Closed GoogleCodeExporter closed 9 years ago
Ah, funny.
This happens iff the access goes to a different allocation which has no id /
stack associated, e.g.:
$ cat test.cpp
int main() {
int *test = new int[5];
test[12] = 42; // Fails on CHECK,
// Whilst "test[11] = 42;" doesn't fail the CHECK.
}
Original comment by timurrrr@google.com
on 4 May 2013 at 12:27
Original comment by timurrrr@google.com
on 4 May 2013 at 12:28
I'd argue that every CHECK on the error reporting path should be replaced by
if (something_wrong) {
print("couldn't get some info");
return;
}
Original comment by timurrrr@google.com
on 11 Oct 2013 at 7:05
AFAIK this CHECK will also be triggered if user sets malloc_context_size=0.
Original comment by tetra2...@gmail.com
on 11 Oct 2013 at 7:42
Original comment by samso...@google.com
on 11 Oct 2013 at 9:05
This may be relevant: http://gcc.gnu.org/bugzilla/show_bug.cgi?id=58718
Original comment by tetra2...@gmail.com
on 14 Oct 2013 at 6:06
I think this should be fixed by LLVM r192581
Original comment by samso...@google.com
on 14 Oct 2013 at 11:17
Original issue reported on code.google.com by
timurrrr@google.com
on 4 May 2013 at 12:22