| 1 | // Test that we don't crash accessing DTLS from malloc hook. |
| 2 | |
| 3 | // RUN: %clang %s -o %t |
| 4 | // RUN: %clang %s -DBUILD_SO -fPIC -o %t-so.so -shared |
| 5 | // RUN: %run %t 2>&1 | FileCheck %s |
| 6 | |
| 7 | // REQUIRES: glibc |
| 8 | |
| 9 | // No allocator and hooks. |
| 10 | // XFAIL: ubsan |
| 11 | |
| 12 | #ifndef BUILD_SO |
| 13 | # include <assert.h> |
| 14 | # include <dlfcn.h> |
| 15 | # include <pthread.h> |
| 16 | # include <stdio.h> |
| 17 | # include <stdlib.h> |
| 18 | |
| 19 | typedef long *(*get_t)(); |
| 20 | get_t GetTls; |
| 21 | void *Thread(void *unused) { return GetTls(); } |
| 22 | |
| 23 | __thread long recursive_hook; |
| 24 | |
| 25 | // CHECK: __sanitizer_malloc_hook: |
| 26 | void __sanitizer_malloc_hook(const volatile void *ptr, size_t sz) |
| 27 | __attribute__((disable_sanitizer_instrumentation)) { |
| 28 | ++recursive_hook; |
| 29 | if (recursive_hook == 1 && GetTls) |
| 30 | fprintf(stderr, format: "__sanitizer_malloc_hook: %p\n" , GetTls()); |
| 31 | --recursive_hook; |
| 32 | } |
| 33 | |
| 34 | int main(int argc, char *argv[]) { |
| 35 | char path[4096]; |
| 36 | snprintf(s: path, maxlen: sizeof(path), format: "%s-so.so" , argv[0]); |
| 37 | int i; |
| 38 | |
| 39 | void *handle = dlopen(file: path, RTLD_LAZY); |
| 40 | if (!handle) |
| 41 | fprintf(stderr, format: "%s\n" , dlerror()); |
| 42 | assert(handle != 0); |
| 43 | GetTls = (get_t)dlsym(handle: handle, name: "GetTls" ); |
| 44 | assert(dlerror() == 0); |
| 45 | |
| 46 | pthread_t t; |
| 47 | pthread_create(newthread: &t, attr: 0, start_routine: Thread, arg: 0); |
| 48 | pthread_join(th: t, thread_return: 0); |
| 49 | pthread_create(newthread: &t, attr: 0, start_routine: Thread, arg: 0); |
| 50 | pthread_join(th: t, thread_return: 0); |
| 51 | return 0; |
| 52 | } |
| 53 | #else // BUILD_SO |
| 54 | __thread long huge_thread_local_array[1 << 17]; |
| 55 | long *GetTls() { return &huge_thread_local_array[0]; } |
| 56 | #endif |
| 57 | |