This repository has been archived by the owner on Jan 6, 2025. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 121
Fix conflict with code sanitizers (UBSAN, ASAN) #7
Labels
Comments
GBuella
added a commit
to GBuella/syscall_intercept
that referenced
this issue
May 21, 2017
Ref: pmem#7 While executing ASAN builds, some unexpected syscalls are observed. These can not be predicted, so this patch attempts to filter them out. Also, the return value of the function named hook in test/hook_test_preload.c is changed to 7 from 99. This also helps with ASAN builds: ASAN reads the buffers passed write syscalls, after they return. Due to this, an ASAN error was triggered every time it tried to read dummy_data buffer's contents, which has fewer than 99 bytes.
Related:
|
Closed
Collecting coverage information was broken for a while ( |
This was referenced Jun 29, 2017
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
The way UBSAN, ASAN do code instrumentation seems to be conflicting with syscall_intercept's syscall hooking. They insert syscall instructions to places other than libc. Looking for all syscalls, and patching all of them outside libc as well probably fixes the conflict.
The text was updated successfully, but these errors were encountered: