octave-bug-tracker
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Octave-bug-tracker] [bug #61472] AddressSanitizer crash in MEX tests


From: Markus Mützel
Subject: [Octave-bug-tracker] [bug #61472] AddressSanitizer crash in MEX tests
Date: Sun, 5 Dec 2021 04:39:55 -0500 (EST)
User-agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/96.0.4664.55 Safari/537.36 Edg/96.0.1054.43

Follow-up Comment #16, bug #61472 (project octave):

Your change e38202d3628d seems to have greatly reduced the number of warnings
on the macOS runners about "direct access to global weak symbols" (see bug
#59820). The remaining ones are mostly about instantiations involving `class
Sparse<T>` and `class octave_int<T>` templates afaict.
Maybe if we take the same approach (dedicated headers to provide guarded
forward declarations for those template classes), we could reduce the impact
of that bug. Maybe that could also resolve the issue you are seeing when using
the patches you provided here with enabled visibility flags.

    _______________________________________________________

Reply to this item at:

  <https://savannah.gnu.org/bugs/?61472>

_______________________________________________
  Message sent via Savannah
  https://savannah.gnu.org/




reply via email to

[Prev in Thread] Current Thread [Next in Thread]