]> granicus.if.org Git - python/commitdiff
Backout ab500b297900: the check for integer overflow is wrong
authorVictor Stinner <victor.stinner@gmail.com>
Mon, 7 May 2012 21:50:05 +0000 (23:50 +0200)
committerVictor Stinner <victor.stinner@gmail.com>
Mon, 7 May 2012 21:50:05 +0000 (23:50 +0200)
Issue #14716: Change integer overflow check in unicode_writer_prepare()
to compute the limit at compile time instead of runtime. Patch writen by Serhiy
Storchaka.

Objects/unicodeobject.c

index 4bbaa35891112554de57d475a7620d3c713ac588..0722312373d6394a35313bebe6f9b99c62937b0f 100644 (file)
@@ -13242,10 +13242,8 @@ unicode_writer_prepare(unicode_writer_t *writer,
     newlen = writer->pos + length;
 
     if (newlen > PyUnicode_GET_LENGTH(writer->buffer)) {
-        /* Overallocate 25% to limit the number of resize.
-           Check for integer overflow:
-           (newlen + newlen / 4) <= PY_SSIZE_T_MAX */
-        if (newlen <= (PY_SSIZE_T_MAX - PY_SSIZE_T_MAX / 5))
+        /* overallocate 25% to limit the number of resize */
+        if (newlen <= (PY_SSIZE_T_MAX - newlen / 4))
             newlen += newlen / 4;
 
         if (maxchar > writer->maxchar) {