Changeset 229125 in webkit
- Timestamp:
- Feb 28, 2018 11:35:30 PM (6 years ago)
- Location:
- trunk/Source/JavaScriptCore
- Files:
-
- 3 edited
Legend:
- Unmodified
- Added
- Removed
-
trunk/Source/JavaScriptCore/ChangeLog
r229109 r229125 1 2018-02-28 Dominik Infuehr <dinfuehr@igalia.com> 2 3 [ARM] Fix compile error in debug builds by invoking unpoisoned(). 4 5 Reviewed by Mark Lam. 6 7 * assembler/MacroAssemblerCodeRef.h: 8 (JSC::MacroAssemblerCodePtr::MacroAssemblerCodePtr): Fix compile error. 9 (JSC::MacroAssemblerCodePtr::createFromExecutableAddress()): Ditto. 10 (JSC::MacroAssemblerCodePtr::dataLocation()): Ditto. 11 * yarr/YarrInterpreter.cpp: 12 (JSC::Yarr::ByteCompiler::dumpDisjunction): use %zu for printf'ing size_t. 13 1 14 2018-02-28 JF Bastien <jfbastien@apple.com> 2 15 -
trunk/Source/JavaScriptCore/assembler/MacroAssemblerCodeRef.h
r226940 r229125 291 291 m_value.assertIsPoisoned(); 292 292 ASSERT(value); 293 ASSERT_VALID_CODE_POINTER(m_value );293 ASSERT_VALID_CODE_POINTER(m_value.unpoisoned()); 294 294 } 295 295 … … 311 311 ASSERT(ra.value()); 312 312 m_value.assertIsPoisoned(); 313 ASSERT_VALID_CODE_POINTER(m_value );313 ASSERT_VALID_CODE_POINTER(m_value.unpoisoned()); 314 314 } 315 315 … … 328 328 { 329 329 m_value.assertIsPoisoned(); 330 ASSERT_VALID_CODE_POINTER(m_value );330 ASSERT_VALID_CODE_POINTER(m_value.unpoisoned()); 331 331 return bitwise_cast<T>(m_value ? m_value.unpoisoned<char*>() - 1 : nullptr); 332 332 } -
trunk/Source/JavaScriptCore/yarr/YarrInterpreter.cpp
r225930 r229125 2126 2126 for (unsigned nestingDepth = 0; nestingDepth < termIndexNest; nestingDepth++) 2127 2127 out.print(" "); 2128 out.printf("%4 lu", index);2128 out.printf("%4zu", index); 2129 2129 for (unsigned nestingDepth = 0; nestingDepth < termNesting; nestingDepth++) 2130 2130 out.print(" ");
Note: See TracChangeset
for help on using the changeset viewer.