1 | // RUN: %clangxx_hwasan -O0 %s -o %t |
2 | // RUN: %env_hwasan_opts=allocator_may_return_null=0 not %run %t m1 2>&1 | FileCheck %s |
3 | // RUN: %env_hwasan_opts=allocator_may_return_null=1 %run %t m1 2>&1 | FileCheck %s --check-prefix=CHECK-NULL |
4 | // RUN: %env_hwasan_opts=allocator_may_return_null=0 not %run %t psm1 2>&1 | FileCheck %s |
5 | // RUN: %env_hwasan_opts=allocator_may_return_null=1 %run %t psm1 2>&1 | FileCheck %s --check-prefix=CHECK-NULL |
6 | |
7 | // UNSUPPORTED: android |
8 | |
9 | // Checks that pvalloc overflows are caught. If the allocator is allowed to |
10 | // return null, the errno should be set to ENOMEM. |
11 | |
12 | #include <assert.h> |
13 | #include <errno.h> |
14 | #include <malloc.h> |
15 | #include <stdint.h> |
16 | #include <string.h> |
17 | #include <unistd.h> |
18 | |
19 | int main(int argc, char *argv[]) { |
20 | assert(argc == 2); |
21 | const char *action = argv[1]; |
22 | |
23 | const size_t page_size = sysconf(_SC_PAGESIZE); |
24 | |
25 | void *p = nullptr; |
26 | if (!strcmp(s1: action, s2: "m1" )) { |
27 | p = pvalloc(size: (uintptr_t)-1); |
28 | } else if (!strcmp(s1: action, s2: "psm1" )) { |
29 | p = pvalloc(size: (uintptr_t)-(page_size - 1)); |
30 | } else { |
31 | assert(0); |
32 | } |
33 | |
34 | fprintf(stderr, format: "errno: %d\n" , errno); |
35 | |
36 | return p != nullptr; |
37 | } |
38 | |
39 | // CHECK: {{ERROR: HWAddressSanitizer: pvalloc parameters overflow: size .* rounded up to system page size .* cannot be represented in type size_t}} |
40 | // CHECK: {{#0 0x.* in .*pvalloc}} |
41 | // CHECK: {{#1 0x.* in main .*pvalloc-overflow.cpp:}} |
42 | // CHECK: SUMMARY: HWAddressSanitizer: pvalloc-overflow {{.*}} in main |
43 | |
44 | // CHECK-NULL: errno: 12 |
45 | |