summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSergei Trofimovich <slyfox@gentoo.org>2020-10-10 09:24:18 +0100
committerSergei Trofimovich <slyfox@gentoo.org>2020-10-10 09:24:18 +0100
commit1833d6912b2b2d5c83e43ff17ae99c2bbc1d135a (patch)
tree4b433c41700c080d23f02b6ea4e554f3d76e0d08 /dev-util/re2c/files
parentmedia-libs/sdl-gfx: bind subslot to SONAME (diff)
downloadgentoo-1833d6912b2b2d5c83e43ff17ae99c2bbc1d135a.tar.gz
gentoo-1833d6912b2b2d5c83e43ff17ae99c2bbc1d135a.tar.bz2
gentoo-1833d6912b2b2d5c83e43ff17ae99c2bbc1d135a.zip
dev-util/re2c: drop old
Package-Manager: Portage-3.0.8, Repoman-3.0.1 Signed-off-by: Sergei Trofimovich <slyfox@gentoo.org>
Diffstat (limited to 'dev-util/re2c/files')
-rw-r--r--dev-util/re2c/files/re2c-1.3-lexer-overflow.patch40
1 files changed, 0 insertions, 40 deletions
diff --git a/dev-util/re2c/files/re2c-1.3-lexer-overflow.patch b/dev-util/re2c/files/re2c-1.3-lexer-overflow.patch
deleted file mode 100644
index 4222ef430c32..000000000000
--- a/dev-util/re2c/files/re2c-1.3-lexer-overflow.patch
+++ /dev/null
@@ -1,40 +0,0 @@
-https://bugs.gentoo.org/718350
-
-From c4603ba5ce229db83a2a4fb93e6d4b4e3ec3776a Mon Sep 17 00:00:00 2001
-From: Ulya Trofimovich <skvadrik@gmail.com>
-Date: Fri, 17 Apr 2020 22:47:14 +0100
-Subject: [PATCH] Fix crash in lexer refill (reported by Agostino Sarubbo).
-
-The crash happened in a rare case of a very long lexeme that doen't fit
-into the buffer, forcing buffer reallocation.
-
-The crash was caused by an incorrect calculation of the shift offset
-(it was smaller than necessary). As a consequence, the data from buffer
-start and up to the beginning of the current lexeme was not discarded
-(as it should have been), resulting in less free space for new data than
-expected.
----
- src/parse/scanner.cc | 3 ++-
- 1 file changed, 2 insertions(+), 1 deletion(-)
-
---- a/src/parse/scanner.cc
-+++ b/src/parse/scanner.cc
-@@ -155,13 +155,14 @@ bool Scanner::fill(size_t need)
- if (!buf) fatal("out of memory");
-
- memmove(buf, tok, copy);
-- shift_ptrs_and_fpos(buf - bot);
-+ shift_ptrs_and_fpos(buf - tok);
- delete [] bot;
- bot = buf;
-
- free = BSIZE - copy;
- }
-
-+ DASSERT(lim + free <= bot + BSIZE);
- if (!read(free)) {
- eof = lim;
- memset(lim, 0, YYMAXFILL);
---
-2.26.1
-