diff options
author | B Stack <bgstack15@gmail.com> | 2018-09-14 13:28:57 -0400 |
---|---|---|
committer | B Stack <bgstack15@gmail.com> | 2018-09-14 13:28:57 -0400 |
commit | 3a898b2efff84d117c670a8e82b202d7f107b37a (patch) | |
tree | 1a16f331ed8100496ad3d9edba34157031cb20b2 | |
parent | bring in chinforpms/waterfox (diff) | |
download | stackrpms-3a898b2efff84d117c670a8e82b202d7f107b37a.tar.gz stackrpms-3a898b2efff84d117c670a8e82b202d7f107b37a.tar.bz2 stackrpms-3a898b2efff84d117c670a8e82b202d7f107b37a.zip |
import srpm from copr chinforpms/waterfox
for some reason I was unable to download the tarball of FreeBSD patches
so I extracted it from the copr waterfox build's srpm and added it here.
-rw-r--r-- | waterfox/.gitignore | 3 | ||||
-rw-r--r-- | waterfox/issue2947383002_1.diff | 60 | ||||
-rw-r--r-- | waterfox/waterfox-FreeBSD-patches-r478244.tar.xz | bin | 0 -> 359576 bytes |
3 files changed, 0 insertions, 63 deletions
diff --git a/waterfox/.gitignore b/waterfox/.gitignore deleted file mode 100644 index 44c08e1..0000000 --- a/waterfox/.gitignore +++ /dev/null @@ -1,3 +0,0 @@ -/FreeBSD-*.patch -/wf-*.patch -!/wf-pull-547.patch diff --git a/waterfox/issue2947383002_1.diff b/waterfox/issue2947383002_1.diff deleted file mode 100644 index c41a964..0000000 --- a/waterfox/issue2947383002_1.diff +++ /dev/null @@ -1,60 +0,0 @@ -Index: webrtc/common_audio/vad/vad_core.c -diff --git a/webrtc/common_audio/vad/vad_core.c b/webrtc/common_audio/vad/vad_core.c -index 0340165eb5050ec9fbc386f6d373d0d90a4868f1..1a3889c36787f7bf993692e8fe7781c2ae35e2c2 100644 ---- a/webrtc/common_audio/vad/vad_core.c -+++ b/webrtc/common_audio/vad/vad_core.c -@@ -115,8 +115,8 @@ static int32_t WeightedAverage(int16_t* data, int16_t offset, - // undefined behavior, so not a good idea; this just makes UBSan ignore the - // violation, so that our old code can continue to do what it's always been - // doing.) --static inline int32_t OverflowingMulS16ByS32ToS32(int16_t a, int32_t b) -- RTC_NO_SANITIZE("signed-integer-overflow") { -+static inline int32_t RTC_NO_SANITIZE("signed-integer-overflow") -+ OverflowingMulS16ByS32ToS32(int16_t a, int32_t b) { - return a * b; - } - -Index: webrtc/modules/audio_coding/codecs/isac/fix/source/entropy_coding.c -diff --git a/webrtc/modules/audio_coding/codecs/isac/fix/source/entropy_coding.c b/webrtc/modules/audio_coding/codecs/isac/fix/source/entropy_coding.c -index 039bbc8af7ec26e286dfc94b4383428e5e6e863b..dc8bcf3f481012caab8718430aa9242cf91ad480 100644 ---- a/webrtc/modules/audio_coding/codecs/isac/fix/source/entropy_coding.c -+++ b/webrtc/modules/audio_coding/codecs/isac/fix/source/entropy_coding.c -@@ -193,16 +193,16 @@ static void CalcCorrelation(int32_t *PSpecQ12, int32_t *CorrQ7) - // undefined behavior, so not a good idea; this just makes UBSan ignore the - // violations, so that our old code can continue to do what it's always been - // doing.) --static inline int32_t OverflowingMulS16S32ToS32(int16_t a, int32_t b) -- RTC_NO_SANITIZE("signed-integer-overflow") { -+static inline int32_t RTC_NO_SANITIZE("signed-integer-overflow") -+ OverflowingMulS16S32ToS32(int16_t a, int32_t b) { - return a * b; - } --static inline int32_t OverflowingAddS32S32ToS32(int32_t a, int32_t b) -- RTC_NO_SANITIZE("signed-integer-overflow") { -+static inline int32_t RTC_NO_SANITIZE("signed-integer-overflow") -+ OverflowingAddS32S32ToS32(int32_t a, int32_t b) { - return a + b; - } --static inline int32_t OverflowingSubS32S32ToS32(int32_t a, int32_t b) -- RTC_NO_SANITIZE("signed-integer-overflow") { -+static inline int32_t RTC_NO_SANITIZE("signed-integer-overflow") -+ OverflowingSubS32S32ToS32(int32_t a, int32_t b) { - return a - b; - } - -Index: webrtc/modules/audio_coding/codecs/isac/fix/source/lattice.c -diff --git a/webrtc/modules/audio_coding/codecs/isac/fix/source/lattice.c b/webrtc/modules/audio_coding/codecs/isac/fix/source/lattice.c -index 2b92acb64a3d7dd268574abb57a24850b60cb3d1..b69a885f34de9eaa762a69f11d84cc8bec637376 100644 ---- a/webrtc/modules/audio_coding/codecs/isac/fix/source/lattice.c -+++ b/webrtc/modules/audio_coding/codecs/isac/fix/source/lattice.c -@@ -209,8 +209,8 @@ void WebRtcIsacfix_NormLatticeFilterMa(size_t orderCoef, - // Left shift of an int32_t that's allowed to overflow. (It's still undefined - // behavior, so not a good idea; this just makes UBSan ignore the violation, so - // that our old code can continue to do what it's always been doing.) --static inline int32_t OverflowingLShiftS32(int32_t x, int shift) -- RTC_NO_SANITIZE("shift") { -+static inline int32_t RTC_NO_SANITIZE("shift") -+ OverflowingLShiftS32(int32_t x, int shift) { - return x << shift; - } - diff --git a/waterfox/waterfox-FreeBSD-patches-r478244.tar.xz b/waterfox/waterfox-FreeBSD-patches-r478244.tar.xz Binary files differnew file mode 100644 index 0000000..ecccbb6 --- /dev/null +++ b/waterfox/waterfox-FreeBSD-patches-r478244.tar.xz |