This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug libc/14547] strcoll integer / buffer overflow
- From: "mancha1 at hush dot com" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sourceware dot org
- Date: Fri, 25 Oct 2013 15:03:25 +0000
- Subject: [Bug libc/14547] strcoll integer / buffer overflow
- Auto-submitted: auto-generated
- References: <bug-14547-131 at http dot sourceware dot org/bugzilla/>
https://sourceware.org/bugzilla/show_bug.cgi?id=14547
--- Comment #11 from mancha <mancha1 at hush dot com> ---
(In reply to Siddhesh Poyarekar from comment #10)
> It should finish a few minutes before forever :)
>
> The *_nocache code is O(n^3) (IIRC), so it's very very slow.
Hi. Thanks for your quick reply. With that kind of complexity I'll adopt your
heuristic: if no failure in 5 minutes, assume success.
> If you want to do a correctness test then I'd suggest commenting out the
> get_next_seq_cached paths so that get_next_seq_nocache is called all the
> time and then run your usual strcoll correctness tests.
Thanks for the suggestion, I'll force get_next_seq_nocache and run my strcoll
faithfulness tests.
--
You are receiving this mail because:
You are on the CC list for the bug.