Module Name: src Committed By: skrll Date: Thu Jun 2 07:31:35 UTC 2022
Modified Files: src/tests/usr.bin/c++: t_fuzzer_oom.sh t_fuzzer_simple.sh t_fuzzer_timeout.sh t_msan_allocated_memory.sh t_msan_check_mem.sh t_msan_free.sh t_msan_heap.sh t_msan_partial_poison.sh t_msan_poison.sh t_msan_realloc.sh t_msan_shadow.sh t_msan_stack.sh t_msan_unpoison.sh t_tsan_data_race.sh t_tsan_heap_use_after_free.sh t_tsan_lock_order_inversion.sh t_tsan_locked_mutex_destroy.sh t_tsan_signal_errno.sh t_tsan_thread_leak.sh t_tsan_vptr_race.sh src/tests/usr.bin/cc: t_fuzzer_oom.sh t_fuzzer_simple.sh t_fuzzer_timeout.sh t_msan_allocated_memory.sh t_msan_check_mem.sh t_msan_free.sh t_msan_heap.sh t_msan_partial_poison.sh t_msan_poison.sh t_msan_realloc.sh t_msan_shadow.sh t_msan_stack.sh t_msan_unpoison.sh t_tsan_data_race.sh t_tsan_heap_use_after_free.sh t_tsan_lock_order_inversion.sh t_tsan_locked_mutex_destroy.sh t_tsan_signal_errno.sh t_tsan_thread_leak.sh Log Message: Trailing whitespace To generate a diff of this commit: cvs rdiff -u -r1.2 -r1.3 src/tests/usr.bin/c++/t_fuzzer_oom.sh \ src/tests/usr.bin/c++/t_fuzzer_simple.sh \ src/tests/usr.bin/c++/t_fuzzer_timeout.sh \ src/tests/usr.bin/c++/t_msan_allocated_memory.sh \ src/tests/usr.bin/c++/t_msan_check_mem.sh \ src/tests/usr.bin/c++/t_msan_free.sh src/tests/usr.bin/c++/t_msan_heap.sh \ src/tests/usr.bin/c++/t_msan_partial_poison.sh \ src/tests/usr.bin/c++/t_msan_poison.sh \ src/tests/usr.bin/c++/t_msan_realloc.sh \ src/tests/usr.bin/c++/t_msan_shadow.sh \ src/tests/usr.bin/c++/t_msan_stack.sh \ src/tests/usr.bin/c++/t_msan_unpoison.sh cvs rdiff -u -r1.5 -r1.6 src/tests/usr.bin/c++/t_tsan_data_race.sh \ src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh \ src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh \ src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh \ src/tests/usr.bin/c++/t_tsan_signal_errno.sh \ src/tests/usr.bin/c++/t_tsan_thread_leak.sh \ src/tests/usr.bin/c++/t_tsan_vptr_race.sh cvs rdiff -u -r1.2 -r1.3 src/tests/usr.bin/cc/t_fuzzer_oom.sh \ src/tests/usr.bin/cc/t_fuzzer_simple.sh \ src/tests/usr.bin/cc/t_fuzzer_timeout.sh \ src/tests/usr.bin/cc/t_msan_allocated_memory.sh \ src/tests/usr.bin/cc/t_msan_check_mem.sh \ src/tests/usr.bin/cc/t_msan_free.sh src/tests/usr.bin/cc/t_msan_heap.sh \ src/tests/usr.bin/cc/t_msan_partial_poison.sh \ src/tests/usr.bin/cc/t_msan_poison.sh \ src/tests/usr.bin/cc/t_msan_realloc.sh \ src/tests/usr.bin/cc/t_msan_shadow.sh \ src/tests/usr.bin/cc/t_msan_stack.sh \ src/tests/usr.bin/cc/t_msan_unpoison.sh cvs rdiff -u -r1.5 -r1.6 src/tests/usr.bin/cc/t_tsan_data_race.sh \ src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh \ src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh \ src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh \ src/tests/usr.bin/cc/t_tsan_signal_errno.sh \ src/tests/usr.bin/cc/t_tsan_thread_leak.sh Please note that diffs are not public domain; they are subject to the copyright notices on the relevant files.
Modified files: Index: src/tests/usr.bin/c++/t_fuzzer_oom.sh diff -u src/tests/usr.bin/c++/t_fuzzer_oom.sh:1.2 src/tests/usr.bin/c++/t_fuzzer_oom.sh:1.3 --- src/tests/usr.bin/c++/t_fuzzer_oom.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_fuzzer_oom.sh Thu Jun 2 07:31:35 2022 @@ -124,9 +124,9 @@ EOF atf_check -s ignore -o ignore -e match:"ERROR: libFuzzer: out-of-memory" ./test -rss_limit_mb=30 } oom_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_fuzzer_simple.sh diff -u src/tests/usr.bin/c++/t_fuzzer_simple.sh:1.2 src/tests/usr.bin/c++/t_fuzzer_simple.sh:1.3 --- src/tests/usr.bin/c++/t_fuzzer_simple.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_fuzzer_simple.sh Thu Jun 2 07:31:35 2022 @@ -136,9 +136,9 @@ EOF atf_check -s ignore -o ignore -e match:"BINGO" ./test } simple_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_fuzzer_timeout.sh diff -u src/tests/usr.bin/c++/t_fuzzer_timeout.sh:1.2 src/tests/usr.bin/c++/t_fuzzer_timeout.sh:1.3 --- src/tests/usr.bin/c++/t_fuzzer_timeout.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_fuzzer_timeout.sh Thu Jun 2 07:31:35 2022 @@ -121,9 +121,9 @@ EOF atf_check -s ignore -o ignore -e match:"ERROR: libFuzzer: timeout" ./test -timeout=5 } timeout_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_msan_allocated_memory.sh diff -u src/tests/usr.bin/c++/t_msan_allocated_memory.sh:1.2 src/tests/usr.bin/c++/t_msan_allocated_memory.sh:1.3 --- src/tests/usr.bin/c++/t_msan_allocated_memory.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_msan_allocated_memory.sh Thu Jun 2 07:31:35 2022 @@ -122,9 +122,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } allocated_memory_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_msan_check_mem.sh diff -u src/tests/usr.bin/c++/t_msan_check_mem.sh:1.2 src/tests/usr.bin/c++/t_msan_check_mem.sh:1.3 --- src/tests/usr.bin/c++/t_msan_check_mem.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_msan_check_mem.sh Thu Jun 2 07:31:35 2022 @@ -125,9 +125,9 @@ EOF atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test } check_mem_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_msan_free.sh diff -u src/tests/usr.bin/c++/t_msan_free.sh:1.2 src/tests/usr.bin/c++/t_msan_free.sh:1.3 --- src/tests/usr.bin/c++/t_msan_free.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_msan_free.sh Thu Jun 2 07:31:35 2022 @@ -119,9 +119,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } free_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_msan_heap.sh diff -u src/tests/usr.bin/c++/t_msan_heap.sh:1.2 src/tests/usr.bin/c++/t_msan_heap.sh:1.3 --- src/tests/usr.bin/c++/t_msan_heap.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_msan_heap.sh Thu Jun 2 07:31:35 2022 @@ -104,9 +104,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } heap_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_msan_partial_poison.sh diff -u src/tests/usr.bin/c++/t_msan_partial_poison.sh:1.2 src/tests/usr.bin/c++/t_msan_partial_poison.sh:1.3 --- src/tests/usr.bin/c++/t_msan_partial_poison.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_msan_partial_poison.sh Thu Jun 2 07:31:35 2022 @@ -128,9 +128,9 @@ EOF atf_check -s ignore -o ignore -e match:": 77654321" ./test } partial_poison_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_msan_poison.sh diff -u src/tests/usr.bin/c++/t_msan_poison.sh:1.2 src/tests/usr.bin/c++/t_msan_poison.sh:1.3 --- src/tests/usr.bin/c++/t_msan_poison.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_msan_poison.sh Thu Jun 2 07:31:35 2022 @@ -125,9 +125,9 @@ EOF atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test } poison_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_msan_realloc.sh diff -u src/tests/usr.bin/c++/t_msan_realloc.sh:1.2 src/tests/usr.bin/c++/t_msan_realloc.sh:1.3 --- src/tests/usr.bin/c++/t_msan_realloc.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_msan_realloc.sh Thu Jun 2 07:31:35 2022 @@ -122,9 +122,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } realloc_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_msan_shadow.sh diff -u src/tests/usr.bin/c++/t_msan_shadow.sh:1.2 src/tests/usr.bin/c++/t_msan_shadow.sh:1.3 --- src/tests/usr.bin/c++/t_msan_shadow.