1 // RUN: %clangxx_hwasan -O0 %s -o %t
2 // RUN: %env_hwasan_opts=allocator_may_return_null=0 not %run %t m1 2>&1 | FileCheck %s
3 // RUN: %env_hwasan_opts=allocator_may_return_null=1 %run %t m1 2>&1 | FileCheck %s --check-prefix=CHECK-NULL
4 // RUN: %env_hwasan_opts=allocator_may_return_null=0 not %run %t psm1 2>&1 | FileCheck %s
5 // RUN: %env_hwasan_opts=allocator_may_return_null=1 %run %t psm1 2>&1 | FileCheck %s --check-prefix=CHECK-NULL
7 // UNSUPPORTED: android
9 // Checks that pvalloc overflows are caught. If the allocator is allowed to
10 // return null, the errno should be set to ENOMEM.
19 int main(int argc
, char *argv
[]) {
21 const char *action
= argv
[1];
23 const size_t page_size
= sysconf(_SC_PAGESIZE
);
26 if (!strcmp(action
, "m1")) {
27 p
= pvalloc((uintptr_t)-1);
28 } else if (!strcmp(action
, "psm1")) {
29 p
= pvalloc((uintptr_t)-(page_size
- 1));
34 fprintf(stderr
, "errno: %d\n", errno
);
39 // CHECK: {{ERROR: HWAddressSanitizer: pvalloc parameters overflow: size .* rounded up to system page size .* cannot be represented in type size_t}}
40 // CHECK: {{#0 0x.* in .*pvalloc}}
41 // CHECK: {{#1 0x.* in main .*pvalloc-overflow.cpp:}}
42 // CHECK: SUMMARY: HWAddressSanitizer: pvalloc-overflow {{.*}} in main
44 // CHECK-NULL: errno: 12