Module Name:    src
Committed By:   skrll
Date:           Thu Jun  2 07:31:35 UTC 2022

Modified Files:
        src/tests/usr.bin/c++: t_fuzzer_oom.sh t_fuzzer_simple.sh
            t_fuzzer_timeout.sh t_msan_allocated_memory.sh t_msan_check_mem.sh
            t_msan_free.sh t_msan_heap.sh t_msan_partial_poison.sh
            t_msan_poison.sh t_msan_realloc.sh t_msan_shadow.sh t_msan_stack.sh
            t_msan_unpoison.sh t_tsan_data_race.sh
            t_tsan_heap_use_after_free.sh t_tsan_lock_order_inversion.sh
            t_tsan_locked_mutex_destroy.sh t_tsan_signal_errno.sh
            t_tsan_thread_leak.sh t_tsan_vptr_race.sh
        src/tests/usr.bin/cc: t_fuzzer_oom.sh t_fuzzer_simple.sh
            t_fuzzer_timeout.sh t_msan_allocated_memory.sh t_msan_check_mem.sh
            t_msan_free.sh t_msan_heap.sh t_msan_partial_poison.sh
            t_msan_poison.sh t_msan_realloc.sh t_msan_shadow.sh t_msan_stack.sh
            t_msan_unpoison.sh t_tsan_data_race.sh
            t_tsan_heap_use_after_free.sh t_tsan_lock_order_inversion.sh
            t_tsan_locked_mutex_destroy.sh t_tsan_signal_errno.sh
            t_tsan_thread_leak.sh

Log Message:
Trailing whitespace


To generate a diff of this commit:
cvs rdiff -u -r1.2 -r1.3 src/tests/usr.bin/c++/t_fuzzer_oom.sh \
    src/tests/usr.bin/c++/t_fuzzer_simple.sh \
    src/tests/usr.bin/c++/t_fuzzer_timeout.sh \
    src/tests/usr.bin/c++/t_msan_allocated_memory.sh \
    src/tests/usr.bin/c++/t_msan_check_mem.sh \
    src/tests/usr.bin/c++/t_msan_free.sh src/tests/usr.bin/c++/t_msan_heap.sh \
    src/tests/usr.bin/c++/t_msan_partial_poison.sh \
    src/tests/usr.bin/c++/t_msan_poison.sh \
    src/tests/usr.bin/c++/t_msan_realloc.sh \
    src/tests/usr.bin/c++/t_msan_shadow.sh \
    src/tests/usr.bin/c++/t_msan_stack.sh \
    src/tests/usr.bin/c++/t_msan_unpoison.sh
cvs rdiff -u -r1.5 -r1.6 src/tests/usr.bin/c++/t_tsan_data_race.sh \
    src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh \
    src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh \
    src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh \
    src/tests/usr.bin/c++/t_tsan_signal_errno.sh \
    src/tests/usr.bin/c++/t_tsan_thread_leak.sh \
    src/tests/usr.bin/c++/t_tsan_vptr_race.sh
cvs rdiff -u -r1.2 -r1.3 src/tests/usr.bin/cc/t_fuzzer_oom.sh \
    src/tests/usr.bin/cc/t_fuzzer_simple.sh \
    src/tests/usr.bin/cc/t_fuzzer_timeout.sh \
    src/tests/usr.bin/cc/t_msan_allocated_memory.sh \
    src/tests/usr.bin/cc/t_msan_check_mem.sh \
    src/tests/usr.bin/cc/t_msan_free.sh src/tests/usr.bin/cc/t_msan_heap.sh \
    src/tests/usr.bin/cc/t_msan_partial_poison.sh \
    src/tests/usr.bin/cc/t_msan_poison.sh \
    src/tests/usr.bin/cc/t_msan_realloc.sh \
    src/tests/usr.bin/cc/t_msan_shadow.sh \
    src/tests/usr.bin/cc/t_msan_stack.sh \
    src/tests/usr.bin/cc/t_msan_unpoison.sh
cvs rdiff -u -r1.5 -r1.6 src/tests/usr.bin/cc/t_tsan_data_race.sh \
    src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh \
    src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh \
    src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh \
    src/tests/usr.bin/cc/t_tsan_signal_errno.sh \
    src/tests/usr.bin/cc/t_tsan_thread_leak.sh

Please note that diffs are not public domain; they are subject to the
copyright notices on the relevant files.

Modified files:

Index: src/tests/usr.bin/c++/t_fuzzer_oom.sh
diff -u src/tests/usr.bin/c++/t_fuzzer_oom.sh:1.2 src/tests/usr.bin/c++/t_fuzzer_oom.sh:1.3
--- src/tests/usr.bin/c++/t_fuzzer_oom.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_fuzzer_oom.sh	Thu Jun  2 07:31:35 2022
@@ -124,9 +124,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"ERROR: libFuzzer: out-of-memory" ./test -rss_limit_mb=30
 }
 oom_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_fuzzer_simple.sh
diff -u src/tests/usr.bin/c++/t_fuzzer_simple.sh:1.2 src/tests/usr.bin/c++/t_fuzzer_simple.sh:1.3
--- src/tests/usr.bin/c++/t_fuzzer_simple.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_fuzzer_simple.sh	Thu Jun  2 07:31:35 2022
@@ -136,9 +136,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"BINGO" ./test
 }
 simple_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_fuzzer_timeout.sh
diff -u src/tests/usr.bin/c++/t_fuzzer_timeout.sh:1.2 src/tests/usr.bin/c++/t_fuzzer_timeout.sh:1.3
--- src/tests/usr.bin/c++/t_fuzzer_timeout.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_fuzzer_timeout.sh	Thu Jun  2 07:31:35 2022
@@ -121,9 +121,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"ERROR: libFuzzer: timeout" ./test -timeout=5
 }
 timeout_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_msan_allocated_memory.sh
diff -u src/tests/usr.bin/c++/t_msan_allocated_memory.sh:1.2 src/tests/usr.bin/c++/t_msan_allocated_memory.sh:1.3
--- src/tests/usr.bin/c++/t_msan_allocated_memory.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_msan_allocated_memory.sh	Thu Jun  2 07:31:35 2022
@@ -122,9 +122,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
 allocated_memory_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_msan_check_mem.sh
diff -u src/tests/usr.bin/c++/t_msan_check_mem.sh:1.2 src/tests/usr.bin/c++/t_msan_check_mem.sh:1.3
--- src/tests/usr.bin/c++/t_msan_check_mem.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_msan_check_mem.sh	Thu Jun  2 07:31:35 2022
@@ -125,9 +125,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
 }
 check_mem_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_msan_free.sh
diff -u src/tests/usr.bin/c++/t_msan_free.sh:1.2 src/tests/usr.bin/c++/t_msan_free.sh:1.3
--- src/tests/usr.bin/c++/t_msan_free.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_msan_free.sh	Thu Jun  2 07:31:35 2022
@@ -119,9 +119,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
 free_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_msan_heap.sh
diff -u src/tests/usr.bin/c++/t_msan_heap.sh:1.2 src/tests/usr.bin/c++/t_msan_heap.sh:1.3
--- src/tests/usr.bin/c++/t_msan_heap.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_msan_heap.sh	Thu Jun  2 07:31:35 2022
@@ -104,9 +104,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
 heap_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_msan_partial_poison.sh
diff -u src/tests/usr.bin/c++/t_msan_partial_poison.sh:1.2 src/tests/usr.bin/c++/t_msan_partial_poison.sh:1.3
--- src/tests/usr.bin/c++/t_msan_partial_poison.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_msan_partial_poison.sh	Thu Jun  2 07:31:35 2022
@@ -128,9 +128,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:": 77654321" ./test
 }
 partial_poison_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_msan_poison.sh
diff -u src/tests/usr.bin/c++/t_msan_poison.sh:1.2 src/tests/usr.bin/c++/t_msan_poison.sh:1.3
--- src/tests/usr.bin/c++/t_msan_poison.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_msan_poison.sh	Thu Jun  2 07:31:35 2022
@@ -125,9 +125,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test
 }
 poison_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_msan_realloc.sh
diff -u src/tests/usr.bin/c++/t_msan_realloc.sh:1.2 src/tests/usr.bin/c++/t_msan_realloc.sh:1.3
--- src/tests/usr.bin/c++/t_msan_realloc.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_msan_realloc.sh	Thu Jun  2 07:31:35 2022
@@ -122,9 +122,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
 realloc_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_msan_shadow.sh
diff -u src/tests/usr.bin/c++/t_msan_shadow.sh:1.2 src/tests/usr.bin/c++/t_msan_shadow.sh:1.3
--- src/tests/usr.bin/c++/t_msan_shadow.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_msan_shadow.sh	Thu Jun  2 07:31:35 2022
@@ -137,9 +137,9 @@ EOF
 	atf_check -s ignore -o match:"2" -e match:"00000000 ff000000" ./test
 }
 shadow_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_msan_stack.sh
diff -u src/tests/usr.bin/c++/t_msan_stack.sh:1.2 src/tests/usr.bin/c++/t_msan_stack.sh:1.3
--- src/tests/usr.bin/c++/t_msan_stack.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_msan_stack.sh	Thu Jun  2 07:31:35 2022
@@ -119,9 +119,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test
 }
 stack_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_msan_unpoison.sh
diff -u src/tests/usr.bin/c++/t_msan_unpoison.sh:1.2 src/tests/usr.bin/c++/t_msan_unpoison.sh:1.3
--- src/tests/usr.bin/c++/t_msan_unpoison.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/c++/t_msan_unpoison.sh	Thu Jun  2 07:31:35 2022
@@ -137,9 +137,9 @@ EOF
 	atf_check -s ignore -o ignore -e not-match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
 unpoison_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF

Index: src/tests/usr.bin/c++/t_tsan_data_race.sh
diff -u src/tests/usr.bin/c++/t_tsan_data_race.sh:1.5 src/tests/usr.bin/c++/t_tsan_data_race.sh:1.6
--- src/tests/usr.bin/c++/t_tsan_data_race.sh:1.5	Tue Nov 17 08:25:57 2020
+++ src/tests/usr.bin/c++/t_tsan_data_race.sh	Thu Jun  2 07:31:35 2022
@@ -131,9 +131,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: data race " ./test
 }
 data_race_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh
diff -u src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh:1.5 src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh:1.6
--- src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh:1.5	Tue Nov 17 08:25:57 2020
+++ src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh	Thu Jun  2 07:31:35 2022
@@ -175,9 +175,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test
 }
 heap_use_after_free_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh
diff -u src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh:1.5 src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh:1.6
--- src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh:1.5	Tue Nov 17 08:25:57 2020
+++ src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh	Thu Jun  2 07:31:35 2022
@@ -147,9 +147,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: lock-order-inversion" ./test
 }
 lock_order_inversion_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh
diff -u src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh:1.5 src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh:1.6
--- src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh:1.5	Tue Nov 17 08:25:57 2020
+++ src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh	Thu Jun  2 07:31:35 2022
@@ -159,9 +159,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: destroy of a locked mutex" ./test
 }
 locked_mutex_destroy_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_tsan_signal_errno.sh
diff -u src/tests/usr.bin/c++/t_tsan_signal_errno.sh:1.5 src/tests/usr.bin/c++/t_tsan_signal_errno.sh:1.6
--- src/tests/usr.bin/c++/t_tsan_signal_errno.sh:1.5	Tue Nov 17 08:25:57 2020
+++ src/tests/usr.bin/c++/t_tsan_signal_errno.sh	Thu Jun  2 07:31:35 2022
@@ -149,9 +149,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: signal handler spoils errno" ./test
 }
 signal_errno_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_tsan_thread_leak.sh
diff -u src/tests/usr.bin/c++/t_tsan_thread_leak.sh:1.5 src/tests/usr.bin/c++/t_tsan_thread_leak.sh:1.6
--- src/tests/usr.bin/c++/t_tsan_thread_leak.sh:1.5	Thu Dec 16 16:30:55 2021
+++ src/tests/usr.bin/c++/t_tsan_thread_leak.sh	Thu Jun  2 07:31:35 2022
@@ -149,9 +149,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: thread leak" ./test
 }
 thread_leak_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF
Index: src/tests/usr.bin/c++/t_tsan_vptr_race.sh
diff -u src/tests/usr.bin/c++/t_tsan_vptr_race.sh:1.5 src/tests/usr.bin/c++/t_tsan_vptr_race.sh:1.6
--- src/tests/usr.bin/c++/t_tsan_vptr_race.sh:1.5	Thu Dec 16 16:30:55 2021
+++ src/tests/usr.bin/c++/t_tsan_vptr_race.sh	Thu Jun  2 07:31:35 2022
@@ -168,9 +168,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: data race on vptr \(ctor/dtor vs virtual call\)" ./test
 }
 vptr_race_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "c++ -pie not supported on this architecture"
 	fi
 	cat > test.cc << EOF

Index: src/tests/usr.bin/cc/t_fuzzer_oom.sh
diff -u src/tests/usr.bin/cc/t_fuzzer_oom.sh:1.2 src/tests/usr.bin/cc/t_fuzzer_oom.sh:1.3
--- src/tests/usr.bin/cc/t_fuzzer_oom.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_fuzzer_oom.sh	Thu Jun  2 07:31:35 2022
@@ -124,9 +124,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"ERROR: libFuzzer: out-of-memory" ./test -rss_limit_mb=30
 }
 oom_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
Index: src/tests/usr.bin/cc/t_fuzzer_simple.sh
diff -u src/tests/usr.bin/cc/t_fuzzer_simple.sh:1.2 src/tests/usr.bin/cc/t_fuzzer_simple.sh:1.3
--- src/tests/usr.bin/cc/t_fuzzer_simple.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_fuzzer_simple.sh	Thu Jun  2 07:31:35 2022
@@ -136,9 +136,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"BINGO" ./test
 }
 simple_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
Index: src/tests/usr.bin/cc/t_fuzzer_timeout.sh
diff -u src/tests/usr.bin/cc/t_fuzzer_timeout.sh:1.2 src/tests/usr.bin/cc/t_fuzzer_timeout.sh:1.3
--- src/tests/usr.bin/cc/t_fuzzer_timeout.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_fuzzer_timeout.sh	Thu Jun  2 07:31:35 2022
@@ -121,9 +121,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"ERROR: libFuzzer: timeout" ./test -timeout=5
 }
 timeout_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
Index: src/tests/usr.bin/cc/t_msan_allocated_memory.sh
diff -u src/tests/usr.bin/cc/t_msan_allocated_memory.sh:1.2 src/tests/usr.bin/cc/t_msan_allocated_memory.sh:1.3
--- src/tests/usr.bin/cc/t_msan_allocated_memory.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_msan_allocated_memory.sh	Thu Jun  2 07:31:35 2022
@@ -122,9 +122,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
 allocated_memory_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
Index: src/tests/usr.bin/cc/t_msan_check_mem.sh
diff -u src/tests/usr.bin/cc/t_msan_check_mem.sh:1.2 src/tests/usr.bin/cc/t_msan_check_mem.sh:1.3
--- src/tests/usr.bin/cc/t_msan_check_mem.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_msan_check_mem.sh	Thu Jun  2 07:31:35 2022
@@ -125,9 +125,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
 }
 check_mem_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
@@ -142,7 +142,7 @@ int main(int argc, char **argv) {
 }
 EOF
 
-	cc -fsanitize=memory -o test -fpie -pie test.c 
+	cc -fsanitize=memory -o test -fpie -pie test.c
 	paxctl +a test
 	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
 }
Index: src/tests/usr.bin/cc/t_msan_free.sh
diff -u src/tests/usr.bin/cc/t_msan_free.sh:1.2 src/tests/usr.bin/cc/t_msan_free.sh:1.3
--- src/tests/usr.bin/cc/t_msan_free.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_msan_free.sh	Thu Jun  2 07:31:35 2022
@@ -119,9 +119,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
 free_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
Index: src/tests/usr.bin/cc/t_msan_heap.sh
diff -u src/tests/usr.bin/cc/t_msan_heap.sh:1.2 src/tests/usr.bin/cc/t_msan_heap.sh:1.3
--- src/tests/usr.bin/cc/t_msan_heap.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_msan_heap.sh	Thu Jun  2 07:31:35 2022
@@ -78,7 +78,7 @@ heap_profile_body(){
 int main() { int *a = (int *)malloc(sizeof(int)); return *a; }
 EOF
 
