"Kamil Rytarowski" writes: > Module Name: src > Committed By: kamil > Date: Thu Jun 21 10:41:46 UTC 2018 > > Modified Files: > src/usr.bin/ldd/build: Makefile > src/usr.bin/ldd/elf32: Makefile > src/usr.bin/ldd/elf32_compat: Makefile > src/usr.bin/ldd/elf64: Makefile > > Log Message: > Disable SANITIZER for ldd(1) > > These utilities (elf32, elf32_compat, elf64, liblldb) share code with the > ELF dynamic loader that is not being sanitized and its symbols are > installed into sanitized programs (in particular __tls_get_addr()). > > Additionally libldd is used in rescue that is not expected to be sanitized > as of today.
i'm not sure i understand. ldd itself should be able to be sanitized. even with shared code with ld.elf_so, this copy shouldn't be doing anything but reading data and outputting the various linkages found, but never executing anything not in ldd binary itself. (this is unlike traditional ldd(1) in most implementations, which often makes the dynamic linker do the real work of ldd.) what's the specific issue? perhaps we can fix it.. .mrg.
