From aeef1f7f6d8f6d4e84ffc9a24874f10403e4ddcd Mon Sep 17 00:00:00 2001 From: Bram Moolenaar Date: Thu, 15 Sep 2022 12:20:18 +0100 Subject: [PATCH] patch 9.0.0468: exectution stack underflow without the +eval feature MIME-Version: 1.0 Content-Type: text/plain; charset=utf8 Content-Transfer-Encoding: 8bit Problem: Exectution stack underflow without the +eval feature. (Dominique Pellé) Solution: Add to execution stack without FEAT_EVAL. (closes #11135) --- src/scriptfile.c | 3 +++ src/version.c | 2 ++ 2 files changed, 5 insertions(+) diff --git a/src/scriptfile.c b/src/scriptfile.c index 34683262a..bdb792236 100644 --- a/src/scriptfile.c +++ b/src/scriptfile.c @@ -1639,6 +1639,9 @@ do_source_ext( } } # endif +#else + // Keep the sourcing name/lnum, for recursive calls. + estack_push(ETYPE_SCRIPT, fname_exp, 0); #endif cookie.conv.vc_type = CONV_NONE; // no conversion diff --git a/src/version.c b/src/version.c index 643195792..82a21df03 100644 --- a/src/version.c +++ b/src/version.c @@ -703,6 +703,8 @@ static char *(features[]) = static int included_patches[] = { /* Add new patch number below this line */ +/**/ + 468, /**/ 467, /**/ -- 2.40.0