Skip to content

Conversation

@OmSaran
Copy link
Contributor

@OmSaran OmSaran commented Jan 20, 2021

Use system call intercept library that patches the text area of running program to intercept calls to address #32

Approach:

  1. This is based on the file structure from splitfs-clean repo (provided to me by rohan).
  2. Get rid of Quill libc interception, associated files and code.
  3. Lift and shift the existing implementation for system calls in master branch (commit ID: 3e5d922) by making corresponding system call changes and interface changes.

Status:

  1. Currently validated applications: (i) POSIX pjd test suite in all modes (successfully passes the tests too)

Note:
Added the syscall_intercept based implementation alongside the existing Quill based implementation because it is not validated to be at par with the existing Quill based implementation.
Additional details in splitfs_syscall_intercept/README.md

@OmSaran OmSaran marked this pull request as ready for review January 24, 2021 16:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant