Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 01 May 2026 02:59:23 +0000
From:      bugzilla-noreply@freebsd.org
To:        testing@FreeBSD.org
Subject:   [Bug 294881] test failures with FORTIFY_SOURCE=2
Message-ID:  <bug-294881-32464-Z8cROf8QVK@https.bugs.freebsd.org/bugzilla/>
In-Reply-To: <bug-294881-32464@https.bugs.freebsd.org/bugzilla/>

index | next in thread | previous in thread | raw e-mail

https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=294881

--- Comment #4 from commit-hook@FreeBSD.org ---
A commit in branch main references this bug:

URL:
https://cgit.FreeBSD.org/src/commit/?id=d98f4f0698ef0c5178882c544b4c38542d4780f0

commit d98f4f0698ef0c5178882c544b4c38542d4780f0
Author:     Kyle Evans <kevans@FreeBSD.org>
AuthorDate: 2026-05-01 02:57:51 +0000
Commit:     Kyle Evans <kevans@FreeBSD.org>
CommitDate: 2026-05-01 02:58:48 +0000

    ssp: fix our gets_s implementation under _FORTIFY_SOURCE

    Annex K specifies an interface for handling constraint violations from
    gets_s, but we previously broke this for some classes of get_s misuse.

    Provide a more nuanced version that tries to dodge errors that would
    trigger a constraint handler while still providing value.  Notably, we
    don't want to trigger a failure unless the passed-in length reasonably
    fits within an RSIZE_MAX, because gets_s will immediately call larger
    lengths bogus and fail.

    PR:             294881
    Reviewed by:    markj
    Differential Revision:  https://reviews.freebsd.org/D56734

 include/ssp/stdio.h | 30 +++++++++++++++++++++++++++++-
 1 file changed, 29 insertions(+), 1 deletion(-)

-- 
You are receiving this mail because:
You are the assignee for the bug.

home | help

Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-294881-32464-Z8cROf8QVK>