Hi, Pipe the output through: https://llvm.org/svn/llvm-project/compiler-rt/trunk/lib/asan/scripts/asan_symbolize.py Cheers, david On Mar 29, 2013, at 7:01 AM, niXman wrote: > Hi, > > I compiled the code from AddressSanitizer wiki page[1], but I can't > see symbols names in backtrace. > Example: http://liveworkspace.org/code/2XMeB7$0 > Backtrace: > ==32073== ERROR: AddressSanitizer: heap-use-after-free on address > 0x600e0000dfb5 at pc 0x41c82f bp 0x7fff47956710 sp 0x7fff47956708 > READ of size 1 at 0x600e0000dfb5 thread T0 > #0 0x41c82e (program+0x41c82e) > #1 0x7f87a351176c (/lib/x86_64-linux-gnu/libc-2.15.so+0x2176c) > #2 0x403f4c (program+0x403f4c) > 0x600e0000dfb5 is located 5 bytes inside of 80-byte region > [0x600e0000dfb0,0x600e0000e000) > freed by thread T0 here: > #0 0x40743a (program+0x40743a) > #1 0x41c809 (program+0x41c809) > #2 0x7f87a351176c (/lib/x86_64-linux-gnu/libc-2.15.so+0x2176c) > previously allocated by thread T0 here: > #0 0x40751a (program+0x40751a) > #1 0x41c7fe (program+0x41c7fe) > #2 0x7f87a351176c (/lib/x86_64-linux-gnu/libc-2.15.so+0x2176c) > > > What I am doing wrongly? > Thanks. > > > [1] https://code.google.com/p/address-sanitizer/wiki/AddressSanitizer#Using_AddressSanitizer > > > -- > Regards, > niXman > ___________________________________________________ > Dual-target(32 & 64-bit) MinGW compilers for 32 and 64-bit Windows: > http://sourceforge.net/projects/mingwbuilds/ > ___________________________________________________ > Another online IDE: http://liveworkspace.org/