Bypassing libcasper (for fun and profit)...?
Ngie Cooper (yaneurabeya)
yaneurabeya at gmail.com
Mon Sep 11 20:55:16 UTC 2017
Hi Mariusz,
I’m trying to get runtime coverage to work on ^/projects/runtime-coverage . I noticed that libcasper is unfortunately getting in the way of writing .gcda files via install(1) (libgcov and libprofile_rt hijack binaries and libraries to write out profiling information at runtime, which doesn’t seem to jive with libcasper). I assume install(1) won’t be the only program to have this issue, so a generic solution should probably be implemented.
I was wondering if there’s a way that you would like to design a formalized hook to bypass this, was wondering if you think conditionally compiling out the functions (as stubs) was the proper way to do it (security vs flexibility), have the the library implement weak symbols and override with another library using strong symbols as a bypass, or use a combination of LD_PRELOAD and hooks to disable libcasper/turn the calls into warnings (instead of fatal errors).
Thanks!
-Ngie
-------------- next part --------------
A non-text attachment was scrubbed...
Name: signature.asc
Type: application/pgp-signature
Size: 842 bytes
Desc: Message signed with OpenPGP using GPGMail
URL: <http://lists.freebsd.org/pipermail/freebsd-hackers/attachments/20170911/c319309c/attachment.sig>
More information about the freebsd-hackers
mailing list