[PATCH] D33784: Bug 33206 - Sanitizer CHECK failed: ((allocated_for_dlsym)) < ((kDlsymAllocPoolSize)) (1036, 1024)) with preload

Denis Khalikov via Phabricator via llvm-commits llvm-commits at lists.llvm.org
Wed Jun 7 10:47:28 PDT 2017


denis13 updated this revision to Diff 101776.
denis13 added a comment.

Test was added


https://reviews.llvm.org/D33784

Files:
  lib/asan/asan_malloc_linux.cc
  test/asan/TestCases/Linux/asan_preload_test-3.cc


Index: test/asan/TestCases/Linux/asan_preload_test-3.cc
===================================================================
--- /dev/null
+++ test/asan/TestCases/Linux/asan_preload_test-3.cc
@@ -0,0 +1,23 @@
+// Regression test for PR33206
+//
+// RUN: %clang -DDYN=1 -fPIC -shared %s -o %t-dso1.so
+// RUN: %clang -DDYN=1 -fPIC -shared %s -o %t-dso2.so %t-dso1.so
+// RUN: %clang %s -o %t %t-dso2.so
+// RUN: env LD_PRELOAD=%shared_libasan %run %t 2>&1 | FileCheck %s
+// REQUIRES: asan-dynamic-runtime
+
+#include <stdlib.h>
+#include <stdio.h>
+
+#ifdef DYN
+__attribute__((constructor)) void foo() {
+  void *p = malloc(1 << 20);
+  free(p);
+}
+#else
+int main() {
+  // CHECK: Success
+  printf("Success\n");
+  return 0;
+}
+#endif
Index: lib/asan/asan_malloc_linux.cc
===================================================================
--- lib/asan/asan_malloc_linux.cc
+++ lib/asan/asan_malloc_linux.cc
@@ -60,17 +60,21 @@
 #endif // SANITIZER_INTERCEPT_CFREE
 
 INTERCEPTOR(void*, malloc, uptr size) {
-  if (UNLIKELY(!asan_inited))
-    // Hack: dlsym calls malloc before REAL(malloc) is retrieved from dlsym.
+  if (UNLIKELY(asan_init_is_running))
+    // Hack: dlsym calls malloc before REAL(malloc) is retrieved from dlsym
     return AllocateFromLocalPool(size);
+  if (UNLIKELY(!asan_inited))
+    AsanInitFromRtl();
   GET_STACK_TRACE_MALLOC;
   return asan_malloc(size, &stack);
 }
 
 INTERCEPTOR(void*, calloc, uptr nmemb, uptr size) {
-  if (UNLIKELY(!asan_inited))
+  if (UNLIKELY(asan_init_is_running))
     // Hack: dlsym calls calloc before REAL(calloc) is retrieved from dlsym.
     return AllocateFromLocalPool(nmemb * size);
+  if (UNLIKELY(!asan_inited))
+    AsanInitFromRtl();
   GET_STACK_TRACE_MALLOC;
   return asan_calloc(nmemb, size, &stack);
 }
@@ -78,18 +82,21 @@
 INTERCEPTOR(void*, realloc, void *ptr, uptr size) {
   GET_STACK_TRACE_MALLOC;
   if (UNLIKELY(IsInDlsymAllocPool(ptr))) {
-    uptr offset = (uptr)ptr - (uptr)alloc_memory_for_dlsym;
-    uptr copy_size = Min(size, kDlsymAllocPoolSize - offset);
+    const uptr offset = (uptr)ptr - (uptr)alloc_memory_for_dlsym;
+    const uptr copy_size = Min(size, kDlsymAllocPoolSize - offset);
     void *new_ptr;
-    if (UNLIKELY(!asan_inited)) {
+    if (UNLIKELY(asan_init_is_running)) {
       new_ptr = AllocateFromLocalPool(size);
     } else {
-      copy_size = size;
-      new_ptr = asan_malloc(copy_size, &stack);
+      if (UNLIKELY(!asan_inited))
+        AsanInitFromRtl();
+      new_ptr = asan_malloc(size, &stack);
     }
     internal_memcpy(new_ptr, ptr, copy_size);
     return new_ptr;
   }
+  if (UNLIKELY(!asan_inited))
+    AsanInitFromRtl();
   return asan_realloc(ptr, size, &stack);
 }
 


-------------- next part --------------
A non-text attachment was scrubbed...
Name: D33784.101776.patch
Type: text/x-patch
Size: 2707 bytes
Desc: not available
URL: <http://lists.llvm.org/pipermail/llvm-commits/attachments/20170607/abd4920e/attachment.bin>


More information about the llvm-commits mailing list