mirror of
https://github.com/bytecodealliance/wasm-micro-runtime.git
synced 2025-05-09 13:16:26 +00:00
Add native-stack-overflow sample (#3321)
This is a test code to examine native stack overflow detection logic. The current output on my environment (macOS amd64): ```shell ====== Interpreter stack size | fail? | leak? | exception --------------------------------------------------------------------------- 0 - 14704 | failed | leaked | Exception: native stack overflow 14704 - 17904 | failed | ok | Exception: native stack overflow 17904 - 24576 | ok | ok | ====== AOT stack size | fail? | leak? | exception --------------------------------------------------------------------------- 0 - 18176 | failed | leaked | Exception: native stack overflow 18176 - 24576 | ok | ok | ====== AOT WAMR_DISABLE_HW_BOUND_CHECK=1 stack size | fail? | leak? | exception --------------------------------------------------------------------------- 0 - 1968 | failed | ok | Exception: native stack overflow 1968 - 24576 | ok | ok | ``` This is a preparation to work on relevant issues, including: https://github.com/bytecodealliance/wasm-micro-runtime/issues/3325 https://github.com/bytecodealliance/wasm-micro-runtime/issues/3320 https://github.com/bytecodealliance/wasm-micro-runtime/issues/3314 https://github.com/bytecodealliance/wasm-micro-runtime/issues/3297
This commit is contained in:
parent
f6481cedec
commit
d6e8d224ce
1
samples/native-stack-overflow/.gitignore
vendored
Normal file
1
samples/native-stack-overflow/.gitignore
vendored
Normal file
|
@ -0,0 +1 @@
|
||||||
|
/out/
|
87
samples/native-stack-overflow/CMakeLists.txt
Normal file
87
samples/native-stack-overflow/CMakeLists.txt
Normal file
|
@ -0,0 +1,87 @@
|
||||||
|
# Copyright (C) 2019 Intel Corporation. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
||||||
|
|
||||||
|
cmake_minimum_required (VERSION 3.14)
|
||||||
|
|
||||||
|
include(CheckPIESupported)
|
||||||
|
|
||||||
|
if (NOT WAMR_BUILD_PLATFORM STREQUAL "windows")
|
||||||
|
project (native-stack-overflow)
|
||||||
|
else()
|
||||||
|
project (native-stack-overflow C ASM)
|
||||||
|
endif()
|
||||||
|
|
||||||
|
################ runtime settings ################
|
||||||
|
string (TOLOWER ${CMAKE_HOST_SYSTEM_NAME} WAMR_BUILD_PLATFORM)
|
||||||
|
if (APPLE)
|
||||||
|
add_definitions(-DBH_PLATFORM_DARWIN)
|
||||||
|
endif ()
|
||||||
|
|
||||||
|
# Reset default linker flags
|
||||||
|
set (CMAKE_SHARED_LIBRARY_LINK_C_FLAGS "")
|
||||||
|
set (CMAKE_SHARED_LIBRARY_LINK_CXX_FLAGS "")
|
||||||
|
|
||||||
|
# WAMR features switch
|
||||||
|
|
||||||
|
# Set WAMR_BUILD_TARGET, currently values supported:
|
||||||
|
# "X86_64", "AMD_64", "X86_32", "AARCH64[sub]", "ARM[sub]", "THUMB[sub]",
|
||||||
|
# "MIPS", "XTENSA", "RISCV64[sub]", "RISCV32[sub]"
|
||||||
|
if (NOT DEFINED WAMR_BUILD_TARGET)
|
||||||
|
if (CMAKE_SYSTEM_PROCESSOR MATCHES "^(arm64|aarch64)")
|
||||||
|
set (WAMR_BUILD_TARGET "AARCH64")
|
||||||
|
elseif (CMAKE_SYSTEM_PROCESSOR STREQUAL "riscv64")
|
||||||
|
set (WAMR_BUILD_TARGET "RISCV64")
|
||||||
|
elseif (CMAKE_SIZEOF_VOID_P EQUAL 8)
|
||||||
|
# Build as X86_64 by default in 64-bit platform
|
||||||
|
set (WAMR_BUILD_TARGET "X86_64")
|
||||||
|
elseif (CMAKE_SIZEOF_VOID_P EQUAL 4)
|
||||||
|
# Build as X86_32 by default in 32-bit platform
|
||||||
|
set (WAMR_BUILD_TARGET "X86_32")
|
||||||
|
else ()
|
||||||
|
message(SEND_ERROR "Unsupported build target platform!")
