diff options
author | H.J. Lu <hjl.tools@gmail.com> | 2021-03-27 09:06:39 -0700 |
---|---|---|
committer | H.J. Lu <hjl.tools@gmail.com> | 2022-01-27 16:31:39 -0800 |
commit | 1cbbc82c09b0ccd92c61f57592c70371887713b3 (patch) | |
tree | 90251f8f58174cc7d46f7f4dbd31cca1ed07027a | |
parent | 2449016af55e5d222f36cae8d4df281b6dd4f423 (diff) | |
download | glibc-1cbbc82c09b0ccd92c61f57592c70371887713b3.tar.gz glibc-1cbbc82c09b0ccd92c61f57592c70371887713b3.tar.xz glibc-1cbbc82c09b0ccd92c61f57592c70371887713b3.zip |
test-strnlen.c: Check that strnlen won't go beyond the maximum length
Place strings ending at page boundary without the null byte. If an implementation goes beyond EXP_LEN, it will trigger the segfault. (cherry picked from commit cb882b21b63606aabd6e55afe23b42434d95f2ef)
-rw-r--r-- | string/test-strnlen.c | 30 |
1 files changed, 30 insertions, 0 deletions
diff --git a/string/test-strnlen.c b/string/test-strnlen.c index f2aa41ddda..12fed880fa 100644 --- a/string/test-strnlen.c +++ b/string/test-strnlen.c @@ -198,6 +198,35 @@ do_page_tests (void) } } +/* Tests meant to unveil fail on implementations that access bytes + beyond the maxium length. */ + +static void +do_page_2_tests (void) +{ + size_t i, exp_len, offset; + size_t last_offset = page_size / sizeof (CHAR); + + CHAR *s = (CHAR *) buf2; + MEMSET (s, 65, last_offset); + + /* Place short strings ending at page boundary without the null + byte. */ + offset = last_offset; + for (i = 0; i < 128; i++) + { + /* Decrease offset to stress several sizes and alignments. */ + offset--; + exp_len = last_offset - offset; + FOR_EACH_IMPL (impl, 0) + { + /* If an implementation goes beyond EXP_LEN, it will trigger + the segfault. */ + do_one_test (impl, (CHAR *) (s + offset), exp_len, exp_len); + } + } +} + int test_main (void) { @@ -244,6 +273,7 @@ test_main (void) do_random_tests (); do_page_tests (); + do_page_2_tests (); return ret; } |