[llvm-bugs] [Bug 33206] New: Sanitizer CHECK failed: ((allocated_for_dlsym)) < ((kDlsymAllocPoolSize)) (1036, 1024)) with preload

via llvm-bugs llvm-bugs at lists.llvm.org
Mon May 29 07:37:23 PDT 2017


            Bug ID: 33206
           Summary: Sanitizer CHECK failed: ((allocated_for_dlsym)) <
                    ((kDlsymAllocPoolSize)) (1036, 1024)) with preload
           Product: compiler-rt
           Version: unspecified
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: enhancement
          Priority: P
         Component: compiler-rt
          Assignee: unassignedbugs at nondot.org
          Reporter: d.khalikov at partner.samsung.com
                CC: llvm-bugs at lists.llvm.org

Created attachment 18529
  --> https://bugs.llvm.org/attachment.cgi?id=18529&action=edit
patch for this Issue

Hello everyone,
I've faced a situation with error:
Sanitizer CHECK failed: asan_malloc_linux.cc:42 ((allocated_for_dlsym)) <
((kDlsymAllocPoolSize)) (1036, 1024).

when LD_PRELOAD set to libclang_rt.asan-x86_64.so

It seems like there is might be a situation when asan initializing later than
shared library which has malloc in static constructor. (rtld doesn't provide
the order of initiazation). In this case asan doesn't init interceptors but
already intercepting malloc (for example). If malloc is too big to be handled
by static local pool asan will die with error:
Sanitizer CHECK failed: libsanitizer/asan/asan_malloc_linux.cc:40
((allocated_for_dlsym)) < ((kDlsymAllocPoolSize)) (1036, 1024)

I have a patch which can help to resolve this problem.
Can someone please review that patch.

You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20170529/a0b4824d/attachment.html>

More information about the llvm-bugs mailing list