On Tue, 2015-12-08 at 13:28 +0100, an unknown sender wrote: > The patch in the attachment is CR/NL damaged, even when saved to file. > I doubt upstream sent it that way, more likely evo(3.18.2) did that.
Upstream(Maxim) just confirmed the patch is fine on his end. > > Even dos2unix failed to convert the last line. > Ideas? > Jocke > > -------- Forwarded Message -------- > From: Maxim Ostapenko <[email protected]> > To: GCC Patches <[email protected]> > Cc: [email protected], Yury Gribov <[email protected]> > Subject: [PATCH][4.9] Backport fix for PR sanitizer/64820. > Date: Wed, 18 Nov 2015 12:28:13 +0300 > > Hi, > > this small patch fixes the logic in ASan vs SSP interaction to provide > correct "size" parameter to asan_stack_malloc_[N] routines. With current > logic, we would have assertion failure in libsanitizer in UAR mode on > 32-bit targets due to wrong granularity of resulting addr + size address. > > Regtested via make check RUNTESTFLAGS="--target_board=unix'{-m32,-m64}' > -j12 on x86_64-unknown-linux-gnu and bootstrapped on > x86_64-unknown-linux-gnu. > > Ok for gcc-4_9-branch? > > -Maxim _______________________________________________ evolution-list mailing list [email protected] To change your list options or unsubscribe, visit ... https://mail.gnome.org/mailman/listinfo/evolution-list
