t_msan_poison.sh revision 1.2
11.1Skamil# Copyright (c) 2018 The NetBSD Foundation, Inc.
21.1Skamil# All rights reserved.
31.1Skamil#
41.1Skamil# This code is derived from software contributed to The NetBSD Foundation
51.1Skamil# by Yang Zheng.
61.1Skamil#
71.1Skamil# Redistribution and use in source and binary forms, with or without
81.1Skamil# modification, are permitted provided that the following conditions
91.1Skamil# are met:
101.1Skamil# 1. Redistributions of source code must retain the above copyright
111.1Skamil#    notice, this list of conditions and the following disclaimer.
121.1Skamil# 2. Redistributions in binary form must reproduce the above copyright
131.1Skamil#    notice, this list of conditions and the following disclaimer in the
141.1Skamil#    documentation and/or other materials provided with the distribution.
151.1Skamil#
161.1Skamil# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
171.1Skamil# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
181.1Skamil# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
191.1Skamil# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
201.1Skamil# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
211.1Skamil# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
221.1Skamil# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
231.1Skamil# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
241.1Skamil# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
251.1Skamil# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
261.1Skamil# POSSIBILITY OF SUCH DAMAGE.
271.1Skamil#
281.1Skamil
291.1Skamiltest_target()
301.1Skamil{
311.1Skamil	SUPPORT='n'
321.1Skamil	if uname -m | grep -q "amd64" && command -v c++ >/dev/null 2>&1 && \
331.1Skamil		   ! echo __clang__ | c++ -E - | grep -q __clang__; then
341.1Skamil		# only clang with major version newer than 7 is supported
351.1Skamil		CLANG_MAJOR=`echo __clang_major__ | c++ -E - | grep -o '^[[:digit:]]'`
361.1Skamil		if [ "$CLANG_MAJOR" -ge "7" ]; then
371.1Skamil			SUPPORT='y'
381.1Skamil		fi
391.1Skamil	fi
401.1Skamil}
411.1Skamil
421.1Skamilatf_test_case poison
431.1Skamilpoison_head() {
441.1Skamil	atf_set "descr" "Test memory sanitizer for __msan_poison interface"
451.1Skamil	atf_set "require.progs" "c++ paxctl"
461.1Skamil}
471.1Skamil
481.1Skamilatf_test_case poison_profile
491.1Skamilpoison_profile_head() {
501.1Skamil	atf_set "descr" "Test memory sanitizer for __msan_poison with profiling option"
511.1Skamil	atf_set "require.progs" "c++ paxctl"
521.1Skamil}
531.1Skamilatf_test_case poison_pic
541.1Skamilpoison_pic_head() {
551.1Skamil	atf_set "descr" "Test memory sanitizer for __msan_poison with position independent code (PIC) flag"
561.1Skamil	atf_set "require.progs" "c++ paxctl"
571.1Skamil}
581.1Skamilatf_test_case poison_pie
591.1Skamilpoison_pie_head() {
601.1Skamil	atf_set "descr" "Test memory sanitizer for __msan_poison with position independent execution (PIE) flag"
611.1Skamil	atf_set "require.progs" "c++ paxctl"
621.1Skamil}
631.1Skamil
641.1Skamilpoison_body(){
651.1Skamil	cat > test.cc << EOF
661.1Skamil#include <sanitizer/msan_interface.h>
671.1Skamil
681.1Skamilint main(void) {
691.1Skamil  char p[32] = {};
701.1Skamil  __msan_poison(p + 10, 2);
