Dong H. Ahn
Dong H. Ahn
@simoatze: out of curiosity, was __tsan_on_report already a weak symbol? Or does this need to bring in our own locally modified TSan runtime library? It seems this is are various...
Your approach seems great to me! Thank you for looking into this. I know you are super busy.
Well... I don't understand. If there is a hook for "on report", why do we need to do a binary patch? What is the current library linking order and what...
@rolandschulz: thank you for using Archer on your build-and-test system. Could you describe how those unit tests failed more specifically? One of the common cases of something like this in...
Thanks. Seems something that @simoatze should look into. @rolandschulz: how should we reproduce this failures?
Interesting. One way is to check if the TSan runtime is linked in.
You can use `nm` or BFD library type (`https://en.wikipedia.org/wiki/Binary_File_Descriptor_library`) on the executable to check the presence of a well-know symbol. But this would be too heavyweight for this purpose... A...
True. But I'm just concerned about having to deal with a large executable. Instead if this is encoded in the program header of the main executable, perhaps we can write...
@jprotze: yes this would be another good - even a more reliable way to check the presence of TSan.
@simoatze: should this limitation be documented somewhere? In particular, how do can disable the static analysis?