t_msan_poison.sh revision 1.4
11.1Skamil# Copyright (c) 2018 The NetBSD Foundation, Inc. 21.1Skamil# All rights reserved. 31.1Skamil# 41.1Skamil# This code is derived from software contributed to The NetBSD Foundation 51.1Skamil# by Yang Zheng. 61.1Skamil# 71.1Skamil# Redistribution and use in source and binary forms, with or without 81.1Skamil# modification, are permitted provided that the following conditions 91.1Skamil# are met: 101.1Skamil# 1. Redistributions of source code must retain the above copyright 111.1Skamil# notice, this list of conditions and the following disclaimer. 121.1Skamil# 2. Redistributions in binary form must reproduce the above copyright 131.1Skamil# notice, this list of conditions and the following disclaimer in the 141.1Skamil# documentation and/or other materials provided with the distribution. 151.1Skamil# 161.1Skamil# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 171.1Skamil# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 181.1Skamil# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 191.1Skamil# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 201.1Skamil# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 211.1Skamil# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 221.1Skamil# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 231.1Skamil# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 241.1Skamil# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 251.1Skamil# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 261.1Skamil# POSSIBILITY OF SUCH DAMAGE. 271.1Skamil# 281.1Skamil 291.1Skamiltest_target() 301.1Skamil{ 311.1Skamil SUPPORT='n' 321.1Skamil if uname -m | grep -q "amd64" && command -v c++ >/dev/null 2>&1 && \ 331.1Skamil ! echo __clang__ | c++ -E - | grep -q __clang__; then 341.1Skamil # only clang with major version newer than 7 is supported 351.1Skamil CLANG_MAJOR=`echo __clang_major__ | c++ -E - | grep -o '^[[:digit:]]'` 361.1Skamil if [ "$CLANG_MAJOR" -ge "7" ]; then 371.1Skamil SUPPORT='y' 381.1Skamil fi 391.1Skamil fi 401.1Skamil} 411.1Skamil 421.1Skamilatf_test_case poison 431.1Skamilpoison_head() { 441.1Skamil atf_set "descr" "Test memory sanitizer for __msan_poison interface" 451.1Skamil atf_set "require.progs" "c++ paxctl" 461.1Skamil} 471.1Skamil 481.1Skamilatf_test_case poison_profile 491.1Skamilpoison_profile_head() { 501.1Skamil atf_set "descr" "Test memory sanitizer for __msan_poison with profiling option" 511.1Skamil atf_set "require.progs" "c++ paxctl" 521.1Skamil} 531.1Skamilatf_test_case poison_pic 541.1Skamilpoison_pic_head() { 551.1Skamil atf_set "descr" "Test memory sanitizer for __msan_poison with position independent code (PIC) flag" 561.1Skamil atf_set "require.progs" "c++ paxctl" 571.1Skamil} 581.1Skamilatf_test_case poison_pie 591.1Skamilpoison_pie_head() { 601.1Skamil atf_set "descr" "Test memory sanitizer for __msan_poison with position independent execution (PIE) flag" 611.1Skamil atf_set "require.progs" "c++ paxctl" 621.1Skamil} 631.1Skamil 641.1Skamilpoison_body(){ 651.1Skamil cat > test.cc << EOF 661.1Skamil#include <sanitizer/msan_interface.h> 671.1Skamil 681.1Skamilint main(void) { 691.1Skamil char p[32] = {}; 701.1Skamil __msan_poison(p + 10, 2); 711.1Skamil 721.1Skamil __msan_check_mem_is_initialized(p + 5, 20); 731.1Skamil return 0; 741.1Skamil} 751.1SkamilEOF 761.1Skamil 771.1Skamil c++ -fsanitize=memory -o test test.cc 781.1Skamil paxctl +a test 791.1Skamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test 801.1Skamil} 811.1Skamil 821.1Skamilpoison_profile_body(){ 831.1Skamil cat > test.cc << EOF 841.1Skamil#include <sanitizer/msan_interface.h> 851.1Skamil 861.1Skamilint main(void) { 871.1Skamil char p[32] = {}; 881.1Skamil __msan_poison(p + 10, 2); 891.1Skamil 901.1Skamil __msan_check_mem_is_initialized(p + 5, 20); 911.1Skamil return 0; 921.1Skamil} 931.1SkamilEOF 941.1Skamil 951.4Sskrll c++ -fsanitize=memory -static -o test -pg test.cc 961.1Skamil paxctl +a test 971.1Skamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test 981.1Skamil} 991.1Skamil 1001.1Skamilpoison_pic_body(){ 1011.1Skamil cat > test.cc << EOF 1021.1Skamil#include <stdio.h> 1031.1Skamil#include <stdlib.h> 1041.1Skamilint help(int); 1051.1Skamilint main(int argc, char **argv) {return help(argc);} 1061.1SkamilEOF 1071.1Skamil 1081.1Skamil cat > pic.cc << EOF 1091.1Skamil#include <sanitizer/msan_interface.h> 1101.1Skamil 1111.1Skamilint help(int argc) { 1121.1Skamil char p[32] = {}; 1131.1Skamil __msan_poison(p + 10, 2); 1141.1Skamil 1151.1Skamil __msan_check_mem_is_initialized(p + 5, 20); 1161.1Skamil return 0; 1171.1Skamil} 1181.1SkamilEOF 1191.1Skamil 1201.1Skamil c++ -fsanitize=memory -fPIC -shared -o libtest.so pic.cc 1211.1Skamil c++ -o test test.cc -fsanitize=memory -L. -ltest 1221.1Skamil paxctl +a test 1231.1Skamil 1241.1Skamil export LD_LIBRARY_PATH=. 1251.1Skamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test 1261.1Skamil} 1271.1Skamilpoison_pie_body(){ 1281.3Sskrll 1291.1Skamil #check whether -pie flag is supported on this architecture 1301.3Sskrll if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 1311.1Skamil atf_set_skip "c++ -pie not supported on this architecture" 1321.1Skamil fi 1331.1Skamil cat > test.cc << EOF 1341.1Skamil#include <sanitizer/msan_interface.h> 1351.1Skamil 1361.1Skamilint main(void) { 1371.1Skamil char p[32] = {}; 1381.1Skamil __msan_poison(p + 10, 2); 1391.1Skamil 1401.1Skamil __msan_check_mem_is_initialized(p + 5, 20); 1411.1Skamil return 0; 1421.1Skamil} 1431.1SkamilEOF 1441.1Skamil 1451.1Skamil c++ -fsanitize=memory -o test -fpie -pie test.cc 1461.1Skamil paxctl +a test 1471.1Skamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 5 inside" ./test 1481.1Skamil} 1491.1Skamil 1501.1Skamilatf_test_case target_not_supported 1511.1Skamiltarget_not_supported_head() 1521.1Skamil{ 1531.1Skamil atf_set "descr" "Test forced skip" 1541.1Skamil} 1551.1Skamil 1561.2Skamiltarget_not_supported_body() 1571.2Skamil{ 1581.2Skamil atf_skip "Target is not supported" 1591.2Skamil} 1601.2Skamil 1611.1Skamilatf_init_test_cases() 1621.1Skamil{ 1631.1Skamil test_target 1641.1Skamil test $SUPPORT = 'n' && { 1651.1Skamil atf_add_test_case target_not_supported 1661.1Skamil return 0 1671.1Skamil } 1681.1Skamil atf_add_test_case poison 1691.1Skamil atf_add_test_case poison_profile 1701.1Skamil atf_add_test_case poison_pie 1711.1Skamil atf_add_test_case poison_pic 1721.1Skamil} 173