Comment #2 on issue 330 by [email protected]: Support re-exec of sanitized executable with preloading libasan on Linux and Android
https://code.google.com/p/address-sanitizer/issues/detail?id=330

If only a single shared library in the testing environment is instrumented (and
depends on the ASan runtime library), and the main executable is not,
__asan_init() is going to be called only at the moment that library is loaded
(including the case when we use dlopen() to load it).

Right, explicitly banning the dlopen case would be nice but I'm not sure how to achieve this.

At that moment the main
executable might have done a fair amount of work which we can't simply replay
upon reexec().

If main executable depends on the library (which is really the case we are interested in) then worst-case some library initializers might have been executed.

I believe that unless the main executable depends on the ASan shared runtime the > users must explicitly preload the runtime in order to test any pieces of code
that might initialize late.

This may get hard to do for some systems. Finding the exact place where a particular executable(s) depending on a library in a large autobuilt distribution is challenging.


--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to