File: canary.c

package info (click to toggle)
llvm-toolchain-3.9 1%3A3.9.1-9
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 441,144 kB
  • ctags: 428,836
  • sloc: cpp: 2,546,577; ansic: 538,318; asm: 119,677; objc: 103,316; python: 102,148; sh: 27,847; pascal: 5,626; ml: 5,510; perl: 5,293; lisp: 4,801; makefile: 2,177; xml: 686; cs: 362; php: 212; csh: 117
file content (37 lines) | stat: -rw-r--r-- 1,001 bytes parent folder | download | duplicates (3)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
// RUN: %clang_safestack -fno-stack-protector -D_FORTIFY_SOURCE=0 -g %s -o %t.nossp
// RUN: %run %t.nossp 2>&1 | FileCheck --check-prefix=NOSSP %s

// RUN: %clang_safestack -fstack-protector-all -D_FORTIFY_SOURCE=0 -g %s -o %t.ssp
// RUN: not --crash %run %t.ssp 2>&1 | FileCheck -check-prefix=SSP %s

// Test stack canaries on the unsafe stack.

// REQUIRES: stable-runtime

#include <assert.h>
#include <stdio.h>
#include <string.h>

__attribute__((noinline)) void f(unsigned *y) {
  char x;
  char *volatile p = &x;
  char *volatile q = (char *)y;
  assert(p < q);
  assert(q - p < 1024); // sanity
  // This has technically undefined behavior, but we know the actual layout of
  // the unsafe stack and this should not touch anything important.
  memset(&x, 0xab, q - p + sizeof(*y));
}

int main(int argc, char **argv)
{
  unsigned y;
  // NOSSP: main 1
  // SSP: main 1
  fprintf(stderr, "main 1\n");
  f(&y);
  // NOSSP: main 2
  // SSP-NOT: main 2
  fprintf(stderr, "main 2\n");
  return 0;
}