|
||||||
|
endif ()
|
||||||
|
endif ()
|
||||||
|
|
||||||
|
if (NOT CMAKE_BUILD_TYPE)
|
||||||
|
set (CMAKE_BUILD_TYPE Debug)
|
||||||
|
endif ()
|
||||||
|
|
||||||
|
set (WAMR_BUILD_INTERP 1)
|
||||||
|
set (WAMR_BUILD_AOT 1)
|
||||||
|
set (WAMR_BUILD_JIT 0)
|
||||||
|
set (WAMR_BUILD_LIBC_BUILTIN 0)
|
||||||
|
set (WAMR_BUILD_LIBC_WASI 1)
|
||||||
|
|
||||||
|
if (NOT MSVC)
|
||||||
|
# linker flags
|
||||||
|
if (NOT (CMAKE_C_COMPILER MATCHES ".*clang.*" OR CMAKE_C_COMPILER_ID MATCHES ".*Clang"))
|
||||||
|
set (CMAKE_EXE_LINKER_FLAGS "${CMAKE_EXE_LINKER_FLAGS} -Wl,--gc-sections")
|
||||||
|
endif ()
|
||||||
|
set (CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -Wall -Wextra -Wformat -Wformat-security")
|
||||||
|
if (WAMR_BUILD_TARGET MATCHES "X86_.*" OR WAMR_BUILD_TARGET STREQUAL "AMD_64")
|
||||||
|
if (NOT (CMAKE_C_COMPILER MATCHES ".*clang.*" OR CMAKE_C_COMPILER_ID MATCHES ".*Clang"))
|
||||||
|
set (CMAKE_C_FLAGS "${CMAKE_C_FLAGS} -mindirect-branch-register")
|
||||||
|
endif ()
|
||||||
|
endif ()
|
||||||
|
endif ()
|
||||||
|
|
||||||
|
# build out vmlib
|
||||||
|
set (WAMR_ROOT_DIR ${CMAKE_CURRENT_LIST_DIR}/../..)
|
||||||
|
include (${WAMR_ROOT_DIR}/build-scripts/runtime_lib.cmake)
|
||||||
|
|
||||||
|
add_library(vmlib ${WAMR_RUNTIME_LIB_SOURCE})
|
||||||
|
|
||||||
|
################ application related ################
|
||||||
|
include_directories(${CMAKE_CURRENT_LIST_DIR}/src)
|
||||||
|
include (${SHARED_DIR}/utils/uncommon/shared_uncommon.cmake)
|
||||||
|
|
||||||
|
add_executable (native-stack-overflow src/main.c src/native_impl.c ${UNCOMMON_SHARED_SOURCE})
|
||||||
|
|
||||||
|
check_pie_supported()
|
||||||
|
set_target_properties (native-stack-overflow PROPERTIES POSITION_INDEPENDENT_CODE ON)
|
||||||
|
|
||||||
|
if (APPLE)
|
||||||
|
target_link_libraries (native-stack-overflow vmlib -lm -ldl -lpthread)
|
||||||
|
else ()
|
||||||
|
target_link_libraries (native-stack-overflow vmlib -lm -ldl -lpthread -lrt)
|
||||||
|
endif ()
|
4
samples/native-stack-overflow/README.md
Normal file
4
samples/native-stack-overflow/README.md
Normal file
|
@ -0,0 +1,4 @@
|
||||||
|
The "native-stack-overflow" sample project
|
||||||
|
==========================================
|
||||||
|
|
||||||
|
This sample examines native stack overflow detection mechanisms.
