Use system call intercept library that patches the text area of running program to intercept calls to address #32
Approach:
This is based on the file structure from splitfs-clean repo (provided to me by rohan).
Get rid of Quill libc interception, associated files and code.
Lift and shift the existing implementation for system calls in master branch (commit ID: 3e5d922cba15e852581b7ae9557d349521c09863) by making corresponding system call changes and interface changes.
Status:
Currently validated applications: (i) POSIX pjd test suite in all modes (successfully passes the tests too)
Note:
Added the syscall_intercept based implementation alongside the existing Quill based implementation because it is not validated to be at par with the existing Quill based implementation.
Additional details in splitfs_syscall_intercept/README.md
Use system call intercept library that patches the text area of running program to intercept calls to address #32
Approach:
splitfs-clean
repo (provided to me by rohan).Status:
Note: Added the syscall_intercept based implementation alongside the existing Quill based implementation because it is not validated to be at par with the existing Quill based implementation. Additional details in
splitfs_syscall_intercept/README.md