xref: /netbsd-src/tests/usr.bin/cc/t_msan_check_mem.sh (revision 154bfe8e089c1a0a4e9ed8414f08d3da90949162)
1# Copyright (c) 2018 The NetBSD Foundation, Inc.
2# All rights reserved.
3#
4# This code is derived from software contributed to The NetBSD Foundation
5# by Yang Zheng.
6#
7# Redistribution and use in source and binary forms, with or without
8# modification, are permitted provided that the following conditions
9# are met:
10# 1. Redistributions of source code must retain the above copyright
11#    notice, this list of conditions and the following disclaimer.
12# 2. Redistributions in binary form must reproduce the above copyright
13#    notice, this list of conditions and the following disclaimer in the
14#    documentation and/or other materials provided with the distribution.
15#
16# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26# POSSIBILITY OF SUCH DAMAGE.
27#
28
29test_target()
30{
31	SUPPORT='n'
32	if uname -m | grep -q "amd64" && command -v cc >/dev/null 2>&1 && \
33		   ! echo __clang__ | cc -E - | grep -q __clang__; then
34		# only clang with major version newer than 7 is supported
35		CLANG_MAJOR=`echo __clang_major__ | cc -E - | grep -o '^[[:digit:]]'`
36		if [ "$CLANG_MAJOR" -ge "7" ]; then
37			SUPPORT='y'
38		fi
39	fi
40}
41
42atf_test_case check_mem
43check_mem_head() {
44	atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized interface"
45	atf_set "require.progs" "cc paxctl"
46}
47
48atf_test_case check_mem_profile
49check_mem_profile_head() {
50	atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with profiling option"
51	atf_set "require.progs" "cc paxctl"
52}
53atf_test_case check_mem_pic
54check_mem_pic_head() {
55	atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with position independent code (PIC) flag"
56	atf_set "require.progs" "cc paxctl"
57}
58atf_test_case check_mem_pie
59check_mem_pie_head() {
60	atf_set "descr" "Test memory sanitizer for __msan_check_mem_is_initialized with position independent execution (PIE) flag"
61	atf_set "require.progs" "cc paxctl"
62}
63
64check_mem_body(){
65	cat > test.c << EOF
66#include <sanitizer/msan_interface.h>
67#include <stdlib.h>
68
69int main(int argc, char **argv) {
70  int *volatile p = (int *)malloc(sizeof(int));
71
72  __msan_check_mem_is_initialized(p, sizeof(*p));
73  return 0;
74}
75EOF
76
77	cc -fsanitize=memory -o test test.c
78	paxctl +a test
79	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
80}
81
82check_mem_profile_body(){
83	cat > test.c << EOF
84#include <sanitizer/msan_interface.h>
85#include <stdlib.h>
86
87int main(int argc, char **argv) {
88  int *volatile p = (int *)malloc(sizeof(int));
89
90  __msan_check_mem_is_initialized(p, sizeof(*p));
91  return 0;
92}
93EOF
94
95	cc -fsanitize=memory -o test -pg test.c
96	paxctl +a test
97	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
98}
99
100check_mem_pic_body(){
101	cat > test.c << EOF
102#include <stdio.h>
103#include <stdlib.h>
104int help(int);
105int main(int argc, char **argv) {return help(argc);}
106EOF
107
108	cat > pic.c << EOF
109#include <sanitizer/msan_interface.h>
110#include <stdlib.h>
111
112int help(int argc) {
113  int *volatile p = (int *)malloc(sizeof(int));
114
115  __msan_check_mem_is_initialized(p, sizeof(*p));
116  return 0;
117}
118EOF
119
120	cc -fsanitize=memory -fPIC -shared -o libtest.so pic.c
121	cc -o test test.c -fsanitize=memory -L. -ltest
122	paxctl +a test
123
124	export LD_LIBRARY_PATH=.
125	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
126}
127check_mem_pie_body(){
128
129	#check whether -pie flag is supported on this architecture
130	if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
131		atf_set_skip "cc -pie not supported on this architecture"
132	fi
133	cat > test.c << EOF
134#include <sanitizer/msan_interface.h>
135#include <stdlib.h>
136
137int main(int argc, char **argv) {
138  int *volatile p = (int *)malloc(sizeof(int));
139
140  __msan_check_mem_is_initialized(p, sizeof(*p));
141  return 0;
142}
143EOF
144
145	cc -fsanitize=memory -o test -fpie -pie test.c
146	paxctl +a test
147	atf_check -s ignore -o ignore -e match:"Uninitialized bytes in __msan_check_mem_is_initialized at offset 0 inside" ./test
148}
149
150
151atf_test_case target_not_supported
152target_not_supported_head()
153{
154	atf_set "descr" "Test forced skip"
155}
156
157target_not_supported_body()
158{
159	atf_skip "Target is not supported"
160}
161
162atf_init_test_cases()
163{
164	test_target
165	test $SUPPORT = 'n' && {
166		atf_add_test_case target_not_supported
167		return 0
168	}
169	atf_add_test_case check_mem
170	atf_add_test_case check_mem_profile
171	atf_add_test_case check_mem_pie
172	atf_add_test_case check_mem_pic
173}
174