You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
For example /sabre ./plugins/sbr-trace/libsbr-trace.so -- test_sbrtrace_hello.
What should we do to debug libsbr-trace.so intercept and replace system calls in gdb? For example, the program executes the write system call, and the plugin prints out some log messages before executing write.
Even though I used gdb to debug sabre, gdb was never able to intercept and view the code function in the dynamic link library libsbr-trace.so that rewrites the system call.
Understanding this process is very important for writing new plugins, can you answer and explain this process, thanks.
The text was updated successfully, but these errors were encountered:
libsbr-trace.so: we write the handle_syscall_real to implement rewriting, and the function iwrite shows how we rewrite write.
I am familiar with debugging the code of the target binary program launched by SaBRe, but I'm uncertain about how to effectively observe the implementation code of the plugin's system call rewrite for the target, specifically referring to the iwrite function, during the execution of the binary program.
For example
/sabre ./plugins/sbr-trace/libsbr-trace.so -- test_sbrtrace_hello.
What should we do to debug libsbr-trace.so intercept and replace system calls in gdb? For example, the program executes the write system call, and the plugin prints out some log messages before executing write.
Even though I used gdb to debug sabre, gdb was never able to intercept and view the code function in the dynamic link library libsbr-trace.so that rewrites the system call.
Understanding this process is very important for writing new plugins, can you answer and explain this process, thanks.
The text was updated successfully, but these errors were encountered: