Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(18)

Side by Side Diff: base/security_unittest.cc

Issue 2722193002: Disable SecurityTest.NewOverflow under msan. (Closed)
Patch Set: Created 3 years, 9 months ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
« no previous file with comments | « no previous file | no next file » | no next file with comments »
Toggle Intra-line Diffs ('i') | Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
OLDNEW
1 // Copyright (c) 2013 The Chromium Authors. All rights reserved. 1 // Copyright (c) 2013 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be 2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file. 3 // found in the LICENSE file.
4 4
5 #include <fcntl.h> 5 #include <fcntl.h>
6 #include <stddef.h> 6 #include <stddef.h>
7 #include <stdio.h> 7 #include <stdio.h>
8 #include <stdlib.h> 8 #include <stdlib.h>
9 #include <string.h> 9 #include <string.h>
10 #include <sys/stat.h> 10 #include <sys/stat.h>
(...skipping 69 matching lines...) Expand 10 before | Expand all | Expand 10 after
80 printf("Platform has overflow: %s\n", 80 printf("Platform has overflow: %s\n",
81 !overflow_detected ? "yes." : "no."); 81 !overflow_detected ? "yes." : "no.");
82 #else 82 #else
83 // Otherwise, fail the test. (Note: EXPECT are ok in subfunctions, ASSERT 83 // Otherwise, fail the test. (Note: EXPECT are ok in subfunctions, ASSERT
84 // aren't). 84 // aren't).
85 EXPECT_TRUE(overflow_detected); 85 EXPECT_TRUE(overflow_detected);
86 #endif 86 #endif
87 } 87 }
88 } 88 }
89 89
90 #if defined(OS_IOS) || defined(ADDRESS_SANITIZER) || defined(THREAD_SANITIZER) 90 #if defined(OS_IOS) || defined(ADDRESS_SANITIZER) || \
91 defined(THREAD_SANITIZER) || defined(MEMORY_SANITIZER)
91 #define MAYBE_NewOverflow DISABLED_NewOverflow 92 #define MAYBE_NewOverflow DISABLED_NewOverflow
92 #else 93 #else
93 #define MAYBE_NewOverflow NewOverflow 94 #define MAYBE_NewOverflow NewOverflow
94 #endif 95 #endif
95 // Test array[TooBig][X] and array[X][TooBig] allocations for int overflows. 96 // Test array[TooBig][X] and array[X][TooBig] allocations for int overflows.
96 // IOS doesn't honor nothrow, so disable the test there. 97 // IOS doesn't honor nothrow, so disable the test there.
97 // Disabled under XSan because asan aborts when new returns nullptr, 98 // Disabled under XSan because asan aborts when new returns nullptr,
98 // https://bugs.chromium.org/p/chromium/issues/detail?id=690271#c15 99 // https://bugs.chromium.org/p/chromium/issues/detail?id=690271#c15
99 TEST(SecurityTest, MAYBE_NewOverflow) { 100 TEST(SecurityTest, MAYBE_NewOverflow) {
100 const size_t kArraySize = 4096; 101 const size_t kArraySize = 4096;
(...skipping 77 matching lines...) Expand 10 before | Expand all | Expand 10 after
178 // kRandomMask, so we use it as an additional detection mechanism. 179 // kRandomMask, so we use it as an additional detection mechanism.
179 const uintptr_t kRandomMask = 0x3fffffffffffULL; 180 const uintptr_t kRandomMask = 0x3fffffffffffULL;
180 bool impossible_random_address = 181 bool impossible_random_address =
181 reinterpret_cast<uintptr_t>(ptr.get()) & ~kRandomMask; 182 reinterpret_cast<uintptr_t>(ptr.get()) & ~kRandomMask;
182 EXPECT_FALSE(impossible_random_address); 183 EXPECT_FALSE(impossible_random_address);
183 } 184 }
184 185
185 #endif // defined(OS_LINUX) && defined(__x86_64__) 186 #endif // defined(OS_LINUX) && defined(__x86_64__)
186 187
187 } // namespace 188 } // namespace
OLDNEW
« no previous file with comments | « no previous file | no next file » | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698