xref: /llvm-project/compiler-rt/test/sanitizer_common/TestCases/Linux/soft_rss_limit_mb_test.cpp (revision 086ee762cb95f7a629ba43110cf1945020cdce9b)
1 // Check soft_rss_limit_mb. Not all sanitizers implement it yet.
2 // RUN: %clangxx -O2 %s -o %t
3 //
4 // Run with limit should fail:
5 // RUN: %env_tool_opts=soft_rss_limit_mb=220:quarantine_size=1:allocator_may_return_null=1     %run %t 2>&1 | FileCheck %s -check-prefix=CHECK_MAY_RETURN_1
6 // RUN: %env_tool_opts=soft_rss_limit_mb=220:quarantine_size=1:allocator_may_return_null=0 not %run %t 2>&1 | FileCheck %s -check-prefix=CHECK_MAY_RETURN_0 --implicit-check-not="returned null"
7 
8 // This run uses getrusage. We can only test getrusage when allocator_may_return_null=0
9 // because getrusage gives us max-rss, not current-rss.
10 // RUN: %env_tool_opts=soft_rss_limit_mb=220:quarantine_size=1:allocator_may_return_null=0:can_use_proc_maps_statm=0 not %run %t 2>&1 | FileCheck %s -check-prefix=CHECK_MAY_RETURN_0 --implicit-check-not="returned null"
11 // REQUIRES: stable-runtime
12 
13 // Ubsan does not intercept pthread_create.
14 // XFAIL: ubsan
15 
16 // THUMB starts background thead only for Asan.
17 // XFAIL: target=thumb{{.*}} && !asan
18 
19 // https://github.com/google/sanitizers/issues/981
20 // UNSUPPORTED: android-26
21 
22 // Symbolizer needs to allocated memory when reporting.
23 // UNSUPPORTED: internal_symbolizer
24 
25 #include <stdlib.h>
26 #include <stdio.h>
27 #include <string.h>
28 #include <unistd.h>
29 
30 static const int kMaxNumAllocs = 1 << 9;
31 static const int kAllocSize = 1 << 20;  // Large enough to go via mmap.
32 
33 static char *allocs[kMaxNumAllocs];
34 
35 int main() {
36   int num_allocs = kMaxNumAllocs / 16;
37   for (int i = 0; num_allocs <= kMaxNumAllocs; i++, num_allocs *= 2) {
38     fprintf(stderr, "[%d] allocating %d times\n", i, num_allocs);
39     int zero_results = 0;
40     for (int j = 0; j < num_allocs; j++) {
41       if ((j % (num_allocs / 8)) == 0) {
42         usleep(100000);
43         fprintf(stderr, "  [%d]\n", j);
44       }
45       allocs[j] = (char*)malloc(kAllocSize);
46       if (allocs[j])
47         memset(allocs[j], -1, kAllocSize);
48       else
49         zero_results++;
50     }
51     if (zero_results)
52       fprintf(stderr, "Some of the malloc calls returned null: %d\n",
53               zero_results);
54     if (zero_results != num_allocs)
55       fprintf(stderr, "Some of the malloc calls returned non-null: %d\n",
56               num_allocs - zero_results);
57     for (int j = 0; j < num_allocs; j++) {
58       free(allocs[j]);
59     }
60   }
61 }
62 
63 // CHECK_MAY_RETURN_1: allocating 32 times
64 // CHECK_MAY_RETURN_1: Some of the malloc calls returned non-null:
65 // CHECK_MAY_RETURN_1: allocating 256 times
66 // CHECK_MAY_RETURN_1: Some of the malloc calls returned non-null:
67 // CHECK_MAY_RETURN_1: allocating 512 times
68 // CHECK_MAY_RETURN_1: Some of the malloc calls returned null:
69 // CHECK_MAY_RETURN_1: Some of the malloc calls returned non-null:
70 
71 // CHECK_MAY_RETURN_0: allocating 32 times
72 // CHECK_MAY_RETURN_0: Some of the malloc calls returned non-null:
73 // CHECK_MAY_RETURN_0: {{SUMMARY: .*Sanitizer: rss-limit-exceeded}}
74