Date: Sat, 14 Mar 2026 09:30:37 +0000 From: bugzilla-noreply@freebsd.org To: riscv@FreeBSD.org Subject: [Bug 293353] No overflow handling in the strnlen function Message-ID: <bug-293353-40250-ZaC59Jv53K@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-293353-40250@https.bugs.freebsd.org/bugzilla/>
index | next in thread | previous in thread | raw e-mail
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=293353 --- Comment #5 from commit-hook@FreeBSD.org --- A commit in branch stable/15 references this bug: URL: https://cgit.FreeBSD.org/src/commit/?id=521519f72d599622a79ed79f93c4f4b208089174 commit 521519f72d599622a79ed79f93c4f4b208089174 Author: Robert Clausecker <fuz@FreeBSD.org> AuthorDate: 2026-03-07 23:14:25 +0000 Commit: Robert Clausecker <fuz@FreeBSD.org> CommitDate: 2026-03-14 09:29:22 +0000 depend-cleanup.sh: rebuild strnlen.o on riscv64 if it came from strnlen.S We have to switch back to the previous rule once the temporary build fix has been replaced with a permanent fix. MFC after: 1 week See also: 2a4e3112c811b9892e14e15cfd23538e7e47329c PR: 293353, 293296 (cherry picked from commit b5514e1c6d9e7ec09b299a983d1ce32852e0d9dc) tools/build/depend-cleanup.sh | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) -- You are receiving this mail because: You are the assignee for the bug.home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-293353-40250-ZaC59Jv53K>
