[PATCH] Support re-exec of sanitized executable with preloading libasan on Linux
Maria Guseva
m.guseva at samsung.com
Thu Oct 23 02:18:48 PDT 2014
Hi glider, kcc, samsonov,
Currently if we want to run sanitized shared library in unsanitized executable we have to run executable with LD_PRELOAD=libasan.so which may be inconvenient for users (have to modify startup scripts, etc.). The patch implements reexecuting of the program with modified LD_PRELOAD environment variable on Linux. The same functionality is already supported for Mac Asan.
The corresponding issue link: https://code.google.com/p/address-sanitizer/issues/detail?id=330
http://reviews.llvm.org/D5931
Files:
lib/asan/asan_flags.h
lib/asan/asan_internal.h
lib/asan/asan_linux.cc
lib/asan/asan_mac.cc
lib/asan/asan_rtl.cc
lib/asan/asan_win.cc
lib/sanitizer_common/sanitizer_common.h
lib/sanitizer_common/sanitizer_flags.cc
lib/sanitizer_common/sanitizer_flags.h
lib/sanitizer_common/sanitizer_linux.cc
test/asan/TestCases/Linux/asan_dlopen_test.cc
test/asan/TestCases/Linux/asan_reexec_test-1.cc
test/asan/TestCases/Linux/asan_reexec_test-2.cc
-------------- next part --------------
A non-text attachment was scrubbed...
Name: D5931.15308.patch
Type: text/x-patch
Size: 23314 bytes
Desc: not available
URL: <http://lists.llvm.org/pipermail/llvm-commits/attachments/20141023/7b9715ff/attachment.bin>
More information about the llvm-commits
mailing list