llvm/compiler-rt/test/asan/TestCases/Linux/swapcontext_test.cpp

// Check that ASan plays well with easy cases of makecontext/swapcontext.

// RUN: %clangxx_asan -O0 %s -o %t && %run %t
// RUN: %clangxx_asan -O3 %s -o %t && %run %t
// RUN: %clangxx_asan -fsanitize-address-use-after-return=never -O0 %s -o %t && %run %t
// RUN: %clangxx_asan -fsanitize-address-use-after-return=never -O3 %s -o %t && %run %t
//
// This test is too sublte to try on non-x86 arch for now.
// Android and musl do not support swapcontext.
// REQUIRES: x86-target-arch && glibc-2.27

#include <assert.h>
#include <memory.h>
#include <stdio.h>
#include <ucontext.h>
#include <unistd.h>

ucontext_t orig_context;
ucontext_t child_context;

const int kStackSize = 1 << 20;

__attribute__((noinline)) void Throw() { throw 1; }

__attribute__((noinline)) void ThrowAndCatch() {
  try {
    Throw();
  } catch (int a) {
    printf("ThrowAndCatch: %d\n", a);
  }
}

void Child(int mode, int a, int b, int c) {
  char x[32] = {0}; // Stack gets poisoned.
  printf("Child: %d\n", x);
  assert(a == 'a');
  assert(b == 'b');
  assert(c == 'c');
  ThrowAndCatch(); // Simulate __asan_handle_no_return().
  // (a) Do nothing, just return to parent function.
  // (b) Jump into the original function. Stack remains poisoned unless we do
  //     something.
  if (mode == 1) {
    if (swapcontext(&child_context, &orig_context) < 0) {
      perror("swapcontext");
      _exit(0);
    }
  }
}

int Run(int arg, int mode, char *child_stack) {
  printf("Child stack: %p\n", child_stack);
  // Setup child context.
  getcontext(&child_context);
  child_context.uc_stack.ss_sp = child_stack;
  child_context.uc_stack.ss_size = kStackSize / 2;
  if (mode == 0) {
    child_context.uc_link = &orig_context;
  }
  makecontext(&child_context, (void (*)())Child, 4, mode, 'a', 'b', 'c');
  if (swapcontext(&orig_context, &child_context) < 0) {
    perror("swapcontext");
    return 0;
  }
  // Touch childs's stack to make sure it's unpoisoned.
  for (int i = 0; i < kStackSize; i++) {
    child_stack[i] = i;
  }
  return child_stack[arg];
}

ucontext_t poll_context;
ucontext_t poller_context;

void Poll() {
  swapcontext(&poll_context, &poller_context);

  {
    char x = 0;
    printf("POLL: %p\n", &x);
  }

  swapcontext(&poll_context, &poller_context);
}

void DoRunPoll(char *poll_stack) {
  getcontext(&poll_context);
  poll_context.uc_stack.ss_sp = poll_stack;
  poll_context.uc_stack.ss_size = kStackSize / 2;
  makecontext(&poll_context, Poll, 0);

  getcontext(&poller_context);

  swapcontext(&poller_context, &poll_context);
  swapcontext(&poller_context, &poll_context);

  // Touch poll's stack to make sure it's unpoisoned.
  for (int i = 0; i < kStackSize; i++) {
    poll_stack[i] = i;
  }
}

void RunPoll() {
  char *poll_stack = new char[kStackSize];

  for (size_t i = 0; i < 2; ++i) {
    DoRunPoll(poll_stack);
  }

  delete[] poll_stack;
}

int main(int argc, char **argv) {
  char stack[kStackSize + 1];
  int ret = 0;
  ret += Run(argc - 1, 0, stack);
  ret += Run(argc - 1, 1, stack);
  char *heap = new char[kStackSize + 1];
  ret += Run(argc - 1, 0, heap);
  ret += Run(argc - 1, 1, heap);

  RunPoll();
  delete[] heap;
  return ret;
}