-	cc -fsanitize=memory -o test -pg test.c 
+	cc -fsanitize=memory -o test -pg test.c
 	paxctl +a test
 	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
@@ -104,9 +104,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
 heap_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
@@ -114,7 +114,7 @@ heap_pie_body(){
 int main() { int *a = (int *)malloc(sizeof(int)); return *a; }
 EOF
 
-	cc -fsanitize=memory -o test -fpie -pie test.c 
+	cc -fsanitize=memory -o test -fpie -pie test.c
 	paxctl +a test
 	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
Index: src/tests/usr.bin/cc/t_msan_partial_poison.sh
diff -u src/tests/usr.bin/cc/t_msan_partial_poison.sh:1.2 src/tests/usr.bin/cc/t_msan_partial_poison.sh:1.3
--- src/tests/usr.bin/cc/t_msan_partial_poison.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_msan_partial_poison.sh	Thu Jun  2 07:31:35 2022
@@ -94,7 +94,7 @@ int main(void) {
 }
 EOF
 
-	cc -fsanitize=memory -o test -pg test.c 
+	cc -fsanitize=memory -o test -pg test.c
 	paxctl +a test
 	atf_check -s ignore -o ignore -e match:": 77654321" ./test
 }
@@ -128,9 +128,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:": 77654321" ./test
 }
 partial_poison_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
Index: src/tests/usr.bin/cc/t_msan_poison.sh
diff -u src/tests/usr.bin/cc/t_msan_poison.sh:1.2 src/tests/usr.bin/cc/t_msan_poison.sh:1.3
--- src/tests/usr.bin/cc/t_msan_poison.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_msan_poison.sh	Thu Jun  2 07:31:35 2022
@@ -92,7 +92,7 @@ int main(void) {
 }
 EOF
 
-	cc -fsanitize=memory -o test -pg test.c 
+	cc -fsanitize=memory -o test -pg test.c
 	paxctl +a test
 	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test
 }
@@ -125,9 +125,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test
 }
 poison_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
@@ -142,7 +142,7 @@ int main(void) {
 }
 EOF
 
-	cc -fsanitize=memory -o test -fpie -pie test.c 
+	cc -fsanitize=memory -o test -fpie -pie test.c
 	paxctl +a test
 	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test
 }
Index: src/tests/usr.bin/cc/t_msan_realloc.sh
diff -u src/tests/usr.bin/cc/t_msan_realloc.sh:1.2 src/tests/usr.bin/cc/t_msan_realloc.sh:1.3
--- src/tests/usr.bin/cc/t_msan_realloc.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_msan_realloc.sh	Thu Jun  2 07:31:35 2022
@@ -122,9 +122,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
 realloc_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
@@ -138,7 +138,7 @@ int main(int argc, char **argv) {
 }
 EOF
 
-	cc -fsanitize=memory -o test -fpie -pie test.c 
+	cc -fsanitize=memory -o test -fpie -pie test.c
 	paxctl +a test
 	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
Index: src/tests/usr.bin/cc/t_msan_shadow.sh
diff -u src/tests/usr.bin/cc/t_msan_shadow.sh:1.2 src/tests/usr.bin/cc/t_msan_shadow.sh:1.3
--- src/tests/usr.bin/cc/t_msan_shadow.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_msan_shadow.sh	Thu Jun  2 07:31:35 2022
@@ -137,9 +137,9 @@ EOF
 	atf_check -s ignore -o match:"2" -e match:"00000000 ff000000" ./test
 }
 shadow_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
@@ -158,7 +158,7 @@ int main(int argc, char **argv) {
 }
 EOF
 
