[llvm-bugs] [Bug 33206] New: Sanitizer CHECK failed: ((allocated_for_dlsym)) < ((kDlsymAllocPoolSize)) (1036, 1024)) with preload
via llvm-bugs
llvm-bugs at lists.llvm.org
Mon May 29 07:37:23 PDT 2017
https://bugs.llvm.org/show_bug.cgi?id=33206
Bug ID: 33206
Summary: Sanitizer CHECK failed: ((allocated_for_dlsym)) <
((kDlsymAllocPoolSize)) (1036, 1024)) with preload
Product: compiler-rt
Version: unspecified
Hardware: PC
OS: Linux
Status: NEW
Severity: enhancement
Priority: P
Component: compiler-rt
Assignee: unassignedbugs at nondot.org
Reporter: d.khalikov at partner.samsung.com
CC: llvm-bugs at lists.llvm.org
Created attachment 18529
--> https://bugs.llvm.org/attachment.cgi?id=18529&action=edit
patch for this Issue
Hello everyone,
I've faced a situation with error:
Sanitizer CHECK failed: asan_malloc_linux.cc:42 ((allocated_for_dlsym)) <
((kDlsymAllocPoolSize)) (1036, 1024).
when LD_PRELOAD set to libclang_rt.asan-x86_64.so
It seems like there is might be a situation when asan initializing later than
shared library which has malloc in static constructor. (rtld doesn't provide
the order of initiazation). In this case asan doesn't init interceptors but
already intercepting malloc (for example). If malloc is too big to be handled
by static local pool asan will die with error:
Sanitizer CHECK failed: libsanitizer/asan/asan_malloc_linux.cc:40
((allocated_for_dlsym)) < ((kDlsymAllocPoolSize)) (1036, 1024)
I have a patch which can help to resolve this problem.
Can someone please review that patch.
Thanks.
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20170529/a0b4824d/attachment.html>
More information about the llvm-bugs
mailing list