[PATCH] Support re-exec of sanitized executable with preloading libasan on Linux

Maria Guseva m.guseva at samsung.com
Thu Oct 23 02:18:48 PDT 2014


Hi glider, kcc, samsonov,

Currently if we want to run sanitized shared library in unsanitized executable we have to run executable with LD_PRELOAD=libasan.so which may be inconvenient for users (have to modify startup scripts, etc.). The patch implements reexecuting of the program with modified LD_PRELOAD environment variable on Linux. The same functionality is already supported for Mac Asan.
The corresponding issue link: https://code.google.com/p/address-sanitizer/issues/detail?id=330

http://reviews.llvm.org/D5931

Files:
  lib/asan/asan_flags.h
  lib/asan/asan_internal.h
  lib/asan/asan_linux.cc
  lib/asan/asan_mac.cc
  lib/asan/asan_rtl.cc
  lib/asan/asan_win.cc
  lib/sanitizer_common/sanitizer_common.h
  lib/sanitizer_common/sanitizer_flags.cc
  lib/sanitizer_common/sanitizer_flags.h
  lib/sanitizer_common/sanitizer_linux.cc
  test/asan/TestCases/Linux/asan_dlopen_test.cc
  test/asan/TestCases/Linux/asan_reexec_test-1.cc
  test/asan/TestCases/Linux/asan_reexec_test-2.cc
-------------- next part --------------
A non-text attachment was scrubbed...
Name: D5931.15308.patch
Type: text/x-patch
Size: 23314 bytes
Desc: not available
URL: <http://lists.llvm.org/pipermail/llvm-commits/attachments/20141023/7b9715ff/attachment.bin>


More information about the llvm-commits mailing list