1 1.1 kamil # Copyright (c) 2018 The NetBSD Foundation, Inc. 2 1.1 kamil # All rights reserved. 3 1.1 kamil # 4 1.1 kamil # This code is derived from software contributed to The NetBSD Foundation 5 1.1 kamil # by Yang Zheng. 6 1.1 kamil # 7 1.1 kamil # Redistribution and use in source and binary forms, with or without 8 1.1 kamil # modification, are permitted provided that the following conditions 9 1.1 kamil # are met: 10 1.1 kamil # 1. Redistributions of source code must retain the above copyright 11 1.1 kamil # notice, this list of conditions and the following disclaimer. 12 1.1 kamil # 2. Redistributions in binary form must reproduce the above copyright 13 1.1 kamil # notice, this list of conditions and the following disclaimer in the 14 1.1 kamil # documentation and/or other materials provided with the distribution. 15 1.1 kamil # 16 1.1 kamil # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 17 1.1 kamil # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 18 1.1 kamil # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 19 1.1 kamil # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 20 1.1 kamil # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 21 1.1 kamil # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 22 1.1 kamil # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 23 1.1 kamil # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 24 1.1 kamil # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 25 1.1 kamil # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 26 1.1 kamil # POSSIBILITY OF SUCH DAMAGE. 27 1.1 kamil # 28 1.1 kamil 29 1.1 kamil test_target() 30 1.1 kamil { 31 1.1 kamil SUPPORT='n' 32 1.1 kamil if uname -m | grep -q "amd64" && command -v c++ >/dev/null 2>&1 && \ 33 1.1 kamil ! echo __clang__ | c++ -E - | grep -q __clang__; then 34 1.1 kamil # only clang with major version newer than 7 is supported 35 1.1 kamil CLANG_MAJOR=`echo __clang_major__ | c++ -E - | grep -o '^[[:digit:]]'` 36 1.1 kamil if [ "$CLANG_MAJOR" -ge "7" ]; then 37 1.1 kamil SUPPORT='y' 38 1.1 kamil fi 39 1.1 kamil fi 40 1.1 kamil } 41 1.1 kamil 42 1.1 kamil atf_test_case check_mem 43 1.1 kamil check_mem_head() { 44 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized interface" 45 1.1 kamil atf_set "require.progs" "c++ paxctl" 46 1.1 kamil } 47 1.1 kamil 48 1.1 kamil atf_test_case check_mem_profile 49 1.1 kamil check_mem_profile_head() { 50 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with profiling option" 51 1.1 kamil atf_set "require.progs" "c++ paxctl" 52 1.1 kamil } 53 1.1 kamil atf_test_case check_mem_pic 54 1.1 kamil check_mem_pic_head() { 55 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with position independent code (PIC) flag" 56 1.1 kamil atf_set "require.progs" "c++ paxctl" 57 1.1 kamil } 58 1.1 kamil atf_test_case check_mem_pie 59 1.1 kamil check_mem_pie_head() { 60 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with position independent execution (PIE) flag" 61 1.1 kamil atf_set "require.progs" "c++ paxctl" 62 1.1 kamil } 63 1.1 kamil 64 1.1 kamil check_mem_body(){ 65 1.1 kamil cat > test.cc << EOF 66 1.1 kamil #include <sanitizer/msan_interface.h> 67 1.1 kamil #include <stdlib.h> 68 1.1 kamil 69 1.1 kamil int main(int argc, char **argv) { 70 1.1 kamil int *volatile p = (int *)malloc(sizeof(int)); 71 1.1 kamil 72 1.1 kamil __msan_check_mem_is_initialized(p, sizeof(*p)); 