From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 1207 invoked by alias); 23 Oct 2002 21:51:14 -0000 Mailing-List: contact libc-hacker-help@sources.redhat.com; run by ezmlm Precedence: bulk List-Subscribe: List-Archive: List-Post: List-Help: , Sender: libc-hacker-owner@sources.redhat.com Received: (qmail 1190 invoked from network); 23 Oct 2002 21:51:13 -0000 Received: from unknown (HELO gateway.sf.frob.com) (64.163.212.31) by sources.redhat.com with SMTP; 23 Oct 2002 21:51:13 -0000 Received: from magilla.sf.frob.com (magilla.sf.frob.com [198.49.250.228]) by gateway.sf.frob.com (Postfix) with ESMTP id 2BE01357E; Wed, 23 Oct 2002 14:51:13 -0700 (PDT) Received: (from roland@localhost) by magilla.sf.frob.com (8.11.6/8.11.6) id g9NLpCA28795; Wed, 23 Oct 2002 14:51:12 -0700 Date: Wed, 23 Oct 2002 16:58:00 -0000 Message-Id: <200210232151.g9NLpCA28795@magilla.sf.frob.com> From: Roland McGrath To: GNU libc hackers Subject: EOVERFLOW for ftell, ftello, fgetpos? X-shopping-list: (1) Iniquitous gloves (2) Conscientious automated redeemer geese (3) Problematic proteins (4) Sinuous split ammunition (5) Triumphant monogamous witch infestations X-SW-Source: 2002-10/txt/msg00094.txt.bz2 Aren't ftell, ftello, and fgetpos supposed to diagnose EOVERFLOW? (A program could fopen, fread pieces totalling >4GB, and then call ftell.) Right now these functions all just truncate the result of _IO_seekoff to 32 bits (and treat 4294967295 as an error). Unless someone tells me why I'm wrong about thinking this is a bug, I will fix them to detect overflow.