This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug translator/10607] need way to protect sensitive tapset globals
- From: "fche at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Wed, 16 May 2012 15:53:27 +0000
- Subject: [Bug translator/10607] need way to protect sensitive tapset globals
- Auto-submitted: auto-generated
- References: <bug-10607-6586@http.sourceware.org/bugzilla/>
http://sourceware.org/bugzilla/show_bug.cgi?id=10607
Frank Ch. Eigler <fche at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Summary|need way to disable |need way to protect
|global-setting module |sensitive tapset globals
|params |
--- Comment #1 from Frank Ch. Eigler <fche at redhat dot com> 2012-05-16 15:53:27 UTC ---
Note that it's not sufficient to just disable -G foo=bar. An end-user script
could equivalently include probe begin(1) { tapset_global = naughty_value } to
mess with this. So we'd need a more general mechanism to protect tapset
internal globals, whose change could cause problems.
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.