-
Notifications
You must be signed in to change notification settings - Fork 116
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix conflict with code sanitizers (UBSAN, ASAN) #7
Comments
Ref: pmem#7 While executing ASAN builds, some unexpected syscalls are observed. These can not be predicted, so this patch attempts to filter them out. Also, the return value of the function named hook in test/hook_test_preload.c is changed to 7 from 99. This also helps with ASAN builds: ASAN reads the buffers passed write syscalls, after they return. Due to this, an ASAN error was triggered every time it tried to read dummy_data buffer's contents, which has fewer than 99 bytes.
Related:
|
Collecting coverage information was broken for a while ( |
The way UBSAN, ASAN do code instrumentation seems to be conflicting with syscall_intercept's syscall hooking. They insert syscall instructions to places other than libc. Looking for all syscalls, and patching all of them outside libc as well probably fixes the conflict.
The text was updated successfully, but these errors were encountered: