This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug string/22603] ia64 memchr overflows internal pointer check
- From: "joseph at codesourcery dot com" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Thu, 14 Dec 2017 14:20:57 +0000
- Subject: [Bug string/22603] ia64 memchr overflows internal pointer check
- Auto-submitted: auto-generated
- References: <bug-22603-131@http.sourceware.org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=22603
--- Comment #2 from joseph at codesourcery dot com <joseph at codesourcery dot com> ---
It's not invalid to pass such a size if you know the character is there -
C11 says "The implementation shall behave as if it reads the characters
sequentially and stops as soon as a matching character is found." - but
it's certainly unusual for code to use such sizes.
--
You are receiving this mail because:
You are on the CC list for the bug.