blob: 1c4aa66901db52291a0d77330e04e2ba9d6ae5cf (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
|
/*
* Copyright (c) 2021, Idan Horowitz <idan.horowitz@serenityos.org>
*
* SPDX-License-Identifier: BSD-2-Clause
*/
#ifdef __clang__
# pragma clang optimize off
#else
# pragma GCC optimize("O0")
#endif
#include <LibTest/TestCase.h>
#include <signal.h>
#include <unistd.h>
static void signal_handler(int)
{
// We execute this syscall in order to force the kernel to perform the syscall precondition validation which
// checks that we have correctly set up the stack region to match our currently implemented protections.
getuid();
_exit(0);
}
#pragma GCC diagnostic push
#pragma GCC diagnostic ignored "-Winfinite-recursion"
static size_t infinite_recursion(size_t input)
{
return infinite_recursion(input) + 1;
}
#pragma GCC diagnostic pop
// This test can only pass with sigaltstack correctly enabled, as otherwise the SIGSEGV signal handler itself would also fault due to the overflown stack.
TEST_CASE(success_case)
{
static u8 alt_stack[SIGSTKSZ];
stack_t ss = {
.ss_sp = alt_stack,
.ss_flags = 0,
.ss_size = SIGSTKSZ,
};
auto res = sigaltstack(&ss, nullptr);
EXPECT_EQ(res, 0);
struct sigaction sa;
sa.sa_handler = signal_handler;
sa.sa_flags = SA_ONSTACK;
res = sigfillset(&sa.sa_mask);
EXPECT_EQ(res, 0);
res = sigaction(SIGSEGV, &sa, 0);
EXPECT_EQ(res, 0);
(void)infinite_recursion(0);
FAIL("Infinite recursion finished successfully");
}
|