GNU bug report logs - #17455
[PATCH] shred: fix overflow checking of command-line options

Previous Next

Package: coreutils;

Reported by: Paul Eggert <eggert <at> CS.UCLA.EDU>

Date: Sat, 10 May 2014 18:51:02 UTC

Severity: normal

Tags: patch

Done: Paul Eggert <eggert <at> cs.ucla.edu>

Bug is archived. No further changes may be made.

Full log


View this message in rfc822 format

From: Paul Eggert <eggert <at> cs.ucla.edu>
To: Jim Meyering <jim <at> meyering.net>
Cc: 17455 <at> debbugs.gnu.org
Subject: bug#17455: [PATCH] shred: fix overflow checking of command-line options
Date: Sat, 10 May 2014 13:05:45 -0700
Thanks for catching that!

I used signed because I was worried about offbeat hosts where 
UINTMAX_MAX < OFF_T_MAX, which I think POSIX allows, but I suppose I was 
going overboard.

There are still a few oddball hosts out there (I just the other day 
discovered that Unisys still ships POSIXish mainframes where UINTMAX_MAX 
== OFF_T_MAX, because off_t has 40 bits and uintmax_t has 39!) but 
nothing *that* weird as far as I know.




This bug report was last modified 11 years and 76 days ago.

Previous Next


GNU bug tracking system
Copyright (C) 1999 Darren O. Benham, 1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson.