This repository will hold the code needed to get Address Sanitizer (ASan) working to find memory bugs in the NetBSD userland and kernel.
- Removed weak symbols from assembly stubs for intercepted syscalls.
- Begin adding interceptor functions for syscalls that write to memory.
- Continue adding interceptor functions for syscalls writing to memory and begin adding syscalls that read from memory.
- Add
touch_mem()
function to touch each byte of a null-terminated string.
- Tie up loose ends with interceptor functions.
- Begin copying the address sanitizer functionality needed for the interceptor functions.
- Travel home to Canada.
- Start adding support to get ASan compiling on NetBSD.
- Define private copies of non-intercepted syscalls for ASan to use.
- Continue adding support to get ASan functioning on NetBSD.