From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 19043 invoked by alias); 12 Apr 2016 09:12:56 -0000 Mailing-List: contact systemtap-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Post: List-Help: , Sender: systemtap-owner@sourceware.org Received: (qmail 18963 invoked by uid 89); 12 Apr 2016 09:12:55 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-1.9 required=5.0 tests=BAYES_00,KAM_LAZY_DOMAIN_SECURITY,RP_MATCHES_RCVD autolearn=ham version=3.3.2 spammy=Staff, alexander, Alexander, staff X-HELO: unimail.uni-dortmund.de Received: from mx1.HRZ.tu-dortmund.de (HELO unimail.uni-dortmund.de) (129.217.128.51) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with (AES256-GCM-SHA384 encrypted) ESMTPS; Tue, 12 Apr 2016 09:12:45 +0000 Received: from [192.168.178.112] (xd9bb9010.dyn.telefonica.de [217.187.144.16]) (authenticated bits=0) by unimail.uni-dortmund.de (8.15.2/8.15.2) with ESMTPSA id u3C9CfNf012119 (version=TLSv1.2 cipher=DHE-RSA-AES128-SHA bits=128 verify=NOT) for ; Tue, 12 Apr 2016 11:12:41 +0200 (CEST) To: systemtap@sourceware.org From: Alexander Lochmann Subject: Blacklist regex is too general Message-ID: <570CBC09.2080608@tu-dortmund.de> Date: Tue, 12 Apr 2016 09:12:00 -0000 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:38.0) Gecko/20100101 Thunderbird/38.6.0 MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha256; protocol="application/pgp-signature"; boundary="dS545x6O37iaxEVXRq90lwb4XHsNwpf4v" X-IsSubscribed: yes X-SW-Source: 2016-q2/txt/msg00027.txt.bz2 This is an OpenPGP/MIME signed message (RFC 4880 and 3156) --dS545x6O37iaxEVXRq90lwb4XHsNwpf4v Content-Type: multipart/mixed; boundary="2trkQHL90tw6M8LrjCTsuGDdJxPsxtGCd" From: Alexander Lochmann To: systemtap@sourceware.org Message-ID: <570CBC09.2080608@tu-dortmund.de> Subject: Blacklist regex is too general --2trkQHL90tw6M8LrjCTsuGDdJxPsxtGCd Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable Content-length: 727 Hi folks! I've wanted to measure the impact of packet duplication due to a raw socket. To do so, I have to probe the kernel function 'raw_v4_input' in net/ipv4/raw.c. Unfortunately, the function name matches the regex defined at dwflpp:4324, which is: blfn +=3D "|raw_.*";. On my opinion, the regex is too general, and there is no reason why it shouldn't be allowed to probe 'raw_v4_input'. It therefore might be necessary to rephrase the mentioned regex. :) Cheers, Alex --=20 Technische Universit=C3=A4t Dortmund Alexander Lochmann PGP key: 0xBC3EF6FD Otto-Hahn-Str. 16 phone: +49.231.7556141 D-44227 Dortmund fax: +49.231.7556116 http://ess.cs.tu-dortmund.de/Staff/al --2trkQHL90tw6M8LrjCTsuGDdJxPsxtGCd-- --dS545x6O37iaxEVXRq90lwb4XHsNwpf4v Content-Type: application/pgp-signature; name="signature.asc" Content-Description: OpenPGP digital signature Content-Disposition: attachment; filename="signature.asc" Content-length: 819 -----BEGIN PGP SIGNATURE----- Version: GnuPG v2 iQIcBAEBCAAGBQJXDLwJAAoJEFk+7QW8Pvb9s8kP/jl6MYGerQCLwzOczR2zvMrF Db22ignr1JMe6BWKzyqycq3S48b3+OxGVvhO2kbAyPfpR2rSqRPzwF3uyz64eEvT FNBSSxLOnATwtVXE2kk4NXsKLNRZm8MUDqu28kNWKi9B9EM4gSChJjGuY6cB8rBS em4FKIWv28Njq0UTNV8x53QUje5ZDdAWyz+Hwf6sKZQ1V2WV0hOXR4VRJr8Guz13 1H5LLpTTWyIpzwWtzQsR2j3lhDa77R11F4HGeSBLYTUg+LcUx8Hlg28vMlw6zZRp VAuGOnY/f6Rh4fI3y/GPiSOlgTpA1lcjpmbWWy3vZsmXnhle46RdgAXQx89MmcbQ DzugMhe7p729WjrbmKuXy2asILSWG+aOSBF9R+2qhn/QwukWYnhV9HTtxA6XuAs8 Mh3shK5GUAzvIap+Gh5f8DcZ1wWZwojBqpEbujxeXNOEc+3oGV4bbE4JM3daEOUv hznlYqijfBvIX5b7YBiY5IgPladpd9aHmvGLgCN6Z3D1xTKuJeCMS8gmYcaV98T/ lVxpPOdJxxyA+f/YsgDX5pGslSfePk9H/HoH7rCY3EY1/bEblfkrcb6ViJnlFC/Q J4W6J0DuX2sU5XovX3U2PNo3SSRE+f4f2U0NQVa8pg86D5bwvso+nSq9dLWEYzZV hdpPRopjCnxEwJi5Y/Fg =JR6g -----END PGP SIGNATURE----- --dS545x6O37iaxEVXRq90lwb4XHsNwpf4v--