From 7fd0a32a7274b0ab1b3779bc40bfdbe68ffcc203 Mon Sep 17 00:00:00 2001 From: CentOS Sources Date: Fri, 8 Jul 2022 06:15:41 +0000 Subject: [PATCH] import clang-14.0.6-1.module+el8.7.0+15816+ec020e8f --- .clang.metadata | 4 +- .gitignore | 4 +- SOURCES/clang-14.0.0.src.tar.xz.sig | Bin 566 -> 0 bytes SOURCES/clang-14.0.6.src.tar.xz.sig | Bin 0 -> 566 bytes .../clang-tools-extra-14.0.0.src.tar.xz.sig | Bin 566 -> 0 bytes .../clang-tools-extra-14.0.6.src.tar.xz.sig | Bin 0 -> 566 bytes SOURCES/m-branch-protection.patch | 44 ------------------ SPECS/clang.spec | 9 ++-- 8 files changed, 9 insertions(+), 52 deletions(-) delete mode 100644 SOURCES/clang-14.0.0.src.tar.xz.sig create mode 100644 SOURCES/clang-14.0.6.src.tar.xz.sig delete mode 100644 SOURCES/clang-tools-extra-14.0.0.src.tar.xz.sig create mode 100644 SOURCES/clang-tools-extra-14.0.6.src.tar.xz.sig delete mode 100644 SOURCES/m-branch-protection.patch diff --git a/.clang.metadata b/.clang.metadata index 1e702fb..a2655c0 100644 --- a/.clang.metadata +++ b/.clang.metadata @@ -1,3 +1,3 @@ -517d56ccc605a9f180266f8fbe742599d743b82a SOURCES/clang-14.0.0.src.tar.xz -676c15c96fece5bdf7ed5eaf08f6f4c1ecfa8898 SOURCES/clang-tools-extra-14.0.0.src.tar.xz +88442d295bc0b96df7cf3d526ed9eabd7a214ac2 SOURCES/clang-14.0.6.src.tar.xz +dac5046f0eb81e6c47432cf80229599befbf273e SOURCES/clang-tools-extra-14.0.6.src.tar.xz b8d2648a01d36ed0186fd2c5af325fd28797f9a0 SOURCES/tstellar-gpg-key.asc diff --git a/.gitignore b/.gitignore index a8a37c0..be7fa0a 100644 --- a/.gitignore +++ b/.gitignore @@ -1,3 +1,3 @@ -SOURCES/clang-14.0.0.src.tar.xz -SOURCES/clang-tools-extra-14.0.0.src.tar.xz +SOURCES/clang-14.0.6.src.tar.xz +SOURCES/clang-tools-extra-14.0.6.src.tar.xz SOURCES/tstellar-gpg-key.asc diff --git a/SOURCES/clang-14.0.0.src.tar.xz.sig b/SOURCES/clang-14.0.0.src.tar.xz.sig deleted file mode 100644 index 12f7c8586f97aba859c5828d538639b0708442fa..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 566 zcmV-60?GY}0y6{v0SEvc79j*jP9iaCzek0rjBbvi$CRmtL7j>P0%AKap#TaA5TeJF zsfIzFifGXf|8dAisL&%2J|EB7pO%BVb9fJ*AN!RydXO>q3xJEKx{dq z6}&-+%EZV4I5DIV@KO{f(70oKzpR@y=I^MqRrB|yL&{ZO#nJ~w6FC)3O0{T7lj2&|j!qj!zuenFZFC_7Q|Uqm*b3tBh$1$s54|J% z3zdq8j=1^GXHI2aHz=Ki1Fo)03nhIqg8zg5bQE-g0L0Prn9{3=bQyM67jzacG7^CzRV_5h7r{6=_HnAYy8>OJg1Bmbf90;c5K__i)i zB5;YENboz0GbV0A1sWj!vY-K}M)nC2pDEfIhO~aB#24GDGDf%82g)K4A~E$fonq;g#2U}K-gMHjN*-^>5+6~Z7u=vMF#)aLa1plC z*Xo@-!q0DK$-3rj8<$(Y_vtq1GlD49j$PQoA>d^6w3zg_(e750?|3WnROf8b2`OuL EvV%JrjsO4v diff --git a/SOURCES/clang-14.0.6.src.tar.xz.sig b/SOURCES/clang-14.0.6.src.tar.xz.sig new file mode 100644 index 0000000000000000000000000000000000000000..3f0ecf46aa55e58516013a18d5f7dc178d7e2915 GIT binary patch literal 566 zcmV-60?GY}0y6{v0SEvc79j*jP9iaCzek0rjBbvi$CRmtL7j>P0%Ep`O8^Q95TeJF zsfIzFir{|_|6`TJH^JQFJfE6LJRBT_3}|#(@J8kWWU}-2O8gToX3ac+$C$61gM8i$ zvHuFxRP*C9Ir9lG4`)H~k99n=~LI z4M3p1A`13BJKHCTUE&xGv#5&oQuJ7Wu{w4UODqO`{x*=9%v6~dc!{n1?VxmRp<#RE zoQuw4pHS@m;#{XF5Q~kDG4IfhWCee*QZq?189ohBhR@dnpPQ>?ikmrE4@FDQ3#n-k zC7~HrK!FH*x%7R#?BD^)QN6pqwOCz(j`lu`pe&gYpAa zsu7OsujiH#n|R*}jJHylpg8MsN$OR{@0bKidT?5@d3#4lg-wr4_06PkQM;;lf#%!% zQqyWuP<;}#L@`c$!{M~-oh<>47xv4W8d(o7puZ4E<#rf8H6^C-H`J|gog^fQzRXVB z!lV8{jOa~KpMw!fu-ggU*;ZD0llw$|^_-FkI{vicvIC5ifrx#PZB3>h2!J>Q0!t-$(=mrye=AqR@uLzr3S$o|l zF?xr}CSz*S|6*%DLA@BK!=ZwmIb2b>C$STt`Qbl91gt=I3p#Q ET)k2Y=>Px# literal 0 HcmV?d00001 diff --git a/SOURCES/clang-tools-extra-14.0.0.src.tar.xz.sig b/SOURCES/clang-tools-extra-14.0.0.src.tar.xz.sig deleted file mode 100644 index 1a9e4649b796a43791c939fdcc4feafd875aeef8..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 566 zcmV-60?GY}0y6{v0SEvc79j*jP9iaCzek0rjBbvi$CRmtL7j>P0%AJ2N&pH85TeJF zsfIzFis3B}|5)4(UL3CQ2}RW`+DI9qLC|HLQIU3Ebl;Dke;KZJ`Z%FXo9OjqT=CnPlo|>+@J6>8a15>q60v-Z!VyygP?buHFjlw?NAB!nx z0d7(j|02=QcW^@v!pX29Pu-kP10j97VQS~F=>z4u;_ZNPYgdaENB{B2(;v19Ig*P`+)=^LiwX(-=D^$#*Ok-xI?N&B3yQdcRjMoNep?0(08tun(EN~=StDTUkHBhm}t@UFr`Xp04 z6dG8Dn`q?lkdLc8va+*iqO}Hs#bBTk=VduGQ&-Hv58Z4Cx&Lnt zI|sR*h0i6lHasC05r4RErT|w{-%T~u8M>(Q57b$jn(mkOt8jJ66OUpdS2Fyth< z`xz@o<@8fLy7x*~3=aygNG~K$a!V_g;?G(s02snk6Up{zuqbOfbiEE9s?>z(D|e>B EA(7<@b^rhX diff --git a/SOURCES/clang-tools-extra-14.0.6.src.tar.xz.sig b/SOURCES/clang-tools-extra-14.0.6.src.tar.xz.sig new file mode 100644 index 0000000000000000000000000000000000000000..9559103dcc92507ad17dab9227017afeb5cb3427 GIT binary patch literal 566 zcmV-60?GY}0y6{v0SEvc79j*jP9iaCzek0rjBbvi$CRmtL7j>P0%Ep`WdI5Z5TeJF zsfIzFiYD_9{woolg%>@!f*q!0l2z)wWv1+ZbhrNVs8;I?Uro!ci9{*dKxFZ6&!R%s zRj&`92CNRm0Dy+nx@`C^n&X8eW@=?Fym_ll*bUTUT^@;sR_+=C0GAI^ZvA?ng9sWExRdr85nSq z!t;Nk%TqQ&L*xr{r|W)VoI0fKo6rs8)%g($!fRxI6l>z8qk39N(Xb}^5+I3Cq3M(H zJWcrfxQ5}&DW>>JAWgZZK2-Xk*eSn>j-WZPn{JIS@JAgysKOe*ywluJCUDTkAWu)p zEeY)KAze_wLapMqP97Yh6rQB|-#Qtf2U9GIoGnWxS5INvw|M$&{-WmSdA(NBn6A;| zZqFd>4cI*wul+_{t0o@ys?CjukLuzPLIS^Z-IDU1t{VaC$t{?@kmh>iCOmBbT_6w~ zphK{2Vr^U46)G)Ch zYMj6~%g)qdpnY73Tx%*@>Ms0nqeUNtkR$Lu4i%<+(^@S@kJF3nDs;2CEk E-~VqF -Date: Tue Mar 22 23:17:39 2022 -0700 - - Re-commit: Driver: Don't warn on -mbranch-protection when linking - - This is a re-commit of 98fd3b359866f474ab1c097c22fb5c3be356b996. The - newly added test was failing on the bots, and I've fixed the test now so - that it doesn't actually invoke the linker. - -diff --git a/clang/include/clang/Driver/Options.td b/clang/include/clang/Driver/Options.td -index d37d3a31fe07..6ed87f9a464d 100644 ---- a/clang/include/clang/Driver/Options.td -+++ b/clang/include/clang/Driver/Options.td -@@ -3444,6 +3444,7 @@ def