aboutsummaryrefslogtreecommitdiffstats
path: root/security/nmap
diff options
context:
space:
mode:
authornetchild <netchild@FreeBSD.org>2003-10-30 22:09:29 +0800
committernetchild <netchild@FreeBSD.org>2003-10-30 22:09:29 +0800
commit2bcbbce6d74162ac7604ef07830f651aedbf2d14 (patch)
tree6c1f10264d745694ddc11925829abaee208fff2f /security/nmap
parenta5790d51692a908255bcdb5e6c163ea8ffe3f7b6 (diff)
downloadfreebsd-ports-gnome-2bcbbce6d74162ac7604ef07830f651aedbf2d14.tar.gz
freebsd-ports-gnome-2bcbbce6d74162ac7604ef07830f651aedbf2d14.tar.zst
freebsd-ports-gnome-2bcbbce6d74162ac7604ef07830f651aedbf2d14.zip
From the submitter:
---snip--- The security/nmap port (currently at 3.48, but previous versions also had this problem) triggers a bug in GCC 3.3.1 on FreeBSD/sparc64 which causes the compilation of the port to fail. The GCC bug itself is know and AFAIK Thomas Moestl (tmm@freebsd.org) tried to get a fix for it in upstream GCC. However, I didn't see an entry in the release notes of GCC 3.3.2 that would suggest that it has been fixed there. Another port that has a workaround for this particular GCC bug is e.g. x11/XFree86-4-libraries (files/patch-XRes.c). ---snip--- PR: 58698 Submitted by: Marius Strobl <marius@alchemy.franken.de> Approved by: maintainer
Diffstat (limited to 'security/nmap')
-rw-r--r--security/nmap/files/patch-nsock::src::nsock_event.c13
1 files changed, 13 insertions, 0 deletions
diff --git a/security/nmap/files/patch-nsock::src::nsock_event.c b/security/nmap/files/patch-nsock::src::nsock_event.c
new file mode 100644
index 000000000000..e2b50646b66d
--- /dev/null
+++ b/security/nmap/files/patch-nsock::src::nsock_event.c
@@ -0,0 +1,13 @@
+--- nsock/src/nsock_event.c.orig Fri Oct 3 15:33:05 2003
++++ nsock/src/nsock_event.c Fri Oct 3 15:32:31 2003
+@@ -242,8 +242,9 @@
+ int type_code = (int) type;
+ unsigned long serial = ms->next_event_serial++;
+ unsigned long max_serial_allowed;
+- int shiftbits = sizeof(nsock_event_id) * 8 - TYPE_CODE_NUM_BITS;
++ int shiftbits;
+ assert(type <= 3);
++ shiftbits = sizeof(nsock_event_id) * 8 - TYPE_CODE_NUM_BITS;
+
+ max_serial_allowed = ( 1 << shiftbits ) - 1;
+ if (serial == max_serial_allowed ) {