Home | History | Annotate | Line # | Download | only in c++
t_msan_stack.sh revision 1.3
      1  1.1  kamil # Copyright (c) 2018 The NetBSD Foundation, Inc.
      2  1.1  kamil # All rights reserved.
      3  1.1  kamil #
      4  1.1  kamil # This code is derived from software contributed to The NetBSD Foundation
      5  1.1  kamil # by Yang Zheng.
      6  1.1  kamil #
      7  1.1  kamil # Redistribution and use in source and binary forms, with or without
      8  1.1  kamil # modification, are permitted provided that the following conditions
      9  1.1  kamil # are met:
     10  1.1  kamil # 1. Redistributions of source code must retain the above copyright
     11  1.1  kamil #    notice, this list of conditions and the following disclaimer.
     12  1.1  kamil # 2. Redistributions in binary form must reproduce the above copyright
     13  1.1  kamil #    notice, this list of conditions and the following disclaimer in the
     14  1.1  kamil #    documentation and/or other materials provided with the distribution.
     15  1.1  kamil #
     16  1.1  kamil # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17  1.1  kamil # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18  1.1  kamil # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19  1.1  kamil # PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20  1.1  kamil # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21  1.1  kamil # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22  1.1  kamil # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23  1.1  kamil # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24  1.1  kamil # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25  1.1  kamil # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26  1.1  kamil # POSSIBILITY OF SUCH DAMAGE.
     27  1.1  kamil #
     28  1.1  kamil 
     29  1.1  kamil test_target()
     30  1.1  kamil {
     31  1.1  kamil 	SUPPORT='n'
     32  1.1  kamil 	if uname -m | grep -q "amd64" && command -v c++ >/dev/null 2>&1 && \
     33  1.1  kamil 		   ! echo __clang__ | c++ -E - | grep -q __clang__; then
     34  1.1  kamil 		# only clang with major version newer than 7 is supported
     35  1.1  kamil 		CLANG_MAJOR=`echo __clang_major__ | c++ -E - | grep -o '^[[:digit:]]'`
     36  1.1  kamil 		if [ "$CLANG_MAJOR" -ge "7" ]; then
     37  1.1  kamil 			SUPPORT='y'
     38  1.1  kamil 		fi
     39  1.1  kamil 	fi
     40  1.1  kamil }
     41  1.1  kamil 
     42  1.1  kamil atf_test_case stack
     43  1.1  kamil stack_head() {
     44  1.1  kamil 	atf_set "descr" "Test memory sanitizer for free-stack-pointer case"
     45  1.1  kamil 	atf_set "require.progs" "c++ paxctl"
     46  1.1  kamil }
     47  1.1  kamil 
     48  1.1  kamil atf_test_case stack_profile
     49  1.1  kamil stack_profile_head() {
     50  1.1  kamil 	atf_set "descr" "Test memory sanitizer for free-stack-pointer with profiling option"
     51  1.1  kamil 	atf_set "require.progs" "c++ paxctl"
     52  1.1  kamil }
     53  1.1  kamil atf_test_case stack_pic
     54  1.1  kamil stack_pic_head() {
     55  1.1  kamil 	atf_set "descr" "Test memory sanitizer for free-stack-pointer with position independent code (PIC) flag"
     56  1.1  kamil 	atf_set "require.progs" "c++ paxctl"
     57  1.1  kamil }
     58  1.1  kamil atf_test_case stack_pie
     59  1.1  kamil stack_pie_head() {
     60  1.1  kamil 	atf_set "descr" "Test memory sanitizer for free-stack-pointer with position independent execution (PIE) flag"
     61  1.1  kamil 	atf_set "require.progs" "c++ paxctl"
     62  1.1  kamil }
     63  1.1  kamil 
     64  1.1  kamil stack_body(){
     65  1.1  kamil 	cat > test.cc << EOF
     66  1.1  kamil #include <stdlib.h>
     67  1.1  kamil int main() {
     68  1.1  kamil   int a = 0;
     69  1.1  kamil   int *p = &a;
     70  1.1  kamil   free(p);
     71  1.1  kamil   return 0;
     72  1.1  kamil }
     73  1.1  kamil EOF
     74  1.1  kamil 
     75  1.1  kamil 	c++ -fsanitize=memory -o test test.cc
     76  1.1  kamil 	paxctl +a test
     77  1.1  kamil 	atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test
     78  1.1  kamil }
     79  1.1  kamil 
     80  1.1  kamil stack_profile_body(){
     81  1.1  kamil 	cat > test.cc << EOF
     82  1.1  kamil #include <stdlib.h>
     83  1.1  kamil int main() {
     84  1.1  kamil   int a = 0;
     85  1.1  kamil   int *p = &a;
     86  1.1  kamil   free(p);
     87  1.1  kamil   return 0;
     88  1.1  kamil }
     89  1.1  kamil EOF
     90  1.1  kamil 
     91  1.1  kamil 	c++ -fsanitize=memory -o test -pg test.cc
     92  1.1  kamil 	paxctl +a test
     93  1.1  kamil 	atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test
     94  1.1  kamil }
     95  1.1  kamil 
     96  1.1  kamil stack_pic_body(){
     97  1.1  kamil 	cat > test.cc << EOF
     98  1.1  kamil #include <stdio.h>
     99  1.1  kamil #include <stdlib.h>
    100  1.1  kamil int help(int);
    101  1.1  kamil int main(int argc, char **argv) {return help(argc);}
    102  1.1  kamil EOF
    103  1.1  kamil 
    104  1.1  kamil 	cat > pic.cc << EOF
    105  1.1  kamil #include <stdlib.h>
    106  1.1  kamil int help(int argc) {
    107  1.1  kamil   int a = 0;
    108  1.1  kamil   int *p = &a;
    109  1.1  kamil   free(p);
    110  1.1  kamil   return 0;
    111  1.1  kamil }
    112  1.1  kamil EOF
    113  1.1  kamil 
    114  1.1  kamil 	c++ -fsanitize=memory -fPIC -shared -o libtest.so pic.cc
    115  1.1  kamil 	c++ -o test test.cc -fsanitize=memory -L. -ltest
    116  1.1  kamil 	paxctl +a test
    117  1.1  kamil 
    118  1.1  kamil 	export LD_LIBRARY_PATH=.
    119  1.1  kamil 	atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test
    120  1.1  kamil }
    121  1.1  kamil stack_pie_body(){
    122  1.3  skrll 
    123  1.1  kamil 	#check whether -pie flag is supported on this architecture
    124  1.3  skrll 	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
    125  1.1  kamil 		atf_set_skip "c++ -pie not supported on this architecture"
    126  1.1  kamil 	fi
    127  1.1  kamil 	cat > test.cc << EOF
    128  1.1  kamil #include <stdlib.h>
    129  1.1  kamil int main() {
    130  1.1  kamil   int a = 0;
    131  1.1  kamil   int *p = &a;
    132  1.1  kamil   free(p);
    133  1.1  kamil   return 0;
    134  1.1  kamil }
    135  1.1  kamil EOF
    136  1.1  kamil 
    137  1.1  kamil 	c++ -fsanitize=memory -o test -fpie -pie test.cc
    138  1.1  kamil 	paxctl +a test
    139  1.1  kamil 	atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test
    140  1.1  kamil }
    141  1.1  kamil 
    142  1.1  kamil atf_test_case target_not_supported
    143  1.1  kamil target_not_supported_head()
    144  1.1  kamil {
    145  1.1  kamil 	atf_set "descr" "Test forced skip"
    146  1.1  kamil }
    147  1.1  kamil 
    148  1.2  kamil target_not_supported_body()
    149  1.2  kamil {
    150  1.2  kamil 	atf_skip "Target is not supported"
    151  1.2  kamil }
    152  1.2  kamil 
    153  1.1  kamil atf_init_test_cases()
    154  1.1  kamil {
    155  1.1  kamil 	test_target
    156  1.1  kamil 	test $SUPPORT = 'n' && {
    157  1.1  kamil 		atf_add_test_case target_not_supported
    158  1.1  kamil 		return 0
    159  1.1  kamil 	}
    160  1.1  kamil 	atf_add_test_case stack
    161  1.1  kamil 	atf_add_test_case stack_profile
    162  1.1  kamil 	atf_add_test_case stack_pie
    163  1.1  kamil 	atf_add_test_case stack_pic
    164  1.1  kamil }
    165