xref: /netbsd/tests/usr.bin/c++/t_msan_realloc.sh (revision d3d203eb)
1fdb6b69dSkamil# Copyright (c) 2018 The NetBSD Foundation, Inc.
2fdb6b69dSkamil# All rights reserved.
3fdb6b69dSkamil#
4fdb6b69dSkamil# This code is derived from software contributed to The NetBSD Foundation
5fdb6b69dSkamil# by Yang Zheng.
6fdb6b69dSkamil#
7fdb6b69dSkamil# Redistribution and use in source and binary forms, with or without
8fdb6b69dSkamil# modification, are permitted provided that the following conditions
9fdb6b69dSkamil# are met:
10fdb6b69dSkamil# 1. Redistributions of source code must retain the above copyright
11fdb6b69dSkamil#    notice, this list of conditions and the following disclaimer.
12fdb6b69dSkamil# 2. Redistributions in binary form must reproduce the above copyright
13fdb6b69dSkamil#    notice, this list of conditions and the following disclaimer in the
14fdb6b69dSkamil#    documentation and/or other materials provided with the distribution.
15fdb6b69dSkamil#
16fdb6b69dSkamil# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17fdb6b69dSkamil# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18fdb6b69dSkamil# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19fdb6b69dSkamil# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20fdb6b69dSkamil# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21fdb6b69dSkamil# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22fdb6b69dSkamil# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23fdb6b69dSkamil# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24fdb6b69dSkamil# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25fdb6b69dSkamil# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26fdb6b69dSkamil# POSSIBILITY OF SUCH DAMAGE.
27fdb6b69dSkamil#
28fdb6b69dSkamil
29fdb6b69dSkamiltest_target()
30fdb6b69dSkamil{
31fdb6b69dSkamil	SUPPORT='n'
32fdb6b69dSkamil	if uname -m | grep -q "amd64" && command -v c++ >/dev/null 2>&1 && \
33fdb6b69dSkamil		   ! echo __clang__ | c++ -E - | grep -q __clang__; then
34fdb6b69dSkamil		# only clang with major version newer than 7 is supported
35fdb6b69dSkamil		CLANG_MAJOR=`echo __clang_major__ | c++ -E - | grep -o '^[[:digit:]]'`
36fdb6b69dSkamil		if [ "$CLANG_MAJOR" -ge "7" ]; then
37fdb6b69dSkamil			SUPPORT='y'
38fdb6b69dSkamil		fi
39fdb6b69dSkamil	fi
40fdb6b69dSkamil}
41fdb6b69dSkamil
42fdb6b69dSkamilatf_test_case realloc
43fdb6b69dSkamilrealloc_head() {
44fdb6b69dSkamil	atf_set "descr" "Test memory sanitizer for realloc"
45fdb6b69dSkamil	atf_set "require.progs" "c++ paxctl"
46fdb6b69dSkamil}
47fdb6b69dSkamil
48fdb6b69dSkamilatf_test_case realloc_profile
49fdb6b69dSkamilrealloc_profile_head() {
50fdb6b69dSkamil	atf_set "descr" "Test memory sanitizer for realloc with profiling option"
51fdb6b69dSkamil	atf_set "require.progs" "c++ paxctl"
52fdb6b69dSkamil}
53fdb6b69dSkamilatf_test_case realloc_pic
54fdb6b69dSkamilrealloc_pic_head() {
55fdb6b69dSkamil	atf_set "descr" "Test memory sanitizer for realloc with position independent code (PIC) flag"
56fdb6b69dSkamil	atf_set "require.progs" "c++ paxctl"
57fdb6b69dSkamil}
58fdb6b69dSkamilatf_test_case realloc_pie
59fdb6b69dSkamilrealloc_pie_head() {
60fdb6b69dSkamil	atf_set "descr" "Test memory sanitizer for realloc with position independent execution (PIE) flag"
61fdb6b69dSkamil	atf_set "require.progs" "c++ paxctl"
62fdb6b69dSkamil}
63fdb6b69dSkamil
64fdb6b69dSkamilrealloc_body(){
65fdb6b69dSkamil	cat > test.cc << EOF
66fdb6b69dSkamil#include <stdlib.h>
67fdb6b69dSkamilint main(int argc, char **argv) {
68fdb6b69dSkamil  char *p = (char *)malloc(100);
69fdb6b69dSkamil  p = (char *)realloc(p, 10000);
70fdb6b69dSkamil  char x = p[50];
71fdb6b69dSkamil  free(p);
72fdb6b69dSkamil  return x;
73fdb6b69dSkamil}
74fdb6b69dSkamilEOF
75fdb6b69dSkamil
76fdb6b69dSkamil	c++ -fsanitize=memory -o test test.cc
77fdb6b69dSkamil	paxctl +a test
78fdb6b69dSkamil	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
79fdb6b69dSkamil}
80fdb6b69dSkamil
81fdb6b69dSkamilrealloc_profile_body(){
82fdb6b69dSkamil	cat > test.cc << EOF
83fdb6b69dSkamil#include <stdlib.h>
84fdb6b69dSkamilint main(int argc, char **argv) {
85fdb6b69dSkamil  char *p = (char *)malloc(100);
86fdb6b69dSkamil  p = (char *)realloc(p, 10000);
87fdb6b69dSkamil  char x = p[50];
88fdb6b69dSkamil  free(p);
89fdb6b69dSkamil  return x;
90fdb6b69dSkamil}
91fdb6b69dSkamilEOF
92fdb6b69dSkamil
93*d3d203ebSskrll	c++ -fsanitize=memory -static -o test -pg test.cc
94fdb6b69dSkamil	paxctl +a test
95fdb6b69dSkamil	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
96fdb6b69dSkamil}
97fdb6b69dSkamil
98fdb6b69dSkamilrealloc_pic_body(){
99fdb6b69dSkamil	cat > test.cc << EOF
100fdb6b69dSkamil#include <stdio.h>
101fdb6b69dSkamil#include <stdlib.h>
102fdb6b69dSkamilint help(int);
103fdb6b69dSkamilint main(int argc, char **argv) {return help(argc);}
104fdb6b69dSkamilEOF
105fdb6b69dSkamil
106fdb6b69dSkamil	cat > pic.cc << EOF
107fdb6b69dSkamil#include <stdlib.h>
108fdb6b69dSkamilint help(int argc) {
109fdb6b69dSkamil  char *p = (char *)malloc(100);
110fdb6b69dSkamil  p = (char *)realloc(p, 10000);
111fdb6b69dSkamil  char x = p[50];
112fdb6b69dSkamil  free(p);
113fdb6b69dSkamil  return x;
114fdb6b69dSkamil}
115fdb6b69dSkamilEOF
116fdb6b69dSkamil
117fdb6b69dSkamil	c++ -fsanitize=memory -fPIC -shared -o libtest.so pic.cc
118fdb6b69dSkamil	c++ -o test test.cc -fsanitize=memory -L. -ltest
119fdb6b69dSkamil	paxctl +a test
120fdb6b69dSkamil
121fdb6b69dSkamil	export LD_LIBRARY_PATH=.
122fdb6b69dSkamil	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
123fdb6b69dSkamil}
124fdb6b69dSkamilrealloc_pie_body(){
125fdb6b69dSkamil
126fdb6b69dSkamil	#check whether -pie flag is supported on this architecture
127fdb6b69dSkamil	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
128fdb6b69dSkamil		atf_set_skip "c++ -pie not supported on this architecture"
129fdb6b69dSkamil	fi
130fdb6b69dSkamil	cat > test.cc << EOF
131fdb6b69dSkamil#include <stdlib.h>
132fdb6b69dSkamilint main(int argc, char **argv) {
133fdb6b69dSkamil  char *p = (char *)malloc(100);
134fdb6b69dSkamil  p = (char *)realloc(p, 10000);
135fdb6b69dSkamil  char x = p[50];
136fdb6b69dSkamil  free(p);
137fdb6b69dSkamil  return x;
138fdb6b69dSkamil}
139fdb6b69dSkamilEOF
140fdb6b69dSkamil
141fdb6b69dSkamil	c++ -fsanitize=memory -o test -fpie -pie test.cc
142fdb6b69dSkamil	paxctl +a test
143fdb6b69dSkamil	atf_check -s ignore -o ignore -e match:"WARNING: MemorySanitizer: use-of-uninitialized-value" ./test
144fdb6b69dSkamil}
145fdb6b69dSkamil
146fdb6b69dSkamilatf_test_case target_not_supported
147fdb6b69dSkamiltarget_not_supported_head()
148fdb6b69dSkamil{
149fdb6b69dSkamil	atf_set "descr" "Test forced skip"
150fdb6b69dSkamil}
151fdb6b69dSkamil
152c52a0032Skamiltarget_not_supported_body()
153c52a0032Skamil{
154c52a0032Skamil	atf_skip "Target is not supported"
155c52a0032Skamil}
156c52a0032Skamil
157fdb6b69dSkamilatf_init_test_cases()
158fdb6b69dSkamil{
159fdb6b69dSkamil	test_target
160fdb6b69dSkamil	test $SUPPORT = 'n' && {
161fdb6b69dSkamil		atf_add_test_case target_not_supported
162fdb6b69dSkamil		return 0
163fdb6b69dSkamil	}
164fdb6b69dSkamil	atf_add_test_case realloc
165fdb6b69dSkamil	atf_add_test_case realloc_profile
166fdb6b69dSkamil	atf_add_test_case realloc_pie
167fdb6b69dSkamil	atf_add_test_case realloc_pic
168fdb6b69dSkamil}
169