diff options
author | Bernard Cafarelli <voyageur@gentoo.org> | 2015-08-24 17:01:00 +0200 |
---|---|---|
committer | Bernard Cafarelli <voyageur@gentoo.org> | 2015-08-24 17:03:05 +0200 |
commit | 8d50a4336ee1622d2571e7dded7834c6c19989af (patch) | |
tree | 608dc809d86de2bd96c38452c72b011cc9593f7d /sys-devel/llvm/files | |
parent | media-video/baka-mplayer: mark stable on amd64 (diff) | |
download | gentoo-8d50a4336ee1622d2571e7dded7834c6c19989af.tar.gz gentoo-8d50a4336ee1622d2571e7dded7834c6c19989af.tar.bz2 gentoo-8d50a4336ee1622d2571e7dded7834c6c19989af.zip |
sys-devel/llvm: add rc version for testing
Package-Manager: portage-2.2.20.1
Diffstat (limited to 'sys-devel/llvm/files')
-rw-r--r-- | sys-devel/llvm/files/clang-3.7-strip_doc_refs.patch | 42 |
1 files changed, 42 insertions, 0 deletions
diff --git a/sys-devel/llvm/files/clang-3.7-strip_doc_refs.patch b/sys-devel/llvm/files/clang-3.7-strip_doc_refs.patch new file mode 100644 index 000000000000..9576b923a28b --- /dev/null +++ b/sys-devel/llvm/files/clang-3.7-strip_doc_refs.patch @@ -0,0 +1,42 @@ +--- tools/clang/docs/AddressSanitizer.rst 2015-06-26 01:36:44.000000000 +0200 ++++ tools/clang/docs/AddressSanitizer.rst 2015-08-23 15:35:10.399174574 +0200 +@@ -198,7 +198,7 @@ + Some code should not be instrumented by AddressSanitizer. One may use the + function attribute ``__attribute__((no_sanitize("address")))`` + (which has deprecated synonyms +-:ref:`no_sanitize_address <langext-address_sanitizer>` and ++`no_sanitize_address` and + `no_address_safety_analysis`) to disable instrumentation of a particular + function. This attribute may not be supported by other compilers, so we suggest + to use it together with ``__has_feature(address_sanitizer)``. +--- tools/clang/docs/MemorySanitizer.rst 2015-02-26 16:59:30.000000000 +0100 ++++ tools/clang/docs/MemorySanitizer.rst 2015-08-23 15:35:28.002200413 +0200 +@@ -82,7 +82,7 @@ + + Some code should not be checked by MemorySanitizer. + One may use the function attribute +-:ref:`no_sanitize_memory <langext-memory_sanitizer>` ++`no_sanitize_memory` + to disable uninitialized checks in a particular function. + MemorySanitizer may still instrument such functions to avoid false positives. + This attribute may not be +--- tools/clang/docs/ThreadSanitizer.rst 2015-02-18 23:26:20.000000000 +0100 ++++ tools/clang/docs/ThreadSanitizer.rst 2015-08-23 15:34:53.918150364 +0200 +@@ -88,7 +88,7 @@ + + Some code should not be instrumented by ThreadSanitizer. + One may use the function attribute +-:ref:`no_sanitize_thread <langext-thread_sanitizer>` ++`no_sanitize_thread` + to disable instrumentation of plain (non-atomic) loads/stores in a particular function. + ThreadSanitizer still instruments such functions to avoid false positives and + provide meaningful stack traces. +@@ -102,7 +102,7 @@ + ThreadSanitizer supports ``src`` and ``fun`` entity types in + :doc:`SanitizerSpecialCaseList`, that can be used to suppress data race reports in + the specified source files or functions. Unlike functions marked with +-:ref:`no_sanitize_thread <langext-thread_sanitizer>` attribute, ++`no_sanitize_thread` attribute, + blacklisted functions are not instrumented at all. This can lead to false positives + due to missed synchronization via atomic operations and missed stack frames in reports. + |