This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/5667] New: Exploit kprobe.symbol_name for function boundary tracing
- From: "ananth at in dot ibm dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sources dot redhat dot com
- Date: 25 Jan 2008 09:52:14 -0000
- Subject: [Bug translator/5667] New: Exploit kprobe.symbol_name for function boundary tracing
- Reply-to: sourceware-bugzilla at sourceware dot org
Further to bug 4311, one could explore the possibility of exploiting the
(already existing) struct kprobe.symbol_name field for function address
resolution. At a minimum, the translator may have to just populate this field
and explicitly set struct kprobe.addr to 0x00. The kernel will try to resolve
this symbol, and in any case, probe registration will fail if the kernel fails
to resolve the symbol.
Kernels >= 2.6.19 incorporate kprobe.symbol_name
--
Summary: Exploit kprobe.symbol_name for function boundary tracing
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: translator
AssignedTo: systemtap at sources dot redhat dot com
ReportedBy: ananth at in dot ibm dot com
http://sourceware.org/bugzilla/show_bug.cgi?id=5667
------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.