1# Copyright (c) 2018 The NetBSD Foundation, Inc. 2# All rights reserved. 3# 4# This code is derived from software contributed to The NetBSD Foundation 5# by Yang Zheng. 6# 7# Redistribution and use in source and binary forms, with or without 8# modification, are permitted provided that the following conditions 9# are met: 10# 1. Redistributions of source code must retain the above copyright 11# notice, this list of conditions and the following disclaimer. 12# 2. Redistributions in binary form must reproduce the above copyright 13# notice, this list of conditions and the following disclaimer in the 14# documentation and/or other materials provided with the distribution. 15# 16# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS 17# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED 18# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR 19# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS 20# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 21# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 22# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 23# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 24# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 25# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 26# POSSIBILITY OF SUCH DAMAGE. 27# 28 29test_target() 30{ 31 SUPPORT='n' 32 if uname -m | grep -q "amd64" && command -v cc >/dev/null 2>&1 && \ 33 ! echo __clang__ | cc -E - | grep -q __clang__; then 34 # only clang with major version newer than 7 is supported 35 CLANG_MAJOR=`echo __clang_major__ | cc -E - | grep -o '^[[:digit:]]'` 36 if [ "$CLANG_MAJOR" -ge "7" ]; then 37 SUPPORT='y' 38 fi 39 fi 40} 41 42atf_test_case stack 43stack_head() { 44 atf_set "descr" "Test memory sanitizer for free-stack-pointer case" 45 atf_set "require.progs" "cc paxctl" 46} 47 48atf_test_case stack_profile 49stack_profile_head() { 50 atf_set "descr" "Test memory sanitizer for free-stack-pointer with profiling option" 51 atf_set "require.progs" "cc paxctl" 52} 53atf_test_case stack_pic 54stack_pic_head() { 55 atf_set "descr" "Test memory sanitizer for free-stack-pointer with position independent code (PIC) flag" 56 atf_set "require.progs" "cc paxctl" 57} 58atf_test_case stack_pie 59stack_pie_head() { 60 atf_set "descr" "Test memory sanitizer for free-stack-pointer with position independent execution (PIE) flag" 61 atf_set "require.progs" "cc paxctl" 62} 63 64stack_body(){ 65 cat > test.c << EOF 66#include <stdlib.h> 67int main() { 68 int a = 0; 69 int *p = &a; 70 free(p); 71 return 0; 72} 73EOF 74 75 cc -fsanitize=memory -o test test.c 76 paxctl +a test 77 atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test 78} 79 80stack_profile_body(){ 81 cat > test.c << EOF 82#include <stdlib.h> 83int main() { 84 int a = 0; 85 int *p = &a; 86 free(p); 87 return 0; 88} 89EOF 90 91 cc -fsanitize=memory -static -o test -pg test.c 92 paxctl +a test 93 atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test 94} 95 96stack_pic_body(){ 97 cat > test.c << EOF 98#include <stdio.h> 99#include <stdlib.h> 100int help(int); 101int main(int argc, char **argv) {return help(argc);} 102EOF 103 104 cat > pic.c << EOF 105#include <stdlib.h> 106int help(int argc) { 107 int a = 0; 108 int *p = &a; 109 free(p); 110 return 0; 111} 112EOF 113 114 cc -fsanitize=memory -fPIC -shared -o libtest.so pic.c 115 cc -o test test.c -fsanitize=memory -L. -ltest 116 paxctl +a test 117 118 export LD_LIBRARY_PATH=. 119 atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test 120} 121stack_pie_body(){ 122 123 #check whether -pie flag is supported on this architecture 124 if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then 125 atf_set_skip "cc -pie not supported on this architecture" 126 fi 127 cat > test.c << EOF 128#include <stdlib.h> 129int main() { 130 int a = 0; 131 int *p = &a; 132 free(p); 133 return 0; 134} 135EOF 136 137 cc -fsanitize=memory -o test -fpie -pie test.c 138 paxctl +a test 139 atf_check -s ignore -o ignore -e match:"MemorySanitizer: bad pointer" ./test 140} 141 142atf_test_case target_not_supported 143target_not_supported_head() 144{ 145 atf_set "descr" "Test forced skip" 146} 147 148target_not_supported_body() 149{ 150 atf_skip "Target is not supported" 151} 152 153atf_init_test_cases() 154{ 155 test_target 156 test $SUPPORT = 'n' && { 157 atf_add_test_case target_not_supported 158 return 0 159 } 160 atf_add_test_case stack 161 atf_add_test_case stack_profile 162 atf_add_test_case stack_pie 163 atf_add_test_case stack_pic 164} 165