On Fri, Jan 24, 2014 at 05:12:28PM -0800, Paul Pluzhnikov wrote:
> On Fri, Jan 24, 2014 at 5:05 PM, Ondřej Bílka <[email protected]> wrote:
> 
> > There would be a possible hack to override mmap and look for mmap that
> > with dl_addr in backtrace.
> 
> That is unlikely to work:
> 
> (gdb) disas __signal_safe_memalign
> Dump of assembler code for function __signal_safe_memalign:
> ...
>    0x00000000000103e2 <+114>:   callq  0x18500 <mmap64>
> ...
> 
> That is, the call to mmap64 does not go through PLT, and overriding it is
> just as difficult as overriding __signal_safe_memalign :-(
> 
I did not considered this one. As mmap is quite slow there is no deep
reason for it.

We would need to make also mmap there go via plt by same logic.

-- 
You received this message because you are subscribed to the Google Groups 
"address-sanitizer" group.
To unsubscribe from this group and stop receiving emails from it, send an email 
to [email protected].
For more options, visit https://groups.google.com/groups/opt_out.

Reply via email to