blob: e29055d19417bc0f1d771ab4618588b3b3788999 (
plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
|
/* { dg-do run } */
/* { dg-options "-fstrub=strict" } */
/* { dg-require-effective-target strub } */
/* Check that a non-strub function leaves a string behind in the stack, and that
equivalent strub functions don't. */
const char test_string[] = "\x55\xde\xad\xbe\xef\xc0\x1d\xca\xfe\x55\xaa";
static inline __attribute__ ((__always_inline__, __strub__ ("callable")))
char *
leak_string (void)
{
int len = sizeof (test_string);
char *s = (char *) __builtin_alloca (len);
__builtin_strcpy (s, test_string);
asm ("" : "+m" (s));
return (char *) __builtin_stack_address ();
}
static inline __attribute__ ((__always_inline__))
int
look_for_string (char *e)
{
char *p = (char *) __builtin_stack_address ();
if (p == e)
__builtin_abort ();
if (p > e)
{
char *q = p;
p = e;
e = q;
}
for (char *re = e - sizeof (test_string); p < re; p++)
for (int i = 0; p[i] == test_string[i]; i++)
if (i == sizeof (test_string) - 1)
return i;
return 0;
}
static __attribute__ ((__noinline__, __noclone__))
char *
callable ()
{
return leak_string ();
}
static __attribute__ ((__strub__ ("at-calls")))
char *
at_calls ()
{
return leak_string ();
}
static __attribute__ ((__strub__ ("internal")))
char *
internal ()
{
return leak_string ();
}
int main ()
{
/* Since these test check stack contents above the top of the stack, an
unexpected asynchronous signal or interrupt might overwrite the bits we
expect to find and cause spurious fails. Tolerate one such overall
spurious fail by retrying. */
int i = 1;
while (!look_for_string (callable ()))
if (!i--) __builtin_abort ();
while (look_for_string (at_calls ()))
if (!i--) __builtin_abort ();
while (look_for_string (internal ()))
if (!i--) __builtin_abort ();
__builtin_exit (0);
}
|