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_msan_shadow.sh Thu Jun 2 07:31:35 2022 @@ -137,9 +137,9 @@ EOF atf_check -s ignore -o match:"2" -e match:"00000000 ff000000" ./test } shadow_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_msan_stack.sh diff -u src/tests/usr.bin/c++/t_msan_stack.sh:1.2 src/tests/usr.bin/c++/t_msan_stack.sh:1.3 --- src/tests/usr.bin/c++/t_msan_stack.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_msan_stack.sh Thu Jun 2 07:31:35 2022 @@ -119,9 +119,9 @@ EOF atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test } stack_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_msan_unpoison.sh diff -u src/tests/usr.bin/c++/t_msan_unpoison.sh:1.2 src/tests/usr.bin/c++/t_msan_unpoison.sh:1.3 --- src/tests/usr.bin/c++/t_msan_unpoison.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/c++/t_msan_unpoison.sh Thu Jun 2 07:31:35 2022 @@ -137,9 +137,9 @@ EOF atf_check -s ignore -o ignore -e not-match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } unpoison_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_tsan_data_race.sh diff -u src/tests/usr.bin/c++/t_tsan_data_race.sh:1.5 src/tests/usr.bin/c++/t_tsan_data_race.sh:1.6 --- src/tests/usr.bin/c++/t_tsan_data_race.sh:1.5 Tue Nov 17 08:25:57 2020 +++ src/tests/usr.bin/c++/t_tsan_data_race.sh Thu Jun 2 07:31:35 2022 @@ -131,9 +131,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: data race " ./test } data_race_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh diff -u src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh:1.5 src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh:1.6 --- src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh:1.5 Tue Nov 17 08:25:57 2020 +++ src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh Thu Jun 2 07:31:35 2022 @@ -175,9 +175,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test } heap_use_after_free_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh diff -u src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh:1.5 src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh:1.6 --- src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh:1.5 Tue Nov 17 08:25:57 2020 +++ src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh Thu Jun 2 07:31:35 2022 @@ -147,9 +147,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: lock-order-inversion" ./test } lock_order_inversion_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh diff -u src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh:1.5 src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh:1.6 --- src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh:1.5 Tue Nov 17 08:25:57 2020 +++ src/tests/usr.bin/c++/t_tsan_locked_mutex_destroy.sh Thu Jun 2 07:31:35 2022 @@ -159,9 +159,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: destroy of a locked mutex" ./test } locked_mutex_destroy_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_tsan_signal_errno.sh diff -u src/tests/usr.bin/c++/t_tsan_signal_errno.sh:1.5 src/tests/usr.bin/c++/t_tsan_signal_errno.sh:1.6 --- src/tests/usr.bin/c++/t_tsan_signal_errno.sh:1.5 Tue Nov 17 08:25:57 2020 +++ src/tests/usr.bin/c++/t_tsan_signal_errno.sh Thu Jun 2 07:31:35 2022 @@ -149,9 +149,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: signal handler spoils errno" ./test } signal_errno_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_tsan_thread_leak.sh diff -u src/tests/usr.bin/c++/t_tsan_thread_leak.sh:1.5 src/tests/usr.bin/c++/t_tsan_thread_leak.sh:1.6 --- src/tests/usr.bin/c++/t_tsan_thread_leak.sh:1.5 Thu Dec 16 16:30:55 2021 +++ src/tests/usr.bin/c++/t_tsan_thread_leak.sh Thu Jun 2 07:31:35 2022 @@ -149,9 +149,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: thread leak" ./test } thread_leak_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/c++/t_tsan_vptr_race.sh diff -u src/tests/usr.bin/c++/t_tsan_vptr_race.sh:1.5 src/tests/usr.bin/c++/t_tsan_vptr_race.sh:1.6 --- src/tests/usr.bin/c++/t_tsan_vptr_race.sh:1.5 Thu Dec 16 16:30:55 2021 +++ src/tests/usr.bin/c++/t_tsan_vptr_race.sh Thu Jun 2 07:31:35 2022 @@ -168,9 +168,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: data race on vptr \(ctor/dtor vs virtual call\)" ./test } vptr_race_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "c++ -pie not supported on this architecture" fi cat > test.cc << EOF Index: src/tests/usr.bin/cc/t_fuzzer_oom.sh diff -u src/tests/usr.bin/cc/t_fuzzer_oom.sh:1.2 src/tests/usr.bin/cc/t_fuzzer_oom.sh:1.3 --- src/tests/usr.bin/cc/t_fuzzer_oom.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_fuzzer_oom.sh Thu Jun 2 07:31:35 2022 @@ -124,9 +124,9 @@ EOF atf_check -s ignore -o ignore -e match:"ERROR: libFuzzer: out-of-memory" ./test -rss_limit_mb=30 } oom_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_fuzzer_simple.sh diff -u src/tests/usr.bin/cc/t_fuzzer_simple.sh:1.2 src/tests/usr.bin/cc/t_fuzzer_simple.sh:1.3 --- src/tests/usr.bin/cc/t_fuzzer_simple.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_fuzzer_simple.sh Thu Jun 2 07:31:35 2022 @@ -136,9 +136,9 @@ EOF atf_check -s ignore -o ignore -e match:"BINGO" ./test } simple_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_fuzzer_timeout.sh diff -u src/tests/usr.bin/cc/t_fuzzer_timeout.sh:1.2 src/tests/usr.bin/cc/t_fuzzer_timeout.sh:1.3 --- src/tests/usr.bin/cc/t_fuzzer_timeout.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_fuzzer_timeout.sh Thu Jun 2 07:31:35 2022 @@ -121,9 +121,9 @@ EOF atf_check -s ignore -o ignore -e match:"ERROR: libFuzzer: timeout" ./test -timeout=5 } timeout_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_msan_allocated_memory.sh diff -u src/tests/usr.bin/cc/t_msan_allocated_memory.sh:1.2 src/tests/usr.bin/cc/t_msan_allocated_memory.sh:1.3 --- src/tests/usr.bin/cc/t_msan_allocated_memory.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_msan_allocated_memory.sh Thu Jun 2 07:31:35 2022 @@ -122,9 +122,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } allocated_memory_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_msan_check_mem.sh diff -u src/tests/usr.bin/cc/t_msan_check_mem.sh:1.2 src/tests/usr.bin/cc/t_msan_check_mem.sh:1.3 --- src/tests/usr.bin/cc/t_msan_check_mem.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_msan_check_mem.sh Thu Jun 2 07:31:35 2022 @@ -125,9 +125,9 @@ EOF atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test } check_mem_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF @@ -142,7 +142,7 @@ int main(int argc, char **argv) { } EOF - cc -fsanitize=memory -o test -fpie -pie test.c + cc -fsanitize=memory -o test -fpie -pie test.c paxctl +a test atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test } Index: src/tests/usr.bin/cc/t_msan_free.sh diff -u src/tests/usr.bin/cc/t_msan_free.sh:1.2 src/tests/usr.bin/cc/t_msan_free.sh:1.3 --- src/tests/usr.bin/cc/t_msan_free.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_msan_free.sh Thu Jun 2 07:31:35 2022 @@ -119,9 +119,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } free_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_msan_heap.sh diff -u src/tests/usr.bin/cc/t_msan_heap.sh:1.2 src/tests/usr.bin/cc/t_msan_heap.sh:1.3 --- src/tests/usr.bin/cc/t_msan_heap.