[llvm-bugs] [Bug 52278] New: Sanitizer CHECK failed: ((allocated_for_dlsym)) < ((kDlsymAllocPoolSize)) (0x41b, 0x400)) with preload

via llvm-bugs llvm-bugs at lists.llvm.org
Sat Oct 23 17:34:30 PDT 2021


            Bug ID: 52278
           Summary: Sanitizer CHECK failed: ((allocated_for_dlsym)) <
                    ((kDlsymAllocPoolSize)) (0x41b, 0x400)) with preload
           Product: compiler-rt
           Version: unspecified
          Hardware: PC
                OS: Linux
            Status: NEW
          Severity: normal
          Priority: P
         Component: asan
          Assignee: unassignedbugs at nondot.org
          Reporter: hjl.tools at gmail.com
                CC: llvm-bugs at lists.llvm.org

With glibc 2.34 on Linux/x86-64, LLVM 13.0.0 rc1 gave me:

[hjl at gnu-skx-1 gcc]$ cat x.c
#include <assert.h>

struct A {
  char a[3];
  int b[3];

volatile int ten = 10;

__attribute__((noinline)) void foo(int index, int len) {
  volatile struct A str[len] __attribute__((aligned(32)));
  assert(!((long) str & 31L));
  str[index].a[0] = '1'; // BOOM

int main(int argc, char **argv) {
  foo(ten, ten);
  return 0;
[hjl at gnu-skx-1 gcc]$ clang -O0 -fsanitize=address x.c -shared-libasan -m32 
[hjl at gnu-skx-1 gcc]$
AddressSanitizer: CHECK failed: asan_malloc_linux.cpp:46
"((allocated_for_dlsym)) < ((kDlsymAllocPoolSize))" (0x402, 0x400)
    <empty stack>

[hjl at gnu-skx-1 gcc]$ 

depending on the directory length where libclang_rt.asan-i386.so is placed.

You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.llvm.org/pipermail/llvm-bugs/attachments/20211024/d52ad175/attachment-0001.html>

More information about the llvm-bugs mailing list