blob: 6ab240c59225bb33f4ffaab0cd4e914a52995d76 [file] [log] [blame]
Gilles Peskine33406b62023-11-02 18:48:39 +01001/** \file metatest.c
2 *
3 * \brief Test features of the test framework.
Gilles Peskinecce00122023-11-10 15:36:15 +01004 *
5 * When you run this program, it runs a single "meta-test". A meta-test
6 * performs an operation which should be caught as a failure by our
7 * test framework. The meta-test passes if this program calls `exit` with
8 * a nonzero status, or aborts, or is terminated by a signal, or if the
9 * framework running the program considers the run an error (this happens
10 * with Valgrind for a memory leak). The non-success of the meta-test
11 * program means that the test failure has been caught correctly.
12 *
13 * Some failures are purely functional: the logic of the code causes the
14 * test result to be set to FAIL. Other failures come from extra
15 * instrumentation which is not present in a normal build; for example,
16 * Asan or Valgrind to detect memory leaks. This is reflected by the
17 * "platform" associated with each meta-test.
18 *
19 * Use the companion script `tests/scripts/run-metatests.sh` to run all
20 * the meta-tests for a given platform and validate that they trigger a
21 * detected failure as expected.
Gilles Peskine33406b62023-11-02 18:48:39 +010022 */
23
24/*
25 * Copyright The Mbed TLS Contributors
26 * SPDX-License-Identifier: Apache-2.0 OR GPL-2.0-or-later
27 */
28
29#define MBEDTLS_ALLOW_PRIVATE_ACCESS
30
31#include <mbedtls/platform.h>
Gilles Peskine69e8db02023-11-02 19:52:32 +010032#include <mbedtls/platform_util.h>
Gilles Peskine33406b62023-11-02 18:48:39 +010033#include "test/helpers.h"
Gilles Peskine102aea22023-11-03 18:05:38 +010034#include "test/macros.h"
Gilles Peskined29cce92023-11-02 20:49:34 +010035#include "test/memory.h"
Gilles Peskine33406b62023-11-02 18:48:39 +010036
37#include <stdio.h>
38#include <string.h>
39
Gilles Peskine102aea22023-11-03 18:05:38 +010040#if defined(MBEDTLS_THREADING_C)
41#include <mbedtls/threading.h>
42#endif
43
Gilles Peskine33406b62023-11-02 18:48:39 +010044
Gilles Peskine69e8db02023-11-02 19:52:32 +010045/* This is an external variable, so the compiler doesn't know that we're never
46 * changing its value.
Gilles Peskine69e8db02023-11-02 19:52:32 +010047 */
Gilles Peskined2fa6982023-11-09 21:46:24 +010048volatile int false_but_the_compiler_does_not_know = 0;
49
Gilles Peskine7a715c42023-11-21 13:42:40 +010050/* Hide calls to calloc/free from static checkers such as
51 * `gcc-12 -Wuse-after-free`, to avoid compile-time complaints about
52 * code where we do mean to cause a runtime error. */
53void * (* volatile calloc_but_the_compiler_does_not_know)(size_t, size_t) = mbedtls_calloc;
54void(*volatile free_but_the_compiler_does_not_know)(void *) = mbedtls_free;
55
Gilles Peskined2fa6982023-11-09 21:46:24 +010056/* Set n bytes at the address p to all-bits-zero, in such a way that
57 * the compiler should not know that p is all-bits-zero. */
Gilles Peskineda6e7a22023-11-10 10:09:27 +010058static void set_to_zero_but_the_compiler_does_not_know(volatile void *p, size_t n)
Gilles Peskined2fa6982023-11-09 21:46:24 +010059{
Gilles Peskineda6e7a22023-11-10 10:09:27 +010060 memset((void *) p, false_but_the_compiler_does_not_know, n);
Gilles Peskined2fa6982023-11-09 21:46:24 +010061}
Gilles Peskine69e8db02023-11-02 19:52:32 +010062
63
Gilles Peskine33406b62023-11-02 18:48:39 +010064/****************************************************************/
Gilles Peskinef309fbf2023-11-02 18:49:52 +010065/* Test framework features */
66/****************************************************************/
67
68void meta_test_fail(const char *name)
69{
70 (void) name;
71 mbedtls_test_fail("Forced test failure", __LINE__, __FILE__);
72}
73
74
75/****************************************************************/
Gilles Peskine80ba8322023-11-02 19:23:26 +010076/* Platform features */
77/****************************************************************/
78
79void null_pointer_dereference(const char *name)
80{
81 (void) name;
Gilles Peskineda6e7a22023-11-10 10:09:27 +010082 volatile char *volatile p;
Gilles Peskined2fa6982023-11-09 21:46:24 +010083 set_to_zero_but_the_compiler_does_not_know(&p, sizeof(p));
Gilles Peskine2f40cc02023-11-16 15:11:44 +010084 /* Undefined behavior (read from null data pointer) */
Gilles Peskine69e8db02023-11-02 19:52:32 +010085 mbedtls_printf("%p -> %u\n", p, (unsigned) *p);
Gilles Peskine80ba8322023-11-02 19:23:26 +010086}
87
88void null_pointer_call(const char *name)
89{
90 (void) name;
Gilles Peskineda6e7a22023-11-10 10:09:27 +010091 unsigned(*volatile p)(void);
Gilles Peskined2fa6982023-11-09 21:46:24 +010092 set_to_zero_but_the_compiler_does_not_know(&p, sizeof(p));
Gilles Peskine2f40cc02023-11-16 15:11:44 +010093 /* Undefined behavior (execute null function pointer) */
Gilles Peskinef0d5cf92023-11-03 10:58:57 +010094 /* The pointer representation may be truncated, but we don't care:
95 * the only point of printing it is to have some use of the pointer
96 * to dissuade the compiler from optimizing it away. */
97 mbedtls_printf("%lx() -> %u\n", (unsigned long) (uintptr_t) p, p());
Gilles Peskine80ba8322023-11-02 19:23:26 +010098}
99
100
101/****************************************************************/
Gilles Peskine102aea22023-11-03 18:05:38 +0100102/* Memory */
Gilles Peskineb0f0a642023-11-02 19:42:13 +0100103/****************************************************************/
104
105void read_after_free(const char *name)
106{
107 (void) name;
Gilles Peskine7a715c42023-11-21 13:42:40 +0100108 volatile char *p = calloc_but_the_compiler_does_not_know(1, 1);
Gilles Peskineb0f0a642023-11-02 19:42:13 +0100109 *p = 'a';
Gilles Peskine7a715c42023-11-21 13:42:40 +0100110 free_but_the_compiler_does_not_know((void *) p);
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100111 /* Undefined behavior (read after free) */
Gilles Peskineb0f0a642023-11-02 19:42:13 +0100112 mbedtls_printf("%u\n", (unsigned) *p);
113}
114
115void double_free(const char *name)
116{
117 (void) name;
Gilles Peskine7a715c42023-11-21 13:42:40 +0100118 volatile char *p = calloc_but_the_compiler_does_not_know(1, 1);
Gilles Peskineb0f0a642023-11-02 19:42:13 +0100119 *p = 'a';
Gilles Peskine7a715c42023-11-21 13:42:40 +0100120 free_but_the_compiler_does_not_know((void *) p);
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100121 /* Undefined behavior (double free) */
Gilles Peskine7a715c42023-11-21 13:42:40 +0100122 free_but_the_compiler_does_not_know((void *) p);
Gilles Peskineb0f0a642023-11-02 19:42:13 +0100123}
124
125void read_uninitialized_stack(const char *name)
126{
127 (void) name;
Gilles Peskineccb12152023-11-10 11:35:36 +0100128 char buf[1];
Gilles Peskineb0f0a642023-11-02 19:42:13 +0100129 if (false_but_the_compiler_does_not_know) {
130 buf[0] = '!';
131 }
Gilles Peskineccb12152023-11-10 11:35:36 +0100132 char *volatile p = buf;
133 if (*p != 0) {
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100134 /* Unspecified result (read from uninitialized memory) */
Gilles Peskineccb12152023-11-10 11:35:36 +0100135 mbedtls_printf("%u\n", (unsigned) *p);
Gilles Peskineb0f0a642023-11-02 19:42:13 +0100136 }
137}
138
139void memory_leak(const char *name)
140{
141 (void) name;
Gilles Peskine7a715c42023-11-21 13:42:40 +0100142 volatile char *p = calloc_but_the_compiler_does_not_know(1, 1);
Gilles Peskined2fa6982023-11-09 21:46:24 +0100143 mbedtls_printf("%u\n", (unsigned) *p);
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100144 /* Leak of a heap object */
Gilles Peskineb0f0a642023-11-02 19:42:13 +0100145}
146
Gilles Peskined29cce92023-11-02 20:49:34 +0100147/* name = "test_memory_poison_%(start)_%(offset)_%(count)"
148 * Poison a region starting at start from an 8-byte aligned origin,
149 * encompassing count bytes. Access the region at offset from the start.
150 */
151void test_memory_poison(const char *name)
152{
153 size_t start = 0, offset = 0, count = 0;
154 if (sscanf(name, "%*[^0-9]%zu%*[^0-9]%zu%*[^0-9]%zu",
155 &start, &offset, &count) != 3) {
156 mbedtls_fprintf(stderr, "%s: Bad name format: %s\n", __func__, name);
157 return;
158 }
159
160 union {
161 long long ll;
162 unsigned char buf[32];
163 } aligned;
164 memset(aligned.buf, 'a', sizeof(aligned.buf));
165
166 if (start > sizeof(aligned.buf)) {
167 mbedtls_fprintf(stderr, "%s: start=%zu > size=%zu", __func__,
168 start, sizeof(aligned.buf));
169 return;
170 }
171 if (start + count > sizeof(aligned.buf)) {
172 mbedtls_fprintf(stderr, "%s: start+count=%zu > size=%zu", __func__,
173 start + count, sizeof(aligned.buf));
174 return;
175 }
176 if (offset >= count) {
177 mbedtls_fprintf(stderr, "%s: offset=%zu >= count=%zu", __func__,
178 offset, count);
179 return;
180 }
181
182 MBEDTLS_TEST_MEMORY_POISON(aligned.buf + start, count);
183 mbedtls_printf("%u\n", (unsigned) aligned.buf[start + offset]);
184}
185
Gilles Peskineb0f0a642023-11-02 19:42:13 +0100186
187/****************************************************************/
Gilles Peskine102aea22023-11-03 18:05:38 +0100188/* Threading */
189/****************************************************************/
190
191void mutex_lock_not_initialized(const char *name)
192{
193 (void) name;
Gilles Peskinead2a17e2023-11-16 15:09:48 +0100194#if defined(MBEDTLS_THREADING_C)
Gilles Peskine102aea22023-11-03 18:05:38 +0100195 mbedtls_threading_mutex_t mutex;
196 memset(&mutex, 0, sizeof(mutex));
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100197 /* This mutex usage error is detected by our test framework's mutex usage
198 * verification framework. See tests/src/threading_helpers.c. Other
199 * threading implementations (e.g. pthread without our instrumentation)
200 * might consider this normal usage. */
Gilles Peskine102aea22023-11-03 18:05:38 +0100201 TEST_ASSERT(mbedtls_mutex_lock(&mutex) == 0);
202exit:
203 ;
204#endif
205}
206
207void mutex_unlock_not_initialized(const char *name)
208{
209 (void) name;
Gilles Peskine102aea22023-11-03 18:05:38 +0100210#if defined(MBEDTLS_THREADING_C)
211 mbedtls_threading_mutex_t mutex;
212 memset(&mutex, 0, sizeof(mutex));
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100213 /* This mutex usage error is detected by our test framework's mutex usage
214 * verification framework. See tests/src/threading_helpers.c. Other
215 * threading implementations (e.g. pthread without our instrumentation)
216 * might consider this normal usage. */
Gilles Peskine102aea22023-11-03 18:05:38 +0100217 TEST_ASSERT(mbedtls_mutex_unlock(&mutex) == 0);
218exit:
219 ;
220#endif
221}
222
223void mutex_free_not_initialized(const char *name)
224{
225 (void) name;
Gilles Peskine102aea22023-11-03 18:05:38 +0100226#if defined(MBEDTLS_THREADING_C)
227 mbedtls_threading_mutex_t mutex;
228 memset(&mutex, 0, sizeof(mutex));
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100229 /* This mutex usage error is detected by our test framework's mutex usage
230 * verification framework. See tests/src/threading_helpers.c. Other
231 * threading implementations (e.g. pthread without our instrumentation)
232 * might consider this normal usage. */
Gilles Peskine102aea22023-11-03 18:05:38 +0100233 mbedtls_mutex_free(&mutex);
234#endif
235}
236
237void mutex_double_init(const char *name)
238{
239 (void) name;
240#if defined(MBEDTLS_THREADING_C)
241 mbedtls_threading_mutex_t mutex;
242 mbedtls_mutex_init(&mutex);
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100243 /* This mutex usage error is detected by our test framework's mutex usage
244 * verification framework. See tests/src/threading_helpers.c. Other
245 * threading implementations (e.g. pthread without our instrumentation)
246 * might consider this normal usage. */
Gilles Peskine102aea22023-11-03 18:05:38 +0100247 mbedtls_mutex_init(&mutex);
248 mbedtls_mutex_free(&mutex);
249#endif
250}
251
252void mutex_double_free(const char *name)
253{
254 (void) name;
255#if defined(MBEDTLS_THREADING_C)
256 mbedtls_threading_mutex_t mutex;
257 mbedtls_mutex_init(&mutex);
258 mbedtls_mutex_free(&mutex);
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100259 /* This mutex usage error is detected by our test framework's mutex usage
260 * verification framework. See tests/src/threading_helpers.c. Other
261 * threading implementations (e.g. pthread without our instrumentation)
262 * might consider this normal usage. */
Gilles Peskine102aea22023-11-03 18:05:38 +0100263 mbedtls_mutex_free(&mutex);
264#endif
265}
266
267void mutex_leak(const char *name)
268{
269 (void) name;
Gilles Peskinead2a17e2023-11-16 15:09:48 +0100270#if defined(MBEDTLS_THREADING_C)
Gilles Peskine102aea22023-11-03 18:05:38 +0100271 mbedtls_threading_mutex_t mutex;
272 mbedtls_mutex_init(&mutex);
273#endif
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100274 /* This mutex usage error is detected by our test framework's mutex usage
275 * verification framework. See tests/src/threading_helpers.c. Other
276 * threading implementations (e.g. pthread without our instrumentation)
277 * might consider this normal usage. */
Gilles Peskine102aea22023-11-03 18:05:38 +0100278}
279
280
281/****************************************************************/
Gilles Peskine33406b62023-11-02 18:48:39 +0100282/* Command line entry point */
283/****************************************************************/
284
285typedef struct {
Gilles Peskinecce00122023-11-10 15:36:15 +0100286 /** Command line argument that will trigger that metatest.
287 *
288 * Conventionally matches "[a-z0-9_]+". */
Gilles Peskine33406b62023-11-02 18:48:39 +0100289 const char *name;
Gilles Peskinecce00122023-11-10 15:36:15 +0100290
291 /** Platform under which that metatest is valid.
292 *
293 * - "any": should work anywhere.
294 * - "asan": triggers ASan (Address Sanitizer).
295 * - "msan": triggers MSan (Memory Sanitizer).
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100296 * - "pthread": requires MBEDTLS_THREADING_PTHREAD and MBEDTLS_TEST_HOOKS,
297 * which enables MBEDTLS_TEST_MUTEX_USAGE internally in the test
298 * framework (see tests/src/threading_helpers.c).
Gilles Peskinecce00122023-11-10 15:36:15 +0100299 */
Gilles Peskine33406b62023-11-02 18:48:39 +0100300 const char *platform;
Gilles Peskinecce00122023-11-10 15:36:15 +0100301
302 /** Function that performs the metatest.
303 *
304 * The function receives the name as an argument. This allows using the
305 * same function to perform multiple variants of a test based on the name.
306 *
307 * When executed on a conforming platform, the function is expected to
308 * either cause a test failure (mbedtls_test_fail()), or cause the
309 * program to abort in some way (e.g. by causing a segfault or by
310 * triggering a sanitizer).
311 *
312 * When executed on a non-conforming platform, the function may return
313 * normally or may have unpredictable behavior.
314 */
Gilles Peskine33406b62023-11-02 18:48:39 +0100315 void (*entry_point)(const char *name);
316} metatest_t;
317
Gilles Peskinecce00122023-11-10 15:36:15 +0100318/* The list of availble meta-tests. Remember to register new functions here!
319 *
320 * Note that we always compile all the functions, so that `metatest --list`
321 * will always list all the available meta-tests.
Gilles Peskine2f40cc02023-11-16 15:11:44 +0100322 *
323 * See the documentation of metatest_t::platform for the meaning of
324 * platform values.
Gilles Peskinecce00122023-11-10 15:36:15 +0100325 */
Gilles Peskine33406b62023-11-02 18:48:39 +0100326metatest_t metatests[] = {
Gilles Peskinef309fbf2023-11-02 18:49:52 +0100327 { "test_fail", "any", meta_test_fail },
Gilles Peskine80ba8322023-11-02 19:23:26 +0100328 { "null_dereference", "any", null_pointer_dereference },
329 { "null_call", "any", null_pointer_call },
Gilles Peskineb0f0a642023-11-02 19:42:13 +0100330 { "read_after_free", "asan", read_after_free },
331 { "double_free", "asan", double_free },
332 { "read_uninitialized_stack", "msan", read_uninitialized_stack },
333 { "memory_leak", "asan", memory_leak },
Gilles Peskined29cce92023-11-02 20:49:34 +0100334 { "test_memory_poison_0_0_8", "asan", test_memory_poison },
Gilles Peskine102aea22023-11-03 18:05:38 +0100335 { "mutex_lock_not_initialized", "pthread", mutex_lock_not_initialized },
336 { "mutex_unlock_not_initialized", "pthread", mutex_unlock_not_initialized },
337 { "mutex_free_not_initialized", "pthread", mutex_free_not_initialized },
338 { "mutex_double_init", "pthread", mutex_double_init },
339 { "mutex_double_free", "pthread", mutex_double_free },
340 { "mutex_leak", "pthread", mutex_leak },
Gilles Peskine33406b62023-11-02 18:48:39 +0100341 { NULL, NULL, NULL }
342};
343
344static void help(FILE *out, const char *argv0)
345{
346 mbedtls_fprintf(out, "Usage: %s list|TEST\n", argv0);
347 mbedtls_fprintf(out, "Run a meta-test that should cause a test failure.\n");
348 mbedtls_fprintf(out, "With 'list', list the available tests and their platform requirement.\n");
349}
350
351int main(int argc, char *argv[])
352{
353 const char *argv0 = argc > 0 ? argv[0] : "metatest";
354 if (argc != 2) {
355 help(stderr, argv0);
356 mbedtls_exit(MBEDTLS_EXIT_FAILURE);
357 }
358
359 /* Support "-help", "--help", "--list", etc. */
360 const char *command = argv[1];
361 while (*command == '-') {
362 ++command;
363 }
364
365 if (strcmp(argv[1], "help") == 0) {
366 help(stdout, argv0);
367 mbedtls_exit(MBEDTLS_EXIT_SUCCESS);
368 }
369 if (strcmp(argv[1], "list") == 0) {
370 for (const metatest_t *p = metatests; p->name != NULL; p++) {
371 mbedtls_printf("%s %s\n", p->name, p->platform);
372 }
373 mbedtls_exit(MBEDTLS_EXIT_SUCCESS);
374 }
375
Gilles Peskine102aea22023-11-03 18:05:38 +0100376#if defined(MBEDTLS_TEST_MUTEX_USAGE)
377 mbedtls_test_mutex_usage_init();
378#endif
379
Gilles Peskine33406b62023-11-02 18:48:39 +0100380 for (const metatest_t *p = metatests; p->name != NULL; p++) {
381 if (strcmp(argv[1], p->name) == 0) {
382 mbedtls_printf("Running metatest %s...\n", argv[1]);
383 p->entry_point(argv[1]);
Gilles Peskine102aea22023-11-03 18:05:38 +0100384#if defined(MBEDTLS_TEST_MUTEX_USAGE)
385 mbedtls_test_mutex_usage_check();
386#endif
Gilles Peskine33406b62023-11-02 18:48:39 +0100387 mbedtls_printf("Running metatest %s... done, result=%d\n",
388 argv[1], (int) mbedtls_test_info.result);
389 mbedtls_exit(mbedtls_test_info.result == MBEDTLS_TEST_RESULT_SUCCESS ?
390 MBEDTLS_EXIT_SUCCESS :
391 MBEDTLS_EXIT_FAILURE);
392 }
393 }
394
395 mbedtls_fprintf(stderr, "%s: FATAL: No such metatest: %s\n",
396 argv0, command);
397 mbedtls_exit(MBEDTLS_EXIT_FAILURE);
398}