t_msan_unpoison.sh revision 1.2 1 1.1 kamil # Copyright (c) 2018 The NetBSD Foundation, Inc.
2 1.1 kamil # All rights reserved.
3 1.1 kamil #
4 1.1 kamil # This code is derived from software contributed to The NetBSD Foundation
5 1.1 kamil # by Yang Zheng.
6 1.1 kamil #
7 1.1 kamil # Redistribution and use in source and binary forms, with or without
8 1.1 kamil # modification, are permitted provided that the following conditions
9 1.1 kamil # are met:
10 1.1 kamil # 1. Redistributions of source code must retain the above copyright
11 1.1 kamil # notice, this list of conditions and the following disclaimer.
12 1.1 kamil # 2. Redistributions in binary form must reproduce the above copyright
13 1.1 kamil # notice, this list of conditions and the following disclaimer in the
14 1.1 kamil # documentation and/or other materials provided with the distribution.
15 1.1 kamil #
16 1.1 kamil # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 1.1 kamil # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 1.1 kamil # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 1.1 kamil # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 1.1 kamil # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 1.1 kamil # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 1.1 kamil # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 1.1 kamil # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 1.1 kamil # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 1.1 kamil # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 1.1 kamil # POSSIBILITY OF SUCH DAMAGE.
27 1.1 kamil #
28 1.1 kamil
29 1.1 kamil test_target()
30 1.1 kamil {
31 1.1 kamil SUPPORT='n'
32 1.1 kamil if uname -m | grep -q "amd64" && command -v c++ >/dev/null 2>&1 && \
33 1.1 kamil ! echo __clang__ | c++ -E - | grep -q __clang__; then
34 1.1 kamil # only clang with major version newer than 7 is supported
35 1.1 kamil CLANG_MAJOR=`echo __clang_major__ | c++ -E - | grep -o '^[[:digit:]]'`
36 1.1 kamil if [ "$CLANG_MAJOR" -ge "7" ]; then
37 1.1 kamil SUPPORT='y'
38 1.1 kamil fi
39 1.1 kamil fi
40 1.1 kamil }
41 1.1 kamil
42 1.1 kamil atf_test_case unpoison
43 1.1 kamil unpoison_head() {
44 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_unpoison interface"
45 1.1 kamil atf_set "require.progs" "c++ paxctl"
46 1.1 kamil }
47 1.1 kamil
48 1.1 kamil atf_test_case unpoison_profile
49 1.1 kamil unpoison_profile_head() {
50 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_unpoison with profiling option"
51 1.1 kamil atf_set "require.progs" "c++ paxctl"
52 1.1 kamil }
53 1.1 kamil atf_test_case unpoison_pic
54 1.1 kamil unpoison_pic_head() {
55 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_unpoison with position independent code (PIC) flag"
56 1.1 kamil atf_set "require.progs" "c++ paxctl"
57 1.1 kamil }
58 1.1 kamil atf_test_case unpoison_pie
59 1.1 kamil unpoison_pie_head() {
60 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_unpoison with position independent execution (PIE) flag"
61 1.1 kamil atf_set "require.progs" "c++ paxctl"
62 1.1 kamil }
63 1.1 kamil
64 1.1 kamil unpoison_body(){
65 1.1 kamil cat > test.cc << EOF
66 1.1 kamil #include <sanitizer/msan_interface.h>
67 1.1 kamil
68 1.1 kamil int main(void) {
69 1.1 kamil char p[32] = {};
70 1.1 kamil char q[32] = {};
71 1.1 kamil __msan_poison(p + 10, 2);
72 1.1 kamil __msan_poison(q, 32);
73 1.1 kamil __msan_unpoison(p + 10, 2);
74 1.1 kamil __msan_unpoison_string(q);
75 1.1 kamil __msan_check_mem_is_initialized(p, 32);
76 1.1 kamil __msan_check_mem_is_initialized(p, 32);
77 1.1 kamil return 0;
78 1.1 kamil }
79 1.1 kamil EOF
80 1.1 kamil
81 1.1 kamil c++ -fsanitize=memory -o test test.cc
82 1.1 kamil paxctl +a test
83 1.1 kamil atf_check -s ignore -o ignore -e not-match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
84 1.1 kamil }
85 1.1 kamil
86 1.1 kamil unpoison_profile_body(){
87 1.1 kamil cat > test.cc << EOF
88 1.1 kamil #include <sanitizer/msan_interface.h>
89 1.1 kamil
90 1.1 kamil int main(void) {
91 1.1 kamil char p[32] = {};
92 1.1 kamil char q[32] = {};
93 1.1 kamil __msan_poison(p + 10, 2);
94 1.1 kamil __msan_poison(q, 32);
95 1.1 kamil __msan_unpoison(p + 10, 2);
96 1.1 kamil __msan_unpoison_string(q);
97 1.1 kamil __msan_check_mem_is_initialized(p, 32);
98 1.1 kamil __msan_check_mem_is_initialized(p, 32);
99 1.1 kamil return 0;
100 1.1 kamil }
101 1.1 kamil EOF
102 1.1 kamil
103 1.1 kamil c++ -fsanitize=memory -o test -pg test.cc
104 1.1 kamil paxctl +a test
105 1.1 kamil atf_check -s ignore -o ignore -e not-match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
106 1.1 kamil }
107 1.1 kamil
108 1.1 kamil unpoison_pic_body(){
109 1.1 kamil cat > test.cc << EOF
110 1.1 kamil #include <stdio.h>
111 1.1 kamil #include <stdlib.h>
112 1.1 kamil int help(int);
113 1.1 kamil int main(int argc, char **argv) {return help(argc);}
114 1.1 kamil EOF
115 1.1 kamil
116 1.1 kamil cat > pic.cc << EOF
117 1.1 kamil #include <sanitizer/msan_interface.h>
118 1.1 kamil
119 1.1 kamil int help(int argc) {
120 1.1 kamil char p[32] = {};
121 1.1 kamil char q[32] = {};
122 1.1 kamil __msan_poison(p + 10, 2);
123 1.1 kamil __msan_poison(q, 32);
124 1.1 kamil __msan_unpoison(p + 10, 2);
125 1.1 kamil __msan_unpoison_string(q);
126 1.1 kamil __msan_check_mem_is_initialized(p, 32);
127 1.1 kamil __msan_check_mem_is_initialized(p, 32);
128 1.1 kamil return 0;
129 1.1 kamil }
130 1.1 kamil EOF
131 1.1 kamil
132 1.1 kamil c++ -fsanitize=memory -fPIC -shared -o libtest.so pic.cc
133 1.1 kamil c++ -o test test.cc -fsanitize=memory -L. -ltest
134 1.1 kamil paxctl +a test
135 1.1 kamil
136 1.1 kamil export LD_LIBRARY_PATH=.
137 1.1 kamil atf_check -s ignore -o ignore -e not-match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
138 1.1 kamil }
139 1.1 kamil unpoison_pie_body(){
140 1.1 kamil
141 1.1 kamil #check whether -pie flag is supported on this architecture
142 1.1 kamil if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
143 1.1 kamil atf_set_skip "c++ -pie not supported on this architecture"
144 1.1 kamil fi
145 1.1 kamil cat > test.cc << EOF
146 1.1 kamil #include <sanitizer/msan_interface.h>
147 1.1 kamil
148 1.1 kamil int main(void) {
149 1.1 kamil char p[32] = {};
150 1.1 kamil char q[32] = {};
151 1.1 kamil __msan_poison(p + 10, 2);
152 1.1 kamil __msan_poison(q, 32);
153 1.1 kamil __msan_unpoison(p + 10, 2);
154 1.1 kamil __msan_unpoison_string(q);
155 1.1 kamil __msan_check_mem_is_initialized(p, 32);
156 1.1 kamil __msan_check_mem_is_initialized(p, 32);
157 1.1 kamil return 0;
158 1.1 kamil }
159 1.1 kamil EOF
160 1.1 kamil
161 1.1 kamil c++ -fsanitize=memory -o test -fpie -pie test.cc
162 1.1 kamil paxctl +a test
163 1.1 kamil atf_check -s ignore -o ignore -e not-match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
164 1.1 kamil }
165 1.1 kamil
166 1.1 kamil atf_test_case target_not_supported
167 1.1 kamil target_not_supported_head()
168 1.1 kamil {
169 1.1 kamil atf_set "descr" "Test forced skip"
170 1.1 kamil }
171 1.1 kamil
172 1.2 kamil target_not_supported_body()
173 1.2 kamil {
174 1.2 kamil atf_skip "Target is not supported"
175 1.2 kamil }
176 1.2 kamil
177 1.1 kamil atf_init_test_cases()
178 1.1 kamil {
179 1.1 kamil test_target
180 1.1 kamil test $SUPPORT = 'n' && {
181 1.1 kamil atf_add_test_case target_not_supported
182 1.1 kamil return 0
183 1.1 kamil }
184 1.1 kamil atf_add_test_case unpoison
185 1.1 kamil atf_add_test_case unpoison_profile
186 1.1 kamil atf_add_test_case unpoison_pie
187 1.1 kamil atf_add_test_case unpoison_pic
188 1.1 kamil }
189