711.1Skamil
721.1Skamil  __msan_check_mem_is_initialized(p + 5, 20);
731.1Skamil  return 0;
741.1Skamil}
751.1SkamilEOF
761.1Skamil
771.1Skamil	c++ -fsanitize=memory -o test test.cc
781.1Skamil	paxctl +a test
791.1Skamil	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test
801.1Skamil}
811.1Skamil
821.1Skamilpoison_profile_body(){
831.1Skamil	cat > test.cc << EOF
841.1Skamil#include <sanitizer/msan_interface.h>
851.1Skamil
861.1Skamilint main(void) {
871.1Skamil  char p[32] = {};
881.1Skamil  __msan_poison(p + 10, 2);
891.1Skamil
901.1Skamil  __msan_check_mem_is_initialized(p + 5, 20);
911.1Skamil  return 0;
921.1Skamil}
931.1SkamilEOF
941.1Skamil
951.1Skamil	c++ -fsanitize=memory -o test -pg test.cc
961.1Skamil	paxctl +a test
971.1Skamil	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test
981.1Skamil}
991.1Skamil
1001.1Skamilpoison_pic_body(){
1011.1Skamil	cat > test.cc << EOF
1021.1Skamil#include <stdio.h>
1031.1Skamil#include <stdlib.h>
1041.1Skamilint help(int);
1051.1Skamilint main(int argc, char **argv) {return help(argc);}
1061.1SkamilEOF
1071.1Skamil
1081.1Skamil	cat > pic.cc << EOF
1091.1Skamil#include <sanitizer/msan_interface.h>
1101.1Skamil
1111.1Skamilint help(int argc) {
1121.1Skamil  char p[32] = {};
1131.1Skamil  __msan_poison(p + 10, 2);
1141.1Skamil
1151.1Skamil  __msan_check_mem_is_initialized(p + 5, 20);
1161.1Skamil  return 0;
1171.1Skamil}
1181.1SkamilEOF
1191.1Skamil
1201.1Skamil	c++ -fsanitize=memory -fPIC -shared -o libtest.so pic.cc
1211.1Skamil	c++ -o test test.cc -fsanitize=memory -L. -ltest
1221.1Skamil	paxctl +a test
1231.1Skamil
1241.1Skamil	export LD_LIBRARY_PATH=.
1251.1Skamil	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test
1261.1Skamil}
1271.1Skamilpoison_pie_body(){
1281.1Skamil	
1291.1Skamil	#check whether -pie flag is supported on this architecture
1301.1Skamil	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 
1311.1Skamil		atf_set_skip "c++ -pie not supported on this architecture"
1321.1Skamil	fi
1331.1Skamil	cat > test.cc << EOF
1341.1Skamil#include <sanitizer/msan_interface.h>
1351.1Skamil
1361.1Skamilint main(void) {
1371.1Skamil  char p[32] = {};
1381.1Skamil  __msan_poison(p + 10, 2);
1391.1Skamil
1401.1Skamil  __msan_check_mem_is_initialized(p + 5, 20);
1411.1Skamil  return 0;
1421.1Skamil}
1431.1SkamilEOF
1441.1Skamil
1451.1Skamil	c++ -fsanitize=memory -o test -fpie -pie test.cc
1461.1Skamil	paxctl +a test
1471.1Skamil	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test
1481.1Skamil}
1491.1Skamil
1501.1Skamilatf_test_case target_not_supported
1511.1Skamiltarget_not_supported_head()
1521.1Skamil{
1531.1Skamil	atf_set "descr" "Test forced skip"
1541.1Skamil}
1551.1Skamil
1561.2Skamiltarget_not_supported_body()
1571.2Skamil{
1581.2Skamil	atf_skip "Target is not supported"
1591.2Skamil}
1601.2Skamil
1611.1Skamilatf_init_test_cases()
1621.1Skamil{
1631.1Skamil	test_target
1641.1Skamil	test $SUPPORT = 'n' && {
1651.1Skamil		atf_add_test_case target_not_supported
1661.1Skamil		return 0
1671.1Skamil	}
1681.1Skamil	atf_add_test_case poison
1691.1Skamil	atf_add_test_case poison_profile
1701.1Skamil	atf_add_test_case poison_pie
1711.1Skamil	atf_add_test_case poison_pic
1721.1Skamil}
173