blob: ba5a1d5cb859d0ad25e714cdbc200b9f94d17f2c (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
|
/*-
* Copyright (c) 2023 Dmitry Chagin <dchagin@FreeBSD.org>
*
* SPDX-License-Identifier: BSD-2-Clause
*
* PR: 272585
* Test provided by John F. Carr
*/
#include <sys/systm.h>
#include <sys/mman.h>
#include <vm/vm_param.h>
#include <atf-c.h>
#include <signal.h>
#include <unistd.h>
static void
sigsegv_handler(int sig __unused)
{
atf_tc_fail("Invalid stack protection mode after grows");
}
ATF_TC_WITHOUT_HEAD(mprotect_exec_test);
ATF_TC_BODY(mprotect_exec_test, tc)
{
long pagesize;
char *addr, *guard;
size_t alloc_size;
signal(SIGSEGV, sigsegv_handler);
pagesize = sysconf(_SC_PAGESIZE);
ATF_REQUIRE(pagesize > 0);
alloc_size = SGROWSIZ * 2;
addr = mmap(NULL, alloc_size, PROT_READ | PROT_WRITE,
MAP_STACK | MAP_PRIVATE | MAP_ANON, -1, 0);
ATF_REQUIRE(addr != MAP_FAILED);
/*
* Change prot of the last page in the mmaped stack area.
*/
guard = addr + alloc_size - SGROWSIZ;
ATF_REQUIRE(mprotect(guard, pagesize, PROT_NONE) == 0);
((volatile char *)guard)[-1];
}
ATF_TP_ADD_TCS(tp)
{
ATF_TP_ADD_TC(tp, mprotect_exec_test);
return (atf_no_error());
}
|