On Tue, 2015-12-08 at 13:28 +0100, an unknown sender wrote:
> The patch in the attachment is CR/NL damaged, even when saved to file.
> I doubt upstream sent it that way, more likely evo(3.18.2) did that.

Upstream(Maxim) just confirmed the patch is fine on his end.

> 
> Even dos2unix failed to convert the last line.
> Ideas?
>          Jocke
> 
> -------- Forwarded Message --------
> From: Maxim Ostapenko <[email protected]>
> To: GCC Patches <[email protected]>
> Cc: [email protected], Yury Gribov <[email protected]>
> Subject: [PATCH][4.9] Backport fix for PR sanitizer/64820.
> Date: Wed, 18 Nov 2015 12:28:13 +0300
> 
> Hi,
> 
> this small patch fixes the logic in ASan vs SSP interaction to provide 
> correct "size" parameter to asan_stack_malloc_[N] routines. With current 
> logic, we would have assertion failure in libsanitizer in UAR mode on 
> 32-bit targets due to wrong granularity of resulting addr + size address.
> 
> Regtested via make check RUNTESTFLAGS="--target_board=unix'{-m32,-m64}' 
> -j12 on x86_64-unknown-linux-gnu and bootstrapped on 
> x86_64-unknown-linux-gnu.
> 
> Ok for gcc-4_9-branch?
> 
> -Maxim
_______________________________________________
evolution-list mailing list
[email protected]
To change your list options or unsubscribe, visit ...
https://mail.gnome.org/mailman/listinfo/evolution-list

Reply via email to