Comment #11 on issue 330 by [email protected]: Support re-exec of sanitized executable with preloading libasan on Linux and Android
https://code.google.com/p/address-sanitizer/issues/detail?id=330

Maybe we should try the same hack as we do on Android?
Everything is runing with asan, but in inactivated mode.
As soon as some module calls __asan_init we activate asan.

Konstantin,
If I understood it correctly, in your proposal Asan will be activated for any module as soon as allocation is done or some intercepted function is called. Indeed very soon for all active processes. That's not what we desired. The intention was to minimize overhead by preloading asan rt only for needed executables.

Can you specify what exactly you don't like in reexec approach? It's fair that in dl_open case we can't rely on it. So probably we need to handle such case separately. But in case of run-time init the executable is not started yet and reexec shouldn't be an issue.


--
You received this message because this project is configured to send all issue notifications to this address.
You may adjust your notification preferences at:
https://code.google.com/hosting/settings

--
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to