summaryrefslogtreecommitdiff
path: root/tests/sys/vm/stack/stack_mprotect_exec_test.c
blob: ba5a1d5cb859d0ad25e714cdbc200b9f94d17f2c (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
/*-
 * Copyright (c) 2023 Dmitry Chagin <dchagin@FreeBSD.org>
 *
 * SPDX-License-Identifier: BSD-2-Clause
 *
 * PR:	272585
 * Test provided by John F. Carr
 */

#include <sys/systm.h>
#include <sys/mman.h>
#include <vm/vm_param.h>

#include <atf-c.h>
#include <signal.h>
#include <unistd.h>

static void
sigsegv_handler(int sig __unused)
{

	atf_tc_fail("Invalid stack protection mode after grows");
}

ATF_TC_WITHOUT_HEAD(mprotect_exec_test);
ATF_TC_BODY(mprotect_exec_test, tc)
{
	long pagesize;
	char *addr, *guard;
	size_t alloc_size;

	signal(SIGSEGV, sigsegv_handler);

	pagesize = sysconf(_SC_PAGESIZE);
	ATF_REQUIRE(pagesize > 0);

	alloc_size = SGROWSIZ * 2;
	addr = mmap(NULL, alloc_size, PROT_READ | PROT_WRITE,
	    MAP_STACK | MAP_PRIVATE | MAP_ANON, -1, 0);
	ATF_REQUIRE(addr != MAP_FAILED);

	/*
	 * Change prot of the last page in the mmaped stack area.
	 */
	guard = addr + alloc_size - SGROWSIZ;
	ATF_REQUIRE(mprotect(guard, pagesize, PROT_NONE) == 0);

	((volatile char *)guard)[-1];
}

ATF_TP_ADD_TCS(tp)
{

	ATF_TP_ADD_TC(tp, mprotect_exec_test);

	return (atf_no_error());
}