mirror of
https://github.com/rust-lang/rust.git
synced 2024-11-01 06:51:58 +00:00
100 lines
3.3 KiB
Rust
100 lines
3.3 KiB
Rust
// run-pass
|
|
// only-x86_64-unknown-linux-gnu
|
|
// revisions: ssp no-ssp
|
|
// [ssp] compile-flags: -Z stack-protector=all
|
|
// compile-flags: -C opt-level=2
|
|
// compile-flags: -g
|
|
|
|
use std::env;
|
|
use std::process::{Command, ExitStatus};
|
|
|
|
fn main() {
|
|
if env::args().len() == 1 {
|
|
// The test is initially run without arguments. Start the process again,
|
|
// this time *with* an argument; in this configuration, the test program
|
|
// will deliberately smash the stack.
|
|
let cur_argv0 = env::current_exe().unwrap();
|
|
let mut child = Command::new(&cur_argv0);
|
|
child.arg("stacksmash");
|
|
|
|
if cfg!(ssp) {
|
|
assert_stack_smash_prevented(&mut child);
|
|
} else {
|
|
assert_stack_smashed(&mut child);
|
|
}
|
|
} else {
|
|
vulnerable_function();
|
|
// If we return here the test is broken: it should either have called
|
|
// malicious_code() which terminates the process, or be caught by the
|
|
// stack check which also terminates the process.
|
|
panic!("TEST BUG: stack smash unsuccessful");
|
|
}
|
|
}
|
|
|
|
// Avoid inlining to make sure the return address is pushed to stack.
|
|
#[inline(never)]
|
|
fn vulnerable_function() {
|
|
let mut x = 5usize;
|
|
let stackaddr = &mut x as *mut usize;
|
|
let bad_code_ptr = malicious_code as usize;
|
|
// Overwrite the on-stack return address with the address of `malicious_code()`,
|
|
// thereby jumping to that function when returning from `vulnerable_function()`.
|
|
unsafe { fill(stackaddr, bad_code_ptr, 20); }
|
|
}
|
|
|
|
// Use an uninlined function with its own stack frame to make sure that we don't
|
|
// clobber e.g. the counter or address local variable.
|
|
#[inline(never)]
|
|
unsafe fn fill(addr: *mut usize, val: usize, count: usize) {
|
|
let mut addr = addr;
|
|
for _ in 0..count {
|
|
*addr = val;
|
|
addr = addr.add(1);
|
|
}
|
|
}
|
|
|
|
// We jump to malicious_code() having wreaked havoc with the previous stack
|
|
// frame and not setting up a new one. This function is therefore constrained,
|
|
// e.g. both println!() and std::process::exit() segfaults if called. We
|
|
// therefore keep the amount of work to a minimum by calling POSIX functions
|
|
// directly.
|
|
// The function is un-inlined just to make it possible to set a breakpoint here.
|
|
#[inline(never)]
|
|
fn malicious_code() {
|
|
let msg = [112u8, 119u8, 110u8, 101u8, 100u8, 33u8, 0u8]; // "pwned!\0" ascii
|
|
unsafe {
|
|
write(1, &msg as *const u8, msg.len());
|
|
_exit(0);
|
|
}
|
|
}
|
|
extern "C" {
|
|
fn write(fd: i32, buf: *const u8, count: usize) -> isize;
|
|
fn _exit(status: i32) -> !;
|
|
}
|
|
|
|
|
|
fn assert_stack_smash_prevented(cmd: &mut Command) {
|
|
let (status, stdout, stderr) = run(cmd);
|
|
assert!(!status.success());
|
|
assert!(stdout.is_empty());
|
|
assert!(stderr.contains("stack smashing detected"));
|
|
}
|
|
|
|
fn assert_stack_smashed(cmd: &mut Command) {
|
|
let (status, stdout, stderr) = run(cmd);
|
|
assert!(status.success());
|
|
assert!(stdout.contains("pwned!"));
|
|
assert!(stderr.is_empty());
|
|
}
|
|
|
|
|
|
fn run(cmd: &mut Command) -> (ExitStatus, String, String) {
|
|
let output = cmd.output().unwrap();
|
|
let stdout = String::from_utf8_lossy(&output.stdout);
|
|
let stderr = String::from_utf8_lossy(&output.stderr);
|
|
println!("status: {}", output.status);
|
|
println!("stdout: {}", stdout);
|
|
println!("stderr: {}", stderr);
|
|
(output.status, stdout.to_string(), stderr.to_string())
|
|
}
|