Files
clang-p2996/compiler-rt/test/asan/TestCases/Linux/swapcontext_test.cpp
Ivan Trofimov b380e8b689 [runtimes][asan] Fix swapcontext interception
Resetting oucp's stack to zero in swapcontext interception is incorrect,
since it breaks ucp cleanup after swapcontext returns in some cases:

Say we have two contexts, A and B, and we swapcontext from A to B, do
some work on Bs stack and then swapcontext back from B to A. At this
point shadow memory of Bs stack is in arbitrary state, but since we
can't know whether B will ever swapcontext-ed to again we clean up it's
shadow memory, because otherwise it remains poisoned and blows in
completely unrelated places when heap-allocated memory of Bs context
gets reused later (see https://github.com/llvm/llvm-project/issues/58633
for example). swapcontext prototype is swapcontext(ucontext* oucp,
ucontext* ucp), so in this example A is oucp and B is ucp, and i refer
to the process of cleaning up Bs shadow memory as ucp cleanup.

About how it breaks:
Take the same example with A and B: when we swapcontext back from B to A
the oucp parameter of swapcontext is actually B, and current trunk
resets its stack in a way that it becomes "uncleanupable" later. It
works fine if we do A->B->A, but if we do A->B->A->B->A no cleanup is
performed for Bs stack after B "returns" to A second time. That's
exactly what happens in the test i provided, and it's actually a pretty
common real world scenario.

Instead of resetting oucp's we make use of uc_stack.ss_flags to mark
context as "cleanup-able" by storing stack specific hash. It should be
safe since this field is not used in [get|make|swap]context functions
and is hopefully never meaningfully used in real-world scenarios (and i
haven't seen any).

Fixes https://github.com/llvm/llvm-project/issues/58633

Reviewed By: vitalybuka

Differential Revision: https://reviews.llvm.org/D137654
2023-04-13 11:47:26 -07:00

126 lines
3.1 KiB
C++

// Check that ASan plays well with easy cases of makecontext/swapcontext.
// RUN: %clangxx_asan -O0 %s -o %t && %run %t
// RUN: %clangxx_asan -O3 %s -o %t && %run %t
// RUN: %clangxx_asan -fsanitize-address-use-after-return=never -O0 %s -o %t && %run %t
// RUN: %clangxx_asan -fsanitize-address-use-after-return=never -O3 %s -o %t && %run %t
//
// This test is too sublte to try on non-x86 arch for now.
// Android and musl do not support swapcontext.
// REQUIRES: x86-target-arch && glibc-2.27
#include <assert.h>
#include <memory.h>
#include <stdio.h>
#include <ucontext.h>
#include <unistd.h>
ucontext_t orig_context;
ucontext_t child_context;
const int kStackSize = 1 << 20;
__attribute__((noinline)) void Throw() { throw 1; }
__attribute__((noinline)) void ThrowAndCatch() {
try {
Throw();
} catch (int a) {
printf("ThrowAndCatch: %d\n", a);
}
}
void Child(int mode, int a, int b, int c) {
char x[32] = {0}; // Stack gets poisoned.
printf("Child: %d\n", x);
assert(a == 'a');
assert(b == 'b');
assert(c == 'c');
ThrowAndCatch(); // Simulate __asan_handle_no_return().
// (a) Do nothing, just return to parent function.
// (b) Jump into the original function. Stack remains poisoned unless we do
// something.
if (mode == 1) {
if (swapcontext(&child_context, &orig_context) < 0) {
perror("swapcontext");
_exit(0);
}
}
}
int Run(int arg, int mode, char *child_stack) {
printf("Child stack: %p\n", child_stack);
// Setup child context.
getcontext(&child_context);
child_context.uc_stack.ss_sp = child_stack;
child_context.uc_stack.ss_size = kStackSize / 2;
if (mode == 0) {
child_context.uc_link = &orig_context;
}
makecontext(&child_context, (void (*)())Child, 4, mode, 'a', 'b', 'c');
if (swapcontext(&orig_context, &child_context) < 0) {
perror("swapcontext");
return 0;
}
// Touch childs's stack to make sure it's unpoisoned.
for (int i = 0; i < kStackSize; i++) {
child_stack[i] = i;
}
return child_stack[arg];
}
ucontext_t poll_context;
ucontext_t poller_context;
void Poll() {
swapcontext(&poll_context, &poller_context);
{
char x = 0;
printf("POLL: %p\n", &x);
}
swapcontext(&poll_context, &poller_context);
}
void DoRunPoll(char *poll_stack) {
getcontext(&poll_context);
poll_context.uc_stack.ss_sp = poll_stack;
poll_context.uc_stack.ss_size = kStackSize / 2;
makecontext(&poll_context, Poll, 0);
getcontext(&poller_context);
swapcontext(&poller_context, &poll_context);
swapcontext(&poller_context, &poll_context);
// Touch poll's stack to make sure it's unpoisoned.
for (int i = 0; i < kStackSize; i++) {
poll_stack[i] = i;
}
}
void RunPoll() {
char *poll_stack = new char[kStackSize];
for (size_t i = 0; i < 2; ++i) {
DoRunPoll(poll_stack);
}
delete[] poll_stack;
}
int main(int argc, char **argv) {
char stack[kStackSize + 1];
int ret = 0;
ret += Run(argc - 1, 0, stack);
ret += Run(argc - 1, 1, stack);
char *heap = new char[kStackSize + 1];
ret += Run(argc - 1, 0, heap);
ret += Run(argc - 1, 1, heap);
RunPoll();
delete[] heap;
return ret;
}