1f0720e69Skamil# Copyright (c) 2018 The NetBSD Foundation, Inc. 2f0720e69Skamil# All rights reserved. 3f0720e69Skamil# 4f0720e69Skamil# This code is derived from software contributed to The NetBSD Foundation 5f0720e69Skamil# by Yang Zheng. 6f0720e69Skamil# 7f0720e69Skamil# Redistribution and use in source and binary forms, with or without 8f0720e69Skamil# modification, are permitted provided that the following conditions 9f0720e69Skamil# are met: 10f0720e69Skamil# 1. Redistributions of source code must retain the above copyright 11f0720e69Skamil# notice, this list of conditions and the following disclaimer. 12f0720e69Skamil# 2. Redistributions in binary form must reproduce the above copyright 13f0720e69Skamil# notice, this list of conditions and the following disclaimer in the 14f0720e69Skamil# documentation and/or other materials provided with the distribution. 15f0720e69Skamil# 16f0720e69Skamil# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 17f0720e69Skamil# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 18f0720e69Skamil# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 19f0720e69Skamil# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 20f0720e69Skamil# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 21f0720e69Skamil# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 22f0720e69Skamil# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 23f0720e69Skamil# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 24f0720e69Skamil# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 25f0720e69Skamil# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 26f0720e69Skamil# POSSIBILITY OF SUCH DAMAGE. 27f0720e69Skamil# 28f0720e69Skamil 29af164454Smartintsan_available_archs() 30af164454Smartin{ 31af164454Smartin atf_set "require.arch" "x86_64" 32af164454Smartin} 33af164454Smartin 34f0720e69Skamiltest_target() 35f0720e69Skamil{ 36f0720e69Skamil SUPPORT='n' 372062795bSkamil # Detect address space larger than 32 bits 382062795bSkamil maxaddress=`sysctl vm.maxaddress|awk '{print $3}'` 392062795bSkamil if [ $maxaddress -gt 4294967295 ]; then 402062795bSkamil if command -v cc >/dev/null 2>&1; then 412062795bSkamil if ! echo __clang__ | cc -E - | grep -q __clang__; then 42f0720e69Skamil SUPPORT='y' 432062795bSkamil elif ! cc -v 2>&1 | awk '/gcc version/{print $3}' | \ 442062795bSkamil awk -F '.' '($0+0) > 9 {exit 1}'; then 452062795bSkamil SUPPORT='y' 462062795bSkamil fi 47f0720e69Skamil fi 48f0720e69Skamil fi 49f0720e69Skamil} 50f0720e69Skamil 51f0720e69Skamilatf_test_case heap_use_after_free 52f0720e69Skamilheap_use_after_free_head() { 53f0720e69Skamil atf_set "descr" "Test thread sanitizer for use-after-free condition" 54f0720e69Skamil atf_set "require.progs" "c++ paxctl" 55af164454Smartin tsan_available_archs 56f0720e69Skamil} 57f0720e69Skamil 58f0720e69Skamilatf_test_case heap_use_after_free_profile 59f0720e69Skamilheap_use_after_free_profile_head() { 60f0720e69Skamil atf_set "descr" "Test thread sanitizer for use-after-free with profiling option" 61f0720e69Skamil atf_set "require.progs" "c++ paxctl" 62af164454Smartin tsan_available_archs 63f0720e69Skamil} 64f0720e69Skamilatf_test_case heap_use_after_free_pic 65f0720e69Skamilheap_use_after_free_pic_head() { 66f0720e69Skamil atf_set "descr" "Test thread sanitizer for use-after-free with position independent code (PIC) flag" 67f0720e69Skamil atf_set "require.progs" "c++ paxctl" 68af164454Smartin tsan_available_archs 69f0720e69Skamil} 70f0720e69Skamilatf_test_case heap_use_after_free_pie 71f0720e69Skamilheap_use_after_free_pie_head() { 72f0720e69Skamil atf_set "descr" "Test thread sanitizer for use-after-free with position independent execution (PIE) flag" 73f0720e69Skamil atf_set "require.progs" "c++ paxctl" 74af164454Smartin tsan_available_archs 75f0720e69Skamil} 76f0720e69Skamil 77f0720e69Skamilheap_use_after_free_body(){ 78f0720e69Skamil cat > test.cc << EOF 79f0720e69Skamil#include <pthread.h> 80f0720e69Skamil#include <stdlib.h> 81f0720e69Skamil 82f0720e69Skamilint *ptr; 83f0720e69Skamilpthread_barrier_t barrier; 84f0720e69Skamilvoid *Thread(void *a) { 85f0720e69Skamil pthread_barrier_wait(&barrier); 86f0720e69Skamil *ptr = 42; 87f0720e69Skamil return 0; 88f0720e69Skamil} 89f0720e69Skamil 90f0720e69Skamilint main() { 91f0720e69Skamil pthread_t t; 92f0720e69Skamil pthread_barrier_init(&barrier, NULL, 2); 93f0720e69Skamil ptr = (int *)malloc(sizeof(int)); 94f0720e69Skamil pthread_create(&t, NULL, Thread, NULL); 95f0720e69Skamil free(ptr); 96f0720e69Skamil pthread_barrier_wait(&barrier); 97f0720e69Skamil pthread_join(t, NULL); 98f0720e69Skamil return 