Skip site navigation (1)Skip section navigation (2)
Date:      Sat, 14 Mar 2026 09:30:37 +0000
From:      bugzilla-noreply@freebsd.org
To:        riscv@FreeBSD.org
Subject:   [Bug 293353] No overflow handling in the strnlen function
Message-ID:  <bug-293353-40250-ZaC59Jv53K@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-293353-40250@https.bugs.freebsd.org/bugzilla/>

index | next in thread | previous in thread | raw e-mail

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=293353

--- Comment #5 from commit-hook@FreeBSD.org ---
A commit in branch stable/15 references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=521519f72d599622a79ed79f93c4f4b208089174

commit 521519f72d599622a79ed79f93c4f4b208089174
Author:     Robert Clausecker <fuz@FreeBSD.org>
AuthorDate: 2026-03-07 23:14:25 +0000
Commit:     Robert Clausecker <fuz@FreeBSD.org>
CommitDate: 2026-03-14 09:29:22 +0000

    depend-cleanup.sh: rebuild strnlen.o on riscv64 if it came from strnlen.S

    We have to switch back to the previous rule once the temporary
    build fix has been replaced with a permanent fix.

    MFC after:      1 week
    See also:       2a4e3112c811b9892e14e15cfd23538e7e47329c
    PR:             293353, 293296

    (cherry picked from commit b5514e1c6d9e7ec09b299a983d1ce32852e0d9dc)

 tools/build/depend-cleanup.sh | 5 ++++-
 1 file changed, 4 insertions(+), 1 deletion(-)

-- 
You are receiving this mail because:
You are the assignee for the bug.

home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-293353-40250-ZaC59Jv53K>