blob: 09ea8b366a07941ad3636184410319f9aecd9763 [file] [log] [blame]
/**
* @license
* Copyright 2019 The Emscripten Authors
* SPDX-License-Identifier: MIT
*/
#if STACK_OVERFLOW_CHECK
// Initializes the stack cookie. Called at the startup of main and at the startup of each thread in pthreads mode.
function writeStackCookie() {
var max = _emscripten_stack_get_end();
#if ASSERTIONS
assert((max & 3) == 0);
#endif
// The stack grows downwards
{{{ makeSetValue('max + 4', 0, '0x2135467', 'i32' ) }}};
{{{ makeSetValue('max + 8', 0, '0x89BACDFE', 'i32' ) }}};
#if !USE_ASAN && !SAFE_HEAP // ASan and SAFE_HEAP check address 0 themselves
// Also test the global address 0 for integrity.
HEAP32[0] = 0x63736d65; /* 'emsc' */
#endif
}
function checkStackCookie() {
#if !MINIMAL_RUNTIME
if (ABORT) return;
#endif
var max = _emscripten_stack_get_end();
var cookie1 = {{{ makeGetValue('max + 4', '0', 'i32', 0, true) }}};
var cookie2 = {{{ makeGetValue('max + 8', '0', 'i32', 0, true) }}};
if (cookie1 != 0x2135467 || cookie2 != 0x89BACDFE) {
abort('Stack overflow! Stack cookie has been overwritten, expected hex dwords 0x89BACDFE and 0x2135467, but received 0x' + cookie2.toString(16) + ' 0x' + cookie1.toString(16));
}
#if !USE_ASAN && !SAFE_HEAP // ASan and SAFE_HEAP check address 0 themselves
// Also test the global address 0 for integrity.
if (HEAP32[0] !== 0x63736d65 /* 'emsc' */) abort('Runtime error: The application has corrupted its heap memory area (address zero)!');
#endif
}
#endif