pkgsrc-WIP-changes archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

compiler-rt-netbsd: Update to SVN r. 323038



Module Name:	pkgsrc-wip
Committed By:	Kamil Rytarowski <n54%gmx.com@localhost>
Pushed By:	kamil
Date:		Sat Jan 20 15:39:46 2018 +0100
Changeset:	cc502f6844733b6cb6a0cd9a7c5058d291421757

Modified Files:
	compiler-rt-netbsd/Makefile
	compiler-rt-netbsd/distinfo
	compiler-rt-netbsd/patches/patch-include_sanitizer_netbsd__syscall__hooks.h
	compiler-rt-netbsd/patches/patch-lib_fuzzer_tests_CMakeLists.txt
	compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__common__interceptors.inc
	compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__netbsd__interceptors__ioctl.inc
	compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__netbsd__syscalls.inc
	compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__platform__interceptors.h
	compiler-rt-netbsd/patches/patch-lib_scudo_scudo__platform.h
	compiler-rt-netbsd/patches/patch-test_asan_lit.cfg
	compiler-rt-netbsd/patches/patch-test_scudo_lit.cfg
	compiler-rt-netbsd/patches/patch-utils_generate__netbsd__ioctls.awk
	compiler-rt-netbsd/patches/patch-utils_generate__netbsd__syscalls.awk

Log Message:
compiler-rt-netbsd: Update to SVN r. 323038

Local patches merged upstream:
D42046: Intercept accept4() on NetBSD
https://reviews.llvm.org/D42046

D42045: Support the localtime interceptor for NetBSD
https://reviews.llvm.org/D42045

Sponsored by <The NetBSD Foundation>

To see a diff of this commit:
https://wip.pkgsrc.org/cgi-bin/gitweb.cgi?p=pkgsrc-wip.git;a=commitdiff;h=cc502f6844733b6cb6a0cd9a7c5058d291421757

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

diffstat:
 compiler-rt-netbsd/Makefile                        |  2 +-
 compiler-rt-netbsd/distinfo                        | 22 +++++------
 ...atch-include_sanitizer_netbsd__syscall__hooks.h |  2 +-
 .../patches/patch-lib_fuzzer_tests_CMakeLists.txt  |  2 +-
 ...zer__common_sanitizer__common__interceptors.inc | 44 +++++++++-------------
 ...mmon_sanitizer__netbsd__interceptors__ioctl.inc |  2 +-
 ...nitizer__common_sanitizer__netbsd__syscalls.inc |  2 +-
 ...zer__common_sanitizer__platform__interceptors.h |  8 ++--
 .../patches/patch-lib_scudo_scudo__platform.h      |  2 +-
 compiler-rt-netbsd/patches/patch-test_asan_lit.cfg |  4 +-
 .../patches/patch-test_scudo_lit.cfg               |  6 +--
 .../patch-utils_generate__netbsd__ioctls.awk       |  2 +-
 .../patch-utils_generate__netbsd__syscalls.awk     |  2 +-
 13 files changed, 45 insertions(+), 55 deletions(-)

diffs:
diff --git a/compiler-rt-netbsd/Makefile b/compiler-rt-netbsd/Makefile
index 1147e97299..70b9c3d3d2 100644
--- a/compiler-rt-netbsd/Makefile
+++ b/compiler-rt-netbsd/Makefile
@@ -5,7 +5,7 @@ CATEGORIES=	lang devel
 
 SVN_REPOSITORIES=	compiler-rt
 SVN_REPO.compiler-rt=	http://llvm.org/svn/llvm-project/compiler-rt/trunk
-SVN_REVISION.compiler-rt=	322947
+SVN_REVISION.compiler-rt=	323038
 
 MAINTAINER=	pkgsrc-users%NetBSD.org@localhost
 HOMEPAGE=	http://compiler-rt.llvm.org/
diff --git a/compiler-rt-netbsd/distinfo b/compiler-rt-netbsd/distinfo
index 3873fecbb2..a64dc209c6 100644
--- a/compiler-rt-netbsd/distinfo
+++ b/compiler-rt-netbsd/distinfo
@@ -2,28 +2,28 @@ $NetBSD: distinfo,v 1.35 2015/09/11 01:21:57 tnn Exp $
 
 SHA1 (patch-cmake_config-ix.cmake) = 11195c8254c84d5972a2ffee8a9e66758ab7105b
 SHA1 (patch-include_CMakeLists.txt) = b6f2713b7e5337aed542442936b6f747efe0a607
-SHA1 (patch-include_sanitizer_netbsd__syscall__hooks.h) = 728e5f9bd0c6eaa242bc3b4612a182f702189c73
+SHA1 (patch-include_sanitizer_netbsd__syscall__hooks.h) = 0cfe2581c93293197e18bb2fead71c251aee2898
 SHA1 (patch-lib_asan_asan__interceptors.cc) = ea4005ce02775060ff52af76d568c450892067b5
 SHA1 (patch-lib_esan_esan__interceptors.cpp) = a7103ca053e92a810c87c593262bb386f3d02606
-SHA1 (patch-lib_fuzzer_tests_CMakeLists.txt) = d15d3869f2c1bbbf13c0a1dead902e8734e5d4f8
+SHA1 (patch-lib_fuzzer_tests_CMakeLists.txt) = bed69bc433f70ec4d88fc5aa11d47ffbd18f4b74
 SHA1 (patch-lib_hwasan_hwasan__interceptors.cc) = c49ab3759728bbd3e27580a3d0d3e2db0bceb2a6
 SHA1 (patch-lib_msan_msan__interceptors.cc) = 9f0c1a05430314581b1711f1d5a1ab8870053879
 SHA1 (patch-lib_msan_msan__linux.cc) = d75d7587071a9e7a3f6a08a3008af55319e62cab
 SHA1 (patch-lib_sanitizer__common_CMakeLists.txt) = fcbf2987ccab5258fe760aef6ef47bd97e0e0b2c
-SHA1 (patch-lib_sanitizer__common_sanitizer__common__interceptors.inc) = 9b84657b7350cb93cc42747e478b9bfadfb40182
+SHA1 (patch-lib_sanitizer__common_sanitizer__common__interceptors.inc) = 546d892d17802f9793c4212c5ca0d215665ba719
 SHA1 (patch-lib_sanitizer__common_sanitizer__common__interceptors__ioctl.inc) = 231f519a0564aa69d746a7f0bbee1b1aeed927a7
 SHA1 (patch-lib_sanitizer__common_sanitizer__internal__defs.h) = 2ff74de8be0825ca4162969cb2ed367654934a17
 SHA1 (patch-lib_sanitizer__common_sanitizer__linux.cc) = b1057f01ae2f03498613eb1a02501c8a65d16fed
-SHA1 (patch-lib_sanitizer__common_sanitizer__netbsd__interceptors__ioctl.inc) = 3d858a30990efa5c4d4b422798186cf87b62d9b7
-SHA1 (patch-lib_sanitizer__common_sanitizer__netbsd__syscalls.inc) = 8080d04f99f7f695cdfc8e561874d374ee634084
-SHA1 (patch-lib_sanitizer__common_sanitizer__platform__interceptors.h) = d238d1355c76db0979b822919dcc93a82d71458c
+SHA1 (patch-lib_sanitizer__common_sanitizer__netbsd__interceptors__ioctl.inc) = bf83b4078f157a10c2afc456ab7451e3851cf119
+SHA1 (patch-lib_sanitizer__common_sanitizer__netbsd__syscalls.inc) = 75fee289e5db1bf3572fcd8ab08921343f94e088
+SHA1 (patch-lib_sanitizer__common_sanitizer__platform__interceptors.h) = e3e1f49c182209afde967ae61f6f4a4d03815f6d
 SHA1 (patch-lib_sanitizer__common_sanitizer__platform__limits__netbsd.cc) = 47236661e37673d66a52e80c3f55be13029014ca
 SHA1 (patch-lib_sanitizer__common_sanitizer__platform__limits__netbsd.h) = 2441d51ba207b067a52b7688076335bb38ad0bb9
 SHA1 (patch-lib_sanitizer__common_sanitizer__procmaps__freebsd.cc) = 7e0deaeeada33bd13575251e5d8fb4a0ee4c53e8
-SHA1 (patch-lib_scudo_scudo__platform.h) = 3e8155bcbe8457fd49203bfb4f73420e58a4020b
+SHA1 (patch-lib_scudo_scudo__platform.h) = d44bd094136dd0381db87344fbbcad1dcfd44dc1
 SHA1 (patch-lib_tsan_rtl_tsan__interceptors.cc) = 4fbaa64e3f8d28cdbab6783c296dfd31cecb45a5
-SHA1 (patch-test_asan_lit.cfg) = f7a52f504286ae8a69a4b683210ad6b51f433bc6
+SHA1 (patch-test_asan_lit.cfg) = d84f23432954031f2c03287d70eef2110d8a9ce0
 SHA1 (patch-test_lsan_lit.common.cfg) = 10dc251f80efb96d015a22c740dc20b1843b9a11
-SHA1 (patch-test_scudo_lit.cfg) = 171f340505f7c87f74a7814b9c4d12d7fcbc5690
-SHA1 (patch-utils_generate__netbsd__ioctls.awk) = cbb68f507a84f4f72ca8658b8d20ce327eaabd76
-SHA1 (patch-utils_generate__netbsd__syscalls.awk) = e24d4ed78db6217acf935b688462a84ec38c1e06
+SHA1 (patch-test_scudo_lit.cfg) = 314da51eef4c4a85c2c5d4610ca2233ece05d78f
+SHA1 (patch-utils_generate__netbsd__ioctls.awk) = 2c3558807c20a534f1ba703c9bfe1d70853d1aa6
+SHA1 (patch-utils_generate__netbsd__syscalls.awk) = 6c8bee596d7fea1b02d070992c2767dbeb0c5e23
diff --git a/compiler-rt-netbsd/patches/patch-include_sanitizer_netbsd__syscall__hooks.h b/compiler-rt-netbsd/patches/patch-include_sanitizer_netbsd__syscall__hooks.h
index ad1b8478ec..411d6e583e 100644
--- a/compiler-rt-netbsd/patches/patch-include_sanitizer_netbsd__syscall__hooks.h
+++ b/compiler-rt-netbsd/patches/patch-include_sanitizer_netbsd__syscall__hooks.h
@@ -1,6 +1,6 @@
 $NetBSD$
 
---- include/sanitizer/netbsd_syscall_hooks.h.orig	2018-01-18 12:27:21.936563177 +0000
+--- include/sanitizer/netbsd_syscall_hooks.h.orig	2018-01-20 14:39:09.255061178 +0000
 +++ include/sanitizer/netbsd_syscall_hooks.h
 @@ -0,0 +1,4730 @@
 +//===-- netbsd_syscall_hooks.h --------------------------------------------===//
diff --git a/compiler-rt-netbsd/patches/patch-lib_fuzzer_tests_CMakeLists.txt b/compiler-rt-netbsd/patches/patch-lib_fuzzer_tests_CMakeLists.txt
index 9cb32c0024..50f2e37712 100644
--- a/compiler-rt-netbsd/patches/patch-lib_fuzzer_tests_CMakeLists.txt
+++ b/compiler-rt-netbsd/patches/patch-lib_fuzzer_tests_CMakeLists.txt
@@ -1,6 +1,6 @@
 $NetBSD$
 
---- lib/fuzzer/tests/CMakeLists.txt.orig	2018-01-18 12:26:39.374508608 +0000
+--- lib/fuzzer/tests/CMakeLists.txt.orig	2018-01-18 12:26:39.000000000 +0000
 +++ lib/fuzzer/tests/CMakeLists.txt
 @@ -10,6 +10,9 @@ add_custom_target(FuzzerUnitTests)
  set_target_properties(FuzzerUnitTests PROPERTIES FOLDER "Compiler-RT Tests")
diff --git a/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__common__interceptors.inc b/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__common__interceptors.inc
index cdb5b3d3bf..12f2534062 100644
--- a/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__common__interceptors.inc
+++ b/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__common__interceptors.inc
@@ -1,6 +1,6 @@
 $NetBSD$
 
---- lib/sanitizer_common/sanitizer_common_interceptors.inc.orig	2018-01-18 12:26:39.364964646 +0000
+--- lib/sanitizer_common/sanitizer_common_interceptors.inc.orig	2018-01-20 14:37:44.460284188 +0000
 +++ lib/sanitizer_common/sanitizer_common_interceptors.inc
 @@ -36,6 +36,7 @@
  //   COMMON_INTERCEPTOR_MEMCPY_IMPL
@@ -18,15 +18,7 @@ $NetBSD$
  #define getitimer __getitimer50
  #define getpwent __getpwent50
  #define getpwnam __getpwnam50
-@@ -88,6 +90,7 @@
- #define glob __glob30
- #define gmtime __gmtime50
- #define gmtime_r __gmtime_r50
-+#define localtime __locatime50
- #define localtime_r __localtime_r50
- #define mktime __mktime50
- #define opendir __opendir30
-@@ -107,6 +110,9 @@
+@@ -108,6 +110,9 @@
  #define times __times13
  #define wait3 __wait350
  #define wait4 __wait450
@@ -36,7 +28,7 @@ $NetBSD$
  #endif
  
  // Platform-specific options.
-@@ -279,6 +285,10 @@ bool PlatformHasDifferentMemcpyAndMemmov
+@@ -280,6 +285,10 @@ bool PlatformHasDifferentMemcpyAndMemmov
    return new_mem;
  #endif
  
