Parso is a Python parser that supports error recovery and round-trip
parsing for different Python versions. Parso is also able to list
multiple syntax errors in your python file.
ok bcallah@
Simply loading this module makes your constructors "strict". If your
constructor is called with an attribute init argument that your class
does not declare, then it dies. This is a great way to catch small typos.
OK giovanni@
dependent ports, this restricts deps to use the current clang version
which is required for some ports using the unversioned libLLVM*.so
library. see https://marc.info/?l=openbsd-ports&m=152377935312657&w=2
- set RUN_DEPENDS on devel/llvm in lang/crystal as it uses libLLVM*.so
breakage reported by James Turner
I don't like this at all, but don't see what other option we have,
if anyone has a better idea please pipe up.
by reyk (most recently) and others.
All consumers tested by jca (sparc64) and myself (amd64).
moral support from phessler; a certain P4 guy also wants this.
ok jca -- many thanks for all your help with this!
This module lexically disables the use of bareword filehandles with
builtin functions, except for the special builtin filehandles STDIN,
STDOUT, STDERR, ARGV, ARGVOUT and DATA.
OK sthen@
With Mixin::Linewise::Readers and Mixin::Linewise::Writers, you can just write
a method to handle handles, and methods for handling strings and filenames are
added for you.
OK sthen@
xa is a high-speed, two-pass portable cross-assembler. It understands mnemonics
and generates code for NMOS 6502s (such as 6502A, 6504, 6507, 6510, 7501, 8500,
8501, 8502 ...), CMOS 6502s (65C02 and Rockwell R65C02) and the 65816.
Key features:
- C-like preprocessor (and understands cpp for additional feature support)
- Rich expression syntax and pseudo-op vocabulary
- Multiple character sets
- Binary linking
- Supports o65 relocatable objects with a full linker and relocation suite, as
well as "bare" plain binary object files block structure for label scoping
OK bcallah@, sthen@
- Add ret protector options as no-ops.
- Add a clang pass that identifies potential ROP gadgets and replaces ROP
friendly instructions with safe alternatives. This initial commit fixes
this framework.
- Add RETGUARD to clang for amd64. This security mechanism uses per-function
random cookies to protect access to function return instructions, with the
effect that the integrity of the return address is protected, and function
return instructions are harder to use in ROP gadgets.
- Put the new retguard symbols in their own section,
'.openbsd.randomdata.retguard', to make them easier to work with in the
kernel hibernate code.
- Pass -nopie to the linker when -pg is specified to make the
profiler(gprof) work properly.
- Work around a bug where discarding the .ARM.exidx section in the armv7 kernel
linker script makes ld.lld(1) crash. This has been fixed in a different
(proper?) way upstream but backporting their fix is a bit too invasive.
- Merge '.openbsd.randomdata.*' sections into a single '.openbsd.randomdata'
section when linking, as we do when using ld from binutils.
from Brad (maintainer)