gonbbb

Results 7 comments of gonbbb

I apologize for sending this while editing.

@Jinmo I run the one-trace command without the /path/to part(`example_library.dll`), memdump(.pre, .post), CALLID, and TID appear. Thank you.

@Jinmo The following is the result of running the synthesizer.py against "GetCurrentProcess" . It is because return `None` at find_module(). (The same result was obtained when calling `-s memcpy`, e.g.)...

It is worked by your replacing, thank you. However, the target address of function(e.g. @`0x1400014c5`, from. https://github.com/sslab-gatech/winnie/issues/20#issuecomment-1066069168) is obviously larger than the address in the DLL. ``` CALLID[0] TID[0] IC...

As I am also interested in this topic, I would like you to communicate with us on GitHub as much as possible... Would it be possible? Thank you.

For example, I run the following command. the contents of `input\test` is `Hello, World!`. ``` $ pin.exe -t \path\to\tools\Tracer\x64\Debug\Tracer.dll -logfile "\path\to\cor1_1" -trace_mode "all" -only_to_target "\path\to\toy_example.exe " -only_to_lib "example_library.dll " --...

@PiotrZierhoffer Sorry for the delay in replying. I was testing Renode's hook feature. I thought that state here is similar to the following permark. https://github.com/antmicro/renode-riscv-torture-example/blob/6b8c8d5fb2626d6fb4af3b64be159086ad26ca15/torture.resc#L31