightly faster and also improves security in these functions,
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_CodeGen_ReturnProtectorPass_cpp,v 1.4 2020/08/05 06:49:48 jca Exp $
|
||||
|
||||
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_CodeGen_TargetPassConfig_cpp,v 1.6 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_MC_MCAsmInfoELF_cpp,v 1.4 2020/08/05 06:49:48 jca Exp $
|
||||
|
||||
Do not use ident.
|
||||
|
||||
Index: lib/MC/MCAsmInfoELF.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_MC_MCELFStreamer_cpp,v 1.9 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
getNonexecutableStackSection() may return nullptr.
|
||||
|
||||
Index: lib/MC/MCELFStreamer.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_MC_MCParser_AsmParser_cpp,v 1.10 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
make clang include a FILE symbol for .(s|S) files
|
||||
|
||||
This is mostly needed by syspatch at the moment to be
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_AArch64_AArch64AsmPrinter_cpp,v 1.6 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add retguard for arm64.
|
||||
|
||||
Index: lib/Target/AArch64/AArch64AsmPrinter.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_AArch64_AArch64FrameLowering_cpp,v 1.7 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add retguard for arm64.
|
||||
|
||||
Index: lib/Target/AArch64/AArch64FrameLowering.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_AArch64_AArch64FrameLowering_h,v 1.4 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add retguard for arm64.
|
||||
|
||||
Index: lib/Target/AArch64/AArch64FrameLowering.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_AArch64_AArch64ISelLowering_cpp,v 1.13 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Disable the Load Stack Guard for OpenBSD on AArch64. We don't use it
|
||||
on any other platform and it causes a segfault in combination with our
|
||||
IR Stack Guard.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_AArch64_AArch64InstrInfo_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
XXX no comment
|
||||
|
||||
Index: lib/Target/AArch64/AArch64InstrInfo.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_AArch64_AArch64InstrInfo_td,v 1.6 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add retguard for arm64.
|
||||
|
||||
Index: lib/Target/AArch64/AArch64InstrInfo.td
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_AArch64_AArch64ReturnProtectorLowering_cpp,v 1.3 2020/11/18 21:13:37 jca Exp $
|
||||
|
||||
- Add retguard for arm64.
|
||||
- Do not store the retguard cookie in frame in leaf functions if possible.
|
||||
Makes things slightly faster and also improves security in these functions,
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_AArch64_AArch64ReturnProtectorLowering_h,v 1.2 2019/07/09 13:21:37 jca Exp $
|
||||
|
||||
- Add retguard for arm64.
|
||||
- Do not store the retguard cookie in frame in leaf functions if possible.
|
||||
Makes things slightly faster and also improves security in these functions,
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_AArch64_AArch64Subtarget_h,v 1.9 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Disable the Load Stack Guard for OpenBSD on AArch64. We don't use it
|
||||
on any other platform and it causes a segfault in combination with our
|
||||
IR Stack Guard.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_AArch64_AArch64TargetMachine_cpp,v 1.4 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Always disable GlobalISel on aarch64, fixes a crash when building on
|
||||
aarch64 without retguard, with a stack protector and without
|
||||
optimizations.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_AArch64_CMakeLists_txt,v 1.5 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add retguard for arm64.
|
||||
|
||||
Index: lib/Target/AArch64/CMakeLists.txt
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_AsmParser_MipsAsmParser_cpp,v 1.5 2021/05/13 23:54:24 jca Exp $
|
||||
|
||||
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
|
||||
|
||||
Index: lib/Target/Mips/AsmParser/MipsAsmParser.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_CMakeLists_txt,v 1.4 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
|
||||
- Add retguard for octeon/mips64.
|
||||
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_MCTargetDesc_MipsABIInfo_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
|
||||
|
||||
Index: lib/Target/Mips/MCTargetDesc/MipsABIInfo.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_MipsAsmPrinter_cpp,v 1.5 2021/05/13 23:54:24 jca Exp $
|
||||
|
||||
- Add retguard for octeon/mips64.
|
||||
|
||||
Index: lib/Target/Mips/MipsAsmPrinter.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_MipsFrameLowering_cpp,v 1.2 2020/08/05 06:49:48 jca Exp $
|
||||
|
||||
Add retguard for octeon/mips64.
|
||||
|
||||
Index: lib/Target/Mips/MipsFrameLowering.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_MipsFrameLowering_h,v 1.2 2020/08/05 06:49:48 jca Exp $
|
||||
|
||||
Add retguard for octeon/mips64.
|
||||
|
||||
Index: lib/Target/Mips/MipsFrameLowering.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_MipsISelLowering_cpp,v 1.4 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Implement the 'h' register constraint on mips64. This lets clang build
|
||||
pieces of software that use the constraint if the compiler claims
|
||||
to be compatible with GCC 4.2.1.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_MipsInstrInfo_td,v 1.4 2021/05/13 23:54:24 jca Exp $
|
||||
|
||||
- Add retguard for octeon/mips64.
|
||||
|
||||
Index: lib/Target/Mips/MipsInstrInfo.td
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_MipsLoongson2FBTBFix_cpp,v 1.1 2020/12/21 21:38:51 jca Exp $
|
||||
|
||||
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
|
||||
|
||||
Index: lib/Target/Mips/MipsLoongson2FBTBFix.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_MipsReturnProtectorLowering_cpp,v 1.2 2020/06/15 21:34:58 gkoehler Exp $
|
||||
|
||||
Add retguard for octeon/mips64.
|
||||
|
||||
Index: lib/Target/Mips/MipsReturnProtectorLowering.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_MipsReturnProtectorLowering_h,v 1.1 2020/01/07 22:59:43 jca Exp $
|
||||
|
||||
Add retguard for octeon/mips64.
|
||||
|
||||
Index: lib/Target/Mips/MipsReturnProtectorLowering.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_MipsTargetMachine_cpp,v 1.3 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
|
||||
|
||||
Index: lib/Target/Mips/MipsTargetMachine.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Mips_Mips_h,v 1.1 2020/12/21 21:38:51 jca Exp $
|
||||
|
||||
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
|
||||
|
||||
Index: lib/Target/Mips/Mips.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_PowerPC_CMakeLists_txt,v 1.3 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Index: lib/Target/PowerPC/CMakeLists.txt
|
||||
--- lib/Target/PowerPC/CMakeLists.txt.orig
|
||||
+++ lib/Target/PowerPC/CMakeLists.txt
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_PowerPC_PPCAsmPrinter_cpp,v 1.10 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add RETGUARD implementation for powerpc and powerpc64.
|
||||
|
||||
Index: lib/Target/PowerPC/PPCAsmPrinter.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_PowerPC_PPCFrameLowering_cpp,v 1.5 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add RETGUARD implementation for powerpc and powerpc64.
|
||||
|
||||
Index: lib/Target/PowerPC/PPCFrameLowering.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_PowerPC_PPCFrameLowering_h,v 1.5 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add RETGUARD implementation for powerpc and powerpc64.
|
||||
|
||||
Index: lib/Target/PowerPC/PPCFrameLowering.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_PowerPC_PPCInstrInfo_td,v 1.5 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add RETGUARD implementation for powerpc and powerpc64.
|
||||
|
||||
Index: lib/Target/PowerPC/PPCInstrInfo.td
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_PowerPC_PPCReturnProtectorLowering_cpp,v 1.1 2020/11/18 21:20:00 jca Exp $
|
||||
|
||||
- Add RETGUARD implementation for powerpc and powerpc64.
|
||||
- Use all 64 bits of the RETGUARD cookie on powerpc64.
|
||||
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_PowerPC_PPCReturnProtectorLowering_h,v 1.1 2020/11/18 21:20:00 jca Exp $
|
||||
|
||||
Add RETGUARD implementation for powerpc and powerpc64.
|
||||
|
||||
Index: lib/Target/PowerPC/PPCReturnProtectorLowering.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_PowerPC_PPCTargetMachine_cpp,v 1.4 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Switch Powerpc64 Big Endian to ELFv2 on OpenBSD.
|
||||
|
||||
Index: lib/Target/PowerPC/PPCTargetMachine.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_RISCV_RISCVISelLowering_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- enable EmuTLS on RiscV.
|
||||
|
||||
Index: lib/Target/RISCV/RISCVISelLowering.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Sparc_SparcISelLowering_cpp,v 1.9 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Make sure that we really don't emit quad-precision unless the
|
||||
"hard-quad-float" feature is available
|
||||
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Sparc_SparcInstr64Bit_td,v 1.8 2020/08/05 06:49:48 jca Exp $
|
||||
|
||||
Make sure that we really don't emit quad-precision unless the
|
||||
"hard-quad-float" feature is available.
|
||||
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_Sparc_SparcInstrInfo_td,v 1.12 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Make sure that we really don't emit quad-precision unless the
|
||||
"hard-quad-float" feature is available
|
||||
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_CMakeLists_txt,v 1.7 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Add a clang pass that identifies potential ROP gadgets and replaces ROP
|
||||
friendly instructions with safe alternatives. This initial commit fixes
|
||||
3 instruction forms that will lower to include a c3 (return) byte.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86AsmPrinter_h,v 1.8 2021/05/13 23:54:25 jca Exp $
|
||||
|
||||
Use int3 trap padding between functions instead of trapsleds with a leading jump.
|
||||
|
||||
Index: lib/Target/X86/X86AsmPrinter.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86FixupGadgets_cpp,v 1.5 2021/07/12 23:54:05 jca Exp $
|
||||
|
||||
- Add a clang pass that identifies potential ROP gadgets and replaces ROP
|
||||
friendly instructions with safe alternatives. This initial commit fixes
|
||||
3 instruction forms that will lower to include a c3 (return) byte.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86FrameLowering_cpp,v 1.10 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86FrameLowering_h,v 1.8 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86IndirectThunks_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
Add lfence after ret in retpoline thunk.
|
||||
|
||||
Index: lib/Target/X86/X86IndirectThunks.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86InstrCompiler_td,v 1.6 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86MCInstLower_cpp,v 1.11 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86MachineFunctionInfo_h,v 1.6 2022/01/03 21:33:51 jca Exp $
|
||||
|
||||
implement -msave-args in clang/llvm, like the sun did for gcc
|
||||
|
||||
Index: lib/Target/X86/X86MachineFunctionInfo.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86RegisterInfo_td,v 1.9 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
- The compiler is generally free to allocate general purpose registers in
|
||||
whatever order it chooses. Reasons for choosing one register before another
|
||||
usually include compiled instruction size (avoidance of REX prefixes, etc.)
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86ReturnProtectorLowering_cpp,v 1.2 2019/07/09 13:21:37 jca Exp $
|
||||
|
||||
- Refactor retguard to make adding additional arches easier.
|
||||
- Do not store the retguard cookie in frame in leaf functions if possible.
|
||||
Makes things slightly faster and also improves security in these functions,
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86ReturnProtectorLowering_h,v 1.1 2018/08/21 06:56:09 ajacoutot Exp $
|
||||
|
||||
Refactor retguard to make adding additional arches easier.
|
||||
|
||||
Index: lib/Target/X86/X86ReturnProtectorLowering.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86Subtarget_h,v 1.10 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
- implement -msave-args in clang/llvm, like the sun did for gcc
|
||||
- Turn on -mretpoline by default in clang on amd64.
|
||||
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86TargetMachine_cpp,v 1.10 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
Add a clang pass that identifies potential ROP gadgets and replaces ROP
|
||||
friendly instructions with safe alternatives. This initial commit fixes
|
||||
3 instruction forms that will lower to include a c3 (return) byte.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86_h,v 1.5 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
Add a clang pass that identifies potential ROP gadgets and replaces ROP
|
||||
friendly instructions with safe alternatives. This initial commit fixes
|
||||
3 instruction forms that will lower to include a c3 (return) byte.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Target_X86_X86_td,v 1.7 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
implement -msave-args in clang/llvm, like the sun did for gcc
|
||||
|
||||
Index: lib/Target/X86/X86.td
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-lib_Transforms_Scalar_LoopIdiomRecognize_cpp,v 1.8 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
Disable loop idiom recognition for _libc_memset and _libc_memcpy. These are
|
||||
the internal names we use in libc for memset and memcpy and having the
|
||||
compiler optimize them as calls to memset and memcpy will lead to infinite
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_include_clang_AST_FormatString_h,v 1.1 2019/07/09 13:21:37 jca Exp $
|
||||
|
||||
- The %b printf extension in the kernel is not fixed to a int type. On sparc64
|
||||
there are various %llb formats. Adjust the code to handle the length specifiers
|
||||
and type check like it is used by the regular case.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_include_clang_Basic_CodeGenOptions_def,v 1.8 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_include_clang_Basic_DiagnosticSemaKinds_td,v 1.11 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
- Disable -Waddress-of-packed-member by default.
|
||||
|
||||
While these warnings have the potential to be useful, there are too many
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_include_clang_Driver_Options_td,v 1.29 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
- Add ret protector options as no-ops.
|
||||
- Improve the X86FixupGadgets pass
|
||||
- Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_include_clang_Sema_Sema_h,v 1.8 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
Teach Clang about syslog format attribute
|
||||
|
||||
Index: tools/clang/include/clang/Sema/Sema.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_lib_AST_FormatString_cpp,v 1.3 2021/05/13 23:54:25 jca Exp $
|
||||
|
||||
- The %b printf extension in the kernel is not fixed to a int type. On sparc64
|
||||
there are various %llb formats. Adjust the code to handle the length specifiers
|
||||
and type check like it is used by the regular case.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_lib_Basic_Targets_Mips_h,v 1.2 2020/08/05 06:49:49 jca Exp $
|
||||
|
||||
- Implement the 'h' register constraint on mips64. This lets clang build
|
||||
pieces of software that use the constraint if the compiler claims
|
||||
to be compatible with GCC 4.2.1.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_lib_Basic_Targets_X86_cpp,v 1.7 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
implement -msave-args in clang/llvm, like the sun did for gcc
|
||||
|
||||
Index: tools/clang/lib/Basic/Targets/X86.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_lib_Basic_Targets_X86_h,v 1.8 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
- implement -msave-args in clang/llvm, like the sun did for gcc.
|
||||
|
||||
Index: tools/clang/lib/Basic/Targets/X86.h
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_lib_CodeGen_CGCall_cpp,v 1.6 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
Add RETGUARD to clang for amd64. This security mechanism uses per-function
|
||||
random cookies to protect access to function return instructions, with the
|
||||
effect that the integrity of the return address is protected, and function
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Arch_RISCV_cpp,v 1.2 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
- ld.lld doesn't properly support R_RISCV_RELAX relocations, switch the default to -no-relax
|
||||
|
||||
Index: tools/clang/lib/Driver/ToolChains/Arch/RISCV.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Arch_X86_cpp,v 1.7 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
- Turn on -mretpoline by default in clang on amd64.
|
||||
|
||||
Index: tools/clang/lib/Driver/ToolChains/Arch/X86.cpp
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Clang_cpp,v 1.22 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
- Switch Powerpc64 Big Endian to ELFv2 on OpenBSD.
|
||||
- Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
|
||||
- Disable -fstrict-aliasing per default on OpenBSD.
|
||||
|
@ -1,5 +1,3 @@
|
||||
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Gnu_cpp,v 1.11 2022/01/03 21:33:52 jca Exp $
|
||||
|
||||
- Disable IAS for OpenBSD SPARC.
|
||||
|
||||
Index: tools/clang/lib/Driver/ToolChains/Gnu.cpp
|
||||
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
x
Reference in New Issue
Block a user