You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
'LD_LIBRARY_PATH considered harmful' is a common topic nowadays.
For oc-inject, LD_LIBRARY_PATH becomes a problem if the debugging tool spawns a process that needs to run in the container environment. Then the spawned process will use oc-inject libraries instead of the container environment's libraries, which is not what we want.
Recent discussion about padding RPATH field to support RPATH editing, which might enable us to reconfigure the injected executable without too much fuss.
Carlos O'Donell suggested using rtld_audit (la_objsearch) to override the library search path.
serhei
changed the title
where possible, relink the executable instead of using LD_LIBRARY_PATH
where possible, use rtld_audit instead of LD_LIBRARY_PATH
Sep 14, 2020
'LD_LIBRARY_PATH considered harmful' is a common topic nowadays.
For oc-inject, LD_LIBRARY_PATH becomes a problem if the debugging tool spawns a process that needs to run in the container environment. Then the spawned process will use oc-inject libraries instead of the container environment's libraries, which is not what we want.
Probably necessary to use 'stap -c' with #2
The text was updated successfully, but these errors were encountered: