This is the mail archive of the glibc-bugs@sourceware.org mailing list for the glibc project.


Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]
Other format: [Raw text]

[Bug string/22603] ia64 memchr overflows internal pointer check


https://sourceware.org/bugzilla/show_bug.cgi?id=22603

--- Comment #2 from joseph at codesourcery dot com <joseph at codesourcery dot com> ---
It's not invalid to pass such a size if you know the character is there - 
C11 says "The implementation shall behave as if it reads the characters 
sequentially and stops as soon as a matching character is found." - but 
it's certainly unusual for code to use such sizes.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

Index Nav: [Date Index] [Subject Index] [Author Index] [Thread Index]
Message Nav: [Date Prev] [Date Next] [Thread Prev] [Thread Next]