summaryrefslogtreecommitdiff
path: root/devel
diff options
context:
space:
mode:
Diffstat (limited to 'devel')
-rw-r--r--devel/electron37/Makefile.version2
-rw-r--r--devel/electron37/distinfo10
-rw-r--r--devel/jenkins-lts/Makefile2
-rw-r--r--devel/jenkins-lts/distinfo6
-rw-r--r--devel/jenkins/Makefile2
-rw-r--r--devel/jenkins/distinfo6
-rw-r--r--devel/py-archinfo/Makefile2
-rw-r--r--devel/py-archinfo/distinfo6
-rw-r--r--devel/ruby-build/Makefile2
-rw-r--r--devel/ruby-build/distinfo6
-rw-r--r--devel/wasmer/files/patch-rust-1.89.0471
11 files changed, 493 insertions, 22 deletions
diff --git a/devel/electron37/Makefile.version b/devel/electron37/Makefile.version
index 2d495a9792cd..1b45438ef1d1 100644
--- a/devel/electron37/Makefile.version
+++ b/devel/electron37/Makefile.version
@@ -1,2 +1,2 @@
-ELECTRON_VER= 37.5.0
+ELECTRON_VER= 37.5.1
ELECTRON_VER_MAJOR= ${ELECTRON_VER:C/\..*//}
diff --git a/devel/electron37/distinfo b/devel/electron37/distinfo
index 088a80694775..f4151a112bb1 100644
--- a/devel/electron37/distinfo
+++ b/devel/electron37/distinfo
@@ -1,4 +1,4 @@
-TIMESTAMP = 1757857958
+TIMESTAMP = 1758098271
SHA256 (electron/chromium-138.0.7204.251.tar.xz.0) = 23057c15fd77b6653b01a34e08782f05cc80ecddddaf6f0b87390beb32810151
SIZE (electron/chromium-138.0.7204.251.tar.xz.0) = 2000000000
SHA256 (electron/chromium-138.0.7204.251.tar.xz.1) = 784a8bcb5eff8c204557c5cb7c4a223efd3c472303dd79a8b7be97e3d5d0982a
@@ -7,10 +7,10 @@ SHA256 (electron/chromium-138.0.7204.251.tar.xz.2) = 3d7af9e06a90102b41de19d4635
SIZE (electron/chromium-138.0.7204.251.tar.xz.2) = 273864084
SHA256 (electron/pulseaudio-16.1.tar.gz) = 027266c62f2a84422ac45fa721a649508f0f1628fb1fd9242315ac54ce2d7c92
SIZE (electron/pulseaudio-16.1.tar.gz) = 2763111
-SHA256 (electron/electron-yarn-cache-37.5.0.tar.xz) = 7823d2fceaf2aac5bb0b342866049b0dfdeca98a65ac00559abfaff47bdba536
-SIZE (electron/electron-yarn-cache-37.5.0.tar.xz) = 30480408
-SHA256 (electron/electron-electron-v37.5.0_GH0.tar.gz) = 1c6e9ba0cf3775b69531d553446bc50291c2ece2a80a819854da3ad4001511d5
-SIZE (electron/electron-electron-v37.5.0_GH0.tar.gz) = 15840392
+SHA256 (electron/electron-yarn-cache-37.5.1.tar.xz) = 7823d2fceaf2aac5bb0b342866049b0dfdeca98a65ac00559abfaff47bdba536
+SIZE (electron/electron-yarn-cache-37.5.1.tar.xz) = 30480408
+SHA256 (electron/electron-electron-v37.5.1_GH0.tar.gz) = b29da9830cb33f859bcc01fcbbe12b7430679f321674ec8827e623bfb7a87087
+SIZE (electron/electron-electron-v37.5.1_GH0.tar.gz) = 15840327
SHA256 (electron/nodejs-node-v22.19.0_GH0.tar.gz) = 8f28e6635c2fe9d1ea29347606df81128c52bc3a2b820aca5851bd6b89c96aa4
SIZE (electron/nodejs-node-v22.19.0_GH0.tar.gz) = 123089614
SHA256 (electron/nodejs-nan-e14bdcd1f72d62bca1d541b66da43130384ec213_GH0.tar.gz) = 02edf8d5b3fef9af94d8a1355da60564a57e7f2c99cb422bce042400607ed2eb
diff --git a/devel/jenkins-lts/Makefile b/devel/jenkins-lts/Makefile
index e7d93977855b..b22b9cc23ed9 100644
--- a/devel/jenkins-lts/Makefile
+++ b/devel/jenkins-lts/Makefile
@@ -1,5 +1,5 @@
PORTNAME= jenkins
-PORTVERSION= 2.516.2
+PORTVERSION= 2.516.3
CATEGORIES= devel java
MASTER_SITES= https://get.jenkins.io/war-stable/${PORTVERSION}/
PKGNAMESUFFIX= -lts
diff --git a/devel/jenkins-lts/distinfo b/devel/jenkins-lts/distinfo
index 6b5a37921f47..61567c35d05f 100644
--- a/devel/jenkins-lts/distinfo
+++ b/devel/jenkins-lts/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1755712932
-SHA256 (jenkins/2.516.2/jenkins.war) = ed6b9c0995d78062e055c7a42a055b65187c4d26ea36fb9b49d8f2dd86bc6fc8
-SIZE (jenkins/2.516.2/jenkins.war) = 87485720
+TIMESTAMP = 1758133479
+SHA256 (jenkins/2.516.3/jenkins.war) = 81b3abcc0f24cea48e74effe152f69dc5f0d880edc0c2737c61446b3c5992c00
+SIZE (jenkins/2.516.3/jenkins.war) = 87500304
diff --git a/devel/jenkins/Makefile b/devel/jenkins/Makefile
index a602f22d148e..5d55a6c9831b 100644
--- a/devel/jenkins/Makefile
+++ b/devel/jenkins/Makefile
@@ -1,5 +1,5 @@
PORTNAME= jenkins
-PORTVERSION= 2.527
+PORTVERSION= 2.528
CATEGORIES= devel java
MASTER_SITES= https://get.jenkins.io/war/${PORTVERSION}/
DISTNAME= jenkins
diff --git a/devel/jenkins/distinfo b/devel/jenkins/distinfo
index e4e3b854a02b..485bfb4ba209 100644
--- a/devel/jenkins/distinfo
+++ b/devel/jenkins/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1757583995
-SHA256 (jenkins/2.527/jenkins.war) = fdada2d547ef03690088c2d616ea9f48b403323d29cd635484a8d1ed5dee473b
-SIZE (jenkins/2.527/jenkins.war) = 95450233
+TIMESTAMP = 1758133304
+SHA256 (jenkins/2.528/jenkins.war) = 0077a6377878eceb659fe0e4c5104fd4adbc36fa307a495eb2264fe4105ed88c
+SIZE (jenkins/2.528/jenkins.war) = 95450722
diff --git a/devel/py-archinfo/Makefile b/devel/py-archinfo/Makefile
index 70a6edbbb9ae..dacc4af7e0d9 100644
--- a/devel/py-archinfo/Makefile
+++ b/devel/py-archinfo/Makefile
@@ -1,6 +1,6 @@
PORTNAME= archinfo
DISTVERSIONPREFIX= v
-DISTVERSION= 9.2.171
+DISTVERSION= 9.2.175
CATEGORIES= devel python
PKGNAMEPREFIX= ${PYTHON_PKGNAMEPREFIX}
diff --git a/devel/py-archinfo/distinfo b/devel/py-archinfo/distinfo
index 45aaae4624be..2033f887a8c7 100644
--- a/devel/py-archinfo/distinfo
+++ b/devel/py-archinfo/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1755675486
-SHA256 (angr-archinfo-v9.2.171_GH0.tar.gz) = 0c356f635a6624495cff9e560b3fd9e3e7532d44d60707b685791c815271055a
-SIZE (angr-archinfo-v9.2.171_GH0.tar.gz) = 45844
+TIMESTAMP = 1758102902
+SHA256 (angr-archinfo-v9.2.175_GH0.tar.gz) = d89a609dc831a86bfd3e0b1ed979b0d17ce06ca101f75c3edc4b770b9d0f0acc
+SIZE (angr-archinfo-v9.2.175_GH0.tar.gz) = 45930
diff --git a/devel/ruby-build/Makefile b/devel/ruby-build/Makefile
index c209109dc5a5..f2a766d28474 100644
--- a/devel/ruby-build/Makefile
+++ b/devel/ruby-build/Makefile
@@ -1,5 +1,5 @@
PORTNAME= ruby-build
-PORTVERSION= 20250916
+PORTVERSION= 20250916.1
DISTVERSIONPREFIX= v
CATEGORIES= devel ruby
diff --git a/devel/ruby-build/distinfo b/devel/ruby-build/distinfo
index 0f5895f95fff..a58c35a4e38f 100644
--- a/devel/ruby-build/distinfo
+++ b/devel/ruby-build/distinfo
@@ -1,3 +1,3 @@
-TIMESTAMP = 1758098495
-SHA256 (rbenv-ruby-build-v20250916_GH0.tar.gz) = 0317015d7257b2a8110b7aa3e046b4ccc3ba6691c8fadb1ef71f7ea445544c79
-SIZE (rbenv-ruby-build-v20250916_GH0.tar.gz) = 96994
+TIMESTAMP = 1758098711
+SHA256 (rbenv-ruby-build-v20250916.1_GH0.tar.gz) = 3e2c33a21a21cda5b4f8725850f9f142a4af0a4062b8b40d1e3c9fae7b50f3b2
+SIZE (rbenv-ruby-build-v20250916.1_GH0.tar.gz) = 97347
diff --git a/devel/wasmer/files/patch-rust-1.89.0 b/devel/wasmer/files/patch-rust-1.89.0
new file mode 100644
index 000000000000..0baa5c9f6fcc
--- /dev/null
+++ b/devel/wasmer/files/patch-rust-1.89.0
@@ -0,0 +1,471 @@
+https://github.com/wasmerio/wasmer/issues/5610
+https://github.com/wasmerio/wasmer/pull/5690
+
+
+From fc021be5c6f30ff0625d0fe8bd37a7d0ead6b0e9 Mon Sep 17 00:00:00 2001
+From: StackOverflowExcept1on
+ <109800286+StackOverflowExcept1on@users.noreply.github.com>
+Date: Thu, 7 Aug 2025 17:50:19 +0300
+Subject: [PATCH] fix(lib/vm): vendor `compiler-builtins` to fix undefined
+ symbol `__rust_probestack`
+
+---
+ Cargo.lock | 1 +
+ lib/vm/Cargo.toml | 4 +
+ lib/vm/build.rs | 7 +
+ lib/vm/src/probestack/compiler_builtins.rs | 358 ++++++++++++++++++
+ .../src/{probestack.rs => probestack/mod.rs} | 20 +-
+ 5 files changed, 386 insertions(+), 4 deletions(-)
+ create mode 100644 lib/vm/build.rs
+ create mode 100644 lib/vm/src/probestack/compiler_builtins.rs
+ rename lib/vm/src/{probestack.rs => probestack/mod.rs} (77%)
+
+diff --git Cargo.lock Cargo.lock
+index 2d980929125..c554ac0997f 100644
+--- Cargo.lock
++++ Cargo.lock
+@@ -7240,6 +7240,7 @@ dependencies = [
+ "memoffset 0.9.1",
+ "more-asserts",
+ "region",
++ "rustversion",
+ "scopeguard",
+ "serde",
+ "thiserror 1.0.69",
+diff --git lib/vm/Cargo.toml lib/vm/Cargo.toml
+index 6c9f5cbee87..e7a40580a80 100644
+--- lib/vm/Cargo.toml
++++ lib/vm/Cargo.toml
+@@ -49,10 +49,14 @@ windows-sys = { version = "0.59", features = [
+
+ [build-dependencies]
+ cc = "1.0"
++rustversion = "1.0"
+
+ [badges]
+ maintenance = { status = "actively-developed" }
+
++[lints.rust]
++unexpected_cfgs = { level = "warn", check-cfg = ['cfg(missing_rust_probestack)'] }
++
+ [features]
+ default = []
+ enable-serde = ["serde", "indexmap/serde", "wasmer-types/enable-serde"]
+diff --git lib/vm/build.rs lib/vm/build.rs
+new file mode 100644
+index 00000000000..a2f1dcd8e8a
+--- /dev/null
++++ lib/vm/build.rs
+@@ -0,0 +1,7 @@
++#[rustversion::since(1.89)]
++fn main() {
++ println!("cargo::rustc-cfg=missing_rust_probestack");
++}
++
++#[rustversion::before(1.89)]
++fn main() {}
+diff --git lib/vm/src/probestack/compiler_builtins.rs lib/vm/src/probestack/compiler_builtins.rs
+new file mode 100644
+index 00000000000..a16c1069f58
+--- /dev/null
++++ lib/vm/src/probestack/compiler_builtins.rs
+@@ -0,0 +1,358 @@
++// Copyright 2017 The Rust Project Developers. See the COPYRIGHT
++// file at the top-level directory of this distribution and at
++// http://rust-lang.org/COPYRIGHT.
++//
++// Licensed under the Apache License, Version 2.0 <LICENSE-APACHE or
++// http://www.apache.org/licenses/LICENSE-2.0> or the MIT license
++// <LICENSE-MIT or http://opensource.org/licenses/MIT>, at your
++// option. This file may not be copied, modified, or distributed
++// except according to those terms.
++
++//! This module defines the `__rust_probestack` intrinsic which is used in the
++//! implementation of "stack probes" on certain platforms.
++//!
++//! The purpose of a stack probe is to provide a static guarantee that if a
++//! thread has a guard page then a stack overflow is guaranteed to hit that
++//! guard page. If a function did not have a stack probe then there's a risk of
++//! having a stack frame *larger* than the guard page, so a function call could
++//! skip over the guard page entirely and then later hit maybe the heap or
++//! another thread, possibly leading to security vulnerabilities such as [The
++//! Stack Clash], for example.
++//!
++//! [The Stack Clash]: https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash
++//!
++//! The `__rust_probestack` is called in the prologue of functions whose stack
++//! size is larger than the guard page, for example larger than 4096 bytes on
++//! x86. This function is then responsible for "touching" all pages relevant to
++//! the stack to ensure that that if any of them are the guard page we'll hit
++//! them guaranteed.
++//!
++//! The precise ABI for how this function operates is defined by LLVM. There's
++//! no real documentation as to what this is, so you'd basically need to read
++//! the LLVM source code for reference. Often though the test cases can be
++//! illuminating as to the ABI that's generated, or just looking at the output
++//! of `llc`.
++//!
++//! Note that `#[naked]` is typically used here for the stack probe because the
++//! ABI corresponds to no actual ABI.
++//!
++//! Finally it's worth noting that at the time of this writing LLVM only has
++//! support for stack probes on x86 and x86_64. There's no support for stack
++//! probes on any other architecture like ARM or PowerPC64. LLVM I'm sure would
++//! be more than welcome to accept such a change!
++
++// Windows and Cygwin already has builtins to do this.
++#![cfg(not(any(windows, target_os = "cygwin")))]
++// We only define stack probing for these architectures today.
++#![cfg(any(target_arch = "x86_64", target_arch = "x86"))]
++
++// SAFETY: defined in this module.
++// FIXME(extern_custom): the ABI is not correct.