@@ -47,7 +39,7 @@ $NetBSD$
  struct FileMetadata {
    // For open_memstream().
    char **addr;
-@@ -1229,6 +1239,7 @@ static void unpoison_tm(void *ctx, __san
+@@ -1230,6 +1239,7 @@ static void unpoison_tm(void *ctx, __san
  INTERCEPTOR(__sanitizer_tm *, localtime, unsigned long *timep) {
    void *ctx;
    COMMON_INTERCEPTOR_ENTER(ctx, localtime, timep);
@@ -55,7 +47,7 @@ $NetBSD$
    __sanitizer_tm *res = REAL(localtime)(timep);
    if (res) {
      COMMON_INTERCEPTOR_READ_RANGE(ctx, timep, sizeof(*timep));
-@@ -1239,6 +1250,7 @@ INTERCEPTOR(__sanitizer_tm *, localtime,
+@@ -1240,6 +1250,7 @@ INTERCEPTOR(__sanitizer_tm *, localtime,
  INTERCEPTOR(__sanitizer_tm *, localtime_r, unsigned long *timep, void *result) {
    void *ctx;
    COMMON_INTERCEPTOR_ENTER(ctx, localtime_r, timep, result);
@@ -63,7 +55,7 @@ $NetBSD$
    __sanitizer_tm *res = REAL(localtime_r)(timep, result);
    if (res) {
      COMMON_INTERCEPTOR_READ_RANGE(ctx, timep, sizeof(*timep));
-@@ -1249,6 +1261,7 @@ INTERCEPTOR(__sanitizer_tm *, localtime_
+@@ -1250,6 +1261,7 @@ INTERCEPTOR(__sanitizer_tm *, localtime_
  INTERCEPTOR(__sanitizer_tm *, gmtime, unsigned long *timep) {
    void *ctx;
    COMMON_INTERCEPTOR_ENTER(ctx, gmtime, timep);
@@ -71,7 +63,7 @@ $NetBSD$
    __sanitizer_tm *res = REAL(gmtime)(timep);
    if (res) {
      COMMON_INTERCEPTOR_READ_RANGE(ctx, timep, sizeof(*timep));
-@@ -1259,6 +1272,7 @@ INTERCEPTOR(__sanitizer_tm *, gmtime, un
+@@ -1260,6 +1272,7 @@ INTERCEPTOR(__sanitizer_tm *, gmtime, un
  INTERCEPTOR(__sanitizer_tm *, gmtime_r, unsigned long *timep, void *result) {
    void *ctx;
    COMMON_INTERCEPTOR_ENTER(ctx, gmtime_r, timep, result);
@@ -79,7 +71,7 @@ $NetBSD$
    __sanitizer_tm *res = REAL(gmtime_r)(timep, result);
    if (res) {
      COMMON_INTERCEPTOR_READ_RANGE(ctx, timep, sizeof(*timep));
-@@ -1269,6 +1283,7 @@ INTERCEPTOR(__sanitizer_tm *, gmtime_r, 
+@@ -1270,6 +1283,7 @@ INTERCEPTOR(__sanitizer_tm *, gmtime_r, 
  INTERCEPTOR(char *, ctime, unsigned long *timep) {
    void *ctx;
    COMMON_INTERCEPTOR_ENTER(ctx, ctime, timep);
@@ -87,7 +79,7 @@ $NetBSD$
    // FIXME: under ASan the call below may write to freed memory and corrupt
    // its metadata. See
    // https://github.com/google/sanitizers/issues/321.
-@@ -1282,6 +1297,7 @@ INTERCEPTOR(char *, ctime, unsigned long
+@@ -1283,6 +1297,7 @@ INTERCEPTOR(char *, ctime, unsigned long
  INTERCEPTOR(char *, ctime_r, unsigned long *timep, char *result) {
    void *ctx;
    COMMON_INTERCEPTOR_ENTER(ctx, ctime_r, timep, result);
@@ -95,7 +87,7 @@ $NetBSD$
    // FIXME: under ASan the call below may write to freed memory and corrupt
    // its metadata. See
    // https://github.com/google/sanitizers/issues/321.
-@@ -1295,6 +1311,7 @@ INTERCEPTOR(char *, ctime_r, unsigned lo
+@@ -1296,6 +1311,7 @@ INTERCEPTOR(char *, ctime_r, unsigned lo
  INTERCEPTOR(char *, asctime, __sanitizer_tm *tm) {
    void *ctx;
    COMMON_INTERCEPTOR_ENTER(ctx, asctime, tm);
@@ -103,7 +95,7 @@ $NetBSD$
    // FIXME: under ASan the call below may write to freed memory and corrupt
    // its metadata. See
    // https://github.com/google/sanitizers/issues/321.
-@@ -1308,6 +1325,7 @@ INTERCEPTOR(char *, asctime, __sanitizer
+@@ -1309,6 +1325,7 @@ INTERCEPTOR(char *, asctime, __sanitizer
  INTERCEPTOR(char *, asctime_r, __sanitizer_tm *tm, char *result) {
    void *ctx;
    COMMON_INTERCEPTOR_ENTER(ctx, asctime_r, tm, result);
@@ -111,7 +103,7 @@ $NetBSD$
    // FIXME: under ASan the call below may write to freed memory and corrupt
    // its metadata. See
    // https://github.com/google/sanitizers/issues/321.
-@@ -1321,6 +1339,7 @@ INTERCEPTOR(char *, asctime_r, __sanitiz
+@@ -1322,6 +1339,7 @@ INTERCEPTOR(char *, asctime_r, __sanitiz
  INTERCEPTOR(long, mktime, __sanitizer_tm *tm) {
    void *ctx;
    COMMON_INTERCEPTOR_ENTER(ctx, mktime, tm);
@@ -119,7 +111,7 @@ $NetBSD$
    COMMON_INTERCEPTOR_READ_RANGE(ctx, &tm->tm_sec, sizeof(tm->tm_sec));
    COMMON_INTERCEPTOR_READ_RANGE(ctx, &tm->tm_min, sizeof(tm->tm_min));
    COMMON_INTERCEPTOR_READ_RANGE(ctx, &tm->tm_hour, sizeof(tm->tm_hour));
-@@ -1703,6 +1722,7 @@ FORMAT_INTERCEPTOR_IMPL(__isoc99_snprint
+@@ -1704,6 +1722,7 @@ FORMAT_INTERCEPTOR_IMPL(__isoc99_snprint
  