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_msan_heap.sh Thu Jun 2 07:31:35 2022 @@ -78,7 +78,7 @@ heap_profile_body(){ int main() { int *a = (int *)malloc(sizeof(int)); return *a; } EOF - cc -fsanitize=memory -o test -pg test.c + cc -fsanitize=memory -o test -pg test.c paxctl +a test atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } @@ -104,9 +104,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } heap_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF @@ -114,7 +114,7 @@ heap_pie_body(){ int main() { int *a = (int *)malloc(sizeof(int)); return *a; } EOF - cc -fsanitize=memory -o test -fpie -pie test.c + cc -fsanitize=memory -o test -fpie -pie test.c paxctl +a test atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } Index: src/tests/usr.bin/cc/t_msan_partial_poison.sh diff -u src/tests/usr.bin/cc/t_msan_partial_poison.sh:1.2 src/tests/usr.bin/cc/t_msan_partial_poison.sh:1.3 --- src/tests/usr.bin/cc/t_msan_partial_poison.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_msan_partial_poison.sh Thu Jun 2 07:31:35 2022 @@ -94,7 +94,7 @@ int main(void) { } EOF - cc -fsanitize=memory -o test -pg test.c + cc -fsanitize=memory -o test -pg test.c paxctl +a test atf_check -s ignore -o ignore -e match:": 77654321" ./test } @@ -128,9 +128,9 @@ EOF atf_check -s ignore -o ignore -e match:": 77654321" ./test } partial_poison_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_msan_poison.sh diff -u src/tests/usr.bin/cc/t_msan_poison.sh:1.2 src/tests/usr.bin/cc/t_msan_poison.sh:1.3 --- src/tests/usr.bin/cc/t_msan_poison.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_msan_poison.sh Thu Jun 2 07:31:35 2022 @@ -92,7 +92,7 @@ int main(void) { } EOF - cc -fsanitize=memory -o test -pg test.c + cc -fsanitize=memory -o test -pg test.c paxctl +a test atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test } @@ -125,9 +125,9 @@ EOF atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test } poison_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF @@ -142,7 +142,7 @@ int main(void) { } EOF - cc -fsanitize=memory -o test -fpie -pie test.c + cc -fsanitize=memory -o test -fpie -pie test.c paxctl +a test atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test } Index: src/tests/usr.bin/cc/t_msan_realloc.sh diff -u src/tests/usr.bin/cc/t_msan_realloc.sh:1.2 src/tests/usr.bin/cc/t_msan_realloc.sh:1.3 --- src/tests/usr.bin/cc/t_msan_realloc.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_msan_realloc.sh Thu Jun 2 07:31:35 2022 @@ -122,9 +122,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } realloc_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF @@ -138,7 +138,7 @@ int main(int argc, char **argv) { } EOF - cc -fsanitize=memory -o test -fpie -pie test.c + cc -fsanitize=memory -o test -fpie -pie test.c paxctl +a test atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } Index: src/tests/usr.bin/cc/t_msan_shadow.sh diff -u src/tests/usr.bin/cc/t_msan_shadow.sh:1.2 src/tests/usr.bin/cc/t_msan_shadow.sh:1.3 --- src/tests/usr.bin/cc/t_msan_shadow.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_msan_shadow.sh Thu Jun 2 07:31:35 2022 @@ -137,9 +137,9 @@ EOF atf_check -s ignore -o match:"2" -e match:"00000000 ff000000" ./test } shadow_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF @@ -158,7 +158,7 @@ int main(int argc, char **argv) { } EOF - cc -fsanitize=memory -o test -fpie -pie test.c + cc -fsanitize=memory -o test -fpie -pie test.c paxctl +a test atf_check -s ignore -o match:"2" -e match:"00000000 ff000000" ./test } Index: src/tests/usr.bin/cc/t_msan_stack.sh diff -u src/tests/usr.bin/cc/t_msan_stack.sh:1.2 src/tests/usr.bin/cc/t_msan_stack.sh:1.3 --- src/tests/usr.bin/cc/t_msan_stack.