|
75
samples/native-stack-overflow/build.sh
Executable file
75
samples/native-stack-overflow/build.sh
Executable file
|
@ -0,0 +1,75 @@
|
||||||
|
#
|
||||||
|
# Copyright (C) 2019 Intel Corporation. All rights reserved.
|
||||||
|
# SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
||||||
|
#
|
||||||
|
|
||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
CURR_DIR=$PWD
|
||||||
|
WAMR_DIR=${PWD}/../..
|
||||||
|
OUT_DIR=${PWD}/out
|
||||||
|
|
||||||
|
WASM_APPS=${PWD}/wasm-apps
|
||||||
|
|
||||||
|
|
||||||
|
rm -rf ${OUT_DIR}
|
||||||
|
mkdir ${OUT_DIR}
|
||||||
|
mkdir ${OUT_DIR}/wasm-apps
|
||||||
|
|
||||||
|
|
||||||
|
echo "##################### build (default)"
|
||||||
|
cd ${CURR_DIR}
|
||||||
|
mkdir -p cmake_build
|
||||||
|
cd cmake_build
|
||||||
|
cmake ..
|
||||||
|
make -j 4
|
||||||
|
if [ $? != 0 ];then
|
||||||
|
echo "BUILD_FAIL native-stack-overflow exit as $?\n"
|
||||||
|
exit 2
|
||||||
|
fi
|
||||||
|
cp -a native-stack-overflow ${OUT_DIR}
|
||||||
|
|
||||||
|
echo "##################### build (WAMR_DISABLE_HW_BOUND_CHECK=1)"
|
||||||
|
cd ${CURR_DIR}
|
||||||
|
mkdir -p cmake_build_disable_hw_bound
|
||||||
|
cd cmake_build_disable_hw_bound
|
||||||
|
cmake -D WAMR_DISABLE_HW_BOUND_CHECK=1 ..
|
||||||
|
make -j 4
|
||||||
|
if [ $? != 0 ];then
|
||||||
|
echo "BUILD_FAIL native-stack-overflow exit as $?\n"
|
||||||
|
exit 2
|
||||||
|
fi
|
||||||
|
cp -a native-stack-overflow ${OUT_DIR}/native-stack-overflow.WAMR_DISABLE_HW_BOUND_CHECK
|
||||||
|
|
||||||
|
echo
|
||||||
|
|
||||||
|
echo "##################### build wasm apps"
|
||||||
|
|
||||||
|
cd ${WASM_APPS}
|
||||||
|
|
||||||
|
for i in `ls *.c`
|
||||||
|
do
|
||||||
|
APP_SRC="$i"
|
||||||
|
OUT_FILE=${i%.*}.wasm
|
||||||
|
|
||||||
|
# use WAMR SDK to build out the .wasm binary
|
||||||
|
/opt/wasi-sdk/bin/clang \
|
||||||
|
-mexec-model=reactor \
|
||||||
|
-Os -z stack-size=4096 -Wl,--initial-memory=65536 \
|
||||||
|
-Wl,--allow-undefined \
|
||||||
|
-o ${OUT_DIR}/wasm-apps/${OUT_FILE} ${APP_SRC}
|
||||||
|
|
||||||
|
if [ -f ${OUT_DIR}/wasm-apps/${OUT_FILE} ]; then
|
||||||
|
echo "build ${OUT_FILE} success"
|
||||||
|
else
|
||||||
|
echo "build ${OUT_FILE} fail"
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
echo "#################### build wasm apps done"
|
||||||
|
|
||||||
|
echo "#################### aot-compile"
|
||||||
|
WAMRC=${WAMR_DIR}/wamr-compiler/build/wamrc
|
||||||
|
${WAMRC} -o ${OUT_DIR}/wasm-apps/${OUT_FILE}.aot ${OUT_DIR}/wasm-apps/${OUT_FILE}
|
||||||
|
|
||||||
|
echo "#################### aot-compile (--bounds-checks=1)"
|
||||||
|
${WAMRC} -o ${OUT_DIR}/wasm-apps/${OUT_FILE}.aot.bounds-checks --bounds-checks=1 ${OUT_DIR}/wasm-apps/${OUT_FILE}
|
1
samples/native-stack-overflow/clean.sh
Executable file
1
samples/native-stack-overflow/clean.sh
Executable file
|
@ -0,0 +1 @@
|
||||||
|
rm -r cmake_build cmake_build_disable_hw_bound out
|
12
samples/native-stack-overflow/run.sh
Executable file
12
samples/native-stack-overflow/run.sh
Executable file
|
@ -0,0 +1,12 @@
|
||||||
|
#!/bin/bash
|
||||||
|
|
||||||
|
echo "====== Interpreter"
|
||||||
|
out/native-stack-overflow out/wasm-apps/testapp.wasm
|
||||||
|
|
||||||
|
echo
|
||||||
|
echo "====== AOT"
|
||||||
|
out/native-stack-overflow out/wasm-apps/testapp.wasm.aot
|
||||||
|
|
||||||
|
echo
|
||||||
|
echo "====== AOT WAMR_DISABLE_HW_BOUND_CHECK=1"
|
||||||
|
out/native-stack-overflow.WAMR_DISABLE_HW_BOUND_CHECK out/wasm-apps/testapp.wasm.aot.bounds-checks
|
178
samples/native-stack-overflow/src/main.c
Normal file
178
samples/native-stack-overflow/src/main.c
Normal file
|
@ -0,0 +1,178 @@
|
||||||
|
/*
|
||||||
|
* Copyright (C) 2024 Midokura Japan KK. All rights reserved.
|
||||||
|
* SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include "wasm_export.h"
|
||||||
|
#include "bh_read_file.h"
|
||||||
|
|
||||||
|
uint32_t
|
||||||
|
host_consume_stack_and_call_indirect(wasm_exec_env_t exec_env, uint32_t funcidx,
|
||||||
|
uint32_t x, uint32_t stack);
|
||||||
|
uint32_t
|
||||||
|
host_consume_stack(wasm_exec_env_t exec_env, uint32_t stack);
|
||||||
|
|
||||||
|
extern unsigned int nest;
|
||||||
|
|
||||||
|
static NativeSymbol native_symbols[] = {
|
||||||
|
{ "host_consume_stack_and_call_indirect",
|
||||||
|
host_consume_stack_and_call_indirect, "(iii)i", NULL },
|
||||||
|
{ "host_consume_stack", host_consume_stack, "(i)i", NULL },
|
||||||
|
};
|
||||||
|
|
||||||
|
struct record {
|
||||||
|
bool failed;
|
||||||
|
bool leaked;
|
||||||
|
char exception[128]; /* EXCEPTION_BUF_LEN */
|
||||||
|
};
|
||||||
|
|
||||||
|
void
|
||||||
|
print_record(unsigned int start, unsigned int end, const struct record *rec)
|
||||||
|
{
|
||||||
|
printf("%5u - %5u | %6s | %6s | %s\n", start, end,
|
||||||
|
rec->failed ? "failed" : "ok", rec->leaked ? "leaked" : "ok",
|
||||||
|
rec->exception);
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
main(int argc, char **argv)
|
||||||
|
{
|
||||||
|
char *buffer;
|
||||||
|
char error_buf[128];
|
||||||
|
|
||||||
|
if (argc != 2) {
|
||||||
|
return 2;
|
||||||
|
}
|
||||||
|
char *module_path = argv[1];
|
||||||
|
|
||||||
|
wasm_module_t module = NULL;
|
||||||
|
uint32 buf_size;
|
||||||
|
uint32 stack_size = 4096;
|
||||||
|
/*
|
||||||
|
* disable app heap.
|
||||||
|
* - we use wasi
|
||||||
|
* - https://github.com/bytecodealliance/wasm-micro-runtime/issues/2275
|
||||||
|
*/
|
||||||
|
uint32 heap_size = 0;
|
||||||
|
|
||||||
|
RuntimeInitArgs init_args;
|
||||||
|
memset(&init_args, 0, sizeof(RuntimeInitArgs));
|
||||||
|
init_args.mem_alloc_type = Alloc_With_System_Allocator;
|
||||||
|
init_args.n_native_symbols = sizeof(native_symbols) / sizeof(NativeSymbol);
|
||||||
|
init_args.native_module_name = "env";
|
||||||
|
init_args.native_symbols = native_symbols;
|
||||||
|
if (!wasm_runtime_full_init(&init_args)) {
|
||||||
|
printf("wasm_runtime_full_init failed.\n");
|
||||||
|
return -1;
|
||||||
|
}
|
||||||
|
|
||||||
|
buffer = bh_read_file_to_buffer(module_path, &buf_size);
|
||||||
|
if (!buffer) {
|
||||||
|
printf("bh_read_file_to_buffer failed\n");
|
||||||
|
goto fail;
|
||||||
|
}
|
||||||
|
|
||||||
|
module = wasm_runtime_load((uint8 *)buffer, buf_size, error_buf,
|
||||||
|
sizeof(error_buf));
|
||||||
|
if (!module) {
|
||||||
|
printf("wasm_runtime_load failed: %s\n", error_buf);
|
||||||
|
goto fail;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* header */
|
||||||
|
printf(" stack size | fail? | leak? | exception\n");
|
||||||
|
printf("-------------------------------------------------------------------"
|
||||||
|
"--------\n");
|
||||||
|
|
||||||
|
unsigned int stack;
|
||||||
|
unsigned int prevstack;
|
||||||
|
unsigned int stack_range_start = 0;
|
||||||
|
unsigned int stack_range_end = 4096 * 6;
|
||||||
|
unsigned int step = 16;
|
||||||
|
struct record rec0;
|
||||||
|
struct record rec1;
|
||||||
|
struct record *rec = &rec0;
|
||||||
|
struct record *prevrec = &rec1;
|
||||||
|
bool have_prevrec = false;
|
||||||
|
for (stack = stack_range_start; stack < stack_range_end; stack += step) {
|
||||||
|
wasm_module_inst_t module_inst = NULL;
|
||||||
|
wasm_exec_env_t exec_env = NULL;
|
||||||
|
bool failed = true;
|
||||||
|
const char *exception = NULL;
|
||||||
|
nest = 0;
|
||||||
|
|
||||||
|
module_inst = wasm_runtime_instantiate(module, stack_size, heap_size,
|
||||||
|
error_buf, sizeof(error_buf));
|
||||||
|
if (!module_inst) {
|
||||||
|
printf("wasm_runtime_instantiate failed: %s\n", error_buf);
|
||||||
|
goto fail2;
|
||||||
|
}
|
||||||
|
|
||||||
|
exec_env = wasm_runtime_create_exec_env(module_inst, stack_size);
|
||||||
|
if (!exec_env) {
|
||||||
|
printf("wasm_runtime_create_exec_env failed\n");
|
||||||
|
goto fail2;
|
||||||
|
}
|
||||||
|
|
||||||
|
const char *funcname = "test";
|
||||||
|
wasm_function_inst_t func =
|
||||||
|
wasm_runtime_lookup_function(module_inst, funcname);
|
||||||
|
if (!func) {
|
||||||
|
printf("wasm_runtime_lookup_function failed for %s\n", funcname);
|
||||||
|
goto fail2;
|
||||||
|
}
|
||||||
|
|
||||||
|
/* note: the function type is (ii)i */
|
||||||
|
uint32_t wasm_argv[] = {
|
||||||
|
stack,
|
||||||
|
30,
|
||||||
|
};
|
||||||
|
uint32_t wasm_argc = 2;
|
||||||
|
if (!wasm_runtime_call_wasm(exec_env, func, wasm_argc, wasm_argv)) {
|
||||||
|
exception = wasm_runtime_get_exception(module_inst);
|
||||||
|
goto fail2;
|
||||||
|
}
|
||||||
|
failed = false;
|
||||||
|
fail2:
|
||||||
|
/*
|
||||||
|
* note: non-zero "nest" here demonstrates resource leak on longjmp
|
||||||
|
* from signal handler.
