abcc04a5bf
Upstream commit: 224d8c1890b6c57c7e4e8ddbb792dd9552086704 - debug: Synchronize feature guards in fortified functions [BZ #28746] - debug: Autogenerate _FORTIFY_SOURCE tests - Enable _FORTIFY_SOURCE=3 for gcc 12 and above - fortify: Fix spurious warning with realpath - __glibc_unsafe_len: Fix comment - debug: Add tests for _FORTIFY_SOURCE=3 - Make sure that the fortified function conditionals are constant - Don't add access size hints to fortifiable functions - nss: Protect against errno changes in function lookup (bug 28953) - nss: Do not mention NSS test modules in <gnu/lib-names.h> - io: Add fsync call in tst-stat - hppa: Fix warnings from _dl_lookup_address - nptl: Fix cleanups for stack grows up [BZ# 28899] - hppa: Revise gettext trampoline design - hppa: Fix swapcontext - Fix elf/tst-audit2 on hppa - localedef: Handle symbolic links when generating locale-archive - NEWS: Add a bug fix entry for BZ #28896 - x86: Fix TEST_NAME to make it a string in tst-strncmp-rtm.c - x86: Test wcscmp RTM in the wcsncmp overflow case [BZ #28896] - x86: Fallback {str|wcs}cmp RTM in the ncmp overflow case [BZ #28896] - string: Add a testcase for wcsncmp with SIZE_MAX [BZ #28755] - linux: fix accuracy of get_nprocs and get_nprocs_conf [BZ #28865] - Add reference to BZ#28860 on NEWS - linux: Fix missing __convert_scm_timestamps (BZ #28860)
25 lines
911 B
Diff
25 lines
911 B
Diff
commit 98ea9372cc8d60b12aa33e007fdd5f5fb042a651
|
|
Author: Siddhesh Poyarekar <siddhesh@sourceware.org>
|
|
Date: Thu Dec 16 07:19:14 2021 +0530
|
|
|
|
__glibc_unsafe_len: Fix comment
|
|
|
|
We know that the length is *unsafe*.
|
|
|
|
Signed-off-by: Siddhesh Poyarekar <siddhesh@sourceware.org>
|
|
(cherry picked from commit ae23fa3e5fe24daf94fc7f8e5268bb8ceeda7477)
|
|
|
|
diff --git a/misc/sys/cdefs.h b/misc/sys/cdefs.h
|
|
index 4825ff0351c1e5d4..3bb9f38916e30295 100644
|
|
--- a/misc/sys/cdefs.h
|
|
+++ b/misc/sys/cdefs.h
|
|
@@ -168,7 +168,7 @@
|
|
__s, __osz)) \
|
|
&& __glibc_safe_len_cond ((__SIZE_TYPE__) (__l), __s, __osz))
|
|
|
|
-/* Conversely, we know at compile time that the length is safe if the
|
|
+/* Conversely, we know at compile time that the length is unsafe if the
|
|
__L * __S <= __OBJSZ condition can be folded to a constant and if it is
|
|
false. */
|
|
#define __glibc_unsafe_len(__l, __s, __osz) \
|