Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

llvm-symbolizer should "Just Work" #134

Closed
ramosian-glider opened this issue Aug 31, 2015 · 5 comments
Closed

llvm-symbolizer should "Just Work" #134

ramosian-glider opened this issue Aug 31, 2015 · 5 comments

Comments

@ramosian-glider
Copy link
Member

Originally reported on Google Code with ID 134

(see also https://codereview.chromium.org/11348066/)
The users expect ASan to print understandable error logs without any additional env
or output filtering.
Can we hardcode the compiler path somewhere so that ASan looks it up for llvm-symbolizer
if the path hasn't been supplied via env?

Reported by ramosian.glider on 2012-12-11 14:48:18

@ramosian-glider
Copy link
Member Author

>> Can we hardcode the compiler path
Instead, we should defeat the symbolizer to make it in-process. 

Reported by konstantin.s.serebryany on 2012-12-11 14:55:11

@ramosian-glider
Copy link
Member Author

Please remind me, have we considered putting the symbolizer into a .so?

Reported by ramosian.glider on 2012-12-11 15:21:58

@ramosian-glider
Copy link
Member Author

Loading a .so with the system loader after a memory error or SIGSEGV occurs seems dicey.
 Couldn't you be inside malloc or the loader?

If you ignore stacks from signal handlers, then maybe the problem is easier.  From
signal handlers, it seems like the symbolizer has to be careful to avoid malloc.

Reported by [email protected] on 2012-12-11 15:34:10

@ramosian-glider
Copy link
Member Author

Reported by konstantin.s.serebryany on 2013-02-15 14:28:44

@ramosian-glider
Copy link
Member Author

Adding Project:AddressSanitizer as part of GitHub migration.

Reported by ramosian.glider on 2015-07-30 09:13:40

  • Labels added: ProjectAddressSanitizer

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant