// Check that ASan plays well with easy cases of makecontext/swapcontext.
// RUN: %clangxx_asan -O0 %s -o %t && %run %t
// RUN: %clangxx_asan -O3 %s -o %t && %run %t
// RUN: %clangxx_asan -fsanitize-address-use-after-return=never -O0 %s -o %t && %run %t
// RUN: %clangxx_asan -fsanitize-address-use-after-return=never -O3 %s -o %t && %run %t
//
// This test is too sublte to try on non-x86 arch for now.
// Android and musl do not support swapcontext.
// REQUIRES: x86-target-arch && glibc-2.27
#include <assert.h>
#include <memory.h>
#include <stdio.h>
#include <ucontext.h>
#include <unistd.h>
ucontext_t orig_context;
ucontext_t child_context;
const int kStackSize = 1 << 20;
__attribute__((noinline)) void Throw() { throw 1; }
__attribute__((noinline)) void ThrowAndCatch() {
try {
Throw();
} catch (int a) {
printf("ThrowAndCatch: %d\n", a);
}
}
void Child(int mode, int a, int b, int c) {
char x[32] = {0}; // Stack gets poisoned.
printf("Child: %d\n", x);
assert(a == 'a');
assert(b == 'b');
assert(c == 'c');
ThrowAndCatch(); // Simulate __asan_handle_no_return().
// (a) Do nothing, just return to parent function.
// (b) Jump into the original function. Stack remains poisoned unless we do
// something.
if (mode == 1) {
if (swapcontext(&child_context, &orig_context) < 0) {
perror("swapcontext");
_exit(0);
}
}
}
int Run(int arg, int mode, char *child_stack) {
printf("Child stack: %p\n", child_stack);
// Setup child context.
getcontext(&child_context);
child_context.uc_stack.ss_sp = child_stack;
child_context.uc_stack.ss_size = kStackSize / 2;
if (mode == 0) {
child_context.uc_link = &orig_context;
}
makecontext(&child_context, (void (*)())Child, 4, mode, 'a', 'b', 'c');
if (swapcontext(&orig_context, &child_context) < 0) {
perror("swapcontext");
return 0;
}
// Touch childs's stack to make sure it's unpoisoned.
for (int i = 0; i < kStackSize; i++) {
child_stack[i] = i;
}
return child_stack[arg];
}
ucontext_t poll_context;
ucontext_t poller_context;
void Poll() {
swapcontext(&poll_context, &poller_context);
{
char x = 0;
printf("POLL: %p\n", &x);
}
swapcontext(&poll_context, &poller_context);
}
void DoRunPoll(char *poll_stack) {
getcontext(&poll_context);
poll_context.uc_stack.ss_sp = poll_stack;
poll_context.uc_stack.ss_size = kStackSize / 2;
makecontext(&poll_context, Poll, 0);
getcontext(&poller_context);
swapcontext(&poller_context, &poll_context);
swapcontext(&poller_context, &poll_context);
// Touch poll's stack to make sure it's unpoisoned.
for (int i = 0; i < kStackSize; i++) {
poll_stack[i] = i;
}
}
void RunPoll() {
char *poll_stack = new char[kStackSize];
for (size_t i = 0; i < 2; ++i) {
DoRunPoll(poll_stack);
}
delete[] poll_stack;
}
int main(int argc, char **argv) {
char stack[kStackSize + 1];
int ret = 0;
ret += Run(argc - 1, 0, stack);
ret += Run(argc - 1, 1, stack);
char *heap = new char[kStackSize + 1];
ret += Run(argc - 1, 0, heap);
ret += Run(argc - 1, 1, heap);
RunPoll();
delete[] heap;
return ret;
}