  #if SANITIZER_INTERCEPT_IOCTL
  #include "sanitizer_common_interceptors_ioctl.inc"
@@ -127,7 +119,7 @@ $NetBSD$
  INTERCEPTOR(int, ioctl, int d, unsigned long request, ...) {
    // We need a frame pointer, because we call into ioctl_common_[pre|post] which
    // can trigger a report and we need to be able to unwind through this
-@@ -2776,6 +2796,30 @@ INTERCEPTOR(int, accept4, int fd, void *
+@@ -2777,6 +2796,30 @@ INTERCEPTOR(int, accept4, int fd, void *
  #define INIT_ACCEPT4
  #endif
  
@@ -158,7 +150,7 @@ $NetBSD$
  #if SANITIZER_INTERCEPT_MODF
  INTERCEPTOR(double, modf, double x, double *iptr) {
    void *ctx;
-@@ -3164,7 +3208,14 @@ INTERCEPTOR(char *, setlocale, int categ
+@@ -3165,7 +3208,14 @@ INTERCEPTOR(char *, setlocale, int categ
    if (locale)
      COMMON_INTERCEPTOR_READ_RANGE(ctx, locale, REAL(strlen)(locale) + 1);
    char *res = REAL(setlocale)(category, locale);
@@ -174,7 +166,7 @@ $NetBSD$
    return res;
  }
  
-@@ -6607,6 +6658,488 @@ INTERCEPTOR(int, getgroupmembership, con
+@@ -6608,6 +6658,488 @@ INTERCEPTOR(int, getgroupmembership, con
  #define INIT_GETGROUPLIST
  #endif
  
@@ -663,7 +655,7 @@ $NetBSD$
  static void InitializeCommonInterceptors() {
    static u64 metadata_mem[sizeof(MetadataHashMap) / sizeof(u64) + 1];
    interceptor_metadata_map = new((void *)&metadata_mem) MetadataHashMap();
-@@ -6686,6 +7219,7 @@ static void InitializeCommonInterceptors
+@@ -6687,6 +7219,7 @@ static void InitializeCommonInterceptors
    INIT_GETSOCKOPT;
    INIT_ACCEPT;
    INIT_ACCEPT4;
@@ -671,7 +663,7 @@ $NetBSD$
    INIT_MODF;
    INIT_RECVMSG;
    INIT_SENDMSG;
-@@ -6826,6 +7360,13 @@ static void InitializeCommonInterceptors
+@@ -6827,6 +7360,13 @@ static void InitializeCommonInterceptors
    INIT_ACCESS;
    INIT_FACCESSAT;
    INIT_GETGROUPLIST;
diff --git a/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__netbsd__interceptors__ioctl.inc b/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__netbsd__interceptors__ioctl.inc
index cb27e47cfd..16f37d7ab8 100644
--- a/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__netbsd__interceptors__ioctl.inc
+++ b/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__netbsd__interceptors__ioctl.inc
@@ -1,6 +1,6 @@
 $NetBSD$
 
