Stephen Kell
Stephen Kell
To get around the "uniqtypes already in the executable" case, we can probably do a hacky pass at startup that re-sites them in the dlbind object, using relocation records (recovered...
Actually I'm not sure we really have to resite them from the executable. The executable cannot be unloaded with dlclose(), even if this is arguably an anomaly that should be...
Also, my idea of "synchronous pointer poisoning on free()" may be interesting. On a free(), do some amount of synchronous work by reflecting on the call site and finding (up...
In CHERI, if I recall, access to the tag bits lets the sweep zoom in on real pointers very quickly. Indeed this uses CLoadTags to get at tag bits in...
Non-obvious explanation: our preload wrappers don't compose because of the __avoid_libdl_calls hack. Once one of them is told not to make libdl calls, it will conservatively avoid downcalling (say to...
Probably the right thing is to refactor so that the core runtime is in the _stubs.so, and the preload lib is just a minimal selection of hook points. But how...
I just did checkout, build and install of coda 7.1.0, successfully set up the server, and have now hit this issue. However, I *do* have the coda kernel module installed....
Thanks for the swift reply! I'm on a 64-bit host so no joy there. My venus.err is not very illuminating. ``` Date: Wed 12/04/2019 18:05:23 Coda Venus, version 7.1.0 18:05:23...
(Thanks @jryans for pointing me at this issue.) If I've understood, the main problem is getting the file path associated with a particular region in the program's virtual address space....
> Would that be enough to get the debug info though? even if the file name wouldn't resolve, at least the symbols would. If you don't want to call out...