* [Bug translator/2426] New: detect and report writes to kernel variables and structures @ 2006-03-06 21:49 hunt at redhat dot com 2006-03-06 22:02 ` [Bug translator/2426] " fche at redhat dot com 2007-05-08 18:49 ` fche at redhat dot com 0 siblings, 2 replies; 3+ messages in thread From: hunt at redhat dot com @ 2006-03-06 21:49 UTC (permalink / raw) To: systemtap People will try to use systemtap for hot-patching and other uses for which it is not intended. We should consider tainting the kernel, or at least writing entries to the system log when programs that modify system variables or structures run. -- Summary: detect and report writes to kernel variables and structures Product: systemtap Version: unspecified Status: NEW Severity: enhancement Priority: P3 Component: translator AssignedTo: systemtap at sources dot redhat dot com ReportedBy: hunt at redhat dot com http://sourceware.org/bugzilla/show_bug.cgi?id=2426 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. ^ permalink raw reply [flat|nested] 3+ messages in thread
* [Bug translator/2426] detect and report writes to kernel variables and structures 2006-03-06 21:49 [Bug translator/2426] New: detect and report writes to kernel variables and structures hunt at redhat dot com @ 2006-03-06 22:02 ` fche at redhat dot com 2007-05-08 18:49 ` fche at redhat dot com 1 sibling, 0 replies; 3+ messages in thread From: fche at redhat dot com @ 2006-03-06 22:02 UTC (permalink / raw) To: systemtap ------- Additional Comments From fche at redhat dot com 2006-03-06 22:02 ------- The translator could emit a call to "printk(...); add_taint(...);" during module initialization for any probe script that includes $target variable writes. I don't see an existing TAINT flag that would be a perfect match, the closest being TAINT_FORCED_MODULE. -- http://sourceware.org/bugzilla/show_bug.cgi?id=2426 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. ^ permalink raw reply [flat|nested] 3+ messages in thread
* [Bug translator/2426] detect and report writes to kernel variables and structures 2006-03-06 21:49 [Bug translator/2426] New: detect and report writes to kernel variables and structures hunt at redhat dot com 2006-03-06 22:02 ` [Bug translator/2426] " fche at redhat dot com @ 2007-05-08 18:49 ` fche at redhat dot com 1 sibling, 0 replies; 3+ messages in thread From: fche at redhat dot com @ 2007-05-08 18:49 UTC (permalink / raw) To: systemtap ------- Additional Comments From fche at redhat dot com 2007-05-08 19:49 ------- We printk during module initialization for all systemtap scripts. -- What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution| |FIXED http://sourceware.org/bugzilla/show_bug.cgi?id=2426 ------- You are receiving this mail because: ------- You are the assignee for the bug, or are watching the assignee. ^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2007-05-08 18:49 UTC | newest] Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2006-03-06 21:49 [Bug translator/2426] New: detect and report writes to kernel variables and structures hunt at redhat dot com 2006-03-06 22:02 ` [Bug translator/2426] " fche at redhat dot com 2007-05-08 18:49 ` fche at redhat dot com
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).