This is the mail archive of the
systemtap@sourceware.org
mailing list for the systemtap project.
[Bug dyninst/14572] New: Restrict stapdyn's set of available probes
- From: "jistone at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: systemtap at sourceware dot org
- Date: Wed, 12 Sep 2012 21:09:45 +0000
- Subject: [Bug dyninst/14572] New: Restrict stapdyn's set of available probes
- Auto-submitted: auto-generated
http://sourceware.org/bugzilla/show_bug.cgi?id=14572
Bug #: 14572
Summary: Restrict stapdyn's set of available probes
Product: systemtap
Version: unspecified
Status: NEW
Severity: normal
Priority: P2
Component: dyninst
AssignedTo: systemtap@sourceware.org
ReportedBy: jistone@redhat.com
Classification: Unclassified
The translator needs to restrict the set of available probes for
--runtime=dyninst. Right now, the bad/unported probe types will make it
through pass-3 unhindered, but will surely fail to compile as userspace code.
(Note that there's no security risk in this, as we're operating entirely
without privilege, but it's broken nonetheless.)
Eventually, the usable probes will probably look similar to --unprivileged, but
for now only begin/end/error and uprobes-like process.* probes are implemented.
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.