t_msan_check_mem.sh revision 1.2 1 1.1 kamil # Copyright (c) 2018 The NetBSD Foundation, Inc.
2 1.1 kamil # All rights reserved.
3 1.1 kamil #
4 1.1 kamil # This code is derived from software contributed to The NetBSD Foundation
5 1.1 kamil # by Yang Zheng.
6 1.1 kamil #
7 1.1 kamil # Redistribution and use in source and binary forms, with or without
8 1.1 kamil # modification, are permitted provided that the following conditions
9 1.1 kamil # are met:
10 1.1 kamil # 1. Redistributions of source code must retain the above copyright
11 1.1 kamil # notice, this list of conditions and the following disclaimer.
12 1.1 kamil # 2. Redistributions in binary form must reproduce the above copyright
13 1.1 kamil # notice, this list of conditions and the following disclaimer in the
14 1.1 kamil # documentation and/or other materials provided with the distribution.
15 1.1 kamil #
16 1.1 kamil # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 1.1 kamil # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 1.1 kamil # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 1.1 kamil # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 1.1 kamil # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 1.1 kamil # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 1.1 kamil # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 1.1 kamil # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 1.1 kamil # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 1.1 kamil # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 1.1 kamil # POSSIBILITY OF SUCH DAMAGE.
27 1.1 kamil #
28 1.1 kamil
29 1.1 kamil test_target()
30 1.1 kamil {
31 1.1 kamil SUPPORT='n'
32 1.1 kamil if uname -m | grep -q "amd64" && command -v cc >/dev/null 2>&1 && \
33 1.1 kamil ! echo __clang__ | cc -E - | grep -q __clang__; then
34 1.1 kamil # only clang with major version newer than 7 is supported
35 1.1 kamil CLANG_MAJOR=`echo __clang_major__ | cc -E - | grep -o '^[[:digit:]]'`
36 1.1 kamil if [ "$CLANG_MAJOR" -ge "7" ]; then
37 1.1 kamil SUPPORT='y'
38 1.1 kamil fi
39 1.1 kamil fi
40 1.1 kamil }
41 1.1 kamil
42 1.1 kamil atf_test_case check_mem
43 1.1 kamil check_mem_head() {
44 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized interface"
45 1.1 kamil atf_set "require.progs" "cc paxctl"
46 1.1 kamil }
47 1.1 kamil
48 1.1 kamil atf_test_case check_mem_profile
49 1.1 kamil check_mem_profile_head() {
50 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with profiling option"
51 1.1 kamil atf_set "require.progs" "cc paxctl"
52 1.1 kamil }
53 1.1 kamil atf_test_case check_mem_pic
54 1.1 kamil check_mem_pic_head() {
55 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with position independent code (PIC) flag"
56 1.1 kamil atf_set "require.progs" "cc paxctl"
57 1.1 kamil }
58 1.1 kamil atf_test_case check_mem_pie
59 1.1 kamil check_mem_pie_head() {
60 1.1 kamil atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with position independent execution (PIE) flag"
61 1.1 kamil atf_set "require.progs" "cc paxctl"
62 1.1 kamil }
63 1.1 kamil
64 1.1 kamil check_mem_body(){
65 1.1 kamil cat > test.c << EOF
66 1.1 kamil #include <sanitizer/msan_interface.h>
67 1.1 kamil #include <stdlib.h>
68 1.1 kamil
69 1.1 kamil int main(int argc, char **argv) {
70 1.1 kamil int *volatile p = (int *)malloc(sizeof(int));
71 1.1 kamil
72 1.1 kamil __msan_check_mem_is_initialized(p, sizeof(*p));
