1fdb6b69dSkamil# Copyright (c) 2018 The NetBSD Foundation, Inc. 2fdb6b69dSkamil# All rights reserved. 3fdb6b69dSkamil# 4fdb6b69dSkamil# This code is derived from software contributed to The NetBSD Foundation 5fdb6b69dSkamil# by Yang Zheng. 6fdb6b69dSkamil# 7fdb6b69dSkamil# Redistribution and use in source and binary forms, with or without 8fdb6b69dSkamil# modification, are permitted provided that the following conditions 9fdb6b69dSkamil# are met: 10fdb6b69dSkamil# 1. Redistributions of source code must retain the above copyright 11fdb6b69dSkamil# notice, this list of conditions and the following disclaimer. 12fdb6b69dSkamil# 2. Redistributions in binary form must reproduce the above copyright 13fdb6b69dSkamil# notice, this list of conditions and the following disclaimer in the 14fdb6b69dSkamil# documentation and/or other materials provided with the distribution. 15fdb6b69dSkamil# 16fdb6b69dSkamil# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 17fdb6b69dSkamil# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 18fdb6b69dSkamil# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 19fdb6b69dSkamil# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 20fdb6b69dSkamil# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 21fdb6b69dSkamil# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 22fdb6b69dSkamil# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 23fdb6b69dSkamil# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 24fdb6b69dSkamil# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 25fdb6b69dSkamil# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 26fdb6b69dSkamil# POSSIBILITY OF SUCH DAMAGE. 27fdb6b69dSkamil# 28fdb6b69dSkamil 29fdb6b69dSkamiltest_target() 30fdb6b69dSkamil{ 31fdb6b69dSkamil SUPPORT='n' 32fdb6b69dSkamil if uname -m | grep -q "amd64" && command -v c++ >/dev/null 2>&1 && \ 33fdb6b69dSkamil ! echo __clang__ | c++ -E - | grep -q __clang__; then 34fdb6b69dSkamil # only clang with major version newer than 7 is supported 35fdb6b69dSkamil CLANG_MAJOR=`echo __clang_major__ | c++ -E - | grep -o '^[[:digit:]]'` 36fdb6b69dSkamil if [ "$CLANG_MAJOR" -ge "7" ]; then 37fdb6b69dSkamil SUPPORT='y' 38fdb6b69dSkamil fi 39fdb6b69dSkamil fi 40fdb6b69dSkamil} 41fdb6b69dSkamil 42fdb6b69dSkamilatf_test_case realloc 43fdb6b69dSkamilrealloc_head() { 44fdb6b69dSkamil atf_set "descr" "Test memory sanitizer for realloc" 45fdb6b69dSkamil atf_set "require.progs" "c++ paxctl" 46fdb6b69dSkamil} 47fdb6b69dSkamil 48fdb6b69dSkamilatf_test_case realloc_profile 49fdb6b69dSkamilrealloc_profile_head() { 50fdb6b69dSkamil atf_set "descr" "Test memory sanitizer for realloc with profiling option" 51fdb6b69dSkamil atf_set "require.progs" "c++ paxctl" 52fdb6b69dSkamil} 53fdb6b69dSkamilatf_test_case realloc_pic 54fdb6b69dSkamilrealloc_pic_head() { 55fdb6b69dSkamil atf_set "descr" "Test memory sanitizer for realloc with position independent code (PIC) flag" 56fdb6b69dSkamil atf_set "require.progs" "c++ paxctl" 57fdb6b69dSkamil} 58fdb6b69dSkamilatf_test_case realloc_pie 59fdb6b69dSkamilrealloc_pie_head() { 60fdb6b69dSkamil atf_set "descr" "Test memory sanitizer for realloc with position independent execution (PIE) flag" 61fdb6b69dSkamil atf_set "require.progs" "c++ paxctl" 62fdb6b69dSkamil} 63fdb6b69dSkamil 64fdb6b69dSkamilrealloc_body(){ 65fdb6b69dSkamil cat > test.cc << EOF 66fdb6b69dSkamil#include <stdlib.h> 67fdb6b69dSkamilint main(int argc, char **argv) { 68fdb6b69dSkamil char *p = (char *)malloc(100); 69fdb6b69dSkamil p = (char *)realloc(p, 10000); 70fdb6b69dSkamil char x = p[50]; 71fdb6b69dSkamil free(p); 72fdb6b69dSkamil return x; 73fdb6b69dSkamil} 74fdb6b69dSkamilEOF 75fdb6b69dSkamil 76fdb6b69dSkamil c++ -fsanitize=memory -o test test.cc 77fdb6b69dSkamil paxctl +a test 78fdb6b69dSkamil atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test 79fdb6b69dSkamil} 80fdb6b69dSkamil 81fdb6b69dSkamilrealloc_profile_body(){ 82fdb6b69dSkamil cat > test.cc << EOF 83fdb6b69dSkamil#include <stdlib.h> 84fdb6b69dSkamilint main(int argc, char **argv) { 85fdb6b69dSkamil char *p = (char *)malloc(100); 86fdb6b69dSkamil p = (char *)realloc(p, 10000); 87fdb6b69dSkamil char x = p[50]; 88fdb6b69dSkamil free(p); 89fdb6b69dSkamil return x; 90fdb6b69dSkamil} 91fdb6b69dSkamilEOF 92fdb6b69dSkamil 93*d3d203ebSskrll c++ -fsanitize=memory -static -o test -pg test.cc 94fdb6b69dSkamil paxctl +a test 95fdb6b69dSkamil atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test 96fdb6b69dSkamil} 97fdb6b69dSkamil 98fdb6b69dSkamilrealloc_pic_body(){ 99fdb6b69dSkamil cat > test.cc << EOF 100fdb6b69dSkamil#include <stdio.h> 101fdb6b69dSkamil#include <stdlib.h> 102fdb6b69dSkamilint help(int); 103fdb6b69dSkamilint main(int argc, char **argv) {return help(argc);} 104fdb6b69dSkamilEOF 105fdb6b69dSkamil 106fdb6b69dSkamil cat > pic.cc << EOF 107fdb6b69dSkamil#include <stdlib.h> 108fdb6b69dSkamilint help(int argc) { 109fdb6b69dSkamil char *p = (char *)malloc(100); 110fdb6b69dSkamil p = (char *)realloc(p, 10000); 111fdb6b69dSkamil char x = p[50]; 112fdb6b69dSkamil free(p); 113fdb6b69dSkamil return x; 114fdb6b69dSkamil} 115fdb6b69dSkamilEOF 116fdb6b69dSkamil 117fdb6b69dSkamil c++ -fsanitize=memory -fPIC -shared -o libtest.so pic.cc 118fdb6b69dSkamil c++ -o test test.cc -fsanitize=memory -L. -ltest 119fdb6b69dSkamil paxctl +a test 120fdb6b69dSkamil 121fdb6b69dSkamil export LD_LIBRARY_PATH=. 122fdb6b69dSkamil atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test 123fdb6b69dSkamil} 124fdb6b69dSkamilrealloc_pie_body(){ 125fdb6b69dSkamil 126fdb6b69dSkamil #check whether -pie flag is supported on this architecture 127fdb6b69dSkamil if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 128fdb6b69dSkamil atf_set_skip "c++ -pie not supported on this architecture" 129fdb6b69dSkamil fi 130fdb6b69dSkamil cat > test.cc << EOF 131fdb6b69dSkamil#include <stdlib.h> 132fdb6b69dSkamilint main(int argc, char **argv) { 133fdb6b69dSkamil char *p = (char *)malloc(100); 134fdb6b69dSkamil p = (char *)realloc(p, 10000); 135fdb6b69dSkamil char x = p[50]; 136fdb6b69dSkamil free(p); 137fdb6b69dSkamil return x; 138fdb6b69dSkamil} 139fdb6b69dSkamilEOF 140fdb6b69dSkamil 141fdb6b69dSkamil c++ -fsanitize=memory -o test -fpie -pie test.cc 142fdb6b69dSkamil paxctl +a test 143fdb6b69dSkamil atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test 144fdb6b69dSkamil} 145fdb6b69dSkamil 146fdb6b69dSkamilatf_test_case target_not_supported 147fdb6b69dSkamiltarget_not_supported_head() 148fdb6b69dSkamil{ 149fdb6b69dSkamil atf_set "descr" "Test forced skip" 150fdb6b69dSkamil} 151fdb6b69dSkamil 152c52a0032Skamiltarget_not_supported_body() 153c52a0032Skamil{ 154c52a0032Skamil atf_skip "Target is not supported" 155c52a0032Skamil} 156c52a0032Skamil 157fdb6b69dSkamilatf_init_test_cases() 158fdb6b69dSkamil{ 159fdb6b69dSkamil test_target 160fdb6b69dSkamil test $SUPPORT = 'n' && { 161fdb6b69dSkamil atf_add_test_case target_not_supported 162fdb6b69dSkamil return 0 163fdb6b69dSkamil } 164fdb6b69dSkamil atf_add_test_case realloc 165fdb6b69dSkamil atf_add_test_case realloc_profile 166fdb6b69dSkamil atf_add_test_case realloc_pie 167fdb6b69dSkamil atf_add_test_case realloc_pic 168fdb6b69dSkamil} 169