---- lib/sanitizer_common/sanitizer_netbsd_interceptors_ioctl.inc.orig	2018-01-18 12:27:21.939365748 +0000
+--- lib/sanitizer_common/sanitizer_netbsd_interceptors_ioctl.inc.orig	2018-01-20 14:39:09.258621476 +0000
 +++ lib/sanitizer_common/sanitizer_netbsd_interceptors_ioctl.inc
 @@ -0,0 +1,1490 @@
 +//===-- sanitizer_common_interceptors_ioctl.inc -----------------*- C++ -*-===//
diff --git a/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__netbsd__syscalls.inc b/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__netbsd__syscalls.inc
index 3707e4fd28..37e1a9e084 100644
--- a/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__netbsd__syscalls.inc
+++ b/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__netbsd__syscalls.inc
@@ -1,6 +1,6 @@
 $NetBSD$
 
---- lib/sanitizer_common/sanitizer_netbsd_syscalls.inc.orig	2018-01-18 12:27:21.940197418 +0000
+--- lib/sanitizer_common/sanitizer_netbsd_syscalls.inc.orig	2018-01-20 14:39:09.259564334 +0000
 +++ lib/sanitizer_common/sanitizer_netbsd_syscalls.inc
 @@ -0,0 +1,3793 @@
 +//===-- sanitizer_common_syscalls.inc ---------------------------*- C++ -*-===//
diff --git a/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__platform__interceptors.h b/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__platform__interceptors.h
index ddb3660829..53bfc15f20 100644
--- a/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__platform__interceptors.h
+++ b/compiler-rt-netbsd/patches/patch-lib_sanitizer__common_sanitizer__platform__interceptors.h
@@ -1,13 +1,11 @@
 $NetBSD$
 
---- lib/sanitizer_common/sanitizer_platform_interceptors.h.orig	2018-01-18 12:26:39.365442943 +0000
+--- lib/sanitizer_common/sanitizer_platform_interceptors.h.orig	2018-01-20 14:37:44.460760436 +0000
 +++ lib/sanitizer_common/sanitizer_platform_interceptors.h
-@@ -217,7 +217,8 @@
-   (SI_FREEBSD || SI_LINUX_NOT_ANDROID || SI_SOLARIS)
+@@ -218,6 +218,7 @@
  #define SANITIZER_INTERCEPT_GETSOCKOPT SI_POSIX
  #define SANITIZER_INTERCEPT_ACCEPT SI_POSIX
--#define SANITIZER_INTERCEPT_ACCEPT4 SI_LINUX_NOT_ANDROID
-+#define SANITIZER_INTERCEPT_ACCEPT4 SI_LINUX_NOT_ANDROID || SI_NETBSD
+ #define SANITIZER_INTERCEPT_ACCEPT4 SI_LINUX_NOT_ANDROID || SI_NETBSD
 +#define SANITIZER_INTERCEPT_PACCEPT SI_NETBSD
  #define SANITIZER_INTERCEPT_MODF SI_POSIX
  #define SANITIZER_INTERCEPT_RECVMSG SI_POSIX
diff --git a/compiler-rt-netbsd/patches/patch-lib_scudo_scudo__platform.h b/compiler-rt-netbsd/patches/patch-lib_scudo_scudo__platform.h
index 2b025d09b6..c00fb146fe 100644
--- a/compiler-rt-netbsd/patches/patch-lib_scudo_scudo__platform.h
+++ b/compiler-rt-netbsd/patches/patch-lib_scudo_scudo__platform.h
@@ -1,6 +1,6 @@
 $NetBSD$
 
---- lib/scudo/scudo_platform.h.orig	2018-01-18 12:26:38.973686973 +0000
+--- lib/scudo/scudo_platform.h.orig	2018-01-18 12:26:38.000000000 +0000
 +++ lib/scudo/scudo_platform.h
 @@ -17,7 +17,7 @@
  
diff --git a/compiler-rt-netbsd/patches/patch-test_asan_lit.cfg b/compiler-rt-netbsd/patches/patch-test_asan_lit.cfg
index 5227ff7940..e33e88fef2 100644
--- a/compiler-rt-netbsd/patches/patch-test_asan_lit.cfg
+++ b/compiler-rt-netbsd/patches/patch-test_asan_lit.cfg
@@ -1,6 +1,6 @@
 $NetBSD$
 
