Hi,

I'm facing an issue with a dynamically loaded third-party library.

To better illustrate the problem, I've create this self-contained C project 
on github: https://github.com/kwk/asan-dlopen-issue

The library contains a memory leak that is correctly found when I compile 
my program with address sanitizer. But now I want to blacklist it to be 
ignore and no longer clutter my ASAN log output.

This doesn't work (see github project for description)!

Any solution on how to blacklist either the caller or the callee would be 
helpful.

Thanks in advance
- Konrad

-- 
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/d/optout.

Reply via email to