summaryrefslogtreecommitdiffstats
path: root/commands/ubsan.c
blob: 784678d399d9391c4a3aff9e587878edf52baee4 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
// SPDX-License-Identifier: GPL-2.0
#include <common.h>
#include <command.h>
#include <abort.h>

struct test_ubsan {
	const char *cmd;
	void(*fun)(void);
};

static void test_ubsan_add_overflow(void)
{
	volatile int val = INT_MAX;

	val += 2;
}

static void test_ubsan_sub_overflow(void)
{
	volatile int val = INT_MIN;
	volatile int val2 = 2;

	val -= val2;
}

static void test_ubsan_mul_overflow(void)
{
	volatile int val = INT_MAX / 2;

	val *= 3;
}

static void test_ubsan_negate_overflow(void)
{
	volatile int val = INT_MIN;

	val = -val;
}

static void test_ubsan_divrem_overflow(void)
{
	volatile int val = 16;
	volatile int val2 = 0;

	val /= val2;
}

static void test_ubsan_shift_out_of_bounds(void)
{
	volatile int val = -1;
	int val2 = 10;

	val2 <<= val;
}

static void test_ubsan_out_of_bounds(void)
{
	volatile int i = 4, j = 5;
	volatile int arr[4];

	arr[j] = i;
}

static void test_ubsan_load_invalid_value(void)
{
	volatile char *dst, *src;
	bool val, val2, *ptr;
	char c = 4;

	dst = (char *)&val;
	src = &c;
	*dst = *src;

	ptr = &val2;
	val2 = val;
}

static void test_ubsan_null_ptr_deref(void)
{
	volatile int *ptr = NULL;
	int val;

	data_abort_mask();
	val = *ptr;
	data_abort_unmask();
}

static void test_ubsan_misaligned_access(void)
{
	volatile char arr[5] __aligned(4) = {1, 2, 3, 4, 5};
	volatile int *ptr, val = 6;

	ptr = (int *)(arr + 1);
	*ptr = val;
}

static void test_ubsan_object_size_mismatch(void)
{
	/* "((aligned(8)))" helps this not into be misaligned for ptr-access. */
	volatile int val __aligned(8) = 4;
	volatile long long *ptr, val2;

	ptr = (long long *)&val;
	val2 = *ptr;
}

static const struct test_ubsan test_ubsan_array[] = {
	{ .cmd = "add",   .fun = test_ubsan_add_overflow },
	{ .cmd = "sub",   .fun = test_ubsan_sub_overflow },
	{ .cmd = "mul",   .fun = test_ubsan_mul_overflow },
	{ .cmd = "neg",   .fun = test_ubsan_negate_overflow },
	{ .cmd = "div",   .fun = test_ubsan_divrem_overflow },
	{ .cmd = "shift", .fun = test_ubsan_shift_out_of_bounds },
	{ .cmd = "oob",   .fun = test_ubsan_out_of_bounds },
	{ .cmd = "trap",  .fun = test_ubsan_load_invalid_value },
	{ .cmd = "null",  .fun = test_ubsan_null_ptr_deref },
	{ .cmd = "align", .fun = test_ubsan_misaligned_access },
	{ .cmd = "size",  .fun = test_ubsan_object_size_mismatch },
	{ /* sentinel */ }
};

static int do_ubsan(int argc, char *argv[])
{
	const struct test_ubsan *test;

	if (argc != 2)
		return COMMAND_ERROR_USAGE;

	for (test = test_ubsan_array; test->cmd; test++) {
		if (strcmp(test->cmd, argv[1]) == 0) {
			test->fun();
			return 0;
		}
	}

	return COMMAND_ERROR_USAGE;
}

BAREBOX_CMD_HELP_START(ubsan)
BAREBOX_CMD_HELP_TEXT("trigger undefined behavior for UBSAN to detect")
BAREBOX_CMD_HELP_TEXT("")
BAREBOX_CMD_HELP_TEXT("Functions:")
BAREBOX_CMD_HELP_TEXT("add, sub, mul, neg, div, shift, oob, trap,")
BAREBOX_CMD_HELP_TEXT("null, align, size")
BAREBOX_CMD_HELP_END

BAREBOX_CMD_START(ubsan)
	.cmd		= do_ubsan,
	BAREBOX_CMD_DESC("trigger undefined behavior for UBSAN to detect")
	BAREBOX_CMD_GROUP(CMD_GRP_MISC)
	BAREBOX_CMD_HELP(cmd_ubsan_help)
BAREBOX_CMD_END