|
||||||
|
* cf.
|
||||||
|
* https://github.com/bytecodealliance/wasm-micro-runtime/issues/3320
|
||||||
|
*/
|
||||||
|
memset(rec, 0, sizeof(*rec));
|
||||||
|
rec->failed = failed;
|
||||||
|
rec->leaked = nest != 0;
|
||||||
|
strncpy(rec->exception, exception ? exception : "",
|
||||||
|
sizeof(rec->exception));
|
||||||
|
if (have_prevrec && memcmp(prevrec, rec, sizeof(*rec))) {
|
||||||
|
print_record(prevstack, stack, prevrec);
|
||||||
|
have_prevrec = false;
|
||||||
|
}
|
||||||
|
if (!have_prevrec) {
|
||||||
|
prevstack = stack;
|
||||||
|
struct record *tmp = prevrec;
|
||||||
|
prevrec = rec;
|
||||||
|
rec = tmp;
|
||||||
|
have_prevrec = true;
|
||||||
|
}
|
||||||
|
if (exec_env) {
|
||||||
|
wasm_runtime_destroy_exec_env(exec_env);
|
||||||
|
}
|
||||||
|
if (module_inst) {
|
||||||
|
wasm_runtime_deinstantiate(module_inst);
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if (have_prevrec) {
|
||||||
|
print_record(prevstack, stack, prevrec);
|
||||||
|
}
|
||||||
|
|
||||||
|
fail:
|
||||||
|
if (module) {
|
||||||
|
wasm_runtime_unload(module);
|
||||||
|
}
|
||||||
|
if (buffer) {
|
||||||
|
BH_FREE(buffer);
|
||||||
|
}
|
||||||
|
wasm_runtime_destroy();
|
||||||
|
}
|
71
samples/native-stack-overflow/src/native_impl.c
Normal file
71
samples/native-stack-overflow/src/native_impl.c
Normal file
|
@ -0,0 +1,71 @@
|
||||||
|
/*
|
||||||
|
* Copyright (C) 2024 Midokura Japan KK. All rights reserved.
|
||||||
|
* SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <inttypes.h>
|
||||||
|
#include <stdio.h>
|
||||||
|
|
||||||
|
#include "wasm_export.h"
|
||||||
|
#include "bh_platform.h"
|
||||||
|
|
||||||
|
/*
|
||||||
|
* this "nest" var has two purposes:
|
||||||
|
* - prevent tail-call optimization
|
||||||
|
* - detect possible resource leak
|
||||||
|
*/
|
||||||
|
unsigned int nest = 0;
|
||||||
|
ptrdiff_t prev_diff = 0;
|
||||||
|
|
||||||
|
uint32_t
|
||||||
|
call_indirect(wasm_exec_env_t exec_env, uint32_t funcidx, uint32_t x)
|
||||||
|
{
|
||||||
|
uint32_t argv[1] = {
|
||||||
|
x,
|
||||||
|
};
|
||||||
|
uint32_t argc = 1;
|
||||||
|
if (!wasm_runtime_call_indirect(exec_env, funcidx, argc, argv)) {
|
||||||
|
/* failed */
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return argv[0];
|
||||||
|
}
|
||||||
|
|
||||||
|
uint32_t
|
||||||
|
host_consume_stack_and_call_indirect(wasm_exec_env_t exec_env, uint32_t funcidx,
|
||||||
|
uint32_t x, uint32_t stack)
|
||||||
|
{
|
||||||
|
void *boundary = os_thread_get_stack_boundary();
|
||||||
|
void *fp = __builtin_frame_address(0);
|
||||||
|
ptrdiff_t diff = fp - boundary;
|
||||||
|
if (diff > stack) {
|
||||||
|
prev_diff = diff;
|
||||||
|
nest++;
|
||||||
|
uint32_t ret =
|
||||||
|