++unsafe extern "C" {
++ pub fn __rust_probestack();
++}
++
++// A wrapper for our implementation of __rust_probestack, which allows us to
++// keep the assembly inline while controlling all CFI directives in the assembly
++// emitted for the function.
++//
++// This is the ELF version.
++#[cfg(not(any(target_vendor = "apple", target_os = "uefi")))]
++macro_rules! define_rust_probestack {
++ ($body: expr) => {
++ concat!(
++ "
++ .pushsection .text.__rust_probestack
++ .globl __rust_probestack
++ .type __rust_probestack, @function
++ .hidden __rust_probestack
++ __rust_probestack:
++ ",
++ $body,
++ "
++ .size __rust_probestack, . - __rust_probestack
++ .popsection
++ "
++ )
++ };
++}
++
++#[cfg(all(target_os = "uefi", target_arch = "x86_64"))]
++macro_rules! define_rust_probestack {
++ ($body: expr) => {
++ concat!(
++ "
++ .globl __rust_probestack
++ __rust_probestack:
++ ",
++ $body
++ )
++ };
++}
++
++// Same as above, but for Mach-O. Note that the triple underscore
++// is deliberate
++#[cfg(target_vendor = "apple")]
++macro_rules! define_rust_probestack {
++ ($body: expr) => {
++ concat!(
++ "
++ .globl ___rust_probestack
++ ___rust_probestack:
++ ",
++ $body
++ )
++ };
++}
++
++// In UEFI x86 arch, triple underscore is deliberate.
++#[cfg(all(target_os = "uefi", target_arch = "x86"))]
++macro_rules! define_rust_probestack {
++ ($body: expr) => {
++ concat!(
++ "
++ .globl ___rust_probestack
++ ___rust_probestack:
++ ",
++ $body
++ )
++ };
++}
++
++// Our goal here is to touch each page between %rsp+8 and %rsp+8-%rax,
++// ensuring that if any pages are unmapped we'll make a page fault.
++//
++// FIXME(abi_custom): This function is unsafe because it uses a custom ABI,
++// it does not actually match `extern "C"`.
++//
++// The ABI here is that the stack frame size is located in `%rax`. Upon
++// return we're not supposed to modify `%rsp` or `%rax`.
++//
++// Any changes to this function should be replicated to the SGX version below.
++#[cfg(all(
++ target_arch = "x86_64",
++ not(all(target_env = "sgx", target_vendor = "fortanix"))
++))]
++core::arch::global_asm!(
++ define_rust_probestack!(
++ "
++ .cfi_startproc
++ pushq %rbp
++ .cfi_adjust_cfa_offset 8
++ .cfi_offset %rbp, -16
++ movq %rsp, %rbp
++ .cfi_def_cfa_register %rbp
++
++ mov %rax,%r11 // duplicate %rax as we're clobbering %r11
++
++ // Main loop, taken in one page increments. We're decrementing rsp by
++ // a page each time until there's less than a page remaining. We're
++ // guaranteed that this function isn't called unless there's more than a
++ // page needed.
++ //
++ // Note that we're also testing against `8(%rsp)` to account for the 8
++ // bytes pushed on the stack orginally with our return address. Using
++ // `8(%rsp)` simulates us testing the stack pointer in the caller's
++ // context.
++
++ // It's usually called when %rax >= 0x1000, but that's not always true.
++ // Dynamic stack allocation, which is needed to implement unsized
++ // rvalues, triggers stackprobe even if %rax < 0x1000.
++ // Thus we have to check %r11 first to avoid segfault.
++ cmp $0x1000,%r11
++ jna 3f
++2:
++ sub $0x1000,%rsp
++ test %rsp,8(%rsp)
++ sub $0x1000,%r11
++ cmp $0x1000,%r11
++ ja 2b
++
++3:
++ // Finish up the last remaining stack space requested, getting the last
++ // bits out of r11
++ sub %r11,%rsp
++ test %rsp,8(%rsp)
++
++ // Restore the stack pointer to what it previously was when entering
++ // this function. The caller will readjust the stack pointer after we
++ // return.
