File: recv_msg_trunc.cpp

package info (click to toggle)
llvm-toolchain-11 1%3A11.0.1-2~deb10u1
  • links: PTS, VCS
  • area: main
  • in suites: buster
  • size: 995,836 kB
  • sloc: cpp: 4,767,656; ansic: 760,916; asm: 477,436; python: 170,940; objc: 69,804; lisp: 29,914; sh: 23,855; f90: 18,173; pascal: 7,551; perl: 7,471; ml: 5,603; awk: 3,489; makefile: 2,573; xml: 915; cs: 573; fortran: 503; javascript: 452
file content (36 lines) | stat: -rw-r--r-- 958 bytes parent folder | download | duplicates (41)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
// Test that ASan doesn't raise false alarm when MSG_TRUNC is present.
//
// RUN: %clangxx %s -o %t && %run %t 2>&1
//
// UNSUPPORTED: android

#include <stdlib.h>
#include <string.h>
#include <sys/types.h>
#include <sys/socket.h>
#include <netinet/ip.h>
#include <assert.h>

int main() {
  int fd_0 = socket(AF_INET, SOCK_DGRAM, 0);
  int fd_1 = socket(AF_INET, SOCK_DGRAM, 0);
  struct sockaddr_in sin;
  socklen_t len = sizeof(sin);
  char *buf = (char *)malloc(1);

  sin.sin_family = AF_INET;
  // Choose a random port to bind.
  sin.sin_port = 0;
  sin.sin_addr.s_addr = INADDR_ANY;

  assert(bind(fd_1, (struct sockaddr *)&sin, sizeof(sin)) == 0);
  // Get the address and port binded.
  assert(getsockname(fd_1, (struct sockaddr *)&sin, &len) == 0);
  assert(sendto(fd_0, "hello", strlen("hello"), MSG_DONTWAIT,
                (struct sockaddr *)&sin, sizeof(sin)) != -1);
  assert(recv(fd_1, buf, 1, MSG_TRUNC) != -1);
  free(buf);

  return 0;
}