|
From: | Markus Mützel |
Subject: | [Octave-bug-tracker] [bug #61472] AddressSanitizer crash in MEX tests |
Date: | Sun, 5 Dec 2021 04:39:55 -0500 (EST) |
User-agent: | Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.43 |
Follow-up Comment #16, bug #61472 (project octave): Your change e38202d3628d seems to have greatly reduced the number of warnings on the macOS runners about "direct access to global weak symbols" (see bug #59820). The remaining ones are mostly about instantiations involving `class Sparse<T>` and `class octave_int<T>` templates afaict. Maybe if we take the same approach (dedicated headers to provide guarded forward declarations for those template classes), we could reduce the impact of that bug. Maybe that could also resolve the issue you are seeing when using the patches you provided here with enabled visibility flags. _______________________________________________________ Reply to this item at: <https://savannah.gnu.org/bugs/?61472> _______________________________________________ Message sent via Savannah https://savannah.gnu.org/
[Prev in Thread] | Current Thread | [Next in Thread] |