-	cc -fsanitize=memory -o test -fpie -pie test.c 
+	cc -fsanitize=memory -o test -fpie -pie test.c
 	paxctl +a test
 	atf_check -s ignore -o match:"2" -e match:"00000000 ff000000" ./test
 }
Index: src/tests/usr.bin/cc/t_msan_stack.sh
diff -u src/tests/usr.bin/cc/t_msan_stack.sh:1.2 src/tests/usr.bin/cc/t_msan_stack.sh:1.3
--- src/tests/usr.bin/cc/t_msan_stack.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_msan_stack.sh	Thu Jun  2 07:31:35 2022
@@ -119,9 +119,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test
 }
 stack_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
@@ -134,7 +134,7 @@ int main() {
 }
 EOF
 
-	cc -fsanitize=memory -o test -fpie -pie test.c 
+	cc -fsanitize=memory -o test -fpie -pie test.c
 	paxctl +a test
 	atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test
 }
Index: src/tests/usr.bin/cc/t_msan_unpoison.sh
diff -u src/tests/usr.bin/cc/t_msan_unpoison.sh:1.2 src/tests/usr.bin/cc/t_msan_unpoison.sh:1.3
--- src/tests/usr.bin/cc/t_msan_unpoison.sh:1.2	Fri Aug 23 06:39:54 2019
+++ src/tests/usr.bin/cc/t_msan_unpoison.sh	Thu Jun  2 07:31:35 2022
@@ -137,9 +137,9 @@ EOF
 	atf_check -s ignore -o ignore -e not-match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
 }
 unpoison_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF

Index: src/tests/usr.bin/cc/t_tsan_data_race.sh
diff -u src/tests/usr.bin/cc/t_tsan_data_race.sh:1.5 src/tests/usr.bin/cc/t_tsan_data_race.sh:1.6
--- src/tests/usr.bin/cc/t_tsan_data_race.sh:1.5	Tue Nov 17 08:25:57 2020
+++ src/tests/usr.bin/cc/t_tsan_data_race.sh	Thu Jun  2 07:31:35 2022
@@ -131,9 +131,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: data race " ./test
 }
 data_race_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
Index: src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh
diff -u src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh:1.5 src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh:1.6
--- src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh:1.5	Tue Nov 17 08:25:57 2020
+++ src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh	Thu Jun  2 07:31:35 2022
@@ -158,9 +158,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test
 }
 heap_use_after_free_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
Index: src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh
diff -u src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh:1.5 src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh:1.6
--- src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh:1.5	Tue Nov 17 08:25:57 2020
+++ src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh	Thu Jun  2 07:31:35 2022
@@ -146,9 +146,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: lock-order-inversion" ./test
 }
 lock_order_inversion_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
Index: src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh
diff -u src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh:1.5 src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh:1.6
--- src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh:1.5	Tue Nov 17 08:25:57 2020
+++ src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh	Thu Jun  2 07:31:35 2022
@@ -158,9 +158,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: destroy of a locked mutex" ./test
 }
 locked_mutex_destroy_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
Index: src/tests/usr.bin/cc/t_tsan_signal_errno.sh
diff -u src/tests/usr.bin/cc/t_tsan_signal_errno.sh:1.5 src/tests/usr.bin/cc/t_tsan_signal_errno.sh:1.6
--- src/tests/usr.bin/cc/t_tsan_signal_errno.sh:1.5	Tue Nov 17 08:25:57 2020
+++ src/tests/usr.bin/cc/t_tsan_signal_errno.sh	Thu Jun  2 07:31:35 2022
@@ -149,9 +149,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: signal handler spoils errno" ./test
 }
 signal_errno_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF
Index: src/tests/usr.bin/cc/t_tsan_thread_leak.sh
diff -u src/tests/usr.bin/cc/t_tsan_thread_leak.sh:1.5 src/tests/usr.bin/cc/t_tsan_thread_leak.sh:1.6
--- src/tests/usr.bin/cc/t_tsan_thread_leak.sh:1.5	Tue Nov 17 08:25:57 2020
+++ src/tests/usr.bin/cc/t_tsan_thread_leak.sh	Thu Jun  2 07:31:35 2022
@@ -149,9 +149,9 @@ EOF
 	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: thread leak" ./test
 }
 thread_leak_pie_body(){
-	
+
 	#check whether -pie flag is supported on this architecture
-	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
+	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
 		atf_set_skip "cc -pie not supported on this architecture"
 	fi
 	cat > test.c << EOF

Reply via email to