[llvm-bugs] [Bug 52278] Sanitizer CHECK failed: ((allocated_for_dlsym)) < ((kDlsymAllocPoolSize)) (0x402, 0x400)) with preload

via llvm-bugs llvm-bugs at lists.llvm.org
Fri Nov 12 18:24:37 PST 2021


Vitaly Buka <vitalybuka at google.com> changed:

           What    |Removed                     |Added
         Resolution|---                         |FIXED
             Status|NEW                         |RESOLVED

--- Comment #5 from Vitaly Buka <vitalybuka at google.com> ---
Fixed with cb0e14ce6dcdd614a7207f4ce6fcf81a164471ab

But if we want to cherry-pick we need 4 patches.

1da33a51f11a7546c7db925e381482266e7c2304 [NFC][sanitizer] Move
GET_MALLOC_STACK_TRACE closer to the use
64d44208246b76772b2b04980234bd75d546a4b4 [NFC][lsan] Simplify root_regions
651797f488682072fcb27ccb9da333b52b55ea7d [NFC][asan][memprov] Remove dlsym hack
from posix_memalign
cb0e14ce6dcdd614a7207f4ce6fcf81a164471ab [sanitizer] Switch dlsym hack to

You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20211113/a844066e/attachment-0001.html>

More information about the llvm-bugs mailing list