jvoisin
cff1d6d4b5
Add a test to prove that hardened_malloc handles too-large-to-be-true allocations
...
This pattern, used by https://github.com/kaist-hacking/HardsHeap ,
uncovered bugs in other memory allocators.
2021-12-28 19:47:05 -05:00
Thibaut Sautereau
76860c72e1
malloc_usable_size: clean abort on invalid region
...
It's the region pointer that can be NULL here, and p was checked at the
beginning of the function. Also fix the test accordingly.
2021-02-10 17:41:17 -05:00
rwarr627
7804e263e9
added tests for if malloc_object_size small allocations are free
2020-06-17 23:29:30 -04:00
rwarr627
195bc8c92a
added tests for malloc_object_size
...
LDFLAGS is on single line
2020-06-13 01:27:32 -04:00
rwarr627
0a3a726c93
added tests for malloc_usable_size
2020-04-29 18:06:15 -04:00
Daniel Micay
c75dcb9d9c
compare with negative integers to check signals
2020-04-11 15:26:24 -04:00
Daniel Micay
d757835d90
increase size for eight_byte_overflow_large test
...
This was not working as expected due to CONFIG_EXTENDED_SIZE_CLASSES
resulting in 128k being a slab allocation size class. The addition of
padding for the canary pushes it into the next size class, resulting in
this writing over size class rounding padding rather than this actually
being an overflow as intended.
2020-04-11 15:25:34 -04:00
rwarr627
6b987e644b
verifies the results of the simple-memory-corruption tests
2020-04-11 15:08:30 -04:00