Re: [PATCH] gengtype: do not skip char after escape sequnce

2022-06-16 Thread Martin Liška
On 6/1/22 17:14, Jeff Law via Gcc-patches wrote: > > > On 5/4/2022 1:14 PM, Martin Liška wrote: >> Right now, when a \$x escape sequence occures, the >> next character after $x is skipped, which is bogus. >> >> The code has very low coverage right now. >> >> Patch can bootstrap on

Re: [PATCH] gengtype: do not skip char after escape sequnce

2022-06-01 Thread Jeff Law via Gcc-patches
On 5/4/2022 1:14 PM, Martin Liška wrote: Right now, when a \$x escape sequence occures, the next character after $x is skipped, which is bogus. The code has very low coverage right now. Patch can bootstrap on x86_64-linux-gnu and survives regression tests. Ready to be installed? Thanks,

Re: [PATCH] gengtype: do not skip char after escape sequnce

2022-05-24 Thread Martin Liška
PING^1 On 5/5/22 09:55, Martin Liška wrote: > On 5/4/22 21:38, Iain Sandoe wrote: >> >> >>> On 4 May 2022, at 20:14, Martin Liška wrote: >>> >>> Right now, when a \$x escape sequence occures, the >>> next character after $x is skipped, which is bogus. >>> >>> The code has very low coverage right

Re: [PATCH] gengtype: do not skip char after escape sequnce

2022-05-05 Thread Martin Liška
On 5/4/22 21:38, Iain Sandoe wrote: > > >> On 4 May 2022, at 20:14, Martin Liška wrote: >> >> Right now, when a \$x escape sequence occures, the >> next character after $x is skipped, which is bogus. >> >> The code has very low coverage right now. >> >> Patch can bootstrap on x86_64-linux-gnu

Re: [PATCH] gengtype: do not skip char after escape sequnce

2022-05-04 Thread Iain Sandoe
> On 4 May 2022, at 20:14, Martin Liška wrote: > > Right now, when a \$x escape sequence occures, the > next character after $x is skipped, which is bogus. > > The code has very low coverage right now. > > Patch can bootstrap on x86_64-linux-gnu and survives regression tests. > > Ready to

[PATCH] gengtype: do not skip char after escape sequnce

2022-05-04 Thread Martin Liška
Right now, when a \$x escape sequence occures, the next character after $x is skipped, which is bogus. The code has very low coverage right now. Patch can bootstrap on x86_64-linux-gnu and survives regression tests. Ready to be installed? Thanks, Martin gcc/ChangeLog: *