-
Notifications
You must be signed in to change notification settings - Fork 570
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
private loader for safe system library use by DR and clients #157
Comments
From [email protected] on November 05, 2009 10:26:58 I am not sure a private load may solve the problem, or it may lead to other new problems |
From [email protected] on November 05, 2009 11:21:41 from my original notes, I pasted most of this above already: challenges of private loader:
|
From [email protected] on November 29, 2009 19:51:13 issue #157 : private Windows loader for safe system library use by DR and clients This is a pretty big Windows-specific feature that attempts to provide a This commit adds a fairly complete loader:
Testing:
There are some improvements and features I'm not supporting for now which I
This loader completely solves on Windows: issue #30 : support clients using standard libraries: STL in particular This loader is a step toward: issue #234 : earliest Windows injection:
Leaving this Issue open for the Linux loader. For the Windows loader all |
From [email protected] on October 25, 2011 19:41:55 I'm closing this because Linux private loader is on by default now, and any issues that we encounter with it will fall under separate bugs. Status: Fixed |
From [email protected] on June 06, 2009 16:39:03
private loader that isolates private copy of libraries for use by DR and
client has many advantages:
on Windows, 2nd copy of kernel32 calls into single system ntdll copy
the main alternative of static libc is problematic:
sufficient for clients
distro's sources too onerous
challenges of private loader:
go through DR instead
for other embedded syscalls: leave it up to user to ensure not using
lib routine that calls syscall that trips up DR?
we just won't support those
would solve:
issue #30/PR 200203: support for standard libraries
issue #46/PR 206369: libc independence
PR 352425: [linux] transparency: hide from dl_iterate_phdr()
issue #44/PR 243532: [API] symbol table lookup support
should enable:
issue #47/PR 204554: early injection on linux
PR 204587: earliest injection
still problematic:
issue #36: GLIBC_2.7 from sscanf
!HAVE_PROC_MAPS uses dl_iterate_phdr: but have alternative of VSI (PR 398083)
Original issue: http://code.google.com/p/dynamorio/issues/detail?id=157
The text was updated successfully, but these errors were encountered: