NetBSD/tests/lib/libc/sys/Makefile

156 lines
4.0 KiB
Makefile
Raw Permalink Normal View History

2020-12-14 19:55:51 +03:00
# $NetBSD: Makefile,v 1.68.2.2 2020/12/14 16:55:51 thorpej Exp $
2011-01-10 07:57:56 +03:00
MKMAN= no
.include <bsd.own.mk>
Add a simple test case to check executable mapping rights for mprotect(2). - provide an exec_prot_support() routine so $ARCH can indicate whether it supports execution protection or not, and skip test accordingly. - have a trivial 'return_one' shellcode to copy anywhere in a page, and call it. The decision to keep the assembly solution is mine, reasons are twofold: - all pure-C implementations cannot be controlled easily: bounds detection (beginning/end) of return_one is unpredictable, or requires the use of overkill solutions like libelf. Using dlsym(3) was a good proposal, however I can't use it to know the end address of the payload. It makes copying of the shellcode a bit more difficult: using a constant may be too small (code has not been entirely copied, and can lead to errors that can be erroneously detected as "test passed"), or too big (depending on where it is mapped in memory, copying past the end of the function may trigger SIGSEGV). - I have to ensure that the resulting assembly is the most compact possible, especially as it will be reused to test other parts of memory (stack, data, rodata, etc.). Only i386 and amd64 are implemented so far. Others will come in due time. FWIW, writing the exec_prot_support() callback and the return_one payload should be enough. Writing callback requires good knowledge of the platform, depending on chip revision, CPU, board, MMU... the protection level may vary. Current files are put under lib/libc/arch/* and lib/libc/common/. Feel free to move them around the tests/ tree. Keep in mind that the common/ and arch/ code will be used outside of libc, so please do not hide them too deep in the tree. I checked a few architectures via build.sh cross-compile, and will keep an eye on buildbot for potential build breakage. Feel free to contact me in case you see any, of course.
2011-07-19 03:16:08 +04:00
.include "../arch/Makefile.exec_prot"
2011-01-10 07:57:56 +03:00
TESTSDIR= ${TESTSBASE}/lib/libc/sys
TESTS_C+= t_access
TESTS_C+= t_bind
TESTS_C+= t_chroot
TESTS_C+= t_clock_gettime
2016-11-11 18:30:44 +03:00
TESTS_C+= t_clock_nanosleep
TESTS_C+= t_clone
TESTS_C+= t_connect
TESTS_C+= t_dup
2020-12-14 19:01:38 +03:00
TESTS_C+= t_eventfd
TESTS_C+= t_fork
TESTS_C+= t_fsync
TESTS_C+= t_futex_ops
TESTS_C+= t_futex_robust
TESTS_C+= t_getcontext
TESTS_C+= t_getgroups
TESTS_C+= t_getitimer
TESTS_C+= t_getlogin
TESTS_C+= t_getpid
2020-08-14 03:53:15 +03:00
TESTS_C+= t_getrandom
TESTS_C+= t_getrusage
TESTS_C+= t_getsid
TESTS_C+= t_getsockname
TESTS_C+= t_gettimeofday
TESTS_C+= t_issetugid
TESTS_C+= t_kevent
TESTS_C+= t_kill
TESTS_C+= t_link
TESTS_C+= t_listen
TESTS_C+= t_lwp_ctl
TESTS_C+= t_lwp_create
2014-07-18 16:34:52 +04:00
TESTS_C+= t_minherit
TESTS_C+= t_mincore
TESTS_C+= t_mkdir
TESTS_C+= t_mkfifo
TESTS_C+= t_mknod
TESTS_C+= t_mlock
TESTS_C+= t_mmap
TESTS_C+= t_mprotect
TESTS_C+= t_msgctl
TESTS_C+= t_msgget
TESTS_C+= t_msgrcv
TESTS_C+= t_msgsnd
TESTS_C+= t_msync
TESTS_C+= t_nanosleep
TESTS_C+= t_pipe
TESTS_C+= t_pipe2
TESTS_C+= t_poll
TESTS_C+= t_pollts
TESTS_C+= t_posix_fallocate
TESTS_C+= t_ppoll
TESTS_C+= t_ptrace
TESTS_C+= t_ptrace_sigchld
TESTS_C+= t_ptrace_wait
TESTS_C+= t_ptrace_wait3
TESTS_C+= t_ptrace_wait4
TESTS_C+= t_ptrace_wait6
TESTS_C+= t_ptrace_waitid
TESTS_C+= t_ptrace_waitpid
2012-06-22 22:45:23 +04:00
TESTS_C+= t_recvmmsg
TESTS_C+= t_revoke
TESTS_C+= t_select
2018-08-21 13:38:09 +03:00
TESTS_C+= t_sendmmsg
TESTS_C+= t_sendrecv
TESTS_C+= t_setrlimit
TESTS_C+= t_setuid
TESTS_C+= t_sigaction
TESTS_C+= t_sigaltstack
TESTS_C+= t_sigqueue
TESTS_C+= t_sigtimedwait
TESTS_C+= t_socketpair
TESTS_C+= t_swapcontext
TESTS_C+= t_stat
TESTS_C+= t_syscall
TESTS_C+= t_timer_create
2020-12-14 19:55:51 +03:00
TESTS_C+= t_timerfd
TESTS_C+= t_truncate
TESTS_C+= t_ucontext
TESTS_C+= t_umask
TESTS_C+= t_unlink
TESTS_C+= t_vfork
2016-04-06 03:45:53 +03:00
TESTS_C+= t_wait
TESTS_C+= t_wait_noproc
TESTS_C+= t_wait_noproc_wnohang
TESTS_C+= t_write
SRCS.t_mprotect= t_mprotect.c ${SRCS_EXEC_PROT} t_mprotect_helper.c
Add a simple test case to check executable mapping rights for mprotect(2). - provide an exec_prot_support() routine so $ARCH can indicate whether it supports execution protection or not, and skip test accordingly. - have a trivial 'return_one' shellcode to copy anywhere in a page, and call it. The decision to keep the assembly solution is mine, reasons are twofold: - all pure-C implementations cannot be controlled easily: bounds detection (beginning/end) of return_one is unpredictable, or requires the use of overkill solutions like libelf. Using dlsym(3) was a good proposal, however I can't use it to know the end address of the payload. It makes copying of the shellcode a bit more difficult: using a constant may be too small (code has not been entirely copied, and can lead to errors that can be erroneously detected as "test passed"), or too big (depending on where it is mapped in memory, copying past the end of the function may trigger SIGSEGV). - I have to ensure that the resulting assembly is the most compact possible, especially as it will be reused to test other parts of memory (stack, data, rodata, etc.). Only i386 and amd64 are implemented so far. Others will come in due time. FWIW, writing the exec_prot_support() callback and the return_one payload should be enough. Writing callback requires good knowledge of the platform, depending on chip revision, CPU, board, MMU... the protection level may vary. Current files are put under lib/libc/arch/* and lib/libc/common/. Feel free to move them around the tests/ tree. Keep in mind that the common/ and arch/ code will be used outside of libc, so please do not hide them too deep in the tree. I checked a few architectures via build.sh cross-compile, and will keep an eye on buildbot for potential build breakage. Feel free to contact me in case you see any, of course.
2011-07-19 03:16:08 +04:00
2020-12-14 19:01:38 +03:00
LDADD.t_eventfd+= -lpthread
LDADD.t_getpid+= -lpthread
2020-12-14 19:55:51 +03:00
LDADD.t_timerfd+= -lpthread
2012-08-08 17:57:05 +04:00
LDADD.t_ptrace_sigchld+= -pthread -lm
LDADD.t_ptrace_wait+= -pthread -lm -lelf
LDADD.t_ptrace_wait3+= -pthread -lm -lelf
LDADD.t_ptrace_wait4+= -pthread -lm -lelf
LDADD.t_ptrace_wait6+= -pthread -lm -lelf
LDADD.t_ptrace_waitid+= -pthread -lm -lelf
LDADD.t_ptrace_waitpid+= -pthread -lm -lelf
.if (${MKRUMP} != "no") && !defined(BSD_MK_COMPAT_FILE)
CPPFLAGS.t_posix_fadvise.c += -D_KERNTYPES
2012-08-08 17:57:05 +04:00
TESTS_C+= t_posix_fadvise
2020-03-01 23:24:07 +03:00
LDADD.t_posix_fadvise+= ${LIBRUMPBASE}
2012-08-08 17:57:05 +04:00
.endif
CPPFLAGS.t_futex_ops.c += -I${.CURDIR}/../../../../lib
CPPFLAGS.t_futex_robust.c += -I${.CURDIR}/../../../../lib
CPPFLAGS.t_lwp_create.c += -D_KERNTYPES
CPPFLAGS.t_ptrace_sigchld.c += -D__TEST_FENV
CPPFLAGS.t_ptrace_wait.c += -D_KERNTYPES -D__TEST_FENV
CPPFLAGS.t_ptrace_wait3.c += -D_KERNTYPES -D__TEST_FENV
CPPFLAGS.t_ptrace_wait4.c += -D_KERNTYPES -D__TEST_FENV
CPPFLAGS.t_ptrace_wait6.c += -D_KERNTYPES -D__TEST_FENV
CPPFLAGS.t_ptrace_waitid.c += -D_KERNTYPES -D__TEST_FENV
CPPFLAGS.t_ptrace_waitpid.c += -D_KERNTYPES -D__TEST_FENV
CPPFLAGS.t_ucontext.c += -D_KERNTYPES
2016-01-24 18:11:08 +03:00
.if ${MKSANITIZER:Uno} != "yes" && ${MKLIBCSANITIZER:Uno} != "yes"
CPPFLAGS.t_ptrace_wait.c += -DENABLE_TESTS
CPPFLAGS.t_ptrace_wait3.c += -DENABLE_TESTS
CPPFLAGS.t_ptrace_wait4.c += -DENABLE_TESTS
CPPFLAGS.t_ptrace_wait6.c += -DENABLE_TESTS
CPPFLAGS.t_ptrace_waitid.c += -DENABLE_TESTS
CPPFLAGS.t_ptrace_waitpid.c += -DENABLE_TESTS
.endif
FILES= truncate_test.root_owned
FILESBUILD= yes
FILESDIR_truncate_test.root_owned= ${TESTSDIR}
FILESMODE_truncate_test.root_owned= 0600
FILESOWNER_truncate_test.root_owned= root
FILESGRP_truncate_test.root_owned= wheel
CLEANFILES= truncate_test.root_owned
truncate_test.root_owned:
dd if=/dev/null bs=1 count=1 of=${.TARGET}
WARNS= 4
2011-01-10 07:57:56 +03:00
CWARNFLAGS.gcc+= ${GCC_NO_ADDR_OF_PACKED_MEMBER} \
${${ACTIVE_CC} == "gcc" && ${HAVE_GCC:U0} >= 8:? -Wno-error=deprecated :}
2011-01-10 07:57:56 +03:00
.include <bsd.test.mk>