From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from lists.gentoo.org (pigeon.gentoo.org [208.92.234.80]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits)) (No client certificate requested) by finch.gentoo.org (Postfix) with ESMTPS id 1868D15800F for ; Fri, 3 Feb 2023 07:12:37 +0000 (UTC) Received: from pigeon.gentoo.org (localhost [127.0.0.1]) by pigeon.gentoo.org (Postfix) with SMTP id 23343E077F; Fri, 3 Feb 2023 07:12:35 +0000 (UTC) Received: from smtp.gentoo.org (woodpecker.gentoo.org [140.211.166.183]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by pigeon.gentoo.org (Postfix) with ESMTPS id EAA6FE077F for ; Fri, 3 Feb 2023 07:12:34 +0000 (UTC) Received: from oystercatcher.gentoo.org (oystercatcher.gentoo.org [148.251.78.52]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (No client certificate requested) by smtp.gentoo.org (Postfix) with ESMTPS id AD94F33E4AD for ; Fri, 3 Feb 2023 07:12:33 +0000 (UTC) Received: from localhost.localdomain (localhost [IPv6:::1]) by oystercatcher.gentoo.org (Postfix) with ESMTP id CBD0F75 for ; Fri, 3 Feb 2023 07:12:30 +0000 (UTC) From: "Sam James" To: gentoo-commits@lists.gentoo.org Content-Transfer-Encoding: 8bit Content-type: text/plain; charset=UTF-8 Reply-To: gentoo-dev@lists.gentoo.org, "Sam James" Message-ID: <1675408241.ee5aadc4bb62d5479d8bc31fa06eb2e5a1bbacc3.sam@gentoo> Subject: [gentoo-commits] repo/gentoo:master commit in: sys-devel/clang-common/ X-VCS-Repository: repo/gentoo X-VCS-Files: sys-devel/clang-common/clang-common-15.0.7-r1.ebuild sys-devel/clang-common/clang-common-15.0.7-r2.ebuild sys-devel/clang-common/clang-common-16.0.0_pre20230107-r1.ebuild sys-devel/clang-common/clang-common-16.0.0_pre20230107-r2.ebuild sys-devel/clang-common/clang-common-16.0.0_pre20230127-r1.ebuild sys-devel/clang-common/clang-common-16.0.0_pre20230127.ebuild sys-devel/clang-common/clang-common-16.0.0_rc1-r1.ebuild sys-devel/clang-common/clang-common-16.0.0_rc1.ebuild X-VCS-Directories: sys-devel/clang-common/ X-VCS-Committer: sam X-VCS-Committer-Name: Sam James X-VCS-Revision: ee5aadc4bb62d5479d8bc31fa06eb2e5a1bbacc3 X-VCS-Branch: master Date: Fri, 3 Feb 2023 07:12:30 +0000 (UTC) Precedence: bulk List-Post: List-Help: List-Unsubscribe: List-Subscribe: List-Id: Gentoo Linux mail X-BeenThere: gentoo-commits@lists.gentoo.org X-Auto-Response-Suppress: DR, RN, NRN, OOF, AutoReply X-Archives-Salt: c1d76cb5-a031-425b-990b-ce8f47665383 X-Archives-Hash: f182f2a4358bb878e7b77274fabe14af commit: ee5aadc4bb62d5479d8bc31fa06eb2e5a1bbacc3 Author: Sam James gentoo org> AuthorDate: Fri Feb 3 07:10:41 2023 +0000 Commit: Sam James gentoo org> CommitDate: Fri Feb 3 07:10:41 2023 +0000 URL: https://gitweb.gentoo.org/repo/gentoo.git/commit/?id=ee5aadc4 sys-devel/clang-common: drop -fstack-clash-protection There's very likely some Clang miscompilation occurring with -fstack-clash-protection, GCC's implementation is fine. Both qtcore and chromium have been reported to misbehave at runtime when built with Clang's. Drop it for now until we can look into it more or Clang gets fixed. Closes: https://bugs.gentoo.org/865339 Closes: https://bugs.gentoo.org/892537 Signed-off-by: Sam James gentoo.org> .../{clang-common-15.0.7-r1.ebuild => clang-common-15.0.7-r2.ebuild} | 3 ++- ...pre20230107-r1.ebuild => clang-common-16.0.0_pre20230107-r2.ebuild} | 3 ++- ....0_pre20230127.ebuild => clang-common-16.0.0_pre20230127-r1.ebuild} | 3 ++- ...lang-common-16.0.0_rc1.ebuild => clang-common-16.0.0_rc1-r1.ebuild} | 3 ++- 4 files changed, 8 insertions(+), 4 deletions(-) diff --git a/sys-devel/clang-common/clang-common-15.0.7-r1.ebuild b/sys-devel/clang-common/clang-common-15.0.7-r2.ebuild similarity index 97% rename from sys-devel/clang-common/clang-common-15.0.7-r1.ebuild rename to sys-devel/clang-common/clang-common-15.0.7-r2.ebuild index 651827d21197..2adff08df36d 100644 --- a/sys-devel/clang-common/clang-common-15.0.7-r1.ebuild +++ b/sys-devel/clang-common/clang-common-15.0.7-r2.ebuild @@ -90,10 +90,11 @@ src_install() { EOF # Baseline hardening (bug #851111) + # (-fstack-clash-protection is omitted because of a possible Clang bug, + # see bug #892537 and bug #865339.) newins - gentoo-hardened.cfg <<-EOF # Some of these options are added unconditionally, regardless of # USE=hardened, for parity with sys-devel/gcc. - -fstack-clash-protection -fstack-protector-strong -fPIE -include "${EPREFIX}/usr/include/gentoo/fortify.h" diff --git a/sys-devel/clang-common/clang-common-16.0.0_pre20230107-r1.ebuild b/sys-devel/clang-common/clang-common-16.0.0_pre20230107-r2.ebuild similarity index 97% rename from sys-devel/clang-common/clang-common-16.0.0_pre20230107-r1.ebuild rename to sys-devel/clang-common/clang-common-16.0.0_pre20230107-r2.ebuild index 3c407f5a1af6..d5df949d5d96 100644 --- a/sys-devel/clang-common/clang-common-16.0.0_pre20230107-r1.ebuild +++ b/sys-devel/clang-common/clang-common-16.0.0_pre20230107-r2.ebuild @@ -90,10 +90,11 @@ src_install() { EOF # Baseline hardening (bug #851111) + # (-fstack-clash-protection is omitted because of a possible Clang bug, + # see bug #892537 and bug #865339.) newins - gentoo-hardened.cfg <<-EOF # Some of these options are added unconditionally, regardless of # USE=hardened, for parity with sys-devel/gcc. - -fstack-clash-protection -fstack-protector-strong -fPIE -include "${EPREFIX}/usr/include/gentoo/fortify.h" diff --git a/sys-devel/clang-common/clang-common-16.0.0_pre20230127.ebuild b/sys-devel/clang-common/clang-common-16.0.0_pre20230127-r1.ebuild similarity index 97% rename from sys-devel/clang-common/clang-common-16.0.0_pre20230127.ebuild rename to sys-devel/clang-common/clang-common-16.0.0_pre20230127-r1.ebuild index be17e87b775a..c04c266d94c8 100644 --- a/sys-devel/clang-common/clang-common-16.0.0_pre20230127.ebuild +++ b/sys-devel/clang-common/clang-common-16.0.0_pre20230127-r1.ebuild @@ -90,10 +90,11 @@ src_install() { EOF # Baseline hardening (bug #851111) + # (-fstack-clash-protection is omitted because of a possible Clang bug, + # see bug #892537 and bug #865339.) newins - gentoo-hardened.cfg <<-EOF # Some of these options are added unconditionally, regardless of # USE=hardened, for parity with sys-devel/gcc. - -fstack-clash-protection -fstack-protector-strong -fPIE -include "${EPREFIX}/usr/include/gentoo/fortify.h" diff --git a/sys-devel/clang-common/clang-common-16.0.0_rc1.ebuild b/sys-devel/clang-common/clang-common-16.0.0_rc1-r1.ebuild similarity index 97% rename from sys-devel/clang-common/clang-common-16.0.0_rc1.ebuild rename to sys-devel/clang-common/clang-common-16.0.0_rc1-r1.ebuild index 3c407f5a1af6..d5df949d5d96 100644 --- a/sys-devel/clang-common/clang-common-16.0.0_rc1.ebuild +++ b/sys-devel/clang-common/clang-common-16.0.0_rc1-r1.ebuild @@ -90,10 +90,11 @@ src_install() { EOF # Baseline hardening (bug #851111) + # (-fstack-clash-protection is omitted because of a possible Clang bug, + # see bug #892537 and bug #865339.) newins - gentoo-hardened.cfg <<-EOF # Some of these options are added unconditionally, regardless of # USE=hardened, for parity with sys-devel/gcc. - -fstack-clash-protection -fstack-protector-strong -fPIE -include "${EPREFIX}/usr/include/gentoo/fortify.h"