++ add %rax,%rsp
++
++ leave
++ .cfi_def_cfa_register %rsp
++ .cfi_adjust_cfa_offset -8
++ ret
++ .cfi_endproc
++ "
++ ),
++ options(att_syntax)
++);
++
++// This function is the same as above, except that some instructions are
++// [manually patched for LVI].
++//
++// [manually patched for LVI]: https://software.intel.com/security-software-guidance/insights/deep-dive-load-value-injection#specialinstructions
++#[cfg(all(
++ target_arch = "x86_64",
++ all(target_env = "sgx", target_vendor = "fortanix")
++))]
++core::arch::global_asm!(
++ define_rust_probestack!(
++ "
++ .cfi_startproc
++ pushq %rbp
++ .cfi_adjust_cfa_offset 8
++ .cfi_offset %rbp, -16
++ movq %rsp, %rbp
++ .cfi_def_cfa_register %rbp
++
++ mov %rax,%r11 // duplicate %rax as we're clobbering %r11
++
++ // Main loop, taken in one page increments. We're decrementing rsp by
++ // a page each time until there's less than a page remaining. We're
++ // guaranteed that this function isn't called unless there's more than a
++ // page needed.
++ //
++ // Note that we're also testing against `8(%rsp)` to account for the 8
++ // bytes pushed on the stack orginally with our return address. Using
++ // `8(%rsp)` simulates us testing the stack pointer in the caller's
++ // context.
++
++ // It's usually called when %rax >= 0x1000, but that's not always true.
++ // Dynamic stack allocation, which is needed to implement unsized
++ // rvalues, triggers stackprobe even if %rax < 0x1000.
++ // Thus we have to check %r11 first to avoid segfault.
++ cmp $0x1000,%r11
++ jna 3f
++2:
++ sub $0x1000,%rsp
++ test %rsp,8(%rsp)
++ sub $0x1000,%r11
++ cmp $0x1000,%r11
++ ja 2b
++
++3:
++ // Finish up the last remaining stack space requested, getting the last
++ // bits out of r11
++ sub %r11,%rsp
++ test %rsp,8(%rsp)
++
++ // Restore the stack pointer to what it previously was when entering
++ // this function. The caller will readjust the stack pointer after we
++ // return.
++ add %rax,%rsp
++
++ leave
++ .cfi_def_cfa_register %rsp
++ .cfi_adjust_cfa_offset -8
++ pop %r11
++ lfence
++ jmp *%r11
++ .cfi_endproc
++ "
++ ),
++ options(att_syntax)
++);
++
++#[cfg(all(target_arch = "x86", not(target_os = "uefi")))]
++// This is the same as x86_64 above, only translated for 32-bit sizes. Note
++// that on Unix we're expected to restore everything as it was, this
++// function basically can't tamper with anything.
++//
++// FIXME(abi_custom): This function is unsafe because it uses a custom ABI,
++// it does not actually match `extern "C"`.
++//
++// The ABI here is the same as x86_64, except everything is 32-bits large.
++core::arch::global_asm!(
++ define_rust_probestack!(
++ "
++ .cfi_startproc
++ push %ebp
++ .cfi_adjust_cfa_offset 4
++ .cfi_offset %ebp, -8
++ mov %esp, %ebp
++ .cfi_def_cfa_register %ebp
++ push %ecx
++ mov %eax,%ecx
++
++ cmp $0x1000,%ecx
++ jna 3f
++2:
++ sub $0x1000,%esp
++ test %esp,8(%esp)
++ sub $0x1000,%ecx
++ cmp $0x1000,%ecx
++ ja 2b
++
++3:
++ sub %ecx,%esp
++ test %esp,8(%esp)
++
++ add %eax,%esp
++ pop %ecx
++ leave
++ .cfi_def_cfa_register %esp
++ .cfi_adjust_cfa_offset -4
++ ret
++ .cfi_endproc
++ "
++ ),
++ options(att_syntax)
++);
++
++#[cfg(all(target_arch = "x86", target_os = "uefi"))]
++// UEFI target is windows like target. LLVM will do _chkstk things like windows.
