[llvm-bugs] [Bug 52278] Sanitizer CHECK failed: ((allocated_for_dlsym)) < ((kDlsymAllocPoolSize)) (0x402, 0x400)) with preload
via llvm-bugs
llvm-bugs at lists.llvm.org
Fri Nov 12 18:24:37 PST 2021
https://bugs.llvm.org/show_bug.cgi?id=52278
Vitaly Buka <vitalybuka at google.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Resolution|--- |FIXED
Status|NEW |RESOLVED
--- Comment #5 from Vitaly Buka <vitalybuka at google.com> ---
Fixed with cb0e14ce6dcdd614a7207f4ce6fcf81a164471ab
But if we want to cherry-pick we need 4 patches.
1da33a51f11a7546c7db925e381482266e7c2304 [NFC][sanitizer] Move
GET_MALLOC_STACK_TRACE closer to the use
64d44208246b76772b2b04980234bd75d546a4b4 [NFC][lsan] Simplify root_regions
initialization
651797f488682072fcb27ccb9da333b52b55ea7d [NFC][asan][memprov] Remove dlsym hack
from posix_memalign
cb0e14ce6dcdd614a7207f4ce6fcf81a164471ab [sanitizer] Switch dlsym hack to
internal_allocator
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20211113/a844066e/attachment-0001.html>
More information about the llvm-bugs
mailing list