Drop RCS Ids in the ports I maintain

This commit is contained in:
jca 2022-03-10 00:04:05 +00:00
parent ee08de4c0c
commit cd0fba1ff1
228 changed files with 7 additions and 414 deletions

View File

@ -1,5 +1,3 @@
# $OpenBSD: Makefile,v 1.10 2021/05/12 23:37:31 jca Exp $
COMMENT = Symas Lightning Memory-Mapped Database COMMENT = Symas Lightning Memory-Mapped Database
VERSION = 0.9.29 VERSION = 0.9.29

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-Makefile,v 1.1.1.1 2018/06/06 10:34:28 rsadowski Exp $
Index: Makefile Index: Makefile
--- Makefile.orig --- Makefile.orig
+++ Makefile +++ Makefile

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-mdb_c,v 1.7 2021/05/12 23:37:31 jca Exp $
enforce MDB_WRITEMAP, because we have no UBC (Unified Buffer Cache). enforce MDB_WRITEMAP, because we have no UBC (Unified Buffer Cache).
Index: mdb.c Index: mdb.c

View File

@ -1,4 +1,3 @@
@comment $OpenBSD: PLIST,v 1.2 2019/12/06 14:22:54 jca Exp $
@bin bin/mdb_copy @bin bin/mdb_copy
@bin bin/mdb_dump @bin bin/mdb_dump
@bin bin/mdb_load @bin bin/mdb_load

View File

@ -1,5 +1,3 @@
# $OpenBSD: Makefile,v 1.30 2021/11/02 00:00:24 sthen Exp $
COMMENT-main= hierarchical memory pool system with destructors COMMENT-main= hierarchical memory pool system with destructors
COMMENT-python= Python ${MODPY_VERSION} bindings for talloc COMMENT-python= Python ${MODPY_VERSION} bindings for talloc

View File

@ -1,4 +1,3 @@
$OpenBSD: patch-Makefile,v 1.2 2019/12/04 00:15:22 jca Exp $
Index: Makefile Index: Makefile
--- Makefile.orig --- Makefile.orig
+++ Makefile +++ Makefile

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-buildtools_wafsamba_samba_install_py,v 1.5 2021/05/12 23:31:39 jca Exp $
- respect OpenBSD shared libraries versioning - respect OpenBSD shared libraries versioning
- --version-script fails if specified multipled times - --version-script fails if specified multipled times

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-buildtools_wafsamba_wafsamba_py,v 1.6 2021/05/12 23:31:39 jca Exp $
- allow the library version to be overriden - allow the library version to be overriden
Index: buildtools/wafsamba/wafsamba.py Index: buildtools/wafsamba/wafsamba.py

View File

@ -1,4 +1,3 @@
@comment $OpenBSD: PLIST-main,v 1.1 2021/03/05 10:42:29 sthen Exp $
@pkgpath devel/libtalloc @pkgpath devel/libtalloc
include/talloc.h include/talloc.h
@lib lib/libtalloc.so.${LIBtalloc_VERSION} @lib lib/libtalloc.so.${LIBtalloc_VERSION}

View File

@ -1,4 +1,3 @@
@comment $OpenBSD: PLIST-python,v 1.2 2021/05/12 23:31:39 jca Exp $
@conflict libtalloc-<2.1.16p0 @conflict libtalloc-<2.1.16p0
include/pytalloc.h include/pytalloc.h
@comment @lib lib/libpytalloc-util.${PYTALLOC_UTIL_LIBSUFFIX} @comment @lib lib/libpytalloc-util.${PYTALLOC_UTIL_LIBSUFFIX}

View File

@ -1,5 +1,3 @@
# $OpenBSD: Makefile,v 1.23 2022/02/20 18:27:35 jca Exp $
COMMENT = user-level RCU implementation COMMENT = user-level RCU implementation
DISTNAME = userspace-rcu-0.13.1 DISTNAME = userspace-rcu-0.13.1

