[pcre-dev] [Bug 1463] pcre-8.35 fails test with GCC 4.9

Startseite
Nachricht löschen
Autor: Simon McVittie
Datum:  
To: pcre-dev
Alte Treads: [pcre-dev] [Bug 1463] New: pcre-8.35 fails test with GCC 4.9
Betreff: [pcre-dev] [Bug 1463] pcre-8.35 fails test with GCC 4.9
------- You are receiving this mail because: -------
You are on the CC list for the bug.

http://bugs.exim.org/show_bug.cgi?id=1463




--- Comment #7 from Simon McVittie <smcv@???> 2014-07-20 15:52:21 ---
Created an attachment (id=740)
--> (http://bugs.exim.org/attachment.cgi?id=740)
Update expected test output to account for avoiding signed overflow

The new implementation for detecting excessively large quantifiers
reports the error sooner than the old one.

Bug: http://bugs.exim.org/show_bug.cgi?id=1463
Bug-Debian: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=751828

---

This is what I would suggest applying.

If you'd prefer to produce the same offsets as before instead, the extra lines
in Petr's patch are a good starting point; I think the only change needed to
cover {large number,???} is to terminate the extra loop on (!ISDIGIT(*p))
instead of (p == '}').


--
Configure bugmail: http://bugs.exim.org/userprefs.cgi?tab=email