New sanitizer option to disable dlclose processing 90/216690/2 accepted/tizen_base accepted/tizen/base/20191105.214104 submit/tizen_base/20191101.071449
authorMikhail Kashkarov <m.kashkarov@partner.samsung.com>
Mon, 17 Jun 2019 17:27:16 +0000 (20:27 +0300)
committerDongkyun Son <dongkyun.s@samsung.com>
Fri, 1 Nov 2019 06:25:14 +0000 (06:25 +0000)
commit44fcff0f433b8267869ddd31b99d7067a0b57ae6
treec961abb7a38f35a1bfaf76d1f49af1b21289807b
parentddcce125f683c0bbdc9462a2d67d57e31948b54f
New sanitizer option to disable dlclose processing

This is a simple workaround for https://github.com/google/sanitizers/issues/89:
Avoid <unknown module> frames for functions from unloaded shared library.

Rtld will unload dynamically loaded shared objects, we are not preventing
unloading in this, just deferring it.

This could hide potential bugs like accesing library range addressing after
dlclose or some tricky cases for functions with __attribute__((__destructor__))
+ code that relies on explicit call to dlclose.

Change-Id: I14fb2b8846350e07040d6f9215b936d9b2956faa
Signed-off-by: Mikhail Kashkarov <m.kashkarov@partner.samsung.com>
libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc
libsanitizer/sanitizer_common/sanitizer_flags.inc