t_msan_check_mem.sh revision 1.4 1 # Copyright (c) 2018 The NetBSD Foundation, Inc.
2 # All rights reserved.
3 #
4 # This code is derived from software contributed to The NetBSD Foundation
5 # by Yang Zheng.
6 #
7 # Redistribution and use in source and binary forms, with or without
8 # modification, are permitted provided that the following conditions
9 # are met:
10 # 1. Redistributions of source code must retain the above copyright
11 # notice, this list of conditions and the following disclaimer.
12 # 2. Redistributions in binary form must reproduce the above copyright
13 # notice, this list of conditions and the following disclaimer in the
14 # documentation and/or other materials provided with the distribution.
15 #
16 # THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 # ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 # TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 # CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 # SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 # INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 # CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 # ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 # POSSIBILITY OF SUCH DAMAGE.
27 #
28
29 test_target()
30 {
31 SUPPORT='n'
32 if uname -m | grep -q "amd64" && command -v cc >/dev/null 2>&1 && \
33 ! echo __clang__ | cc -E - | grep -q __clang__; then
34 # only clang with major version newer than 7 is supported
35 CLANG_MAJOR=`echo __clang_major__ | cc -E - | grep -o '^[[:digit:]]'`
36 if [ "$CLANG_MAJOR" -ge "7" ]; then
37 SUPPORT='y'
38 fi
39 fi
40 }
41
42 atf_test_case check_mem
43 check_mem_head() {
44 atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized interface"
45 atf_set "require.progs" "cc paxctl"
46 }
47
48 atf_test_case check_mem_profile
49 check_mem_profile_head() {
50 atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with profiling option"
51 atf_set "require.progs" "cc paxctl"
52 }
53 atf_test_case check_mem_pic
54 check_mem_pic_head() {
55 atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with position independent code (PIC) flag"
56 atf_set "require.progs" "cc paxctl"
57 }
58 atf_test_case check_mem_pie
59 check_mem_pie_head() {
60 atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with position independent execution (PIE) flag"
61 atf_set "require.progs" "cc paxctl"
62 }
63
64 check_mem_body(){
65 cat > test.c << EOF
66 #include <sanitizer/msan_interface.h>
67 #include <stdlib.h>
68
69 int main(int argc, char **argv) {
70 int *volatile p = (int *)malloc(sizeof(int));
71
72 __msan_check_mem_is_initialized(p, sizeof(*p));
73 return 0;
74 }
75 EOF
76
77 cc -fsanitize=memory -o test test.c
78 paxctl +a test
79 atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
80 }
81
82 check_mem_profile_body(){
83 cat > test.c << EOF
84 #include <sanitizer/msan_interface.h>
85 #include <stdlib.h>
86
87 int main(int argc, char **argv) {
88 int *volatile p = (int *)malloc(sizeof(int));
89
90 __msan_check_mem_is_initialized(p, sizeof(*p));
91 return 0;
92 }
93 EOF
94
95 cc -fsanitize=memory -static -o test -pg test.c
96 paxctl +a test
97 atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
98 }
99
100 check_mem_pic_body(){
101 cat > test.c << EOF
102 #include <stdio.h>
103 #include <stdlib.h>
104 int help(int);
105 int main(int argc, char **argv) {return help(argc);}
106 EOF
107
108 cat > pic.c << EOF
109 #include <sanitizer/msan_interface.h>
110 #include <stdlib.h>
111
112 int help(int argc) {
113 int *volatile p = (int *)malloc(sizeof(int));
114
115 __msan_check_mem_is_initialized(p, sizeof(*p));
116 return 0;
117 }
118 EOF
119
120 cc -fsanitize=memory -fPIC -shared -o libtest.so pic.c
121 cc -o test test.c -fsanitize=memory -L. -ltest
122 paxctl +a test
123
124 export LD_LIBRARY_PATH=.
125 atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
126 }
127 check_mem_pie_body(){
128
129 #check whether -pie flag is supported on this architecture
130 if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
131 atf_set_skip "cc -pie not supported on this architecture"
132 fi
133 cat > test.c << EOF
134 #include <sanitizer/msan_interface.h>
135 #include <stdlib.h>
136
137 int main(int argc, char **argv) {
138 int *volatile p = (int *)malloc(sizeof(int));
139
140 __msan_check_mem_is_initialized(p, sizeof(*p));
141 return 0;
142 }
143 EOF
144
145 cc -fsanitize=memory -o test -fpie -pie test.c
146 paxctl +a test
147 atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
148 }
149
150
151 atf_test_case target_not_supported
152 target_not_supported_head()
153 {
154 atf_set "descr" "Test forced skip"
155 }
156
157 target_not_supported_body()
158 {
159 atf_skip "Target is not supported"
160 }
161
162 atf_init_test_cases()
163 {
164 test_target
165 test $SUPPORT = 'n' && {
166 atf_add_test_case target_not_supported
167 return 0
168 }
169 atf_add_test_case check_mem
170 atf_add_test_case check_mem_profile
171 atf_add_test_case check_mem_pie
172 atf_add_test_case check_mem_pic
173 }
174