Re: Issue 330 in address-sanitizer: Support re-exec of sanitized executable with preloading libasan on Linux and Android

2014-11-05 Thread address-sanitizer
Comment #13 on issue 330 by konstant...@gmail.com: Support re-exec of sanitized executable with preloading libasan on Linux and Android https://code.google.com/p/address-sanitizer/issues/detail?id=330 mguseva2: please see how ASAN_OPTIONS=start_deactivated=1 works (e.g. in test/asan/TestCases

Re: Why GCC's asan depends on on Microsoft Visual C++ runtime library?

2014-11-05 Thread 'Reid Kleckner' via address-sanitizer
ASan doesn't depend on those symbols, it's merely trying to intercept them in case they ever get called. If you are using mingw, we can assume they won't be called. An ifdef, or something cleaner, would probably be appropriate. However, so far as I know nobody has been testing ASan on Windows with

Re: Issue 330 in address-sanitizer: Support re-exec of sanitized executable with preloading libasan on Linux and Android

2014-11-05 Thread 'Evgeniy Stepanov' via address-sanitizer
__asan_init (not to be confused with AsanInitInternal) is only called from constructors of instrumented modules. On Wed Nov 05 2014 at 4:06:31 PM wrote: > > Comment #12 on issue 330 by tetra20...@gmail.com: Support re-exec of > sanitized executable with preloading libasan on Linux and Android >

Re: Issue 330 in address-sanitizer: Support re-exec of sanitized executable with preloading libasan on Linux and Android

2014-11-05 Thread address-sanitizer
Comment #12 on issue 330 by tetra20...@gmail.com: Support re-exec of sanitized executable with preloading libasan on Linux and Android https://code.google.com/p/address-sanitizer/issues/detail?id=330 It's fair that in dl_open case we can't rely on it. So probably we need to handle such case

Re: Issue 330 in address-sanitizer: Support re-exec of sanitized executable with preloading libasan on Linux and Android

2014-11-05 Thread address-sanitizer
Comment #11 on issue 330 by mguse...@gmail.com: Support re-exec of sanitized executable with preloading libasan on Linux and Android https://code.google.com/p/address-sanitizer/issues/detail?id=330 Maybe we should try the same hack as we do on Android? Everything is runing with asan, but in

Re: Issue 330 in address-sanitizer: Support re-exec of sanitized executable with preloading libasan on Linux and Android

2014-11-05 Thread 'Evgeniy Stepanov' via address-sanitizer
May work. Note that not all ASAN_OPTIONS can be changed at the activation time - we should fix this. Also, I'd like to eventually shift away from this mode on Android and move on to late initialization model, if we can make it work. The hack is great, but it still requires a rooted device, which no

Why GCC's asan depends on on Microsoft Visual C++ runtime library?

2014-11-05 Thread Constantine Tarasenkov
This code: https://github.com/gcc-mirror/gcc/blob/141eb62b/libsanitizer/asan/asan_interceptors.cc#L721-L722 Depends on VIsual C++ specific library called msvcrt40.dll, which is not available in MinGW or MinGW-w64. I know it doesn't tested yet to work with these compilers, but I'm not sure under

Re: Compiling for iOS Simulator

2014-11-05 Thread Alexander Potapenko
Assuming you already know how to build an application targeting the iOS simulator, you just need to use the trunk version of Clang (not the one shipped with Xcode) and pass -fsanitize=address when compiling and linking the code. There's a pretty nice writeup on using ASan with iOS simulator by Mih