73 1.1 kamil return 0;
74 1.1 kamil }
75 1.1 kamil EOF
76 1.1 kamil
77 1.1 kamil cc -fsanitize=memory -o test test.c
78 1.1 kamil paxctl +a test
79 1.1 kamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
80 1.1 kamil }
81 1.1 kamil
82 1.1 kamil check_mem_profile_body(){
83 1.1 kamil cat > test.c << EOF
84 1.1 kamil #include <sanitizer/msan_interface.h>
85 1.1 kamil #include <stdlib.h>
86 1.1 kamil
87 1.1 kamil int main(int argc, char **argv) {
88 1.1 kamil int *volatile p = (int *)malloc(sizeof(int));
89 1.1 kamil
90 1.1 kamil __msan_check_mem_is_initialized(p, sizeof(*p));
91 1.1 kamil return 0;
92 1.1 kamil }
93 1.1 kamil EOF
94 1.1 kamil
95 1.1 kamil cc -fsanitize=memory -o test -pg test.c
96 1.1 kamil paxctl +a test
97 1.1 kamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
98 1.1 kamil }
99 1.1 kamil
100 1.1 kamil check_mem_pic_body(){
101 1.1 kamil cat > test.c << EOF
102 1.1 kamil #include <stdio.h>
103 1.1 kamil #include <stdlib.h>
104 1.1 kamil int help(int);
105 1.1 kamil int main(int argc, char **argv) {return help(argc);}
106 1.1 kamil EOF
107 1.1 kamil
108 1.1 kamil cat > pic.c << EOF
109 1.1 kamil #include <sanitizer/msan_interface.h>
110 1.1 kamil #include <stdlib.h>
111 1.1 kamil
112 1.1 kamil int help(int argc) {
113 1.1 kamil int *volatile p = (int *)malloc(sizeof(int));
114 1.1 kamil
115 1.1 kamil __msan_check_mem_is_initialized(p, sizeof(*p));
116 1.1 kamil return 0;
117 1.1 kamil }
118 1.1 kamil EOF
119 1.1 kamil
120 1.1 kamil cc -fsanitize=memory -fPIC -shared -o libtest.so pic.c
121 1.1 kamil cc -o test test.c -fsanitize=memory -L. -ltest
122 1.1 kamil paxctl +a test
123 1.1 kamil
124 1.1 kamil export LD_LIBRARY_PATH=.
125 1.1 kamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
126 1.1 kamil }
127 1.1 kamil check_mem_pie_body(){
128 1.1 kamil
129 1.1 kamil #check whether -pie flag is supported on this architecture
130 1.1 kamil if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
131 1.1 kamil atf_set_skip "cc -pie not supported on this architecture"
132 1.1 kamil fi
133 1.1 kamil cat > test.c << EOF
134 1.1 kamil #include <sanitizer/msan_interface.h>
135 1.1 kamil #include <stdlib.h>
136 1.1 kamil
137 1.1 kamil int main(int argc, char **argv) {
138 1.1 kamil int *volatile p = (int *)malloc(sizeof(int));
139 1.1 kamil
140 1.1 kamil __msan_check_mem_is_initialized(p, sizeof(*p));
141 1.1 kamil return 0;
142 1.1 kamil }
143 1.1 kamil EOF
144 1.1 kamil
145 1.1 kamil cc -fsanitize=memory -o test -fpie -pie test.c
146 1.1 kamil paxctl +a test
147 1.1 kamil atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
148 1.1 kamil }
149 1.1 kamil
150 1.1 kamil
151 1.1 kamil atf_test_case target_not_supported
152 1.1 kamil target_not_supported_head()
153 1.1 kamil {
154 1.1 kamil atf_set "descr" "Test forced skip"
155 1.1 kamil }
156 1.1 kamil
157 1.2 kamil target_not_supported_body()
158 1.2 kamil {
159 1.2 kamil atf_skip "Target is not supported"
160 1.2 kamil }
161 1.2 kamil
162 1.1 kamil atf_init_test_cases()
163 1.1 kamil {
164 1.1 kamil test_target
165 1.1 kamil test $SUPPORT = 'n' && {
166 1.1 kamil atf_add_test_case target_not_supported
167 1.1 kamil return 0
168 1.1 kamil }
169 1.1 kamil atf_add_test_case check_mem
170 1.1 kamil atf_add_test_case check_mem_profile
171 1.1 kamil atf_add_test_case check_mem_pie
172 1.1 kamil atf_add_test_case check_mem_pic
173 1.1 kamil }
174