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_urcu_syscall-compat_h,v 1.2 2021/07/24 16:45:24 jca Exp $
Index: include/urcu/syscall-compat.h Index: include/urcu/syscall-compat.h
--- include/urcu/syscall-compat.h.orig --- include/urcu/syscall-compat.h.orig
+++ include/urcu/syscall-compat.h +++ include/urcu/syscall-compat.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tests_benchmark_common_sh,v 1.2 2021/07/24 16:45:24 jca Exp $
Our time(1) doesn't support -a and -o options. Our time(1) doesn't support -a and -o options.
Index: tests/benchmark/common.sh Index: tests/benchmark/common.sh

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tests_common_thread-id_h,v 1.3 2018/11/27 12:04:36 jca Exp $
XXX not portable, but used by tests only. XXX not portable, but used by tests only.
Index: tests/common/thread-id.h Index: tests/common/thread-id.h

View File

@ -1,4 +1,3 @@
@comment $OpenBSD: PLIST,v 1.7 2022/02/20 18:27:35 jca Exp $
include/urcu/ include/urcu/
include/urcu-bp.h include/urcu-bp.h
include/urcu-call-rcu.h include/urcu-call-rcu.h

View File

@ -1,4 +1,4 @@
# $OpenBSD: Makefile,v 1.290 2022/02/26 22:59:44 naddy Exp $ # $OpenBSD: Makefile,v 1.291 2022/03/10 00:04:05 jca Exp $
# XXX If broken on an architecture, remove the arch from LLVM_ARCHS. # XXX If broken on an architecture, remove the arch from LLVM_ARCHS.
ONLY_FOR_ARCHS = ${LLVM_ARCHS} ONLY_FOR_ARCHS = ${LLVM_ARCHS}
@ -17,7 +17,7 @@ PKGNAME = llvm-${LLVM_V}
PKGSPEC-main = llvm-=${LLVM_V} PKGSPEC-main = llvm-=${LLVM_V}
PKGNAME-python = py3-llvm-${LLVM_V} PKGNAME-python = py3-llvm-${LLVM_V}
PKGNAME-lldb = lldb-${LLVM_V} PKGNAME-lldb = lldb-${LLVM_V}
REVISION-main = 1 REVISION-main = 2
CATEGORIES = devel CATEGORIES = devel

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-cmake_modules_GetLibraryName_cmake,v 1.1 2022/01/03 21:33:51 jca Exp $
Properly parse library suffixes on OpenBSD Properly parse library suffixes on OpenBSD
Index: cmake/modules/GetLibraryName.cmake Index: cmake/modules/GetLibraryName.cmake

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-cmake_modules_LLVMProcessSources_cmake,v 1.1 2019/12/25 21:58:23 jca Exp $
Avoid adding a dep on all headers in ${LOCALBASE}/include, not Avoid adding a dep on all headers in ${LOCALBASE}/include, not
compatible with dpb(1) junking. compatible with dpb(1) junking.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_CodeGen_AsmPrinter_h,v 1.8 2022/01/03 21:33:51 jca Exp $
Use int3 trap padding between functions instead of trapsleds with a leading jump. Use int3 trap padding between functions instead of trapsleds with a leading jump.
Index: include/llvm/CodeGen/AsmPrinter.h Index: include/llvm/CodeGen/AsmPrinter.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_CodeGen_MachineFrameInfo_h,v 1.6 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function - Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_CodeGen_Passes_h,v 1.5 2022/01/03 21:33:51 jca Exp $
Add RETGUARD to clang for amd64. This security mechanism uses per-function Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_CodeGen_ReturnProtectorLowering_h,v 1.2 2019/07/09 13:21:37 jca Exp $
- Refactor retguard to make adding additional arches easier. - Refactor retguard to make adding additional arches easier.
- Do not store the retguard cookie in frame in leaf functions if possible. - Do not store the retguard cookie in frame in leaf functions if possible.
Makes things slightly faster and also improves security in these functions, Makes things slightly faster and also improves security in these functions,

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_CodeGen_TargetFrameLowering_h,v 1.7 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function - Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-include_llvm_InitializePasses_h,v 1.6 2022/01/03 21:33:51 jca Exp $
Add RETGUARD to clang for amd64. This security mechanism uses per-function Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_AsmPrinter_AsmPrinter_cpp,v 1.13 2022/01/03 21:33:51 jca Exp $
- Use int3 trap padding between functions instead of trapsleds with a leading jump. - Use int3 trap padding between functions instead of trapsleds with a leading jump.
- Emit trap alignment between basic blocks that are unreachable via - Emit trap alignment between basic blocks that are unreachable via
fallthrough. Avoids unnecessary jmp instructions in the middle fallthrough. Avoids unnecessary jmp instructions in the middle

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_CMakeLists_txt,v 1.7 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function - Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_PrologEpilogInserter_cpp,v 1.7 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function - Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_ReturnProtectorLowering_cpp,v 1.4 2021/05/13 23:54:24 jca Exp $
- Refactor retguard to make adding additional arches easier. - Refactor retguard to make adding additional arches easier.
- Do not store the retguard cookie in frame in leaf functions if possible. - Do not store the retguard cookie in frame in leaf functions if possible.
Makes things slightly faster and also improves security in these functions, Makes things slightly faster and also improves security in these functions,

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_ReturnProtectorPass_cpp,v 1.4 2020/08/05 06:49:48 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function - Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_CodeGen_TargetPassConfig_cpp,v 1.6 2022/01/03 21:33:51 jca Exp $
Add RETGUARD to clang for amd64. This security mechanism uses per-function Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_MC_MCAsmInfoELF_cpp,v 1.4 2020/08/05 06:49:48 jca Exp $
Do not use ident. Do not use ident.
Index: lib/MC/MCAsmInfoELF.cpp Index: lib/MC/MCAsmInfoELF.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_MC_MCELFStreamer_cpp,v 1.9 2022/01/03 21:33:51 jca Exp $
getNonexecutableStackSection() may return nullptr. getNonexecutableStackSection() may return nullptr.
Index: lib/MC/MCELFStreamer.cpp Index: lib/MC/MCELFStreamer.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_MC_MCParser_AsmParser_cpp,v 1.10 2022/01/03 21:33:51 jca Exp $
make clang include a FILE symbol for .(s|S) files make clang include a FILE symbol for .(s|S) files
This is mostly needed by syspatch at the moment to be This is mostly needed by syspatch at the moment to be

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64AsmPrinter_cpp,v 1.6 2022/01/03 21:33:51 jca Exp $
Add retguard for arm64. Add retguard for arm64.
Index: lib/Target/AArch64/AArch64AsmPrinter.cpp Index: lib/Target/AArch64/AArch64AsmPrinter.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64FrameLowering_cpp,v 1.7 2022/01/03 21:33:51 jca Exp $
Add retguard for arm64. Add retguard for arm64.
Index: lib/Target/AArch64/AArch64FrameLowering.cpp Index: lib/Target/AArch64/AArch64FrameLowering.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64FrameLowering_h,v 1.4 2022/01/03 21:33:51 jca Exp $
Add retguard for arm64. Add retguard for arm64.
Index: lib/Target/AArch64/AArch64FrameLowering.h Index: lib/Target/AArch64/AArch64FrameLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64ISelLowering_cpp,v 1.13 2022/01/03 21:33:51 jca Exp $
Disable the Load Stack Guard for OpenBSD on AArch64. We don't use it Disable the Load Stack Guard for OpenBSD on AArch64. We don't use it
on any other platform and it causes a segfault in combination with our on any other platform and it causes a segfault in combination with our
IR Stack Guard. IR Stack Guard.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64InstrInfo_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
XXX no comment XXX no comment
Index: lib/Target/AArch64/AArch64InstrInfo.cpp Index: lib/Target/AArch64/AArch64InstrInfo.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64InstrInfo_td,v 1.6 2022/01/03 21:33:51 jca Exp $
Add retguard for arm64. Add retguard for arm64.
Index: lib/Target/AArch64/AArch64InstrInfo.td Index: lib/Target/AArch64/AArch64InstrInfo.td

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64ReturnProtectorLowering_cpp,v 1.3 2020/11/18 21:13:37 jca Exp $
- Add retguard for arm64. - Add retguard for arm64.
- Do not store the retguard cookie in frame in leaf functions if possible. - Do not store the retguard cookie in frame in leaf functions if possible.
Makes things slightly faster and also improves security in these functions, Makes things slightly faster and also improves security in these functions,

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64ReturnProtectorLowering_h,v 1.2 2019/07/09 13:21:37 jca Exp $
- Add retguard for arm64. - Add retguard for arm64.
- Do not store the retguard cookie in frame in leaf functions if possible. - Do not store the retguard cookie in frame in leaf functions if possible.
Makes things slightly faster and also improves security in these functions, Makes things slightly faster and also improves security in these functions,

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64Subtarget_h,v 1.9 2022/01/03 21:33:51 jca Exp $
Disable the Load Stack Guard for OpenBSD on AArch64. We don't use it Disable the Load Stack Guard for OpenBSD on AArch64. We don't use it
on any other platform and it causes a segfault in combination with our on any other platform and it causes a segfault in combination with our
IR Stack Guard. IR Stack Guard.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_AArch64TargetMachine_cpp,v 1.4 2022/01/03 21:33:51 jca Exp $
Always disable GlobalISel on aarch64, fixes a crash when building on Always disable GlobalISel on aarch64, fixes a crash when building on
aarch64 without retguard, with a stack protector and without aarch64 without retguard, with a stack protector and without
optimizations. optimizations.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_AArch64_CMakeLists_txt,v 1.5 2022/01/03 21:33:51 jca Exp $
Add retguard for arm64. Add retguard for arm64.
Index: lib/Target/AArch64/CMakeLists.txt Index: lib/Target/AArch64/CMakeLists.txt

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_AsmParser_MipsAsmParser_cpp,v 1.5 2021/05/13 23:54:24 jca Exp $
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang. Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
Index: lib/Target/Mips/AsmParser/MipsAsmParser.cpp Index: lib/Target/Mips/AsmParser/MipsAsmParser.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_CMakeLists_txt,v 1.4 2022/01/03 21:33:51 jca Exp $
- Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang. - Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
- Add retguard for octeon/mips64. - Add retguard for octeon/mips64.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MCTargetDesc_MipsABIInfo_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang. Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
Index: lib/Target/Mips/MCTargetDesc/MipsABIInfo.cpp Index: lib/Target/Mips/MCTargetDesc/MipsABIInfo.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsAsmPrinter_cpp,v 1.5 2021/05/13 23:54:24 jca Exp $
- Add retguard for octeon/mips64. - Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsAsmPrinter.cpp Index: lib/Target/Mips/MipsAsmPrinter.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsFrameLowering_cpp,v 1.2 2020/08/05 06:49:48 jca Exp $
Add retguard for octeon/mips64. Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsFrameLowering.cpp Index: lib/Target/Mips/MipsFrameLowering.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsFrameLowering_h,v 1.2 2020/08/05 06:49:48 jca Exp $
Add retguard for octeon/mips64. Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsFrameLowering.h Index: lib/Target/Mips/MipsFrameLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsISelLowering_cpp,v 1.4 2022/01/03 21:33:51 jca Exp $
- Implement the 'h' register constraint on mips64. This lets clang build - Implement the 'h' register constraint on mips64. This lets clang build
pieces of software that use the constraint if the compiler claims pieces of software that use the constraint if the compiler claims
to be compatible with GCC 4.2.1. to be compatible with GCC 4.2.1.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsInstrInfo_td,v 1.4 2021/05/13 23:54:24 jca Exp $
- Add retguard for octeon/mips64. - Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsInstrInfo.td Index: lib/Target/Mips/MipsInstrInfo.td

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsLoongson2FBTBFix_cpp,v 1.1 2020/12/21 21:38:51 jca Exp $
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang. Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
Index: lib/Target/Mips/MipsLoongson2FBTBFix.cpp Index: lib/Target/Mips/MipsLoongson2FBTBFix.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsReturnProtectorLowering_cpp,v 1.2 2020/06/15 21:34:58 gkoehler Exp $
Add retguard for octeon/mips64. Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsReturnProtectorLowering.cpp Index: lib/Target/Mips/MipsReturnProtectorLowering.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsReturnProtectorLowering_h,v 1.1 2020/01/07 22:59:43 jca Exp $
Add retguard for octeon/mips64. Add retguard for octeon/mips64.
Index: lib/Target/Mips/MipsReturnProtectorLowering.h Index: lib/Target/Mips/MipsReturnProtectorLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_MipsTargetMachine_cpp,v 1.3 2022/01/03 21:33:51 jca Exp $
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang. Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
Index: lib/Target/Mips/MipsTargetMachine.cpp Index: lib/Target/Mips/MipsTargetMachine.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Mips_Mips_h,v 1.1 2020/12/21 21:38:51 jca Exp $
Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang. Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
Index: lib/Target/Mips/Mips.h Index: lib/Target/Mips/Mips.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_CMakeLists_txt,v 1.3 2022/01/03 21:33:51 jca Exp $
Index: lib/Target/PowerPC/CMakeLists.txt Index: lib/Target/PowerPC/CMakeLists.txt
--- lib/Target/PowerPC/CMakeLists.txt.orig --- lib/Target/PowerPC/CMakeLists.txt.orig
+++ lib/Target/PowerPC/CMakeLists.txt +++ lib/Target/PowerPC/CMakeLists.txt

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCAsmPrinter_cpp,v 1.10 2022/01/03 21:33:51 jca Exp $
Add RETGUARD implementation for powerpc and powerpc64. Add RETGUARD implementation for powerpc and powerpc64.
Index: lib/Target/PowerPC/PPCAsmPrinter.cpp Index: lib/Target/PowerPC/PPCAsmPrinter.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCFrameLowering_cpp,v 1.5 2022/01/03 21:33:51 jca Exp $
Add RETGUARD implementation for powerpc and powerpc64. Add RETGUARD implementation for powerpc and powerpc64.
Index: lib/Target/PowerPC/PPCFrameLowering.cpp Index: lib/Target/PowerPC/PPCFrameLowering.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCFrameLowering_h,v 1.5 2022/01/03 21:33:51 jca Exp $
Add RETGUARD implementation for powerpc and powerpc64. Add RETGUARD implementation for powerpc and powerpc64.
Index: lib/Target/PowerPC/PPCFrameLowering.h Index: lib/Target/PowerPC/PPCFrameLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCInstrInfo_td,v 1.5 2022/01/03 21:33:51 jca Exp $
Add RETGUARD implementation for powerpc and powerpc64. Add RETGUARD implementation for powerpc and powerpc64.
Index: lib/Target/PowerPC/PPCInstrInfo.td Index: lib/Target/PowerPC/PPCInstrInfo.td

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCReturnProtectorLowering_cpp,v 1.1 2020/11/18 21:20:00 jca Exp $
- Add RETGUARD implementation for powerpc and powerpc64. - Add RETGUARD implementation for powerpc and powerpc64.
- Use all 64 bits of the RETGUARD cookie on powerpc64. - Use all 64 bits of the RETGUARD cookie on powerpc64.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCReturnProtectorLowering_h,v 1.1 2020/11/18 21:20:00 jca Exp $
Add RETGUARD implementation for powerpc and powerpc64. Add RETGUARD implementation for powerpc and powerpc64.
Index: lib/Target/PowerPC/PPCReturnProtectorLowering.h Index: lib/Target/PowerPC/PPCReturnProtectorLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_PowerPC_PPCTargetMachine_cpp,v 1.4 2022/01/03 21:33:51 jca Exp $
Switch Powerpc64 Big Endian to ELFv2 on OpenBSD. Switch Powerpc64 Big Endian to ELFv2 on OpenBSD.
Index: lib/Target/PowerPC/PPCTargetMachine.cpp Index: lib/Target/PowerPC/PPCTargetMachine.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_RISCV_RISCVISelLowering_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
- enable EmuTLS on RiscV. - enable EmuTLS on RiscV.
Index: lib/Target/RISCV/RISCVISelLowering.cpp Index: lib/Target/RISCV/RISCVISelLowering.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Sparc_SparcISelLowering_cpp,v 1.9 2022/01/03 21:33:51 jca Exp $
- Make sure that we really don't emit quad-precision unless the - Make sure that we really don't emit quad-precision unless the
"hard-quad-float" feature is available "hard-quad-float" feature is available

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Sparc_SparcInstr64Bit_td,v 1.8 2020/08/05 06:49:48 jca Exp $
Make sure that we really don't emit quad-precision unless the Make sure that we really don't emit quad-precision unless the
"hard-quad-float" feature is available. "hard-quad-float" feature is available.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_Sparc_SparcInstrInfo_td,v 1.12 2022/01/03 21:33:51 jca Exp $
Make sure that we really don't emit quad-precision unless the Make sure that we really don't emit quad-precision unless the
"hard-quad-float" feature is available "hard-quad-float" feature is available

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_CMakeLists_txt,v 1.7 2022/01/03 21:33:51 jca Exp $
- Add a clang pass that identifies potential ROP gadgets and replaces ROP - Add a clang pass that identifies potential ROP gadgets and replaces ROP
friendly instructions with safe alternatives. This initial commit fixes friendly instructions with safe alternatives. This initial commit fixes
3 instruction forms that will lower to include a c3 (return) byte. 3 instruction forms that will lower to include a c3 (return) byte.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86AsmPrinter_h,v 1.8 2021/05/13 23:54:25 jca Exp $
Use int3 trap padding between functions instead of trapsleds with a leading jump. Use int3 trap padding between functions instead of trapsleds with a leading jump.
Index: lib/Target/X86/X86AsmPrinter.h Index: lib/Target/X86/X86AsmPrinter.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86FixupGadgets_cpp,v 1.5 2021/07/12 23:54:05 jca Exp $
- Add a clang pass that identifies potential ROP gadgets and replaces ROP - Add a clang pass that identifies potential ROP gadgets and replaces ROP
friendly instructions with safe alternatives. This initial commit fixes friendly instructions with safe alternatives. This initial commit fixes
3 instruction forms that will lower to include a c3 (return) byte. 3 instruction forms that will lower to include a c3 (return) byte.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86FrameLowering_cpp,v 1.10 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function - Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86FrameLowering_h,v 1.8 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function - Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86IndirectThunks_cpp,v 1.2 2022/01/03 21:33:51 jca Exp $
Add lfence after ret in retpoline thunk. Add lfence after ret in retpoline thunk.
Index: lib/Target/X86/X86IndirectThunks.cpp Index: lib/Target/X86/X86IndirectThunks.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86InstrCompiler_td,v 1.6 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function - Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86MCInstLower_cpp,v 1.11 2022/01/03 21:33:51 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function - Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86MachineFunctionInfo_h,v 1.6 2022/01/03 21:33:51 jca Exp $
implement -msave-args in clang/llvm, like the sun did for gcc implement -msave-args in clang/llvm, like the sun did for gcc
Index: lib/Target/X86/X86MachineFunctionInfo.h Index: lib/Target/X86/X86MachineFunctionInfo.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86RegisterInfo_td,v 1.9 2022/01/03 21:33:52 jca Exp $
- The compiler is generally free to allocate general purpose registers in - The compiler is generally free to allocate general purpose registers in
whatever order it chooses. Reasons for choosing one register before another whatever order it chooses. Reasons for choosing one register before another
usually include compiled instruction size (avoidance of REX prefixes, etc.) usually include compiled instruction size (avoidance of REX prefixes, etc.)

