xref: /netbsd-src/tests/usr.bin/c++/t_msan_shadow.sh (revision 4bb9965c4810ecd9c59e6a3c0d9bfaeb7ab7b45c)
1f0720e69Skamil# Copyright (c) 2018 The NetBSD Foundation, Inc.
2f0720e69Skamil# All rights reserved.
3f0720e69Skamil#
4f0720e69Skamil# This code is derived from software contributed to The NetBSD Foundation
5f0720e69Skamil# by Yang Zheng.
6f0720e69Skamil#
7f0720e69Skamil# Redistribution and use in source and binary forms, with or without
8f0720e69Skamil# modification, are permitted provided that the following conditions
9f0720e69Skamil# are met:
10f0720e69Skamil# 1. Redistributions of source code must retain the above copyright
11f0720e69Skamil#    notice, this list of conditions and the following disclaimer.
12f0720e69Skamil# 2. Redistributions in binary form must reproduce the above copyright
13f0720e69Skamil#    notice, this list of conditions and the following disclaimer in the
14f0720e69Skamil#    documentation and/or other materials provided with the distribution.
15f0720e69Skamil#
16f0720e69Skamil# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17f0720e69Skamil# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18f0720e69Skamil# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19f0720e69Skamil# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20f0720e69Skamil# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21f0720e69Skamil# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22f0720e69Skamil# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23f0720e69Skamil# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24f0720e69Skamil# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25f0720e69Skamil# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26f0720e69Skamil# POSSIBILITY OF SUCH DAMAGE.
27f0720e69Skamil#
28f0720e69Skamil
29f0720e69Skamiltest_target()
30f0720e69Skamil{
31f0720e69Skamil	SUPPORT='n'
32f0720e69Skamil	if uname -m | grep -q "amd64" && command -v c++ >/dev/null 2>&1 && \
33f0720e69Skamil		   ! echo __clang__ | c++ -E - | grep -q __clang__; then
34f0720e69Skamil		# only clang with major version newer than 7 is supported
35f0720e69Skamil		CLANG_MAJOR=`echo __clang_major__ | c++ -E - | grep -o '^[[:digit:]]'`
36f0720e69Skamil		if [ "$CLANG_MAJOR" -ge "7" ]; then
37f0720e69Skamil			SUPPORT='y'
38f0720e69Skamil		fi
39f0720e69Skamil	fi
40f0720e69Skamil}
41f0720e69Skamil
42f0720e69Skamilatf_test_case shadow
43f0720e69Skamilshadow_head() {
44f0720e69Skamil	atf_set "descr" "Test memory sanitizer for shadow interface"
45f0720e69Skamil	atf_set "require.progs" "c++ paxctl"
46f0720e69Skamil}
47f0720e69Skamil
48f0720e69Skamilatf_test_case shadow_profile
49f0720e69Skamilshadow_profile_head() {
50f0720e69Skamil	atf_set "descr" "Test memory sanitizer for shadow with profiling option"
51f0720e69Skamil	atf_set "require.progs" "c++ paxctl"
52f0720e69Skamil}
53f0720e69Skamilatf_test_case shadow_pic
54f0720e69Skamilshadow_pic_head() {
55f0720e69Skamil	atf_set "descr" "Test memory sanitizer for shadow with position independent code (PIC) flag"
56f0720e69Skamil	atf_set "require.progs" "c++ paxctl"
57f0720e69Skamil}
58f0720e69Skamilatf_test_case shadow_pie
59f0720e69Skamilshadow_pie_head() {
60f0720e69Skamil	atf_set "descr" "Test memory sanitizer for shadow with position independent execution (PIE) flag"
61f0720e69Skamil	atf_set "require.progs" "c++ paxctl"
62f0720e69Skamil}
63f0720e69Skamil
64f0720e69Skamilshadow_body(){
65f0720e69Skamil	cat > test.cc << EOF
66f0720e69Skamil#include <stdio.h>
67f0720e69Skamil#include <stdlib.h>
68f0720e69Skamil#include <sanitizer/msan_interface.h>
69f0720e69Skamil
70f0720e69Skamilint main(int argc, char **argv) {
71f0720e69Skamil  char str[] = "abc";
72f0720e69Skamil  char str2[] = "cdefghi";
73f0720e69Skamil  __msan_poison(str + 2, 1);
74f0720e69Skamil  __msan_copy_shadow(str2 + 2, str, 4);
75f0720e69Skamil  printf("%ld\n", __msan_test_shadow(str, 4));
76f0720e69Skamil  __msan_print_shadow(str2, 8);
77f0720e69Skamil  return 0;
78f0720e69Skamil}
79f0720e69SkamilEOF
80f0720e69Skamil
81f0720e69Skamil	c++ -fsanitize=memory -o test test.cc
82f0720e69Skamil	paxctl +a test
83f0720e69Skamil	atf_check -s ignore -o match:"2" -e match:"00000000 ff000000" ./test
