cff1d6d4b5
Add a test to prove that hardened_malloc handles too-large-to-be-true allocations
...
This pattern, used by https://github.com/kaist-hacking/HardsHeap ,
uncovered bugs in other memory allocators.
2021-12-28 19:47:05 -05:00
76860c72e1
malloc_usable_size: clean abort on invalid region
...
It's the region pointer that can be NULL here, and p was checked at the
beginning of the function. Also fix the test accordingly.
2021-02-10 17:41:17 -05:00
7804e263e9
added tests for if malloc_object_size small allocations are free
2020-06-17 23:29:30 -04:00
195bc8c92a
added tests for malloc_object_size
...
LDFLAGS is on single line
2020-06-13 01:27:32 -04:00
0a3a726c93
added tests for malloc_usable_size
2020-04-29 18:06:15 -04:00
c75dcb9d9c
compare with negative integers to check signals
2020-04-11 15:26:24 -04:00
d757835d90
increase size for eight_byte_overflow_large test
...
This was not working as expected due to CONFIG_EXTENDED_SIZE_CLASSES
resulting in 128k being a slab allocation size class. The addition of
padding for the canary pushes it into the next size class, resulting in
this writing over size class rounding padding rather than this actually
being an overflow as intended.
2020-04-11 15:25:34 -04:00
6b987e644b
verifies the results of the simple-memory-corruption tests
2020-04-11 15:08:30 -04:00