++// probestack function will also do things like _chkstk in MSVC.
++// So we need to sub %ax %sp in probestack when arch is x86.
++//
++// FIXME(abi_custom): This function is unsafe because it uses a custom ABI,
++// it does not actually match `extern "C"`.
++//
++// REF: Rust commit(74e80468347)
++// rust\src\llvm-project\llvm\lib\Target\X86\X86FrameLowering.cpp: 805
++// Comments in LLVM:
++// MSVC x32's _chkstk and cygwin/mingw's _alloca adjust %esp themselves.
++// MSVC x64's __chkstk and cygwin/mingw's ___chkstk_ms do not adjust %rsp
++// themselves.
++core::arch::global_asm!(
++ define_rust_probestack!(
++ "
++ .cfi_startproc
++ push %ebp
++ .cfi_adjust_cfa_offset 4
++ .cfi_offset %ebp, -8
++ mov %esp, %ebp
++ .cfi_def_cfa_register %ebp
++ push %ecx
++ push %edx
++ mov %eax,%ecx
++
++ cmp $0x1000,%ecx
++ jna 3f
++2:
++ sub $0x1000,%esp
++ test %esp,8(%esp)
++ sub $0x1000,%ecx
++ cmp $0x1000,%ecx
++ ja 2b
++
++3:
++ sub %ecx,%esp
++ test %esp,8(%esp)
++ mov 4(%ebp),%edx
++ mov %edx, 12(%esp)
++ add %eax,%esp
++ pop %edx
++ pop %ecx
++ leave
++
++ sub %eax, %esp
++ .cfi_def_cfa_register %esp
++ .cfi_adjust_cfa_offset -4
++ ret
++ .cfi_endproc
++ "
++ ),
++ options(att_syntax)
++);
+diff --git lib/vm/src/probestack.rs lib/vm/src/probestack/mod.rs
+similarity index 77%
+rename from lib/vm/src/probestack.rs
+rename to lib/vm/src/probestack/mod.rs
+index 814ddf9c20c..84dfd22fb8a 100644
+--- lib/vm/src/probestack.rs
++++ lib/vm/src/probestack/mod.rs
+@@ -14,6 +14,11 @@
+ //!
+ //! [The Stack Clash]: https://blog.qualys.com/securitylabs/2017/06/19/the-stack-clash
+
++// Based on `compiler-builtins` crate with changes in `#[cfg(...)]`:
++// https://raw.githubusercontent.com/rust-lang/compiler-builtins/319637f544d9dda8fc3dd482d9979e0da135a258/compiler-builtins/src/probestack.rs
++#[cfg(missing_rust_probestack)]
++mod compiler_builtins;
++
+ // A declaration for the stack probe function in Rust's standard library, for
+ // catching callstack overflow.
+ cfg_if::cfg_if! {
+@@ -55,10 +60,17 @@ cfg_if::cfg_if! {
+ /// A default probestack for other architectures
+ pub const PROBESTACK: unsafe extern "C" fn() = empty_probestack;
+ } else {
+- extern "C" {
+- pub fn __rust_probestack();
++ cfg_if::cfg_if! {
++ if #[cfg(not(missing_rust_probestack))] {
++ extern "C" {
++ pub fn __rust_probestack();
++ }
++ /// The probestack based on the Rust probestack
++ pub static PROBESTACK: unsafe extern "C" fn() = __rust_probestack;
++ } else if #[cfg(missing_rust_probestack)] {
++ /// The probestack based on the Rust probestack
++ pub static PROBESTACK: unsafe extern "C" fn() = compiler_builtins::__rust_probestack;
++ }
+ }
+- /// The probestack based on the Rust probestack
+- pub static PROBESTACK: unsafe extern "C" fn() = __rust_probestack;
+ }
+ }