84f0720e69Skamil}
85f0720e69Skamil
86f0720e69Skamilshadow_profile_body(){
87f0720e69Skamil	cat > test.cc << EOF
88f0720e69Skamil#include <stdio.h>
89f0720e69Skamil#include <stdlib.h>
90f0720e69Skamil#include <sanitizer/msan_interface.h>
91f0720e69Skamil
92f0720e69Skamilint main(int argc, char **argv) {
93f0720e69Skamil  char str[] = "abc";
94f0720e69Skamil  char str2[] = "cdefghi";
95f0720e69Skamil  __msan_poison(str + 2, 1);
96f0720e69Skamil  __msan_copy_shadow(str2 + 2, str, 4);
97f0720e69Skamil  printf("%ld\n", __msan_test_shadow(str, 4));
98f0720e69Skamil  __msan_print_shadow(str2, 8);
99f0720e69Skamil  return 0;
100f0720e69Skamil}
101f0720e69SkamilEOF
102f0720e69Skamil
103*4bb9965cSskrll	c++ -fsanitize=memory -static -o test -pg test.cc
104f0720e69Skamil	paxctl +a test
105f0720e69Skamil	atf_check -s ignore -o match:"2" -e match:"00000000 ff000000" ./test
106f0720e69Skamil}
107f0720e69Skamil
108f0720e69Skamilshadow_pic_body(){
109f0720e69Skamil	cat > test.cc << EOF
110f0720e69Skamil#include <stdio.h>
111f0720e69Skamil#include <stdlib.h>
112f0720e69Skamilint help(int);
113f0720e69Skamilint main(int argc, char **argv) {return help(argc);}
114f0720e69SkamilEOF
115f0720e69Skamil
116f0720e69Skamil	cat > pic.cc << EOF
117f0720e69Skamil#include <stdio.h>
118f0720e69Skamil#include <stdlib.h>
119f0720e69Skamil#include <sanitizer/msan_interface.h>
120f0720e69Skamil
121f0720e69Skamilint help(int argc) {
122f0720e69Skamil  char str[] = "abc";
123f0720e69Skamil  char str2[] = "cdefghi";
124f0720e69Skamil  __msan_poison(str + 2, 1);
125f0720e69Skamil  __msan_copy_shadow(str2 + 2, str, 4);
126f0720e69Skamil  printf("%ld\n", __msan_test_shadow(str, 4));
127f0720e69Skamil  __msan_print_shadow(str2, 8);
128f0720e69Skamil  return 0;
129f0720e69Skamil}
130f0720e69SkamilEOF
131f0720e69Skamil
132f0720e69Skamil	c++ -fsanitize=memory -fPIC -shared -o libtest.so pic.cc
133f0720e69Skamil	c++ -o test test.cc -fsanitize=memory -L. -ltest
134f0720e69Skamil	paxctl +a test
135f0720e69Skamil
136f0720e69Skamil	export LD_LIBRARY_PATH=.
137f0720e69Skamil	atf_check -s ignore -o match:"2" -e match:"00000000 ff000000" ./test
138f0720e69Skamil}
139f0720e69Skamilshadow_pie_body(){
140f0720e69Skamil
141f0720e69Skamil	#check whether -pie flag is supported on this architecture
142f0720e69Skamil	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
143f0720e69Skamil		atf_set_skip "c++ -pie not supported on this architecture"
144f0720e69Skamil	fi
145f0720e69Skamil	cat > test.cc << EOF
146f0720e69Skamil#include <stdio.h>
147f0720e69Skamil#include <stdlib.h>
148f0720e69Skamil#include <sanitizer/msan_interface.h>
149f0720e69Skamil
150f0720e69Skamilint main(int argc, char **argv) {
151f0720e69Skamil  char str[] = "abc";
152f0720e69Skamil  char str2[] = "cdefghi";
153f0720e69Skamil  __msan_poison(str + 2, 1);
154f0720e69Skamil  __msan_copy_shadow(str2 + 2, str, 4);
155f0720e69Skamil  printf("%ld\n", __msan_test_shadow(str, 4));
156f0720e69Skamil  __msan_print_shadow(str2, 8);
157f0720e69Skamil  return 0;
158f0720e69Skamil}
159f0720e69SkamilEOF
160f0720e69Skamil
161f0720e69Skamil	c++ -fsanitize=memory -o test -fpie -pie test.cc
162f0720e69Skamil	paxctl +a test
163f0720e69Skamil	atf_check -s ignore -o match:"2" -e match:"00000000 ff000000" ./test
164f0720e69Skamil}
165f0720e69Skamil
166f0720e69Skamilatf_test_case target_not_supported
167f0720e69Skamiltarget_not_supported_head()
168f0720e69Skamil{
169f0720e69Skamil	atf_set "descr" "Test forced skip"
170f0720e69Skamil}
171f0720e69Skamil
1725612f2caSkamiltarget_not_supported_body()
1735612f2caSkamil{
1745612f2caSkamil	atf_skip "Target is not supported"
1755612f2caSkamil}
1765612f2caSkamil
177f0720e69Skamilatf_init_test_cases()
178f0720e69Skamil{
179f0720e69Skamil	test_target
180f0720e69Skamil	test $SUPPORT = 'n' && {
181f0720e69Skamil		atf_add_test_case target_not_supported
182f0720e69Skamil		return 0
183f0720e69Skamil	}
184f0720e69Skamil	atf_add_test_case shadow
185f0720e69Skamil	atf_add_test_case shadow_profile
186f0720e69Skamil	atf_add_test_case shadow_pie
187f0720e69Skamil	atf_add_test_case shadow_pic
188f0720e69Skamil}
189