host_consume_stack_and_call_indirect(exec_env, funcidx, x, stack);
|
||||||
|
nest--;
|
||||||
|
return ret;
|
||||||
|
}
|
||||||
|
return call_indirect(exec_env, funcidx, x);
|
||||||
|
}
|
||||||
|
|
||||||
|
static uint32_t
|
||||||
|
consume_stack1(wasm_exec_env_t exec_env, void *base, uint32_t stack)
|
||||||
|
{
|
||||||
|
void *fp = __builtin_frame_address(0);
|
||||||
|
ptrdiff_t diff = (unsigned char *)base - (unsigned char *)fp;
|
||||||
|
assert(diff > 0);
|
||||||
|
char buf[16];
|
||||||
|
memset_s(buf, sizeof(buf), 0, sizeof(buf));
|
||||||
|
if (diff > stack) {
|
||||||
|
return diff;
|
||||||
|
}
|
||||||
|
return consume_stack1(exec_env, base, stack);
|
||||||
|
}
|
||||||
|
|
||||||
|
uint32_t
|
||||||
|
host_consume_stack(wasm_exec_env_t exec_env, uint32_t stack)
|
||||||
|
{
|
||||||
|
void *base = __builtin_frame_address(0);
|
||||||
|
return consume_stack1(exec_env, base, stack);
|
||||||
|
}
|
54
samples/native-stack-overflow/wasm-apps/testapp.c
Normal file
54
samples/native-stack-overflow/wasm-apps/testapp.c
Normal file
|
@ -0,0 +1,54 @@
|
||||||
|
/*
|
||||||
|
* Copyright (C) 2024 Midokura Japan KK. All rights reserved.
|
||||||
|
* SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
|
||||||
|
*/
|
||||||
|
|
||||||
|
#include <stdio.h>
|
||||||
|
#include <stdint.h>
|
||||||
|
|
||||||
|
uint32_t
|
||||||
|
host_consume_stack_and_call_indirect(int (*)(int), uint32_t, uint32_t);
|
||||||
|
uint32_t host_consume_stack(uint32_t);
|
||||||
|
|
||||||
|
int
|
||||||
|
cb(int x)
|
||||||
|
{
|
||||||
|
return x * x;
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
consume_stack_cb(int x)
|
||||||
|
{
|
||||||
|
/*
|
||||||
|
* intentions:
|
||||||
|
*
|
||||||
|
* - consume native stack by making recursive calls
|
||||||
|
*
|
||||||
|
* - avoid tail-call optimization (either by the C compiler or
|
||||||
|
* aot-compiler)
|
||||||
|
*/
|
||||||
|
if (x == 0) {
|
||||||
|
return 0;
|
||||||
|
}
|
||||||
|
return consume_stack_cb(x - 1) + 1;
|
||||||
|
}
|
||||||
|
|
||||||
|
int
|
||||||
|
host_consume_stack_cb(int x)
|
||||||
|
{
|
||||||
|
return host_consume_stack(x);
|
||||||
|
}
|
||||||
|
|
||||||
|
__attribute__((export_name("test"))) uint32_t
|
||||||
|
test(uint32_t native_stack, uint32_t recurse_count)
|
||||||
|
{
|
||||||
|
uint32_t ret;
|
||||||
|
ret = host_consume_stack_and_call_indirect(cb, 321, native_stack);
|
||||||
|
ret = host_consume_stack_and_call_indirect(consume_stack_cb, recurse_count,
|
||||||
|
native_stack);
|
||||||
|
#if 0 /* notyet */
|
||||||
|
ret = host_consume_stack_and_call_indirect(host_consume_stack_cb, 1000000,
|
||||||
|
native_stack);
|
||||||
|
#endif
|
||||||
|
return 42;
|
||||||
|
}
|
Loading…
Reference in New Issue
Block a user