[llvm-bugs] [Bug 52278] New: Sanitizer CHECK failed: ((allocated_for_dlsym)) < ((kDlsymAllocPoolSize)) (0x41b, 0x400)) with preload
via llvm-bugs
llvm-bugs at lists.llvm.org
Sat Oct 23 17:34:30 PDT 2021
https://bugs.llvm.org/show_bug.cgi?id=52278
Bug ID: 52278
Summary: Sanitizer CHECK failed: ((allocated_for_dlsym)) <
((kDlsymAllocPoolSize)) (0x41b, 0x400)) with preload
Product: compiler-rt
Version: unspecified
Hardware: PC
OS: Linux
Status: NEW
Severity: normal
Priority: P
Component: asan
Assignee: unassignedbugs at nondot.org
Reporter: hjl.tools at gmail.com
CC: llvm-bugs at lists.llvm.org
With glibc 2.34 on Linux/x86-64, LLVM 13.0.0 rc1 gave me:
[hjl at gnu-skx-1 gcc]$ cat x.c
#include <assert.h>
struct A {
char a[3];
int b[3];
};
volatile int ten = 10;
__attribute__((noinline)) void foo(int index, int len) {
volatile struct A str[len] __attribute__((aligned(32)));
assert(!((long) str & 31L));
str[index].a[0] = '1'; // BOOM
}
int main(int argc, char **argv) {
foo(ten, ten);
return 0;
}
[hjl at gnu-skx-1 gcc]$ clang -O0 -fsanitize=address x.c -shared-libasan -m32
[hjl at gnu-skx-1 gcc]$
LD_PRELOAD=/export/users/hjl/build/gnu/tools-build/gcc-debug/build-x86_64-linux/x86_64-pc-linux-gnu/32/libsanitizer/libclang_rt.asan-i386.so
./a.out
AddressSanitizer: CHECK failed: asan_malloc_linux.cpp:46
"((allocated_for_dlsym)) < ((kDlsymAllocPoolSize))" (0x402, 0x400)
(tid=3485465)
<empty stack>
[hjl at gnu-skx-1 gcc]$
depending on the directory length where libclang_rt.asan-i386.so is placed.
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20211024/d52ad175/attachment-0001.html>
More information about the llvm-bugs
mailing list