On Thu, 25 Sep 2014 06:03:07 -0400 (EDT)
Jan Stancek <jstan...@redhat.com> wrote:

> > --- a/testcases/kernel/syscalls/recvfrom/recvfrom01.c
> > +++ b/testcases/kernel/syscalls/recvfrom/recvfrom01.c
> > @@ -105,7 +105,7 @@
> >                 0, ENOTSOCK, setup1, cleanup1, "invalid socket buffer"},
> >  /* 4 */
> >     {
> > -   PF_INET, SOCK_STREAM, 0, (void *)buf, sizeof(buf), -1,
> > +   PF_INET, SOCK_STREAM, 0, (void *)buf, -1, 0,
> 
> I understand setting flags to 0, but why changing also buflen to -1?
> 

Because that was the original intent of that test -- to pass an invalid
buffer length. But whoever wrote the test put the -1 in the wrong
position. At least that's the way it looked to me.

------------------------------------------------------------------------------
Meet PCI DSS 3.0 Compliance Requirements with EventLog Analyzer
Achieve PCI DSS 3.0 Compliant Status with Out-of-the-box PCI DSS Reports
Are you Audit-Ready for PCI DSS 3.0 Compliance? Download White paper
Comply to PCI DSS 3.0 Requirement 10 and 11.5 with EventLog Analyzer
http://pubads.g.doubleclick.net/gampad/clk?id=154622311&iu=/4140/ostg.clktrk
_______________________________________________
Ltp-list mailing list
Ltp-list@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/ltp-list

Reply via email to