public inbox for systemtap@sourceware.org
 help / color / mirror / Atom feed
* [Bug translator/2426] New: detect and report writes to kernel variables and structures
@ 2006-03-06 21:49 hunt at redhat dot com
  2006-03-06 22:02 ` [Bug translator/2426] " fche at redhat dot com
  2007-05-08 18:49 ` fche at redhat dot com
  0 siblings, 2 replies; 3+ messages in thread
From: hunt at redhat dot com @ 2006-03-06 21:49 UTC (permalink / raw)
  To: systemtap

People will try to use systemtap for hot-patching and other uses for which it is
not intended. 

We should consider tainting the kernel, or at least writing entries to the
system log when programs that modify system variables or structures run.

-- 
           Summary: detect and report writes to kernel variables and
                    structures
           Product: systemtap
           Version: unspecified
            Status: NEW
          Severity: enhancement
          Priority: P3
         Component: translator
        AssignedTo: systemtap at sources dot redhat dot com
        ReportedBy: hunt at redhat dot com


http://sourceware.org/bugzilla/show_bug.cgi?id=2426

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Bug translator/2426] detect and report writes to kernel variables and structures
  2006-03-06 21:49 [Bug translator/2426] New: detect and report writes to kernel variables and structures hunt at redhat dot com
@ 2006-03-06 22:02 ` fche at redhat dot com
  2007-05-08 18:49 ` fche at redhat dot com
  1 sibling, 0 replies; 3+ messages in thread
From: fche at redhat dot com @ 2006-03-06 22:02 UTC (permalink / raw)
  To: systemtap


------- Additional Comments From fche at redhat dot com  2006-03-06 22:02 -------
The translator could emit a call to "printk(...); add_taint(...);" during module
initialization for any probe script that includes $target variable writes.  I
don't see an existing TAINT flag that would be a perfect match, the closest
being TAINT_FORCED_MODULE.


-- 


http://sourceware.org/bugzilla/show_bug.cgi?id=2426

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

^ permalink raw reply	[flat|nested] 3+ messages in thread

* [Bug translator/2426] detect and report writes to kernel variables and structures
  2006-03-06 21:49 [Bug translator/2426] New: detect and report writes to kernel variables and structures hunt at redhat dot com
  2006-03-06 22:02 ` [Bug translator/2426] " fche at redhat dot com
@ 2007-05-08 18:49 ` fche at redhat dot com
  1 sibling, 0 replies; 3+ messages in thread
From: fche at redhat dot com @ 2007-05-08 18:49 UTC (permalink / raw)
  To: systemtap


------- Additional Comments From fche at redhat dot com  2007-05-08 19:49 -------
We printk during module initialization for all systemtap scripts.


-- 
           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|NEW                         |RESOLVED
         Resolution|                            |FIXED


http://sourceware.org/bugzilla/show_bug.cgi?id=2426

------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2007-05-08 18:49 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-03-06 21:49 [Bug translator/2426] New: detect and report writes to kernel variables and structures hunt at redhat dot com
2006-03-06 22:02 ` [Bug translator/2426] " fche at redhat dot com
2007-05-08 18:49 ` fche at redhat dot com

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for read-only IMAP folder(s) and NNTP newsgroup(s).