73 1.1 kamil return 0; 74 1.1 kamil } 75 1.1 kamil EOF 76 1.1 kamil 77 1.1 kamil c++ -fsanitize=memory -o test test.cc 78 1.1 kamil paxctl +a test 79 1.1 kamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test 80 1.1 kamil } 81 1.1 kamil 82 1.1 kamil check_mem_profile_body(){ 83 1.1 kamil cat > test.cc << EOF 84 1.1 kamil #include <sanitizer/msan_interface.h> 85 1.1 kamil #include <stdlib.h> 86 1.1 kamil 87 1.1 kamil int main(int argc, char **argv) { 88 1.1 kamil int *volatile p = (int *)malloc(sizeof(int)); 89 1.1 kamil 90 1.1 kamil __msan_check_mem_is_initialized(p, sizeof(*p)); 91 1.1 kamil return 0; 92 1.1 kamil } 93 1.1 kamil EOF 94 1.1 kamil 95 1.4 skrll c++ -fsanitize=memory -static -o test -pg test.cc 96 1.1 kamil paxctl +a test 97 1.1 kamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test 98 1.1 kamil } 99 1.1 kamil 100 1.1 kamil check_mem_pic_body(){ 101 1.1 kamil cat > test.cc << EOF 102 1.1 kamil #include <stdio.h> 103 1.1 kamil #include <stdlib.h> 104 1.1 kamil int help(int); 105 1.1 kamil int main(int argc, char **argv) {return help(argc);} 106 1.1 kamil EOF 107 1.1 kamil 108 1.1 kamil cat > pic.cc << EOF 109 1.1 kamil #include <sanitizer/msan_interface.h> 110 1.1 kamil #include <stdlib.h> 111 1.1 kamil 112 1.1 kamil int help(int argc) { 113 1.1 kamil int *volatile p = (int *)malloc(sizeof(int)); 114 1.1 kamil 115 1.1 kamil __msan_check_mem_is_initialized(p, sizeof(*p)); 116 1.1 kamil return 0; 117 1.1 kamil } 118 1.1 kamil EOF 119 1.1 kamil 120 1.1 kamil c++ -fsanitize=memory -fPIC -shared -o libtest.so pic.cc 121 1.1 kamil c++ -o test test.cc -fsanitize=memory -L. -ltest 122 1.1 kamil paxctl +a test 123 1.1 kamil 124 1.1 kamil export LD_LIBRARY_PATH=. 125 1.1 kamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test 126 1.1 kamil } 127 1.1 kamil check_mem_pie_body(){ 128 1.3 skrll 129 1.1 kamil #check whether -pie flag is supported on this architecture 130 1.3 skrll if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 131 1.1 kamil atf_set_skip "c++ -pie not supported on this architecture" 132 1.1 kamil fi 133 1.1 kamil cat > test.cc << EOF 134 1.1 kamil #include <sanitizer/msan_interface.h> 135 1.1 kamil #include <stdlib.h> 136 1.1 kamil 137 1.1 kamil int main(int argc, char **argv) { 138 1.1 kamil int *volatile p = (int *)malloc(sizeof(int)); 139 1.1 kamil 140 1.1 kamil __msan_check_mem_is_initialized(p, sizeof(*p)); 141 1.1 kamil return 0; 142 1.1 kamil } 143 1.1 kamil EOF 144 1.1 kamil 145 1.1 kamil c++ -fsanitize=memory -o test -fpie -pie test.cc 146 1.1 kamil paxctl +a test 147 1.1 kamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test 148 1.1 kamil } 149 1.1 kamil 150 1.1 kamil atf_test_case target_not_supported 151 1.1 kamil target_not_supported_head() 152 1.1 kamil { 153 1.1 kamil atf_set "descr" "Test forced skip" 154 1.1 kamil } 155 1.1 kamil 156 1.2 kamil target_not_supported_body() 157 1.2 kamil { 158 1.2 kamil atf_skip "Target is not supported" 159 1.2 kamil } 160 1.2 kamil 161 1.1 kamil atf_init_test_cases() 162 1.1 kamil { 163 1.1 kamil test_target 164 1.1 kamil test $SUPPORT = 'n' && { 165 1.1 kamil atf_add_test_case target_not_supported 166 1.1 kamil return 0 167 1.1 kamil } 168 1.1 kamil atf_add_test_case check_mem 169 1.1 kamil atf_add_test_case check_mem_profile 170 1.1 kamil atf_add_test_case check_mem_pie 171 1.1 kamil atf_add_test_case check_mem_pic 172 1.1 kamil } 173