---- test/asan/lit.cfg.orig	2018-01-17 14:42:51.000000000 +0000
+--- test/asan/lit.cfg.orig	2018-01-20 14:37:44.078179409 +0000
 +++ test/asan/lit.cfg
 @@ -209,7 +209,7 @@ else:
    config.substitutions.append(('%pie', '-pie'))
@@ -10,4 +10,4 @@ $NetBSD$
 +if config.host_os not in ['Linux', 'Darwin', 'FreeBSD', 'SunOS', 'Windows', 'NetBSD']:
    config.unsupported = True
  
- if config.host_os == 'Darwin' and config.target_arch in ["x86_64", "x86_64h"]:
+ if config.host_os == 'Darwin':
diff --git a/compiler-rt-netbsd/patches/patch-test_scudo_lit.cfg b/compiler-rt-netbsd/patches/patch-test_scudo_lit.cfg
index bee3a49757..d7ed5251e6 100644
--- a/compiler-rt-netbsd/patches/patch-test_scudo_lit.cfg
+++ b/compiler-rt-netbsd/patches/patch-test_scudo_lit.cfg
@@ -1,8 +1,8 @@
 $NetBSD$
 
---- test/scudo/lit.cfg.orig	2017-12-04 19:21:18.000000000 +0000
+--- test/scudo/lit.cfg.orig	2018-01-20 14:37:44.075290564 +0000
 +++ test/scudo/lit.cfg
-@@ -26,9 +26,11 @@ c_flags = ([config.target_cflags] +
+@@ -21,9 +21,11 @@ c_flags = ([config.target_cflags] +
             "-pie",
             "-O0",
             "-UNDEBUG",
@@ -15,7 +15,7 @@ $NetBSD$
  # Android doesn't want -lrt.
  if not config.android:
    c_flags += ["-lrt"]
-@@ -57,5 +59,5 @@ config.substitutions.append(('%env_scudo
+@@ -54,5 +56,5 @@ config.substitutions.append(('%env_scudo
                               'env SCUDO_OPTIONS=' + default_scudo_opts))
  
  # Hardened Allocator tests are currently supported on Linux only.
diff --git a/compiler-rt-netbsd/patches/patch-utils_generate__netbsd__ioctls.awk b/compiler-rt-netbsd/patches/patch-utils_generate__netbsd__ioctls.awk
index b78d2716e9..c2090b396b 100644
--- a/compiler-rt-netbsd/patches/patch-utils_generate__netbsd__ioctls.awk
+++ b/compiler-rt-netbsd/patches/patch-utils_generate__netbsd__ioctls.awk
@@ -1,6 +1,6 @@
 $NetBSD$
 
---- utils/generate_netbsd_ioctls.awk.orig	2018-01-18 12:27:21.942437750 +0000
+--- utils/generate_netbsd_ioctls.awk.orig	2018-01-20 14:39:09.262418467 +0000
 +++ utils/generate_netbsd_ioctls.awk
 @@ -0,0 +1,755 @@
 +#!/usr/bin/awk -f
diff --git a/compiler-rt-netbsd/patches/patch-utils_generate__netbsd__syscalls.awk b/compiler-rt-netbsd/patches/patch-utils_generate__netbsd__syscalls.awk
index b7e279a58e..3c2a21b646 100644
--- a/compiler-rt-netbsd/patches/patch-utils_generate__netbsd__syscalls.awk
+++ b/compiler-rt-netbsd/patches/patch-utils_generate__netbsd__syscalls.awk
@@ -1,6 +1,6 @@
 $NetBSD$
 
---- utils/generate_netbsd_syscalls.awk.orig	2018-01-18 12:27:21.943088110 +0000
+--- utils/generate_netbsd_syscalls.awk.orig	2018-01-20 14:39:09.263158156 +0000
 +++ utils/generate_netbsd_syscalls.awk
 @@ -0,0 +1,2989 @@
 +#!/usr/bin/awk -f


Home | Main Index | Thread Index | Old Index