xref: /netbsd-src/tests/usr.bin/c++/t_tsan_heap_use_after_free.sh (revision 4bb9965c4810ecd9c59e6a3c0d9bfaeb7ab7b45c)
1f0720e69Skamil# Copyright (c) 2018 The NetBSD Foundation, Inc.
2f0720e69Skamil# All rights reserved.
3f0720e69Skamil#
4f0720e69Skamil# This code is derived from software contributed to The NetBSD Foundation
5f0720e69Skamil# by Yang Zheng.
6f0720e69Skamil#
7f0720e69Skamil# Redistribution and use in source and binary forms, with or without
8f0720e69Skamil# modification, are permitted provided that the following conditions
9f0720e69Skamil# are met:
10f0720e69Skamil# 1. Redistributions of source code must retain the above copyright
11f0720e69Skamil#    notice, this list of conditions and the following disclaimer.
12f0720e69Skamil# 2. Redistributions in binary form must reproduce the above copyright
13f0720e69Skamil#    notice, this list of conditions and the following disclaimer in the
14f0720e69Skamil#    documentation and/or other materials provided with the distribution.
15f0720e69Skamil#
16f0720e69Skamil# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17f0720e69Skamil# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18f0720e69Skamil# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19f0720e69Skamil# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20f0720e69Skamil# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21f0720e69Skamil# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22f0720e69Skamil# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23f0720e69Skamil# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24f0720e69Skamil# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25f0720e69Skamil# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26f0720e69Skamil# POSSIBILITY OF SUCH DAMAGE.
27f0720e69Skamil#
28f0720e69Skamil
29af164454Smartintsan_available_archs()
30af164454Smartin{
31af164454Smartin	atf_set "require.arch" "x86_64"
32af164454Smartin}
33af164454Smartin
34f0720e69Skamiltest_target()
35f0720e69Skamil{
36f0720e69Skamil	SUPPORT='n'
372062795bSkamil	# Detect address space larger than 32 bits
382062795bSkamil	maxaddress=`sysctl vm.maxaddress|awk '{print $3}'`
392062795bSkamil	if [ $maxaddress -gt 4294967295 ]; then
402062795bSkamil		if command -v cc >/dev/null 2>&1; then
412062795bSkamil			if ! echo __clang__ | cc -E - | grep -q __clang__; then
42f0720e69Skamil				SUPPORT='y'
432062795bSkamil			elif ! cc -v 2>&1 | awk '/gcc version/{print $3}' | \
442062795bSkamil				awk -F '.' '($0+0) > 9 {exit 1}'; then
452062795bSkamil				SUPPORT='y'
462062795bSkamil			fi
47f0720e69Skamil		fi
48f0720e69Skamil	fi
49f0720e69Skamil}
50f0720e69Skamil
51f0720e69Skamilatf_test_case heap_use_after_free
52f0720e69Skamilheap_use_after_free_head() {
53f0720e69Skamil	atf_set "descr" "Test thread sanitizer for use-after-free condition"
54f0720e69Skamil	atf_set "require.progs" "c++ paxctl"
55af164454Smartin	tsan_available_archs
56f0720e69Skamil}
57f0720e69Skamil
58f0720e69Skamilatf_test_case heap_use_after_free_profile
59f0720e69Skamilheap_use_after_free_profile_head() {
60f0720e69Skamil	atf_set "descr" "Test thread sanitizer for use-after-free with profiling option"
61f0720e69Skamil	atf_set "require.progs" "c++ paxctl"
62af164454Smartin	tsan_available_archs
63f0720e69Skamil}
64f0720e69Skamilatf_test_case heap_use_after_free_pic
65f0720e69Skamilheap_use_after_free_pic_head() {
66f0720e69Skamil	atf_set "descr" "Test thread sanitizer for use-after-free with position independent code (PIC) flag"
67f0720e69Skamil	atf_set "require.progs" "c++ paxctl"
68af164454Smartin	tsan_available_archs
69f0720e69Skamil}
70f0720e69Skamilatf_test_case heap_use_after_free_pie
71f0720e69Skamilheap_use_after_free_pie_head() {
72f0720e69Skamil	atf_set "descr" "Test thread sanitizer for use-after-free with position independent execution (PIE) flag"
73f0720e69Skamil	atf_set "require.progs" "c++ paxctl"
74af164454Smartin	tsan_available_archs
75f0720e69Skamil}
76f0720e69Skamil
77f0720e69Skamilheap_use_after_free_body(){
78f0720e69Skamil	cat > test.cc << EOF
79f0720e69Skamil#include <pthread.h>
80f0720e69Skamil#include <stdlib.h>
81f0720e69Skamil
82f0720e69Skamilint *ptr;
83f0720e69Skamilpthread_barrier_t barrier;
84f0720e69Skamilvoid *Thread(void *a) {
85f0720e69Skamil  pthread_barrier_wait(&barrier);
86f0720e69Skamil  *ptr = 42;
87f0720e69Skamil  return 0;
88f0720e69Skamil}
89f0720e69Skamil
90f0720e69Skamilint main() {
91f0720e69Skamil  pthread_t t;
92f0720e69Skamil  pthread_barrier_init(&barrier, NULL, 2);
93f0720e69Skamil  ptr = (int *)malloc(sizeof(int));
94f0720e69Skamil  pthread_create(&t, NULL, Thread, NULL);
95f0720e69Skamil  free(ptr);
96f0720e69Skamil  pthread_barrier_wait(&barrier);
97f0720e69Skamil  pthread_join(t, NULL);
98f0720e69Skamil  return 0;
99f0720e69Skamil}
100f0720e69SkamilEOF
101f0720e69Skamil
102f0720e69Skamil	c++ -fsanitize=thread -o test test.cc
103f0720e69Skamil	paxctl +a test
104f0720e69Skamil	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test
105f0720e69Skamil}
106f0720e69Skamil
107f0720e69Skamilheap_use_after_free_profile_body(){
108b1909191Sgson	atf_expect_fail "PR toolchain/55760"
109f0720e69Skamil	cat > test.cc << EOF
110f0720e69Skamil#include <pthread.h>
111f0720e69Skamil#include <stdlib.h>
112f0720e69Skamil
113f0720e69Skamilint *ptr;
114f0720e69Skamilpthread_barrier_t barrier;
115f0720e69Skamilvoid *Thread(void *a) {
116f0720e69Skamil  pthread_barrier_wait(&barrier);
117f0720e69Skamil  *ptr = 42;
118f0720e69Skamil  return 0;
119f0720e69Skamil}
120f0720e69Skamil
121f0720e69Skamilint main() {
122f0720e69Skamil  pthread_t t;
123f0720e69Skamil  pthread_barrier_init(&barrier, NULL, 2);
124f0720e69Skamil  ptr = (int *)malloc(sizeof(int));
125f0720e69Skamil  pthread_create(&t, NULL, Thread, NULL);
126f0720e69Skamil  free(ptr);
127f0720e69Skamil  pthread_barrier_wait(&barrier);
128f0720e69Skamil  pthread_join(t, NULL);
129f0720e69Skamil  return 0;
130f0720e69Skamil}
131f0720e69SkamilEOF
132f0720e69Skamil
133*4bb9965cSskrll	c++ -fsanitize=thread -static -o test -pg test.cc
134f0720e69Skamil	paxctl +a test
135f0720e69Skamil	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test
136f0720e69Skamil}
137f0720e69Skamil
138f0720e69Skamilheap_use_after_free_pic_body(){
139f0720e69Skamil	cat > test.cc << EOF
140f0720e69Skamil#include <stdio.h>
141f0720e69Skamil#include <stdlib.h>
142f0720e69Skamilint help(int);
143f0720e69Skamilint main(int argc, char **argv) {return help(argc);}
144f0720e69SkamilEOF
145f0720e69Skamil
146f0720e69Skamil	cat > pic.cc << EOF
147f0720e69Skamil#include <pthread.h>
148f0720e69Skamil#include <stdlib.h>
149f0720e69Skamil
150f0720e69Skamilint *ptr;
151f0720e69Skamilpthread_barrier_t barrier;
152f0720e69Skamilvoid *Thread(void *a) {
153f0720e69Skamil  pthread_barrier_wait(&barrier);
154f0720e69Skamil  *ptr = 42;
155f0720e69Skamil  return 0;
156f0720e69Skamil}
157f0720e69Skamil
158f0720e69Skamilint help(int argc) {
159f0720e69Skamil  pthread_t t;
160f0720e69Skamil  pthread_barrier_init(&barrier, NULL, 2);
161f0720e69Skamil  ptr = (int *)malloc(sizeof(int));
162f0720e69Skamil  pthread_create(&t, NULL, Thread, NULL);
163f0720e69Skamil  free(ptr);
164f0720e69Skamil  pthread_barrier_wait(&barrier);
165f0720e69Skamil  pthread_join(t, NULL);
166f0720e69Skamil  return 0;
167f0720e69Skamil}
168f0720e69SkamilEOF
169f0720e69Skamil
170f0720e69Skamil	c++ -fsanitize=thread -fPIC -shared -o libtest.so pic.cc
171f0720e69Skamil	c++ -o test test.cc -fsanitize=thread -L. -ltest
172f0720e69Skamil	paxctl +a test
173f0720e69Skamil
174f0720e69Skamil	export LD_LIBRARY_PATH=.
175f0720e69Skamil	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test
176f0720e69Skamil}
177f0720e69Skamilheap_use_after_free_pie_body(){
178f0720e69Skamil
179f0720e69Skamil	#check whether -pie flag is supported on this architecture
180f0720e69Skamil	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
181f0720e69Skamil		atf_set_skip "c++ -pie not supported on this architecture"
182f0720e69Skamil	fi
183f0720e69Skamil	cat > test.cc << EOF
184f0720e69Skamil#include <pthread.h>
185f0720e69Skamil#include <stdlib.h>
186f0720e69Skamil
187f0720e69Skamilint *ptr;
188f0720e69Skamilpthread_barrier_t barrier;
189f0720e69Skamilvoid *Thread(void *a) {
190f0720e69Skamil  pthread_barrier_wait(&barrier);
191f0720e69Skamil  *ptr = 42;
192f0720e69Skamil  return 0;
193f0720e69Skamil}
194f0720e69Skamil
195f0720e69Skamilint main() {
196f0720e69Skamil  pthread_t t;
197f0720e69Skamil  pthread_barrier_init(&barrier, NULL, 2);
198f0720e69Skamil  ptr = (int *)malloc(sizeof(int));
199f0720e69Skamil  pthread_create(&t, NULL, Thread, NULL);
200f0720e69Skamil  free(ptr);
201f0720e69Skamil  pthread_barrier_wait(&barrier);
202f0720e69Skamil  pthread_join(t, NULL);
203f0720e69Skamil  return 0;
204f0720e69Skamil}
205f0720e69SkamilEOF
206f0720e69Skamil
207f0720e69Skamil	c++ -fsanitize=thread -o test -fpie -pie test.cc
208f0720e69Skamil	paxctl +a test
209f0720e69Skamil	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test
210f0720e69Skamil}
211f0720e69Skamil
212f0720e69Skamil
213f0720e69Skamilatf_init_test_cases()
214f0720e69Skamil{
215f0720e69Skamil	atf_add_test_case heap_use_after_free
216f0720e69Skamil	atf_add_test_case heap_use_after_free_profile
217f0720e69Skamil	atf_add_test_case heap_use_after_free_pie
218f0720e69Skamil	atf_add_test_case heap_use_after_free_pic
219f0720e69Skamil}
220