Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

how identify syscall number for non-exported syscall wrappers? #388

Closed
derekbruening opened this issue Nov 28, 2014 · 2 comments
Closed

Comments

@derekbruening
Copy link
Contributor

From [email protected] on May 06, 2011 15:52:50

some user32.dll and kernel32.dll syscall wrappers are not exported (NtWow64*, etc.: xref issue #384 ) so we need private syms to find them (or need to store a table of syscall nums by OS version). not all will have workarounds like issue #352 .

should have frontend look for kernel32 and user32 syscalls and download to
symbols/ dir inside drmem, w/ options to specify elsewhere or disable.
should use _NT_SYMBOL_PATH if already set.

alternatively maybe the table is the better solution: no reliance on network access, not perf hit on startup. won't work on new version of windows but we'll need to put in updates for that anyway.

Original issue: http://code.google.com/p/drmemory/issues/detail?id=388

@derekbruening
Copy link
Contributor Author

From [email protected] on June 09, 2011 05:36:10

issue #446 proposes using a table here

@derekbruening
Copy link
Contributor Author

From [email protected] on June 26, 2011 13:56:30

This issue was closed by revision r352 .

Status: Fixed

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

1 participant