Conversation
Signed-off-by: sabi789 <sabithac6298@gmail.com>
🤖 Augment PR SummarySummary: Adds an environment override for how existing files are opened via Changes:
🤖 Was this summary useful? React with 👍 or 👎 |
| .B _ENCODE_FILE_NEW=BINARY | ||
|
|
||
| .TP | ||
| .B _ENCODE_FILE_NEW=UTF-8 |
There was a problem hiding this comment.
man/zoslib.1:26: This .TP starts a new term immediately after _ENCODE_FILE_NEW=BINARY, which leaves the BINARY option with no description and makes the “tagged as BINARY” paragraph apply to the UTF-8 entry instead.
Severity: medium
🤖 Was this useful? React with 👍 or 👎, or 🚀 if it prevented an incident/outage.
| } | ||
| // Enable auto-conversion of untagged files | ||
| else if (S_ISREG(sb.st_mode)) { | ||
| __tag_existing_file(fd); |
There was a problem hiding this comment.
src/zos-io.cc:894: The return value from __tag_existing_file(fd) is ignored and errno is reset unconditionally, so failures (e.g., invalid _ENCODE_FILE_EXISTING or a failing tag operation) can be silently dropped while still returning a usable fd.
Severity: medium
Other Locations
src/zos-io.cc:939
🤖 Was this useful? React with 👍 or 👎, or 🚀 if it prevented an incident/outage.
| write(fd, buff, sizeof(buff)); | ||
| close(fd); | ||
|
|
||
| fd = open(temp_path, O_RDONLY); |
There was a problem hiding this comment.
test/test-clib-override.cc:191: This fd isn’t closed before remove(temp_path) and reassigning fd, which can leak a descriptor and make the subsequent remove() behavior platform-dependent. It also means the final close(fd) later in the test may double-close or close the wrong descriptor.
Severity: medium
🤖 Was this useful? React with 👍 or 👎, or 🚀 if it prevented an incident/outage.
No description provided.