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86ReturnProtectorLowering_cpp,v 1.2 2019/07/09 13:21:37 jca Exp $
- Refactor retguard to make adding additional arches easier. - Refactor retguard to make adding additional arches easier.
- Do not store the retguard cookie in frame in leaf functions if possible. - Do not store the retguard cookie in frame in leaf functions if possible.
Makes things slightly faster and also improves security in these functions, Makes things slightly faster and also improves security in these functions,

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86ReturnProtectorLowering_h,v 1.1 2018/08/21 06:56:09 ajacoutot Exp $
Refactor retguard to make adding additional arches easier. Refactor retguard to make adding additional arches easier.
Index: lib/Target/X86/X86ReturnProtectorLowering.h Index: lib/Target/X86/X86ReturnProtectorLowering.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86Subtarget_h,v 1.10 2022/01/03 21:33:52 jca Exp $
- implement -msave-args in clang/llvm, like the sun did for gcc - implement -msave-args in clang/llvm, like the sun did for gcc
- Turn on -mretpoline by default in clang on amd64. - Turn on -mretpoline by default in clang on amd64.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86TargetMachine_cpp,v 1.10 2022/01/03 21:33:52 jca Exp $
Add a clang pass that identifies potential ROP gadgets and replaces ROP Add a clang pass that identifies potential ROP gadgets and replaces ROP
friendly instructions with safe alternatives. This initial commit fixes friendly instructions with safe alternatives. This initial commit fixes
3 instruction forms that will lower to include a c3 (return) byte. 3 instruction forms that will lower to include a c3 (return) byte.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86_h,v 1.5 2022/01/03 21:33:52 jca Exp $
Add a clang pass that identifies potential ROP gadgets and replaces ROP Add a clang pass that identifies potential ROP gadgets and replaces ROP
friendly instructions with safe alternatives. This initial commit fixes friendly instructions with safe alternatives. This initial commit fixes
3 instruction forms that will lower to include a c3 (return) byte. 3 instruction forms that will lower to include a c3 (return) byte.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Target_X86_X86_td,v 1.7 2022/01/03 21:33:52 jca Exp $
implement -msave-args in clang/llvm, like the sun did for gcc implement -msave-args in clang/llvm, like the sun did for gcc
Index: lib/Target/X86/X86.td Index: lib/Target/X86/X86.td

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-lib_Transforms_Scalar_LoopIdiomRecognize_cpp,v 1.8 2022/01/03 21:33:52 jca Exp $
Disable loop idiom recognition for _libc_memset and _libc_memcpy. These are Disable loop idiom recognition for _libc_memset and _libc_memcpy. These are
the internal names we use in libc for memset and memcpy and having the the internal names we use in libc for memset and memcpy and having the
compiler optimize them as calls to memset and memcpy will lead to infinite compiler optimize them as calls to memset and memcpy will lead to infinite

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_include_clang_AST_FormatString_h,v 1.1 2019/07/09 13:21:37 jca Exp $
- The %b printf extension in the kernel is not fixed to a int type. On sparc64 - The %b printf extension in the kernel is not fixed to a int type. On sparc64
there are various %llb formats. Adjust the code to handle the length specifiers there are various %llb formats. Adjust the code to handle the length specifiers
and type check like it is used by the regular case. and type check like it is used by the regular case.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_include_clang_Basic_CodeGenOptions_def,v 1.8 2022/01/03 21:33:52 jca Exp $
- Add RETGUARD to clang for amd64. This security mechanism uses per-function - Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_include_clang_Basic_DiagnosticSemaKinds_td,v 1.11 2022/01/03 21:33:52 jca Exp $
- Disable -Waddress-of-packed-member by default. - Disable -Waddress-of-packed-member by default.
While these warnings have the potential to be useful, there are too many While these warnings have the potential to be useful, there are too many

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_include_clang_Driver_Options_td,v 1.29 2022/01/03 21:33:52 jca Exp $
- Add ret protector options as no-ops. - Add ret protector options as no-ops.
- Improve the X86FixupGadgets pass - Improve the X86FixupGadgets pass
- Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang. - Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_include_clang_Sema_Sema_h,v 1.8 2022/01/03 21:33:52 jca Exp $
Teach Clang about syslog format attribute Teach Clang about syslog format attribute
Index: tools/clang/include/clang/Sema/Sema.h Index: tools/clang/include/clang/Sema/Sema.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_AST_FormatString_cpp,v 1.3 2021/05/13 23:54:25 jca Exp $
- The %b printf extension in the kernel is not fixed to a int type. On sparc64 - The %b printf extension in the kernel is not fixed to a int type. On sparc64
there are various %llb formats. Adjust the code to handle the length specifiers there are various %llb formats. Adjust the code to handle the length specifiers
and type check like it is used by the regular case. and type check like it is used by the regular case.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Basic_Targets_Mips_h,v 1.2 2020/08/05 06:49:49 jca Exp $
- Implement the 'h' register constraint on mips64. This lets clang build - Implement the 'h' register constraint on mips64. This lets clang build
pieces of software that use the constraint if the compiler claims pieces of software that use the constraint if the compiler claims
to be compatible with GCC 4.2.1. to be compatible with GCC 4.2.1.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Basic_Targets_X86_cpp,v 1.7 2022/01/03 21:33:52 jca Exp $
implement -msave-args in clang/llvm, like the sun did for gcc implement -msave-args in clang/llvm, like the sun did for gcc
Index: tools/clang/lib/Basic/Targets/X86.cpp Index: tools/clang/lib/Basic/Targets/X86.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Basic_Targets_X86_h,v 1.8 2022/01/03 21:33:52 jca Exp $
- implement -msave-args in clang/llvm, like the sun did for gcc. - implement -msave-args in clang/llvm, like the sun did for gcc.
Index: tools/clang/lib/Basic/Targets/X86.h Index: tools/clang/lib/Basic/Targets/X86.h

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_CodeGen_CGCall_cpp,v 1.6 2022/01/03 21:33:52 jca Exp $
Add RETGUARD to clang for amd64. This security mechanism uses per-function Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function effect that the integrity of the return address is protected, and function

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Arch_RISCV_cpp,v 1.2 2022/01/03 21:33:52 jca Exp $
- ld.lld doesn't properly support R_RISCV_RELAX relocations, switch the default to -no-relax - ld.lld doesn't properly support R_RISCV_RELAX relocations, switch the default to -no-relax
Index: tools/clang/lib/Driver/ToolChains/Arch/RISCV.cpp Index: tools/clang/lib/Driver/ToolChains/Arch/RISCV.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Arch_X86_cpp,v 1.7 2022/01/03 21:33:52 jca Exp $
- Turn on -mretpoline by default in clang on amd64. - Turn on -mretpoline by default in clang on amd64.
Index: tools/clang/lib/Driver/ToolChains/Arch/X86.cpp Index: tools/clang/lib/Driver/ToolChains/Arch/X86.cpp

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Clang_cpp,v 1.22 2022/01/03 21:33:52 jca Exp $
- Switch Powerpc64 Big Endian to ELFv2 on OpenBSD. - Switch Powerpc64 Big Endian to ELFv2 on OpenBSD.
- Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang. - Adapt the -mfix-loongson2f-btb workaround from as(1) to LLVM/clang.
- Disable -fstrict-aliasing per default on OpenBSD. - Disable -fstrict-aliasing per default on OpenBSD.

View File

@ -1,5 +1,3 @@
$OpenBSD: patch-tools_clang_lib_Driver_ToolChains_Gnu_cpp,v 1.11 2022/01/03 21:33:52 jca Exp $
- Disable IAS for OpenBSD SPARC. - Disable IAS for OpenBSD SPARC.
Index: tools/clang/lib/Driver/ToolChains/Gnu.cpp Index: tools/clang/lib/Driver/ToolChains/Gnu.cpp

Some files were not shown because too many files have changed in this diff Show More