console: fix overwrite of 'dhcp' configuration
Although this is correct from a pure config.xml.sample perspective
it clearly purges further configuration from the file which we better
avoid.
(cherry picked from commit 660fa8210bec8acf41c2b615fb3212e39ce64e33)
Revert "[HLSL] Improve HLSL resource method generation" (#178266)
Reverts llvm/llvm-project#176806
This is causing memsan failures related to the source locations for cast
instructions we are not generating. The failure is not straight forward
to fix, so I will revert this while I work on a fix.
llvm-tli-checker: Print custom name instead of standard name (#178265)
Previously this always printed the standard name if the function
was available, leaving any custom name override untested. Print the
target's name instead. The message should possibly include the standard
name for reference.
Closes #142537
[ASan] Fix UnpoisonDefaultStack stack bottom estimation (#178137)
UnpoisonDefaultStack estimates the stack bottom as:
```
bottom = ((uptr)&local_stack - page_size) & ~(page_size - 1);
```
However, this can try to poision memory that doesn't have a shadow (i.e.
AddrIsInMem(x) is false) if the local_stack variable is within two pages
of the actual bottom of the space available for stack. This causes the
unpoison-alternate-stack.cpp test (which allocates a very small stack)
to fail.
This PR changes this computation to check AddrIsInMem before subtracting
the additional page.
rdar://82645815
llvm-tli-checker: Print custom name instead of standard name
Previously this always printed the standard name if the function
was available, leaving any custom name override untested. Print the
target's name instead. The message should possibly include the standard
name for reference.
Closes #142537
[libc] fix LIBC_CONF_ENABLE_STRONG_STACK_PROTECTOR (#178136)
In order to apply the stack protector correctly to the compile options,
we need to make sure to use the same config name everywhere.
`LIBC_CONF_ENABLE_STACK_PROTECTOR` seems to be outdated and all other
places specify `LIBC_CONF_ENABLE_STRONG_STACK_PROTECTOR` and it should
therefore be updated here as well.
mail/msmtp: fix the TLS option
Part of commit 61d57c2657e1178dd763c8dd63503a9338525f47 was
converting from *_CONFIGURE_ON to *_CONFIGURE_WITH
for the TLS option. As it is a radio option, it means that one
of the options will be always disabled, resulting in adding
`--without-tls` to the CONFIGURE_ARGS, and no TLS support.
Fix by switching back to CONFIGURE_ON and bump PORTREVISION
to regenerate the package.
Reported by: Scott Robbins
NAS-139506 / 26.0.0-BETA.1 / fix pool export when apps ds is gone (#18110)
This code is indecipherable and maddening. I can't export a pool because
the ix-apps dataset was destroyed (by me during bug reproduction) and
it's raising ENOENT. Investigating shows that this regressed when the
new zfs.resource API was put in which broke the `except CallError` catch
that should have been ignoring this and allowing it go through.
I've fixed the regression but this code makes me want to mow yards for a
living.
[MLIR][TOSA] Guard scatter lowering against unranked operand (#178188)
### What the problem
--tosa-to-scf crashes when lowering tosa.scatter if operands are
unranked, because the lowering assumes RankedTensorType and later builds
tensor.extract_slice, which asserts on unranked tensors.
### Why it Happened
The current pattern does not check operand ranks before lowering, even
though the implementation hardcodes 3D (N,W,C) semantics and cannot
handle unranked or differently-ranked tensors.
### Whats The Fix
Add rank/type guards in ScatterOpConverter and fail the rewrite unless
operands are ranked with expected ranks (values/input: rank-3, indices:
rank-2), allowing legalization to fail gracefully instead of crashing.
Fixes #177966
InstCombine: Apply demanded mask at recursion limit in SimplifyDemandedFPClass (#178157)
This fixes missed flag inference in some cases, due to not inferring
no-nan result implies no-nan source. Also start treating explicit
nofpclass
attributes as a leaf value, like a constant or argument.