msign_return_address_EQ : Joined<["-"], "msign-return-address=">, - Flags<[CC1Option]>, Group, Values<"none,all,non-leaf">, - HelpText<"Select return address signing scope">; - def mbranch_protection_EQ : Joined<["-"], "mbranch-protection=">, -+ Group, - HelpText<"Enforce targets of indirect branches and function returns">; - - def mharden_sls_EQ : Joined<["-"], "mharden-sls=">, -diff --git a/clang/test/Driver/aarch64-security-options.c b/clang/test/Driver/aarch64-security-options.c -index 6ea4b8ae5838..4bd73e06d255 100644 ---- a/clang/test/Driver/aarch64-security-options.c -+++ b/clang/test/Driver/aarch64-security-options.c -@@ -27,6 +27,9 @@ - // RUN: %clang -target aarch64--none-eabi -c %s -### -mbranch-protection=bar 2>&1 | \ - // RUN: FileCheck %s --check-prefix=BAD-BP-PROTECTION --check-prefix=WARN - -+// RUN: %clang -target aarch64--none-eabi -### -o /dev/null -mbranch-protection=standard /dev/null 2>&1 | \ -+// RUN: FileCheck --allow-empty %s --check-prefix=LINKER-DRIVER -+ - // WARN-NOT: warning: ignoring '-mbranch-protection=' option because the 'aarch64' architecture does not support it [-Wbranch-protection] - - // RA-OFF: "-msign-return-address=none" -@@ -46,3 +49,7 @@ - - // BAD-B-KEY-COMBINATION: invalid branch protection option 'b-key' in '-mbranch-protection={{.*}}' - // BAD-LEAF-COMBINATION: invalid branch protection option 'leaf' in '-mbranch-protection={{.*}}' -+ -+// Check that the linker driver doesn't warn about -mbranch-protection=standard -+// as an unused option. -+// LINKER-DRIVER-NOT: warning: diff --git a/SPECS/clang.spec b/SPECS/clang.spec index 7f5dd87..2820e6c 100644 --- a/SPECS/clang.spec +++ b/SPECS/clang.spec @@ -3,7 +3,7 @@ %global maj_ver 14 %global min_ver 0 -%global patch_ver 0 +%global patch_ver 6 #global rc_ver 4 %global clang_version %{maj_ver}.%{min_ver}.%{patch_ver} @@ -41,7 +41,7 @@ Name: %pkg_name Version: %{clang_version}%{?rc_ver:~rc%{rc_ver}} -Release: 2%{?dist} +Release: 1%{?dist} Summary: A C language family front-end for LLVM License: NCSA @@ -65,8 +65,6 @@ Patch3: 0001-Driver-Add-a-gcc-equivalent-triple-to-the-list-of-tr.patch Patch4: 0001-cmake-Allow-shared-libraries-to-customize-the-soname.patch # This patch can be dropped once gcc-12.0.1-0.5.fc36 is in the repo. Patch5: 0001-Work-around-gcc-miscompile.patch -# https://github.com/llvm/llvm-project/commit/fed96f31bb5b68f77dd617ee8e698dd8171ee71b -Patch6: m-branch-protection.patch Patch7: 0010-PATCH-clang-Produce-DWARF4-by-default.patch Patch8: disable-recommonmark.patch @@ -613,6 +611,9 @@ false %endif %changelog +* Tue Jun 28 2022 Tom Stellard - 14.0.6-1 +- 14.0.6 Release + * Wed Jun 01 2022 Timm Bäder - 14.0.0-2 - Increate gcc-toolset dependency to 12 - Set GCC_INSTALL_PREFIX variable