diff options
author | Noah Goldstein <goldstein.w.n@gmail.com> | 2021-06-09 16:17:14 -0400 |
---|---|---|
committer | Noah Goldstein <goldstein.w.n@gmail.com> | 2021-06-23 14:13:00 -0400 |
commit | da5a6fba0febbfc90896ce1b2eb75c6d8a88a72d (patch) | |
tree | b0b24fa0d148725804d45f3204c985243d38d526 /sysdeps/x86_64/memchr.S | |
parent | 6f573a27b6c8b4236445810a44660612323f5a73 (diff) | |
download | glibc-da5a6fba0febbfc90896ce1b2eb75c6d8a88a72d.zip glibc-da5a6fba0febbfc90896ce1b2eb75c6d8a88a72d.tar.gz glibc-da5a6fba0febbfc90896ce1b2eb75c6d8a88a72d.tar.bz2 |
String: Add overflow tests for strnlen, memchr, and strncat [BZ #27974]
This commit adds tests for a bug in the wide char variant of the
functions where the implementation may assume that maxlen for wcsnlen
or n for wmemchr/strncat will not overflow when multiplied by
sizeof(wchar_t).
These tests show the following implementations failing on x86_64:
wcsnlen-sse4_1
wcsnlen-avx2
wmemchr-sse2
wmemchr-avx2
strncat would fail as well if it where on a system that prefered
either of the wcsnlen implementations that failed as it relies on
wcsnlen.
Signed-off-by: Noah Goldstein <goldstein.w.n@gmail.com>
Reviewed-by: H.J. Lu <hjl.tools@gmail.com>
Diffstat (limited to 'sysdeps/x86_64/memchr.S')
0 files changed, 0 insertions, 0 deletions