NetBSD/tests/lib/libc/sys/Makefile

73 lines
1.4 KiB
Makefile
Raw Normal View History

# $NetBSD: Makefile,v 1.22 2012/04/20 12:11:29 jruoho Exp $
2011-01-10 07:57:56 +03:00
MKMAN= no
.include <bsd.own.mk>
Add a simple test case to check executable mapping rights for mprotect(2). - provide an exec_prot_support() routine so $ARCH can indicate whether it supports execution protection or not, and skip test accordingly. - have a trivial 'return_one' shellcode to copy anywhere in a page, and call it. The decision to keep the assembly solution is mine, reasons are twofold: - all pure-C implementations cannot be controlled easily: bounds detection (beginning/end) of return_one is unpredictable, or requires the use of overkill solutions like libelf. Using dlsym(3) was a good proposal, however I can't use it to know the end address of the payload. It makes copying of the shellcode a bit more difficult: using a constant may be too small (code has not been entirely copied, and can lead to errors that can be erroneously detected as "test passed"), or too big (depending on where it is mapped in memory, copying past the end of the function may trigger SIGSEGV). - I have to ensure that the resulting assembly is the most compact possible, especially as it will be reused to test other parts of memory (stack, data, rodata, etc.). Only i386 and amd64 are implemented so far. Others will come in due time. FWIW, writing the exec_prot_support() callback and the return_one payload should be enough. Writing callback requires good knowledge of the platform, depending on chip revision, CPU, board, MMU... the protection level may vary. Current files are put under lib/libc/arch/* and lib/libc/common/. Feel free to move them around the tests/ tree. Keep in mind that the common/ and arch/ code will be used outside of libc, so please do not hide them too deep in the tree. I checked a few architectures via build.sh cross-compile, and will keep an eye on buildbot for potential build breakage. Feel free to contact me in case you see any, of course.
2011-07-19 03:16:08 +04:00
.include "../arch/Makefile.exec_prot"
2011-01-10 07:57:56 +03:00
TESTSDIR= ${TESTSBASE}/lib/libc/sys
TESTS_C+= t_access
TESTS_C+= t_chroot
TESTS_C+= t_clock_gettime
TESTS_C+= t_clone
TESTS_C+= t_connect
TESTS_C+= t_dup
TESTS_C+= t_fsync
TESTS_C+= t_getcontext
TESTS_C+= t_getgroups
TESTS_C+= t_getitimer
TESTS_C+= t_getlogin
TESTS_C+= t_getpid
TESTS_C+= t_getrusage
TESTS_C+= t_getsid
TESTS_C+= t_gettimeofday
TESTS_C+= t_issetugid
TESTS_C+= t_kevent
TESTS_C+= t_kill
TESTS_C+= t_link
TESTS_C+= t_listen
TESTS_C+= t_lwp_ctl
TESTS_C+= t_mincore
TESTS_C+= t_mkdir
TESTS_C+= t_mkfifo
TESTS_C+= t_mknod
TESTS_C+= t_mlock
TESTS_C+= t_mmap
TESTS_C+= t_mprotect
TESTS_C+= t_msgctl
TESTS_C+= t_msgget
TESTS_C+= t_msgrcv
TESTS_C+= t_msgsnd
TESTS_C+= t_msync
TESTS_C+= t_nanosleep
TESTS_C+= t_pipe
TESTS_C+= t_pipe2
TESTS_C+= t_posix_fadvise
TESTS_C+= t_poll
TESTS_C+= t_revoke
TESTS_C+= t_select
TESTS_C+= t_setrlimit
TESTS_C+= t_setuid
TESTS_C+= t_sigaction
TESTS_C+= t_sigqueue
TESTS_C+= t_socketpair
TESTS_C+= t_stat
TESTS_C+= t_timer_create
TESTS_C+= t_truncate
TESTS_C+= t_ucontext
TESTS_C+= t_umask
TESTS_C+= t_unlink
TESTS_C+= t_write
Add a simple test case to check executable mapping rights for mprotect(2). - provide an exec_prot_support() routine so $ARCH can indicate whether it supports execution protection or not, and skip test accordingly. - have a trivial 'return_one' shellcode to copy anywhere in a page, and call it. The decision to keep the assembly solution is mine, reasons are twofold: - all pure-C implementations cannot be controlled easily: bounds detection (beginning/end) of return_one is unpredictable, or requires the use of overkill solutions like libelf. Using dlsym(3) was a good proposal, however I can't use it to know the end address of the payload. It makes copying of the shellcode a bit more difficult: using a constant may be too small (code has not been entirely copied, and can lead to errors that can be erroneously detected as "test passed"), or too big (depending on where it is mapped in memory, copying past the end of the function may trigger SIGSEGV). - I have to ensure that the resulting assembly is the most compact possible, especially as it will be reused to test other parts of memory (stack, data, rodata, etc.). Only i386 and amd64 are implemented so far. Others will come in due time. FWIW, writing the exec_prot_support() callback and the return_one payload should be enough. Writing callback requires good knowledge of the platform, depending on chip revision, CPU, board, MMU... the protection level may vary. Current files are put under lib/libc/arch/* and lib/libc/common/. Feel free to move them around the tests/ tree. Keep in mind that the common/ and arch/ code will be used outside of libc, so please do not hide them too deep in the tree. I checked a few architectures via build.sh cross-compile, and will keep an eye on buildbot for potential build breakage. Feel free to contact me in case you see any, of course.
2011-07-19 03:16:08 +04:00
SRCS.t_mprotect= t_mprotect.c ${SRCS_EXEC_PROT}
LDADD.t_getpid+= -lpthread
LDADD.t_posix_fadvise+= -lrumpvfs -lrump -lrumpuser -lpthread
WARNS= 4
2011-01-10 07:57:56 +03:00
.include <bsd.test.mk>