public inbox for glibc-bugs@sourceware.org
help / color / mirror / Atom feed
* [Bug stdio/28949] New: String streams do not handle flush-only overflow correctly
@ 2022-03-08 10:36 fweimer at redhat dot com
  2022-05-23  9:08 ` [Bug stdio/28949] " cvs-commit at gcc dot gnu.org
  0 siblings, 1 reply; 2+ messages in thread
From: fweimer at redhat dot com @ 2022-03-08 10:36 UTC (permalink / raw)
  To: glibc-bugs

https://sourceware.org/bugzilla/show_bug.cgi?id=28949

            Bug ID: 28949
           Summary: String streams do not handle flush-only overflow
                    correctly
           Product: glibc
           Version: unspecified
            Status: NEW
          Severity: normal
          Priority: P2
         Component: stdio
          Assignee: unassigned at sourceware dot org
          Reporter: fweimer at redhat dot com
  Target Milestone: ---

_IO_sstr_overflow (fp, EOF) and _IO_wstr_overflow (fp, WEOF) always return EOF
and WEOF, even if the call was successful. This means that the caller has no
way of checking for failure.

-- 
You are receiving this mail because:
You are on the CC list for the bug.

^ permalink raw reply	[flat|nested] 2+ messages in thread

* [Bug stdio/28949] String streams do not handle flush-only overflow correctly
  2022-03-08 10:36 [Bug stdio/28949] New: String streams do not handle flush-only overflow correctly fweimer at redhat dot com
@ 2022-05-23  9:08 ` cvs-commit at gcc dot gnu.org
  0 siblings, 0 replies; 2+ messages in thread
From: cvs-commit at gcc dot gnu.org @ 2022-05-23  9:08 UTC (permalink / raw)
  To: glibc-bugs

https://sourceware.org/bugzilla/show_bug.cgi?id=28949

--- Comment #1 from cvs-commit at gcc dot gnu.org <cvs-commit at gcc dot gnu.org> ---
The master branch has been updated by Florian Weimer <fw@sourceware.org>:

https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=0060a6de5493aeb4af457511e9b9ab532a6930a5

commit 0060a6de5493aeb4af457511e9b9ab532a6930a5
Author: Florian Weimer <fweimer@redhat.com>
Date:   Mon May 23 10:08:18 2022 +0200

    stdio-common: Add tst-memstream-string for open_memstream overflow

    This code path is exercised indirectly by some of the DNS stub
    resolver tests, via their own use of xopen_memstream for constructing
    strings describing result data.  The relative lack of test suite
    coverage became apparent when these tests starting failing after a
    printf changes uncovered bug 28949.

    Reviewed-by: Adhemerval Zanella  <adhemerval.zanella@linaro.org>

-- 
You are receiving this mail because:
You are on the CC list for the bug.

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2022-05-23  9:08 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-03-08 10:36 [Bug stdio/28949] New: String streams do not handle flush-only overflow correctly fweimer at redhat dot com
2022-05-23  9:08 ` [Bug stdio/28949] " cvs-commit at gcc dot gnu.org

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).