0; 99f0720e69Skamil} 100f0720e69SkamilEOF 101f0720e69Skamil 102f0720e69Skamil c++ -fsanitize=thread -o test test.cc 103f0720e69Skamil paxctl +a test 104f0720e69Skamil atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test 105f0720e69Skamil} 106f0720e69Skamil 107f0720e69Skamilheap_use_after_free_profile_body(){ 108b1909191Sgson atf_expect_fail "PR toolchain/55760" 109f0720e69Skamil cat > test.cc << EOF 110f0720e69Skamil#include <pthread.h> 111f0720e69Skamil#include <stdlib.h> 112f0720e69Skamil 113f0720e69Skamilint *ptr; 114f0720e69Skamilpthread_barrier_t barrier; 115f0720e69Skamilvoid *Thread(void *a) { 116f0720e69Skamil pthread_barrier_wait(&barrier); 117f0720e69Skamil *ptr = 42; 118f0720e69Skamil return 0; 119f0720e69Skamil} 120f0720e69Skamil 121f0720e69Skamilint main() { 122f0720e69Skamil pthread_t t; 123f0720e69Skamil pthread_barrier_init(&barrier, NULL, 2); 124f0720e69Skamil ptr = (int *)malloc(sizeof(int)); 125f0720e69Skamil pthread_create(&t, NULL, Thread, NULL); 126f0720e69Skamil free(ptr); 127f0720e69Skamil pthread_barrier_wait(&barrier); 128f0720e69Skamil pthread_join(t, NULL); 129f0720e69Skamil return 0; 130f0720e69Skamil} 131f0720e69SkamilEOF 132f0720e69Skamil 133*4bb9965cSskrll c++ -fsanitize=thread -static -o test -pg test.cc 134f0720e69Skamil paxctl +a test 135f0720e69Skamil atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test 136f0720e69Skamil} 137f0720e69Skamil 138f0720e69Skamilheap_use_after_free_pic_body(){ 139f0720e69Skamil cat > test.cc << EOF 140f0720e69Skamil#include <stdio.h> 141f0720e69Skamil#include <stdlib.h> 142f0720e69Skamilint help(int); 143f0720e69Skamilint main(int argc, char **argv) {return help(argc);} 144f0720e69SkamilEOF 145f0720e69Skamil 146f0720e69Skamil cat > pic.cc << EOF 147f0720e69Skamil#include <pthread.h> 148f0720e69Skamil#include <stdlib.h> 149f0720e69Skamil 150f0720e69Skamilint *ptr; 151f0720e69Skamilpthread_barrier_t barrier; 152f0720e69Skamilvoid *Thread(void *a) { 153f0720e69Skamil pthread_barrier_wait(&barrier); 154f0720e69Skamil *ptr = 42; 155f0720e69Skamil return 0; 156f0720e69Skamil} 157f0720e69Skamil 158f0720e69Skamilint help(int argc) { 159f0720e69Skamil pthread_t t; 160f0720e69Skamil pthread_barrier_init(&barrier, NULL, 2); 161f0720e69Skamil ptr = (int *)malloc(sizeof(int)); 162f0720e69Skamil pthread_create(&t, NULL, Thread, NULL); 163f0720e69Skamil free(ptr); 164f0720e69Skamil pthread_barrier_wait(&barrier); 165f0720e69Skamil pthread_join(t, NULL); 166f0720e69Skamil return 0; 167f0720e69Skamil} 168f0720e69SkamilEOF 169f0720e69Skamil 170f0720e69Skamil c++ -fsanitize=thread -fPIC -shared -o libtest.so pic.cc 171f0720e69Skamil c++ -o test test.cc -fsanitize=thread -L. -ltest 172f0720e69Skamil paxctl +a test 173f0720e69Skamil 174f0720e69Skamil export LD_LIBRARY_PATH=. 175f0720e69Skamil atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test 176f0720e69Skamil} 177f0720e69Skamilheap_use_after_free_pie_body(){ 178f0720e69Skamil 179f0720e69Skamil #check whether -pie flag is supported on this architecture 180f0720e69Skamil if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 181f0720e69Skamil atf_set_skip "c++ -pie not supported on this architecture" 182f0720e69Skamil fi 183f0720e69Skamil cat > test.cc << EOF 184f0720e69Skamil#include <pthread.h> 185f0720e69Skamil#include <stdlib.h> 186f0720e69Skamil 187f0720e69Skamilint *ptr; 188f0720e69Skamilpthread_barrier_t barrier; 189f0720e69Skamilvoid *Thread(void *a) { 190f0720e69Skamil pthread_barrier_wait(&barrier); 191f0720e69Skamil *ptr = 42; 192f0720e69Skamil return 0; 193f0720e69Skamil} 194f0720e69Skamil 195f0720e69Skamilint main() { 196f0720e69Skamil pthread_t t; 197f0720e69Skamil pthread_barrier_init(&barrier, NULL, 2); 198f0720e69Skamil ptr = (int *)malloc(sizeof(int)); 199f0720e69Skamil pthread_create(&t, NULL, Thread, NULL); 200f0720e69Skamil free(ptr); 201f0720e69Skamil pthread_barrier_wait(&barrier); 202f0720e69Skamil pthread_join(t, NULL); 203f0720e69Skamil return 0; 204f0720e69Skamil} 205f0720e69SkamilEOF 206f0720e69Skamil 207f0720e69Skamil c++ -fsanitize=thread -o test -fpie -pie test.cc 208f0720e69Skamil paxctl +a test 209f0720e69Skamil atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: heap-use-after-free" ./test 210f0720e69Skamil} 211f0720e69Skamil 212f0720e69Skamil 213f0720e69Skamilatf_init_test_cases() 214f0720e69Skamil{ 215f0720e69Skamil atf_add_test_case heap_use_after_free 216f0720e69Skamil atf_add_test_case heap_use_after_free_profile 217f0720e69Skamil atf_add_test_case heap_use_after_free_pie 218f0720e69Skamil atf_add_test_case heap_use_after_free_pic 219f0720e69Skamil} 220