From owner-freebsd-hackers Tue Feb 6 02:29:25 1996 Return-Path: owner-hackers Received: (from root@localhost) by freefall.freebsd.org (8.7.3/8.7.3) id CAA14251 for hackers-outgoing; Tue, 6 Feb 1996 02:29:25 -0800 (PST) Received: from tfs.com (tfs.com [140.145.250.1]) by freefall.freebsd.org (8.7.3/8.7.3) with SMTP id CAA14246 for ; Tue, 6 Feb 1996 02:29:23 -0800 (PST) Received: from critter.tfs.com by tfs.com (smail3.1.28.1) with SMTP id m0tjkeG-0003vqC; Tue, 6 Feb 96 02:29 PST Received: from localhost.tfs.com (localhost.tfs.com [127.0.0.1]) by critter.tfs.com (8.6.12/8.6.12) with SMTP id KAA00881; Tue, 6 Feb 1996 10:28:07 +0100 X-Authentication-Warning: critter.tfs.com: Host localhost.tfs.com didn't use HELO protocol To: "Christoph P. Kukulies" cc: freebsd-hackers@freefall.FreeBSD.org Subject: Re: does phkmalloc check bounds? In-reply-to: Your message of "Tue, 06 Feb 1996 10:43:08 +0100." <199602060943.KAA17404@gilberto.physik.rwth-aachen.de> Date: Tue, 06 Feb 1996 10:28:06 +0100 Message-ID: <879.823598886@critter.tfs.com> From: Poul-Henning Kamp Sender: owner-hackers@FreeBSD.ORG Precedence: bulk > > Without having looked at phkmalloc - where is it hidden in the > source tree BTW - I wonder if it does bounds checking, that is src/lib/libc/stdlib/malloc.c > allocate a bit more on every malloc, initialize the extra bytes > with a magic pattern and see if it is invalidated next time > an alloc routine is entered. No presently not. If you want to add this, make it an option you enable with the MALLOC_OPTIONS, and we can merge it into the mainline code... -- Poul-Henning Kamp | phk@FreeBSD.ORG FreeBSD Core-team. http://www.freebsd.org/~phk | phk@login.dknet.dk Private mailbox. whois: [PHK] | phk@ref.tfs.com TRW Financial Systems, Inc. Future will arrive by its own means, progress not so.