Hi, I'm facing an issue with a dynamically loaded third-party library.
To better illustrate the problem, I've create this self-contained C project on github: https://github.com/kwk/asan-dlopen-issue The library contains a memory leak that is correctly found when I compile my program with address sanitizer. But now I want to blacklist it to be ignore and no longer clutter my ASAN log output. This doesn't work (see github project for description)! Any solution on how to blacklist either the caller or the callee would be helpful. Thanks in advance - Konrad -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/d/optout.
