-
Notifications
You must be signed in to change notification settings - Fork 216
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Show TSAN stacktraces on Azure Linux #6870
Comments
I've reproduced it on local Azure Linux VM. To begin with, I've checked that TSAN is able to load symbols in general on this machine. I've tried a slightly modified example from clang docs a
Compiled with
Now, trying to run ccf tests always produces smth like:
Setting Also, found this article about failing to parse symbols for |
I've now got an Azure Linux VM, and it looks like we do get stacktraces for failures in the unit tests:
Note also that this failed without any local modifications, which is surprising - perhaps we need Regardless, this is a sign that these stacks aren't omitted for everything we build. Either the |
@eddyashton my money is on |
I suspect so too, further evidenced by the fact that adding a simple violation to the start of
But the obvious culprit in the -#if defined(__has_feature)
-# if __has_feature(address_sanitizer)
+// #if defined(__has_feature)
+// # if __has_feature(address_sanitizer)
// Avoid unloading on delete under ASAN, so that leak checking can still
// access symbols
| RTLD_NODELETE
-# endif
-#endif
+// # endif
+// #endif |
Tried linking against built-from-source openssl to make sure symcrypt is not guilty. Still |
At the moment looks like:
Job: https://github.com/microsoft/CCF/actions/runs/13589076609/job/37990529965?pr=6616
The text was updated successfully, but these errors were encountered: