On Fri, Jan 24, 2014 at 5:05 PM, Ondřej Bílka <[email protected]> wrote:

> There would be a possible hack to override mmap and look for mmap that
> with dl_addr in backtrace.

That is unlikely to work:

(gdb) disas __signal_safe_memalign
Dump of assembler code for function __signal_safe_memalign:
...
   0x00000000000103e2 <+114>:   callq  0x18500 <mmap64>
...

That is, the call to mmap64 does not go through PLT, and overriding it is
just as difficult as overriding __signal_safe_memalign :-(


-- 
Paul Pluzhnikov

-- 
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to