On Fri, Jan 24, 2014 at 5:05 PM, Ondřej Bílka <[email protected]> wrote:
> There would be a possible hack to override mmap and look for mmap that > with dl_addr in backtrace. That is unlikely to work: (gdb) disas __signal_safe_memalign Dump of assembler code for function __signal_safe_memalign: ... 0x00000000000103e2 <+114>: callq 0x18500 <mmap64> ... That is, the call to mmap64 does not go through PLT, and overriding it is just as difficult as overriding __signal_safe_memalign :-( -- Paul Pluzhnikov -- You received this message because you are subscribed to the Google Groups "address-sanitizer" group. To unsubscribe from this group and stop receiving emails from it, send an email to [email protected]. For more options, visit https://groups.google.com/groups/opt_out.
