summaryrefslogtreecommitdiff
path: root/Tests/Kernel/TestSigAltStack.cpp
blob: 1c4aa66901db52291a0d77330e04e2ba9d6ae5cf (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
/*
 * Copyright (c) 2021, Idan Horowitz <idan.horowitz@serenityos.org>
 *
 * SPDX-License-Identifier: BSD-2-Clause
 */

#ifdef __clang__
#    pragma clang optimize off
#else
#    pragma GCC optimize("O0")
#endif

#include <LibTest/TestCase.h>
#include <signal.h>
#include <unistd.h>

static void signal_handler(int)
{
    // We execute this syscall in order to force the kernel to perform the syscall precondition validation which
    // checks that we have correctly set up the stack region to match our currently implemented protections.
    getuid();
    _exit(0);
}

#pragma GCC diagnostic push
#pragma GCC diagnostic ignored "-Winfinite-recursion"
static size_t infinite_recursion(size_t input)
{
    return infinite_recursion(input) + 1;
}
#pragma GCC diagnostic pop

// This test can only pass with sigaltstack correctly enabled, as otherwise the SIGSEGV signal handler itself would also fault due to the overflown stack.
TEST_CASE(success_case)
{
    static u8 alt_stack[SIGSTKSZ];
    stack_t ss = {
        .ss_sp = alt_stack,
        .ss_flags = 0,
        .ss_size = SIGSTKSZ,
    };
    auto res = sigaltstack(&ss, nullptr);
    EXPECT_EQ(res, 0);

    struct sigaction sa;
    sa.sa_handler = signal_handler;
    sa.sa_flags = SA_ONSTACK;
    res = sigfillset(&sa.sa_mask);
    EXPECT_EQ(res, 0);
    res = sigaction(SIGSEGV, &sa, 0);
    EXPECT_EQ(res, 0);

    (void)infinite_recursion(0);
    FAIL("Infinite recursion finished successfully");
}