t_msan_stack.sh revision 1.3 1 1.1 kamil # Copyright (c) 2018 The NetBSD Foundation, Inc.
2 1.1 kamil # All rights reserved.
3 1.1 kamil #
4 1.1 kamil # This code is derived from software contributed to The NetBSD Foundation
5 1.1 kamil # by Yang Zheng.
6 1.1 kamil #
7 1.1 kamil # Redistribution and use in source and binary forms, with or without
8 1.1 kamil # modification, are permitted provided that the following conditions
9 1.1 kamil # are met:
10 1.1 kamil # 1. Redistributions of source code must retain the above copyright
11 1.1 kamil # notice, this list of conditions and the following disclaimer.
12 1.1 kamil # 2. Redistributions in binary form must reproduce the above copyright
13 1.1 kamil # notice, this list of conditions and the following disclaimer in the
14 1.1 kamil # documentation and/or other materials provided with the distribution.
15 1.1 kamil #
16 1.1 kamil # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 1.1 kamil # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 1.1 kamil # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 1.1 kamil # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 1.1 kamil # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 1.1 kamil # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 1.1 kamil # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 1.1 kamil # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 1.1 kamil # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 1.1 kamil # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 1.1 kamil # POSSIBILITY OF SUCH DAMAGE.
27 1.1 kamil #
28 1.1 kamil
29 1.1 kamil test_target()
30 1.1 kamil {
31 1.1 kamil SUPPORT='n'
32 1.1 kamil if uname -m | grep -q "amd64" && command -v c++ >/dev/null 2>&1 && \
33 1.1 kamil ! echo __clang__ | c++ -E - | grep -q __clang__; then
34 1.1 kamil # only clang with major version newer than 7 is supported
35 1.1 kamil CLANG_MAJOR=`echo __clang_major__ | c++ -E - | grep -o '^[[:digit:]]'`
36 1.1 kamil if [ "$CLANG_MAJOR" -ge "7" ]; then
37 1.1 kamil SUPPORT='y'
38 1.1 kamil fi
39 1.1 kamil fi
40 1.1 kamil }
41 1.1 kamil
42 1.1 kamil atf_test_case stack
43 1.1 kamil stack_head() {
44 1.1 kamil atf_set "descr" "Test memory sanitizer for free-stack-pointer case"
45 1.1 kamil atf_set "require.progs" "c++ paxctl"
46 1.1 kamil }
47 1.1 kamil
48 1.1 kamil atf_test_case stack_profile
49 1.1 kamil stack_profile_head() {
50 1.1 kamil atf_set "descr" "Test memory sanitizer for free-stack-pointer with profiling option"
51 1.1 kamil atf_set "require.progs" "c++ paxctl"
52 1.1 kamil }
53 1.1 kamil atf_test_case stack_pic
54 1.1 kamil stack_pic_head() {
55 1.1 kamil atf_set "descr" "Test memory sanitizer for free-stack-pointer with position independent code (PIC) flag"
56 1.1 kamil atf_set "require.progs" "c++ paxctl"
57 1.1 kamil }
58 1.1 kamil atf_test_case stack_pie
59 1.1 kamil stack_pie_head() {
60 1.1 kamil atf_set "descr" "Test memory sanitizer for free-stack-pointer with position independent execution (PIE) flag"
61 1.1 kamil atf_set "require.progs" "c++ paxctl"
62 1.1 kamil }
63 1.1 kamil
64 1.1 kamil stack_body(){
65 1.1 kamil cat > test.cc << EOF
66 1.1 kamil #include <stdlib.h>
67 1.1 kamil int main() {
68 1.1 kamil int a = 0;
69 1.1 kamil int *p = &a;
70 1.1 kamil free(p);
71 1.1 kamil return 0;
72 1.1 kamil }
73 1.1 kamil EOF
74 1.1 kamil
75 1.1 kamil c++ -fsanitize=memory -o test test.cc
76 1.1 kamil paxctl +a test
77 1.1 kamil atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test
78 1.1 kamil }
79 1.1 kamil
80 1.1 kamil stack_profile_body(){
81 1.1 kamil cat > test.cc << EOF
82 1.1 kamil #include <stdlib.h>
83 1.1 kamil int main() {
84 1.1 kamil int a = 0;
85 1.1 kamil int *p = &a;
86 1.1 kamil free(p);
87 1.1 kamil return 0;
88 1.1 kamil }
89 1.1 kamil EOF
90 1.1 kamil
91 1.1 kamil c++ -fsanitize=memory -o test -pg test.cc
92 1.1 kamil paxctl +a test
93 1.1 kamil atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test
94 1.1 kamil }
95 1.1 kamil
96 1.1 kamil stack_pic_body(){
97 1.1 kamil cat > test.cc << EOF
98 1.1 kamil #include <stdio.h>
99 1.1 kamil #include <stdlib.h>
100 1.1 kamil int help(int);
101 1.1 kamil int main(int argc, char **argv) {return help(argc);}
102 1.1 kamil EOF
103 1.1 kamil
104 1.1 kamil cat > pic.cc << EOF
105 1.1 kamil #include <stdlib.h>
106 1.1 kamil int help(int argc) {
107 1.1 kamil int a = 0;
108 1.1 kamil int *p = &a;
109 1.1 kamil free(p);
110 1.1 kamil return 0;
111 1.1 kamil }
112 1.1 kamil EOF
113 1.1 kamil
114 1.1 kamil c++ -fsanitize=memory -fPIC -shared -o libtest.so pic.cc
115 1.1 kamil c++ -o test test.cc -fsanitize=memory -L. -ltest
116 1.1 kamil paxctl +a test
117 1.1 kamil
118 1.1 kamil export LD_LIBRARY_PATH=.
119 1.1 kamil atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test
120 1.1 kamil }
121 1.1 kamil stack_pie_body(){
122 1.3 skrll
123 1.1 kamil #check whether -pie flag is supported on this architecture
124 1.3 skrll if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
125 1.1 kamil atf_set_skip "c++ -pie not supported on this architecture"
126 1.1 kamil fi
127 1.1 kamil cat > test.cc << EOF
128 1.1 kamil #include <stdlib.h>
129 1.1 kamil int main() {
130 1.1 kamil int a = 0;
131 1.1 kamil int *p = &a;
132 1.1 kamil free(p);
133 1.1 kamil return 0;
134 1.1 kamil }
135 1.1 kamil EOF
136 1.1 kamil
137 1.1 kamil c++ -fsanitize=memory -o test -fpie -pie test.cc
138 1.1 kamil paxctl +a test
139 1.1 kamil atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test
140 1.1 kamil }
141 1.1 kamil
142 1.1 kamil atf_test_case target_not_supported
143 1.1 kamil target_not_supported_head()
144 1.1 kamil {
145 1.1 kamil atf_set "descr" "Test forced skip"
146 1.1 kamil }
147 1.1 kamil
148 1.2 kamil target_not_supported_body()
149 1.2 kamil {
150 1.2 kamil atf_skip "Target is not supported"
151 1.2 kamil }
152 1.2 kamil
153 1.1 kamil atf_init_test_cases()
154 1.1 kamil {
155 1.1 kamil test_target
156 1.1 kamil test $SUPPORT = 'n' && {
157 1.1 kamil atf_add_test_case target_not_supported
158 1.1 kamil return 0
159 1.1 kamil }
160 1.1 kamil atf_add_test_case stack
161 1.1 kamil atf_add_test_case stack_profile
162 1.1 kamil atf_add_test_case stack_pie
163 1.1 kamil atf_add_test_case stack_pic
164 1.1 kamil }
165