/* Make sure longjmp fortification catches bad signal stacks.
Copyright (C) 2013-2023 Free Software Foundation, Inc.
This file is part of the GNU C Library.
The GNU C Library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
The GNU C Library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with the GNU C Library; if not, see
. */
#include
#include
#include
static char buf[SIGSTKSZ * 4];
static jmp_buf jb;
static void
handler (int sig)
{
if (sig == SIGUSR1)
{
if (setjmp (jb) != 0)
{
puts ("setjmp should not have been called");
kill (getpid (), SIGTERM);
}
}
else if (sig == SIGABRT)
{
/* Yeah it worked. */
_exit (0);
}
}
static int
do_test (void)
{
stack_t ss;
set_fortify_handler (handler);
/* Create a valid signal stack and enable it. */
ss.ss_sp = buf;
ss.ss_size = sizeof (buf);
ss.ss_flags = 0;
if (sigaltstack (&ss, NULL) < 0)
{
printf ("first sigaltstack failed: %m\n");
return 1;
}
/* Trigger the signal handler which will create a jmpbuf that points to the
end of the signal stack. */
signal (SIGUSR1, handler);
kill (getpid (), SIGUSR1);
/* Shrink the signal stack so the jmpbuf is now invalid.
We adjust the start & end to handle stacks that grow up & down. */
ss.ss_sp = buf + sizeof (buf) / 2;
ss.ss_size = sizeof (buf) / 4;
if (sigaltstack (&ss, NULL) < 0)
{
printf ("second sigaltstack failed: %m\n");
return 1;
}
/* This should fail. */
longjmp (jb, 1);
puts ("longjmp returned and shouldn't");
return 1;
}
#include