diff options
author | netchild <netchild@FreeBSD.org> | 2003-10-30 22:09:29 +0800 |
---|---|---|
committer | netchild <netchild@FreeBSD.org> | 2003-10-30 22:09:29 +0800 |
commit | 2bcbbce6d74162ac7604ef07830f651aedbf2d14 (patch) | |
tree | 6c1f10264d745694ddc11925829abaee208fff2f /security/nmap | |
parent | a5790d51692a908255bcdb5e6c163ea8ffe3f7b6 (diff) | |
download | freebsd-ports-gnome-2bcbbce6d74162ac7604ef07830f651aedbf2d14.tar.gz freebsd-ports-gnome-2bcbbce6d74162ac7604ef07830f651aedbf2d14.tar.zst freebsd-ports-gnome-2bcbbce6d74162ac7604ef07830f651aedbf2d14.zip |
From the submitter:
---snip---
The security/nmap port (currently at 3.48, but previous versions also
had this problem) triggers a bug in GCC 3.3.1 on FreeBSD/sparc64 which
causes the compilation of the port to fail.
The GCC bug itself is know and AFAIK Thomas Moestl (tmm@freebsd.org)
tried to get a fix for it in upstream GCC. However, I didn't see an
entry in the release notes of GCC 3.3.2 that would suggest that it has
been fixed there.
Another port that has a workaround for this particular GCC bug is e.g.
x11/XFree86-4-libraries (files/patch-XRes.c).
---snip---
PR: 58698
Submitted by: Marius Strobl <marius@alchemy.franken.de>
Approved by: maintainer
Diffstat (limited to 'security/nmap')
-rw-r--r-- | security/nmap/files/patch-nsock::src::nsock_event.c | 13 |
1 files changed, 13 insertions, 0 deletions
diff --git a/security/nmap/files/patch-nsock::src::nsock_event.c b/security/nmap/files/patch-nsock::src::nsock_event.c new file mode 100644 index 000000000000..e2b50646b66d --- /dev/null +++ b/security/nmap/files/patch-nsock::src::nsock_event.c @@ -0,0 +1,13 @@ +--- nsock/src/nsock_event.c.orig Fri Oct 3 15:33:05 2003 ++++ nsock/src/nsock_event.c Fri Oct 3 15:32:31 2003 +@@ -242,8 +242,9 @@ + int type_code = (int) type; + unsigned long serial = ms->next_event_serial++; + unsigned long max_serial_allowed; +- int shiftbits = sizeof(nsock_event_id) * 8 - TYPE_CODE_NUM_BITS; ++ int shiftbits; + assert(type <= 3); ++ shiftbits = sizeof(nsock_event_id) * 8 - TYPE_CODE_NUM_BITS; + + max_serial_allowed = ( 1 << shiftbits ) - 1; + if (serial == max_serial_allowed ) { |