aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorH.J. Lu <hjl.tools@gmail.com>2021-03-27 09:06:39 -0700
committerH.J. Lu <hjl.tools@gmail.com>2022-01-27 16:31:39 -0800
commit1cbbc82c09b0ccd92c61f57592c70371887713b3 (patch)
tree90251f8f58174cc7d46f7f4dbd31cca1ed07027a
parent2449016af55e5d222f36cae8d4df281b6dd4f423 (diff)
downloadglibc-1cbbc82c09b0ccd92c61f57592c70371887713b3.tar
glibc-1cbbc82c09b0ccd92c61f57592c70371887713b3.tar.gz
glibc-1cbbc82c09b0ccd92c61f57592c70371887713b3.tar.bz2
glibc-1cbbc82c09b0ccd92c61f57592c70371887713b3.zip
test-strnlen.c: Check that strnlen won't go beyond the maximum length
Place strings ending at page boundary without the null byte. If an implementation goes beyond EXP_LEN, it will trigger the segfault. (cherry picked from commit cb882b21b63606aabd6e55afe23b42434d95f2ef)
-rw-r--r--string/test-strnlen.c30
1 files changed, 30 insertions, 0 deletions
diff --git a/string/test-strnlen.c b/string/test-strnlen.c
index f2aa41ddda..12fed880fa 100644
--- a/string/test-strnlen.c
+++ b/string/test-strnlen.c
@@ -198,6 +198,35 @@ do_page_tests (void)
}
}
+/* Tests meant to unveil fail on implementations that access bytes
+ beyond the maxium length. */
+
+static void
+do_page_2_tests (void)
+{
+ size_t i, exp_len, offset;
+ size_t last_offset = page_size / sizeof (CHAR);
+
+ CHAR *s = (CHAR *) buf2;
+ MEMSET (s, 65, last_offset);
+
+ /* Place short strings ending at page boundary without the null
+ byte. */
+ offset = last_offset;
+ for (i = 0; i < 128; i++)
+ {
+ /* Decrease offset to stress several sizes and alignments. */
+ offset--;
+ exp_len = last_offset - offset;
+ FOR_EACH_IMPL (impl, 0)
+ {
+ /* If an implementation goes beyond EXP_LEN, it will trigger
+ the segfault. */
+ do_one_test (impl, (CHAR *) (s + offset), exp_len, exp_len);
+ }
+ }
+}
+
int
test_main (void)
{
@@ -244,6 +273,7 @@ test_main (void)
do_random_tests ();
do_page_tests ();
+ do_page_2_tests ();
return ret;
}