+++ /dev/null
-#include <stdio.h>
-#include <strings.h>
-#include <stdlib.h>
-#include <unistd.h>
-#include <signal.h>
-#include <setjmp.h>
-#include <sys/mman.h>
-
-int test_func();
-void catch_segv(int);
-jmp_buf resume;
-
-#define func_len 256
-
-#define ALT_STK_SIZE (MINSIGSTKSZ + pagesize)
-
-#if __i386__
-typedef unsigned int psint_t;
-#endif
-#if __x86_64__
-typedef unsigned long long psint_t;
-#endif
-
-int verbose = 0;
-
-#define msg(...) do { if (verbose) printf(__VA_ARGS__); } while (0);
-
-/*
- * Test whether the architecture allows execution from the stack and heap data areas. What's
- * allowed varies by architecture due to backwards compatibility. We also run a separate test
- * where we turn on PROT_EXEC explicitly which should always allow execution to take place.
- *
- * The "expected" array tells us what the result of each test should be based on the architecture.
- * The code assumes the test numbers in the macros below are consecutive starting from 0.
- */
-
-#define HEAP_TEST 0
-#define HEAP_PROT_EXEC 1
-#define STACK_TEST 2
-#define STACK_PROT_EXEC 3
-
-#define SUCCEED 1
-#define FAIL -1 /* can't use 0 since setjmp uses that */
-
-int expected[4] = {
-#if NXDATA32TESTNONX
- SUCCEED, /* execute from heap */
- SUCCEED, /* exeucte from heap with PROT_EXEC */
- FAIL, /* execute from stack */
- SUCCEED, /* exeucte from stack with PROT_EXEC */
-#elif __i386__
- FAIL, /* execute from heap */
- SUCCEED, /* exeucte from heap with PROT_EXEC */
- FAIL, /* execute from stack */
- SUCCEED, /* exeucte from stack with PROT_EXEC */
-#endif
-#if __x86_64__
- FAIL, /* execute from heap */
- SUCCEED, /* exeucte from heap with PROT_EXEC */
- FAIL, /* execute from stack */
- SUCCEED, /* exeucte from stack with PROT_EXEC */
-#endif
-};
-
-
-int main(int argc, char *argv[])
-{
- int (*func)();
- int result, test;
- char buf[func_len + 4];
- psint_t base;
- unsigned int len;
- psint_t pagesize;
- size_t count;
- stack_t sigstk;
- struct sigaction sigact;
- char *cmd_name;
- int c;
-
- cmd_name = argv[0];
-
- while ((c = getopt(argc, argv, "v")) != -1) {
- switch (c) {
- case 'v':
- verbose = 1;
- break;
-
- case '?':
- default:
- fprintf(stderr, "usage: data_exec [-v]\n");
- exit(1);
- }
- }
-
- pagesize = getpagesize();
-
- sigstk.ss_sp = malloc(ALT_STK_SIZE);
- sigstk.ss_size = ALT_STK_SIZE;
- sigstk.ss_flags = 0;
-
- if (sigaltstack(&sigstk, NULL) < 0) {
- perror("sigaltstack");
- exit(1);
- }
-
- sigact.sa_handler = catch_segv;
- sigact.sa_flags = SA_ONSTACK;
- sigemptyset(&sigact.sa_mask);
-
- if (sigaction(SIGSEGV, &sigact, NULL) == -1) {
- perror("sigaction SIGSEGV");
- exit(1);
- }
-
- if (sigaction(SIGBUS, &sigact, NULL) == -1) {
- perror("sigaction SIGBUS");
- exit(1);
- }
-
- test = HEAP_TEST;
-
-restart:
-
- if ((result = setjmp(resume)) != 0) {
- if (result != expected[test]) {
- printf("%s: test %d failed, expected %d, got %d\n", cmd_name, test, expected[test], result);
- exit(2);
- }
-
- test++;
- goto restart;
- }
-
- switch (test) {
- case HEAP_TEST:
- msg("attempting to execute from malloc'ed area..\n");
-
- func = (void *)malloc(func_len);
-
- func = (void *)((char *)func + ((psint_t)test_func & 0x3));
-
- bcopy(test_func, func, func_len);
-
- result = (*func)();
- msg("execution suceeded, result is %d\n\n", result);
- longjmp(resume, SUCCEED);
-
- case HEAP_PROT_EXEC:
- msg("attempting to execute from malloc'ed area with PROT_EXEC..\n");
-
- func = (void *)malloc(func_len);
-
- func = (void *)((char *)func + ((psint_t)test_func & 0x3));
- bcopy(test_func, func, func_len);
-
- base = (psint_t)func & ~(pagesize - 1);
- len = func_len + (psint_t)func - base;
-
- if(mprotect((void *)base, len, PROT_READ|PROT_WRITE|PROT_EXEC) == -1) {
- perror("mprotect of stack");
- exit(1);
- }
-
- result = (*func)();
- msg("execution suceeded, result is %d\n\n", result);
- longjmp(resume, SUCCEED);
-
- case STACK_TEST:
- msg("attempting to execute from stack...\n");
-
- func = (void *)(buf + ((psint_t)test_func & 0x3));
- bcopy(test_func, func, func_len);
-
- result = (*func)();
- msg("stack execution suceeded, result from stack exec is %d\n\n", result);
- longjmp(resume, SUCCEED);
-
- case STACK_PROT_EXEC:
- msg("attempting to execute from stack with PROT_EXEC...\n");
-
- func = (void *)(buf + ((psint_t)test_func & 0x3));
- bcopy(test_func, func, func_len);
-
- base = (psint_t)func & ~(pagesize - 1);
- len = func_len + (psint_t)func - base;
-
- if(mprotect((void *)base, len, PROT_READ|PROT_WRITE|PROT_EXEC) == -1) {
- perror("mprotect of stack");
- exit(1);
- }
-
- result = (*func)();
- msg("stack execution suceeded, result from stack exec is %d\n", result);
- longjmp(resume, SUCCEED);
- }
-
- msg("All tests passed.\n");
- exit(0);
-}
-
-
-int
-test_func()
-{
- return 42;
-}
-
-
-void
-catch_segv(int sig)
-{
- msg("got sig %d\n\n", sig);
- longjmp(resume, FAIL);
-}