Resetting oucp's stack to zero in swapcontext interception is incorrect, since it breaks ucp cleanup after swapcontext returns in some cases: Say we have two contexts, A and B, and we swapcontext from A to B, do some work on Bs stack and then swapcontext back from B to A. At this point shadow memory of Bs stack is in arbitrary state, but since we can't know whether B will ever swapcontext-ed to again we clean up it's shadow memory, because otherwise it remains poisoned and blows in completely unrelated places when heap-allocated memory of Bs context gets reused later (see https://github.com/llvm/llvm-project/issues/58633 for example). swapcontext prototype is swapcontext(ucontext* oucp, ucontext* ucp), so in this example A is oucp and B is ucp, and i refer to the process of cleaning up Bs shadow memory as ucp cleanup. About how it breaks: Take the same example with A and B: when we swapcontext back from B to A the oucp parameter of swapcontext is actually B, and current trunk resets its stack in a way that it becomes "uncleanupable" later. It works fine if we do A->B->A, but if we do A->B->A->B->A no cleanup is performed for Bs stack after B "returns" to A second time. That's exactly what happens in the test i provided, and it's actually a pretty common real world scenario. Instead of resetting oucp's we make use of uc_stack.ss_flags to mark context as "cleanup-able" by storing stack specific hash. It should be safe since this field is not used in [get|make|swap]context functions and is hopefully never meaningfully used in real-world scenarios (and i haven't seen any). Fixes https://github.com/llvm/llvm-project/issues/58633 Reviewed By: vitalybuka Differential Revision: https://reviews.llvm.org/D137654
126 lines
3.1 KiB
C++
126 lines
3.1 KiB
C++
// Check that ASan plays well with easy cases of makecontext/swapcontext.
|
|
|
|
// RUN: %clangxx_asan -O0 %s -o %t && %run %t
|
|
// RUN: %clangxx_asan -O3 %s -o %t && %run %t
|
|
// RUN: %clangxx_asan -fsanitize-address-use-after-return=never -O0 %s -o %t && %run %t
|
|
// RUN: %clangxx_asan -fsanitize-address-use-after-return=never -O3 %s -o %t && %run %t
|
|
//
|
|
// This test is too sublte to try on non-x86 arch for now.
|
|
// Android and musl do not support swapcontext.
|
|
// REQUIRES: x86-target-arch && glibc-2.27
|
|
|
|
#include <assert.h>
|
|
#include <memory.h>
|
|
#include <stdio.h>
|
|
#include <ucontext.h>
|
|
#include <unistd.h>
|
|
|
|
ucontext_t orig_context;
|
|
ucontext_t child_context;
|
|
|
|
const int kStackSize = 1 << 20;
|
|
|
|
__attribute__((noinline)) void Throw() { throw 1; }
|
|
|
|
__attribute__((noinline)) void ThrowAndCatch() {
|
|
try {
|
|
Throw();
|
|
} catch (int a) {
|
|
printf("ThrowAndCatch: %d\n", a);
|
|
}
|
|
}
|
|
|
|
void Child(int mode, int a, int b, int c) {
|
|
char x[32] = {0}; // Stack gets poisoned.
|
|
printf("Child: %d\n", x);
|
|
assert(a == 'a');
|
|
assert(b == 'b');
|
|
assert(c == 'c');
|
|
ThrowAndCatch(); // Simulate __asan_handle_no_return().
|
|
// (a) Do nothing, just return to parent function.
|
|
// (b) Jump into the original function. Stack remains poisoned unless we do
|
|
// something.
|
|
if (mode == 1) {
|
|
if (swapcontext(&child_context, &orig_context) < 0) {
|
|
perror("swapcontext");
|
|
_exit(0);
|
|
}
|
|
}
|
|
}
|
|
|
|
int Run(int arg, int mode, char *child_stack) {
|
|
printf("Child stack: %p\n", child_stack);
|
|
// Setup child context.
|
|
getcontext(&child_context);
|
|
child_context.uc_stack.ss_sp = child_stack;
|
|
child_context.uc_stack.ss_size = kStackSize / 2;
|
|
if (mode == 0) {
|
|
child_context.uc_link = &orig_context;
|
|
}
|
|
makecontext(&child_context, (void (*)())Child, 4, mode, 'a', 'b', 'c');
|
|
if (swapcontext(&orig_context, &child_context) < 0) {
|
|
perror("swapcontext");
|
|
return 0;
|
|
}
|
|
// Touch childs's stack to make sure it's unpoisoned.
|
|
for (int i = 0; i < kStackSize; i++) {
|
|
child_stack[i] = i;
|
|
}
|
|
return child_stack[arg];
|
|
}
|
|
|
|
ucontext_t poll_context;
|
|
ucontext_t poller_context;
|
|
|
|
void Poll() {
|
|
swapcontext(&poll_context, &poller_context);
|
|
|
|
{
|
|
char x = 0;
|
|
printf("POLL: %p\n", &x);
|
|
}
|
|
|
|
swapcontext(&poll_context, &poller_context);
|
|
}
|
|
|
|
void DoRunPoll(char *poll_stack) {
|
|
getcontext(&poll_context);
|
|
poll_context.uc_stack.ss_sp = poll_stack;
|
|
poll_context.uc_stack.ss_size = kStackSize / 2;
|
|
makecontext(&poll_context, Poll, 0);
|
|
|
|
getcontext(&poller_context);
|
|
|
|
swapcontext(&poller_context, &poll_context);
|
|
swapcontext(&poller_context, &poll_context);
|
|
|
|
// Touch poll's stack to make sure it's unpoisoned.
|
|
for (int i = 0; i < kStackSize; i++) {
|
|
poll_stack[i] = i;
|
|
}
|
|
}
|
|
|
|
void RunPoll() {
|
|
char *poll_stack = new char[kStackSize];
|
|
|
|
for (size_t i = 0; i < 2; ++i) {
|
|
DoRunPoll(poll_stack);
|
|
}
|
|
|
|
delete[] poll_stack;
|
|
}
|
|
|
|
int main(int argc, char **argv) {
|
|
char stack[kStackSize + 1];
|
|
int ret = 0;
|
|
ret += Run(argc - 1, 0, stack);
|
|
ret += Run(argc - 1, 1, stack);
|
|
char *heap = new char[kStackSize + 1];
|
|
ret += Run(argc - 1, 0, heap);
|
|
ret += Run(argc - 1, 1, heap);
|
|
|
|
RunPoll();
|
|
delete[] heap;
|
|
return ret;
|
|
}
|