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_msan_stack.sh Thu Jun 2 07:31:35 2022 @@ -119,9 +119,9 @@ EOF atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test } stack_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF @@ -134,7 +134,7 @@ int main() { } EOF - cc -fsanitize=memory -o test -fpie -pie test.c + cc -fsanitize=memory -o test -fpie -pie test.c paxctl +a test atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test } Index: src/tests/usr.bin/cc/t_msan_unpoison.sh diff -u src/tests/usr.bin/cc/t_msan_unpoison.sh:1.2 src/tests/usr.bin/cc/t_msan_unpoison.sh:1.3 --- src/tests/usr.bin/cc/t_msan_unpoison.sh:1.2 Fri Aug 23 06:39:54 2019 +++ src/tests/usr.bin/cc/t_msan_unpoison.sh Thu Jun 2 07:31:35 2022 @@ -137,9 +137,9 @@ EOF atf_check -s ignore -o ignore -e not-match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test } unpoison_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_tsan_data_race.sh diff -u src/tests/usr.bin/cc/t_tsan_data_race.sh:1.5 src/tests/usr.bin/cc/t_tsan_data_race.sh:1.6 --- src/tests/usr.bin/cc/t_tsan_data_race.sh:1.5 Tue Nov 17 08:25:57 2020 +++ src/tests/usr.bin/cc/t_tsan_data_race.sh Thu Jun 2 07:31:35 2022 @@ -131,9 +131,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: data race " ./test } data_race_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh diff -u src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh:1.5 src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh:1.6 --- src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh:1.5 Tue Nov 17 08:25:57 2020 +++ src/tests/usr.bin/cc/t_tsan_heap_use_after_free.sh Thu Jun 2 07:31:35 2022 @@ -158,9 +158,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test } heap_use_after_free_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh diff -u src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh:1.5 src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh:1.6 --- src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh:1.5 Tue Nov 17 08:25:57 2020 +++ src/tests/usr.bin/cc/t_tsan_lock_order_inversion.sh Thu Jun 2 07:31:35 2022 @@ -146,9 +146,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: lock-order-inversion" ./test } lock_order_inversion_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh diff -u src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh:1.5 src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh:1.6 --- src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh:1.5 Tue Nov 17 08:25:57 2020 +++ src/tests/usr.bin/cc/t_tsan_locked_mutex_destroy.sh Thu Jun 2 07:31:35 2022 @@ -158,9 +158,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: destroy of a locked mutex" ./test } locked_mutex_destroy_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_tsan_signal_errno.sh diff -u src/tests/usr.bin/cc/t_tsan_signal_errno.sh:1.5 src/tests/usr.bin/cc/t_tsan_signal_errno.sh:1.6 --- src/tests/usr.bin/cc/t_tsan_signal_errno.sh:1.5 Tue Nov 17 08:25:57 2020 +++ src/tests/usr.bin/cc/t_tsan_signal_errno.sh Thu Jun 2 07:31:35 2022 @@ -149,9 +149,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: signal handler spoils errno" ./test } signal_errno_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF Index: src/tests/usr.bin/cc/t_tsan_thread_leak.sh diff -u src/tests/usr.bin/cc/t_tsan_thread_leak.sh:1.5 src/tests/usr.bin/cc/t_tsan_thread_leak.sh:1.6 --- src/tests/usr.bin/cc/t_tsan_thread_leak.sh:1.5 Tue Nov 17 08:25:57 2020 +++ src/tests/usr.bin/cc/t_tsan_thread_leak.sh Thu Jun 2 07:31:35 2022 @@ -149,9 +149,9 @@ EOF atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: thread leak" ./test } thread_leak_pie_body(){ - + #check whether -pie flag is supported on this architecture - if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then + if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then atf_set_skip "cc -pie not supported on this architecture" fi cat > test.c << EOF