This is the mail archive of the
gcc-patches@gcc.gnu.org
mailing list for the GCC project.
Re: Fix for PR70498 in Libiberty Demangler
- From: Bernd Schmidt <bschmidt at redhat dot com>
- To: Marcel BÃhme <boehme dot marcel at gmail dot com>
- Cc: Pedro Alves <palves at redhat dot com>, gcc-patches at gcc dot gnu dot org, Richard Biener <richard dot guenther at gmail dot com>
- Date: Mon, 4 Apr 2016 15:24:32 +0200
- Subject: Re: Fix for PR70498 in Libiberty Demangler
- Authentication-results: sourceware.org; auth=none
- References: <9B8E7D06-93A5-40C6-A1F8-599482DD9056 at gmail dot com> <56FEB2AD dot 3030304 at redhat dot com> <56FEB36F dot 3070906 at redhat dot com> <5C58DC48-8E92-4581-A1DC-1491A3DC7CEB at gmail dot com>
On 04/02/2016 11:49 AM, Marcel Böhme wrote:
Bootstrapped and regression tested on x86_64-pc-linux-gnu. Test cases
added + checked PR70498 is resolved.
Richard - any objections from an RM perspective to check in such
potentially security-related fixes now even if not regressions?
The patch now also accounts for overflows in d_compact_number which
is supposed to return -1 in case of negative numbers.
I take it this isn't for the normal 'n' case, but for instances where we
encounter overflows in d_number?
Bernd