Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Avoid calls to mallopt() if ASan is active #9308

Merged
merged 1 commit into from May 30, 2015

Conversation

davidlt
Copy link
Contributor

@davidlt davidlt commented May 28, 2015

mallopt() calls are not valid on ASan builds, avoid them.

Without this I keep getting ERROR: from CMSSW and exact same string fragment is used in ASan reports. This cleans the noise created by not working mallopt() calls on ASan builds.

Makes grepping easier.

Signed-off-by: David Abdurachmanov David.Abdurachmanov@cern.ch

`mallopt()` calls are not valid on ASan builds, avoid them.

Signed-off-by: David Abdurachmanov <David.Abdurachmanov@cern.ch>
@cmsbuild
Copy link
Contributor

A new Pull Request was created by @davidlt for CMSSW_7_5_X.

Avoid calls to mallopt() if ASan is active

It involves the following packages:

FWCore/Utilities

@cmsbuild, @Dr15Jones, @nclopezo can you please review it and eventually sign? Thanks.
@makortel, @Martin-Grunewald, @wddgit, @wmtan this is something you requested to watch as well.
You can sign-off by replying to this message having '+1' in the first line of your reply.
You can reject by replying to this message having '-1' in the first line of your reply.
If you are a L2 or a release manager you can ask for tests by saying 'please test' in the first line of a comment.
@nclopezo you are the release manager for this.
You can merge this pull request by typing 'merge' in the first line of your comment.

@Dr15Jones
Copy link
Contributor

I'm waiting to request testing until we have a working IB

@@ -162,6 +162,7 @@ namespace edm
error_message_.clear();
changed_ = false;

#ifndef __SANITIZE_ADDRESS__
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Is address sanitizing a function of the operating system or of how the operating system is configured? Basically I'm asking if this is really a compile time switch or should really be a run time one.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Compile time + run-time library. The main executable (cmsRun) is statically linked to ASan run-time, which initializes required structures and brings all symbols. At compile time it adds and replaces functions calls with special functions in ASan run-time which do all accounting.

@davidlt
Copy link
Contributor Author

davidlt commented May 28, 2015

There is nothing to test here. __SANITIZE_ADDRESS__ is only defined if -fsanitize=address is passed to compiler. This piece of code is also only for glibc, which is not a main allocator we use.

@Dr15Jones
Copy link
Contributor

please test

@Dr15Jones
Copy link
Contributor

+1
if the tests pass

@cmsbuild
Copy link
Contributor

The tests are being triggered in jenkins.

@cmsbuild
Copy link
Contributor

This pull request is fully signed and it will be integrated in one of the next CMSSW_7_5_X IBs unless changes or unless it breaks tests. This pull request requires discussion in the ORP meeting before it's merged. @davidlange6, @nclopezo, @smuzaffar

@cmsbuild
Copy link
Contributor

@cmsbuild
Copy link
Contributor

This pull request is fully signed and it will be integrated in one of the next CMSSW_7_5_X IBs unless changes (tests are also fine). This pull request requires discussion in the ORP meeting before it's merged. @davidlange6, @Degano, @smuzaffar

@davidlange6
Copy link
Contributor

+1

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants