Comment #3 on issue 330 by [email protected]: Support re-exec of sanitized executable with preloading libasan on Linux and Android
https://code.google.com/p/address-sanitizer/issues/detail?id=330

Right, explicitly banning the dlopen case would be nice but I'm not sure how to achieve this.
Why ban this case? Doesn't it work with LD_PRELOAD?

If main executable depends on the library (which is really the case we are interested in) then worst-case some library initializers might have been executed.
Can you please remind why GCC doesn't use the static runtime library?

--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to