NetBSD/tests/usr.bin/cc/t_ubsan_int_add_overflow.sh
kamil e308425ef5 Add new ATF Undefined Behavior Sanitizer tests
Add new cc and c++ tests to check whether UBSan works.
These tests are prepared for GCC (in base) and Clang (with external patches).

Enable these tests for all ports by default, just verify whether we are
using GCC/Clang or a compatible compiler.

Add five equivalent C and C++ tests:
 - Integer addition overflow
 - Integer divide by zero
 - Integer negation overflow
 - Integer subtraction overflow
 - VLA out of bounds

All tests pass on NetBSD/amd64.

Patch submitted by <Harry Pantazis>
Minor cleanup by <myself>
2018-05-02 18:46:05 +00:00

198 lines
5.9 KiB
Bash

# Copyright (c) 2018 The NetBSD Foundation, Inc.
# All rights reserved.
#
# This code is derived from software contributed to The NetBSD Foundation
# by Harry Pantazis.
#
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions
# are met:
# 1. Redistributions of source code must retain the above copyright
# notice, this list of conditions and the following disclaimer.
# 2. Redistributions in binary form must reproduce the above copyright
# notice, this list of conditions and the following disclaimer in the
# documentation and/or other materials provided with the distribution.
#
# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
# POSSIBILITY OF SUCH DAMAGE.
#
test_target()
{
SUPPORT='n'
if ! echo __GNUC__ | cc -E - | grep -q __GNUC__; then
SUPPORT='y'
fi
if ! echo __clang__ | cc -E - | grep -q __clang__; then
SUPPORT='y'
fi
}
atf_test_case int_add_overflow
int_add_overflow_head() {
atf_set "descr" "Test Undefined Behavior for int addition overflows"
atf_set "require.progs" "cc"
}
atf_test_case int_add_overflow_profile
int_add_overflow_profile_head() {
atf_set "descr" "Test Undefined Behavior for int addition overflows with profiling option"
atf_set "require.progs" "cc"
}
atf_test_case int_add_overflow_pic
int_add_overflow_pic_head() {
atf_set "descr" "Test Undefined Behavior for int addition overflows with position independent code (PIC) flag"
atf_set "require.progs" "cc"
}
atf_test_case int_add_overflow_pie
int_add_overflow_pie_head() {
atf_set "descr" "Test Undefined Behavior for int addition overflows with position independent execution (PIE) flag"
atf_set "require.progs" "cc"
}
atf_test_case int_add_overflow32
int_add_overflow32_head() {
atf_set "descr" "Test Undefined Behavior for int addition overflows in NetBSD_32 emulation"
atf_set "require.progs" "cc file diff cat"
}
int_add_overflow_body(){
cat > test.c << EOF
#include <limits.h>
#include <stdio.h>
#include <stdlib.h>
int main(int argc, char **argv) {volatile int l = INT_MAX; l+=argc; return l;}
EOF
cc -fsanitize=undefined -o test test.c
atf_check -e match:"signed integer overflow" ./test
}
int_add_overflow_profile_body(){
cat > test.c << EOF
#include <limits.h>
#include <stdio.h>
#include <stdlib.h>
int main(int argc, char **argv) {volatile int l = INT_MAX; l+=argc; return l;}
EOF
cc -fsanitize=undefined -o test -pg test.c
atf_check -e match:"signed integer overflow" ./test
}
int_add_overflow_pic_body(){
cat > test.c << EOF
#include <stdio.h>
#include <stdlib.h>
int help(int);
int main(int argc, char **argv) {volatile int k = help(argc); return k;}
EOF
cat > pic.c << EOF
#include <stdlib.h>
#include <stdio.h>
#include <limits.h>
int help(int count) {volatile int l = INT_MAX; l+= count; return l;}
EOF
cc -fsanitize=undefined -fPIC -shared -o libtest.so pic.c
cc -o test test.c -fsanitize=undefined -L. -ltest
export LD_LIBRARY_PATH=.
atf_check -e match:"signed integer overflow" ./test
}
int_add_overflow_pie_body(){
#check whether -pie flag is supported on this architecture
if ! cc -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
atf_set_skip "cc -pie not supported on this architecture"
fi
cat > test.c << EOF
#include <limits.h>
#include <stdio.h>
#include <stdlib.h>
int main(int argc, char **argv) {volatile int l = INT_MAX; l+= argc; return l;}
EOF
cc -fsanitize=undefined -o test -fpie -pie test.c
atf_check -e match:"signed integer overflow" ./test
}
int_add_overflow32_body(){
# check what this architecture is, after all
if ! cc -dM -E - < /dev/null | grep -F -q _LP64; then
atf_skip "This is not a 64 bit architecture"
fi
if ! cc -m32 -dM -E - < /dev/null 2>/dev/null > ./def32; then
atf_skip "cc -m32 Not supported on this architecture"
else
if grep -F -q _LP64 ./def32; then
atf_fail "cc -m32 Does not generate NetBSD32 binaries"
fi
fi
cat > test.c << EOF
#include <limits.h>
#include <stdio.h>
#include <stdlib.h>
int main(int argc, char **argv) {volatile int l = INT_MAX; l+= argc; return l;}
EOF
cc -fsanitize=undefined -o md32 -m32 test.c
cc -fsanitize=undefined -o md64 test.c
file -b ./md32 > ./ftype32
file -b ./md64 > ./ftype64
if diff ./ftype32 ./ftype64 >/dev/null; then
atf_fail "Generated binz ain't no different"
fi
echo "32bit Binz on this platform are:"
cat ./ftype32
echo "64bit Binz are on the other hand:"
cat ./ftype64
atf_check -e match:"signed integer overflow" ./md32
# Another test with profile 32bit binaries, just to make sure everything has been thoroughly done
cat > test.c << EOF
#include <limits.h>
#include <stdio.h>
#include <stdlib.h>
int main(int argc, char **argv) {volatile int l = INT_MAX; l+= argc; return l;}
EOF
cc -fsanitize=undefined -pg -m32 -o test test.c
atf_check -e match:"signed integer overflow" ./test
}
atf_test_case target_not_supported
target_not_supported_head()
{
atf_set "descr" "Test forced skip"
}
atf_init_test_cases()
{
test_target
test $SUPPORT = 'n' && {
atf_add_test_case target_not_supported
return 0
}
atf_add_test_case int_add_overflow
atf_add_test_case int_add_overflow_profile
atf_add_test_case int_add_overflow_pie
atf_add_test_case int_add_overflow_pic
atf_add_test_case int_add_overflow32
}